RSS feed Get our RSS feed

News by Topic

smartphones

Results 126 - 150 of 264Sort Results By: Published Date | Title | Company Name
By: DocuSign     Published Date: Aug 09, 2016
Emails would go unanswered, social posts unseen, movie times and tickets unpurchased, our favorite sports teams ignored, pictures untaken you get the idea. Now add tablets and the growing interest in wearable. All have become vital and pervasive appendages to helping us live our lives to the fullest.
Tags : docusign, secure cloud storage, mobile device management, smartphones, internet
     DocuSign
By: DocuSign     Published Date: Feb 13, 2017
"As HP digitized its contracting process with DocuSign, it went from 23 steps down to 7. Contracts are signed in 4 days down from 23 days—a 93% improvement in turnaround time. ""Our workforce is mobile; our salesforce is mobile. People want to do things on their laptops, tablets and smartphones. DocuSign enables us to do that. It is a digital enterprise solution."" -- Nick Gunn, SVP of Global Corporate Services at Hewlett-Packard. See more of their story.
Tags : 
     DocuSign
By: Dropbox for Business     Published Date: Jun 09, 2014
Not so long ago, the office was the only place you could work. But when smartphones and tablets came along, the only thing holding us back from getting work done anywhere, any time was having access to our data. That led to the creation of a whole new class of solutions designed to keep files current across our rapidly proliferating fleets of devices — through a technology known as ‘sync.’ All of a sudden, getting a file from your work laptop to your iPad became as simple as clicking “Save.” So it’s no surprise that 55% of information workers in North America and Europe who use a tablet at work are using file sync and share tools.
Tags : dropbox, file sync, data, technology, sync
     Dropbox for Business
By: e-SignLive     Published Date: Oct 11, 2013
While we tend to think about mobility largely as a consumer phenomenon, it is also changing how the workforce carries out business. With so much being done beyond traditional office walls, many insurance companies, financial service organizations and even government agencies are adopting mobile tablets and smartphones as productivity tools for agents, representatives and personnel, and developing enterprise apps for these devices.
Tags : ipad, mobility, apple, e-signatures, esign
     e-SignLive
By: ExactTarget     Published Date: Aug 14, 2014
Marketing as you know it will never be the same. There’s a fundamental shift in relationships between brands and customers—fueled by smartphones, social media, and today’s always-on, always-connected mentality. Marketers have access to more customer data (big data) than ever before. But the quantity of data only matters if you’re smart about using it—to power 1:1 customer journeys.
Tags : marketing cloud, target, big data, brands, customers, social media, smartphones, always-on
     ExactTarget
By: Focus     Published Date: Jan 06, 2011
Mitigate the risks of data breach and loss with these best practices for managing security on mobile devices.
Tags : amy babinchak, best practices, bob egan, expert content, information technology, it security, josh lipton, ken wineberg
     Focus
By: ForeScout     Published Date: Aug 14, 2012
The What, Why and How to Employ NAC to Apply Guest Networking, BYOD (Bring Your Own Device) and Endpoint Security Policies. Many of today's endpoints are neither known nor protected. According to Gartner, enterprises are only aware of 80 percent of the devices on their network. Those 20 percent of unknown devices are inside the perimeter of the network, are unmanaged and provide users with access. They are small, varied and highly mobile, and they are loaded with their own applications, can act as WAPs, and often contain outdated firmware or are jailbroken. Even as the devices are accessing personal applications on the web, they are also accessing corporate resources such as e-mail-all from the very same unmanaged devices, which have not been vetted by the security organization. Smartphones, notebooks, netbooks, iPads, e-readers, gaming consoles and more-the list of personal devices attempting access to employer networks seems to grow every day in what's come to be known as the BYOD (Bring Your Own Device) era in networking.
Tags : pad, mine, enabling, secure, personal, mobile, device, use
     ForeScout
By: Forrester     Published Date: May 10, 2012
More people own smartphones than ever before and they're using them more often too. This makes a mobile marketing strategy crucial for any interactive marketer. Yet today we find that although mobile budgets are beginning to increase, the majority of interactive marketers are just starting to experiment, and many still treat mobile phones as mini-PCs. This report explains how marketers at each phase of mobile marketing evolution should craft successful mobile campaigns by hewing to three key principles: immediacy, simplicity, and context.
Tags : emerging methods, brand tactics, mobile channel for consumers, ecommerce, consumer mobile activities, mobile marketing, media mix, emerging media
     Forrester
By: Fortinet EMEA     Published Date: Nov 26, 2018
Cloud services are a pillar of a digital transformation, but they have also become a thorn in the side of many security architects. As data and applications that were once behind the enterprise firewall began roaming free—on smartphones, between Internet-of-Things (IoT) devices, and in the cloud—the threat landscape expanded rapidly. Security architects scrambled to adjust their technologies, policies, and procedures. But just when they thought they had a handle on securing their cloud-connected enterprises, new business imperatives indicated that one cloud wasn’t enough. Modern enterprises operate in a multi-cloud world, where the threat landscape has reached a new level of complexity. Security teams are juggling a hodgepodge of policies, threat reports, and management tools. When each cloud operates in its own silo, the security architect has even more difficulty supporting the CISO or CIO with a coherent, defensible security posture.
Tags : 
     Fortinet EMEA
By: Fujitsu     Published Date: Sep 02, 2016
Download this white paper today to better understand how devices are going to be used in the health care environments and how you can adjust your product plans accordingly.
Tags : fujitsu, mobile device, healthcare device, mobile computing, tablets, smartphones, mobile workers
     Fujitsu
By: Fujitsu America, Inc.     Published Date: Jan 22, 2019
Crime overall is decreasing, but chaotic events such as extreme weather, domestic terrorist attacks, gun violence, and opioid-related emergencies are increasing, requiring highly coordinated response protocols. From raucous inner cities to sleepy suburbs, the scope and nature of these threats demand a new way of thinking and acting — a new, frictionless collaboration among agencies, departments, and vendor partners.1 Ideally, public safety professionals are already fitted with the latest smartphones, laptops, and tablets to receive targeted information about situations, individuals, and locations before they respond. However, when police, fire, EMT, first responders, and even utility companies can communicate and share data via secure channels, the severity and length of incidents may be lessened, and lives can be saved. This is the next phase of digital age public safety. As more public safety leaders get introduced to sophisticated surveillance and big data technologies, they realize
Tags : 
     Fujitsu America, Inc.
By: G/O Digital     Published Date: Nov 13, 2014
A lot has changed in the 10 years since Facebook first launched. No longer are social networking sites just a place where people can stay in touch with friends. Now, 30 percent of people use Facebook as their primary source of news. While Facebook is still the number one social network, Twitter, Google Plus, LinkedIn, Instagram, and Pinterest are all growing at steady rates and millions of users are accessing these sites from the palm of their hand with smartphones and other mobile devices. Download this whitepaper to learn how you can leverage social networking to quickly reach users and entire online communities to boost your business.
Tags : digital marketing, online marketing, internet marketing, search marketing, seo, ppc, search engine optimization, social media
     G/O Digital
By: G/O Digital     Published Date: Nov 13, 2014
Every year, consumers flock to malls, department stores and retailers - big and small - to score huge savings and deals on holiday gifts. All the while, these shoppers are chained at the hip to their smartphones and tablets to stay connected to what's happening in real time. Download this research report for a snapshot of how local search and mobile marketing streamline the path to in-store sales for small businesses.
Tags : digital marketing, online marketing, internet marketing, search marketing, seo, ppc, search engine optimization, social media
     G/O Digital
By: Globalscape     Published Date: Mar 21, 2014
This whitepaper examines the way in which enterprise mobility has both increased employee productivity and decreased the security of corporate networks. The paper discusses the challenges IT managers have with controlling the "Bring Your Own Device" (BYOD) trend to allow mobile users to have access to the corporate network. Explained in the paper is the limit to visibility and control of file transfers when employees use ad hoc methods, and that educating employees on proper data access is not enough to protect the corporate network. The paper concludes by describing how Globalscape's EFT™ and Tappin™ can provide mobile access, without compromising security and controls over file sharing.
Tags : mobile, mobile access, remote access, byod, smartphones, tablets, laptops, ad hoc
     Globalscape
By: Google     Published Date: Aug 23, 2018
"From APIs to employee-owned smartphones, there are more access points to corporate data than ever before. Have businesses updated their security strategies to reflect this explosion of new targets for potential breaches? In June 2017, Google commissioned Forrester Consulting to examine how security experts think about endpoint security and learn how the cloud is helping businesses address new vulnerabilities. Download the Forrester report and find out more."
Tags : 
     Google
By: Group M_IBM Q1'18     Published Date: Feb 27, 2018
IBM MaaS360 provides unified endpoint management (UEM) across desktops, laptops, tablets, smartphones, and the Internet of Things (IoT).
Tags : internet of things, uem, unified endpoint management, iot
     Group M_IBM Q1'18
By: Group M_IBM Q119     Published Date: Dec 20, 2018
While it might be desirable to standardize end users on one or two types of devices that all run the same operating system, most organizations don’t have that luxury. Today’s users demand an extraordinary level of flexibility and convenience—which means most organizations support a vast assortment of endpoints, including laptops and desktops (both PCs and Macs), tablets and hybrid devices, smartphones, and even wearables and IoT devices.
Tags : 
     Group M_IBM Q119
By: Group M_IBM Q2'19     Published Date: May 03, 2019
"Your workers demand an extraordinary level of flexibility and convenience in how they use their devices ... Meaning it’s up to you to support a vast assortment of endpoints, including laptops and desktops (both PCs and Macs), tablets and hybrid devices, smartphones, and even the Internet of Things (IoT). And not only do your users expect support for a wide variety of form factors, but they also require cross-platform support for all major platforms, including iOS and macOS, Android, and Windows. To complicate the situation further, they run different versions of those platforms—for example, they may run Windows XP SP3, Windows 10, or anything in between. Read onward and learn how the industry’s first cognitive UEM platform, MaaS360 with Watson, delivers a single, strategic management and security solution to drive your organization’s digital business transformation—no matter what endpoints your enterprise is putting to work."
Tags : 
     Group M_IBM Q2'19
By: Group M_IBM Q2'19     Published Date: May 03, 2019
"Managing and securing endpoints with conventional mobile device management (MDM) or enterprise mobile management (EMM) solutions is time-consuming and ineffective. For this reason, global IT leaders are turning towards unified endpoint management (UEM) solutions to consolidate their management of smartphones, tablets, laptops and IoT devices into a single management console. To increase operational efficiency, maximize data security and deliver on their digital transformation goals, they’ll need a UEM platform that does more than just promise success. The answer is a smarter solution, built for today, that brings new opportunities, threats, and efficiency improvements to the forefront. With Watson™, IBM® MaaS360® UEM features cognitive insights, contextual analytics, and cloud-sourced benchmarking capabilities. It helps you make sense of daily mobile details while managing your endpoints, users, apps, document, and data from one platform."
Tags : 
     Group M_IBM Q2'19
By: Gthreecom     Published Date: Nov 06, 2014
While 90% of consumers use mobile devices for pre-shopping activities, up to 84% use smartphones to help them shop in the store. It’s time to get personal with today’s mobile shoppers. Download this E-book, titled: The Retailer’s Mobile Strategy Guide, to learn the steps engage, convert and retain customers more efficiently.
Tags : 
     Gthreecom
By: Here Technologies     Published Date: Mar 29, 2019
Advertisers are beginning to invest in location insights which give them data on how and why transactions are made in specific places. And with nearly all smartphones equipped with geolocation abilities, advertisements can be made location-aware with improved precision for targeting. Understanding location is key to gaining improved insights. HERE offers data sets and services that advertisers can use to contextualize consumer movements and habits in the world around them to provide well-timed and relevant advertising.
Tags : location data, ad tech, location targeting
     Here Technologies
By: Hewlett Packard Enterprise     Published Date: Nov 06, 2017
In recent years, it seems like technology is changing faster than it used to in decades past. As employees devour newer technologies such as smartphones, tablets, wearables, and other devices, and as they become more comfortable with solutions such as Dropbox and Skype, their demands on enterprise IT intensify. Plus, management and other decision makers are also increasing their demands on enterprise IT to provide more infrastructure with less cost and time. Unfortunately, enterprise IT organizations often don’t see much, if any, associated increases in funding to accomodate these demands.
Tags : hyperconverged, infrastructure, implementation, data metrics, protection, recovery, public cloud
     Hewlett Packard Enterprise
By: Hewlett Packard Enterprise     Published Date: May 11, 2018
The widespread use of mobile devices — smartphones and tablets — provides anytime, anywhere computing and communications resources for individuals worldwide. Both smartphones and tablets have made the transition from a personal resource, acquired and supported by consumers, to a professional resource, provided and supported by employers. For midsize firms around the world, those with 100–999 employees, mobile resources play a key role in improving workplace productivity as well as allowing greater flexibility in how and where work is done. New collaboration resources also allow staff in different locations to work together as efficiently and effectively as staff in the same office. The challenge for IT management is how best to coordinate the different collaborative and mobile resources and provide secure management of mobile devices and collaboration tools while enhancing workforce agility and productivity.
Tags : 
     Hewlett Packard Enterprise
By: HP - Enterprise     Published Date: Jun 04, 2013
Mobility services are frequently being positioned as part of broader application transformation offerings, enabling enterprises to support the bring-your-own-device (BYOD) approach, with the development of enterprise app stores and the ability to leverage personal devices for business functions. This white paper describes software and services that accelerate and simplify the creation of internally developed or “in-house” enterprise mobile applications. It also describes how to deploy and manage these mobile apps on both company-provided and “bring-your-own” smartphones and tablet computers. Solving the complete mobile app lifecycle means transforming enterprise apps for multiscreen devices; facilitating design, testing, security, performance, management, and compliance to reach new customers and employee expectations.
Tags : mobile apps, lifecycle approach, mobility services, bring-your-own-device, software
     HP - Enterprise
By: HP - Enterprise     Published Date: Jun 04, 2013
Using mobile applications is much more than a trend these days—it’s a way of life. Whether you want to map directions, find a restaurant, look up your flight details, see where your next meeting is, or just check your email, chances are you do it on your smartphone. Consumer applications and games were the first to hit the market on mobile phones, and soon after enterprise applications followed suit. Banking is going mobile, retail is going mobile, and even HP Application Lifecycle Management (HP ALM) software has a mobile version—HP ALM Mobile.
Tags : performance testing, mobile applications, alm mobile, consumer applications, smartphones, hp application lifecycle management
     HP - Enterprise
Start   Previous    1 2 3 4 5 6 7 8 9 10 11    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics