Cookie policy: This site uses cookies (small files stored on your computer) to simplify and improve your experience of this website. Cookies are small text files stored on the device you are using to access this website. For more information on how we use and manage cookies please take a look at our privacy and cookie policies. Some parts of the site may not work properly if you choose not to accept cookies.

sections
 

mobile now

Results 126 - 150 of 289Sort Results By: Published Date | Title | Company Name
Published By: Entrust Datacard     Published Date: Jan 16, 2015
With every new data breach revealed or costly identity-theft case reported, confidence in data security and the protection of private identity information transactions — and overall trust — erodes. This loss of confidence in online services and reputation can have a direct impact on trust from end-users, customers, employees, partners, vendors and more. With significant advances in criminal threats — both in sophistication and sheer frequency — all enterprises are urged to bolster defenses, authenticate digital identities and safeguard sensitive information. Entrust offers five specific best practices — with emphasis on strong authentication, identity assurance, mobile enablement and general layered security — that can help protect against targeted attacks now and over the long term.
Tags : 
entrust, server, risk, assessment, authentication, standards, layered, authentication
    
Entrust Datacard
Published By: Entrust Datacard     Published Date: Sep 14, 2018
With more and more dependency on mobile and cloud, digital enablement is key to business success. Now IT has an increased impact on how to drive strategy and implementation to reach business goals. But the reality of distributed applications and connected devices has introduced new security challenges. To secure information and provide users seamless access to data, you need to reevaluate your approach to authentication. You need a modern authentication solution that is agile and secure, enabling your digital transformation. This buyer's guide will help you determine whether a cloud-based multi-factor authentication solution is right for your organization and details the top features to look for in an authentication solution to securely enable your digital transformation. Download the Cloud-Based Authentication Buyer’s Guide — to learn more.
Tags : 
authentication, knowledge-based authentication (kba), multifactor authentication, out-of-band authentication, two-factor authentication, identity as a service (idaas), enterprise mobility
    
Entrust Datacard
Published By: Microsoft Windows Phone     Published Date: Feb 05, 2010
In this e-Guide, we recap Windows Mobile OS's evolution and look at the wide array of Windows Mobile-powered devices available to untethered today's workforces. We'll explore where and why Windows Mobile OS devices are used to support a wide range of mobile apps, from vertical business automation to knowledge worker access.
Tags : 
microsoft, windows mobile 6.5, mobile apps, smartphone, mobile worker, wince, business applications
    
Microsoft Windows Phone
Published By: Unica     Published Date: Mar 29, 2010
Marketers have been limited to bland options for sending communications to consumers on their mobile phones. With the introduction of Apple's iPhone and operating systems like Google's Android and Palm's Pre/Pixi, now offering similarly rich user experiences, you have the opportunity to reach your customers, anywhere, any time, on their mobile devices.
Tags : 
unica, email, emarketing, esp, email trends, social media, sms, spam
    
Unica
Published By: Citrix Systems     Published Date: Sep 06, 2013
Delivering apps into the mobile space isn’t an activity to be considered lightly. The wrong approach can inadvertently cost more while decreasing productivity. If you’ve ever struggled to interact with a poorly designed tablet or smartphone application, then you already know this pain.
Tags : 
citrix, windows applications, consumerization, mobilizing microsoft® windows®, apps, mobile, security, it management
    
Citrix Systems
Published By: ForeScout     Published Date: Aug 14, 2012
The What, Why and How to Employ NAC to Apply Guest Networking, BYOD (Bring Your Own Device) and Endpoint Security Policies. Many of today's endpoints are neither known nor protected. According to Gartner, enterprises are only aware of 80 percent of the devices on their network. Those 20 percent of unknown devices are inside the perimeter of the network, are unmanaged and provide users with access. They are small, varied and highly mobile, and they are loaded with their own applications, can act as WAPs, and often contain outdated firmware or are jailbroken. Even as the devices are accessing personal applications on the web, they are also accessing corporate resources such as e-mail-all from the very same unmanaged devices, which have not been vetted by the security organization. Smartphones, notebooks, netbooks, iPads, e-readers, gaming consoles and more-the list of personal devices attempting access to employer networks seems to grow every day in what's come to be known as the BYOD (Bring Your Own Device) era in networking.
Tags : 
pad, mine, enabling, secure, personal, mobile, device, use
    
ForeScout
Published By: Cisco Systems     Published Date: Oct 01, 2013
The “New Mobile” era is here. What are the top 10 insights in this growing market? And how can you capture its value? Find out in this Cisco® Internet Business Solutions Group (IBSG) survey of 1,060 Canadian mobile users. Download now.
Tags : 
consumer insights, mobile market, cisco internet business solutions, technology, telecommunication, wireless, telecom
    
Cisco Systems
Published By: BMC Software     Published Date: May 19, 2014
Your people and business can do amazing things when technology runs at its best. The new ITSM experience helps organizations achieve greatness in today’s mobile, social and user-centric reality. Discover a better way for users to access service and support anywhere, anytime. Explore enhanced productivity for IT staff, and seamless integration across IT operation management systems. Download now.
Tags : 
bmc, itsm solutions, changing business, cloud, cios, software, it organizations, saas
    
BMC Software
Published By: Keynote     Published Date: Nov 13, 2013
Enterprises are increasingly looking to expand their ALM capabilities to include mobile application testing. Users of HP’s Unified Functional Testing (UFT), formerly QuickTest Pro, now have an option to perform mobile functional testing (regression) with access to real mobile devices hosted in the cloud, leveraging the native test automation capabilities found in UFT.
Tags : 
cell phone app development, mobile phone test, device anywhere, mobile phone testing, testing mobile phone, mobile web test, deviceanywhere, testing for mobile devices
    
Keynote
Published By: VMware, Inc     Published Date: Dec 05, 2013
The workforce is going mobile. According to Forrester, more than half of employees carry at least three devices for work. And many are bringing their own smartphones, tablets, and other devices to work, a phenomenon that’s grown so popular it now has its own acronym—Bring Your Own Device (BYOD). So it comes as no surprise that, according a survey by SpiceWorks, 60% of small and medium businesses are considering using a virtual desktop infrastructure (VDI) as part of their BYOD strategy. Many of these organizations are relying on VMware® Horizon View™ (formerly VMware View), because it enables organizations to implement a VDI infrastructure that reduces operational costs, enhances security and supports a mobile workforce.
Tags : 
vmware, vmware horizon view, virtual desktop infrastructure, mobile, byod, spiceworks, virtual desktop infrastructure, bring your own device
    
VMware, Inc
Published By: hightail     Published Date: Jan 17, 2014
Learn 3 essential values for securing the cloud and see how you can better prioritize security and improve your organization’s productivity.
Tags : 
cloud computing
    
hightail
Published By: hightail     Published Date: Jan 17, 2014
Learn 5 ways the cloud will enhance your professional life in 2014 and how understanding the technology will improve how organizations store and share files.
Tags : 
cloud computing, content management
    
hightail
Published By: Adobe     Published Date: Dec 21, 2015
Five years ago, the mobile revolution was in its adolescence. Now, it’s in the midst of a growth spurt, and it’s developing faster than ever. To keep up, you need to deliver customer-winning mobile experiences that drive loyalty for your brand.
Tags : 
adobe, mobile, marketing, strategy, it management, wireless
    
Adobe
Published By: CradlePoint     Published Date: Sep 04, 2014
In a world where traditional tethers to the central office have all but vanished, enterprises that operate vehicle fleets require constant and dependable mobile Internet connectivity to keep up. Businesses, organizations, and public agencies with vehicle fleets find productivity gains and improved fleet management by deploying dependable mobile connectivity in vehicles. Additionally, travelers and mass transit commuters now expect constant connectivity, and not just through their mobile phones.
Tags : 
constant connectivity, dependable mobile connectivity, cradlepoint, mobile phones, wireless
    
CradlePoint
Published By: CradlePoint     Published Date: Sep 04, 2014
Once considered experimental merchandising for adventurous retailers and cash-strapped entrepreneurs, pop-up stores have become an established national phenomenon and a legitimate means of testing product, generating buzz, building brand awareness, and driving sales for big-name retailers and ambitious upstarts alike. Growth in mobile broadband technology is expanding the possibilities for a diverse array of applications in mobile pop-up. Furthermore, the “fly-by-night” qualities that might have characterized early pop-ups have now been supplanted by dependable, secure infrastructure solutions that put temporary retail locations on par with their more permanent counterparts. Download the whitepaper to learn more!
Tags : 
pop-up stores, secure infrastructure solutions, mobile pop-up, cradlepoint
    
CradlePoint
Published By: Lenovo and Intel®     Published Date: Jan 19, 2017
We all love laptops, tablets, and mobile devices; but, sometimes you need a powerful desktop that still fits neatly in small, awkward, or even non-traditional spaces. Enter Tiny. In this eBook, we dive into the diverse settings where Tiny has proven to be the better fit. Get the eBook now.
Tags : 
    
Lenovo and Intel®
Published By: Movable Ink     Published Date: Apr 01, 2016
Do your emails look great on mobile devices? In the UK, 70% of email opens occur on smartphones and tablets. You know you should be building responsive emails, but where do you start? Download ‘10 Quick Design Hacks for Responsive Emails’ to discover simple ways to create great-looking emails for mobile devices and see real life examples of how brands are making a big impact on a small screen.
Tags : 
email marketing, contextual marketing, mobile marketing, responsive email marketing, email design
    
Movable Ink
Published By: VMware     Published Date: Feb 24, 2017
Mobile device management (MDM) tools allow companies to connect their employees securely to basic corporate network resources. Enterprise mobility management (EMM) goes a step further by enabling secure mobile versions of business-critical applications and data loss prevention to protect corporate information. But in today's workplace, employees and businesses deal with a vast variety of devices with different operating systems and form factors, from PCs and laptops, to tablets and smartphones, and now, increasingly wearables and Internet of Things (IoT) endpoints. The solution is unified endpoint management (UEM), which enables organizations to take a consistent approach to manage and secure every endpoint, any app and content, and across deployment use cases from a single holistic platform. Read this whitepaper to uncover VMware AirWatch®'s leading UEM approach that is benefiting organizations tremendously.
Tags : 
    
VMware
Published By: Zebra Technologies     Published Date: Jun 15, 2017
Dallas-based Parkland Health & Hospital implemented a Zebra technology solution to create a mobile-enabled workforce at its new state-of-the-art hospital campus. That mobile solution enabled the nursing staff to focus on what’s most important — patient care. The solution gave nurses the ability to communicate in real time, access right-now information and take the right action with that information. Parkland’s leadership was able to track all patient activities from positive patient identification and specimen collection to laboratory specimen tracking and pharmacy medication administration. Additionally, hospital staff communication with voice and secure texting, along with patient alerts and alarms—all help increase patient safety, care and satisfaction.
Tags : 
parkland health, hospital, system, zebra, mobile
    
Zebra Technologies
Published By: Zebra Technologies     Published Date: Jul 06, 2017
Stay ahead of risks inherent in modern connectivity, mobile integration and securing thermal barcode printers. This paper helps you leverage your IT know-how, by evaluating common security risks and tightening control with remote device management systems.
Tags : 
printer intelligence, industrial printers, desktop printers, mobile printers, highly durable printers, improving warehouse, manufacturing productivity, shipping accuracy
    
Zebra Technologies
Published By: Epson     Published Date: May 10, 2018
Online, mobile, omnichannel, untethered, data mining, automation, and remote communication are all now buzzwords surrounding the new technologies and resources financial institutions have to help them re-invent their branch experience. Capabilities are available today that were not imagined a decade ago. This is an exciting time for those institutions that can look to the future and enhance their offerings. While technology is driving change, it can also be a tremendous challenge for financial institutions as they work to keep pace and even take advantage of the dramatic shift in customer needs and expectations. Millennials, baby boomers, small businesses – all are important market segments with very different wants and needs. Driven by technology, the new demand is for a complete online presence, complemented by more flexibility in personalized services, and specialized expertise available in every branch. Suffice it to say, financial institutions of all sizes and in every geography a
Tags : 
    
Epson
Published By: Epson     Published Date: May 14, 2018
Consumers worldwide continue to adopt and use technology in their shopping experience. Faced with rising customer expectations and increasing competitive pressures, retailers now are prioritizing in-store innovation. Many retailers have adopted multichannel implementations, in which mobile, web, and in-store shopping are enabled but not delivered consistently to the customer. The next step in this evolution is an omnichannel strategy, now being deployed by some retailers, which presents a consistent shopping experience across mobile, web, and in-store channels. Omnichannel also enables retailers to integrate back-end infrastructure technologies (e.g., servers, databases, etc.) and cloud-based services (e.g., loyalty programs, personalized recommendations, inventory management, etc.) to improve many aspects of store and enterprise operations. An omnichannel strategy relies on several core and supporting technologies. The key factors in evaluating any omnichannel-enabling solution includ
Tags : 
    
Epson
Published By: Plantronics     Published Date: Sep 27, 2013
The future of work is mobile. Liberated by the internet and new mobile solutions, more and more businesses are embracing flexible working arrangements in which employees work from wherever they want. Smart businesses utilising flexible working know that it’s no longer about the hours you work—it’s about results. These businesses are freeing themselves and their employees from the burden of counting hours and minutes worked, and are now focusing on output.
Tags : 
mobile, internet, mobile solutions, technology, flexible working, remote access, wireless, telecom
    
Plantronics
Published By: Motorola     Published Date: Feb 06, 2008
This White Paper outlines how mobile solutions help organizations work efficiently in a global business environment. It also discusses how organizations can best create processes around device usage, data/service access and security.
Tags : 
mobile strategy, wireless, mobility, adoption, htc, mobile workers, security, network
    
Motorola
Published By: Okta     Published Date: Aug 12, 2015
If you're migrating from an existing on-premise Exchange environment — or setting up Office 365 for a new set of users — you'll need to address how to handle users accessing Office 365 from mobile devices. Read this eGuide now to discover how you can simplify the migration and deployment process around Office 365 to mobile devices.
Tags : 
    
Okta
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12    Next    End
Search      

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.