mobile

Results 401 - 425 of 4208Sort Results By: Published Date | Title | Company Name
Published By: Hewlett Packard Enterprise     Published Date: May 11, 2018
The widespread use of mobile devices — smartphones and tablets — provides anytime, anywhere computing and communications resources for individuals worldwide. Both smartphones and tablets have made the transition from a personal resource, acquired and supported by consumers, to a professional resource, provided and supported by employers. For midsize firms around the world, those with 100–999 employees, mobile resources play a key role in improving workplace productivity as well as allowing greater flexibility in how and where work is done. New collaboration resources also allow staff in different locations to work together as efficiently and effectively as staff in the same office. The challenge for IT management is how best to coordinate the different collaborative and mobile resources and provide secure management of mobile devices and collaboration tools while enhancing workforce agility and productivity.
Tags : 
    
Hewlett Packard Enterprise
Published By: Hewlett Packard Enterprise     Published Date: May 11, 2018
For midsize firms around the world with 100 to 999 employees, advanced technology plays an increasingly important role in business success. Companies have been adding cloud resources to supplement on-premise server, storage, and networking capabilities. At the same time, growth of mobile and remote workers is also changing how companies need to support workers to allow them to be as productive as possible. Like larger companies, midsize firms must make sure that they are effectively coordinating on-premise, public cloud, and private cloud capabilities. Unlike large companies, though, midsize firms are limited in both financial and technical resources to design and coordinate effective solutions to meet specific needs. Rather than invest in a major overhaul of their IT environments, midsize firms have to move incrementally, supplementing current resources with new cloud and on-premise capabilities that provide the performance needed to prosper in an increasingly competitive environment.
Tags : 
    
Hewlett Packard Enterprise
Published By: Hewlett Packard Enterprise     Published Date: May 11, 2018
In today’s dynamic business environment where applications and data are accessed outside of traditional corporate boundaries, IT must embrace the needs of both the business and an ever present mobile workforce. From business agility to employee efficiency, the never-ending quest for improved productivity is found in organisations across industries. And throughout it all, IT is charged with maintaining an organisation’s infrastructure, and security and access, while working to support initiatives that keep the business agile and growing, and employees productive.
Tags : 
    
Hewlett Packard Enterprise
Published By: Hewlett Packard Enterprise     Published Date: May 11, 2018
Dans un monde des affaires dynamique où les applications et les données sont utilisées en dehors des frontières traditionnelles de l’entreprise, le service informatique doit répondre aux besoins de l’entreprise aussi bien que de ses salariés mobiles. De l’agilité de l'activité à l’efficacité des salariés, les entreprises de tous les secteurs cherchent en permanence à améliorer la productivité. L’informatique a pour mission de gérer l’infrastructure, la sécurité et le contrôle des accès d’une entreprise, tout en soutenant les initiatives destinées à favoriser son agilité et sa croissance, et de veiller à la productivité des salariés.
Tags : 
    
Hewlett Packard Enterprise
Published By: Hewlett Packard Enterprise     Published Date: May 11, 2018
Das Thema Sicherheit droht, sich für Unternehmen zum Problem zu entwickeln. Die Zahl der Sicherheitsbedrohungen nimmt zu und die Angriffe werden immer raffinierter. Neue Technologien wie das IoT, mobile Lösungen und Hybrid IT-Umgebungen bieten zwar neue Geschäftschancen, bringen aber auch neue Risiken mit sich. Heutzutage reicht es daher nicht mehr aus, die Server auf Softwareebene zu schützen. Unternehmen müssen den Schutz bis auf die physischen Systeme ausweiten, um gegen Sicherheitsbedrohungen gewappnet zu sein. Angesichts der immer größeren Zahl an regulatorischen Bestimmungen im heutigen Geschäftsumfeld gewinnt die Einhaltung dieser Bestimmungen an Bedeutung – zum einen, um das Sicherheitsniveau zu verbessern, zum anderen, um die Kosten zu senken, die durch die Nichteinhaltung dieser Bestimmungen entstehen. Da diese Aspekte von so kritischer Bedeutung sind, ist es wichtig, den Schutz der Hardware zu verbessern und das Sicherheitsniveau bis auf Lieferkettenebene zu erhöhen.
Tags : 
    
Hewlett Packard Enterprise
Published By: Hewlett Packard Enterprise     Published Date: May 11, 2018
In der heutigen dynamischen Geschäftswelt erfolgt der Zugriff auf Anwendungen und Daten häufig außerhalb der Mauern traditioneller Unternehmen. Daher muss die IT die Geschäftsanforderungen mit den Anforderungen von immer mehr mobilen Mitarbeitern in Einklang bringen. Von der Unternehmensagilität bis hin zur Mitarbeitereffizienz – die ständige Suche nach höherer Produktivität vereint IT-Organisationen in allen Branchen. Zudem muss die IT die Infrastruktur eines Unternehmens pflegen und für sicheren Datenzugriff sorgen, während sie gleichzeitig Initiativen unterstützt, die die Agilität und das Wachstum des Unternehmens sowie die Mitarbeiterproduktivität erhöhen.
Tags : 
    
Hewlett Packard Enterprise
Published By: Epson     Published Date: May 10, 2018
Online, mobile, omnichannel, untethered, data mining, automation, and remote communication are all now buzzwords surrounding the new technologies and resources financial institutions have to help them re-invent their branch experience. Capabilities are available today that were not imagined a decade ago. This is an exciting time for those institutions that can look to the future and enhance their offerings. While technology is driving change, it can also be a tremendous challenge for financial institutions as they work to keep pace and even take advantage of the dramatic shift in customer needs and expectations. Millennials, baby boomers, small businesses – all are important market segments with very different wants and needs. Driven by technology, the new demand is for a complete online presence, complemented by more flexibility in personalized services, and specialized expertise available in every branch. Suffice it to say, financial institutions of all sizes and in every geography a
Tags : 
    
Epson
Published By: Epson     Published Date: May 10, 2018
This paper aims to: • Summarize recent developments in the current state of mobile transaction technology, with an emphasis on line busting as a part of mPOS systems • Highlight studies that point to mobile transaction’s projected significant short-term growth • Outline the business benefits of both mobile transactions and line busting • Provide in-depth guidance on how to evaluate mPOS systems for line-busting applications
Tags : 
    
Epson
Published By: KPMG     Published Date: May 08, 2018
Many retailers have responded with a largely outdated omnichannel approach, focusing on integrating the physical and digital channels they use to interact with customers, when the problem is actually inside the business. Today's customers will remain loyal only if a brand offers them transparency and superior quality products while actively engaging with them to build a relationship they value. Meeting those needs has nothing to do with offering another physical, digital, or mobile channel and everything to do with running the business in a way that is customer-first and customer-centric.
Tags : 
    
KPMG
Published By: KPMG     Published Date: May 08, 2018
Many retailers have responded with a largely outdated omnichannel approach, focusing on integrating the physical and digital channels they use to interact with customers, when the problem is actually inside the business. Today's customers will remain loyal only if a brand offers them transparency and superior quality products while actively engaging with them to build a relationship they value. Meeting those needs has nothing to do with offering another physical, digital, or mobile channel and everything to do with running the business in a way that is customer-first and customer-centric.
Tags : 
    
KPMG
Published By: IBM     Published Date: May 08, 2018
Our recent Ponemon Institute report reveals key findings from organizations' ability to protect their mobile and IoT apps.
Tags : 
iot application security, iot apps, security
    
IBM
Published By: MobileIron     Published Date: May 07, 2018
MobileIron knows that cybercriminals are continuously generating more advanced ways to steal your data by any means necessary. That’s why we are committed to continually innovating and delivering new solutions that help our customers win the race against time to get ahead of the latest mobile security threats. As part of that commitment, MobileIron Threat Defense supports the five critical steps to deploying advanced, on-device mobile security. Our solution provides a single, integrated app that delivers several key advantages.
Tags : 
mobile, threat, defense, security, mobileiron, cyber, criminal
    
MobileIron
Published By: MobileIron     Published Date: May 07, 2018
The types of threats targeting enterprises are vastly different than they were just a couple of decades ago. Today, successful enterprise attacks are rarely executed by the “lone wolf” hacker and instead come from highly sophisticated and professional cybercriminal networks. These networks are driven by the profitability of ransomware and the sale of confidential consumer data, intellectual property, government intelligence, and other valuable data. While traditional PC-based antivirus solutions can offer some protection against these attacks, organizations need highly adaptive and much faster mobile threat defense (MTD) for enterprise devices.
Tags : 
mobile, threat, detection, machine, ransomware, confidential, networks
    
MobileIron
Published By: MobileIron     Published Date: May 07, 2018
Enterprises and users continue to be concerned about mobile apps and mobile malware because they have been trained by legacy antivirus software packages. Look for a known malware file and remove it. The issue with this logic on mobile devices is the mobile operating systems evolve and add features very rapidly. The mobile operating systems add millions of lines of code in a year and therefore introduce unintended consequences, bugs and vulnerabilities. In 2017, there were more CVEs registered for Android and iOS than all of 2016 and 2015 combined. In 2017 there were 1229 CVEs awarded. Over half of these CVEs that received scores of 7 or greater indicated that the vulnerabilities are severe and exploitable. This trend is expected to continue as the mobile operating systems mature and more features are added.
Tags : 
global, threat, report, mobile, malware, software, antivirus
    
MobileIron
Published By: MobileIron     Published Date: May 07, 2018
This 10-point checklist outlines best practices for designing a security architecture that protects cloud data at the endpoint. Enterprise computing architectures have changed fundamentally in the last ten years, as employees consume an ever-growing collection of business cloud services through mobile apps. The traditional security approach of network perimeter and locked-down endpoints is not suitable for this app-to-cloud model of modern work.
Tags : 
cloud, best, practices, endpoint, security, data
    
MobileIron
Published By: MobileIron     Published Date: May 07, 2018
Office 365, Microsoft’s cloud-based productivity suite, includes online versions of Microsoft’s most popular solutions, like Exchange and SharePoint, storage through OneDrive, and several mobile apps, including Word, Excel, PowerPoint, OneNote, Outlook, Publisher, and Skype for Business. Office 365 is central to Microsoft’s strategy as the company evolves into a mobile-first, cloud-first software and solutions provider. Many MobileIron customers are increasingly using Office 365 on mobile devices instead of on traditional PCs. Therefore the ability to secure and deploy Office 365 on mobile devices using MobileIron is a common requirement.
Tags : 
security, office, 365, mobileiron, microsoft, cloud, onedrive, business
    
MobileIron
Published By: MobileIron     Published Date: May 07, 2018
The global BYOD and enterprise mobility market continues to experience impressive growth. Preparing for this transformation is more than just a matter of security. It’s a matter of leveraging the people, processes and tools needed to become a Mobile First organization that’s ready to explore a whole new opportunity landscape. This BYOD guide is a great first step toward achieving your mobile transformation by implementing a successful BYOD program. By following the recommendations in this guide, you can deliver a program that meets the needs and preferences of mobile workers, while upholding corporate security and budget requirements. But the true success of any BYOD program depends on its long-term sustainability, which means you must ensure the security of your corporate data, drive user adoption by supporting employees’ device preferences and maintain a flexible technology portfolio that enables business innovation.
Tags : 
guide, byod, mobility, landscape, organization, program, mobile
    
MobileIron
Published By: MobileIron     Published Date: May 07, 2018
Ready or not, the global mobility trend is forcing enterprises to enable a modern, mobile workforce with business productivity tools on any device, regardless of the underlying operating system. As enterprise users increasingly demand the ability to use their own mobile devices and desktops for modern work, IT is quickly impacted by end-user technology decisions. Enterprises can no longer ignore this reality, especially given the explosive global demand for mobile devices. Considering that smartphone adoption is expected to grow from 1.47 billion devices in 2016 to more than 1.7 billion in 2021, it’s clear that organizations need a comprehensive way to quickly onboard and secure a vast range of employee devices coming into the enterprise.
Tags : 
endpoint, management, business, workforce, desktop, device, mobile
    
MobileIron
Published By: Google Chrome Enterprise     Published Date: May 07, 2018
In the year 2016 alone, the world learned about security breaches that compromised nearly 2 billion records.1 Employee endpoints are increasingly targeted: Nearly two-thirds (64%) of external attacks last year targeted a corporate-owned, employee-owned, or mobile device.2 Data breaches cost companies time and money, weaken brand reputation, and jeopardize customer and employee trust.
Tags : 
    
Google Chrome Enterprise
Published By: Adobe     Published Date: May 04, 2018
Mobile capabilities have grown up. Strategies should, too. Over the last ten years, smartphone usage among adults has grown to 95 percent. Surprisingly, 90 percent of marketers say they’ve only had a mobile strategy for five years or less. Read The Next Mobile Decade: Adobe 2018 Mobile Maturity Study, and learn: - How 500 marketing and IT professionals tackled mobile marketing last year - Which mobile strategies the most advanced organizations put into practice - What you can do to make your brand a mobile leader in the next decade Fill out the form to get the report.
Tags : 
    
Adobe
Published By: CyberSource EMEA     Published Date: May 04, 2018
The digital economy is dramatically changing how consumers shop and interact with businesses. They expect a fast, convenient and highly secure digital experience. With the average company lifespan decreasing rapidly, merchants have to operate as a true digital enterprise to stay competitive and to stay in business. Payment and fraud management is no longer a back-office utility. It is a prime differentiator, critical to achieving competitive advantage, improving customer experience and reducing risk. Digital transformation is not simply a market buzz word. It is real. And those who don’t embrace it are in a position to lose. By 2020, eCommerce sales as a percentage of retail sales are forecast to be 12.4% compared to 8.0% in 2016, according to eMarketer. And engaging customers digitally across channels remains a top digital initiative. While there are several drivers of growth in the digital economy, none are more significant than the force of mobile and cloud technologies. Innovation
Tags : 
    
CyberSource EMEA
Published By: Zebra Technologies     Published Date: May 02, 2018
The exponential growth of omnichannel shopping and ever-burgeoning demand for faster merchandise deliveries is redefining the supply chain’s distribution of consumer products goods. A seminal shift in how shoppers increasingly buy via multiple touch points — online from desktop computers, mobile devices and in-store — has created the need for the “smarter” warehouse to serve today’s connected consumer. As retailers look to merge their brick-and-mortar and online operations to cut costs and boost efficiency, warehouse management systems must keep pace. For this report, Zebra Technologies analyzed the state of the warehousing marketplace among firms in the US and Canada with at least $15 million in annual revenues. The online survey asked IT and operations personnel in the manufacturing, retail, transportation and wholesale market segments to share their insights and business plans over the next five years, in light of a rapidly changing industry.
Tags : 
warehouse, merchandise, delivery, demand, devices, computers
    
Zebra Technologies
Published By: Zebra Technologies     Published Date: May 02, 2018
Hospitals around the globe are investing in mobile computers and it’s redefining the way healthcare is delivered. This study offers critical insights into key healthcare trends such as: The driving factors behind widespread expansion of mobile device use in the hospital What compelling, real-time advancements are promoting hospitals to further invest in technology How tech-savvy patients are pushing for increased technology use in their care
Tags : 
technology, mobile, healthcare, hospital, technology
    
Zebra Technologies
Published By: Ingenico     Published Date: May 02, 2018
The time of mobile point of sale (mPOS) has arrived. While the mission to adopt EMV has dominated the payments industry over the past few years, many hotels, resorts and casinos are now focusing their efforts on rapid planning and implementation of mPOS strategies. A number of emerging trends are driving this new focus, including an emphasis on enhancing guest experiences and building brand loyalty by leveraging digital and mobile technologies. Innovative hotels, resorts and casinos are using these solutions to create entirely new guest experiences that improve service speed and convenience while creating distinct competitive advantages. mPOS is increasingly becoming a key part of the picture, providing unique opportunities to improve guest service quality and engagement, create new efficiencies and cost savings, and strengthen their brand. This eBook will provide an overview of those opportunities, some key trends in the hotel & lodging industry, and guide you through the key requirem
Tags : 
    
Ingenico
Published By: Epicor     Published Date: May 01, 2018
We all know the wisdom of monitoring familiar key performance indicators (KPIs). Turns, gross margin return on investment (GMROI), sales, inventory measures, and other metrics will tell you how your business is faring—and that’s pretty important if you want to keep your hardware store in business. However, just staying in business isn’t enough in a rapidly evolving retail world, so achieving improved KPI results is essential. In this Epicor eBook, you’ll learn about eight easy-to-use tools that go beyond traditional KPIs to quickly improve business results, including: • Reviewing store-to-store sales • Identifying your top 100 items • Monitoring excess inventory • Viewing items with cost change and no retail change Learn more about these tools, and discover what else you can do to improve your KPI results by downloading this Epicor eBook. Download now and go beyond retail KPIs.
Tags : 
retail analytics software, analytics on demand, kpi analytics software, retail kpi software, real time analytics, retail pos software, mobile pos, reporting software, pos technology
    
Epicor
Start   Previous    10 11 12 13 14 15 16 17 18 19 20 21 22 23 24    Next    End
Search      
Already a subscriber? Log in here
Please note you must now log in with your email address and password.