Mobile Device Systems Management Software Reports

Focus: Enterprise Mobility Management
sponsored by TechTarget ComputerWeekly.com
EGUIDE: In this e-guide, we will explore exactly enterprise mobility management, looking in-depth at some of the key trends and developments in the world of enterprise mobility, as well as keeping a watchful eye on cybersecurity.
Posted: 08 Feb 2021 | Published: 21 Jun 2018

TechTarget ComputerWeekly.com

The changing mobile platform landscape
sponsored by TechTarget ComputerWeekly.com
EGUIDE: So while there will inevitably be heated debates over which mobile platform is better, or which one to develop for first, the real opportunity comes when the discussion moves above the hardware to how an app can derive value by connecting to different business platforms and ecosystems. Find out more in this eguide.
Posted: 08 Feb 2021 | Published: 18 Jan 2019

TechTarget ComputerWeekly.com

Desktop Virtualisation: The Essential Guide
sponsored by TechTarget ComputerWeekly.com
EDITORIAL RESOURCE GUIDE: Desktop virtualisation, or virtual desktop infrastructure, has come of age, partly thanks to shifts in workplace practices. Employees are increasingly working remotely and need full access to corporate systems. It is often inconvenient to use the corporate laptop but the user still needs access to the systems offsite.
Posted: 08 Feb 2021 | Published: 14 Oct 2016

TechTarget ComputerWeekly.com

Defining Your Corporate Mobile Policies
sponsored by TechTarget Security
EGUIDE: It's important that corporate mobile policies cover everything from what types of devices will be available to users, to how and when they can use them Read this e-guide to learn more about developing appropriate mobile policies for your organization
Posted: 22 Sep 2008 | Published: 18 Sep 2008

TechTarget Security

BlackBerry Enterprise Server for IBM Lotus Domino Version 4.1: Feature and Technical Overview
sponsored by BlackBerry
WHITE PAPER: Learn about the next step in wireless networking, the BlackBerry Enterprise Server. This paper provides an in-depth look at its architecture, components and key technical features.
Posted: 21 Nov 2006 | Published: 20 Feb 2006

BlackBerry

Introduction to Blackberry® Java® Development
sponsored by BlackBerry
WEBCAST: The Blackberry® Java® Development Environment (BlackBerry JDE) is a fully integrated development environment and simulation tool for building Java Micro Edition (Java ME™) applications for Java-based Blackberry® smartphones.
Posted: 12 Jan 2009 | Premiered: Jan 12, 2009

BlackBerry

Blackberry Solution Increases Customer Service for Corporate Real Estate Company
sponsored by BlackBerry
CASE STUDY: J.J. Barnicke's sales people needed instant access to corporate property information to better serve clients and speed up sales cycles. They also needed wireless access to CRM data This case study explains how J.J. Barnicke is using BlackBerry and the sales force solution to access CRM information about clients.
Posted: 26 Feb 2009 | Published: 26 Feb 2009

BlackBerry

Securely Mobilize Lotus Domino: E-mail, Instant Message and Custom Lotus Applications
sponsored by Sybase iAnywhere
WHITE PAPER: Mobile applications that support the enterprise must be reliable, secure and available. Download today and discover how to work efficiently and effectively from your mobile device with real-time access to business critical Lotus Notes information.
Posted: 06 Jun 2007 | Published: 01 Jun 2007

Sybase iAnywhere

Mobile Social Networking and the Next Generation of Handheld Devices
sponsored by BlackBerry
WHITE PAPER: This paper explains how social networking and the next generation of handheld devices will improve business decision-making through efficient, unified communications and location awareness.
Posted: 25 Feb 2009 | Published: 25 Feb 2009

BlackBerry

Successful Mobile Deployments Require Robust Security
sponsored by Lopez Research
WHITE PAPER: Now that mobility has become an integral part of an enterprise's infrastructure, IT must now support and secure these mobile devices. Read this whitepaper to find out the unique security requirements that these mobile devices create and the three components of mobile security protection.
Posted: 20 May 2009 | Published: 20 May 2009

Lopez Research