RecruitingBlogscom

Follow Us:

 

mobile service

Results 151 - 175 of 470Sort Results By: Published Date | Title | Company Name
Published By: hybris software     Published Date: Aug 01, 2012
Industry leaders are engaging in multichannel integration for some very good reasons. More effective cross-channel strategies lead to more satisfied consumers as well as more efficient, more profitable retail operations. In fact, as the survey indicates, consumers expect integrated multichannel experience from their favorite brands.
Tags : 
multichannel, retailing, multichannel retailing, technology considerations, hybris, pos, point of sale, print, mobile, call center, social media, website, integrated multichannel experience, cross-channel strategies, synergy, buy online, immediacy, convenience, cost savings, aisle kiosks
    
hybris software
Published By: LivePerson     Published Date: May 17, 2016
At the end of last year, the US alone had 435 million smart mobile devices in use — that’s 35% higher than the total US population. Among smartphone users, 68% use messaging apps regularly. And 84% of smartphone engagement with apps is spent communicating via text, email, and social channels. What does this mean for brands? The current state of CX is broken. Brands focus too much on channel and transaction, ignoring the customer’s preferences, and, ultimately, negatively affecting their bottom line. But wherever there’s a disconnect, there’s also opportunity. In increasing numbers brands are turning to messaging platforms and apps to offer more efficient, convenient customer service.
Tags : 
liveperson, idc, consumer relations, mobile, smartphones, mobile apps, brand engagement
    
LivePerson
Published By: ServiceNow     Published Date: Mar 24, 2015
Technology has become the heart and soul of every business. The hardware boundaries of IT have exploded beyond data centers, with mobile devices in the hands of both employees and customers alike. Application options have blossomed, from traditional to open source to software-as-a-service. Business has become global, bringing with it a demand for round-the-clock agility. Employees expect that the applications they use at work should be as easy to use the Web apps they use at home. Integration remains difficult, because it's sometimes impossible to know what will happen when someone tries to pluck one strand out of the pile. IT workload and system complexity will only get more challenging, bringing the need for disintermediation through service automation.
Tags : 
future it, service automation, it workload, integration, data centers, mobile devices, software-as-a-service, web apps, it management, enterprise applications
    
ServiceNow
Published By: MobileIron     Published Date: Nov 14, 2017
This paper covers some of the critical security gaps today’s mobile-cloud enterprises must address: • Unsecured devices. Unsecured devices allow users to easily access business data from mobile apps or cloud services simply by entering their credentials into an app or browser on the device. Once on the device, data can be easily compromised or shared with unauthorized, external sources. • Unmanaged apps. These typically include business apps, such as Office 365 productivity apps, that the user has downloaded from a personal app store instead of the enterprise app store. As a result, these apps are not under IT control but can still be used to access business content once the user enters his or her credentials. • Unsanctioned cloud services. Most enterprise cloud services have associated ecosystems of apps and services that integrate using APIs. While the enterprise cloud service might be sanctioned, apps and services from its ecosystem might not be.
Tags : 
    
MobileIron
Published By: MobileIron     Published Date: Apr 11, 2018
MobileIron unified endpoint management (UEM) enables your employees to enjoy seamless access to business apps and data through secure mobile devices, desktops, and cloud services while still maintaining complete control over their privacy. Harness the power of secure modern devices, apps and cloud services to enable business innovation. With one app, enterprises can protect company data by detecting and remediating known and zero-day threats on the mobile device, and no need for users to take any action.
Tags : 
byod, strategy, endpoint, management, uem, business, applications, data, mobile, device
    
MobileIron
Published By: MobileIron     Published Date: Aug 20, 2018
The new generation of mobile devices, applications, and cloud services significantly improve agency efficiencies. Tasks that were once relegated to timeconsuming deskwork, are now performed in the field, and with improved accuracy. Because of this, more and more public safety agencies are adopting these new technologies. One purpose of the FBI’s CJIS Security Policy is to enable agencies to fully leverage mobile devices, but without sacrificing security. Mobile devices introduce a variety of new threat vectors and risks. Careful consideration of these risks is important to maintaining information security. Threats to mobile devices stem mainly from their size, portability, and available wireless interfaces. Examples of mobile device threats include: • Loss or theft of device • Unauthorized access to device • Mobile operating system vulnerabilities • Communication over untrusted networks • Malware or malicious Apps • Jailbreak or rooting activity • Data loss through user behaviors
Tags : 
criminal, justice, information, services, cjis, compliance
    
MobileIron
Published By: MobileIron     Published Date: Aug 20, 2018
In the PC era, employees operated from within a well defined enterprise IT perimeter and passwords were sufficient to establish user trust. However, in today’s mobile-cloud environment, the enterprise perimeter has dissolved and business information is available to users on a variety of endpoints, apps, services, networks, locations. In this dynamic access environment, organizations need a different approach to security that is able to: • Establish user trust using multiple factor authentication • Correlate user trust with other factors such as endpoint, app, network, and more • Apply adaptive, risk-based policies that match the user’s environment
Tags : 
security, enterprise, cloud
    
MobileIron
Published By: MobileIron     Published Date: Nov 07, 2018
In recent years, the market for mobile and cloud technologies has completely shifted the behavior of enterprise users. People can now work anywhere, on any device, to access business apps and data from mobile apps and cloud services. Static, perimeter-based security can no longer keep up with all of the endpoints, users, apps, and data that travel far beyond the corporate firewall. Relying on old security approaches like password-only access control is no longer enough to secure this vast mobile-cloud infrastructure — especially since stolen user credentials were the top cause of data breaches in 2017.
Tags : 
    
MobileIron
Published By: Akamai Technologies     Published Date: Apr 25, 2018
Cyber attackers are targeting the application programming interfaces (APIs) used by businesses to share data with customers. Consumer mobile adoption, electronic goods and services, and high volumes of data have led businesses to use APIs for data exchange. Unfortunately, attackers can also use APIs to access or deny service to valuable data and systems. This white paper explores strategies for protecting APIs. You’ll learn about APIs, how and why these endpoints are targets for web application attacks, security models, and how Akamai can help.
Tags : 
api, security, interface, businesses, data, mobile, adoption
    
Akamai Technologies
Published By: IBM     Published Date: Mar 29, 2017
This report details our findings about how well each vendor fulfills our criteria for constructing an online collaboration service and where they stand in relation to each other. Forrester chose to evaluate the overall strategies of these providers across criteria like global footprint, service-level agreements, mobile support, enterprise readiness, and more. This report and associated Excel model highlight the key criteria CIOs and their staffs should evaluate when looking at prospective providers of online collaboration services. Download now to learn more!
Tags : 
forrester, cloud, online collaberation, it management, cloud strategies
    
IBM
Published By: IBM     Published Date: Jan 20, 2017
Government agencies are taking advantage of new capabilities like mobile and cloud to deliver better services to its citizens. Many agencies are going paperless, streamlining how they interact with citizens and providing services more efficiently and faster. This short video will show real examples of how government agencies are applying new capabilities like cognitive and analytics to improve how they ingest, manage, store and interact with content.
Tags : 
ibm, ecm, analytics, smarter content, ecm for government, enterprise applications, business technology
    
IBM
Published By: IBM     Published Date: Mar 30, 2017
This report details our findings about how well each vendor fulfills our criteria for constructing an online collaboration service and where they stand in relation to each other. Forrester chose to evaluate the overall strategies of these providers across criteria like global footprint, service-level agreements, mobile support, enterprise readiness, and more. This report and associated Excel model highlight the key criteria CIOs and their staffs should evaluate when looking at prospective providers of online collaboration services. Download now to learn more!
Tags : 
forrester, cloud, online collaberation, it management, cloud strategies
    
IBM
Published By: Druva     Published Date: Nov 09, 2018
The all-encompassing data center is a thing of the past. Modern data environments are distributed and include remote and branch offices, mobile devices, and the Internet of Things (IoT) as well as cloud solutions such as infrastructure as a service (IaaS), platform as a service (PaaS), and software as a service (SaaS). There’s more critical data to back up than ever before. Plus, data silos and fragmented management mean poor visibility, which can make it difficult to comply with regional data residency and security rules as well as service-level agreements (SLAs). On-premises data protection has not kept pace. According to a survey by Fujitsu, 45% of IT managers said they had lost data or productivity related to data protection inefficiency within the last year.1 Often, this is because on-premises backups are cumbersome and do not always happen on time.
Tags : 
    
Druva
Published By: Group M_IBM Q418     Published Date: Nov 07, 2018
The rise of the cloud and mobile computing has rapidly changed the nature of enterprise cybersecurity. The old paradigm, where all work was done behind a company firewall, has been breaking down. Employees work not just at the office, but also on the road and at home, on mobile devices and on their own personal computers. They’re no longer using a limited stack of enterprise applications. Instead, they increasingly require access to a wide variety of apps, cloud services, and new communication platforms.
Tags : 
    
Group M_IBM Q418
Published By: Ingenico     Published Date: May 02, 2018
The time of mobile point of sale (mPOS) has arrived. While the mission to adopt EMV has dominated the payments industry over the past few years, many hotels, resorts and casinos are now focusing their efforts on rapid planning and implementation of mPOS strategies. A number of emerging trends are driving this new focus, including an emphasis on enhancing guest experiences and building brand loyalty by leveraging digital and mobile technologies. Innovative hotels, resorts and casinos are using these solutions to create entirely new guest experiences that improve service speed and convenience while creating distinct competitive advantages. mPOS is increasingly becoming a key part of the picture, providing unique opportunities to improve guest service quality and engagement, create new efficiencies and cost savings, and strengthen their brand. This eBook will provide an overview of those opportunities, some key trends in the hotel & lodging industry, and guide you through the key requirem
Tags : 
    
Ingenico
Published By: CheckMarx     Published Date: Apr 03, 2019
We live in an era of digital transformation. Software is the backbone of this digital transformation. Mobile, cloud, open source, Internet of Things, microservices and AI have made software more complex. Over 80% of the code in today’s software applications is open source. Estimates show that there will be 30 billion connected IOT devices by 2020. Furthermore, 85% of customer interactions will be computer managed by 2020. Software is everywhere. While software has gotten more complex, timeto-market is the new name of the game and enterprises can’t risk security slowing this down.
Tags : 
    
CheckMarx
Published By: MindTouch     Published Date: Mar 18, 2019
Today, the average person has instant access to an immeasurable quantity of information. Smartphones and mobile devices put it all at one’s fingertips. It is part of an unprecedented shift that puts customers squarely in the driver’s seat. As a result, the balance of power has decisively shifted from sellers to buyers—from products and services to the customers who consume them. Companies now face a simple but critical choice: prioritize the customer experience, or risk going by the wayside. The companies that thrive are those that obsess over proactively meeting customer demand for timely and effortless experiences.
Tags : 
    
MindTouch
Published By: Splunk     Published Date: Jul 23, 2012
As the largest on-line directory, WhitePages offers a suite of free mobile and internet services that makes it easy to find and connect with people and businesses in the US.
Tags : 
splunk, whitepages, security, operational intelligence, data management, business technology
    
Splunk
Published By: Good Technology Corporation     Published Date: Apr 29, 2013
You can’t slow down technology. But you can get ahead of it. Learn how in this mobile trend report from Gartner. Learn the latest in devices, app stores, and cloud services. You’ll even get operational tips to manage mobile costs, risk, and support.
Tags : 
consumerization, mobile technology, infrastructure and operations, mobile management, mobile security, enterprise mobility, mobile application management
    
Good Technology Corporation
Published By: Frontrange     Published Date: Mar 13, 2013
Data is now accessed via physical and virtual desktops, laptops and mobile devices. IT organizations struggle to control and manage this widening pool of devices. View this Computerworld Survey to better understand the solutions to these challenges.
Tags : 
it service management, itsm, service desk, service catalog, service management software, mobile service management, cloud itsm, service manager, help desk software, hybrid it service management, heat help desk, client management, network discovery software, software audit, pc hardware inventory software, hardware software inventory, hardware inventory, pc hardware inventory, audit service level agreement, network inventory
    
Frontrange
Published By: Frontrange     Published Date: Mar 13, 2013
Recent new technology introductions are fundamentally changing the way we utilize and manage IT resources. This whitepaper shows how these new processes and automation solutions deliver the agility and extensibility to maintain performance and relia
Tags : 
it service management, itsm, service desk, service catalog, service management software, mobile service management, cloud itsm, service manager, help desk software, hybrid it service management, heat help desk, client management, network discovery software, software audit, pc hardware inventory software, hardware software inventory, hardware inventory, pc hardware inventory, audit service level agreement, network inventory
    
Frontrange
Published By: Frontrange     Published Date: Mar 13, 2013
Many IT organizations are excited about the prospects of incorporating Cloud-based technologies into their present/future vision. Download this whitepaper and learn how you can leverage Cloud services for increased resiliency and efficiency.
Tags : 
it service management, itsm, service desk, service catalog, service management software, mobile service management, cloud itsm, service manager, help desk software, hybrid it service management, heat help desk, client management, network discovery software, software audit, pc hardware inventory software, hardware software inventory, hardware inventory, pc hardware inventory, audit service level agreement, network inventory
    
Frontrange
Published By: Frontrange     Published Date: Mar 13, 2013
Reducing IT costs and improving service quality are primary concerns when looking to improve your IT efficiencies. This paper presents the Return on Investment implications for organizations considering an IT Service and Client Management solution.
Tags : 
it service management, itsm, service desk, service catalog, service management software, mobile service management, cloud itsm, service manager, help desk software, hybrid it service management, heat help desk, client management, network discovery software, software audit, pc hardware inventory software, hardware software inventory, hardware inventory, pc hardware inventory, audit service level agreement, network inventory
    
Frontrange
Published By: Frontrange     Published Date: Mar 13, 2013
Managing IT services has rarely been as challenging as it is today. The solution is to adopting a standards-based strategy that automates IT service management. This white paper examines what’s holding IT back and offers a potential way forward.
Tags : 
it service management, itsm, service desk, service catalog, service management software, mobile service management, cloud itsm, service manager, help desk software, hybrid it service management, heat help desk, client management, network discovery software, software audit, pc hardware inventory software, hardware software inventory, hardware inventory, pc hardware inventory, audit service level agreement, network inventory
    
Frontrange
Published By: Epicor     Published Date: Jul 18, 2017
As technology improves, retailers are relying more and more on their customer service to gain an advantage and differentiate themselves from the competition. Providing a pleasant customer experience can turn a first-time shopper into a lifelong buyer. By reading this Epicor eBook, you’ll discover the important role mobile technology plays in delivering faster, service. Retailers everywhere are implementing mobile tools to empower their employees to support customers—from stock and pricing information to mobile checkout. Epicor Eagle N Series is a fully integrated retail management system that offers a whole host of mobile tools to help you service your customers, stay informed, and make decisions from anywhere. Read the eBook and learn how the mobility of Epicor Eagle N Series can provide your retail business with a competitive advantage.
Tags : 
retail store software, retail sales software, retail saas, business retail software, epicor eagle, benefits of epicor eagle, benefits of retail pos, advantages of retail saas
    
Epicor
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.

© 2019  Created by RecruitingBlogs.   Powered by

Badges  |  Report an Issue  |  Terms of Service

scroll to the top