mobile phones

Results 76 - 100 of 217Sort Results By: Published Date | Title | Company Name
By: 8x8 Inc.     Published Date: Jun 16, 2017
Some companies opt to deploy UC solutions on-premises, but the cloudbased model is gaining popularity. Cloud-based UC solutions are ideal for businesses that have limited IT staff, a distributed workforce and/or a desire for pay-as-you-go flexibility. By enabling diverse communication media to be carried over a common IP network, UC solutions make it possible to manage a full suite of capabilities from a single point—and use them with common devices. But what’s the best way to maximize UC capabilities for your specific workplace? Spiceworks surveyed IT decision makers to get their insights on identifying and deploying collaboration and communication solutions across their organizations. This white paper explores the survey results, including key concerns, pain points, and roadmaps around driving UC strategies.
Tags : technology solutions, mobile workforce, interface optimization, 8x8, desk phones, internal collaboration, remote employees, cost reduction
     8x8 Inc.
By: VMware     Published Date: Feb 24, 2017
Mobile device management (MDM) tools allow companies to connect their employees securely to basic corporate network resources. Enterprise mobility management (EMM) goes a step further by enabling secure mobile versions of business-critical applications and data loss prevention to protect corporate information. But in today's workplace, employees and businesses deal with a vast variety of devices with different operating systems and form factors, from PCs and laptops, to tablets and smartphones, and now, increasingly wearables and Internet of Things (IoT) endpoints. The solution is unified endpoint management (UEM), which enables organizations to take a consistent approach to manage and secure every endpoint, any app and content, and across deployment use cases from a single holistic platform. Read this whitepaper to uncover VMware AirWatch®'s leading UEM approach that is benefiting organizations tremendously.
Tags : 
     VMware
By: Gthreecom     Published Date: Nov 06, 2014
While 90% of consumers use mobile devices for pre-shopping activities, up to 84% use smartphones to help them shop in the store. It’s time to get personal with today’s mobile shoppers. Download this E-book, titled: The Retailer’s Mobile Strategy Guide, to learn the steps engage, convert and retain customers more efficiently.
Tags : 
     Gthreecom
By: Motorola     Published Date: Feb 06, 2008
In this paper, Frost & Sullivan has detailed leading mobile solution deployments, products in development and new product features and modifications for leading solution vendors in the mobile enterprise space. All solutions were then compared, evaluated and ranked based on parameters considered as critical in the implementation of a wireless enterprise solution.
Tags : mobile, wireless, wireless products, wireless phones, mobility, motorola, motorola good
     Motorola
By: Sprint     Published Date: Oct 15, 2010
As businesses increasingly demand mobile options for employees, Sprint has introduced a service for wholesale providers called Wholesale Mobile Integration (WMI), which integrates wireless and office telephones on the same phone number.
Tags : sprint wholesale, wireless integration, business communication, mobile phone, wholesale mobile integration, voip
     Sprint
By: Dell     Published Date: Mar 02, 2012
When you think about all the choices you have in computing devices for your workforce, it's easy to feel overwhelmed. There are so many different form factors, and for each, there are slight variations in shape, size, and physical features.
Tags : dell, mobile devices, tablets, mobile phones, workplace sofftware
     Dell
By: Dell     Published Date: Mar 02, 2012
By now the fundamentals of computer and network security are familiar to almost everyone who interacts with a PC on a regular basis: install antivirus software, choose good passwords and protect them and download and install software updates. Despite these measures, businesses of all sizes continue to suffer security breaches.
Tags : dell, mobile data, mobile devices, smartphones, it planning, technology, it management, small business, technology trenfs
     Dell
By: Dell     Published Date: Mar 02, 2012
Since the emergence of the personal computer, IT managers have had to navigate through a computing and communications landscape where business and consumer technologies have intersected. Sometimes those intersections produce benefits for all involved; other times they result in destructive collisions.
Tags : dell, idg, mobile technology, mobile data, mobile phones, mobile services, network security
     Dell
By: CDW Symantec     Published Date: Aug 02, 2012
Read about how Symantec provides the security needed to protect valuable information without hindering productivity. This white paper documents how Symantec helps identify, authorize, inspect and protect, so companies feel comfortable with their employees working from anywhere and from any device.
Tags : mobile, wireless, cloud computing, virtualization, data storage, data management, symantec, smart phones, rsa, cloud applications, data loss prevention, encryption, dlp, data center
     CDW Symantec
By: ThreatTrack Security     Published Date: Jan 22, 2015
It’s Time Businesses Wake up to the Mobile Security Reality - Bring Your Own Device (BYOD) is here to stay, and so are the associated risks. IT administrators face a new reality: pressure to account for, manage and secure an array of new endpoints. It's a giant task given the influx of smartphones and tablets, and the corresponding employee expectation - if not outright demand - for connection to the office at all times.
Tags : threattrack, security, threat, track, information, admins, best, practices, training, defense, tips, web, email, smartphones, education, data, breach, prevention, mobile, byod
     ThreatTrack Security
By: Oracle Service Cloud     Published Date: Mar 24, 2016
Despite the array of new technologies enabling customer contact across web and mobile channels, most serious interactions still have to pass through an agent in order to be resolved. Enterprises can push customers toward self-service, but in the end, people often still need to talk to other people. This means that, even in the best of circumstances, the customer experience is highly dependent on the capabilities of the agent manning the phones. That person needs more than skills and a beneficial temperament; they require a software environment that provides maximum space for flexibility, problem solving, and intuitive task switching.
Tags : oracle, service cloud, customer interaction, customer support
     Oracle Service Cloud
By: IBM     Published Date: Mar 11, 2008
More and more employees are working remotely or traveling around the world to meet with colleagues, customers and partners. Jobs are no longer tied to a specific physical location, and people have come to rely on devices such as mobile phones, personal digital assistants (PDAs) and laptops to stay connected and productive.
Tags : ibm, convergence, collaboration, pda, unified communications, productivity
     IBM
By: Secure Computing     Published Date: Jan 25, 2008
This paper discusses the value of two-factor authentication systems that provide vital access security for today's mobile workforces, who can now be productive from numerous remote locations: the home office, the airport, hotels, and customer sites. Moreover, the ubiquitous nature of mobile phones has now given rise to a new, convenient form factor for the software-based authenticator that resides right on the mobile phone/device.
Tags : cell phone, cell phones, wireless security, mobile security, mobile workers, authentication, 2-factor authentication, iam, identity management, access control, securecomputing, secure computing
     Secure Computing
By: Skillsoft     Published Date: May 10, 2011
Is now the time to take the plunge into mobile learning or should you wait for a more stable mobile landscape to emerge? It's important for organizations to focus on some basic issues before making this important decision.
Tags : mobile learning, smartphones, skillsoft, learning strategy, mobile learning strategy, tablets
     Skillsoft
By: Cisco     Published Date: Jan 29, 2009
Small business telephone systems are available in a variety of configurations, offering an ever-growing range of features and benefits. The most advanced small business telephone systems today run on Internet Protocol (IP) networks—the same network many small businesses use to connect employees, devices and information resources.
Tags : cisco, small business phone systems, ip networks, internet protocol, videoconferencing, unified messaging, mobile softphones, automated attendant, paging and intercom, crm
     Cisco
By: Dell Mobility     Published Date: Oct 12, 2011
Download this report to find out how technology professionals rate factors like security, integration with existing infrastructure, ease of use, etc.
Tags : dell, mobility, solutions, servers, storage, datacenter, client refresh, wireless, mobility, workstation productivity, mobile phones, smartphones, smart phones, touch screen phones, pda phones
     Dell Mobility
By: Dell Mobility     Published Date: Oct 12, 2011
Download this report and learn which mobile initiatives IT organizations are investing in most aggressively and what's driving those decisions.
Tags : dell, mobility, solutions, servers, storage, datacenter, client refresh, wireless, mobility, workstation productivity, mobile phones, smartphones, smart phones, touch screen phones, pda phones, lifecycle, decisions, refresh, rates
     Dell Mobility
By: Dell Mobility     Published Date: Oct 12, 2011
Download this report and learn where you need to invest your mobile money.
Tags : dell, mobility, solutions, servers, storage, datacenter, client refresh, wireless, mobility, workstation productivity, mobile phones, smartphones, smart phones, touch screen phones, pda phones, infrastructure, consumerization
     Dell Mobility
By: Cisco     Published Date: Jan 20, 2012
This white paper discusses 10 important tips your organization can use to secure employees' mobile devices. Read on!
Tags : mobile devices, smart phones, cybercrime, mobile, policy, cisco, transition, communication, migration, security, performance, version 6, internet protocol, ipv4, ipv6, security, video traffic, cloud infrastructure, network performance, networking
     Cisco
By: IBM     Published Date: Nov 09, 2012
IBM Rational enterprise modernization solutions can help companies develop new mobile banking services using smartphone technologies and text-message based services, to allow customers to make payments with their cell phones. All made simple.
Tags : z/os, aix, linux, windows, ibm, modernization, enterprise applications, data management
     IBM
By: CDW     Published Date: Mar 31, 2015
As mobile computing becomes an increasingly important technology, the need for robust, reliable wireless networks is growing. In addition to enterprise-issued devices, users are bringing their own tablets and smartphones and demanding access to IT resources. Organizations need a wireless infrastructure that can support these demands. Our research shows that in addition to mobile demands, aging hardware is driving many organizations' wireless upgrade plans. Download this white paper to read more about the research.
Tags : wireless, infrastructure, wi-fi, mobile computing, byod, upgrade, networking, it management
     CDW
By: CDW     Published Date: Mar 18, 2016
The number of mobile devices managed by enterprises increased 72 percent from 2014 to 2015. This onslaught of technology such as notebooks, smartphones, tablets, watches and gadgets has transformed the way users work. These devices provide users in just about every sector with access to the information and tools they need to do their jobs, wherever and whenever they need them. They’re free to work at their desks, in conference rooms, while visiting clients on the road or during a child’s baseball practice. They can input data directly into a medical chart, an order form or an inspection report, rather than doubling their work by transcribing handwritten notes later in the day.
Tags : 
     CDW
By: Plantronics     Published Date: Oct 18, 2013
Wireless technology surrounds us — in the workplace, at home, and many places in between. Mobile phones, WiFi networks, wireless computer accessories, and cordless phones all use radio transmissions for wireless communication. Even devices not used for communication, such as microwave ovens and lighting systems, emit radio frequency energy that can impact wireless devices. In this crowded radio environment, two technologies have emerged as the standard for wireless voice communication in UC and enterprise applications.
Tags : plantronics, audio device technology, wireless technology, digital telecommunications, wireless headset success, influence deployment, analogue modulation, business conversations, dect, dect architecture, wireless technologies, bluetooth headsets, interference avoidance, roaming range, radio spectrum, channel sharing, density effects, wideband operation
     Plantronics
By: Plantronics     Published Date: Oct 18, 2013
Emerging technologies empower, but they can also confuse. Workers in the new mobile landscape struggle to manage communications with mobile phones, landlines, VoIP calls and different voicemail boxes, email, IM, text messages and social networking applications. Unified Communications is the answer. It’s the bridge between all these communication systems helping manage communications with one interface.
Tags : plantronics, office environment, unified communications, emerging technologies empower, manage communications, audio quality, communication channels, acoustic technology, working offsite, b2b communication, telecommuting, plantronics audio devices, plantronics technology, ergonomic innovations, acoustic intelligence, networking
     Plantronics
Start   Previous    1 2 3 4 5 6 7 8 9    Next    End
Search White Papers      

Add White Papers

Get your white papers featured in the insideHPC White Paper Library contact: Kevin@insideHPC.com