devices

Results 1551 - 1575 of 1793Sort Results By: Published Date | Title | Company Name
Published By: HP - Intel® Xeon® processors     Published Date: Nov 07, 2012
Download this whitepaper for a look at how organizations are becoming much more efficient through the use of virtualization and the separation of physical devices from the computing, storage, and networking services they deliver.
Tags : 
virtualization, converged infrastructure, cloud computing, convergence, mission-critical applications, servers, cloud, it infrastructure
    
HP - Intel® Xeon® processors
Published By: IBM     Published Date: Oct 24, 2012
The world's appetite for media and entertainment is seemingly insatiable. New devices are enabling the use of new media in ways that were barely imaginable a few decades ago. Read on to learn more about analytics and personalization to attract users.
Tags : 
analytics, ibm, consumer behavior, consumer, user, media, cross channel marketing, social media, marketing research
    
IBM
Published By: Good Technology Corporation     Published Date: Oct 23, 2012
As companies embrace the use of individual liable mobile devices to access corporate applications and data, Good provides guidance on creating individual liable usage policies.
Tags : 
byod, bring your own device, security, policy considerations, device, enterprise applications
    
Good Technology Corporation
Published By: IBM     Published Date: Oct 23, 2012
With widespread use of mobile devices and social media, today's consumers are connected and empowered like never before. This white paper explores the challenges that face retail chief marketing officers (CMOs) and their divisions.
Tags : 
ibm, analytics, personalized marketing, customer loyalty, consumer behavior, customer loyalty, emerging marketing, marketing research
    
IBM
Published By: Good Technology Corporation     Published Date: Oct 23, 2012
The consumerization of IT is coming. It's a given that employees will bring their own devices to work or will want to work on devices away from the office. The adoption of smart devices has set expectations, causing the "I want my iPad" phenomena
Tags : 
byod, virtualization, enterprise applications, mobile, security, implementation, it implementation
    
Good Technology Corporation
Published By: Good Technology Corporation     Published Date: Oct 23, 2012
Read this whitepaper to learn how to enable mobile collaboration while maintaining data security and strict end user privacy -whether on BYOD or a mix of corporate- and employee-owned devices.
Tags : 
virtualization, collaboration, enterprise applications, cloud computing, mobility management, mobile collaboration
    
Good Technology Corporation
Published By: HP - Intel®     Published Date: Oct 19, 2012
This paper discusses the challenges and solutions on how HP addresses the security and management of multiple Wi-Fi devices being introduced into the wireless/wired network.
Tags : 
byod, healthcare, bring your own device, mobile devices, security risk, security compliance
    
HP - Intel®
Published By: HP - Intel®     Published Date: Oct 19, 2012
This white paper can help you address the security and management of multiple devices being introduced into your network. Read on and learn how to embrace a BYOD.
Tags : 
byod, bring your own device, mobile device, education applications, education, security risk, security compliance
    
HP - Intel®
Published By: Adobe     Published Date: Oct 19, 2012
As consumers access online content on more devices - computers, smartphones, tablets and even gaming consoles - managing and delivering digital content has grown exponentially more complex. Learn how rethinking WCM will help you thrive in complexity.
Tags : 
mobile content management, cms, content management systems, wcm, web content management, mobile content planning, mobile applications, crm & customer care
    
Adobe
Published By: Symantec.cloud     Published Date: Oct 11, 2012
The emergence of mobile applications has fundamentally changed the way that millions of people around the world work, play, and communicate. Meanwhile, cybercriminals want to infect and exploit as many mobile devices as they can to steal information.
Tags : 
symantec, phishing, malware, security, internet security, mobile security, mobile
    
Symantec.cloud
Published By: Interactive Intelligence     Published Date: Oct 10, 2012
In this whitepaper, Daniel Hong and Keith Dawson from Ovum take an extensive look at how smart devices can revolutionize the customer experience.
Tags : 
customer service, customer experience, customer interactions, smart devices, mobile strategy, customer care
    
Interactive Intelligence
Published By: IBM     Published Date: Oct 09, 2012
An infographic showcasing the necessity of defending mobile devices.
Tags : 
mobile device, mobile security, corporate reputation, it security, security risk
    
IBM
Published By: Business.com     Published Date: Oct 09, 2012
The use of GPS tracking devices in fleet vehicles helps reduce fuel costs, increase employee productivity, and improve your company's safety profile. In this guide, we'll cover how and why GPS fleet tracking can save your business money.
Tags : 
gps. fleet tracking, saving, costs, lowering costs
    
Business.com
Published By: Citrix Systems     Published Date: Oct 08, 2012
Today's organizations encompass a diverse range of users, from road warriors using laptops and mobile devices as well as power users working with demanding high-end applications, to task workers performing standard, relatively predictable processes. A one-size-fits-all approach to desktop virtualization cannot meet all the different requirements of these users.
Tags : 
citrix, desktop, virtualization, shared desktop, remote pc
    
Citrix Systems
Published By: Citrix Systems     Published Date: Oct 08, 2012
Desktop virtualization helps organizations support business priorities that are crucial for growth. By freeing people to work in more places, on more devices, the organization can offer a more attractive work experience to recruit and retain the best candidates and empower them to do their best work.
Tags : 
citrix, desktop, virtualization, it structure, data
    
Citrix Systems
Published By: BlackBerry     Published Date: Oct 03, 2012
In this webcast, we will demonstrate some of the standard administrative tasks and how they are performed with BlackBerry® Mobile Fusion.
Tags : 
mobile infrastructure, mobile devices, mobile device management, managing mobility
    
BlackBerry
Published By: BlackBerry     Published Date: Oct 03, 2012
Get the details on how BlackBerry Mobile Fusion can make managing mobile devices - including those running Apple iOS and Google Android operating systems faster, easier and safer than ever.
Tags : 
byod, bring your own device, blackberry, mobile device, managing mobility, managing enterprise mobility, smartphones, mobile device management
    
BlackBerry
Published By: BlackBerry     Published Date: Oct 03, 2012
In this FAQ, discover answers to your top questions about balancing the security of your corporation and its confidential information with the usability and convenience that your end-users want on their mobile devices.
Tags : 
mobile user needs, mobile security, mobile devices, blackberry
    
BlackBerry
Published By: BlackBerry     Published Date: Oct 03, 2012
Though you can't stop the loss or theft of devices, there are powerful ways to ensure enterprise and data security in every scenario. This FAQ explains how the BlackBerry PlayBook tablets can be an integral part of an enterprise security strategy.
Tags : 
enterprise security, enterprise security strategy, mobile security, data security, blackberry, workplace mobility
    
BlackBerry
Published By: Blackberry     Published Date: Oct 03, 2012
Though you can't stop the loss or theft of devices, there are powerful ways to ensure enterprise and data security in every scenario. This FAQ explains how the BlackBerry PlayBook tablets can be an integral part of an enterprise security strategy.
Tags : 
enterprise security, enterprise security strategy, mobile security, data security, blackberry, workplace mobility
    
Blackberry
Published By: BlackBerry     Published Date: Oct 03, 2012
As the workplace grows more mobile by the minute, you may be wondering how to extend this to your mobile devices. In this resource, uncover how mobile communications fit into your call recording strategy, and what it means for your enterprise.
Tags : 
mobile device management, mobile communications, blackberry, call recording, call recording strategy
    
BlackBerry
Published By: Blackberry     Published Date: Oct 03, 2012
As the workplace grows more mobile by the minute, you may be wondering how to extend this to your mobile devices. In this resource, uncover how mobile communications fit into your call recording strategy, and what it means for your enterprise.
Tags : 
mobile device management, mobile communications, blackberry, call recording, call recording strategy
    
Blackberry
Published By: IBM     Published Date: Oct 01, 2012
Today's office is everywhere. Remote devices have created a 24/7, instantaneous response, work environment.
Tags : 
intranet, web experiences, customer experience, web content management, content delivery
    
IBM
Published By: Good Technology     Published Date: Sep 27, 2012
Read this whitepaper to learn how to enable mobile collaboration while maintaining data security and strict end user privacy -whether on BYOD or a mix of corporate- and employee-owned devices.
Tags : 
    
Good Technology
Published By: Voltage Security     Published Date: Sep 13, 2012
If there are any lingering doubts that mobile de-vices-such as smartphones and tablets-have profoundly transformed today's business, one study finds that using smart devices for produc-tivity is "now the standard.
Tags : 
data security, smart devices, smart security, data security strtegy, mobile security, security risks
    
Voltage Security
Start   Previous    56 57 58 59 60 61 62 63 64 65 66 67 68 69 70    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.


Featured FREE Resource: