Reltio launched v 2015.2 of its Reltio Cloud master data management (MDM) platform, which fuels a spread of data-driven apps. The company says that the new version adds granular segmentation, advanced semantic search, enhanced personalization, configurable data-as-a-service, sophisticated match, and comprehensive audit capabilities.
WidePoint announced Monday a partnership with Samsung SDS America to provide its digital certificates to a selection of the mobile device maker's products.
One of the most obvious signs of that transformation is the changes Apple has made to iOS mobile operating system. Based on what Apple did with iOS 8, we can eeven more exciting enterprises features with iOS 9, expected to be unveiled at WWDC in June.
As you can probably already tell from this stack of announcements, metadata and MDM/RDM--i.e. the organization of data--was a prevailing theme at Enterprise Data World 2015. Which makes sense because while the wheels of business go round and round, it is the grit in such details that provides the traction.
Good Technology announced several efforts Tuesday to optimize mobile computing on Windows Phones and other Microsoft devices.
Just as enterprises are starting to get a firm handle on mobile device management, they are looking ahead to a new set of devices that could throw IT into chaos if not properly managed. More pervasive and numerous than smartphones or tablets, companies must plan now for the influx of Internet of Things devices.
The new mobile device management service is only available for Apple devices but its low cost and simplicity may appeal to smaller businesses.
In a move aimed at improving security for enterprise mobile devices, Samsung and ManageEngine have announced that Desktop Central will now support the KNOX platform.
When it comes to BYOD programs, you've been reading for months about the need to keep things safe, and keep things sound. Now you're being told to keep everyone happy as well.
Say "BYOD is our friend." Repeat, "BYOD is our friend." It's a simple message, but one that bears repeating for IT leaders who fear that BYOD practices will be the undoing of all their hard-fought data security efforts.