mobile apps

Results 151 - 175 of 459Sort Results By: Published Date | Title | Company Name

Application Consternation: Why App Decisions May Be The Most Important Ones You Make

Published By: Enterprise Mobile     Published Date: Oct 09, 2013
Enterprise app decisions may be some of the most important decisions you make. This brief will help guide your organization by providing valuable insight on delivering, supporting and securing mobile apps.
Tags : 
mobility-as-a service, managed mobility services, mobile application management, mam, apps, enterprise mobile, mobility, enterprise mobility, mobile strategy, mobile security, mobile management, device management, enterprise mobile devices, mobile device management
    
Enterprise Mobile

Application Consternation

Published By: Enterprise Mobile     Published Date: Jul 14, 2014
The right apps can enhance employee productivity, reduce expenses and increase profitability which means apps decisions are among the most important decisions your organization makes. This brief addresses everything from app costs to how choose the right platform to build on.
Tags : 
managed mobility services, mobility-as-a service, enterprise mobile, mobility, enterprise mobility, mobile management, device management, mobile applications, mobile apps, application management, wireless, business technology
    
Enterprise Mobile

Application Consternation

Published By: Enterprise Mobile     Published Date: Dec 04, 2014
Employees today want more—and they need more—if they’re going to stay productive from anywhere, which is usually the primary goal of having mobile devices in the first place. The right apps can enhance employee productivity, reduce expenses, and increase profitability which means that the decisions you make about the apps your organization uses are among the most important decisions your organization makes. No pressure, right? Our Mobile Application Development solution brief covers: App delivery Providing support for apps Securing apps
Tags : 
managed mobility services, mobility-as-a service, enterprise mobile, mobility, enterprise mobility, mobile management, device management, mobile applications, mobile apps, application management, wireless, it management, knowledge management, enterprise applications, data management
    
Enterprise Mobile

Why a Mobility Strategy Matters

Published By: Enterprise Mobile     Published Date: Dec 04, 2014
A revolution is taking place, and it’s happening in every corporate office across the globe. Mobile devices have completely transformed the way we work, and with the increasing capabilities of the next generation of devices, the need to incorporate mobility into your strategic planning is only going to increase.
Tags : 
managed mobility services, mobility-as-a service, enterprise mobile, mobility, enterprise mobility, mobile management, device management, mobile applications, mobile apps, application management, it management, wireless, knowledge management, enterprise applications
    
Enterprise Mobile

From Mobile to Desktop - And Back Again

Published By: EPiServer Inc.     Published Date: Sep 16, 2013
Traditional multi-channel thinking simply does not deliver the results most businesses and, more importantly, their customers demand. Today, it's critical to go beyond thinking in terms of "multi-channel" and start focusing on unifying content across screens—only forking content to real channels such as social media and mobile apps. It's vital to really understand the user's context and to intelligently re-use and re-format content blocks to deliver the right experience at the right time on the right screen or channel. Download this eBook for 6 ways to rethink content when structuring and managing online properties.
Tags : 
multi-channel marketing, multi-screens, content delivery, cross-channel experience
    
EPiServer Inc.

Mobile Banking: Staying Relevant with Customers' Changing Needs

Published By: Epsilon     Published Date: Aug 23, 2012
As competition increases, financial institutions need to enhance the overall mobile banking experience to stay relevant and better meet customers' demands and constantly changing needs.
Tags : 
mobile banking, mobile sites, text banking, mobile apps, mobile behavior
    
Epsilon

Why the Hybrid Cloud Makes Sense

Published By: Equinix     Published Date: May 18, 2015
This white paper explores how CIOs and business leaders need to think much more broadly about how their technology fits into a global network of services due to the rise of cloud infrastructure, software as a service, the global data foot­print, and mobile apps.
Tags : 
hybrid cloud, technology, data center, global network, cloud computing, cloud, cloud infrastructure, mobile apps, software, cloud design challenges, public cloud, private cloud, public cloud vs private cloud, proximity, public cloud limits, benefits of hybrid cloud, network management, mobile computing, mobile data systems, virtualization
    
Equinix

Customer Success Story: Mobile (French)

Published By: Equinix     Published Date: Jul 13, 2016
This case study illustrates how mobile's performance is improved by a 70% reduction in latency, from 12 ms to 5 ms using Equinix and AWS Direct Connect.
Tags : 
mobile, mobility, mobile performance, mobile devices, gaming, mobile apps, mobile computing, mobile data systems, mobile workers, smart phones, customer relationship management
    
Equinix

Automotive Finance and lending – industry competition is speeding up. Can you stay ahead?

Published By: FICO     Published Date: Jun 15, 2017
Consumers financing a new or used vehicle have more choices than ever before and rising expectations for great experiences on digital and through mobile apps show no sign of slowing.
Tags : 
    
FICO

Keep Your Application Fleet Flying Risk Free

Published By: Flexera     Published Date: Apr 17, 2019
How is enterprise security like a commercial airliner? Preventative maintenance and regular, in-depth inspections keep jumbo jets operating safely, and the same approach will protect your enterprise security, too. When you consider the widespread security vulnerabilities, the massively intertwined application dependencies, the diversity of deployment environments, and the potential device takeover of mobile apps, keeping your applications safe is a mind-boggling job. Traditional manual approaches are no longer practical. Our exclusive white paper, “Keeping Your Application Fleet Flying Risk Free,” will help you establish the preflight checks and regular inspections that keep the applications in your portfolio running reliably and securely. Download it today.
Tags : 
    
Flexera

Keep Your Application Fleet Flying Risk Free

Published By: Flexera     Published Date: Apr 19, 2019
How is enterprise security like a commercial airliner? Preventative maintenance and regular, in-depth inspections keep jumbo jets operating safely, and the same approach will protect your enterprise security, too. When you consider the widespread security vulnerabilities, the massively intertwined application dependencies, the diversity of deployment environments, and the potential device takeover of mobile apps, keeping your applications safe is a mind-boggling job. Traditional manual approaches are no longer practical. Our exclusive white paper, “Keeping Your Application Fleet Flying Risk Free,” will help you establish the preflight checks and regular inspections that keep the applications in your portfolio running reliably and securely. Download it today.
Tags : 
    
Flexera

It's Time to Rethink Data Security

Published By: Forcepoint     Published Date: May 14, 2019
Things are not as they used to be in the enterprise. Today’s employees are mobile, they’re storing and accessing data in cloud apps, and are in disparate networks. While the present-day digital world has changed, the objective of data protection has not: you must still ensure the security of your critical data and intellectual property. However, the threat-centric security approach, with its static policies forces decisions about cyber activity with no insight into the broader context. The result is a disproportionate number of flagged activities, overwhelming security teams who have no way to understand the ones most worthy of investigation. Read Rethinking Data Security with a Risk-Adaptive Approach to learn how a human-centric, risk-adaptive approach can help your organization be more proactive in order to: • Automate policy enforcement to deter data loss events • Reduce the number of security alerts • Cut down on incident investigation time
Tags : 
    
Forcepoint

Rethinking Data Security with a Risk-Adaptive Approach

Published By: Forcepoint     Published Date: Jun 06, 2019
Things aren't what they used to be in the enterprise. Your employees are mobile and they're storing and accessing data in cloud apps—often in disparate networks. That presents a serious challenge for old-school threat-centric security models that force you to make decisions with little insight or broader context. Download our eBook to find out how a human-centric, risk-adaptive approach to data security can free up your overwhelmed security team to focus on investigations that really matter.
Tags : 
    
Forcepoint

Next Gen Your Data Protection

Published By: Forcepoint     Published Date: Jun 06, 2019
Things are not as they used to be in the enterprise. Today’s employees are mobile, they’re storing and accessing data in cloud apps, and are in disparate networks. While the present-day digital world has changed, the objective of data protection has not: you must still ensure the security of your critical data and intellectual property without impacting an employee’s ability to do their job. The key is to gain visibility into user interactions with data and applications. Once this is achieved, you can apply a level of control based on the specific user’s risk and the sensitivity or value of the data. An organization’s data protection program must consider the human point — the intersection of users, data and networks. Enterprises must remain vigilant of data as it moves across hybrid environments and highlight the users who create, touch and move data who may pose the greatest risk to an organization.
Tags : 
    
Forcepoint

Technical White Paper: Secure Mobile Workflows

Published By: Good Technology Corporation     Published Date: Mar 19, 2013
Learn how to move beyond single task apps and enable the app workflows that help keep your mobile workforce productive and secure.
Tags : 
mobile collaboration, secure collaboration, secure mobile application, enterprise mobile applications, enterprise mobile apps, enterprise collaboration, business case
    
Good Technology Corporation

Mobilize Your LOBs with Mobile Apps

Published By: Good Technology Corporation     Published Date: Mar 19, 2013
Mobile apps are the key to productivity and are proving to be a competitive advantage for enterprises across every industry. “Are you App Able”, shows how companies today are capitalizing on secure mobile apps to drive LOB advantages and revenue.
Tags : 
mobile collaboration, secure collaboration, secure mobile application, enterprise mobile applications, enterprise mobile apps, enterprise collaboration
    
Good Technology Corporation

Mobile Collaboration: 7 Pitfalls to Avoid

Published By: Good Technology Corporation     Published Date: Apr 29, 2013
Mobile collaboration is fast, efficient, and necessary. But before you spend your time and money on a solution, you’d better learn what works—and what doesn’t. Read this guide to learn what to consider, mistakes to avoid, and tips for data security.
Tags : 
mobile collaboration, secure collaboration, enterprise mobile applications, enterprise mobile apps, enterprise collaboration, employee collaboration
    
Good Technology Corporation

New Guide: 10 Essential Mobile App Security Questions

Published By: Good Technology Corporation     Published Date: Apr 29, 2013
Mobile apps are the ultimate corporate dilemma: They turbo-charge productivity—but also bring security risks. You need a mobile app security strategy to navigate the challenge. Read this guide to learn the top 10 must-haves as you build yours.
Tags : 
mobile applications, mobile security, mobile application management, mobile app security, secure mobile application, enterprise mobile applications
    
Good Technology Corporation

APIs: The New Marketing Platform

Published By: Google Apigee APAC     Published Date: Jun 10, 2019
Five things every CMO should know about APIs. APIs power the digital marketing channels and the applications we use today. They are a window to your company’s digital assets, exposing them so that developers and partners can build mobile apps and become an extension of your innovation engine. APIs are the technology that brings the CIO and the CMO together. In this ebook, see how a strong partnership between the CIO and CMO, centered around the customer, is essential to the success of today’s API-powered digital businesses. What’s inside? APIs open opportunities for new distribution channels APIs connect businesses and enable growth with partners and developers APIs are the foundation for data exchange in digital ecosystems APIs create more customer value with existing business assets Fill out the form to get the ebook and receive a copy via email.
Tags : 
    
Google Apigee APAC

Ponemon Institute 2017 State of Mobile and IoT Application Security Study

Published By: Group M_IBM Q1'18     Published Date: Jan 16, 2018
Are you up-to-speed with the latest trends in mobile and Internet of Things (IoT) application security testing? Our recent Ponemon Institute study reveals key findings about organizations' ability to protect their mobile and IoT apps. Read our report to learn how well you stack up against your peers in securing your most critical mobile and IoT applications.
Tags : 
iot, ponemon institute, mobile application security, application security
    
Group M_IBM Q1'18

Boost your mobile ROI with powerful Cognitive Insights from IBM MaaS360

Published By: Group M_IBM Q2'19     Published Date: May 03, 2019
"Managing and securing endpoints with conventional mobile device management (MDM) or enterprise mobile management (EMM) solutions is time-consuming and ineffective. For this reason, global IT leaders are turning towards unified endpoint management (UEM) solutions to consolidate their management of smartphones, tablets, laptops and IoT devices into a single management console. To increase operational efficiency, maximize data security and deliver on their digital transformation goals, they’ll need a UEM platform that does more than just promise success. The answer is a smarter solution, built for today, that brings new opportunities, threats, and efficiency improvements to the forefront. With Watson™, IBM® MaaS360® UEM features cognitive insights, contextual analytics, and cloud-sourced benchmarking capabilities. It helps you make sense of daily mobile details while managing your endpoints, users, apps, document, and data from one platform."
Tags : 
    
Group M_IBM Q2'19

CISOs Investigate: Endpoint Security Peer-authored Research

Published By: Group M_IBM Q418     Published Date: Nov 07, 2018
The rise of the cloud and mobile computing has rapidly changed the nature of enterprise cybersecurity. The old paradigm, where all work was done behind a company firewall, has been breaking down. Employees work not just at the office, but also on the road and at home, on mobile devices and on their own personal computers. They’re no longer using a limited stack of enterprise applications. Instead, they increasingly require access to a wide variety of apps, cloud services, and new communication platforms.
Tags : 
    
Group M_IBM Q418

Testing Mobile Applications

Published By: Harry lei     Published Date: Apr 04, 2011
An approach towards solving the emerging technological implications of Mobile Apps. MOBILE is Accelerating.
Tags : 
i phone applications testing, blackberry applications testing, android applications testing, agile, saas, i pad applications testing, software compliance
    
Harry lei

The State of Connected In-Car Navigation Whitepaper, Written by ABI Research

Published By: HERE Technologies     Published Date: Dec 18, 2018
Are automakers re-inventing the wheel with every new navigation program without creating user value? Users movement towards free mobile apps that mirror to in-dash screens may be the symptom of a negative cost-benefit perception. But the automotive industry has an opportunity to change these market dynamics. By delivering compelling experiences that leverage their core advantages, OEMs can create touchpoints for recurring revenue streams from the IVI. This white paper from ABI Research discusses the state of the connected navigation market, the challenges OEMs face, the industry paradigms blocking OEMs from creating customer value, and the advantages OEMs could leverage.
Tags : 
location data, navigation, automotive
    
HERE Technologies

Hyperconverged Platforms: ROI for the Mid-Enterprise

Published By: Hewlett Packard Enterprise     Published Date: Aug 02, 2017
Enterprises are looking to innovations like big data, cloud-based services and mobile apps to improve decision making and accelerate business results. But legacy IT implementations—independent compute, storage and networking platforms, veneered with a hypervisor— often can’t deliver on the increased agility, scalability and price performance demands of this new era of IT.
Tags : 
information technology, networking platforms, return on investment, cloud-based services, mobile apps
    
Hewlett Packard Enterprise
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.