Information Technology


Responsive Delivery: A methodology for mobile development and deployment

Responsive Delivery is a methodology employed to deliver HTML5 user experiences on a variety of devices—typically mobile and tablet—by...

New Free Tool to Detect SQL Server Database Corruption

SQL Integrity Check, the latest free tool from Idera, allows DBAs to skip the time-consuming task of writing and...

10 Tips to Minimize the Impact of a Security Breach

The Dell SecureWorks Counter Threat Unit research team has developed a set of 10 recommended best practices to help...

Making the move from 2.0 to 3.0 USB

With a growing number of USB 3.0 hard disks, drive enclosures, and other devices on the market, it’s time...

Why Now is the Time to Get Started with BlackBerry Enterprise Service 10

BlackBerry® 10 smartphones support Microsoft® ActiveSync™ right out of the box, giving IT a fast and easy solution for...

Debugging Hi-speed USB 2.0 Serial Buses in Embedded Designs

The hi-speed USB 2.0 serial bus is used today in a broad range of computer as well as embedded...

Continuing the In-Store Conversation Online

The need to develop a solid cross-channel marketing strategy encompassing email, mobile and social has become a priority for...

Storage as a service – Recover

The risk of data loss is not something you can afford to ignore. You need to know that backups...

10 Tips to Minimize the Impact of a Security Breach

The Dell SecureWorks Counter Threat Unit research team has developed a set of 10 recommended best practices to help...

[Analyst Webinar] Optimizing the cross-platform experience

Effectively reaching an online audience – and meeting their expectations – has grown increasingly complex. Join GigaOM Research and...

Automate Increase Engagement & Drive Revenuewith Triggered Messages

Set your email marketing success in motion with triggered messages. From a customized welcome series to reengagement messages,...

10 Tips to Minimize the Impact of a Security Breach

The Dell SecureWorks Counter Threat Unit research team has developed a set of 10 recommended best practices to help...

Advanced Threat Protection

This paper distinguishes between and discusses the various types of advanced threats, the actors, their motives and processes, and...

New Paper: The CISO’s Guide to Advanced Attackers

Much of the security industry spends significant time and effort focused on how hard it is to deal with...

Security Testing and Assessment Services Guide

This document provides you with an understanding of common cyber security tests and assessments organizations can use to evaluate...

Best Practices in BYOD: BlackBerry Enterprise Service 10

Manageability, security and support – these are just a few of the reasons BlackBerry® Enterprise Service 10 is such...

Top 10 Features of BlackBerry Enterprise Service 10

BlackBerry® Enterprise Service 10 is designed to help organizations like yours address the full range of Enterprise Mobility Management...

Protection for Every Enterprise: How BlackBerry 10 Security Works

If you’re choosing a platform for enterprise-grade Mobile Device Management, security is probably near the top of your list...

Engaged Commerce: Multi-touchpoint lifecycle marketing to drive revenue

To drive revenue, you have to first engage your audience. To engage your audience, you need to communicate in...

Why Now is the Time to Get Started with BlackBerry Enterprise Service 10

BlackBerry® 10 smartphones support Microsoft® ActiveSync™ right out of the box, giving IT a fast and easy solution for...
 
Page 139 of 148«137138139140141»