Code Division Multiple Access Reports

The Promise of Mobile Unified Communications
sponsored by BlackBerry
WHITE PAPER: Mobile unified communications allows organizations to provide employees with the ability to collaborate and communicate efficiently, as well as access information on-demand.
Posted: 09 Jan 2009 | Published: 09 Jan 2009

BlackBerry

Advanced GPS Techniques
sponsored by BlackBerry
VIDEO: Watch this tutorial video, presented by Brian Zubert of the developer relations team at Research in Motion, as he covers advanced GPS. Topics included are: GPS on GSM, GPS on iDEN, GPS on CDMA, best practices, GPS in the browser and integrating with BlackBerry maps.
Posted: 14 Jun 2010 | Premiered: 11 Jun 2010

BlackBerry

Building a Unified Enterprise Mobility Strategy
sponsored by Motorola Solutions
WHITE PAPER: This paper outlines a step-by-step approach to developing a unified enterprise mobility strategy, enabling a more cost-effective and efficient delivery of network connectivity to a larger mobile workforce.
Posted: 29 Jun 2007 | Published: 01 May 2007

Motorola Solutions

Video conferencing standards and interoperability considerations
sponsored by TechTarget Security
EGUIDE: Before you can successfully implement a video conferencing system into your enterprise, you must first understand the standards involved to ensure your solution will work with others on your network.  This e-guide uncovers standards and interoperability considerations while also providing migration planning tips.
Posted: 27 Apr 2011 | Published: 27 Apr 2011

TechTarget Security

Dirk Hohndel on Intel and the Linux Foundation
sponsored by Intel
VIDEO: In this video, Dirk Hohndel, Chief Linux and Open Source Technologist at Intel, discusses the importance of standards organizations like the Linux Foundation as well as thought on the future of Open Source at Intel.
Posted: 01 Nov 2010 | Premiered: 01 Nov 2010

Intel

Informatica SWIFT Validation
sponsored by Informatica
PRODUCT DEMO: Financial messages must be validated before being sent across any network for financial data exchange or they may be delayed or rejected. Informatica minimizes these risks with message validation, part of its B2B Data. Use the provided links here to test Informatica SWIFT Validation.
Posted: 14 Jun 2010 | Premiered: 14 Jun 2010

Informatica

Seven Steps to Achieving Better Requirements Engineering in Your Organization
sponsored by IBM
WHITE PAPER: Requirements engineering is about more than just analyzing documenting requirements. It is an important and multifaceted part of systems engineering that broadens the product development process. Companies that successfully introduce a new requirements engineering process don't just change their process and technology; they change their thinking.
Posted: 13 May 2009 | Published: 31 Mar 2009

IBM

E-Book: Standardizing Business Continuity
sponsored by IBM
EBOOK: Download this e-book, brought to you by SearchCompliance.com, for insights, tips and suggestions for developing an optimal business continuity plan. Read on to learn details of FEMA’s PS-Prep, how to make the case for business continuity, what standard to use, how to measure continuity risk, and much more!
Posted: 15 Dec 2010 | Published: 15 Dec 2010

IBM

Data Myths Busted: Expert Weighs in on SAP, BI, and Data Warehouse Platforms
sponsored by TechTarget Search SAP
EBOOK: In this expert guide, SAP Mentor and BI and data management specialist Ethan Jewett debunks common myths around big data and business analytics, Hadoop integration, and data transformation. Access now to understand more about the state of business intelligence and data warehousing for SAP.
Posted: 10 Dec 2014 | Published: 10 Dec 2014

TechTarget Search SAP

E-Guide: Prioritizing Application Security Concerns
sponsored by TechTarget Security
EGUIDE: Application security has significantly grown and developed in sophistication over the past few years, but so have the threats that seek to wreak havoc on your software. Read this expert e-guide to learn best practices on how to ensure your applications are protected with the highest level of security possible.
Posted: 02 May 2012 | Published: 02 May 2012

TechTarget Security