Home | About | Publishers | Advertisers | Contact | Directory
Your Research Library for Finding Relevant BtoB Whitepapers, Webinars, eBooks, and Digital Content

Find Research


Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.

mobile devices

Results 101 - 125 of 848Sort Results By: Published Date | Title | Company Name
Published By: Adobe     Published Date: Oct 05, 2016
Mobile apps are a core – and essential – component of the modern digital experience. Whether the organization is a consumer-facing brand, a B2B leader, or an enterprise seeking to enhance employee productivity, well-designed mobile apps that deliver a great user experience play a unique role in building engagement.
Tags : 
mobile apps, mobility, mobile devices, customer experience, mobile workers, smart phones, crm solutions/software, customer experience/engagement
    
Adobe
Published By: Adobe     Published Date: Oct 05, 2016
Ask any marketer or line of business owner what is driving their investment in mobile apps and you’ll hear a mix of priorities, including the need to improve the user experience, better marketing, increased sales, improved brand loyalty and streamlined productivity.
Tags : 
mobility, mobile devices, mobile strategy, apps, mobile apps, smart phones, crm & customer care
    
Adobe
Published By: Adobe     Published Date: Oct 05, 2016
Mobile apps are a core – and essential – component of the modern digital experience. Whether the organization is a consumer-facing brand, a B2B leader, or an enterprise seeking to enhance employee productivity, well-designed mobile apps that deliver a great user experience play a unique role in building engagement.
Tags : 
mobile apps, mobility, mobile devices, customer experience, smart phones, crm solutions/software, customer experience/engagement
    
Adobe
Published By: Adobe     Published Date: Oct 05, 2016
Ask any marketer or line of business owner what is driving their investment in mobile apps and you’ll hear a mix of priorities, including the need to improve the user experience, better marketing, increased sales, improved brand loyalty and streamlined productivity.
Tags : 
mobility, mobile devices, mobile strategy, apps, mobile apps, mobile workers, smart phones, crm solutions/software, customer experience/engagement
    
Adobe
Published By: Adobe     Published Date: Mar 21, 2017
Mobile devices are ubiquitous, and many organizations have realized that consumer-facing mobile apps can drive deep connections and loyalty with their customers.
Tags : 
    
Adobe
Published By: Workforce Software     Published Date: Jun 04, 2015
This paper helps outline some of the ways to control BYOD risks and outlines other factors that influence your decision to establish a BYOD policy. Like Cloud-based software delivery, BYOD presents such compelling advantages over the traditional approach that its emergence as the dominant mobile strategy appears to be a question of “when” rather than “if.”
Tags : 
workforce software, byod, enterprise applications, mobile strategy, mobile devices, it management, human resources management
    
Workforce Software
Published By: Workforce Software     Published Date: Jun 04, 2015
This paper explores the BYOD trend, examines its intersections with workforce management, and provides recommendations on how organisations can maximise the return on their workforce management investments and practices in an increasingly mobile environment.
Tags : 
workforce software, byod, enterprise applications, mobile strategy, mobile devices, human resources management, management fundamentals, training and development
    
Workforce Software
Published By: Panasonic Business Mobility Solutions     Published Date: Feb 09, 2017
As vehicles get smarter and connected, service organizations are finding rugged mobile devices are a “must have” in their tool bag to provide roadside emergency service or normal maintenance. Here’s why.
Tags : 
    
Panasonic Business Mobility Solutions
Published By: Oracle (Hospitality)     Published Date: Mar 28, 2017
The ubiquitous nature of mobile devices can seemingly diminish their value, making them a commodity to be taken for granted. But their true power hasn’t begun to be tapped — especially by hoteliers. If seen as a gateway to operational efficiency, enhanced guest experiences and, most importantly, a better bottom line, mobility wouldn’t be overlooked. Which is exactly why it’s time to view it through a different prism — or risk being left behind by your competitors who will.
Tags : 
mobility, mobile, hoteliers, guest experience, oracle
    
Oracle (Hospitality)
Published By: CA Technologies     Published Date: Sep 25, 2017
Enterprise security traditionally relied on a fortress strategy tha locked down user endpoints and created walls around the network. Today, this strategy cannot support or secure the use of mobile devices and SaaS capabilities, which exist outside the fortress. As a result, Chief Information Security Officers (CISOs) have been looking for new solutions that can secure these technologies today, and adapt as threats and business needs change. The credit card industry’s security model is one example that provides a new way to think about risk and contain it—that is, if you can see past the occasional bad rap it’s gotten from attacks and breaches.
Tags : 
data protection, data security, data optimization, organization optimization, cloud management, virtualization, data center, cloud environment
    
CA Technologies
Published By: Salesforce     Published Date: Dec 29, 2015
App Cloud gives Crossmark the speed and precision necessary to support Crossmark’s team of field agents who routinely collect data in stores via mobile devices.
Tags : 
salesforce, crossmark, success, app cloud, customers, enterprise applications, data management, human resource technology
    
Salesforce
Published By: Salesforce     Published Date: Jan 14, 2016
App Cloud gives Crossmark the speed and precision necessary to support Crossmark’s team of field agents who routinely collect data in stores via mobile devices.
Tags : 
salesforce, crossmark, success, app cloud, customers, enterprise applications, human resource technology, crm & customer care
    
Salesforce
Published By: Logrhythm     Published Date: Sep 11, 2017
Der traditionelle Ansatz der Cyber-Sicherheit besteht in einer präventionsorientierten Strategie, die darauf fokussiert, Angriffe zu stoppen. Und tatsächlich lassen sich mit präventionsorientierten Ansätzen viele Bedrohungen abwehren, doch den versierten und hochmotivierten Bedrohungsakteuren von heute gelingt es immer öfter, diese Abwehrmaßnahmen mit kreativen, verdeckten, gezielten und permanenten Angriffen zu umgehen, die oft lange unentdeckt bleiben.
Tags : 
network, cloud saas, users, mobile devices, iot, malicious insiders, hacktivists
    
Logrhythm
Published By: Dell EMC & Intel     Published Date: Apr 13, 2018
Whether you’re making plans with friends, ordering food, or setting the temperature on your thermostat, smartphone and tablet technology make everyday tasks faster and easier. New Intel® Xeon® Scalable processor-powered 14th generation Dell EMC PowerEdge™ servers with iDRAC Quick Sync 2 technology bring these automated advantages to the datacenter, too. IT datacenter administrators (ITDMs) can now connect to the new PowerEdge servers using the OpenManage™ Mobile app on their Android™ or iOS devices and perform a subset of routine, yet essential, server management tasks. Intel Inside®. New Possibilities Outside.
Tags : 
    
Dell EMC & Intel
Published By: Dell EMC & Intel     Published Date: Apr 13, 2018
Whether you’re making plans with friends, ordering food, or setting the temperature on your thermostat, smartphone and tablet technology make everyday tasks faster and easier. New Intel® Xeon® Scalable processor-powered 14th generation Dell EMC PowerEdge™ servers powered by Intel® Xeon® Platinum processor with iDRAC Quick Sync 2 technology bring these automated advantages to the datacenter, too. IT datacenter administrators (ITDMs) can now connect to the new PowerEdge servers using the OpenManage™ Mobile app on their Android™ or iOS devices and perform a subset of routine, yet essential, server management tasks. Intel Inside®. New Possibilities Outside.
Tags : 
    
Dell EMC & Intel
Published By: Limelight Networks     Published Date: Aug 08, 2011
Learn how to use mobile to generate the highest consumer engagement and conversion rates by customizing the mobile experience, scaling for delivery across mobile devices, and connecting the online and offline worlds.
Tags : 
limielight networks, mobile commerce, mobile marketing, mobile shopping, mobile strategy, mobile retail
    
Limelight Networks
Published By: Limelight Networks     Published Date: Oct 17, 2011
Learn how to use every mobile opportunity to your advantage. This report shows you how to: . Optimize your website for mobile devices . Take advantage of mobile context . Create richer mobile experiences by adding video and interactivity
Tags : 
mobile ads, marketing strategy, mobile marketing strategy, mobile optimization
    
Limelight Networks
Published By: Limelight Networks     Published Date: Oct 17, 2011
An effective mobile website experience is essential to your brand's success. In this report, learn: . Insights on how to extend your brand image effectively across mobile devices . Tips for targeting multiple mobile platforms . Strategies for optimizing content publishing and performance
Tags : 
mobile strategy, mobile site, mobile website, mobile marketing, mobile web, interactive/pr agencies, search marketing agencies, interactive marketing, marketing software, crm solutions/software, customer experience/engagement, market research, e-commerce solutions, email marketing services/software, online video marketing, social media marketing, search engine optimization (seo)
    
Limelight Networks
Published By: Voltage Security     Published Date: Sep 13, 2012
If there are any lingering doubts that mobile de-vices-such as smartphones and tablets-have profoundly transformed today's business, one study finds that using smart devices for produc-tivity is "now the standard.
Tags : 
data security, smart devices, smart security, data security strtegy, mobile security, security risks, security, smart phones, wireless security, data protection, database security
    
Voltage Security
Published By: CA Technologies     Published Date: Jan 14, 2015
Whether you were at the forefront of the mobility era or are just now catching up—or, most likely, somewhere in between—you’ve already experienced first-hand the business impact of ubiquitous smartphones and tablets. From employees to customers, mobile devices spawned an explosion in new applications, data, support needs, security concerns, and other issues. They’ve reset expectations for organizational speed and flexibility. They’ve dramatically increased the surface area for potential security attacks. All this, and the mobile era is still just in its infancy.
Tags : 
mobile busienss, smartphones, tablets, applications, data, support needs, security attacks, organizational speed, wireless
    
CA Technologies
Published By: CA Technologies     Published Date: Jan 20, 2015
In the application economy, speed, innovation and quality have become table stakes. If you can’t meet your customers’ expectations, they will surely find a competitor who can. Whether your organization is in one of the sectors facing the most intense digital competition—insurance, banking, telecommunications or retail—or in a more traditional industry, how rapidly and successfully you embrace a software-driven digital transformation strategy will likely have a profound effect on your organization’s long term viability. Within this transformation sphere, the development of “omnichannel” or “digitally-connected multi-channel” capabilities is a key priority. CA Technologies can help you deliver a consistent, integrated and quality customer experience, regardless of how your customers choose to interact with you.
Tags : 
enterprise mobility management, mobile devices, software, competitive advantage, strategic requirement, wireless, enterprise applications
    
CA Technologies
Published By: CA Technologies     Published Date: Jan 26, 2015
The ability to apply software to strategic advantage is the de? ning technology theme of this decade. This is not just an IT issue. It is a business imperative. Every business is in the software business. In some industries, the number of software jobs has doubled over the past ? ve years. JP Morgan Chase has more software developers than Google and more technologists than Microsoft. If you think your company isn’t in the software business, you’re wrong. Airlines, oil companies, telecommunications providers all are using applications to attract customers and gain a competitive advantage. With the ubiquitous adoption of mobile devices, a whole new platform for application and content delivery is evolving. With their colorful, interactive, intuitive user interfaces, always-on global connectivity, sensing capabilities such as GPS and device orientation and their ability to connect with users through personalized con? guration options, mobile is truly the de? ning platform of the applicat
Tags : 
enterprise mobility management, mobile devices, software, competitive advantage, strategic requirement, wireless, enterprise applications
    
CA Technologies
Published By: MobileIron     Published Date: Feb 05, 2016
Mobile platforms have leapfrogged PC security for years, but as mobile device adoption explodes worldwide, these platforms face more security threats than ever before. While mobile devices are still safer than PCs, hackers are relentlessly searching for new ways to exploit these operating systems and gain access to their valuable data. Four major threats are currently targeting iOS and Android devices using very clever tactics. In fact, users may not know their devices have been compromised until after their data has been hacked.
Tags : 
mobile malware, activesync, mobile platforms, hackers, data threat, android, ios
    
MobileIron
Published By: MobileIron     Published Date: Feb 05, 2016
To help you succeed on your mobile journey, this guide outlines essential best practices and recommendations across all four stages of the mobile app lifecycle: Design, Develop, Deploy, and Maintain. It’s ideal for organizations that are ready to move beyond enabling basic apps, such as email and calendar, on mobile devices. It also provides operational guidance for deploying and maintaining existing mobile apps.
Tags : 
mobile apps, best practices, mobiletron, phones, content integration, content management system
    
MobileIron
Published By: MobileIron     Published Date: Aug 04, 2016
This whitepaper describes the MobileIron app security model and how it can be used to secure Office 365 for mobile devices.
Tags : 
office 365, mobileiron, crm, erp, analytics, security model, mobile apps
    
MobileIron
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search Research