mobile

Results 4201 - 4225 of 4237Sort Results By: Published Date | Title | Company Name
Published By: Motorola     Published Date: Feb 06, 2008
The need for the services provided by Specially for Children has continued to increase, placing extra demands on the group's physicians. To improve their efficiency, doctors began carrying multiple devices including cell phones, pagers and PDAs. Learn how Good Mobile Messaging helped the organization streamline its operation.
Tags : 
motorola, motorola good, case study
    
Motorola
Published By: Motorola     Published Date: Feb 06, 2008
Webcor's industry is highly competitive. To maintain and build on its leadership position, the company's employees must be able to clearly communicate and quickly respond to a wide range of stakeholders, including customers, architects, contractors and manufacturers. This case study details how Good™ Mobile Messaging helped Webcor employees stay on top of things.
Tags : 
motorola, case study, motorola good
    
Motorola
Published By: Motorola     Published Date: Feb 05, 2008
Get an overview of how Good™ Mobile Intranet can put the power of your intranet and mobile applications on your fleet of handhelds.
Tags : 
intranet, intranets, motorola, motorola good, mobile, wireless, mobile applications
    
Motorola
Published By: Motorola     Published Date: Feb 05, 2008
Read this overview of Good™ Mobile Messaging to learn how it can deliver all your enterprise e-mail, calendars, contacts and more—directly to your mobile workers—all in real time.
Tags : 
motorola, motorola good, mobile messaging, wireless messaging, mobile applications, wireless applications, productivity, wireless, mobile
    
Motorola
Published By: ESET     Published Date: Feb 01, 2008
With the ever evolving threat landscape, what will 2008 hold for IT Managers?  This podcast provides a high level overview of a few trends to watch for this year.
Tags : 
2008 predications, it security predictions, it security, mobile devices, laptops, endpoint, operating systems, antivirus, spam, viruses, trojans, rootkits, malware, threats, eset, nod32, trends, security, networks, spyware
    
ESET
Published By: Absolute Software     Published Date: Jan 29, 2008
Does your PC lifecycle management (PCLM) reflect the issues associated with mobile users? Many organizations face expensive inefficiencies by not managing mobile assets effectively. These inefficiencies include dispersed and manual data collection, and inventory tools that are dependent on a connection to the company network.
Tags : 
absolute, intel, laptop, saas, managing laptops, pclm, computrace, absolute software, it asset management, remote data delete, geolocation tracking, theft recovery, service guarantee, lock down, rapid recovery, stolen, data defense, theft deterrence, pc protection, tpm
    
Absolute Software
Published By: Secure Computing     Published Date: Jan 25, 2008
This paper discusses the value of two-factor authentication systems that provide vital access security for today's mobile workforces, who can now be productive from numerous remote locations: the home office, the airport, hotels, and customer sites. Moreover, the ubiquitous nature of mobile phones has now given rise to a new, convenient form factor for the software-based authenticator that resides right on the mobile phone/device.
Tags : 
cell phone, cell phones, wireless security, mobile security, mobile workers, authentication, 2-factor authentication, iam, identity management, access control, securecomputing, secure computing
    
Secure Computing
Published By: Secure Computing     Published Date: Jan 25, 2008
Enterprises are increasingly opening up their networks to a greater constituency of remote users, but they often do not take into consideration the protection of user identity as a critical component of their strategy. The mobile workforce can now work productively from a remote location such as a home office, the airport, a hotel, or a customer site.
Tags : 
cell phone, cell phones, wireless security, mobile security, mobile workers, authentication, 2-factor authentication, iam, identity management, access control, securecomputing, secure computing, remote access
    
Secure Computing
Published By: Secure Computing     Published Date: Jan 25, 2008
In an environment where business and government databases store ever-increasing amounts of sensitive and confidential data; and where a growing number of employees need to access that data remotely, password security alone is insufficient to ensure user authentication. Two-factor authentication requires two measures for users to verify their identities and access data.
Tags : 
cell phone, cell phones, wireless security, mobile security, mobile workers, authentication, 2-factor authentication, iam, identity management, access control, securecomputing, secure computing, password, password management, passcode, best practices, remote access
    
Secure Computing
Published By: ElcomSoft     Published Date: Dec 06, 2007
Rapid development of digital technologies and electronic communication, availability of mobile PCs and smart phones, abundance of tools for creating documents or high-quality presentations coupled with constantly growing volumes of information and yearning for doing business more effectively leads to switching to electronic exchange of information.
Tags : 
pdf, acrobat, adobe acrobat, document security, secure content, secure pdf, password recovery, pdf password, elcomsoft, portable document, document management
    
ElcomSoft
Published By: Deep Software     Published Date: Nov 14, 2007
With so much of today's commerce being conducted electronically, providing staff with internet access has become a business necessity. The improper use of e-mail and instant messengers can lead to extremely expensive lawsuits, and the proliferation of mobile devices has made it considerably easier for errant employees to steal sensitive information. This white paper will detail the risks to which organizations that do not monitor their employees are exposed and explain the right way for organizations to go about monitoring.
Tags : 
security, security management, access control, identity management, data protection, email security, iam, authentication, instant messaging, tracking, workforce, workforce management, employee management, deep software
    
Deep Software
Published By: WiChorus     Published Date: Nov 05, 2007
Rising demand for multimedia applications and mobile usage requires new paradigm to shift voice-oriented cellular architecture into data-oriented networks in order to serve bandwidth hungry packet based applications which include but not limited to multimedia gaming, mobiTV, streaming media, P2P, etc. Data oriented network requires 20-fold fatter air link and backhaul as compared to typical voice communication.
Tags : 
wimax, access controller, asn-gw, gateway, base station, ofdma, edge router, farpoint group, controller, wichorus
    
WiChorus
Published By: Advantix Communications     Published Date: Oct 26, 2007
Today, most healthcare professionals carry mobile phones. These phones are capable of sending and receiving text messages; immediately, non-intrusively and cost effectively. Text messaging has opened up a revolutionary way for healthcare organizations to interact with their health care staff.  This document will help the reader to understand the costs associated with current staffing organizations' communications and identify a cost effective alternative.
Tags : 
nurse communications, sms for healthcare, sms for health care, text messaging communications, cell phone messaging, cellphone messaging, mobile phone messaging, health care text message, healthcare text message, health care professionals, healthcare professionals, health care communications, healthcare communications, health care messaging, healthcare messaging, healthcare technology, health care technology, wireless healthcare, wireless health care, nurse communication
    
Advantix Communications
Published By: PKWARE     Published Date: Oct 22, 2007
Text-messaging, or SMS, usage is on the rise while email usage is falling. Meanwhile many more mobile phones than personal computers are sold around the world. Long story short: Marketers who want to reach consumers with targeted campaigns had better put an SMS strategy in place. mobileStorm's new white paper, "SMS Or Die," explains why mobile marketing, particularly SMS marketing, is the ideal platform to reach consumers.
Tags : 
sms marketing, mobile marketing, email marketing, text messaging, text marketing, sms, sms, mobile, email, text, sms messaging, mobile messaging, mobilestorm, mobilestorm
    
PKWARE
Published By: WiChorus     Published Date: Oct 12, 2007
Wireless technologies are migrating from complex hierarchical voice-oriented architectures to flatter, low latency, all-IP based designs – reducing cost and complexity for service providers while efficiently supporting real time IP services. Coupled with this trend is the migration to higher performance OFDMA air links with MIMO and AAS, providing much greater bandwidth with improved interference characteristics.
Tags : 
wimax, access controller, asn-gw, gateway, base station, ofdma, edge router, farpoint group, controller, wichorus
    
WiChorus
Published By: Quocirca     Published Date: Sep 07, 2007
Companies are faced with increasing pressures on the communications capabilities they offer their employees.  More employees are mobile, working from home or in other remote locations with a growing need to talk and share information with their colleagues.  This cuts across fixed and mobile communications, but businesses still want the flexibility of mobile, and the costs, predictability, quality and service models of fixed.
Tags : 
telecom, quocirca, mobility, soho, voip, ip telephony, convergence, small business, wi-fi, wifi, united kingdom, mobile
    
Quocirca
Published By: OneNeck IT Services     Published Date: Aug 24, 2007
This case study explores the IT challenges of Targus, a global supplier of mobile computing cases and accessories, and how OneNeck helped Targus achieve their IT goals.
Tags : 
oneneck, erp hosting, erp outsourcing, it outsourcing, it hosting, j.d. edwards, oracle, baan, infor, axapta, microsoft dynamics ax, fusion, outsourcing, governance, outsource, targus, case study
    
OneNeck IT Services
Published By: Motorola     Published Date: Aug 09, 2007
Mobile devices represent a tremendous productivity advantage for today’s mobile worker. However, IT organizations must give consideration to the deployment of device security policies in order to provide the level of security that enterprises require.
Tags : 
mobile workers, mobile security, wireless security, mobile computing, mobility, enterprise security, network security, lost, stolen, disgruntled, data erase, authentication, compliance, wireless, encryption, motorola, good technology
    
Motorola
Published By: Motorola     Published Date: Aug 09, 2007
Wireless access to enterprise information is going mainstream. However, while the groundswell of enthusiasm for wireless access is coming from the bottom up, the management of wireless access needs to be driven from the top down. Learn how you can build a solid wireless strategy for your organization.
Tags : 
wireless, mobility, mobile computing, wireless security, remote access, fleet management, mobile workforce, mobile worker, productivity, roi, motorola, good technology, application optimization
    
Motorola
Published By: Motorola     Published Date: Aug 09, 2007
In this paper, two case studies illustrate different approaches to unlocking the value of existing investments through mobilization. Each case study provides an overview of an application we mobilized, identifies the characteristics that made the application a good candidate and explains the value realized by enabling access to these applications from mobile devices.
Tags : 
applications, mobile applications, mobility, mobilization, pda application, optimizing applications, mobile computing, mobile workers, productivity, treo, smartphone, smart phone, blackberry, motorola, good technology, application optimization
    
Motorola
Published By: PEAK Technologies, Inc.     Published Date: Jul 05, 2007
Today's competitive, agile business demands anytime/anywhere connectivity and access to real time data. Outdated technology, security concerns and compliance requirements are forcing companies throughout industries to consider migrating to advanced wireless systems for supply chain operations.
Tags : 
scm, supply chain management, mobile computing, mobile data systems, real-time data, wireless systems, supply chain productivity, supply chain compliance, supply chain technology, wireless technology, wireless technologies, peak, peak technologies
    
PEAK Technologies, Inc.
Published By: Salesforce.com     Published Date: Apr 26, 2007
This paper summarizes the key ingredients for a successful on-demand implementation. Find out how you can benefit from the knowledge gained by the Salesforce.com Global Services organization, as outlined in the seven domains described in this paper.
Tags : 
salesforce, salesforce crm, crm, customer relationship management, mobile, saas, sales tools, best practices
    
Salesforce.com
Published By: Infor     Published Date: Apr 19, 2007
This paper includes a comparison between using RFID and barcoding for asset management as well as real-life examples of how RFID technology is being used by enterprising organizations today to gain significant time savings and enable better asset and maintenance management.
Tags : 
wireless, wireless hardware, wireless infrastructure, rfid, radio frequency, mobile data systems, asset management, barcode, barcoding, infor, erp
    
Infor
Published By: PEAK Technologies, Inc.     Published Date: Apr 19, 2007
Download this paper now and read why many businesses now recognize that comprehensive management of their wireless device infrastructure is a crucial component of a total IT enterprise management solution.
Tags : 
wireless, infrastructure, wireless infrastructure, wireless device, wireless networking, wlan, mobile computing, it management, tco, total cost of ownership, peak, peak technologies
    
PEAK Technologies, Inc.
Published By: Trapeze Networks     Published Date: Apr 16, 2007
This paper identifies the requirements for next-generation WLANs, examines the limitations of existing approaches, and describes an innovative WLAN architecture from Trapeze Networks called Smart Mobile™, which overcomes those limitations.
Tags : 
802.11n, wireless, wi-fi, wireless local area network, wlan, wireless network, mobile, voice over ip, voip, voice over wlan, vowlanm, network access points, infrastructure, controllers, switches, network management, trapeze networks, cisco, aruba
    
Trapeze Networks
Start   Previous    156 157 158 159 160 161 162 163 164 165 166 167 168 169 170    Next    End
Search      
Already a subscriber? Log in here
Please note you must now log in with your email address and password.