smartphones tablets

Results 1 - 25 of 90Sort Results By: Published Date | Title | Company Name
Published By: Movable Ink     Published Date: Apr 01, 2016
Do your emails look great on mobile devices? In the UK, 70% of email opens occur on smartphones and tablets. You know you should be building responsive emails, but where do you start? Download ‘10 Quick Design Hacks for Responsive Emails’ to discover simple ways to create great-looking emails for mobile devices and see real life examples of how brands are making a big impact on a small screen.
Tags : 
email marketing, contextual marketing, mobile marketing, responsive email marketing, email design
    
Movable Ink
Published By: OutSystems     Published Date: Jul 15, 2014
Anyone with a mobile device these days knows all about the seemingly never-ending procession of new applications for smartphones, tablets and anything else people can carry in their pockets, purses or bags. And while apps are extremely popular, there’s also been failure with millions of attempts to build mobile applications for both business and consumer use. How can the mistakes be avoided? We asked several experts in the eld to outline some of the top pitfalls of mobile application development and how teams can avoid them to build a useful, innovative app that enables and empowers as many potential end-users as possible.
Tags : 
outsystems, applications, strategic business, innovation, app development, mobile, it management, data center
    
OutSystems
Published By: Zebra Technologies     Published Date: Sep 05, 2018
The retail shopper is changing rapidly. To keep up, so must the retail industry. The internet, online shopping, mobile communications, smartphones, tablets and more turning traditional shoppers into something else entirely: connected shoppers. Today’s shoppers can now shop online, on either a computer or mobile device, as well as in brick-and-mortar stores. For retailers, the implications are huge. In this complex new environment, there are two vital questions. First, as a retailer, how do you create differentiated value that will enable you to stand out from the crowd? Second, how can you strengthen customer relationships, build loyalty, increase sales and maximize profitability?
Tags : 
    
Zebra Technologies
Published By: Adobe     Published Date: Nov 25, 2013
For the past several years, the nature of enterprise productivity has been forever changed by the new breed of mobile devices. Personal smartphones and tablets are everywhere. Gone are the days when every enterprise gave its employees a security-focused BlackBerry. Cloud-based productivity apps can be downloaded in seconds. Compared to even a few years ago, enterprises are operating in a new world. Please download whitepaper to learn more.
Tags : 
mobile devices, compatibility, cloud-based, enterprise, enterprise productivity, productivity apps, security-focused, smartphones tablets, growing mobile workforce, document productivity, content management, hybrid model, networking, it management, wireless, enterprise applications, business intelligence, database development, data integration
    
Adobe
Published By: Adobe     Published Date: Jul 28, 2015
Download the Adobe Mobile Marketing Survey to discover the big-picture view of investments in mobile by leading marketers—and what it will take to stay on top.
Tags : 
adobe creative cloud, mobile marketing, mobile devices, smartphones, tablets, mobile strategy, mobile app innovation
    
Adobe
Published By: Voltage Security     Published Date: Sep 13, 2012
Sending and receiving encrypted email with sensitive data should be a lot easier to do. But it ends up being something painful, and as a result we tend to avoid this protection.
Tags : 
data security, voltage, smartphones, tablets, smart security, email security, mobile email security, encryption, email encryption, security, business technology
    
Voltage Security
Published By: LogMeIn     Published Date: Jun 23, 2015
This white paper reveals how to become mobile-minded enough to win with customers.
Tags : 
mobility, mobile-minded, mobile devices, go mobile, customer relationship, customer engagement, smartphones, tablets, mobile experiences, customer experiences, mobile engagement strategy
    
LogMeIn
Published By: Ayla Networks     Published Date: Aug 11, 2015
The step from unconnected to connected products is a daunting one. Unlike the computers and smartphones and tablets we use to connect to the Internet of Computers, the devices of the IoT were rarely designed with connectivity in mind.
Tags : 
    
Ayla Networks
Published By: Citrix Systems     Published Date: Oct 07, 2014
Bring-your-own-device (BYOD) programs and policies empower people to choose the best device to get their work done, including personally-owned consumer smartphones, tablets and laptops. This white paper provides guidance for introducing BYOD to help people become more mobile and productive while IT adapts to consumerization in a simple, secure and controlled manner.
Tags : 
best practices, secure, simple, consumerization, byod, program, device, smartphones, tablets, laptops, mobile, productive, it management, wireless
    
Citrix Systems
Published By: Citrix     Published Date: Jul 25, 2014
Smartphones, tablets and other mobile devices increase productivity by accelerating decision making and responsiveness. As a result, the number of business users relying on corporate and bring-your-own (BYO) mobile devices continues to grow rapidly—with email serving as the primary app to service customers and facilitate collaboration.
Tags : 
email, mobile, collaboration, smartphone, tablets, productivity
    
Citrix
Published By: Brother     Published Date: Mar 08, 2018
The last decade has seen many exciting advances in connectivity accelerated by the near universal availability of smartphones and tablets – leading to a highly interconnected world. The security of networks - and the businesses and individuals that rely on them - has become top of mind for the IT Security professionals who are responsible for ensuring the safety of the data and the networks where this information is utilized. As high-visibility security breaches occur - affecting ecommerce, banking, retail and other industries - the critical importance of the security of the infrastructure these businesses rely on continues to grow. Security in the workplace is a daily fact of life. From using ID cards to control physical access, to entering passwords to join the network, to using software to monitor and prevent unauthorized access, all are routinely used to protect critical assets and information. However, there is one key area where many organizations still have potential vulnerabili
Tags : 
network security, security breaches, pci, dss, hippa
    
Brother
Published By: IBM     Published Date: May 07, 2013
"Building game-changing mobile apps—from vision to execution The proliferation of mobile devices, from smartphones to tablets, is empowering customers all over the world. Now, they expect to engage with enterprises and brands on their terms. In order to get closer to customers and boost productivity, many companies are now investing in apps, with varying results. Read the paper to see why it pays to have an innovative, sound mobile app strategy in place—before looking to build compelling systems of engagement."
Tags : 
mobile, capitalizing, smarter commerce, customers, productivity, innovative
    
IBM
Published By: Adobe     Published Date: Jul 09, 2015
Com o crescimento explosivo no uso de smartphones e tablets nos últimos cinco anos, a maioria dos profissionais de marketing desenvolveu estratégias para atrair clientes através de canais mobile. Nessa pesquisa, descobrimos que esses profissionais aprenderam a atingir os clientes por meio de dispositivos e plataformas, além de adaptar seus investimentos mobile à medida que eles se desenvolvem. Também analisamos e avaliamos as melhores práticas desses profissionais, de setores como: mídia e entretenimento, varejo e comércio, serviços financeiros, B2B e alta tecnologia. A pesquisa oferece uma visão geral dos investimentos em mobilidade pelos principais pro ssionais de marketing e o que é preciso para manter a liderança.
Tags : 
adobe, líderes, mobilidade, estratégia, web, tecnologia
    
Adobe
Published By: Fujitsu America, Inc.     Published Date: Jan 22, 2019
Crime overall is decreasing, but chaotic events such as extreme weather, domestic terrorist attacks, gun violence, and opioid-related emergencies are increasing, requiring highly coordinated response protocols. From raucous inner cities to sleepy suburbs, the scope and nature of these threats demand a new way of thinking and acting — a new, frictionless collaboration among agencies, departments, and vendor partners.1 Ideally, public safety professionals are already fitted with the latest smartphones, laptops, and tablets to receive targeted information about situations, individuals, and locations before they respond. However, when police, fire, EMT, first responders, and even utility companies can communicate and share data via secure channels, the severity and length of incidents may be lessened, and lives can be saved. This is the next phase of digital age public safety. As more public safety leaders get introduced to sophisticated surveillance and big data technologies, they realize
Tags : 
    
Fujitsu America, Inc.
Published By: CA Technologies     Published Date: Aug 24, 2017
We can quote innumerable stats to impress, but there is no need—it is apparent that the world is getting more connected. Today’s connectivity will seem primitive in a few years as the connectivity extends beyond smartphones, tablets and computers to concepts such as devices implanted in the human body.
Tags : 
    
CA Technologies
Published By: CA Technologies     Published Date: Aug 24, 2017
Die Möglichkeit, auf Smartphones und Tablets schlanke Apps auszuführen, hat zu einem Quantensprung des Potenzials von Mobile Devices am Arbeitsplatz geführt. Apps bieten Unternehmen deutliche Vorteile hinsichtlich der Maximierung der Konnektivität, Verfügbarkeit, Flexibilität und Produktivität von Mitarbeitern.
Tags : 
    
CA Technologies
Published By: Citrix     Published Date: Jul 25, 2014
Android, iOS and Windows-based mobile devices—including smartphones, tablets and everything in between—have transformed enterprise computing, providing new mobility and flexibility for people and IT. At the same time, they compound the challenge of maintaining effective security and privacy of business information. Read this Citrix technical how-to guide—updated for Android 4.4, iOS 7.1, and Windows Phone.
Tags : 
enterprise information, secure, android, apple ios, microsoft window tablets, flexibility
    
Citrix
Published By: Citrix     Published Date: Jul 25, 2014
As organizations embrace smartphones, tablets and mobile applications, they are moving beyond simply providing mobile email and browser capability to offering mobile access to Windows-based and other corporate applications.
Tags : 
app, mobile, smartphones, tablets, mobile, email, windows-based, networking
    
Citrix
Published By: Citrix Systems, Inc.     Published Date: Jan 27, 2016
As organizations embrace smartphones, tablets and mobile applications, they are moving beyond simply providing mobile email and browser capability to offering mobile access to Windows-based and other corporate applications.
Tags : 
citrix, mobile, deployment, app
    
Citrix Systems, Inc.
Published By: Cisco     Published Date: Jan 12, 2016
The idea of bring your own device (BYOD) for connectivity has been well recognized in most networking environments. Yet some corporations are still struggling to understand its potential impacts. For them, the concept of users attaching privately owned and managed smartphones, tablets or laptops to their secure networks is a relatively new and worrisome concept. However, it is a challenge that customers in higher education have been dealing with for years as students have increasingly turned to easy-to-connect and affordable laptops as study aids.
Tags : 
cisco, byod, connectivity, education, networking environment, networking, it management, knowledge management, data management
    
Cisco
Published By: CDW-Trend Micro     Published Date: Mar 26, 2015
Endpoint security is at a critical juncture. Increasingly, employees at organizations of all sizes are using a wider variety than ever of desktop and mobile devices, including smartphones, tablets and laptops, as they work from broadly dispersed locations, including home offices. Often, organizations are permitting and even encouraging employees to use their own devices under BYOD (bring your own device) policies. With these devices, employees are accessing not only corporate data and applications, but also social media, banking and shopping sites. Download this white paper to learn more about endpoint security.
Tags : 
endpoint security, desktop devices, mobile devices, byod, corporate data, technology, networking, security, it management, wireless, knowledge management
    
CDW-Trend Micro
Published By: NEC     Published Date: Nov 20, 2013
Mobile usage isn't slowing down; take a look at how its impacting the work place.
Tags : 
nec, enterprise mobile device, mobile, smartphones, tablets, it management
    
NEC
Published By: CA Technologies     Published Date: Mar 10, 2015
Die Möglichkeit, auf Smartphones und Tablets schlanke Apps auszuführen, hat zu einem Quantensprung des Potenzials von Mobile Devices am Arbeitsplatz geführt.
Tags : 
    
CA Technologies
Published By: CA Technologies     Published Date: Aug 24, 2017
The existence of smartphones and tablets able to run lightweight apps has created a quantum leap in the potential of mobile devices in the workplace. Apps present enterprises with clear benefits in terms of maximizing employee connectivity, availability, flexibility and productivity.
Tags : 
    
CA Technologies
Published By: CA Technologies     Published Date: Jan 14, 2015
Whether you were at the forefront of the mobility era or are just now catching up—or, most likely, somewhere in between—you’ve already experienced first-hand the business impact of ubiquitous smartphones and tablets. From employees to customers, mobile devices spawned an explosion in new applications, data, support needs, security concerns, and other issues. They’ve reset expectations for organizational speed and flexibility. They’ve dramatically increased the surface area for potential security attacks. All this, and the mobile era is still just in its infancy.
Tags : 
mobile busienss, smartphones, tablets, applications, data, support needs, security attacks, organizational speed, wireless
    
CA Technologies
Start   Previous   1 2 3 4    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.

We use technologies such as cookies to understand how you use our site and to provide a better user experience. This includes personalizing content, using analytics and improving site operations. We may share your information about your use of our site with third parties in accordance with our Privacy Policy. You can change your cookie settings as described here at any time, but parts of our site may not function correctly without them. By continuing to use our site, you agree that we can save cookies on your device, unless you have disabled cookies.
I Accept