eWorkplace Reports

A Solid Mobility Strategy Can Improve Quality of Service
sponsored by Dimension Data
WHITE PAPER: Learn how one company improved their quality of service by implementing a sound mobility strategy. This case study highlights how to craft a mobility strategy that will improve efficiency, and keep field staff as well as clients happy.
Posted: 11 Mar 2015 | Published: 11 Mar 2015

Dimension Data

Next-Generation Security in a Mobile Era
sponsored by TechTarget CIO
EBOOK: Mobile security isn't just a matter investing more in security technologies. Access this handbook to learn what CIO expert Harvey Koeppel thinks it will take to reformulate your mobile security strategy and tackle today's mobile risks. Also uncover the top 10 mobile security risks, a 7-point checklist for guarding mobile apps and devices, and more.
Posted: 13 Mar 2015 | Published: 13 Mar 2015

TechTarget CIO

The Cost of Moving Unified Communications to the Cloud
sponsored by NWN Corporation
EGUIDE: As cloud UC services emerged, vendors touted cost savings as a key driver, but Nemertes Research results did not align, as average operational costs for cloud services were more costly. That is, until this year for companies with rollouts of fewer than 1,000 licenses. In this e-guide, learn why operational costs are starting to decline.
Posted: 28 Dec 2020 | Published: 28 Dec 2020

NWN Corporation

The Essential Guide for Threat Intelligence Services: What to Look For
sponsored by TechTarget Security
EBOOK: This Buyer's Essential guide explains what you need to know if you're in the market for a threat intelligence service. It outlines the must-have features, like a threat intelligence score, and also explains what you need to do to ensure you benefit as much as possible from adding a threat intelligence feed to your security system.
Posted: 27 Feb 2015 | Published: 27 Feb 2015

TechTarget Security

9 Essential Elements for Effective Enterprise Mobility
sponsored by VMware, Inc.
EGUIDE: Expert-level mobility comes in threes. Uncover three essentials for an effective mobile app strategy, three steps to a successful mobile initiative, and three steps to better mobile data protection.
Posted: 20 Jun 2016 | Published: 15 Jun 2016

VMware, Inc.

To Build or to Buy? That is the Mobile App Question
sponsored by TechTarget Mobile Computing
EBOOK: This expert guide explores how to choose the best app deployment approach for your business needs and reveals 4 mobile app options that you may not have considered.
Posted: 22 Jun 2015 | Published: 22 Jun 2015

TechTarget Mobile Computing

GSMA Mobile World Congress
sponsored by Mobile World Congress
EVENT: GSMA Mobile World Congress is the place for mobile leaders to network and conduct business. This senior-level conference and technology exhibition brings together over 85,000 industry professionals, operators, application developers on "The Edge of Innovation".
Posted: 12 Dec 2014 | Published: 12 Dec 2014

All resources sponsored by Mobile World Congress

SAP's IoT Lineup for ERP and Manufacturing
sponsored by Microsoft, Intel, SAP
EGUIDE: In this expert e-guide, Ann Grackin from ChainLink Research gives an overview of SAP's new IoT offerings. Learn about these emerging services and find out how you can incorporate IoT products into your ERP, manufacturing, and analytics strategies.
Posted: 02 Jan 2018 | Published: 02 Jan 2018

Microsoft, Intel, SAP

Shifting Unified Communications into the Cloud and Mobile Apps
sponsored by TechTarget Unified Communications
EBOOK: This Technical Guide explores the disconnect between UC applications and how employees in sales, marketing, customer service and other departments do their job. It also discusses how vendors are working to integrate UC capabilities in popular work software, like customer-management applications, on both desktop and mobile devices.
Posted: 12 Jan 2015 | Published: 12 Jan 2015

TechTarget Unified Communications

Tackling Mobile Security and BYOD Risks
sponsored by TechTarget Security
EGUIDE: This expert guide from SearchSecurity.com examines the top risks of mobile security and what BYOD risks your enterprise could encounter, along with how you can rethink network security and take the steps needed to ensure a successful BYOD experience.
Posted: 08 Feb 2021 | Published: 11 Jul 2013

TechTarget Security