mobile

Results 251 - 275 of 3998Sort Results By: Published Date | Title | Company Name
Published By: Kaon     Published Date: Feb 01, 2012
As complex product companies look to build sales opps they're using mobile platforms (iPads and Smartphones) to demo products anywhere, anytime. But the question is, who's developing the dynamic content that's exciting prospects and accelerating sales?As complex product companies look to build sales opps they're using mobile platforms (iPads and Smartphones) to demo products anywhere, anytime. But the question is, who's developing the dynamic content that's exciting prospects and accelerating sales?
Tags : 
cmo, ipad, 3d products, virtual products, interactive products, mobility, sales, marketing, demonstrations, meeting, tablets, smartphone, products, interactive, trade shows, remote meeting, laptop, touch-screen, iphone, events
    
Kaon
Published By: HPE     Published Date: Mar 23, 2015
If you’ve noticed more employees accessing the corporate network using their personally owned mobile devices, you’re not alone. Many employees are boosting their productivity by using their smartphones and tablets at work. Gone are the days of corporate IT departments dictating the types of mobile devices that could access the network. Bring your own device (BYOD) policies, while increasing employee satisfaction and productivity, are straining corporate networks. This white paper describes the limitations of legacy networks, especially for supporting BYOD. Understanding these limitations can pave the way for a successful BYOD management policy for campus and branch networks.
Tags : 
corporate network, personal devices, smartphone, tablet, legacy networks, byod
    
HPE
Published By: HPE     Published Date: Mar 23, 2015
With new technologies, new opportunities often emerge, especially in business. The advent of innovations, such as social media and mobile devices, is changing the ways businesses interact with customers and the ways in which customers desire to be engaged. Opportunities arising from the benefits of salesforce automation, business intelligence (BI), and customer relationship management (CRM) applications are providing new levels of insight, helping businesses acquire customers more efficiently and retain those customers longer. As a direct result, organizations that invest in better understanding potential customers are likely to see higher returns than those organizations that possess a more limited understanding of their customer base. Seeking the competitive advantage resulting from improved customer focus, IT organizations have increased investment in business intelligence and analytics and the underlying infrastructure to support those applications.
Tags : 
    
HPE
Published By: PulseSecure     Published Date: Apr 01, 2015
Learn how to implement a unified solution for mobile device, app, and data security and see what this means for security and risk professionals embracing and securing mobility in their enterprise.
Tags : 
junos pulse, vpn, pulse secure, security, risk, mobility, networking, it management, wireless
    
PulseSecure
Published By: PulseSecure     Published Date: Apr 01, 2015
Learn how to achieve a better bring your own device policy for your organization and properly implement an integrated VPN, access control, and mobile device management solutions to deliver network security and BYOD productivity.
Tags : 
byod, pulse secure, vpn, mobile device management, network security, productivity, networking, security, it management, wireless
    
PulseSecure
Published By: PulseSecure     Published Date: Apr 01, 2015
Learn how to transition enterprise customers safely to the cloud and see how this will enable service providers to deliver scalable and on-demand, cloud-based deployments with simplicity and agility.
Tags : 
cloud, pulse secure, security, wireless, mobile access, data center, it management, knowledge management
    
PulseSecure
Published By: PulseSecure     Published Date: Apr 01, 2015
Learn how to craft enterprise plans for your organization’s mobile security and see how this will allow your organization to properly implement a Bring Your Own Device environment to improve employee’s productivity.
Tags : 
mobile devices, corporate network, security, secure access solutions, it management, enterprise applications, business technology
    
PulseSecure
Published By: PulseSecure     Published Date: Apr 01, 2015
Learn how to properly empower your organization for mobile productivity and see how you can deploy and provision for this device-based access with improved security and management policies.
Tags : 
mobile productivity, mobile access, security, connectivity, byod, corporate network, networking, it management, wireless
    
PulseSecure
Published By: PulseSecure     Published Date: Apr 01, 2015
Learn how to achieve an app centric approach to enterprise mobility and see how this will enable workers to stay connected to corporate systems through a vast array of device types and wireless connectivity options while simultaneously increasing productivity and becoming more customer-centric.
Tags : 
enterprise mobility, applications, byod, mobile strategy, security, it management, knowledge management, enterprise applications
    
PulseSecure
Published By: PulseSecure     Published Date: Apr 01, 2015
Learn how to enable fast and secure network, cloud, and application access in order to maximize productivity for those employees who work remotely or are constantly travelling.
Tags : 
mobile connectivity, byod, device security, policy compliance, enduser, pulse secure, mobile worker, networking, security, it management, wireless
    
PulseSecure
Published By: PulseSecure     Published Date: Apr 06, 2015
Learn about the 2015 mobile threat landscape and see how you can prepare your organization for 2015 and beyond with this market report.
Tags : 
mobile threats, pulsesecure, mobile security, mobile threat landscape, market report, security, it management, knowledge management, enterprise applications
    
PulseSecure
Published By: Sitecore     Published Date: Feb 26, 2016
Mobile isn’t about devices, it’s about people. Understanding this helps mobile leaders deliver contextual content that creates personalized mobile customer experiences. With a mobile leadership mindset, you can build a platform for increasing engagement and loyalty – and driving better commerce results.
Tags : 
wireless management, wireless, communications, business practices, commerce, wireless communications, wireless phones, best practices, content delivery
    
Sitecore
Published By: CA Technologies     Published Date: Nov 07, 2014
Découvrez dans ce livre blanc une technologie unique de gestion des caractéristiques de sécurité, de performances, de conformité et de support de tout type de périphérique, d’application, de contenu ou de courriel, qui préserve la qualité de l’expérience utilisateur mobile.
Tags : 
mobile user experience, security features, security in the cloud, the mobile user experience, optimising the user experience, mobile computing, mobile data systems, mobile workers, wireless phones, cloud computing, business technology, mobile device management
    
CA Technologies
Published By: CA Technologies     Published Date: Nov 07, 2014
Guide pratique à l’attention des responsables métier et IT sur les actions à entreprendre dès MAINTENANT pour gérer la mobilité future de l’entreprise.
Tags : 
enterprise mobility, delivering a mobile strategy, flexible and secure infrastructures, byod, adopting mobility strategies, mobile computing, mobile data systems, mobile workers, smart phones, wireless application software, cloud computing, mobile device management
    
CA Technologies
Published By: CA Technologies     Published Date: Nov 07, 2014
Fournissez de nouveaux services métier sécurisés et améliorez l’expérience client. De plus en plus d’entreprises adoptent le Cloud, la technologie mobile et les réseaux sociaux pour élargir leurs activités, créer de nouveaux canaux commerciaux et améliorer les services aux clients.
Tags : 
accelerate service engagement, improve customer engagement, cloud, social networks, secure services, improve the customer experience, mobile computing, mobile data systems, wireless security, customer interaction service, cloud computing
    
CA Technologies
Published By: CA Technologies     Published Date: Nov 07, 2014
Les activités IT et métier sont concernées par de nombreuses tendances : l’adoption du Cloud, l’accroissement de la mobilité, l’essor des médias sociaux et l’augmentation des flux d’informations circulant au sein de toute l’entreprise. Le concept de périmètre réseau n’a plus de sens. En effet, l’IT doit aujourd’hui composer avec des identités hautement distribuées sur l’ensemble de l’environnement métier et provenant de nombreuses sources, telles que des applications, des systèmes, des médias sociaux, etc. Les employés et les clients mobiles sont, par ailleurs, en train de changer profondément l’activité et de redéfinir le défi consistant à fournir rapidement des applications sécurisées à une population d’utilisateurs en constante évolution. À chaque défi son opportunité. L’identité remplace désormais le périmètre réseau, et seules les entreprises qui ont compris cette évolution sont en mesure de dynamiser et de protéger leur activité.
Tags : 
business trends, cloud adoption, sociial media, social mobility, security in the cloud, business security, wireless, application security, business continuity, network security appliance, web service security, cloud computing, business technology, research, mobile device management
    
CA Technologies
Published By: CA Technologies     Published Date: Nov 07, 2014
Les supports mobiles, sociaux et de cloud computing ont aidé à éliminer les vieux périmètres réseau. La nouvelle entreprise ouverte doit faire avec un large éventail d'utilisateurs, d'appareils et d'applications, sans limites définies. De nouveaux modèles de sécurité sont essentiels pour à la fois permettre et protéger les activités commerciales dans ce monde nouveau. Téléchargez le guide.
Tags : 
mobile media, social media, mobile workers, security in the cloud, removal of the network perimeters, remote access, access control, application security, web service security, mobile computing, wifi, wireless security, cloud computing, business technology, mobile device management
    
CA Technologies
Published By: Cisco     Published Date: Apr 07, 2014
This is a report of the findings from the Cisco Internet Business Solutions Group (IBSG) who conducted a survey of 540 U.S. mobile business users to understand their needs and behaviors.
Tags : 
mobile, wi-fi, wireless, cisco, research, wifi, wireless hardware, wireless infrastructure, wireless service providers
    
Cisco
Published By: Cisco     Published Date: Apr 07, 2014
Cisco presents its research findings on mobile data traffic, wireless trends and how the service providers can capture the Wi-Fi opportunity.
Tags : 
wi-fi, wireless, cisco, service providers, wifi, wireless infrastructure, wireless service providers
    
Cisco
Published By: DellEMC and Intel®     Published Date: Jan 17, 2017
Distributed enterprises often encompass many remote offices that are essential to running the organization and supporting customers. Important activities at the edge include manufacturing, warehousing and distribution, even mobile or remote life-saving environments like health clinics. And while there is usually a central IT staff that creates the overall business architecture for the enterprise, specialized resources to deploy and maintain the infrastructure at the edge can be scarce. Intel® Xeon® processor Ultrabook, Celeron, Celeron Inside, Core Inside, Intel, Intel Logo, Intel Atom, Intel Atom Inside, Intel Core, Intel Inside, Intel Inside Logo, Intel vPro, Itanium, Itanium Inside, Pentium, Pentium Inside, vPro Inside, Xeon, Xeon Phi, and Xeon Inside are trademarks of Intel Corporation or its subsidiaries in the U.S. and/or other countries
Tags : 
ultrabook, celeron, celeron inside, core inside, intel, intel logo, intel atom, intel atom inside, intel core, intel inside, intel inside logo, intel vpro, itanium, itanium inside, pentium, pentium inside, vpro inside, xeon, xeon phi, enterprise applications
    
DellEMC and  Intel®
Published By: DellEMC and Intel®     Published Date: Jan 17, 2017
It’s a new era in IT. The end-­user workforce is mobile, social, and putting huge strains on your Virtual Desktop Infrastructure (VDI). It’s time for a new model, one that liberates you from costly infrastructure maintenance and delivers the service and availability end-­users demand. Intel® Xeon® processor Ultrabook, Celeron, Celeron Inside, Core Inside, Intel, Intel logotyp, Intel Atom, Intel Atom Inside, Intel Core, Intel Inside, Intel Inside logotyp, Intel vPro, Itanium, Itanium Inside, Pentium, Pentium Inside, vPro Inside, Xeon, Xeon Phi och Xeon Inside är varumärken som tillhör Intel Corporation eller dess dotterbolag i USA och/eller andra länder
Tags : 
ultrabook, celeron, celeron inside, core inside, intel, intel logo, intel atom, intel atom inside, intel core, intel inside, intel inside logo, intel vpro, itanium, itanium inside, pentium, pentium inside, vpro inside, xeon, xeon phi, virtualization
    
DellEMC and  Intel®
Published By: DellEMC and Intel®     Published Date: Jan 17, 2017
It’s a new era in IT. The end-­user workforce is mobile, social, and putting huge strains on your Virtual Desktop Infrastructure (VDI). It’s time for a new model, one that liberates you from costly infrastructure maintenance and delivers the service and availability end-­users demand. Processeur Intel® Xeon® Ultrabook, Celeron, Celeron Inside, Core Inside, Intel, le logo Intel, Intel Atom, Intel Atom Inside, Intel Core, Intel Inside, le logo Intel Inside, Intel vPro, Itanium, Itanium Inside, Pentium, Pentium Inside, vPro Inside, Xeon, Xeon Phi, et Xeon Inside sont des marques commerciales d'Intel Corporation ou de ses filiales aux États-Unis et/ou dans d'autres pays
Tags : 
ultrabook, celeron, celeron inside, core inside, intel, le logo intel, intel atom, intel atom inside, intel core, intel inside, le logo intel inside, intel vpro, itanium, itanium inside, pentium, pentium inside, vpro inside, xeon, xeon phi, virtualization
    
DellEMC and  Intel®
Published By: DellEMC and Intel®     Published Date: Jan 17, 2017
Distributed enterprises often encompass many remote offices that are essential to running the organization and supporting customers. Important activities at the edge include manufacturing, warehousing and distribution, even mobile or remote life-saving environments like health clinics. And while there is usually a central IT staff that creates the overall business architecture for the enterprise, specialized resources to deploy and maintain the infrastructure at the edge can be scarce. Processeur Intel® Xeon® Ultrabook, Celeron, Celeron Inside, Core Inside, Intel, Intel Logo, Intel Atom, Intel Atom Inside, Intel Core, Intel Inside, Intel Inside Logo, Intel vPro, Itanium, Itanium Inside, Pentium, Pentium Inside, vPro Inside, Xeon, Xeon Phi, and Xeon Inside are trademarks of Intel Corporation or its subsidiaries in the U.S. and/or other countries.
Tags : 
ultrabook, celeron, celeron inside, core inside, intel, le logo intel, intel atom, intel atom inside, intel core, intel inside, le logo intel inside, intel vpro, itanium, itanium inside, pentium, pentium inside, vpro inside, xeon, xeon phi, enterprise applications
    
DellEMC and  Intel®
Published By: DellEMC and Intel®     Published Date: Jan 17, 2017
Distributed enterprises often encompass many remote offices that are essential to running the organization and supporting customers. Important activities at the edge include manufacturing, warehousing and distribution, even mobile or remote life-saving environments like health clinics. And while there is usually a central IT staff that creates the overall business architecture for the enterprise, specialized resources to deploy and maintain the infrastructure at the edge can be scarce. Intel® Xeon® Prozessor Ultrabook, Celeron, Celeron Inside, Core Inside, Intel, Intel Logo, Intel Atom, Intel Atom Inside, Intel Core, Intel Inside, Intel Inside Logo, Intel vPro, Itanium, Itanium Inside, Pentium, Pentium Inside, vPro Inside, Xeon, Xeon Phi, and Xeon Inside are trademarks of Intel Corporation or its subsidiaries in the U.S. and/or other countries.
Tags : 
ultrabook, celeron, celeron inside, core inside, intel, das intel-logo, intel atom, intel atom inside, intel core, intel inside, das intel inside-logo, intel vpro, itanium, itanium inside, pentium, pentium inside, vpro inside, xeon, enterprise applications, data center
    
DellEMC and  Intel®
Published By: Panasonic     Published Date: Feb 19, 2015
Does any mobile device offer everything we need? Panasonic has a device that combines the best benefits of all devices.
Tags : 
mobile devices, mobility, technology, panasonic, new panasonic devices, toughpad devices, benefits of different devices, electronics, mobile computing, mobile data systems, mobile workers, pda, smart phones, business technology
    
Panasonic
Start   Previous    4 5 6 7 8 9 10 11 12 13 14 15 16 17 18    Next    End
Search      

Search the Library

Add Research

Get your company's research in the hands of targeted business professionals.