mobile strategy

Results 151 - 175 of 336Sort Results By: Published Date | Title | Company Name
Published By: IBM     Published Date: Jul 07, 2015
By 2018, company-supplied mobile phones will exceed 228 million and mobile devices will replace 63% of desktops. Are you ready?
Tags : 
ibm, mobile, devices, strategy, infrastructure, wireless, business technology
    
IBM
Published By: Dell Mobility     Published Date: Oct 12, 2011
Download this report and learn how to build your mobile consumerization strategy
Tags : 
dell, mobility, solutions, servers, storage, datacenter, client refresh, wireless, mobility, workstation productivity, mobile phones, smartphones, smart phones, touch screen phones, pda phones, infrastructure, consumerization, strategy
    
Dell Mobility
Published By: Samsung     Published Date: Dec 18, 2015
This paper will examine seven steps for developing a current, secure, and well-managed mobile app portfolio.
Tags : 
    
Samsung
Published By: CA Technologies     Published Date: Jan 08, 2014
Mobile devices are ubiquitous and end users keep tend to keep them close at hand. This represents both an opportunity and a challenge with regard to security and authentication. There is an opportunity to leverage mobile devices to provide out-of-band authentication methods for access to sensitive applications and data. There is also a growing challenge to provide user convenient authentication directly from mobile devices. This eBook will discuss these use cases and how they fit into your overall mobile authentication strategy.
Tags : 
ca technologies, authentication, password management, bring your own device, byod, mobile security, security, mobile device, access control, application security, mobile authentication
    
CA Technologies
Published By: CA Technologies     Published Date: Jan 08, 2014
Mobile devices are ubiquitous and end users keep tend to keep them close at hand. This represents both an opportunity and a challenge with regard to security and authentication. There is an opportunity to leverage mobile devices to provide out-of-band authentication methods for access to sensitive applications and data. There is also a growing challenge to provide user convenient authentication directly from mobile devices. This eBook will discuss these use cases and how they fit into your overall mobile authentication strategy.
Tags : 
ca technologies, authentication, password management, bring your own device, byod, mobile security, security, mobile device, access control, application security, mobile authentication
    
CA Technologies
Published By: CA Technologies     Published Date: Jan 08, 2014
Mobile devices are ubiquitous and end users keep tend to keep them close at hand. This represents both an opportunity and a challenge with regard to security and authentication. There is an opportunity to leverage mobile devices to provide out-of-band authentication methods for access to sensitive applications and data. There is also a growing challenge to provide user convenient authentication directly from mobile devices. This eBook will discuss these use cases and how they fit into your overall mobile authentication strategy.
Tags : 
ca technologies, authentication, password management, bring your own device, byod, mobile security, security, mobile device, access control, application security, mobile authentication
    
CA Technologies
Published By: CA Technologies     Published Date: Jan 15, 2014
Mobile devices are ubiquitous and end users keep tend to keep them close at hand. This represents both an opportunity and a challenge with regard to security and authentication. There is an opportunity to leverage mobile devices to provide out-of-band authentication methods for access to sensitive applications and data. There is also a growing challenge to provide user convenient authentication directly from mobile devices. This eBook will discuss these use cases and how they fit into your overall mobile authentication strategy
Tags : 
ca technologies, authentication, password management, bring your own device, byod, mobile security, security, mobile device, access control, application security, mobile authentication, identity management, security management, web service security, wireless security, mobile device management
    
CA Technologies
Published By: OutSystems     Published Date: Mar 24, 2014
Mobile has become standard in the enterprise with smartphones and tablets common in the workplace. Anywhere, anytime access to company systems is expected and systems must work flawlessly on these devices! This eBook looks at how to kick start your mobile application strategy.
Tags : 
outsystems, mobile, app, mobile applications, mobile strategy, corporate it departments, smartphones, tablets, networking, business technology
    
OutSystems
Published By: OutSystems     Published Date: Apr 10, 2014
This eBook looks at how to kick start your mobile application strategy. Download to learn more!
Tags : 
outsystems, mobile app strategy, mobile, mobile applications, types of apps, it management, data center
    
OutSystems
Published By: Trend Micro, Inc.     Published Date: Jul 19, 2011
In a new video, security analyst Rich Mogull discusses mobile data protection topics and addresses many issues, including, the latest trends in mobile security, mobile device management, and mobile data protection.
Tags : 
trend micro, internet content security, smart protection network, internet security, enterprise business security, worry-free business security, web threat management, australia, cloud, android mobile security, antivirus, consumerisation of it, enterprise mobile management, enterprise mobile security, enterprise network security, mobile device management, ipad mobile device, ipad, iphone, it strategy
    
Trend Micro, Inc.
Published By: Epicor     Published Date: Jul 18, 2017
Big-box retailers often have the resources, product variety, and name recognition to get ahead of smaller competitors. However, small and midsize businesses are able to crush the big-box stores where it matters most—the customer experience. Whether by design, geography, or as a matter of principle, small and midsize retailers are closer to their customers and are able to engage them on a level that big-box stores simply cannot. This closeness—combined with the right retail management system—allows smaller business to deliver a superior shopping experience with: • Special orders • Predictive inventory analysis • Digital, mobile channels and device integration This white paper—written by Innovative Retail Technologies and sponsored by Epicor—explains how the right software solution leads to a more agile retail strategy, which then leads to a better experience for your customers.
Tags : 
retail store software, retail sales software, retail saas, business retail software, epicor eagle, benefits of epicor eagle, benefits of retail pos, advantages of retail saas, advantages of retail store software
    
Epicor
Published By: Courion     Published Date: Aug 21, 2012
In today's mobile, always-on, cloud-based business environment open is not a choice, it's a requirement. With openness comes access risk, does your organization have a strategy to identify, quantify and manage this risk? Learn more today!
Tags : 
access, risk, identity management, identity and access management, iam, regulatory compliance, audit compliance, policy compliance, access policy, user provisioning, access certification, access intelligence, user access, onboarding, security, business technology
    
Courion
Published By: Courion     Published Date: Nov 05, 2012
In today's mobile, always-on, cloud-based business environment open is not a choice, it's a requirement. With openness comes access risk, does your organization have a strategy to identify, quantify and manage this risk? Learn more today!
Tags : 
courion, access risk management, cloud based environment, mobile, data loss prevention, security, data management, data center
    
Courion
Published By: Cisco     Published Date: May 14, 2015
Depuis la naissance de l'informatique, la technologie a connu d'importantes évolutions. Dans les années 60, le modèle de calcul dominant reposait sur des unités centrales, lesquelles ont été remplacées une décennie plus tard par les mini-ordinateurs.
Tags : 
mobile users, strategy, app enabled, scalability, security, device management, enterprise, byod, cisco
    
Cisco
Published By: Intel® Services     Published Date: Aug 11, 2014
In this guide, Intel® Services share lessons learned about deploying and managing successful enterprise APIs.
Tags : 
intel services, enterprises, api management, enterprise apis, wireless
    
Intel® Services
Published By: VMware AirWatch     Published Date: Oct 14, 2016
Advances in the technologies of the electronic components essential to mobility continue to yield powerful and productive mobile computers and communicators, with an amazing range of function and raw capabilities that even seasoned professionals find remarkable. There also have been dramatic improvements in wireless networks—from Wi-Fi to the broadband cellular services that continue to expand in both coverage and capacity—that offer throughput and related performance characteristics that rival what’s possible on wire. Finally, add in apps, cloud solutions and related management capabilities, and there’s never been a better time than right now to profit from a strategy that reaps the benefits of a mobile workforce—and, really, a mobile organization.
Tags : 
    
VMware AirWatch
Published By: IBM MaaS360     Published Date: Apr 16, 2015
The Gartner Magic Quadrant is one of the most influential research tools that IT buyers use to evaluate enterprise mobility security vendors.
Tags : 
mobile users, strategy, app enabled, scalability, security, device management, enterprise, byod
    
IBM MaaS360
Published By: BlackBerry     Published Date: Dec 22, 2009
Over a decade ago, mobile telephony entered the enterprise through the back door: employees who could afford mobile phones occasionally used them for business; specific business units budgeted for employee mobiles and then procured them locally; policies surrounding the usage of mobile phones for work were - where they existed at all - haphazard; there was little means of policy enforcement; and in no case were these mobile phones integrated into a business's fixed telephony strategy, let alone its IT strategy. This stands in sharp contrast to other office technologies, such as PCs, faxes, and copiers.
Tags : 
blackberry, mobile applications, cio, pim, voip, smartphones, it communication, microsoft exchange, mobile device management, mobile device management software, mobile workers, remote computing, wireless applications software, wireless computing
    
BlackBerry
Published By: Webtrends     Published Date: May 18, 2010
Mobile marketing investments will likely triple over the next five years. In the haste to stake a claim in the mobile gold rush, many businesses skip the lessons learned from the last big push: to be successful, you'll need to measure and quantify your results with mobile analytics.
Tags : 
webtrends, mobile strategy, app downloads, apps, performance indicators, targeted marketing, web analytics
    
Webtrends
Published By: OKTA     Published Date: Apr 24, 2018
"It’s important to understand the role that an Identity platform plays in modern enterprise IT. In the past, Identity and Access Management systems were an afterthought. They were put into place after making many of your other architectural decisions. With the move to web, cloud and mobile, IAM has become a key variable in hardware and software deployment, as well as in operational strategy. This webinar will reveal why leveraging an IAM platform, built as a single cloud-based platform for security across on-prem and cloud, can solve these issues."
Tags : 
    
OKTA
Published By: Webtrends     Published Date: Jun 02, 2010
To succeed in mobile marketing, analytics must play a crucial role in the development of strategy and prioritizations of marketing spend. But this rigor isn't being consistently applied to this rapidly growing, emerging channel.
Tags : 
webtrends, mobile strategy, digital marketing, process, customer experience, multi-channel marketing, business intelligence, customer intelligence, mobile analytics, mobile apps, sms
    
Webtrends
Published By: SAP     Published Date: Jul 20, 2015
Download this case study to see how Migros uses mobile technology to optimize their business strategy.
Tags : 
migros, sap, it trends, retail, big data, seamless retailing
    
SAP
Published By: SAP     Published Date: Jul 24, 2015
Download this case study to see how Migros uses mobile technology to optimize their business strategy.
Tags : 
migros, sap, it trends, retail, big data, seamless retailing
    
SAP
Published By: Skillsoft     Published Date: Dec 06, 2016
Millennials are the first true “digital natives,” and because of this, they are often associated with driving new work practices and expectations. However, it is actually the ubiquity of technology, the accelerated pace of work and our consumer experiences that are driving new work practices, not millennials. New research tells us that to be engaging, L&D teams need to focus on modern learning rather than millennials.The formula for modern learning is: • Learner-centric • Micro/modular • Varied treatments • Retention-driven • Embedded • Mobile Download “Millennial Learning Myths and Misconceptions Prescriptions for a Modern Learning Strategy” for tips for enabling modern learning at your organization.
Tags : 
learning, engagement, millennials, learning and development, knowledge management
    
Skillsoft
Published By: Mobify     Published Date: Apr 17, 2015
Choosing the right mobile solution (and solution provider) is a complex undertaking – and asking the right questions is critical in helping you find your best fit. In order to determine your ideal mobile solution, it’s important to understand what your needs are, what a given solution offers and how the two might intersect. In this workbook, we’ve presented the most commonly referenced mobile solution criteria for retailers in 2015. For the purposes of this guide, we’ve defined mobile solution providers as companies that bring together a productized mobile technology platform with creative and strategy services that are focused on improving mobile metrics. You can use this criteria to validate different solution providers, and can download included template to customize it for your business’ unique needs.
Tags : 
mobile solutions, mobify, mobile solution criteria, mobile technology platforms, mobile metrics
    
Mobify
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

“I am the Inspector Morse of IT journalism. I haven't a clue. D'oh” - Mike Magee