RecruitingBlogscom

Follow Us:

 

mobile organization

Results 276 - 300 of 409Sort Results By: Published Date | Title | Company Name
Published By: SAP     Published Date: Sep 10, 2010
The forces of consumerization are sweeping over the mobile world, with workers bringing their personal devices into the office and increasingly asking for IT support for those devices. How you respond to this challenge will say a lot about the mobile environment of your organization as a whole, and a lot as well about just how productive these mobile users can be. This strategic PlayBook and accompanying Webcast will offer you very practical ways to grab hold of this mobile trend of consumerization and help your mobile workers to be more effective and productive.
Tags : 
sap, consumer mobile devices, iphone, adoption, mobility, wireless, smartphones
    
SAP
Published By: SAP     Published Date: Feb 10, 2011
The recession notwithstanding, mobile devices continue to be purchased in record numbers, pouring into the organization. These devices are coming in a wide variety of hardware and operating system types, making their management and security a big IT challenge. This IDG Playbook is designed to help guide your strategy to manage and secure the booming mobile environment.
Tags : 
sap, mobility, competitive edge, mobile workers, enterprise mobility, mobile, applications, iphone, crm, erp, mobile landscape
    
SAP
Published By: SAP     Published Date: Apr 13, 2011
If you are a business running SAP Business Suite solutions, learn how you can use Sybase mobile solutions for SAP to dramatically increase sales productivity and bring the advantages of business mobility to your organization now.
Tags : 
sap business suite solutions, sybase mobile solutions, business mobility, sales productivity, mobile crm, sales management, forecasting, mobile business application
    
SAP
Published By: SAP     Published Date: Apr 14, 2011
As mobile technology becomes ubiquitous, IT organizations must have a thorough enterprisewide mobility deployment and infrastructure strategy in place.
Tags : 
mobility deployment, mobilization, engagement, consumerization, sybase, sap, infrastructure strategy
    
SAP
Published By: Blackberry     Published Date: Jul 03, 2012
For virtually every enterprise today, mobile device management (MDM) is top of mind. And while security is a chief concern, smart organizations are also discovering new opportunities for productivity. Getting the most from the BYOD phenomenon requires strategic thinking. Find out what key elements to consider in your Enterprise Mobility Strategy. And learn how BlackBerry Mobile Fusion can improve mobile security, reduce TCO and improve productivity.
Tags : 
blackberry, cio, mobile, mdm, smartphones, tablet, business technology
    
Blackberry
Published By: Oracle     Published Date: Apr 28, 2014
Perfect order fulfillment requires companies to have seamless integration of all supply chain execution (SCE) including, logistics processes from manufacturing, transportation, warehouse, global trade to mobile and RFID. Recent research from Gartner reveals that most supply chain organizations continue to operate as functional silos – warehousing, transportation and manufacturing – with minimal, if any, process integration and synchronization between execution silos. The Gartner Research report provides key insights into how supply chain and IT leaders can transform logistics by breaking down functional silos, and designing business processes that span, optimize and synchronize across traditional functional domains.
Tags : 
oracle, logistics, value chain execution, silos, manufacturing, product development and design
    
Oracle
Published By: OKTA     Published Date: Mar 30, 2018
"Today's workplace is flexible, collaborative, and dynamic-allowing people to work anywhere any time. A cloud-first strategy allows organizations to remain competitive and empowers greater productivity amongst their distributed workforce. But what does 100% cloud and mobile really mean? What does it really look like? Cloud-first is a philosophy of openness, security and user trust. It has specific components that embody a cloud- and mobile-first strategy. Read this whitepaper to learn the seven pillars of a 100% cloud and mobile organization. These core attributes serve as vital, interlinking nodes that alone promote efficiency and progress, and together drive cloud-first transformation."
Tags : 
    
OKTA
Published By: OKTA     Published Date: Mar 30, 2018
"Cloud-first, mobile-first organizations are seeing huge benefits from taking a more distributed approach to IT and user access management. Business units are given more freedom to evaluate and select SaaS applications that will enable efficiency and growth. Users are given more freedom to use the devices that make them the most productive. When this trend started, most IT organizations were able to implement some basic, manual processes to administer and govern IT in this best-of-breed distributed environment. However, as the number of touchpoints increases, IT needs to automate to keep pace and stay secure. This white paper goes into more detail on the top 5 reasons to automate identity lifecycle and identity administration with comprehensive user provisioning and build a solid foundation for future cloud-first, mobile-first IT."
Tags : 
    
OKTA
Published By: Qualys     Published Date: Jan 08, 2015
Health care organizations face a variety of security challenges—from the growing presence of online personal data to new methods of accessing and transferring medical information. Protecting sensitive data requires more vigilance than ever. Learn how your IT security peers are responding to threats from mobile and cloud technologies to address these open systems in this latest SANS survey:New Threats Drive Improved Practices: State of Cybersecurity in Health Care Organizations. Inside you’ll see all the results—revealing better awareness of risks with improved commitment of resources and support. Download now to learn more about how leading health care organizations: Assess information ecosystems — to understand gaps in infrastructure Establish data-centric security controls — focusing on information, not just infrastructure Manage identities — tying data controls closely with identity and access management Invest in incident response — documenting and maintaining a formal response p
Tags : 
it security, information ecosystems, data-centric security, identity management, security
    
Qualys
Published By: BlackBerry     Published Date: Jul 17, 2008
Mobile unified communications allows organizations to provide employees with the ability to collaborate and communicate efficiently, as well as access information on-demand. An exclusive Computerworld online survey offers insight into how companies can develop cost-effective strategies for implementing or improving mobile applications and foster an efficient workplace.
Tags : 
blackberry, unified communications, rim, mobile applications, cio, pim, voip, smartphones, it communication, microsoft exchange, mobile device management, mobile device management software, mobile workers, remote computing, wireless applications software, wireless computing
    
BlackBerry
Published By: BlackBerry     Published Date: Apr 13, 2010
The BlackBerry Enterprise Server Express is designed to be a secure, centralized link between an organization's wireless network, communications software, applications, and BlackBerry devices. The BlackBerry Enterprise Server Express integrates with your organization's existing infrastructure, which can include messaging software, calendar and contact information, wireless Internet and intranet access, and custom applications, to provide BlackBerry device users with mobile access to your organization's resources. You can install the BlackBerry Enterprise Server Express on the same server as Microsoft Exchange or Windows Small Business Server, or you can install the BlackBerry Enterprise Server Express on a separate server.
Tags : 
blackberry, server express, microsoft exchange, v5.0.1, administration guide, mobile applications, cio, pim, voip, smartphones, it communication, microsoft exchange, mobile device management, mobile device management software, mobile workers, remote computing, wireless applications software, wireless computing
    
BlackBerry
Published By: BlackBerry     Published Date: Apr 13, 2010
The BlackBerry Enterprise Server is designed to be a secure, centralized link between an organization's wireless network, communications software, applications, and BlackBerry devices. The BlackBerry Enterprise Server integrates with your organization's existing infrastructure, which can include messaging and collaboration software, calendar and contact information, wireless Internet and intranet access, and custom applications, to provide BlackBerry device users with mobile access to your organization's resources.
Tags : 
blackberry, mobile applications, enterprise server, planning guide, aes, des, cio, pim, voip, smartphones, it communication, microsoft exchange, mobile device management, mobile device management software, mobile workers, remote computing, wireless applications software, wireless computing
    
BlackBerry
Published By: BlackBerry     Published Date: Apr 13, 2010
The BlackBerry Enterprise Server is designed to be a secure, centralized link between an organization's wireless network, communications software, applications, and BlackBerry devices. The BlackBerry Enterprise Server integrates with your organization's existing infrastructure, which can include messaging and collaboration software, calendar and contact information, wireless Internet and intranet access, and custom applications, to provide BlackBerry device users with mobile access to your organization's resources.
Tags : 
blackberry, enterprise server, desktop manager, communications software, rim, microsoft exchange, mobile device management, mobile device management software, mobile workers, remote computing, wireless applications software, wireless computing
    
BlackBerry
Published By: BlackBerry     Published Date: May 20, 2009
Mobility is no longer considered a luxury within enterprise but a critical part of a networking strategy as firms look to increase productivity and remain competitive in a rapidly changing environment. As mobility becomes an integral part of the infrastructure, IT must deal with supporting numerous devices including laptops, smartphones and other mobile handhelds. The challenge for IT will be enabling productivity improvements while mitigating the risk of numerous types of devices. The devices and their memory cards may hold sensitive organizational and personal information, including information about product announcements, 9inancial statements, or customer records.
Tags : 
blackberry, mobile applications, cio, deployments, pim, voip, smartphones, it communication, microsoft exchange, mobile device management, mobile device management software, mobile workers, remote computing, wireless applications software, wireless computing
    
BlackBerry
Published By: McAfee Inc     Published Date: Aug 19, 2009
Data is a company's most precious asset-and maintaining secure access for a mobile workforce is vital for midsize organizations. This brief explains the key benefits of implementing a data security solution with McAfee. Read more.
Tags : 
mcafee, security, data protection, compliance, cyber criminals, midmarket, encryption, security tools, sans, data protection, dlp, midmarket, compliance, availability, email security
    
McAfee Inc
Published By: RingCentral     Published Date: Dec 05, 2013
Employees today want to be able to choose their own mobile devices based on their preferred design and functionality, a trend known as “bring your own device,” or BYOD. This can be a boon to the organization, but it is also a risk. This study explains why.
Tags : 
ringcentral, mobile devices, mobile workers, cellphone, bluetooth, wireless, cell phone, iphone, blackberry, communications
    
RingCentral
Published By: IBM     Published Date: Apr 04, 2014
Today, as customers increasingly turn to digital channels to research products, shop, and purchase — and as employees arrive in the workplace conditioned by engaging consumer Web, mobile, and social experiences — organizations can't afford to be left behind because of legacy investments. Customers and employees alike expect an exceptional digital experience. The good news, as our TCO study shows, is that most organizations can justify the cost of IBM's Exceptional Digital Experience solutions based on quantifiable hard dollar savings within a relatively short period of time. Read this IDC Report to learn more about IBM's Exceptional Digital Experience Solutions
Tags : 
ibm, idc, digital experience, digital marketing, customer engagement, web marketing, mobile marketing, social media, tco, customer engagement, emerging marketing
    
IBM
Published By: Webroot Inc     Published Date: Aug 27, 2015
In the past year, Webroot encountered tens of millions of instances of malware and potentially unwanted applications (PUAs), monitored billions of IP addresses and URLs, analyzed millions of new and updated mobile apps for malicious behavior, and studied major malware trends based on data from millions of endpoints. This report contains insights, analysis, and information on how collective threat intelligence can protect organizations from sophisticated attacks.
Tags : 
malware, unwanted applications, malicious behavior, threat intelligence, security
    
Webroot Inc
Published By: Oracle Social Cloud     Published Date: Jan 14, 2015
Did you know that 97% of business executives want social integrated across their enterprise? According to a recent Oracle global study, respondents nearly unanimously sang the praises of becoming a social business. Social gives you a window into the consumer like never before, revealing affinities that allow your business to understand and personalize engagements that build stronger customer relationships. Consumers don’t see social as a “marketing channel”. They just view it as part of their communications; it’s embedded in their daily mobile and digital experiences. Businesses should be thinking the same way. As Altimeter sees it, social business is the deep integration of social media and social methodologies into the organization to drive business impact
Tags : 
command center, social listening, influencers, digital, social marketing, social intelligence, cmo, oracle, research, social business; marketing cloud, emerging marketing, social media, internet marketing, crm & customer care
    
Oracle Social Cloud
Published By: Litmos     Published Date: Apr 23, 2015
Download this infographic to see statistics on how influential and integral mobile devices are in day to day life. Learners prefer mobile devices and use them everywhere at all times. Having a mobile learning strategy is imperative to your organization's success because mobile learning enables anyone to learn anytime, anywhere.
Tags : 
mobile learning, mobile devices, wireless, smartphone, training, litmos, human resources
    
Litmos
Published By: ForeScout     Published Date: Aug 15, 2017
When it comes to network security, most organizations face a daunting situation. IT infrastructure continues to grow more complex, driven by an onslaught of mobile devices and BYOD, Internet of Things (IoT) adoption, and increasing use of cloud computing. At the same time, the threat landscape becomes increasingly dangerous as organizations face a rise in sophisticated targeted attacks.
Tags : 
    
ForeScout
Published By: IBM     Published Date: Oct 13, 2015
Download this white paper from EuropeanCommunications to learn how leading mobile network operators use analytics to create more targeted marketing. Get real-world examples of companies that are using subscriber analytics to reduce customer churn, and find out what it takes to put big data to work in your organization.
Tags : 
ibm, eu comms, csp, subscriber analytics, analytics, cem, customer experience marketing, targeted marketing, it management, knowledge management, enterprise applications, crm & customer care, telecom, research
    
IBM
Published By: IBM     Published Date: Apr 23, 2015
With IBM analytics for big data with a smart mobile strategy, banks can increase wallet share and assets under management while lowering the organization’s operating ratio by using more efficient channels.
Tags : 
ibm, analytics, efficiencies, digital banking, management, strategy, data management, business technology, finance, data center
    
IBM
Published By: IBM     Published Date: Feb 24, 2015
Mobile capture is quickly becoming an important differentiators for many companies and organizations, especially those in traditionally document-intensive fields like banking, insurance, healthcare and government operations. According to a 2014 study conducted by AIIM, 45% of companies feel that mobile capture is vitally important, pointing to the competitive need for improved process agility and customer service across the board. Discover the top 10 questions to ask before you make your investment in mobile capture.
Tags : 
mobile capture, ibm, process agility, customer service, it management, knowledge management, enterprise applications
    
IBM
Published By: IBM     Published Date: Oct 06, 2015
This paper explores the implications of cloud, big data and analytics, mobile, social business and the evolving IT security landscape on data center and enterprise networks and the changes that organizations will need to make in order to capitalize on these technology force.
Tags : 
networks, ibm, redefining networks, cloud, analytics, mobile, social, security, big data, it security, data center, enterprise networks, it management, data management
    
IBM
Start   Previous    3 4 5 6 7 8 9 10 11 12 13 14 15 16 17    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.

© 2019  Created by RecruitingBlogs.   Powered by

Badges  |  Report an Issue  |  Terms of Service

scroll to the top