Business of Information Technology  >   Business Processes  >   eCommerce  >  

Wireless Commerce

RSS Feed    Add to Google    Add to My Yahoo!
Wireless Commerce Reports
 
Mobile Security Strategies
sponsored by ComputerWeekly.com
ANALYST REPORT: This exclusive report for Computer Weekly members explains the security risks and challenges of using mobile devices in the enterprise.
Posted: 09 Nov 2012 | Published: 09 Nov 2012

ComputerWeekly.com

Create a strong, dynamic customer experience
sponsored by Hewlett Packard Enterprise
WHITE PAPER: In this white paper, learn how retail businesses should leverage technology to gather more customer info, implement the appropriate changes to their services, and create a more enjoyable shopping experience. Click now to see how to manage and maximize opportunity from omni-channel services.
Posted: 20 Jan 2014 | Published: 30 Nov 2012

Hewlett Packard Enterprise

Magic Quadrant for Enterprise Mobility Management Suites
sponsored by Maas360 by IBM
WHITE PAPER: The mobile device management market has evolved into the enterprise mobility management suites market. EMM is growing quickly, and the vendor landscape has changed significantly, which will impact IT leaders' choices. This magic quadrant for enterprise mobility management suites can help you decide. Read on to learn more.
Posted: 11 Mar 2015 | Published: 11 Mar 2015

Maas360 by IBM

Enterprise Mobility: The Year in Review
sponsored by IBM
WEBCAST: In this exclusive webcast, IBM teamed up with research analyst firm Ovum for a series of presentations aimed at identifying the must-know trends in mobility in 2015. View now to learn more.
Posted: 06 Mar 2015 | Premiered: Mar 6, 2015

IBM

BYOD and UC: Get more value from both
sponsored by Cisco
WHITE PAPER: This informative resource takes an in-depth look at the role mobility can play as part of a midmarket enterprise's UC platform and how your organization can streamline management to reap the benefits of BYOD.
Posted: 02 Apr 2014 | Published: 02 Apr 2014

Cisco

CIO Spotlight: Controlling Data Risk In the BYOD Onslaught
sponsored by Commvault
WHITE PAPER: This exclusive paper lists 5 areas that support risk mitigation and data protection for BYOD. Read on to learn more.
Posted: 04 Dec 2014 | Published: 04 Dec 2014

Commvault

Enabling an Enterprise-Grade Mobile Workspace
sponsored by Citrix
WHITE PAPER: This informative paper examines what you organization needs to keep in mind when constructing a mobile strategy and also outlines how you can enable a mobile workspace allowing your employees to securely connect to the corporate network regardless of location or device.
Posted: 08 May 2014 | Published: 08 May 2014

Citrix

Infographic: The Effects of Mobile on the Enterprise
sponsored by Accellion, Inc.
WHITE PAPER: This exclusive resource takes a look at how mobility has impacted organizations today, examining both the benefits and the drawbacks of the trend.
Posted: 02 Jun 2014 | Published: 02 Jun 2014

Accellion, Inc.

Best Approaches to BYOD and Mobile Security
sponsored by Citrix
EGUIDE: This exclusive e-guide offers advice on developing a strong mobile security plan and examines how some modern corporations approach BYOD and security.
Posted: 02 Oct 2014 | Published: 02 Oct 2014

Citrix

5 Easy steps to adopting an enterprise app store
sponsored by Citrix
WHITE PAPER: This exclusive white paper examines five easy steps that your organization can take to adopt a secure and effective enterprise app store that will help you empower your workers and reap the benefits of enterprise mobility.
Posted: 12 May 2014 | Published: 12 May 2014

Citrix
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement