Smartphones Reports

Digital secure remote payment: How Apple Pay can change the future of remote payments
sponsored by TechTarget ComputerWeekly.com
RESEARCH CONTENT: Apple Pay introduces EMV cryptographic strength to remote payments for in-app payments on the iPhone and interconnected Apple devices. It has the potential to reduce card-not-present (CNP) fraud.
Posted: 08 Feb 2021 | Published: 27 Mar 2018

TechTarget ComputerWeekly.com

Computer Weekly – 8 October 2019: Showcasing the potential of 5G
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, we visit an ambitious trial in Bristol that is showcasing the possibilities offered by 5G roll-out. We look at how emerging automation technologies are enhancing the use of identity and access management tools. And we assess the Government Digital Service plan for transforming public services. Read the issue now.
Posted: 08 Feb 2021 | Published: 08 Oct 2019

TechTarget ComputerWeekly.com

Mobile World Congress 2019: The year 5G use cases got real
sponsored by TechTarget ComputerWeekly.com
EGUIDE: In this e-guide we will examine some of the bigger themes that emerged over the course of Mobile World Congress 2019 - which now attracts over 100,000 people every year.
Posted: 08 Feb 2021 | Published: 12 Mar 2019

TechTarget ComputerWeekly.com

Unlock the value of BYOD: Go mobile without sacrificing security
sponsored by IBM
WHITE PAPER: This paper explores how organizations can derive business value in the BYOD era, while still providing a security-rich IT infrastructure and consistent service levels.
Posted: 08 Apr 2014 | Published: 30 Nov 2012

IBM

Mobile Device Management Buyers Guide
sponsored by Sophos
WHITE PAPER: This informative paper takes an in-depth look at the mobile device management (MDM) solutions that are on the market today, comparing features and discussing the benefits and drawbacks of each tool.
Posted: 03 Jul 2014 | Published: 25 Feb 2014

Sophos

Common Use of Mobile Devices Makes Strong Case for Strong BYOD
sponsored by TigerText, Inc.
EGUIDE: Access this expert e-guide from SearchHealthIT.com to learn more about the benefits and challenges to consider before implementing BYOD policies.
Posted: 28 Apr 2014 | Published: 28 Apr 2014

TigerText, Inc.

Mobile Device Management Checklist
sponsored by Citrix
EGUIDE: This expert guide from SearchConsumerization.com provides a mobile device management (MDM) checklist your organization can utilize in order to ensure successful mobility deployments and management.
Posted: 13 Feb 2014 | Published: 13 Feb 2014

Citrix

Accelerating Mobile Development with PaaS, SaaS and IaaS
sponsored by IBM
EGUIDE: In this e-guide, experts highlight how Platform-as-a-Service (PaaS), Software-as-a-Service (SaaS), and Infrastructure-as-a-Service (IaaS) can jumpstart your mobile app development processes and get your software out the door faster.
Posted: 29 Sep 2014 | Published: 29 Sep 2014

IBM

BYOD Risks and Rewards How to keep employee smartphones, laptops and tablets secure
sponsored by Sophos
WHITE PAPER: This informative resource takes a look at the risks and rewards of BYOD from a security perspective and details what your organization can do to embrace the brand while ensuring that your sensitive data is protected.
Posted: 03 Jul 2014 | Published: 25 Feb 2014

Sophos

Protection Plus
sponsored by Insight and Panasonic
WHITE PAPER: This exclusive paper discusses an extended warranty that comes complimentary with a number of mobile hardware solutions. Read on to learn how this warrantee can enhance your workers' productivity and help maintain your budget.
Posted: 06 Mar 2014 | Published: 06 Mar 2014

Insight and Panasonic