IT Agents  >   IT Workforce  >   Work Environment  >  

Mobile Workers

RSS Feed    Add to Google    Add to My Yahoo!
Mobile WorkersReports
201 - 225 of 948 Matches Previous Page  | Next Page
HR Technology Key Trends 2014
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: HR Directors and leading IT suppliers give their take on the HR technology trends for 2014 in this analysis from HR Zone.
Posted: 27 Jan 2014 | Published: 27 Jan 2014

ComputerWeekly.com

Five Steps to Enabling a Mobile Workforce
sponsored by Hewlett-Packard Company
WHITE PAPER: This exclusive paper discusses how your organization can best adopt enterprise mobility in such a way that enables increased productivity, efficiency, and worker satisfaction. Read on to discover five for enabling and supporting a mobile workforce.
Posted: 22 Jan 2014 | Published: 22 Jan 2014

Hewlett-Packard Company

The “upwardly mobile” enterprise
sponsored by IBM
RESOURCE: Find out how successful companies are embracing mobility in IBM's survey with Oxford Economics, in which they identify processes and practices of "mobile leaders." Discover the benefits that strategic use of mobility offers these companies, and learn how they can be applied to your organization.
Posted: 22 Jan 2014 | Published: 22 Jan 2014

IBM

MicroStrategy Customer Success Story: Ceva Santé Animale
sponsored by MicroStrategy Incorporated
CASE STUDY: The CIO of Ceva Santé Animale, a global veterinary health company, wanted to "have everything on all devices without VPN (PC, Mac, iPad, Android and Blackberry." View this brief case study to learn how CSA built a sales enablement application on a mobile platform that aggregates CRM, ERP and sales data.
Posted: 22 Jan 2014 | Published: 31 Aug 2013

MicroStrategy Incorporated

MicroStrategy Customer Success Story: AutoTrader.com
sponsored by MicroStrategy Incorporated
CASE STUDY: In this brief case study, find out how AutoTrader developed a mobile application that enabled advertising consultants to easily access reports and other business-critical information on-the-go, in a meeting, or wherever they might be.
Posted: 22 Jan 2014 | Published: 30 Apr 2014

MicroStrategy Incorporated

Enterprises See Clear Advantage of Cloud Computing and BYOD Combo
sponsored by Cisco Systems, Inc.
EGUIDE: This expert guide from searchCloudComputing.com answers some of the most frequently asked questions when it comes to making cloud computing and BYOD work in your enterprise without disruption.
Posted: 20 Jan 2014 | Published: 20 Jan 2014

Cisco Systems, Inc.

Incorporating BYOD in the Cloud
sponsored by Cisco Systems, Inc.
EGUIDE: This expert e-guide from searchCloudComputing.com explains how to create a BYOD-compatible cloud.
Posted: 20 Jan 2014 | Published: 20 Jan 2014

Cisco Systems, Inc.

Solving BYOD Security Issues Using Cloud
sponsored by Cisco Systems, Inc.
EGUIDE: The cloud can help resolve security issues surrounding BYOD – and this expert e-guide from searchCloudComputing.com shows you how. Inside, you’ll learn about the cloud security tools organizations are turning to today as well as how companies are incorporating BYOD into their cloud plans.
Posted: 20 Jan 2014 | Published: 20 Jan 2014

Cisco Systems, Inc.

Know the big three: Top three mobile application threats
sponsored by Hewlett-Packard Company
WHITE PAPER: This exclusive paper examines you how to prevent sensitive data leakage over insecure channels or stolen devices. Read on to discover the top three threats to mobile applications and how to mitigate their potential impact.
Posted: 20 Jan 2014 | Published: 20 Jan 2014

Hewlett-Packard Company

The New Style of IT
sponsored by Hewlett-Packard Company
WEBCAST: This short webcast highlights some of the biggest technologies that are affecting businesses today, and what they mean for the role of IT.
Posted: 17 Jan 2014 | Premiered: Jan 17, 2014

Hewlett-Packard Company

IT Priorities 2014: UK Europe, France and Germany
sponsored by ComputerWeekly.com
RESEARCH CONTENT: Benchmark your IT spending plans, with our in-depth study of IT spending priorities in the UK, France, Germany, and Europe in 2014.
Posted: 17 Jan 2014 | Published: 17 Jan 2014

TOPICS:  Application Development | Backup for Virtualized Servers | Backup Server Hardware | Backup Software | Backups | Budgeting | Business Continuity Planning | Business Intelligence | Business Process Automation | Business Process Management | Cloud Archive | Cloud Backup | Cloud Computing | Cloud CRM | Cloud Disaster Recovery | Cloud Management | Cloud Security | Cloud Storage | Cloud Storage Services | Cloud Storage Strategy | Compliance Best Practices | CRM | CRM Software | Data Analytics | Data Center Consolidation | Data Center Networking | Data Centers | Data Deduplication | Data Loss Prevention (DLP) | Database Management Software | Desktop Virtualization | Disaster Recovery | ERP | ERP Software | Ethernet Networks | Green Data Center | Green Storage | Hardware | Hybrid clouds | Identity Management | Infrastructure as a Service (IaaS) | ITIL | Mobile CRM | Mobile Device Management | Mobile Device Management Software | Mobile Middleware | Mobile Payments | Mobile Workers | NAS | NAS Software | Network Appliances | Network Architectures | Network Configuration Management | Network Infrastructure | Network Management | Network Monitoring Software | Network Operating Systems | Network Performance Management Software | Network Processors | Network Provisioning | Network Security | Network Security Appliances | Network Security Hardware | Network Security Software | Networking | Networking Hardware | Office Suites | Outsourcing | Platform as a service | Private Cloud | Public Cloud | Remote Access Hardware | Risk Assessment | Risk Management | Security | Security Architectures | Security Audits | Security Best Practices | Security Event Management | Security Hardware | Security Industry | Security Infrastructure | Security Management | Security Managers | Security Policies | Security Software | Security Spending | Security Standards | Security Systems | Security Threats | Security Tokens | Server Appliances | Server Consolidation | Server Hardware | Server Provisioning | Server Software | Server Virtualization | Smart Phones | Social Computing | Software | Software as a Service | Software Implementation | Software Virtualization | Storage Appliances | Storage Architectures | Storage Consolidation | Storage Devices | Storage for File Virtualization/NAS Virtualization | Storage for Virtualized Servers | Storage Hardware | Storage Management | Storage Management Services | Storage Management Software | Storage Media | Storage Resource Management Software | Storage Security | Storage Spending | Storage Switches | Storage Systems | Storage Virtualization | Storage Virtualization Software | Supply Chain Software | Tablet PC | Tape Backups | Testing | Video Services | Videoconferencing Hardware | Videoconferencing Services | Videoconferencing Software | Virtual Desktop Infrastructure | Virtual Machine | Virtualization Security | Vulnerability Management | WAN | WAN Hardware | WAN Switches | WAN Switching | Windows | Windows 7 | Windows Server Software | Windows XP | WLAN | Workforce Management Software
ComputerWeekly.com

Analyst Report: Addressing the Complexities and Growing Requirements of the Future
sponsored by IBM
ANALYST REPORT: As mobile device adoption gains traction for personal usage, it's also becoming increasingly popular in the workplace. In response, enterprises must develop strategies for managing the inherent complexity of these new devices in order to improve productivity and optimize performance, while also protecting data and maintaining security.
Posted: 15 Jan 2014 | Published: 31 Oct 2012

IBM

Accelerating the deployment of a secure mobile enterprise
sponsored by IBM
WHITE PAPER: In this insightful white paper, explore key challenges you'll face in ensuring the security of enterprise mobile devices, learn strategies that will help you reduce risk, and discover new ways that you can be more secure in your use of mobile technology.
Posted: 15 Jan 2014 | Published: 31 Oct 2013

IBM

Securing mobile devices in the business environment
sponsored by IBM
WHITE PAPER: As smartphones and other mobile devices gain traction in consumers' personal lives, they're also being introduced into their work environments. In this white paper, learn how to safely introduce personal or corporate-owned mobile devices into the workplace, identify and prevent the risks to corporate data, and ultimately drive more business value.
Posted: 15 Jan 2014 | Published: 31 Oct 2011

IBM

Deploy Your BYOD Solution—Cisco Design Guide
sponsored by Cisco Systems, Inc.
WHITE PAPER: In this exclusive resource, get the latest guidelines, recommendations, and best practices for designing and deploying a BYOD solution that fits your organization's needs.
Posted: 30 Jan 2014 | Published: 30 Jan 2014

Cisco Systems, Inc.

Navigating the New Mobile World
sponsored by SAP America, Inc.
EBOOK: In order for mobility to work in your enterprise, it must become an integral part of business processes and IT strategies. Enabling your back-end systems for mobile isn't enough -- you need to take advantage of mobile capabilities to truly transform the way your business operates.
Posted: 30 Jan 2014 | Published: 30 Jan 2014

SAP America, Inc.

Cisco Mobility Assessment—Is Your Business Ready?
sponsored by Cisco Systems, Inc.
ASSESSMENT TOOL: This simple mobility assessment evaluates your readiness and provides you with suggested services, products, and solutions that can help you take advantage of the latest trends.
Posted: 28 Jan 2014 | Published: 28 Jan 2014

Cisco Systems, Inc.

Top 5 Mobility Security Concerns with Consumerization
sponsored by More Direct
EGUIDE: This expert guide from SearchConsumerization.com examines how your organization can overcome the security problems that consumerization can bring. Read on to learn how to ensure mobile data security and compliance while supplying enough network bandwidth for BYOD.
Posted: 27 Jan 2014 | Published: 27 Jan 2014

More Direct

Cisco Mobile Security Survey: Research Highlights
sponsored by Cisco Systems, Inc.
WHITE PAPER: Read the results of a recent international mobile security survey to see highlighted findings and discover solutions for productive, flexible, and secure network access.
Posted: 24 Jan 2014 | Published: 31 Aug 2013

Cisco Systems, Inc.

Mobility Management Selection Guide
sponsored by Citrix
WHITE PAPER: This exclusive paper takes an in-depth look at the criteria you can use to select the optimal enterprise mobility management system that can meet your specific, fast-paced, and consistently changing requirements.
Posted: 22 Jan 2014 | Published: 22 Jan 2014

Citrix

Secure Mobile Collaboration
sponsored by Cisco Systems, Inc.
WHITE PAPER: Mobility adoption in the enterprise has accelerated. To stay current, you need to know the latest IT trends for secure mobile collaboration. Get an overview of what’s shaping corporate mobility in this Forrester Consulting Technology Adoption Profile.
Posted: 22 Jan 2014 | Published: 22 Jan 2014

Cisco Systems, Inc.

The Role of Integrated Network Services in Next-Generation Application Delivery
sponsored by F5 Networks
WHITE PAPER: This informative spotlight examines the next generation of integrated application-delivery solutions and the impact that they will have in developing more agile network functions. Read on to learn how your organization can best prepare for the future.
Posted: 20 Jan 2014 | Published: 20 Jan 2014

F5 Networks

Using All the Tools You can
sponsored by Ruckus Wireless
WHITE PAPER: This informative paper discusses the latest generation of Wi-Fi technology and how you can use these tools to get the best Wi-Fi performance possible.
Posted: 16 Jan 2014 | Published: 16 Jan 2014

Ruckus Wireless

BYOD Predictions for 2014 - Webinar
sponsored by Enterasys
WEBCAST: This exclusive webcast takes an in-depth look at the future of mobile computing in the enterprise, discussing predictions by industry experts and examining what your organization can do to prepare for what's ahead.
Posted: 16 Jan 2014 | Premiered: Jan 16, 2014

Enterasys

Join SafeNet Authentication Free Trial
sponsored by SafeNet Asia Ltd
TRIAL SOFTWARE: Experience low-maintenance and low-cost authorization controls by downloading your free 30-day trial of SafeNet Authentication Service, a cloud-based solution featuring token and self-service capabilities.
Posted: 10 Jan 2014 | Premiered: 10 Jan 2014

SafeNet Asia Ltd
201 - 225 of 948 Matches Previous Page    7 8 9 10 11 12    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement