Mobility

We discuss the growing importance of enterprise mobility and the technology behind mobile application development.

  • Research // Oct 2013

    BYOD: Snapshot of the emerging BYOD Landscape: Ready or Not, Here it Comes

    BYOD: Ready or Not, Here it Comes information on BYOD is on the Rise, Company vs Personal, End-users are Driving the Trend, What's Keeping You Awake? And When BYOD is Supported and Embraced GET READY.

    Provided By VMware

  • Research // Oct 2013

    Addressing the Multi-device Reality: Unified Endpoint Management webinar

    Register today for an informative live event, where we'll be demonstrating the latest release of the Dell KACE K3000 Mobile Management Appliance. Join us and learn about unified endpoint management, regardless of devices in use, with the new K3000. Register now to learn: Is the PC dead? What’s really...

    Provided By Dell Kace

  • Research // Jun 2013

    Top Considerations for a Unified Communications Purchase

    A report from ZK Research provides relevant decision criteria to help organizations make the best Unified communications (UC) decision possible. Unified communications has been a continually evolving market for the past decade. UC was initially centered on voice over IP (VoIP) and unified messaging, but has expanded significantly over the...

    Provided By Cisco Systems, Inc

  • Research // Feb 2013

    BlackBerry 10: A smartphone beginning or end?

    With a new operating system, two new phones and a rebranding, BlackBerry is starting 2013 afresh. The company formerly known as Research In Motion or RIM introduced its BlackBerry 10 platform, with chief executive Thorsten Heins marking the day as the “starting line” for a new wave of BlackBerry products....

    Provided By ZDNet

  • Research // Feb 2013

    Security Intelligence Can Deliver Value Beyond Expectations

    First-generation security intelligence and security incident and event management products have promised a lot, but some of these tools require considerable resources to manage the solution. The growth in security-as-a-service offerings, however, offers an opportunity for information security teams to follow the path successfully laid by many other IT departments....

    Provided By IBM

  • Research // Feb 2013

    Security Intelligence Can Deliver Value Beyond Expectations And Needs To Be Prioritized

    First-generation security intelligence and security incident and event management products have promised a lot, but some of these tools require considerable resources to manage the solution. The growth in security-as-a-service offerings, however, offers an opportunity for information security teams to follow the path successfully laid by many other IT departments....

    Provided By IBM

  • Research // Feb 2013

    Reputational risk and IT: How security and business continuity can shape the reputation and value of your company

    Reputational risk and IT is an IBM study that investigates how organizations around the world are managing their reputations in today’s digital era. IT risk can imperil companies’ productivity, damage customer relations and ultimately erode trust. Read the research report to find out the three principal forces that drive corporate...

    Provided By IBM

  • Research // Jan 2013

    How Mobility Is Changing the World

    Never before in the history of technology, has there been such strong development in three key areas: the power of devices; the plethora of back-end information; and the ability to integrate multiple sources of the latter to display on the former. As a result, these global deployments of mobile technology...

    Provided By SAP

  • Research // Nov 2012

    Mobile security: Defending your devices

    The days when IT security was solely focused on desktop PCs are long gone. Today, businesses operate in a multi-device, multi-platform world, with remote working, the popularity of bring-your-own-device (BYOD) and the consumerisation of IT changing the way companies protect their data and employees.This ZDNet and TechRepublic guide looks at...

    Provided By ZDNet

  • Research // Nov 2012

    BYOD: Fueling Mobile Growth, Employee Innovation

    A recent Cisco survey shows that 89% of IT departments worldwide enable BYOD, proving it's a global trend for which IT must prepare. What are the security challenges? The benefits? Learn why the world is drawn to a more flexible network.

    Provided By Cisco

  • Research // Oct 2012

    Windows 8: From preview to release

    It's been over three years since Microsoft released Windows 7, and its new desktop OS is about to take its first steps in the big wide world. Along with Microsoft Surface and Windows Server 2012, ZDNet has followed Windows 8 all the way from Developer Preview to Release To Manufacturing....

    Provided By ZDNet

  • Research // Sep 2012

    BYOD Survey Report: Mobile Threats are Real and Costly

    A lack of integrated mobile security is costing companies from lost productivity to lost data. In fact, 83% of IT professionals believe that mobile devices create a high security risk within the corporate environment. Webroot recently conducted research to assess the state of mobile security in organizations throughout the United...

    Provided By Webroot Software

  • Research // Nov 2011

    BYO Device: How to handle consumer gadgets in your workplace

    Workers are no longer willing to let the business decide what devices they should use to get their jobs done most effectively. Whether it's smartphones, laptops, netbooks or even tablets, many workers are insisting on using their own devices to connect to sensitive systems inside your organisation. Allowing workers to...

    Provided By silicon.com

  • Research // Sep 2011

    ZDNet Tech Family Tree - The history of the iPhone

    Download ZDNet's Tech Family Tree as a PDF and explore the history of the iPhone. The iPhone Tech Family Tree is a wholly original insight into Apple's most famous product. Designed to look good and do good anywhere someone with an interest in technology might be, it's perfect for designers,...

    Provided By ZDNet

  • Research // Jan 2010

    Best Practices in Lifecycle Management: Comparing KACE, Altiris, LANDesk, and Microsoft SCCM

    Compares the KBOX? family of appliances from KACE with leading competitors Altiris, LANDesk, and Microsoft. It explains key best practices in lifecycle management, uses these as a framework for functional comparison, and includes a cost comparison to determine overall solution value.

    Provided By KACE

  • Research // Nov 2009

    2009 Smartphone and Carrier Buying Guide

    The lineup of cell phones has expanded a bit, but a significant number of what we see in that category are updates to existing models. The real innovation in the mobile phone world is in the area of smartphones where we see the Apple iPhone, Palm WebOS, Google Android, RIM...

    Provided By ZDNet

  • Research // Feb 2013

    Security Intelligence Can Deliver Value Beyond Expectations

    First-generation security intelligence and security incident and event management products have promised a lot, but some of these tools require considerable resources to manage the solution. The growth in security-as-a-service offerings, however, offers an opportunity for information security teams to follow the path successfully laid by many other IT departments....

    Provided By IBM

  • Research // Feb 2013

    Security Intelligence Can Deliver Value Beyond Expectations And Needs To Be Prioritized

    First-generation security intelligence and security incident and event management products have promised a lot, but some of these tools require considerable resources to manage the solution. The growth in security-as-a-service offerings, however, offers an opportunity for information security teams to follow the path successfully laid by many other IT departments....

    Provided By IBM

  • Research // Feb 2013

    Reputational risk and IT: How security and business continuity can shape the reputation and value of your company

    Reputational risk and IT is an IBM study that investigates how organizations around the world are managing their reputations in today’s digital era. IT risk can imperil companies’ productivity, damage customer relations and ultimately erode trust. Read the research report to find out the three principal forces that drive corporate...

    Provided By IBM

  • Research // Oct 2013

    BYOD: Snapshot of the emerging BYOD Landscape: Ready or Not, Here it Comes

    BYOD: Ready or Not, Here it Comes information on BYOD is on the Rise, Company vs Personal, End-users are Driving the Trend, What's Keeping You Awake? And When BYOD is Supported and Embraced GET READY.

    Provided By VMware

  • Research // Nov 2009

    2009 Smartphone and Carrier Buying Guide

    The lineup of cell phones has expanded a bit, but a significant number of what we see in that category are updates to existing models. The real innovation in the mobile phone world is in the area of smartphones where we see the Apple iPhone, Palm WebOS, Google Android, RIM...

    Provided By ZDNet

  • Research // Sep 2011

    ZDNet Tech Family Tree - The history of the iPhone

    Download ZDNet's Tech Family Tree as a PDF and explore the history of the iPhone. The iPhone Tech Family Tree is a wholly original insight into Apple's most famous product. Designed to look good and do good anywhere someone with an interest in technology might be, it's perfect for designers,...

    Provided By ZDNet

  • Research // Oct 2012

    Windows 8: From preview to release

    It's been over three years since Microsoft released Windows 7, and its new desktop OS is about to take its first steps in the big wide world. Along with Microsoft Surface and Windows Server 2012, ZDNet has followed Windows 8 all the way from Developer Preview to Release To Manufacturing....

    Provided By ZDNet

  • Research // Nov 2012

    Mobile security: Defending your devices

    The days when IT security was solely focused on desktop PCs are long gone. Today, businesses operate in a multi-device, multi-platform world, with remote working, the popularity of bring-your-own-device (BYOD) and the consumerisation of IT changing the way companies protect their data and employees.This ZDNet and TechRepublic guide looks at...

    Provided By ZDNet

  • Research // Feb 2013

    BlackBerry 10: A smartphone beginning or end?

    With a new operating system, two new phones and a rebranding, BlackBerry is starting 2013 afresh. The company formerly known as Research In Motion or RIM introduced its BlackBerry 10 platform, with chief executive Thorsten Heins marking the day as the “starting line” for a new wave of BlackBerry products....

    Provided By ZDNet

  • Research // Jan 2013

    How Mobility Is Changing the World

    Never before in the history of technology, has there been such strong development in three key areas: the power of devices; the plethora of back-end information; and the ability to integrate multiple sources of the latter to display on the former. As a result, these global deployments of mobile technology...

    Provided By SAP

  • Research // Sep 2012

    BYOD Survey Report: Mobile Threats are Real and Costly

    A lack of integrated mobile security is costing companies from lost productivity to lost data. In fact, 83% of IT professionals believe that mobile devices create a high security risk within the corporate environment. Webroot recently conducted research to assess the state of mobile security in organizations throughout the United...

    Provided By Webroot Software

  • Research // Oct 2013

    Addressing the Multi-device Reality: Unified Endpoint Management webinar

    Register today for an informative live event, where we'll be demonstrating the latest release of the Dell KACE K3000 Mobile Management Appliance. Join us and learn about unified endpoint management, regardless of devices in use, with the new K3000. Register now to learn: Is the PC dead? What’s really...

    Provided By Dell Kace

  • Research // Nov 2011

    BYO Device: How to handle consumer gadgets in your workplace

    Workers are no longer willing to let the business decide what devices they should use to get their jobs done most effectively. Whether it's smartphones, laptops, netbooks or even tablets, many workers are insisting on using their own devices to connect to sensitive systems inside your organisation. Allowing workers to...

    Provided By silicon.com

  • Research // Jan 2010

    Best Practices in Lifecycle Management: Comparing KACE, Altiris, LANDesk, and Microsoft SCCM

    Compares the KBOX? family of appliances from KACE with leading competitors Altiris, LANDesk, and Microsoft. It explains key best practices in lifecycle management, uses these as a framework for functional comparison, and includes a cost comparison to determine overall solution value.

    Provided By KACE

  • Research // Nov 2012

    BYOD: Fueling Mobile Growth, Employee Innovation

    A recent Cisco survey shows that 89% of IT departments worldwide enable BYOD, proving it's a global trend for which IT must prepare. What are the security challenges? The benefits? Learn why the world is drawn to a more flexible network.

    Provided By Cisco

  • Research // Jun 2013

    Top Considerations for a Unified Communications Purchase

    A report from ZK Research provides relevant decision criteria to help organizations make the best Unified communications (UC) decision possible. Unified communications has been a continually evolving market for the past decade. UC was initially centered on voice over IP (VoIP) and unified messaging, but has expanded significantly over the...

    Provided By Cisco Systems, Inc