Cookie policy: This site uses cookies (small files stored on your computer) to simplify and improve your experience of this website. Cookies are small text files stored on the device you are using to access this website. For more information on how we use and manage cookies please take a look at our privacy and cookie policies. Some parts of the site may not work properly if you choose not to accept cookies.

sections
 

mobile now

Results 251 - 275 of 293Sort Results By: Published Date | Title | Company Name
Published By: Citrix Systems     Published Date: Sep 06, 2013
Delivering apps into the mobile space isn’t an activity to be considered lightly. The wrong approach can inadvertently cost more while decreasing productivity. If you’ve ever struggled to interact with a poorly designed tablet or smartphone application, then you already know this pain.
Tags : 
citrix, windows applications, consumerization, mobilizing microsoft® windows®, apps, mobile, security, it management
    
Citrix Systems
Published By: IBM     Published Date: Aug 21, 2013
Until now, marketers have been limited to two relatively uninspired options for sending direct communications to consumers on their mobile phones: SMS (a.k.a., text messaging), and text-only, imageless email on devices like the BlackBerry and Palm Treo. But with the introduction of Apple’s iPhone and competitor operating systems like Google’s Android and Palm’s Pre/Pixi now offering similarly rich user experiences, email marketers have a huge opportunity to reach consumers anywhere, any time, on their mobile devices.
Tags : 
email marketing, enterprise marketing management, email performance, mobile marketing, mobile reach, marketing channels
    
IBM
Published By: Rapid7     Published Date: Jul 24, 2013
As mobile devices become more common, cybercriminals see them as having huge profit potential, and aim to gain access to the user's confidential personal and financial information. In this Mobile Security Guide, we'll walk you through the mobile malware landscape and what you need to know to keep your organization's data safe.
Tags : 
rapid7, malware, mobile malware, trojan, virus, app security, mobile device security, iphone security, blackberry security, threat protection
    
Rapid7
Published By: Communispond     Published Date: Jul 08, 2013
85% of us would rather give up water than mobile apps! We all know it—digital screens have officially invaded our lives. They have grown in popularity, enhancing our personal and professional lives, which includes the learning space. Do they really enhance the learning experience or are they just a distraction?
Tags : 
communispond, digital learning, byod, multi-screen, communication skills, public speaking, communication training, presentation skills, technology in education, technology in classrooms, learning and development
    
Communispond
Published By: Sophos     Published Date: Jul 01, 2013
Gone is the day of the corporate-issued BlackBerry device. With its finely ingrained policies, BlackBerry was once the go-to mobile device for security-savvy enterprises. Research from IDC shows that iPhone and Android now hold over 80% of market share, with Windows Phone 8 and BlackBerry completing for the third spot. The rising trend of mobility consumerization has reached a point where it is increasingly difficult for IT organizations to settle on a standard mobile device. This whitepaper will help you identify each device platform’s security features—and choose the right platform for your business.
Tags : 
mobile device, security
    
Sophos
Published By: HP - Enterprise     Published Date: Jun 05, 2013
It wasn’t long ago that being on the cutting edge of business meant having a website where customers could purchase your products, but that quickly changed. Soon, it wasn’t enough just to have an e-commerce presence; you had to offer an interactive and engaging customer experience (see Web 2.0). Now the standard has shifted once again; in order to truly compete in the modern economy, your business needs to have a mobile storefront on smart phones and tablets. Without this mobile presence, you’ll lose business to competitors who have them. With this new challenge comes high risk as well as great reward. With mobility, the client side of your applications is more important than ever. Instead of accessing your website from the safe confines of work or home, your customers can now perform sensitive transactions anywhere. As a result, mobile applications, and the devices and data they interact with, can now be more easily attacked.
Tags : 
mobile applications, ecosystem, risk, defense, application, risk
    
HP - Enterprise
Published By: HP - Enterprise     Published Date: Jun 04, 2013
Did you know that over 64% of mobile phone time is spent on applications? Mobile apps represent a huge opportunity for your enterprise to grow your business, but in order to benefit from them you need effective methods for developing, testing, and supporting mobile apps. Take a look at this eye-opening infographic to learn more about the current state of enterprise mobility and get the information you need to equip your business for mobile app development success.
Tags : 
mobile phone, white paper, enterprise, growing your business, applications, mobile applications
    
HP - Enterprise
Published By: IBM     Published Date: May 07, 2013
"Building game-changing mobile apps—from vision to execution The proliferation of mobile devices, from smartphones to tablets, is empowering customers all over the world. Now, they expect to engage with enterprises and brands on their terms. In order to get closer to customers and boost productivity, many companies are now investing in apps, with varying results. Read the paper to see why it pays to have an innovative, sound mobile app strategy in place—before looking to build compelling systems of engagement."
Tags : 
mobile, capitalizing, smarter commerce, customers, productivity, innovative
    
IBM
Published By: Citrix NetScaler     Published Date: May 06, 2013
The Mobile future is here now and a network infrastructure that supports mobile initiatives needs to be flexible and scalable, while delivering uncompromised performance and security. With Citrix XenMobile MDM and Citrix NetScaler, IT can address the full range of enterprise mobility requirements. Here’s a guide to help ensure your enterprise mobile workers are empowered with the full mobility their work requires as well as the ability to use the device of their choice. Take advantage of a complete, robust platform that addresses the full range of mobile business requirements—simply and securely.
Tags : 
citrix xenmobile, citrix netscaler, mobility, delivery enterprise mobility, citrix, mobility, enterprise applications
    
Citrix NetScaler
Published By: ClickExpress     Published Date: May 01, 2013
Deploying a mobile workforce solution used to be a major undertaking. Today, it’s easy. You don’t need any specialized devices; management software is cloud-based, and training is short and simple. In other words, obstacles of the past have disappeared, and now is the time to implement mobile workforce solutions for organizations with between 15 and 250 mobile workforce. In this brief, you’ll see why it’s easier than ever to implement software solutions for mobile workforce.
Tags : 
mobile, workforce, solution, organizations, mobile, implement, software
    
ClickExpress
Published By: Good Technology Corporation     Published Date: Apr 29, 2013
Extend desktop-level security to mobile users. This whitepaper—Effective Identity and Access Management in a Mobile World—covers how to harness your IAM infrastructure to balance the freedom mobile users want with the security IT needs. Read it now.
Tags : 
mobile security, secure mobile application, mobile device management, identity management, identity and access management, iam
    
Good Technology Corporation
Published By: Bridgeline Digital     Published Date: Apr 08, 2013
In this white paper, learn the 7 reasons to consider responsive design for your company's next generation website. With the mobile revolution already present, it is important to know the reasons why you must reconsider the design of your website. Branding, accessibility and cost are big reasons to consider responsive design for your companies website.
Tags : 
company, next generation website, accesibility, branding, cost, bridgeline
    
Bridgeline Digital
Published By: Attachmate     Published Date: Mar 20, 2013
This short demo shows how Verastream Host Integrator can modernize and service-enable legacy assets for use across your enterprise. Verastream takes a flexible, scalable service-level approach to integration and gets you up and running quickly.
Tags : 
soa project, mobile now, mobilenow, screen scraping, terminal emulation iphone, terminal emulation ipad, networking, security
    
Attachmate
Published By: Attachmate     Published Date: Mar 20, 2013
Quickly and efficiently package your applications into any format for any device. Deliver enterprise applications wherever and whenever users need them. With Verastream.
Tags : 
soa project, mobile now, mobilenow, screen scraping, terminal emulation iphone, terminal emulation ipad, networking, security
    
Attachmate
Published By: Voltage Security     Published Date: Sep 13, 2012
If there are any lingering doubts that mobile de-vices-such as smartphones and tablets-have profoundly transformed today's business, one study finds that using smart devices for produc-tivity is "now the standard.
Tags : 
data security, smart devices, smart security, data security strtegy, mobile security, security risks, security
    
Voltage Security
Published By: ForeScout     Published Date: Aug 14, 2012
The What, Why and How to Employ NAC to Apply Guest Networking, BYOD (Bring Your Own Device) and Endpoint Security Policies. Many of today's endpoints are neither known nor protected. According to Gartner, enterprises are only aware of 80 percent of the devices on their network. Those 20 percent of unknown devices are inside the perimeter of the network, are unmanaged and provide users with access. They are small, varied and highly mobile, and they are loaded with their own applications, can act as WAPs, and often contain outdated firmware or are jailbroken. Even as the devices are accessing personal applications on the web, they are also accessing corporate resources such as e-mail-all from the very same unmanaged devices, which have not been vetted by the security organization. Smartphones, notebooks, netbooks, iPads, e-readers, gaming consoles and more-the list of personal devices attempting access to employer networks seems to grow every day in what's come to be known as the BYOD (Bring Your Own Device) era in networking.
Tags : 
pad, mine, enabling, secure, personal, mobile, device, use, your, network, nac, guest, networking, byod, bring, your, own, device, endpoint, security
    
ForeScout
Published By: SAP     Published Date: Jul 18, 2012
Mobile is not simply another device for IT to support with a shrunken Website or a screen-scraped SAP application. Rather, mobile manifests a broader shift to new engagement systems. CIOs must plan now for them and empower customers, partners, and employees with context-aware apps and smart products.
Tags : 
technology, mobile, apps, applications, cio, social, cloud
    
SAP
Published By: SAP     Published Date: Jul 18, 2012
An increasing number of organizations are permitting employees to bring their own mobile devices into the workplace to be used for work purposes. While this practice may first appear to reduce enterprise mobility costs while increasing employee productivity, it also poses new risks and may actually increase costs if not properly managed. Know how to cost-effectively manage this Bring-Your-Own-Device (BYOD) phenomenon.
Tags : 
technology, mobile, byod, bring-your-own-device, mobile devices
    
SAP
Published By: Aerohive     Published Date: Jul 03, 2012
One of the most overlooked aspects of the BYOD phenomenon isn't just connecting the users to the network, but how to manage them once they're there. Getting mobile and BYO devices onto the network is now table stakes. This white paper will take you through the necessary connectivity and productivity requirements in order to ensure your network is truly ready for the mobility explosion.
Tags : 
byod, mobility, productivity
    
Aerohive
Published By: Appcelerator     Published Date: Jun 20, 2012
Find out about two of the hottest topics surrounding mobile app development right now-social media and HTML5. Educate yourself on the backend of mobile app strategy and use your knowledge to stay in front of the competition.
Tags : 
html5, social media, mobile app, development, backend, strategy, competition, trends, dynamtic, survey, wireless
    
Appcelerator
Published By: Oracle     Published Date: May 22, 2012
Being successful in the mobile channel hinges on the right technology. This whitepaper outlines how to approach your mobile strategy, drive cross-channel activity, and maximize your budget with the right technology foundation to achieve your mobile goals now, and in the future.
Tags : 
oracle, marketing, marketing strategy, mobile, mobile marketing, emering marketing
    
Oracle
Published By: SAP     Published Date: May 11, 2012
The increasing possibilities that come from deploying mobile solutions in the workplace are now counter balanced by an exponentially complex ecosystem of options that can make navigating the corporate mobile landscape challenging - and risky.
Tags : 
mobile device management, mobile application, enterprise mobility management, mobile asset management, mobile inventory management, mobile operations management, wireless expense management, mobile application management, wireless, enterprise applications
    
SAP
Published By: Interactive Intelligence     Published Date: May 07, 2012
IT strategies in insurance have traditionally been driven by business objectives and business strategy. But with technology advancements for mobile solutions, social media, analytics, content management (ECM), and process automation, insurers can now take a conjoinment view to evaluate opportunities and drive differentiation. Read more in this paper from Mark Breading of Strategy Meets Action.
Tags : 
interactive, technology, ecm, process automation, social and mobile technology
    
Interactive Intelligence
Published By: Bronto     Published Date: Nov 07, 2011
As channels for communicating digitally with customers evolve and increase, email's role is changing. Explore current trends in e-commerce, the influences of social content and the mobile experience, as well as provide ideas you can deploy now to distinguish yourself in the inbox.
Tags : 
bronto, marketing, email marketing, customer engagement, strategies
    
Bronto
Published By: CCMI     Published Date: Jul 20, 2011
Telecom expense management is a critical and well-established discipline that has grown to encompass the challenging problem of mobile device and cost management. And now there's a simple, self-service approach to successful mobile expense management (MEM) that is simple to implement and demonstrates immediate results.
Tags : 
xigo, ccmi, mem, mobile expense management, voice report, telecom expense management, tem, mobile device management, mobility management
    
CCMI
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12    Next    End
Search      

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.