(Translated by https://www.hiragana.jp/)
Mobile Data Systems White Papers - Business Exchange
The Wayback Machine - https://web.archive.org/web/20110909225702/http://whitepapers.bx.businessweek.com:80/technology/wireless/mobile_data_systems

Mobile Data Systems

Results 1 - 25 of 184Sort Results By: Published Date | Title | Company Name
By: Trend Micro, Inc.     Published Date: Jul 19, 2011
In a new video, security analyst Rich Mogull discusses mobile data protection topics and addresses many issues, including, the latest trends in mobile security, mobile device management, and mobile data protection.
Tags : trend micro, internet content security, smart protection network, internet security, enterprise business security, worry-free business security, web threat management, australia
     Trend Micro, Inc.
By: Trend Micro, Inc.     Published Date: Jul 19, 2011
The Consumerisation of Enterprise Mobility: A Formidable Challenge for CIOs, but a great opportunity. Download the Trend Micro Enterprise Security Whitepaper: The Consumerisation of Enterprise Mobility to learn the secrets to data protection on mobile devices.
Tags : trend micro, internet content security, smart protection network, internet security, enterprise business security, worry-free business security, web threat management, australia
     Trend Micro, Inc.
By: Adobe     Published Date: Sep 08, 2011
Discover how to build mobile apps and learn more about minimizing development time and the re-use of components across device platforms.
Tags : adobe, cem, customer experience management, best practices, customer interactions, enterprise applications, cloud compatibility, rias
     Adobe
By: Adobe     Published Date: Sep 08, 2011
Join Christophe Coenraets as he demonstrates how to build mobile apps for iOS and Android devices more easily using Adobe Flash Builder, Flex & LiveCycle. Learn how to minimize development time and reuse components across device platforms.
Tags : adobe, mobile apps, ios, android, mobile applications, christophe coenraets, adobe flash builder, device platforms
     Adobe
By: Intermec     Published Date: Sep 08, 2011
This white paper identifies best practices for workforce optimization, resource management, revenue assurance and performance control, explains how technology supports these processes, provides leveraging current mobile and wireless technology to enhance processes to improve productivity and profitability.
Tags : intermec, mobile technology, workforce optimization, data management, revenue assurance, asset tracking
     Intermec
By: Intermec     Published Date: Sep 07, 2011
In this white paper, learn why emerging enterprise applications require ruggedness and reliability.
Tags : intermec, smart phones, reliability, handheld devices, ip ratings, drop ratings
     Intermec
By: Intermec     Published Date: Sep 07, 2011
This is for individuals who want to understand more about the latest evolution of cellular or wireless technology.
Tags : intermec, 3g, wireless, cellular technology, third generation, application capability
     Intermec
By: Absolute Software     Published Date: Sep 06, 2011
Vice President and Research Fellow for Aberdeen Group, shares trends, best practices and actionable insight on management of iOS mobile devices.
Tags : absolute, intel, laptop, saas, lock down, rapid recovery, stolen, data defense
     Absolute Software
By: Entrust     Published Date: Aug 03, 2011
Whether it's a smartcard for physical and logical access, soft tokens on a mobile device, or a unique grid card for strong authentication to a VPN, organizations can consolidate all authentication processes with a single, proven solution.
Tags : digital certificate, digital certificates, pki, pki security, two factor authentication, encryption software, multi factor authentication, public key infrastructure
     Entrust
By: Trend Micro, Inc.     Published Date: Jul 19, 2011
Maintain visibility and control, regardless of device or OS. The consumerisation of enterprise information technology is one of the most significant security concerns today. Gartner's Analyst Ken Delaney explains the impact of consumerisation on enterprise IT.
Tags : trend micro, internet content security, smart protection network, internet security, enterprise business security, worry-free business security, web threat management, australia
     Trend Micro, Inc.
By: Trend Micro, Inc.     Published Date: Jul 19, 2011
Answers to Your Mobile Device Data Protection Questions. The IT landscape is changing quickly, Get expert advice on developing a strategy and learn how your organization can manage security on employee-owned mobile devices.
Tags : trend micro, internet content security, smart protection network, internet security, enterprise business security, worry-free business security, web threat management, australia
     Trend Micro, Inc.
By: Sophos     Published Date: Jun 27, 2011
Seven Tips for Securing Mobile Workers is intended to offer practical guidance on dealing with one of the fastest growing threats to the security of sensitive and confidential information.
Tags : sophos, mobile workers, security, confidential information, android, ipad, laptop, iphone
     Sophos
By: Google Apps     Published Date: May 18, 2011
This was a live webcast featuring Mark Steward, IT Director at Baird & Warner, the oldest residential real estate brokerage in the nation with 26 branch offices in 300 communities.
Tags : google apps, webinar, baird & warner, messaging system, mobile
     Google Apps
By: SAP     Published Date: Apr 13, 2011
If you are a business running SAP Business Suite solutions, learn how you can use Sybase mobile solutions for SAP to dramatically increase sales productivity and bring the advantages of business mobility to your organization now.
Tags : sap business suite solutions, sybase mobile solutions, business mobility, sales productivity, mobile crm, sales management, forecasting, mobile business application
     SAP
By: Tata Communications     Published Date: Apr 05, 2011
This document discusses the Evolution of Ethernet. As a proven leader in delivering Ethernet services, Tata Communications is making a bold, calculated move that positively impact the future of Ethernet and ultimately benefit customers.
Tags : pbb technology, tata communications, vlan, b-vlan, lan, provider backbone bridging technology
     Tata Communications
By: SkillSoft     Published Date: Apr 01, 2011
In this report, we will take a look at the IT-related activities from the ITPro and AnalystPerspectives collections, as well as the most popular IT and business search terms.
Tags : it, analystperspectives, itpro, books24x7, cloud computing
     SkillSoft
By: SAP     Published Date: Mar 28, 2011
Mobility transformation starts with a plan. Discover best practices for building an enterprise mobility strategy.
Tags : business value, mobility momentum, mobility transformation, enterprise mobility strategy
     SAP
By: SAP     Published Date: Mar 28, 2011
Learn about the momentum behind enterprise mobility and about SAP's plans for keeping up.
Tags : mobility momentum, mobility transformation, enterprise mobility strategy
     SAP
By: SAP     Published Date: Mar 24, 2011
In spite of the growth of virtual business activities performed via the World Wide Web, every business transaction or operation is performed at a physical place. And as handheld GPS devices drive a growing awareness of the concept of "location," people are increasingly looking for operational efficiencies, revenue growth, or more effective management as a result of geographic data services and location-based intelligence. In this white paper, David Loshin, president of Knowledge Integrity, Inc., introduces geographic data services (such as geocoding and proximity matching) and discusses how they are employed in both operational and analytical business applications. The paper also reviews analytical techniques applied across many types of organizations and examines a number of industry-specific usage scenarios.
Tags : location-based bi, business value, geographic enhancement
     SAP
By: MicroStrategy     Published Date: Mar 16, 2011
With the ability to access information at any time, in any location, on a hand-held device, consumers can now make more and more decisions quickly and easily. Read More.
Tags : microstrategy, mobile intelligence, mobile computing, business intelligence, mobile internet application, smartphone
     MicroStrategy
By: MicroStrategy     Published Date: Mar 16, 2011
Learn more about Business Intelligence for the iPad and the iPhone. Discover how beautiful dashboards display brilliantly in an instant. Gain quick access to key insights that you can share with your colleagues to drive better business decisions. Learn more.
Tags : microstrategy, mobile bi, business intelligence, ipad, iphone, dashboards display
     MicroStrategy
By: MicroStrategy     Published Date: Mar 16, 2011
This paper will discuss the security capabilities of MicroStrategy Mobile on Apple's mobile devices.
Tags : microstrategy, mobile business intelligence, bi application, security, data access, apple mobile device, data transmission, data storage
     MicroStrategy
By: MicroStrategy     Published Date: Mar 15, 2011
This free, one-day course covers an introduction to Mobile BI Applications and Mobile App architecture, interactivity and design techniques, and how to develop and deploy a fully-functional Mobile App. Students will spend the afternoon session exploring MicroStrategy software with hands-on, instructor-driven exercises.
Tags : microstrategy mobile class, bi application, business intelligence, mobile app architecture
     MicroStrategy
By: Cisco     Published Date: Mar 10, 2011
Fresh Direct Produce workforce is more mobile, responsive with Cisco Unified Communications. To give its employees the immediate, direct communications that the business required, Fresh Direct replaced its phone system with the Cisco� Unified Communications System. The Cisco solution supports all of the company's voice, data, and wireless communications on one secure network.
Tags : cisco, unified communications, fresh direct produce, mobile, wireless communication, voice, data network, phone system
     Cisco
By: Symantec.cloud     Published Date: Mar 02, 2011
This white paper examines the information security needs of midmarket organisations, and explains how SaaS security services can help address the security requirements of a distributed workforce.
Tags : symantec.cloud, messagelabs, midmarket, wireless device, remote workers, pda, smart phones, tablet pc
     Symantec.cloud
Start   Previous   1 2 3 4 5 6 7 8    Next    End
Search White Papers      

ADD WHITE PAPERS

Get your company's white paper reports in the hands of targeted business professionals.

Search Cancel