HIT Consultant Insightful coverage of healthcare innovation
 

worker

Results 276 - 300 of 608Sort Results By: Published Date | Title | Company Name
Published By: Motorola     Published Date: Aug 09, 2007
In this paper, two case studies illustrate different approaches to unlocking the value of existing investments through mobilization. Each case study provides an overview of an application we mobilized, identifies the characteristics that made the application a good candidate and explains the value realized by enabling access to these applications from mobile devices.
Tags : 
applications, mobile applications, mobility, mobilization, pda application, optimizing applications, mobile computing, mobile workers
    
Motorola
Published By: Motorola     Published Date: Feb 05, 2008
Read this overview of Good™ Mobile Messaging to learn how it can deliver all your enterprise e-mail, calendars, contacts and more—directly to your mobile workers—all in real time.
Tags : 
motorola, motorola good, mobile messaging, wireless messaging, mobile applications, wireless applications, productivity, wireless
    
Motorola
Published By: Motorola     Published Date: Feb 06, 2008
In this paper, Aberdeen details how best-in-class organizations equip and manage their mobile workforce. You can also determine the steps your organization needs to take in order to maximize productivity for your road warriors.
Tags : 
mobility, wireless, remote workers, road warrior, global roaming connectivity, mobile device, cellular data cards, vpn
    
Motorola
Published By: Motorola     Published Date: Feb 06, 2008
This White Paper outlines how mobile solutions help organizations work efficiently in a global business environment. It also discusses how organizations can best create processes around device usage, data/service access and security.
Tags : 
mobile strategy, wireless, mobility, adoption, htc, mobile workers, security, network
    
Motorola
Published By: Motorola     Published Date: Feb 06, 2008
Mobile Messaging—a standards-based, wireless messaging application and management system that connects mobile workers to enterprise e-mail, contacts, calendar, notes and more. All with a messaging architecture that incorporates end-to-end encryption of all data.
Tags : 
mobile, wireless, mobile messaging, wireless messaging, motorola, motorola good
    
Motorola
Published By: Motorola     Published Date: Feb 06, 2008
Maintaining security while providing mobile workers with access to the information they need, when and where they need it, is complex. This white paper helps you understand the risks associated with mobile applications, handhelds and wireless networks—then shows you how Good Mobile Messaging helps you address these issues.
Tags : 
wireless, mobile, wireless security, mobile messaging, motorola, motorola good
    
Motorola
Published By: Motorola     Published Date: Feb 06, 2008
This case study details how Allen Boone Humphries Robinson improved efficiency and exceeded client expectations with help from Good™ Mobile Messaging.
Tags : 
mobility, productivity, mobile, mobile workers, case study, motorola, motorola good
    
Motorola
Published By: Computhink     Published Date: Dec 10, 2007
TMCC's Financial Aid Department (FA) stores about 14,000 hardcopy files, and processes approximately 7,000 new applications a year. FA workers were running out of space to house all of the files when they were told their office might be moved, resulting in the loss of their file room altogether. Since they are required by the U.S. Department of Education to keep files for four years (sometimes longer depending on a specific regulation) they knew converting to an electronic file system would save both time and money while serving their students better.
Tags : 
college, university, education, school, case study, paperless, document management, electronic document management
    
Computhink
Published By: SafeNet     Published Date: Jul 20, 2010
This paper compares the strengths and weaknesses of hardware- and software-based authentication approaches, and offers five key considerations for evaluating which approach is right for the specific needs of your organization.
Tags : 
safenet mobile, hardware and software authentication, teleworker, smart phone, remote access, deployment, tco, security
    
SafeNet
Published By: Webroot UK     Published Date: Dec 20, 2013
The workplace technology landscape has changed dramatically over the past five years, and the security threats have changed along with it. This whitepaper will show you the growing factors that IT professionals can't afford to ignore.
Tags : 
webroot, mobile apps, mobile workers, mobile devices, accessing networks, workplace technology, security threats, infographic
    
Webroot UK
Published By: Symantec.cloud     Published Date: Apr 27, 2010
Our latest research uncovers the legal risks from employee use of the email & internet.
Tags : 
messagelabs symantec, email legal risk, internet security, copyright infringement, confidentiality, remote worker
    
Symantec.cloud
Published By: Symantec.cloud     Published Date: Aug 10, 2010
Off-the-shelf instant messaging (IM) lets malware into the Enterprise, and compromises regulatory compliance and copyright protection. Find out how a secure IM service can keep you covered.
Tags : 
messagelabs us, instant messaging, malware, information mobile worker, saas, security risk
    
Symantec.cloud
Published By: Box     Published Date: May 31, 2012
Here's how some of the nation's most progressive corporations are meeting the many needs of their mobile workers - without overwhelming their IT departments - with the help of Box.
Tags : 
mobile, mobile worker, communication devices, free online storage, online storage, file sharing, online file storage, share files online
    
Box
Published By: Jive Software     Published Date: Dec 02, 2014
Millennials have changed the way we communicate and as they move into the workforce, they expect the flexibility to be as productive, collaborative and connected in the workplace as they are in their personal lives. By 2015, millennials will make up the majority of the workforce, requiring companies to change the way they do business to accommodate these new workstyles. This shift starts with technology, but in the end is about creating a more collective and connected way to work for everyone.
Tags : 
workforce statistics, millenials, collaborative workforce
    
Jive Software
Published By: HP     Published Date: Nov 27, 2012
Download this white paper to learn how you can deliver a consistent worker experience and enable fast adoption and easy management with Lync.
Tags : 
unified communications, unified collaboration, collaboration, microsoft lync
    
HP
Published By: BMC Software     Published Date: Jan 31, 2014
IT is embracing to this new world of consumerized technology, with a focus on its own employees as internal customers. Explore how customer-first policies can make use of social, mobile and cloud technologies to give workers the freedom and flexibility they desire to drive company productivity. Please download the white paper for more information.
Tags : 
bmc, cosumerized technology, cloud technology, mobile technology, social technology, customer-first, modernized work processes, social-enabled enterprise applications
    
BMC Software
Published By: Salesforce.com     Published Date: Feb 12, 2014
The nature of today’s business climate means that now, more than ever, companies look for any business advantage that helps them stay ahead of the competition. Often, that means companies take such steps as creating innovative products, increasing and maintain customer loyalty, and implementing cost-control measures to realize distinct advantages. Leading industry analysts point to two areas internally where companies can achieve the best possible advantages, by focusing on a company’s workers and work processes.
Tags : 
it service management, cloud platform, collaboration, it service management, saas, it help desk, productivity, it assistance
    
Salesforce.com
Published By: Code42     Published Date: Jul 12, 2017
Read the white paper today to learn how to keep your data on endpoints beyond your network.
Tags : 
deduplication,  worker productivity,  backup solution,  recover data, data security,  protecting data
    
Code42
Published By: Windstream     Published Date: Mar 26, 2014
Whether you supply the devices or support a BYOD approach, Unified Communications (UC) makes it easier for your mobile workforce to stay connected.
Tags : 
windstream, byod, unified communications, mobile workers, telecommuters, connection, collaboration
    
Windstream
Published By: Polycom     Published Date: Jul 24, 2014
Build or buy? When manufacturers have sought new leaders, they have typically done both: grooming talent in-house and paying market rates for the best thinkers and managers. With the growing STEM (science, technology, engineering, and mathematics) shortage, companies will be harder-pressed to buy – and keep – top technical talent. Emerging and established leaders will command premium prices and field continual offers, increasing the likelihood they’ll make frequent job changes, taking their industry and institutional knowledge with them. As a consequence, manufacturers will need to build their talent pipeline, empower knowledge workers with the tools and intelligence they need to succeed, and provide professional development opportunities that exceed what competitors offer. This will be a marathon, not a sprint. What’s key to making the race for talent successful: virtual training environments that accelerate learning and innovation.
Tags : 
polycom, management, virtual, training, development
    
Polycom
Published By: Code42     Published Date: Apr 22, 2016
Today, in the age of information, people are paid for their ideas: to create original knowledge products or add value to existing products. Given their self-reliance, it is not surprising that workers take pride in their outputs—up to half of employees take a portfolio of files with them when they leave. When employees move on, many feel entitled to the work they’ve created.They presume it is acceptable to transfer work documents to personal computers, removable media, tablets, smartphones or online file sharing apps. Some pilfered data is innocuous and already in the public realm. But some of it is classified. Read this paper to find out how to collect and secure data to protect operations, reputation and continuity when employees leave.
Tags : 
data protection, code 42, data security, intellectual property
    
Code42
Published By: 8x8 Inc.     Published Date: Feb 17, 2017
This Frost & Sullivan paper will outline the difficult challenges faced by all businesses—in a variety of industries and sizes—in creating an exceptional customer experience; discuss the value of a contact center that also supports all channels of choice, disaster recovery, data analytics, and leveraging back-office workers; stress the need for cultural change throughout the organization to truly meet today’s customers’ expectations; and offer best practices recommendations for taking the lead in creating a customer journey that engenders loyalty, delivers total satisfaction, and drives revenues.
Tags : 
frost & sullivan, contact center, customer engagement, cloud, culture gap, scalability, omnichannel, digital tranformation
    
8x8 Inc.
Published By: Code42     Published Date: Apr 04, 2017
Three decades after the height of the cold war between Apple and IBM, these former nemeses have formed a partnership emblematic of the shifting tide in enterprise IT. Macs are no longer just a niche choice for the creative class. In this report, see how Macs have proven themselves in the enterprise. They’re easier to support than PCs, increase worker productivity, enhance information security and save money.
Tags : 
    
Code42
Published By: Secure Computing     Published Date: Jan 25, 2008
This paper discusses the value of two-factor authentication systems that provide vital access security for today's mobile workforces, who can now be productive from numerous remote locations: the home office, the airport, hotels, and customer sites. Moreover, the ubiquitous nature of mobile phones has now given rise to a new, convenient form factor for the software-based authenticator that resides right on the mobile phone/device.
Tags : 
cell phone, cell phones, wireless security, mobile security, mobile workers, authentication, 2-factor authentication, iam
    
Secure Computing
Published By: Secure Computing     Published Date: Jan 25, 2008
Enterprises are increasingly opening up their networks to a greater constituency of remote users, but they often do not take into consideration the protection of user identity as a critical component of their strategy. The mobile workforce can now work productively from a remote location such as a home office, the airport, a hotel, or a customer site.
Tags : 
cell phone, cell phones, wireless security, mobile security, mobile workers, authentication, 2-factor authentication, iam
    
Secure Computing
Start   Previous    5 6 7 8 9 10 11 12 13 14 15 16 17 18 19    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.