• July 31, 2006 31 Jul'06

    CRM SaaS vendors moving to mobile

    On-demand CRM vendors are extending their functionality into mobile applications, and though they can be a good fit for some, there's still a need for mobile platforms.  Continue Reading

  • July 31, 2006 31 Jul'06

    Mobile CRM: Service applications

    Mobilizing your field and customer service staff can increase productivity and give your enterprise the upper hand when it comes to customer satisfaction. This tip discusses some critical questions you must ask before you deploy a mobile service ...  Continue Reading

  • July 26, 2006 26 Jul'06

    Mobile Platforms: Palm OS - not the best for the multitasker

    Mobile managers face a tough choice when weighing which mobile platform or operating system to deploy. We've assembled a team of experts and asked them to weigh the good and bad of each mobile platform to help you choose the one that's right for ...  Continue Reading

  • July 19, 2006 19 Jul'06

    Enterprises failing to secure instant messaging

    Results of a recent Symantec survey suggest that nearly three out of every five organizations have not secured their instant messaging applications.  Continue Reading

  • July 19, 2006 19 Jul'06

    Company outsources telecom expense management and saves big

    As wireless costs increase, many companies are looking for ways to better manage their telecom expenses. One construction company decided to outsource its telecom expense management and saw its phone equipment and wireless service expenses almost ...  Continue Reading

  • July 17, 2006 17 Jul'06

    Step 2: How to crack a laptop

    Laptops with sensitive data are getting stolen every day. Contributor Kevin Beaver says the best way to secure your laptops is to understand how they will be attacked. He provides the basic attack methods and a set of contingencies in this ...  Continue Reading

  • July 17, 2006 17 Jul'06

    Step 3: How to secure a laptop

    Laptops with sensitive data are getting stolen every day. Contributor Kevin Beaver says the best way to secure your laptops is to understand how they will be attacked. He provides the basic attack methods and a set of contingencies in this ...  Continue Reading

  • July 17, 2006 17 Jul'06

    Step 4: Laptop security summation

    Laptops with sensitive data are getting stolen every day. Contributor Kevin Beaver says the best way to secure your laptops is to understand how they will be attacked. He provides the basic attack methods and a set of contingencies in this ...  Continue Reading

  • July 17, 2006 17 Jul'06

    Step 1: How it can happen

    Laptops with sensitive data are getting stolen every day. Contributor Kevin Beaver says the best way to secure your laptops is to understand how they will be attacked. He provides the basic attack methods and a set of contingencies in this ...  Continue Reading

  • July 17, 2006 17 Jul'06

    Quiz: Mobile CRM vendors

    Trouble keeping up with CRM mobile vendors? Enhance your knowledge with this quiz from SearchCRM.com. Learn about SFA vendors and resources.  Continue Reading

  • July 17, 2006 17 Jul'06

    Laptop hacking step by step

    Laptops with sensitive data are getting stolen every day. Contributor Kevin Beaver says the best way to secure your laptops is to understand how they will be attacked. He provides the basic attack methods and a set of contingencies in this ...  Continue Reading

  • July 17, 2006 17 Jul'06

    Mobile CRM: Sales

    Mobile CRM can be an effective sales tool and a source of improved customer service and competitive differentiation.  Continue Reading

  • July 17, 2006 17 Jul'06

    Mobile IPv6

    This chapter describes the operation of Mobile IPv6, starting with the role of each element: the mobile node, the correspondent node, and the home agent.  Continue Reading

-ADS BY GOOGLE

SearchNetworking

SearchTelecom

SearchUnifiedCommunications

SearchSecurity

Close