Hardware  >   Communications Hardware  >   Voice Communications Hardware  >   Consumer Telephony Equipment  >   Telephones  >  

Wireless Phones

RSS Feed    Add to Google    Add to My Yahoo!
Wireless PhonesReports
 
Mobile Device Security Overview
sponsored by SearchSecurity.com
EGUIDE: This expert E-Guide highlights the 3 components for solid mobile device security, top mobile operating systems and more.
Posted: 29 Sep 2011 | Published: 29 Sep 2011

SearchSecurity.com

Your Guide to Mobile Bill Management Success
sponsored by Xigo
EBOOK: This expert E-Book highlights best practices for improved mobile bill management and mobile bill consolidation.
Posted: 24 Oct 2011 | Published: 24 Oct 2011

Xigo

Increasing Productivity for the Windows Mobile Workforce
sponsored by Celio Corp / REDFLY Mobile Companion
WHITE PAPER: The REDFLY Mobile Companion is a smartphone terminal that allows the smartphone to be used like a laptop when connected to REDFLY, its 80-key keyboard and 8-inch display allow users to interact with Word Mobile just like any word processor.
Posted: 30 Oct 2008 | Published: 29 Aug 2008

Celio Corp / REDFLY Mobile Companion

Top 3 Questions for Mobile Computer Purchases
sponsored by Intermec
WHITE PAPER: This white paper provides the top three questions you must ask before making a mobile computer purchase.
Posted: 25 Oct 2007 | Published: 01 Mar 2007

Intermec

Managing Security on Mobile Phones
sponsored by Nokia
WHITE PAPER: This paper describes the challenges of provisioning and managing security in mobile phone environments and how a well-designed deployment system can alleviate these challenges.
Posted: 17 May 2005 | Published: 01 Apr 2005

Nokia

Does tiered pricing require more visibility into mobile data usage?
sponsored by Mu Dynamics
EGUIDE: This e-guide discusses the top factors driving the trend for tiered pricing. Uncover what key carriers are considering for the future and what it means for end users.
Posted: 20 Apr 2011 | Published: 20 Apr 2011

Mu Dynamics

What's new with Windows Phones
sponsored by Microsoft
PODCAST: In this three-part series podcast, hear from an industry expert as he discusses what's new with Windows Phones. Uncover why Windows Phones on Exchange server is the best mix for your enterprise and key advantages of leveraging business applications through Windows Phones.
Posted: 20 Nov 2009 | Premiered: Nov 20, 2009

Microsoft

Telephone Reliability for Alarm Notification: Where Have All the Landlines Gone?
sponsored by Sensaphone
WHITE PAPER: This paper discusses why timely and reliable alarm notification is part of a successful remote monitoring program and discusses the factors to consider when selecting a remote monitoring system.
Posted: 17 Jun 2008 | Published: 17 Jun 2008

Sensaphone

Developing an Effective Corporate Mobile Policy
sponsored by BlackBerry
WHITE PAPER: By now, most organizations are clear on the advantages and benefits of wireless data solutions in the enterprise. However, It is no longer enough to rely on ad hoc policies regarding wireless computing.
Posted: 19 Jun 2008 | Published: 01 Jun 2008

BlackBerry

eBook - The Mobile Enterprise: Taking Wireless Networking to the Next Level
sponsored by SearchMobileComputing
EBOOK: Read this eBook to learn how faster, more robust 802.11n WLANs can help your business offer new mobility services to improve mobility and reduce cost through fixed-mobile convergence. Discover how unified communications applications can exploit wireless mobile connectivity to facilitate workforce collaboration and enhance productivity.
Posted: 10 Sep 2009 | Published: 10 Sep 2009

SearchMobileComputing
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement