Business of Information Technology  >   Business Processes  >   eCommerce  >  

Wireless Commerce

RSS Feed    Add to Google    Add to My Yahoo!
Wireless Commerce Reports
 
Mobile Security Strategies
sponsored by ComputerWeekly.com
ANALYST REPORT: This exclusive report for Computer Weekly members explains the security risks and challenges of using mobile devices in the enterprise.
Posted: 09 Nov 2012 | Published: 09 Nov 2012

ComputerWeekly.com

Create a strong, dynamic customer experience
sponsored by Hewlett-Packard Company
WHITE PAPER: In this white paper, learn how retail businesses should leverage technology to gather more customer info, implement the appropriate changes to their services, and create a more enjoyable shopping experience. Click now to see how to manage and maximize opportunity from omni-channel services.
Posted: 20 Jan 2014 | Published: 30 Nov 2012

Hewlett-Packard Company

Enable Secure Access to Apps
sponsored by IBM
DATA SHEET: The BYOD era has left IT with less control over the network, creating security and network integrity problems.  IT professionals are constantly striving to secure sensitive enterprise data and discover vulnerabilities.
Posted: 28 Aug 2014 | Published: 28 Aug 2014

IBM

Why Humanizing Enterprise Communications Makes all the Difference
sponsored by Unify
WHITE PAPER: This exclusive resource acts as a helpful introduction to coping with the advent of new communications and collaboration tools. Read on to learn more.
Posted: 20 Feb 2015 | Published: 20 Feb 2015

Unify

Addressing NIST and DOD Requirements for Mobile Device Management (MDM)
sponsored by IBM
WHITE PAPER: Read this exclusive white paper to gain key insights on the security risks associated with mobile device policies, as well as an in-depth look at one solution that was able to drive rock-solid security without risking network performance and end-user satisfaction. Read on to learn more.
Posted: 11 Nov 2014 | Published: 11 Nov 2014

IBM

New Enterprise Imperative - Securing Mobile Content
sponsored by Accellion, Inc.
WHITE PAPER: Read this whitepaper to learn the requirements for providing secure mobile access to ECM platforms and cloud storage services, and how to best enable mobile productivity for your work force
Posted: 16 Jan 2015 | Published: 16 Jan 2015

Accellion, Inc.

Wi-Fi Buyers Guide
sponsored by Extreme Networks
WHITE PAPER: The huge growth of mobile and BYOD is driving user's demands to rise, while networks become more dense and harder to manage.  How can a balance be found between the two?
Posted: 23 Sep 2014 | Published: 23 Sep 2014

Extreme Networks

EMA Research Report: Enabling Unified Endpoint and Service Management for a Mobile Workforce
sponsored by FrontRange Solutions Inc.
WHITE PAPER: This exclusive white paper takes an in-depth look at enabling unified endpoint and service management for mobile workers. Read on to learn more.
Posted: 07 Nov 2014 | Published: 07 Nov 2014

FrontRange Solutions Inc.

Buyer's Guide to 802.11ac Wireless: The Time to Move is Now!
sponsored by Extreme Networks
WHITE PAPER: Keeping the network up to speed is no easy task - but with wireless from 802.11ac, speed can be increased by up to three times as much as before. Read on to learn more.
Posted: 03 Dec 2014 | Published: 03 Dec 2014

Extreme Networks

Supporting Mobility with a UC Technology Strategy
sponsored by Windstream Communications
EGUIDE: Learn what standards define mobility, how emerging standards will affect mobile collaboration, and how to evaluate the strength of your unified communications technology strategy.
Posted: 27 Jun 2014 | Published: 27 Jun 2014

Windstream Communications
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement