Research in Motion

The BlackBerry isn't the only smartphone in town anymore and Research in Motion is scurrying to fend off Apple's iPhone and other competition. However, the BlackBerry name has become synonymous with enterprise mobile devices, with the French banning their use by government workers and India wanting to intercept calls from suspected terrorists who might be using them. Its latest products have been received warmly. Still, as Apple sets its sights on the enterprise market with the 3G iPhone, RIM will have its work cut out for it.


Articles

Business and IT Leaders Must Think Differently

Digital technology presents incredible challenges and fundamentally changes the nature of products. The first step is recognizing a need to think differently. More >

How Enterprises Can Get Better Access to Real-Time Data

Here's a list of data points around a new approach to enterprise performance management. More >

Cisco CEO: Internet of Everything Will Be Worth $19 Trillion

At CES, John Chambers said the Internet of everything will be more about its impact on people's lives than the underlying technology. More >

More Articles >

Interviews

BYOD, Wireless Drive Network Complexity

The explosion of wireless devices has increased the number of devices workers use at home and at work. Ankur Chadda discusses the implications this has on the enterprise.

More >

Protect Data or Device? The Key Choice in Securing Mobility

Focusing on the device inconveniences users and doesn't work.

More >

Controlling the Mobile Transition

BYOD (bring your own device) is a well-established trend. The next steps are to redesign business processes as mobility takes root and implement a “buy the right device” program.

More >

More Interviews >

Resource centers

Business Intelligence

Business performance information for strategic and operational decision-making

SOA

SOA uses interoperable services grouped around business processes to ease data integration

Data Warehousing

Data warehousing helps companies make sense of their operational data

Editor's Choice

Which Web Programming Language Is Most Secure?

Security Staffing

Take a deeper look into the security of a number of the most popular programming languages, including .NET, Java, ColdFusion and ASP.

 More >

Red Hat Outlines Container Strategy

The Green Data Center in the Real World

Riverbed SteelFusion 3.0 Provides Faster Branch Office Consolidation

 

Articles  |  Interviews  |  Guest Opinions  | Slideshows

Related IT Downloads

mobile9 PhoneGap Build: Developing Cross Platform Mobile Applications in the Cloud

This excerpt from chapter four focuses on using PhoneGap Build, including beginning steps, creating builds for different m...

Managing the Security of Mobile Devices in the Enterprise

This publication provides recommendations for selecting, implementing, and using centralized management technologies, and ...

Tutorial Building Security into ‘Off-The-Shelf’ Smartphones

This paper from the National Institute of Standards and Technology discusses the key issues surrounding smartphone securit...

BYOC Readiness Assessment Tool BYOC Readiness Assessment Tool

Successful deployment of each BYOC model depends on a different mix of capabilities.

...

More IT Downloads>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.