Business of Information Technology  >   Business Processes  >   eCommerce  >  

Wireless Commerce

RSS Feed    Add to Google    Add to My Yahoo!
Wireless CommerceReports
 
Mobile Security Strategies
sponsored by ComputerWeekly.com
ANALYST REPORT: This exclusive report for Computer Weekly members explains the security risks and challenges of using mobile devices in the enterprise.
Posted: 09 Nov 2012 | Published: 09 Nov 2012

ComputerWeekly.com

Create a strong, dynamic customer experience
sponsored by Hewlett-Packard Company
WHITE PAPER: In this white paper, learn how retail businesses should leverage technology to gather more customer info, implement the appropriate changes to their services, and create a more enjoyable shopping experience. Click now to see how to manage and maximize opportunity from omni-channel services.
Posted: 20 Jan 2014 | Published: 30 Nov 2012

Hewlett-Packard Company

Mobilizing Your Infrastructure: The Fast Lane to Success
sponsored by CA Technologies.
WHITE PAPER: This exclusive resource examines how your organization can mobilize your infrastructure quickly, efficiently, and effectively.
Posted: 13 Jun 2014 | Published: 13 Jun 2014

CA Technologies.

The Challenge: Enabling A Mobile Workforce
sponsored by Raytheon Trusted Computer Solutions
WEBCAST: This exclusive webcast examines a mobile content enablement solution that provides your mobile workforce with secure access to critical information and data, allowing them to do their jobs efficiently and effectively.
Posted: 02 Jun 2014 | Premiered: Jun 2, 2014

Raytheon Trusted Computer Solutions

Virtual Mobile Infrastructure (VMI): Like VDI but for Mobile Devices
sponsored by Raytheon Trusted Computer Solutions
WHITE PAPER: This exclusive resource discusses the impact that the rise of BYOD has had on enterprise security, how the industry is responding, and what your organization can do to avoid the common pitfalls.
Posted: 27 May 2014 | Published: 27 May 2014

Raytheon Trusted Computer Solutions

Enterprise Mobility Management – Going from Good to Great
sponsored by CA Technologies.
WEBCAST: This exclusive webcast takes a look at what makes an enterprise mobility management strategy successful, outlining what approaches are popular, what users are looking for, and how you can better empower your mobile workforce.
Posted: 02 Jun 2014 | Premiered: Jun 2, 2014

CA Technologies.

Case Study: Telecom Giant Calls On Box For Mobile Sales Team
sponsored by Box
CASE STUDY: This exclusive case study discusses how a telecom giant was able to use cloud services to ensure that their tablet-equipped sales team is efficient, secure, well-connected and, most importantly, mobile.
Posted: 30 Apr 2014 | Published: 30 Apr 2014

Box

Top Five Ways IT Teams Benefit from Box
sponsored by Box
WHITE PAPER: This informative white paper discusses a cloud solution that can help your organization deliver a highly mobile, collaborative and innovative workforce without sacrificing security, visibility or control.
Posted: 29 Apr 2014 | Published: 29 Apr 2014

Box

Mobile IAM™: The “BYOD Done Right™” Solution
sponsored by Extreme Networks
WHITE PAPER: This exclusive resource examines a comprehensive BYOD solution that provides security, full IT control, and reliable network experience for all users.
Posted: 22 May 2014 | Published: 22 May 2014

Extreme Networks

Infographic: The Effects of Mobile on the Enterprise
sponsored by Accellion, Inc.
WHITE PAPER: This exclusive resource takes a look at how mobility has impacted organizations today, examining both the benefits and the drawbacks of the trend.
Posted: 02 Jun 2014 | Published: 02 Jun 2014

Accellion, Inc.
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement