TECH SPOTLIGHT

BYOD Checklist: Who is Responsible for What?

8/10/2012
What if a personal device being used for work is lost or stolen? What happens to the data? Who pays for it? The enterprise and employees alike must consider liability, policies and procedures before allowing BYOD.

Utilizing Tablets for Sales and Beyond

8/2/2012
While sales professionals have been slow to embrace mobile technology, tablets are gaining traction among the sales force, and IT is starting to catch on as well.

Rugged Computers Evolve for the Future

7/27/2012
Jerker Hellström, CEO of Handheld Group, discusses the evolution of rugged devices and their use in the enterprise - which now includes use in ordinary offices.

The Rise of the Mobile Center of Excellence

6/29/2012
Despite the rapid adoption of mobile, creating an effective enterprise mobility strategy hasn’t been easy for many companies. Today’s CIO is tasked with often conflicting, sometimes redundant, mobile projects that have sprung up within individual business units. Establishing a Mobile enter of Excellence will help.

The Lost or Stolen Device

5/29/2012
At the very least ensure that your company's mobile devices can be fully tracked and have their data wiped.

Unpacking RIM's Mobile Fusion

5/21/2012
On the surface, BlackBerry Mobile Fusion appears to meet a critical need for enterprises struggling to manage their mobility demands, but is BlackBerry Mobile Fusion too little, too late for RIM? Or is it a solid solution that re-establishes RIM’s relevancy in today’s mobility marketplace?
 |<  <  11 12 13 14 15 16 17 18 19 20  >  >| 

MOST READ STORIES

topics

Must See


FEATURED REPORT

Mobile Risk: Security Is Not a Game

IDC predicts 2 billion mobile devices will be shipped by 2017, while Gartner expects a 26 billion Internet of Things installed base (excluding smartphones and tablets) by 2020. With more devices, more machines, more connectivity comes more risk.