Skip to main content
 

mobile activities

Results 1 - 24 of 24Sort Results By: Published Date | Title | Company Name
Published By: Cisco and NVIDIA Corporation     Published Date: Sep 09, 2019
The future of work means a new IT balancing act No matter what the work of your organization, today it’s likely done… …As much out of the office as in it …As much on mobile devices as traditional computers …And much more through cloud applications for core business activities and collaboration with customers and partners. The future of work has arrived, and with it comes a complex new balancing act for IT. On one side of the scale are high expectations for how IT can enable digital transformation and innovation in the business. On the other side is more accountability for mitigating risk, even as growing adoption of new technologies means more apps, more devices, and more mobile employees. This balancing act is driven by current challenges and trends in four areas.
Tags : 
    
Cisco and NVIDIA Corporation
Published By: Adobe     Published Date: Apr 25, 2016
In this study, you’ll discover key trends from today’s mobile consumer such as the activities they engage in the most, which elements in mobile experience receive the highest scores, and the benchmarks and best practices your company can take to raise your own mobile experience bar.
Tags : 
mobile, data management, mobile first
    
Adobe
Published By: Microsoft     Published Date: Jul 07, 2016
Enable, protect, and manage mobile productivity Protecting email and other corporate data on mobile devices—without bogging down workers—is one of today’s biggest challenges faced by IT pros today. With the massive, global proliferation of mobile devices, it can be a struggle to manage and secure these devices and your data, both on approved enterprise applications and shadow IT. Download this free e-book to learn how to control the uncontrollable and create a solution that: • Enables continuous management, so your employees are more productive. • Offers threat protection, so you can detect abnormal user behavior, suspicious activities, known malicious attacks, and security issues right away. • Guards against data leakage. • Provides security after loss or theft of mobile devices. • Helps protect your Microsoft Office email, files, and apps.
Tags : 
mobile devices, enterprise, best practices, management
    
Microsoft
Published By: CA Technologies     Published Date: Jan 08, 2014
Customers are embracing new technologies and they want to interact through a variety of applications, at any time and from any device. Many consumer facing organizations are racing to enable new interaction channels to innovate, grow their business and improve customer loyalty. As they expand online services and add mobile and social media interaction there is an increasing need to both secure and coordinate these activities. The key challenge is to deliver innovative new applications and services quickly and to provide an excellent customer experience across multiple channels.
Tags : 
ca technologies, crm, customer relationship management, delivery, security, multi-channel, customer environment, customer experience, social media, mobile, applications, customer experience management, customer engagement
    
CA Technologies
Published By: CA Technologies     Published Date: Jan 08, 2014
Customers are embracing new technologies and they want to interact through a variety of applications, at any time and from any device. Many consumer facing organizations are racing to enable new interaction channels to innovate, grow their business and improve customer loyalty. As they expand online services and add mobile and social media interaction there is an increasing need to both secure and coordinate these activities. The key challenge is to deliver innovative new applications and services quickly and to provide an excellent customer experience across multiple channels.
Tags : 
ca technologies, crm, customer relationship management, delivery, security, multi-channel, customer environment, customer experience, social media, mobile, applications, customer experience management, customer engagement
    
CA Technologies
Published By: Citrix ShareFile     Published Date: Jul 24, 2017
In just a few years, we’ve learned to rely on our phones for everything from banking to email to watching cat videos. Most importantly, it’s a safe bet your employees are using mobile devices for work-related activities as well – whether your IT department is prepared for it or not. The proliferation of internet devices makes it simply too easy for employees to check emails en route to the office or give a project that final once over from their couch at home. Smart businesses are already taking advantage of this trend, and reaping the benefits of productivity and employee satisfaction. Is yours?
Tags : 
mobility, productivity, employee satisfaction
    
Citrix ShareFile
Published By: CA Technologies     Published Date: Jan 08, 2014
Customers are embracing new technologies and they want to interact through a variety of applications, at any time and from any device. Many consumer facing organizations are racing to enable new interaction channels to innovate, grow their business and improve customer loyalty. As they expand online services and add mobile and social media interaction there is an increasing need to both secure and coordinate these activities. The key challenge is to deliver innovative new applications and services quickly and to provide an excellent customer experience across multiple channels.
Tags : 
ca technologies, crm, customer relationship management, delivery, security, multi-channel, customer environment, customer experience, social media, mobile, applications, customer experience management, customer engagement
    
CA Technologies
Published By: CA Technologies     Published Date: Jan 15, 2014
Customers are embracing new technologies and they want to interact through a variety of applications, at any time and from any device. Many consumer facing organizations are racing to enable new interaction channels to innovate, grow their business and improve customer loyalty. As they expand online services and add mobile and social media interaction there is an increasing need to both secure and coordinate these activities. The key challenge is to deliver innovative new applications and services quickly and to provide an excellent customer experience across multiple channels.
Tags : 
ca technologies, crm, customer relationship management, delivery, security, multi-channel, customer environment, customer experience, social media, mobile, applications, customer experience management, customer engagement, application performance management, customer interaction service, customer satisfaction, secure content management
    
CA Technologies
Published By: CA Technologies     Published Date: Jan 15, 2014
Customers are embracing new technologies and they want to interact through a variety of applications, at any time and from any device. Many consumer facing organizations are racing to enable new interaction channels to innovate, grow their business and improve customer loyalty. As they expand online services and add mobile and social media interaction there is an increasing need to both secure and coordinate these activities. The key challenge is to deliver innovative new applications and services quickly and to provide an excellent customer experience across multiple channels.
Tags : 
ca technologies, crm, customer relationship management, delivery, security, multi-channel, customer environment, customer experience, social media, mobile, applications, customer experience management, customer engagement, application performance management, customer interaction service, customer satisfaction, secure content management
    
CA Technologies
Published By: Forrester     Published Date: May 10, 2012
More people own smartphones than ever before and they're using them more often too. This makes a mobile marketing strategy crucial for any interactive marketer. Yet today we find that although mobile budgets are beginning to increase, the majority of interactive marketers are just starting to experiment, and many still treat mobile phones as mini-PCs. This report explains how marketers at each phase of mobile marketing evolution should craft successful mobile campaigns by hewing to three key principles: immediacy, simplicity, and context.
Tags : 
emerging methods, brand tactics, mobile channel for consumers, ecommerce, consumer mobile activities, mobile marketing, media mix, emerging media, consumer mobile devices, mobile advertising
    
Forrester
Published By: MicroStrategy     Published Date: May 15, 2014
MicroStrategy, a global innovator of mobile solutions, recently surveyed 500 U.S. organizations on the use of tablet computers to support sales activities across a large, diverse group of industries. The survey results suggested many companies are facing significant hurdles to sales enablement related to the limitations of their internal sales systems, which are largely not equipped for enabling sales processes out of the office. Find out how innovative companies are enabling their sales reps to be 10X more effective with mobile sales enablement apps.
Tags : 
mobilestrategy, mobile solutions, tablets, sales enablement, mobile sales, enablement apps, sales force, emerging marketing, traditional marketing, sales
    
MicroStrategy
Published By: Forcepoint     Published Date: May 14, 2019
Things are not as they used to be in the enterprise. Today’s employees are mobile, they’re storing and accessing data in cloud apps, and are in disparate networks. While the present-day digital world has changed, the objective of data protection has not: you must still ensure the security of your critical data and intellectual property. However, the threat-centric security approach, with its static policies forces decisions about cyber activity with no insight into the broader context. The result is a disproportionate number of flagged activities, overwhelming security teams who have no way to understand the ones most worthy of investigation. Read Rethinking Data Security with a Risk-Adaptive Approach to learn how a human-centric, risk-adaptive approach can help your organization be more proactive in order to: • Automate policy enforcement to deter data loss events • Reduce the number of security alerts • Cut down on incident investigation time
Tags : 
    
Forcepoint
Published By: LogMeIn     Published Date: Oct 08, 2015
This paper reveals how Europeans have significantly increased their use of mobile as a channel to regularly perform both shopping and support functions, with particular spikes in growth in research and purchasing activities.
Tags : 
mobile engagement, mobile engagement in europe, mobility, mobile devices, use of mobile, online shopping, retail
    
LogMeIn
Published By: CDW     Published Date: Jul 30, 2013
Today’s workforce is widely dispersed and more mobile than ever before. At the same time, decision making and many work processes are increasingly collaborative activities.
Tags : 
cdw, cloud communications, cloud collaboration, unified communications, ucc
    
CDW
Published By: Zebra Technologies     Published Date: Jun 15, 2017
Dallas-based Parkland Health & Hospital implemented a Zebra technology solution to create a mobile-enabled workforce at its new state-of-the-art hospital campus. That mobile solution enabled the nursing staff to focus on what’s most important — patient care. The solution gave nurses the ability to communicate in real time, access right-now information and take the right action with that information. Parkland’s leadership was able to track all patient activities from positive patient identification and specimen collection to laboratory specimen tracking and pharmacy medication administration. Additionally, hospital staff communication with voice and secure texting, along with patient alerts and alarms—all help increase patient safety, care and satisfaction.
Tags : 
parkland health, hospital, system, zebra, mobile
    
Zebra Technologies
Published By: Gthreecom     Published Date: Nov 06, 2014
While 90% of consumers use mobile devices for pre-shopping activities, up to 84% use smartphones to help them shop in the store. It’s time to get personal with today’s mobile shoppers. Download this E-book, titled: The Retailer’s Mobile Strategy Guide, to learn the steps engage, convert and retain customers more efficiently.
Tags : 
    
Gthreecom
Published By: Yammer     Published Date: May 23, 2012
The enterprise social software market is exploding thanks to converging trends of consumerization, cloud, and mobile. In this must-read report, "The Forrester Wave: Activities Streams, Q2 2012", Forrester Research Inc. evaluated five social software vendors with core strengths in the stream based on the overall strength of vendors' current offerings, a clear product strategy, and vendor market presence. In a detailed look at the space, Forrester named Yammer as a leader.
Tags : 
yammer, enterprise social, integration, cloud, adoption
    
Yammer
Published By: Adobe     Published Date: Sep 04, 2014
The rapid growth of mobile impacts all facets of your business. Econsultancy surveyed 600 client-side and agency marketers to provide data and insights in their Quarterly Digital Intelligence Briefing: Finding the Path to Mobile Maturity report, giving marketers a benchmark to judge their own mobile activities.
Tags : 
mobile impacts, mobile insight, mobile trends, mobile activities, emerging marketing
    
Adobe
Published By: ScanLife     Published Date: Feb 25, 2012
The report details information such as overall barcode scanning trends, mobile operating systems scanning shares, representative demographics of users, and activities of overall states and/or countries with the highest scanning utilization.
Tags : 
scanlife, marketing, emerging marketing, mobile marketing, barcode, mobile phones, smart phones
    
ScanLife
Published By: IBM     Published Date: Sep 30, 2013
Insurers are discovering the power of conjoining advanced technologies for collaboration, social media and mobile with business processes. The result is social business, which embeds advanced technology tools, media and practices into the ongoing activities of the organization. Social business reaches across the enterprise and then extends to customers and partners. Read this white paper to learn more.
Tags : 
ibm, social business, insurance, social media, media technology, it platforms, customer service
    
IBM
Published By: GoToMeeting     Published Date: Jun 09, 2010
This new Forrester white paper provides a snapshot of a typical day in the life of a U.S. information worker. It reveals how workers are employing new technologies and applications, interacting with their teams and engaging in mobile activities.
Tags : 
citrix gotomeeting, information worker, knowledge management, desktop computers, remote access employee
    
GoToMeeting
Published By: HP - Enterprise     Published Date: Jun 05, 2013
Mobile applications have swept across geographic boundaries, cultures, and enterprises faster than any previous technology innovation. Consumers around the world use them to find their way when they travel by car and verify flight details when they travel by air. They check bank balances and sports scores, reserve theater tickets and dining reservations, shop online, pay bills, download entertainment, and participate in dozens of other everyday activities—using convenient portable devices like smart phones and tablets. The demand for this kind of convenience has spilled over into the world of work as well, and employees today expect to use their mobile devices to check email, participate in meetings, access files—even use enterprise applications, like ERP and CRM, that drive business processes.
Tags : 
mobile application, mobile convenience, business opportunities, travel
    
HP - Enterprise
Published By: Okta     Published Date: Apr 29, 2015
Creating mobile apps that capture the minds and wallets of your customers will lead to increased revenue and improved customer engagement. However, you must do so while protecting customers’ privacy and shielding them from fraud and other malicious activities. This report will help S&R pros understand the growing mobile authentication market and its transformative impact on customers’ mobile moments.
Tags : 
mobile, apps, mobile apps, s&r, fraud, okta
    
Okta
Published By: IBM     Published Date: Apr 20, 2017
How to protect against mobile malware. Mobility is transforming enterprises at an unprecedented rate with the continued proliferation of smart devices, explosive development of mobile apps and increased access to work files. Employees are empowered by their organizations to be more productive at virtually any time and from anywhere, adopting policies for Bring Your Own Device (BYOD) and even allowing the use of personal apps for work-related activities. However, organizations have not kept pace with this mobility explosion by deploying the enterprise-grade security needed to protect their sensitive information. Hackers and thieves are seizing on this opportunity to penetrate networks and acquire sensitive work data from mobile endpoints. IT and Security leaders need a modern and robust security solution to proactively detect, analyze and remediate these mobile threats.
Tags : 
(delete)mobile management, system solutions, data security, software management, personal data management, device management
    
IBM
Search      

Add Research

Get your company's research in the hands of targeted business professionals.