HIT Consultant Insightful coverage of healthcare innovation
 

mobile erp

Results 151 - 175 of 735Sort Results By: Published Date | Title | Company Name
Published By: Workday     Published Date: Jun 05, 2017
In today’s mobile, connected and data-driven world, legacy financial management systems are failing to meet the needs of the modern enterprise.
Tags : 
workday, finance management, mobile employees, mobile workers, mobile data, cloud finance, cloud hr, hr technology
    
Workday
Published By: IBM     Published Date: May 01, 2017
If you function like most IT organizations, you've spent the past few years relying on mobile device management (MDM), enterprise mobility management (EMM) and client management tools to get the most out of your enterprise endpoints while limiting the onset of threats you may encounter. In peeling back the onion, you'll find little difference between these conventional tools and strategies in comparison to those that Chief Information Officers (CIOs) and Chief Information Security Officers (CISOs) have employed since the dawn of the modern computing era. Their use has simply become more: Time consuming, with IT trudging through mountains of endpoint data; Inefficient, with limited resources and limitless issues to sort through for opportunities and threats; and Costly, with point solution investments required to address gaps in OS support across available tools. Download this whitepaper to learn how to take advantage of the insights afforded by big data and analytics thereby usher i
Tags : 
ibm, endpoint management, mobile device management, enterprise mobility, os support, it organizations
    
IBM
Published By: Microsoft Windows Phone     Published Date: Feb 05, 2010
This paper compares the Research In Motion BlackBerry solution (BlackBerry mobile devices and BlackBerry Enterprise Server) with the Microsoft® mobile solution (Microsoft Windows Mobile® and Microsoft Exchange Server 2007 SP1 with Microsoft ActiveSync® technology) by analyzing features of the user experience and the administrator experience.
Tags : 
microsoft windows mobile, mobile work, blackberry, smartphone, exchange server 2007 sp1, activesync, secure mobile messaging, security
    
Microsoft Windows Phone
Published By: Sybase     Published Date: Aug 21, 2009
This paper provides guidance on how companies should rethink their existing management and security strategy to effectively secure mobile solutions in the workforce, over a wide array of devices, connections and applications. It details why mobile security must be included as a mission critical component of any enterprise strategy and implemented on a pro-active basis before any major security breach has the opportunity to negatively affect the enterprise.
Tags : 
security management, mobile device, mobile security, wireless security, secure laptop, secure pda, secure blackberry, network security
    
Sybase
Published By: Oracle     Published Date: Apr 22, 2015
This e-book explores how Oracle ERP Cloud can support your organisation and help you overcome key financial challenges, today and into your future.
Tags : 
finance, role of finance changing, digital, big data, mobile networking, social media, oracle, erp cloud
    
Oracle
Published By: Oracle     Published Date: Apr 22, 2015
This e-book explores how Oracle ERP Cloud can support your organisation and help you overcome key financial challenges, today and into your future.
Tags : 
finance, role of finance changing, digital, big data, mobile networking, social media, oracle, erp cloud
    
Oracle
Published By: Microsoft     Published Date: Jul 07, 2016
Enable, protect, and manage mobile productivity Protecting email and other corporate data on mobile devices—without bogging down workers—is one of today’s biggest challenges faced by IT pros today. With the massive, global proliferation of mobile devices, it can be a struggle to manage and secure these devices and your data, both on approved enterprise applications and shadow IT. Download this free e-book to learn how to control the uncontrollable and create a solution that: • Enables continuous management, so your employees are more productive. • Offers threat protection, so you can detect abnormal user behavior, suspicious activities, known malicious attacks, and security issues right away. • Guards against data leakage. • Provides security after loss or theft of mobile devices. • Helps protect your Microsoft Office email, files, and apps.
Tags : 
mobile devices, enterprise, best practices, management
    
Microsoft
Published By: HP and Intel ®     Published Date: May 27, 2014
This book makes it easier for you to understand convergence and the ways you can move forward quickly, safely, and successfully.
Tags : 
intel, converged infrastructure, mobile users, applications, virtualization, enterprises
    
HP and Intel ®
Published By: HP     Published Date: May 27, 2014
This book makes it easier for you to understand convergence and the ways you can move forward quickly, safely, and successfully.
Tags : 
intel, converged infrastructure, mobile users, applications, virtualization, enterprises
    
HP
Published By: HP and Intel ®     Published Date: May 27, 2014
The following questions were posed by HP to Jed Scaramella, research director for IDC's Enterprise Platforms and Datacenter Trends practice, on behalf of HP's customers.
Tags : 
intel, converged infrastructure, mobile users, applications, virtualization, enterprises
    
HP and Intel ®
Published By: HP     Published Date: May 27, 2014
The following questions were posed by HP to Jed Scaramella, research director for IDC's Enterprise Platforms and Datacenter Trends practice, on behalf of HP's customers.
Tags : 
intel, converged infrastructure, mobile users, applications, virtualization, enterprises
    
HP
Published By: HP and Intel ®     Published Date: May 27, 2014
The following questions were posed by HP to Jed Scaramella, research director for IDC's Enterprise Platforms and Datacenter Trends practice, on behalf of HP's customers.
Tags : 
intel, converged infrastructure, mobile users, applications, virtualization, enterprises
    
HP and Intel ®
Published By: HP     Published Date: May 27, 2014
The following questions were posed by HP to Jed Scaramella, research director for IDC's Enterprise Platforms and Datacenter Trends practice, on behalf of HP's customers.
Tags : 
intel, converged infrastructure, mobile users, applications, virtualization, enterprises
    
HP
Published By: Windstream     Published Date: Apr 03, 2014
Done correctly, organizations should gain several advantages from server virtualization and cloud computing that will improve their overall ROI: less CAPEX spending, greater flexibility and scalability, more security options and overall savings.
Tags : 
windstream, convergence, mobility, unified communications, mobile enterprise, private clouds, hybrid cloud
    
Windstream
Published By: Dell     Published Date: Dec 12, 2017
Fast-moving employees demand access to people, programs and data from anywhere. Power up their productivity with greater portability and connectivity. Begin by downloading “On the go Professional,” a brief by Dell that uncovers the key needs around convenience, connectivity and access required by mobile professionals. The brief also covers technology recommendations for you to consider, such as the robust line of Dell Latitude and Venue devices powered by Intel®, to meet the preferences of your users. Take advantage of the solutions that maximize enterprise productivity and employee satisfaction today. Download the brief now!
Tags : 
    
Dell
Published By: CDW     Published Date: Mar 27, 2015
Many, if not most, organizations today are grappling with the challenge of a growing mobile technology environment. Mobility can deliver many key benefits: improved collaboration among workers, enhanced customer service, easier access to corporate information from many locations and increased productivity—to name a few. But the proliferation of mobile devices and applications also comes with its share of challenges, perhaps none more important than ensuring the security of the devices themselves as well as the data they contain and the enterprise networks they access.
Tags : 
mobile, security, strategy, application, enterprise, network, data
    
CDW
Published By: Blackberry     Published Date: Jul 03, 2012
Prompted by individual employee and executive interest, IT decision makers are challenged to find the common ground between enterprise must-haves and end-user benefits.
Tags : 
blackberry, mobile, enterprises, smartphone, tablet
    
Blackberry
Published By: CCMI     Published Date: Jul 12, 2011
Most organizations waste millions of dollars every year by improperly managing mobile device and network service expenses. Learn the critical steps to mobile expense management (MEM) and how a SaaS solution can provide immediate return on your mobility investments while ironing out every unnecessary cost.
Tags : 
ccmi, xigo, mobile expense management, mem, telecom expense management, tem, enterprise mobility, mobile expenses
    
CCMI
Published By: VMware     Published Date: Feb 24, 2017
End users expect to be able to work anywhere, at any time, and from any device. Additionally, they expect a similar experience for accessing work apps and data across all their devices—desktop, laptop, tablet, and smartphone. Meeting these expectations is becoming more and more complex for IT teams that continue to use multiple disconnected tools to manage mobile and desktop devices. A unified endpoint management (UEM) solution provides a holistic and user-centric approach to managing all endpoints. VMware AirWatch® Unified Endpoint Management™ provides IT with a comprehensive view of asset inventory and full lifecycle management of endpoints across the organization. Read more to learn why leading organizations around the world rely on VMware AirWatch unified endpoint management for their enterprise mobility solution.
Tags : 
    
VMware
Published By: BlackBerry Cylance     Published Date: Mar 12, 2019
Today’s advanced cyber threats target every computer and mobile device, including enterprise endpoints, especially those that make up critical infrastructure like industrial control systems and embedded devices that control much of our physical world. The modern computing landscape consists of a complex array of physical, mobile, cloud, and virtual computing, creating a vast attack surface. Meanwhile, the cybersecurity industry is prolific with defense-in-depth security technologies, despite a threat landscape that remains highly dynamic, sophisticated, and automated. Cylance, however, takes a unique and innovative approach of using real-time, mathematical, and machine learning threat analysis to solve this problem at the endpoint for organizations, governments, and end-users worldwide.
Tags : 
    
BlackBerry Cylance
Published By: DellEMC and Intel®     Published Date: Jan 17, 2017
Distributed enterprises often encompass many remote offices that are essential to running the organization and supporting customers. Important activities at the edge include manufacturing, warehousing and distribution, even mobile or remote life-saving environments like health clinics. And while there is usually a central IT staff that creates the overall business architecture for the enterprise, specialized resources to deploy and maintain the infrastructure at the edge can be scarce. Intel® Xeon® Prozessor Ultrabook, Celeron, Celeron Inside, Core Inside, Intel, Intel Logo, Intel Atom, Intel Atom Inside, Intel Core, Intel Inside, Intel Inside Logo, Intel vPro, Itanium, Itanium Inside, Pentium, Pentium Inside, vPro Inside, Xeon, Xeon Phi, and Xeon Inside are trademarks of Intel Corporation or its subsidiaries in the U.S. and/or other countries.
Tags : 
ultrabook, celeron, celeron inside, core inside, intel, das intel-logo, intel atom, intel atom inside
    
DellEMC and  Intel®
Published By: Lookout     Published Date: Sep 25, 2017
Ein Überblick über die gesamte Bandbreite der mobilen Risiken für Unternehmensdaten Es ist an der Zeit, das unternehmensweite Risikomanagement zu ändern. Mobilgeräte spielen in unserem privaten und beruflichen Leben eine zentrale Rolle. In der überwiegenden Mehrheit aller Unternehmen liegt der Schwerpunkt jedoch nach wie vor auf dem Schutz traditioneller PC-Endgeräte. Um diese Entwicklung zu fördern, hat Lookout die Matrix für mobile Risiken entwickelt. Sie dient dazu, Sicherheitsorganisationen für das Risikospektrum von Mobilgeräten zu sensibilisieren und Daten bereitzustellen, die die Häufigkeit von Sicherheitsrisiken für mobile Plattformen veranschaulichen.
Tags : 
    
Lookout
Published By: HP and Intel ®     Published Date: May 27, 2014
Imagine a future where applications become the source of competitive advantage for businesses in most industries. Software can augment products and services and automate workflows, as enterprises innovate to deliver more engaging experiences to mobile users. Download to learn more!
Tags : 
intel, converged infrastructure, mobile users, applications, virtualization, enterprises
    
HP and Intel ®
Published By: HP     Published Date: May 27, 2014
Imagine a future where applications become the source of competitive advantage for businesses in most industries. Software can augment products and services and automate workflows, as enterprises innovate to deliver more engaging experiences to mobile users. Download to learn more!
Tags : 
intel, converged infrastructure, mobile users, applications, virtualization, enterprises
    
HP
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.