mobile

Results 1 - 25 of 3537Sort Results By: Published Date | Title | Company Name
Published By: HPE APAC     Published Date: Jun 16, 2017
Read this white paper: the quest for efficiency, productivity, and Mobility.
Tags : 
    
HPE APAC
Published By: Silverpop     Published Date: Sep 19, 2011
To gain a better understanding of how today's marketers are using-and plan to use-various mocial mediums to communicate with customers, Silverpop polled more than 500 online marketers regarding their use of social, email, mobile and local forms of communication.
Tags : 
silverpop, marketing, customer communication, social media
    
Silverpop
Published By: Aruba Networks     Published Date: May 21, 2013
The increase in enterprise WLANs is being driven largely by the rapid growth of mobile devices in the enterprise — what many are calling the "consumerization of IT" — and the resultant increase in enterprise mobility applications.
Tags : 
aruba, aruba networks, consumerization of it, wireless lans, mobile enterprise, enterprise mobility, wireless
    
Aruba Networks
Published By: IBM     Published Date: Jan 07, 2016
In this study, we set to explore, with the help of ISMG, how enterprises view mobile security risks, what capabilities they are currently deploying vis-a`-vis the four pillars of the framework and what their short-to- medium-term plans are to extend these capabilities.
Tags : 
ibm, security, maturity, mobile, wireless, business technology
    
IBM
Published By: Polycom     Published Date: Apr 30, 2013
Wearable operational video (such as helmet cams), mobile cameras and sensors, and other visual technologies can provide crucial intelligence, which then can be gathered, communicated to personnel in disparate locations, and integrated to enable unified collaboration for public security responses. The possibility is emerging for a new generation of video applications that will enhance public security and disaster management.
Tags : 
videoconferencing, telepresence, video application, real time video, intelligence, security, crisis management, technology
    
Polycom
Published By: ForeScout     Published Date: Aug 14, 2012
The What, Why and How to Employ NAC to Apply Guest Networking, BYOD (Bring Your Own Device) and Endpoint Security Policies. Many of today's endpoints are neither known nor protected. According to Gartner, enterprises are only aware of 80 percent of the devices on their network. Those 20 percent of unknown devices are inside the perimeter of the network, are unmanaged and provide users with access. They are small, varied and highly mobile, and they are loaded with their own applications, can act as WAPs, and often contain outdated firmware or are jailbroken. Even as the devices are accessing personal applications on the web, they are also accessing corporate resources such as e-mail-all from the very same unmanaged devices, which have not been vetted by the security organization. Smartphones, notebooks, netbooks, iPads, e-readers, gaming consoles and more-the list of personal devices attempting access to employer networks seems to grow every day in what's come to be known as the BYOD (Bring Your Own Device) era in networking.
Tags : 
pad, mine, enabling, secure, personal, mobile, device, use
    
ForeScout
Published By: Avaya     Published Date: Jun 15, 2016
Expanding and enriching the educational experience through a streamlined, broadened networkBYOD in the classroom and one-student-one-device trends meant Kentucky’s Bullitt County Public Schools needed an easily configurable, reliable and scalable network. Read this case study to discover the benefits of WLAN technology in the educational world.
Tags : 
mobile device, best practices, networks, technology
    
Avaya
Published By: IBM     Published Date: Apr 20, 2017
Security from design through deployment. Mobile devices are now a reality in many organizations. Building on Mobile Device Management (MDM) and Mobile Application Management (MAM), organizations are increasingly developing their own enterprise apps for specific job tasks to improve productivity, business partnerships, customer satisfaction and bottom-line performance. However, to achieve these benefits, it is imperative that mobile security best practices are incorporated throughout the lifecycle of the application.
Tags : 
    
IBM
Published By: IBM     Published Date: Apr 20, 2017
Protecting confidential data while keeping mobile users productive. The terms Data Leak Prevention (DLP) and Container are beginning to dominate the mobile management conversation. Over the past few years great strides have been made in providing the tools and solutions that offer management and security for mobile devices; both for devices the enterprise owns and those that employees own. While these solutions generally meet the need to secure the device, they have been lacking in some of the more sophisticated security aspects that are commonplace in laptop and distributed network deployments. Specifically lacking are the robust DLP controls common in laptop management solutions.
Tags : 
    
IBM
Published By: Lumesse     Published Date: May 15, 2015
This paper explores how critical it is to have an agile talent management strategy in place. Being mobile and social are key to attracting, developing and retaining the cream of Gen Z.
Tags : 
gen z, employees, retain talent, talent management, strategy, generation z, workplace, hr trends
    
Lumesse
Published By: PC Mall     Published Date: Dec 07, 2011
This white paper discusses critical best practices including approaches for both policy and technology.
Tags : 
sonicwall, mobile security, mobile phone security, mobile device security, mobile device management, mobile antivirus, data loss prevention, malware
    
PC Mall
Published By: Birst     Published Date: Jul 16, 2013
Birst’s Salesforce Reporting and Analytics helps sales managers analyze all of the critical salesforce.com data to uncover insightful pipeline information. Combining sales data with marketing, financial and operational data to obtain a comprehensive view of the pipeline is where Birst excels.
Tags : 
business intelligence, agile bi, self service bi, bi in the cloud, unified bi, mobile bi, embedded analytics, business analytics
    
Birst
Published By: MobileIron     Published Date: Apr 20, 2015
10 Dinge, die IT-Administratoren zu ANDROID for Work wissen müssen.
Tags : 
    
MobileIron
Published By: Salesforce     Published Date: Nov 18, 2014
If you missed Dreamforce this year, we’ve got you covered. In this ebook, you’ll discover the ten major breakthroughs for Sales Cloud — and how they will enable the sales team of the future. Explore enhanced capablities, loads of new features, new mobile apps and a seamless user experience. Welcome to the sales success platform, reimagined for today’s sales team.
Tags : 
dreamforce, sales cloud, sales team, enhanced capabilities, new features, mobile apps, user experience, enterprise applications
    
Salesforce
Published By: Citrix     Published Date: Jul 25, 2014
This paper presents 10 key points to consider as you develop your enterprise mobility strategy, encompassing security, user experience, IT operations and BYOD.
Tags : 
citrix, enteprise mobility, mobile workers, byod, remote access, end point security, mobile security, mobile application management
    
Citrix
Published By: Adobe     Published Date: Sep 20, 2016
Download our guide, 10 Goals for a Perfectly Balanced Email Marketer, to learn how you can transform your email campaigns through personal goals. You’ll discover new ways to make the most of this highly effective channel — so you can enjoy better results. Get the guide now to learn how you can: • Prioritize mobile email in your marketing strategy • Improve customer relationships with contextual emails • Self-assess your email marketing maturity
Tags : 
adobe, ccm, cross channel, marketing, email marketer, marketer
    
Adobe
Published By: Akamai Technologies     Published Date: May 08, 2017
We are coming to expect quality video in all our digital experiences – from online shopping to on the job training. However, as video technology has become more ubiquitous, it has also become more complex. To deliver a quality experience to users, regardless of their device and connectivity, you need a holistic video strategy. We’ve tapped into our experience to present the top issues you must address to ensure a successful online video strategy. Download now to learn more!
Tags : 
device management, data solutions, system solutions, data breach, mobile management
    
Akamai Technologies
Published By: Unica     Published Date: Mar 02, 2010
Download 10 Key Online Marketing Trends for 2010 to reveal what is shaping online marketing today.
Tags : 
unica, online marketing trends, trends, web analytics, emarketing, social media, mobile, online marketing
    
Unica
Published By: Infor     Published Date: Jun 13, 2017
Avec la digitalisation, les industriels peuvent réaliser un retour sur investissement de 2 manières : en réduisant les coûts ou en augmentant les revenus. Selon le rapport « Manufacturing's next big act: Building an industrial digital ecosystem », près des 2/3 des industriels prévoient que les technologies digitales telles que l’augmentation de l’utilisation d'appareils mobiles, les aideront à réduire les frais généraux d’au moins 11 %.
Tags : 
    
Infor
Published By: CDW     Published Date: Feb 27, 2015
The real test of any SAM system goes beyond creating a one-time Effective Licensing Position (ELP) for a given software publisher. To be truly valuable, the SAM solution has to have the ability to manage change. Being able to work from a dependable list of software that has been approved by, and which also serves the business, means that finite IT & SAM resources are not wasted through the support of legacy software that might be deemed redundant, and should keep a company on track technically by not becoming dependent on aging software. This 10 –Minute Guide from SAM experts at Snow Software will show how to establish and maintain a Software Catalog for the purpose of ensuring that your software estate remains relevant and fit for its business purpose.
Tags : 
software management, sam, software security, cloud computing, enterprise content management, business intelligence, office productivity apps, network security
    
CDW
Published By: Adobe     Published Date: Feb 08, 2016
Download our guide, 10 New Year’s Resolutions for Email Marketers, to learn how you can transform your email campaigns in 2016.
Tags : 
adobe, marketers, email, customer relationships, mobile email, enterprise applications, business technology
    
Adobe
Published By: MobileIron     Published Date: Apr 20, 2015
10 POINTS que tout administrateur doit connaître ANDROID FOR WORK.
Tags : 
    
MobileIron
Published By: AtTask     Published Date: Jul 17, 2014
Rapid changes in both technology and business mean that IT departments are constantly barraged with new projects whether it's writing a web app or implementing new infrastructure for mobile application. It's a challenge just to stay ahead of the curve. This Whitepaper examines the top 10 every day pains that prevent IT managers from getting work done and offers some new and trusted solutions for improving your productivity.
Tags : 
at task, it organizations, work requests, technology changes, project updates, status reports, project management, knowledge management
    
AtTask
Published By: Movable Ink     Published Date: Apr 01, 2016
Do your emails look great on mobile devices? In the UK, 70% of email opens occur on smartphones and tablets. You know you should be building responsive emails, but where do you start? Download ‘10 Quick Design Hacks for Responsive Emails’ to discover simple ways to create great-looking emails for mobile devices and see real life examples of how brands are making a big impact on a small screen.
Tags : 
email marketing, contextual marketing, mobile marketing, responsive email marketing, email design
    
Movable Ink
Published By: BI WORLDWIDE     Published Date: Dec 22, 2014
Everyone likes to be noticed. Recognition and rewards help people feel good about what they are doing and things they have accomplished. Recognizing employees will keep them focused, directed and willing to repeat the behaviors they were recognized for. Learn 10 reasons why recognizing your employees really works.
Tags : 
employee engagement, employee recognition, social recognition, mobile recognition, employee awards, employer engagement, incentive programs, employee incentives
    
BI WORLDWIDE
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.