M Listing of Enterprise Software, Hardware, Services, and White Papers ResourceWelcome, Guest      sign in | register | help

   Search for:        Advanced Search
Alphabetical Index of Solutions & Research
A |  B |  C |  D |  E |  F |  G |  H |  I |  J |  K |  L |  M |  N |  O |  P |  Q |  R |  S |  T |  U |  V |  W |  X |  Y |  Z |  0-9
M Listings:  Result Page 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8

Migrating From UNIX/ RISC To Red Hat Enterprise Linux® On Intel® Processor-Based Servers by  Red Hat and Intel

August 10, 2009 - Red Hat Enterprise Linux running on Intel® processor-based servers is helping companies cut TCO by up to 50 percent and more versus comparable UNIX/RISC solutions, while providing a better foundation for growth. This white paper outlines the key benefits of migration and provides a step-by-step guide to conducting a successful transition.


Migrating from Windows XP: Understanding the Challenges and How to Mitigate Them by  Dell and Microsoft

October 01, 2013 - This paper describes how effective Windows migration projects can be broken down into four manageable phases, and how industry best practices and products can reduce the time and disruptions caused by a migration from XP to Windows 7 or 8, as well as provide IT more time and resources to focus on more strategic initiatives.


Migrating JEE Applications to SpringSource tc Server by  VMware, Inc.

March 02, 2011 - This white paper focuses on the migration decision processes for determining whether to migrate your applications or portions of your applications from commercial JEE servers to SpringSource tc Server.


Migrating Millions to IP: A Mission Impossible? Not with a Migration Control Center by  Alcatel-Lucent

January 01, 2007 - This paper describes the key business drivers for the creation and operation of the MCC, the critical functions of the MCC, and the basic principles for establishing an effective MCC organization.


Migrating Mission-Critical Environments to Intel Architecture by  Intel

August 09, 2011 - Without the most up-to-date technology infrastructure, your organization will struggle to meet the changing demands of its internal and external users. Take a look at this exclusive resource to learn how Intel migrated its entire internal infrastructure to the Intel Architecture for a revitalized computing experience.


Migrating Oracle Application Setups – The Stat Way by  Dell Software

May 31, 2012 - Changes to your Oracle E-Business Suite applications directly affect your company. Therefore, having an effective change management and version control process is critical. In this paper, see how an impossible task – versioning and managing Oracle setup object with third-party tools – is now a reality.


Migrating SQL 2000 to SQL 2008- a Dell Deployment Guide by  Dell, Inc.

April 27, 2009 - This Deployment Guide reviews the approach that Dell and Principled Technologies recommend for a tested and validated migration of SQL Server 2000 databases to SQL Server 2008 on the Dell PowerEdge R900 server and Microsoft Windows Server 2008 Enterprise.


Migrating Tier 1 Application Workloads to AWS by  F5 Networks

April 24, 2013 - This whitepaper covers the hesitation many organizations feel about putting Tier-1 applications in the cloud and offers up some solutions.


Migrating to 40 Gigabit Ethernet and Beyond: A well planned migration by  SearchNetworking.com

December 07, 2012 - This edition of "Network Evolution" focuses on this progression, talking about the transition by organizations to 10 and 40 GbE switches, as well as the prospect of 100 and even 400 GbE switches. Read on to learn where this technology is going - and what it means for your business.


Migrating to Microsoft from Lotus Notes®? Not so Fast! by  Teamstudio, Inc.

April 01, 2008 - There is some good information presented in this document and no doubt you would like to get this information for your existing applications, even if you are not planning a migration.


Migrating to SharePoint 2010? - Ten Things I’ve Learned the Hard Way (So You Don’t Have To) by  Idera

June 20, 2011 - While SharePoint 2010 offers your enterprise a fabulous tool for document sharing and collaboration, the migration process can bring some difficult challenges. Read this exclusive resource to learn the top 10 challenges surrounding an upgrade to SharePoint 2010.


Migrating to the Cloud - Step 1: Outsource Exchange by  Dell Software

July 13, 2011 - The cloud can provide flexibility, value and time and cost savings to businesses of any size. Which cloud scenario is the best fit for your business? In this Quest white paper, discover the easiest way to get your cloud migration rolling, and how to prepare and simplify your migration. Read the paper today.


Migrating to the New Dell Management Console by  Dell, Inc. and Intel®

May 19, 2009 - Read this white paper to learn how the Dell™ Management Console Powered by Altiris™ from SymantecTM centralizes multiple aspects of systems management into a single easy-to-use tool.


Migrating to Windows 7: How to Select a Provider for PC Online Backup and Recovery by  Iron Mountain

January 26, 2011 - In addition to implementing strategic initiatives, IT has the basic function of keeping workers productive. With many enterprises migrating to Microsoft Windows 7, it is important to consider a backup provider that supports Microsoft’s latest platform. Read this white paper to learn more.


Migrating to Windows 7? Technology Points to Consider by  Novell, Inc.

September 22, 2010 - This white paper examines how endpoint management and related technologies can be used to streamline the migration process and discusses the role that Novell plays in this increasingly important market.


Migrating Users from Physical Workstations to XenDesktop by  Citrix

October 05, 2009 - This document provides recommendations and best practices for moving a user’s data from their physical corporate workstations into the virtual Citrix XenDesktop environment.


Migrating enterprise apps to the Cloud by  AppZero

May 30, 2013 - Download this white paper to explore the top strategies and options when migrating your enterprise applications from the data center to the cloud along with the core benefits and challenges.


Migration and Security in SOA by  Torry Harris Business Solutions

March 03, 2009 - It is estimated that 90% of most external attacks take advantage of known vulnerabilities and misconfigured systems. This white paper provides comprehensive guidance on integrating security and access-control best practices into your SOA and WSOA initiatives. It includes such topics as access control and SOA security implementation models.


Migration Considerations for Windows Server 2012 by  Dell and Microsoft

October 10, 2013 - This whitepaper will describe the support available for Server 2012 and explain other important considerations to keep in mind while upgrading your server from previous iterations of Microsoft Operating System to the 2012 version.


Migration Considerations for Windows Server 2012 by  Dell and Microsoft

November 16, 2012 - Access this white paper to learn more about Dell's support for Microsoft Windows Server 2012 and other essential things to consider when upgrading your servers from a previous Microsoft operating system. Also discover the advanced networking, storage and security features offered.


Migration to DOCSIS 3.0 by  Motorola, Inc.

December 23, 2008 - Factors driving cable operators toward deployment of DOCSIS 3.0, new features, channel bonding and multicast services, and migration scenarios to DOCSIS 3.0, are addressed.


Migration to Windows 7 with Immidio Flex Profiles by  Immidio

January 15, 2011 - This white paper discusses how to use Immidio Flex Profiles for making user profiles cross-platform compatible to Windows XP and Windows 7, both for migration projects and side-by-side scenarios using multiple versions of Windows simultaneously.


Million Dollar HIPAA Penalties for Healthcare by  Absolute Software

November 11, 2013 - The threat of million dollar penalties from HIPAA regulations is making Healthcare Organizations re-evaluate their patient information security infrastructure. Watch this recorded webcast to see how your organization can reduce the risk.


Mimecast Unifies Email Security, Archiving, and Continuity Services in the Cloud by  Mimecast

August 17, 2010 - The market for cloud-based IT infrastructure services delivered in a software-as-a-service model continues to grow. IDC research indicates this model of IT delivery is disrupting traditional licensed software markets and changing how archiving, backup, recovery, and security technologies are procured. Read this whitepaper to learn more.


Mimosa NearPoint for Microsoft Exchange Server by  Mimosa Systems

October 01, 2008 - This white paper describes how NearPoint complements and extends Exchange 2007 and how it adds important benefits for compliance, storage management, and recovery.


Mind the Gap: CISOs Work to Narrow the Breach-to-Detection Gap for Better Security by  Tripwire, Inc.

February 08, 2011 - Compliance is indeed a conscientious effort toward securing corpo­rate assets. IT organizations have committed much time and money to the cause. Despite security breaches still happening many still fly under the radar. This paper outlines what precautions need to be taken to avoid future security breaches.


Mine valuable data and achieve new levels of productivity by  CommVault Systems, Inc.

March 31, 2014 - This case study talks about the challenges one organization faced when they were attempting to keep up with growing storage demands while also growing as a business. The solution they implemented provided efficient storage capabilities with a powerful search functionality to provide easy access to valuable information.


Minimize customer churn with analytics by  IBM

February 07, 2014 - Access the following white paper to uncover how predictive analytics can effectively minimize customer churn through analyzing predictive patterns. Learn how with this technology you can stand to gain better overall insights to market patterns, areas of focus, and much more.


Minimize LAN Switch Tiers to Reduce Cost and Increase Efficiency by  Juniper Networks, Inc.

November 17, 2009 - Established LAN design practices were created for an environment of limited switch performance. Today's high-capacity switches allow new design approaches, thus reducing cost and complexity in campus and data center LANs. Read this Gartner report to learn about maximizing LAN performance by minimizing LAN switch Tiers.


Minimize the Impact of Patch Tuesday by  Shavlik Technologies

December 12, 2007 - Register for this webcast held monthly on the Wednesday after Patch Tuesday starting at 12:00 PM, ET. Get information on the latest Microsoft Patches and how they could affect you and your network environment.


Minimize the Impact of Patch Tuesday by  Shavlik Technologies

October 10, 2007 - Attend this monthly webcast to learn about Microsoft Patches and which are the most relevant to protecting your network environment.


Minimize the Impact of Patch Tuesday by  Shavlik Technologies

November 14, 2007 - Register for this webcast held monthly on the Wednesday after Patch Tuesday starting at 12:00 PM EDT. Get information on the latest Microsoft Patches and how they could affect you and your network environment.


Minimize the Impact of Patch Tuesday by  Shavlik Technologies

November 14, 2007 - Get information on the latest Microsoft Patches and how they could affect you and your network environment.


Minimize the Impact of Payment Card Industry (PCI) Standard on SAP Applications by  Paymetric, Inc.

January 01, 2008 - Explore encryption management for credit card data to ensure performance and availability of SAP applications. Learn implementation requirements, hurdles to development, and how you can improve security of sensitive customer information.


Minimize the Risk of Your Cloud-Based Services by  Hewlett-Packard Limited

April 30, 2012 - This guide dives into how you can minimize the risk of your cloud-based services and reap the benefits of a fully protected cloud.


Minimize your financial institution’s risk with solutions from IBM by  IBM

August 04, 2011 - Organisations face many challenges as they become more reliant on web technology: web applications are increasingly being targeted, and at the same time, compliance regulations continue to grow in complexity. Learn how to tackle these issues with IBM Rational, a comprehensive solution that provides protection, while helping to ensure compliance.


Minimizing Code Defects to Improve Software Quality and Lower Development Costs by  IBM

March 13, 2009 - This paper talks about why it's important to take a proactive approach to improving overall code quality using static and dynamic analysis. It then shows how IBM Rational Software Analyzer and IBM Rational PurifyPlus software can be used together to reduce the number of defects in your company's code.


Minimizing Distressed Shipments by  IBM

December 18, 2010 - Read this case study to learn how Lombardi Teamworks® helped a major computer manufacturer gain a complete understanding of the distressed shipment process and orchestrate efficient responses to returns. Read on to learn to learn how this large computer manufacturer saved 2 million dollars per quarter with Lombardi Teamworks®.


Minimizing Downtime in SAP Environments by  Sun Microsystems, Inc.

October 01, 2008 - Learn how to use standard features of Solaris 10, Containers and Zones and ZFS to optimize your SAP data centre, virtualize your infrastructure and drive down cost and raise flexibility.


Minimizing the Risks of Data Loss: Why Centralized, Automated Protection is Critical by  IBM

February 28, 2011 - In this white paper, you will gain insight into a comprehensive, highly scalable software solution that gives you centralized, automated data protection to help reduce the risks associated with data loss.


Minnesota Wild Names Dell Compellent SAN "Most Valuable Player" by  Dell Compellent

September 09, 2011 - The Minnesota Wild’s six-month old iSCSI storage solution could no longer keep up with the growing data needs of concession vendors. Read this white paper to learn how the Wild successfully implemented Fluid Data technology to solve the problem.


Minority Report: How science fiction is becoming reality by  ComputerWeekly.com

March 02, 2011 - Customers are urgently looking for the WOW Effect to create awareness and transfer an innovative image. Most digital signage to date has been a video feed or a slide-show, where it is almost like a poster replacement.


MIPS Core PSP by  CriticalBlue

June 17, 2010 - This application note provides a detailed tutorial of how to use the features of the MIPS Core PSP within Prism. End users who are either considering migrating existing software applications onto the 34K or 1004K core, or who already use those cores but wish to optimize their operation are the target audience for this paper.


Mirapoint RazorSafe™ by  Mirapoint Software, Inc.

September 18, 2009 - RazorSafe operates in a low-risk, passive mode and archives all emails, while ensuring minimal impact on your email infrastructure. RazorSafe uses open, standard protocols (POP, IMAP, SMTP) to archive all emails sent or received from the email server.


MIS Saves Bank 30 Percent Man Hours and Substantial Operational Cost in First Year by  Microsoft Corporation India Pvt Ltd

August 01, 2009 - Read this case study to learn how Microsoft SQL Server 2008 gave Lakshmi Vilas Bank a competitive edge by speeding up the rate at which the bank provides information to internal stakeholders, customers and government departments.


Missing PDF Fonts: How Metadata Affects Text Optimization by  Amyuni Technologies

September 18, 2009 - This document is the second in a series of white papers that will explore the problem of missing font information in PDFs. Since its inception, the PDF has revolutionized the way individuals and businesses communicate and exchange information. The promise to maintain informational integrity and display content consistently across many platforms.


Mission Cloud: Jumpstart IT as a Service by  CSC

January 12, 2012 - This webcast is designed to help companies design and execute a successful cloud deployment plan. Obtain cloud survey results from your peers and discover key questions to consider as you get started.


Mission Critical Converged Infrastructure Resource Center by  HP & Intel®

June 08, 2010 - This interactive resource center examines the benefits of a centralized management approach.  Discover why a platform that integrates facilities and key infrastructure components is more cost-effective than traditional data silos.


Mission Critical Java by  Oracle Corporation

November 04, 2008 - Read this white paper to learn how you can achieve extreme and predictable performance with Java and real-time, real-world memory leak detection and application performance analysis.


Mission Critical Services by  Hewlett-Packard Company

December 01, 2008 - In this webcast you will learn how Mission Critical & Proactive Services help you improve availability, reduce risk and increase service management.


Mission impossible? Data governance process takes on ‘big data’ by  SAP America, Inc.

December 10, 2012 - The importance of governing big data environments is just starting to take hold, and there are few prescriptions for how to do it right, let alone cost-effectively. This e-guide sheds light on the data governance process for big data and offers new insights from leading data management experts.


Mission Possible -- How HP conquers the demon of explosive structured data growth by  Hewlett-Packard Company

April 24, 2013 - How does your business contain the explosive data growth that is draining all financial and human resources? Application availability is critical to daily business operations, but they must also have a backup plan in place. Consult this white paper to learn more about how to manage structured data growth effectively.


Mission-Critical Converged Infrastructure Podcast Series by  HP & Intel®

May 09, 2011 - This podcast discusses the challenges that come with a mission-critical environment and the four characteristics of a converged infrastructure to meet the ever-changing demands of business.


Mistakes in Cloud Application Deployment by  SearchBusinessAnalytics

January 25, 2013 - This expert E-Guide explores the mistakes many organizations make when deploying apps in the cloud and describes how you can avoid making the same issues. In addition, learn why cloud integration is so complicated for today's testers.


Mistakes Made When Backup Up VMs & How to Prevent Them by  Symantec Corporation

September 07, 2012 - This expert E-Guide can help by outlining the 5 most common mistakes made when backing up VMs and how to avoid them.


Mitchells and Butlers: The boardroom view of IT by  ComputerWeekly.com

September 07, 2012 - Robin Young, COO Mitchells and Butlers and former CIO gives a candid appraisal of the boardroom's view of IT and offers tips to CIOs on building credibility with board members.


Mitigate Slow MySQL Queries and Accelerate Overall Query Performance to Gain New Competitive Platform Capabilities by  Akiban

May 30, 2012 - Read this white paper to learn about a new relational database from Akiban, a unified document and relational architecture that accelerates MySQL applications to ensure consistent and compelling performance for end users with no change to code, architecture or infrastructure.


Mitigate the Risks of File Sharing and BYOD with Private Clouds by  Accellion, Inc.

June 28, 2013 - This informative white paper examines private cloud solutions for file sharing and synchronization, discussing how a private cloud can help you realize the benefits that BYOD provides without having to expose your sensitive information to potential risks.


Mitigating DDoS Attacks with F5 Technology by  F5 Networks

July 19, 2013 - This exclusive white paper examines a set of solutions that can securely deliver applications while protecting the network, the session and the user, with mitigation technologies that map directly to individual DDoS attacks.


Mitigating Email Virus Attacks by  Cisco

June 30, 2013 - Access this resource to explore the emerging e-mail threat landscape that includes inbound and outbound risks. Read on to discover a simplified management solution that boosts defenses at a lower TCO.


Mitigating Email Virus Attacks by  Cisco Systems, Inc.

April 21, 2014 - This exclusive white paper discusses how your organization can best mitigate email virus attacks, examining helpful solutions and strategies that you can use to ensure that your sensitive data is kept secure.


Mitigating Insider Threats by  IBM

August 14, 2013 - This exclusive webcast examines a security solution designed to help you manage privileged identity access and centrally manage, audit and control shared identities across the enterprise to help prevent internal incidents from occurring.


Mitigating Risk and Ensuring Compliance with EMC Documentum ApplicationXtender Retention Manager by  EMC Corporation

August 04, 2010 - Read this white paper to learn how to easily configure document retention and disposition policies in the background to mitigate risk and meet compliance goals.


Mitigating Risk in a Mobile World by  Symantec Corporation

September 05, 2012 - Discover why flexible architectures – such as cloud-based security services – can help your organization enjoy the benefits of enterprise mobility by mitigating its inherent risks.


Mitigating Supply Chain Risk Using Collaborative Technology by  Infinity QS

May 01, 2007 - This whitepaper addresses the trends surrounding Supply Chain Risk Management (SCRM) and the strategies that manufacturers are using to mitigate risk from their supply network. It contains a case study about how one manufacturer is viewing real-tim...


Mitigating the Risks of IT Change by  Riverbed Technology, Inc.

December 30, 2011 - Riverbed® Cascade® is an application-aware network performance management solution with built-in application discovery and dependency mapping capabilities. Cascade quickly provides a complete and accurate inventory of the IT environment, including an understanding of how services and their underlying infrastructure impact the business.


Mitigating the Risks of Outsourcing by  Hewlett-Packard Company

November 06, 2013 - When opting for an outsourcing program, CIOs should check the reliability, financial stability and reputation of service providers, advices Shailesh Joshi, head of corporate IT at Godrej Industries. Get further outsourcing insights in this resource.


Mitigations for Mobile Phishing Problems on the iOS Platform by  SearchSecurity.com

May 03, 2013 - Attackers today are commonly using SMS messaging as a form of mobile device phishing. This expert E-Guide will walk you through the basics of SMS-based attacks and what security teams can do to mitigate the risk associated with iOS devices. Read on to learn more.


Mixed All-Flash Array Delivers Safer High Performance by  Dell India

August 08, 2013 - Access this lab report to uncover the key features of Dell Compellent which separates it from similar technologies, implementation recommendations and much more.


Mixed All-Flash Array Delivers Safer High Performance by  Dell, Inc.

August 08, 2013 - Read this analyst report from Storage Switzerland to learn how automated tiering technologies have been enabled to move data between different types of flash based storage using a flash-optimized storage solution. As you're reading, find out how one solution balances reliability and high performance as based on Storage Switzerland's lab testing.


Mixed All-Flash Array Delivers Safer High Performance by  Dell, Inc.

August 08, 2013 - This white paper showcases a sale-out all-flash storage array that redefines the economics of enterprise storage by deploying a single platform for block and file with built-in efficiency, resiliency and intelligence to optimize your IT budget.


Mixed Company: Integrating SAP, Third-Party Software by  SearchSAP

March 28, 2013 - In this expert handbook, discover the latest challenges and responses to SAP and non-SAP integration as well as data integration between applications. Learn how software development is making projects such as these both more and less difficult.


Mixing Gigabit Ethernet and 10 Gigabit Ethernet in a Dedicated SAN Infrastructure by  Dell India

September 01, 2009 - The reference architecture illustrated in this article shows how enterprises may make the transition to 10GbE for storage using Dell™ EqualLogic™ PS Series arrays and Dell PowerConnect™ switches.


Mizuho information and research speeds up system development by automating test processes by  Hewlett-Packard Company

April 30, 2012 - Mizuho Information needed to improve the efficiency of financial system deployments and shorten development cycle times. To do this, they knew they needed to rethink their testing processes. In this case study, discover how Mizuho utilized a test automation tool to enhance their testing procedures without having to make drastic process changes.


Mobile "systems of interactions" driving business process innovation by  IBM

May 31, 2013 - In this white paper, get an overview of mobile systems, or "systems of interaction", including the business and technological challenges, as well as how these systems impact the application lifecycle.


Mobile Analytics for On-the-Go Decisions by  SAP America, Inc.

October 15, 2013 - In this brief video, explore how you can make intelligent decisions on the go with mobile applications and devices. Learn from a variety of use cases how you implement mobile applications in your enterprise.


Mobile Analytics Leader Bango Moves From SQL Server to Infobright for Faster Query Response, Lower Cost, and Reduced Administration by  Infobright, Inc.

November 18, 2010 - This informative case study from Bango takes a look at the implementation of Infobright into a large enterprise, and how this change has affected the cost effectiveness of this corporation.


Mobile app development made simple by  IBM

February 21, 2014 - Access this exclusive resource to learn about an application development program designed specifically for developing mobile applications. Read on to find out how easy the program is to install and use.


Mobile app development, JavaScript everywhere and “the three amigos” by  IBM

October 31, 2013 - Today's enterprise application developer must master a range of technologies, APIs and techniques that can be quite overwhelming. However, savvy developers can reduce their "concept count" for building mobile applications with the help of three tools.


Mobile Application Delivery: The Next Frontier by  SearchSecurity.com

February 03, 2014 - BYOD, plus virtualization and cloud computing, offer IT new ways to address mobile application delivery and mobile device security. A good mobile app plan includes all of them.


Mobile Application Development Center by  Microsoft

April 24, 2013 - Visit this exclusive resource center to find valuable tools for your Windows 8 mobile development initiative, including an "App Builder Virtual Summit" that provides expert seminars on everything from game development to app monetization through advertisements to making the move from iOS and Android.


Mobile Application Development for Enterprise Organizations by  Salesforce.com

May 31, 2012 - As more people become attached to their mobile devices, mobile application development should be high on your list of priorities as it may be the best way to reach your target audience. Read this expertly-compiled e-to learn how you can best develop your mobile applications to optimize their speed and reliability to surpass user expectations.


Mobile Application Development: Making It Easier For Developers by  SearchSOA.com

September 01, 2009 - Mobile applications have not only piqued the interest of developers, but also of the average cell phone user. Download this ebook and learn why.


Mobile Application Keeps KART Vans on a Roll by  AT&T Corp

October 03, 2011 - This case study shows how The Kings County Area Public Transit Agency uses mobile applications to increase the effeciency of their rural transit vanpool program.


Mobile Application Management in the BYOD Era by  SearchSecurity.com

March 29, 2013 - This expert E-Guide from SearchConsumerization.com serves as the Enterprise Mobile Application Management Guide, exploring the strategies and tools available for managing the security of your BYOD applications.


Mobile Application Management with Citrix XenMobile by  Citrix

May 14, 2014 - Mobility is a critical IT initiative in companies of all sizes because it provides an unprecedented opportunity to increase business efficiency and competitive advantage. Beyond device management, mobile application and data management are key to achieving these benefits. Access this resource for insights into mobile application strategies.


Mobile Application Security Best Practices to Protect Corporate Data by  SearchSecurity.com

July 11, 2013 - This expert guide from SearchConsumerization.com explains the risks associated with mobile devices and discusses native security measures built into mobile operating systems and best practices for mitigating common mobile application security risks.


Mobile Application Security from HP - Build security into your mobile applications by  Hewlett-Packard Limited

January 04, 2012 - Watch this short animation webcast to learn more about mobile application security and how you can allow good mobile connections while maintaining a secure environment.


Mobile applications - Making anywhere access a reality by  Cisco Systems, Inc.

February 13, 2012 - Uncover how you can make anytime, anywhere access a reality for your mobile workforce. Also analyze costs of mobilizing applications and how to get those applications to your mobile devices.


Mobile Applications Before and After by  AT&T Corp

October 04, 2011 - This white paper takes a look at business processes before and after the use of mobile applications.


Mobile Applications That Fit by  BlackBerry

February 18, 2010 - The more employees rely on their BlackBerry® smartphones, the greater the need for enterprise applications that fit their, and the company's, specific needs. But IT organizations can't always do it on their own. This white paper covers some best practices and resources for creating mobile enterprise applications.


Mobile apps reach the busy customer by  SearchCRM

March 19, 2013 - In this expert e-zine, discover two key areas of app development in today's mobile climate: delivering quality mobile customer service, and uniting front-end and back-end functionality. Also included is a case study of a mobile app that delivered user-oriented, ultra-simple service with outstanding results.


Mobile Apps Stores by  ComputerWeekly.com

March 09, 2012 - Juniper Research analyses the growing market for mobile apps in this report extract.


Mobile as a Platform for Business Service Innovation by  CA Technologies.

February 14, 2014 - This informative paper examines a mobile services management solution that can help your organization build a strategy to support and drive business service innovation.


Mobile Augmented Reality by  ComputerWeekly.com

February 02, 2011 - It is fair to say that AR (Augmented Reality) applications and services on the mobile remain in their infancy. Given that the first AR mobile browsers did not become available until June 2009, this is hardly surprising.


Mobile augmented reality opportunities for business by  ComputerWeekly.com

December 01, 2010 - The phrase “augmented reality” was coined by Boeing researcher Tom Caudell in the early 1990s to describe a digital display viewed through a headset  which guided workers through electrical wires in aircraft. The term has since gained currency and is now taken to describe digital information overlaid on the physical world.


Mobile Backup: Of Course There's an App for That by  CommVault Systems, Inc.

February 21, 2012 - Read this E-Guide today to learn how to utilize the PC as the center of your mobile universe, discover what mobile backup solutions are currently available today and learn about device-specific ultraportable backup technologies. Read on for more.


Mobile banking strategies - maximise your revenues by  ComputerWeekly.com

December 06, 2010 - Juniper Research defines mobile banking as  “the provision of banking services to customers on their mobile devices”: specifically we mean in the vast majority of instances “the operation of bank current and deposit or savings accounts”.


Mobile BI RTE Topic page by  IBM

January 21, 2014 - Access the following download page to uncover several downloadable applications that will enable your business to deliver your current BI and analytics solutions to your mobile device network.


Mobile BI: A Must Have in the New Mobile-First World by  MicroStrategy Incorporated

April 02, 2014 - "Anyone that uses BI has the need for mobile BI," said BI analyst Howard Dresner, president at Dresner Advisory Services. In this exclusive e-guide, learn more from Dresner and other mobile experts about why mobile BI is a must-have for forward-thinking businesses, and get advice on best practices for developing a mobile plan.


Mobile BI: Actionable Intelligence for the Agile Enterprise by  SAS

June 28, 2011 - This report describes how mobile devices can drive better BI. Find out how top performing companies have made mobile devices the primary platform for BI deployments.


Mobile BI: Empowering users at every level by  BeyeNETWORK

November 28, 2012 - In this expert resource, join tech guru Wayne Eckerson and he examines best practices for implementing mobile BI and the technologies and architectural approaches for building mobile BI systems. Read on for insights on many aspects of BI and recommendations for implementing BI applications.


Mobile Business Intelligence 101: Proven Strategies and Use Cases by  Information Builders

May 22, 2014 - The following white paper explores mobile business intelligence—what it is, how it's evolving, what applications exist, and how to address security concerns. Also gain access to real-world use cases, technology recommendations, and much more.


Mobile Business Intelligence: When Mobility Matters by  MicroStrategy Incorporated

January 24, 2011 - Mobile business intelligence is a process, not a project, and a journey rather than a destination. The case studies included represent two forms that mobile BI can take to empower the mobile worker and port existing applications. This paper discusses two different companies, their environments, reasons for going mobile and key success factors.


Mobile cloud computing vs. cloud computing in building or hosting mobile apps by  SAP America, Inc.

December 06, 2012 - Read this expert e-guide for explanations of some of the key differences between mobile and regular cloud computing, including the need for additional testing capabilities, the need to allow for disconnected operation, the need to be mindful of limited energy available on mobile devices, and more.


Mobile Collaboration from IBM - Support for Fast-Moving Businesses by  IBM

December 05, 2008 - Mobile business solutions & services keep employees on the go and in the loop.


Mobile Collaboration: Strategies and Challenges by  SearchSecurity.com

January 25, 2013 - This E-Guide from SearchUnifiedCommunications.com explores the challenges small screens present to mobile collaboration and unveils how UC strategies and vendors are responding to these issues.


Mobile computing strategies in manufacturing by  IQMS

January 08, 2013 - Understanding the challenges you'll face and finding the right role within your operations for mobile devices or applications will be crucial to the success of a manufacturing mobility initiative.Read this expert e-guide to understand the current state of the market for mobility in manufacturingand how it stands to shape up in the coming months.


Mobile Computing Trends: Insight Into Today's Workforce by  Intel

May 15, 2014 - This exclusive paper takes a look at the latest enterprise mobility trends, focusing on the mobile workforce and what your organization can do to get the most value from your employees.


Mobile Computing: Reshaping Application Modernization by  CSC

December 02, 2013 - As users continue to move to using mobile devices, businesses are being put under pressure to update their older applications.  This e-guide provides expert tips and best practices to approach mobile computing-driven application modernization.


Mobile Configuration Management Functions for Successful MDM by  Citrix Systems, Inc.

March 12, 2013 - This expert E-Guide will help you get the most out of mobile configuration management. Read on to understand more about security certificates, local file encryption, proxies and more.


Mobile Configuration Management Functions for Successful MDM by  SearchSecurity.com

July 02, 2013 - Configuration management is one of the most essential (if not the most essential) function served by mobile device management. In this expert guide from SearchConsumerization.com, you'll get a detailed look at the considerations you need to take concerning configuration management.


Mobile Connect by  Dell Software

March 11, 2014 - Discover how to give your employees safe, easy access to the data and resources they need to be productive from a range of devices (including iOS, Mac OS X, Android™ ,Kindle Fire and Windows 8.1) while protecting your corporate network from mobile security threats.


Mobile Connect for iOS: Superior Network-Level Access for iPad, iPhone, and iPod Touch Users by  Dell Software

February 12, 2014 - Discover how Apple® iPad®, iPhone® and iPod touch® users can get superior network-level access to corporate, academic and government resources over encrypted SSL VPN connections, affording complete privacy and authentication.


Mobile Content and Document Management Best Practices and Decision Checklist by  SAP AG

July 18, 2013 - This crucial paper discusses some of the most common threats to your mobile devices and provides key best practices for mobile content management so that you can ensure that your mobile data is secure wherever you go.


Mobile coupon technology by  ComputerWeekly.com

November 11, 2010 - Juniper Research defines a mobile coupon as “a coupon sent to and stored on a mobile phone that can be exchanged for a rebate, a financial discount etc. at a retailer or merchant when the consumer purchases a product.”


Mobile Data Offload and Onload by  ComputerWeekly.com

October 12, 2012 - Consumer traffic demand continues to outstrip network planning capacity putting pressure on operator's networks. There are several solutions to this problem says analysts Juniper Research.


Mobile data protection best practices by  SearchSecurity.com

November 28, 2011 - Check out this E-Guide for the top 5 mobile data protection best practices to ensure your corporation's protection.


Mobile Data Security and Compliance Challenges in the Enterprises by  SearchSecurity.com

September 19, 2012 - The bring your own device (BYOD) era has ushered in a number of benefits and security challenges alike. In this E-Guide from SearchConsumerization.com, learn about the top mobile data security and compliance challenges and the best ways you can conquer them.


Mobile Data Security Finding the Balance by  IBM

April 30, 2013 - Access this white paper to learn how to develop a secure mobile strategy that not only protects business data, but keeps the user experience simple and efficient.


Mobile Design Patterns: Push, Don't Pull by  IBM

December 05, 2013 - Is it better to wait for users to request, or "pull," the content they need, or to "push" content updates when you think users need them? This resource weighs in on the "push vs. pull" design model debate, describing key advantages of the push model in the mobile space.


Mobile device controls: MDM security features vs. mobile native security by  SearchSecurity.com

March 20, 2013 - When it comes to implementing mobile device management (MDM), not all organizations are the same. Read on to learn how to choose the right approach to MDM for your organization.


Mobile Device Data Protection: Key Findings and Players in the Market by  SearchSecurity.com

June 14, 2013 - This E-Guide explores the risks associated with BYOD and quantifies the costs of a lost device, from both a cost and security standpoint.


Mobile Device Management (MDM) Policies Best Practices Guide by  IBM

May 15, 2014 - This informative resource discusses how to create the most effective MDM policies by providing helpful best practices that have worked for numerous other successful organizations.


Mobile Device Management Buyers Guide by  Sophos, Inc.

February 25, 2014 - This informative paper takes an in-depth look at the mobile device management (MDM) solutions that are on the market today, comparing features and discussing the benefits and drawbacks of each tool.


Mobile Device Management Checklist by  Citrix

February 13, 2014 - This expert guide from SearchConsumerization.com provides a mobile device management (MDM) checklist your organization can utilize in order to ensure successful mobility deployments and management.


Mobile Device Management Checklist by  SearchSecurity.com

December 22, 2011 - This expert E-Guide highlights a mobile device management checklist to consider when developing your own mobile device management strategy.


Mobile Device Management Cloud Report by  Zenprise

August 10, 2012 - This quarterly report on mobile device management (MDM) cloud practices explores the latest trends surrounding the device enrollment, application usage, and security of mobile devices in the enterprise.


Mobile Device Management for Dummies by  Sybase, an SAP company

May 08, 2009 - Mobile Device Management For Dummies is your guide to managing and securing mobile computing equipment such as laptops and handheld devices. You get the lowdown on enterprise mobile device management and how Sybase's Afaria solution can help you.


Mobile Device Management Software Comparison by  Citrix

November 20, 2013 - This crucial magic quadrant analyzes the top mobile device management software solutions on the market, examining their strengths, weaknesses and overall effectiveness to provide you with a complete view.


Mobile Device Management Systems Help Mitigate BYOD Risks by  SearchSecurity.com

March 12, 2013 - This whitepaper will help you learn how mobile device management (MDM) can be used to mitigate the risks associated with mobility and BYOD. Learn more about multi-platform MDM, lifecycle management, enforcing compliance, and other topics.


Mobile Device Management Technical Guide by  SearchSecurity.com

March 06, 2013 - In this TechGuide from SearchSecurity.com, industry expert Lisa Phifer shares her vast knowledge on BYOD, MDM, data security, and more to help you get a handle on top mobile trends rocking the enterprise.


Mobile Device Management: Fundamental steps for success by  SearchSecurity.com

May 29, 2013 - This expert e-guide from SearchConsumerization.com will highlight a number of ways IT can prepare for the influx of mobile devices into the workplace and lay the foundation needed to successfully support mobility. Learn about setting up your network structure for mobility, fundamental features for success when choosing an MDM system, and more.


Mobile device protection: tackling mobile device security risks by  SearchSecurity.com

June 04, 2012 - The proliferation of mobile devices into the enterprise has put mobile device security risks as a top priority for many organizations today. In this e-guide from SearchSecurity.com, gain expert insight on how to tackle mobile device security risks and explore why your current approach might need to be reevaluated.


Mobile Device Security Best Practices by  SearchSecurity.com

April 12, 2012 - While mobile devices have become a key tool for businesses today, it has also introduced a number of security risks that must be addressed. In this expert guide, uncover some of the best mobile security practices and how to balance security and end-user morale.


Mobile Device Security Best Practices for BYOD by  SearchSecurity.com

April 06, 2012 - This expert E-Guide from SearchMobileComputing.com explores the issue of mobile device security and offers best practices for making a BYOD program work in your organization.


Mobile Device Security Lacking in Most Hospital Policy Discussions by  Essextec

June 11, 2013 - This expert resource from SearchHealthIT.com will attempt to uncover why conversations about mobile security have been lacking, discuss the emerging trends surrounding BYOD policies, and advise readers how to ensure security protocols are properly followed.


Mobile Device Security Overview by  SearchSecurity.com

September 29, 2011 - This expert E-Guide highlights the 3 components for solid mobile device security, top mobile operating systems and more.


Mobile Device Security: Emerging Threats, Essential Strategies by  Juniper Networks, Inc.

February 15, 2012 - In this resource, explore the emerging threats organizations face with the rise of mobile computing. View now to discover key strategies for securing mobile devices, including the essential requirements for an effective solution.


Mobile Device Security: What Senior Managers Should Know by  Sophos, Inc.

October 31, 2012 - In this article, find practical advice to help you effectively manage the iPads, Android phones, and other next-generation mobile devices in your organization in order to minimize risk and drive business success.

  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints

  TechTarget - The IT Media ROI Experts