mobile technologies

Results 151 - 175 of 217Sort Results By: Published Date | Title | Company Name
Published By: DocuSign     Published Date: May 29, 2014
Enterprises need to produce results faster, and that means eliminating paper and transitioning to fully digital processes. Digital transactions have become the new currency. Cloud, mobile and digital technologies such as e-signatures automate analog processes. This research note introduces digital transaction management (DTM) as a new way to conduct business.
Tags : 
docusign, aragon, cloud, mobile, digital, e-signatures, digital transaction management, dtm
    
DocuSign
Published By: Salesforce.com     Published Date: Apr 16, 2013
Smartphones and tablets are game changers for engagement because people carry them everywhere they go. Your customers and partners and employees have perpetual access to the vast resources of the Internet and hopefully your mobile app as well in the key moments of their day. In interviews with more than 100 mobile innovators, we have found four places where mobile engagement transforms services and processes: customer engagement, process acceleration, employee productivity, and new business services. Even at this early stage of development, you can see positive impacts of mobile engagement in apps from General Electric, Trane, and Uber Technologies. We close with a simple framework for prioritizing which apps and features people will actually use based how useful and convenient they are.
Tags : 
mobile, engagement, business, smartphones, tablets, mobile computing, mobile workers, smart phones
    
Salesforce.com
Published By: Adobe     Published Date: Apr 13, 2015
This Gigaom Research report aims to help technology decision-makers better understand: - What the modern workforce thinks it needs to succeed in this rapidly changing world of mobile-first communications and new work-collaboration technologies - How IT is supporting those needs and overall corporate objectives - If there are gaps between worker expectations and IT requirements, and how technology buyers can address them Download this Gigaom Research white paper to learn more.
Tags : 
adobe, modern workforce, platform support, platform productivity, it support, work-collaboration technologies, business intelligence, collaboration
    
Adobe
Published By: Ektron     Published Date: Jun 03, 2014
Leverage the best technologies to prepare your website for the mobile needs of tomorrow
Tags : 
ektron, ress, mobile technology, devices
    
Ektron
Published By: IBM     Published Date: Jan 06, 2016
In light of such popularity, many organizations are turning their attention to mobile recruiting. So, how do job seekers use mobile devices in their job searches? Using data from the global IBM WorkTrendsTM survey, the IBM Smarter Workforce Institute (SWI) analyzed why and how potential job seekers use mobile in their job searches and what concerns and expectations they have. The results provide organizations with clear insights into how they can attract talent via mobile technologies.
Tags : 
ibm, mobile recruitment, recruitment, mobile devices, smarter workforce institute, attracting talent
    
IBM
Published By: Zebra Technologies (Bulldog)     Published Date: Sep 19, 2016
Use this worksheet to record all of the information in one place. You can then use it to see which areas of your business will be impacted and which to prioritize when it comes to your rollout.
Tags : 
mobile asset inventory, zebra technologies, mobile devices, mobile device rollout
    
Zebra Technologies (Bulldog)
Published By: SAP     Published Date: Apr 14, 2011
Display marketers are eager to launch mobile campaigns. But they face challenges such as audience fragmentation, a chaotic vendor landscape, and myriad new technologies and devices. In order to navigate these challenges, we recommend that marketers focus on creating convenient mobile experiences by building mobile display campaigns that are simple, immediate, and contextually relevant to the section of their audience most likely to use them.
Tags : 
mobile display, melissa parrish, mobile marketers, tracking, audience fragmentation, mobile campaign, mobile experience, forrester
    
SAP
Published By: Qualys     Published Date: Jan 08, 2015
Health care organizations face a variety of security challengesfrom the growing presence of online personal data to new methods of accessing and transferring medical information. Protecting sensitive data requires more vigilance than ever. Learn how your IT security peers are responding to threats from mobile and cloud technologies to address these open systems in this latest SANS survey:New Threats Drive Improved Practices: State of Cybersecurity in Health Care Organizations. Inside youll see all the resultsrevealing better awareness of risks with improved commitment of resources and support. Download now to learn more about how leading health care organizations: Assess information ecosystems to understand gaps in infrastructure Establish data-centric security controls focusing on information, not just infrastructure Manage identities tying data controls closely with identity and access management Invest in incident response documenting and maintaining a formal response p
Tags : 
it security, information ecosystems, data-centric security, identity management, security
    
Qualys
Published By: BlackBerry     Published Date: Dec 22, 2009
Over a decade ago, mobile telephony entered the enterprise through the back door: employees who could afford mobile phones occasionally used them for business; specific business units budgeted for employee mobiles and then procured them locally; policies surrounding the usage of mobile phones for work were - where they existed at all - haphazard; there was little means of policy enforcement; and in no case were these mobile phones integrated into a business's fixed telephony strategy, let alone its IT strategy. This stands in sharp contrast to other office technologies, such as PCs, faxes, and copiers.
Tags : 
blackberry, mobile applications, cio, pim, voip, smartphones, it communication, microsoft exchange
    
BlackBerry
Published By: Adobe     Published Date: Apr 03, 2015
Download the Top 10 Mobile Predictions for 2015 to learn how you can win big in the new year by investing heavily in mobile marketing. Youll learn about the oncoming mobile technology arms race and youll discover the steps you must take to stay ahead of the pack. Download the report now to see all ten predictions and actions for marketers, including: How mobile technologies will disrupt entire industries. And what you must do to prepare. Why mobile moments will shrink to micro-moments. And which strategies youll need to integrate. How mobile wallets will soon take over. And what you can do to seize the opportunities.
Tags : 
mobile marketing, mobile technology, personalization, mobile wallets, adobe, marketing
    
Adobe
Published By: Adobe     Published Date: Sep 10, 2015
See how your peers - and potentially your competitors - use e-signatures and mobile sales effectiveness technologies to simplify sales cycles and create win- win results.
Tags : 
adobe, e-signature, revenue, sales
    
Adobe
Published By: ForgeRock     Published Date: Oct 24, 2014
Identity is a fundamental requirement to digital growth. Businesses and organizations cannot properly take advantage of mobile, cloud, or Internet of Things (IoT) technologies without a scalable and repeatable identity strategy. Without it, they have no way to identify and engage with their customers in a meaningful way whether it be through a laptop, mobile phone, tablet, connected car, healthcare wearable, connected home device or the next great connected innovation. This guide is designed to help you understand the essentials of customer-focused identity and how it helps you engage with your customers.
Tags : 
revenue generator, digital growth, identity management, customer-focused, it management, enterprise applications
    
ForgeRock
Published By: ForgeRock     Published Date: Mar 10, 2015
Identity is a fundamental requirement to digital growth. Businesses and organizations cannot properly take advantage of mobile, cloud, or Internet of Things (IoT) technologies without a scalable and epeatable identity strategy. Without it, they have no way to identify and engage with their customers in a meaningful way whether it be through a laptop, mobile phone, tablet, connected car, healthcare wearable, connected home device or the next great connected innovation. This guide is designed to help you understand the essentials of customer-focused identity and how it helps you engage with your customers.
Tags : 
irm, management, time-to-market, forgerock, revenue generator, software development
    
ForgeRock
Published By: TRUSTe     Published Date: Dec 08, 2010
This paper outlines for businesses the mobile landscape and introduces best design and privacy practices for mobile websites and apps, location-aware technologies, and mobile advertising.
Tags : 
truste, mobile platform strategy, design, privacy and security, mobile advertising, website, apps
    
TRUSTe
Published By: IBM     Published Date: Dec 15, 2016
Register today to learn more about this exciting release, its new features, and how you can drive new value for your organization: - Improve customer centricity by engaging individuals at the right time with the right offers - Cut operating costs and reduce fraud by gaining real-time visibility and insights into transactions and business operations - Empower knowledge workers and leverage mobile technologies to create more engaging experiences
Tags : 
ibm, middleware, operational decisions, odm advanced, enterprise applications
    
IBM
Published By: Group M_IBM Q418     Published Date: Sep 10, 2018
Digital transformation is not a buzzword. IT has moved from the back office to the front office in nearly every aspect of business operations, driven by what IDC calls the 3rd Platform of compute with mobile, social business, cloud, and big data analytics as the pillars. In this new environment, business leaders are facing the challenge of lifting their organization to new levels of competitive capability, that of digital transformation leveraging digital technologies together with organizational, operational, and business model innovation to develop new growth strategies. One such challenge is helping the business efficiently reap value from big data and avoid being taken out by a competitor or disruptor that figures out new opportunities from big data analytics before the business does. From an IT perspective, there is a fairly straightforward sequence of applications that businesses can adopt over time that will help put direction into this journey. IDC outlines this sequence to e
Tags : 
    
Group M_IBM Q418
Published By: Group M_IBM Q418     Published Date: Oct 02, 2018
Organizations are faced with providing secure authentication, authorization, and Single Sign On (SSO) access to thousands of users accessing hundreds of disparate applications. Ensuring that each user has only the necessary and authorized permissions, managing the users identity throughout its life cycle, and maintaining regulatory compliance and auditing further adds to the complexity. These daunting challenges are solved by Identity and Access Management (IAM) software. Traditional IAM supports on-premises applications, but its ability to support Software-as-a-Service (SaaS)-based applications, mobile computing, and new technologies such as Big Data, analytics, and the Internet of Things (IoT) is limited. Supporting on-premises IAM is expensive, complex, and time-consuming, and frequently incurs security gaps. Identity as a Service (IDaaS) is an SaaS-based IAM solution deployed from the cloud. By providing seamless SSO integration to legacy on-premises applications and modern cloud-
Tags : 
    
Group M_IBM Q418
Published By: IBM     Published Date: Jun 22, 2017
Security threats are very real, and the stakes are higher than ever. Each day, tens of thousands of malware variants are created, with new classes of threats continually added and improved upon. Savvy attackers use polymorphic programs to alter malware into new form factors after each delivery. And all of this is exacerbated by the proliferation of mobile devices, cloud computing and social mediain fact, the intersection of these technologies provides fertile new ground for threats and malware. Todays attacks are often not random, but targeted for maximum financial gain and impact. Rogue individuals and groups are constantly innovating new ways to attack organizations most valuable assets. As a result, traditional methods of dealing with threats are no longer enough. Organizations need more threat intelligence than ever before in order to effectively protect themselves.
Tags : 
cyber security, global threat intelligence, malware prevention, cyber threat, protection
    
IBM
Published By: IBM     Published Date: Jul 26, 2017
Security threats are very real, and the stakes are higher than ever. Each day, tens of thousands of malware variants are created, with new classes of threats continually added and improved upon. Savvy attackers use polymorphic programs to alter malware into new form factors after each delivery. And all of this is exacerbated by the proliferation of mobile devices, cloud computing and social mediain fact, the intersection of these technologies provides fertile new ground for threats and malware.
Tags : 
mobile devices, security, data protection, data loss, information security
    
IBM
Published By: Akamai     Published Date: Apr 10, 2015
Enterprise network architectures are evolving as a result of the growth of public cloud, proliferation of mobile devices, and organizational requirement to collaborate with global users. In this on-demand webinar, Gartner Research VP and Distinguished Analyst Mark Fabbi and Akamai Technologies' Enterprise Web Experience Product Manager, Greg Lord, will provide insight into this new trend.
Tags : 
akamai, web performance, cloud services, network management, cloud networking, digital enterprise
    
Akamai
Published By: Sage SalesLogix     Published Date: Apr 03, 2009
Workforce mobilization has become a key competitive requirement for most organizations. However, enabling mobility is more than just providing laptops and mobile phones to users and sending them out into the field. It's about selecting the appropriate technologies and developing the right user experience.
Tags : 
crm, customer relationship management, customer centric, saleslogix, user center design, mobile crm, customer-centric, customer service
    
Sage SalesLogix
Published By: IBM     Published Date: Oct 10, 2013
IBM MobileFirst is designed to enable organizations turn their interactions into an opportunity to drive return on engagement and investment. IBM combines deep industry expertise with mobile, analytics, cloud, social and security technologies. This can help enterprises capture new markets, efficiently extend their businesses to mobile employees, customers and business partners and maintain the integrity of their assets.
Tags : 
ibm, mobilefirst, business in motion, mobile enterprise, user interactions, return on engagement, return on investment, roi
    
IBM
Published By: IBM     Published Date: Oct 10, 2013
Four technology trendscloud computing, mobile technology, social collaboration and analyticsare shaping the business and converging on the data center. But few data center strategies are designed with the requisite flexibility, scalability or resiliency to meet the new demands. Read the white paper to learn how a good data center strategy can help you prepare for the rigors and unpredictability of emerging technologies. Find out how IBMs predictive analytics are helping companies build more accurate, forward-looking data center strategies and how those strategies are leading to more agile, efficient and resilient infrastructures.
Tags : 
technology trends, pervasive technology, data center, resilient infrastructures, collaboration and analytics, mobile technology, ibm, accurate strategies
    
IBM
Published By: Cisco     Published Date: Apr 10, 2015
This document is a Cisco Validated Design (CVD) for Cisco Connected Mobile Experience (CMX) Solutions. It presents system-level requirements, recommendations, guidelines, and best practices for detecting, connecting, and engaging mobile users within your venue and leveraging your Wi-Fi network to fit your business needs. As Cisco continues to develop and enhance the technologies required to implement a CMX solution, this CVD will evolve and be updated to provide the latest guidelines, recommendations, and best practices for designing and deploying a CMX solution.
Tags : 
cisco, design, network architecture, mobile devices, best practices, wifi, wlan, wan
    
Cisco
Published By: Cisco     Published Date: Oct 14, 2015
Mobile technologies are having a dramatic effect on the way we live, work, learn, and play. While organizations recognize that the impact of mobility could be as great as that of the web, many are struggling with what exactly to do about it. IT leaders have the opportunity to direct this transformation. Read more to learn how.
Tags : 
cisco, mobility solutions, mobility, mobile technologies, mobile work environment, networking, it management, enterprise applications
    
Cisco
Start   Previous    1 2 3 4 5 6 7 8 9    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.