eMarketingPapers
Home
About Us
List Your Papers
    

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.

tablet

Results 176 - 200 of 346Sort Results By: Published Date | Title | Company Name
Published By: Plantronics     Published Date: Sep 27, 2013
Apps have become critical to small businesses’ success. Small businesses are increasingly using apps in their daily operations. According to a recent survey, nearly three-fourths (72%) of small businesses are using apps on smartphones or tablets for their business and 38% report they could not survive—or it would be a major challenge to survive—without apps.
Tags : 
apps, mobile apps, mobile applications, mobile platforms, technology, communications, business applications, wireless, business technology, telecom
    
Plantronics
Published By: RES Software     Published Date: Apr 08, 2013
De ontwikkeling in IT heeft de afgelopen jaren niet stil gestaan. Alleen al het concept ‘Bring Your Own Device’ (BYOD), een gevolg van Het Nieuwe Werken, veroorzaakt een verandering in de manier waarop ICT-beheer vandaag de dag wordt uitgevoerd. De grens tussen werk en privé en de technologie die thuis of op het werk gebruikt wordt, vervaagt steeds meer nu werknemers persoonlijke apparaten als een tablet of mobiele telefoon, ook op de werkvloer gebruiken. Of andersom, wanneer de arbeidskracht de werklaptop thuis op de bank nog even voor een persoonlijk rondje surfen openklapt.
Tags : 
    
RES Software
Published By: Dell     Published Date: Mar 02, 2012
When you think about all the choices you have in computing devices for your workforce, it's easy to feel overwhelmed. There are so many different form factors, and for each, there are slight variations in shape, size, and physical features.
Tags : 
dell, mobile devices, tablets, mobile phones, workplace sofftware
    
Dell
Published By: Adobe     Published Date: Jul 13, 2012
Marketers, retailers, content owners and technology firms are more focused than ever on obtaining results from investments in digital marketing.
Tags : 
emarketing, cloud computing, smartphone, tablet, ereader, mobile video, online video, e-commerce, traditional marketing, search engine optimization (seo)
    
Adobe
Published By: CDW Symantec     Published Date: Aug 02, 2012
This white paper documents the ubiquity of tablets and other mobile devices within the workplace, the sensitive data accessed on these devices and their potential IT risks, and the data loss prevention solutions Symantec provides to help CISOs make the most intelligent security decision.
Tags : 
ipad, data security, remote wiping, data encryption, sandboxing, compartmentalization, reverse proxy, dlp, tablets, it systems, endpoint device growth, symnatec, integration, cisos, wireless, data management, business technology, data center
    
CDW Symantec
Published By: ThreatTrack Security     Published Date: Jan 22, 2015
It’s Time Businesses Wake up to the Mobile Security Reality - Bring Your Own Device (BYOD) is here to stay, and so are the associated risks. IT administrators face a new reality: pressure to account for, manage and secure an array of new endpoints. It's a giant task given the influx of smartphones and tablets, and the corresponding employee expectation - if not outright demand - for connection to the office at all times.
Tags : 
threattrack, security, threat, track, information, admins, best, practices, training, defense, tips, web, email, smartphones, education, data, breach, prevention, mobile, byod
    
ThreatTrack Security
Published By: Code42     Published Date: Apr 22, 2016
Today, in the age of information, people are paid for their ideas: to create original knowledge products or add value to existing products. Given their self-reliance, it is not surprising that workers take pride in their outputs—up to half of employees take a portfolio of files with them when they leave. When employees move on, many feel entitled to the work they’ve created.They presume it is acceptable to transfer work documents to personal computers, removable media, tablets, smartphones or online file sharing apps. Some pilfered data is innocuous and already in the public realm. But some of it is classified. Read this paper to find out how to collect and secure data to protect operations, reputation and continuity when employees leave.
Tags : 
data protection, code 42, data security, intellectual property
    
Code42
Published By: NexGen     Published Date: Feb 09, 2015
Desktop management at any scale is a tedious job. Imaging, reimaging, and troubleshooting desktop systems consume valuable IT resources, and keep employees from being productive. Securing the information generated on desktops, tablets, and smartphones is no simple job either. Many organizations are deploying virtual desktop infrastructures (VDI) for these reasons. But for deployment to be successful, computing and storage infrastructures must deliver high-quality, predictable, and productive user experiences. Often, the best way to accomplish this is through flash-based storage solutions due to its low latency/high IOPS nature. Unfortunately many IT professionals aren't sure what type of flash array is best for their needs or how to ensure that all elements of their VDI work seamlessly. Download now and learn how to validate a provide VDI configuration across NexGen N5 Hybrid Flash Array, VMWare Horizon View, Cisco Unified Computing System™(UCS), and Cisco Nexus Switches.
Tags : 
nexgen, hybrid, flash, qos, quality of service, it management
    
NexGen
Published By: Skillsoft     Published Date: May 10, 2011
Is now the time to take the plunge into mobile learning or should you wait for a more stable mobile landscape to emerge? It's important for organizations to focus on some basic issues before making this important decision.
Tags : 
mobile learning, smartphones, skillsoft, learning strategy, mobile learning strategy, tablets
    
Skillsoft
Published By: SAP     Published Date: Jul 17, 2012
Striving for employees to be able to collect, update, and access data anytime anywhere, organizations are leveraging smartphones and tablets to extend HR data and processes, creating new thresholds of efficiency, decision-making, and competitive advantage. Read this research report for new insights and examples on how mobility is impacting enterprise applications, data and processes, with a particular focus on HR applications.
Tags : 
technology, white paper, employees, smartphones, tablets, business technology, research
    
SAP
Published By: CDW     Published Date: Mar 27, 2015
IT departments must contend with an array of devices, operating systems and cellular carriers as well as new security threats. Even if IT departments can get a handle on the complex mobility landscape, the technology is so fluid that the picture is constantly changing. That means the IT staff has to devote time to learning about, procuring, deploying and supporting an array of devices. Busy IT departments now have another option for addressing these challenges: a monthly subscription package that provides a customizable web-based portal to automate mobile device procurement, expense management and support.
Tags : 
mobile, data, communication, tablet, smartphone, device, enterprise, tools, efficiency, wireless, enterprise applications
    
CDW
Published By: CDW     Published Date: Mar 27, 2015
Smartphones, tablets and other mobile devices have become embedded in enterprise processes, thanks to the consumerization of IT and a new generation of workers raised on mobile technologies. Consumer devices and bring-yourown-device (BYOD) programs are driving a new wave of business process innovation, changing the way customers, employees and partners interact with organizations and with each other. In fact, mobile devices and applications are catching up with — and in many cases surpassing — PCs in the quality and functionality of their applications.
Tags : 
mobile, application, content, innovation, functionality, customer, employee, smartphone, tablet, device, consumerization, wireless, data management
    
CDW
Published By: CDW     Published Date: Mar 27, 2015
Mobile devices are ubiquitous. The wide variety of functions they provide on the go — everything from making phone calls to checking email to literally millions of applications — has created widespread demand around the globe for this technology. With the right tools, an organization can extend the workplace far beyond its own physical walls. And employees can be active at any time within the 24-hour cycle; whenever inspiration strikes, a smartphone or tablet can quickly harness their productivity.
Tags : 
mobile, help desk, phone call, productivity, smartphone, tablet, email, applications, wireless, enterprise applications
    
CDW
Published By: CDW     Published Date: Mar 31, 2015
As mobile computing becomes an increasingly important technology, the need for robust, reliable wireless networks is growing. In addition to enterprise-issued devices, users are bringing their own tablets and smartphones and demanding access to IT resources. Organizations need a wireless infrastructure that can support these demands. Our research shows that in addition to mobile demands, aging hardware is driving many organizations' wireless upgrade plans. Download this white paper to read more about the research.
Tags : 
wireless, infrastructure, wi-fi, mobile computing, byod, upgrade, networking, it management
    
CDW
Published By: CDW     Published Date: Jul 08, 2015
It’s official — BYOD is here, and there’s no turning back. Mobile Device Management (MDM) gives employees the freedom to connect whenever, wherever for increased productivity and a better work-life balance. But every smartphone, tablet and notebook is a potential gateway for unauthorized applications, malware and other security threats.
Tags : 
security, vulnerability management, analytics, mobile security, byod, mdm
    
CDW
Published By: CDW     Published Date: Mar 18, 2016
The number of mobile devices managed by enterprises increased 72 percent from 2014 to 2015. This onslaught of technology such as notebooks, smartphones, tablets, watches and gadgets has transformed the way users work. These devices provide users in just about every sector with access to the information and tools they need to do their jobs, wherever and whenever they need them. They’re free to work at their desks, in conference rooms, while visiting clients on the road or during a child’s baseball practice. They can input data directly into a medical chart, an order form or an inspection report, rather than doubling their work by transcribing handwritten notes later in the day.
Tags : 
    
CDW
Published By: Dell SonicWALL     Published Date: Nov 28, 2012
A new IDG survey reveals optimism about the ability of next- generation firewalls to help IT balance productivity and security.
Tags : 
firewall security, security intelligence, nss svm, next generation firewall, network control, it security, security threats, network management, application intelligence, whitepaper, mobile, social, tablets, byod, security, business technology
    
Dell SonicWALL
Published By: NEC     Published Date: Nov 20, 2013
Mobile usage isn't slowing down; take a look at how its impacting the work place.
Tags : 
nec, enterprise mobile device, mobile, smartphones, tablets, it management
    
NEC
Published By: RingCentral     Published Date: May 22, 2014
A phone system that can integrate your desk phones, smartphones, and tablets is possible because of cloud technologies. And you are empowered to manage your entire company communications with a web browser and mobile app. RingCentral’s service frees businesses from outdated modalities of work and obsolete hardware—giving you voice, fax and text capabilities you can manage and access anywhere you go.
Tags : 
ringcentral, phone system, business phone, mobile phone, business transition, phone provider, cloud based phone, changing attitudes, enterprise applications, data center
    
RingCentral
Published By: Adobe     Published Date: Jul 09, 2015
Com o crescimento explosivo no uso de smartphones e tablets nos últimos cinco anos, a maioria dos profissionais de marketing desenvolveu estratégias para atrair clientes através de canais mobile. Nessa pesquisa, descobrimos que esses profissionais aprenderam a atingir os clientes por meio de dispositivos e plataformas, além de adaptar seus investimentos mobile à medida que eles se desenvolvem. Também analisamos e avaliamos as melhores práticas desses profissionais, de setores como: mídia e entretenimento, varejo e comércio, serviços financeiros, B2B e alta tecnologia. A pesquisa oferece uma visão geral dos investimentos em mobilidade pelos principais pro ssionais de marketing e o que é preciso para manter a liderança.
Tags : 
adobe, líderes, mobilidade, estratégia, web, tecnologia, email marketing, emerging marketing, social media, advertising agencies, crm & customer care, e-commerce, traditional marketing
    
Adobe
Published By: Box     Published Date: Jan 16, 2015
Desktop management at any scale is a tedious job. Imaging, reimaging, and troubleshooting desktop systems consume valuable IT resources, and keep employees from being productive. Securing the information generated on desktops, tablets, and smartphones is no simple job either. Many organizations are deploying virtual desktop infrastructures (VDI) for these reasons. But for deployment to be successful, computing and storage infrastructures must deliver high-quality, predictable, and productive user experiences. Often, the best way to accomplish this is through flash-based storage solutions due to its low latency/high IOPS nature. Unfortunately many IT professionals aren't sure what type of flash array is best for their needs or how to ensure that all elements of their VDI work seamlessly. Download now and learn how to validate a provide VDI configuration across NexGen N5 Hybrid Flash Array, VMWare Horizon View, Cisco Unified Computing System™(UCS), and Cisco Nexus Switches.
Tags : 
nexgen, hybrid, flash, qos, quality of service, it management
    
Box
Published By: bigtincan     Published Date: Oct 10, 2014
These days, business productivity depends largely on the ability to securely access and interact with a wide range of information over mobile devices, such as tablets and smartphones. From sales executives to field technicians, the demand for accessing corporate content securely on mobile devices is growing exponentially. In the past, implementing security measures to protect corporate content has involved VPNs, intranets, firewalls and passwords. However the increasing uptake of mobile devices in corporate settings means security measures must be implemented over a plethora of networks and devices. bigtincan has created a powerful solution with BigTinCan hub. An application for mobile devices, it allows for the distribution, management and governance of a range of content, including documents and rich media content, with enterprise-grade security.
Tags : 
mobile apps, mobile content, mobile security, corporate content, emerging marketing, marketing research
    
bigtincan
Published By: Quark Software     Published Date: Mar 19, 2015
With the proliferation of customer experience initiatives, content marketing and an increasing need to fulfill content delivery on mobile devices, digital publishing has now become an important component of the digital toolbox for every organization. Research firm InfoTrends recently released the 2015 Digital Publication Platform Market Overview, which finds that: • Over 90% of enterprises are moving towards electronic documentation. • The digital publishing platform landscape is made up of approximately 60 to 80 main companies, but is dominated by a few vendors that can be considered influencers. • The digital publishing platform market will grow by a 25% CAGR (compound annual growth rate) over the next five years. Learn more about the market, solution providers and take a look at the future of digital publishing in the InfoTrends Digital Publication Platform Market Report.
Tags : 
digital publishing, sales enablement, digital sales enablement, mobile sales enablement, enterprise mobility, corporate app, automated publishing, automated digital publishing, publishing automation, automated authoring, enterprise publishing, digital publishing software, digital publishing solutions, tablet publishing, mobile publishing digital, publishing report digital, publishing analyst report, xml publishing to apps, ipad publishing, digital publishing platform
    
Quark Software
Published By: Quark Software     Published Date: Mar 19, 2015
Companies of all sizes are realizing the increasingly important role digital plays in the enablement of their employees, sales teams and customers. To communicate with employees and customers around the world, Lufthansa Cargo needed to develop a corporate tablet and smartphone app that featured key details about the company such as information on its fleet, network, infrastructure, products and corporate responsibility. While Lufthansa Cargo had already gone digital with a customer magazine, the company realized a corporate app was a must have. Originally the app was envisioned as a toolkit for Lufthansa Cargo‘s top management and sales staff, but it ultimately developed into a multimedia offering for all air cargo enthusiasts. Download the case study to learn how Lufthansa Cargo increased its digital reach with an award-winning corporate app.
Tags : 
digital publishing, sales enablement, digital sales enablement, mobile sales enablement, enterprise mobility, corporate app, automated publishing, automated digital publishing, publishing automation, automated authoring, dynamic publishing, enterprise publishing, digital publishing software, digital publishing solutions, tablet publishing, mobile publishing, html5 publishing, xml publishing to apps, ipad publishing, digital publishing platform
    
Quark Software
Published By: CDW-Trend Micro     Published Date: Mar 26, 2015
Endpoint security is at a critical juncture. Increasingly, employees at organizations of all sizes are using a wider variety than ever of desktop and mobile devices, including smartphones, tablets and laptops, as they work from broadly dispersed locations, including home offices. Often, organizations are permitting and even encouraging employees to use their own devices under BYOD (bring your own device) policies. With these devices, employees are accessing not only corporate data and applications, but also social media, banking and shopping sites. Download this white paper to learn more about endpoint security.
Tags : 
endpoint security, desktop devices, mobile devices, byod, corporate data, technology, networking, security, it management, wireless, knowledge management
    
CDW-Trend Micro
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14    Next    End
Search Research Library