HIT Consultant Insightful coverage of healthcare innovation
 

mobile erp

Results 701 - 725 of 745Sort Results By: Published Date | Title | Company Name
Published By: DocuSign     Published Date: Feb 13, 2017
"As HP digitized its contracting process with DocuSign, it went from 23 steps down to 7. Contracts are signed in 4 days down from 23 days—a 93% improvement in turnaround time. ""Our workforce is mobile; our salesforce is mobile. People want to do things on their laptops, tablets and smartphones. DocuSign enables us to do that. It is a digital enterprise solution."" -- Nick Gunn, SVP of Global Corporate Services at Hewlett-Packard. See more of their story.
Tags : 
    
DocuSign
Published By: Attachmate     Published Date: Mar 20, 2013
Quickly and efficiently package your applications into any format for any device. Deliver enterprise applications wherever and whenever users need them. With Verastream.
Tags : 
soa project, mobile now, mobilenow, screen scraping, terminal emulation iphone, terminal emulation ipad
    
Attachmate
Published By: Good Technology Corporation     Published Date: Apr 29, 2013
Security and management are critical to enterprise mobility—but they’re also complex. Dive deeper in this virtual roundtable with guests from Forrester Research, Inc., Good, and BoxTone. Learn more about mobile security trends, concerns, and myths.
Tags : 
mdm, mobile device management, emm, enterprise mobility, mobile application management, enterprise mobility, mobile security
    
Good Technology Corporation
Published By: VMware     Published Date: May 10, 2017
As a cloud-based business services suite, Microsoft® Office 365™ provides organizations with access to web, mobile and desktop versions of traditional Office software tools, cloud storage space for enterprise file sharing, and hosted services for communication and social. By making these services available across desktop, mobile, and web platforms, Microsoft is experiencing increased adoption from both consumers and businesses while expanding the possibilities for anytime-anywhere collaboration. Yet for all its promise, Office 365 poses a meaningful adoption and security challenges for the IT organization. Download this whitepaper to discover how VMware Workspace ONE™ brings together the power of VMware AirWatch® and VMware Identity Manager™ to accelerate and secure Office 365 deployments.
Tags : 
    
VMware
Published By: VMware AirWatch     Published Date: Mar 02, 2017
As a cloud-based business services suite, Microsoft® Office 365™ provides organizations with access to web, mobile and desktop versions of traditional Office software tools, cloud storage space for enterprise file sharing, and hosted services for communication and social. By making these services available across desktop, mobile, and web platforms, Microsoft is experiencing increased adoption from both consumers and businesses while expanding the possibilities for anytime-anywhere collaboration. Yet for all its promise, Office 365 poses a meaningful adoption and security challenges for the IT organization. This is where VMware Workspace™ ONE™ comes in — we’ve brought together the power of VMware AirWatch® and VMware Identity Manager™ to accelerate and secure Office 365 deployments.
Tags : 
    
VMware AirWatch
Published By: VMware     Published Date: Feb 24, 2017
As a cloud-based business services suite, Microsoft® Office 365™ provides organizations with access to web, mobile and desktop versions of traditional Office software tools, cloud storage space for enterprise file sharing, and hosted services for communication and social. By making these services available across desktop, mobile, and web platforms, Microsoft is experiencing increased adoption from both consumers and businesses while expanding the possibilities for anytime-anywhere collaboration.
Tags : 
    
VMware
Published By: Polycom     Published Date: Mar 13, 2015
We are now in a world of Unified Communications (UC) and your employees are using many devices and modalities to communicate. A phone is still needed, but its use as a “stand-alone” device is changing as end users now have a wider range of communications options afforded by UC including chat, video, and communications on a phone or mobile devices (BYOD). As IM becomes the new dial tone (“U there?”, “Is now a good time to talk”), when your users want to talk, they expect to be able to place their phone call from their UC client. For most companies today, that UC client is Microsoft® Lync®. While the user may want to place their phone call from Lync, they also want to be able to use a telephone dial pad to dial numbers, access features with convenient feature keys, and be able to choose between using a handset, headset, or speakerphone—and they want to use their phones in ways that are fully integrated with their Lync client.
Tags : 
mobile, lync, unified communication, concept, brand, enterprise, voice, products
    
Polycom
Published By: GENBAND     Published Date: Sep 11, 2014
GENBAND’s NUViA™ voicemail solution changes the economics of acquiring and managing voicemail. Eliminate end of life platforms that are expensive to maintain while adding new mobility services that make users more productive. Integrates with your existing PBXs or IP-PBXs.
Tags : 
voicemail, solution, managing, economics, platforms, pbx, mobility, messaging
    
GENBAND
Published By: Oracle     Published Date: Feb 21, 2018
Transform Your Business with Artificial Intelligence (AI) AI is on the verge of broad adoption, and Mobile will be at the forefront of this digital transformation through the use of intelligent chatbots! Introducing Oracle Mobile Cloud, Enterprise Learn about Oracle’s new Intelligent Bots platform and check out the chatbot demo Listen to Oracle's Suhas Uliyar and Exelon's Rajesh Kumar Thakur discuss how AI is impacting how customers interact with businesses Learn of the new Customer Experience Analytics capabilities for web, mobile, and chatbots
Tags : 
    
Oracle
Published By: Box     Published Date: Jun 11, 2014
Watch this webcast to learn what's really happening in the mobile space and how you can use mobile tech to transform your business. You'll hear examples of innovative companies and what they're doing and learn to use new technology to optimize how your employees access and share info, allowing them to get more work done.
Tags : 
box, mobile, enterprise, mobile tech, technology
    
Box
Published By: MuleSoft     Published Date: May 02, 2016
This is a webinar about the path to becoming a mobile enterprise.
Tags : 
mobile, enterprise, applications, scalable
    
MuleSoft
Published By: Lookout     Published Date: Dec 13, 2018
The world has changed. Yesterday everyone had a managed PC for work and all enterprise data was behind a firewall. Today, mobile devices are the control panel for our personal and professional lives. This change has contributed to the single largest technology-driven lifestyle change of the last 10 years. As productivity tools, mobile devices now access significantly more data than in years past. This has made mobile the new frontier for a wide spectrum of risk that includes cyber attacks, a range of malware families, non-compliant apps that leak data, and vulnerabilities in device operating systems or apps. A secure digital business ecosystem demands technologies that enable organizations to continuously monitor for threats and provide enterprise-wide visibility into threat intelligence. Watch the webinar to learn more about: What makes up the full spectrum of mobile risks Lookout's Mobile Risk Matrix covering the key components of risk How to evolve beyond mobile device management
Tags : 
    
Lookout
Published By: BlackBerry     Published Date: Oct 03, 2012
Tablet computers are making significant inroads in the enterprise - and in a recent survey of over 150 executives, Research In Motion® explores which features are most important.
Tags : 
mobile enterprise, mobile computing platform, tablet, tablet computers, blackberry
    
BlackBerry
Published By: Blackberry     Published Date: Oct 03, 2012
Tablet computers are making significant inroads in the enterprise - and in a recent survey of over 150 executives, Research In Motion® explores which features are most important.
Tags : 
mobile enterprise, mobile computing platform, tablet, tablet computers, blackberry
    
Blackberry
Published By: BMC Software     Published Date: Jan 31, 2014
“Exploring Business and IT Friction: Myths and Realities,” outlines key issues that cause friction between business users and IT, such as: • Gaps in customer satisfaction and the perceived value of services • Inadequate IT support, which decreases productivity and revenue • Lack of communication and ownership in how business users and IT work together to identify service levels and technology needs See what 900 business and IT professionals had to say and get recommendations for change.
Tags : 
bmc, cosumerized technology, cloud technology, mobile technology, social technology, customer-first, modernized work processes, social-enabled enterprise applications
    
BMC Software
Published By: Financial Force     Published Date: Dec 01, 2017
Traditional business models are getting shattered by subscriptions. No one can doubt the new services economy is flourishing. The cloud, mobile, digital, connected devices, globalization - all these things have had a hand in reshaping business and powering new business models. Companies today are wrapping service-based business models and while this shift adds new complexities for finance and has major revenue recognition implications, it also gives finance leaders huge opportunities to become bigger value creators for their business and make a stronger impact on enterprise-wide strategies - not financials.
Tags : 
    
Financial Force
Published By: FinancialForce     Published Date: Dec 01, 2017
Traditional business models are getting shattered by subscriptions. No one can doubt the new services economy is flourishing. The cloud, mobile, digital, connected devices, globalization - all these things have had a hand in reshaping business and powering new business models. Companies today are wrapping service-based business models and while this shift adds new complexities for finance and has major revenue recognition implications, it also gives finance leaders huge opportunities to become bigger value creators for their business and make a stronger impact on enterprise-wide strategies - not financials.
Tags : 
    
FinancialForce
Published By: MobileIron     Published Date: Feb 12, 2019
MobileIron is uniquely capable of helping customers leverage the new enterprise features in iOS 12. We enable users around the world to securely access hundreds of applications and cloud services from any of their devices.
Tags : 
    
MobileIron
Published By: Polycom     Published Date: Mar 13, 2015
Polycom uniquely brings together Microsoft Lync software, a strategic alliance with Crestron and its own industry-leading audio/visual technology for an intuitive and collaborative experience for every member of your team.
Tags : 
mobile, unified communication, concept, brand, enterprise, voice, products, services
    
Polycom
Published By: Lookout     Published Date: Aug 30, 2017
In this eBook, you’ll learn about the difference between securing mobility and mobile security, why EMM/MDM solutions alone aren’t security, and the kinds of attacks your mobile fleet might be facing.
Tags : 
mobile security, device security, device attacks, enterprise mobile security
    
Lookout
Published By: Nativeflow     Published Date: Feb 25, 2014
Are your employees using WhatsApp? Is mobile messaging taking over an ever-growing portion of your enterprise communications? Is your enterprise running into compliance considerations around messaging? Learn about approaches to addressing these challenges so that your employees can communicate on the go and your enterprise data will be protected.
Tags : 
whatsapp, enterprise communication, employees, enterprise data protection, enterprise data, mobile protection, mobile messaging
    
Nativeflow
Published By: Aternity     Published Date: Feb 24, 2016
In this brief, the focus will be on how companies are relying on more mobile applications to run their businesses. As these mobile applications become more important, it is critical for companies to ensure a quality mobile user experience in order to deliver quality service to ensure customer satisfaction and brand loyalty. A unified approach to mobile end user experience monitoring is the proven way enterprises can ensure this quality user experience.
Tags : 
aternity, mobile strategy, mobile apm, unified monitoring, mobile applications, brand loyalty
    
Aternity
Published By: IBM     Published Date: Jun 13, 2018
In the digital era, businesses in every industry are becoming technology companies. New business models such as “product as a service” (in which traditional manufacturers and distributors are driving new revenue streams by integrating software-based services into their offerings) and new operational models, such as collaboration, social business, and mobile platforms, mean that nearly every company is deriving at least part of its revenue from cloudbased solutions. So, why are so many of these new cloud solution providers building their businesses on shaky foundations? The truth is, when your business is based in the cloud, you need more than on-demand leased compute and storage capacity. You need a cloud that is enterprise-grade, secure, and resilient. Equally important—and overlooked by too many cloud solution providers—you need a cloud platform that is able to grow your business into the future, supporting next-generation functionality like Artificial Intelligence (AI). No matter wh
Tags : 
    
IBM
Published By: Canon Solutions America     Published Date: Feb 28, 2019
Today’s data breaches are planned and executed with military precision. This Security Brief reveals how cybercriminals can get in and out of your network without being detected. It also gives you tips for helping secure your data, documents, and devices.
Tags : 
canon security solutions, security printing, secure printing, print security, secure print solutions, secure printing, secure documents, document security
    
Canon Solutions America
Published By: Canon Solutions America     Published Date: Mar 28, 2019
Today’s data breaches are planned and executed with military precision. This Security Brief reveals how cybercriminals can get in and out of your network without being detected. It also gives you tips for helping secure your data, documents, and devices.
Tags : 
canon security solutions, security printing, secure printing, print security, secure print solutions, secure printing, secure documents, document security
    
Canon Solutions America
Start   Previous    16 17 18 19 20 21 22 23 24 25 26 27 28 29 30    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.