WEBCAST:
Attend this webcast to learn about the new functionality and features in BlackBerry Enterprise Solution v4.1 for Microsoft Exchange, including role-based and group-based administration.
CASE STUDY:
Access this case study to learn how YPG created a consumer mobile version of YellowPages.ca™ and sales applications for BlackBerry® smartphones to expand the reach of its local search database.
WHITE PAPER:
Read this white paper to learn about some of the key enterprise LOB applications that most benefit from mobility and how applications can be deployed with a simple implementation guideline.
VIDEOCAST:
This video case study showcases a physician's practice implementing a phone system and reducing time required for appointment reminder calls from four hours to 15 minutes per day and achieving efficient contact with insurance companies.
EZINE:
This ezine covers the topic of testing and retesting defects and cites the Blackberry blackouts of 2007 and 2008 as examples of issues that could have been detected by regressing testing.
WHITE PAPER:
The latest smartphone applications foster more mobility and productivity than ever before--as long as a secure mobile network is in place. This white paper addresses mobile applications and the potential security threats to the corporate networking as well as provide security measures to take.
CASE STUDY:
Access this case study to learn how a company deployed WIC Messenger to automatically push an up-to-date list of PINs to each BlackBerry smartphone so users could easily contact each other in the event of a power outage or email service disruption.
WHITE PAPER:
Mobile security is a growing concern as organizations look to gain competitive advantages through the use of a remote workforce. Read this paper to learn about the security vulnerabilities that can arise when wireless devices access corporate data.
WEBCAST:
This webcast will cover the following topics: Enterprise activation overview, Prerequisites for enterprise activation, Troubleshooting stage 1 issues: activation, Troubleshooting stage 2 issues: verifying encryption etc.