RSS feed Get our RSS feed

News by Topic

mobile use

Results 776 - 800 of 828Sort Results By: Published Date | Title | Company Name
By: IBM     Published Date: Sep 16, 2014
In 2013, Bon Ton Stores invested in upgrading IT, continuing to update and expand its eCommerce sites, and launching a new mobile site supporting delivery of promotions and online purchasing. A central aspect of this technology upgrade involved the replacement of an x86 server environment, supporting eCommerce with ten IBM® PowerLinux™ 7R2 servers and IBM PowerVM® running IBM WebSphere® Commerce on SUSE Linux operating systems. This case study highlights of some of the key aspects of this significant migration and its results, including how Bon-Ton IT executives support the business and what they prioritize, why they decided to make this move, what performance and capability resulted, and how it affected full data center costs and business resilience.
Tags : stack costs, online purchasing, promotion delivery, mobile retail
     IBM
By: Cisco     Published Date: Dec 21, 2016
To better understand the benefits, costs, and risks associated with Cisco TrustSec, Forrester interviewed two companies. Company A is an organization that provides senior housing for over 22,000 residents in the US. This organization used Cisco TrustSec to provide highly secure segmented mobile network services to its residents. Company B is an international packaging and paper group company experiencing rapid growth. It used Cisco TrustSec as an innovative solution to quickly integrate the infrastructure of new acquisitions into its own and standardize security architecture across its wide area network (WAN) globally. While the case study will talk about the experiences of these two companies, the financial analysis focuses on the impact that Cisco TrustSec had on one organization.
Tags : 
     Cisco
By: Globalscape     Published Date: Mar 21, 2014
This whitepaper examines the way in which enterprise mobility has both increased employee productivity and decreased the security of corporate networks. The paper discusses the challenges IT managers have with controlling the "Bring Your Own Device" (BYOD) trend to allow mobile users to have access to the corporate network. Explained in the paper is the limit to visibility and control of file transfers when employees use ad hoc methods, and that educating employees on proper data access is not enough to protect the corporate network. The paper concludes by describing how Globalscape's EFT™ and Tappin™ can provide mobile access, without compromising security and controls over file sharing.
Tags : mobile, mobile access, remote access, byod, smartphones, tablets, laptops, ad hoc
     Globalscape
By: Cisco     Published Date: Apr 07, 2014
This is a report of the findings from the Cisco Internet Business Solutions Group (IBSG) who conducted a survey of 540 U.S. mobile business users to understand their needs and behaviors.
Tags : mobile, wi-fi, wireless, cisco, research
     Cisco
By: Cisco     Published Date: Apr 07, 2014
This is a report of the findings from the Cisco Internet Business Solutions Group (IBSG) who conducted a survey of 540 U.S. mobile business users to understand their needs and behaviors.
Tags : mobile, wi-fi, wireless, cisco, research
     Cisco
By: Cisco     Published Date: Apr 07, 2014
This is a report of the findings from the Cisco Internet Business Solutions Group (IBSG) who conducted a survey of 540 U.S. mobile business users to understand their needs and behaviors.
Tags : mobile, wi-fi, wireless, cisco, research
     Cisco
By: Adobe     Published Date: Mar 03, 2017
With a world of information and accessibility in their pockets, customers can engage with a brand whenever and wherever they want. This flexibility has made mobile technology an essential part of the way both customers and businesses interact. And to deliver experiences that feel personal and intimate, your plan needs to account for a critical building block to any relationship: trust. Read Circles of Trust: Use Mobile to Engage Better, to understand how you can leverage trust to deliver a better customer experience. Read the white paper to learn: • The four major circles of trust as a fresh approach to successful customer experience • The seven steps to effective optimization • The 3 C’s of mobile marketing • The steps for developing a mobile optimization plan across your organization
Tags : mobile engagement, branding, mobile marketing, mobile optimization
     Adobe
By: Adobe     Published Date: Mar 03, 2017
Today, customer identity is the only constant in digital marketing. But as consumers switch from desktop to mobile, they are more and more difficult to recognize. But it’s not impossible. The Adobe white paper, Managing Anonymous and Authenticated Experiences Across the Customer Lifecycle, explains best practices to identify your anonymous and authenticated customers while complying with regulations, contracts, and industry standards. Read the paper to learn: • The benefits of well executed personalization • How to navigate the landscape between anonymous and authenticated data • Safe and effective uses of consumer information • The technological building blocks to put these new methods to work
Tags : personalization, authenticated data, anonymous data, consumer information, customer life cycle, customer experience
     Adobe
By: Cyveillance     Published Date: Jun 20, 2014
Phishing is defined by the Financial Services Technology Consortium (FSTC) as a broadly launched social engineering attack in which an electronic identity is misrepresented in an attempt to trick individuals into revealing personal credentials that can be used fraudulently against them. In short, it’s online fraud to the highest degree. Although it’s been around for years, phishing is still one of the most common and effective online scams. The schemes are varied, typically involving some combination of spoofed email (spam), malicious software (malware), and fake websites to harvest personal information from unwitting consumers. The explosive rise of mobile devices, mobile applications, and social media networks has given phishers new vectors to exploit, along with access to volumes of personal data that can be used in more targeted attacks or spear phishing. The fact that phishing attacks are still so common highlights their efficacy and reinforces the need to implement comprehensive phishing and response plans to protect organizations. An effective phishing protection plan should focus on four primary areas: Prevention, Detection, Response, and Recovery. High-level recommendations for each of the four areas are outlined in this whitepaper.
Tags : cyveillance, phishing, security, cyberattacks, cybercriminals, threats
     Cyveillance
By: Box     Published Date: Jun 11, 2014
Watch this webcast to learn what's really happening in the mobile space and how you can use mobile tech to transform your business. You'll hear examples of innovative companies and what they're doing and learn to use new technology to optimize how your employees access and share info, allowing them to get more work done.
Tags : box, mobile, enterprise, mobile tech, technology
     Box
By: Epicor     Published Date: Mar 19, 2015
Mobile user access to ERP and other back office systems has become a core requirement as organizations seek operational efficiency and deepening customer engagement. Without mobile access, system users are disadvantaged by needing to return to a desktop, often after a job is completed, to enter data relating to that job and get information about other jobs. Frequently that information is not entered at all and become more of a hindrance to user adaption of your ERP investment.
Tags : mobile access, erp, office systems, customer engagement
     Epicor
By: Epicor     Published Date: Feb 09, 2018
As mobile devices become increasingly essential to our working lives, your business—and your enterprise resource planning (ERP) system—must connect to these vital tools or risk losing to the competition. When employees can use their preferred devices to access information on demand, distributors like you can improve employee collaboration, increase productivity, and deliver exceptional customer service. In this Epicor eBook, you’ll discover how mobile technologies can integrate with your ERP solution to help you: • Instantly give customers what they want • Make faster business decisions • Use the right tools to enhance sales productivity Download the eBook to learn how else you can capitalize on greater mobility and grow your distribution business.
Tags : distribution, mobility
     Epicor
By: CradlePoint     Published Date: Sep 04, 2014
Whether your businesses are connected to the Internet via T1/T3, DSL or Cable, incorporating a mobile broadband backup solution adds uptime whenever there is a loss in connectivity via your wired line. With CradlePoint routers as your Internet backup solution, you're ensured more uptime for your POS transactions and cloud-based services while gaining significant financial and operational benefits over wired backup solutions including: better reliability, lower operating costs, greater ease of use and management, and quicker speed to deployment. Please download the whitepaper to learn more!
Tags : cradlepoint, business continuity, dsl, internet service, t1 or t3 line, distributed enterprises, storage
     CradlePoint
By: IBM MaaS360     Published Date: Feb 05, 2015
Bring Your Own Device has changed the rules for corporate security on smartphones and tablets. Companies need to find the right balance in securing email, apps and content without compromising user experience.
Tags : data security, byod, corporate security, mobile data security, user experience, security
     IBM MaaS360
By: IBM MaaS360     Published Date: Apr 15, 2015
Mobile device Management was just the beginning of enterprise security needs for iOS, Android, Windows and the ever expanding universe of devices. Data, Apps and access are what will send businesses into a new galaxy of great performance. Get there at safely light-speed with Enterprise Mobility Management.
Tags : fiberlink, mobile users, strategy, app enabled, scalability, security, device management, enterprise
     IBM MaaS360
By: IBM MaaS360     Published Date: Apr 15, 2015
Tired of hearing all the ways you need to go “mobile” and all the ”things” it can do for your business. Don’t buy the hype, here’s a list of perfectly valid reasons fast and secure mobile deployment and management is a bunch of hullabaloo and poppycock.
Tags : fiberlink, mobile users, strategy, app enabled, scalability, security, device management, enterprise
     IBM MaaS360
By: IBM MaaS360     Published Date: Apr 16, 2015
See where Ovum places the focus on EMM for 2015 and the vendors with the vision and executional ability to deliver.
Tags : fiberlink, deliverability, mobile users, strategy, app enabled, scalability, security, device management
     IBM MaaS360
By: IBM MaaS360     Published Date: Apr 16, 2015
The Aragon Globe delivers an eighteen-vendor comparison on EMM strengths and weaknesses for mobile devices, content and BYOD readiness.
Tags : fiberlink, mobile users, strategy, app enabled, scalability, security, device management, enterprise
     IBM MaaS360
By: Lumesse     Published Date: Feb 13, 2015
This White Paper illustrates the trends that increase the complexity of recruitment, causing talent acquisition managers and HR leaders significant concern: the emergence of new technology, changing demographics and recruiting across borders and increasing globalisation.
Tags : use of technology in recruitment, new recruitment methods, mobile jobseekers, social media, customer experience/engagement, mobile marketing
     Lumesse
By: IBM     Published Date: Apr 01, 2015
Is email still the “killer app” it used to be? Social technologies and mobile capabilities are changing the way people communicate in the workplace. Many organizations are employing BYOD strategies and embracing social business tools like file sharing, chat, wikis and communities. In the past, email was used for storing and sharing documents and having conversations with groups. Tasks which are much better suited for today's social cloud collaboration tools. Email usage may be evolving, but email is not dead. In fact, everyone in the organization from executives to factory workers needs email to stay connected. And many organizations are moving their messaging to cloud to take advantage of the flexibility and cost savings a cloud environment provides. In this webcast, you will learn: • How the nature of email has changed and why everyone in your organization needs it. • Why the cloud makes sense for messaging for everyone from executives, to sales, to boundary workers, either as hybrid solution or for the entire workforce. • How email complements social business technologies and how you can start using your email more efficiently in the workplace. • How moving messaging to the cloud can help reduce IT cost and complexity.
Tags : email, social technologies, byod, file sharing, chat, cloud, ibm
     IBM
By: MobileIron     Published Date: Mar 21, 2017
In 2017, BlackBerry customers will face a major IT challenge — rebuilding their entire mobile security infrastructure when BlackBerry officially end-of-lifes its Good for Enterprise email app. Migrating to BlackBerry’s offering involves more than just rolling out a new app; it will require IT to spend significant time and resources to redefine policies, retrain IT and help desk staff, and re-enroll hundreds or even thousands of users in the new software.
Tags : 
     MobileIron
By: VMware AirWatch     Published Date: Nov 12, 2015
Historically in the enterprise, Macs have been managed separately from iOS devices in separate consoles, sometimes by different groups within IT. Traditional domain-joined management posed several problems for today’s modern enterprise. Nowadays, managing Macs like mobile devices means they can be configured over the air, without ever having to be domain-joined. That’s a major plus for global organizations, remote workers and companies who use contractors or freelancers. Unifying parallel device environments enables streamlined oversight, management and distribution of content across Macs and iOS devices. With AirWatch® Enterprise Mobility Management, IT can implement a BYOD program and policy for all device types, ensuring personal information remains private. IT has a consistent management experience for all device types and operating systems, enabling a single-pane-of-glass view of all endpoints in an enterprise.
Tags : vmware, emm, mac management, managing macs, airwatch
     VMware AirWatch
By: VMware AirWatch     Published Date: Nov 13, 2015
Au cours des dernières années, le terme « BYOD » ( Bring Your Own Device » ou « Utilisation de terminaux personnels ») a gagné en popularité dans le monde du travail, et les terminaux mobiles sont devenus très courants dans de nombreuses entreprises. Toutefois, ce terme englobe bien plus que cette nouvelle tendance. L’utilisation de terminaux personnels n’est qu’une partie d’une évolution plus importante et plus profonde : celle de la consumérisation de l’informatique qui remonte au début des années 2000. À cette époque, presque tout le monde avait un ordinateur personnel qui permettait de travailler chez soi en dehors des heures de travail. Nous avions tous les avantages de ces terminaux choisis avec soin et nous profitions d’un grand confort d’utilisation par rapport aux terminaux d’entreprise préparés par le service informatique.
Tags : byod, vmware, productivity, it management, mobile accessibility
     VMware AirWatch
By: VMware AirWatch     Published Date: Nov 13, 2015
In den vergangenen Jahren ist der Begriff „BYOD“ am Arbeitsplatz immer populärer geworden, weil zahlreiche Unternehmen auf mobile Geräte umgestiegen sind. BYOD ist aber nicht nur ein begrifflicher Trend oder einfach nur eine Abkürzung. Es handelt sich um einen viel größeren und stärker verwurzelten Trend: die stärkere Orientierung der IT an Verbraucherprodukten, die seit Anfang des 21. Jahrhunderts zu beobachten ist. Damals verfügten nahezu alle über einen PC, mit dem sie nach Feierabend zu Hause arbeiten und dabei die Vorteile nutzen konnten, die ihnen das eigene, vertraute und sorgfältig ausgewählte Gerät gegenüber dem von der Unternehmens-IT bereitgestellten System bot.
Tags : byod, vmware, productivity, it management, mobile accessibility
     VMware AirWatch
By: VMware AirWatch     Published Date: May 19, 2016
The economy isn’t standing still. For your business to succeed, your employees shouldn’t either. That’s why companies of all types are moving to empower their mobile workforce and engage with customers in innovative ways. To realize their potential, enterprises need to find ways to make a mobile workforce as productive when they’re away from the office and on their mobile devices as they are in the office. This means mobility systems must give users a seamless experience across the ever-expanding types of mobile devices employees use, for easy access to business-critical applications. At the same time, it must deliver a secure workspace that complies with security regulations, protects devices, plus guards business and customer data, from expanding security threats.
Tags : innovation, best practices, mobile device, security, mobile workforce
     VMware AirWatch
Start   Previous    20 21 22 23 24 25 26 27 28 29 30 31 32 33 34    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics