mobi

Results 551 - 575 of 4982Sort Results By: Published Date | Title | Company Name
By: Sage EMEA     Published Date: Jan 29, 2019
Sage pays close attention to what your business demands For nearly 40 years, Sage has followed through on its founding commitment: Making sure we deliver what our customers need. That dedication has helped us become one of the world’s largest suppliers of enterprise management solutions, used by more than 3 million businesses of all types and sizes around the world. Sage helps drive today’s business builders with a new generation of solutions to manage everything from money to people wherever they’re needed, offering the freedom to work with mobility. Above all else, we’re driven to satisfy our customers and keep them coming back. That commitment has paid off. We beat SAP (19), Oracle (25) and Microsoft (34) with our Net Promoter Score (NPS)—a respected customer-satisfaction, customer-experience, and loyalty indicator widely used by Fortune 500 companies. The industry NPS average is 31.75, meaning we are 58% better than the average, and 88% above our closest competition. It shows t
Tags : 
     Sage EMEA
By: Cisco     Published Date: Apr 07, 2014
This is a report of the findings from the Cisco Internet Business Solutions Group (IBSG) who conducted a survey of 540 U.S. mobile business users to understand their needs and behaviors.
Tags : mobile, wi-fi, wireless, cisco, research
     Cisco
By: Cisco     Published Date: Apr 07, 2014
Cisco presents its research findings on mobile data traffic, wireless trends and how the service providers can capture the Wi-Fi opportunity.
Tags : wi-fi, wireless, cisco, service providers
     Cisco
By: IBM APAC     Published Date: May 18, 2017
According to industry analyst IDC, the mean cost of an hour of downtime can range from USD 224,952 to USD 1,659,428, depending on the size of your organization.1 And each instance of downtime increases your total cost of ownership (TCO) and eats away at your IT budget.
Tags : tco, idc, ibm, cloud, mobile, hardware
     IBM APAC
By: IBM APAC     Published Date: May 18, 2017
Today, everything computes. Intelligence has been infused into things no one would recognize as computers: appliances, cars, roadways, clothes, even rivers and cornfields. Tomorrow, many of these things will think, thanks to breakthroughs in cognitive computing. Even the things that don’t think themselves will continue collecting and reporting the massive quantities of data that feed cognitive systems.
Tags : ibm, tss, cloud, mobile, appliances
     IBM APAC
By: IBM APAC     Published Date: May 18, 2017
In today’s always on world, IT systems are so interdependent with business operations that even a few minutes of downtime can have big implications—for your productivity, reputation and finances. New technologies like cloud, mobile, analytics and social can help your business be more flexible and responsive, but at the same time they increase your risk.
Tags : ibm, tss, cloud, mobile
     IBM APAC
By: Bazaarvoice     Published Date: Jan 24, 2013
To compete in the new environment of always connected, highly informed consumers, retailers need to leverage five trends to realize higher conversions and larger transaction sizes. Find out how you can apply these 5 trends to your business.
Tags : retail, ecommerce, data, analytics, marketing, mobile, social, marketing
     Bazaarvoice
By: MicroStrategy     Published Date: Aug 12, 2012
Mobile retail applications empower associates with store operations data, merchandising, and logistics.
Tags : microstrategy, mobile, retail, logistics, operations data
     MicroStrategy
By: MicroStrategy     Published Date: Aug 12, 2012
Mobile retail applications empower associates with store operations data, merchandising, and logistics.
Tags : microstrategy, mobil, applications, logistics, customers
     MicroStrategy
By: MicroStrategy     Published Date: Aug 12, 2012
MicroStrategy Mobile Apps are transforming the Retail Industry by providing unprecedented insights into store operations,inventory,and customer satisfaction.
Tags : microstrategy, mobile, apps, retail
     MicroStrategy
By: MicroStrategy     Published Date: Aug 12, 2012
Apple Premium Resellers use MicroStrategy Intelligence Dashboards on the iPad. See how these retail stores use our mobile platform to design beautiful, data-rich dashboards. See why MicroStrategy is the vendor of choice for Apple Premium Resellers.
Tags : microstategy, apple, dashboards, ipad
     MicroStrategy
By: MicroStrategy     Published Date: Aug 12, 2012
A panel of industry experts, including Steve Cornett, Director of Enterprise Information Services with Lowe's Companies, Inc.,
Tags : microstrategy, mobile, steve cornett, lowe's, roi
     MicroStrategy
By: MicroStrategy     Published Date: Aug 12, 2012
Hear how Whole Foods Market is using Mobile Business Intelligence to balance both individual store effectiveness and regional uniqueness while promoting the efficiencies of "oneness."
Tags : microstrategy, mobile, wholefoods, oneness
     MicroStrategy
By: MicroStrategy     Published Date: Aug 24, 2012
Guess GMobile app, developed using the MicroStrategy Mobile App Platform, instantly delivers up-to-the-minute operational information to their employees via the iPad.
Tags : microstrategy, guess, gmobile app, platform
     MicroStrategy
By: Webroot     Published Date: Nov 02, 2012
This short paper looks at this situation and suggests how by replacing traditional AV with next generation cloud-based endpoint protection you will solve many of the issues surrounding your highly distributed mobile workforce.
Tags : mobility, endpoint security, it security, endpoint protection, mobile workforce, high mobility, security
     Webroot
By: Webroot     Published Date: Nov 07, 2012
This case study describes how globally dispersed technology company, Cascade Microtech addressed concerns about Web Security.
Tags : case study, web security, cloud, mobility, mobile security, web security solutions, security
     Webroot
By: Webroot     Published Date: Nov 08, 2012
To Protect Mobile Users and Globally Dispersed Locations, Cascade Microtech Chooses Webroot for Web Security in the Cloud.
Tags : mobile users, mobility, case study, it security, web security, cloud computing, networking, security
     Webroot
By: Blue Coat Systems     Published Date: Jun 26, 2013
While mobile threats are still largely mischiefware and have not yet broken the device’s security model but instead more focused on for-pay texting scams or stealing personal information, the dangers are still rife. This white paper from BlueCoat examines the mobile threat landscape and the behavioral patterns of mobile users that make them most vulnerable to data loss, malicious applications, fraud and other mobile threats.
Tags : mobile threats, security, malicious applications, data loss prevention, fraud, technology, malware, networking
     Blue Coat Systems
By: Blue Coat Systems     Published Date: Jun 26, 2013
Given the new threats inherent in an increasingly mobile workforce and the blurring of lines between business and personal use of devices, it is clear that conventional methods of securing the perimeter in this new environment are not up to the task. This white paper from BlueCoat explains how organizations can most effectively maximize their security efforts by incorporating a cloud-based solution as part of a unified approach.
Tags : web security, mobile threats, security, cloud, application, technology, solution, networking
     Blue Coat Systems
By: Blue Coat Systems     Published Date: Jun 26, 2013
CISOs recognize the risk threats such as phishing, fake antivirus (AV), and search engine poisoning bring, and are anxious to invest in web security technology to safeguard users. Unfortunately, it’s not so easy. Many security executives are struggling to answer questions about the most effective approach. This ESG white paper from BlueCoat explains why some CIOs are struggling to manage security in an increasingly complex and mobile landscape, and offers advice for what they should be looking for in web security.
Tags : web security, web threats, physical appliance, virtual appliance, saas, security, technology, data management
     Blue Coat Systems
By: Blue Coat Systems     Published Date: Jun 26, 2013
All indicators are up when it comes to mobility: More devices, more users, more budget, and more applications. Business technology leaders must begin planning now for a security paradigm shift, one that will pull together disparate security policies into a single, user-centric, universal policy that can apply to whatever devices and apps employees use. This white paper from BlueCoat explores the new security challenges mobility trends are creating, and how security must change to meet them.
Tags : mobile threats, security, malicious applications, data loss prevention, fraud, technology, malware, storage
     Blue Coat Systems
By: Blue Coat Systems     Published Date: Jul 18, 2013
While mobile threats are still largely mischiefware and have not yet broken the device’s security model but instead more focused on for-pay texting scams or stealing personal information, the dangers are still rife. This white paper from BlueCoat examines the mobile threat landscape and the behavioral patterns of mobile users that make them most vulnerable to data loss, malicious applications, fraud and other mobile threats.
Tags : mobile, malware, security, scams, bluecoat, data loss
     Blue Coat Systems
By: Blue Coat Systems     Published Date: Jul 18, 2013
Given the new threats inherent in an increasingly mobile workforce and the blurring of lines between business and personal use of devices, it is clear that conventional methods of securing the perimeter in this new environment are not up to the task. This white paper from BlueCoat explains how organizations can most effectively maximize their security efforts by incorporating a cloud-based solution as part of a unified approach.
Tags : web security, mobile, workforce, bluecoat, security
     Blue Coat Systems
By: Blue Coat Systems     Published Date: Jul 18, 2013
CISOs recognize the risk threats such as phishing, fake antivirus (AV), and search engine poisoning bring, and are anxious to invest in web security technology to safeguard users. Unfortunately, it’s not so easy. Many security executives are struggling to answer questions about the most effective approach. This ESG white paper from BlueCoat explains why some CIOs are struggling to manage security in an increasingly complex and mobile landscape, and offers advice for what they should be looking for in web security.
Tags : web security, appliance, virtual, physical, saas, hybrid
     Blue Coat Systems
By: Blue Coat Systems     Published Date: Jul 18, 2013
All indicators are up when it comes to mobility: More devices, more users, more budget, and more applications. Business technology leaders must begin planning now for a security paradigm shift, one that will pull together disparate security policies into a single, user-centric, universal policy that can apply to whatever devices and apps employees use. This white paper from BlueCoat explores the new security challenges mobility trends are creating, and how security must change to meet them.
Tags : mobile, security, devices, users, bluecoat
     Blue Coat Systems
Start   Previous    16 17 18 19 20 21 22 23 24 25 26 27 28 29 30    Next    End
Search White Papers      

Add White Papers

Get your white papers featured in the insideHPC White Paper Library contact: Kevin@insideHPC.com