devices

Results 1226 - 1250 of 1794Sort Results By: Published Date | Title | Company Name
Published By: SAP     Published Date: Dec 20, 2010
Mobility is sweeping across the enterprise. Consider a company like Kindred Healthcare, which has boosted the productivity of its rehabilitation therapists and the accuracy of its patient records through the use of mobile devices.
Tags : 
sap, sybase, mobility, mobile workers, idc, mcommerce, healthcare
    
SAP
Published By: SAP     Published Date: Mar 24, 2011
In spite of the growth of virtual business activities performed via the World Wide Web, every business transaction or operation is performed at a physical place. And as handheld GPS devices drive a growing awareness of the concept of "location," people are increasingly looking for operational efficiencies, revenue growth, or more effective management as a result of geographic data services and location-based intelligence. In this white paper, David Loshin, president of Knowledge Integrity, Inc., introduces geographic data services (such as geocoding and proximity matching) and discusses how they are employed in both operational and analytical business applications. The paper also reviews analytical techniques applied across many types of organizations and examines a number of industry-specific usage scenarios.
Tags : 
location-based bi, business value, geographic enhancement
    
SAP
Published By: SAP     Published Date: Apr 14, 2011
Display marketers are eager to launch mobile campaigns. But they face challenges such as audience fragmentation, a chaotic vendor landscape, and myriad new technologies and devices. In order to navigate these challenges, we recommend that marketers focus on creating convenient mobile experiences by building mobile display campaigns that are simple, immediate, and contextually relevant to the section of their audience most likely to use them.
Tags : 
mobile display, melissa parrish, mobile marketers, tracking, audience fragmentation, mobile campaign, mobile experience, forrester
    
SAP
Published By: SAP     Published Date: Jun 30, 2011
This white paper will outline possible mobile device security threats and review how IT can effectively manage and secure a fleet of devices, whether they are personally owned or corporate owned. By following the strategies outlined in this paper, IT managers will learn what the greatest security risks are for mobile devices and how to effectively protect end users, their devices, and the network infrastructure from attack, harm, or lost data.
Tags : 
sap, security, smartphones, tablets, productivity, mobility, security configuration, security enforcement, secure apps, mobile management
    
SAP
Published By: Centrify Corporation     Published Date: Dec 04, 2014
The number of identities that an organization must control and secure is exploding as companies support the evolution of business. Traditional users, customers and partners, outsourced or offshore IT, support and development teams, and new users from mergers and acquisitions are working from increasingly distributed locations and devices and to be efficient they need the right set of privileges across a diverse set of servers and applications. So, how can an organization successfully control privilege for all of these identities to mitigate identity-related risk without slowing down the business? From this webinar you will learn: • Forrester’s predictions for next generation privileged identity management. • How best-in-class organizations are successfully controlling privilege and mitigating risks
Tags : 
identity management, it support, security, identity management, controlling privilege
    
Centrify Corporation
Published By: IBM     Published Date: Jul 13, 2017
Learn about a solution for electronics manufacturers to promote greater efficiency and profitability, as well as consumer satisfaction. The full spectrum of IoT electronics consists of Medical Devices, Consumer electronics and appliances, network equipment providers and many more. “These “smart, connected products”—made possible by vast improvements in processing power and device miniaturization and by the network benefits of ubiquitous wireless connectivity—have unleashed a new era of competition.”
Tags : 
iot, electronic industry, technology advancement, medical devices, greater efficiency, consumer satisfaction, data driven
    
IBM
Published By: Group M_IBM Q1'18     Published Date: Dec 20, 2017
Despite the business-transforming upsides of data from the Internet of things (IoT), there’s a downside: security. Porous networks and lax users offer tantalizing access for hackers. Although most security spending is at the enterprise level, a shift is needed to secure IoT applications and provide improved governance and accountability. Electronics companies must create secure environments that safely collect, consume, share and store data on their networks. But they also must go beyond devices and consumers to close holes to factory, ecosystem and partner networks.
Tags : 
planet scale security, iot, security, iot application, application security, partner networks
    
Group M_IBM Q1'18
Published By: ATG, Inc.     Published Date: Feb 19, 2010
As networks, devices and media converge, telecoms companies have increasingly complex catalogues of products and services on offer to customers who are, in turn, becoming more aware that they can easily switch to other providers.
Tags : 
telecom, atg, web 2.0, customer service, clicks, quocirca, mcm, multi channel marketing
    
ATG, Inc.
Published By: Appcelerator     Published Date: Jun 25, 2012
In order to capitalize on the mobile boom, retailers need to find compelling ways to integrate mobile app technology into the shopping and purchase processes.
Tags : 
appcelerator, mobile devices, build relationships, brand, mobile space, social sharing, technology
    
Appcelerator
Published By: IBM MaaS360     Published Date: Feb 05, 2015
Smart companies are realizing a vital part of any mobile device management strategy is to mitigate risk by sealing these security holes in document sharing and finding new ways to enhance information sharing across the enterprise in a secure and compliant manner.
Tags : 
mobile device management, mobile document sharing, risk mitigation, document security, byod
    
IBM MaaS360
Published By: IBM MaaS360     Published Date: Feb 09, 2015
For a deeper dive into the EMM shift, Aragon sheds light on the need for secure and managed sharing of content to mobile devices.
Tags : 
ibm, fiberlink, mobile content management, mcm, enterprise mobility management, content management, secure content
    
IBM MaaS360
Published By: IBM     Published Date: Nov 12, 2015
Hear from the University of Michigan Health System’s CMIO, Dr. Andrew Rosenberg, to learn how this institution is achieving their goal for internal/external operability in support of their enterprise analytics roadmap to support its clinical, research, education and administrative missions. Learn more about the specific challenge's that were solved, how they integrated systems of record with medical devices, and hear about their plans for future integration.
Tags : 
ibm, big data, enterprise analytics, emr, research interfaces
    
IBM
Published By: BlackBerry Cylance     Published Date: Jul 02, 2018
Phoenix Children’s CISO, Daniel Shuler, and its IT security team are responsible for protecting 5,000 endpoints in the hospital and across more than 20 clinics in the region. Endpoints include physician and staff laptops and desktops, nursing stations, servers, Windows-based clinical devices, credit card payment processors, and point-of-sale terminals. These endpoints are used to store and/or process personal health information (PHI), and payment and credit card information. They must comply with HIPAA for PHI and voluntarily comply with the Payment Card Industry Data Security Standard (PCI-DSS) for credit card data. The IT security team’s existing industry-leading AV solution claimed to provide visibility into malicious activity aimed at the endpoints. It continuously reported all endpoints were safe, sound, and secure. This caused Daniel to be suspicious. He knew from experience that such low levels of endpoint malicious activity was highly unlikely. Read the full case study to learn about the results Cylance was able to deliver.
Tags : 
hospital, cyber, security, data
    
BlackBerry Cylance
Published By: OKTA     Published Date: Mar 30, 2018
"Cloud-first, mobile-first organizations are seeing huge benefits from taking a more distributed approach to IT and user access management. Business units are given more freedom to evaluate and select SaaS applications that will enable efficiency and growth. Users are given more freedom to use the devices that make them the most productive. When this trend started, most IT organizations were able to implement some basic, manual processes to administer and govern IT in this best-of-breed distributed environment. However, as the number of touchpoints increases, IT needs to automate to keep pace and stay secure. This white paper goes into more detail on the top 5 reasons to automate identity lifecycle and identity administration with comprehensive user provisioning and build a solid foundation for future cloud-first, mobile-first IT."
Tags : 
    
OKTA
Published By: Lumension     Published Date: Feb 04, 2011
With cyberattacks inflicting increasingly greater damage following uncontrolled connection, it's time that government organizations got serious about outside threats.
Tags : 
usb security, network security, patch management, lumension, device management, security
    
Lumension
Published By: Lumension     Published Date: Jan 08, 2010
The use of portable devices can also potentially infect public systems with malware, inadvertently expose classified information and citizens' personally identifiable information, and otherwise breach the public's trust. Learn how to prevent this breach.
Tags : 
usb, flash drive, mobile security, pii, personal information, malware, government information security
    
Lumension
Published By: Druva     Published Date: Aug 05, 2016
As employees use more devices and cloud apps like Box.com, Google and O365, responding to legal hold or eDiscovery requests becomes costlier and time consuming. Read how to take a proactive approach to eDiscovery data collection for data within and outside the firewall, thereby reducing the risks and costs of litigation.
Tags : 
cloud backup, enterprise, cloud computing, best practices, storage
    
Druva
Published By: Group M_IBM Q418     Published Date: Sep 10, 2018
Every day, companies generate mountains of data that are critical to their business. With that data comes a clear challenge: How do you protect exabytes of data that's strewn across global data centers, computer rooms, remote offices, laptops, desktops, and mobile devices, as well as hosted by many different cloud providers, without choking business agility, employee productivity, and customer experience? The solution lies not in throwing more technology at the network, but in taking specific steps to identify malicious actions and respond to them in order to fix the issue, a process known as operationalizing security.
Tags : 
    
Group M_IBM Q418
Published By: SAS     Published Date: Mar 06, 2018
Digital transformation is a reality for marketers that is wrapped in both opportunities and headaches. Marketers understand the choices and expectations that their customers now have, and they are up for the challenge. But marketers also have many obstacles to overcome to deliver the consistently good, timely and engaging customer experience, across devices, that customers demand. The good news is that the marketing technology industry is rapidly evolving to address these challenges. And in the same way that consumers have an abundance of choices, marketers also have many options when it comes to choosing partners to help. But where to start, and how to choose the right partners?
Tags : 
    
SAS
Published By: SAS     Published Date: Mar 06, 2018
The Internet of Things enables retailers to do three basics better and faster: 1) Sensing who customers are and what they’re doing, 2) Understanding customer behavior and preferences, and 3)Acting on that insight to create a more engaging customer experience. - There are high-potential IoT applications in supply chain, in “smart store” operations, and especially in providing an engaging experience to the “connected customer.” IoT data can anticipate where the customer is headed and how to meet her there. - Much of the IoT ground, in both data management and analytics, may be unfamiliar. Retailers and their IT organizations have to be realistic about the technological challenges, their own capabilities, and where they need assistance. - To differentiate through IoT, focus on the analytics. Devices and their data — and even their platforms — are commodities. Advantage goes to the retailer who does the most with the data to engage the connected customer.
Tags : 
    
SAS
Published By: SAS     Published Date: Jun 11, 2018
Electric vehicle technology touches all areas of the utility business, including IT, forecasters and grid operations. The growth of IoT-connected devices, both in the utility-owned grid and customer-owned smart energy apps, makes this a rich field for innovation. But what analytics infrastructure is needed in order to manage the future demand coming from EVs? And what opportunities and risks do EVs present? This white paper from Navigant Research, sponsored by SAS and Intel, explores the analytics infrastructure that utilities need to prepare for and benefit from the growth of EVs.
Tags : 
    
SAS
Published By: Qualys     Published Date: Jan 11, 2017
With attackers using increasingly-sophisticated ways to break into systems, manual methods of locating and inspecting devices on your network are no longer enough. The right Vulnerability Management (VM) solution can monitor your environment, enabling you to: discover devices running in your network, determine whether they are vulnerable to attack, find fixes to the underlying problems, and protect yourself while those fixes are being implemented
Tags : 
information security, it compliance, it audit, it security, network security, web application security, application security
    
Qualys
Published By: Diskeeper Corporation     Published Date: Jun 08, 2007
This document will explain the behavior and benefit of implementing Diskeeper defragmentation software with intricate modern hardware technologies such as RAID, NAS and SANs. SANs, NAS devices, corporate servers, and even high end workstations and multimedia-centric desktops characteristically implement multiple physical disk drives in some form of fault tolerant disk striping (RAID).
Tags : 
san, sans, storage, raid, network attached storage, nas, storage management, defrag, defragment, defragmentation, fault tolerance, diskeeper, diskkeeper, disk keeper
    
Diskeeper Corporation
Published By: NewField IT     Published Date: Aug 19, 2008
As offices review their office printing costs, one significant area almost entirely overlooked is the cost of having A3 devices. The perception is that the A3 document is as necessary to our office printing needs as power-steering is to our cars. The reality, as evidenced by NewField IT's review of more than 70,000 devices supporting over 200,000 users, is that A3 output in the office is remarkably low – less than 2.5% of total page volumes on average.
Tags : 
    
NewField IT
Published By: NewField IT     Published Date: Aug 19, 2008
The printer salesman began his pitch: "Once upon a time there was a poor, dull document that was of interest to no-one. Its vital information was ignored by one and all, and it stayed unloved and unlovely at the bottom of a drawer in the kingdom of Officeland." NewField IT is an independent consultancy practice with primary data covering 28 countries and over 70,000 devices. In this paper, they take an impartial look at the use of colour in an office, its advantages and the cost to a business.
Tags : 
    
NewField IT
Start   Previous    43 44 45 46 47 48 49 50 51 52 53 54 55 56 57    Next    End
Search      
Already a subscriber? Log in here
Please note you must now log in with your email address and password.