mobile application

Results 76 - 100 of 771Sort Results By: Published Date | Title | Company Name
Published By: LogMeIn     Published Date: Feb 27, 2018
The rise of mobile devices have changed the way we communicate, the way we work, and the way we shop. Mobile devices give power to the consumers. Constant connectivity allows for easy access to endless information providing customers with multiple purchase options. In eCommerce, mobile shopping is sharply rising. According to Forrester, 29% of all U.S. eCommerce transactions will occur on a tablet or mobile phone this year, totaling $114 billion. By 2018, that percentage will rise to 54% of the total $414 billion in eCommerce sales.i All of this information points to the fact that mobile is not just a trend, it's a reality. A reality that forces businesses to change the way they engage with their customers.
Tags : 
mobile, applications, reporting, deployment, chat, device
    
LogMeIn
Published By: Schneider Electric     Published Date: Feb 12, 2018
Internet use is trending towards bandwidth-intensive content and an increasing number of attached “things”. At the same time, mobile telecom networks and data networks are converging into a cloud computing architecture. To support needs today and tomorrow, computing power and storage is being inserted out on the network edge in order to lower data transport time and increase availability. Edge computing brings bandwidth-intensive content and latency-sensitive applications closer to the user or data source. This white paper explains the drivers of edge computing and explores the various types of edge computing available.
Tags : 
    
Schneider Electric
Published By: Schneider Electric     Published Date: Feb 12, 2018
Internet use is trending towards bandwidth-intensive content and an increasing number of attached “things”. At the same time, mobile telecom networks and data networks are converging into a cloud computing architecture. To support needs today and tomorrow, computing power and storage is being inserted out on the network edge in order to lower data transport time and increase availability. Edge computing brings bandwidth-intensive content and latency-sensitive applications closer to the user or data source. This white paper explains the drivers of edge computing and explores the various types of edge computing available.
Tags : 
    
Schneider Electric
Published By: Group M_IBM Q1'18     Published Date: Feb 09, 2018
Thrill customers and empower employees with omni-channel, socially-infused digital experiences to drive better business outcomes IBM Customer Experience Suite features rich, integrated capabilities for managing web content, rich-media assets, real-time social communications, robust customer self-service capabilities, business analytics and mobile device delivery IBM Employee Experience Suite enables employees to easily find and share relevant information across multiple platforms, diverse geographies with multiple languages, and within the context of business applications
Tags : 
digital experience, ibm, software
    
Group M_IBM Q1'18
Published By: Group M_IBM Q1'18     Published Date: Jan 16, 2018
Are you up-to-speed with the latest trends in mobile and Internet of Things (IoT) application security testing? Our recent Ponemon Institute study reveals key findings about organizations' ability to protect their mobile and IoT apps. Read our report to learn how well you stack up against your peers in securing your most critical mobile and IoT applications.
Tags : 
iot, ponemon institute, mobile application security, application security
    
Group M_IBM Q1'18
Published By: Group M_IBM Q1'18     Published Date: Jan 16, 2018
Manage identity and access across the full range of on-premises, cloud and mobile applications with IBM Cloud Identity.
Tags : 
identiry and access, ibm cloud identity, cloud and mobile applications
    
Group M_IBM Q1'18
Published By: Cisco EMEA     Published Date: Nov 13, 2017
Encryption technology has enabled much greater privacy and security for enterprises that use the Internet to communicate and transact business online. Mobile, cloud and web applications rely on well-implemented encryption mechanisms, using keys and certificates to ensure security and trust. However, businesses are not the only ones to benefit from encryption.
Tags : 
anomaly detection, trust modeling, event classification, entity modeling, relationship building, internet scrapers
    
Cisco EMEA
Published By: Red Hat     Published Date: Nov 08, 2017
Accelerated digital transformation places new demands on business. To stay competitive, organizations must quickly adapt their business models and processes. Business process management (BPM), business rules management (BRM), and mobile applications are increasingly important to many business transactions—from customer-facing to business-to-employee (B2E) and business-to-business (B2B) interactions.
Tags : 
digital transformation, business process management, business rules management, mobile applications, application programming interfaces
    
Red Hat
Published By: Red Hat     Published Date: Nov 08, 2017
Industry-leading organizations are now exploiting interoperable business process management (BPM) and mobile application platforms (MAPs) so that process-oriented mobile applications can help transform the way they do business. This paper examines the phenomena driving this trend, and the common approaches to digital transformation that contribute to the enterprise in motion. Read this analyst paper from 451 Research to learn more.
Tags : 
business process management, mobile application platforms, digital transformation, customer experience, adaptive business operations
    
Red Hat
Published By: AppDynamics     Published Date: Nov 02, 2017
With an estimated 9 million developers worldwide, the Java community is a very robust one. One of the most important uses of Java today is building applications for mobile devices using the Android operating system. In addition, Java remains incredibly popular for enterprise applications and client-server web applications, and is also a very common language of instruction in software development courses.
Tags : 
    
AppDynamics
Published By: IBM     Published Date: Oct 26, 2017
As security threats increase and government regulations require more control over users and data, it is important for organizations to evolve their security measures. As enterprises rapidly expand their footprints into cloud, mobile and social, they must ensure that the right users have the right access to sensitive data and applications. Strong as well as optimized identities are becoming increasingly important as insider threat and tightened regulations become more prevalent.
Tags : 
identity governance, security threats, user access, cloud security, identity management
    
IBM
Published By: Juniper Networks     Published Date: Oct 25, 2017
The broad adoption of the next generation of cloud, mobile, M2M, and big data applications is having profound impacts on IT and network infrastructures. Compared to traditional applications, these applications have much shorter life cycles. You must be able to spin them up, spin them down, and grow and shrink them on demand. Furthermore, you must be able to move these application workloads within a data center or across geographically distributed data centers, resulting in increased management complexities.
Tags : 
data management, data system, business development, software integration, resource planning, enterprise management, data collection
    
Juniper Networks
Published By: OneLogin     Published Date: Oct 24, 2017
Enterprises of all sizes are challenged to effectively provide secure access to a rapidly growing mosaic of cloud, on-premise and mobile applications. Whether sanctioned by the enterprise IT group of purchased by departmental shadow IT organizations, individually provisioned applications present a great management burden with multiple negative operational effects: • Time and money wasted by manual on-and off-boarding, and lost passwords. • Security risk from weak, easy-to-remember passwords, as well as from system access by former employees whose credentials are not promptly revoked. • Lack of visibility into who accesses which application, and from where. As a result, enterprises and users encounter a range of obstacles that prevent them from securely operating at speed. At best, users who clamor for access to applications are inconvenienced when they don’t get access quickly enough, or not at all. Worst case, because today’s IT footprint is large and porous, companies face headline-m
Tags : 
    
OneLogin
Published By: Oracle     Published Date: Oct 20, 2017
Modern technology initiatives are driving IT infrastructure in a new direction. Big data, social business, mobile applications, the cloud, and real-time analytics all require forward-thinking solutions and enough compute power to deliver the performance required in a rapidly evolving digital marketplace. Customers increasingly drive the speed of business, and organizations need to engage with customers on their terms. The need to manage sensitive information with high levels of security as well as capture, analyze, and act upon massive volumes of data every hour of every day has become critical. These challenges will dramatically change the way that IT systems are designed, funded, and run compared to the past few decades. Databases and Java have become the de facto language in which modern, cloud-ready applications are written. The massive explosion in the volume, variety, and velocity of data increases the need for secure and effective analytics so that organizations can make bette
Tags : 
    
Oracle
Published By: Oracle     Published Date: Oct 20, 2017
Modern technology initiatives are driving IT infrastructure in a new direction. Big data, social business, mobile applications, the cloud, and real-time analytics all require forward-thinking solutions and enough compute power to deliver the performance required in a rapidly evolving digital marketplace. Customers increasingly drive the speed of business, and organizations need to engage with customers on their terms. The need to manage sensitive information with high levels of security as well as capture, analyze, and act upon massive volumes of data every hour of every day has become critical. These challenges will dramatically change the way that IT systems are designed, funded, and run compared to the past few decades. Databases and Java have become the de facto language in which modern, cloud-ready applications are written. The massive explosion in the volume, variety, and velocity of data increases the need for secure and effective analytics so that organizations can make bette
Tags : 
    
Oracle
Published By: Oracle     Published Date: Oct 20, 2017
With cloud, mobile and all the new tools & frameworks that come with them, application development has never been so easy – or so hard. Join leading application development expert Mark Driver of Gartner as he answers your most pressing questions, including: What is the impact of lightweight and scripting applications traditional IT process? How has app development changed with the rise of cloud computing? How has mobile development changed expectations of developers and the apps they build?
Tags : 
    
Oracle
Published By: Oracle     Published Date: Oct 20, 2017
With cloud, mobile and all the new tools & frameworks that come with them, application development has never been so easy – or so hard. Join leading application development expert Mark Driver of Gartner as he answers your most pressing questions, including: What is the impact of lightweight and scripting applications traditional IT process? How has app development changed with the rise of cloud computing? How has mobile development changed expectations of developers and the apps they build
Tags : 
    
Oracle
Published By: CA Technologies EMEA     Published Date: Oct 20, 2017
Die Application Economy hat Unternehmen zu Umstellungen gezwungen. Unternehmen machen ausgewählte Daten und Anwendungen für Entwickler, Partner, Mobile Devices, die Cloud und das Internet of Things (IoT) zugänglich, um neue Wachstumschancen wahrzunehmen. Im Zuge dieser Umstellungen zeigte sich, dass Legacy-Daten in der Application Economy von Nutzen sein können, und zwar in einem solchen Ausmaß, dass sich durch die neue Art der Verwendung dieser Daten neue Umsatzchancen ergeben.
Tags : 
api, application programming interface, psd2, open banking, json, github, secure gateway, microservices, api gateway, apim, api management, full api lifecycle, restful web services, rest, integration, api portal
    
CA Technologies EMEA
Published By: CA Technologies EMEA     Published Date: Oct 19, 2017
Dans un contexte où les entreprises se tournent de plus en plus vers les équipements mobiles, les services Cloud, leurs partenaires et les développeurs tiers, les API sont devenues incontournables. La passerelle d’API de CA Technologies, CA API Gateway, offre une solution unique, capable de prendre en charge les initiatives API internes. Elle offre ainsi aux entreprises la possibilité d’explorer de nouvelles voies novatrices d’exploitation des données tout en répondant aux attentes de leurs clients et en augmentant leur efficacité. CA API Gateway allie la gestion des règles à la mise en œuvre de règles d’exécution pour garantir la centralisation de l’application des règles entre l’entreprise et l’utilisateur final, indépendamment de leur localisation.
Tags : 
    
CA Technologies EMEA
Published By: CA Technologies EMEA     Published Date: Oct 19, 2017
L’économie des applications oblige les entreprises à se transformer. Pour saisir de nouvelles opportunités de croissance, elles s’ouvrent sur l’extérieur et partagent des données et applications sélectionnées avec des développeurs, des partenaires, des appareils mobiles, le Cloud et l’Internet des objets. Cette transformation contribue à redonner de la valeur aux données héritées : dans l’économie des applications, une organisation qui parvient à exploiter ces données d’une nouvelle manière pourra faire émerger de nouvelles opportunités de revenus.
Tags : 
api, application programming interface, psd2, open banking, json, github, api gateway, apim, api management, full api lifecycle, restful web services, api portal, gestion des api, portail api, oauth, openid connect, rest json, soap xml, api analytics, orchestration transformation
    
CA Technologies EMEA
Published By: Oracle CX     Published Date: Oct 19, 2017
Modern technology initiatives are driving IT infrastructure in a new direction. Big data, social business, mobile applications, the cloud, and real-time analytics all require forward-thinking solutions and enough compute power to deliver the performance required in a rapidly evolving digital marketplace. Customers increasingly drive the speed of business, and organizations need to engage with customers on their terms. The need to manage sensitive information with high levels of security as well as capture, analyze, and act upon massive volumes of data every hour of every day has become critical. These challenges will dramatically change the way that IT systems are designed, funded, and run compared to the past few decades. Databases and Java have become the de facto language in which modern, cloud-ready applications are written. The massive explosion in the volume, variety, and velocity of data increases the need for secure and effective analytics so that organizations can make better
Tags : 
    
Oracle CX
Published By: Oracle CX     Published Date: Oct 19, 2017
Modern technology initiatives are driving IT infrastructure in a new direction. Big data, social business, mobile applications, the cloud, and real-time analytics all require forward-thinking solutions and enough compute power to deliver the performance required in a rapidly evolving digital marketplace. Customers increasingly drive the speed of business, and organizations need to engage with customers on their terms. The need to manage sensitive information with high levels of security as well as capture, analyze, and act upon massive volumes of data every hour of every day has become critical. These challenges will dramatically change the way that IT systems are designed, funded, and run compared to the past few decades. Databases and Java have become the de facto language in which modern, cloud-ready applications are written. The massive explosion in the volume, variety, and velocity of data increases the need for secure and effective analytics so that organizations can make better
Tags : 
    
Oracle CX
Published By: Zebra Technologies     Published Date: Oct 04, 2017
Como evitar a escolha do dispositivo errado para sua aplicação. Para uma visão mais completa de cada consideração, faça download do nosso documento técnico. Ele destaca razões para escolher os dispositivos de nível empresarial em vez de dispositivos de consumo, incluindo: • As principais considerações sobre desempenho de digitalização • A importância do gerenciamento de energia e dos acessórios certos • A importância da conectividade e porque nem todos os dispositivos são feitos da mesma maneira
Tags : 
mobile technologies, machine to machine communication, automation increase, accurate data capture, team collaboration, tc56, mc67, tc55, tc75, mobility dna software, traceability, field operations, industrial facilities, mobile solutions, enterprise productivity, choosing the right technology, enterprise grade technology, field applications, high battery capacity, rugged handheld computers
    
Zebra Technologies
Published By: Zebra Technologies     Published Date: Oct 04, 2017
Como evitar elegir el dispositivo incorrecto para su aplicación. Para saber más sobre cada consideración, descargue nuestro documento técnico. El documente provee razones convincentes para elegir los dispositivos de nivel empresarial en lugar de dispositivos de nivel de consumidor, incluyendo: • Las principales comparaciones de rendimiento de escaneo • La importancia de la gestión de energía y los accesorios correctos • La importancia de la conectividad y por qué no todos los dispositivos son iguales
Tags : 
mobile technologies, machine to machine communication, automation increase, accurate data capture, team collaboration, tc56, mc67, tc55, tc75, mobility dna software, traceability, field operations, industrial facilities, mobile solutions, enterprise productivity, choosing the right technology, enterprise grade technology, field applications, high battery capacity, rugged handheld computers
    
Zebra Technologies
Published By: Zebra Technologies     Published Date: Oct 04, 2017
Como evitar a escolha do dispositivo errado para sua aplicação. Para uma visão mais completa de cada consideração, faça download do nosso documento técnico. Ele destaca razões para escolher os dispositivos de nível empresarial em vez de dispositivos de consumo, incluindo: • As principais considerações sobre desempenho de digitalização • A importância do gerenciamento de energia e dos acessórios certos • A importância da conectividade e porque nem todos os dispositivos são feitos da mesma maneira
Tags : 
mobile technologies, machine to machine communication, automation increase, accurate data capture, team collaboration, tc56, mc67, tc55, tc75, mobility dna software, traceability, field operations, industrial facilities, mobile solutions, enterprise productivity, choosing the right technology, enterprise grade technology, field applications, high battery capacity, rugged handheld computers
    
Zebra Technologies
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search Resource Library      

Add Resources

Get your company's resources in the hands of targeted business professionals.