TECH SPOTLIGHT

Removing the Mystery of Radio Frequency

4/25/2010
As wireless LANs become more critical to delivering core business applications, IT requires that these wireless networks be reliable, yet simple to maintain. The good news is that predicting radio frequency performance was once an art, but has now become a science.

Enterprise Data Mobilization: Part 4

1/25/2010
In this final installment of our four-part series we'll discuss the remaining key steps to take for a successful implementation and deployment.

Don't Be Scared

1/5/2010
Threats are real, but you can secure WLAN & VoIP for your mobile workforce.

10 Steps For A Mobile Deployment

1/5/2010
It's not brain surgery, but establishing a plan for mobility before you take that first step is a good way to avoid problems. Check out our step-by-step guide.

Enterprise Data Mobilization: Part 3

12/17/2009
In Parts 1 and 2 of this series we explored the steps to take to mobilize enterprise data and application design considerations. In this installment, we explore the next steps in the implementation process, including client-side caching, coding business logic, and building the user interface.

Enterprise Data Mobilization: Part 2

11/24/2009
In Part 1 of this tutorial series we explored the first steps to take to mobilize enterprise data. In this installment, we'll discuss application design considerations as you architect your system.

Process & Strategy: Mobile Entitlement

11/6/2009
Young employees are bringing new wireless demands to the workplace. In the latest installment of our ongoing Process & Strategy series, industry analyst Craig Settles asks leading enterprises for their top tips in dealing with the expectations of the "entitlement generation."
 |<  <  17 18 19 20 21 22 23 24 25 26  >  >| 

MOST READ STORIES

topics

Must See


FEATURED REPORT

Mobile Risk: Security Is Not a Game

IDC predicts 2 billion mobile devices will be shipped by 2017, while Gartner expects a 26 billion Internet of Things installed base (excluding smartphones and tablets) by 2020. With more devices, more machines, more connectivity comes more risk.