RecruitingBlogscom

Follow Us:

 

mobile organization

Results 326 - 350 of 416Sort Results By: Published Date | Title | Company Name
Published By: IBM     Published Date: Apr 18, 2014
Infrastructure matters. Today’s business environment is increasingly dominated by mobile and cloud-based platforms, and by the skyrocketing volume of new data. And with 70 percent of the average organization's IT budget being spent on operations and maintenance, infrastructure must be simplified, adaptive and responsive. Those are the characteristics of the software defined environment: IBM’s optimized, customized, virtualized IT platform designed to replace systems that assign server, storage and network resources manually. This eBook serves as an essential introduction to SDEs: what they are, and why your organization needs them now more than ever.
Tags : 
ibm, software defined environments, sde, it infrastructure, workloads, it operations, optimization, software, software development, it management
    
IBM
Published By: Adobe     Published Date: Apr 17, 2014
Discover new opportunities for maturing your data practices—and building your business results. You’ll learn how to move beyond mere web analytics to build a more comprehensive marketing analytics approach that includes mobile, social, and offline channels. And you’ll see how your current analytics capabilities compare to those of similar organizations and where you have opportunities for improvement.
Tags : 
adobe, analytics, marketing, data collection, data automation, marketing automation, web analytics, marketing analytics, data exploration, automation technology, data practices, marketing solutions, emerging marketing, social media
    
Adobe
Published By: Oracle     Published Date: Apr 10, 2014
The very best CFOs are becoming “technology evangelists”, investing in the latest mobile, social, analytical and cloud technologies to modernize their finance organizations and become more strategic partners to the business. Find out more – download the report, “Empowering Modern Finance: The CFO as Technology Evangelist.”
Tags : 
cloud, finance, saas, big data, social, mobile, analytics, modernization, planning, forecasting, governance, technology, accounting, business intelligence, epm, erp, grc
    
Oracle
Published By: IBM     Published Date: Apr 04, 2014
Today, as customers increasingly turn to digital channels to research products, shop, and purchase — and as employees arrive in the workplace conditioned by engaging consumer Web, mobile, and social experiences — organizations can't afford to be left behind because of legacy investments. Customers and employees alike expect an exceptional digital experience. The good news, as our TCO study shows, is that most organizations can justify the cost of IBM's Exceptional Digital Experience solutions based on quantifiable hard dollar savings within a relatively short period of time. Read this IDC Report to learn more about IBM's Exceptional Digital Experience Solutions
Tags : 
ibm, idc, digital experience, digital marketing, customer engagement, web marketing, mobile marketing, social media, tco, customer engagement, emerging marketing
    
IBM
Published By: ForeScout     Published Date: Mar 26, 2014
The report presents a tiered service approach to enterprise mobile security while exploring how NAC and MDM as complementary controls can offer necessary network and device level defenses to enable IT organizations to realize mobility advantages and reduce security and compliance exposures. The report also examines ForeScout's mobile security offering and presents relevant use cases.
Tags : 
forescout, cyberedge, cyberthreat, it security, byod, nac, mdm, reduce security, compliance exposures, mobile security, security, enterprise applications
    
ForeScout
Published By: IBM     Published Date: Mar 04, 2014
Technology advances are changing the way employees work, consumers buy, and enterprises conduct business. Old methods for marketing products are taking a back seat to online distribution, and mobile devices are ubiquitous access points to the Internet. The resulting environment is ripe for the creation and distribution of new software for handling a constantly expanding array of functions. When there is an app for everything, organizations have no choice but to adapt or risk getting left behind as markets enter the era of the Web application programming interface (API).
Tags : 
ibm, mobile, mobile app, api, api management, web application, application programming interface, app, ubm tech, mobility, cloud, mobile devices, software, software development, it management, enterprise applications
    
IBM
Published By: IBM     Published Date: Feb 27, 2014
Learn the best practices that the mobile technology leaders are using and see how your organization could benefit from an infrastructure that supports mobile devices and other mobile solutions.
Tags : 
mobile, best practices, mobile technology, mobile solutions, mobile devices, mobile collaboration, byod, bring your own device, mobile applications, network, device, business technology
    
IBM
Published By: CA Technologies     Published Date: Jan 15, 2014
Today’s trends, including cloud, mobile, social media, and big data, are causing huge changes in the way that identities need to be managed. As a result, the previous notion of a network perimeter is disappearing. With the advent of cloud and mobility, identity has become the new perimeter. This trend will have profound impacts on the business and IT organizations. This paper describes an identity-centric approach to security that can help you grow your business while protecting your key assets from improper use.
Tags : 
ca technologies, identity, identity management, user provisioning, identity centric security, security, cloud, network provisioning, network security, access control, application security, authentication, security management, cloud computing
    
CA Technologies
Published By: CA Technologies     Published Date: Jan 15, 2014
Today’s trends, including cloud, mobile, social media, and big data, are causing huge changes in the way that identities need to be managed. As a result, the previous notion of a network perimeter is disappearing. With the advent of cloud and mobility, identity has become the new perimeter. This trend will have profound impacts on the business and IT organizations. This paper describes an identity-centric approach to security that can help you grow your business while protecting your key assets from improper use.
Tags : 
ca technologies, identity, identity management, user provisioning, identity centric security, security, cloud, network provisioning, network security, access control, application security, authentication, security management, cloud computing
    
CA Technologies
Published By: CA Technologies     Published Date: Jan 08, 2014
Today’s trends, including cloud, mobile, social media, and big data, are causing huge changes in the way that identities need to be managed. As a result, the previous notion of a network perimeter is disappearing. With the advent of cloud and mobility, identity has become the new perimeter. This trend will have profound impacts on the business and IT organizations. This paper describes an identity-centric approach to security that can help you grow your business while protecting your key assets from improper use.
Tags : 
ca technologies, identity, identity management, user provisioning, identity centric security, security, cloud
    
CA Technologies
Published By: CA Technologies     Published Date: Jan 08, 2014
Today’s trends, including cloud, mobile, social media, and big data, are causing huge changes in the way that identities need to be managed. As a result, the previous notion of a network perimeter is disappearing. With the advent of cloud and mobility, identity has become the new perimeter. This trend will have profound impacts on the business and IT organizations. This paper describes an identity-centric approach to security that can help you grow your business while protecting your key assets from improper use.
Tags : 
ca technologies, identity, identity management, user provisioning, identity centric security, security, cloud
    
CA Technologies
Published By: CA Technologies     Published Date: Jan 08, 2014
Today’s trends, including cloud, mobile, social media, and big data, are causing huge changes in the way that identities need to be managed. As a result, the previous notion of a network perimeter is disappearing. With the advent of cloud and mobility, identity has become the new perimeter. This trend will have profound impacts on the business and IT organizations. This paper describes an identity-centric approach to security that can help you grow your business while protecting your key assets from improper use.
Tags : 
ca technologies, identity, identity management, user provisioning, identity centric security, security, cloud
    
CA Technologies
Published By: Avaya     Published Date: Dec 18, 2013
Discover the four biggest challenges created by the rise of the mobile workforce – and how your organization can achieve a unified solution.
Tags : 
avaya, mobility, mobile workforce, unified solution, it management, wireless, data center
    
Avaya
Published By: VMware, Inc     Published Date: Dec 05, 2013
The workforce is going mobile. According to Forrester, more than half of employees carry at least three devices for work. And many are bringing their own smartphones, tablets, and other devices to work, a phenomenon that’s grown so popular it now has its own acronym—Bring Your Own Device (BYOD). So it comes as no surprise that, according a survey by SpiceWorks, 60% of small and medium businesses are considering using a virtual desktop infrastructure (VDI) as part of their BYOD strategy. Many of these organizations are relying on VMware® Horizon View™ (formerly VMware View), because it enables organizations to implement a VDI infrastructure that reduces operational costs, enhances security and supports a mobile workforce.
Tags : 
vmware, vmware horizon view, virtual desktop infrastructure, mobile, byod, spiceworks, virtual desktop infrastructure, bring your own device, vdi, networking, security, it management, knowledge management, enterprise applications, storage, data management, business technology, data center
    
VMware, Inc
Published By: RingCentral     Published Date: Dec 05, 2013
Employees today want to be able to choose their own mobile devices based on their preferred design and functionality, a trend known as “bring your own device,” or BYOD. This can be a boon to the organization, but it is also a risk. This study explains why.
Tags : 
ringcentral, mobile devices, mobile workers, cellphone, bluetooth, wireless, cell phone, iphone, blackberry, communications
    
RingCentral
Published By: ServiceNow     Published Date: Nov 22, 2013
Whether you’ve embraced it or not, mobile is already part of your business. To remain relevant, IT must think like the business. IT must reinvent itself and become more of a technology advisor and less of a technology traffic cop. This paper sets out some of the key lessons learned by progressive organizations that have used mobile to get ahead.
Tags : 
servicenow, enterprise it, mobile computing, mobile initiative, it managers, progressive enterprise, mobile users, bring your own device, mobile device management, mobile adoption, mobile maturity model, mobile savvy, actionable analytics, renew it
    
ServiceNow
Published By: Brainshark     Published Date: Nov 14, 2013
SiriusDecisions identifies five planning assumptions that must drive the agenda of sales enablement executives in the year ahead. From onboarding to demand creation to tackling mobile and social media, discover how to build integration between the marketing, sales, training and operations teams with the new sales enablement organizational model.
Tags : 
effective content, sales content, sales collateral, marketing collateral, sales enablement, sales
    
Brainshark
Published By: Brainshark     Published Date: Nov 05, 2013
SiriusDecisions identifies five planning assumptions that must drive the agenda of sales enablement executives in the year ahead. From onboarding to demand creation to tackling mobile and social media, discover how to build integration between the marketing, sales, training and operations teams with the new sales enablement organizational model.
Tags : 
sales enablement, sales training, sales productivity, sales effectiveness, sales revenue, sales costs, product marketing, content marketing, onboarding sales, sales new hires, mobile sales, sales mobility, powerpoint, ppt, presentation, video, video training, ipad, iphone, video marketing
    
Brainshark
Published By: CDW     Published Date: Oct 10, 2013
Increasing staff productivity while lowering costs tied to this growing enterprise resource. A productive mobile program starts with holistic research and planning. Approaching mobility from a lifecycle standpoint will help an organization focus on optimizing each stage of the process. Having some guidance on what to expect at the different points of the mobility lifecycle is valuable for planning purposes.
Tags : 
mobile solutions, byod, mobile safety, mobile strategies, data access, secure foundation, applications, mobile app, app security, secure network
    
CDW
Published By: CDW     Published Date: Oct 10, 2013
CDW’s Mobile Expense Management solution enables organizations to view, integrate and manage mobile communications costs across the entire organization in order to make more informed strategic decisions.
Tags : 
mobility management, mobile expense management, total mobility, cdw, expense management, mobile expense, historical invoice audit, invoice process, wireless expense, wireless communications, optimize communications, maximize mobile benefits, wireless, network performance management, tablet, smartphone, mobile device
    
CDW
Published By: CDW     Published Date: Oct 10, 2013
Five key items can help reap solid ROI from launching a mobile application strategy. Organizations are demonstrating their interest in mobile apps with their checkbooks.
Tags : 
increase revenue, mobile apps, apps, mobility, mobile device, trademonster, productivity with apps, customer relationships management, crm, mobile app development, mobile hardware, mobile product, wireless, business technology
    
CDW
Published By: IBM     Published Date: Oct 10, 2013
IBM MobileFirst is designed to enable organizations turn their interactions into an opportunity to drive return on engagement and investment. IBM combines deep industry expertise with mobile, analytics, cloud, social and security technologies. This can help enterprises capture new markets, efficiently extend their businesses to mobile employees, customers and business partners and maintain the integrity of their assets.
Tags : 
ibm, mobilefirst, business in motion, mobile enterprise, user interactions, return on engagement, return on investment, roi, capture new markets, security technologies, mobile employees, customers, business partners, mobility importance, maintaining relationships, business integrity, employee integrity, wireless
    
IBM
Published By: IBM     Published Date: Oct 10, 2013
With 2.5 billion employee-owned mobile devices in the workplace today, enterprises are struggling to capture the business benefits while bracing their IT infrastructure against data breaches and a deluge of mobile traffic. A new study reveals that the most mobile-savvy organizations are employing specific best practices, including mobile planning, integration, optimization and management to achieve mobile infrastructure maturity.
Tags : 
mobiles, mobile technology, technology leaders, ibm, global it, it leaders, mobility, wireless, business benefits, mobile traffic, gaining traffic, employing practices, mobile infrastructure, infrastructure maturity, mobile devices, data breach, enterprises, it management, data management
    
IBM
Published By: E-SignLive by Silanis     Published Date: Oct 02, 2013
While we tend to think about mobility largely as a consumer phenomenon, it is also changing how the workforce carries out business. With so much being done beyond traditional office walls, many insurance companies, financial service organizations and even government agencies are adopting mobile devices as productivity tools and developing enterprise apps for these devices. Electronic signature technology is pivotal to enabling mobile transactions beyond just informational apps. Not only in terms of straight-through processing (STP), but also for full compliance, legal enforceability and record retention. With most organizations’ mobile strategies still in the early stages, this article provides a starting point to help you better understand mobile e-signatures for business. It reviews the top 10 capabilities that businesses need in order to properly equip their customer-facing workforce with mobile e-signing.
Tags : 
ipad, mobility, apple, e-signatures, esign, marketing, enterprise, cio, networking, security, it management, wireless, enterprise applications, sales, state/local/municipal, information technology, insurance ros
    
E-SignLive by Silanis
Published By: IBM     Published Date: Sep 30, 2013
Insurers are discovering the power of conjoining advanced technologies for collaboration, social media and mobile with business processes. The result is social business, which embeds advanced technology tools, media and practices into the ongoing activities of the organization. Social business reaches across the enterprise and then extends to customers and partners. Read this white paper to learn more.
Tags : 
ibm, social business, insurance, social media, media technology, it platforms, customer service, networking, enterprise applications, business technology, insurance ros
    
IBM
Start   Previous    3 4 5 6 7 8 9 10 11 12 13 14 15 16 17    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.

© 2019  Created by RecruitingBlogs.   Powered by

Badges  |  Report an Issue  |  Terms of Service

scroll to the top