HIT Consultant Insightful coverage of healthcare innovation
 

mobile erp

Results 526 - 550 of 745Sort Results By: Published Date | Title | Company Name
Published By: IBM     Published Date: Oct 06, 2015
This paper explores the implications of cloud, big data and analytics, mobile, social business and the evolving IT security landscape on data center and enterprise networks and the changes that organizations will need to make in order to capitalize on these technology force.
Tags : 
networks, ibm, redefining networks, cloud, analytics, mobile, social, security
    
IBM
Published By: IBM     Published Date: Oct 08, 2015
Sign up for this 20-minute webcast to better understand how this mobile enterprise application platform and associated application deployment and management capabilities can be leveraged to win, serve, and retain customers.
Tags : 
ibm, mobile, forrester, app development, mobilefirst, enterprise
    
IBM
Published By: IBM     Published Date: Oct 08, 2015
This infographic succinctly explains the value of our Mobile Platform for key stakeholders -- developers, IT managers, app owners and users, and CISOs.
Tags : 
ibm, mobilefirst, analytics, enterprise, application, application development
    
IBM
Published By: IBM     Published Date: Oct 09, 2015
Mobilephobia: A family of fears typically impacting CISOs and other security professionals associated with embracing and deploying a mobile security strategy that enables access across the enterprise, sharing of corporate data or interaction with associates, customers and other third parties via mobile devices and applications.
Tags : 
    
IBM
Published By: IBM     Published Date: Jan 07, 2016
This infographic shows the key points on the path to a secure mobile enterprise, and how holistic protection from IBM can help organizations move beyond device security and extend protection to sensitive content, applications and transactions.
Tags : 
ibm, security, mobile, enterprise, application
    
IBM
Published By: IBM     Published Date: Feb 02, 2016
This white paper will examine why becoming a mobile enterprise may be the best choice for your organization, how cloud can help you accelerate your transformation into a mobile enterprise, and the important things to consider when designing a mobile enterprise.
Tags : 
ibm, cloud, mobile, enterprise
    
IBM
Published By: IBM     Published Date: Feb 29, 2016
This paper explores the implications of cloud, big data and analytics, mobile, social business and the evolving IT security landscape on data center and enterprise networks and the changes that organizations will need to make in order to capitalize on these technology force.
Tags : 
ibm, network, cloud, analytics, mobile, social, big data, it security
    
IBM
Published By: IBM     Published Date: Apr 04, 2016
When you think about mobile security and policies, do you ever think about all the places your enterprise data is going? We operate in a mobile economy, with an estimated 16M mobile devices infected by malware at any given time. There are more mobile devices connected to the Internet than human beings in the world. The question is: Are we prepared for that?
Tags : 
ibm, ciso, mobility, mobilephobia, mobile security
    
IBM
Published By: IBM     Published Date: Apr 27, 2016
Adopting new mobile applications usually brings with it legitmate concerns related to security and risk mitigation. This technical white paper explains how IBM MobileFirst Platform can address some of the unique security challenges of mobile applications by helping you to: - Protect on-device data through encryption, offline authentication and other security features - Integrate IBM MobileFirst Platform with your existing enterprise security infrastructure - Prevent the mass distribution of tampered copies of your original application - Enforce security updates to your mobile applications
Tags : 
ibm, ibm mobilefirst, mobile, mobile application, app, mobile application security
    
IBM
Published By: IBM     Published Date: May 24, 2016
Join Forrester and IBM to learn how, clients are leveraging mobile and cloud to transform their businesses and bring new innovations to market. Understand how organizations can continuously deliver high quality mobile enterprise applications that leverage Cloud computing to securely integrate with their IT systems opening up new sources of revenue and innovation. Forrester Principal Analyst John M. Wargo will share insights Forrester has gleaned from conversations with clients deploying packaged solutions and building custom applications using cloud services. IBM's Botond Kiss will provide insight into how leading organizations are using cloud to accelerate their mobile transformation.
Tags : 
ibm, forrester, cloud, mobile, mobile applications
    
IBM
Published By: IBM     Published Date: Oct 21, 2016
By next year over half of all US companies will formally support BYOD, bringing on the challenge of securing data and applications on devices that may often be in the hands malicious users, or worse – teenagers looking to win a game of Pokémon Go with mom’s work iPhone. And, thanks to the consumerization of IT, mobile users increasingly expect the same smooth user experience with business applications that is provided by popular games and consumer applications. Fortunately, increased mobility and the bring your own device explosion don’t always add up to increased security challenges and UI/UX struggles. This Tech Byte series will look at the most important considerations when planning a mobile strategy – from application development platform to security and governance to user interface guidelines, and present best practices that businesses of all kinds can use to help ensure a successful shift towards a mobile-first enterprise.
Tags : 
ibm, mobile, mobile security, devices, platform to device
    
IBM
Published By: IBM     Published Date: Oct 21, 2016
By next year over half of all US companies will formally support BYOD, bringing on the challenge of securing data and applications on devices that may often be in the hands malicious users, or worse – teenagers looking to win a game of Pokémon Go with mom’s work iPhone. And, thanks to the consumerization of IT, mobile users increasingly expect the same smooth user experience with business applications that is provided by popular games and consumer applications. Fortunately, increased mobility and the bring your own device explosion don’t always add up to increased security challenges and UI/UX struggles. This Tech Byte series will look at the most important considerations when planning a mobile strategy – from application development platform to security and governance to user interface guidelines, and present best practices that businesses of all kinds can use to help ensure a successful shift towards a mobile-first enterprise.
Tags : 
ibm, cloud, mobility, enterprise, mobile applications, mobile application strategy
    
IBM
Published By: Gizmox     Published Date: May 24, 2012
In this Webinar, Jeffrey Hammond of Forrester Research discusses those trends, their challenges and why organizations need to rethink their application development strategies.
Tags : 
webgui, ajax frameworks, mobile, virtualization, visualwebgui, silverlight, winforms, enterprise
    
Gizmox
Published By: Cisco     Published Date: Jul 11, 2016
As the corporate landscape becomes increasingly mobile, and workers collaborate across a growing range of devices, organizations are implementing an agile and secure unified communications infrastructure. Active deployment of UC technology solutions has been on the rise among enterprises; however, adoption among midsize businesses has been notably slower. Yet in seeking ways to do more with less, midsize organizations are increasingly turning to the cloud and converged networks to provide UC solutions. In October 2013, Cisco commissioned Forrester Consulting to dive deeper into the current usage trends and perceptions of unified communications among midsize organizations (100 to 999 employees) across North America, Asia, and Europe.
Tags : 
    
Cisco
Published By: IBM     Published Date: May 01, 2017
If you function like most IT organizations, you've spent the past few years relying on mobile device management (MDM), enterprise mobility management (EMM) and client management tools to get the most out of your enterprise endpoints while limiting the onset of threats you may encounter. In peeling back the onion, you'll find little difference between these conventional tools and strategies in comparison to those that Chief Information Officers (CIOs) and Chief Information Security Officers (CISOs) have employed since the dawn of the modern computing era. Their use has simply become more: Time consuming, with IT trudging through mountains of endpoint data; Inefficient, with limited resources and limitless issues to sort through for opportunities and threats; and Costly, with point solution investments required to address gaps in OS support across available tools. Download this whitepaper to learn how to take advantage of the insights afforded by big data and analytics thereby usher i
Tags : 
ibm, endpoint management, mobile device management, enterprise mobility, os support, it organizations
    
IBM
Published By: IBM     Published Date: Oct 19, 2017
Customer engagement has emerged as the most critical competitive factor in the current environment. Fueled by widespread mobile access and constant social connectedness, customers are demanding that every interaction, across every channel, be simple, streamlined and seamless. High expectations mean high stakes. When options abound and patience is low, customers don’t stick around. Companies need to get it right the first time. This new customer-centric standard and the ability to connect directly with customers is fueling a depth and breadth of enterprise reinvention. Ensuring that every customer experience across every conceivable channel delights and adds value calls for a Smarter Process approach and a new perspective on business process management.
Tags : 
    
IBM
Published By: IBM     Published Date: Oct 13, 2017
IBM Security offers one of the most advanced and integrated portfolios of enterprise security products and services. The portfolio, supported by world-renowned X-Force research, provides security intelligence to help organizations holistically protect their infrastructures, data and applications, offering solutions for identity and access management, database security, application development, risk management, endpoint management, network security and more. These solutions enable organizations to effectively manage risk and implement integrated security for mobile, cloud, social media and other enterprise business architectures. IBM operates one of the world’s broadest security research, development and delivery organizations, monitors 15 billion security events per day in more than 130 countries, and holds more than 3,000 security patents.
Tags : 
it security, malware, malware protection, virus prevention, ibm, threat intelligence
    
IBM
Published By: Akamai     Published Date: Apr 10, 2015
Enterprise network architectures are evolving as a result of the growth of public cloud, proliferation of mobile devices, and organizational requirement to collaborate with global users. In this on-demand webinar, Gartner Research VP and Distinguished Analyst Mark Fabbi and Akamai Technologies' Enterprise Web Experience Product Manager, Greg Lord, will provide insight into this new trend.
Tags : 
akamai, web performance, cloud services, network management, cloud networking, digital enterprise
    
Akamai
Published By: IBM     Published Date: May 09, 2013
Employee-owned mobile devices are in the enterprise to stay. But the explosion in the numbers and types of mobile devices spawns questions that organizations must address if they are to gain the most benefits possible from employees, their devices and the business network.
Tags : 
mobility, control, change, employees, business network, mobile devices
    
IBM
Published By: BlackBerry     Published Date: Mar 12, 2013
Installing BlackBerry® Mobile Fusion, upgrading licenses, preparing apps and more – learn how to make your organization’s transition to BlackBerry® Enterprise Service 10 smooth and seamless.
Tags : 
it manager, blackberry, tips, blackberry enterprise service 10, organization transition
    
BlackBerry
Published By: Blackberry     Published Date: Mar 12, 2013
Mobile Computing Corp Inc. (MCC) specializes in mobile field service solutions. After a rigorous trial period, the company’s CEO concluded that “the strength of BlackBerry 10 is great.” Find out what made the experience so positive.
Tags : 
mobile computing corp, implementing blackberry 10, feedback, enterprise
    
Blackberry
Published By: OutSystems     Published Date: Nov 07, 2014
New research conducted for OutSystems by independent research company Opinion Matters uncovers key mobile trend statistics. The study polled US and UK enterprises and found that organizations are currently struggling with a significant mobile backlog and unable to cope with business demands. Download this report today and learn about the key findings from this study.
Tags : 
mobile apps, it statistics, mobile trend statistics, mobile app backlog
    
OutSystems
Published By: OutSystems     Published Date: Nov 07, 2014
This paper chronicles the adventures and misadventures of the enterprise mobile app journey based on our observations working with industry leaders who have weathered three years of pain to arrive at the same conclusions.
Tags : 
mobility, mobile devices, web apps, enterprise mobile app development
    
OutSystems
Published By: IBM     Published Date: Oct 10, 2013
Mobility is now a business fact of life. Will your organization be one with mobile capabilities or a truly mobile enterprise? The new IBM white paper “Building the mobile enterprise: integrated, secure and productive” explains the difference and offers a checklist of eight key items to consider when planning your mobility initiatives.
Tags : 
mobile enterprise, secure and productive, mobile checklist, securing mobiles, build mobile enterprise, planning mobilities, mobility initiatives, mobile capabilities
    
IBM
Published By: IBM     Published Date: Oct 10, 2013
This paper outlines practical “how-to” guidance to strategize and implement more effective mobile enterprise programs and details the robust capabilities that mobile enterprise partners can bring to the development and support of your corporate owned device or BYOD mobile enterprise programs. It focuses on mobile enterprise programs for employees, as opposed to customers.
Tags : 
effective mobile enterprise, enterprise programs, mobile enterprise, guidance to strategize, guidance to implement, implement efficiently, effective implementation, corporate device
    
IBM
Start   Previous    16 17 18 19 20 21 22 23 24 25 26 27 28 29 30    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.