• RSS
  • Twitter
  • FaceBook

Related Topics

Add White Papers

Get your company's white papers in the hands of targeted business professionals.

mobile computing

Results 176 - 200 of 242Sort Results By: Published Date | Title | Company Name
By: IBM     Published Date: Jul 26, 2017
Security threats are very real, and the stakes are higher than ever. Each day, tens of thousands of malware variants are created, with new classes of threats continually added and improved upon. Savvy attackers use polymorphic programs to alter malware into new form factors after each delivery. And all of this is exacerbated by the proliferation of mobile devices, cloud computing and social media—in fact, the intersection of these technologies provides fertile new ground for threats and malware.
Tags : 
mobile devices, security, data protection, data loss, information security
    
IBM
By: BlackBerry     Published Date: Jan 06, 2011
With consumer use of smartphones growing by the day, it's no surprise that users are taking them into the workplace as well. Thousands of people already use their personal smartphones for work-related tasks like checking email and calendars when they're away from their desks. And many wish they could do more with their smartphones, given their myriad functions and applications.
Tags : 
blackberry, enterprise server, desktop manager, communications software, rim, microsoft exchange, mobile device management, mobile device management software, mobile workers, remote computing, wireless applications software, wireless computing, mobile data systems, pda, smart phones, wifi, wireless application software, wireless communications, wireless phones, wireless service providers
    
BlackBerry
By: BlackBerry     Published Date: Dec 22, 2009
University of Waterloo conducted a six-week pilot project with several of its students in the Project Leadership Program, a distance learning program. Their goal was to see if mobile learning using BlackBerry smartphones would enhance their educational experience.
Tags : 
blackberry, mobile applications, waterloo, cio, pim, voip, smartphones, it communication, microsoft exchange, mobile device management, mobile device management software, mobile workers, remote computing, wireless applications software, wireless computing, mobile data systems, pda, smart phones, wireless application software, wireless communications
    
BlackBerry
By: BlackBerry     Published Date: Dec 22, 2009
The Johnson & Johnson Family of Companies is comprised of the world's premier consumer health company, the world's largest medical devices and diagnostics company, the world's fourth-largest biologics company, and the world's seventh-largest pharmaceuticals company. With over 250 operating companies in 57 countries, Johnson & Johnson's Credo is to put the needs and well-being of the people they serve first.
Tags : 
blackberry, mobile applications, johnson, pharma, cio, pim, voip, smartphones, it communication, microsoft exchange, mobile device management, mobile device management software, mobile workers, remote computing, wireless applications software, wireless computing, mobile computing, mobile data systems, pda, smart phones
    
BlackBerry
By: BlackBerry     Published Date: Dec 22, 2009
AT&T is a premier communications holding company. Its subsidiaries and affiliates, AT&T operating companies, are the providers of AT&T services in the United States and around the world. Among their offerings are the world's most advanced IP-based business communications services, the nation's fastest 3G network and the best wireless coverage worldwide, and the nation's leading high speed Internet access and voice services.
Tags : 
blackberry, mobile applications, at&t, pharma, cio, pim, voip, smartphones, it communication, microsoft exchange, mobile device management, mobile device management software, mobile workers, remote computing, wireless applications software, wireless computing, mobile computing, mobile data systems, pda, rfid
    
BlackBerry
By: IBM     Published Date: Apr 26, 2013
The move to 4G LTE networks promises much to the world of mobile computing: speeds ten-fold faster than 3G to enable HD video quality, faster online gaming, mobile video chat, and more … but from the communication provider’s perspective, LTE’s advances also come with higher levels of uncertainty. The videos in this interactive menu show how IBM’s Integrated Service Management for LTE delivers an integrated offering that provides visibility, control and automation over LTE networks and services.
Tags : 
demo, ibm, trivoli, netcool, lte, launchpad, mobile computing, hd tv quality
    
IBM
By: BlackBerry     Published Date: Mar 12, 2013
BlackBerry® 10 is an entirely new mobile computing platform that removes many of the barriers that slow down other devices. Here are just a few of the reasons end users love BlackBerry 10.
Tags : 
reasons to love blackberry 10, reasons end users, efficiently and effortless, blackberry 10, mobile devices, knowledge management, enterprise applications, mobile computing, mobile data systems, wireless application software, wireless communications
    
BlackBerry
By: BlackBerry     Published Date: Mar 12, 2013
Mobile Computing Corp Inc. (MCC) specializes in mobile field service solutions. After a rigorous trial period, the company’s CEO concluded that “the strength of BlackBerry 10 is great.” Find out what made the experience so positive.
Tags : 
case study, enterprise feedback, blackberry 10, mobile field service solutions, mobile computing corp, knowledge management, enterprise applications, mobile computing, mobile data systems, smart phones
    
BlackBerry
By: Blackberry     Published Date: Mar 12, 2013
Mobile Computing Corp Inc. (MCC) specializes in mobile field service solutions. After a rigorous trial period, the company’s CEO concluded that “the strength of BlackBerry 10 is great.” Find out what made the experience so positive.
Tags : 
mobile computing corp, implementing blackberry 10, feedback, enterprise, knowledge management, enterprise applications, mobile computing, mobile data systems, smart phones
    
Blackberry
By: IBM     Published Date: Oct 10, 2013
Four technology trends—cloud computing, mobile technology, social collaboration and analytics—are shaping the business and converging on the data center. But few data center strategies are designed with the requisite flexibility, scalability or resiliency to meet the new demands. Read the white paper to learn how a good data center strategy can help you prepare for the rigors and unpredictability of emerging technologies. Find out how IBM’s predictive analytics are helping companies build more accurate, forward-looking data center strategies and how those strategies are leading to more agile, efficient and resilient infrastructures.
Tags : 
technology trends, pervasive technology, data center, resilient infrastructures, collaboration and analytics, mobile technology, ibm, accurate strategies, cloud computing, scalability, wireless, data center design and management
    
IBM
By: IBM     Published Date: Oct 10, 2013
Mobile computing via smart phone, laptop, tablet and e-reader is becoming commonplace in the enterprise today. Unfortunately, so are the challenges it brings. This White Paper examines the network security, device management, network performance and user expectation issues you need to solve for effective mobile collaboration, and outlines the planned, architectural approach IBM recommends.
Tags : 
mobile computing, smart phones, wireless devices, device management, security, network performance, user expectations, mobile collaborations, architectural approach, mobile onslaught, networking, wireless
    
IBM
By: IBM     Published Date: Oct 10, 2013
Mobile devices, including smartphones and tablets, enable increasing numbers of employees to work "anywhere, anytime."The security of enterprise data is a key concern, particularly on mobile devices that are easily lost or stolen. The security risk is further heightened by the proliferation of employee-owned mobile devices in many enterprises. Employees will almost always take the path of least resistance in leveraging mobile devices for business purposes, which may lead to unsafe computing practices. A clearly documented and enforceable mobile security policy is critical to reducing the risk of data loss.
Tags : 
mobile, mobile enterprise, mobile environment, security, mobile security, mobile device, wireless, mobile strategy, byod, mobile infastructure, application management, data, security, safeguarding, telecommunications, enterprise applications
    
IBM
By: Cisco     Published Date: Apr 10, 2015
The evolution from business connectivity to business mobility is unlike previous compute transitions because it redefines how people work. Historically, companies provided access to the necessary applications and data from corporate-issued devices such as laptops and desktops in controlled operating environments. This tightly integrated environment tethered workers to a specific device and operating system, and even sometimes to a location. Mobility breaks these shackles and enables workers to change the way they work.
Tags : 
cisco, zk research, mobile workplace, mobile deployment, mobile computing, it management, mobile data systems, mobile workers, wireless hardware, wireless infrastructure
    
Cisco
By: Cisco     Published Date: Apr 10, 2015
Compare Switches & Get Free Resources Our guides and free service can help you prepare for mobility, advanced security, and simplicity with the new Catalyst switches.
Tags : 
cisco, catalyst, networks, byod, mobile computing, wifi, bandwidth management, infrastructure, network architecture, network management, network performance, network performance management, mobile data systems, mobile workers, wireless application software, wireless communications, wireless hardware, wireless infrastructure, wireless security, wlan
    
Cisco
By: Cisco     Published Date: Apr 10, 2015
Cisco’s Catalyst WS-C2960X-48TD-L and WS-C2960XR-48TD-I Gigabit Ethernet switches were evaluated by Miercom under the Certified Green program for power consumption and energy Using a 1518-byte frame size with 100% Layer 2 traffic load, testing showed both switches to be 55% more efficient in power consumption, measured in Watts/ Gbps, than the Industry Average efficiency. Overall environmental impact and business-enabling green benefits of the Layer 2 and Layer 3 switches were also analyzed.
Tags : 
cisco, catalyst, networks, byod, mobile computing, wifi, mobile data systems, mobile workers, wireless hardware, wireless infrastructure, green computing
    
Cisco
By: Cisco     Published Date: Apr 10, 2015
Get Ready for 802.11ac Wave 2, prepare your access network for new innovations with Cisco Catalyst Multigigabit Technology.
Tags : 
cisco, catalyst, networks, byod, mobile computing, wifi, mobile data systems, mobile workers, wireless communications, wireless hardware, wireless infrastructure, wireless phones, wlan
    
Cisco
By: Cisco     Published Date: Apr 10, 2015
Interest in cloud computing over the last several years has been phenomenal. For cloud providers, public or private, it will transform business and operational processes, streamlining customer on-ramping and time to market, facilitating innovation, providing cost efficiencies, and enabling the ability to scale resources on demand. Cisco's Virtualized Multi-tenant Data Center (VMDC) system defines an end-to-end architecture, which an organization may reference for the migration or build out of virtualized, multi-tenant data centers for new cloud-based service models such as Infrastructure as a Service (IaaS).
Tags : 
cisco, design, network architecture, mobile devices, best practices, vmdc, data center, cloud computing, iaas
    
Cisco
By: Cisco     Published Date: Jun 10, 2015
The shift to mobile and cloud computing is imperative for all company leaders because it facilitates the digitization of the business and advances new ways to enable employees and serve customers.
Tags : 
wifi, wireless, technology, network, application, mobile, cloud, network architecture, mobile computing, mobile data systems, wireless application software, wireless hardware, wireless infrastructure, wireless phones, wlan, application integration, application performance management, cloud computing
    
Cisco
By: BlackBerry Cylance     Published Date: Mar 12, 2019
Today’s advanced cyber threats target every computer and mobile device, including enterprise endpoints, especially those that make up critical infrastructure like industrial control systems and embedded devices that control much of our physical world. The modern computing landscape consists of a complex array of physical, mobile, cloud, and virtual computing, creating a vast attack surface. Meanwhile, the cybersecurity industry is prolific with defense-in-depth security technologies, despite a threat landscape that remains highly dynamic, sophisticated, and automated. Cylance, however, takes a unique and innovative approach of using real-time, mathematical, and machine learning threat analysis to solve this problem at the endpoint for organizations, governments, and end-users worldwide.
Tags : 
    
BlackBerry Cylance
By: IBM     Published Date: Jul 09, 2014
To gain fast access to patient records, Kochi Medical School Hospital in Japan struggled to use aging mobile devices that were unreliable and expensive to repair. Read the case study to learn how the hospital used IBM Mobility Services and desktop cloud to deploy hundreds of mobile devices at a lower per-device cost in a security-rich cloud environment. IBM helped the hospital achieve anywhere, anytime access to patient records; maintain the confidentiality of patient medical information; improve patient care coordination; and increase staff productivity.
Tags : 
ibm, mobile computing, mobile computing system, cloud services, productivity, technology services, cloud platform, mobility, it management
    
IBM
By: IBM     Published Date: Apr 09, 2015
How can you get actionable insight from user feedback to develop mobile apps that engage users and deliver what matters to them? The answer lies in cloud-based services that enable rapid collection and analysis of user feedback combined with automation enabling faster response.
Tags : 
application integration, mobile apps, coding, cloud-based services, cloud computing, automation, user feedback, mobile computing, application performance management, best practices, business integration, business process automation, analytical applications
    
IBM
By: IBM     Published Date: Feb 26, 2016
"71% of consumers do some digital research before buying an insurance policy, and 26% of those surveyed had purchased their policies online. Insurance companies are investing in interactive websites, mobile apps, and analytics software to help them optimize their processes, increase sales, improve customer service, and boost their financial standing. But is this enough to keep up? As technology continues to advance, leading insurance companies are already looking ahead to the next big advance that will transform the industry: cognitive computing."
Tags : 
cognitive computing, analytics software, ibm, insurance, process automation, business analytics, enterprise software
    
IBM
By: Druva     Published Date: Mar 30, 2016
As information security continues to rise to the top of the enterprise priority list, what used to be an easy-to-control environment, with all data stored behind the corporate firewall, is no longer. Shadow IT, mobile computing, consumer IT, and cloud computing are all transforming enterprise IT. Workers using unsecured networks and devices without encryption are also a concern, as data breaches cost organizations millions of dollars in fines, data loss, investigations, and customer backlash.
Tags : 
druva, data risks, consumer it, corporate firewall, shadow it, mobile computing, data breaches, security
    
Druva
By: VMware     Published Date: Dec 27, 2016
With Windows 10, Microsoft brings to market a mobile and cloud-ready OS that is poised to have a significant impact on organizations’ end user computing (EUC) strategy. The modern OS offers a unified platform for building apps and extending the organization’s core processes to end users anywhere and using any Windows 10-powered device. However, enterprise wide execution of this business mobility vision comes with its own set of challenges. A 2015 VMware study involving 1,000+ IT decision makers identified the following top concerns for adoption of mobility initiatives: Reduce the overall cost and complexity of management Ensure security and control of devices at all times Minimize the risk of corporate data loss With a unified endpoint management vision, VMware AirWatch® is strategically positioned to address these challenges. AirWatch's EUC solution enables organizations to fully capitalize on their mobility initiatives and IT departments to redefine themselves as true business enab
Tags : 
    
VMware
By: Citrix     Published Date: Jul 25, 2014
Android, iOS and Windows-based mobile devices—including smartphones, tablets and everything in between—have transformed enterprise computing, providing new mobility and flexibility for people and IT. At the same time, they compound the challenge of maintaining effective security and privacy of business information. Read this Citrix technical how-to guide—updated for Android 4.4, iOS 7.1, and Windows Phone.
Tags : 
enterprise information, secure, android, apple ios, microsoft window tablets, flexibility, mobile workers, smart phones, wireless messaging, wireless phones, windows, windows server, collaboration, messaging
    
Citrix
Start   Previous    1 2 3 4 5 6 7 8 9 10    Next    End
Search White Papers      

Community Area

Log in | Register

Solution Center

Follow TechGenix on Twitter