mobile

Results 3826 - 3850 of 4233Sort Results By: Published Date | Title | Company Name

The Growing Challenges of Compliance in a Mobile World

Published By: TextGuard Mobile     Published Date: Mar 10, 2011
The Growing Challenges of Compliance in a Mobile World White Paper by Osterman Research
Tags : 
mobile message archiving, monitoring, compliance, sms, text messages, bbm, instant messages, archiving, data protection
    
TextGuard Mobile

See what MicroStrategy Mobile Business Intelligence is all about.

Published By: MicroStrategy     Published Date: Mar 16, 2011
See what MicroStrategy Mobile is all about. The iPad's stunning touchscreen and gesture motif allow anyone to find information naturally and intuitively. See it in action, watch the video now.
Tags : 
microstrategy mobile, ipad, mobile bi, business intelligence, mobile computing, mobile data systems, mobile workers, smart phones, wireless application software, wireless phones
    
MicroStrategy

Setting the Standard for Mobile BI in Retail With MicroStrategy Mobile

Published By: MicroStrategy     Published Date: Aug 12, 2012
Merchants can access the app and look at the data in multiple ways.
Tags : 
business technology
    
MicroStrategy

When Passwords Aren't Enough: The Need for Strong Online Authentication That Is Easy To Use

Published By: Confident Technologies     Published Date: Mar 16, 2011
This paper will examine the security threats associated with weak authentication practices on the Web, why businesses need to strengthen online authentication, and new approaches for delivering one-time passwords.
Tags : 
authentication, it security, website security, two-factor authentication, passwords, login, one-time passwords, otp, 2fa, multifactor authentication, identity and access management, user authentication, web authentication, mobile authentication, access control, biometrics, identity management, internet security, password management, phishing
    
Confident Technologies

Top Considerations for a Mobile Application Platform

Published By: Worklight     Published Date: Mar 23, 2011
Key priorities that companies should be aware of when embarking on a cross-platform application strategy
Tags : 
mobile application platform, mobile app platform, mobile enterprise application platform, mobile consumer application platform, mobile app development, mobile computing, wireless application software
    
Worklight

Getting Your Message In The Hands of Your Consumer: A Guide to Effective Mobile Marketing Techniques

Published By: Stevens & Tate Marketing     Published Date: Apr 12, 2011
Businesses looking to market their products and services to this new generation of consumers need to understand and embrace the benefits of using digital and mobile platforms to reach the audience of today.
Tags : 
mobile marketing, digital advertising, internet marketing, mobile advertising
    
Stevens & Tate Marketing

Lifecycle Marketing and Promotion Challenges in the Mobile Service Provider World

Published By: Sixth Sense Media     Published Date: Apr 14, 2011
This paper will review growth drivers, and outline steps service providers can take to enter a new age of lifecycle marketing and promotions to increase ARPU and address churn.
Tags : 
mobile subscriber marketing, telecommunications marketing, mobile services marketing, reduce subscriber churn, telecom services, subscriber marketing
    
Sixth Sense Media

Mobilizing Brand Loyalty with Persistent Trigger Marketing

Published By: Sixth Sense Media     Published Date: Apr 14, 2011
This paper will examine and review the application of persistence and triggers in a new age of loyalty marketing to increase brand affinity and drive revenue.
Tags : 
loyalty marketing, brand marketing, customer retention, trigger-based marketing, mobile marketing, mobile loyalty, affinity marketing, mobile communications
    
Sixth Sense Media

Three Trends Causing Paradigm Shifts in Online Retail

Published By: Limelight Networks     Published Date: May 03, 2011
In this whitepaper you will learn about the three major trends re-shaping the ecommerce landscape: Video as a way to enhance the shopping experience; Mobile as a channel for expanding marketing reach; and Personalization informed by advanced analytics.
Tags : 
limelight networks, rich-media strategies, ecommerce, online retail, consumer behavior, video, mobile, personalization, analytics
    
Limelight Networks

SMS for Software Developers

Published By: tyntec     Published Date: May 13, 2011
Software developers have been adding mobile elements into their applications for years, whether it be using mobile to alert to system downtime or creating specialist mobile functionality to allow remote access. However, the c
Tags : 
mobile servies, sms, tyntec, software developing, sms and software, mobile computing, mobile data systems
    
tyntec

How to Profit from the mHealth Revolution

Published By: Mobile PRM     Published Date: May 18, 2011
This eBook offers the exclusive and critical rules for using the power of mobile to transform your patient relationships.
Tags : 
mobile health, mhealth, ehealth platform, pharmaceutical marketing, patient-centric, mobile health technology
    
Mobile PRM

From Password Reset to Authentication Management

Published By: Hitachi ID     Published Date: Jun 09, 2011
Over the years, password management software has evolved from a simple self-service web application to reset forgotten passwords to a complex platform for managing multiple authentication factors and encryption keys.
Tags : 
password reset, authentication management, proliferation of passwords, locked-out users, mobile users and cached passwords, full disk encryption, user enrollment and adoption, privileged accounts and passwords
    
Hitachi ID

How Online Retailers Can Tap into the Emerging Site Monetization Boom

Published By: Searchandise     Published Date: Jun 21, 2011
Reliance on retail sites provides unprecedented opportunity for retailers to look at their sites as media venues, and retail search media has emerged. Think paid search for retail websites and their mobile counterparts.
Tags : 
retail search media, retail media, advertising
    
Searchandise

Secure, Two-Factor Authentication Using Images

Published By: Confident Technologies     Published Date: Jun 29, 2011
Two-factor, mobile authentication using images.
Tags : 
authentication, two-factor authentication, multifactor authentication, security, website security
    
Confident Technologies

Introduction to Mobile Device Management (MDM)

Published By: Avema Critical Wireless     Published Date: Jul 26, 2011
A starting point to learn about Mobile Device Management, and the need for mobile device security
Tags : 
mobile device management, smartphone security, tablet security, mobile security, mobile management, ios security, android security
    
Avema Critical Wireless

Desktop virtualization for all

Published By: Citrix Systems     Published Date: Oct 08, 2012
Today's organizations encompass a diverse range of users, from road warriors using laptops and mobile devices as well as power users working with demanding high-end applications, to task workers performing standard, relatively predictable processes. A one-size-fits-all approach to desktop virtualization cannot meet all the different requirements of these users.
Tags : 
citrix, desktop, virtualization, shared desktop, remote pc, enterprise applications, desktop management, business technology, cloud computing, infrastructure
    
Citrix Systems

Why choose Citrix over VMware?

Published By: Citrix Systems     Published Date: Apr 15, 2016
Why should you choose Citrix over VMware? With 25 years of innovation and real-world customer deployments, only Citrix has the mobile workspace technology that helps businesses achieve their goal of a truly mobile workforce. Read the infographic.
Tags : 
citrix, vmware, mobile workspace technology, mobile workforce, mobile computing, mobile data systems, mobile workers, collaboration, messaging, productivity, project management
    
Citrix Systems

Moving Beyond PowerPoint: Using the iPad for Winning Sales Presentations in Health Care

Published By: StoryDesk     Published Date: May 02, 2012
For sales teams using iPads - or those thinking about it - this is a must read primer on how to leverage the iPad's technology to drive sales. Hint: it's not by using PowerPoint for a mobile slide show.
Tags : 
    
StoryDesk

Zscaler ThreatLabZ Q3 2011 State of the Web Report

Published By: ZScaler     Published Date: Dec 13, 2011
Leveraging a combined view of billions of daily web transactions-spanning millions of enterprise users across over 140 countries - Zscaler ThreatLabZ delivers the State of the Web Q3 2011 Report.
Tags : 
blue coat, proxy sg, url filtering, web 2.0, cloud security, proxy av, xss, vpn, email gateway, web gateway, mobile device, saas, gre tunnels, proxy chaining, active directory, dlp, cookie theft, application integration, application performance management, best practices
    
ZScaler

Top Trends in Workforce Management: Where Does Your Organization Stand?

Published By: Workforce Software     Published Date: Nov 17, 2011
During the past several years, challenges such as increased regulatory pressures, employee fatigue and the ever-present need to reduce costs have all weighed heavily on most human resource organizations. As a result, HR and payroll professionals are playing an increasingly strategic role in the day-to-day operation of the business.
Tags : 
workforce management software, labor laws, california labor laws, change management, labor law compliance, time and attendance, time and attendance software, labor scheduling, labor scheduling software, employee scheduling, absense management, absense management software, fatigue management, employee fatigue management, mobile workforce management, mobile time and attendance, mobile scheduling software, flsa, flsa compliance, fmla
    
Workforce Software

Finding High Ground as Big Data Swells

Published By: CenturyLink     Published Date: Mar 09, 2012
Explore this infographic and begin building a tangible plan-it could mean the difference between reacting and prospering in Big Data's shadow.
Tags : 
centurylink, qwest, high speed internet, phone, mobile, tv services, offers, bundles, networking, security, wide area networks, wide area networking, enterprise, protocals, mpl
    
CenturyLink

Securing the Mobile App Market

Published By: Symantec     Published Date: Oct 02, 2012
How Code Signing Can Bolster Security for Mobile Applications
Tags : 
mobile app market, securing, code, signing, certificates, business technology
    
Symantec

Securing Your Software for the Mobile Application Market

Published By: Symantec     Published Date: Oct 02, 2012
The Latest Code Signing Technology
Tags : 
mobile, application, market, software, code, signing, technology, business technology
    
Symantec

Best Practices for Mobile Device Support

Published By: LogMeIn     Published Date: Mar 01, 2012
The best practices offered in this white paper will help streamline IT's time, budget, and the support it offers to keep end users working effectively and successfully.
Tags : 
mobile devices, mobile support, customer satisfaction, customer service, wireless devices, wireless phone, mobile data systems, smart phones, wireless communications, wireless phones, customer interaction service
    
LogMeIn
Start   Previous    147 148 149 150 151 152 153 154 155 156 157 158 159 160 161    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.