"Tech Solutions - one byte at a time!"
DigiBytes.com is the digital library of solutions for business and technology professionals.

Login Register Login
For Admins

smartphones tablets

Results 1 - 25 of 87Sort Results By: Published Date | Title | Company Name
Published By: Hewlett Packard Enterprise     Published Date: May 11, 2018
The widespread use of mobile devices — smartphones and tablets — provides anytime, anywhere computing and communications resources for individuals worldwide. Both smartphones and tablets have made the transition from a personal resource, acquired and supported by consumers, to a professional resource, provided and supported by employers. For midsize firms around the world, those with 100–999 employees, mobile resources play a key role in improving workplace productivity as well as allowing greater flexibility in how and where work is done. New collaboration resources also allow staff in different locations to work together as efficiently and effectively as staff in the same office. The challenge for IT management is how best to coordinate the different collaborative and mobile resources and provide secure management of mobile devices and collaboration tools while enhancing workforce agility and productivity.
Tags : 
    
Hewlett Packard Enterprise
Published By: Hewlett Packard Enterprise     Published Date: Nov 06, 2017
In recent years, it seems like technology is changing faster than it used to in decades past. As employees devour newer technologies such as smartphones, tablets, wearables, and other devices, and as they become more comfortable with solutions such as Dropbox and Skype, their demands on enterprise IT intensify. Plus, management and other decision makers are also increasing their demands on enterprise IT to provide more infrastructure with less cost and time. Unfortunately, enterprise IT organizations often don’t see much, if any, associated increases in funding to accomodate these demands.
Tags : 
hyperconverged, infrastructure, implementation, data metrics, protection, recovery, public cloud
    
Hewlett Packard Enterprise
Published By: HPE     Published Date: Mar 23, 2015
If you’ve noticed more employees accessing the corporate network using their personally owned mobile devices, you’re not alone. Many employees are boosting their productivity by using their smartphones and tablets at work. Gone are the days of corporate IT departments dictating the types of mobile devices that could access the network. Bring your own device (BYOD) policies, while increasing employee satisfaction and productivity, are straining corporate networks. This white paper describes the limitations of legacy networks, especially for supporting BYOD. Understanding these limitations can pave the way for a successful BYOD management policy for campus and branch networks.
Tags : 
corporate network, personal devices, smartphone, tablet, legacy networks, byod
    
HPE
Published By: Adobe     Published Date: Nov 25, 2013
For the past several years, the nature of enterprise productivity has been forever changed by the new breed of mobile devices. Personal smartphones and tablets are everywhere. Gone are the days when every enterprise gave its employees a security-focused BlackBerry. Cloud-based productivity apps can be downloaded in seconds. Compared to even a few years ago, enterprises are operating in a new world. Please download whitepaper to learn more.
Tags : 
mobile devices, compatibility, cloud-based, enterprise, enterprise productivity, productivity apps, security-focused, smartphones tablets, growing mobile workforce, document productivity, content management, hybrid model, networking, it management, wireless, enterprise applications, storage management, business intelligence, data integration, web service management
    
Adobe
Published By: Adobe     Published Date: Jul 04, 2016
More and more interactions are shifting from the desktop to smartphones and tablets, so the value of that screen and the massive potential it represents grows daily. As do the opportunitie —and potential pitfalls—for marketers.
Tags : 
mobile, mobility, customer interaction, mobile devices, mobile computing, smart phones, customer experience management
    
Adobe
Published By: IBM APAC     Published Date: Aug 25, 2017
There is a tectonic shift in the way we work. We expect the same kind of intuitive, tactile experience with our workplace technology that we now take for granted with our smartphones, tablets and gaming systems. We expect our devices to talk to each other and update automatically. Virtual meetings should be as easy to set up as a video chat, and whatever we need to do our jobs should be as easy to tailor as a streaming music or video application.
Tags : 
personal profile, news and alerts, conversation recall, system updates, productivity tips
    
IBM APAC
Published By: IBM APAC     Published Date: Aug 22, 2017
While it might be desirable to standardize end users on one or two types of devices that all run the same operating system, most organizations don’t have that luxury. Today’s users demand an extraordinary level of flexibility and convenience—which means most organizations support a vast assortment of endpoints, including laptops and desktops (both PCs and Macs), tablets and hybrid devices, smartphones, and even wearables and IoT devices.
Tags : 
actionable insights, contextual analytics, applications, content, data, identity, threats, connectivity, smartphones, tablets
    
IBM APAC
Published By: Voltage Security     Published Date: Sep 13, 2012
Sending and receiving encrypted email with sensitive data should be a lot easier to do. But it ends up being something painful, and as a result we tend to avoid this protection.
Tags : 
data security, voltage, smartphones, tablets, smart security, email security, mobile email security, encryption, email encryption, security, smart phones, wireless security
    
Voltage Security
Published By: Voltage Security     Published Date: Sep 13, 2012
If there are any lingering doubts that mobile de-vices-such as smartphones and tablets-have profoundly transformed today's business, one study finds that using smart devices for produc-tivity is "now the standard.
Tags : 
data security, smart devices, smart security, data security strtegy, mobile security, security risks, security, smart phones, wireless security
    
Voltage Security
Published By: CA Technologies     Published Date: Jan 14, 2015
Whether you were at the forefront of the mobility era or are just now catching up—or, most likely, somewhere in between—you’ve already experienced first-hand the business impact of ubiquitous smartphones and tablets. From employees to customers, mobile devices spawned an explosion in new applications, data, support needs, security concerns, and other issues. They’ve reset expectations for organizational speed and flexibility. They’ve dramatically increased the surface area for potential security attacks. All this, and the mobile era is still just in its infancy.
Tags : 
mobile busienss, smartphones, tablets, applications, data, support needs, security attacks, organizational speed, wireless
    
CA Technologies
Published By: CA Technologies     Published Date: Aug 24, 2017
Die Möglichkeit, auf Smartphones und Tablets schlanke Apps auszuführen, hat zu einem Quantensprung des Potenzials von Mobile Devices am Arbeitsplatz geführt. Apps bieten Unternehmen deutliche Vorteile hinsichtlich der Maximierung der Konnektivität, Verfügbarkeit, Flexibilität und Produktivität von Mitarbeitern.
Tags : 
    
CA Technologies
Published By: CA Technologies     Published Date: Aug 24, 2017
We can quote innumerable stats to impress, but there is no need—it is apparent that the world is getting more connected. Today’s connectivity will seem primitive in a few years as the connectivity extends beyond smartphones, tablets and computers to concepts such as devices implanted in the human body.
Tags : 
    
CA Technologies
Published By: CA Technologies     Published Date: Aug 24, 2017
The existence of smartphones and tablets able to run lightweight apps has created a quantum leap in the potential of mobile devices in the workplace. Apps present enterprises with clear benefits in terms of maximizing employee connectivity, availability, flexibility and productivity.
Tags : 
    
CA Technologies
Published By: CA Technologies     Published Date: Aug 24, 2017
In recent years, the concept of “Anywhere, Anytime Computing” has become the common denominator in driving personal electronic device sales, as users are adopting to new categories of devices such as smartphones, tablets, and smartTVs. These devices enable consumers and employees to access information and services from almost any device at any time. Gartner studies show that the estimated mobile phone market is to reach 1.8 billion devices in 2013.
Tags : 
    
CA Technologies
Published By: CA Technologies     Published Date: Mar 10, 2015
Die Möglichkeit, auf Smartphones und Tablets schlanke Apps auszuführen, hat zu einem Quantensprung des Potenzials von Mobile Devices am Arbeitsplatz geführt.
Tags : 
    
CA Technologies
Published By: Brother     Published Date: Mar 08, 2018
The last decade has seen many exciting advances in connectivity accelerated by the near universal availability of smartphones and tablets – leading to a highly interconnected world. The security of networks - and the businesses and individuals that rely on them - has become top of mind for the IT Security professionals who are responsible for ensuring the safety of the data and the networks where this information is utilized. As high-visibility security breaches occur - affecting ecommerce, banking, retail and other industries - the critical importance of the security of the infrastructure these businesses rely on continues to grow. Security in the workplace is a daily fact of life. From using ID cards to control physical access, to entering passwords to join the network, to using software to monitor and prevent unauthorized access, all are routinely used to protect critical assets and information. However, there is one key area where many organizations still have potential vulnerabili
Tags : 
network security, security breaches, pci, dss, hippa
    
Brother
Published By: Citrix ShareFile     Published Date: Mar 31, 2017
Your directors may not have approved it, your IT department may not be ready for it, but your employees are already using their smartphones and tablets for work tasks. Don’t fight the change, embrace it: a mobile workforce can pay huge dividends for productivity and employee satisfaction. Download this e-Book to learn: • How giving your employees the choice to work from home can save $11,000 per year • What tool you can give your employees to boost creative innovation by 250% • Why organizations embracing mobility claim 320 hours more work per employee
Tags : 
mobile business, business efficiency, customer service, business benefits, employee efficiency
    
Citrix ShareFile
Published By: Keynote     Published Date: Apr 23, 2014
In the world of digital interactions, the margin between success and disengagement or abandonment is measured in milliseconds. With the exploding adoption of advanced smartphones and tablets, you need a mobile-first approach to engaging with customers and employees. And as your mobile initiatives are delivered at increasingly rapid rates, the quality and reliability of the mobile apps, mobile web and connected services that support them has become critically important. For the technology teams delivering customer and employee services in the mobile channel, it is important to understand that performance monitoring solutions which work for the desktop cannot be simply applied to mobile. Managing the mobile end user experience requires an understanding of the challenges posed by the complexities of the mobile environment. This paper will reveal the 4 pillars of mobile performance, plus offer strategies for accurately monitoring mobile end user experience so you can continuously improve.
Tags : 
mobile application monitoring, mobile application monitoring system, mobile app performance, mobile application performance, app monitoring, monitor mobile applications, web performance monitoring tools, performance monitoring, web application monitoring, mobile website performance, mobile website optimization, mobile web monitoring, keynote, wireless, enterprise applications
    
Keynote
Published By: Lookout     Published Date: Aug 30, 2017
Most people define mobile devices – smartphones and tablets – as those running a mobile-optimized operating system (e.g. iOS, Android, Windows Phone). There’s a trend emerging, however, in which traditional mobile devices are gaining functionality typically associated with PCs. At the same time, PCs are being architected more like mobile devices — an interbreeding of species, if you will. The iPad Pro, for example, has a keyboard. With Windows 10, phones and tablets can run “Universal” apps that also run on PCs. Windows 10 also has application-layer sandboxing, code-signing, and an app store with apps pre-vetted by Microsoft. In certain configurations (i.e. enterprise-managed devices), a laptop running Windows 10 has a security architecture that looks strikingly similar to a smartphone or tablet.
Tags : 
cybersecurity, enterprise networks, enterprise security architecture, risk reduction, ios attacks
    
Lookout
Published By: apperian     Published Date: Apr 13, 2012
With more mobile workers using personal smartphones and tablets to conduct business, 2011 is being heralded as the year of mobile apps in the enterprise. The benefits of mobile apps initiatives will far outweigh the challenges of getting them into the enterprise, in the form of increased work productivity and customer response, analysts say.
Tags : 
apperian, technology, enterprise applications, mobile device, wireless communication, mobile management, mobile data systems, wireless communications, wireless messaging, wireless phones
    
apperian
Published By: Aruba Networks     Published Date: Nov 15, 2013
Microsoft Lync is not only changing the cost structure of enterprise telephony, but also ushering in a new user experience in which every communication is transformed into a more collaborative, engaging interaction.
Tags : 
just media, aruba networks, deploying lync, mobile devices, microsoft lync, cost structure, user experience, engaging interaction, wireless infrastructure, lync traffic, prioritize lync, wifi, window of visibility, access points, integrated spectrum analyzers, network engineers, secure network, call admission control, wireless vendors, end-to-end visibility
    
Aruba Networks
Published By: Aruba Networks     Published Date: Nov 15, 2013
L’application Microsoft Lync modifie en profondeur la structure des coûts de la téléphonie d’entreprise et plonge l’utilisateur dans une nouvelle expérience où chaque communication devient plus captivante et plus conviviale. Voici 10 conseils pour garantir le bon fonctionnement de Lync sur les appareils mobiles de votre réseau.
Tags : 
just media, aruba networks, deploying lync, mobile devices, microsoft lync, cost structure, user experience, engaging interaction, wireless infrastructure, lync traffic, prioritize lync, wifi, window of visibility, access points, integrated spectrum analyzers, network engineers, secure network, call admission control, wireless vendors, end-to-end visibility
    
Aruba Networks
Published By: Aruba Networks     Published Date: Nov 15, 2013
Microsoft Lync optimiert nicht nur die Kostenstruktur für die Unternehmenstelefonie, sondern schafft auch ein völlig neues Benutzererlebnis, fördert den Austausch und stärkt die Zusammenarbeit im Unternehmen. Um die Vorteile von Lync umfassend ausschöpfen zu können, muss die zugrunde liegende Infrastruktur optimal genutzt werden. Da die Zahl an Laptops, Smartphones und Tablets langfristig die Zahl der Desktops übertreffen wird, benötigen Unternehmen sichere und zuverlässige Wireless-Infrastrukturen. Mit nur geringem Aufwand können Sie die Qualität und die Zuverlässigkeit multimedialer Kommunikation in Ihrem WiFi-Netzwerk verbessern. Wir haben die Top-10-Tipps für Sie, wie Sie von den Vorteilen von Lync auf mobilen Endgeräten in Ihrem Netzwerk profitieren können…
Tags : 
just media, aruba networks, deploying lync, mobile devices, microsoft lync, cost structure, user experience, engaging interaction, wireless infrastructure, lync traffic, prioritize lync, wifi, window of visibility, access points, integrated spectrum analyzers, network engineers, secure network, call admission control, wireless vendors, end-to-end visibility
    
Aruba Networks
Published By: Aruba Networks     Published Date: Nov 15, 2013
Microsoft Lync está cambiando la estructura de costes en la telefonía empresarial y está marcando una nueva experiencia para sus usuarios en la cual cada comunicación se convierte en una interacción cada vez más colaborativa y atractiva. Aquí tiene 10 consejos para asegurarse de que Lync funciona bien en los dispositivos móviles en la red. Microsoft Lync no sólo está cambiando la estructura de costes en la telefonía empresarial sino que, además, está marcando una nueva experiencia para sus usuarios en la cual cada comunicación se convierte en una interacción cada vez más colaborativa y atractiva.
Tags : 
just media, aruba networks, deploying lync, mobile devices, microsoft lync, cost structure, user experience, engaging interaction, wireless infrastructure, lync traffic, prioritize lync, wifi, window of visibility, access points, integrated spectrum analyzers, network engineers, secure network, call admission control, wireless vendors, end-to-end visibility
    
Aruba Networks
Published By: Aruba Networks     Published Date: Nov 15, 2013
Microsoft Lync cambia la struttura dei costi della telefonia aziendale e apre la strada ad una nuova esperienza per il cliente, in cui ogni comunicazione si trasforma in un'interazione più collaborativa e coinvolgente. Ecco 10 consigli per garantire il corretto funzionamento di Lync sui dispositivi mobili della vostra rete.
Tags : 
just media, aruba networks, deploying lync, mobile devices, microsoft lync, cost structure, user experience, engaging interaction, wireless infrastructure, lync traffic, prioritize lync, wifi, window of visibility, access points, integrated spectrum analyzers, network engineers, secure network, call admission control, wireless vendors, end-to-end visibility
    
Aruba Networks
Start   Previous   1 2 3 4    Next    End
Search      

Special Report

In this webinar Black Duck Software (www.blackducksoftware.com), together with representatives of SAP, will review the benefits open source offers to development organizations, the management challenges it presents, and approaches for addressing those challenges.

Add Research

Get your company's research in the hands of targeted business professionals.

Modern Analyst Media Modern Analyst Media
Modern Analyst Requirements Modern Analyst Media Modern Analyst DigiBytes
Copyright 2009-2014 by Modern Analyst Media LLC Home  |  Featured Bytes  |  Popular Bytes  |  All Topics  |  Vendor Directory