mobile data

Results 251 - 275 of 683Sort Results By: Published Date | Title | Company Name

Evaluating Data Management Platforms for Cloud Applications

Published By: Datastax     Published Date: May 14, 2018
" For any business that wants to successfully compete in today’s digital economy, it is not a question of if but rather how much of their business will be done with cloud applications. A cloud application is one with many endpoints including browsers, mobile devices, and/or machines that are geographically distributed. The application is intensely transactional (high velocity reads and/or writes), always available, and instantaneously responsive no matter the number of users or machines using the application. Download this free white paper and explore how DataStax customers are delivering real-time value at epic scale with their cloud applications. Explore the core database requirements that make businesses successful with cloud applications, which include continuous availability, linear scale, and geographic distribution."
Tags : 
    
Datastax

Evaluating Databases for Cloud Applications

Published By: Datastax     Published Date: Aug 27, 2018
" For any business that wants to successfully compete in today’s digital economy, it is not a question of if but rather how much of their business will be done with cloud applications. A cloud application is one with many endpoints including browsers, mobile devices, and/or machines that are geographically distributed. The application is intensely transactional (high velocity reads and/or writes), always available, and instantaneously responsive no matter the number of users or machines using the application. Download this free white paper and explore how DataStax customers are delivering real-time value at epic scale with their cloud applications. Explore the core database requirements that make businesses successful with cloud applications, which include continuous availability, linear scale, and geographic distribution."
Tags : 
    
Datastax

Endpoint Backup Compliance Considerations for HIPAA-regulated Enterprises

Published By: Druva     Published Date: Oct 02, 2017
To best address HIPAA compliance, maintain productivity, and mitigate risk in the mobile age, HIPAA-regulated enterprises need to ensure high standards of data security and privacy on all endpoint devices that contain or have access to protected health information (PHI). Get this white paper to learn: What HIPAA means for data on endpoint devices Features you should look for when evaluating endpoint backup solutions How to maintain HIPAA compliance whether data is stored on-premise or in the cloud What other organizations are doing to comply with HIPAA/HITECH
Tags : 
hipaa, hipaa compliance, risk mitigation, data security, endpoint devices, protected health information
    
Druva

THE DEFINITIVE GUIDE TO ENTERPRISE DATA BACKUP & RECOVERY ARCHITECTURES

Published By: Druva     Published Date: Nov 09, 2018
The all-encompassing data center is a thing of the past. Modern data environments are distributed and include remote and branch offices, mobile devices, and the Internet of Things (IoT) as well as cloud solutions such as infrastructure as a service (IaaS), platform as a service (PaaS), and software as a service (SaaS). There’s more critical data to back up than ever before. Plus, data silos and fragmented management mean poor visibility, which can make it difficult to comply with regional data residency and security rules as well as service-level agreements (SLAs). On-premises data protection has not kept pace. According to a survey by Fujitsu, 45% of IT managers said they had lost data or productivity related to data protection inefficiency within the last year.1 Often, this is because on-premises backups are cumbersome and do not always happen on time.
Tags : 
    
Druva

Turn Your Customers into Brand Champions

Published By: Reputation.com     Published Date: Oct 02, 2017
1.Meet the new consumer The migration to mobile and social media will challenge — and change — everything we know about consumer marketing. 2. Who owns your brand? Brand equity can no longer be bought. Online reviews now generate total market transparency for location-based businesses. Reviews tilt the balance of branding power away from companies and into the hands of customers. 3. The battle for brick-and-mortar customers is won or lost on the social web. To win, marketers must actively enlist customers as online advocates. Those who scale online review volume and quality will be rewarded with higher search visibility and more business at street level. 4. “Dark data” provides priceless operational insights Vast amounts of unstructured, unmined sentiment data on social media provides feedback about the customer experience that you can filter using thematic analysis and use to improve operations at the national or location level. 5. Business implications Online reputation stands betwee
Tags : 
    
Reputation.com

Secure the SaaS Tsunami

Published By: OneLogin     Published Date: Oct 24, 2017
SaaS has fundamentally changed security requirements. We used to just go into work, and everything—corporate applications, sensitive customer data, employee health records, etc.—was within the “safe” four walls of the corporate network behind a firewall. Now employees work remotely and use mobile devices, including unmanaged, personal devices. They access SaaS apps that live in the cloud without any sort of firewall that IT can use to monitor and manage access. Prominent examples include Salesforce.com, Google Apps, Office 365, Box, and many others. As employees use these SaaS apps, they are creating proprietary company data, often confidential in nature, that exists outside the control of IT, creating new challenges for security teams. In this new world, IT needs to track sensitive corporate data in third-party SaaS apps, and ensure that only the right people have the right level of access to it. In this whitepaper, we’ll explain ten steps on how to do that
Tags : 
    
OneLogin

A New Breed of Servers for Digital Transformation

Published By: IBM     Published Date: Jul 02, 2018
Digital transformation is not a buzzword. IT has moved from the back office to the front office in nearly every aspect of business operations, driven by what IDC calls the 3rd Platform of compute with mobile, social business, cloud, and big data analytics as the pillars. In this new environment, business leaders are facing the challenge of lifting their organization to new levels of competitive capability, that of digital transformation — leveraging digital technologies together with organizational, operational, and business model innovation to develop new growth strategies. One such challenge is helping the business efficiently reap value from big data and avoid being taken out by a competitor or disruptor that figures out new opportunities from big data analytics before the business does. From an IT perspective, there is a fairly straightforward sequence of applications that businesses can adopt over time that will help put direction into this journey. IDC outlines this sequence to e
Tags : 
    
IBM

A new Breed of Servers for Digital Transformation

Published By: Group M_IBM Q418     Published Date: Dec 18, 2018
Digital transformation is not a buzzword. IT has moved from the back office to the front office in nearly every aspect of business operations, driven by what IDC calls the 3rd Platform of compute with mobile, social business, cloud, and big data analytics as the pillars. In this new environment, business leaders are facing the challenge of lifting their organization to new levels of competitive capability, that of digital transformation — leveraging digital technologies together with organizational, operational, and business model innovation to develop new growth strategies. One such challenge is helping the business efficiently reap value from big data and avoid being taken out by a competitor or disruptor that figures out new opportunities from big data analytics before the business does.
Tags : 
    
Group M_IBM Q418

A new Breed of Servers for Digital Transformation

Published By: Group M_IBM Q119     Published Date: Dec 18, 2018
Digital transformation is not a buzzword. IT has moved from the back office to the front office in nearly every aspect of business operations, driven by what IDC calls the 3rd Platform of compute with mobile, social business, cloud, and big data analytics as the pillars. In this new environment, business leaders are facing the challenge of lifting their organization to new levels of competitive capability, that of digital transformation — leveraging digital technologies together with organizational, operational, and business model innovation to develop new growth strategies. One such challenge is helping the business efficiently reap value from big data and avoid being taken out by a competitor or disruptor that figures out new opportunities from big data analytics before the business does.
Tags : 
    
Group M_IBM Q119

Boost your mobile ROI with powerful Cognitive Insights from IBM MaaS360

Published By: Group M_IBM Q119     Published Date: Dec 20, 2018
Today’s mobile landscape is very much a moving target. IT managers must keep track of all types of devices and platforms, hundreds if not thousands of applications and a threat landscape that changes by the minute. In this ever-changing environment, IT staff often find themselves drowning in mobile minutiae, overwhelmed by mountains of endpoint data but unable to extract meaning from it or make business decisions based on it.
Tags : 
    
Group M_IBM Q119

Gartner Magic Quadrant for Mobile Marketing Platforms, July 2018

Published By: Group M_IBM Q119     Published Date: Feb 21, 2019
Mobile marketing platforms facilitate direct marketing on mobile devices by enabling mobile campaign management and activation. These platforms can operate as stand-alone solutions; however, they typically integrate with, or operate alongside, CRM, location/data management, and multichannel marketing hub (MMH) or email marketing platforms. Regardless of how a mobile marketing platform gets deployed, the native or third-party analytics supporting its audience targeting, campaign sequencing, personalization and performance measurement capabilities form the foundation of this technology.
Tags : 
    
Group M_IBM Q119

2018 Watson Marketing Digital Benchmark Report

Published By: Group M_IBM Q119     Published Date: Feb 21, 2019
At IBM Watson Marketing, we believe deeply in this practice and have dedicated a large effort to provide some of this critical data to marketers. The newest IBM Watson Marketing annual report of marketing benchmarks is bigger and better than ever with mobile marketing metrics data in addition to email marketing metrics. This year’s report includes traditional benchmark metrics such as email marketing open, click-through and unsubscribe rates, as well as email client and device data and engagement/read rates. New this year to the report are delivery and message frequency metrics for SMS and open and clickthrough rates for mobile push messages.
Tags : 
    
Group M_IBM Q119

Boost your mobile ROI with powerful Cognitive Insights from IBM MaaS360

Published By: Group M_IBM Q2'19     Published Date: May 03, 2019
"Managing and securing endpoints with conventional mobile device management (MDM) or enterprise mobile management (EMM) solutions is time-consuming and ineffective. For this reason, global IT leaders are turning towards unified endpoint management (UEM) solutions to consolidate their management of smartphones, tablets, laptops and IoT devices into a single management console. To increase operational efficiency, maximize data security and deliver on their digital transformation goals, they’ll need a UEM platform that does more than just promise success. The answer is a smarter solution, built for today, that brings new opportunities, threats, and efficiency improvements to the forefront. With Watson™, IBM® MaaS360® UEM features cognitive insights, contextual analytics, and cloud-sourced benchmarking capabilities. It helps you make sense of daily mobile details while managing your endpoints, users, apps, document, and data from one platform."
Tags : 
    
Group M_IBM Q2'19

14 Types of Push Notifications You Should Almost Certainly Be Sending

Published By: Urban Airship     Published Date: Oct 18, 2017
Push notifications for mobile and web that boost customer engagement & retention. Our data study of 63 million new app users shows that when brands send high value push notifications more frequently (sometimes more than one a day!) users are more likely to engage and keep their app. So what kinds of push notifications should you be sending? Download this eBook for 50+ examples you can use to increase the frequency of your notifications (web or app) — and reap the bottom line benefits.
Tags : 
    
Urban Airship

Free Template: Mobile Engagement RFP

Published By: Urban Airship     Published Date: Oct 18, 2017
FIGHT THE FOMO! MAKE SURE YOU CHOOSE THE RIGHT MOBILE ENGAGEMENT VENDOR You've been tasked with evaluating mobile engagement vendors. Now what? Be sure you’re asking the right questions. We’ve gathered questions 14 key areas to ask vendors based on a few data sets — high-level thoughts from analyst firms like Forrester, the best questions prospective customers ask us, what we wish customers in certain verticals would ask, and more. It's thorough and it’ll give you a solid, informed place to start. Download the RFP template and get: ? A comprehensive list of 150+ questions in 14 key areas — and the business reasons behind asking them ? Recommendations for vertically-specific questions to ensure you’re including what’s most critical to getting your needs met
Tags : 
    
Urban Airship

Bring Your Own Device Policy Consideration

Published By: Good Technology Corporation     Published Date: Oct 23, 2012
As companies embrace the use of individual liable mobile devices to access corporate applications and data, Good provides guidance on creating individual liable usage policies.
Tags : 
byod, bring your own device, security, policy considerations, device, enterprise applications, business technology, virtualization, cloud computing
    
Good Technology Corporation

Ebook: Secure your entire mobile workforce. Say 'yes' to BYOD.

Published By: Good Technology Corporation     Published Date: Oct 23, 2012
Increase of BYOD programs in the enterprise has introduced questions to those in charge of enterprise mobility. Fierce MobileIT's ebook, "Securing the Mobile Workforce,"covers many of the trends and challenges of securing corporate data on a device.
Tags : 
byod, virtualization, enterprise applications, mobile, security, implementation, data management, business technology, data center
    
Good Technology Corporation

John Herrema Thought Leadership Paper "Collaboration without Compromise"

Published By: Good Technology Corporation     Published Date: Oct 23, 2012
Read this whitepaper to learn how to enable mobile collaboration while maintaining data security and strict end user privacy -whether on BYOD or a mix of corporate- and employee-owned devices.
Tags : 
virtualization, collaboration, enterprise applications, cloud computing, mobility management, mobile collaboration, business technology
    
Good Technology Corporation

Mobile Collaboration: 7 Pitfalls to Avoid

Published By: Good Technology Corporation     Published Date: Apr 29, 2013
Mobile collaboration is fast, efficient, and necessary. But before you spend your time and money on a solution, you’d better learn what works—and what doesn’t. Read this guide to learn what to consider, mistakes to avoid, and tips for data security.
Tags : 
mobile collaboration, secure collaboration, enterprise mobile applications, enterprise mobile apps, enterprise collaboration, employee collaboration
    
Good Technology Corporation

Toolkit: 4 Keys to Managing Social Media Risk Management

Published By: NAVEX Global     Published Date: Sep 05, 2013
Explore four important facets of managing social media use by employees in your organization. Craft a best practice social media policy and navigate the legal landscape, train employees, address retaliation, and take a comprehensive approach. View examples of organizations that have successfully and creatively implemented social media guidelines.
Tags : 
social media policy, risk management, best practices, policy management, social media training, social media laws, national labor relations act, nlra, retaliation, harassment, mobile training, risk assessment, data, culture assessment, program assessment
    
NAVEX Global

6 Ways Integrated Inventory Management Can Maximize Profitability For Your LBM Business

Published By: Epicor     Published Date: Nov 19, 2018
Managing inventory efficiently is one of the challenges that lumber and building material businesses face. Evolving technologies, including mobile functionality and connected business, offer opportunities for LBM business growth. With a deep understanding of the challenges facing lumber and building materials dealers, Epicor has identified six ways integrated inventory management can have a positive impact on your LBM business, including: • Operational efficiencies • Data access and Insights • Mobile functionality Epicor has a proven history growing profits and increasing efficiencies for lumber and building material businesses. Read this Epicor Tip Sheet and discover how your LBM business can benefit from integrated inventory with BisTrack.
Tags : 
lumber, building materials, lbm, erp, bistrack, lumber distributors
    
Epicor

Wi-Fi Emergency Call Case Study: The Wales Home

Published By: STANLEY Healthcare     Published Date: Mar 24, 2015
The Wales Home selected the STANLEY Healthcare AeroScout Resident Safety solution because of its ability to protect residents throughout the building and grounds, with every resident carrying a personal pendant to call for help at any time. Alerts are automatically directed to staff via Apple iPod® mobile digital devices, and activity is captured in a database for analysis. The Wales Home is also leveraging the AeroScout platform for temperature monitoring of its server room and refrigeration units. Read this case study to learn more about how The Wales Home increases resident safety and autonomy with STANLEY Healthcare’s AeroScout® Solutions.
Tags : 
resident safety, healthcare, nurse call systems, wi-fi, mobile devices, temperature monitoring
    
STANLEY Healthcare

Mobile Threat Detection & Remediation

Published By: MobileIron     Published Date: Feb 14, 2019
What if you could protect your company from data loss before a mobile attack occurs? The reality is that mobile threats are everywhere and the risks are escalating. But in the world of modern work, how can IT protect mobile devices while allowing users easy access to corporate data on a device of their choice anytime, anywhere? Watch this webinar on demand to learn how mobile threat defense is reducing risks amongst some of the largest mobility programs in the world. We will reveal: -How mobile attacks are targeting corporate data, bypassing traditional IT defenses -Why threat detection and remediation protects your data, without disrupting user productivity -Why mobile threat detection is an essential component of a layered defense architecture With one app, MobileIron Threat Defense delivers unparalleled mobile threat detection and remediation on-device without network connectivity required, and no need for users to take any action.
Tags : 
    
MobileIron

eBook: Connect the Cloud

Published By: Oracle     Published Date: Feb 21, 2018
The new integration demands of cloud, mobile, API and IoT technologies require a unified approach to integration that spans multiple integration channels. As the volume, variety, and velocity of data increases it is becoming more important to maintain effective communication among all elements of the architecture. Planning your cloud, hybrid, and on-premises integration needs? This free e-book will show you how the Oracle Cloud Platform for Integration can help you extend what is possible.
Tags : 
    
Oracle

Creating The Workspace of the Future – Today

Published By: VMware     Published Date: May 10, 2017
What is a digital workspace and what does it take to create one? If we break it down, the workspace is a portal for end users into all of their apps and online services that they canseamlessly and securely access across devices and locations. But what makes the workspace of today different from the desktop or mobile device of the past? And how can you move forward with delivering a digital workspace? Download this solution brief to learn how VMware® Workspace™ ONE™is designed to deliver a digital workspace that integrates device management, application delivery, and identity management into a single platform on your terms, via your data center, in the cloud, or through a combination of the two. This workspace can be accessed by your end users across devices and locations and be centrally secured and supported to streamline management and improve the quality of services you deliver across the entire organization.
Tags : 
    
VMware
Start   Previous    4 5 6 7 8 9 10 11 12 13 14 15 16 17 18    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.