mobi

Results 451 - 475 of 4982Sort Results By: Published Date | Title | Company Name
By: HERE Technologies     Published Date: Sep 26, 2018
Mobile has become the first screen for consumers in terms of internet time spent. Hyperlocal location data is unique to mobile and provides a lot of new, valuable information about consumers. Today’s sophisticated buyers demand more transparency in location data science, better campaign performance and ROI from attribution modeling. Finding the right partner that can help build the bridge between real-world consumer behavior and mobile programmatic advertising in a transparent way is essential. To meet those challenges and address the demand for top quality location data, adsquare integrated a global database of HERE Places in April 2017. By leveraging HERE Places and overlaying raw location data of anonymous users with POI data points, adsquare is able to understand exactly what consumers are doing in the real world: what places they visit, when and how often. To find out more download this paper today.
Tags : 
     HERE Technologies
By: Moxie     Published Date: Nov 01, 2017
Consumers are interacting on more devices and channels than ever. They expect to find what they need, fast and friction-less, no matter what — or they’ll find someplace else where they can. With customer self-service on the rise, the need to provide exceptional digital customer engagement has become a competitive differentiator. It’s not enough to chase the latest digital channels. It’s about improving the engagement to get customers what they need — before they have to ask for it.
Tags : customer engagement, digital channels, digital experience, communication channels, mobile experience
     Moxie
By: Symantec     Published Date: Jun 13, 2018
Today’s workforce is increasingly nomadic. Employees use personal and company-owned devices desktops, laptops, tablets, and smartphones with various operating systems to access corporate resources over different networks from virtually anywhere. Roaming users and cloud-based applications have eroded the network perimeter where enterprises have traditionally focused their security controls. In the wake of this disruption, vendors offered myriad point products that solve only a portion of the security problem. These products usually require costly custom integrations and high management overhead to boot. Making matters worse, traditional security approaches can’t address an evolving threat landscape that includes ransomware, stealthy attacks that dwell in a customer’s environment for months, and threats targeting iOS and Android devices. In fact, the mobile workforce is more vulnerable than ever before.
Tags : 
     Symantec
By: Sybase     Published Date: Aug 31, 2010
This whitepaper outlines the new challenges 4G deployments bring to mobile operators and solutions designed to address these challenges.
Tags : advanced ip messaging server
     Sybase
By: Cisco     Published Date: Jul 08, 2016
What You Will Learn: This document will identify the essential capabilities you need in an advanced malware protection solution, the key questions you should ask your vendor, and shows you how Cisco combats today’s advanced malware attacks using a combination of four techniques: • Advanced analytics • Collective global security threat intelligence • Enforcement across multiple form factors (networks, endpoints, mobile devices, secure gateways, and virtual systems) • Continuous analysis and retrospective security
Tags : 
     Cisco
By: SAP     Published Date: Mar 29, 2011
Explore the latest thinking on use of mobile technology to deliver business value by enabling sales and service processes - and transform processes across the enterprise. Business software vendors can best support their customers by collaborating with strategic partners to co-innovate and foster a mobile ecosystem.
Tags : sap crm, enterprise mobility suite, enterprise mobility
     SAP
By: Voltage Security     Published Date: Sep 13, 2012
Sending and receiving encrypted email with sensitive data should be a lot easier to do. But it ends up being something painful, and as a result we tend to avoid this protection.
Tags : data security, voltage, smartphones, tablets, smart security, email security, mobile email security, encryption, email encryption, security
     Voltage Security
By: Adobe     Published Date: Nov 05, 2014
As advertising continues to evolve, we continue to provide the latest insights and trends. The Adobe Advertising Benchmark 2014 report gives you the information you need to identify better opportunities to make the most of your advertising efforts.
Tags : advertising, spend trends, search engines, mobile spend, ctr
     Adobe
By: Adobe     Published Date: Jan 12, 2015
As advertising continues to evolve, we continue to provide the latest insights and trends. The Adobe Advertising Benchmark 2014 report gives you the information you need to identify better opportunities to make the most of your advertising efforts.
Tags : adobe, benchmark, search, spend, cpc, pla, advertising, google, yahoo, bing, tends. device, ctr, germany, mobile, keywords, audience
     Adobe
By: Cisco EMEA     Published Date: Nov 08, 2018
Enterprise IT is changing. It’s evolving from a rigid, static, manually configured and managed architecture to one where connectivity is dynamic, application services are on demand, and processes are automated. Enterprise networking is evolving along with IT. This has been evident in the past several years in initiatives such as enterprise digitization and as-a-service consumption models, as well as their enablers, including BYOD, IoT and cloud. Add to this, all of the security implications of each initiative. The purpose of this paper is to assess the switching requirements for next-generation campus networks incorporating wired switches, wireless LANs and WAN routers in an intuitive, intent-based network supporting cloud, mobility, IoT and digitization, with pervasive security.
Tags : 
     Cisco EMEA
By: Aerohive     Published Date: May 13, 2015
This paper gives information on how Aerohive AP130 provides high-performance data rates up to 876Mbps in the 5-GHz band.
Tags : aerohive ap130, network infrastructure, aerohive networks, wi-fi security and mobility packages, hardware platform, security, integrated application, wireless, networking
     Aerohive
By: Aerohive     Published Date: Oct 14, 2014
This data sheet outlines the main features of Aerohive Networks AP230 Enterprise access points.
Tags : aerohive ap230, network infrastructure, aerohive networks, wi-fi security and mobility packages, security
     Aerohive
By: Aerohive     Published Date: Oct 23, 2014
This data sheet outlines the main features of Aerohive Networks AP230 Enterprise access points.
Tags : aerohive ap230, network infrastructure, aerohive networks, wi-fi security and mobility packages, networking
     Aerohive
By: Aerohive     Published Date: Oct 23, 2014
This data sheet outlines the main features of Aerohive Networks AP230 Enterprise access points.
Tags : aerohive ap230, network infrastructure, aerohive networks, wi-fi security and mobility packages, networking
     Aerohive
By: Aerohive     Published Date: May 14, 2015
This data sheet outlines the main features of Aerohive Networks AP230 Enterprise access points.
Tags : aerohive ap230, network infrastructure, aerohive networks, wi-fi security and mobility packages, security
     Aerohive
By: Aerohive     Published Date: May 14, 2015
This data sheet outlines the main features of Aerohive Networks AP230 Enterprise access points.
Tags : aerohive ap230, network infrastructure, aerohive networks, wi-fi security and mobility packages, security
     Aerohive
By: Aerohive     Published Date: May 13, 2015
This case study explores the new challenges of WLAN Network and reveals the advantages of using Aerohive Wi-Fi solution.
Tags : wi-fi, wi-fi solutions, aerohive, wlan, wlan network, wlan network challenges, wi-fi, aerohive solutions, mobility, mobile devices, mobile, wireless, wi-fi solutions, connectivity, education, students using devices
     Aerohive
By: Lenovo UK     Published Date: Nov 09, 2018
L'aumento della mobilità sta causando mal di testa a tutti i team IT, con potenziali aumenti di costi e rischi. Ma con ThinkPad basato su processori Intel® Core™ i7 vPro™, ottieni sicurezza a 360, durata affidabile e produttività senza compromessi in tutti i dispositivi. Scopri di più nel nostro white paper. Ultrabook, Celeron, Celeron Inside, Core Inside, Intel, il logo Intel, Intel Atom, Intel Atom Inside, Intel Core, Intel Inside, il logo Intel Inside, Intel vPro, Itanium, Itanium Inside, Pentium, Pentium Inside, vPro Inside, Xeon, Xeon Phi, Xeon Inside e Intel Optane sono marchi di Intel Corporation o di società controllate da Intel negli Stati Uniti e/o in altri Paesi.
Tags : lenovo, intel, thinkpad, thinkpad x1, x1 extreme, laptop, sicurezza, produttività, mobilità, lenovo x1, mobilità della forza lavoro
     Lenovo UK
By: Lenovo UK     Published Date: May 15, 2019
L'aumento della mobilità sta causando mal di testa a tutti i team IT, con potenziali aumenti di costi e rischi. Ma con ThinkPad basato su processori Intel® Core™ i7 vPro™, ottieni sicurezza a 360, durata affidabile e produttività senza compromessi in tutti i dispositivi. Scopri di più nel nostro white paper. Ultrabook, Celeron, Celeron Inside, Core Inside, Intel, il logo Intel, Intel Atom, Intel Atom Inside, Intel Core, Intel Inside, il logo Intel Inside, Intel vPro, Itanium, Itanium Inside, Pentium, Pentium Inside, vPro Inside, Xeon, Xeon Phi, Xeon Inside e Intel Optane sono marchi di Intel Corporation o di società controllate da Intel negli Stati Uniti e/o in altri Paesi.
Tags : lenovo, intel, thinkpad, thinkpad x1, x1 extreme, laptop, sicurezza, produttività, mobilità, lenovo x1, mobilità della forza lavoro
     Lenovo UK
By: NuCompass     Published Date: May 26, 2016
First impressions matter, and relocations are stressful. If your new hire isn’t taken care of during the relocation process, it can lead to an early resignation, a bad candidate experience, and a poor reputation for your company.
Tags : employee relocation, relocation, relocation program, new hire relocation, mobility, mobility services, mobility program, employee move, lump sum relocation, lump sum move, relocation technology, relocation services, mobility technology
     NuCompass
By: AWS     Published Date: May 09, 2018
More and more businesses are embracing workplace mobility and bring-your-own-device (BYOD) strategies as a method to reduce costs and stimulate productivity. These initiatives give employees, contractors, and business partners the power to remotely contribute, collaborate, and communicate with team members from familiar devices, anywhere around the world. To implement these strategies effectively however, IT teams must provide access to applications, business systems, collaboration platforms, and development environments without sacrificing end-user experiences, hindering their organization’s security posture, or inducing excessive costs. What many are finding is that traditional methods of desktop and application delivery and on-premises Virtualized Desktop Infrastructure (VDI) often cannot live up to this task, as they introduce new challenges upon implementation.
Tags : 
     AWS
By: Juniper Networks     Published Date: Oct 25, 2017
The broad adoption of the next generation of cloud, mobile, M2M, and big data applications is having profound impacts on IT and network infrastructures. Compared to traditional applications, these applications have much shorter life cycles. You must be able to spin them up, spin them down, and grow and shrink them on demand. Furthermore, you must be able to move these application workloads within a data center or across geographically distributed data centers, resulting in increased management complexities.
Tags : data management, data system, business development, software integration, resource planning, enterprise management, data collection
     Juniper Networks
By: Box     Published Date: Jun 19, 2014
This AIIM Trendscape report has in-depth interviews of 50 senior end users and industry leaders, highlights expert recommendations to maximize mobile opportunities within the enterprise and offers a 7-point mobile action plan that organizations can execute in the next 12 months. Obtain access to data, expert opinions and a unique perspective on the impact of cloud and mobility in the enterprise, surfacing issues that are not readily apparent in existing coverage about mobile technologies.
Tags : box, aiim, mobile opportunities, mobile first, mobile technologies, applications, it management, enterprise applications
     Box
By: VMware AirWatch     Published Date: Nov 12, 2015
L’une des questions que de nombreux clients se posent récemment est « Comment Office 365 est-il pris en charge par AirWatch ? » Beaucoup se demandent si AirWatch peut contrôler l’accès à Office 365 (O365) non seulement sur leurs systèmes de Bureau d’entreprise mais surtout sur leurs terminaux mobiles. AirWatch® by VMware® apporte un soutien complet aux organisations qui souhaitent utiliser O365 sur leurs terminaux mobiles. Notre récente intégration à VMware® Identity Manager fournit un cadre de contrôle d’accès adaptatif pour s’assurer que toutes les applications professionnelles, dont O365, sont uniquement consultées depuis des terminaux gérés et conformes.
Tags : airwatch, emm, office365, cloud, software development, it management, platforms, data management
     VMware AirWatch
By: VMware AirWatch     Published Date: Sep 11, 2015
One of the most common questions being asked by many customers recently is “How does AirWatch support Office 365?” Many ask if AirWatch can control access to Office 365 (O365) not only on their corporate desktop systems, but most importantly on their mobile devices.
Tags : 
     VMware AirWatch
Start   Previous    12 13 14 15 16 17 18 19 20 21 22 23 24 25 26    Next    End
Search White Papers      

Add White Papers

Get your white papers featured in the insideHPC White Paper Library contact: Kevin@insideHPC.com