devices

Results 1376 - 1400 of 1773Sort Results By: Published Date | Title | Company Name
Published By: IBM     Published Date: Oct 10, 2013
Our services can help you create a robust mobile environment where you can deploy and manage devices and applications more easily.
Tags : 
manage mobiles, mobile services, managing mobile services, global enterprise, services globally, manage devices, manage applications, mobile environment, deploy devices, emerging mobile market, robust mobility
    
IBM
Published By: IBM     Published Date: Oct 10, 2013
Mobile computing via smart phone, laptop, tablet and e-reader is becoming commonplace in the enterprise today. Unfortunately, so are the challenges it brings. This White Paper examines the network security, device management, network performance and user expectation issues you need to solve for effective mobile collaboration, and outlines the planned, architectural approach IBM recommends.
Tags : 
mobile computing, smart phones, wireless devices, device management, security, network performance, user expectations, mobile collaborations, architectural approach, mobile onslaught
    
IBM
Published By: IBM     Published Date: Oct 10, 2013
With 2.5 billion employee-owned mobile devices in the workplace today, enterprises are struggling to capture the business benefits while bracing their IT infrastructure against data breaches and a deluge of mobile traffic. A new study reveals that the most mobile-savvy organizations are employing specific best practices, including mobile planning, integration, optimization and management to achieve mobile infrastructure maturity.
Tags : 
mobiles, mobile technology, technology leaders, ibm, global it, it leaders, mobility, wireless, business benefits, mobile traffic, gaining traffic, employing practices, mobile infrastructure, infrastructure maturity, mobile devices, data breach, enterprises
    
IBM
Published By: IBM     Published Date: Oct 10, 2013
The ubiquity of mobile devices is transforming the ways that business gets done in today’s world. IBM has the services that can help go beyond supporting devices to achieve a flexible, powerful mobile enterprise.
Tags : 
mobile, mobile enterprise, mobile environment, security, mobile security, mobile device, wireless, mobile strategy, byod, mobile infastructure, application management, data, security, safeguarding, telecommunications
    
IBM
Published By: IBM     Published Date: Oct 10, 2013
Mobile devices, including smartphones and tablets, enable increasing numbers of employees to work "anywhere, anytime."The security of enterprise data is a key concern, particularly on mobile devices that are easily lost or stolen. The security risk is further heightened by the proliferation of employee-owned mobile devices in many enterprises. Employees will almost always take the path of least resistance in leveraging mobile devices for business purposes, which may lead to unsafe computing practices. A clearly documented and enforceable mobile security policy is critical to reducing the risk of data loss.
Tags : 
mobile, mobile enterprise, mobile environment, security, mobile security, mobile device, wireless, mobile strategy, byod, mobile infastructure, application management, data, security, safeguarding, telecommunications
    
IBM
Published By: IBM     Published Date: Oct 10, 2013
As your employees bring their own smartphones and tablets to the workplace, you need to create a flexible mobile environment that allows personally owned and corporate-issued devices to co-exist. IBM Mobile Enterprise Services for managed mobility is designed to help reduce the complexity that comes with multiple mobile platforms. IBM recently commissioned Forrester Consulting to examine the total economic impact and potential return on investment that companies realized by engaging IBM to implement a “bring your own device” program. In this report, you’ll learn how these companies: Increased employee productivity and satisfaction; expanded revenues from improved sales mobility, and decreased replacement, mobility infrastructure and support costs.
Tags : 
managed mobility, byod, michelle evangelista, bring your own device, mobile, flexible, mobile environment, ibm mobile enterprise services, mobile enterprise, managed mobility, mobile platforms, roi, employee productivity, sales mobility, mobility infrastructure
    
IBM
Published By: IBM     Published Date: Oct 10, 2013
e IBM journey toward unified communications for mobile and social collaboration. Many of today's innovations are driven by the consumer marketplace, and the workplace is no exception. As consumers, we are very familiar with new ways for people to find each other, keepin touch, share ideas and be mobile, getting information from many place. As employees, we would like to apply these consumer capabilities to our work - seamlessly and on a global basis - to make us more productive and effective with business colleagues, clients and business partners. This white paper discusses IBMs infrastructure transformation over the first 12 years, summary value proposition, and volution in supporting mobile devices and BYOD.
Tags : 
collaboration, infrastructure, mobile, social, communication system, unification, mobile collaboration, social collaboration, byod, ibm, bring your own device, infrastructure, infrastructure transformation, summary value proposition, mobile devices
    
IBM
Published By: Oracle     Published Date: Nov 13, 2013
This Executive Brief explores the role of service and support in creating great customer experiences, the service goals market leaders use related to customer experience, the Oracle approach for empowering new service experiences, and how Oracle’s service solutions can help organizations create and manage their own great customer experiences across all channels, touchpoints, and devices.
Tags : 
zenithoptimedia, oracle, executive strategy series, customer experience, empowering people, take initiative, power your brand, oracle service solutions, customer experience impact, cei, service and support experience, lasting customer relationships, sales interactions, ignored customers, efficiency, acquisition, improve self-service, improve productivity, cross-channel support, decrease operational costs
    
Oracle
Published By: IBM     Published Date: Mar 04, 2014
Technology advances are changing the way employees work, consumers buy, and enterprises conduct business. Old methods for marketing products are taking a back seat to online distribution, and mobile devices are ubiquitous access points to the Internet. The resulting environment is ripe for the creation and distribution of new software for handling a constantly expanding array of functions. When there is an app for everything, organizations have no choice but to adapt or risk getting left behind as markets enter the era of the Web application programming interface (API).
Tags : 
ibm, mobile, mobile app, api, api management, web application, application programming interface, app, ubm tech, mobility, cloud, mobile devices, software
    
IBM
Published By: IBM     Published Date: Mar 04, 2014
This paper explores how companies can more safely introduce employee- or corporate-owned mobile devices into the work-place, identify the risks inherent in their broader access to corpo-rate data, and derive enhanced business value.
Tags : 
ibm, mobile, mobile device, mobile security, security, mobility, enterprise, mobile enterprise, mobile device platform, it management, malware, spam, phishing, bluetooth, wi-fi, theft
    
IBM
Published By: Cisco     Published Date: Apr 08, 2015
NSS research indicates that NGFW devices are typically deployed to protect users rather than data center assets, and that the majority of enterprises will not tune the IPS module separately within their NGFW. Therefore, NSS evaluation of NGFW products is configured with the vendor pre-defined or recommended,“out-of-the-box” settings, in order to provide readers with relevant security effectiveness and performance dimensions based upon their expected usage.
Tags : 
next generation, firewall, malware, threat, complexity, costs, visibility, protection, network, enterprise, solution
    
Cisco
Published By: Cisco     Published Date: Apr 10, 2015
As education evolves, so does the way we teach and learn. This report focuses on one of the newest trends, still in its nascent stages—mobile learning. It describes the potential benefits of mobile learning, addresses the challenges and opportunities that introducing mobile learning presents, and provides examples from school districts that have already implemented mobile learning programs so we can learn from their best practices. The report also suggests key points to consider as you develop your plans, align your goals, and make decisions regarding mobile learning in your schools.
Tags : 
cisco, education, mobile learning, mobile devices
    
Cisco
Published By: Cisco     Published Date: Apr 10, 2015
Data center administrators face a significant challenge: They need to secure the data center without compromising the performance and functionality that new data center environments enable. Many are looking to secure the data center using solutions designed for the Internet edge, but these solutions are not enough. The data center has unique requirements around provisioning, performance, virtualization, applications, and traffic that Internet-edge security devices are simply not designed to address.
Tags : 
security, data center, performance, virtualization, application, internet, functionality
    
Cisco
Published By: Cisco     Published Date: Apr 10, 2015
Today’s branch office requires the same level of rich application services as the company headquarters to ensure business innovation and employee productivity. Why are these services needed? What impact do they have on the network, IT staff, and service provider? What is the best way to boost the branch-office network to optimum levels - both technically and tactfully - if the devices provided do not meet the new requirements? Read on to learn more.
Tags : 
cisco, routers, wan, wlan, rich application services, wireless devices
    
Cisco
Published By: Cisco     Published Date: Apr 10, 2015
This document is a Cisco Validated Design (CVD) for Cisco Connected Mobile Experience (CMX) Solutions. It presents system-level requirements, recommendations, guidelines, and best practices for detecting, connecting, and engaging mobile users within your venue and leveraging your Wi-Fi network to fit your business needs. As Cisco continues to develop and enhance the technologies required to implement a CMX solution, this CVD will evolve and be updated to provide the latest guidelines, recommendations, and best practices for designing and deploying a CMX solution.
Tags : 
cisco, design, network architecture, mobile devices, best practices, wifi, wlan, wan, cmx
    
Cisco
Published By: Cisco     Published Date: Apr 10, 2015
The evolution from business connectivity to business mobility is unlike previous compute transitions because it redefines how people work. Historically, companies provided access to the necessary applications and data from corporate-issued devices such as laptops and desktops in controlled operating environments. This tightly integrated environment tethered workers to a specific device and operating system, and even sometimes to a location. Mobility breaks these shackles and enables workers to change the way they work.
Tags : 
cisco, zk research, mobile workplace, mobile deployment, mobile computing, it management
    
Cisco
Published By: Cisco     Published Date: Apr 10, 2015
This part of the CVD describes design considerations to implement a successful BYOD solution and different deployment models to address diverse business cases. Other parts of the CVD provide more details on how to implement unique use cases. There are numerous ways to enable a BYOD solution based on the unique business requirements of a specific organization. While some organizations may take a more open approach and rely on basic authentication, other organizations will prefer more secure ways to identify, authenticate, and authorize devices. A robust network infrastructure with the capabilities to manage and enforce these policies is critical to a successful BYOD deployment.
Tags : 
cisco, byod, wifi, wireless, wlan, productivity, productivity
    
Cisco
Published By: Cisco     Published Date: Apr 10, 2015
Interest in cloud computing over the last several years has been phenomenal. For cloud providers, public or private, it will transform business and operational processes, streamlining customer on-ramping and time to market, facilitating innovation, providing cost efficiencies, and enabling the ability to scale resources on demand. Cisco's Virtualized Multi-tenant Data Center (VMDC) system defines an end-to-end architecture, which an organization may reference for the migration or build out of virtualized, multi-tenant data centers for new cloud-based service models such as Infrastructure as a Service (IaaS).
Tags : 
cisco, design, network architecture, mobile devices, best practices, vmdc, data center, cloud computing, iaas
    
Cisco
Published By: Cisco     Published Date: Aug 27, 2015
Reliance on mobility, network access for mobile devices, including guest wireless access, is essential.
Tags : 
wifi, lan, infrastructure, mobility, network
    
Cisco
Published By: Cisco     Published Date: Sep 15, 2015
Walk past your data center, and you might hear a soft, plaintive call: “Feed me, feed me…” It is not your engineers demanding more pizza. It is your servers and applications. And the call is growing louder. Mobile and virtualized workloads, cloud applications, big data, heterogeneous devices: they are all growing in your business, demanding previously unimagined capacity and performance from your servers and data center fabric. And that demand is not slacking. Your employees, applications, and competitive advantage increasingly depend on it. Those servers and applications need to be fed. And if you have not started planning for 40 gigabits per second (Gbps) to the server rack, you will need to soon.
Tags : 
applications, systems integration, cloud, development
    
Cisco
Published By: Cisco     Published Date: Oct 14, 2015
Malware knows no boundaries. Neither should your advanced malware protection solution. Cisco offers the industry’s broadest portfolio of Advanced Malware Protection (AMP) products available for all enforcement points in the extended network wherever threats can manifest: endpoints, network appliances, secure content gateways, mobile devices, and virtual environments.
Tags : 
cisco, malware protection, security, nss, malware protection solution, advanced malware protection, amp, endpoints, mobile devices, virtual environments
    
Cisco
Published By: Cisco     Published Date: Dec 21, 2016
As the corporate landscape becomes increasingly mobile, and workers collaborate across a growing range of devices, organizations are implementing an agile and secure unified communications infrastructure. Active deployment of UC technology solutions has been on the rise among enterprises; however, adoption among midsize businesses has been notably slower. Yet in seeking ways to do more with less, midsize organizations are increasingly turning to the cloud and converged networks to provide UC solutions.
Tags : 
    
Cisco
Published By: Cisco     Published Date: Dec 21, 2016
Mobile devices have brought advancements to virtually all aspects of modern life and have had transformative effects on businesses spanning all industries. However, the positive business effects that can be brought about by mobility and "going digital" are not enjoyed as frequently within small and midsize businesses (SMBs) as they are within larger organizations. While potential benefits are there, small and midmarket organizations may have fewer resources available and can find difficulty in realizing the full value of the enterprise mobility infrastructure. Often, organizations find themselves having to make trade-offs between richness of functionality and available resources.
Tags : 
    
Cisco
Published By: Cisco     Published Date: Dec 21, 2016
Employees are mobile because we support everyone with technology and policies that allow them to work flexibly in terms of time, place, and device. We deliver this capability through Cisco products for secure wireless LAN (WLAN) and home and remote access (Cisco Virtual Office and VPN), as well as softphones, Cisco® WebEx®, Cisco Spark™, and extension mobility features. Our bring your own device (BYOD) policies and program allow employees to use their personal mobile devices to access the Cisco network, after the device is registered and confirmed as compliant with our security requirements for making it a secure or trusted device.
Tags : 
    
Cisco
Published By: Cisco     Published Date: Dec 21, 2016
IT has gone through a significant evolution over the past decade. Virtualization has changed the entire face of the data center, the network edge has become predominantly wireless and consumer devices reign supreme. However, one of the few areas of IT that has yet to evolve is the corporate wide area network (WAN). Managing the WAN is something network managers have always struggled with because WAN speeds are typically an order of magnitude, or more, slower than local area networks (LANs).
Tags : 
    
Cisco
Start   Previous    49 50 51 52 53 54 55 56 57 58 59 60 61 62 63    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.


Featured FREE Resource: