mobile app

Results 526 - 550 of 1385Sort Results By: Published Date | Title | Company Name

Forrester Report on Mobile Engagement

Published By: Urban Airship     Published Date: Apr 17, 2014
In this October 2013 report, Forrester Research, Inc. says push notifications are the ideal tool, combining the unique benefits of mobile marketing: intimacy, immediacy and context.
Tags : 
urban airship, mobile engagement, mobile marketing, push notification, mobile, mobile app, conversion rate, direct marketing strategy
    
Urban Airship

Forrester Report: Contact Centers Must Go Digital or Die

Published By: Oracle Service Cloud     Published Date: Mar 23, 2016
Consumer preference for customer service channels is changing across all ages and demographics. Adoption of digital customer service channels, with an emphasis on self-service channels such as web and mobile, is exploding as consumers expect relevant and seamless omnichannel customer service. However, firms’ technology and staffing plans are not keeping up with consumer demand for digital customer service. This report outlines communication channel customer use and major gaps in contact center technology and operations. It also provides data that will help application development and delivery (AD&D) pros align operations with customer expectations to garner their satisfaction and long-term loyalty.
Tags : 
oracle, service cloud, forrester report, contact centers, application integration, best practices, business analytics, business intelligence
    
Oracle Service Cloud

Forrester Report: Transform and Protect Your Mobile Moments with Seamless Authentication

Published By: Okta     Published Date: Apr 29, 2015
Creating mobile apps that capture the minds and wallets of your customers will lead to increased revenue and improved customer engagement. However, you must do so while protecting customers’ privacy and shielding them from fraud and other malicious activities. This report will help S&R pros understand the growing mobile authentication market and its transformative impact on customers’ mobile moments.
Tags : 
mobile, apps, mobile apps, s&r, fraud, okta, security, it management
    
Okta

Forrester Report: “Balance Self-Service Analytics And Governance To Achieve Business Success”

Published By: Oracle Analytics     Published Date: Oct 06, 2017
Empowered with mobile and cloud-based access to a myriad of products and services, customers now have a variety of options at their fingertips with regards to partnerships. Enterprises that do not follow the ever-changing tastes and preferences of their customers, or that wait too long to react, will fall behind and fail. Across functions, business professionals readily require big data tools and insights to understand and serve these customers. It is no longer an option for business users to rely on IT to deliver customer and other relevant analytics. On the flipside, handing the analytics reins entirely to business users can make governance nearly impossible. Organizations must find balance in a new approach in which IT mostly governs and curates data while business users are empowered to derive insights from data mostly ontheir own without delay.
Tags : 
    
Oracle Analytics

Forrester Wave: Enterprise Mobile Management Q3 2014, IBM is a Leader

Published By: IBM MaaS360     Published Date: Apr 16, 2015
Read about 27 critical criteria of mobile concern, 15 vendors ranked on current offering and strategy, and the 10 providers leading the pack.
Tags : 
fiberlink, mobile users, strategy, app enabled, scalability, security, device management, enterprise
    
IBM MaaS360

Forrester WP - Converged Infrastructure: Ready For The Next Phase

Published By: HP and Intel ®     Published Date: May 27, 2014
On behalf of HP, Forrester Consulting conducted research regarding the acceptance and benefits of converged infrastructure (CI) among medium-size to very large enterprises during the second quarter of 2013. Read this white paper sponsored by HP and Intel® to learn the rest of Forrester's conclusions.
Tags : 
intel, converged infrastructure, mobile users, applications, virtualization, enterprises, it management, enterprise applications
    
HP and Intel ®

Forrester WP - Converged Infrastructure: Ready For The Next Phase

Published By: HP     Published Date: May 27, 2014
On behalf of HP, Forrester Consulting conducted research regarding the acceptance and benefits of converged infrastructure (CI) among medium-size to very large enterprises during the second quarter of 2013. Read this white paper sponsored by HP and Intel® to learn the rest of Forrester's conclusions.
Tags : 
intel, converged infrastructure, mobile users, applications, virtualization, enterprises, it management, enterprise applications
    
HP

Forrester's Shopping Guide for Mobile Application Performance Management Solutions

Published By: HP Software     Published Date: Oct 20, 2015
Mobile strategy to transform into a digital business.
Tags : 
mobile application, management, solutions, performance, mobile strategy, operations, infrastructure, business intelligence
    
HP Software

Forrester: Mobile App Discovery: Best Practices To Promote Your App

Published By: Adobe     Published Date: Feb 20, 2014
Most brands would love to have their apps among the top 25 most downloaded apps on the Apple App Store or Google Play. With more than one million apps available, there’s a great risk that your app won’t stand out from the crowd. Marketers need to make sure their core target audiences will first download and then regularly use their apps, without spending huge promotion budgets. This report will analyze how consumers discover apps and will provide some guidelines on how to promote your apps.
Tags : 
forrester, adobe, mobile app promotion, mobile app, mobile applications, apps, mobile marketing, promotion
    
Adobe

Forward-Thinking CIOs Use Okta to Build Their Digital Businesses Type: Video

Published By: Okta     Published Date: Jul 27, 2016
IT leaders at FICO, Rotary International, Informatica, and many other leading organizations are becoming strategic business enablers and creating new ways to engage customers and partners with Okta. Watch this short video to learn how these IT leaders are driving business results with Okta.
Tags : 
identity, idaas, iam, identity lifecycle management, mobile, provisioning, active directory, security
    
Okta

Four Pitfalls Hindering Mobile App Success

Published By: OutSystems     Published Date: Mar 18, 2015
In this white paper we describe the top four issues that cause mobile projects to fail and outline a path that can take you safely around these common pitfalls and put you on track to delivering a powerful, flexible mobile application strategy.
Tags : 
application development, mobile app development, mobile app pitfalls, a guide to mobile app success, application performance management, best practices, research
    
OutSystems

Four Questions Guide Web Mobile Content Management Plans

Published By: Adobe     Published Date: Oct 19, 2012
As consumers access online content on more devices - computers, smartphones, tablets and even gaming consoles - managing and delivering digital content has grown exponentially more complex. Learn how rethinking WCM will help you thrive in complexity.
Tags : 
mobile content management, cms, content management systems, wcm, web content management, mobile content planning, mobile applications, software development
    
Adobe

Four Steps to Effectively Protecting Your Organization from Phishing Attacks

Published By: Cyveillance     Published Date: Jun 20, 2014
Phishing is defined by the Financial Services Technology Consortium (FSTC) as a broadly launched social engineering attack in which an electronic identity is misrepresented in an attempt to trick individuals into revealing personal credentials that can be used fraudulently against them. In short, it’s online fraud to the highest degree. Although it’s been around for years, phishing is still one of the most common and effective online scams. The schemes are varied, typically involving some combination of spoofed email (spam), malicious software (malware), and fake websites to harvest personal information from unwitting consumers. The explosive rise of mobile devices, mobile applications, and social media networks has given phishers new vectors to exploit, along with access to volumes of personal data that can be used in more targeted attacks or spear phishing. The fact that phishing attacks are still so common highlights their efficacy and reinforces the need to implement comprehensive phishing and response plans to protect organizations. An effective phishing protection plan should focus on four primary areas: Prevention, Detection, Response, and Recovery. High-level recommendations for each of the four areas are outlined in this whitepaper.
Tags : 
cyveillance, phishing, security, cyberattacks, cybercriminals, threats
    
Cyveillance

Four Tips for Driving Mobile Advertising Success

Published By: appia     Published Date: Jan 21, 2014
Behind every successful app is a great user acquisition strategy. In our whitepaper, Four Tips for Driving Mobile Advertising Success, learn four essential tactics creating successful mobile advertising program.
Tags : 
appia, mobile marketing, mobile targeting, localization, tracking, app marketing, iphone, blackberry
    
appia

Four Ways to Satisfy the Modern User – Without Losing Your Sanity

Published By: Cherwell Software     Published Date: Sep 22, 2015
The next generation user expects more do-it-yourself IT offerings. Whether it’s self-service portals with interfaces to rival Amazon or personal mobile devices with 24/7 business access, users are requesting more self-service functions and capability. To the modern user of technology “consumer-grade” has become a standard, and it’s ITs’ job to not only appease but genuinely satisfy contemporary users. This research highlights four ways to satisfy the modern user who brings their own knowledge, devices, applications and technical expectations to the workplace.
Tags : 
business enablement, cloud applications, cloud computing, cloud infrastructure, cloud strategy, customer relationship management, customer satisfaction, business intelligence
    
Cherwell Software

Free Guide: Delivering The Ultimate Mobile Fan Experience w/iBeacon

Published By: Phunware     Published Date: Jun 24, 2014
For event producers and franchise owners, keeping fans engaged and committed is crucial to maintaining and growing the business’ success. Download our guide and get insight on, why event marketers are losing touch with fans, why move to mobile and how to increase fan engagement—both at the event and beyond.
Tags : 
sports franchises, mobile apps for fans, sports team mobile app
    
Phunware

Free white paper: “Revolutionizing the Professional Services relationship with Time”

Published By: Intapp     Published Date: Jan 09, 2019
Intapp Time provides superior business intelligence thatchangesyour firm’sfundamental relationship with time.Thisunified suite of applications gives timekeepers access to time data and capture wherever they are: in the office, on a mobile device, online and offline.It is user-centric, offering a completely automated option while fullysupporting hands-on tracking—contemporaneous or reconstructionist.Intapp Time helps your business mine time data to reveal new sources of revenue, inform staff decisions, increase project efficiency, and reduce time leakage.
Tags : 
business, business intelligence, time, tax, time for tax, intapp, applications, time data
    
Intapp

From idea to production in minutes: IBM DevOps for Bluemix short-circuits development headaches

Published By: IBM     Published Date: Nov 19, 2014
IBM DevOps for Bluemix provides an integrated set of DevOps services in the IBM Bluemix PaaS, for individuals and teams building mobile and cloud applications (‘systems of engagement’) that enable teams to shrink the application delivery cycle time, and consistently deliver software with speed, quality and accuracy. This session provides an overview of IBM DevOps services on Bluemix, focusing on quickly getting started with new projects and collaborative development with agile tracking and planning.
Tags : 
ibm, bluemix, devops, collaborative development, productivity, networking, software development, it management
    
IBM

From Mobile to Desktop - And Back Again

Published By: EPiServer Inc.     Published Date: Sep 16, 2013
Traditional multi-channel thinking simply does not deliver the results most businesses and, more importantly, their customers demand. Today, it's critical to go beyond thinking in terms of "multi-channel" and start focusing on unifying content across screens—only forking content to real channels such as social media and mobile apps. It's vital to really understand the user's context and to intelligently re-use and re-format content blocks to deliver the right experience at the right time on the right screen or channel. Download this eBook for 6 ways to rethink content when structuring and managing online properties.
Tags : 
multi-channel marketing, multi-screens, content delivery, cross-channel experience
    
EPiServer Inc.

Frost & Sullivan Innovation Report: 2015 Global Next-Gen Enterprise Mobility Solutions

Published By: Citrix Systems, Inc.     Published Date: Jan 27, 2016
Future workplace structures are envisioned to be a scenario wherein employees are likely to use a multitude of connected mobile devices and apps that will offer compelling new work style experiences integrating voice, video and data access services.
Tags : 
citrix, frost & sullivan, next-gen, enterprise, infrastructure, ip networks, network security, access control
    
Citrix Systems, Inc.

Fulfilling the Promise of the Digital Workspace

Published By: VMware AirWatch     Published Date: Jul 19, 2017
There’s no denying that today’s workforce is “mobile.” Inspired by the ease and simplicity of their own personal devices, today’s workforce relies on a variety of tools to accomplish their business tasks — desktops, smart phones, tablets, laptops or other connected devices — each with varying operating systems.  The specific tasks they need to accomplish? That depends on the person. But it’s safe to say remotely logging in and out of legacy, desktop, mobile, software as-a-service (SaaS) and cloud applications is a given. And the devices on which they work? They could be owned by the enterprise or the end user, with varying levels of company oversight, security and management. The result? An overabundance of “flexibility” that leads to fundamental IT challenges of security and manageability.
Tags : 
    
VMware AirWatch

Fulfilling the Promise of the Digital Workspace

Published By: VMware     Published Date: Jul 24, 2017
There’s no denying that today’s workforce is “mobile.” Inspired by the ease and simplicity of their own personal devices, today’s workforce relies on a variety of tools to accomplish their business tasks — desktops, smart phones, tablets, laptops or other connected devices — each with varying operating systems.  The specific tasks they need to accomplish? That depends on the person. But it’s safe to say remotely logging in and out of legacy, desktop, mobile, software as-a-service (SaaS) and cloud applications is a given. And the devices on which they work? They could be owned by the enterprise or the end user, with varying levels of company oversight, security and management. The result? An overabundance of “flexibility” that leads to fundamental IT challenges of security and manageability.
Tags : 
    
VMware

Full API Lifecycle Management

Published By: CA Technologies EMEA     Published Date: May 23, 2018
Increasingly, enterprises are opening their data and applications to partners, developers, mobile apps and cloud services. APIs provide a standardized way to open up information assets across the web, mobile devices, serviceoriented architecture (SOA) and the cloud. However, to make API information sharing safe, reliable and cost-effective, enterprises must deal with critical security, performance management and data adaptation challenges. CA API Management combines advanced functionality for back-end integration, mobile optimization, cloud orchestration and developer management. It is unique in its ability to address the full breadth of enterprise API management challenges.
Tags : 
    
CA Technologies EMEA

Gain visibility over your automotive supply chain

Published By: HERE Technologies     Published Date: Sep 26, 2019
A utomobile manufacturers find meeting the requirements of a just - in - time supply chain one of their biggest challenges , but with advances in location technology manufacturers can meet even the strictest shipping deadlines . With better visibility across the supply chain auto manufacturers can drive down costs, improve efficiency and support proactive decision making. By reading this eBook, you’ll discover how to p repar e your supply chain for the future wit h the application of location intelligence to: ? Gain location - based insights to help optimize processes and inform decision making ? Set accurate ETAs with reliable real - time information ? Use real - time visibility to proactively solve problems ( like bottlenecks ) as they occur ? Gain comprehensive coverage of assets and trace them across factories, warehouses, showrooms and in transit
Tags : 
    
HERE Technologies

Game Changing Cyber Defense Strategies

Published By: Fidelis Cybersecurity     Published Date: May 15, 2019
Its the start of a new year and amidst the countless predictions flooding the internet, one things for certain 2019 is shaping up to be the year of cloud adoption. Analysts are expecting that enterprise adoption of cloud will ramp up significantly, but with this migration and the continued adoption of mobile and IoT technologies, the attack surface is changing dramatically and this has major implications for security. Fundamentally, security boundaries extend from on premises infrastructure to cloud service provider environments where perimeters no longer exist. Organizations cannot defend themselves with the same strategies and tactics that applied when it did. In this brave new world of cloud, IoT and mobile technology, organizations must be agile and shift, extend, and evolve their perimeter-based defense practices to those that are more robust. Further, a comprehensive defense in depth approach enables defense of high value assets amidst a more unpredictable cyber security landsca
Tags : 
    
Fidelis Cybersecurity
Start   Previous    15 16 17 18 19 20 21 22 23 24 25 26 27 28 29    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.