"Tech Solutions - one byte at a time!"
DigiBytes.com is the digital library of solutions for business and technology professionals.

Login Register Login
For Admins

mobile app

Results 1 - 25 of 1360Sort Results By: Published Date | Title | Company Name
Published By: Fidelis Cybersecurity     Published Date: May 15, 2019
Its the start of a new year and amidst the countless predictions flooding the internet, one things for certain 2019 is shaping up to be the year of cloud adoption. Analysts are expecting that enterprise adoption of cloud will ramp up significantly, but with this migration and the continued adoption of mobile and IoT technologies, the attack surface is changing dramatically and this has major implications for security. Fundamentally, security boundaries extend from on premises infrastructure to cloud service provider environments where perimeters no longer exist. Organizations cannot defend themselves with the same strategies and tactics that applied when it did. In this brave new world of cloud, IoT and mobile technology, organizations must be agile and shift, extend, and evolve their perimeter-based defense practices to those that are more robust. Further, a comprehensive defense in depth approach enables defense of high value assets amidst a more unpredictable cyber security landsca
Tags : 
    
Fidelis Cybersecurity
Published By: CheckMarx     Published Date: Apr 03, 2019
We live in an era of digital transformation. Software is the backbone of this digital transformation. Mobile, cloud, open source, Internet of Things, microservices and AI have made software more complex. Over 80% of the code in today’s software applications is open source. Estimates show that there will be 30 billion connected IOT devices by 2020. Furthermore, 85% of customer interactions will be computer managed by 2020. Software is everywhere. While software has gotten more complex, timeto-market is the new name of the game and enterprises can’t risk security slowing this down.
Tags : 
    
CheckMarx
Published By: Forcepoint     Published Date: May 14, 2019
Things are not as they used to be in the enterprise. Today’s employees are mobile, they’re storing and accessing data in cloud apps, and are in disparate networks. While the present-day digital world has changed, the objective of data protection has not: you must still ensure the security of your critical data and intellectual property. However, the threat-centric security approach, with its static policies forces decisions about cyber activity with no insight into the broader context. The result is a disproportionate number of flagged activities, overwhelming security teams who have no way to understand the ones most worthy of investigation. Read Rethinking Data Security with a Risk-Adaptive Approach to learn how a human-centric, risk-adaptive approach can help your organization be more proactive in order to: • Automate policy enforcement to deter data loss events • Reduce the number of security alerts • Cut down on incident investigation time
Tags : 
    
Forcepoint
Published By: Virtela Communications, Inc.     Published Date: Oct 13, 2011
Christian Kane is an Enterprise Mobility Management Research Analyst with Forrester Research, where he helps clients develop and improve their desktop and mobile strategy. His research spans mobile hardware, mobile operating systems, mobile device management solutions, and mobile applications.
Tags : 
cloud computing, technology, virtela, device management, christian kane, mobility management, research, analytical applications, business intelligence, data quality
    
Virtela Communications, Inc.
Published By: Harry lei     Published Date: Apr 04, 2011
An approach towards solving the emerging technological implications of Mobile Apps. MOBILE is Accelerating.
Tags : 
i phone applications testing, blackberry applications testing, android applications testing, agile, saas, i pad applications testing, software compliance
    
Harry lei
Published By: Endeavour Software Technologies     Published Date: Nov 25, 2011
This whitepaper takes a deep dive into the security considerations required for enterprise mobile applications with an emphasis on iPad security.
Tags : 
    
Endeavour Software Technologies
Published By: e-SignLive     Published Date: Oct 11, 2013
While we tend to think about mobility largely as a consumer phenomenon, it is also changing how the workforce carries out business. With so much being done beyond traditional office walls, many insurance companies, financial service organizations and even government agencies are adopting mobile tablets and smartphones as productivity tools for agents, representatives and personnel, and developing enterprise apps for these devices.
Tags : 
ipad, mobility, apple, e-signatures, esign
    
e-SignLive
Published By: Akamai Technologies     Published Date: May 24, 2017
Nutzer von Mobilgeräten sind heutzutage verwöhnt. Sie erwarten, dass ihnen ansprechende Inhalte blitzschnell und optimiert auf ihrem Mobilgerät bereitgestellt werden – und das noch in der gleichen Qualität wie auf dem Desktop-PC. Einerseits stellen diese permanent mit dem Internet verbundenen Nutzer eine hervorragende Geschäftschance dar. Andererseits müssen Unternehmen komplexe Herausforderungen meistern, um solch hohen Nutzererwartungen bei der mobilen Bereitstellung gerecht zu werden. In diesem E-Book werden wir drei dieser Herausforderungen näher beleuchten und Wege aufzeigen, wie Sie diese durch Optimierungen für schnelle APIs, Apps und mobile Websites meistern. So lassen sich Umsätze sowie die Kundeninteraktion und Kundenbindung steigern. Laden Sie das E-Book heute noch herunter, um zu erfahren, wie Ihr Unternehmen die heutigen Anforderungen im Mobilbereich erfüllen kann.
Tags : 
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: May 24, 2017
Apps sind auf dem Vormarsch: Bei der Nutzung mobiler Geräte entfallen 85 % der Zeit auf Apps. Der App-Markt ist jedoch extrem umkämpft und 20 % der heruntergeladenen Apps werden nur ein einziges Mal geöffnet. Wie können Sie Ihre App von der massenhaften Konkurrenz abheben? Der Schlüssel zum Erfolg ist die Performance. Laden Sie diese Infografik herunter. Darin erfahren Sie, worauf es ankommt, um sich in den komplexen App-Umgebungen behaupten zu können, und wie Sie Nutzer mit schnellen, interaktiven Apps überzeugen.
Tags : 
    
Akamai Technologies
Published By: Cisco EMEA     Published Date: Nov 13, 2017
Encryption technology has enabled much greater privacy and security for enterprises that use the Internet to communicate and transact business online. Mobile, cloud and web applications rely on well-implemented encryption mechanisms, using keys and certificates to ensure security and trust. However, businesses are not the only ones to benefit from encryption.
Tags : 
anomaly detection, trust modeling, event classification, entity modeling, relationship building, internet scrapers
    
Cisco EMEA
Published By: Cisco EMEA     Published Date: May 15, 2018
Your employees, customers, and partners need the ability to connect and collaborate, at any time, from any location—across time zones or simply across the conference table. And those workplaces are expanding faster than ever, powered by mobile and cloud usage that makes virtual meetings essential. With scalable and secure voice, video, and content sharing, real-time collaboration can happen anywhere. Staying connected can lead to improved productivity and faster decision-making, as well as better customer service. But only if the technology offers a seamless experience and is intuitive enough to drive user adoption. While the need for better meetings is universal, not all conferencing tools are the same. Choosing the wrong tool could actually decrease productivity by wasting valuable meeting time troubleshooting the technology, or by providing a negative experience that will deter users from embracing it. This is especially true in situations where poor meeting quality could impact
Tags : 
    
Cisco EMEA
Published By: Zendesk     Published Date: May 31, 2018
Be always on with your customers; wherever they are. With Zendesk Chat, your customer agents can engage with customers over websites, mobile apps, and popular messaging apps like Facebook Messenger, Twitter, and LINE. That means you can build relationships with customers in the places they prefer.
Tags : 
    
Zendesk
Published By: Hewlett Packard Enterprise     Published Date: May 11, 2018
Das Thema Sicherheit droht, sich für Unternehmen zum Problem zu entwickeln. Die Zahl der Sicherheitsbedrohungen nimmt zu und die Angriffe werden immer raffinierter. Neue Technologien wie das IoT, mobile Lösungen und Hybrid IT-Umgebungen bieten zwar neue Geschäftschancen, bringen aber auch neue Risiken mit sich. Heutzutage reicht es daher nicht mehr aus, die Server auf Softwareebene zu schützen. Unternehmen müssen den Schutz bis auf die physischen Systeme ausweiten, um gegen Sicherheitsbedrohungen gewappnet zu sein. Angesichts der immer größeren Zahl an regulatorischen Bestimmungen im heutigen Geschäftsumfeld gewinnt die Einhaltung dieser Bestimmungen an Bedeutung – zum einen, um das Sicherheitsniveau zu verbessern, zum anderen, um die Kosten zu senken, die durch die Nichteinhaltung dieser Bestimmungen entstehen. Da diese Aspekte von so kritischer Bedeutung sind, ist es wichtig, den Schutz der Hardware zu verbessern und das Sicherheitsniveau bis auf Lieferkettenebene zu erhöhen.
Tags : 
    
Hewlett Packard Enterprise
Published By: Hewlett Packard Enterprise     Published Date: Aug 02, 2017
Enterprises are looking to innovations like big data, cloud-based services and mobile apps to improve decision making and accelerate business results. But legacy IT implementations—independent compute, storage and networking platforms, veneered with a hypervisor— often can’t deliver on the increased agility, scalability and price performance demands of this new era of IT.
Tags : 
information technology, networking platforms, return on investment, cloud-based services, mobile apps
    
Hewlett Packard Enterprise
Published By: Akamai Technologies     Published Date: May 05, 2017
Everybody has their favorite apps…but can you name even three mobile websites you like? Probably not – and that’s because retrofitting desktop web designs fails to meet users’ mobile expectations. Yet in spite of that, smartphone traffic is at its highest point ever and will only continue to increase. This report, written by Forrester analysts, outlines why it’s time for a radical web reset and how you can make your mobile website a “first-class citizen.” Download it today.
Tags : 
mobile applications, ebusiness, web design, web traffic, mobile websites
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: May 05, 2017
Today’s mobile users are spoiled. They demand rich, desktop quality experiences tailored to their devices and delivered at lightning fast speeds. And while these “always on” users represent a tremendous business opportunity, satisfying their high expectations requires overcoming complex mobile delivery challenges. In this e-book, we review three key mobile delivery challenges and explain how you can overcome them by optimizing for fast APIs, mobile apps, and mobile sites to increase engagement, revenue, and customer loyalty. Download today to learn how your business can Meet Today’s Mobile Mandate.
Tags : 
mobile adoption, customer loyalty, customer engagement, increase revenue
    
Akamai Technologies
Published By: ClearCompany     Published Date: Mar 24, 2016
As professionals in a world that is now driven by self-improvement, we’ve become very skilled at setting goals. There is a plethora of mobile apps that exist solely to help us track goals and keep ourselves accountable. Goals are what keep us engaged, looking ahead and striving to be better. That’s the same reason organizations spend hours, weeks, months and years planning and trying to execute them. But what good is all that motivation, strategy and planning if organizations can’t execute those goals properly? Well, none really.
Tags : 
clearcompany, human resources, hiring, recruiting, quality of hire
    
ClearCompany
Published By: Commvault     Published Date: Jul 06, 2016
ENDPOINT DATA. It’s often one of the most forgotten aspects of an enterprise data protection strategy. Yet, content on laptops, desktops and mobile devices is among a company’s most valuable data even while it’s potentially at the greatest risk. According to IDC there will be some 1.3 billion mobile workers by 2015. However, only half of enterprises today are using some type of endpoint backup. That means that the volume of endpoint data that is in jeopardy is nothing short of significant. Download to read the buyer's checklist on endpoint data protection!
Tags : 
commvault, endpoint data protection, endpoint data, data protection, backup, encryption, data loss prevention, mobile app, networking, security, it management, knowledge management, enterprise applications, storage, data management
    
Commvault
Published By: Commvault     Published Date: Jul 06, 2016
How do you maintain the security and confidentiality of your organization’s data in a world in which your employees, contractors and partners are now working, file sharing and collaborating on a growing number of mobile devices? Makes you long for the day when data could be kept behind firewalls and employees were, more or less, working on standardized equipment. Now, people literally work on the edge, using various devices and sending often unprotected data to the cloud. This dramatic shift to this diversified way of working has made secure backup, recovery and sharing of data an exponentially more difficult problem to solve. The best approach is to start with a complete solution that can intelligently protect, manage and access data and information across users, heterogeneous devices and infrastructure from a single console - one that can efficiently manage your data for today's mobile environment and that applies rigorous security standards to this function.
Tags : 
commvault, mobile data, file sharing, backup recovery, access, personal cloud approach, data protection, endpoint, end user recovery, control governance, networking, security, it management, enterprise applications, data management
    
Commvault
Published By: Hewlett Packard Enterprise     Published Date: Jul 12, 2016
Technology enables business transformation To thrive in today’s idea economy, small and midsize companies like yours are using technology to transform their business. Like your peers, you know that mobile applications, cloud-based solutions, and advanced analytics can help you increase productivity, reduce costs, and grow your business. Older servers, storage, and networking products weren’t built to handle the exploding amount of data that is being shared today. In order to take advantage of these modern applications, many companies have found that they need to close the gap between what their business demands and what their IT systems can deliver.
Tags : 
best practices, business optimization, business management, application management, enterprise application, business intelligence, transformation, productivity
    
Hewlett Packard Enterprise
Published By: Hewlett Packard Enterprise     Published Date: Jul 12, 2016
In today’s dynamic business environment where applications and data are accessed outside of traditional corporate boundaries, IT must embrace the needs of both the business and an ever present mobile workforce. Download this asset to learn more about working to support initiatives that keep the business agile and growing, and employees productive. Sponsored by: HPE and Intel®
Tags : 
best practices, mobile workforce, business management, business environment, applications, technology, mobile computing, business intelligence
    
Hewlett Packard Enterprise
Published By: Samsung     Published Date: Dec 18, 2015
This paper will examine seven steps for developing a current, secure, and well-managed mobile app portfolio.
Tags : 
    
Samsung
Published By: Samsung     Published Date: Dec 18, 2015
Download this infographic to see why with increasing adoption of mobile banking, banks must take a “mobile-first” approach to their branch networks
Tags : 
    
Samsung
Published By: Cisco     Published Date: Jun 21, 2016
Modern organizations are expanding mobility initiatives across virtually every business function. According to Cisco’s 2015 Mobility Landscape Survey, 72 percent of business leaders believe mobility is a strategic imperative for their organization’s success. In fact, in many businesses today, line-of-business (LoB) leaders are increasingly funding and making decisions about mobile applications and solutions.
Tags : 
    
Cisco
Published By: Equinix     Published Date: May 18, 2015
This white paper explores how CIOs and business leaders need to think much more broadly about how their technology fits into a global network of services due to the rise of cloud infrastructure, software as a service, the global data foot­print, and mobile apps.
Tags : 
hybrid cloud, technology, data center, global network, cloud computing, cloud, cloud infrastructure, mobile apps, software, cloud design challenges, public cloud, private cloud, public cloud vs private cloud, proximity, public cloud limits, benefits of hybrid cloud, network management, mobile computing, mobile data systems, virtualization
    
Equinix
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Special Report

In this webinar Black Duck Software (www.blackducksoftware.com), together with representatives of SAP, will review the benefits open source offers to development organizations, the management challenges it presents, and approaches for addressing those challenges.

Add Research

Get your company's research in the hands of targeted business professionals.

Modern Analyst Media Modern Analyst Media
Modern Analyst Requirements Modern Analyst Media Modern Analyst DigiBytes
Copyright 2009-2014 by Modern Analyst Media LLC Home  |  Featured Bytes  |  Popular Bytes  |  All Topics  |  Vendor Directory