mobile devices

Results 151 - 175 of 893Sort Results By: Published Date | Title | Company Name
Published By: CA Technologies     Published Date: Mar 10, 2015
Die Möglichkeit, auf Smartphones und Tablets schlanke Apps auszuführen, hat zu einem Quantensprung des Potenzials von Mobile Devices am Arbeitsplatz geführt.
Tags : 
    
CA Technologies
Published By: CA Technologies     Published Date: Nov 02, 2016
Since Aternity was founded in 2005, the business world has changed dramatically. Mobile devices, software as a service (SaaS) and the cloud have taken up permanent residence in today’s enterprise IT department. Aternity stays on the cutting edge by rapidly delivering innovative End User Experience Monitoring solutions that can monitor any application on any device—physical, virtual or mobile—for any user.
Tags : 
    
CA Technologies
Published By: CA Technologies     Published Date: Jul 20, 2017
Mainframes continue to provide high business value by combining efficient transaction processing with high-volume access to critical enterprise data. Business organizations are linking mobile devices to mainframe processing and data to support digital applications and drive business transformation. In this rapidly growing scenario, the importance of providing excellent end-user experience becomes critical for business success.This analyst announcement note covers how CA Technologies is addressing the need for providing high availability and a fast response time by optimizing mainframe performance with new machine learning and analytics capabilities.
Tags : 
    
CA Technologies
Published By: CA Technologies     Published Date: Aug 22, 2017
Enterprise security traditionally relied on a fortress strategy that locked down user endpoints and created walls around the network. Today, this strategy cannot support or secure the use of mobile devices and SaaS capabilities, which exist outside the fortress. As a result, Chief Information Security Officers (CISOs) have been looking for new solutions that can secure these technologies today, and adapt as threats and business needs change. The credit card industry’s security model is one example that provides a new way to think about risk and contain it—that is, if you can see past the occasional bad rap it’s gotten from attacks and breaches.
Tags : 
    
CA Technologies
Published By: CA Technologies     Published Date: Aug 22, 2017
Across industry sectors, the boundaries of the traditional enterprise are blurring, as organizations open up their on-premise data and application functionality to partner organizations, the Web, mobile apps, smart devices and the cloud. APIs (application programming interfaces) form the foundation of this new open enterprise, allowing enterprises to reuse their existing information assets across organizational boundaries.
Tags : 
    
CA Technologies
Published By: CA Technologies     Published Date: Aug 22, 2017
The application economy has forced businesses to transform. To capture new growth opportunities, enterprises are opening up and sharing select data and applications with developers, partners, mobile devices, the cloud and the Internet of Things (IoT). One of the byproducts of this transformation is the discovery that legacy data has value in the application economy—so much so that new revenue opportunities emerge as this data is used in new ways.
Tags : 
    
CA Technologies
Published By: CA Technologies     Published Date: Aug 24, 2017
Die Möglichkeit, auf Smartphones und Tablets schlanke Apps auszuführen, hat zu einem Quantensprung des Potenzials von Mobile Devices am Arbeitsplatz geführt. Apps bieten Unternehmen deutliche Vorteile hinsichtlich der Maximierung der Konnektivität, Verfügbarkeit, Flexibilität und Produktivität von Mitarbeitern.
Tags : 
    
CA Technologies
Published By: CA Technologies     Published Date: Aug 24, 2017
Die Application Economy hat Unternehmen zu Umstellungen gezwungen. Unternehmen machen ausgewählte Daten und Anwendungen für Entwickler, Partner, Mobile Devices, die Cloud und das Internet of Things (IoT) zugänglich, um neue Wachstumschancen wahrzunehmen. Im Zuge dieser Umstellungen zeigte sich, dass Legacy-Daten in der Application Economy von Nutzen sein können, und zwar in einem solchen Ausmaß, dass sich durch die neue Art der Verwendung dieser Daten neue Umsatzchancen ergeben.
Tags : 
    
CA Technologies
Published By: CA Technologies     Published Date: Aug 24, 2017
The existence of smartphones and tablets able to run lightweight apps has created a quantum leap in the potential of mobile devices in the workplace. Apps present enterprises with clear benefits in terms of maximizing employee connectivity, availability, flexibility and productivity.
Tags : 
    
CA Technologies
Published By: CA Technologies     Published Date: Aug 24, 2017
In recent years, the concept of “Anywhere, Anytime Computing” has become the common denominator in driving personal electronic device sales, as users are adopting to new categories of devices such as smartphones, tablets, and smartTVs. These devices enable consumers and employees to access information and services from almost any device at any time. Gartner studies show that the estimated mobile phone market is to reach 1.8 billion devices in 2013.
Tags : 
    
CA Technologies
Published By: CA Technologies     Published Date: Aug 22, 2017
Effectively supporting these new business demands has become more complex and challenging. The increased use of mobile devices alone is driving exponential growth in transaction volumes. A customer pushes a button on his or her cell phone, for example, to check a bank balance. That single transaction triggers a cascade of transactions as the request is validated and data is accessed, retrieved and then sent back to the customer.
Tags : 
storage, systems, network, applications, data, automation, ca technologies
    
CA Technologies
Published By: CA Technologies     Published Date: Sep 25, 2017
Enterprise security traditionally relied on a fortress strategy tha locked down user endpoints and created walls around the network. Today, this strategy cannot support or secure the use of mobile devices and SaaS capabilities, which exist outside the fortress. As a result, Chief Information Security Officers (CISOs) have been looking for new solutions that can secure these technologies today, and adapt as threats and business needs change. The credit card industry’s security model is one example that provides a new way to think about risk and contain it—that is, if you can see past the occasional bad rap it’s gotten from attacks and breaches.
Tags : 
data protection, data security, data optimization, organization optimization, cloud management, virtualization, data center, cloud environment
    
CA Technologies
Published By: CA Technologies EMEA     Published Date: Aug 07, 2017
Ubiquitous connectivity and mobile devices have changed everything, opening up markets to millions of new consumers across the globe. Within the past few years, nimble upstarts have created mobile apps that have converted banking customers, cab riders and hotel guests at unprecedented rates. Large, established brands are scrambling to transform their businesses in order to maintain market share. To compete in this application economy, you must adapt or be left behind.
Tags : 
testing effort, delivery model, sdlc, ca technologies, continuous testing, testing effort, service virtualisation, delivery ecosystem
    
CA Technologies EMEA
Published By: CA Technologies EMEA     Published Date: Oct 20, 2017
Die Application Economy hat Unternehmen zu Umstellungen gezwungen. Unternehmen machen ausgewählte Daten und Anwendungen für Entwickler, Partner, Mobile Devices, die Cloud und das Internet of Things (IoT) zugänglich, um neue Wachstumschancen wahrzunehmen. Im Zuge dieser Umstellungen zeigte sich, dass Legacy-Daten in der Application Economy von Nutzen sein können, und zwar in einem solchen Ausmaß, dass sich durch die neue Art der Verwendung dieser Daten neue Umsatzchancen ergeben.
Tags : 
api, application programming interface, psd2, open banking, json, github, secure gateway, microservices, api gateway, apim, api management, full api lifecycle, restful web services, rest, integration, api portal
    
CA Technologies EMEA
Published By: CA Technologies EMEA     Published Date: Apr 10, 2018
A New Security Model Worth Understanding—and Emulating Enterprise security traditionally relied on a fortress strategy that locked down user endpoints and created walls around the network. Today, this strategy cannot support or secure the use of mobile devices and SaaS capabilities, which exist outside the fortress. As a result, Chief Information Security Officers (CISOs) have been looking for new solutions that can secure these technologies today, and adapt as threats and business needs change. The credit card industry’s security model is one example that provides a new way to think about risk and contain it—that is, if you can see past the occasional bad rap it’s gotten from attacks and breaches.
Tags : 
    
CA Technologies EMEA
Published By: CA Technologies EMEA     Published Date: Apr 10, 2018
Ein neues Security-Modell, das Sie verstehen und nachahmen sollten. Die Security in Unternehmen ähnelte bisher einer Festungsstrategie, die Anwenderendpunkte abschottete und Mauern um das Netzwerk baute. Heutzutage kann diese Strategie die Nutzung von Mobile Devices und SaaS-Funktionen (Software-as-a-Service), die sich außerhalb der Festung befinden, nicht mehr unterstützen. Daher haben sich Chief Information Security Officers (CISOs) nach neuen Lösungen umgesehen, die diese Technologien heute sichern können und die sich einer Zeit anpassen, in der sich sowohl Bedrohungen als auch Unternehmensanforderungen verändern.
Tags : 
    
CA Technologies EMEA
Published By: CA Technologies EMEA     Published Date: May 23, 2018
Increasingly, enterprises are opening their data and applications to partners, developers, mobile apps and cloud services. APIs provide a standardized way to open up information assets across the web, mobile devices, serviceoriented architecture (SOA) and the cloud. However, to make API information sharing safe, reliable and cost-effective, enterprises must deal with critical security, performance management and data adaptation challenges. CA API Management combines advanced functionality for back-end integration, mobile optimization, cloud orchestration and developer management. It is unique in its ability to address the full breadth of enterprise API management challenges.
Tags : 
    
CA Technologies EMEA
Published By: CA Technologies EMEA     Published Date: May 24, 2018
Sie müssen stets für das kontinuierliche Wachstum Ihres Unternehmens sorgen. Im Zuge der anhaltenden Dynamik der Application Economy setzen Sie zur Förderung dieses Wachstums vermutlich auf digitale Unternehmensinitiativen. Folgende Ziele für diese Strategie versprechen das größte Potenzial: • Bereitstellung einer herausragenden digitalen Customer Experience über Mobile Devices • Erschließung von Märkten und Umsatzquellen über unterschiedliche Kanäle• Vernetzung von Mitarbeitern und Partnern mit Unternehmensdaten jederzeit und standortunabhängig • Einführung innovativer neuer Services für das Internet of Things (IoT)
Tags : 
    
CA Technologies EMEA
Published By: Canon Solutions America     Published Date: Feb 28, 2019
Printers, scanners, mobile devices… It’s hard to imagine running a law office without them, but you should know they can expose your client data to theft or misuse. Learn why your office technology may not be as secure as you think.
Tags : 
legal document management, best legal document management systems, law firm data breach, law firm security breach, law firm data security, legal document automation software
    
Canon Solutions America
Published By: Carbonite     Published Date: Jul 18, 2018
With more and more employees spread around the globe, IT teams face a conundrum: how to secure an increasing amount of data traveling outside the network while preserving workforce productivity in an increasingly interconnected and global market. It’s up to IT decision-makers to protect and secure company data in a way that promotes user access without imposing overly restrictive or cumbersome device policies. When it comes to protecting data on laptops and mobile devices, several key factors are essential for today’s businesses:
Tags : 
    
Carbonite
Published By: Carbonite     Published Date: Oct 10, 2018
With more and more employees spread around the globe, IT teams face a conundrum: how to secure an increasing amount of data traveling outside the network while preserving workforce productivity in an increasingly interconnected and global market. It’s up to IT decision-makers to protect and secure company data in a way that promotes user access without imposing overly restrictive or cumbersome device policies. When it comes to protecting data on laptops and mobile devices, several key factors are essential for today’s businesses:
Tags : 
    
Carbonite
Published By: CBRE     Published Date: Aug 02, 2017
Watch this on-demand Ask Us Anything HIMSS webinar as we engage with a panel of experts from St. Joseph Health, Box, and MobileIron. We'll uncover St. Joseph Health’s recent deployment of Box cloud storage with MobileIron to their employees’ mobile devices, major changes we’re seeing in the healthcare industry, and so much more!
Tags : 
webinar, cloud storage, healthcare, mobile devices, mobileiron
    
CBRE
Published By: CDW     Published Date: Nov 12, 2012
Whether assigned or brought in ad hoc by staff, mobile-computing devices require MDM to protect enterprise IT assets.
Tags : 
cdw, mdm, mobile device management, cross-platform, apple, ios
    
CDW
Published By: CDW     Published Date: Nov 12, 2012
Preparing for the influx of mobile computing devices in schools.
Tags : 
cdw, consumerization of technology, mobile computing devices, influx of byod
    
CDW
Published By: CDW     Published Date: Oct 10, 2013
Pairing a BYOD program with MDM technology, a California law firm serves up a mobile strategy that lets its lawyers work where and when needed — securely.
Tags : 
consumerization, mdm, mobile device management, manage devices, attorneys work, airwatch, cloudbased, ios, android, access mobile applications, mobile device, mobile management, byod, wireless, network management, network performance management, productivity, mobileiron
    
CDW
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search Resource Library