mobile computing

Results 51 - 75 of 243Sort Results By: Published Date | Title | Company Name
Published By: ServiceNow     Published Date: Nov 22, 2013
Whether youve embraced it or not, mobile is already part of your business. To remain relevant, IT must think like the business. IT must reinvent itself and become more of a technology advisor and less of a technology traffic cop. This paper sets out some of the key lessons learned by progressive organizations that have used mobile to get ahead.
Tags : 
servicenow, enterprise it, mobile computing, mobile initiative, it managers, progressive enterprise, mobile users, bring your own device, mobile device management, mobile adoption, mobile maturity model, mobile savvy, actionable analytics, renew it, mobile data systems, mobile workers, wireless infrastructure, change management, service management
    
ServiceNow
Published By: ServiceNow     Published Date: Nov 22, 2013
As technology continues to advance and the new reality is based on an infrastructure that includes physical, virtual and cloud resources, IT departments need to find new ways of managing and securing this vastly different technology ecosystem.
Tags : 
servicenow, enterprise it, it department, cloud generation, social networks, mobile workforce, virtualization, cloud computing, collaborative, service-oriented, cloud platform, drive down expenses, increase efficiency, cloud-driven technology, streamlines operations, fluid systems manageable, it management, business activity monitoring, change management, enterprise resource planning
    
ServiceNow
Published By: Intel     Published Date: Nov 29, 2016
Just after the turn of the decade researchers are predicting there will be somewhere north of 24 million subscriptions to next generation 5G networking services. Today most of those services are little more than pilot projects. But thanks to emerging network function virtualization (NFV) software running on Mobile Edge Computing (MEC) platforms enabled by Intel most of those 5G services should be in production before the end of the decade. Come learn how MEC platforms are about to transform every corner of the networking world to not only drive the creation of a vast array of new IT services, but also make networks more agile and responsive than anyone ever thought possible.
Tags : 
    
Intel
Published By: Schneider Electric     Published Date: Feb 12, 2018
Internet use is trending towards bandwidth-intensive content and an increasing number of attached things. At the same time, mobile telecom networks and data networks are converging into a cloud computing architecture. To support needs today and tomorrow, computing power and storage is being inserted out on the network edge in order to lower data transport time and increase availability. Edge computing brings bandwidth-intensive content and latency-sensitive applications closer to the user or data source. This white paper explains the drivers of edge computing and explores the various types of edge computing available.
Tags : 
    
Schneider Electric
Published By: Aerohive     Published Date: May 13, 2015
This paper aims to facilitate understanding and addressing ITs dilemma in a bring your own device (BYOD) world.
Tags : 
mobile computing, the increase in mobile workers, byod policy implications for it
    
Aerohive
Published By: Aerohive     Published Date: May 14, 2015
This paper aims to facilitate understanding and addressing ITs dilemma in a bring your own device (BYOD) world.
Tags : 
mobile computing, the increase in mobile workers, byod policy implications for it, it management, mobile data systems, mobile workers, wireless infrastructure, cloud computing, infrastructure
    
Aerohive
Published By: Aerohive     Published Date: May 14, 2015
This paper aims to facilitate understanding and addressing ITs dilemma in a bring your own device (BYOD) world.
Tags : 
mobile computing, the increase in mobile workers, byod policy implications for it, it management, mobile data systems, mobile workers, wireless infrastructure, cloud computing, infrastructure, design and facilities
    
Aerohive
Published By: Aerohive     Published Date: May 14, 2015
This paper aims to facilitate understanding and addressing ITs dilemma in a bring your own device (BYOD) world.
Tags : 
mobile computing, the increase in mobile workers, byod policy implications for it, it management, mobile data systems, mobile workers, wireless infrastructure, virtualization, cloud computing, design and facilities
    
Aerohive
Published By: IBM     Published Date: May 28, 2015
In this book, you look at how the Smarter Process approach helps you create a more customer-centric organization. You discover how four major technologies mobile, cloud computing, Big Data, and social collaboration are disrupting the way you do business and how you can work through the challenges.
Tags : 
smarter process, data management, business models, blueworks live, big data, cloud computing, social collaboration, data center
    
IBM
Published By: CA Technologies     Published Date: Jan 08, 2014
Cloud adoption, mobility, social media and the consumerization of IT are transforming many business activities for enterprise employees, partners and customers and eliminating the traditional network perimeter. Organizations have to change how they manage security and user identities if they want to keep their data and applications secure. Read this eBook to discover how a centralized identity and access management service can help you create a new identity perimeter.
Tags : 
ca technologies, identity, identity management, user provisioning, security, mobile, cloud computing, social media, mobility, security management, access mangement, identity perimeter, network provisioning, network security, access control, authentication, internet security, web service security
    
CA Technologies
Published By: CA Technologies     Published Date: Jan 15, 2014
Cloud adoption, mobility, social media and the consumerization of IT are transforming many business activities for enterprise employees, partners and customers and eliminating the traditional network perimeter. Organizations have to change how they manage security and user identities if they want to keep their data and applications secure. Read this eBook to discover how a centralized identity and access management service can help you create a new identity perimeter.
Tags : 
ca technologies, identity, identity management, user provisioning, security, mobile, cloud computing, social media, mobility, security management, access mangement, identity perimeter, network provisioning, network security, access control, authentication, internet security, web service security, mobile device management
    
CA Technologies
Published By: CA Technologies     Published Date: Jan 15, 2014
Cloud adoption, mobility, social media and the consumerization of IT are transforming many business activities for enterprise employees, partners and customers and eliminating the traditional network perimeter. Organizations have to change how they manage security and user identities if they want to keep their data and applications secure. Read this eBook to discover how a centralized identity and access management service can help you create a new identity perimeter.
Tags : 
ca technologies, identity, identity management, user provisioning, security, mobile, cloud computing, social media, mobility, security management, access mangement, identity perimeter, network provisioning, network security, access control, authentication, internet security, web service security, mobile device management
    
CA Technologies
Published By: Citrix Systems     Published Date: Jan 29, 2013
This white paper describes options for a mobile services-focused computing architecture that empowers productivity through work-shifting, consumerization and collaboration.
Tags : 
ipad, android, tablet, mobility, byo, smartphone, citrix, knowledge management, data management, data center
    
Citrix Systems
Published By: Citrix Systems     Published Date: Jul 25, 2016
NetScaler MobileStream technology from Citrix enables enterprises to do more than simply get by when it comes to the performance and security of mobile workspaces. Building on the gains derived from the core set of NetScaler functionality, NetScaler MobileStream combines a suite of multi-layer optimizations purpose-built to accelerate mobile service delivery with an essential collection of secure access and threat protection capabilities for mobile computing. The result is a unified solution that not only provides the peace of mind IT needs but also delivers the exceptional mobile experience your employees, customers and partners deserve. Put another way, the result with NetScaler MobileStream is a dramatic improvement in mobile service performance and protection that makes Citrix NetScaler the worlds fastest and most secure delivery platform for mobile workspaces.
Tags : 
    
Citrix Systems
Published By: Red Hat     Published Date: Sep 25, 2014
Todays mega IT trends cloud computing, big data, mobile and social media have dramatically altered how enterprises work, requiring datacenters to find new, more flexible and cost effective ways to meet computing demands. For most datacenters, the path toward tomorrow's compute paradigm mandates an investment in standardization and consolidation as well as a more robust adoption of enterprise virtualization software, along with cloud system software to extend that virtualized infrastructure into a true private cloud environment. Linux has emerged as one of the key elements to a modernization program for a datacenter.
Tags : 
datacenter, modernization, enterprise virtualization, infrastructure, private cloud enviornment, it management, data management, data center
    
Red Hat
Published By: Oracle EPM     Published Date: May 11, 2015
Which EPM priorities are at the top of the Finance agenda? What are the most compelling developments in big data, analytics, mobile technology, and cloud computing that motivate Finance leaders to undertake new technology initiatives?
Tags : 
epm, finance, technology, cloud computing, big data, enterprise software
    
Oracle EPM
Published By: Group M_IBM Q418     Published Date: Nov 07, 2018
The rise of the cloud and mobile computing has rapidly changed the nature of enterprise cybersecurity. The old paradigm, where all work was done behind a company firewall, has been breaking down. Employees work not just at the office, but also on the road and at home, on mobile devices and on their own personal computers. Theyre no longer using a limited stack of enterprise applications. Instead, they increasingly require access to a wide variety of apps, cloud services, and new communication platforms.
Tags : 
    
Group M_IBM Q418
Published By: Adobe     Published Date: May 16, 2012
Recently, Adobe gathered a panel of executives from Cond Nast, National Geographic, Newsday, and other publishers to discuss their organizations' efforts to create a new breed of e-publications based on the mobile computing power of the tablet.
Tags : 
cs5.5, creative suite, adobe, adobe creative suite, 5.5 master collection, pulitzer, print, broadcast, journalismlo alto, data management, design and facilities
    
Adobe
Published By: Lenovo     Published Date: Sep 16, 2014
Agency IT is tasked with building smarter and more responsive state and local government services, while CTOs look to enable government workforce mobility and address strategic issues, such as BYOD. Adding to the challenge is a rise in devices, data, and even multiple OSs that IT must support and secure. With the decline in traditional Windows-based computing, these challenges are driving agencies toward cloud solutions that don't sacrifice security or IT manageability. See our featured cloud solution for government agencies that has IT leaders re-thinking how they enable mobile productivity.
Tags : 
agency it, workforce mobility, mobile productivity, cloud computing, it management, project management, web services, database security
    
Lenovo
Published By: VMware     Published Date: May 10, 2017
The pace of business is faster than ever before. Due to the rapid adoption of cloud and mobile computing, driven by consumerization, operational needs, and security requirements, ESG believes that Identity and Access Management (IAM) is undergoing a profound transition. Download this ESG whitepaper to learn why organizations should combine Identity and Access Management (IAM) and Enterprise Mobility Management (EMM) solutions to adapt to the influx of workforce mobility without interfering with user experience or compromising security.
Tags : 
    
VMware
Published By: VMware     Published Date: May 10, 2017
VMware Identity Manager provides single sign-on (SSO) to a broad range of SaaS applications, as well as legacy applications published via virtual desktop platforms from VMware and Citrix, and browser-based and native mobile apps. VMware Identity Manager also provides application provisioning and conditional (adaptive, or risk-based) access controls, and can be deployed either on-premises or in the cloud. In this report, 451 Research analyzes VMwares strategic effort to bridge the legacy on-premises world (which still represents most of its business) with the more highly distributed and heterogeneous worlds of mobile and cloud computing. 451 also examines VMwares re-entry into the IDaaS market is to extend their market reach beyond what VDI and EMM might accomplish individually.
Tags : 
    
VMware
Published By: Intel     Published Date: Aug 17, 2017
5G will be a transformative force, offering enhanced mobile broadband and enabling a huge volume of machine to machine communications, based on its ultra-reliable, and low latency network. For comms service providers it puts them in a strong position to offer new services, including in the Internet of Things (IoT), visual computing, analytics, and enhanced mobility.
Tags : 
    
Intel
Published By: IBM Watson Health     Published Date: Nov 20, 2017
Strong patient engagement leads to improved population health, a better experience of care, and lower healthcare costs. Even so, few healthcare organizations have a well-defined patient engagement strategy, according to research by IBM Watson Health. Read this whitepaper and learn why healthcare organizations should create a comprehensive patient engagement strategy, what each component of such a strategy entails and how to take the steps required to build an effective patient engagement program. From patient portals, telemedicine, and mobile health, to data sharing, automation tools and cognitive computing, youll gain the ability to leverage valuable tools for increasing patients involvement in their own health outcomes.
Tags : 
patient outreach, patient relationship management, patient experience, population health management, cognitive computing, data, data sharing, healthcare costs, care, patient engagement, patient engagement strategy, patient portals, mobile health, telemedicine, automation tools, health outcomes
    
IBM Watson Health
Published By: Macquarie Telecom     Published Date: Mar 30, 2015
This white paper reveals a list of top 10 trends in cloud computing to help you take advantage of all the greatest new innovations in cloud technology.
Tags : 
virtualisation, cloud computing, softward defined datacentres, software define networking, hybrid cloud, hybrid, cloud computing trends, cloud security, cloud performance, mobile cloud computing, disaster recovery, firewalls, mobile computing, data protection, virtualization
    
Macquarie Telecom
Published By: Message Systems     Published Date: Apr 29, 2013
The CRM has been a spectacularly successful technology application, especially in providing large organizations with a detailed.
Tags : 
message systems, customer engagement, mobile, crm, crm, crm implementations, crm-based customer insight, cloud computing, sms, mms, social messaging, smartphones
    
Message Systems
Start   Previous    1 2 3 4 5 6 7 8 9 10    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.