Cookie policy: This site uses cookies (small files stored on your computer) to simplify and improve your experience of this website. Cookies are small text files stored on the device you are using to access this website. For more information on how we use and manage cookies please take a look at our privacy and cookie policies. Some parts of the site may not work properly if you choose not to accept cookies.

sections
 

smartphones

Results 126 - 150 of 278Sort Results By: Published Date | Title | Company Name
Published By: ThreatTrack Security     Published Date: Jan 22, 2015
South Staffordshire College: A U.K. college with 4 campuses, 4,000 students and 500 employees became frustrated with its Kaspersky antivirus and discovered that VIPRE proves robust malware defense doesn’t have to disrupt operations, slow down machines or be difficult to manage.
Tags : 
threattrack, security, threat, track, information, admins, best, practices, training, defense, tips, web, email, smartphones, education, data, breach, prevention, vipre, kaspersky
    
ThreatTrack Security
Published By: ThreatTrack Security     Published Date: Jan 22, 2015
Stillwater Medical Center: Healthcare provider with 1,000 employees chooses VIPRE after its old antivirus kept crashing systems, disrupting operations and failing to protect against malware infections. Learn how this hospital cured its antivirus ills with VIPRE.
Tags : 
threattrack, security, threat, track, information, admins, best, practices, training, defense, tips, web, email, smartphones, education, data, breach, prevention, vipre, hospital
    
ThreatTrack Security
Published By: ThreatTrack Security     Published Date: Jan 22, 2015
AtNetPlus - As an IT services company on the front lines of network defense, AtNetPlus takes choosing antivirus software very seriously. After rigorous testing of multiple antivirus products, their IT specialist chose VIPRE for its small footprint and reliable malware detections.
Tags : 
threattrack, security, threat, track, information, admins, best, practices, training, defense, tips, web, email, smartphones, education, data, breach, prevention, vipre, atnet
    
ThreatTrack Security
Published By: Code42     Published Date: Apr 22, 2016
Today, in the age of information, people are paid for their ideas: to create original knowledge products or add value to existing products. Given their self-reliance, it is not surprising that workers take pride in their outputs—up to half of employees take a portfolio of files with them when they leave. When employees move on, many feel entitled to the work they’ve created.They presume it is acceptable to transfer work documents to personal computers, removable media, tablets, smartphones or online file sharing apps. Some pilfered data is innocuous and already in the public realm. But some of it is classified. Read this paper to find out how to collect and secure data to protect operations, reputation and continuity when employees leave.
Tags : 
data protection, code 42, data security, intellectual property
    
Code42
Published By: NexGen     Published Date: Feb 09, 2015
Desktop management at any scale is a tedious job. Imaging, reimaging, and troubleshooting desktop systems consume valuable IT resources, and keep employees from being productive. Securing the information generated on desktops, tablets, and smartphones is no simple job either. Many organizations are deploying virtual desktop infrastructures (VDI) for these reasons. But for deployment to be successful, computing and storage infrastructures must deliver high-quality, predictable, and productive user experiences. Often, the best way to accomplish this is through flash-based storage solutions due to its low latency/high IOPS nature. Unfortunately many IT professionals aren't sure what type of flash array is best for their needs or how to ensure that all elements of their VDI work seamlessly. Download now and learn how to validate a provide VDI configuration across NexGen N5 Hybrid Flash Array, VMWare Horizon View, Cisco Unified Computing System™(UCS), and Cisco Nexus Switches.
Tags : 
nexgen, hybrid, flash, qos, quality of service, it management
    
NexGen
Published By: Skillsoft     Published Date: May 10, 2011
Is now the time to take the plunge into mobile learning or should you wait for a more stable mobile landscape to emerge? It's important for organizations to focus on some basic issues before making this important decision.
Tags : 
mobile learning, smartphones, skillsoft, learning strategy, mobile learning strategy, tablets
    
Skillsoft
Published By: Dell Mobility     Published Date: Oct 12, 2011
Download this report to find out how technology professionals rate factors like security, integration with existing infrastructure, ease of use, etc.
Tags : 
dell, mobility, solutions, servers, storage, datacenter, client refresh, wireless, mobility, workstation productivity, mobile phones, smartphones, smart phones, touch screen phones, pda phones
    
Dell Mobility
Published By: Dell Mobility     Published Date: Oct 12, 2011
Download this report and learn which mobile initiatives IT organizations are investing in most aggressively and what's driving those decisions.
Tags : 
dell, mobility, solutions, servers, storage, datacenter, client refresh, wireless, mobility, workstation productivity, mobile phones, smartphones, smart phones, touch screen phones, pda phones, lifecycle, decisions, refresh, rates
    
Dell Mobility
Published By: Dell Mobility     Published Date: Oct 12, 2011
Download this report and learn how to build your mobile consumerization strategy
Tags : 
dell, mobility, solutions, servers, storage, datacenter, client refresh, wireless, mobility, workstation productivity, mobile phones, smartphones, smart phones, touch screen phones, pda phones, infrastructure, consumerization, strategy
    
Dell Mobility
Published By: Dell Mobility     Published Date: Oct 12, 2011
Download this report and learn where you need to invest your mobile money.
Tags : 
dell, mobility, solutions, servers, storage, datacenter, client refresh, wireless, mobility, workstation productivity, mobile phones, smartphones, smart phones, touch screen phones, pda phones, infrastructure, consumerization
    
Dell Mobility
Published By: Adobe     Published Date: Apr 17, 2014
Online video continues to be one of the hottest opportunities for marketing—if you know exactly where to focus your efforts. Our U.S. Digital Video Benchmark can help. Download it now to learn about the rise of video streaming on smartphones, the explosion of TV Everywhere, and the opportunities you should seize in 2014.
Tags : 
adobe, marketing, online marketing, online video marketing, online video, digital marketing, smartphone, video streaming
    
Adobe
Published By: SAP     Published Date: Jul 17, 2012
Striving for employees to be able to collect, update, and access data anytime anywhere, organizations are leveraging smartphones and tablets to extend HR data and processes, creating new thresholds of efficiency, decision-making, and competitive advantage. Read this research report for new insights and examples on how mobility is impacting enterprise applications, data and processes, with a particular focus on HR applications.
Tags : 
technology, white paper, employees, smartphones, tablets
    
SAP
Published By: CDW     Published Date: Mar 27, 2015
Smartphones, tablets and other mobile devices have become embedded in enterprise processes, thanks to the consumerization of IT and a new generation of workers raised on mobile technologies. Consumer devices and bring-yourown-device (BYOD) programs are driving a new wave of business process innovation, changing the way customers, employees and partners interact with organizations and with each other. In fact, mobile devices and applications are catching up with — and in many cases surpassing — PCs in the quality and functionality of their applications.
Tags : 
mobile, application, content, innovation, functionality, customer, employee, smartphone, tablet, device, consumerization, wireless
    
CDW
Published By: CDW     Published Date: Mar 31, 2015
As mobile computing becomes an increasingly important technology, the need for robust, reliable wireless networks is growing. In addition to enterprise-issued devices, users are bringing their own tablets and smartphones and demanding access to IT resources. Organizations need a wireless infrastructure that can support these demands. Our research shows that in addition to mobile demands, aging hardware is driving many organizations' wireless upgrade plans. Download this white paper to read more about the research.
Tags : 
wireless, infrastructure, wi-fi, mobile computing, byod, upgrade, networking, it management
    
CDW
Published By: CDW     Published Date: Mar 18, 2016
The number of mobile devices managed by enterprises increased 72 percent from 2014 to 2015. This onslaught of technology such as notebooks, smartphones, tablets, watches and gadgets has transformed the way users work. These devices provide users in just about every sector with access to the information and tools they need to do their jobs, wherever and whenever they need them. They’re free to work at their desks, in conference rooms, while visiting clients on the road or during a child’s baseball practice. They can input data directly into a medical chart, an order form or an inspection report, rather than doubling their work by transcribing handwritten notes later in the day.
Tags : 
    
CDW
Published By: NEC     Published Date: Nov 20, 2013
Mobile usage isn't slowing down; take a look at how its impacting the work place.
Tags : 
nec, enterprise mobile device, mobile, smartphones, tablets, it management
    
NEC
Published By: RingCentral     Published Date: May 22, 2014
A phone system that can integrate your desk phones, smartphones, and tablets is possible because of cloud technologies. And you are empowered to manage your entire company communications with a web browser and mobile app. RingCentral’s service frees businesses from outdated modalities of work and obsolete hardware—giving you voice, fax and text capabilities you can manage and access anywhere you go.
Tags : 
ringcentral, phone system, business phone, mobile phone, business transition, phone provider, cloud based phone, changing attitudes, enterprise applications, data center
    
RingCentral
Published By: Adobe     Published Date: Jul 09, 2015
Com o crescimento explosivo no uso de smartphones e tablets nos últimos cinco anos, a maioria dos profissionais de marketing desenvolveu estratégias para atrair clientes através de canais mobile. Nessa pesquisa, descobrimos que esses profissionais aprenderam a atingir os clientes por meio de dispositivos e plataformas, além de adaptar seus investimentos mobile à medida que eles se desenvolvem. Também analisamos e avaliamos as melhores práticas desses profissionais, de setores como: mídia e entretenimento, varejo e comércio, serviços financeiros, B2B e alta tecnologia. A pesquisa oferece uma visão geral dos investimentos em mobilidade pelos principais pro ssionais de marketing e o que é preciso para manter a liderança.
Tags : 
adobe, líderes, mobilidade, estratégia, web, tecnologia
    
Adobe
Published By: Box     Published Date: Jan 16, 2015
Desktop management at any scale is a tedious job. Imaging, reimaging, and troubleshooting desktop systems consume valuable IT resources, and keep employees from being productive. Securing the information generated on desktops, tablets, and smartphones is no simple job either. Many organizations are deploying virtual desktop infrastructures (VDI) for these reasons. But for deployment to be successful, computing and storage infrastructures must deliver high-quality, predictable, and productive user experiences. Often, the best way to accomplish this is through flash-based storage solutions due to its low latency/high IOPS nature. Unfortunately many IT professionals aren't sure what type of flash array is best for their needs or how to ensure that all elements of their VDI work seamlessly. Download now and learn how to validate a provide VDI configuration across NexGen N5 Hybrid Flash Array, VMWare Horizon View, Cisco Unified Computing System™(UCS), and Cisco Nexus Switches.
Tags : 
nexgen, hybrid, flash, qos, quality of service, it management
    
Box
Published By: bigtincan     Published Date: Oct 10, 2014
Enabling the mobile workforce to be productive is the ultimate goal of any mobile business initiative. While the idea that mobile devices like the iPad, Galaxy Tab and today’s leading smartphones can change how users work in the enterprise is well established, the real challenge is how to enable a mobile workforce to have device access to all the different content they need to do their job without having to circumvent security and content governance objective or require users to learn a mix of consumer oriented software tools and work in different user interfaces in order to be productive. Viewing, editing, annotating and sharing content must be available from the same application.
Tags : 
mobile apps, user enablement, mobile workforce, mobile content
    
bigtincan
Published By: bigtincan     Published Date: Oct 10, 2014
These days, business productivity depends largely on the ability to securely access and interact with a wide range of information over mobile devices, such as tablets and smartphones. From sales executives to field technicians, the demand for accessing corporate content securely on mobile devices is growing exponentially. In the past, implementing security measures to protect corporate content has involved VPNs, intranets, firewalls and passwords. However the increasing uptake of mobile devices in corporate settings means security measures must be implemented over a plethora of networks and devices. bigtincan has created a powerful solution with BigTinCan hub. An application for mobile devices, it allows for the distribution, management and governance of a range of content, including documents and rich media content, with enterprise-grade security.
Tags : 
mobile apps, mobile content, mobile security, corporate content
    
bigtincan
Published By: CDW-Trend Micro     Published Date: Mar 26, 2015
Endpoint security is at a critical juncture. Increasingly, employees at organizations of all sizes are using a wider variety than ever of desktop and mobile devices, including smartphones, tablets and laptops, as they work from broadly dispersed locations, including home offices. Often, organizations are permitting and even encouraging employees to use their own devices under BYOD (bring your own device) policies. With these devices, employees are accessing not only corporate data and applications, but also social media, banking and shopping sites. Download this white paper to learn more about endpoint security.
Tags : 
endpoint security, desktop devices, mobile devices, byod, corporate data, technology, networking, security, it management, wireless
    
CDW-Trend Micro
Published By: CDW-Trend Micro     Published Date: Jul 17, 2015
Rush University Medical Center (Rush) is a not-for-profit healthcare, education, and research enterprise with a 664-bed academic medical center that includes hospital facilities for adults and children. Rush offers residency and fellowship programs in medical and surgical specialties to more than 2,000 students. With a large and experienced IT team, Rush manages three data centers across its campuses. The organization currently supports approximately 1,600 virtual desktops and 600 virtual servers, along with 10,000 physical desktops. The Rush IT team is tasked with supporting users on all devices, including smartphones and tablets. Watch the video to see how Rush protects the entire organization and protects against advanced threats with Trend Micro solutions, including Deep Discovery. Webinar Brought To You By CDW-Trend Micro
Tags : 
security threats, trend micro, security solutions, mobile devices, network, networking, security, it management
    
CDW-Trend Micro
Published By: TheMarketingScope     Published Date: Nov 19, 2015
In this white paper, we will provide an overview of the present state of mobility in the enterprise and identify loopholes and key areas of concern for the Public Sector.
Tags : 
byod, mobile devices, mobile workers, smartphones, mobile computing, laptops, communications, ip networks, ip telephony, network security
    
TheMarketingScope
Published By: Zebra Technologies (Bulldog)     Published Date: Jul 11, 2019
Surviving and thriving amid the global, digital shopping revolution, in which consumers fluidly browse and buy from their smartphones, computers and in store, calls for a supply-chain makeover. Pressed to offer consumers fast, flexible and even free product fulfillment and delivery in an omnichannel retail landscape, a crowdsourced, collaborative model is taking shape. Traditional roles are blurring as logistics companies, manufacturers and retailers work to meet the growing on-demand economy via the adoption of business intelligence supply chain technologies.
Tags : 
    
Zebra Technologies (Bulldog)
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12    Next    End
Search      

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.