smartphone

Results 151 - 175 of 407Sort Results By: Published Date | Title | Company Name
Published By: Microsoft Windows Phone     Published Date: Feb 05, 2010
In this e-Guide, we recap Windows Mobile OS's evolution and look at the wide array of Windows Mobile-powered devices available to untethered today's workforces. We'll explore where and why Windows Mobile OS devices are used to support a wide range of mobile apps, from vertical business automation to knowledge worker access.
Tags : 
microsoft, windows mobile 6.5, mobile apps, smartphone, mobile worker, wince, business applications
    
Microsoft Windows Phone
Published By: Microsoft Windows Phone     Published Date: Feb 05, 2010
This paper compares the Research In Motion BlackBerry solution (BlackBerry mobile devices and BlackBerry Enterprise Server) with the Microsoft® mobile solution (Microsoft Windows Mobile® and Microsoft Exchange Server 2007 SP1 with Microsoft ActiveSync® technology) by analyzing features of the user experience and the administrator experience.
Tags : 
microsoft windows mobile, mobile work, blackberry, smartphone, exchange server 2007 sp1, activesync, secure mobile messaging, security, tco
    
Microsoft Windows Phone
Published By: Microsoft Windows Phone     Published Date: Feb 08, 2010
How Windows Phones Combine Email, Messaging, Voice, and Presence in a Secure, Collaborative Environment. This paper explains why unified communications is essential and why Windows® Phones are ideally suited to serve as the "mobile connection" in a unified communication environment.
Tags : 
microsoft windows phones, unified communications, security, mobile worker, smartphone, business intelligence, corporate social network
    
Microsoft Windows Phone
Published By: PC Mall     Published Date: Dec 07, 2011
This white paper discusses critical best practices including approaches for both policy and technology.
Tags : 
sonicwall, mobile security, mobile phone security, mobile device security, mobile device management, mobile antivirus, data loss prevention, malware
    
PC Mall
Published By: Aternity     Published Date: Jul 20, 2012
Forrester Research projects that by 2016, 350 million employees will have smartphones, prompting businesses to drastically increase spending on mobile projects to meet the flexibility demands of increasingly tech-savvy employees. This exclusive resource describes how businesses can support mobile technologies from virtual desktops to application development with comprehensive end-user experience (EUE) management tools. Find out how this platform proactively detects performance and availability issues to help IT professionals troubleshoot and improve application performance for end-users.
Tags : 
technology, mobile, management tools, end-user experience, eue, application performance, smartphones, business technology
    
Aternity
Published By: MicroStrategy     Published Date: Mar 16, 2011
With the ability to access information at any time, in any location, on a hand-held device, consumers can now make more and more decisions quickly and easily. Read More.
Tags : 
microstrategy, mobile intelligence, mobile computing, business intelligence, mobile internet application, smartphone
    
MicroStrategy
Published By: Citrix Systems     Published Date: Sep 06, 2013
A technical how-to guide— updated for Android 4.2, iOS 6.1, and Windows Phone and Surface 8.
Tags : 
citrix, apple ios, enterprise information, smartphones, enterprise computing, security, it management
    
Citrix Systems
Published By: Citrix Systems     Published Date: Sep 06, 2013
Delivering apps into the mobile space isn’t an activity to be considered lightly. The wrong approach can inadvertently cost more while decreasing productivity. If you’ve ever struggled to interact with a poorly designed tablet or smartphone application, then you already know this pain.
Tags : 
citrix, windows applications, consumerization, mobilizing microsoft® windows®, apps, mobile, security, it management
    
Citrix Systems
Published By: Citrix Systems     Published Date: Feb 27, 2014
Android, iOS and Windows tablets and smartphones play an increasing role in enterprise computing, providing new flexibility and mobility for workers and IT—but creating new challenges around security. This paper describes these issues and explains how they can be addressed effectively with Citrix BYOD solutions.
Tags : 
citrix, apple, android, byod, tablet, mobile, citrix byod, microsoft windows tablets, it management
    
Citrix Systems
Published By: Citrix Systems     Published Date: Oct 07, 2014
Bring-your-own-device (BYOD) programs and policies empower people to choose the best device to get their work done, including personally-owned consumer smartphones, tablets and laptops. This white paper provides guidance for introducing BYOD to help people become more mobile and productive while IT adapts to consumerization in a simple, secure and controlled manner.
Tags : 
best practices, secure, simple, consumerization, byod, program, device, smartphones, tablets, laptops, mobile, productive, it management, wireless
    
Citrix Systems
Published By: Citrix Systems     Published Date: Nov 10, 2014
"Is your mobile micro app concealing a complex web property? The mobile web doesn’t just exist in your smartphone or tablet’s browser—there’s also an invisible but critical layer at the back end that powers mobile app services from content delivery to networking and collaboration. A micro app on a mobile device typically serves as the entry point to a web property. The combination of Citrix XenMobile and Citrix NetScaler offers enterprises an ideal solution that not only incorporates a comprehensive set of MDM and MAM features but also complements them with a market-leading, cloud-ready suite of capabilities for optimizing mobile web app performance, availability and security."
Tags : 
mobile, web properties, applications, infrastructure, network devices, performance, communicate, security, reliability, netscaler, wireless
    
Citrix Systems
Published By: Citrix Systems     Published Date: Feb 10, 2016
"Is your mobile micro app concealing a complex web property? The mobile web doesn’t just exist in your smartphone or tablet’s browser—there’s also an invisible but critical layer at the back end that powers mobile app services from content delivery to networking and collaboration. A micro app on a mobile device typically serves as the entry point to a web property. The combination of Citrix XenMobile and Citrix NetScaler offers enterprises an ideal solution that not only incorporates a comprehensive set of MDM and MAM features but also complements them with a market-leading, cloud-ready suite of capabilities for optimizing mobile web app performance, availability and security."
Tags : 
    
Citrix Systems
Published By: LogMeIn     Published Date: Jan 15, 2014
The following industry forecasts and findings highlight mobile’s growth potential and each on their own should merit merchants’ attention. Learn more about the potential of mobile growth through this whitepaper.
Tags : 
logmein, merchants and consumer, mobility, mobile mastery, industry insights, smartphones, research findings, e-tailing groups, mcommerce checklist, customer service, top merchants, cross-channel efficiency, inventory access, best practice
    
LogMeIn
Published By: LogMeIn     Published Date: Jun 23, 2015
This white paper reveals how to become mobile-minded enough to win with customers.
Tags : 
mobility, mobile-minded, mobile devices, go mobile, customer relationship, customer engagement, smartphones, tablets, mobile experiences, customer experiences, mobile engagement strategy
    
LogMeIn
Published By: ForeScout     Published Date: Aug 14, 2012
The What, Why and How to Employ NAC to Apply Guest Networking, BYOD (Bring Your Own Device) and Endpoint Security Policies. Many of today's endpoints are neither known nor protected. According to Gartner, enterprises are only aware of 80 percent of the devices on their network. Those 20 percent of unknown devices are inside the perimeter of the network, are unmanaged and provide users with access. They are small, varied and highly mobile, and they are loaded with their own applications, can act as WAPs, and often contain outdated firmware or are jailbroken. Even as the devices are accessing personal applications on the web, they are also accessing corporate resources such as e-mail-all from the very same unmanaged devices, which have not been vetted by the security organization. Smartphones, notebooks, netbooks, iPads, e-readers, gaming consoles and more-the list of personal devices attempting access to employer networks seems to grow every day in what's come to be known as the BYOD (Bring Your Own Device) era in networking.
Tags : 
pad, mine, enabling, secure, personal, mobile, device, use, your, network, nac, guest, networking, byod, bring, your, own, device, endpoint, security
    
ForeScout
Published By: CDW     Published Date: Jun 18, 2013
Guidance on the strategies and tools needed for a secure and productive bring-your-own-device program.
Tags : 
cdw, byod, bring your own device, mobile computing, smartphones, tablets, wireless, security
    
CDW
Published By: CDW     Published Date: Jun 18, 2013
A mix of well-thought-out policies and up-to-date technologies are needed to protect critical data.
Tags : 
cdw, mobile security, protecting data, critical data. notebooks, smartphones, tablets, security, telecom
    
CDW
Published By: CDW     Published Date: Jul 30, 2013
As video technology becomes more accessible, more people will use it to make video calls. A confluence of camera-enabled notebooks, smartphones and tablets combined with better wireless network capabilities has created a base of users that are willing to fire up the camera when they want to talk.
Tags : 
cdw, unified communications, camera-enabled notebooks, smartphones, tablets, wireless network capabilities, software development, it management
    
CDW
Published By: CDW     Published Date: Oct 10, 2013
CDW’s Mobile Expense Management solution enables organizations to view, integrate and manage mobile communications costs across the entire organization in order to make more informed strategic decisions.
Tags : 
mobility management, mobile expense management, total mobility, cdw, expense management, mobile expense, historical invoice audit, invoice process, wireless expense, wireless communications, optimize communications, maximize mobile benefits, wireless, network performance management, tablet, smartphone, mobile device
    
CDW
Published By: CDW     Published Date: Oct 10, 2013
A team approach and careful consideration of operational and security issues will pave the way for effective guidance. The drivers are many, but big draws include the potential for greater productivity — giving people anywhere, anytime access to information via devices they’re comfortable with.
Tags : 
mobile device policy, mobile data policy, mobility goals, byod, user profile, device security, mobile applications, app availability, device liability, technology vendors, mdm, sarbanes oxley, sensitive data, mobile data, mobile information, vpn, virtual private networks, wireless, access control, mobile application security
    
CDW
Published By: Advizex     Published Date: Sep 25, 2013
The challenge of Big Data is more than a question of size; it’s about time to insight and action. With the exponential growth of unstructured data such as social media, video and the raw data generated by smartphones and other “intelligent” machines, businesses are buried under an avalanche of data that renders even best-effort analytics slow and sometimes unreliable. As many businesses are learning in this age of Big Data, it’s not just what you know, but when you know it and how much you trust it. Download this white paper and learn that with SAP HANA, companies can react intelligently at the speed of thought to capture new opportunities.
Tags : 
sap hana, sap, real time analytics, raw data, generation, analytics, big data, business intelligence, trusting big data, insight, action, knowledge management, enterprise applications, data management
    
Advizex
Published By: Aruba Networks     Published Date: Sep 18, 2013
In this whitepaper Gartner explores smartphones and tablet devices, and their applications, which are increasingly at risk of malware. IT security planners and operations managers can thwart serious malware threats for the time being with these best practices. Read this whitepaper for more information.
Tags : 
smartphones, tablet devices, malware, best practices, security planners, risk, applications, technology, access control, networking, security, wireless, business technology
    
Aruba Networks
Published By: Aruba Networks     Published Date: Jul 03, 2013
Microsoft Lync is not only changing the cost structure of enterprise telephony, but is also ushering in a new user experience in which every communication is transformed into a more collaborative, engaging interaction. But it’s impossible to achieve the promises of Lync if you haven’t fully considered the underlying infrastructure. And with laptops, smartphones and tablets on track to outnumber desktops, that means wireless infrastructure. Fortunately, with a little upfront planning, you can dramatically increase the quality and reliability of multimedia over enterprise Wi-Fi. Here are 10 tips for ensuring that Lync runs well on mobile devices in your network…
Tags : 
lync, smartphone, tablet, wireless infrastructure, deploy
    
Aruba Networks
Published By: Keynote     Published Date: Nov 05, 2013
Mobile testing requires a di¬fferent approach. This white paper takes an exhaustive look at challenges today in testing mobile apps and websites and why testing in the cloud can improve your ROI and efficiency.
Tags : 
cell phone app development, mobile phone test, device anywhere, mobile phone testing, testing mobile phone, mobile web test, deviceanywhere, testing for mobile devices, test mobile phones, iphone app testing, mobile site testing, "smartphone testing", mobile website testing, mobile software testing, test mobile applications, "automated mobile testing", application testing software, mobile automation, mobile testing automation, mobile app testing
    
Keynote
Published By: Keynote     Published Date: Nov 13, 2013
Enterprises are increasingly looking to expand their ALM capabilities to include mobile application testing. Users of HP’s Unified Functional Testing (UFT), formerly QuickTest Pro, now have an option to perform mobile functional testing (regression) with access to real mobile devices hosted in the cloud, leveraging the native test automation capabilities found in UFT.
Tags : 
cell phone app development, mobile phone test, device anywhere, mobile phone testing, testing mobile phone, mobile web test, deviceanywhere, testing for mobile devices, test mobile phones, iphone app testing, mobile site testing, "smartphone testing", mobile website testing, mobile software testing, test mobile applications, "automated mobile testing", application testing software, mobile automation, mobile testing automation, mobile app testing
    
Keynote
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

“I am the Inspector Morse of IT journalism. I haven't a clue. D'oh” - Mike Magee