mobile app

Results 1 - 25 of 1384Sort Results By: Published Date | Title | Company Name

IDC Next-Gen Wireless LANs Rise to the Challenge of the Mobile Enterprise.

Published By: Aruba Networks     Published Date: May 21, 2013
The increase in enterprise WLANs is being driven largely by the rapid growth of mobile devices in the enterprise — what many are calling the "consumerization of IT" — and the resultant increase in enterprise mobility applications.
Tags : 
aruba, aruba networks, consumerization of it, wireless lans, mobile enterprise, enterprise mobility, wireless
    
Aruba Networks

The IT Innovator’s Guide to Digital Transformation in Healthcare

Published By: Comcast Business     Published Date: Oct 19, 2018
Technology has had a truly transformative impact on the healthcare space. Thanks to innovations in technology, tools and their respective processes, the practice of treating patients has shifted from mostly reactive to proactive, enabling physicians and caregivers to approach healthcare in a more holistic fashion. As part of that shift, hospitals, wellness centers and physicians’ offices are focusing on providing value over volume1, taking healthcare beyond the four walls of the facility and into patients’ homes, places of work and social centers. The concept of whole health is much easier to attain with technology such as artificial intelligence, analytics, wearables and mobile health (mHealth) apps, to name a few.
Tags : 
    
Comcast Business

Video Beyond the Conference Room: Innovative Solutions for Public Safety, Crisis Management and Nat

Published By: Polycom     Published Date: Apr 30, 2013
Wearable operational video (such as helmet cams), mobile cameras and sensors, and other visual technologies can provide crucial intelligence, which then can be gathered, communicated to personnel in disparate locations, and integrated to enable unified collaboration for public security responses. The possibility is emerging for a new generation of video applications that will enhance public security and disaster management.
Tags : 
videoconferencing, telepresence, video application, real time video, intelligence, security, crisis management, application integration, application performance management, best practices, collaboration
    
Polycom

"Your Pad or Mine?" Enabling Secure Personal and Mobile Device Use On Your Network

Published By: ForeScout     Published Date: Aug 14, 2012
The What, Why and How to Employ NAC to Apply Guest Networking, BYOD (Bring Your Own Device) and Endpoint Security Policies. Many of today's endpoints are neither known nor protected. According to Gartner, enterprises are only aware of 80 percent of the devices on their network. Those 20 percent of unknown devices are inside the perimeter of the network, are unmanaged and provide users with access. They are small, varied and highly mobile, and they are loaded with their own applications, can act as WAPs, and often contain outdated firmware or are jailbroken. Even as the devices are accessing personal applications on the web, they are also accessing corporate resources such as e-mail-all from the very same unmanaged devices, which have not been vetted by the security organization. Smartphones, notebooks, netbooks, iPads, e-readers, gaming consoles and more-the list of personal devices attempting access to employer networks seems to grow every day in what's come to be known as the BYOD (Bring Your Own Device) era in networking.
Tags : 
pad, mine, enabling, secure, personal, mobile, device, use, your, network, nac, guest, networking, byod, bring, your, own, device, endpoint, security
    
ForeScout

(DELETE)Best Practices For Mobile Application Lifecycle Management

Published By: IBM     Published Date: Apr 20, 2017
Security from design through deployment. Mobile devices are now a reality in many organizations. Building on Mobile Device Management (MDM) and Mobile Application Management (MAM), organizations are increasingly developing their own enterprise apps for specific job tasks to improve productivity, business partnerships, customer satisfaction and bottom-line performance. However, to achieve these benefits, it is imperative that mobile security best practices are incorporated throughout the lifecycle of the application.
Tags : 
    
IBM

10 Dreamforce Announcements That Will Shape Sales in 2015

Published By: Salesforce     Published Date: Nov 18, 2014
If you missed Dreamforce this year, we’ve got you covered. In this ebook, you’ll discover the ten major breakthroughs for Sales Cloud — and how they will enable the sales team of the future. Explore enhanced capablities, loads of new features, new mobile apps and a seamless user experience. Welcome to the sales success platform, reimagined for today’s sales team.
Tags : 
dreamforce, sales cloud, sales team, enhanced capabilities, new features, mobile apps, user experience, enterprise applications
    
Salesforce

10 essential elements for a secure enterprise mobility strategy

Published By: Citrix     Published Date: Jul 25, 2014
This paper presents 10 key points to consider as you develop your enterprise mobility strategy, encompassing security, user experience, IT operations and BYOD.
Tags : 
citrix, enteprise mobility, mobile workers, byod, remote access, end point security, mobile security, mobile application management, smart phones, wireless security, secure content management, mobile device management
    
Citrix

10 Problems Preventing Your IT Team From Doing Their Best Work and How to Solve Them

Published By: AtTask     Published Date: Jul 17, 2014
Rapid changes in both technology and business mean that IT departments are constantly barraged with new projects whether it's writing a web app or implementing new infrastructure for mobile application. It's a challenge just to stay ahead of the curve. This Whitepaper examines the top 10 every day pains that prevent IT managers from getting work done and offers some new and trusted solutions for improving your productivity.
Tags : 
at task, it organizations, work requests, technology changes, project updates, status reports, project management, knowledge management, enterprise applications
    
AtTask

10 reasons why you need to move to HP Converged Infrastructure now

Published By: HP and Intel ®     Published Date: May 27, 2014
The technology industry is constantly changing. Usually, it evolves along a progression of somewhat predictable lines. But every 20 years or so, a sea change shakes its very foundation. Tried-and-true practices that underpinned the previous model may no longer apply. It happened, for example when our industry transitioned from the mainframe to a client/server model. That change required a rethinking of the IT model from top to bottom. Download to learn more!
Tags : 
intel, converged infrastructure, mobile users, applications, virtualization, enterprises, it management, enterprise applications
    
HP and Intel ®

10 reasons why you need to move to HP Converged Infrastructure now

Published By: HP     Published Date: May 27, 2014
The technology industry is constantly changing. Usually, it evolves along a progression of somewhat predictable lines. But every 20 years or so, a sea change shakes its very foundation. Tried-and-true practices that underpinned the previous model may no longer apply. It happened, for example when our industry transitioned from the mainframe to a client/server model. That change required a rethinking of the IT model from top to bottom. Download to learn more!
Tags : 
intel, converged infrastructure, mobile users, applications, virtualization, enterprises, it management, enterprise applications
    
HP

10 Things IT Administrators Need to know about Android for work

Published By: MobileIron     Published Date: Mar 02, 2015
The Android platform has quickly established itself as a dominant mobile OS for consumers. However, enterprise IT has been slower to adopt Android broadly due to lack of Enterprise Mobility Management capabilities in Android and fragmentation. But the recent release of Android Lollipop reduces fragmentation and when combined with MobileIron enterprise mobility management (EMM) solutions, gives IT the tools needed to easily manage and secure apps and content on all types of Android devices. This will accelerate adoption of Android devices within the enterprise.
Tags : 
android, apps, vpn, work, multiple devices, emm
    
MobileIron

11 Key Marketing Trends for 2011

Published By: IBM Unica     Published Date: Sep 08, 2011
The proliferation of marketing channels, and the explosion of data, pose a wealth of challenges for marketers making crucial calls for 2011. The results of Unica's annual survey of marketers reveal 11 key trends in marketing for 2011.
Tags : 
ibm, unica, marketing trends, annual survey, social media trends, cross-channel attribution, mobile application
    
IBM Unica

11 Usability Rules for IT Developers

Published By: OutSystems     Published Date: Jan 06, 2014
Download this whitepaper to find out the 11 Usability Rules for IT Developers.
Tags : 
outsystems, usability rules, it developers, business solutions, mobile applications, web apps, it management
    
OutSystems

12 On-the-clock Reasons to Use a Mobile Timesheet App

Published By: ClickSoftware     Published Date: Sep 12, 2014
An e-Book providing 12 on-the-clock reasons why we think field service management is the perfect place for a mobile timesheet app.
Tags : 
mobile timesheets, mobile workforce management, clicksoftware, business software, sales software, productivity, time and attendance software, workforce management software, employee monitoring software, employee performance management, business technology
    
ClickSoftware

12 Tips for Mobile Design

Published By: Adobe     Published Date: Apr 04, 2018
If you’re not thinking about the end user experience before you start a new mobile app, it’s time to start. The most important thing to keep in mind when designing a mobile app is to make sure it’s both useful and intuitive for your users.
Tags : 
    
Adobe

14 Types of Push Notifications You Should Almost Certainly Be Sending

Published By: Urban Airship     Published Date: Oct 18, 2017
Push notifications for mobile and web that boost customer engagement & retention. Our data study of 63 million new app users shows that when brands send high value push notifications more frequently (sometimes more than one a day!) users are more likely to engage and keep their app. So what kinds of push notifications should you be sending? Download this eBook for 50+ examples you can use to increase the frequency of your notifications (web or app) — and reap the bottom line benefits.
Tags : 
    
Urban Airship

2013 Mobile Malware Report

Published By: Blue Coat Systems     Published Date: Jun 26, 2013
While mobile threats are still largely mischiefware and have not yet broken the device’s security model but instead more focused on for-pay texting scams or stealing personal information, the dangers are still rife. This white paper from BlueCoat examines the mobile threat landscape and the behavioral patterns of mobile users that make them most vulnerable to data loss, malicious applications, fraud and other mobile threats.
Tags : 
mobile threats, security, malicious applications, data loss prevention, fraud, technology, malware, networking, wireless, business technology, data center
    
Blue Coat Systems

2013 Mobile Malware Report

Published By: Blue Coat Systems     Published Date: Jul 18, 2013
While mobile threats are still largely mischiefware and have not yet broken the device’s security model but instead more focused on for-pay texting scams or stealing personal information, the dangers are still rife. This white paper from BlueCoat examines the mobile threat landscape and the behavioral patterns of mobile users that make them most vulnerable to data loss, malicious applications, fraud and other mobile threats.
Tags : 
mobile, malware, security, scams, bluecoat, data loss, anti spam, anti virus, application security, email security, internet security, network security appliance
    
Blue Coat Systems

2015 State of Application Security: Closing the Gap

Published By: Veracode     Published Date: Oct 26, 2016
As software applications are increasingly distributed through cloud and mobile platforms, the risk of vulnerabilities affecting enterprises rises. This whitepaper provides advice for secure development and delivery of applications throughout the software development lifecycle.
Tags : 
veracode, security, application security, software applications, software development lifecycle, enterprise applications, business technology
    
Veracode

2016 Gartner Report: Magic Quadrant For Enterprise Mobility Management Suites

Published By: IBM     Published Date: Apr 20, 2017
Enterprise mobility management suites enable organizations to integrate and manage mobile devices in their IT infrastructures. End-user computing leaders must act amid rapid market changes to reach both short-term and long-term enterprise mobility objectives. UEM is not limited to PCs, tablets and smartphones. Smart devices, broadly grouped as part of the IoT, will increasingly become included in UEM. Devices such as Apple TVs, printers and smartwatches are identifiable examples of IoT devices managed by EMM tools. However, not all IoT objects will fall under the realm of EMM tools. Some devices may be managed directly by manufacturers. Other types of devices will have proprietary management tools. And many devices will not need to be managed at all. However, it is clear that the diversity and number of devices will continue to grow, and IT organizations must be ready.
Tags : 
auditing, enterprise data protection, mobile device management, mobile application management, mobile identity, policy enforcement, content optimization
    
IBM

2016 Mobile Security & Business Transformation Study

Published By: IBM     Published Date: Apr 20, 2017
Ninety-nine percent of the enterprise workforce currently uses mobile devices – smart phones and tablets – to perform their jobs today. Nearly 60 percent of security leaders describe their organizations as either partially or fully mobile, deriving enhanced productivity and other business benefits. Reflecting on the survey results provides the opportunity to take a broad view of enterprise mobility and realize how business transformation has begun. Nearly all enterprises now incorporate mobility in their work, and a majority now sees tangible business results from mobility. Organizations are seeing greater efficiencies and productivity from mobile workers.
Tags : 
mobile security, mobile device management, enterprise data, application security, information security, communication interception, business data
    
IBM

2017 Commerce Trends

Published By: Bronto     Published Date: May 18, 2017
Convenience is absolutely critical to succeeding in e-commerce. Any glitches along the path to purchase potentially result in a lost sale. That's one reason we think Apple Pay's new mobile payment feature that uses a fingerprint is going to be a game changer. Its another step in reducing hurdles to online buying. You see it, you select it, you pay with your finger. What could be more convenient? Not interested in Apple Pay? Or unable to use it? At the very least, make sure customers that shop on multiple devices are recognized, no matter which device they log into. Giving them access to their stored information will make for a much smoother checkout.
Tags : 
bronto, digital marketers, program management, customer support, critical data source, email management, world wide business research, mobile devices, visual commerce, virtual reality, overseas market
    
Bronto

2017 Retail Vision Study

Published By: Zebra Technologies     Published Date: Sep 07, 2017
In the age of evolving shopper expectations and technology advancements, the global retail industry is in the midst of a profound shift in retail operations. To gain a deeper understanding of retailers’ focus, concerns and investment plans, Zebra conducted a global research study across a wide spectrum of retail segments, including: specialty stores, department stores, apparel merchants, supermarkets, electronics, home improvement and drugstore chains. The results of this study are shared in this 2017 Retail Vision Study.
Tags : 
inventory management, staff communication, guest safety, guest security, mobile ordering, payment solutions, loyalty/membership/rewards, access card printers, state of the hospitality industry, smart data dives, automating convenience, the personalization equation, location technologies, key qr code applications, customer service, customer satisfaction
    
Zebra Technologies

2018 Buyers Guide: Collaborative Solutions to Create the Workplace of the Future, Today

Published By: Polycom     Published Date: Mar 12, 2018
"Traditional offices and meeting rooms are giving way to open team and mobile spaces, as well as huddle rooms, all of which present challenges for effective collaboration in geographically distributed organizations. Polycom can help you transform the way you and your teams work and compete more effectively with intuitive collaboration tools that fit with the way your teams work, not the other way around. The Polycom 2018 Buyers Guide will help you understand how to apply team collaboration technology to meeting spaces of all sizes.
Tags : 
workplace, mobile, polycom, business, optimization
    
Polycom

3 businesses share why they chose Citrix XenDesktop over VMware View

Published By: Citrix Systems     Published Date: Oct 07, 2014
Citrix XenDesktop is the clear choice for mobilizing Windows apps and desktops. Whether you are looking to deliver Windows apps and desktops to mobile users, reduce costs and management through desktop virtualization, or secure intellectual property, XenDesktop is the only solution able to meet all your needs from a single, easy to deploy platform. It quickly and securely delivers mobile access to individual apps or complete desktops while maintaining a high definition user experience.
Tags : 
mobilizing, windows, intellectual property, secure, desktops, virtualization, high definition, user experience, deliver, access, app, cost, management, it management, wireless
    
Citrix Systems
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.