Business of Information Technology  >   Business Processes  >   eCommerce  >  

M Commerce

RSS Feed   
M Commerce Reports
 
Mobile Security Strategies
sponsored by ComputerWeekly.com
ANALYST REPORT: This exclusive report for Computer Weekly members explains the security risks and challenges of using mobile devices in the enterprise.
Posted: 09 Nov 2012 | Published: 09 Nov 2012

ComputerWeekly.com

Create a strong, dynamic customer experience
sponsored by Hewlett Packard Enterprise
WHITE PAPER: In this white paper, learn how retail businesses should leverage technology to gather more customer info, implement the appropriate changes to their services, and create a more enjoyable shopping experience. Click now to see how to manage and maximize opportunity from omni-channel services.
Posted: 20 Jan 2014 | Published: 30 Nov 2012

Hewlett Packard Enterprise

Advanced Secure Access for Remote and Mobile Workers
sponsored by Barracuda Networks
PRODUCT OVERVIEW: Download this resource to discover how to provide your mobile workers with secure, flexible, remote access to corporate apps and information, and reduce the risks of BYOD, with a cloud-based firewall.
Posted: 21 May 2019 | Published: 31 Dec 2018

Barracuda Networks

IT Priorities 2014: UK Europe, France and Germany
sponsored by ComputerWeekly.com
RESEARCH CONTENT: Benchmark your IT spending plans, with our in-depth study of IT spending priorities in the UK, France, Germany, and Europe in 2014.
Posted: 17 Jan 2014 | Published: 17 Jan 2014

TOPICS:  Application Development | Backup for Virtualized Servers | Backup Server Hardware | Backup Software | Backups | Budgeting | Business Continuity Planning | Business Intelligence | Business Process Automation | Business Process Management | Cloud Archive | Cloud Backup | Cloud Computing | Cloud CRM | Cloud Disaster Recovery | Cloud Management | Cloud Security | Cloud Storage | Cloud Storage Services | Cloud Storage Strategy | Compliance Best Practices | CRM | CRM Software | Data Analytics | Data Center Consolidation | Data Center Networking | Data Centers | Data Deduplication | Data Loss Prevention (DLP) | Database Management Software | Desktop Virtualization | Disaster Recovery | ERP | ERP Software | Ethernet Networks | Green Data Center | Green Storage | Hardware | Hybrid clouds | Identity Management | Infrastructure as a Service (IaaS) | ITIL | Mobile CRM | Mobile Device Management | Mobile Device Management Software | Mobile Middleware | Mobile Payments | Mobile Workers | NAS | NAS Software | Network Appliances | Network Architectures | Network Configuration Management | Network Infrastructure | Network Management | Network Monitoring Software | Network Operating Systems | Network Performance Management Software | Network Processors | Network Provisioning | Network Security | Network Security Appliances | Network Security Hardware | Network Security Software | Networking | Networking Hardware | Office Suites | Outsourcing | Platform as a service | Private Cloud | Public Cloud | Remote Access Hardware | Risk Assessment | Risk Management | Security | Security Architectures | Security Audits | Security Best Practices | Security Event Management | Security Hardware | Security Industry | Security Infrastructure | Security Management | Security Managers | Security Policies | Security Software | Security Spending | Security Standards | Security Systems | Security Threats | Security Tokens | Server Appliances | Server Consolidation | Server Hardware | Server Provisioning | Server Software | Server Virtualization | Smart Phones | Social Computing | Software | Software as a Service | Software Implementation | Software Virtualization | Storage Appliances | Storage Architectures | Storage Consolidation | Storage Devices | Storage for File Virtualization/NAS Virtualization | Storage for Virtualized Servers | Storage Hardware | Storage Management | Storage Management Services | Storage Management Software | Storage Media | Storage Resource Management Software | Storage Security | Storage Spending | Storage Switches | Storage Systems | Storage Virtualization | Storage Virtualization Software | Supply Chain Software | Tablet PC | Tape Backups | Testing | Video Services | Videoconferencing Hardware | Videoconferencing Services | Videoconferencing Software | Virtual Desktop Infrastructure | Virtual Machine | Virtualization Security | Vulnerability Management | WAN | WAN Hardware | WAN Switches | WAN Switching | Windows | Windows 7 | Windows Server Software | Windows XP | WLAN | Workforce Management Software
ComputerWeekly.com

Best Approaches to BYOD and Mobile Security
sponsored by Citrix
EGUIDE: This exclusive e-guide offers advice on developing a strong mobile security plan and examines how some modern corporations approach BYOD and security.
Posted: 02 Oct 2014 | Published: 02 Oct 2014

Citrix

How UC Mobility Changes Your Enterprise
sponsored by SearchUnifiedCommunications.com
EBOOK: This guide provides the expert advice you need to adapt to a mobile UC world. Access now and learn how to rethink and implement your UC strategy in order to deliver a seamless mobile user experience for voice, video, and data, without too much IT upheaval.
Posted: 06 Mar 2014 | Published: 06 Mar 2014

SearchUnifiedCommunications.com

CYOD: Hassle Free BYOD
sponsored by Insight
WHITE PAPER: This informative resource discusses a new approach to BYOD where employees choose their own device from a menu of pre-approved devices and plans, helping ease the burden of management for IT and allowing for improved efficiency.
Posted: 24 Apr 2014 | Published: 24 Apr 2014

Insight

Mobility and the Channel
sponsored by SearchITChannel.com
EBOOK: This Handbook explores opportunities for IT solution providers in the mobile market, delving into detail on those with the greatest potential return for value-added resellers (VARs), systems integrators and IT consultants.
Posted: 06 Mar 2014 | Published: 07 Mar 2014

SearchITChannel.com

Augmented Reality Mobile Technology Still 'Experimental' in the Enterprise
sponsored by Dell EMC and Intel®
EGUIDE: Pokémon Go brought augmented reality (AR) technology to the masses. In this guide, our experts illustrate the basics of AR in the mobile enterprise, and how to overcome adoption roadblocks such as cost, lack of development tools, and more. Read on to dive into the state of the AR market and evaluate its adoption readiness in your enterprise.
Posted: 06 Apr 2017 | Published: 03 Apr 2017

Dell EMC and Intel®

A Rugged Notebook for Extreme Conditions
sponsored by DellEMC and Intel®
WHITE PAPER: This exclusive paper examines a rugged notebook solution that is built to endure even the roughest of field conditions.
Posted: 18 Jun 2014 | Published: 13 Jun 2014

DellEMC and Intel®
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement