Skip to main content
 

mobile challenge

Results 76 - 100 of 223Sort Results By: Published Date | Title | Company Name
Published By: Here Technologies     Published Date: Apr 02, 2019
Automobile and heavy equipment manufacturers are ready to break free of the outdated state of their outbound supply chains. A lack of visibility contributes to a process that is ripe for optimization. Manufacturers need reliable partners to help establish greater visibility of their supply chains and locate assets in real time. This ebook outlines how solutions from HERE Technologies can meet common supply chain challenges and help manufactures enable proactive decision-making and greater efficiency. This ebook will help you understand how location intelligence from HERE: • Enables manufacturers tackle key supply chain challenges and begin a new phase of smart optimization • Helps manufacturers establish more accurate supply chain ETAs • Utilizes a range of technologies to provide real-time locations – both indoor and outdoor
Tags : 
auto, mapping, location data
    
Here Technologies
Published By: Here Technologies     Published Date: May 14, 2019
To provide drivers with navigation experiences that are always fresh, differentiated and that set an OEM’s brand apart on either embedded or mobile platforms, automakers need an unprecedented level of flexibility and control over data, software and the delivery process. As a SaaS offering, HERE Navigation on Demand offers automakers a new way to solve their key challenges – such as static software, complex and costly solution development and the inability to update or upgrade the experience once vehicles are in the field. Automakers need alternatives as they overhaul their navigation and connected service programs and bring change to their development, deployment, and monetization processes. This whitepaper outlines how HERE Technologies can support them to deliver compelling navigation and connected experiences, while keeping them in full control of their branding and revenue streams. Find out how HERE Navigation on Demand leverages: The HERE Open Location Platform to deliver alwa
Tags : 
auto, mapping, location data
    
Here Technologies
Published By: IBM     Published Date: May 28, 2015
In this book, you look at how the Smarter Process approach helps you create a more customer-centric organization. You discover how four major technologies — mobile, cloud computing, Big Data, and social collaboration — are disrupting the way you do business and how you can work through the challenges.
Tags : 
smarter process, data management, business models, blueworks live, big data, cloud computing, social collaboration
    
IBM
Published By: CA Technologies     Published Date: Jan 08, 2014
Mobile devices are ubiquitous and end users keep tend to keep them close at hand. This represents both an opportunity and a challenge with regard to security and authentication. There is an opportunity to leverage mobile devices to provide out-of-band authentication methods for access to sensitive applications and data. There is also a growing challenge to provide user convenient authentication directly from mobile devices. This eBook will discuss these use cases and how they fit into your overall mobile authentication strategy.
Tags : 
ca technologies, authentication, password management, bring your own device, byod, mobile security, security, mobile device
    
CA Technologies
Published By: CA Technologies     Published Date: Jan 08, 2014
Customers are embracing new technologies and they want to interact through a variety of applications, at any time and from any device. Many consumer facing organizations are racing to enable new interaction channels to innovate, grow their business and improve customer loyalty. As they expand online services and add mobile and social media interaction there is an increasing need to both secure and coordinate these activities. The key challenge is to deliver innovative new applications and services quickly and to provide an excellent customer experience across multiple channels.
Tags : 
ca technologies, crm, customer relationship management, delivery, security, multi-channel, customer environment, customer experience
    
CA Technologies
Published By: CA Technologies     Published Date: Jan 15, 2014
Mobile devices are ubiquitous and end users keep tend to keep them close at hand. This represents both an opportunity and a challenge with regard to security and authentication. There is an opportunity to leverage mobile devices to provide out-of-band authentication methods for access to sensitive applications and data. There is also a growing challenge to provide user convenient authentication directly from mobile devices. This eBook will discuss these use cases and how they fit into your overall mobile authentication strategy
Tags : 
ca technologies, authentication, password management, bring your own device, byod, mobile security, security, mobile device
    
CA Technologies
Published By: CA Technologies     Published Date: Jan 15, 2014
Customers are embracing new technologies and they want to interact through a variety of applications, at any time and from any device. Many consumer facing organizations are racing to enable new interaction channels to innovate, grow their business and improve customer loyalty. As they expand online services and add mobile and social media interaction there is an increasing need to both secure and coordinate these activities. The key challenge is to deliver innovative new applications and services quickly and to provide an excellent customer experience across multiple channels.
Tags : 
ca technologies, crm, customer relationship management, delivery, security, multi-channel, customer environment, customer experience
    
CA Technologies
Published By: CA Technologies     Published Date: Jan 15, 2014
Customers are embracing new technologies and they want to interact through a variety of applications, at any time and from any device. Many consumer facing organizations are racing to enable new interaction channels to innovate, grow their business and improve customer loyalty. As they expand online services and add mobile and social media interaction there is an increasing need to both secure and coordinate these activities. The key challenge is to deliver innovative new applications and services quickly and to provide an excellent customer experience across multiple channels.
Tags : 
ca technologies, crm, customer relationship management, delivery, security, multi-channel, customer environment, customer experience
    
CA Technologies
Published By: Citrix Systems     Published Date: Sep 17, 2015
Embracing mobile devices, thin clients, new app delivery systems, and BYOD all represent a huge challenge to IT. The incredible amount of flexibility, productivity, and employee satisfaction that can be gleaned from the support of such initiatives is massive. However, this shift comes at a high price in terms of increased infrastructure cost and the increased complexity of managing it all.
Tags : 
mobile, thin clients, app delivery, byod, employee productivity
    
Citrix Systems
Published By: Akamai Technologies     Published Date: Apr 25, 2018
APIs are increasingly powering mobile applications, websites, single-page applications, and data sharing. APIs connect across business and technology boundaries—meaning every enterprise has good reason to be developing, delivering, and consuming APIs. Learn more about: How to overcome API latency & traffic spike challenges Options to ensure 100% availability How to design a security stack for your APIs
Tags : 
api, performance, security, developing, applications, data
    
Akamai Technologies
Published By: IBM     Published Date: May 09, 2016
Adopting new mobile applications usually brings with it legitmate concerns related to security and risk mitigation. This technical white paper explains how IBM MobileFirst Platform can address some of the unique security challenges of mobile applications by helping you to: - Protect on-device data through encryption, offline authentication and other security features - Integrate IBM MobileFirst Platform with your existing enterprise security infrastructure - Prevent the mass distribution of tampered copies of your original application - Enforce security updates to your mobile applications
Tags : 
ibm, mobile, hybrid, buyer's guide, mobile applications, mobile application platforms
    
IBM
Published By: IBM     Published Date: May 22, 2017
Only a handful of industries have been transformed by the digital age the way banking has. Internet and mobile banking, digital wallets, and a raft of new and innovative products have redefined “the bank” from a local, brick-and-mortar branch to an anytime-anywhere process. The new banking environment has opened opportunities for national, regional, and community banks alike, which are no longer constrained to serve only customers located in the areas where they maintain a physical branch presence. But it has also brought challenges associated with collecting, processing, analyzing, storing, and protecting vast amounts of new data, from multiple locations and sources.
Tags : 
cloud privacy, cloud security, cloud management, cloud assurance, cloud visibility, enterprise management, data management
    
IBM
Published By: Reputation.com     Published Date: Oct 02, 2017
1.Meet the new consumer The migration to mobile and social media will challenge — and change — everything we know about consumer marketing. 2. Who owns your brand? Brand equity can no longer be bought. Online reviews now generate total market transparency for location-based businesses. Reviews tilt the balance of branding power away from companies and into the hands of customers. 3. The battle for brick-and-mortar customers is won or lost on the social web. To win, marketers must actively enlist customers as online advocates. Those who scale online review volume and quality will be rewarded with higher search visibility and more business at street level. 4. “Dark data” provides priceless operational insights Vast amounts of unstructured, unmined sentiment data on social media provides feedback about the customer experience that you can filter using thematic analysis and use to improve operations at the national or location level. 5. Business implications Online reputation stands betwee
Tags : 
    
Reputation.com
Published By: Reputation.com     Published Date: Oct 02, 2017
1. Meet the new healthcare consumer The consumerization of healthcare, major demographic shifts, and the migration to mobile and social media are tilting the balance of power away from traditional healthcare marketers and into the hands of potential patients. 2. Online reputation is the new competitive frontier for marketers Healthcare brands are no longer controlled by marketers. Patient feedback about doctors and facilities online is leading to total market transparency for healthcare consumers. CG-CAHPS surveys only go so far in providing social proof. 3. Healthcare branding is becoming hyper-local In the search for providers, all branding is local – at the level of individual practitioners and facilities. Proliferating points of presence on the web make this a challenge that requires technology. But healthcare marketers who scale online review volume and quality will be rewarded with higher search visibility. 4. Business implications Online ratings and reviews stand between everyth
Tags : 
    
Reputation.com
Published By: OneLogin     Published Date: Oct 24, 2017
SaaS has fundamentally changed security requirements. We used to just go into work, and everything—corporate applications, sensitive customer data, employee health records, etc.—was within the “safe” four walls of the corporate network behind a firewall. Now employees work remotely and use mobile devices, including unmanaged, personal devices. They access SaaS apps that live in the cloud without any sort of firewall that IT can use to monitor and manage access. Prominent examples include Salesforce.com, Google Apps, Office 365, Box, and many others. As employees use these SaaS apps, they are creating proprietary company data, often confidential in nature, that exists outside the control of IT, creating new challenges for security teams. In this new world, IT needs to track sensitive corporate data in third-party SaaS apps, and ensure that only the right people have the right level of access to it. In this whitepaper, we’ll explain ten steps on how to do that
Tags : 
    
OneLogin
Published By: IBM     Published Date: Jul 02, 2018
Digital transformation is not a buzzword. IT has moved from the back office to the front office in nearly every aspect of business operations, driven by what IDC calls the 3rd Platform of compute with mobile, social business, cloud, and big data analytics as the pillars. In this new environment, business leaders are facing the challenge of lifting their organization to new levels of competitive capability, that of digital transformation — leveraging digital technologies together with organizational, operational, and business model innovation to develop new growth strategies. One such challenge is helping the business efficiently reap value from big data and avoid being taken out by a competitor or disruptor that figures out new opportunities from big data analytics before the business does. From an IT perspective, there is a fairly straightforward sequence of applications that businesses can adopt over time that will help put direction into this journey. IDC outlines this sequence to e
Tags : 
    
IBM
Published By: Group M_IBM Q418     Published Date: Dec 18, 2018
Digital transformation is not a buzzword. IT has moved from the back office to the front office in nearly every aspect of business operations, driven by what IDC calls the 3rd Platform of compute with mobile, social business, cloud, and big data analytics as the pillars. In this new environment, business leaders are facing the challenge of lifting their organization to new levels of competitive capability, that of digital transformation — leveraging digital technologies together with organizational, operational, and business model innovation to develop new growth strategies. One such challenge is helping the business efficiently reap value from big data and avoid being taken out by a competitor or disruptor that figures out new opportunities from big data analytics before the business does.
Tags : 
    
Group M_IBM Q418
Published By: Ricoh     Published Date: Oct 04, 2019
On June 25, 2018, Ricoh announced its Cloud Workflow Solutions portfolio, a collection of cloudbased solutions and services that bring streamlined processes to SMBs in scalable, subscriptionbased packages. With an emphasis on addressing specific challenges facing smaller businesses, these solutions are meant to empower digital workplaces by eliminating manual steps, reducing manual data entry, and improving speed and accuracy to increase productivity and reduce overall costs. Many SMBs struggle to move beyond the challenges associated with content silos, lack of interoperability, and ongoing transition to mobile work environments. Much like their enterprise counterparts, smaller businesses face various complexities and pain points associated with interdepartmental workflows combined with a real need to enable employees to work when, where, and how they desire. Ricoh's Cloud Workflow Solutions platform is designed to address these challenges by streamlining and automating common busines
Tags : 
    
Ricoh
Published By: Group M_IBM Q119     Published Date: Dec 18, 2018
Digital transformation is not a buzzword. IT has moved from the back office to the front office in nearly every aspect of business operations, driven by what IDC calls the 3rd Platform of compute with mobile, social business, cloud, and big data analytics as the pillars. In this new environment, business leaders are facing the challenge of lifting their organization to new levels of competitive capability, that of digital transformation — leveraging digital technologies together with organizational, operational, and business model innovation to develop new growth strategies. One such challenge is helping the business efficiently reap value from big data and avoid being taken out by a competitor or disruptor that figures out new opportunities from big data analytics before the business does.
Tags : 
    
Group M_IBM Q119
Published By: SDL     Published Date: Sep 20, 2019
Component Content Management: A New Paradigm in Intelligent Content Services While technology has changed the world, the way that companies manage information has inherently stayed the same. The advent of near-ubiquitous connectivity among applications and machines has resulted in a data deluge that will fundamentally alter the landscape of content management. From mobile devices to intelligent machines, the volume and sophistication of data have surpassed the ability of humans to manage it with outdated methods of collection, processing, storage, and analysis. The opportunity afforded by the advent of artificial intelligence (AI) has stimulated the market to search for a better way to capture, classify, and analyze this data in its journey to digital transformation (DX). The paradigm of document-based information management has proven to be a challenge in finding, reusing, protecting, and extracting value from data in real time. Legacy systems may struggle with fragmented information
Tags : 
    
SDL
Published By: Good Technology Corporation     Published Date: Oct 23, 2012
Increase of BYOD programs in the enterprise has introduced questions to those in charge of enterprise mobility. Fierce MobileIT's ebook, "Securing the Mobile Workforce,"covers many of the trends and challenges of securing corporate data on a device.
Tags : 
byod, virtualization, enterprise applications, mobile, security, implementation
    
Good Technology Corporation
Published By: Good Technology Corporation     Published Date: Apr 29, 2013
Mobile apps are the ultimate corporate dilemma: They turbo-charge productivity—but also bring security risks. You need a mobile app security strategy to navigate the challenge. Read this guide to learn the top 10 must-haves as you build yours.
Tags : 
mobile applications, mobile security, mobile application management, mobile app security, secure mobile application, enterprise mobile applications
    
Good Technology Corporation
Published By: Frontrange     Published Date: Mar 13, 2013
Data is now accessed via physical and virtual desktops, laptops and mobile devices. IT organizations struggle to control and manage this widening pool of devices. View this Computerworld Survey to better understand the solutions to these challenges.
Tags : 
it service management, itsm, service desk, service catalog, service management software, mobile service management, cloud itsm, service manager
    
Frontrange
Published By: Epicor     Published Date: Nov 19, 2018
Managing inventory efficiently is one of the challenges that lumber and building material businesses face. Evolving technologies, including mobile functionality and connected business, offer opportunities for LBM business growth. With a deep understanding of the challenges facing lumber and building materials dealers, Epicor has identified six ways integrated inventory management can have a positive impact on your LBM business, including: • Operational efficiencies • Data access and Insights • Mobile functionality Epicor has a proven history growing profits and increasing efficiencies for lumber and building material businesses. Read this Epicor Tip Sheet and discover how your LBM business can benefit from integrated inventory with BisTrack.
Tags : 
lumber, building materials, lbm, erp, bistrack, lumber distributors
    
Epicor
Published By: Polycom     Published Date: Mar 12, 2018
"Traditional offices and meeting rooms are giving way to open team and mobile spaces, as well as huddle rooms, all of which present challenges for effective collaboration in geographically distributed organizations. Polycom can help you transform the way you and your teams work and compete more effectively with intuitive collaboration tools that fit with the way your teams work, not the other way around. The Polycom 2018 Buyers Guide will help you understand how to apply team collaboration technology to meeting spaces of all sizes.
Tags : 
workplace, mobile, polycom, business, optimization
    
Polycom
Start   Previous    1 2 3 4 5 6 7 8 9    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.