eMarketingPapers
Home
About Us
List Your Papers
    

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.

mobile applications

Results 276 - 300 of 590Sort Results By: Published Date | Title | Company Name
Published By: CDW Symantec     Published Date: Aug 02, 2012
Read about how Symantec provides the security needed to protect valuable information without hindering productivity. This white paper documents how Symantec helps identify, authorize, inspect and protect, so companies feel comfortable with their employees working from anywhere and from any device.
Tags : 
mobile, wireless, cloud computing, virtualization, data storage, data management, symantec, smart phones, rsa, cloud applications, data loss prevention, encryption, dlp, business technology, data center
    
CDW Symantec
Published By: Comcast Business     Published Date: Mar 24, 2015
For today’s businesses, fast Internet access is more than a competitive advantage. It is an operational necessity. Changes in the way companies are working – and the tools they are using – have created the need for high-speed connections to services and individuals off-site. Across the country, in-house servers are rapidly being replaced by cloud-based infrastructure. Videoconferencing is helping businesses cut travel costs. Mobile devices – with easy links to work-related content – are enabling more employees to be more productive, from any location. All of these applications have one factor in common: they require bandwidth. And plenty of it. Download this white paper to learn more about high-speed internet connections.
Tags : 
dsl, high-speed internet, cable, internet connection, productivity, bandwith, enterprise applications, data management
    
Comcast Business
Published By: Salesforce.com     Published Date: May 14, 2013
Get the Nucleus Research survey of CRM decision makers, showing the significant ROI opportunity all organizations should consider regarding mobile and social CRM adoption.
Tags : 
crm, mobile crm, salesforce, social sales, salesforce, social crm, crm applications
    
Salesforce.com
Published By: BMC Software     Published Date: Jan 31, 2014
IT is embracing to this new world of consumerized technology, with a focus on its own employees as internal customers. Explore how customer-first policies can make use of social, mobile and cloud technologies to give workers the freedom and flexibility they desire to drive company productivity. Please download the white paper for more information.
Tags : 
bmc, cosumerized technology, cloud technology, mobile technology, social technology, customer-first, modernized work processes, social-enabled enterprise applications, internal customers, it management, knowledge management, enterprise applications, business technology
    
BMC Software
Published By: BMC Software     Published Date: Jan 31, 2014
Today’s mature cloud-based ITSM solutions can give you the flexibility and agility you need—without sacrificing security, stability or performance. In this THINKstrategies, Inc. white paper, you’ll learn why businesses are moving to cloud-based ITSM and the advantages they’ve achieved. Explore how this innovative approach to IT management might be right for your organization. Please download the whitepaper to learn more.
Tags : 
bmc, cosumerized technology, cloud technology, mobile technology, social technology, customer-first, modernized work processes, social-enabled enterprise applications, internal customers, gartner, itssm, saas, itrpm, it service support management tools, cloud-based, thinkstrategies, it management, enterprise applications, business technology
    
BMC Software
Published By: BMC Software     Published Date: Jan 31, 2014
Consumerization of IT forces enterprises to rethink their approach to IT service delivery. What does consumerization really mean and why does it matter? Understand the basics to accurately identify the practical implications and benefits for your organization. This guide explores the realities of IT Consumerization to define challenges and opportunities. Learn best practices and get actionable recommendations. Please download the whitepaper to learn more.
Tags : 
bmc, cosumerized technology, cloud technology, mobile technology, social technology, customer-first, modernized work processes, social-enabled enterprise applications, internal customers, gartner, itssm, saas, itrpm, it service support management tools, cloud-based, customer experience, consumerization, it management, knowledge management, enterprise applications
    
BMC Software
Published By: BMC Software     Published Date: Jan 31, 2014
“Exploring Business and IT Friction: Myths and Realities,” outlines key issues that cause friction between business users and IT, such as: • Gaps in customer satisfaction and the perceived value of services • Inadequate IT support, which decreases productivity and revenue • Lack of communication and ownership in how business users and IT work together to identify service levels and technology needs See what 900 business and IT professionals had to say and get recommendations for change.
Tags : 
bmc, cosumerized technology, cloud technology, mobile technology, social technology, customer-first, modernized work processes, social-enabled enterprise applications, internal customers, gartner, itssm, saas, itrpm, it service support management tools, cloud-based, customer experience, consumerization, it management, knowledge management, enterprise applications
    
BMC Software
Published By: BMC Software     Published Date: Feb 03, 2014
Analysts predict that soon, half of all new IT service desk tools will be adopted as cloud-based services. While shifting to an on-demand model can be a complex decision, requiring organizations to assess carefully the potential impact on their business operations, a growing number of companies are clearly finding the move worthwhile. This paper explores the reasons for the rapid growth of cloud-based IT service management (ITSM) solutions and the benefits they offer for enterprises. Topics include: • The cost savings companies can achieve by deploying ITSM solutions via the cloud, which allows better management and optimization of consumption and costs. • Improved alignment between IT to and business, as self-service, a service catalog, collaboration, and mobility help IT expose and provide its services more effectively. • The ability to integrate cloud and on-premise solutions to leverage existing systems while leveraging new innovations via the cloud. • The advantages of cloud
Tags : 
bmc, cosumerized technology, cloud technology, mobile technology, social technology, customer-first, modernized work processes, social-enabled enterprise applications, internal customers, gartner, itssm, saas, itrpm, it service support management tools, networking, it management, knowledge management, enterprise applications, business technology
    
BMC Software
Published By: NetApp     Published Date: Sep 30, 2013
"As the rapid rise in the number of mobile devices and users creates an explosion in data and virtual machine instances, datacenter transformation becomes imperative for many enterprises. It is essential enterprises move to consolidate resources and cut both capital and operating costs while still providing support for distributed applications. This brief white paper delves into a Q&A with Eric Sheppard, research director of IDC’s Storage Software program, on integrated systems and whether you should buy compute, network, and storage resources together. Read on as you will discover: What integrated systems are, and its benefits The differences between an integrated platform and integrated infrastructure How datacenters are leveraging these new systems today And more" NetApp Privacy Policy
Tags : 
storage infrastructure, clustered storage, technology, scalability, application, storage solution, non-disruptive operations
    
NetApp
Published By: Tyco Integrated Security     Published Date: May 05, 2015
With security management apps, you can better protect your livelihood -- wherever and whenever you want.
Tags : 
mobility, mobile devices, networking, security, it management, wireless
    
Tyco Integrated Security
Published By: MuleSoft     Published Date: Oct 13, 2015
This paper reviews the primary drivers for mobile initiatives, the challenges faced by CIOs trying to initiate or support a mobile strategy, and the transformation stories of three market leaders who enabled mobility via API-led connectivity.
Tags : 
mobile applications, api-led connectivity, consumer experience, enterprise mobile strategy, enterprise applications
    
MuleSoft
Published By: MuleSoft     Published Date: Oct 13, 2015
The retail world is being transformed by e-commerce, mobile devices, and more competition than ever before. Retailers are using numerous customer-facing and back-office mobile apps, SaaS applications, and legacy systems — all of which are generating more data than ever before about their customers, providing valuable intelligence to create greater customer lifetime value, brand loyalty, and cross-selling across brands and products. Learn how harnessing that data can help retailers cut costs, retain their customers and generate more revenue.
Tags : 
retail success, cut costs, customer retention, revenue growth, enterprise applications
    
MuleSoft
Published By: Interactive Intelligence     Published Date: Oct 10, 2012
Nearly two-thirds of customers who try to solve issues online or through an interactive voice response (IVR) system inevitably choose to speak with an agent. Can smartphone applications change this interaction landscape for the better?
Tags : 
mobile apps, mobile self-service, mobile applications, customer interactions, business technology, customer experience/engagement
    
Interactive Intelligence
Published By: Kaspersky Lab     Published Date: Feb 18, 2014
Kaspersky Lab has created an eBook to help you calculate the true cost of protecting your business infrastructure, intelligence, and reputation. Download "IT Security by the Numbers: Calculating the Total Cost of Protection" to learn more.
Tags : 
kaspersky, it security, cost of production, total cost, hidden costs, cloud computing, mobile devices, web applications, virtualization, vulnerabilities, it spending, security spending, malware writers, cybercriminals, anti-malware, it environment, virus detection, software protection, security, it management
    
Kaspersky Lab
Published By: CenturyLink     Published Date: Nov 18, 2011
See how Payment Card Industry compliance can keep customer data safe and strengthen your business.
Tags : 
centurylink, qwest, high speed internet, phone, mobile, tv services, offers, bundles, voip, customers, kosks, mobile, applications, security, breaches, data, cards
    
CenturyLink
Published By: SAP     Published Date: Sep 12, 2012
In this whitepaper, you'll learn how SMEs can take a strategic approach to identify which mobile business apps will yield the strongest business value.
Tags : 
mobile solutions, mobile business applications, sme, sap, mobile governance, mobility
    
SAP
Published By: SAP     Published Date: Jul 18, 2012
As mobile operations spread through your organization, how is it possible to manage, support, and configure hundreds if not thousands of mobile applications for employees who use different mobile devices and operating systems requiring different versions of the same applications? Read this white paper to discover the importance of mobile application management, and learn best practices for establishing it within your organization.
Tags : 
technology, mobile, apps, applications, business, enterprise, workplace, e-mail, mobility, business technology, research
    
SAP
Published By: SAP     Published Date: Jul 18, 2012
Mobile is not simply another device for IT to support with a shrunken Website or a screen-scraped SAP application. Rather, mobile manifests a broader shift to new engagement systems. CIOs must plan now for them and empower customers, partners, and employees with context-aware apps and smart products.
Tags : 
technology, mobile, apps, applications, cio, social, cloud, business technology
    
SAP
Published By: CDW     Published Date: Mar 27, 2015
Smartphones, tablets and other mobile devices have become embedded in enterprise processes, thanks to the consumerization of IT and a new generation of workers raised on mobile technologies. Consumer devices and bring-yourown-device (BYOD) programs are driving a new wave of business process innovation, changing the way customers, employees and partners interact with organizations and with each other. In fact, mobile devices and applications are catching up with — and in many cases surpassing — PCs in the quality and functionality of their applications.
Tags : 
mobile, application, content, innovation, functionality, customer, employee, smartphone, tablet, device, consumerization, wireless, data management
    
CDW
Published By: CDW     Published Date: Mar 27, 2015
Many organizations are seeing clear and quantifiable benefits from the deployment of mobile technologies that provide access to data and applications any time, anywhere. These benefits often include increased profits, a more efficient and productive workforce, and enhanced customer service.
Tags : 
mobile, productive, workforce, deployment, customer service, benefit, success, data, wireless, enterprise applications
    
CDW
Published By: CDW     Published Date: Mar 27, 2015
Many, if not most, organizations today are grappling with the challenge of a growing mobile technology environment. Mobility can deliver many key benefits: improved collaboration among workers, enhanced customer service, easier access to corporate information from many locations and increased productivity—to name a few. But the proliferation of mobile devices and applications also comes with its share of challenges, perhaps none more important than ensuring the security of the devices themselves as well as the data they contain and the enterprise networks they access.
Tags : 
mobile, security, strategy, application, enterprise, network, data, wireless
    
CDW
Published By: CDW     Published Date: Mar 27, 2015
Mobile devices are ubiquitous. The wide variety of functions they provide on the go — everything from making phone calls to checking email to literally millions of applications — has created widespread demand around the globe for this technology. With the right tools, an organization can extend the workplace far beyond its own physical walls. And employees can be active at any time within the 24-hour cycle; whenever inspiration strikes, a smartphone or tablet can quickly harness their productivity.
Tags : 
mobile, help desk, phone call, productivity, smartphone, tablet, email, applications, wireless, enterprise applications
    
CDW
Published By: CDW     Published Date: Jul 08, 2015
It’s official — BYOD is here, and there’s no turning back. Mobile Device Management (MDM) gives employees the freedom to connect whenever, wherever for increased productivity and a better work-life balance. But every smartphone, tablet and notebook is a potential gateway for unauthorized applications, malware and other security threats.
Tags : 
security, vulnerability management, analytics, mobile security, byod, mdm
    
CDW
Published By: CDW     Published Date: Oct 01, 2015
Learn how a coherent strategy improves productivity and enhances how enterprises operate.
Tags : 
mobile, analytics software, cloud applications, cloud as a service, cloud computing, cloud infrastructure, cloud management
    
CDW
Published By: CDW     Published Date: Jan 15, 2016
Even with the latest devices, your mobile workforce may not have what they need to get the job done. Without a strategy to provide them with data and applications, they’re forced to work without them or find workarounds that can compromise security. Today’s workers are constantly on the move, and IT departments are scrambling to keep up. Access to email is not enough. You must address the legacy applications that your employees can’t easily access from their mobile devices, knowing that app development can be cost prohibitive and complex. And you have to have a strategy in place to secure and manage every application in use.
Tags : 
cdw, client virtualization, mobile workforce, mobile strategy, best practices, networking, security, software development, it management
    
CDW
Start   Previous    5 6 7 8 9 10 11 12 13 14 15 16 17 18 19    Next    End
Search Research Library