EBOOK:
The evolution of smartphones and mobile networks enable new possibilities for enterprise applications and new challenges for IT. The benefits span organizations. But delivering this requires a sound strategy and close collaboration between business and IT. Learn about key mobile trends and how to develop a mobile enterprise application strategy.
CASE STUDY:
Access this case study to learn how YPG created a consumer mobile version of YellowPages.ca™ and sales applications for BlackBerry® smartphones to expand the reach of its local search database.
EZINE:
This ezine covers the topic of testing and retesting defects and cites the Blackberry blackouts of 2007 and 2008 as examples of issues that could have been detected by regressing testing.
VIDEOCAST:
In this video case study watch how amaZulu, an eco-friendly company that imports natural architectural materials from villages all around the world, uses Cisco technology to improve customer service and productivity.
WEBCAST:
Mobile applications must be as reliable and secure as those that run within the enterprise. View this webcast to get a demonstration of focused features to secure wireless email.
WEBCAST:
This webcast will cover the following topics: Enterprise activation overview, Prerequisites for enterprise activation, Troubleshooting stage 1 issues: activation, Troubleshooting stage 2 issues: verifying encryption etc.
WHITE PAPER:
This paper describes the key issues a multi-national enterprise needs to consider when determining the requirements for deploying a global wireless messaging project.
WHITE PAPER:
This document describes how administrators can enable wireless enterprise activation for users on the BlackBerry Enterprise Server, and how users can initiate wireless enterprise activation from their handhelds.
WHITE PAPER:
The latest smartphone applications foster more mobility and productivity than ever before--as long as a secure mobile network is in place. This white paper addresses mobile applications and the potential security threats to the corporate networking as well as provide security measures to take.