RecruitingBlogscom

Follow Us:

 

mobile service

Results 76 - 100 of 470Sort Results By: Published Date | Title | Company Name
Published By: Dell SB     Published Date: Jan 24, 2019
Creators, inventors and designers across the world’s industries rely on Dell Precision workstations to expand the horizons of the possible and bring their ideas into reality. Some of the most noteworthy features of the Precision workstation family include: • A broad solution portfolio that ranges from mobile devices to rack and tower workstations • Innovative designs that enhance user experiences • Power to enable emerging technologies • The industry’s most comprehensive service and support offering, Dell ProSupport • A world-class ecosystem of displays, input devices and accessories
Tags : 
    
Dell SB
Published By: Akamai     Published Date: Mar 08, 2017
Akamai’s Predictive Content Delivery (PCD) technology was developed to help satisfy the growing demand of mobile video. It is designed to optimize the delivery of data-heavy video traffic terminating on mobile devices and provide mobile customers with a video service that exceeds their expectations in the form of high-quality, always-available video with instant startup. Read on to find out more.
Tags : 
content, predictive content delivery, pcd, video, traffic, mobile video
    
Akamai
Published By: ipoque     Published Date: Feb 14, 2019
Virtualized Evolved Packet Core (vEPC) is a major breakthrough in network function virtualization (NFV). When asked where they have deployed NFV in production networks, communication service providers (CSPs) consistently name vEPC as one of the top answers. Why is that? In order to maximize their processing capacity, CSPs virtualize a subset of their network applications, including mobile edge computing (MEC), base stations (small/macro cells) and the mobile core, because these systems use a large bandwidth. The mobile packet core builds the foundation of the core network on which mobile CSPs offer IP-based services to their customers. Implementing vEPC solutions can help CSPs obtain the scale necessary to accommodate growing numbers of subscribers and large amounts of traffic or connections while controlling costs and improving on quality of experience (QoE). In the past, evolved packet core (EPC) solutions were deployed on purpose-built hardware. NFV enables operators to deploy EPC c
Tags : 
dpi, deep packet inspection, vepc, sdn, nfv, network analytics, virtual network
    
ipoque
Published By: Equinix     Published Date: Jul 07, 2016
Selevision wanted a data centre provider to host its services - Video on Demand, Live TV and Catch-up TV. It needed direct access to the world’s top CDNs, NSPs, ISPs and mobile data providers to securely stream video across the Middle East region. Selevision chose to host its services in the Equinix Internet Business Exchange (IBX) located in Dubai.
Tags : 
content management, content on demand, equinix, content
    
Equinix
Published By: Equinix     Published Date: Jul 11, 2016
Selevision wanted a data centre provider to host its services - Video on Demand, Live TV and Catch-up TV. It needed direct access to the world’s top CDNs, NSPs, ISPs and mobile data providers to securely stream video across the Middle East region. Selevision chose to host its services in the Equinix Internet Business Exchange (IBX) located in Dubai.
Tags : 
content management, content on demand, equinix, content
    
Equinix
Published By: CA Technologies     Published Date: Jan 08, 2014
Customers are embracing new technologies and they want to interact through a variety of applications, at any time and from any device. Many consumer facing organizations are racing to enable new interaction channels to innovate, grow their business and improve customer loyalty. As they expand online services and add mobile and social media interaction there is an increasing need to both secure and coordinate these activities. The key challenge is to deliver innovative new applications and services quickly and to provide an excellent customer experience across multiple channels.
Tags : 
ca technologies, crm, customer relationship management, delivery, security, multi-channel, customer environment, customer experience, social media, mobile, applications, customer experience management, customer engagement
    
CA Technologies
Published By: CA Technologies     Published Date: Jan 08, 2014
Customers are embracing new technologies and they want to interact through a variety of applications, at any time and from any device. Many consumer facing organizations are racing to enable new interaction channels to innovate, grow their business and improve customer loyalty. As they expand online services and add mobile and social media interaction there is an increasing need to both secure and coordinate these activities. The key challenge is to deliver innovative new applications and services quickly and to provide an excellent customer experience across multiple channels.
Tags : 
ca technologies, crm, customer relationship management, delivery, security, multi-channel, customer environment, customer experience, social media, mobile, applications, customer experience management, customer engagement
    
CA Technologies
Published By: AppDynamics     Published Date: Sep 20, 2017
Larger organizations run into problems when monolithic architectures cannot be scaled, upgraded or maintained easily as they grow over time. Microservices architecture is an answer to that problem. It is a software architecture where complex tasks are broken down into small processes that operate independently and communicate through language-agnostic APIs.
Tags : 
mobile devices, web apps, operating systems, ram, server utilization, multi-core services, ethernet
    
AppDynamics
Published By: HP - Enterprise     Published Date: Jun 05, 2013
Whether you want to map directions, find a restaurant, look up your flight details, see where your next meeting is, or just check your email, chances are you do it on your smartphone. Just about everything is going mobile. Industries such as retail and financial services are going mobile to increase efficiency and generate more revenue. Mobile business apps and mobile enterprise apps have the potential to transform organizations. This white paper discusses key mobile trends and analyzes how financial services organizations must change their IT application development, testing, monitoring, and management methodologies while extending their services to multi-client mobile environments, leveraging both Native and Mobile-oriented Web apps.
Tags : 
mobility, financial services, revenue stream, application development
    
HP - Enterprise
Published By: HP - Enterprise     Published Date: Sep 16, 2013
This paper touches upon the following topics: -Critical vulnerabilities are on the decline, but still pose a significant threat -Mature technologies introduce continued risk -Mobile platforms represent a major growth area for vulnerabilities -Web applications remain a substantial source of vulnerabilities -Cross-site scripting remains a major threat to organizations and users -Effective mitigation for cross-frame scripting remains noticeably absent
Tags : 
internet security, intrusion detection, intrusion detection/ forensics, intrusion prevention, mobile security, network security appliance, security, security policies, technology security, web service security, vulnerability management, networking, application security, phishing, security management, security monitoring, security solutions, network security
    
HP - Enterprise
Published By: HP - Enterprise     Published Date: Sep 16, 2013
HP Enterprise Security provides a broad view of the vulnerability landscape, ranging from industry-wide data down to a focused look at different technologies, including web and mobile. The goal of this report is to provide the kind of actionable security that intelligence organizations need to understand the vulnerability landscape as well as best deploy their resources to minimize security risk.
Tags : 
internet security, intrusion detection, intrusion detection/ forensics, intrusion prevention, mobile security, network security appliance, security, security policies, technology security, web service security, vulnerability management, networking, application security, phishing, security management, security monitoring, security solutions, network security
    
HP - Enterprise
Published By: HP - Enterprise     Published Date: Sep 16, 2013
HP Enterprise Security provides a broad view of the vulnerability landscape, ranging from industry-wide data down to a focused look at different technologies, including web and mobile. The goal of this report is to provide the kind of actionable security that intelligence organizations need to understand the vulnerability landscape as well as best deploy their resources to minimize security risk. Download this infographic for more info!
Tags : 
internet security, intrusion detection, intrusion detection/ forensics, intrusion prevention, mobile security, network security appliance, security, security policies, technology security, web service security, vulnerability management, networking, application security, phishing, security management, security monitoring, security solutions, network security
    
HP - Enterprise
Published By: Genesys     Published Date: Oct 16, 2013
The existing upgrade paths from legacy PBX and ACD suppliers make it difficult for contact center executives to contemplate the future of customer service on their own terms. If your ACD-based contact center has become a road block for adding capacity or adding channels such as social media and mobile, you might want to think about making the switch to a SIP-based contact center solution. SIP delivers two important advantages over legacy switching: 1. SIP is based on open standards, so you can choose hardware and software that is best suited for your environment. 2. SIP’s capability extends beyond voice to new media types such as mobile, social media and video. SIP-based contact centers provide a roadmap to sophisticated features without the complexity and expense of traditional proprietary ACDs. Learn more about how to build the next-generation customer service platform.
Tags : 
contact center, customer service, social media, mobile, sip, technology solution, technology, enterprise applications, business technology
    
Genesys
Published By: ClickExpress     Published Date: May 01, 2013
Businesses with between 15-250 mobile workforce employees are looking for optimization software. At the same time, they don’t want a complex enterprise solution with long integration times and complex IT requirements. Many vendors are offering cloud-based solutions. But what does that mean? Is it secure? In this Q&A, we answer the most common questions about cloud-based software solutions for field service management.
Tags : 
cloud-based, solution, mobile, workforce, optimization, employees, software, enterprise, solutions
    
ClickExpress
Published By: ClickExpress     Published Date: May 01, 2013
The cost of ineffective customer service visits isn't just in money: the greater cost is in customer satisfaction. When a mobile workforce employee doesn't arrive on time, is missing equipment, or doesn't resolve the issue on the first visit, it leads to customer dissatisfaction, lost business, and today, public complaints in the media and social networks. Every single service organization understands the crucial value of great customer service. Every single visit to a customer is critical. In this paper, we reveal the 3 steps to a great visit every time.
Tags : 
employees, customer, mobile, workforce, organization, service
    
ClickExpress
Published By: ClickSoftware     Published Date: Jun 30, 2014
Automating mobile workforce management can allow insurers to increase efficiency and improve service levels. When business is tough, that’s a great advantage
Tags : 
clicksoftware, mobile, mobile workforce, automation, casualty, small business, finance
    
ClickSoftware
Published By: MobileIron     Published Date: Feb 15, 2017
The third edition of the Mobile Security and Risk Review is a must read and provides IT security leaders with timely information about the mobile threat landscape and the emerging risks facing their organizations. The report also includes a list of the most popular business apps, Apple VPP and DEP adoption metrics, top blacklisted mobile apps and information about healthcare and financial services industries.
Tags : 
    
MobileIron
Published By: MobileIron     Published Date: Mar 21, 2017
Over the past few years, organizations have used a variety of tools and technologies to enable basic mobile device management (MDM) and essential apps like email and calendar. But those capabilities are inadequate for companies that want to move beyond the basics and transform their business processes by securely moving apps and data to the cloud. For AirWatch customers, this means they should start evaluating leading enterprise mobility management (EMM) platforms like MobileIron in order to achieve their mobile transformation goals. Our platform is 100% focused on building today’s modern enterprise architecture, which is quickly shifting core business processes away from legacy technologies and standardizing on mobile devices and cloud services.
Tags : 
    
MobileIron
Published By: MobileIron     Published Date: Nov 14, 2017
Traditional identity-based security models cannot secure your business data from the latest mobile-cloud threats, including unsecured devices, unmanaged apps, and unsanctioned cloud services. To keep business data secure in the mobile-cloud world, you need a new security model that checks the state and health of devices, apps, and cloud services before letting them get to your data.
Tags : 
    
MobileIron
Published By: MobileIron     Published Date: Nov 16, 2017
L'émergence des technologies mobiles et cloud modernes contraint les organisations à repenser complètement leur approche de la sécurité des terminaux. Par exemple, alors que l'utilisation d'identifiants suffit à sécuriser les accès dans un environnement composé d'ordinateurs de bureau et contrôlé par un service informatique, ce modèle n'est pas transposable à l'univers du cloud et des mobiles. Lorsque la sécurité repose uniquement sur l'identité (et donc sur un nom d'utilisateur et un mot de passe), l'utilisation d'appareils mobiles se complique et les comportements non sécurisés susceptibles de mettre en danger les données de l'entreprise sont encouragés
Tags : 
    
MobileIron
Published By: MobileIron     Published Date: Nov 16, 2017
Traditional identity-based security models cannot secure your business data from the latest mobile-cloud threats, including unsecured devices, unmanaged apps, and unsanctioned cloud services. To keep business data secure in the mobile-cloud world, you need a new security model that checks the state and health of devices, apps, and cloud services before letting them get to your data. Download the one pager now to learn more.
Tags : 
    
MobileIron
Published By: goTransverse     Published Date: Nov 02, 2016
In this era of cloud computing, mobile devices, and the Internet of Things (IoT), firms are testing new product offerings that combine elements of content, software, services, and hardware together. Like the innovative products themselves, the rulebook on monetizing them is evolving. Firms are shifting from one-time perpetual sales or fixed monthly subscriptions to consumption models that blend onetime, subscription, and usage-based billing. Download this white paper to learn the eight subscription billing solution providers that matter most and how they stack up.
Tags : 
    
goTransverse
Published By: Okta     Published Date: May 09, 2016
With a secure foundation in place to manage internal IT, many IT leaders are thinking about a foundation for the entire business. In the new world of mobile apps, cloud services, and the Internet of Everything, people, processes, data, and devices are all converging to reshape how day-to-day business is done. Companies are reaching out to customers and partners—and even intelligent objects like connected cars and monitoring systems—and modifying the products and services they bring to market as a result. To an unprecedented degree, the future of an enterprise lies in the hands of the CIO and her IT staff who orchestrate these connections and act on the benefits they bring. IT leaders are finding new opportunities in an era of digital disruption. This executive brief provides a quick overview of how they are driving growth and increasing efficiency by securely connecting the digital enterprise with customers, partners, suppliers and distributors.
Tags : 
    
Okta
Published By: Veracode     Published Date: Oct 26, 2016
Web and mobile applications are now top attack vectors for cyber attackers, accounting for more than a third of data breaches. As a result, securing the application layer has now become a high priority for enterprises. Enterprise application security testing solutions for Web, native, cloud and mobile applications are key to this strategy. In the latest Gartner 2015 Magic Quadrant for Application Security Testing, Veracode has been positioned as a Leader for the third year in a row based on our completeness of vision and ability to execute in the AST market. Download the report for more on why Veracode's automated cloud-based service is in Gartner's “Leaders” quadrant.
Tags : 
veracode, gartner, magic quadrant, application security testing, security, application security, enterprise applications, business technology
    
Veracode
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.

© 2019  Created by RecruitingBlogs.   Powered by

Badges  |  Report an Issue  |  Terms of Service

scroll to the top