mobile technologies

Results 51 - 75 of 217Sort Results By: Published Date | Title | Company Name
Published By: CA Technologies     Published Date: Jul 26, 2017
To deliver on the potential for transformative innovation, businesses must maximize the latent value of legacy application code and data—and fast. Talking Points: • Go Agile with Agile processes and tools that speed innovation on legacy applications • Onboard your team quickly with modern toolsets and languages that seamlessly integrate legacy code • Integrate legacy code and simplify how you manage the software development lifecycle
Tags : 
    
CA Technologies
Published By: TIBCO Software     Published Date: Aug 13, 2018
Maintaining a competitive edge today means building a Digital Enterprise capable of taking full advantage of social, mobile, web, cloud, “things,” (sensors and devices), and analytics technologies. Among the terms used to describe this business transition is “the API Economy,” an economy in which APIs are no longer just an IT concern, but the underpinnings of new revenue streams and new business models that are disrupting entire industries. Read this paper to learn about: New, modern applications being built for the enterprise Application ecosystems and extending the value of your company in the API Economy Two ways to integrate devices in the Internet of Things The microservices approach to application development The role of API management in the digital enterprise
Tags : 
    
TIBCO Software
Published By: PGi     Published Date: May 03, 2019
AI, mobile, live streaming and other visionary technologies help elevate communication, making digital interactions more intelligent, seamless ... and even more human.
Tags : 
    
PGi
Published By: CyberSource EMEA     Published Date: May 04, 2018
The digital economy is dramatically changing how consumers shop and interact with businesses. They expect a fast, convenient and highly secure digital experience. With the average company lifespan decreasing rapidly, merchants have to operate as a true digital enterprise to stay competitive and to stay in business. Payment and fraud management is no longer a back-office utility. It is a prime differentiator, critical to achieving competitive advantage, improving customer experience and reducing risk. Digital transformation is not simply a market buzz word. It is real. And those who don’t embrace it are in a position to lose. By 2020, eCommerce sales as a percentage of retail sales are forecast to be 12.4% compared to 8.0% in 2016, according to eMarketer. And engaging customers digitally across channels remains a top digital initiative. While there are several drivers of growth in the digital economy, none are more significant than the force of mobile and cloud technologies. Innovation
Tags : 
    
CyberSource EMEA
Published By: Akamai Technologies     Published Date: Mar 07, 2019
Traditional remote access technologies—like VPNs, proxies,and remote desktops—provide access in much the same way they did 20 years ago. However, new and growing business realities—like a growing mobile and distributed workforce—are forcing enterprises to take a different approach to address the complexity and security challenges that traditional access technologies present. Read this whitepaper to learn 5 key reasons why it’s time for enterprises to adopt a new remote access model.
Tags : 
    
Akamai Technologies
Published By: HERE Technologies     Published Date: Mar 28, 2019
Automobile and heavy equipment manufacturers are ready to break free of the outdated state of their outbound supply chains. A lack of visibility contributes to a process that is ripe for optimization. Manufacturers need reliable partners to help establish greater visibility of their supply chains and locate assets in real time. This ebook outlines how solutions from HERE Technologies can meet common supply chain challenges and help manufactures enable proactive decision-making and greater efficiency. This ebook will help you understand how location intelligence from HERE: • Enables manufacturers tackle key supply chain challenges and begin a new phase of smart optimization • Helps manufacturers establish more accurate supply chain ETAs • Utilizes a range of technologies to provide real-time locations – both indoor and outdoor
Tags : 
location data, mapping, here technologies
    
HERE Technologies
Published By: HERE Technologies     Published Date: May 23, 2019
To provide drivers with navigation experiences that are always fresh, differentiated and that set an OEM’s brand apart on either embedded or mobile platforms, automakers need an unprecedented level of flexibility and control over data, software and the delivery process. As a SaaS offering, HERE Navigation on Demand offers automakers a new way to solve their key challenges – such as static software, complex and costly solution development and the inability to update or upgrade the experience once vehicles are in the field. Automakers need alternatives as they overhaul their navigation and connected service programs and bring change to their development, deployment, and monetization processes. This whitepaper outlines how HERE Technologies can support them to deliver compelling navigation and connected experiences, while keeping them in full control of their branding and revenue streams. Find out how HERE Navigation on Demand leverages: The HERE Open Location Platform to deliver alwa
Tags : 
    
HERE Technologies
Published By: Lumesse     Published Date: Mar 18, 2015
This guide will help you achieve truly Mobile Talent Management.
Tags : 
mobile talent management, recruiting becoming mobile, mobility, hr technologies. mobile recruiting, new generations, mobile devices, multiple devices, recruiting
    
Lumesse
Published By: iPass     Published Date: Sep 16, 2009
Thanks to new mobile technologies, work happens everywhere today. It might be responding to email on the morning train or uploading a customer contract during a cross-town cab ride. Your workers need this level of connectivity to compete. At the same time, you likely face unprecedented budgetary challenges.
Tags : 
wireless, wifi, smartphones, pda, security, smartphone, personal devices, nokia
    
iPass
Published By: Oracle     Published Date: Apr 10, 2014
The very best CFOs are becoming “technology evangelists”, investing in the latest mobile, social, analytical and cloud technologies to modernize their finance organizations and become more strategic partners to the business. Find out more – download the report, “Empowering Modern Finance: The CFO as Technology Evangelist.”
Tags : 
cloud, finance, saas, big data, social, mobile, analytics, modernization
    
Oracle
Published By: MobileIron     Published Date: Apr 05, 2017
MobileIron is a proven leader in mobile and cloud security innovation for the modern enterprise. In addition to being the enterprise choice for secure mobility, we rank in the top five for all categories of the Gartner Critical Capabilities for High-Security Mobility Management. We have also been positioned as a Leader in the Gartner Magic Quadrant for Enterprise Mobility Management Suites for six consecutive years. Our platform is fully mature and built from the ground up to address evolving mobility and cloud requirements. Plus, MobileIron integrates with leading technology providers, so customers aren’t tied to proprietary technologies that don’t meet their needs. We ensure customers can choose the best technologies that fit their environment.
Tags : 
cloud services, enterprise management, cloud security, mobile security, mobile device security, platforms, email security, cloud data
    
MobileIron
Published By: MobileIron     Published Date: Apr 05, 2017
MobileIron is a proven leader in EMM innovation and mobile security for the modern enterprise. In addition to being the enterprise choice for secure mobility, we rank in the top five for all categories of the Gartner Critical Capabilities for High-Security Mobility Management. We have also been positioned as a Leader in the Gartner Magic Quadrant for Enterprise Mobility Management Suites for six consecutive years. Our platform is fully mature and built from the ground up to address evolving mobility and cloud requirements. Plus, MobileIron integrates with leading technology providers, so customers aren’t tied to proprietary technologies that don’t meet their needs. Our goal is to ensure organizations can choose the best technologies that fit their environment.
Tags : 
cloud services, enterprise management, cloud security, mobile security, mobile device security, platforms, email security, cloud data
    
MobileIron
Published By: VMware AirWatch     Published Date: Feb 21, 2017
"Although they have been around for several years, virtual desktop and application virtualization solutions have not yet gone mainstream in most enterprises. That’s bound to change, however, given advances in the technologies and the increasing need to deliver a great computing experience to mobile device users. Read this Executive Viewpoint Q&A with VMware Senior VP and General Manager of Desktops Sumit Dhawan, as he explains why it’s time to revisit virtual desktop and application virtualization technologies. "
Tags : 
    
VMware AirWatch
Published By: Lookout     Published Date: Dec 13, 2018
The world has changed. Yesterday everyone had a managed PC for work and all enterprise data was behind a firewall. Today, mobile devices are the control panel for our personal and professional lives. This change has contributed to the single largest technology-driven lifestyle change of the last 10 years. As productivity tools, mobile devices now access significantly more data than in years past. This has made mobile the new frontier for a wide spectrum of risk that includes cyber attacks, a range of malware families, non-compliant apps that leak data, and vulnerabilities in device operating systems or apps. A secure digital business ecosystem demands technologies that enable organizations to continuously monitor for threats and provide enterprise-wide visibility into threat intelligence. Watch the webinar to learn more about: What makes up the full spectrum of mobile risks Lookout's Mobile Risk Matrix covering the key components of risk How to evolve beyond mobile device management
Tags : 
    
Lookout
Published By: CA Technologies EMEA     Published Date: Aug 07, 2017
CA’s portfolio is designed to drive efficiency from planning through production. A core component of our continuous delivery portfolio is CA Release Automation, a market-leading application release automation solution that delivers full application deployment automation and release coordination across stages, environments and teams. The solution’s analytic capabilities enable DevOps teams to plan, manage, analyze and optimize the continuous delivery pipeline from a single control point. In addition, the portfolio includes CA Agile Central, CA Agile Requirements Designer, CA Service Virtualization and CA Test Data Manager. We continue to invest in and enhance the portfolio, most recently via the acquisition of BlazeMeter, an innovative, SaaS-based performance and load-testing solution.
Tags : 
digital experience, mobile applications, business success, innovations, market, risk and cost, software development, ca technologies
    
CA Technologies EMEA
Published By: CA Technologies EMEA     Published Date: Aug 07, 2017
In a world where customers and citizens expect so much more from technology, the race is on to develop a finely tuned high performance IT function. Hopefully by reading this book you're in a better position to see how DevOps supports this imperative and can develop the strategies needed to reignite your business.
Tags : 
digital experience, mobile applications, business success, innovations, market, risk and cost, software development, ca technologies
    
CA Technologies EMEA
Published By: Fujitsu America, Inc.     Published Date: Jan 22, 2019
Intel, the Intel logo, Intel Core, Intel vPro, Core Inside and vPro Inside are trademarks of Intel Corporation or its subsidiaries in the U.S. and/or other countries. The diversity and bureaucratic nature of government agencies have complicated communication for decades. But today digital technologies offer a path to connectivity and information sharing that could help break the gridlock. Innovative mobile and field force automation (FFA) technologies are helping state and federal government agencies break down the walls that hindered cooperation and decision making between offices and field personnel. This document is designed to help ensure that your mobile device platform selection and processes provide the power, reliability, and flexibility you need to achieve your mission — in the office, in the field, or ten flights up in the air.
Tags : 
    
Fujitsu America, Inc.
Published By: Here Technologies     Published Date: Mar 29, 2019
Automobile and heavy equipment manufacturers are ready to break free of the outdated state of their outbound supply chains. A lack of visibility contributes to a process that is ripe for optimization. Manufacturers need reliable partners to help establish greater visibility of their supply chains and locate assets in real time. This ebook outlines how solutions from HERE Technologies can meet common supply chain challenges and help manufactures enable proactive decision-making and greater efficiency. This ebook will help you understand how location intelligence from HERE: • Enables manufacturers tackle key supply chain challenges and begin a new phase of smart optimization • Helps manufacturers establish more accurate supply chain ETAs • Utilizes a range of technologies to provide real-time locations – both indoor and outdoor
Tags : 
    
Here Technologies
Published By: Here Technologies     Published Date: Apr 02, 2019
Automobile and heavy equipment manufacturers are ready to break free of the outdated state of their outbound supply chains. A lack of visibility contributes to a process that is ripe for optimization. Manufacturers need reliable partners to help establish greater visibility of their supply chains and locate assets in real time. This ebook outlines how solutions from HERE Technologies can meet common supply chain challenges and help manufactures enable proactive decision-making and greater efficiency. This ebook will help you understand how location intelligence from HERE: • Enables manufacturers tackle key supply chain challenges and begin a new phase of smart optimization • Helps manufacturers establish more accurate supply chain ETAs • Utilizes a range of technologies to provide real-time locations – both indoor and outdoor
Tags : 
auto, mapping, location data
    
Here Technologies
Published By: Here Technologies     Published Date: May 14, 2019
To provide drivers with navigation experiences that are always fresh, differentiated and that set an OEM’s brand apart on either embedded or mobile platforms, automakers need an unprecedented level of flexibility and control over data, software and the delivery process. As a SaaS offering, HERE Navigation on Demand offers automakers a new way to solve their key challenges – such as static software, complex and costly solution development and the inability to update or upgrade the experience once vehicles are in the field. Automakers need alternatives as they overhaul their navigation and connected service programs and bring change to their development, deployment, and monetization processes. This whitepaper outlines how HERE Technologies can support them to deliver compelling navigation and connected experiences, while keeping them in full control of their branding and revenue streams. Find out how HERE Navigation on Demand leverages: The HERE Open Location Platform to deliver alwa
Tags : 
auto, mapping, location data
    
Here Technologies
Published By: Equinix     Published Date: Sep 28, 2015
This paper summarises the main observations extracted from the Interconnected Commerce: A Revolution in Value Creation whitepaper.
Tags : 
mobile payments, mobile wallets, digital wallets, online payments, e-commerce, payment gateways, payment technologies, payment trends
    
Equinix
Published By: Docusign     Published Date: Feb 19, 2015
À cause du nombre croissant de professionnels qui utilisent les téléphones et applications mobiles, la « vague mobile » a des incidences sur chaque fonction commerciale dans le monde entier et modifie la manière de faire des affaires. Les technologies telles que les signatures électroniques mobiles peuvent aider les entreprises à finaliser leurs transactions commerciales. Les signatures électroniques mobiles vous permettent, ainsi qu'à vos contacts, d'envoyer et de signer des documents légalement, grâce aux téléphones et à d'autres appareils mobiles, à tout moment et en tout lieu.
Tags : 
docusign, la signature electronique
    
Docusign
Published By: Oracle     Published Date: Jul 31, 2017
"The significance of technology in higher education has changed dramatically over the past decade. The rise of mobile, social and analytic technologies is forcing institutions to rethink their business models from the ground up. Institutions at all ends of the spectrum clearly need to embrace fundamental changes in their most basic business processes and platforms. A critical factor in the planning for those changes includes finding the right partner to assist with a major platform shift to the cloud."
Tags : 
    
Oracle
Published By: MobileIron     Published Date: Aug 20, 2018
The new generation of mobile devices, applications, and cloud services significantly improve agency efficiencies. Tasks that were once relegated to timeconsuming deskwork, are now performed in the field, and with improved accuracy. Because of this, more and more public safety agencies are adopting these new technologies. One purpose of the FBI’s CJIS Security Policy is to enable agencies to fully leverage mobile devices, but without sacrificing security. Mobile devices introduce a variety of new threat vectors and risks. Careful consideration of these risks is important to maintaining information security. Threats to mobile devices stem mainly from their size, portability, and available wireless interfaces. Examples of mobile device threats include: • Loss or theft of device • Unauthorized access to device • Mobile operating system vulnerabilities • Communication over untrusted networks • Malware or malicious Apps • Jailbreak or rooting activity • Data loss through user behaviors
Tags : 
criminal, justice, information, services, cjis, compliance
    
MobileIron
Published By: MobileIron     Published Date: Nov 07, 2018
In recent years, the market for mobile and cloud technologies has completely shifted the behavior of enterprise users. People can now work anywhere, on any device, to access business apps and data from mobile apps and cloud services. Static, perimeter-based security can no longer keep up with all of the endpoints, users, apps, and data that travel far beyond the corporate firewall. Relying on old security approaches like password-only access control is no longer enough to secure this vast mobile-cloud infrastructure — especially since stolen user credentials were the top cause of data breaches in 2017.
Tags : 
    
MobileIron
Start   Previous    1 2 3 4 5 6 7 8 9    Next    End
Search Offers      
Get your company's offers in the hands of targeted business professionals.