mobile devices

Results 451 - 475 of 897Sort Results By: Published Date | Title | Company Name
Published By: IBM     Published Date: Jul 09, 2014
Building a mobile collaboration or bring-your-own-device solution requires three things: mobile applications, the mobile devices themselves and the network that underpins them both. Often, the network and its capabilities take a back seat to applications and devices—which can ultimately lead to poor performance or an inflexible infrastructure. Find out how to develop the type of network that truly supports mobile devices, applications and unified communications programs, thereby establishing the foundation for stronger mobile solutions.
Tags : 
ibm, mobility, mobile, mobile technology, mobile infrastructure, it infrastructure, it management
    
IBM
Published By: IBM     Published Date: Jul 09, 2014
To gain fast access to patient records, Kochi Medical School Hospital in Japan struggled to use aging mobile devices that were unreliable and expensive to repair. Read the case study to learn how the hospital used IBM Mobility Services and desktop cloud to deploy hundreds of mobile devices at a lower per-device cost in a security-rich cloud environment. IBM helped the hospital achieve anywhere, anytime access to patient records; maintain the confidentiality of patient medical information; improve patient care coordination; and increase staff productivity.
Tags : 
ibm, mobile computing, mobile computing system, cloud services, productivity, technology services, cloud platform, mobility
    
IBM
Published By: IBM     Published Date: Aug 14, 2014
Consumers are leveraging innovative and richly functional mobile devices to become connected and empowered like never before, reshaping the consumer/marketer relationship and raising the stakes for marketers to utilize the mobile channel to engage shoppers and drive revenue.
Tags : 
ibm, mobile, marketing, consumer, marketer, mobile channel, revenue
    
IBM
Published By: IBM     Published Date: Aug 28, 2014
The paybacks from paper-free processes can be dramatic: much improved response times and greater productivity of back-office staff. Extending capture to mobile devices provides even closer coupling to back-office workflows. Yet the progress being made towards paper-free processes is very slow. In this report, AIIM looks at the reasons for this poor progress, measure the adoption of digital mailrooms, chart the progress of mobile capture, and show which paper-free processes are the most effective. It helps you build a business case for the battle against paper, and make recommendations on how to move the business forward on all fronts.
Tags : 
paper-free processes, digital mailrooms, mobile capture
    
IBM
Published By: IBM     Published Date: Oct 14, 2014
Building a mobile collaboration or bring-your-own-device solution requires three things: mobile applications, the mobile devices themselves and the network that underpins them both. Often, the network and its capabilities take a back seat to applications and devices—which can ultimately lead to poor performance or an inflexible infrastructure. Find out how to develop the type of network that truly supports mobile devices, applications and unified communications programs, thereby establishing the foundation for stronger mobile solutions.
Tags : 
mobile collaboration, mobile applications, mobile solutions, mobile infrastructure
    
IBM
Published By: IBM     Published Date: Nov 04, 2014
Today’s consumers are on the move, and with mobile devices accounting for nearly 20 percent of site sales heading into the 2014 holiday season, creating compelling mobile experiences is no longer just a nice-to-have option. Read this research report from Aberdeen Group to get secrets on how targeted push notifications can generate unprecedented levels of engagement with customers wherever they are. Find out how to make sure every message they receive is relevant—and right on target.
Tags : 
mobile notifications, mobile apps, mobile consumers, site sales, push notification
    
IBM
Published By: IBM     Published Date: Nov 19, 2014
As the use of mobile devices exponentially expands, so too does security threats to the increasing number of mobile applications that companies rely on. As a result, companies struggle to keep pace with mobile application security and face the risk of embarrassing and costly data breaches. In this technical session, you’ll learn how Worklight Application Scanning helps you deliver applications that aren’t susceptible to the most common types of malware, including SQL Injection and Cross-Site Scripting. In addition, you’ll learn how this powerful tool helps address the OWASP Top 10 Mobile Risks for 2014.
Tags : 
application screening, user feedback, mobile app development, cloud-based services
    
IBM
Published By: IBM     Published Date: Jan 09, 2015
Building a mobile collaboration or bring-your-own-device solution requires three things: mobile applications, the mobile devices themselves and the network that underpins them both. Often, the network and its capabilities take a back seat to applications and devices—which can ultimately lead to poor performance or an inflexible infrastructure. Find out how to develop the type of network that truly supports mobile devices, applications and unified communications programs, thereby establishing the foundation for stronger mobile solutions.
Tags : 
ibm, mobile, network, capabilities, solutions, strategy, cisco, challenges, iot, byod
    
IBM
Published By: IBM     Published Date: Feb 11, 2015
This paper explores how companies can more safely introduce employee - or corporate-owned mobile devices into the workplace, identify the risks inherent in their broader access to corporate data, and derive enhanced business value.
Tags : 
corporate data, business value, mobile devices, client services
    
IBM
Published By: IBM     Published Date: May 12, 2015
The security threat landscape is rapidly evolving: from risks with the proliferation of mobile devices to the increased sophistication of organized cyber criminals and geopolitical threats. Healthcare has a significant burden with the dubious distinction of having the highest per record data breach cost among all regulated industries.
Tags : 
ibm, healthcare, security, data, cybercrime
    
IBM
Published By: IBM     Published Date: Jul 07, 2015
Mobile Devices in the workplace will exceed 5.25 Billion. Are you Ready?
Tags : 
ibm, mobile, devices, strategy, infrastructure
    
IBM
Published By: IBM     Published Date: Jul 07, 2015
By 2018, company-supplied mobile phones will exceed 228 million and mobile devices will replace 63% of desktops. Are you ready?
Tags : 
ibm, mobile, devices, strategy, infrastructure
    
IBM
Published By: IBM     Published Date: Oct 09, 2015
Mobilephobia: A family of fears typically impacting CISOs and other security professionals associated with embracing and deploying a mobile security strategy that enables access across the enterprise, sharing of corporate data or interaction with associates, customers and other third parties via mobile devices and applications.
Tags : 
    
IBM
Published By: IBM     Published Date: Jan 06, 2016
In light of such popularity, many organizations are turning their attention to mobile recruiting. So, how do job seekers use mobile devices in their job searches? Using data from the global IBM WorkTrendsTM survey, the IBM Smarter Workforce Institute (SWI) analyzed why and how potential job seekers use mobile in their job searches and what concerns and expectations they have. The results provide organizations with clear insights into how they can attract talent via mobile technologies.
Tags : 
ibm, mobile recruitment, recruitment, mobile devices, smarter workforce institute, attracting talent, human resources
    
IBM
Published By: IBM     Published Date: Jan 07, 2016
Are you suffering from “mobilephobia”? If you’re a CISO, and the growing number of mobile devices on your network—and your inability to manage those devices with traditional security measures—keeps you awake at night, then you’ve got a textbook case of mobilephobia.
Tags : 
ibm, mobile, ciso, mobile, security
    
IBM
Published By: IBM     Published Date: Mar 28, 2016
Attracting talented job candidates is one of the biggest challenges facing HR in the next 10 years.1 Understandably, organizations want top talent and they are highly focused on recruiting strategies that enable them to hire the very best. One increasingly popular strategy is mobile recruitment. As mobile devices become ever more ubiquitous, potential candidates are starting to look more favorably at organizations offering a mobile recruitment option.2 But are all candidates created equal when it comes to mobile recruitment? We decided to take a look at the coveted members of the workforce and explore their use of and attitudes towards mobile recruitment. Using the high-potential employees subset of our global WorkTrends™ survey data, we were able to compare top talent, who significantly outperform their peers and demonstrate a stronger capacity to succeed,3,4 with other employees. The results provide new insight into mobile recruiting and guidance for organizations looking to attract
Tags : 
ibm, recruiting, mobile recruiting, mobile recruitment
    
IBM
Published By: IBM     Published Date: Apr 04, 2016
When you think about mobile security and policies, do you ever think about all the places your enterprise data is going? We operate in a mobile economy, with an estimated 16M mobile devices infected by malware at any given time. There are more mobile devices connected to the Internet than human beings in the world. The question is: Are we prepared for that?
Tags : 
ibm, ciso, mobility, mobilephobia, mobile security
    
IBM
Published By: IBM     Published Date: Aug 08, 2016
In this solution brief, you'll learn how IBM Integration Bus enables you to: - Eliminate the need for point-to-point connectivity - Connect across an array of packaged applications and web services - Route and transform data in virtually any format so you can read, interpret and convert multiple data formats - Expose and extend back-end systems to mobile devices
Tags : 
ibm, middleware, api economy, ibm integration bus, business agility
    
IBM
Published By: IBM     Published Date: Oct 21, 2016
By next year over half of all US companies will formally support BYOD, bringing on the challenge of securing data and applications on devices that may often be in the hands malicious users, or worse – teenagers looking to win a game of Pokémon Go with mom’s work iPhone. And, thanks to the consumerization of IT, mobile users increasingly expect the same smooth user experience with business applications that is provided by popular games and consumer applications. Fortunately, increased mobility and the bring your own device explosion don’t always add up to increased security challenges and UI/UX struggles. This Tech Byte series will look at the most important considerations when planning a mobile strategy – from application development platform to security and governance to user interface guidelines, and present best practices that businesses of all kinds can use to help ensure a successful shift towards a mobile-first enterprise.
Tags : 
ibm, mobile, mobile security, devices, platform to device
    
IBM
Published By: IBM     Published Date: Nov 17, 2016
In this solution brief, you'll learn how IBM Integration Bus enables you to: - Eliminate the need for point-to-point connectivity - Connect across an array of packaged applications and web services - Route and transform data in virtually any format so you can read, interpret and convert multiple data formats - Expose and extend back-end systems to mobile devices
Tags : 
ibm, middleware, api economy, ibm integration bus, business agility
    
IBM
Published By: IBM     Published Date: Jan 19, 2017
Watch this video to learn how IBM Datacap and Box enable better customer centricity through the capture of data across mobile devices, scanners, email, fax and files. This solution works with Box to store documents in the cloud.
Tags : 
ibm, analytics, data, ibm box, customer centricity, ibm datacap
    
IBM
Published By: IBM     Published Date: Feb 16, 2017
Watch this video to learn how IBM Datacap and Box enable better customer centricity through the capture of data across mobile devices, scanners, email, fax and files. This solution works with Box to store documents in the cloud.
Tags : 
ibm, ecm, analytics, ibm datacap, ibm box
    
IBM
Published By: IBM     Published Date: Apr 20, 2017
The National Institute for Standards and Technology (NIST) and the Defense Information Systems Agency (DISA) have taken leading roles in exploring requirements for Mobile Device Management (MDM) systems for government agencies. Mobile devices, particularly smartphones, are exceptionally vulnerable to security breaches. They are easily lost, are filled with unknown applications, communicate over untrusted networks, and are often purchased by users without regard to IT standards and security features.
Tags : 
mobile security, mobile device management, enterprise data, application security, information security, communication interception, business data, app security
    
IBM
Published By: IBM     Published Date: Apr 20, 2017
Protecting confidential data while keeping mobile users productive. The terms Data Leak Prevention (DLP) and Container are beginning to dominate the mobile management conversation. Over the past few years great strides have been made in providing the tools and solutions that offer management and security for mobile devices; both for devices the enterprise owns and those that employees own. While these solutions generally meet the need to secure the device, they have been lacking in some of the more sophisticated security aspects that are commonplace in laptop and distributed network deployments. Specifically lacking are the robust DLP controls common in laptop management solutions.
Tags : 
    
IBM
Published By: IBM     Published Date: Apr 20, 2017
Security from design through deployment. Mobile devices are now a reality in many organizations. Building on Mobile Device Management (MDM) and Mobile Application Management (MAM), organizations are increasingly developing their own enterprise apps for specific job tasks to improve productivity, business partnerships, customer satisfaction and bottom-line performance. However, to achieve these benefits, it is imperative that mobile security best practices are incorporated throughout the lifecycle of the application.
Tags : 
    
IBM
Start   Previous    12 13 14 15 16 17 18 19 20 21 22 23 24 25 26    Next    End
Search Resource Library