smartphone

Results 301 - 325 of 409Sort Results By: Published Date | Title | Company Name
Published By: Adobe     Published Date: Nov 05, 2014
Download the new Adobe Digital Index report to see how your online marketing practices compare to the best-of-the-best websites across five industries, including retail, media and entertainment, travel and hospitality, financial services, and high tech. You’ll see critical metrics on everything from mobile trends to conversion rates—so you can develop new strategies for success in 2014.
Tags : 
adobe, adobe digital index, benchmarking, marketing, smartphone, tablet, stick rate, conversion rate, customer engagement, online marketing
    
Adobe
Published By: Adobe     Published Date: Apr 03, 2015
Understanding which customer experiences and touchpoints are driving the best results can be hard. Adobe can help. The new eMarketer report, Omnichannel Trends 2015: Mobile is the New Retail Hub, exposes the importance of utilizing omnichannel (cross-channel) marketing to effectively reach, engage, and convert your customers. Read the report to learn: • The seven most important trends you’ll face this year • How retailers are dealing with the obstacles of cross-channel practices • Why smartphones are becoming the new retail hub
Tags : 
customer experience, personalization, mobile, retail, adobe, marketing, trends, cross-channel, smartphones
    
Adobe
Published By: Adobe     Published Date: Mar 05, 2018
We are fully entrenched in the digital age, so much so that you're probably reading this with a smartphone or mobile device within arms length. Similarly government is also making the shift towards a digital future. But with moving away from paper-based records and towards digital data, there are new opportunities for potential security risks regarding government data and content. As cyberthreats continue to grow in number and sophistication, agencies should be looking at features to secure every level of their digital infrastructure and content. Check out this new pocket guide to learn content security best practices, why it matters, government rules and regulations related to digital data and its associated security and content challenges. You’ll also learn tips and tricks to apply at your agency to make sure your content is secure.
Tags : 
    
Adobe
Published By: Litmos     Published Date: Apr 23, 2015
Download this infographic to see statistics on how influential and integral mobile devices are in day to day life. Learners prefer mobile devices and use them everywhere at all times. Having a mobile learning strategy is imperative to your organization's success because mobile learning enables anyone to learn anytime, anywhere.
Tags : 
mobile learning, mobile devices, wireless, smartphone, training, litmos
    
Litmos
Published By: Campaigner     Published Date: Apr 30, 2015
The purpose of this report is to educate marketers about the challenges presented by the mobile landscape and to present some practical and effective solutions for increasing mobile engagement and email marketing ROI.
Tags : 
mobile marketing, email marketing, mobile design, roi, smartphones, mobile engagement, mobile-friendly email campaigns
    
Campaigner
Published By: IBM     Published Date: May 07, 2013
"Building game-changing mobile apps—from vision to execution The proliferation of mobile devices, from smartphones to tablets, is empowering customers all over the world. Now, they expect to engage with enterprises and brands on their terms. In order to get closer to customers and boost productivity, many companies are now investing in apps, with varying results. Read the paper to see why it pays to have an innovative, sound mobile app strategy in place—before looking to build compelling systems of engagement."
Tags : 
mobile, capitalizing, smarter commerce, customers, productivity, innovative
    
IBM
Published By: Symantec     Published Date: Jun 13, 2018
Today’s workforce is increasingly nomadic. Employees use personal and company-owned devices desktops, laptops, tablets, and smartphones with various operating systems to access corporate resources over different networks from virtually anywhere. Roaming users and cloud-based applications have eroded the network perimeter where enterprises have traditionally focused their security controls. In the wake of this disruption, vendors offered myriad point products that solve only a portion of the security problem. These products usually require costly custom integrations and high management overhead to boot. Making matters worse, traditional security approaches can’t address an evolving threat landscape that includes ransomware, stealthy attacks that dwell in a customer’s environment for months, and threats targeting iOS and Android devices. In fact, the mobile workforce is more vulnerable than ever before.
Tags : 
    
Symantec
Published By: IBM MaaS360     Published Date: Apr 15, 2015
Bring Your Own Device has changed the rules for corporate security on smartphones and tablets. Companies need to find the right balance in securing devices and data without sacrificing the intuitive native experience that has made business move from typing to swiping.
Tags : 
fiberlink, mobile users, strategy, app enabled, scalability, security, device management, enterprise, byod
    
IBM MaaS360
Published By: IBM MaaS360     Published Date: Jul 09, 2015
Mobile productivity necessitates instant and easy access to retrieve, edit, share and send corporate data from anywhere. In this paper we’ll explore the rapid workplace productivity transformation of securing enterprise content so employees can use smartphones and tablets to run all business from the palms of their hands.
Tags : 
mobile content management, mobile productivity, corporate data, access, workplace productivity, smartphones, tablets, networking, it management, business technology
    
IBM MaaS360
Published By: IBM MaaS360     Published Date: Jul 09, 2015
End users are demanding their own devices in the workplace, making IT the shepherds of a potentially unruly flock?The good news is IT can embrace BYOD with security and confidence given the right preparation and technology.
Tags : 
byod, mobile devices, smartphone, tablet, networking, it management, wireless
    
IBM MaaS360
Published By: IBM MaaS360     Published Date: Jul 09, 2015
Manufacturing: The Bring Your Own Device (BYOD) policies that thrive in other industries are gaining momentum in manufacturing as well.
Tags : 
mobile device management, manufacturing, mobile devices, smartphone, tablet, byod, networking, security, it management, wireless
    
IBM MaaS360
Published By: IBM MaaS360     Published Date: Jul 09, 2015
Get the latest mobile devices and apps in the hands of learners and educators quickly and securely with mobile device and app management.
Tags : 
mobile device management, education, educators, students, app management, smartphone, tablet, classroom, networking, security, it management, wireless
    
IBM MaaS360
Published By: IBM MaaS360     Published Date: Jul 09, 2015
See where Ovum places the focus on EMM for 2015 and the vendors with the vision and executional ability to deliver.
Tags : 
enterprise mobility management, emm, ovum, vendors, tablet, smartphone, mobile device, networking, security, it management, wireless
    
IBM MaaS360
Published By: IBM MaaS360     Published Date: Oct 08, 2015
Hacktavists have made the move to mobile. Malware, phishing and network attacks are now as likely to strike smartphones and tablets like any other system. Mobile Threat Management is now needed to stay ahead of new vectors of vicious intent.
Tags : 
ibm, fiberlink, maas360, mobile, malware, hackers, phishing, threat management, network, networking, security, wireless, business technology
    
IBM MaaS360
Published By: IBM MaaS360     Published Date: Oct 08, 2015
Bring Your Own Device has changed the rules for corporate security on smartphones and tablets. Companies need to find the right balance in securing devices and data without sacrificing the intuitive native experience that has made business move from typing to swiping.
Tags : 
ibm, fiberlink, maas360, mobile, data security, mobile device management, networking, security, wireless, business technology
    
IBM MaaS360
Published By: Zmags, Corp.     Published Date: Jun 15, 2010
How marketers can navigate the increasingly murky waters of mobile platforms, devices and services With the rise of smartphones, notebooks and tablets, life has become more complicated for you regarding creating and delivering digital content to your audience. Get the inside look with this comprehensive whitepaper and learn how to navigate the increasingly murky waters of mobile platforms, devices and services.
Tags : 
zmags, smartphones, mobile marketing, internet marketing, android
    
Zmags, Corp.
Published By: Cisco     Published Date: Jul 11, 2016
Companies rely on an expanding set of applications to compete in today's rapidly evolving business environment: - They rely on a fast-growing array of applications and devices (email, collaboration tools, and smartphones/tablets) to communicate and conduct business with customers and business partners. - They are creating, collecting, and repurposing large, unstructured data sets in life sciences, geophysics, media, and manufacturing. - They are collecting, storing, and analyzing more social and sensor-generated data about environments, products, customers, and transactions. The promise of better and faster data-driven decision making based on all this information is pushing big data and analytics (BDA) technology to the top of executive agendas. To succeed, CIOs must place a laserlike investment focus on datacenter solutions that allow them to deliver scalable, reliable, and flexible infrastructure for fast-growing BDA environments. Read more to learn how!
Tags : 
    
Cisco
Published By: IBM     Published Date: May 01, 2017
Today's enterprises support an assortment of end-user devices, including laptops and desktops (both PCs and Macs), tablets and hybrid devices, and, of course, smartphones. Not only do employees use a variety of form factors, but they run a variety of platforms on those devices, including: Apple iOS and Apple macOS Google Android Microsoft Windows To complicate the situation further, they run different versions of those platforms for example, Microsoft Windows XP SP3, Microsoft Windows 10 or anything in between. In addition, IT is being tasked more and more with managing and securing wearables, ruggedized devices and the Internet of Things (IoT). Read this whitepaper to learn more.
Tags : 
enterprise management, mobile management, organization optimization, security management, microsoft, data protection, bug prevention, information management
    
IBM
Published By: IBM     Published Date: May 01, 2017
In October 2016, IBM commissioned Forrester Consulting to evaluate the means by which enterprises are managing and securing various endpoint form factors today and how strategies will change over the next three years. In conducting an in-depth survey of 556 IT and security leaders in the US, the UK, Germany, India, and Australia, Forrester found that while enterprises have a decentralized approach to managing and securing smartphones, tablets, laptops, and IoT today, they will move to a more consolidated and cognitive approach by 2020. Download report to learn more.
Tags : 
ibm, consulting, it security, smartphones, tablets, laptops, enterprise management
    
IBM
Published By: Group M_IBM Q1'18     Published Date: Feb 27, 2018
Forrester survey: global IT leaders plan their transition to consolidated, cognitive smartphone, tablet, laptop, and IoT security by 2020.
Tags : 
iot security, internet of things, mobility
    
Group M_IBM Q1'18
Published By: Group M_IBM Q1'18     Published Date: Feb 27, 2018
IBM MaaS360 provides unified endpoint management (UEM) across desktops, laptops, tablets, smartphones, and the Internet of Things (IoT).
Tags : 
internet of things, uem, unified endpoint management, iot
    
Group M_IBM Q1'18
Published By: BlackBerry     Published Date: Jul 23, 2010
Investing in mobility is like investing in any other important business activity, and its success will largely depend on how closely it is aligned with both business and IT drivers. A successful mobility plan should focus on 'mobilizing' your critical business processes and include planning phases for discovery, development and deployment. This Guide focuses on how to build an effective mobility plan while providing valuable insight into the benefits of mobilizing your business applications.
Tags : 
blackberry, mobility, smartphones, cell phones, mobile workforce, e-commerce, handset, touchpoint
    
BlackBerry
Published By: BlackBerry     Published Date: Jul 22, 2010
Unified Communications (UC) integrates multiple communications modalities and adds presence features to allow workers to communicate and collaborate more effectively with co-workers, customers and suppliers. Learn about the cost, productivity and reachability issues associated with increased enterprise mobility and the benefits and future directions of Mobile UC.
Tags : 
blackberry, mobility, smartphones, cell phones, mobile workforce, e-commerce, handset, fmc, telecom, touchpoint
    
BlackBerry
Published By: BlackBerry     Published Date: Jul 22, 2010
As more employees desire to use their personal smartphones for work, IT managers must leverage the opportunity, or risk their organizations missing out on an emerging business trend. It's no longer feasible for an IT department, regardless of company size, to ignore the smartphone push from the majority of the employee population. IT management must attempt to channel the chaos and determine ways to embrace the personal mobility wave while maintaining effective security and management measures, especially in relation to the corporate network. This free whitepaper discusses innovative mobile strategies, new policies, and a fresh approach to allowing smartphones access to corporate resources.
Tags : 
blackberry, mobility, smartphones, rim, cell phones, mobile workforce, e-commerce, handset, touchpoint
    
BlackBerry
Published By: BlackBerry     Published Date: Jan 06, 2011
With consumer use of smartphones growing by the day, it's no surprise that users are taking them into the workplace as well. Thousands of people already use their personal smartphones for work-related tasks like checking email and calendars when they're away from their desks. And many wish they could do more with their smartphones, given their myriad functions and applications.
Tags : 
blackberry, enterprise server, desktop manager, communications software, rim, microsoft exchange, mobile device management, mobile device management software, mobile workers, remote computing, wireless applications software, wireless computing
    
BlackBerry
Start   Previous    3 4 5 6 7 8 9 10 11 12 13 14 15 16 17    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

“I am the Inspector Morse of IT journalism. I haven't a clue. D'oh” - Mike Magee