mobile device

Results 276 - 300 of 1310Sort Results By: Published Date | Title | Company Name
Published By: Oracle     Published Date: Jan 09, 2017
Sur la base des résultats de notre étude de recherche indépendante, La génération Y et l’hôtellerie-restauration - La redéfinition du service, obtenez nos cinq conseils pour vous aider à séduire les technophiles de la génération Y.
Tags : 
mobility, mobile devices, millennials, hospitality, hotels, hotel management
    
Oracle
Published By: Oracle     Published Date: Jan 09, 2017
Based on the findings of our independent research study, "Millennials and Hospitality: The Redefinition of Service”, get our five tips to help you successfully win the business of this coveted, tech-savvy generation and keep them coming back.
Tags : 
mobility, mobile devices, millennials, hospitality, hotels, hotel management
    
Oracle
Published By: Oracle     Published Date: Jan 09, 2017
The ubiquitous nature of mobile devices can seemingly diminish their value, making them a commodity to be taken for granted. But their true power hasn’t begun to be tapped — especially by hoteliers.
Tags : 
mobility, mobile devices, hospitality, hotels, customer experience, customer relationship
    
Oracle
Published By: Lumesse     Published Date: Mar 18, 2015
This guide will help you achieve truly Mobile Talent Management.
Tags : 
mobile talent management, recruiting becoming mobile, mobility, hr technologies. mobile recruiting, new generations, mobile devices, multiple devices, recruiting
    
Lumesse
Published By: IBM     Published Date: Apr 24, 2017
The perimeter continues to dissolve, and the definition of endpoint is evolving, according to results of the SANS 2016 Endpoint Security Survey, now in its third year. As we might expect, 90% or more consider desktops, servers, routers, firewalls and printers to be endpoints that need to be protected. After that, respondents include other less-typical devices in their definition of endpoints that warrant protection: 71% include building security (access/ surveillance), 59% include employee-owned mobile devices and 40% consider industrial control systems as endpoints that need to be protected. Some respondents also consider POS devices, smart cars, emulated endpoints in the cloud and wearables as endpoints needing protection, highlighting the diversity of thinking among respondents.
Tags : 
device management, data solutions, system solutions, data breach, mobile management
    
IBM
Published By: iPass     Published Date: Apr 08, 2009
Learn what Forrester has uncovered in their latest report on Enteprise Mobility trends. During the past two years, Forrester has seen the number of enterprise mobility inquiries increase nearly 55%, jumping to 550-plus inquiries in 2008. In the past year, we have seen a spike in the number of inquiries focused on mobile network architecture, new types of mobile devices, and deploying vertically focused mobile applications that address the needs of workers in certain industries (e.g., retail, transportation, and healthcare).
Tags : 
forrester, wireless, infrastructure, fmc, fixed mobile convergence, network architecture, healthcare, retail
    
iPass
Published By: Box     Published Date: Mar 14, 2012
As increasing percentage of companies' employees are going mobile - and that could be an issue for IT departments. But it doesn't need to be. Box enables users to securely access, manage, and share content from any mobile device, anytime, anywhere.
Tags : 
    
Box
Published By: Salesforce.com     Published Date: Sep 20, 2013
In 2013 Salesforce.com partnered with Fifth Quadrant to conduct quantitative and qualitative research into the customer service space in Australia and New Zealand. The research was designed to specifically examine new channels for service delivery such as Mobile Devices, Social Media to name a few and the maturity level of Australian organisations in regards to Customer Experience Strategy.
Tags : 
salesforce, crm, crm solutions, research, best practices, ces, technology
    
Salesforce.com
Published By: NetApp     Published Date: Sep 24, 2013
"Today, enormous amounts of data are being created from a variety of sources, such as applications, new mobile devices, big data analytics, and the cloud. This is changing the speed with which business gets conducted and the scale in which it occurs. Moreover, the digital explosion shows no sign of slowing and IDC expects the amount of data being stored to grow in excess of 50% per year over the next few years. Discover how flash technology is being deployed to improve performance and efficiency for these demanding environments. Access this IDC whitepaper to learn more about the role of flash technology and the importance of flash solutions that are designed specifically for the enterprise."
Tags : 
data, cloud, data centers, mobile devices, flash technology, flash solutions, netapp
    
NetApp
Published By: ServiceNow     Published Date: Nov 22, 2013
Whether you’ve embraced it or not, mobile is already part of your business. To remain relevant, IT must think like the business. IT must reinvent itself and become more of a technology advisor and less of a technology traffic cop. This paper sets out some of the key lessons learned by progressive organizations that have used mobile to get ahead.
Tags : 
servicenow, enterprise it, mobile computing, mobile initiative, it managers, progressive enterprise, mobile users, bring your own device
    
ServiceNow
Published By: MobileIron     Published Date: Jul 31, 2015
Most large organizations deploy or intend to deploy a broad range of mobile apps to their employees for productivity, collaboration, CRM, ERP, analytics, and industry-specific business processes. Office 365 might be the productivity solution, but the IT team needs a central platform that can provide a consistent security and policy framework across all the mobile apps the organization will deploy both today and tomorrow. This whitepaper describes the MobileIron app security model and how it can be used to secure Office 365 for mobile devices.
Tags : 
office 365, mobileiron, crm, erp, analytics, security model, mobile apps
    
MobileIron
Published By: MobileIron     Published Date: Jul 31, 2015
This whitepaper takes the findings from the 2015 Trust Gap Survey and translates them into actionable recommendations for employers in the form of privacy-centric mobile device policies. This white paper also reviews the privacy enhancements that Apple, Google, and Microsoft have made to their operating systems. When used with an enterprise mobility management (EMM) platform, these enhancements enable a more powerful set of privacy protections than was available even two years ago.
Tags : 
    
MobileIron
Published By: MobileIron     Published Date: Aug 03, 2015
This is an article about how enterprise mobility management (EMM) suites help organizations integrate mobile devices into their security frameworks and systems and information technology life cycles.
Tags : 
enterprise mobility management, mobile devices, security framework, mobile devices, data encryption
    
MobileIron
Published By: MobileIron     Published Date: Aug 27, 2015
This is a case study about the Varian Medical system's focus on energy and saving lives through advanced technology.
Tags : 
mobileiron, medical devices, medical software, security
    
MobileIron
Published By: MobileIron     Published Date: Apr 05, 2017
MobileIron is a proven leader in mobile and cloud security innovation for the modern enterprise. In addition to being the enterprise choice for secure mobility, we rank in the top five for all categories of the Gartner Critical Capabilities for High-Security Mobility Management. We have also been positioned as a Leader in the Gartner Magic Quadrant for Enterprise Mobility Management Suites for six consecutive years. Our platform is fully mature and built from the ground up to address evolving mobility and cloud requirements. Plus, MobileIron integrates with leading technology providers, so customers aren’t tied to proprietary technologies that don’t meet their needs. We ensure customers can choose the best technologies that fit their environment.
Tags : 
cloud services, enterprise management, cloud security, mobile security, mobile device security, platforms, email security, cloud data
    
MobileIron
Published By: MobileIron     Published Date: Apr 05, 2017
Now is the time to switch from BlackBerry’s new and unproven mobile device management (MDM) offering to a modern, comprehensive EMM solution like MobileIron. In today’s highly competitive and fast-paced global economy, the last thing companies need is an MDM vendor who is always playing catch up through technology acquisitions that cost too much and offer too little. MobileIron is a recognized industry leader that has always been 100% focused on mobile security. Our unified, multi-OS EMM platform was built from the ground up to meet the needs of the modern mobile enterprise by reducing IT complexity, delivering a secure user experience, and protecting mobile apps and data on any device, in any cloud service, anywhere in the world.
Tags : 
mobile security, mobile device management, enterprise data, application security, information security, communication interception, business data, app security
    
MobileIron
Published By: MobileIron     Published Date: Apr 05, 2017
MobileIron is a proven leader in EMM innovation and mobile security for the modern enterprise. In addition to being the enterprise choice for secure mobility, we rank in the top five for all categories of the Gartner Critical Capabilities for High-Security Mobility Management. We have also been positioned as a Leader in the Gartner Magic Quadrant for Enterprise Mobility Management Suites for six consecutive years. Our platform is fully mature and built from the ground up to address evolving mobility and cloud requirements. Plus, MobileIron integrates with leading technology providers, so customers aren’t tied to proprietary technologies that don’t meet their needs. Our goal is to ensure organizations can choose the best technologies that fit their environment.
Tags : 
cloud services, enterprise management, cloud security, mobile security, mobile device security, platforms, email security, cloud data
    
MobileIron
Published By: Intralinks     Published Date: Apr 13, 2015
They say content is king. But if your content isn’t protected, it’s a king with no clothes. The proliferation of mobile devices in the workplace, and the availability of cloud services designed for consumers, can lead to improper sharing of corporate data. Information that leaves your firewalls can live forever, and without adequate protection, can end up in the wrong hands. This report by Ovum takes a look at the challenges of information security and explores how a new generation of Information Rights Management (IRM) technology directly addresses the most critical concerns. Key topics include: • The threat posed by Dropbox and other consumer-grade FSS providers • The need for lifetime control of information and content • The ability to perform audits, and locate files, anywhere, and who accessed them • How next-generation IRM technology is available to add a new layer of security to every file
Tags : 
    
Intralinks
Published By: Aditi     Published Date: Jun 11, 2015
Your mobile device is speaking to your garage door. Your alarm is telling your coffee maker you are up and it’s time to get that caffeine kick going. Your car is dropping your thermostat a message, telling it to keep the house warm before you step in. This isn’t a quote from an Issac Asimov novel, it’s the reality of how the Internet of Things is making a difference to our lives. Most of us are consciously making the shift to a connected world, while at home or at work. While this has caught the public imagination, enterprises are chasing to fulfil their Internet-of-Things-ambitions and transform their customer experience. In this e-book we aim to address the 5 fundamental questions that one should not hesitate to ask about your foray into the world of Internet of Things, while telling you how it can reshape your business.
Tags : 
aditi, rfids scada, c-suite, optimization, lot, hybrid cloud
    
Aditi
Published By: VMware AirWatch     Published Date: Feb 21, 2017
"Although they have been around for several years, virtual desktop and application virtualization solutions have not yet gone mainstream in most enterprises. That’s bound to change, however, given advances in the technologies and the increasing need to deliver a great computing experience to mobile device users. Read this Executive Viewpoint Q&A with VMware Senior VP and General Manager of Desktops Sumit Dhawan, as he explains why it’s time to revisit virtual desktop and application virtualization technologies. "
Tags : 
    
VMware AirWatch
Published By: Okta     Published Date: Jul 19, 2016
Part of a strong foundation for cloud-first, mobile-first IT includes supporting BYOD. BYOD can improve end user satisfaction and enable employees to work anywhere from any device. To really get these benefits though, the end-user experience must provide seamless access to the applications end-users want and need. Accomplishing this starts with extending app provisioning to mobile devices, and automatically deprovisioning mobile access as part of the identity lifecycle. For the best user experience, you’ll want automatic configuration of native mobile applications with mobile SSO, security settings and app settings like usernames, URLs and tenant IDs.
Tags : 
identity, idaas, iam, identity lifecycle management, mobile, provisioning, active directory, security
    
Okta
Published By: Okta     Published Date: Jul 19, 2016
With a secure foundation in place to manage internal IT, many IT leaders are thinking about a foundation for the entire business. In the new world of mobile apps, cloud services, and the Internet of Everything, people, processes, data, and devices are all converging to reshape how day-to-day business is done. Companies are reaching out to customers and partners—and even intelligent objects like connected cars and monitoring systems—and modifying the products and services they bring to market as a result. To an unprecedented degree, the future of an enterprise lies in the hands of the CIO and her IT staff who orchestrate these connections and act on the benefits they bring. IT leaders are finding new opportunities in an era of digital disruption. This executive brief provides a quick overview of how they are driving growth and increasing efficiency by securely connecting the digital enterprise with customers, partners, suppliers and distributors.
Tags : 
identity, idaas, iam, identity lifecycle management, mobile, provisioning, active directory, security
    
Okta
Published By: Okta     Published Date: Jul 19, 2016
Cloud-first, mobile-first organizations are seeing huge benefits from taking a more distributed approach to IT. Business units are given more freedom to evaluate and select SaaS applications that will enable efficiency and growth. Users are given more freedom to use the devices that make them the most productive. When this trend started, most IT organizations were able to implement some basic, manual processes to administer and govern IT in this best-of-breed distributed environment. However, as the number of touchpoints increases, IT needs to automate to keep pace. This paper goes into more detail on the top 5 reasons to automate identity lifecycle and identity administration and build a solid foundation for future cloud-first, mobile-first IT.
Tags : 
best practices, business optimization, business management, productivity, cloud services, mobile, identity, idaas
    
Okta
Published By: Ping Identity     Published Date: Feb 12, 2016
Many enterprises today are actively pursuing mobile device initiatives—largely driven by the desire to support BYOD, which holds high potential for productivity gains as well as improved employee satisfaction.
Tags : 
    
Ping Identity
Published By: Jamf     Published Date: Jan 18, 2018
Ace your migration with a manageable timeline. Once the decision is made to switch MDM solutions, the first step is to construct a logical, achievable timeline. The timeline should include critical milestones, financial considerations, school breaks, or any other factors that may impact implementation success. Choose a time when devices can be out of use in order to give IT time to make the transition without impacting users. Download this whitepaper to learn more!
Tags : 
    
Jamf
Start   Previous    5 6 7 8 9 10 11 12 13 14 15 16 17 18 19    Next    End
Search Resource Library      

Add Resources

Get your company's resources in the hands of targeted business professionals.