mobile data

Results 176 - 200 of 703Sort Results By: Published Date | Title | Company Name

Dresner Wisdom of Crowds Report

Published By: Looker EMEA     Published Date: Sep 27, 2017
Want to know how Business Intelligence products vary in categories such as scalability, reliability, technical support, value for price paid, integrity, and whether the vendor is recommended? Read this report to get: • A side-by-side comparison of 28 BI tools • Ratings across 33 metrics for each vendor • Real customer feedback on performance
Tags : 
technology efficiency, cloud storage services, mobile devices, applications, online collaboration tools, client services, data encryption, remote access
    
Looker EMEA

Driving Growth Through Smarter Selling

Published By: Oracle     Published Date: Jan 13, 2014
Watch Oracle’s Thomas Kurian and Doug Clemmans as they explain: Why today’s sales processes have rendered many CRM systems obsolete How Oracle Sales Cloud enables smarter selling, leveraging mobile, social, and big data How smarter selling allows reps to sell more, managers to know more and companies to grow more. You’ll also hear from customers and see a demonstration of Oracle Sales Cloud’s “zero training” user interface. Register to watch now.
Tags : 
sales cloud, salesforce.com, mobile sales, social selling, sales analytics, territory management, sales quota management, sales performance management
    
Oracle

eBook on Software Defined Environments

Published By: IBM     Published Date: Apr 18, 2014
Infrastructure matters. Today’s business environment is increasingly dominated by mobile and cloud-based platforms, and by the skyrocketing volume of new data. And with 70 percent of the average organization's IT budget being spent on operations and maintenance, infrastructure must be simplified, adaptive and responsive. Those are the characteristics of the software defined environment: IBM’s optimized, customized, virtualized IT platform designed to replace systems that assign server, storage and network resources manually. This eBook serves as an essential introduction to SDEs: what they are, and why your organization needs them now more than ever.
Tags : 
ibm, software defined environments, sde, it infrastructure, workloads, it operations, optimization, software
    
IBM

eBook: Connect the Cloud

Published By: Oracle     Published Date: Feb 21, 2018
The new integration demands of cloud, mobile, API and IoT technologies require a unified approach to integration that spans multiple integration channels. As the volume, variety, and velocity of data increases it is becoming more important to maintain effective communication among all elements of the architecture. Planning your cloud, hybrid, and on-premises integration needs? This free e-book will show you how the Oracle Cloud Platform for Integration can help you extend what is possible.
Tags : 
    
Oracle

Ebook: Secure your entire mobile workforce. Say 'yes' to BYOD.

Published By: Good Technology Corporation     Published Date: Oct 23, 2012
Increase of BYOD programs in the enterprise has introduced questions to those in charge of enterprise mobility. Fierce MobileIT's ebook, "Securing the Mobile Workforce,"covers many of the trends and challenges of securing corporate data on a device.
Tags : 
byod, virtualization, enterprise applications, mobile, security, implementation, data management, business technology
    
Good Technology Corporation

Econsultancy: Digital Trends 2015

Published By: Adobe     Published Date: Jun 03, 2015
Download the 2015 Digital Trends report, created in partnership with Econsultancy, to see the trends and tools you need to provide exceptional customer experiences and to gain a competitive edge.
Tags : 
adobe, trends, content, experience, mobile, social, multichannel, video
    
Adobe

Efficient, Cost-Effective VDI Expansion on Converged Infrastructure

Published By: Dell EMC     Published Date: Feb 23, 2017
Business leaders are increasingly looking to IT to deliver a mobile workspace that allows employees to access corporate data, applications, and communication resources on their devices of choice. But making the most of the opportunity while minimizing risks can be complex and overwhelming for many IT teams. Therefore, it makes more sense than ever for IT leaders to consider virtual client computing (VCC), also commonly referred to as virtual desktop infrastructure (VDI) solutions.
Tags : 
    
Dell EMC

Eight Components Of A Successful BYOD Strategy

Published By: MobileIron     Published Date: Apr 11, 2018
MobileIron unified endpoint management (UEM) enables your employees to enjoy seamless access to business apps and data through secure mobile devices, desktops, and cloud services while still maintaining complete control over their privacy. Harness the power of secure modern devices, apps and cloud services to enable business innovation. With one app, enterprises can protect company data by detecting and remediating known and zero-day threats on the mobile device, and no need for users to take any action.
Tags : 
byod, strategy, endpoint, management, uem, business, applications, data
    
MobileIron

Eight Keys to Cloud Friendly Systems Management

Published By: Kaseya     Published Date: May 13, 2015
At the same time that organizations are moving many of their IT assets to the cloud, the problem of how to manage all of an organization’s IT assets has, in many ways, become more complex.
Tags : 
kaseya, hybrid, cloud, management, msp, mobile, big data, network architecture
    
Kaseya

Eight Steps to Fill the Mobile Enterprise Application Gap

Published By: Citrix     Published Date: Jul 25, 2014
Mobile devices and applications are quickly becoming as important and widespread in the enterprise as PCs and traditional business apps. Thanks to the consumerization of IT and bring-your-own-device (BYOD) programs, the workplace has expanded beyond the office and even the home to wherever the user happens to be. Traveling executives and Millennials alike expect to communicate, collaborate and access their important work applications and data from anywhere on whatever device they choose.
Tags : 
mobile, enterprise, application gap, pcs, byod, data, networking
    
Citrix

Email+ Enhances PIM Security and Preserves the Native App Experience

Published By: MobileIron     Published Date: Oct 29, 2018
For every mobile user, staying productive requires secure access to critical apps such as email, contacts, and calendar. These personal information management (PIM) apps are some of the most commonly used apps in the enterprise, so IT must ensure that users can seamlessly and securely access them on any device, including Android and iOS. The ultimate goal is to prevent data loss while preserving the native app experience users expect.
Tags : 
    
MobileIron

eMarketer's top digital trends for 2012 and beyond

Published By: Adobe     Published Date: Jun 29, 2012
Where should you be advertising in 2012? How will consumer behavior change the way you interact with your audience? What mobile trends will impact you most this year? Marketers, retailer, content owners and technology firms are more focused than ever on obtaining results from investments in digital marketing. If past years were about amassing data from the touch points between companies, 2012 will be about curating, filtering and measuring that information to drive outcomes.
Tags : 
adobe, marketing, emarketer, digital trends, digital marketing, advertising
    
Adobe

EMM Real Benefits in Today's Mobile World

Published By: VMware AirWatch     Published Date: May 19, 2016
The economy isn’t standing still. For your business to succeed, your employees shouldn’t either. That’s why companies of all types are moving to empower their mobile workforce and engage with customers in innovative ways. To realize their potential, enterprises need to find ways to make a mobile workforce as productive when they’re away from the office and on their mobile devices as they are in the office. This means mobility systems must give users a seamless experience across the ever-expanding types of mobile devices employees use, for easy access to business-critical applications. At the same time, it must deliver a secure workspace that complies with security regulations, protects devices, plus guards business and customer data, from expanding security threats.
Tags : 
innovation, best practices, mobile device, security, mobile workforce, access control, mobile computing, mobile data systems
    
VMware AirWatch

Empowering the Digital User: A New Paradigm for Directly Connecting People Within the Enterprise

Published By: Equinix     Published Date: Oct 20, 2015
Enterprises must prepare for the emerging digital user. Future interactions among people, whether enterprise employees, partners or customers, will be primarily digital and heavily influenced by mobile devices, social media, analytics and the cloud. User interactions with systems of record, such as databases and files, will largely give way to interactions with systems of engagement, such as social media.
Tags : 
enterprise, digital user, user interaction, systems of engagement, analytics and the cloud, mobile devices, social media, enterprise applications
    
Equinix

Empowering Your Mobile Worker

Published By: Box     Published Date: May 31, 2012
Here's how some of the nation's most progressive corporations are meeting the many needs of their mobile workers - without overwhelming their IT departments - with the help of Box.
Tags : 
mobile, mobile worker, communication devices, free online storage, online storage, file sharing, online file storage, share files online
    
Box

Enabling Better Patient Care Through Mobility: Insights for Healthcare Organizations

Published By: Comcast Business     Published Date: Mar 24, 2015
The digitization of data has empowered both healthcare providers and patients to improve how, when and where healthcare is administered, giving patients greater control over their personal health and well-being. The key to success lies in the ability to get the right information to the right people at the right time. And a crucial enabler of improved communications is the ability to transfer data across like and disparate systems through mobile technology. This was the topic at a recent focus group Comcast Business held at HIMSS14 that included healthcare IT professionals from six leading healthcare providers. The participants shared the following insights on how advancements in data mobility can engage the entire healthcare ecosystem and help improve patient outcomes. Download this white paper to learn more.
Tags : 
healthcare, patient care, communication, electronic health records, remote diagnostics, mobile technology, networking, security
    
Comcast Business

Endpoint Backup Compliance Considerations for HIPAA-regulated Enterprises

Published By: Druva     Published Date: Oct 02, 2017
To best address HIPAA compliance, maintain productivity, and mitigate risk in the mobile age, HIPAA-regulated enterprises need to ensure high standards of data security and privacy on all endpoint devices that contain or have access to protected health information (PHI). Get this white paper to learn: What HIPAA means for data on endpoint devices Features you should look for when evaluating endpoint backup solutions How to maintain HIPAA compliance whether data is stored on-premise or in the cloud What other organizations are doing to comply with HIPAA/HITECH
Tags : 
hipaa, hipaa compliance, risk mitigation, data security, endpoint devices, protected health information
    
Druva

Endpoint Data Protection: A Buyer’s Checklist

Published By: Commvault     Published Date: Jul 06, 2016
ENDPOINT DATA. It’s often one of the most forgotten aspects of an enterprise data protection strategy. Yet, content on laptops, desktops and mobile devices is among a company’s most valuable data even while it’s potentially at the greatest risk. According to IDC there will be some 1.3 billion mobile workers by 2015. However, only half of enterprises today are using some type of endpoint backup. That means that the volume of endpoint data that is in jeopardy is nothing short of significant. Download to read the buyer's checklist on endpoint data protection!
Tags : 
commvault, endpoint data protection, endpoint data, data protection, backup, encryption, data loss prevention, mobile app
    
Commvault

Endpoint Data Protection: A Buyer’s Checklist

Published By: Commvault     Published Date: Jul 06, 2016
ENDPOINT DATA. It’s often one of the most forgotten aspects of an enterprise data protection strategy. Yet, content on laptops, desktops and mobile devices is among a company’s most valuable data even while it’s potentially at the greatest risk. According to IDC there will be some 1.3 billion mobile workers by 2015.1 However, only half of enterprises today are using some type of endpoint backup.2 That means that the volume of endpoint data that is in jeopardy is nothing short of significant.
Tags : 
encryption, data loss prevention, mobile app
    
Commvault

Endpoint Security Must Get Better

Published By: CDW-Trend Micro     Published Date: Mar 26, 2015
Endpoint security is at a critical juncture. Increasingly, employees at organizations of all sizes are using a wider variety than ever of desktop and mobile devices, including smartphones, tablets and laptops, as they work from broadly dispersed locations, including home offices. Often, organizations are permitting and even encouraging employees to use their own devices under BYOD (bring your own device) policies. With these devices, employees are accessing not only corporate data and applications, but also social media, banking and shopping sites. Download this white paper to learn more about endpoint security.
Tags : 
endpoint security, desktop devices, mobile devices, byod, corporate data, technology, networking, security
    
CDW-Trend Micro

Endpoint Security: Fighting Cyber Crime with Automated, Centralized Management

Published By: Kaseya     Published Date: May 13, 2015
To win the ongoing war against hackers and cyber criminals, IT professionals must do two things: Deploy and maintain endpoint security tools with the latest updates, and ensure the software applications running in their networks have the latest available patches.
Tags : 
kaseya, hybrid, cloud, management, msp, mobile, big data, security
    
Kaseya

Enhancing Customer 360 with Data Analysis & Visualization

Published By: AWS - ROI DNA     Published Date: Jun 12, 2018
Achieving a 360-degree view of customers has become increasingly challenging as companies embrace omni-channel strategies, engaging customers across websites, mobile, call centers, social media, physical sites, and beyond. Learn how software solutions in AWS Marketplace can automate data lake analysis, enabling self-service platforms for analysis that expand and enhance personalization while deepening customer understanding so you can spend more time acting on insights.
Tags : 
    
AWS - ROI DNA

Enterprise architects challenged to manage data explosion

Published By: Red Hat     Published Date: Jun 09, 2014
Read this whitepaper to find out how Red Hat Storage Server can allow enterprises to quickly and confidently deliver business applications that minimize cost, complexity, and risk while increasing architectural flexibility.
Tags : 
red hat, data explosion, business applications, enterprise architects, mobile, social, data platforms, digital media
    
Red Hat

Enterprise architects challenged to manage data explosion

Published By: Red Hat     Published Date: Jun 10, 2014
Read this whitepaper to find out how Red Hat Storage Server can allow enterprises to quickly and confidently deliver business applications that minimize cost, complexity, and risk while increasing architectural flexibility.
Tags : 
red hat, data explosion, business applications, enterprise architects, mobile, social, data platforms, digital media
    
Red Hat

Enterprise Content Management: Four things line of business leaders need to know

Published By: IBM     Published Date: Jul 14, 2015
An Aberdeen white paper on ECM in the Cloud.
Tags : 
content management, mobile, cloud, collaboration, management solutions, enterprise content, data, data management
    
IBM
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.