HIT Consultant Insightful coverage of healthcare innovation
 

mobile software

Results 151 - 175 of 232Sort Results By: Published Date | Title | Company Name
Published By: BlackBerry     Published Date: May 11, 2009
Research In Motion (RIM) has made its name by providing email to wireless devices for more than ten years. It has made wireless email available around the globe and has pioneered a number of the technologies that are needed to provide seamless integration between corporate and desktop email systems and BlackBerrys in the field.
Tags : 
blackberry, mobile applications, cio, pim, voip, smartphones, it communication, microsoft exchange
    
BlackBerry
Published By: Frontrange     Published Date: Mar 13, 2013
Data is now accessed via physical and virtual desktops, laptops and mobile devices. IT organizations struggle to control and manage this widening pool of devices. View this Computerworld Survey to better understand the solutions to these challenges.
Tags : 
it service management, itsm, service desk, service catalog, service management software, mobile service management, cloud itsm, service manager
    
Frontrange
Published By: Abacus Labs     Published Date: Jan 11, 2019
Abacus is a real time expense reporting solution that processes individual expenses as they flow into the system. No expense report required. It provides finance teams unprecedented visibility into spend and minimizes the work required to submit expenses. At one time, the most efficient way to get expense documentation from employees to the finance team was to tape receipts together and fill out templated forms. Today we have mobile cameras, automated accounting software, and convenient apps for peer-to-peer payments. We live in a world of real time data. You should be able to submit your expenses as easily as you pay a friend for your half of dinner!
Tags : 
    
Abacus Labs
Published By: Abacus Labs     Published Date: Jan 11, 2019
Abacus is a real time expense reporting solution that processes individual expenses as they flow into the system. No expense report required. It provides finance teams unprecedented visibility into spend and minimizes the work required to submit expenses. At one time, the most efficient way to get expense documentation from employees to the finance team was to tape receipts together and fill out templated forms. Today we have mobile cameras, automated accounting software, and convenient apps for peer-to-peer payments. We live in a world of real time data. You should be able to submit your expenses as easily as you pay a friend for your half of dinner!
Tags : 
    
Abacus Labs
Published By: Epicor     Published Date: Apr 17, 2018
More and more sporting goods and outdoor sports retailers are using the rich and robust Epicor® Eagle N Series® solutions for higher profits and faster growth—all while building loyal customer relationships. Now, with hundreds of additional enhancements built in, Epicor Eagle N Series software can help you streamline nearly everything you do for your business so you can focus on running more efficiently and profitably. With Eagle N Series, you can: • Simplify everyday processes—natural, intuitive workflows whisk you through everyday activities, plus it includes specialty tools for firearms compliance and equipment rentals • Manage complex inventory despite seasonal and trend-based demand swings • Improve overall business performance—make fast, informed decisions using intuitive on-screen analytics and dashboards What do businesses powered by Eagle N Series have to say about it? Read on to find out.
Tags : 
sporting goods pos software, retail pos software, sporting goods, inventory management, improve business efficiencies, smarter retailers, customer engagement software, customer loyalty software
    
Epicor
Published By: Riverbed DE     Published Date: Oct 16, 2017
What is the key benefit of SD-WAN? To provide seamless access to digital services for end-users. But IT is more distributed, fragmentary, and dynamic than ever, with hybrid apps, hybrid networks, and remote and mobile users everywhere. Hardware-bound legacy networks can never fulfill the promise of seamless access. Taming the chaos of today’s IT requires a new approach to networking. This is the promise of software-defined wide area networks (SD-WAN)—the ability to use plain-language business policies to automate and orchestrate all the components of digital access. Read this white paper to learn how SD-WAN lets you: • Manage centrally from a cloud console with a comprehensive view of your connectivity fabric that spans and unifies datacenter/cloud apps, branch/mobile users, and enterprise/cloud networks. • Orchestrate globally using business policy-based automation to define quality of service and access privileges for all apps/users. • Deploy locally with zero touch via automated
Tags : 
cloud optimization, cloud efficiency, cloud management, cloud assurance, cloud visibility, enterprise management, data management
    
Riverbed DE
Published By: BlackBerry     Published Date: Nov 08, 2008
This paper is the first in a four-part series examines the ways that wireless technology and mobile communications can enhance the efficiency and quality of institutional healthcare, improving the processes through which doctors, nurses, specialists and support staff members deliver medical treatment. Part One offers an overview of the current healthcare situation and suggests ways in which wireless technology solutions address healthcare challenges.
Tags : 
blackberry, healthcare, voip, it communication, microsoft exchange, mobile device management, mobile device management software, mobile workers
    
BlackBerry
Published By: BlackBerry     Published Date: Oct 04, 2008
This paper outlines the multitude of benefits that the BlackBerry solution offers to doctors, nurses, support staff and other clinical workers.
Tags : 
blackberry, healthcare, voip, smartphones, it communication, microsoft exchange, mobile device management, mobile device management software
    
BlackBerry
Published By: BlackBerry     Published Date: Oct 12, 2008
The healthcare industry has lagged behind other industry sectors in adopting wireless technologies. Is the problem one of functionality, reliability or suitability to the required tasks? Or, is it simply the conservative nature of healthcare, where a solution must be of proven value and unassail-able virtue before investments are made and policies are changed. This paper examines the characteristics of wireless mobility solutions and considers how effectively these solutions meet healthcare industry requirements.
Tags : 
blackberry, healthcare, voip, smartphones, it communication, microsoft exchange, mobile device management, mobile device management software
    
BlackBerry
Published By: Riverbed     Published Date: Aug 19, 2014
Riverbed Optimization System (RiOS™) is the software that powers Riverbed’s unique award-winning line of Steelhead™ application acceleration appliances and Steelhead Mobile client software.
Tags : 
optimization, wan bandwidth, high-latency, traffic, wan
    
Riverbed
Published By: Riverbed     Published Date: Aug 22, 2014
The Riverbed Optimization System (RiOS™) is the software that powers Riverbed’s unique award-winning line of Steelhead™ application acceleration appliances and Steelhead Mobile client software. RiOS is based on patented technologies that solve a range of problems affecting wide area networks (WANs) and application performance.
Tags : 
optimization, rios, technical, software, application, acceleration, technologies, solve problems
    
Riverbed
Published By: IBM     Published Date: Mar 17, 2009
PTC, the Product Development Company® today announced that Samsung Electronics Co., LTD (SEC), a leading digital products manufacturer of mobile phones, televisions, and semiconductors, has selected PTC Windchill as its digital product development data repository to manage an integrated BOM of mechanical, electrical and software data across its globally distributed product development environment. Windchill is the standard enterprise PLM solution at SEC because of its powerful, Web-based support of key product development processes on a single technology architecture and execution environment.
Tags : 
ibm, telelogic, samsung, ptc windchill, press release, electronics industry, product development, global bom
    
IBM
Published By: CA Technologies EMEA     Published Date: Apr 10, 2018
Ein neues Security-Modell, das Sie verstehen und nachahmen sollten. Die Security in Unternehmen ähnelte bisher einer Festungsstrategie, die Anwenderendpunkte abschottete und Mauern um das Netzwerk baute. Heutzutage kann diese Strategie die Nutzung von Mobile Devices und SaaS-Funktionen (Software-as-a-Service), die sich außerhalb der Festung befinden, nicht mehr unterstützen. Daher haben sich Chief Information Security Officers (CISOs) nach neuen Lösungen umgesehen, die diese Technologien heute sichern können und die sich einer Zeit anpassen, in der sich sowohl Bedrohungen als auch Unternehmensanforderungen verändern.
Tags : 
    
CA Technologies EMEA
Published By: Dell     Published Date: Oct 24, 2014
Employees are increasingly using bring-your-own devices (BYOD) to work and accessing corporate IT resources from home. Until now, management of BYOD within IT was piecemeal, with most organizations cob¬bling together solutions that included mobile device management software, unified access suites, security, and hardware. Read this technology brief to learn how Windows Server 2012 R2 takes the guesswork and integration out of BYOD security and administration, providing one point of control and management for IT organizations.
Tags : 
byod, mobile device mangement, secure mobility
    
Dell
Published By: BlackBerry     Published Date: Mar 23, 2010
It's no secret: Smartphones are infiltrating the corporate world and making employees more productive. Their use is no longer dictated by IT departments that provision them to executives and salespeople.
Tags : 
blackberry, mobile applications, cio, pim, voip, smartphones, it communication, microsoft exchange
    
BlackBerry
Published By: CDW     Published Date: Oct 10, 2013
Guidance on the strategies and tools needed for a secure and productive bring-your-own-device program. Security is a prime concern with a BYOD initiative and organizations must adjust their security strategy to accommodate increased mobility, particularly for BYOD users.
Tags : 
device defense, security, mobile device, byod, mobile security, encryption, secure software, securing data
    
CDW
Published By: MobileIron     Published Date: May 07, 2018
Office 365, Microsoft’s cloud-based productivity suite, includes online versions of Microsoft’s most popular solutions, like Exchange and SharePoint, storage through OneDrive, and several mobile apps, including Word, Excel, PowerPoint, OneNote, Outlook, Publisher, and Skype for Business. Office 365 is central to Microsoft’s strategy as the company evolves into a mobile-first, cloud-first software and solutions provider. Many MobileIron customers are increasingly using Office 365 on mobile devices instead of on traditional PCs. Therefore the ability to secure and deploy Office 365 on mobile devices using MobileIron is a common requirement.
Tags : 
security, office, 365, mobileiron, microsoft, cloud, onedrive, business
    
MobileIron
Published By: Symantec Corporation     Published Date: Feb 25, 2014
The explosive growth of the mobile apps market presents a tremendous opportunity for software developers and cybercriminals alike.  Infected apps are not only a threat to mobile device users, but also to network and platform providers, device manufacturers, and the reputation of the industry as a whole. Fortunately, developers can protect their code – and their customers – with a straightforward and easy-to-manage technology: code signing certificates. This white paper details the rise of mobile applications and why code signing certificates are essential to protecting the entire mobile apps ecosystem.
Tags : 
mobile apps, symantec, cybercriminals, security, mobile applications, code signing, malware
    
Symantec Corporation
Published By: Symantec Corporation     Published Date: Jun 24, 2014
The explosive growth of the mobile apps market presents a tremendous opportunity for software developers and cybercriminals alike.  Infected apps are not only a threat to mobile device users, but also to network and platform providers, device manufacturers, and the reputation of the industry as a whole. Fortunately, developers can protect their code – and their customers – with a straightforward and easy-to-manage technology: code signing certificates. This white paper details the rise of mobile applications and why code signing certificates are essential to protecting the entire mobile apps ecosystem.
Tags : 
security, mobile, mobile app, code, mobile application, code signing
    
Symantec Corporation
Published By: HP - Enterprise     Published Date: Aug 31, 2011
New headlines provide ongoing evidence that IT Security teams are losing the battle against attackers, reinforcing the need to address the security of enterprise applications.This Analyst Insight reviews several practical steps you can take to get started now.
Tags : 
"application security", cyber-attacks, software security assurance, dast, sast, security breach, data breach, owasp
    
HP - Enterprise
Published By: Symantec     Published Date: Oct 02, 2012
The Latest Code Signing Technology
Tags : 
mobile, application, market, software, code, signing, technology
    
Symantec
Published By: Symantec Corporation     Published Date: Feb 25, 2014
Due to recent innovations in the mobile device industry, demand for mobile applications has soared. Meanwhile, malware continues to infect sites at an explosive rate. Mobile application developers need to secure their code and content to protect the integrity of their software and the reputation of their business. This business guide discusses how the latest code signing technology works to secure software code and content for mobile applications, along with why code signing platforms need to be flexible, scalable, user-friendly, and easily adaptable to different mobile operating platforms.
Tags : 
symantec, mobile, mobile applications, security
    
Symantec Corporation
Published By: Symantec Corporation     Published Date: Jun 24, 2014
Due to recent innovations in the mobile device industry, demand for mobile applications has soared. Meanwhile, malware continues to infect sites at an explosive rate. Mobile application developers need to secure their code and content to protect the integrity of their software and the reputation of their business. This business guide discusses how the latest code signing technology works to secure software code and content for mobile applications, along with why code signing platforms need to be flexible, scalable, user-friendly, and easily adaptable to different mobile operating platforms.
Tags : 
security, software, mobile, mobile application, malware, code signing
    
Symantec Corporation
Published By: Zebra Technologies     Published Date: Sep 11, 2017
THE WORKFORCE MOBILITY REVOLUTION IS HERE. SET IN MOTION THE OPPORTUNITIES WHEN YOU SELECT THE RIGHT DEVICE.
Tags : 
mobile technologies, machine to machine communication, automation increase, accurate data capture, team collaboration, mc92000 mobile computer, mobility dna software, traceability
    
Zebra Technologies
Published By: LogMeIn Rescue     Published Date: Oct 21, 2013
Customer service has evolved from a reactive activity viewed largely as a cost center-based tactical necessity, to a proactive management task that can in many ways set a company apart from the competition. At the same time, the channels by which customers receive support are growing and fragmenting very rapidly. The telephone is still the primary mode of support, but is steadily declining as text, social media, chat, knowledge bases, email and online communities provide new avenues for customers to get the help they need. Some organizations are embracing this evolution by implementing technologies that enable them to interact with customers regardless of the channel or the device they’re using. This approach not only improves customer service, but also boosts the brand image and helps companies achieve broader business goals.
Tags : 
logmein, infoworld, customer service, customer support, support, support strategy, social media, mobile support
    
LogMeIn Rescue
Start   Previous    1 2 3 4 5 6 7 8 9 10    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.