RecruitingBlogscom

Follow Us:

 

mobile apps

Results 351 - 375 of 458Sort Results By: Published Date | Title | Company Name
Published By: IBM     Published Date: Apr 09, 2015
How can you get actionable insight from user feedback to develop mobile apps that engage users and deliver what matters to them? The answer lies in cloud-based services that enable rapid collection and analysis of user feedback combined with automation enabling faster response.
Tags : 
application integration, mobile apps, coding, cloud-based services, cloud computing, automation, user feedback
    
IBM
Published By: bigtincan     Published Date: Oct 10, 2014
These days, business productivity depends largely on the ability to securely access and interact with a wide range of information over mobile devices, such as tablets and smartphones. From sales executives to field technicians, the demand for accessing corporate content securely on mobile devices is growing exponentially. In the past, implementing security measures to protect corporate content has involved VPNs, intranets, firewalls and passwords. However the increasing uptake of mobile devices in corporate settings means security measures must be implemented over a plethora of networks and devices. bigtincan has created a powerful solution with BigTinCan hub. An application for mobile devices, it allows for the distribution, management and governance of a range of content, including documents and rich media content, with enterprise-grade security.
Tags : 
mobile apps, mobile content, mobile security, corporate content, emerging marketing, marketing research
    
bigtincan
Published By: MobileIron     Published Date: Feb 17, 2015
Agent-based security solutions such as anti-virus software rely on controlling all processes on a system. This approach breaks in sandboxed environments as one process cannot control other aspects of the system. To secure mobile, IT has to replace traditional PC management tools with purpose-built enterprise mobility management (EMM) Platforms, designed to enable end-user productivity while securing apps, content and devices.
Tags : 
mobile, open file architecture, mobileiron, security, sandboxed
    
MobileIron
Published By: MobileIron     Published Date: Sep 22, 2014
Agent-based security solutions such as anti-virus software rely on controlling all processes on a system. This approach breaks in sandboxed environments as one process cannot control other aspects of the system. To secure mobile, IT has to replace traditional PC management tools with purpose-built enterprise mobility management (EMM) Platforms, designed to enable end-user productivity while securing apps, content and devices.
Tags : 
mobile security, mobile first era, mobile operating systems, agent-based security, emm platforms, user productivity, wireless, enterprise applications
    
MobileIron
Published By: Webtrends     Published Date: May 05, 2010
You don't have to look far to find research that shows targeted marketing is most effective. Spray-and-pray tactics barely produce much more than annoyed customers.
Tags : 
webtrends, mobile strategy, app downloads, apps, performance indicators, targeted marketing, web analytics
    
Webtrends
Published By: IBM     Published Date: Apr 09, 2015
Discover service virtualization and how it fits into the big picture of software quality. In this book, Service Virtualization For Dummies, IBM Limited Edition written by industry analysts Marcia Kaufman and Judith Hurwitz, learn how to deliver higher quality software by increase the efficiency and effectiveness of your testing processes while reducing testing downtime and testing cost. The book covers the following topics and more: • Understand the changing relationship between IT and business — quicker delivery is required • Examine today’s complex applications — mobile, web, social meet middleware, packaged apps, databases, and mainframes. • Discover how to begin with service virtualization — build your business case. • Realize the benefits of service virtualization —enable earlier testing to eliminate surprises and reduce risk.
Tags : 
service virtualization, software quality, testing processes, software testing, packaged apps, delivery, ibm, software development, it management, enterprise applications, business technology
    
IBM
Published By: IBM     Published Date: Oct 02, 2015
The book covers the following topics and more: - Understand the changing relationship between IT and business — quicker delivery is required - Examine today’s complex applications — mobile, web, social meet middleware, packaged apps, databases, and mainframes. - Discover how to begin with service virtualization — build your business case. - Realize the benefits of service virtualization —enable earlier testing to eliminate surprises and reduce risk.
Tags : 
service virtualization, software quality, efficiency, testing processes, testing, mobile applications, web applications, middleware, packaged apps, databases, security, it management, enterprise applications, business technology
    
IBM
Published By: IBM     Published Date: Nov 08, 2016
Read this paper to learn seven ways that the cloud and API's can be used to help businesses develop mobile apps.
Tags : 
ibm, connect, middleware, api, cloud, app development, enterprise applications, business technology
    
IBM
Published By: MobileIron     Published Date: Aug 04, 2016
Office 365 est la suite de productivité cloud de Microsoft. Elle comprend une version en ligne des solutions les plus connues de Microsoft, comme Exchange et SharePoint, un espace de stockage avec OneDrive et plusieurs applications mobiles, dont Word, Excel, PowerPoint, OneNote, Outlook, Publisher, Skype for Business et Yammer. Office 365 est au coeur de la stratégie d'évolution de Microsoft qui tend à devenir un fournisseur de solutions et de logiciels axés sur le mobile et le cloud. De nombreux clients MobileIron organisent également leur stratégie de productivité autour de cette suite en raison de l'utilisation croissante d'Office sur les appareils mobiles plutôt que sur les ordinateurs traditionnels. Dans ce contexte, ils exigent de pouvoir sécuriser et déployer Office 365 sur les appareils mobiles avec nos solutions.
Tags : 
mobile apps, best practices, mobileiron, phones
    
MobileIron
Published By: MobileIron     Published Date: Aug 20, 2018
In the PC era, employees operated from within a well defined enterprise IT perimeter and passwords were sufficient to establish user trust. However, in today’s mobile-cloud environment, the enterprise perimeter has dissolved and business information is available to users on a variety of endpoints, apps, services, networks, locations. In this dynamic access environment, organizations need a different approach to security that is able to: • Establish user trust using multiple factor authentication • Correlate user trust with other factors such as endpoint, app, network, and more • Apply adaptive, risk-based policies that match the user’s environment
Tags : 
security, enterprise, cloud
    
MobileIron
Published By: Cisco and NVIDIA Corporation     Published Date: Oct 22, 2018
How can IT safely enable a mobile workforce in the face of an ever changing and increasingly sophisticated world of cyber threats? The answer is a solution that securely delivers and manages seamless access to Windows desktops, apps, and data to Chrome OS, the secure by design endpoint operating system.
Tags : 
    
Cisco and NVIDIA Corporation
Published By: Microsoft     Published Date: Jul 07, 2016
Every organization and every industry is being transformed by the trend towards cloud and mobility. There is no shortage of narrow point solutions that can provide bits and pieces of the overarching solution you need – but modern IT departments face enough day-to-day challenges without having to constantly fine tune and integrate a bunch of different products. We’ve assembled a step-by-step guide to help you address the challenges you face as you work to go mobile, stay mobile, and protect your data with an end-to-end solution. Download this free e-book to learn: • How application policy relates to providing secure e-mail • How to set up policy for MAM without enrollment apps via application managed policy • How to create device configuration policies for both corporate-owned and personally owned devices • How to authenticate and authorize access to your company resources • How to get end-to-end protection for mobile e-mail up and running in your own environment.
Tags : 
technology, best practices, data, enterprise
    
Microsoft
Published By: New Relic     Published Date: Jun 05, 2014
This eBook examines the current state of mobile application performance monitoring; the challenges this is creating for mobile app development; and how the new forms of mobile APM are helping developers create better user experiences for customers and grow their businesses.
Tags : 
new relic, mobile, mobile apps, mobile app performance, apm, developers, user experiences
    
New Relic
Published By: bigtincan     Published Date: Oct 10, 2014
Enabling the mobile workforce to be productive is the ultimate goal of any mobile business initiative. While the idea that mobile devices like the iPad, Galaxy Tab and today’s leading smartphones can change how users work in the enterprise is well established, the real challenge is how to enable a mobile workforce to have device access to all the different content they need to do their job without having to circumvent security and content governance objective or require users to learn a mix of consumer oriented software tools and work in different user interfaces in order to be productive. Viewing, editing, annotating and sharing content must be available from the same application.
Tags : 
mobile apps, user enablement, mobile workforce, mobile content, emerging marketing, marketing research, e-commerce
    
bigtincan
Published By: Citrix Systems     Published Date: Nov 10, 2014
Citrix NetScaler helps your organization fully optimize, secure and control the delivery of all enterprise and cloud services. NetScaler Insight Center and ActionAnalytics deliver unprecedented visibility and enables real-time control in response to network traffic from a variety of services such as native web and mobile apps and virtual desktops.
Tags : 
optimization, enterprise, cloud services, mobile apps, virtual desktop, visibility, enterprise, organization, insight, real-time, traffic, native web, application, action analytics, netscaler, solve, control, wireless, storage
    
Citrix Systems
Published By: Mass Relevance     Published Date: Jun 12, 2014
See how USOC partnered with Spredfast (formerly Mass Relevance) to create a single, responsive social media hub for the Sochi 2014 Winter Olympic Games that combined onsite, online and mobile apps to engage fans and athletes throughout the games.
Tags : 
spredfast, mass relevance, responsive social media hub, social media strategy, sochi 2014 winter olympic games, mobile apps, fan and athlete engagement, responsiveness, wireless, data management
    
Mass Relevance
Published By: MobileIron     Published Date: Feb 05, 2016
Recent attacks targeting mobile apps and operating systems have put an unprecedented amount of mobile business data at risk. Many enterprises are unprepared to combat the latest mobile threats: One in 10 enterprises have at least one compromised device. More than 53% have at least one device that is not in compliance with corporate security policies. This white paper outlines how to protect enterprise data while realizing the transformative benefits of mobility.
Tags : 
app security, mobile apps, operating systems, corporate security, enterprise data
    
MobileIron
Published By: CA Technologies     Published Date: Aug 22, 2017
Der Aufstieg der Anwendungsprogrammierschnittstelle (Application Programming Interface, API) stellt eine geschäftliche Chance und eine technische Herausforderung dar. Unternehmensverantwortlichen bieten APIs die Gelegenheit, sich neue Umsatzquellen zu erschließen und den Kundenwert zu maximieren. Es ist jedoch Aufgabe von Unternehmensarchitekten, die APIs zu erstellen, mit denen Back End?Systeme zur Wiederverwendung in neuen Webanwendungen und neuen mobilen Apps verfügbar werden.
Tags : 
    
CA Technologies
Published By: CA Technologies EMEA     Published Date: Apr 10, 2018
Der Aufstieg der Anwendungsprogrammierschnittstelle (Application Programming Interface, API) stellt eine geschäftliche Chance und eine technische Herausforderung dar. Unternehmensverantwortlichen bieten APIs die Gelegenheit, sich neue Umsatzquellen zu erschließen und den Kundenwert zu maximieren. Es ist jedoch Aufgabe von Unternehmensarchitekten, die APIs zu erstellen, mit denen Back End?Systeme zur Wiederverwendung in neuen Webanwendungen und neuen mobilen Apps verfügbar werden. Es ist unabdingbar, dass alle Stakeholder verstehen, dass die geschäftlichen Ziele und die technischen Herausforderungen eines API-Programms eng miteinander in Beziehung stehen. Programmmanager müssen die Verantwortung dafür übernehmen, die wichtigen geschäftlichen Ziele einer vorgeschlagenen API den Architekten klar mitzuteilen, die diese API erstellen sollen.
Tags : 
    
CA Technologies EMEA
Published By: CA Technologies EMEA     Published Date: May 24, 2018
Der Aufstieg der Anwendungsprogrammierschnittstelle (Application Programming Interface, API) stellt eine geschäftliche Chance und eine technische Herausforderung dar. Unternehmensverantwortlichen bieten APIs die Gelegenheit, sich neue Umsatzquellen zu erschließen und den Kundenwert zu maximieren. Es ist jedoch Aufgabe von Unternehmensarchitekten, die APIs zu erstellen, mit denen Back End?Systeme zur Wiederverwendung in neuen Webanwendungen und neuen mobilen Apps verfügbar werden. Es ist unabdingbar, dass alle Stakeholder verstehen, dass die geschäftlichen Ziele und die technischen Herausforderungen eines API?Programms eng miteinander in Beziehung stehen. Programmmanager müssen die Verantwortung dafür übernehmen, die wichtigen geschäftlichen Ziele einer vorgeschlagenen API den Architekten klar mitzuteilen, die diese API erstellen sollen.
Tags : 
    
CA Technologies EMEA
Published By: Zebra Technologies (Bulldog)     Published Date: Sep 19, 2016
In this whitepaper we discuss the reasons for app migration, the process organizations need to go through, the choices they need to make and the ways to successfully navigate through the process.
Tags : 
mobile apps, zebra technology, next generation platforms, modern enterprise, mobile devices
    
Zebra Technologies (Bulldog)
Published By: Citrix Systems     Published Date: Nov 10, 2014
Don't let poor performance and inadequate security constrain your enterprise mobility initiatives. Accelerate and protect your mobile workspaces with innovative NetScaler MobileStream technology from Citrix.
Tags : 
optimization, enterprise, cloud services, mobile apps, virtual desktop, visibility, enterprise, organization, insight, real-time, traffic, native web, application, action analytics, netscaler, solve, control, wireless, data management
    
Citrix Systems
Published By: Good Technology Corporation     Published Date: Mar 19, 2013
Learn how to move beyond single task apps and enable the app workflows that help keep your mobile workforce productive and secure.
Tags : 
mobile collaboration, secure collaboration, secure mobile application, enterprise mobile applications, enterprise mobile apps, enterprise collaboration, business case
    
Good Technology Corporation
Start   Previous    5 6 7 8 9 10 11 12 13 14 15 16 17 18 19    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.

© 2019  Created by RecruitingBlogs.   Powered by

Badges  |  Report an Issue  |  Terms of Service

scroll to the top