mobile strategy

Results 251 - 275 of 336Sort Results By: Published Date | Title | Company Name
Published By: IBM MaaS360     Published Date: Apr 15, 2015
Manufacturing: The Bring Your Own Device (BYOD) policies that thrive in other industries are gaining momentum in manufacturing as well.
Tags : 
fiberlink, mobile users, strategy, app enabled, scalability, security, device management, enterprise, byod, manufacturing
    
IBM MaaS360
Published By: IBM MaaS360     Published Date: Apr 15, 2015
With Mobile Device Management (MDM), Retail IT can ensure security of information across iPhones, iPads and Android devices.
Tags : 
fiberlink, mobile users, strategy, app enabled, scalability, security, device management, enterprise, byod, retail
    
IBM MaaS360
Published By: IBM MaaS360     Published Date: Apr 16, 2015
Android: With each new confectionary code name, Google’s mobile OS makes new strides to remain flexible while making a shell so hard hackers will crack their teeth biting in.
Tags : 
fiberlink, android, mobile users, strategy, app enabled, scalability, security, device management, enterprise, byod
    
IBM MaaS360
Published By: IBM MaaS360     Published Date: Apr 16, 2015
The Gartner Magic Quadrant is one of the most influential research tools that IT buyers use to evaluate enterprise mobility security vendors.
Tags : 
mobile users, strategy, app enabled, scalability, security, device management, enterprise, byod
    
IBM MaaS360
Published By: IBM MaaS360     Published Date: Apr 16, 2015
For a deeper dive into the EMM shift, Aragon sheds light on the need for secure and managed sharing of content to mobile devices.
Tags : 
fiberlink, mobile users, strategy, app enabled, scalability, security, device management, enterprise, byod
    
IBM MaaS360
Published By: IBM MaaS360     Published Date: Apr 16, 2015
Read about 27 critical criteria of mobile concern, 15 vendors ranked on current offering and strategy, and the 10 providers leading the pack.
Tags : 
fiberlink, mobile users, strategy, app enabled, scalability, security, device management, enterprise, byod
    
IBM MaaS360
Published By: IBM MaaS360     Published Date: Jul 09, 2015
Read about 27 critical criteria of mobile concern, 15 vendors ranked on current offering and strategy, and the 10 providers leading the pack.
Tags : 
enterprise mobile management, emm, ibm, vendors, mobile management strategy, networking, security, it management, wireless
    
IBM MaaS360
Published By: IBM MaaS360     Published Date: Oct 08, 2015
Security is really about access; today’s work demands access to anything from anywhere on any device. Learn how to securely let employees share, edit and distribute work data across iOS, Android and Windows.
Tags : 
ibm, fiberlink, data security, mobile, mobile strategy, networking, wireless, enterprise applications, data management, business technology
    
IBM MaaS360
Published By: IBM MaaS360     Published Date: Oct 08, 2015
Read about 27 critical criteria of mobile concern, 15 vendors ranked on current offering and strategy, and the 10 providers leading the pack.
Tags : 
ibm, fiberlink, maas360, forrester, mobile, enterprise, management, networking, security, wireless, enterprise applications, business technology
    
IBM MaaS360
Published By: IBM MaaS360     Published Date: Oct 09, 2015
Mobilephobia: A family of fears typically impacting CISOs and other security professionals associated with embracing and deploying a mobile security strategy that enables access across the enterprise, sharing of corporate data or interaction with associates, customers and other third parties via mobile devices and applications.
Tags : 
fiberlink, ciso, security, mobile, mobilephobia, corporate data, networking, business technology
    
IBM MaaS360
Published By: IBM     Published Date: Oct 09, 2015
Mobilephobia: A family of fears typically impacting CISOs and other security professionals associated with embracing and deploying a mobile security strategy that enables access across the enterprise, sharing of corporate data or interaction with associates, customers and other third parties via mobile devices and applications.
Tags : 
    
IBM
Published By: IBM     Published Date: Oct 21, 2016
By next year over half of all US companies will formally support BYOD, bringing on the challenge of securing data and applications on devices that may often be in the hands malicious users, or worse – teenagers looking to win a game of Pokémon Go with mom’s work iPhone. And, thanks to the consumerization of IT, mobile users increasingly expect the same smooth user experience with business applications that is provided by popular games and consumer applications. Fortunately, increased mobility and the bring your own device explosion don’t always add up to increased security challenges and UI/UX struggles. This Tech Byte series will look at the most important considerations when planning a mobile strategy – from application development platform to security and governance to user interface guidelines, and present best practices that businesses of all kinds can use to help ensure a successful shift towards a mobile-first enterprise.
Tags : 
ibm, mobile, mobile security, devices, platform to device, networking, enterprise applications
    
IBM
Published By: IBM     Published Date: Oct 21, 2016
By next year over half of all US companies will formally support BYOD, bringing on the challenge of securing data and applications on devices that may often be in the hands malicious users, or worse – teenagers looking to win a game of Pokémon Go with mom’s work iPhone. And, thanks to the consumerization of IT, mobile users increasingly expect the same smooth user experience with business applications that is provided by popular games and consumer applications. Fortunately, increased mobility and the bring your own device explosion don’t always add up to increased security challenges and UI/UX struggles. This Tech Byte series will look at the most important considerations when planning a mobile strategy – from application development platform to security and governance to user interface guidelines, and present best practices that businesses of all kinds can use to help ensure a successful shift towards a mobile-first enterprise.
Tags : 
ibm, cloud, mobility, enterprise, mobile applications, mobile application strategy, networking, enterprise applications
    
IBM
Published By: Gomez Marketing     Published Date: May 23, 2011
In the study, Forrester broke down the process of calculating the ROI of brands' mobile initiatives into four key steps-identifying benefits, estimating the value of the benefits, calculating costs and building a model-to help justify the resources they need for mobile without getting lost in the details.
Tags : 
compuware, gomez, mobile roi, julie a. ask, forrester, mobile return on investment, mobile marketing, mobile advertising, mobile commerce, tco, consumer data
    
Gomez Marketing
Published By: BlackBerry     Published Date: Mar 12, 2013
McCain Foods Ltd. and Air Canada are long-time BlackBerry® customers. In this short video, senior IT leaders from both companies explain why they see BlackBerry® 10 as the natural evolution of their mobile strategy.
Tags : 
blackberry 10, natural evolution for mccain, air canada, case study, evolution of mobile strategy, knowledge management, human resource technology, business technology
    
BlackBerry
Published By: Blackberry     Published Date: Mar 12, 2013
McCain Foods Ltd. and Air Canada are long-time BlackBerry® customers. In this short video, senior IT leaders from both companies explain why they see BlackBerry® 10 as the natural evolution of their mobile strategy.
Tags : 
feedback, blackberry 10, evolution for mccain, air canada, case study, knowledge management, enterprise applications, business technology
    
Blackberry
Published By: Localytics     Published Date: Apr 16, 2013
In this eBook you will learn about the right way to engage users with mobile app marketing with the best practices of in-app messages.
Tags : 
in-app messaging, appstore, mobile apps, mobile experience, user experience, mobile application marketing, mobile application strategy
    
Localytics
Published By: IBM     Published Date: Oct 10, 2013
Four technology trends—cloud computing, mobile technology, social collaboration and analytics—are shaping the business and converging on the data center. But few data center strategies are designed with the requisite flexibility, scalability or resiliency to meet the new demands. Read the white paper to learn how a good data center strategy can help you prepare for the rigors and unpredictability of emerging technologies. Find out how IBM’s predictive analytics are helping companies build more accurate, forward-looking data center strategies and how those strategies are leading to more agile, efficient and resilient infrastructures.
Tags : 
technology trends, pervasive technology, data center, resilient infrastructures, collaboration and analytics, mobile technology, ibm, accurate strategies, cloud computing, scalability, wireless
    
IBM
Published By: IBM     Published Date: Oct 10, 2013
The ubiquity of mobile devices is transforming the ways that business gets done in today’s world. IBM has the services that can help go beyond supporting devices to achieve a flexible, powerful mobile enterprise.
Tags : 
mobile, mobile enterprise, mobile environment, security, mobile security, mobile device, wireless, mobile strategy, byod, mobile infastructure, application management, data, security, safeguarding, telecommunications, enterprise applications, business technology, telecom
    
IBM
Published By: IBM     Published Date: Oct 10, 2013
Mobile devices, including smartphones and tablets, enable increasing numbers of employees to work "anywhere, anytime."The security of enterprise data is a key concern, particularly on mobile devices that are easily lost or stolen. The security risk is further heightened by the proliferation of employee-owned mobile devices in many enterprises. Employees will almost always take the path of least resistance in leveraging mobile devices for business purposes, which may lead to unsafe computing practices. A clearly documented and enforceable mobile security policy is critical to reducing the risk of data loss.
Tags : 
mobile, mobile enterprise, mobile environment, security, mobile security, mobile device, wireless, mobile strategy, byod, mobile infastructure, application management, data, security, safeguarding, telecommunications, enterprise applications, business technology, telecom
    
IBM
Published By: Cisco     Published Date: Aug 27, 2015
A Mobile Workspace Strategy Is an Imperative
Tags : 
network, infrastructure, cloud, mobility
    
Cisco
Published By: Phunware     Published Date: Jul 30, 2014
Hospitality businesses now have a major opportunity to increase revenue, differentiate their brands and properties, increase customer service, and jump ahead of competitors. Today’s mobile technology advancements are the key. With branded mobile apps coupled with location-based mobile technologies, you can create a compelling, satisfying, and exciting guest experience in ways not possible just a few months ago.
Tags : 
phunware, hotel app development, resort app development, restaurant app development, hotel mobile development, resort mobile development, restaurant mobile development, hotel mobile strategy, resort mobile strategy, mobile strategy
    
Phunware
Published By: Phunware     Published Date: Aug 11, 2014
Many hospitals are losing revenue and receiving poor reviews due to process inefficiencies that can often result in missed or delayed appointments and patient dissatisfaction. Additionally, with the influx of newly insured health care patients resulting from the Affordable Care Act’s new regulations, it is more of a challenge than ever before to guide patients through the hospital system in an efficient manner. In this white paper, we’ll examine how hospitals can use mobile technology to enhance the patient and visitor experience and drive new revenue through increased efficiency.
Tags : 
phunware, hospital mobile strategy, hospital beacon strategy, hospital mobile technology, hospital wayfinding technology, hospital push notifications, hospital digital navigation
    
Phunware
Published By: EX Squared Solutions     Published Date: Jul 16, 2014
Learn how to create a digital storefront to adapt to multi-device consumers and see how you can reach the customers who are moving away from PC and increasingly using mobile devices for purchases.
Tags : 
exsquared, digital retailing, consumer behavior, interactive merchandising, mobile strategy, mobile marketing, multi device, storefronts
    
EX Squared Solutions
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

“I am the Inspector Morse of IT journalism. I haven't a clue. D'oh” - Mike Magee