Mobile Data Systems
In a new video, security analyst Rich Mogull discusses mobile data protection topics and addresses many issues, including, the latest trends in mobile security, mobile device management, and mobile data protection.
| |
|
|
The Consumerisation of Enterprise Mobility: A Formidable Challenge for CIOs, but a great opportunity. Download the Trend Micro Enterprise Security Whitepaper: The Consumerisation of Enterprise Mobility to learn the secrets to data protection on mobile devices.
| |
|
|
By: Adobe
Published Date: Sep 08, 2011
Discover how to build mobile apps and learn more about minimizing development time and the re-use of components across device platforms.
| |
|
|
By: Adobe
Published Date: Sep 08, 2011
Join Christophe Coenraets as he demonstrates how to build mobile apps for iOS and Android devices more easily using Adobe Flash Builder, Flex & LiveCycle. Learn how to minimize development time and reuse components across device platforms.
| |
|
|
By: Intermec
Published Date: Sep 08, 2011
This white paper identifies best practices for workforce optimization, resource management, revenue assurance and performance control, explains how technology supports these processes, provides leveraging current mobile and wireless technology to enhance processes to improve productivity and profitability.
| |
|
|
By: Intermec
Published Date: Sep 07, 2011
In this white paper, learn why emerging enterprise applications require ruggedness and reliability.
| |
|
|
By: Intermec
Published Date: Sep 07, 2011
This is for individuals who want to understand more about the latest evolution of cellular or wireless technology.
| |
|
|
Vice President and Research Fellow for Aberdeen Group, shares trends, best practices and actionable insight on management of iOS mobile devices.
| |
|
|
By: Entrust
Published Date: Aug 03, 2011
Whether it's a smartcard for physical and logical access, soft tokens on a mobile device, or a unique grid card for strong authentication to a VPN, organizations can consolidate all authentication processes with a single, proven solution.
| |
|
|
Maintain visibility and control, regardless of device or OS. The consumerisation of enterprise information technology is one of the most significant security concerns today. Gartner's Analyst Ken Delaney explains the impact of consumerisation on enterprise IT.
| |
|
|
Answers to Your Mobile Device Data Protection Questions. The IT landscape is changing quickly, Get expert advice on developing a strategy and learn how your organization can manage security on employee-owned mobile devices.
| |
|
|
By: Sophos
Published Date: Jun 27, 2011
Seven Tips for Securing Mobile Workers is intended to offer practical guidance on dealing with one of the fastest growing threats to the security of sensitive and confidential information.
| |
|
|
This was a live webcast featuring Mark Steward, IT Director at Baird & Warner, the oldest residential real estate brokerage in the nation with 26 branch offices in 300 communities.
| |
|
|
By: SAP
Published Date: Apr 13, 2011
If you are a business running SAP Business Suite solutions, learn how you can use Sybase mobile solutions for SAP to dramatically increase sales productivity and bring the advantages of business mobility to your organization now.
| |
|
|
This document discusses the Evolution of Ethernet. As a proven leader in delivering Ethernet services, Tata Communications is making a bold, calculated move that positively impact the future of Ethernet and ultimately benefit customers.
| |
|
|
In this report, we will take a look at the IT-related activities from the ITPro and AnalystPerspectives collections, as well as the most popular IT and business search terms.
| |
|
|
By: SAP
Published Date: Mar 28, 2011
Mobility transformation starts with a plan. Discover best practices for building an enterprise mobility strategy.
| |
|
|
By: SAP
Published Date: Mar 28, 2011
Learn about the momentum behind enterprise mobility and about SAP's plans for keeping up.
| |
|
|
By: SAP
Published Date: Mar 24, 2011
In spite of the growth of virtual business activities performed via the World Wide Web, every business transaction or operation is performed at a physical place. And as handheld GPS devices drive a growing awareness of the concept of "location," people are increasingly looking for operational efficiencies, revenue growth, or more effective management as a result of geographic data services and location-based intelligence. In this white paper, David Loshin, president of Knowledge Integrity, Inc., introduces geographic data services (such as geocoding and proximity matching) and discusses how they are employed in both operational and analytical business applications. The paper also reviews analytical techniques applied across many types of organizations and examines a number of industry-specific usage scenarios.
| |
|
|
With the ability to access information at any time, in any location, on a hand-held device, consumers can now make more and more decisions quickly and easily. Read More.
| |
|
|
Learn more about Business Intelligence for the iPad and the iPhone. Discover how beautiful dashboards display brilliantly in an instant. Gain quick access to key insights that you can share with your colleagues to drive better business decisions. Learn more.
| |
|
|
This paper will discuss the security capabilities of MicroStrategy Mobile on Apple's mobile devices.
| |
|
|
This free, one-day course covers an introduction to Mobile BI Applications and Mobile App architecture, interactivity and design techniques, and how to develop and deploy a fully-functional Mobile App. Students will spend the afternoon session exploring MicroStrategy software with hands-on, instructor-driven exercises.
| |
|
|
By: Cisco
Published Date: Mar 10, 2011
Fresh Direct Produce workforce is more mobile, responsive with Cisco Unified Communications. To give its employees the immediate, direct communications that the business required, Fresh Direct replaced its phone system with the Cisco� Unified Communications System. The Cisco solution supports all of the company's voice, data, and wireless communications on one secure network.
| |
|
|
This white paper examines the information security needs of midmarket organisations, and explains how SaaS security services can help address the security requirements of a distributed workforce.
| |
|
|
|