RSS feed Get our RSS feed

News by Topic

mobile use

Results 126 - 150 of 827Sort Results By: Published Date | Title | Company Name
By: VMware AirWatch     Published Date: Jul 21, 2016
Windows 10, a mobile and cloud-ready operating system (OS), is poised to significantly impact on organizations' end user computing (EUC) strategy, with a unified platform for building apps and extending the organization's core processes to end users using any Windows 10-powered device. However, enterprise-wide execution of this business mobility vision comes with its own set of challenges. Read this white paper to learn how a unified endpoint management solution can enable organizations to fully capitalize on their mobility initiatives and IT departments to redefine themselves as true business enablers.
Tags : technology, windows, data, cloud, mobile, cloud computing, applications, enterprise
     VMware AirWatch
By: VMware AirWatch     Published Date: Jul 21, 2016
Windows 10, a mobile and cloud-ready operating system (OS), is poised to significantly impact on organizations' end user computing (EUC) strategy, with a unified platform for building apps and extending the organization's core processes to end users using any Windows 10-powered device. However, enterprise-wide execution of this business mobility vision comes with its own set of challenges. Read this white paper to learn how a unified endpoint management solution can enable organizations to fully capitalize on their mobility initiatives and IT departments to redefine themselves as true business enablers.
Tags : technology, windows, data, cloud, mobile, cloud computing, applications, enterprise
     VMware AirWatch
By: VMware AirWatch     Published Date: Jul 21, 2016
Windows 10, a mobile and cloud-ready operating system (OS), is poised to significantly impact on organizations' end user computing (EUC) strategy, with a unified platform for building apps and extending the organization's core processes to end users using any Windows 10-powered device. However, enterprise-wide execution of this business mobility vision comes with its own set of challenges. Read this white paper to learn how a unified endpoint management solution can enable organizations to fully capitalize on their mobility initiatives and IT departments to redefine themselves as true business enablers.
Tags : technology, windows, data, cloud, mobile, cloud computing, applications, enterprise
     VMware AirWatch
By: Q2 eBanking     Published Date: Jul 30, 2017
To thrive in today’s marketplace, FIs can meet the mobile-first challenge by offering a unified digital experience and highly relevant offers while expanding digital-first design to mobile businesses. A technology partner like Q2 will help. We will help you execute with the speed, agility, and accuracy to meet today’s pace of change and offer the digital experience your consumer, business, or corporate users demand.
Tags : 
     Q2 eBanking
By: CA Technologies     Published Date: Jan 26, 2015
The ability to apply software to strategic advantage is the de? ning technology theme of this decade. This is not just an IT issue. It is a business imperative. Every business is in the software business. In some industries, the number of software jobs has doubled over the past ? ve years. JP Morgan Chase has more software developers than Google and more technologists than Microsoft. If you think your company isn’t in the software business, you’re wrong. Airlines, oil companies, telecommunications providers all are using applications to attract customers and gain a competitive advantage. With the ubiquitous adoption of mobile devices, a whole new platform for application and content delivery is evolving. With their colorful, interactive, intuitive user interfaces, always-on global connectivity, sensing capabilities such as GPS and device orientation and their ability to connect with users through personalized con? guration options, mobile is truly the de? ning platform of the applicat
Tags : enterprise mobility management, mobile devices, software, competitive advantage, strategic requirement
     CA Technologies
By: MobileIron     Published Date: Feb 05, 2016
Mobile platforms have leapfrogged PC security for years, but as mobile device adoption explodes worldwide, these platforms face more security threats than ever before. While mobile devices are still safer than PCs, hackers are relentlessly searching for new ways to exploit these operating systems and gain access to their valuable data. Four major threats are currently targeting iOS and Android devices using very clever tactics. In fact, users may not know their devices have been compromised until after their data has been hacked.
Tags : mobile malware, activesync, mobile platforms, hackers, data threat, android, ios
     MobileIron
By: MobileIron     Published Date: Aug 03, 2016
In this edition we discuss emerging risks, report OS enterprise share, and list the top blacklisted consumer apps. We conclude with our recommendations for enterprises to protect their assets against mobile risks and threats. Several new mobile attacks have emerged that threaten enterprises. Most are re-using old tactics against mobilespecific services, such as SideStepper’s use of Man-In-The-Middle (MITM) against MDM, rather than employing new techniques or exploiting new vulnerabilities. When attacks against users are successful, they can result in the loss of both personal and business data.
Tags : 
     MobileIron
By: MobileIron     Published Date: Aug 04, 2016
This whitepaper describes the MobileIron app security model and how it can be used to secure Office 365 for mobile devices.
Tags : office 365, mobileiron, crm, erp, analytics, security model, mobile apps
     MobileIron
By: MobileIron     Published Date: Aug 04, 2016
Mobile platforms have leapfrogged PC security for years, but as mobile device adoption explodes worldwide, these platforms face more security threats than ever before. While mobile devices are still safer than PCs, hackers are relentlessly searching for new ways to exploit these operating systems and gain access to their valuable data. Four major threats are currently targeting iOS and Android devices using very clever tactics. In fact, users may not know their devices have been compromised until after their data has been hacked.
Tags : mobile malware, activesync, mobile platforms, hackers, data threat, android, ios
     MobileIron
By: MobileIron     Published Date: Sep 07, 2017
Secure corporate data, drive employee productivity, and enable business innovation in ways you never thought possible. Harness the power of mobile devices with the leading enterprise mobility management (EMM) platform from MobileIron. By providing a modern EMM solution that meets both user demands and IT security requirements, MobileIron enables today’s large enterprises to become truly Mobile First.
Tags : mobileiron, information technology, platform, security, mobile devices
     MobileIron
By: Aternity     Published Date: Feb 24, 2016
In this brief, the focus will be on how companies are relying on more mobile applications to run their businesses. As these mobile applications become more important, it is critical for companies to ensure a quality mobile user experience in order to deliver quality service to ensure customer satisfaction and brand loyalty. A unified approach to mobile end user experience monitoring is the proven way enterprises can ensure this quality user experience.
Tags : aternity, mobile strategy, mobile apm, unified monitoring, mobile applications, brand loyalty
     Aternity
By: OutSystems     Published Date: Oct 12, 2015
This ebook will help you navigate the mobile architecture decision process to select the right mix of native and HTML5 in order to achieve the perfect balance between richness of use and development productivity.
Tags : outsystems, enterprise, mobile, application, architecture, html, application development
     OutSystems
By: Microsoft     Published Date: Jul 07, 2016
Enable, protect, and manage mobile productivity Protecting email and other corporate data on mobile devices—without bogging down workers—is one of today’s biggest challenges faced by IT pros today. With the massive, global proliferation of mobile devices, it can be a struggle to manage and secure these devices and your data, both on approved enterprise applications and shadow IT. Download this free e-book to learn how to control the uncontrollable and create a solution that: • Enables continuous management, so your employees are more productive. • Offers threat protection, so you can detect abnormal user behavior, suspicious activities, known malicious attacks, and security issues right away. • Guards against data leakage. • Provides security after loss or theft of mobile devices. • Helps protect your Microsoft Office email, files, and apps.
Tags : mobile devices, enterprise, best practices, management
     Microsoft
By: Microsoft     Published Date: Jul 07, 2016
Before you transform your business with mobility services, you need to consider both the management and security challenges you’ll face from the combination of mobile devices and cloud-based apps. In this IDC report, you’ll examine enterprise mobility management technology—offered through solutions such as the Microsoft Enterprise Mobility Suite—and how it helps manage the security risks of your mobility strategy. Learn about these critical benefits: • Provisioning and configuration devices and users—across platforms • Ensuring only authorized users access data with identity system integration • Ensuring only compliant devices access the corporate network through conditional access policies • Allowing mobile applications to deploy in a more secure, streamline manner with enterprise app stores • Providing security for data at rest, within workflows or over wireless networks, using granular policies around applications
Tags : mobile, cloud, best practices, productivity, technology
     Microsoft
By: Microsoft     Published Date: Oct 07, 2016
Security was once largely limited to the confines of an on-premises world, but now it must extend to the cloud, as well as a myriad of mobile devices. Employees and companies now expect increasingly complex interactions with devices, apps, data, and even other users. As many companies struggle to keep up with traditional single-point solutions, and limited budgets, this pressure is creating security blind spots for IT. In a world of evolving threats, it is becoming increasingly impossible to address all of these issues with an on-premises solution.
Tags : technology, best practices, data, enterprise, business analytics, business intelligence, business management
     Microsoft
By: CA Technologies     Published Date: Nov 02, 2016
Since Aternity was founded in 2005, the business world has changed dramatically. Mobile devices, software as a service (SaaS) and the cloud have taken up permanent residence in today’s enterprise IT department. Aternity stays on the cutting edge by rapidly delivering innovative End User Experience Monitoring solutions that can monitor any application on any device—physical, virtual or mobile—for any user.
Tags : 
     CA Technologies
By: CA Technologies     Published Date: Aug 22, 2017
Across industry sectors, the boundaries of the traditional enterprise are blurring, as organizations open up their on-premise data and application functionality to partner organizations, the Web, mobile apps, smart devices and the cloud. APIs (application programming interfaces) form the foundation of this new open enterprise, allowing enterprises to reuse their existing information assets across organizational boundaries.
Tags : 
     CA Technologies
By: CA Technologies     Published Date: Aug 22, 2017
The mobile app has become “the” strategic initiative for all digital organizations attempting to drive business forward. “By 2017, mobile apps will be downloaded more than 268 billion times, generating revenue of more than $77 billion — making apps one of the most popular computing tools for users across the globe.”1 The app has become more than a simple method of communication. It is the new critical point of engagement, the face of the organization, and quite possibly the difference maker in customers staying or leaving. Getting the “user experience” (or UX) right in the eyes of the consumer is no longer a nice to have but fundamental to achieving success.
Tags : 
     CA Technologies
By: CA Technologies     Published Date: Aug 22, 2017
The application economy has forced businesses to transform. To capture new growth opportunities, enterprises are opening up and sharing select data and applications with developers, partners, mobile devices, the cloud and the Internet of Things (IoT). One of the byproducts of this transformation is the discovery that legacy data has value in the application economy—so much so that new revenue opportunities emerge as this data is used in new ways.
Tags : 
     CA Technologies
By: HP Enterprise Business     Published Date: Jan 20, 2017
We all want our work to be meaningful and valuable. Working with mobile apps enables us to reach millions – potentially billions – of users if we create something our users like, value, and find useful. Download now to learn more.
Tags : 
     HP Enterprise Business
By: Intapp     Published Date: Jan 09, 2019
Intapp Time provides superior business intelligence thatchangesyour firm’sfundamental relationship with time.Thisunified suite of applications gives timekeepers access to time data and capture wherever they are: in the office, on a mobile device, online and offline.It is user-centric, offering a completely automated option while fullysupporting hands-on tracking—contemporaneous or reconstructionist.Intapp Time helps your business mine time data to reveal new sources of revenue, inform staff decisions, increase project efficiency, and reduce time leakage.
Tags : business, business intelligence, time, tax, time for tax, intapp, applications, time data
     Intapp
By: Oracle Analytics     Published Date: Oct 06, 2017
Empowered with mobile and cloud-based access to a myriad of products and services, customers now have a variety of options at their fingertips with regards to partnerships. Enterprises that do not follow the ever-changing tastes and preferences of their customers, or that wait too long to react, will fall behind and fail. Across functions, business professionals readily require big data tools and insights to understand and serve these customers. It is no longer an option for business users to rely on IT to deliver customer and other relevant analytics. On the flipside, handing the analytics reins entirely to business users can make governance nearly impossible. Organizations must find balance in a new approach in which IT mostly governs and curates data while business users are empowered to derive insights from data mostly ontheir own without delay.
Tags : 
     Oracle Analytics
By: Dell SB     Published Date: Jan 24, 2019
Creators, inventors and designers across the world’s industries rely on Dell Precision workstations to expand the horizons of the possible and bring their ideas into reality. Some of the most noteworthy features of the Precision workstation family include: • A broad solution portfolio that ranges from mobile devices to rack and tower workstations • Innovative designs that enhance user experiences • Power to enable emerging technologies • The industry’s most comprehensive service and support offering, Dell ProSupport • A world-class ecosystem of displays, input devices and accessories
Tags : 
     Dell SB
By: ipoque     Published Date: Feb 14, 2019
Virtualized Evolved Packet Core (vEPC) is a major breakthrough in network function virtualization (NFV). When asked where they have deployed NFV in production networks, communication service providers (CSPs) consistently name vEPC as one of the top answers. Why is that? In order to maximize their processing capacity, CSPs virtualize a subset of their network applications, including mobile edge computing (MEC), base stations (small/macro cells) and the mobile core, because these systems use a large bandwidth. The mobile packet core builds the foundation of the core network on which mobile CSPs offer IP-based services to their customers. Implementing vEPC solutions can help CSPs obtain the scale necessary to accommodate growing numbers of subscribers and large amounts of traffic or connections while controlling costs and improving on quality of experience (QoE). In the past, evolved packet core (EPC) solutions were deployed on purpose-built hardware. NFV enables operators to deploy EPC c
Tags : dpi, deep packet inspection, vepc, sdn, nfv, network analytics, virtual network
     ipoque
By: ipoque     Published Date: Feb 14, 2019
Application-aware vEPC is the key to SDN/NFV service deployments. Deep packet inspection software provides granular network data, which lays the foundation for application awareness in mobile networks. This case study explains how a leading provider of virtualized network solutions uses the best-berforming deep packet inspection (DPI) software R&S®PACE 2 by Rohde & Schwarz to provide their CSP customers with overall network intelligence at a highly granular level.
Tags : dpi, deep packet inspection, vepc, sdn, nfv, network analytics, virtual network
     ipoque
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics