Remote Workers Reports

Sleeping Android: the danger of dormant permissions
sponsored by TechTarget ComputerWeekly.com
ESSENTIAL GUIDE: This article in our Royal Holloway Information Security Thesis series explains how weaknesses in the Android platform could leave users open to exploitation or abuse.
Posted: 13 Mar 2017 | Published: 04 Mar 2013

TechTarget ComputerWeekly.com

Modern Mobility E-zine: February 2016
sponsored by TechTarget Mobile Computing
EZINE: In this issue of Modern Mobility, you will explore the state of enterprise wearables, assesses their potential use cases, and take an exclusive look at the security challenges that still remain. Read on to access a Q&A with end-user computing expert Matt Kosht, who explains why app refactoring is still a niche technology.
Posted: 09 Feb 2016 | Published: 09 Feb 2016

TechTarget Mobile Computing

How User Experience Monitoring Can Benefit Help Desks
sponsored by LogMeIn Rescue
EGUIDE: The rise of mobility has created myriad issues for the IT help desk. In this expert e-guide, learn how you can give your help desk the support it needs in the mobile era.
Posted: 09 Mar 2017 | Published: 06 Mar 2017

LogMeIn Rescue

Your guide to mobile device management
sponsored by Microsoft
EGUIDE: The EMM market is growing at a rapid pace. To stay on top of your mobile strategy, organizations should be aware of a number of trends. In this e-guide compare mobile device management products, trends, and more to implement the most effective mobile strategy for your organization.
Posted: 27 Oct 2017 | Published: 23 Oct 2017

Microsoft

Address Cloud Failover Issues with DRaaS
sponsored by Zerto
EGUIDE: Failing over to the cloud can be handled by a DRaaS provider, but concerns over data movement and performance need to be addressed before the cloud DR strategy is implemented. Explore three questions to answer before using DRaaS in any cloud strategy.
Posted: 24 Oct 2016 | Published: 21 Oct 2016

Zerto

IDC Flash: IBM Releases IAM for Mobile, Cloud and Enterprise
sponsored by IBM
WHITE PAPER: Gain insights into IBM's threat-aware IAM solutions focused on enabling identity as the new security perimeter.
Posted: 09 Oct 2014 | Published: 29 Nov 2013

IBM

DevOps, Low-Code, and the Democratization of App Development
sponsored by Applause
EGUIDE: In this expert e-guide, learn about the debate about which parts – if any – of app development should be handled by LOB employees and IT professionals other than developers themselves. Enter the discussion and find out how DevOps and no-code/low-code tools are reshaping the way cloud and mobile apps are being built.
Posted: 15 Dec 2017 | Published: 12 Dec 2017

Applause

Reduce the Complexity of Managing and Securing Mobile Deployments
sponsored by BlackBerry
EGUIDE: As enterprise mobility expands, so do are the resources required to support and manage it. Determine the best way for your organization to implement an EMM strategy and find out if and why, you should consider managed mobility services.
Posted: 04 May 2017 | Published: 27 Apr 2017

BlackBerry

Improving Revenue and Population Health: New Strategies for Health IT
sponsored by Medfusion
EGUIDE: Orlando Health found a way to create a more efficient and accurate revenue cycle, while saving money. But how did they do it? Plus, could the gamification of healthcare apps influence a positive change on population health? Access this e-guide to discover the answers to these question and more.
Posted: 08 Feb 2021 | Published: 02 Sep 2016

Medfusion

The role of Apple device management in modern business
sponsored by JAMF
EGUIDE: Many organizations rely on unified endpoint management for a variety of devices, but there's also a space for Apple device management in the modern enterprise. In this e-guide you'll discover new management support features for Apple devices and how they are making these devices more productive as business tools.
Posted: 23 Aug 2017 | Published: 18 Aug 2017

JAMF