RSS feed Get our RSS feed

News by Topic

mobile networks

Results 76 - 100 of 106Sort Results By: Published Date | Title | Company Name
By: Plantronics     Published Date: Oct 18, 2013
Wireless technology surrounds us — in the workplace, at home, and many places in between. Mobile phones, WiFi networks, wireless computer accessories, and cordless phones all use radio transmissions for wireless communication. Even devices not used for communication, such as microwave ovens and lighting systems, emit radio frequency energy that can impact wireless devices. In this crowded radio environment, two technologies have emerged as the standard for wireless voice communication in UC and enterprise applications.
Tags : plantronics, audio device technology, wireless technology, digital telecommunications, wireless headset success, influence deployment, analogue modulation, business conversations
     Plantronics
By: CDW     Published Date: Oct 10, 2013
Integrate and simplify mobility management with total mobility management from CDW.
Tags : byod, mobility management, total mobility, leverage practices, mobile device management, mdm, mobility strategies, wireless networks
     CDW
By: CDW     Published Date: Oct 10, 2013
A team approach and careful consideration of operational and security issues will pave the way for effective guidance. The drivers are many, but big draws include the potential for greater productivity — giving people anywhere, anytime access to information via devices they’re comfortable with.
Tags : mobile device policy, mobile data policy, mobility goals, byod, user profile, device security, mobile applications, app availability
     CDW
By: IBM     Published Date: Oct 10, 2013
Mobile computing via smart phone, laptop, tablet and e-reader is becoming commonplace in the enterprise today. Unfortunately, so are the challenges it brings. This White Paper examines the network security, device management, network performance and user expectation issues you need to solve for effective mobile collaboration, and outlines the planned, architectural approach IBM recommends.
Tags : mobile computing, smart phones, wireless devices, device management, security, network performance, user expectations, mobile collaborations
     IBM
By: Webroot     Published Date: Sep 18, 2013
With the exploding use of mobile devices and BYOD, mobile apps represent a major new threat. This infographic reveals some surprising facts about malicious mobile apps, including where they come from, what they do, and what other IT pros are thinking about MMAs. Below are some key highlights: • 73% of IT pros expect mobile threats to their networks will increase in the next 12 months • Mobile threats account for 59% of all malware • 12% of all Android Apps are now malicious
Tags : malicious mobile apps, mobile apps, malware, security, smartphones, mobile threat, mobile device, byod
     Webroot
By: ClickExpress     Published Date: May 01, 2013
The cost of ineffective customer service visits isn't just in money: the greater cost is in customer satisfaction. When a mobile workforce employee doesn't arrive on time, is missing equipment, or doesn't resolve the issue on the first visit, it leads to customer dissatisfaction, lost business, and today, public complaints in the media and social networks. Every single service organization understands the crucial value of great customer service. Every single visit to a customer is critical. In this paper, we reveal the 3 steps to a great visit every time.
Tags : employees, customer, mobile, workforce, organization, service
     ClickExpress
By: IBM     Published Date: Apr 26, 2013
The move to 4G LTE networks promises much to the world of mobile computing: speeds ten-fold faster than 3G to enable HD video quality, faster online gaming, mobile video chat, and more … but from the communication provider’s perspective, LTE’s advances also come with higher levels of uncertainty. The videos in this interactive menu show how IBM’s Integrated Service Management for LTE delivers an integrated offering that provides visibility, control and automation over LTE networks and services.
Tags : demo, ibm, trivoli, netcool, lte, launchpad, mobile computing, hd tv quality
     IBM
By: HP and Intel® Xeon® processors     Published Date: Aug 23, 2012
Networks for Today's Mobile Workforce
Tags : network, mobile, social networks
     HP and Intel® Xeon® processors
By: ForeScout     Published Date: Aug 14, 2012
The What, Why and How to Employ NAC to Apply Guest Networking, BYOD (Bring Your Own Device) and Endpoint Security Policies. Many of today's endpoints are neither known nor protected. According to Gartner, enterprises are only aware of 80 percent of the devices on their network. Those 20 percent of unknown devices are inside the perimeter of the network, are unmanaged and provide users with access. They are small, varied and highly mobile, and they are loaded with their own applications, can act as WAPs, and often contain outdated firmware or are jailbroken. Even as the devices are accessing personal applications on the web, they are also accessing corporate resources such as e-mail-all from the very same unmanaged devices, which have not been vetted by the security organization. Smartphones, notebooks, netbooks, iPads, e-readers, gaming consoles and more-the list of personal devices attempting access to employer networks seems to grow every day in what's come to be known as the BYOD (Bring Your Own Device) era in networking.
Tags : pad, mine, enabling, secure, personal, mobile, device, use
     ForeScout
By: Mirror Image Internet     Published Date: Jun 07, 2012
This white paper discusses 5 sure-fire ways you can make your advertising technologies perform better to deliver significant business value.
Tags : advertising, ad ops, ad tech, display advertising, online advertising, targeting, data, mobile advertising
     Mirror Image Internet
By: Oracle     Published Date: May 22, 2012
With the growing number of channels for consumers to connect with your products from store kiosks to mobile devices and social networks, it is increasingly important that they are experiencing the the same consistent brand experience regardless of the channels they choose. This whitepaper describes 3 customer experience features to help guide your decisions about technology, organizational structure, and internal process.
Tags : oracle, multichannel integration, marketing, customer experience, crm solutions/software, customer experience/engagement, business intelligence, market research
     Oracle
By: CenturyLink     Published Date: Mar 09, 2012
IT Security challenges are more complex than ever, as mobile devices, social technologies and cloud computing take hold. Find out how these top 2012 security trends will affect your organization-and make sure your data protection measures are ready.
Tags : centurylink, qwest, high speed internet, phone, mobile, tv services, offers, bundles
     CenturyLink
By: CenturyLink     Published Date: Mar 09, 2012
Explore this infographic and begin building a tangible plan-it could mean the difference between reacting and prospering in Big Data's shadow.
Tags : centurylink, qwest, high speed internet, phone, mobile, tv services, offers, bundles
     CenturyLink
By: CenturyLink     Published Date: Nov 18, 2011
Read this IDC Executive Brief to see how MPLS facilitates cost-effective and converged wide area networking with a high level of security and flexibility
Tags : centurylink, qwest, high speed internet, phone, mobile, tv services, offers, bundles
     CenturyLink
By: Cotendo     Published Date: Nov 18, 2011
Learn about the technology limitations killing the performance of mobile websites and mobile applications, plus how innovations in mobile content delivery networks (CDNs) can transform users' experience of the mobile Web.
Tags : mobile cloud, mobile web performance, mobile website performance, mobile application performance, mobile content delivery, mobile acceleration, mobile cdn, cotendo mobile
     Cotendo
By: HP     Published Date: Nov 14, 2011
Read this whitepaper to learn the 3 key factors that IT managers need to consider when designing a scalable network for today's mobile workforce.
Tags : networks, mobile, mobile workers, worforce, scalable, wi-fi, text, social networks
     HP
By: Limelight Networks     Published Date: Jul 01, 2011
Create your own tablet-worthy site, and make your marketing work harder. This report shows you how to: . Take advantage of the tablet as a high-end media experience . Create experiences that support unique tablet behavior . Increase engagement by leveraging user-generated content
Tags : mobile marketing, tablet-worthy site, mobile website, ipad site, limelight networks, content delivery, content delivery network, cdn
     Limelight Networks
By: Symantec.cloud     Published Date: Mar 02, 2011
The mobile workspace has created problems for IT, including policy enforcement, attack from untrusted wireless networks, and physical data theft. This white paper examines how cloud-based security solutions can protect distributed workers.
Tags : symantec.cloud, messagelabs, distributed workforce management, cloud-based security, it security, remote worker, wireless network, laptop
     Symantec.cloud
By: Neustar     Published Date: Sep 15, 2010
How Nonprofit Organizations can use SMS to mobilize Millions of Volunteers, Dollars, and Supporters.
Tags : neustar, sms, mobile networks, text message, call to action, mobile marketing, government, non profit
     Neustar
By: Neustar     Published Date: Jun 30, 2010
Sell more in 160 characters or less.
Tags : neustar, sms, mobile networks, text message, call to action, mobile marketing
     Neustar
By: BlackBerry     Published Date: Apr 13, 2010
Mobile deployments in business are growing at an accelerating rate, enabled by increasingly capable devices at attractive prices, faster, less costly, and more reliable wireless networks being deployed across wider areas, and an expanding array of mobile applications that empower the mobile workforce with an abundance of business critical functions.
Tags : blackberry, iphone, windows, wireless networksmicrosoft exchange, mobile device management, mobile device management software, mobile workers, remote computing
     BlackBerry
By: Neustar     Published Date: Mar 29, 2010
How SMS can help government agencies reach the public in 160 characters or less.
Tags : neustar, sms, mobile networks, text message, call to action, mobile marketing, government
     Neustar
By: Internet Security Systems     Published Date: Aug 21, 2009
Mobile and remote workers of all types need high-quality connections to the Internet and to their corporate networks. They need connections from branch offices, homes, airports, hotels and other locations around the world. This truly becomes a security challenge as network managers scramble to meet these needs.
Tags : mobile workforce, remote access, network security, wireless security, off-site, remote workers, internet security, internet security systems
     Internet Security Systems
By: Trend Micro, Inc.     Published Date: Apr 29, 2009
Companies rely on knowledge assets, such as product formulas and customer databases. VPNs and network monitors can protect proprietary information from outsiders; but, they won't do much to prevent access by internal users. With the popularity of wireless networks, USB drives and other portable devices, it's all too easy for insiders to leak key data. This white paper explains how Trend Micro LeakProof 3.0 protects sensitive data at rest, in use, and in motion.
Tags : trend micro, data breach, breaches, data breaches, data loss prevention, dlp, hackers, data leak
     Trend Micro, Inc.
By: Trend Micro, Inc.     Published Date: Apr 29, 2009
Encryption will help to protect data against unauthorized access by outsiders from lost or stolen devices such as laptops, thumb drives, and other removable media. But it does not protect against the insider threat-employees and contractors with authorized access to data who mistakenly or maliciously leak your most valuable assets.
Tags : trend micro, encryption, laptop, ediscovery, e-discovery, data protection, threats, leaks
     Trend Micro, Inc.
Start   Previous    1 2 3 4 5    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics