mobile

Results 1 - 25 of 3571Sort Results By: Published Date | Title | Company Name
Published By: Oracle     Published Date: Dec 31, 9999
Employee Services Systems and Technology Manager Trent Filth out talks about the benefits of choosing on-premises Oracle Fusion Human Capital Management.
Tags : 
pcl constructors inc, mobile, oracle, fusion, human capital management, hcm
    
Oracle
Published By: Lookout     Published Date: Dec 07, 2017
How to think about the risk to data from the mobile ecosystem Mobile devices, even those that are corporate owned, are personal. Your CEO uses the same smartphone to send confidential emails, snap family photos, inspect customer records, get directions to meetings, and scrutinize financial reports. Every employee in your organization does the same thing. Your organization's critical data is constantly being accessed by mobile devices, and once it leaves the network you have no visibility into where it goes, and little or no ability to enforce your security policy to protect it. Your organization’s sensitive data has made the mobile ecosystem the new frontier for a wide spectrum of risk that every CISO must now understand. Take a deep dive into all twelve elements of the Mobile Risk Matrix in the interactive table below.
Tags : 
    
Lookout
Published By: Financial Force     Published Date: Dec 01, 2017
Traditional business models are getting shattered by subscriptions. No one can doubt the new services economy is flourishing. The cloud, mobile, digital, connected devices, globalization - all these things have had a hand in reshaping business and powering new business models. Companies today are wrapping service-based business models and while this shift adds new complexities for finance and has major revenue recognition implications, it also gives finance leaders huge opportunities to become bigger value creators for their business and make a stronger impact on enterprise-wide strategies - not financials.
Tags : 
    
Financial Force
Published By: FinancialForce     Published Date: Dec 01, 2017
Traditional business models are getting shattered by subscriptions. No one can doubt the new services economy is flourishing. The cloud, mobile, digital, connected devices, globalization - all these things have had a hand in reshaping business and powering new business models. Companies today are wrapping service-based business models and while this shift adds new complexities for finance and has major revenue recognition implications, it also gives finance leaders huge opportunities to become bigger value creators for their business and make a stronger impact on enterprise-wide strategies - not financials.
Tags : 
    
FinancialForce
Published By: Oracle OMC     Published Date: Nov 30, 2017
Today’s consumers are demanding: they have become more unforgiving of a poor customer experience and expect interactions on their desktop and mobile devices to be responsive, intuitive, and easy to use. Marketers understand that delivering the most relevant experience is the key to gaining continued satisfaction and loyalty from their digital consumers. Oftentimes, however, when it comes to marketing to consumers there are two dynamics. On one hand you have what consumers say they want out of a customer experience. On the other hand, there is what they actually receive. What they want are experiences that are personalized, contextually relevant, and consistent— regardless of online or offline channel or lifecycle stage. What they too often get, however, are experiences that are disconnected, not contextually relevant, and inconsistent across channels and lifecycle stages.
Tags : 
    
Oracle OMC
Published By: Oracle OMC     Published Date: Nov 30, 2017
The act of engaging with a customer or buyer is hardly a new concept. Nor is the inherent need to do so in order to achieve success. Companies initially had control of the relationship because they controlled the information. When consumers received the advantage of online access, they took the lead. But the terms of engagement have changed again. Because of the mobile app, the power has shifted back to the marketing department.
Tags : 
    
Oracle OMC
Published By: Oracle OMC     Published Date: Nov 30, 2017
There’s really no mystery about mobile testing. It’s the art and science of building, running, and analyzing optimization tests for mobile customer experiences. But for companies looking to mobilize their websites and apps, the mystery often lies in how to do mobile testing really well. This guide assembles the best advice from analysts, engineers, and thought leaders to help mobile-minded businesses master the non-desktop landscape. You’ll learn how to optimize customer mobile experiences from strategy to execution. Along the way, you’ll get answers to common questions about mobile testing, find out about optimization testing in general, learn key differences between customer experience optimization (CXO) on mobile and desktop, and see how you can use design expertise to create bold and effective mobile experiences. So start reading and boost your understanding of mobile testing and optimization.
Tags : 
    
Oracle OMC
Published By: Oath     Published Date: Nov 29, 2017
Target, reach and engage your audience to drive measurable action and conversions with Yahoo Gemini native advertising solutions. Get more customers Native ads deliver up to 3.6X lift in searches for your brand name and services. Yahoo native ads e?ectively enhance your search campaigns. Drive better results Achieve results with targeted reach and up to 4x the performance of traditional banners. Engage a mobile audience 650M of our 1B global users are on mobile. Consumers spend nearly 3 hrs. on their mobile devices each day. Cost e?ective ads Native ads deliver up to 3.6X lift in searches for your brand name and services. Yahoo Gemini native ads on Oath owned and operated sites and apps can be purchased on a CPC or CPM basis. Native ads will be served to your customers based on their geo, demo and interest targets.
Tags : 
    
Oath
Published By: ChannelAdvisor     Published Date: Nov 29, 2017
"More than $1 million of e-commerce revenue is generated every 30 seconds, as millions of consumers purchase billions of products online. And these days, shopping is getting social. People aren’t just engaging on social media sites, but buying through them, too. As constant changes to mobile technology and e-commerce tools continue to reshape how consumers interact with brands and retailers, social commerce is here to stay. This white paper serves to help brands and retailers understand the state of social commerce today and its implications for connecting to customers, optimizing e-commerce operations and growing sales channels."
Tags : 
ecommerce, retail, advertising, selling online, online shopping, online advertising, social commerce, social media, social advertising, facebook, instagram, paid social, marketing
    
ChannelAdvisor
Published By: Avaya     Published Date: Nov 27, 2017
In an industry like automobile sales and service, responsiveness can easily mean the difference between a service appointment, a large-ticket sale – or a customer taking their business elsewhere. Despite its reputation for meeting and exceeding customer needs, Voss Auto Network was using an aging communications system. The network of dealerships, including eight locations across Ohio, serves over 500 employees. Getting calls even when “walking the lot,” quickly retrieving voicemails, and having the ability to easily track missed calls all proved key to taking customer service, sales, and repeat business to the next level.
Tags : 
    
Avaya
Published By: Intel Corp.     Published Date: Nov 21, 2017
case study on Bank Leumi, which Launches Mobile Only Banking
Tags : 
    
Intel Corp.
Published By: Avaya     Published Date: Nov 21, 2017
In an industry like automobile sales and service, responsiveness can easily mean the difference between a service appointment, a large-ticket sale – or a customer taking their business elsewhere. Despite its reputation for meeting and exceeding customer needs, Voss Auto Network was using an aging communications system. The network of dealerships, including eight locations across Ohio, serves over 500 employees. Getting calls even when “walking the lot,” quickly retrieving voicemails, and having the ability to easily track missed calls all proved key to taking customer service, sales, and repeat business to the next level.
Tags : 
    
Avaya
Published By: IBM Watson Health     Published Date: Nov 20, 2017
Strong patient engagement leads to improved population health, a better experience of care, and lower healthcare costs. Even so, few healthcare organizations have a well-defined patient engagement strategy, according to research by IBM Watson Health. Read this whitepaper and learn why healthcare organizations should create a comprehensive patient engagement strategy, what each component of such a strategy entails and how to take the steps required to build an effective patient engagement program. From patient portals, telemedicine, and mobile health, to data sharing, automation tools and cognitive computing, you’ll gain the ability to leverage valuable tools for increasing patients’ involvement in their own health outcomes.
Tags : 
patient outreach, patient relationship management, patient experience, population health management, cognitive computing, data, data sharing, healthcare costs, care, patient engagement, patient engagement strategy, patient portals, mobile health, telemedicine, automation tools, health outcomes
    
IBM Watson Health
Published By: MobileIron     Published Date: Nov 16, 2017
Der Wechsel zu modernen, mobilen Cloud-Technologien zwingt Unternehmen, ihr Endgeräte-Sicherheitskonzept komplett zu überdenken. Eine Absicherung mit Benutzerdaten reicht beispielsweise aus, um den Zugriff in einer von der IT kontrollierten Desktop-Umgebung abzusichern. Dies gilt jedoch nicht für die mobile Cloud. Identitätsabhängige Sicherheitsmaßnahmen, die lediglich Benutzernamen und Passwörter abfragen, komplizieren das Benutzererlebnis mit Mobilgeräten und fördern unsichere Sicherheitspraktiken, welche die Unternehmensdaten gefährden
Tags : 
    
MobileIron
Published By: MobileIron     Published Date: Nov 16, 2017
L'émergence des technologies mobiles et cloud modernes contraint les organisations à repenser complètement leur approche de la sécurité des terminaux. Par exemple, alors que l'utilisation d'identifiants suffit à sécuriser les accès dans un environnement composé d'ordinateurs de bureau et contrôlé par un service informatique, ce modèle n'est pas transposable à l'univers du cloud et des mobiles. Lorsque la sécurité repose uniquement sur l'identité (et donc sur un nom d'utilisateur et un mot de passe), l'utilisation d'appareils mobiles se complique et les comportements non sécurisés susceptibles de mettre en danger les données de l'entreprise sont encouragés
Tags : 
    
MobileIron
Published By: MobileIron     Published Date: Nov 16, 2017
Traditional identity-based security models cannot secure your business data from the latest mobile-cloud threats, including unsecured devices, unmanaged apps, and unsanctioned cloud services. To keep business data secure in the mobile-cloud world, you need a new security model that checks the state and health of devices, apps, and cloud services before letting them get to your data. Download the one pager now to learn more.
Tags : 
    
MobileIron
Published By: Insight     Published Date: Nov 16, 2017
With the mobile worker population on track to exceed 105 million by 2020, organizations in all industries are in a critical race to accommodate a new breed of worker. Comprised of millennials and Gen Xers alike, this new workforce expects seamless work experiences from device to desktop to laptop, anywhere, anytime. They demand to be fully equipped with the apps they need to do their best work — all without a hitch in the back-end systems and security that power and support them.
Tags : 
digital workforce, mobile worker, insight's connected workforce, intune, modern devices, end-user experiences
    
Insight
Published By: Insight     Published Date: Nov 16, 2017
Learn how to evolve your workplace technology and keep teams connected
Tags : 
connected workforce, modern workforce, mobile workforce technology, cloud for business, enterprise apps
    
Insight
Published By: MobileIron     Published Date: Nov 14, 2017
Watch this interactive video to get an overview of Mobileiron's products and the access it can offer you!
Tags : 
mobileiron, software solutions, mobility management
    
MobileIron
Published By: MobileIron     Published Date: Nov 14, 2017
This three-part video blog series is my perspective on Microsoft’s strategy, the evolution of Microsoft Intune, and the critical role MobileIron plays in a Microsoft shop. My opinions are based on publicly available and third-party data plus my analysis of Microsoft’s actions. Part I of this series gives an overview of Microsoft’s strategy, and Part II provides a high-level comparison of MobileIron and Microsoft Intune.
Tags : 
mobileiron, microsoft strategy, data analysis, efficiency, webinar
    
MobileIron
Published By: MobileIron     Published Date: Nov 14, 2017
Watch this on-demand Ask Us Anything HIMSS webinar as we engage with a panel of experts from St. Joseph Health, Box, and MobileIron. We'll uncover St. Joseph Health’s recent deployment of Box cloud storage with MobileIron to their employees’ mobile devices, major changes we’re seeing in the healthcare industry, and so much more!
Tags : 
healthcare, webinar, cloud storage, data usage, mobile device
    
MobileIron
Published By: MobileIron     Published Date: Nov 14, 2017
This paper covers some of the critical security gaps today’s mobile-cloud enterprises must address: • Unsecured devices. Unsecured devices allow users to easily access business data from mobile apps or cloud services simply by entering their credentials into an app or browser on the device. Once on the device, data can be easily compromised or shared with unauthorized, external sources. • Unmanaged apps. These typically include business apps, such as Office 365 productivity apps, that the user has downloaded from a personal app store instead of the enterprise app store. As a result, these apps are not under IT control but can still be used to access business content once the user enters his or her credentials. • Unsanctioned cloud services. Most enterprise cloud services have associated ecosystems of apps and services that integrate using APIs. While the enterprise cloud service might be sanctioned, apps and services from its ecosystem might not be.
Tags : 
    
MobileIron
Published By: MobileIron     Published Date: Nov 14, 2017
Traditional identity-based security models cannot secure your business data from the latest mobile-cloud threats, including unsecured devices, unmanaged apps, and unsanctioned cloud services. To keep business data secure in the mobile-cloud world, you need a new security model that checks the state and health of devices, apps, and cloud services before letting them get to your data.
Tags : 
    
MobileIron
Published By: IBM UK&Ireland     Published Date: Nov 14, 2017
Today’s empowered consumers want to shop anywhere, anytime and they expect nothing less than a seamless experience with all their needs accommodated as they shift among mobile, digital and physical channels. They want the freedom and choice of online shopping, balanced with the comfort and immediacy of a physical store. They want to research and select items from their armchair, check out offers when they’re on the move and then try out products in the store.
Tags : 
omni channel, retail success, customer empowerment, digital, mobile, ibm
    
IBM UK&Ireland
Published By: Cisco EMEA Tier 3 ABM     Published Date: Nov 13, 2017
Encryption technology has enabled much greater privacy and security for enterprises that use the Internet to communicate and transact business online. Mobile, cloud and web applications rely on well-implemented encryption mechanisms, using keys and certificates to ensure security and trust. However, businesses are not the only ones to benefit from encryption.
Tags : 
anomaly detection, trust modeling, event classification, entity modeling, relationship building, internet scrapers
    
Cisco EMEA Tier 3 ABM
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.


Featured FREE Resource: