mobile data

Results 176 - 200 of 661Sort Results By: Published Date | Title | Company Name
Published By: IBM APAC     Published Date: Aug 22, 2017
While working to maintain tactical control of the mobile environment, IT managers often find themselves drowning in minutiae. Overwhelmed by the number of moving parts, they’re unable to stay abreast of the latest threats, let alone extract meaning from or make decisions based on the mountains of data now being collected. With limited IT resources dedicated to mobile technology tools that facilitate reactive rather than proactive management—and limited visibility into mobile intelligence across the organization—many managers have had to choose between security and productivity as the focus of their efforts.
Tags : 
security risks, it operations, workforce, advisor, mobile security, mobile metrics, cloud based, benchmarking data, ibm
    
IBM APAC
Published By: CA Technologies     Published Date: Aug 22, 2017
Effectively supporting these new business demands has become more complex and challenging. The increased use of mobile devices alone is driving exponential growth in transaction volumes. A customer pushes a button on his or her cell phone, for example, to check a bank balance. That single transaction triggers a cascade of transactions as the request is validated and data is accessed, retrieved and then sent back to the customer.
Tags : 
storage, systems, network, applications, data, automation, ca technologies
    
CA Technologies
Published By: Akamai Technologies     Published Date: Aug 17, 2017
APIs are the unseen language of the Internet. They power digital transformation across industries by allowing applications to talk to one another and operate as crucial backend services to websites and mobile apps. As a dynamic and somewhat hidden technology, it can be challenging to find detailed information about the API space. We combined findings from our recent API survey of business leaders from over 400 leading technology companies with industry data to compile four need to know facts about APIs.
Tags : 
api, mobile app, technology, backend service
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Aug 17, 2017
The rapid rate of mobile adoption provides today’s users with nearly unlimited access to data and information anytime, anywhere. While “always on” users represent a tremendous opportunity for businesses to increase engagement, revenue, and customer loyalty, they also create unprecedented mobile delivery challenges. In this e-book, we will delve into these challenges and learn how to master them by optimizing for fast APIs, mobile apps, and mobile sites. But before we do that, let’s start our mobile story with some perspective: Approximately half of you reading this e-book will do so on mobile. That fact alone should be a compelling enough reason to keep reading, but in case it’s not, the following data illustrates the impact mobile growth has had on our technological landscape.
Tags : 
mobile, mobile adoption, customer loyalty, always on
    
Akamai Technologies
Published By: Juniper Networks     Published Date: Aug 10, 2017
OpenLab provides an environment and set of resources where customers representing telecommunications, education, government, financial services, and virtually every other vertical market can explore new technologies, all in the spirit of network transformation. By examining SDN/network automation solutions such Network Functions Virtualization (NFV), software-defined WAN (SD-WAN), and others, OpenLab offers a platform for developing and delivering new network-integrated functionality that serves the greater need.
Tags : 
technology efficiency, cloud storage services, mobile devices, applications, online collaboration tools, client services, data encryption, remote access, workflow integration
    
Juniper Networks
Published By: CBRE     Published Date: Aug 02, 2017
This three-part video blog series is my perspective on Microsoft’s strategy, the evolution of Microsoft Intune, and the critical role MobileIron plays in a Microsoft shop. My opinions are based on publicly available and third-party data plus my analysis of Microsoft’s actions. Part I of this series gives an overview of Microsoft’s strategy, and Part II provides a high-level comparison of MobileIron and Microsoft Intune.
Tags : 
microsoft strategy, mobileiron, data analysis, video blog
    
CBRE
Published By: IBM     Published Date: Jul 26, 2017
Security threats are very real, and the stakes are higher than ever. Each day, tens of thousands of malware variants are created, with new classes of threats continually added and improved upon. Savvy attackers use polymorphic programs to alter malware into new form factors after each delivery. And all of this is exacerbated by the proliferation of mobile devices, cloud computing and social media—in fact, the intersection of these technologies provides fertile new ground for threats and malware.
Tags : 
mobile devices, security, data protection, data loss, information security
    
IBM
Published By: Oracle PaaS/IaaS/Hardware     Published Date: Jul 25, 2017
"Since a decade the market has seen an outburst of data. With Managing and Securing Data is Crucial. With 3.8 Billion mobile users and 24 Zetta bytes of data created, and 100% attacks that target username and password credentials, managing and securing data has become a crucial and the most critical aspect for almost every Business. Oracle’s SPARC M7 processor, with Oracle’s Software in Silicon technology, is the industry’s most advanced multi thread, multi-core processor with unique capabilities for information security. It sets the foundation for mission-critical cloud based server infrastructure with unprecedented levels of security, efficiency, and performance.
Tags : 
    
Oracle PaaS/IaaS/Hardware
Published By: Netsuite     Published Date: Jul 24, 2017
Baseball has always collected in-game data. However, until recently, fans didn’t have easy access to the various statistics that coaches used for key decisions important for the development of the players and success on the baseball field. It’s not unlike how traditional business intelligence is delivered. Data and reports are set aside for a few experts who determine what is important for you. Today, baseball statistics are widely available during broadcasts on TV, PCs and mobile devices. Basic data displays like inning and score are enhanced with metrics meaningful to students of the game, such as pitch speed, strikeout percentages and hit zones. It’s a good example of vital information being delivered in real-time, on demand and in context.
Tags : 
    
Netsuite
Published By: CA Technologies     Published Date: Jul 20, 2017
Mainframes continue to provide high business value by combining efficient transaction processing with high-volume access to critical enterprise data. Business organizations are linking mobile devices to mainframe processing and data to support digital applications and drive business transformation. In this rapidly growing scenario, the importance of providing excellent end-user experience becomes critical for business success.This analyst announcement note covers how CA Technologies is addressing the need for providing high availability and a fast response time by optimizing mainframe performance with new machine learning and analytics capabilities.
Tags : 
    
CA Technologies
Published By: CrowdCompass     Published Date: Jul 20, 2017
You know you need a mobile event app, but choosing the right one can sometimes be a tricky, painstaking process. Ranging from freemium/low-cost solutions to full capability, multi-event apps, determining what you need for your conferences, tradeshows, incentive events, meetings, and more is no easy task. Let us help. Download our free eBook: “Simple Questions for Success – The Definitive Guide to Selecting a Mobile App” and find the awesome event app of your, and your attendees, dreams.
Tags : 
mobile app, event app, easy planning, social media integration, social media, networking capabilities, mobile event app, return on investment, mobile personalization, mobile networking, mobile interaction, mobile security, data privacy
    
CrowdCompass
Published By: VMware AirWatch     Published Date: Jul 19, 2017
Anytime, anywhere access to work is now a basic need for the modern workforce. Whether remote, in the field or in the office, workers are no longer physically connected to your network or data center. Today’s employees work in a digital workspace that features virtualized laptops, desktop and workstations; a variety of personal systems and smart devices that may be part of BYOD programs and a diverse app ecosystem with desktop, remote, mobile, SaaS and Universal apps. In this mobile-cloud world, new and unpredictable forms of malicious software continue to evolve. Traditional network security, perimeter protection and firewalls are no longer enough to combat these new threats to the corporate IT infrastructure and company data integrity.
Tags : 
    
VMware AirWatch
Published By: Oracle APAC ZO OD Prime Volume CX ABM Leads June 2017     Published Date: Jul 18, 2017
For sales teams to be successful in the age of the customer, they need tools that help them close more deals, faster. Some CRM tools are underused because they’re not geared to helping reps sell in the modern era. This may be because they’re complicated to use; because they’re isolated from the apps your reps use every day; or because they don’t give reps the information they need. Today, sales automation is not (just) about managing accounts, contacts, and activities. It’s about gaining insight that provides a competitive edge, having access to predictive information, being able to collaborate in real time, creating quotes in front of the customer, updating forecasts. All at any time, from any place, using mobile devices—all helping to drive sales and pipeline.
Tags : 
sales, mobile, analytics, customer data, sales automation, accounts, contacts, predictive information
    
Oracle APAC ZO OD Prime Volume CX ABM Leads June 2017
Published By: Oracle APAC ZO OD Prime Volume CX ABM Leads June 2017     Published Date: Jul 18, 2017
Mobile is undoubtedly changing both our personal and professional lives. Customer service organizations should decide on a strategy to bridge the gap between mobile behavior and customer service. This requires a strategic review of value drivers, combined with a tactical search for relevant use cases. Don’t fall in the “we need an app for everything” trap — some users need big screens, some users don’t. Some need a rich experience, others just need basic functions. Your strategy must take all of these dynamics into consideration.
Tags : 
data search, mobile devices, customer service, organization optimization, employee expectations, opportunities, global oracle data centers, data center traffic, customer interaction
    
Oracle APAC ZO OD Prime Volume CX ABM Leads June 2017
Published By: Oracle APAC ZO OD Prime Volume ERP ABM Leads June 2017     Published Date: Jul 12, 2017
Relentless digital developments have created the chance for the finance team to become true strategic leaders across the business—but they have also raised expectations and generated new challenges. In this digibook, we explore the growth of cloud, social, mobile and big data, and how smart CFOs are taking advantage. We show how to use your big data analytics and smooth procurement systems as a launchpad to holding your own in the Digital Age. Each chapter is illustrated by examples from successful businesses that have embraced the new ways of working as well as guidance on how to plan for and implement the changes that are right for you.
Tags : 
data analytics, digital age, digital transformation, cloud, big data, growth
    
Oracle APAC ZO OD Prime Volume ERP ABM Leads June 2017
Published By: Citrix ShareFile     Published Date: Jul 11, 2017
Mobile devices and BYOD have brought unprecedented agility to the enterprises, but with it comes new security concerns. Read this short whitepaper to learn what over 200 senior security executives had to say about the top risks and trends in data security, as well as how to overcome them: 98% of respondents deal with the loss of sensitive data Up to 50% of employees regularly share files outside your organization EFSS solutions are seen as a primary tool to enable mobility and enforce security
Tags : 
mobile device, flexibility, risk reduction, data security, agility
    
Citrix ShareFile
Published By: Citrix ShareFile     Published Date: Jul 11, 2017
It’s 2017. 29% of the global workforce is fully mobile, allowing productivity to skyrocket. Mobility is achievable for any business, but there are significant obstacles along the way. Does your workplace know enough about security and implementation to join in? This Whitepaper will help you overcome the biggest barriers to mobility in your business, such as: Security: How do you make a plan to secure your data against infinite possibilities? Efficiency: How much ROI can you expect, and what expenses should you budget? Implementation: How do you create a mobile solution your employees will love?
Tags : 
business mobility, efficiency, productivity, data security, employee satisfaction
    
Citrix ShareFile
Published By: Citrix ShareFile     Published Date: Jul 11, 2017
Mobile devices and BYOD have brought unprecedented agility to the enterprises, but with it comes new security concerns. Read this short whitepaper to learn what over 200 senior security executives had to say about the top risks and trends in data security, as well as how to overcome them: 98% of respondents deal with the loss of sensitive data Up to 50% of employees regularly share files outside your organization EFSS solutions are seen as a primary tool to enable mobility and enforce security
Tags : 
risk reduction, flexibility, mobility, data security, agility
    
Citrix ShareFile
Published By: Citrix ShareFile     Published Date: Jul 11, 2017
It’s 2017. 29% of the global workforce is fully mobile, allowing productivity to skyrocket. Mobility is achievable for any business, but there are significant obstacles along the way. Does your workplace know enough about security and implementation to join in? This Whitepaper will help you overcome the biggest barriers to mobility in your business, such as: Security: How do you make a plan to secure your data against infinite possibilities? Efficiency: How much ROI can you expect, and what expenses should you budget? Implementation: How do you create a mobile solution your employees will love?
Tags : 
data security, business mobility, efficiency, employee satisfaction, productivity
    
Citrix ShareFile
Published By: Veritas & PureStorage     Published Date: Jun 23, 2017
As flash costs continue to drop and new, flash-driven designs help to magnify the compelling economic advantages AFAs offer relative to HDD-based designs, mainstream adoption of AFAs —first for primary storage workloads and then ultimately for secondary storage workloads — will accelerate. Well-designed AFAs that still leverage legacy interfaces like SAS will be able to meet many performance requirements over the next year or two. Those IT organisations that aim to best position themselves to handle future growth will want to look at next-generation AFA offerings, as the future is no longer flash-optimised architectures (implying that HDD design tenets had to be optimised around) — it is flash-driven architectures.
Tags : 
cloud data, online marketing, customer acquisition, mobile marketing, social marketing, data warehouse, data storage, data collection
    
Veritas & PureStorage
Published By: Zebra Technologies     Published Date: Jun 21, 2017
Best practices for integrating mobile, wireless and data capture technologies into warehouse management. Download now!
Tags : 
    
Zebra Technologies
Published By: DellEMC and Intel® Xeon® processor     Published Date: Jun 19, 2017
Read this white paper to find out how you could move your enterprise to the next level. Intel Inside® per nuove, infinite possibilità.
Tags : 
digital transformation, it infrastructure, mobile, cloud, big data, social
    
DellEMC and  Intel® Xeon® processor
Published By: DellEMC and Intel® Xeon® processor     Published Date: Jun 19, 2017
Read this white paper to find out how you could move your enterprise to the next level. Intel Inside® pour de nouvelles possibilités.
Tags : 
digital transformation, it infrastructure, mobile, cloud, big data, social
    
DellEMC and  Intel® Xeon® processor
Published By: DellEMC and Intel® Xeon® processor     Published Date: Jun 19, 2017
Read this white paper to find out how you could move your enterprise to the next level. Intel Inside®. Neue Möglichkeiten Outside.
Tags : 
digital transformation, it infrastructure, mobile, cloud, big data, social
    
DellEMC and  Intel® Xeon® processor
Published By: Citrix ShareFile     Published Date: Jun 12, 2017
Some of the biggest challenges IT teams face today stem from data loss and security risks arising from the unauthorized use of personal file sharing services by employees for business purposes. Personal file sharing services invite data leakage and compliance violations by allowing files being shared to escape beyond the visibility and control of IT. At the same time, these services meet the essential need of today’s mobile workforce to be able to access and share data wherever people work. Learn how enterprise-ready file sharing solutions exceed employee needs while securing and mobilizing business data.
Tags : 
data loss, security, file sharing, mobile workforce
    
Citrix ShareFile
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

“I am the Inspector Morse of IT journalism. I haven't a clue. D'oh” - Mike Magee