devices

Results 301 - 325 of 1626Sort Results By: Published Date | Title | Company Name
Published By: Micron     Published Date: Oct 13, 2016
Micron is uniquely positioned to ease adoption with extensive expertise, advice and support. Secure your data by preventing data breach due to lost or stolen devices.
Tags : 
    
Micron
Published By: Citrix ShareFile     Published Date: Mar 31, 2017
The workplace is changing. Are you taking advantage of new technology to improve your productivity? Learn how far modern tech can take you. Read the e-book to learn how you can: • Integrate new work routines • Improve client relationships • Eliminate barriers to collaboration
Tags : 
technology efficiency, cloud storage services, mobile devices, applications, online collaboration tools, client services, data encryption, remote access, workflow integration
    
Citrix ShareFile
Published By: Citrix ShareFile     Published Date: Mar 31, 2017
Accounting is full of big, busy deadlines, which means the ability to take your work home with you could be a game-changer. But can your personal devices ever be secure enough to manage your clients’ sensitive data? Surprisingly, this informative whitepaper shows that, with the right preparation, using your personal device can actually help you keep your firm more secure. • Why data encryption is often easier to adopt as part of a cloud initiative • What top security threat you are less susceptible to on personal devices • How to manage device updates and passwords for the greatest protection
Tags : 
account security, data security, data loss prevention, device security, cloud security, confidential data
    
Citrix ShareFile
Published By: Citrix ShareFile     Published Date: Mar 31, 2017
Finance moves fast, and the ability to work from anywhere on your smartphone or laptop could be a game-changer. But can your personal devices ever be secure enough to manage your clients’ sensitive financial data? Surprisingly, this informative whitepaper shows that, with the right preparation, using your personal device can actually help you keep your organization more secure. • Why data encryption is often easier to adopt as part of a cloud initiative • What top security threat your employees are less susceptible to on personal devices • How to manage device updates and passwords for the greatest protection
Tags : 
financial services, financial security, data security, cloud security, network security, business protection
    
Citrix ShareFile
Published By: Citrix ShareFile     Published Date: Mar 31, 2017
Patients come with lots of paperwork. The ability to securely access it on your smartphone or laptop could be a game-changer. But can your personal devices ever be secure enough to manage PHI? Surprisingly, this informative whitepaper shows that, with the right preparation, using your personal device can actually help you keep your organization more secure. • Why data encryption is often easier to adopt as part of a cloud initiative • What top security threat your employees are less susceptible to on personal devices • How to manage device updates and passwords for the greatest protection
Tags : 
data encryption, cloud security, data storage, network security, device protection, information protection
    
Citrix ShareFile
Published By: Citrix ShareFile     Published Date: Apr 13, 2017
Patients come with lots of paperwork. The ability to securely access it on your smartphone or laptop could be a game-changer. But can your personal devices ever be secure enough to manage PHI? Surprisingly, this informative whitepaper shows that, with the right preparation, using your personal device can actually help you keep your organization more secure. • Why data encryption is often easier to adopt as part of a cloud initiative • What top security threat your employees are less susceptible to on personal devices • How to manage device updates and passwords for the greatest protection
Tags : 
data encryption, personal security, client security, cloud initiative, password protection
    
Citrix ShareFile
Published By: Citrix ShareFile     Published Date: Apr 13, 2017
Finance moves fast, and the ability to work from anywhere on your smartphone or laptop could be a game-changer. But can your personal devices ever be secure enough to manage your clients’ sensitive financial data? Surprisingly, this informative whitepaper shows that, with the right preparation, using your personal device can actually help you keep your organization more secure. • Why data encryption is often easier to adopt as part of a cloud initiative • What top security threat your employees are less susceptible to on personal devices • How to manage device updates and passwords for the greatest protection
Tags : 
data encryption, personal security, client security, cloud initiative, password protection
    
Citrix ShareFile
Published By: Citrix ShareFile     Published Date: Apr 13, 2017
Accounting is full of big, busy deadlines, which means the ability to take your work home with you could be a game-changer. But can your personal devices ever be secure enough to manage your clients’ sensitive data? Surprisingly, this informative whitepaper shows that, with the right preparation, using your personal device can actually help you keep your firm more secure. • Why data encryption is often easier to adopt as part of a cloud initiative • What top security threat you are less susceptible to on personal devices • How to manage device updates and passwords for the greatest protection
Tags : 
data encryption, personal security, client security, cloud initiative, password protection
    
Citrix ShareFile
Published By: VMware     Published Date: Jul 24, 2017
ANZ Bank chose VMware AirWatch® to securely manage the bank’s fleet of more than 18,000 mobile devices that are used in 34 countries. ANZ Bank uses AirWatch to manage bankers’ company-issued mobile devices, and to manage digital tools such as Apple® iPad® kiosks in bank branches. Learn more about VMware AirWatch solutions built specifically for the finance industry.
Tags : 
    
VMware
Published By: VMware     Published Date: Jul 24, 2017
How can your business support new identity-defined workspaces across a variety of users — retail store associates checking inventory on a PC and a smartphone, hospital clinicians entering test results into a mobile workstation and an iPad, or financial advisors placing trades from Android devices and laptops? The answer is the digital workspace.
Tags : 
    
VMware
Published By: VMware     Published Date: Jul 24, 2017
There’s no denying that today’s workforce is “mobile.” Inspired by the ease and simplicity of their own personal devices, today’s workforce relies on a variety of tools to accomplish their business tasks — desktops, smart phones, tablets, laptops or other connected devices — each with varying operating systems.  The specific tasks they need to accomplish? That depends on the person. But it’s safe to say remotely logging in and out of legacy, desktop, mobile, software as-a-service (SaaS) and cloud applications is a given. And the devices on which they work? They could be owned by the enterprise or the end user, with varying levels of company oversight, security and management. The result? An overabundance of “flexibility” that leads to fundamental IT challenges of security and manageability.
Tags : 
    
VMware
Published By: VMware     Published Date: Jul 24, 2017
The mobile-cloud era is here. It is not merely about delivering apps; it is about simplifying processes so you can accomplish more. The mobile-cloud era is redefining productivity by enabling workflows through the key foundations of identity and contextual experiences, mobile collaboration, united endpoint management and security, and windows apps and desktops. Today people work primarily from mobile sources and expect a strikingly continuous experience across all their devices, regardless of which device they select to best accomplish any given task. Once access is established, organizations are looking to transform processes to mobile so they can increase efficiency and workflows for end users, thereby driving productivity to the next level.
Tags : 
    
VMware
Published By: Progress     Published Date: Mar 06, 2017
The old rules no longer apply. Digital technologies have radically transformed the business landscape, yet many organizations have completely ignored this reality. A new survey of IT decision makers found 96% see digital transformation as important or critical, yet 55% say they have one year or less to respond before they financially suffer. By failing to prepare for new technologies, devices and systems, organizations have threatened their own survival.
Tags : 
digital transformation, new technology, customer experience, web content management, content management sytems, software development, business technology
    
Progress
Published By: Progress     Published Date: Oct 09, 2017
"The old rules no longer apply. Digital technologies have radically transformed the business landscape, yet many organizations have completely ignored this reality. A new survey of IT decision makers found 96% see digital transformation as important or critical, yet 55% say they have one year or less to respond before they financially suffer. By failing to prepare for new technologies, devices and systems, organizations have threatened their own survival. The Digital Ultimatum, is your first step towards building a future-proof organization that optimizes the customer experience and routinely achieves organizational excellence."
Tags : 
    
Progress
Published By: Intel     Published Date: May 15, 2017
Mitel* delivers voice over Wi-Fi faster and with less disruption to existing network services. Read on to find out more.
Tags : 
mobile, network, wi-fi, mitel, mobile devices, remote working
    
Intel
Published By: Intel     Published Date: May 19, 2017
For today’s service providers and enterprises, bandwidth demands continue to increase and evolve. The introduction of Internet of Things (IoT) solutions, such as smart homes, smart cities, connected cars, and connected medical devices, is forcing organizations to change existing business models and to build more cost-effective networks.
Tags : 
nfv, enterprises, service providers, internet of things, virtualization, infrastructure, infrastructure management
    
Intel
Published By: FinancialForce     Published Date: Dec 01, 2017
Traditional business models are getting shattered by subscriptions. No one can doubt the new services economy is flourishing. The cloud, mobile, digital, connected devices, globalization - all these things have had a hand in reshaping business and powering new business models. Companies today are wrapping service-based business models and while this shift adds new complexities for finance and has major revenue recognition implications, it also gives finance leaders huge opportunities to become bigger value creators for their business and make a stronger impact on enterprise-wide strategies - not financials.
Tags : 
    
FinancialForce
Published By: Oracle APAC ZO OD Prime Volume CX ABM Leads June 2017     Published Date: Jul 18, 2017
For sales teams to be successful in the age of the customer, they need tools that help them close more deals, faster. Some CRM tools are underused because they’re not geared to helping reps sell in the modern era. This may be because they’re complicated to use; because they’re isolated from the apps your reps use every day; or because they don’t give reps the information they need. Today, sales automation is not (just) about managing accounts, contacts, and activities. It’s about gaining insight that provides a competitive edge, having access to predictive information, being able to collaborate in real time, creating quotes in front of the customer, updating forecasts. All at any time, from any place, using mobile devices—all helping to drive sales and pipeline.
Tags : 
sales, mobile, analytics, customer data, sales automation, accounts, contacts, predictive information
    
Oracle APAC ZO OD Prime Volume CX ABM Leads June 2017
Published By: Oracle APAC ZO OD Prime Volume CX ABM Leads June 2017     Published Date: Jul 18, 2017
Mobile is undoubtedly changing both our personal and professional lives. Customer service organizations should decide on a strategy to bridge the gap between mobile behavior and customer service. This requires a strategic review of value drivers, combined with a tactical search for relevant use cases. Don’t fall in the “we need an app for everything” trap — some users need big screens, some users don’t. Some need a rich experience, others just need basic functions. Your strategy must take all of these dynamics into consideration.
Tags : 
data search, mobile devices, customer service, organization optimization, employee expectations, opportunities, global oracle data centers, data center traffic, customer interaction
    
Oracle APAC ZO OD Prime Volume CX ABM Leads June 2017
Published By: CA Technologies     Published Date: Aug 22, 2017
Effectively supporting these new business demands has become more complex and challenging. The increased use of mobile devices alone is driving exponential growth in transaction volumes. A customer pushes a button on his or her cell phone, for example, to check a bank balance. That single transaction triggers a cascade of transactions as the request is validated and data is accessed, retrieved and then sent back to the customer.
Tags : 
storage, systems, network, applications, data, automation, ca technologies
    
CA Technologies
Published By: TE Connectivity     Published Date: Feb 23, 2018
In our increasingly connected world, quality, reliability and consistency matter a great deal, particularly in the context of the smart home ecosystem. The antennas, connectors, relays, sensors, switches, terminals and tubing inside these devices play critical roles in the product’s ultimate functionality. If you don’t focus on the right components or choose the wrong or incompatible ones, then device reliability becomes an issue.
Tags : 
    
TE Connectivity
Published By: INT_AstuteIT_ABM_DoubleTouch_BENELUX     Published Date: Feb 23, 2018
Traditional organizations across the globe are transforming to compete against digital-only players, in restructuring to put the customer first. The world’s buying behavior - and people’s behavior in relation to technology - is quickly changing in connection with online distribution channels, smart devices, and their interplay with offline touchpoints. Siloed business systems and their old reporting lines need to shift, and synchronize - fast.
Tags : 
programme, manager, data, analyst, technical
    
INT_AstuteIT_ABM_DoubleTouch_BENELUX
Published By: TIBCO Software APAC     Published Date: Aug 13, 2018
Maintaining a competitive edge today means building a Digital Enterprise capable of taking full advantage of social, mobile, web, cloud, “things,” (sensors and devices), and analytics technologies. Among the terms used to describe this business transition is “the API Economy,” an economy in which APIs are no longer just an IT concern, but the underpinnings of new revenue streams and new business models that are disrupting entire industries. Read this paper to learn about: New, modern applications being built for the enterprise Application ecosystems and extending the value of your company in the API Economy Two ways to integrate devices in the Internet of Things The microservices approach to application development The role of API management in the digital enterprise
Tags : 
    
TIBCO Software APAC
Published By: CyberSource EMEA     Published Date: May 04, 2018
The digital economy is dramatically changing how your customers buy products and services, and how they interact with your business. As customers increasingly use multiple devices (including Smartphones) to make their purchases, they expect fast, consistent and highly secure experiences – and you need to deliver. At the same time, you should remain vigilant about fraud. Effective fraud management is critical, not only for reducing risk, but also for accepting more good customer orders, improving customer engagement, controlling costs and achieving competitive advantage.
Tags : 
    
CyberSource EMEA
Published By: CyberSource EMEA     Published Date: Jun 28, 2018
Mobile devices are everywhere. 95% of UK millennials now use smartphones1; and it’s estimated that across the globe, nearly a billion more people now use mobile phones today than did five years ago.2 Mobile commerce will continue to grow as smartphones continue to be adopted. For example, forecasts for Europe’s EU 5 (France, Germany, Italy, Spain and the United Kingdom) show mCommerce will account for 43.8% of eCommerce sales by 2020, compared to 32.9% in 2016.3 As fraud teams determine which orders to accept or reject, fraud managers are key to providing a seamless mobile checkout experience. But they also need to protect their business from fraud – and from the damage it can cause to bottom line, customer experience and brand.
Tags : 
    
CyberSource EMEA
Start   Previous    6 7 8 9 10 11 12 13 14 15 16 17 18 19 20    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.

We use technologies such as cookies to understand how you use our site and to provide a better user experience. This includes personalizing content, using analytics and improving site operations. We may share your information about your use of our site with third parties in accordance with our Privacy Policy. You can change your cookie settings as described here at any time, but parts of our site may not function correctly without them. By continuing to use our site, you agree that we can save cookies on your device, unless you have disabled cookies.
I Accept