News Stay informed about the latest enterprise technology news and product updates.

Special advisory: An introduction to enterprise mobile computing

Can wireless apps be cheap and successful? Are wireless LANs more trouble than they're worth? How should you craft your wireless security strategy? In this weeklong special advisory, SearchMobileComputing.com presents original articles and fresh resources to help you successfully develop a mobile computing strategy for your enterprise.

Can wireless apps be cheap and successful? Are wireless LANs more trouble than they're worth? How should you craft...

your wireless security strategy? In this weeklong special advisory, SearchMobileComputing.com presents original articles and fresh resources to help you successfully develop a mobile computing strategy for your enterprise. We hope you'll share your feedback with us about our series, and also tell us about your wireless projects and how SearchMobileComputing.com can help you achieve your goals. E-mail us at editor@SearchMobileComputing.com.

The secrets to cheap, easy and successful wireless apps
Monday, Apr 14, 2003
Wireless applications can seem to magically improve workforce productivity, but simply waving a wand won't ensure a successful deployment. Experts explain why availability matters more than air interfaces, how to determine ROI and why it's important to understand the differences between a wireless application and a mobile one.

Wireless LAN doesn't mean worriless LAN
Tuesday, Apr 15, 2003
Wireless LANs are cheap to buy and usually easy to install, but going wireless doesn't mean it's time to throw away your aspirin. Experts say rogue access points, stray signals and standards struggles should concern all wireless LAN managers. With new technology and new products emerging constantly, decision makers may find that there are no easy answers.

Experts: Good policy can mitigate mobile security risks
Wednesday, Apr 16, 2003
It may be easy to store your client list on your company-issued PDA, but what happens if the device is lost or stolen? Experts say that an enterprise-wide mobile security policy can protect a company's interests in the event of a worst-case scenario like theft, but only if IT managers craft guidelines that address an enterprise's unique requirements.


LINKS:

 

Dig Deeper on Mobile infrastructure and applications

Start the conversation

Send me notifications when other members comment.

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Please create a username to comment.

-ADS BY GOOGLE

SearchNetworking

SearchTelecom

SearchUnifiedCommunications

SearchSecurity

Close