Mobile and Wireless Device Management Reports

Computer Weekly – 28 May 2019: Technology at heart of Spurs' new stadium
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, the IT chief at Tottenham Hotspurs FC discusses the tech behind the most technologically advanced football stadium in the world. We also investigate how the data powering artificial intelligence is leading to discriminatory algorithms and explore the inherent risks in 5G mobile networks. Read the issue now.
Posted: 08 Feb 2021 | Published: 24 May 2019

TechTarget ComputerWeekly.com

Computer Weekly – 18 September 2018: The importance of smartphone sustainability
sponsored by Oracle Cloud
EZINE: In this week's Computer Weekly, we examine the considerable environmental footprint of the mobile phone industry and ask what can be done to improve it. We find out how disaster recovery as a service (DRaaS) is being used and when it's an option for businesses. And we look at some of the UK's emerging fintech success stories. Read the issue now.
Posted: 08 Feb 2021 | Published: 14 Sep 2018

Oracle Cloud

A Security Assessment of Android Full-disk Encryption
sponsored by TechTarget ComputerWeekly.com
EGUIDE: This article in our Royal Holloway Security Series describes an attack on Android 5.0 full disk encryption and discusses potential countermeasures.
Posted: 08 Feb 2021 | Published: 02 Aug 2016

TechTarget ComputerWeekly.com

What to look for in an SMB-ready mobile device
sponsored by T-Mobile for Business
EGUIDE: Read this TechTarget e-guide to glean mobile device selection methods and best practices for SMBs, including what to look for in a mobile device, picking rugged mobile devices vs. consumer-grade ones, and deployment approaches.
Posted: 16 Apr 2024 | Published: 12 Apr 2024

T-Mobile for Business

Explore the latest enterprise mobile security technology
sponsored by TechTarget Mobile Computing
EBOOK: As cyber threats continue to evolve, mobile device management and mobile security tools need to evolve as well. This handbook offers a new approach to mobile security, which offers IT more granular control over data and devices, making it easier to weed out threats.
Posted: 25 Oct 2017 | Published: 26 Oct 2017

TechTarget Mobile Computing

Access e-zine – May 2017
sponsored by TechTarget Enterprise Desktop
EZINE: Technology budgets are tight, yet businesses still expect IT to increase their ROI. But end-user computing tools don't always rake in big bucks. Instead the ROI comes from increased productivity and simpler management and maintenance for IT administrators. Discover the ROI businesses can get from these technologies and how to measure it.
Posted: 09 May 2017 | Published: 09 May 2017

TechTarget Enterprise Desktop

Access e-zine: September 2017
sponsored by TechTarget Enterprise Desktop
EBOOK: IT pros and consultants with hands-on experience in Windows 10 migration strategies share their upgrade approaches, triumphs and trials.
Posted: 12 Sep 2017 | Published: 12 Sep 2017

TechTarget Enterprise Desktop

Access e-zine – June 2017
sponsored by TechTarget Enterprise Desktop
EZINE: Download this issue of Access magazine to understand how the enterprise mobility management (EMM) landscape is changing and the IT infrastructure systems issues popping up around graphics support, secure data access and how IT pros are approaching these IT infrastructure challenges.
Posted: 13 Jun 2017 | Published: 13 Jun 2017

TechTarget Enterprise Desktop

Uniting IT and App Development for Mobile App Strategies
sponsored by TechTarget Enterprise Desktop
EZINE: The new wave of enterprise mobile application development has altered how app dev fits into IT's overall strategy. Learn how the sides can come together.
Posted: 11 Jul 2017 | Published: 11 Jul 2017

TechTarget Enterprise Desktop

Single Sign-On Service Requires a Cloud-Era Update
sponsored by TechTarget Security
EBOOK: The best Single Sign-On today can handle the applications mobile workers use, identity as a service and more. In this guide, learn how you can make SSO and other identity management approaches more effective.
Posted: 13 Sep 2017 | Published: 13 Sep 2017

TechTarget Security