TECH SPOTLIGHT

The End Goal of Apps

11/13/2013
B2B, B2E and B2C apps — what’s the difference? For mobile apps to be successful, they need to be built with the intended user in mind, independent of the device.

7 Tips for Creating Effective Apps for Sales

11/11/2013
Sales apps are critical for the business. But done incorrectly, and having an app means little. Here’s seven steps for enterprises to take to ensure the process is not a waste of time.

CIO Versus CMO

11/3/2013
Traditionally, CIO and CMOs are seen as opposite ends of the spectrum. However, the rise of   mobility calls for more interdependency in shaping mobile strategy. Who will own mobile?

Get Beyond BYOD

10/28/2013
The biggest question in the BYOD phenomenon is not just how users and their myriad of personal and corporate devices will connect the network, but how will these devices be managed for productivity once they’re there?

The Key to Recruiting Top Talent

10/20/2013
Enterprises must address the preferences and habits of a new workforce as part of the recruitment process. For the current and future crop of workers, that means one thing: mobile.

What Rugged Really Means

10/7/2013
"Ruggedish" devices are a new trend, but there’s a big difference  between consumer devices that can take a beating and real rugged devices that can take a hit.

The Device Does Not Matter

9/29/2013
Consumerization is redefining the software developer's business model. And it begins with responsive design.

From Mobile Access to Mobile Working

9/23/2013
Office hours? What's that. Mobility means "we're always on" and because of that, "always working." Access, by itself, is useless unless we can actually interact with the content that drives what we do.
 |<  <  3 4 5 6 7 8 9 10 11 12  >  >| 

MOST READ STORIES

topics

Must See


FEATURED REPORT

Mobile Risk: Security Is Not a Game

IDC predicts 2 billion mobile devices will be shipped by 2017, while Gartner expects a 26 billion Internet of Things installed base (excluding smartphones and tablets) by 2020. With more devices, more machines, more connectivity comes more risk.