mobile im

Results 1 - 25 of 1248Sort Results By: Published Date | Title | Company Name
Published By: Spok     Published Date: Jun 18, 2015
On-call schedules, patient monitors, diverse mobile devices and healthcare IT systems all contribute to a web of information that is difficult to navigate and manage. This eBrief offers nine tips to bring order and improve patient care.
Tags : 
    
Spok
Published By: Intel     Published Date: Jul 17, 2019
Today, business is conducted in a fast-paced, on-demand, globally dispersed environment. Maintaining a competitive edge requires cohesive real-time collaboration. Mobile workers, partners, vendors, suppliers, and even customers expect to be able to work together seamlessly, both inside and outside the firewall. But delivering tools for high-quality collaboration is often challenging, due to the need for businesses of all sizes to support a wide range of personal and business devices. Mixing disparate devices with complex conferencing solutions often lead to frustrated employees, while businesses face a labor-intensive, costly endeavor without a high ROI. In addition, collaboration is evolving with businesses creating small "huddle" spaces and open workspaces that increase the demand for ubiquitous, effective conferencing. The Intel Unite ' solution is a fast, simple, cost-efficient way to deliver a more secure, manageable, high-quality collaboration experience. Whether you select the
Tags : 
    
Intel
Published By: F5 Networks Singapore Pte Ltd     Published Date: Sep 09, 2019
Tech advances like the cloud, mobile technology, and the app-based software model have changed the way today’s modern business operates. They’ve also changed the way criminals attack and steal from businesses. Criminals strive to be agile in much the same way that companies do. Spreading malware is a favorite technique among attackers. According to the 2019 Data Breach Investigations Report, 28% of data breaches included malware.¹ While malware’s pervasiveness may not come as a surprise to many people, what’s not always so well understood is that automating app attacks—by means of malicious bots —is the most common way cybercriminals commit their crimes and spread malware. It helps them achieve scale.
Tags : 
    
F5 Networks Singapore Pte Ltd
Published By: Intel     Published Date: Aug 26, 2019
Distributed cloud architectures will play an important role in Communication Service Providers’ network transformations. The distributed cloud will be made of numerous edge locations, from the customer premises to mobile base stations to central offices, each of which has its benefits and constraints. CSPs will need to consider attributes such as performance, availability, security, integration, and data and traffic volume to optimize the infrastructure for a myriad of workloads. Learn more about Heavy Reading’s survey results on CSPs adopting a distributed cloud strategy and delivering new services in this white paper.
Tags : 
    
Intel
Published By: HERE Technologies     Published Date: Aug 28, 2019
Mapping, tracking, positioning and real-time data arekey to supporting defense and intelligence initiatives. Governments and agencies need location data they can trust to track and adjust fixed and mobile resources to address rapidly changing events and circumstances. With Ovum's Location Platform Index: Mapping and Navigation, agencies can assess location platform industry leaders and identify the platform that best meets their product development demands. This year, HERE Technologies cemented its role as the industry leader, earning the highest ranking, and besting Google, for the second time in a row. Download your free report to learn: The relative strengths and weaknesses of each vendor, including data, enablers and features Vendor strategies to keep up with changes in technologies and trends The specific workings of the location platform market, and to better understand what constitutes a healthy location platform and which provider offers the correct portfolio and the necess
Tags : 
data, platform, mapping, developers, index, vendors, capabilities, maps
    
HERE Technologies
Published By: Group M_IBM Q3'19     Published Date: Jun 24, 2019
Today's energy, environment, and utility companies face an unfamiliar landscape in which they must integrate alternative energies, expand situational awareness across the system, and deepen their relationships with customers-all while continuing to deliver reliable, safe, and affordable electricity, gas and water to everyone.By combining predictive analytics with IoT, cloud and mobile technologies, utilities companies can Lower costs, improve operational efficiency and increase equipment reliability.
Tags : 
    
Group M_IBM Q3'19
Published By: Iovation     Published Date: Aug 02, 2019
The digitalization of business processes and the advent of mobile computing have given rise to the next generation of fraud. Cybercriminals have a variety of tools and techniques—as well as opportunities—to steal money and services. Furthermore, traditional fraud prevention tools often fail to stop this fraudulent activity. Companies need a new approach to fraud prevention—one that stops fraud early and preserves the user experience. Companies with an online presence must have the ability to: Detect and respond to fraudulent activity before incurring losses Leverage human insight and machine learning to identify advanced fraud Work with other fraud analysts to identify larger fraud trends and stop cybercriminals on a global scale Block more fraud while reducing fraud prevention costs This book explores how companies can leverage a next-generation fraud prevention solution to stop more fraud while reducing costs and providing a positive user experience for trusted customers.
Tags : 
    
Iovation
Published By: Iovation     Published Date: Aug 02, 2019
Insurance fraud is back with a vengeance. With four out of ten mobile claims estimated to be fraudulent, using connected devices have made it easier than ever for fraudsters to commit insurance crimes. Gather insights from the live panel discussion hosted by MoneyLIVE & TransUnion. As fraud experts examine current trends & impacts of insurance fraud in today's digital age and learn how to overcome insurance fraud while protecting your customer relationships. What you will learn: Key trends behind fraud and the way in which they are impacting insurers. How to tackle fraud and identify red flags by using a holistic approach. Explore trigger points that can help warn insurers of when there is a high chance of fraudulent activity. Identify the genuine customers and their genuine claims from the fraudsters.
Tags : 
botnet, insurance claims fraud, fraud rings, account takeover
    
Iovation
Published By: Panasonic     Published Date: Apr 23, 2019
Mobility is critical to government productivity, but mobile data and devices present attractive targets to cybercriminals seeking to exploit vulnerabilities across the spectrum. Federal agencies are no strangers to cybersecurity attacks, and several recent high-profile breaches involving mobile devices demonstrate ongoing vulnerabilities in government’s expanding network of endpoints. This issue brief describes what can be done to protect devices, data and networks, including multi-factor authentication to authorization controls and user education.
Tags : 
    
Panasonic
Published By: Virtela Communications, Inc.     Published Date: Oct 12, 2011
Find out how companies have deployed remote access SSL VPNs to increase remote user satisfaction, improve accessibility to corporate resources, support business continuity planning, and reduce overall implementation and ongoing management costs. The white paper also covers how cloud-based SSL VPN services address high availability requirements, support unforeseen spikes in activity and optimize network performance. Lastly, learn how a single SSL VPN platform can support all your mobile access, telecommuting and partner extranet requirements to improve your ROI.
Tags : 
virtela, healthcare, remote user satisfaction, roi
    
Virtela Communications, Inc.
Published By: Infosys     Published Date: Sep 05, 2019
In today's hyperconnected and digitized world, cybersecurity has become an important strategic imperative owing to the sophistication of cybercrime. Digital businesses require complex and distributed interactions among people, applications and data - on premise, off-premise, on mobile devices and in the cloud. The result is an increase in the attack surfaces that are hard to protect and defend. As the perimeter continues to diminish, visibility into the environment gets tougher. Operational Technology (OT) and the Internet of Things (IoT) massively expand the scope of security strategy and operations. When a massively distributed fleet of autonomous devices that can make decisions is combined, directly affecting the physical state of people and things, there is a considerable risk to manage. This issue is not limited to the chief information security officer (CISO) but needs the involvement and sponsorship of the leadership and the board.
Tags : 
    
Infosys
Published By: Shell     Published Date: May 28, 2019
You may see recommendations for universal tractor transmission oil, anti-wear hydraulic oil, zinc free hydraulic oil, TO-4 transmission drive train oil, and more. These varying recommendations can leave one confused and asking, “Is there one hydraulic oil I could use in all of my mobile equipment?” This is a question our technical team is asked frequently; after all, hydraulic systems perform similar duties, and some components, like pumps and valves, can be common across different OEM brands.
Tags : 
    
Shell
Published By: The Economist Group     Published Date: Aug 28, 2019
In a digital world, customers expect banks to connect all the dots and deliver omnichannel experiences that are seamless, personalized, and yes, delightful. Whether your customers visit branch locations or engage on mobile apps, it’s essential that at the enterprise level, you're able to understand and anticipate their needs. Understanding your data is key to this kind of responsiveness. When you’re able to harness data and segment customers in new and exciting ways, target the right markets, and offer relevant products at the right time you can drive new opportunities, generate new revenue streams, and increase the value of every customer. To find out more download this whitepaper today.
Tags : 
    
The Economist Group
Published By: Dell APAC     Published Date: May 16, 2019
"Dell and its partners provide a range of solutions that enable their customers to transform the capabilities of the workforce. Dell commissioned Forrester Consulting to conduct a Total Economic ImpactTM (TEI) study and examine the potential benefits and costs enterprises may realize by deploying three key Workforce Enablement Solutions, namely: › Best device experience: a hardware policy combining the choice of a range of Dell PCs, tablets, and peripherals with rapid configuration and delivery. › Unified endpoint management (UEM): an integrated approach to managing mobile devices, PCs. and other workstation technologies. In this case study, implementations of Workspace ONE, VMware’s UEM solution, have been assessed. › Enterprise collaboration: includes capabilities such as messaging, conferencing, document sharing, and business use of social media. In this case study the collaboration elements of Microsoft Office 365, namely OneDrive, SharePoint, Teams, Skype for Business, and Yammer
Tags : 
    
Dell APAC
Published By: Dell APAC     Published Date: May 25, 2019
"Dell and its partners provide a range of solutions that enable their customers to transform the capabilities of the workforce. Dell commissioned Forrester Consulting to conduct a Total Economic ImpactTM (TEI) study and examine the potential benefits and costs enterprises may realize by deploying three key Workforce Enablement Solutions, namely: › Best device experience: a hardware policy combining the choice of a range of Dell PCs, tablets, and peripherals with rapid configuration and delivery. › Unified endpoint management (UEM): an integrated approach to managing mobile devices, PCs. and other workstation technologies. In this case study, implementations of Workspace ONE, VMware’s UEM solution, have been assessed. › Enterprise collaboration: includes capabilities such as messaging, conferencing, document sharing, and business use of social media. In this case study the collaboration elements of Microsoft Office 365, namely OneDrive, SharePoint, Teams, Skype for Business, and Yammer
Tags : 
    
Dell APAC
Published By: Dell APAC     Published Date: May 25, 2019
"Dell and its partners provide a range of solutions that enable their customers to transform the capabilities of the workforce. Dell commissioned Forrester Consulting to conduct a Total Economic ImpactTM (TEI) study and examine the potential benefits and costs enterprises may realize by deploying three key Workforce Enablement Solutions, namely: › Best device experience: a hardware policy combining the choice of a range of Dell PCs, tablets, and peripherals with rapid configuration and delivery. › Unified endpoint management (UEM): an integrated approach to managing mobile devices, PCs. and other workstation technologies. In this case study, implementations of Workspace ONE, VMware’s UEM solution, have been assessed. › Enterprise collaboration: includes capabilities such as messaging, conferencing, document sharing, and business use of social media. In this case study the collaboration elements of Microsoft Office 365, namely OneDrive, SharePoint, Teams, Skype for Business, and Yammer
Tags : 
    
Dell APAC
Published By: Dell APAC     Published Date: May 25, 2019
"Dell and its partners provide a range of solutions that enable their customers to transform the capabilities of the workforce. Dell commissioned Forrester Consulting to conduct a Total Economic ImpactTM (TEI) study and examine the potential benefits and costs enterprises may realize by deploying three key Workforce Enablement Solutions, namely: › Best device experience: a hardware policy combining the choice of a range of Dell PCs, tablets, and peripherals with rapid configuration and delivery. › Unified endpoint management (UEM): an integrated approach to managing mobile devices, PCs. and other workstation technologies. In this case study, implementations of Workspace ONE, VMware’s UEM solution, have been assessed. › Enterprise collaboration: includes capabilities such as messaging, conferencing, document sharing, and business use of social media. In this case study the collaboration elements of Microsoft Office 365, namely OneDrive, SharePoint, Teams, Skype for Business, and Yammer
Tags : 
    
Dell APAC
Published By: Dell APAC     Published Date: May 25, 2019
"Dell and its partners provide a range of solutions that enable their customers to transform the capabilities of the workforce. Dell commissioned Forrester Consulting to conduct a Total Economic ImpactTM (TEI) study and examine the potential benefits and costs enterprises may realize by deploying three key Workforce Enablement Solutions, namely: › Best device experience: a hardware policy combining the choice of a range of Dell PCs, tablets, and peripherals with rapid configuration and delivery. › Unified endpoint management (UEM): an integrated approach to managing mobile devices, PCs. and other workstation technologies. In this case study, implementations of Workspace ONE, VMware’s UEM solution, have been assessed. › Enterprise collaboration: includes capabilities such as messaging, conferencing, document sharing, and business use of social media. In this case study the collaboration elements of Microsoft Office 365, namely OneDrive, SharePoint, Teams, Skype for Business, and Yammer
Tags : 
    
Dell APAC
Published By: Dell APAC     Published Date: May 25, 2019
"Dell and its partners provide a range of solutions that enable their customers to transform the capabilities of the workforce. Dell commissioned Forrester Consulting to conduct a Total Economic ImpactTM (TEI) study and examine the potential benefits and costs enterprises may realize by deploying three key Workforce Enablement Solutions, namely: › Best device experience: a hardware policy combining the choice of a range of Dell PCs, tablets, and peripherals with rapid configuration and delivery. › Unified endpoint management (UEM): an integrated approach to managing mobile devices, PCs. and other workstation technologies. In this case study, implementations of Workspace ONE, VMware’s UEM solution, have been assessed. › Enterprise collaboration: includes capabilities such as messaging, conferencing, document sharing, and business use of social media. In this case study the collaboration elements of Microsoft Office 365, namely OneDrive, SharePoint, Teams, Skype for Business, and Yammer
Tags : 
    
Dell APAC
Published By: Entrust Datacard     Published Date: Oct 24, 2016
Today, mobility is no longer a trend. It’s the new reality — and it is reshaping the enterprise. Gone are the days of employees tethered to desktop computers, and they’re no longer dependent on an Ethernet or wi-fi connection to work remotely. More and more enterprise employees are conducting daily work transactions on mobile devices. Mobility surged to 1.3 billion workers in 2015, continuing a 33 percent growth trend since 2010. These mobile workers aren’t limiting themselves to a single device, either. In just the last year, the number of devices managed by enterprises grew an incredible 72 percent.
Tags : 
    
Entrust Datacard
Published By: Akamai Technologies     Published Date: May 24, 2017
Nutzer von Mobilgeräten sind heutzutage verwöhnt. Sie erwarten, dass ihnen ansprechende Inhalte blitzschnell und optimiert auf ihrem Mobilgerät bereitgestellt werden – und das noch in der gleichen Qualität wie auf dem Desktop-PC. Einerseits stellen diese permanent mit dem Internet verbundenen Nutzer eine hervorragende Geschäftschance dar. Andererseits müssen Unternehmen komplexe Herausforderungen meistern, um solch hohen Nutzererwartungen bei der mobilen Bereitstellung gerecht zu werden. In diesem E-Book werden wir drei dieser Herausforderungen näher beleuchten und Wege aufzeigen, wie Sie diese durch Optimierungen für schnelle APIs, Apps und mobile Websites meistern. So lassen sich Umsätze sowie die Kundeninteraktion und Kundenbindung steigern. Laden Sie das E-Book heute noch herunter, um zu erfahren, wie Ihr Unternehmen die heutigen Anforderungen im Mobilbereich erfüllen kann.
Tags : 
    
Akamai Technologies
Published By: HERE Technologies     Published Date: Apr 04, 2019
Artificial Intelligence (AI) has already begun to improve targeting, segmentation, media buying and planning in the advertising industry. AI algorithms can extract complex patterns from vast numbers of data points, and in so doing, are able to self-correct and learn patterns. The revenue potential that improved personalization, segmentation and targeting that AI provides to marketers is huge. At HERE Technologies, we are placing AI and machine learning at the center of our products and services. We see the opportunity in automated machine learning to enrich the targeting and effectiveness of mobile advertising campaigns in real time. But the outcome of implementing such technology depends on the quality of data being fed into it from the outset. AI wouldn’t be as helpful if it’s being used alongside questionable location data or audience data. HERE’s location data provides a strong thread that can be woven throughout every stage of the media buying process, offering more context and
Tags : 
location data, ad tech, location targeting
    
HERE Technologies
Published By: Cisco EMEA     Published Date: Nov 13, 2017
Encryption technology has enabled much greater privacy and security for enterprises that use the Internet to communicate and transact business online. Mobile, cloud and web applications rely on well-implemented encryption mechanisms, using keys and certificates to ensure security and trust. However, businesses are not the only ones to benefit from encryption.
Tags : 
anomaly detection, trust modeling, event classification, entity modeling, relationship building, internet scrapers
    
Cisco EMEA
Published By: Cisco EMEA     Published Date: May 15, 2018
Your employees, customers, and partners need the ability to connect and collaborate, at any time, from any location—across time zones or simply across the conference table. And those workplaces are expanding faster than ever, powered by mobile and cloud usage that makes virtual meetings essential. With scalable and secure voice, video, and content sharing, real-time collaboration can happen anywhere. Staying connected can lead to improved productivity and faster decision-making, as well as better customer service. But only if the technology offers a seamless experience and is intuitive enough to drive user adoption. While the need for better meetings is universal, not all conferencing tools are the same. Choosing the wrong tool could actually decrease productivity by wasting valuable meeting time troubleshooting the technology, or by providing a negative experience that will deter users from embracing it. This is especially true in situations where poor meeting quality could impact
Tags : 
    
Cisco EMEA
Published By: BigCommerce     Published Date: Oct 16, 2018
Businesses who have lived through the evolution of the digital age are well aware that we’ve experienced a generational shift in technology. The rise of software as a service (SaaS), cloud, mobile, big data, the Internet of Things (IoT), social media, and other technologies have disrupted industries and changed customers’ expectations. In our always-on, buy anything anywhere world, customers want their shopping experiences to be personalized, dynamic, and convenient. As a result, many businesses are trying to reinvent themselves. Success in a fast-paced economy depends on continually adapting and innovating. Companies have to move quickly to keep up; there’s no time for disjointed technologies and old systems that don’t serve the customer-obsessed mentality needed to thrive in the digital age.
Tags : 
    
BigCommerce
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      
Already a subscriber? Log in here
Please note you must now log in with your email address and password.