smart phones

Results 101 - 125 of 311Sort Results By: Published Date | Title | Company Name
Published By: Comcast Business     Published Date: Nov 28, 2016
Technology has had a profound impact on society, influencing everything from the way we communicate with each other to how we conduct business transactions. In the financial services space, technology has brought banks closer to their customers, offering a wide range of online services to appeal to a population of consumers who now view their smartphones as something they can’t live without. In the process of shifting their practices to accommodate this new generation of customers, banks are transforming and reinventing themselves from the corporate office to the branch office through innovative services and technologies that take banking beyond the traditional experience. Networks are playing a central role in this transformation.
Tags : 
    
Comcast Business
Published By: Monotype     Published Date: Jun 29, 2017
After years spent hidden in the shadows of Millennials, Generation Z is taking over the spotlight and making some serious waves in the process. Gen Zs are the first true digital natives, born between the late 1990’s to the mid 2000’s, and only know a world with Internet access, social media and smartphones. This “YouTube generation” is tech-savvy and pragmatic, drives innovation and the way we consume media, and they’re pushing brands and marketers to catch up in the process. Like, follow, read, repeat In an era of massive information (and advertising) overload, the brand-consumer relationship is a delicate dance. One misstep and a disgruntled customer will gladly find a new partner. Thanks to a mobile-first, visually rich, social and digital world, people expect flexibility, authenticity and consistency in every single interaction with a brand. In order to keep your customers engaged and happy, look to the emerging behaviours and preferences of Generation Z as a beacon for what’s to c
Tags : 
generation z, communication, media, marketing, branding, customer engagement, digital engagement
    
Monotype
Published By: Tact     Published Date: Sep 06, 2016
Did you know that sales reps typically waste up to 16 hours per week on non-selling tasks? If your sales team is spending too much time on non-selling tasks, logging sales activities to Salesforce, hunting for customer information and documents, or copy-pasting data between separate systems, they might resist the rise of mobile CRM solutions like Salesforce1. However, it’s important to figure out how to enable these teams in the field, as 55% of salespeople will access sales applications exclusively through smartphones or tablets by the end of 2016. It’s not surprising that salespeople will increase their use of mobile apps 125% from 2015-2017. In this whitepaper from Tact, you’ll learn 1) common challenges facing field sales teams, 2) a framework for thinking about mobile sales productivity, 3) essential characteristics for evaluating mobile sales solutions, and 4) key trends in mobile sales.
Tags : 
salesforce, salesforce.com, crm, sales productivity, sales enablement, salesforce adoption, crm adoption, sales management, crm best practices, salesforce best practices, mobile applications, field sales, mobile field sales, tactile, tact, chuck ganapathi
    
Tact
Published By: Silverpop     Published Date: Jun 15, 2012
The way we communicate is moving-literally. Smart phones are outselling PCs, and tablet sales are expected to outpace desktop sales by 2013. But although the screens may be smaller, the possibilities for engagement are larger than ever.
Tags : 
marketing, silverpop, email, mobile marketing, social media, emerging marketing, social media platforms
    
Silverpop
Published By: Silverpop     Published Date: Jun 15, 2012
People are increasingly using smartphones for researching, social networking and "checking in" on Foursquare. Learn how you can tap the power of location-based marketing, using customers' real-world behaviors and location to reach them when it's most relevant.
Tags : 
marketing, silverpop, social media, social marketing, mobile marketing, social media campaigns
    
Silverpop
Published By: Microsoft Windows Phone     Published Date: Feb 05, 2010
Part 3 - Free security testing tools for Windows handheld devices. With these no-cost security testing tools, you can check network security from Windows handheld devices.
Tags : 
microsoft, windows phone, mobile security, free security testing tool, networking, wireless network connection, smart phones, pdas, network security, pda, wifi, wireless messaging, wireless phones, wireless security, windows
    
Microsoft Windows Phone
Published By: Aternity     Published Date: Jul 20, 2012
Forrester Research projects that by 2016, 350 million employees will have smartphones, prompting businesses to drastically increase spending on mobile projects to meet the flexibility demands of increasingly tech-savvy employees. This exclusive resource describes how businesses can support mobile technologies from virtual desktops to application development with comprehensive end-user experience (EUE) management tools. Find out how this platform proactively detects performance and availability issues to help IT professionals troubleshoot and improve application performance for end-users.
Tags : 
technology, mobile, management tools, end-user experience, eue, application performance, smartphones, mobile workers
    
Aternity
Published By: Citrix Systems     Published Date: Sep 06, 2013
A technical how-to guide— updated for Android 4.2, iOS 6.1, and Windows Phone and Surface 8.
Tags : 
citrix, apple ios, enterprise information, smartphones, enterprise computing, security, it management
    
Citrix Systems
Published By: Citrix Systems     Published Date: Feb 27, 2014
Android, iOS and Windows tablets and smartphones play an increasing role in enterprise computing, providing new flexibility and mobility for workers and IT—but creating new challenges around security. This paper describes these issues and explains how they can be addressed effectively with Citrix BYOD solutions.
Tags : 
citrix, apple, android, byod, tablet, mobile, citrix byod, microsoft windows tablets, it management
    
Citrix Systems
Published By: Citrix Systems     Published Date: Oct 07, 2014
Bring-your-own-device (BYOD) programs and policies empower people to choose the best device to get their work done, including personally-owned consumer smartphones, tablets and laptops. This white paper provides guidance for introducing BYOD to help people become more mobile and productive while IT adapts to consumerization in a simple, secure and controlled manner.
Tags : 
best practices, secure, simple, consumerization, byod, program, device, smartphones, tablets, laptops, mobile, productive, it management, wireless
    
Citrix Systems
Published By: LogMeIn     Published Date: Jan 15, 2014
The following industry forecasts and findings highlight mobile’s growth potential and each on their own should merit merchants’ attention. Learn more about the potential of mobile growth through this whitepaper.
Tags : 
logmein, merchants and consumer, mobility, mobile mastery, industry insights, smartphones, research findings, e-tailing groups, mcommerce checklist, customer service, top merchants, cross-channel efficiency, inventory access, best practice, mobile computing, mobile data systems, wireless infrastructure, business intelligence, service management
    
LogMeIn
Published By: ForeScout     Published Date: Aug 14, 2012
The What, Why and How to Employ NAC to Apply Guest Networking, BYOD (Bring Your Own Device) and Endpoint Security Policies. Many of today's endpoints are neither known nor protected. According to Gartner, enterprises are only aware of 80 percent of the devices on their network. Those 20 percent of unknown devices are inside the perimeter of the network, are unmanaged and provide users with access. They are small, varied and highly mobile, and they are loaded with their own applications, can act as WAPs, and often contain outdated firmware or are jailbroken. Even as the devices are accessing personal applications on the web, they are also accessing corporate resources such as e-mail-all from the very same unmanaged devices, which have not been vetted by the security organization. Smartphones, notebooks, netbooks, iPads, e-readers, gaming consoles and more-the list of personal devices attempting access to employer networks seems to grow every day in what's come to be known as the BYOD (Bring Your Own Device) era in networking.
Tags : 
pad, mine, enabling, secure, personal, mobile, device, use, your, network, nac, guest, networking, byod, bring, your, own, device, endpoint, security
    
ForeScout
Published By: CDW     Published Date: Jun 18, 2013
Guidance on the strategies and tools needed for a secure and productive bring-your-own-device program.
Tags : 
cdw, byod, bring your own device, mobile computing, smartphones, tablets, wireless, security
    
CDW
Published By: CDW     Published Date: Jun 18, 2013
A mix of well-thought-out policies and up-to-date technologies are needed to protect critical data.
Tags : 
cdw, mobile security, protecting data, critical data. notebooks, smartphones, tablets, security, telecom
    
CDW
Published By: CDW     Published Date: Jul 30, 2013
As video technology becomes more accessible, more people will use it to make video calls. A confluence of camera-enabled notebooks, smartphones and tablets combined with better wireless network capabilities has created a base of users that are willing to fire up the camera when they want to talk.
Tags : 
cdw, unified communications, camera-enabled notebooks, smartphones, tablets, wireless network capabilities, software development, it management
    
CDW
Published By: CDW     Published Date: Oct 10, 2013
Let CDW’s Total Mobility Management experts help address your mobility needs with the right mix of solutions, services and support.
Tags : 
managed mobility, mobility management, support services, cdw, solution architects, managed mdm services, mdm administration, help desk, mobile solutions, airwatch, mobileiron, mobile workers, smart phones, mobile computing, mobile data systems, wireless phones
    
CDW
Published By: Advizex     Published Date: Sep 25, 2013
The challenge of Big Data is more than a question of size; it’s about time to insight and action. With the exponential growth of unstructured data such as social media, video and the raw data generated by smartphones and other “intelligent” machines, businesses are buried under an avalanche of data that renders even best-effort analytics slow and sometimes unreliable. As many businesses are learning in this age of Big Data, it’s not just what you know, but when you know it and how much you trust it. Download this white paper and learn that with SAP HANA, companies can react intelligently at the speed of thought to capture new opportunities.
Tags : 
sap hana, sap, real time analytics, raw data, generation, analytics, big data, business intelligence, trusting big data, insight, action, knowledge management, enterprise applications, data management
    
Advizex
Published By: Aruba Networks     Published Date: Sep 18, 2013
In this whitepaper Gartner explores smartphones and tablet devices, and their applications, which are increasingly at risk of malware. IT security planners and operations managers can thwart serious malware threats for the time being with these best practices. Read this whitepaper for more information.
Tags : 
smartphones, tablet devices, malware, best practices, security planners, risk, applications, technology, access control, networking, security, wireless
    
Aruba Networks
Published By: Aruba Networks     Published Date: Jul 03, 2013
Microsoft Lync is not only changing the cost structure of enterprise telephony, but is also ushering in a new user experience in which every communication is transformed into a more collaborative, engaging interaction. But it’s impossible to achieve the promises of Lync if you haven’t fully considered the underlying infrastructure. And with laptops, smartphones and tablets on track to outnumber desktops, that means wireless infrastructure. Fortunately, with a little upfront planning, you can dramatically increase the quality and reliability of multimedia over enterprise Wi-Fi. Here are 10 tips for ensuring that Lync runs well on mobile devices in your network…
Tags : 
lync, smartphone, tablet, wireless infrastructure, deploy
    
Aruba Networks
Published By: VMware, Inc     Published Date: Dec 05, 2013
The workforce is going mobile. According to Forrester, more than half of employees carry at least three devices for work. And many are bringing their own smartphones, tablets, and other devices to work, a phenomenon that’s grown so popular it now has its own acronym—Bring Your Own Device (BYOD). So it comes as no surprise that, according a survey by SpiceWorks, 60% of small and medium businesses are considering using a virtual desktop infrastructure (VDI) as part of their BYOD strategy. Many of these organizations are relying on VMware® Horizon View™ (formerly VMware View), because it enables organizations to implement a VDI infrastructure that reduces operational costs, enhances security and supports a mobile workforce.
Tags : 
vmware, vmware horizon view, virtual desktop infrastructure, mobile, byod, spiceworks, virtual desktop infrastructure, bring your own device, vdi, networking, security, it management, knowledge management, enterprise applications, storage, data management, mobile computing, mobile data systems, mobile workers, smart phones
    
VMware, Inc
Published By: Adobe     Published Date: Jul 28, 2015
Download the Adobe Mobile Marketing Survey to discover the big-picture view of investments in mobile by leading marketers—and what it will take to stay on top.
Tags : 
adobe creative cloud, mobile marketing, mobile devices, smartphones, tablets, mobile strategy, mobile app innovation
    
Adobe
Published By: Movable Ink     Published Date: Apr 01, 2016
Do your emails look great on mobile devices? In the UK, 70% of email opens occur on smartphones and tablets. You know you should be building responsive emails, but where do you start? Download ‘10 Quick Design Hacks for Responsive Emails’ to discover simple ways to create great-looking emails for mobile devices and see real life examples of how brands are making a big impact on a small screen.
Tags : 
email marketing, contextual marketing, mobile marketing, responsive email marketing, email design
    
Movable Ink
Published By: Fujitsu     Published Date: Sep 02, 2016
Download this white paper today to better understand how devices are going to be used in the health care environments and how you can adjust your product plans accordingly.
Tags : 
fujitsu, mobile device, healthcare device, mobile computing, tablets, smartphones, mobile workers, remote access, application integration, data protection, collaboration
    
Fujitsu
Published By: VMware     Published Date: Feb 24, 2017
Mobile device management (MDM) tools allow companies to connect their employees securely to basic corporate network resources. Enterprise mobility management (EMM) goes a step further by enabling secure mobile versions of business-critical applications and data loss prevention to protect corporate information. But in today's workplace, employees and businesses deal with a vast variety of devices with different operating systems and form factors, from PCs and laptops, to tablets and smartphones, and now, increasingly wearables and Internet of Things (IoT) endpoints. The solution is unified endpoint management (UEM), which enables organizations to take a consistent approach to manage and secure every endpoint, any app and content, and across deployment use cases from a single holistic platform. Read this whitepaper to uncover VMware AirWatch®'s leading UEM approach that is benefiting organizations tremendously.
Tags : 
    
VMware
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13    Next    End
Search Resource Library      

Add Resources

Get your company's resources in the hands of targeted business professionals.