mobile app

Results 1351 - 1375 of 1379Sort Results By: Published Date | Title | Company Name

Why Choose Okta vs ADFS?

Published By: Okta     Published Date: Jul 27, 2016
You're moving towards Office 365 and you want true single sign-on for users. You also want to ensure authentication is directly tied back to the policies and user status in Active Directory. With Okta's lightweight agent, you can minimize your on-prem footprint as you move to the cloud. Zero servers and on-prem software to deploy, update and manage means lower TCO.
Tags : 
identity, idaas, iam, identity lifecycle management, mobile, provisioning, active directory, security
    
Okta

Why Comprehensive Endpoint Security and Management is a Must-Have for Small and Medium Enterprises

Published By: EarthLink Business     Published Date: May 15, 2014
This white paper underscores why it’s critical for SMEs to protect all endpoints – not just mobile devices – in the operating environment. It also explains the challenges of applying stringent security across all endpoints and balancing that with convenience and ease-of-use for employees.
Tags : 
earthlink, smb, small business, medium business, sme, endpoint security, mobile security, mobile workers
    
EarthLink Business

Why Good Apps Are Not Good Enough

Published By: IBM     Published Date: Jul 06, 2016
Why good mobile apps are not good enough: Measure and move your mobile app to greatness
Tags : 
ibm, mobile, applications, apps, mobile apps, customer engagement, networking, mobile computing
    
IBM

Why Good Apps Are Not Good Enough

Published By: IBM     Published Date: Oct 12, 2016
IBM commissioned Forrester Consulting to evaluate what consumers want from a mobile app (and its authoring brand) and focused on the following questions: - What elevates a good, serviceable, and even profitable app into the realm of great? - And if a mobile app achieves greatness, what is the impact?
Tags : 
ibm, commerce, digital experience, digital, applications, apps, mobile app, wireless
    
IBM

Why is App Security Escaping Development?

Published By: IBM     Published Date: Oct 08, 2015
The Ponemon institute recently interviewed Fortune 500 companies down to the mid-market to find "The State of Mobile Application Insecurity." Sponsored by IBM, the paper explores why security is being left behind or completely out of app development.
Tags : 
    
IBM

Why IT Struggles to Innovate: And How You can Fix It

Published By: OutSystems     Published Date: Jan 06, 2014
Why IT Struggles to Innovate: And How You can Fix It
Tags : 
outsystems, it innovation, web applications, mobile applications, outsystems platform, paas, platform as a service, it management
    
OutSystems

Why IT struggles with Mobility

Published By: OutSystems     Published Date: Nov 07, 2014
This paper chronicles the adventures and misadventures of the enterprise mobile app journey based on our observations working with industry leaders who have weathered three years of pain to arrive at the same conclusions.
Tags : 
mobility, mobile devices, web apps, enterprise mobile app development, it management, knowledge management, enterprise applications, business technology
    
OutSystems

Why Managing Mobility Matters

Published By: SAP     Published Date: Feb 10, 2011
The recession notwithstanding, mobile devices continue to be purchased in record numbers, pouring into the organization. These devices are coming in a wide variety of hardware and operating system types, making their management and security a big IT challenge. This IDG Playbook is designed to help guide your strategy to manage and secure the booming mobile environment.
Tags : 
sap, mobility, competitive edge, mobile workers, enterprise mobility, mobile, applications, iphone
    
SAP

Why Storage Convergence? Why Now?

Published By: HP     Published Date: May 14, 2014
As business purposes have changed over the years, IT approaches and infrastructures have had to change in lock-step to serve them optimally. IT professionals are now combining the best of the centralized approach – via virtualization, federation, and clouds of all sorts – with the best of the decentralized model – via mobile and localized consumption and production. In this paper, Enterprise Strategy Group examines approaches to IT operational challenges and business requirements. Learn how HP Converged Storage’s comprehensive approach represents a logical evolution development in storage, delivering ease, flexibility and cost-efficiency all in one.
Tags : 
3par storeserv, converged storate, new style of it, storage architecture, itaas, cloud, hybrid cloud, private cloud
    
HP

Why the Hybrid Cloud Makes Sense

Published By: Equinix     Published Date: May 18, 2015
This white paper explores how CIOs and business leaders need to think much more broadly about how their technology fits into a global network of services due to the rise of cloud infrastructure, software as a service, the global data foot­print, and mobile apps.
Tags : 
hybrid cloud, technology, data center, global network, cloud computing, cloud, cloud infrastructure, mobile apps
    
Equinix

Why your Mobile App "Strategy" is Killing your Business

Published By: Swrve     Published Date: Mar 07, 2016
This whitepaper highlights if your mobile app strategy is killing your business and how to calculate the ROI to fix it.
Tags : 
mobile app, roi, return of investment, mobile app strategy, mobility, roi calculation, mobile computing, mobile data systems
    
Swrve

WiFi Buyers Guide für Unternehmen: Die neue Mobilität möglich machen

Published By: Aerohive     Published Date: Jun 15, 2015
In diesem Dokument wird beschrieben, wie die Komplexität und Kosten herkömmlicher drahtloser Netzwerke beseitigt und ein mobilitätsbereites Netz erstellt werden kann.
Tags : 
mobility, wireless, wlan, wi-fi, mobile applications, mobile users, networks, wireless networks
    
Aerohive

Wild, Wild West of Mobile App Reputation

Published By: Webroot UK     Published Date: Sep 25, 2013
Mobile applications are providing exciting new business opportunities for service providers and technology companies. Innovative firms are thriving by offering apps in app stores and app markets, by supporting apps with mobile services and infrastructure, and by managing apps through mobile device management (MDM) and mobile application management (MAM) products. Enterprises are providing mobile apps to their employees and customers through corporate app catalogs. But these business opportunities could be jeopardized by information security issues.
Tags : 
webroot, app reputation, app, mobile app, mam, enterprise mobile apps, app markets, mobile viruses
    
Webroot UK

Windows 10 fu¨r die Mobile First, Cloud First A¨ra neudefiniert

Published By: VMware AirWatch     Published Date: Dec 10, 2015
Windows 10 fu¨r die Mobile First, Cloud First A¨ra neudefiniert Die neueste, revolutionäre Version von Microsoft hat ein einziges Betriebssystem fu¨r Mobilgeräte und traditionelle PCs geschaffen. Eine Plattform | Einheitliche Apps | Intuitive Erfahrung | Integrierte Sicherheit Neu definiert - fu¨r eine ära, in der Mobilitat und Cloud an erster Stelle steht
Tags : 
windows 10, vmware, cloud, cloud first, webinar, mobile first, networking, it management
    
VMware AirWatch

Windows 10 Mobile: The Right Choice for Business Mobile Device Management

Published By: Microsoft Nokia Lumia     Published Date: Jun 08, 2016
Organizations' users increasingly depend on their mobile devices, but phones and tablets bring new and unfamiliar challenges for IT departments. IT must be able to deploy and manage mobile devices and apps quickly to support the business while balancing the growing need to protect corporate data because of evolving laws, regulations, and cybercrime.
Tags : 
    
Microsoft Nokia Lumia

Windows 10 Security and VMware AirWatch

Published By: VMware AirWatch     Published Date: Jul 19, 2017
Anytime, anywhere access to work is now a basic need for the modern workforce. Whether remote, in the field or in the office, workers are no longer physically connected to your network or data center. Today’s employees work in a digital workspace that features virtualized laptops, desktop and workstations; a variety of personal systems and smart devices that may be part of BYOD programs and a diverse app ecosystem with desktop, remote, mobile, SaaS and Universal apps. In this mobile-cloud world, new and unpredictable forms of malicious software continue to evolve. Traditional network security, perimeter protection and firewalls are no longer enough to combat these new threats to the corporate IT infrastructure and company data integrity.
Tags : 
    
VMware AirWatch

Windows Mobile 6.5: Enabling business mobility, today and tomorrow

Published By: Microsoft Windows Phone     Published Date: Feb 05, 2010
In this e-Guide, we recap Windows Mobile OS's evolution and look at the wide array of Windows Mobile-powered devices available to untethered today's workforces. We'll explore where and why Windows Mobile OS devices are used to support a wide range of mobile apps, from vertical business automation to knowledge worker access.
Tags : 
microsoft, windows mobile 6.5, mobile apps, smartphone, mobile worker, wince, business applications, mobile computing
    
Microsoft Windows Phone

Winning API Strategy Developing Secure Mobile Apps

Published By: CA Technologies     Published Date: Mar 06, 2015
L’application mobile est devenue l’initiative stratégique phare pour toutes les organisations numériques qui cherchent à développer leur activité.
Tags : 
    
CA Technologies

Winning API Strategy Developing Secure Mobile Apps

Published By: CA Technologies     Published Date: Mar 10, 2015
Die mobile App ist jetzt „die“ strategische Initiative für alle digitalen Organisationen, die ihr Unternehmen voranbringen möchten.
Tags : 
    
CA Technologies

Winning Api Strategy Developing Secure Mobile Apps

Published By: CA Technologies     Published Date: Mar 10, 2015
Vereinfachen von Security und Management von Apps und BYOD auf Unternehmensebene
Tags : 
    
CA Technologies

Winning Strategies for the Evolving Legal Marketplace

Published By: BlackBerry     Published Date: Aug 10, 2009
In recent years, law firms have enjoyed remarkable financial returns due to a strong global economy, free flowing capital and a high level of demand for legal services. Law firm revenues and profits continued to be strong, even during the dotcom bust, the post 9/11 slowdown and the increasing cost of associate recruitment and retention. This success could be partly explained by the growth imperative in law firms: they must continue to grow, either by acquisition, or by recruiting laterals or associates, because law firm economics correlates size with profits. And many firms grew rapidly in the past several years.
Tags : 
blackberry, altman weil, law, legal, research in motion, voip, smartphones, it communication
    
BlackBerry

Wireless Voice in the Office Environment

Published By: Plantronics     Published Date: Oct 18, 2013
Wireless technology surrounds us — in the workplace, at home, and many places in between. Mobile phones, WiFi networks, wireless computer accessories, and cordless phones all use radio transmissions for wireless communication. Even devices not used for communication, such as microwave ovens and lighting systems, emit radio frequency energy that can impact wireless devices. In this crowded radio environment, two technologies have emerged as the standard for wireless voice communication in UC and enterprise applications.
Tags : 
plantronics, audio device technology, wireless technology, digital telecommunications, wireless headset success, influence deployment, analogue modulation, business conversations
    
Plantronics

With Mobile Barcodes, Marketers Enjoy These Benefits

Published By: Neustar     Published Date: Jan 24, 2011
Learn how retailers can use mobile barcodes to attract new customers, keep their existing customers, and build multiple and repetitive sales.
Tags : 
neustar, mobile barcode, 2d barcode, qr code, retail, upc code, ean code, sms
    
Neustar

Workplace Mobility, Consumerization, and Cloud Drive End-user Computing Transformation

Published By: VMware AirWatch     Published Date: Dec 09, 2016
To streamline the process of maintaining desktop environments, many IT managers are turning to mobile-cloud first approaches to application and desktop delivery. And if your business is in a similar transition, due to trends in BYOD, changing application delivery models, and worker mobility, your end-user computing environments could be becoming overly complex. To combat this rising complexity, you need to consider implementing hybrid consumption models that work at scale and address security threats. Read this white paper that details how the next generation of desktop architectures is taking mobility into account and how IT strategies are shifting from managing devices to managing users.
Tags : 
    
VMware AirWatch

XenMobile security paper

Published By: Citrix Systems, Inc.     Published Date: Jan 27, 2016
Security is a top priority at Citrix. This whitepaper is meant to delve into the technical details of the security around the Citrix XenMobile solution and each of its components. Details include how Citrix implements secure mobile device management, mobile application management, mobile content management and more
Tags : 
citrix, xenmobile, mobile, security, mobile device management, mobile app management, mobile content management, secure instant messaging
    
Citrix Systems, Inc.
Start   Previous    42 43 44 45 46 47 48 49 50 51 52 53 54 55 56    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.