Functions Documents Mobile ArchitectureWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Functions Documents Mobile Architecture returned the following results.
RSS What is RSS?
Related Categories

 •   Wireless Technologies and Mobile Computing
 •   Mobile Device Management
 •   Network Security
 •   Endpoint Security
 •   Wireless Security
 •   Laptops/ Notebooks/ Tablet PCs
 •   Enterprise Systems Management
 •   Mobile Field Sales/ Wireless Connectivity
 •   Application Security
 •   Service Oriented Architecture (SOA)

Related Searches
 •   Balancing Functions
 •   Building Functions Documents Mobile
 •   Functions Accounting
 •   Functions Article
 •   Functions Documents Controls
 •   Functions Documents Equipment
 •   Functions Documents Mobile Consultant
 •   Functions Documents Mobile Statement
 •   Functions Documents Standards
 •   Size Functions
Advertisement

ALL RESULTS
1 - 25 of 452 | Next Page

Featured Sponsors

Cisco ASA 5500 Series by Cisco Systems, Inc..
The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall and optional content security capabilities, more...
>> Discover more offerings from Cisco Systems, Inc..

Mobile Configuration Management Functions for Successful MDM by SearchSecurity.com

July 02, 2013 - (Free Research)
Configuration management is one of the most essential (if not the most essential) function served by mobile device management. In this expert guide from SearchConsumerization.com, you'll get a detailed look at the considerations you need to take concerning configuration management. 
(EGUIDE) READ ABSTRACT |

SOA Appliances: A Simple & Secure Approach to Integration across SOA, API & Cloud by CA Technologies.

December 31, 2011 - (Free Research)
In this resource, explore an alternative to ESBs -- a SOA integration appliance that offers simplified integration across SOA, APIs, and the cloud, along with native security functions. Read now to see how built-in security functions reduce complexities and costs. 
(WHITE PAPER) READ ABSTRACT |

Simple-to-Use Endpoint Security: Proactive Solutions for Networkwide Platforms by ESET

February 06, 2009 - (Free Research)
This white paper examines the looming threat horizon that is forcing companies to reexamine their endpoint security functions and discusses ESET’s solution for integrated security management that is built around its advanced heuristic technology. 
(WHITE PAPER) READ ABSTRACT |

Introduction to Evolved Packet Core by Alcatel-Lucent

June 09, 2009 - (Free Research)
This white paper provides a brief introduction to Evolved Packet Core - a new mobile core for LTE. Key concepts and functional elements are outlined, as well as key changes in LTE requirements imposed on the Evolved Packet Core, and the deployment challenges one can expect to encounter. 
(WHITE PAPER) READ ABSTRACT |

Choosing an MDM System: Fundamental Features for Success by SearchSecurity.com

February 28, 2013 - (Free Research)
There's a huge number of mobile device management (MDM) functions that exist today. Read this expert E-Guide to get a condensed list of the major MDM system features that most organizations require. 
(EGUIDE) READ ABSTRACT |

Software-Defined Networking: Top Architecture and Security Considerations by SearchSecurity.com

June 07, 2013 - (Free Research)
This e-guide examines the potential of network functions virtualization (NFV) in revolutionizing how networks are built, managed and used to create services as well as reveals the dark side of software-defined networking. 
(EGUIDE) READ ABSTRACT |

Session Border Controllers: Addressing Tomorrow's Requirements by Metaswitch Networks

September 27, 2011 - (Free Research)
This white paper discusses how IP-based service innovation will impact and shape the future of session border controllers. 
(WHITE PAPER) READ ABSTRACT |

CW+ Open Group: World-class enterprise architecture by ComputerWeekly.com

October 15, 2010 - (Free Research)
This White Paper is intended to help organizations who are attempting to set up an enterprise architecture practice. It shows how organizations can use a modular, iterative, and incremental approach in order to develop an architectural capability that is otherwise a large and complex undertaking. 
(WHITE PAPER) READ ABSTRACT |

Mobile Configuration Management Functions for Successful MDM by Citrix Systems, Inc. (E-mail this company)

March 12, 2013 - (Free Research)
This expert E-Guide will help you get the most out of mobile configuration management. Read on to understand more about security certificates, local file encryption, proxies and more. 
(EGUIDE) READ ABSTRACT |

MDM Software: Benefits of Mobile Configuration Management by SearchSecurity.com

November 27, 2012 - (Free Research)
This E-Guide from SearchConsumerization.com explores why configuration management is one of the most important functions of a mobile device management (MDM) policy and describes what you should look for when selecting your MDM solution. 
(EGUIDE) READ ABSTRACT |

Next-Generation API Delivery Platform : How to Use an API Server to Manage, Deliver and Secure APIs by Vordel now part of Axway

April 18, 2013 - (Free Research)
In this white paper, discover the next generation of APIs: API delivery platforms and servers. Read on for more information and details on API management, security, and delivery, the next generation of application architecture, key app design and usage changes, and more. 
(WHITE PAPER) READ ABSTRACT |

Mobile ticketing opens doors of opportunity for business by ComputerWeekly.com

November 17, 2010 - (Free Research)
Juniper Research defines a mobile ticketing user as “someone who stores a ticket on their mobile phone for later redemption” at the point of travel, the music venue, the cinema etc. 
(WHITE PAPER) READ ABSTRACT |

Scan and Go - Transport Ticketing on the Mobile by ComputerWeekly.com

January 14, 2011 - (Free Research)
This Whitepaper focuses on transport mobile ticketing. The full end-to-end mobile commerce transaction involves the purchase, storage and redemption of tickets on the mobile device. 
(WHITE PAPER) READ ABSTRACT |

Mobile banking strategies - maximise your revenues by ComputerWeekly.com

December 06, 2010 - (Free Research)
Juniper Research defines mobile banking as  “the provision of banking services to customers on their mobile devices”: specifically we mean in the vast majority of instances “the operation of bank current and deposit or savings accounts”. 
(WHITE PAPER) READ ABSTRACT |

CW+ Open Group: Governance in IT and Architecture - TOGAF by ComputerWeekly.com

October 06, 2010 - (Free Research)
This White Paper recommends additional definition of IT governance within TOGAF to strengthen an organization’s ability to effectively govern the architecture and make appropriate investment decisions. 
(WHITE PAPER) READ ABSTRACT |

Three Keys to Effective Service-oriented Architecture Governance by Accenture

June 2008 - (Free Research)
While most leading companies' IT organizations are well on the way to adopting service-oriented architecture capabilities, many find their progress slowed by questions about who owns business services. 
(WHITE PAPER) READ ABSTRACT |

SUN SYSTEMS FOR ORACLE COHERENCE: An optimal in-memory data grid architecture by Sun Microsystems, Inc.

November 2009 - (Free Research)
Optimizing the benefits of a data grid built with Oracle Coherence relies upon creating a modular, balanced architecture. Matching the number of application servers, memory capacity, and quantity of processing nodes to the target workload characteristics is important to achieving the best performance. 
(WHITE PAPER) READ ABSTRACT |

Unlocking the Value of Global Deduplication for Enterprise Data Management by CommVault Systems, Inc.

February 2009 - (Free Research)
CommVault Simpana software is the only end-to-end data management solution that delivers global data deduplication across replication, backup and archiving functions. This white paper explains more about this single-platform architecture that keeps compressed data on shared storage resources, giving you control over all data management functions. 
(WHITE PAPER) READ ABSTRACT |

BPM and enterprise architecture: The case for integration by IBM

February 2014 - (Free Research)
Business process management (BPM) and enterprise architecture (EA) sometimes seem to exist in parallel universes. However, that can be detrimental the function of each--and to the organization. In this e-guide, learn from industry experts as they make the case for integration of BPM and EA. 
(EGUIDE) READ ABSTRACT |

Network Evolution E-Zine: New Architectures, Traditional Hardware: Why You Need Both by SearchNetworking.com

February 2014 - (Free Research)
This issue of Network Evolution will help network engineers assess the looming changes brought on by trends like network features virtualization, software-defined networking and WebRTC, determine how fast they might arrive, and guide them in determining how to keep physical networks functioning in the meantime. 
(EZINE) READ ABSTRACT |

Extending the World's Most Popular Processor Architecture by Intel Corporation

January 2006 - (Free Research)
This paper will provide a brief background on instruction set architecture (ISA) and review new instructions, including SSE4 vectoring compiler and media accelerators, SSE4 efficient accelerated string and text processing, and Application T... 
(WHITE PAPER) READ ABSTRACT |

Mobility and Tablet Trends in Healthcare IT by Intel

June 2012 - (Free Research)
Caregivers want the devices they work with to function like the devices in their pockets. And this is steadily becoming a reality. View today’s brief video and join Motion Computing’s Vice President of Marketing, Mike Stinson as he talks about the latest health IT trends in tablets and other mobile devices. 
(WEBCAST) READ ABSTRACT |

The Digital Enterprise by ComputerWeekly.com

March 2014 - (Free Research)
Not every business is a digital business, but every business must become digital, writes Karl-Heinz Streibich in this book extract. 
(BOOK) READ ABSTRACT |

HP 3Par Secure Service Architecture by HP and Intel

February 2012 - (Free Research)
Check out this introduction to a secure service architecture that provides the ability to perform secure remote service connections and encrypt all data transmissions over a secure network. Learn about the authentication, authorization and audit logging security functions this platform features, and discover the benefits it can bring your business. 
(WHITE PAPER) READ ABSTRACT |

Session Initiated Protocol (SIP): A Five-Function Control Protocol by F5 Networks

August 2007 - (Free Research)
The intent of this paper is to offer the reader a basic understanding of the Session Initiated Protocol. SIP is the conduit that will bring together the enterprise and telecommunications to provide IP-based communications. 
(WHITE PAPER) READ ABSTRACT |

1 - 25 of 452 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts