eWorkplace Reports

What Can You Do Differently to Guard Against Threats from Rapidly Evolving Mobile Malware?
sponsored by IBM
WHITE PAPER: Mobile security is about more than the device: It's also about protecting apps on the device. Learn how IBM can help.
Posted: 09 Oct 2014 | Published: 31 Jan 2014

IBM

Address Cloud Failover Issues with DRaaS
sponsored by Zerto
EGUIDE: Failing over to the cloud can be handled by a DRaaS provider, but concerns over data movement and performance need to be addressed before the cloud DR strategy is implemented. Explore three questions to answer before using DRaaS in any cloud strategy.
Posted: 24 Oct 2016 | Published: 21 Oct 2016

Zerto

7 Features ECM Systems Need for a Modern User Experience
sponsored by Microsoft
EGUIDE: In this e-guide, expert consultant Reda Chouffani explores how to adapt ECM to handle increasing volumes of content and coordinate with cloud-based systems. Discover 7 key capabilities of modern ECM systems like robust mobility, seamless integration with LOB systems, analytics, and 4 more.
Posted: 02 May 2017 | Published: 27 Apr 2017

Microsoft

Why It's Important to Have a Mobile Enterprise Strategy
sponsored by VMware, Inc.
EGUIDE: We sat down with the general manager of VMware's end-user computing group to learn about the vendor's EMM evolution. Explore additional expert resources that detail ways to integrate EMM into a broader mobile enterprise strategy, and what it means to have a mobile-first strategy.
Posted: 20 Jun 2016 | Published: 15 Jun 2016

VMware, Inc.

Empowering Mobile Workers across Apps and Networks
sponsored by Dell and Microsoft
EGUIDE: Download this e-guide to learn how fusion apps are empowering mobile workers by combining social and location data with key business data. You'll also learn best practices for setting up mobile workers across local office networks.
Posted: 21 May 2018 | Published: 17 May 2018

Dell and Microsoft

How to Empower Mobile Workers With Remote Desktop Apps
sponsored by TechTarget Mobile Computing
EBOOK: In this expert e-book, technology expert Bryan Barringer explains how studying user habits, using modern software development methodologies and constantly monitoring performance can lead to successful adoption of mobile apps. Also discover how mobile remote desktop apps work, and how employee productivity can get a boost from mobile apps.
Posted: 28 Jan 2015 | Published: 28 Jan 2015

TechTarget Mobile Computing

Assess Devices and Users To Get Started on a Mobility Program
sponsored by TechTarget Enterprise Desktop
EGUIDE: While IT administrators have managed user identities, endpoint devices, applications, and data for years, mobile technology has brought dramatic growth and corresponding challenges. This exclusive e-guide takes a look at the shifting workplace environment as mobile devices have increasingly become popular.
Posted: 03 Mar 2016 | Published: 02 Mar 2016

TechTarget Enterprise Desktop

Mobile App Infrastructure and the New "Mindset" of Node.js
sponsored by Red Hat
EGUIDE: This e-guide details how Electronic Arts Inc. learned from their failed efforts and constructed a successful strategy for deploying cloud infrastructure for mobile apps. Additionally, learn from Red Hat CTO, Mícheál Ó Foghlú on how Node.js went exponential and how it's contributing to a new "mindset" when it comes to enterprise mobility.
Posted: 09 Sep 2016 | Published: 08 Sep 2016

Red Hat

IBM SmartCloud for Social Business Mobility
sponsored by IBM
WHITE PAPER: This white paper introduces one company's portfolio of online services, including scalable and security-rich email, web conferencing, and social collaboration, that can help to improve employee responsiveness and effectiveness in support of social business.
Posted: 02 Oct 2014 | Published: 30 Sep 2014

IBM

The SDN Charge and the New Role in Mobile Security
sponsored by Juniper Networks, Inc.
EGUIDE: Take a closer look at the benefits and challenges of an SDN-WAN and network function virtualization (NFV) deployment. Additionally, this guide illustrates SDN's new security methodologies, which are reshaping mobile security today.
Posted: 14 Nov 2016 | Published: 11 Nov 2016

Juniper Networks, Inc.