M Listing of Enterprise Software, Hardware, Services, and White Papers ResourceWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
Alphabetical Index of Solutions & Research
A |  B |  C |  D |  E |  F |  G |  H |  I |  J |  K |  L |  M |  N |  O |  P |  Q |  R |  S |  T |  U |  V |  W |  X |  Y |  Z |  0-9
 
M Listings:  Result Page 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8
 

Minimize customer churn with analytics by  IBM


February 07, 2014 - Access the following white paper to uncover how predictive analytics can effectively minimize customer churn through analyzing predictive patterns. Learn how with this technology you can stand to gain better overall insights to market patterns, areas of focus, and much more.

 

Minimize LAN Switch Tiers to Reduce Cost and Increase Efficiency by  Juniper Networks, Inc.


November 17, 2009 - Established LAN design practices were created for an environment of limited switch performance. Today's high-capacity switches allow new design approaches, thus reducing cost and complexity in campus and data center LANs. Read this Gartner report to learn about maximizing LAN performance by minimizing LAN switch Tiers.

 

Minimize the Impact of Patch Tuesday by  Shavlik Technologies


October 10, 2007 - Attend this monthly webcast to learn about Microsoft Patches and which are the most relevant to protecting your network environment.

 

Minimize the Impact of Patch Tuesday by  Shavlik Technologies


December 12, 2007 - Register for this webcast held monthly on the Wednesday after Patch Tuesday starting at 12:00 PM, ET. Get information on the latest Microsoft Patches and how they could affect you and your network environment.

 

Minimize the Impact of Patch Tuesday by  Shavlik Technologies


November 14, 2007 - Get information on the latest Microsoft Patches and how they could affect you and your network environment.

 

Minimize the Impact of Patch Tuesday by  Shavlik Technologies


November 14, 2007 - Register for this webcast held monthly on the Wednesday after Patch Tuesday starting at 12:00 PM EDT. Get information on the latest Microsoft Patches and how they could affect you and your network environment.

 

Minimize the Impact of Payment Card Industry (PCI) Standard on SAP Applications by  Paymetric, Inc.


January 01, 2008 - Explore encryption management for credit card data to ensure performance and availability of SAP applications. Learn implementation requirements, hurdles to development, and how you can improve security of sensitive customer information.

 

Minimize the Risk of Your Cloud-Based Services by  Hewlett-Packard Limited


April 30, 2012 - This guide dives into how you can minimize the risk of your cloud-based services and reap the benefits of a fully protected cloud.

 

Minimize your financial institution’s risk with solutions from IBM by  IBM


August 04, 2011 - Organisations face many challenges as they become more reliant on web technology: web applications are increasingly being targeted, and at the same time, compliance regulations continue to grow in complexity. Learn how to tackle these issues with IBM Rational, a comprehensive solution that provides protection, while helping to ensure compliance.

 

Minimizing Code Defects to Improve Software Quality and Lower Development Costs by  IBM


March 13, 2009 - This paper talks about why it's important to take a proactive approach to improving overall code quality using static and dynamic analysis. It then shows how IBM Rational Software Analyzer and IBM Rational PurifyPlus software can be used together to reduce the number of defects in your company's code.

 

Minimizing Distressed Shipments by  IBM


December 18, 2010 - Read this case study to learn how Lombardi Teamworks® helped a major computer manufacturer gain a complete understanding of the distressed shipment process and orchestrate efficient responses to returns. Read on to learn to learn how this large computer manufacturer saved 2 million dollars per quarter with Lombardi Teamworks®.

 

Minimizing Downtime in SAP Environments by  Sun Microsystems, Inc.


October 01, 2008 - Learn how to use standard features of Solaris 10, Containers and Zones and ZFS to optimize your SAP data centre, virtualize your infrastructure and drive down cost and raise flexibility.

 

Minimizing the Risks of Data Loss: Why Centralized, Automated Protection is Critical by  IBM


February 28, 2011 - In this white paper, you will gain insight into a comprehensive, highly scalable software solution that gives you centralized, automated data protection to help reduce the risks associated with data loss.

 

Minnesota Wild Names Dell Compellent SAN "Most Valuable Player" by  Dell Compellent


September 09, 2011 - The Minnesota Wild’s six-month old iSCSI storage solution could no longer keep up with the growing data needs of concession vendors. Read this white paper to learn how the Wild successfully implemented Fluid Data technology to solve the problem.

 

Minority Report: How science fiction is becoming reality by  ComputerWeekly.com


March 02, 2011 - Customers are urgently looking for the WOW Effect to create awareness and transfer an innovative image. Most digital signage to date has been a video feed or a slide-show, where it is almost like a poster replacement.

 

MIPS Core PSP by  CriticalBlue


June 17, 2010 - This application note provides a detailed tutorial of how to use the features of the MIPS Core PSP within Prism. End users who are either considering migrating existing software applications onto the 34K or 1004K core, or who already use those cores but wish to optimize their operation are the target audience for this paper.

 

Mirapoint RazorSafe™ by  Mirapoint Software, Inc.


September 18, 2009 - RazorSafe operates in a low-risk, passive mode and archives all emails, while ensuring minimal impact on your email infrastructure. RazorSafe uses open, standard protocols (POP, IMAP, SMTP) to archive all emails sent or received from the email server.

 

MIS Saves Bank 30 Percent Man Hours and Substantial Operational Cost in First Year by  Microsoft Corporation India Pvt Ltd


August 01, 2009 - Read this case study to learn how Microsoft SQL Server 2008 gave Lakshmi Vilas Bank a competitive edge by speeding up the rate at which the bank provides information to internal stakeholders, customers and government departments.

 

Missing PDF Fonts: How Metadata Affects Text Optimization by  Amyuni Technologies


September 18, 2009 - This document is the second in a series of white papers that will explore the problem of missing font information in PDFs. Since its inception, the PDF has revolutionized the way individuals and businesses communicate and exchange information. The promise to maintain informational integrity and display content consistently across many platforms.

 

Mission Cloud: Jumpstart IT as a Service by  CSC


January 12, 2012 - This webcast is designed to help companies design and execute a successful cloud deployment plan. Obtain cloud survey results from your peers and discover key questions to consider as you get started.

 

Mission Critical Converged Infrastructure Resource Center by  HP & Intel®


June 08, 2010 - This interactive resource center examines the benefits of a centralized management approach.  Discover why a platform that integrates facilities and key infrastructure components is more cost-effective than traditional data silos.

 

Mission Critical Java by  Oracle Corporation


November 04, 2008 - Read this white paper to learn how you can achieve extreme and predictable performance with Java and real-time, real-world memory leak detection and application performance analysis.

 

Mission Critical Services by  Hewlett-Packard Company


December 01, 2008 - In this webcast you will learn how Mission Critical & Proactive Services help you improve availability, reduce risk and increase service management.

 

Mission impossible? Data governance process takes on ‘big data’ by  SAP America, Inc.


December 10, 2012 - The importance of governing big data environments is just starting to take hold, and there are few prescriptions for how to do it right, let alone cost-effectively. This e-guide sheds light on the data governance process for big data and offers new insights from leading data management experts.

 

Mission Possible -- How HP conquers the demon of explosive structured data growth by  Hewlett-Packard Company


April 24, 2013 - How does your business contain the explosive data growth that is draining all financial and human resources? Application availability is critical to daily business operations, but they must also have a backup plan in place. Consult this white paper to learn more about how to manage structured data growth effectively.

 

Mission-Critical Converged Infrastructure Podcast Series by  HP & Intel®


May 09, 2011 - This podcast discusses the challenges that come with a mission-critical environment and the four characteristics of a converged infrastructure to meet the ever-changing demands of business.

 

Mission-Critical Platforms for Databases and Enterprise Applications by  Hitachi Data Systems


October 31, 2012 - Learn more about a converged platform that offloads systems integration responsibilities from your IT department.

 

Mistakes in Cloud Application Deployment by  CSC


January 25, 2013 - This expert E-Guide explores the mistakes many organizations make when deploying apps in the cloud and describes how you can avoid making the same issues. In addition, learn why cloud integration is so complicated for today's testers.

 

Mistakes Made When Backup Up VMs & How to Prevent Them by  Symantec Corporation


September 07, 2012 - This expert E-Guide can help by outlining the 5 most common mistakes made when backing up VMs and how to avoid them.

 

Mistakes To Avoid When Selecting And Implementing ERP Software by  Epicor Software Corporation


December 02, 2013 - This expert e-guide describes common mistakes to avoid when selecting and implementing ERP software. Read on to learn more now.

 

Mitchells and Butlers: The boardroom view of IT by  ComputerWeekly.com


September 07, 2012 - Robin Young, COO Mitchells and Butlers and former CIO gives a candid appraisal of the boardroom's view of IT and offers tips to CIOs on building credibility with board members.

 

Mitigate Slow MySQL Queries and Accelerate Overall Query Performance to Gain New Competitive Platform Capabilities by  Akiban


May 30, 2012 - Read this white paper to learn about a new relational database from Akiban, a unified document and relational architecture that accelerates MySQL applications to ensure consistent and compelling performance for end users with no change to code, architecture or infrastructure.

 

Mitigating DDoS Attacks with F5 Technology by  F5 Networks


July 19, 2013 - This exclusive white paper examines a set of solutions that can securely deliver applications while protecting the network, the session and the user, with mitigation technologies that map directly to individual DDoS attacks.

 

Mitigating Email Virus Attacks by  Cisco


June 30, 2013 - Access this resource to explore the emerging e-mail threat landscape that includes inbound and outbound risks. Read on to discover a simplified management solution that boosts defenses at a lower TCO.

 

Mitigating Insider Threats by  IBM


August 14, 2013 - This exclusive webcast examines a security solution designed to help you manage privileged identity access and centrally manage, audit and control shared identities across the enterprise to help prevent internal incidents from occurring.

 

Mitigating Risk and Ensuring Compliance with EMC Documentum ApplicationXtender Retention Manager by  EMC Corporation


August 04, 2010 - Read this white paper to learn how to easily configure document retention and disposition policies in the background to mitigate risk and meet compliance goals.

 

Mitigating Risk in a Mobile World by  Symantec Corporation


September 05, 2012 - Discover why flexible architectures – such as cloud-based security services – can help your organization enjoy the benefits of enterprise mobility by mitigating its inherent risks.

 

Mitigating Supply Chain Risk Using Collaborative Technology by  Infinity QS


May 01, 2007 - This whitepaper addresses the trends surrounding Supply Chain Risk Management (SCRM) and the strategies that manufacturers are using to mitigate risk from their supply network. It contains a case study about how one manufacturer is viewing real-tim...

 

Mitigating the OWASP Top 10 2013 with Imperva SecureSphere by  Imperva


December 31, 2013 - This resource offers a Web application firewall solution that addresses the Open Web Application Security Project (OWASP) Top 10 security risks.

 

Mitigating the Risks of IT Change by  Riverbed Technology, Inc.


December 30, 2011 - Riverbed® Cascade® is an application-aware network performance management solution with built-in application discovery and dependency mapping capabilities. Cascade quickly provides a complete and accurate inventory of the IT environment, including an understanding of how services and their underlying infrastructure impact the business.

 

Mitigating the Risks of Outsourcing by  Hewlett-Packard Company


November 06, 2013 - When opting for an outsourcing program, CIOs should check the reliability, financial stability and reputation of service providers, advices Shailesh Joshi, head of corporate IT at Godrej Industries. Get further outsourcing insights in this resource.

 

Mitigating Web Threats with Comprehensive and Pervasive Security by  Cisco


May 31, 2013 - This whitepaper features an all-inclusive security solution that offers intelligence, context-based policy management, and network-enforced security to better detect, prevent, and protect against advanced Web threats.

 

Mixed All-Flash Array Delivers Safer High Performance by  Dell India


August 08, 2013 - Access this lab report to uncover the key features of Dell Compellent which separates it from similar technologies, implementation recommendations and much more.

 

Mixed All-Flash Array Delivers Safer High Performance by  Dell and VMware


August 08, 2013 - This resource details how automated tiering technologies have been enabled to move data between different types of flash based storage using a flash-optimized storage solution.

 

Mixed All-Flash Array Delivers Safer High Performance by  Dell, Inc.


August 08, 2013 - This white paper showcases a sale-out all-flash storage array that redefines the economics of enterprise storage be deploying a single platform for block and file with built-in efficiency, resiliency and intelligence to optimize your IT budget.

 

Mixed Company: Integrating SAP, Third-Party Software by  SearchSAP


March 28, 2013 - In this expert handbook, discover the latest challenges and responses to SAP and non-SAP integration as well as data integration between applications. Learn how software development is making projects such as these both more and less difficult.

 

Mixing Gigabit Ethernet and 10 Gigabit Ethernet in a Dedicated SAN Infrastructure by  Dell India


September 01, 2009 - The reference architecture illustrated in this article shows how enterprises may make the transition to 10GbE for storage using Dell™ EqualLogic™ PS Series arrays and Dell PowerConnect™ switches.

 

Mizuho information and research speeds up system development by automating test processes by  Hewlett-Packard Company


April 30, 2012 - Mizuho Information needed to improve the efficiency of financial system deployments and shorten development cycle times. To do this, they knew they needed to rethink their testing processes. In this case study, discover how Mizuho utilized a test automation tool to enhance their testing procedures without having to make drastic process changes.

 

Mobile "systems of interactions" driving business process innovation by  IBM


May 31, 2013 - In this white paper, get an overview of mobile systems, or "systems of interaction", including the business and technological challenges, as well as how these systems impact the application lifecycle.

 

Mobile Analytics for On-the-Go Decisions by  SAP America, Inc.


October 15, 2013 - In this brief video, explore how you can make intelligent decisions on the go with mobile applications and devices. Learn from a variety of use cases how you implement mobile applications in your enterprise.

 

Mobile Analytics Leader Bango Moves From SQL Server to Infobright for Faster Query Response, Lower Cost, and Reduced Administration by  Infobright, Inc.


November 18, 2010 - This informative case study from Bango takes a look at the implementation of Infobright into a large enterprise, and how this change has affected the cost effectiveness of this corporation.

 

Mobile app development, JavaScript everywhere and “the three amigos” by  IBM


October 31, 2013 - Today's enterprise application developer must master a range of technologies, APIs and techniques that can be quite overwhelming. However, savvy developers can reduce their "concept count" for building mobile applications with the help of three tools.

 

Mobile Application Development Center by  Microsoft


April 24, 2013 - Visit this exclusive resource center to find valuable tools for your Windows 8 mobile development initiative, including an "App Builder Virtual Summit" that provides expert seminars on everything from game development to app monetization through advertisements to making the move from iOS and Android.

 

Mobile Application Development for Enterprise Organizations by  Salesforce.com


May 31, 2012 - As more people become attached to their mobile devices, mobile application development should be high on your list of priorities as it may be the best way to reach your target audience. Read this expertly-compiled e-to learn how you can best develop your mobile applications to optimize their speed and reliability to surpass user expectations.

 

Mobile Application Development: Making It Easier For Developers by  SearchSOA.com


September 01, 2009 - Mobile applications have not only piqued the interest of developers, but also of the average cell phone user. Download this ebook and learn why.

 

Mobile Application Keeps KART Vans on a Roll by  AT&T Corp


October 03, 2011 - This case study shows how The Kings County Area Public Transit Agency uses mobile applications to increase the effeciency of their rural transit vanpool program.

 

Mobile Application Security Best Practices to Protect Corporate Data by  Thawte Inc.


July 11, 2013 - This expert guide from SearchConsumerization.com explains the risks associated with mobile devices and discusses native security measures built into mobile operating systems and best practices for mitigating common mobile application security risks.

 

Mobile Application Security Chaos by  Hewlett-Packard Company


April 08, 2014 - Check out this video and see if you can recognize each of the types of vulnerabilities inflicted on these mobile users.

 

Mobile Application Security from HP - Build security into your mobile applications by  Hewlett-Packard Limited


January 04, 2012 - Watch this short animation webcast to learn more about mobile application security and how you can allow good mobile connections while maintaining a secure environment.

 

Mobile Application Security Study by  Hewlett-Packard Company


February 28, 2014 - In this resource, unveil the major vulnerabilities created when mobile application developers speed through to meet deadlines instead of integrating top security measures.

 

Mobile applications - Making anywhere access a reality by  Cisco Systems, Inc.


February 13, 2012 - Uncover how you can make anytime, anywhere access a reality for your mobile workforce. Also analyze costs of mobilizing applications and how to get those applications to your mobile devices.

 

Mobile Applications Before and After by  AT&T Corp


October 04, 2011 - This white paper takes a look at business processes before and after the use of mobile applications.

 

Mobile Applications That Fit by  BlackBerry


February 18, 2010 - The more employees rely on their BlackBerry® smartphones, the greater the need for enterprise applications that fit their, and the company's, specific needs. But IT organizations can't always do it on their own. This white paper covers some best practices and resources for creating mobile enterprise applications.

 

Mobile apps reach the busy customer by  SearchCRM


March 19, 2013 - In this expert e-zine, discover two key areas of app development in today's mobile climate: delivering quality mobile customer service, and uniting front-end and back-end functionality. Also included is a case study of a mobile app that delivered user-oriented, ultra-simple service with outstanding results.

 

Mobile Apps Stores by  ComputerWeekly.com


March 09, 2012 - Juniper Research analyses the growing market for mobile apps in this report extract.

 

Mobile as a Platform for Business Service Innovation by  CA Technologies.


February 14, 2014 - This informative paper examines a mobile services management solution that can help your organization build a strategy to support and drive business service innovation.

 

Mobile Augmented Reality by  ComputerWeekly.com


February 02, 2011 - It is fair to say that AR (Augmented Reality) applications and services on the mobile remain in their infancy. Given that the first AR mobile browsers did not become available until June 2009, this is hardly surprising.

 

Mobile augmented reality opportunities for business by  ComputerWeekly.com


December 01, 2010 - The phrase “augmented reality” was coined by Boeing researcher Tom Caudell in the early 1990s to describe a digital display viewed through a headset  which guided workers through electrical wires in aircraft. The term has since gained currency and is now taken to describe digital information overlaid on the physical world.

 

Mobile Backup: Of Course There's an App for That by  CommVault Systems, Inc.


February 21, 2012 - Read this E-Guide today to learn how to utilize the PC as the center of your mobile universe, discover what mobile backup solutions are currently available today and learn about device-specific ultraportable backup technologies. Read on for more.

 

Mobile banking strategies - maximise your revenues by  ComputerWeekly.com


December 06, 2010 - Juniper Research defines mobile banking as  “the provision of banking services to customers on their mobile devices”: specifically we mean in the vast majority of instances “the operation of bank current and deposit or savings accounts”.

 

Mobile BI :Connect. Visualize. Interact by  IBM


March 13, 2014 - Access the following solution overview to see what mobile business applications can do for you. Gain a firsthand look at how you can access information virtually anywhere, explore insights like never before, and much more.

 

Mobile BI RTE Topic page by  IBM


January 21, 2014 - Access the following download page to uncover several downloadable applications that will enable your business to deliver your current BI and analytics solutions to your mobile device network.

 

Mobile BI: A Must Have in the New Mobile-First World by  MicroStrategy Incorporated


April 02, 2014 - "Anyone that uses BI has the need for mobile BI," said BI analyst Howard Dresner, president at Dresner Advisory Services. In this exclusive e-guide, learn more from Dresner and other mobile experts about why mobile BI is a must-have for forward-thinking businesses, and get advice on best practices for developing a mobile plan.

 

Mobile BI: Actionable Intelligence for the Agile Enterprise by  SAS


June 28, 2011 - This report describes how mobile devices can drive better BI. Find out how top performing companies have made mobile devices the primary platform for BI deployments.

 

Mobile BI: Empowering users at every level by  BeyeNETWORK


November 28, 2012 - In this expert resource, join tech guru Wayne Eckerson and he examines best practices for implementing mobile BI and the technologies and architectural approaches for building mobile BI systems. Read on for insights on many aspects of BI and recommendations for implementing BI applications.

 

Mobile Business Intelligence: When Mobility Matters by  MicroStrategy Incorporated


January 24, 2011 - Mobile business intelligence is a process, not a project, and a journey rather than a destination. The case studies included represent two forms that mobile BI can take to empower the mobile worker and port existing applications. This paper discusses two different companies, their environments, reasons for going mobile and key success factors.

 

Mobile cloud computing vs. cloud computing in building or hosting mobile apps by  SAP America, Inc.


December 06, 2012 - Read this expert e-guide for explanations of some of the key differences between mobile and regular cloud computing, including the need for additional testing capabilities, the need to allow for disconnected operation, the need to be mindful of limited energy available on mobile devices, and more.

 

Mobile Collaboration from IBM - Support for Fast-Moving Businesses by  IBM


December 05, 2008 - Mobile business solutions & services keep employees on the go and in the loop.

 

Mobile Collaboration: Strategies and Challenges by  Sprint


January 25, 2013 - This E-Guide from SearchUnifiedCommunications.com explores the challenges small screens present to mobile collaboration and unveils how UC strategies and vendors are responding to these issues.

 

Mobile computing strategies in manufacturing by  IQMS


January 08, 2013 - Understanding the challenges you'll face and finding the right role within your operations for mobile devices or applications will be crucial to the success of a manufacturing mobility initiative.Read this expert e-guide to understand the current state of the market for mobility in manufacturingand how it stands to shape up in the coming months.

 

Mobile Computing: Reshaping Application Modernization by  CSC


December 02, 2013 - As users continue to move to using mobile devices, businesses are being put under pressure to update their older applications.  This e-guide provides expert tips and best practices to approach mobile computing-driven application modernization.

 

Mobile Configuration Management Functions for Successful MDM by  Citrix Systems, Inc.


March 12, 2013 - This expert E-Guide will help you get the most out of mobile configuration management. Read on to understand more about security certificates, local file encryption, proxies and more.

 

Mobile Connect by  Dell Software


March 11, 2014 - Find out how to give your employees safe, easy access to the data and resources they need to be productive from a range of devices (including iOS, Android™ and Windows 8.1) while protecting your network from mobile security threats.

 

Mobile Connect for iOS: Superior Network-Level Access for iPad, iPhone, and iPod Touch Users by  Dell Software


February 12, 2014 - Discover how Apple® iPad®, iPhone® and iPod touch® users can get superior network-level access to corporate, academic and government resources over encrypted SSL VPN connections, affording complete privacy and authentication.

 

Mobile Content and Document Management Best Practices and Decision Checklist by  SAP AG


July 18, 2013 - This crucial paper discusses some of the most common threats to your mobile devices and provides key best practices for mobile content management so that you can ensure that your mobile data is secure wherever you go.

 

Mobile coupon technology by  ComputerWeekly.com


November 11, 2010 - Juniper Research defines a mobile coupon as “a coupon sent to and stored on a mobile phone that can be exchanged for a rebate, a financial discount etc. at a retailer or merchant when the consumer purchases a product.”

 

Mobile CRM for Optimal Sales Performance by  Oracle Corporation UK Ltd


December 31, 2012 - To support today's sales people, organizations need customer relationship management (CRM) mobility solutions, providing secure access to critical information both on and offline. Access this white paper today to learn more about the ways in which mobility can be leveraged in order to improve business.

 

Mobile Data Offload and Onload by  ComputerWeekly.com


October 12, 2012 - Consumer traffic demand continues to outstrip network planning capacity putting pressure on operator's networks. There are several solutions to this problem says analysts Juniper Research.

 

Mobile data protection best practices by  McAfee, Inc.


November 28, 2011 - Check out this E-Guide for the top 5 mobile data protection best practices to ensure your corporation's protection.

 

Mobile Design Patterns: Push, Don't Pull by  IBM


December 05, 2013 - Is it better to wait for users to request, or "pull," the content they need, or to "push" content updates when you think users need them? This resource weighs in on the "push vs. pull" design model debate, describing key advantages of the push model in the mobile space.

 

Mobile Device Management Buyers Guide by  Sophos, Inc.


February 25, 2014 - This informative paper takes an in-depth look at the mobile device management (MDM) solutions that are on the market today, comparing features and discussing the benefits and drawbacks of each tool.

 

Mobile Device Management Checklist by  BlackBerry


December 22, 2011 - This expert E-Guide highlights a mobile device management checklist to consider when developing your own mobile device management strategy.

 

Mobile Device Management Checklist by  Citrix


February 13, 2014 - This expert guide from SearchConsumerization.com provides a mobile device management (MDM) checklist your organization can utilize in order to ensure successful mobility deployments and management.

 

Mobile Device Management Cloud Report by  Zenprise


August 10, 2012 - This quarterly report on mobile device management (MDM) cloud practices explores the latest trends surrounding the device enrollment, application usage, and security of mobile devices in the enterprise.

 

Mobile Device Management for Dummies by  Sybase, an SAP company


May 08, 2009 - Mobile Device Management For Dummies is your guide to managing and securing mobile computing equipment such as laptops and handheld devices. You get the lowdown on enterprise mobile device management and how Sybase's Afaria solution can help you.

 

Mobile Device Management Systems Help Mitigate BYOD Risks by  Citrix Systems, Inc.


March 12, 2013 - This whitepaper will help you learn how mobile device management (MDM) can be used to mitigate the risks associated with mobility and BYOD. Learn more about multi-platform MDM, lifecycle management, enforcing compliance, and other topics.

 

Mobile Device Management Technical Guide by  SearchSecurity.com


March 06, 2013 - In this TechGuide from SearchSecurity.com, industry expert Lisa Phifer shares her vast knowledge on BYOD, MDM, data security, and more to help you get a handle on top mobile trends rocking the enterprise.

 

Mobile Device Management: Fundamental steps for success by  Citrix Systems, Inc.


May 29, 2013 - This expert e-guide from SearchConsumerization.com will highlight a number of ways IT can prepare for the influx of mobile devices into the workplace and lay the foundation needed to successfully support mobility. Learn about setting up your network structure for mobility, fundamental features for success when choosing an MDM system, and more.

 

Mobile device protection: tackling mobile device security risks by  Juniper Networks, Inc.


June 04, 2012 - The proliferation of mobile devices into the enterprise has put mobile device security risks as a top priority for many organizations today. In this e-guide from SearchSecurity.com, gain expert insight on how to tackle mobile device security risks and explore why your current approach might need to be reevaluated.

 

Mobile Device Security Lacking in Most Hospital Policy Discussions by  Essextec


June 11, 2013 - This expert resource from SearchHealthIT.com will attempt to uncover why conversations about mobile security have been lacking, discuss the emerging trends surrounding BYOD policies, and advise readers how to ensure security protocols are properly followed.

 

Mobile Device Security Overview by  BlackBerry


September 29, 2011 - This expert E-Guide highlights the 3 components for solid mobile device security, top mobile operating systems and more.

 

Mobile Device Security: Emerging Threats, Essential Strategies by  Juniper Networks, Inc.


February 15, 2012 - In this resource, explore the emerging threats organizations face with the rise of mobile computing. View now to discover key strategies for securing mobile devices, including the essential requirements for an effective solution.

 

Mobile Device Security: What Senior Managers Should Know by  Sophos, Inc.


October 31, 2012 - In this article, find practical advice to help you effectively manage the iPads, Android phones, and other next-generation mobile devices in your organization in order to minimize risk and drive business success.

 

Mobile Devices Reshaping the Customer Experience: Learn how a mobility strategy can drive innovation and add a competitive edge to your contact center by  Avaya


December 31, 2012 - This resource details the opportunities that mobility presents for contact centers, and offers guidance to help you weave these opportunities into a strategy that empowers you to capitalize on mobile benefits and sharpen your competitive edge.

 

Mobile Devices: Changing the Way You'll Service Your Customers by  Interactive Intelligence, Inc.


August 15, 2012 - Discover how you can take advantage of the mobile revolution to deliver an improved and expanded service experience for your mobile device wielding users.

 

Mobile EndPoint Security and Management - Best Practices by  Dell, Inc.


March 08, 2013 - Learn more about today's mobility concerns and how to address them in this mobile security and management E-Guide. Read on and discover more about issues to address, tools to use and steps to take.

 

Mobile Enterprise CIOs Talk Strategy by  Cisco Systems, Inc.


April 04, 2014 - In this exclusive resource, business leaders discuss how they are formulating their mobile strategy to ensure success, providing helpful tips that you can apply to your own mobile initiatives.

 

Mobile ERP and Financials: Customers Tell All by  Workday


September 25, 2013 - In this brief video, hear from real-world users -- including CareFusion, Chiquita Brands, and Community Health Services of Georgia -- of a mobile enterprise resource planning (ERP), financials, and human capital management (HCM) technology to explore the benefits they experience from mobile apps.

 

Mobile ERP, Social Media Rank Among Manufacturing Technology Trends of 2011 by  Plex Systems


January 26, 2012 - In 2011, there was a  strong willingness to invest in technology by manufacturing organizations. However, that wasn't the only trend. In this tip guide, uncover the most popular  developments in 2011 and how these trends have the potential to carry into 2012.

 

Mobile Expense Management by  ComputerWeekly.com


April 24, 2013 - Analysts Rob Bamforth and Clive Longbottom advise businesses on ways to manage the cost of mobile communications.

 

Mobile Field Service: Better Collaboration with the Back Office by  Epicor Software Corporation


July 31, 2013 - This resource introduces an enterprise mobile field service strategy that gives you the power to receive and process work orders in the field, allowing you to be more responsive to customer needs and drive success.

 

Mobile Health Handbook: Device Security by  SearchHealthIT.com


March 06, 2013 - Finding the balance between convenience and security is the key for successful mobile device management. Review expert techniques and strategies for achieving this objective in this handbook on mobile device security for the health care organization.

 

MOBILE HEALTH TRENDS 2013: BYOD HERE TO STAY by  HP & Intel®


August 16, 2013 - This expert handbook takes an in-depth look at the latest BYOD and mobile trends that organizations are adopting, examining the common problems that CIOs and IT are facing and what you can do to best overcome them.

 

Mobile infrastructure assessment by  IBM


November 26, 2013 - Access this exclusive resource to take a ten minute self-assessment to identify areas where you might be able to improve your IT infrastructure supporting mobility. This assessment is quick, simple, and can help strengthen your overall mobile strategy.

 

Mobile infrastructure self-assessment by  IBM


February 24, 2014 - This informative resource provides a helpful self-assessment so you can identify areas where you can improve the IT infrastructure that supports mobility within your organization so you can enhance your mobile environment.

 

Mobile Innovation: Transforming Customer Expectations by  Cisco Systems, Inc.


April 07, 2014 - This assessment tool provides you with 6 key factors for your mobile strategy that will increase savings and productivity.

 

Mobile Integration, Simplified: Part 4 - Building Industrial-Strength Mobile Apps by  Teamstudio, Inc.


September 14, 2011 - User demand has forced IT to re-evaluate company policies and embrace mobile computing. Access this exclusive resource to explore how companies are now taking mobile computing to the next level with customized mobile applications designed to enhance productivity in the workplace.

 

Mobile Internet 3.0: How Operators Can Become Service Innovators and Drive Profitability by  Juniper Networks, Inc.


April 23, 2012 - Mobile operators today have the distinct ability to become service innovators and drive profitability with the advent of Mobile Internet 3.0. Learn how you can expand your data revenue base in this resource.

 

Mobile is on fire: don't let your apps get burned by  Hewlett-Packard Company


November 22, 2013 - The world of mobile applications has exploded. And, it is completely transforming the way we live and work. Listen to this fascinating webcast today to learn about how enterprises can take advantage of mobile applications, BYOD challenges, the importance of speed of delivery, achieving high performance, and more.

 

Mobile Is The New Face Of Engagement by  SAP AG


July 18, 2013 - This informative resource takes an in-depth look at the critical importance of establishing an enterprise-wide mobile strategy, outlining the benefits for business, IT and end users.

 

Mobile Learning with BlackBerry Smartphones by  BlackBerry


January 21, 2011 - This study looks at the University of Waterloo's pilot project to test the impact of mobile learning using BlackBerry smartphones on their educational experience. The project utilized Chalk Pushcast software which allows organizations to create, deliver and track impactful content, which can include text, graphics, audio voiceover, video, and more.

 

Mobile location-based services gaining ground by  ComputerWeekly.com


November 24, 2010 - From the turn of the millennium until the end of 2007 MLBS (Mobile Location Based Services) had promised much, but delivered very little in terms of commercial applications. Even in Japan and South Korea, the most advanced markets for commercial MLBS, usage was disappointing.

 

Mobile Madness or BYOD Security? by  Sophos, Inc.


November 01, 2013 - This informative paper examines the state of BYOD today and the direction in which it's going, discussing common challenges in implementing and managing it and helpful strategies for overcoming these obstacles.

 

Mobile messaging is the key to connecting communities by  ComputerWeekly.com


November 25, 2010 - Few could have envisioned the global success of SMS (short message service) when the first text message was sent in 1992. SMS has crossed network and technology boundaries, and continues to find new applications, as well as providing inspiration for industry innovation as IP (Internet Protocol)-based messaging builds momentum.

 

Mobile Music Opportunities - market size, strategic analysis and forcasts by  ComputerWeekly.com


February 24, 2011 - Music services on the mobile handset are uniquely positioned to become a key platform within the music industry. Since the turn of the millennium, sales of physical music – CDs etc. – have slowly declined yearon-year, largely as a result of online piracy.

 

Mobile NAC: Protecting Network Security by Protecting Mobile Endpoints by  Fiberlink Communications


June 01, 2008 - This white paper discusses a new approach to Network Access Control that overcomes both of these shortcomings of conventional NAC products.

 

Mobile NFC in Retail by  ComputerWeekly.com


November 01, 2012 - This report from the GSMA explains the opportunities for NFC Mobile communications in retail.

 

Mobile NFC in Transport by  ComputerWeekly.com


November 23, 2012 - This in-depth report from the GSMA explains the opportunities for NFC Mobile communications in transport.

 

Mobile Optimization – It’s Now or Never by  AT&T Corp


September 21, 2011 - Read this article to discover best practices for creating a a consumer-friendly, mobile shopping experience.

 

MOBILE OPTIMIZATION: How Testing on Smartphones and Tablets Lifts Conversion by  WebTrends


April 16, 2013 - In this white paper, discover a new set of best practices for optimizing and monetizing mobile development, focusing on CRM, layout, and usability. Read on for more information and best practices on testing and optimization, segmentation and targeting, case studies of successful mobile migrations, and more.

 

Mobile payment technology - a buyer's guide by  ComputerWeekly.com


November 18, 2010 - The definition of a mobile payment is often open to interpretation and can differ from source to source.    Juniper Research has a simple definition of a mobile payment as “payment for goods or services with a mobile device such as a phone, Personal Digital Assistant (PDA), or other such device.”

 

Mobile Payments Gain New Momentum in Evolving US Market by  BlackBerry


August 02, 2010 - As a result of increasingly dynamic mobile users and an expanding base of smartphones, a growing array of payment mechanisms is reaching the market to take advantage of the power and flexibility of mobile devices. Continue reading to learn how mobile payment is evolving in the US Market.

 

Mobile phone app opportunities for business by  ComputerWeekly.com


December 01, 2010 - Over the past 12 months, the global market for applications – fuelled by the astonishing and unprecedented activity experienced on Apple’s App Store and iPhone – has continued its stellar levels of growth.

 

Mobile Phones Emerge As Security Threat Targets by  Trend Micro, Inc.


October 26, 2010 - Due to their portability and advanced computing features, mobile phones are becoming popular devices for Web surfing. Just like PCs, however, these gadgets are also susceptible to various security threats. Users must remain cautious when using their mobile phones to surf the Internet to keep their phones malware free.

 

Mobile Presence and Instant Messaging: Key Strategies for Mid-Sized Companies by  Cisco Systems, Inc.


November 02, 2011 - This e-guide discusses steps to develop a UC strategy for presence in the anywhere office. Additionally, uncover the dangers of instant messaging, how to tackle potential security challenges, what role mobility plays within presence and more.

 

Mobile Presence and Instant Messaging:  Key Strategies for Mid-Sized Companies by  Cisco Systems, Inc.


June 23, 2011 - This e-guide discusses steps to develop a UC strategy for presence in the anywhere office. Additionally, uncover the dangers of instant messaging, how to tackle potential security challenges, what role mobility plays within presence and more.

 

Mobile Remote access services from ATT Video by  AT&T Corp


October 13, 2011 - Mobile workers need access to the same tools and applications they use in the office. Mobile Remote Access Services (MRAS) from AT&T provide added security to help keep employees connected to the tools they need to be efficient and productive.

 

Mobile RFID Readers: Read Points That Move with Your Assets by  Motorola, Inc.


March 01, 2007 - Tracking inventory with RFID just got easier. Read this white paper to see how mobile RFID read points are helping increase visibility for company inventory and other assets, regardless of where it is in the supply chain.

 

Mobile Security Insider's Edition by  SearchSecurity.com


November 18, 2013 - This Insider Edition will lay out the basic strategies your organization should follow when dealing with mobile security, including data protection technologies, mobile device management and policies dealing with employees bringing personal consumer devices onto the network.

 

Mobile Security Report 2009 by  McAfee, Inc.


December 07, 2009 - Device manufacturers are balancing control with innovation, a dynamic that often controls the mobile ecosystem. This is why the McAfee Mobile Security Report 2009 is taking a closer look at manufacturers’ security experiences, their concerns and priorities, and their approach to major security challenges that lie ahead of them in the near future.

 
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts