mobile data

Results 1 - 25 of 614Sort Results By: Published Date | Title | Company Name
Published By: Intel     Published Date: Sep 14, 2018
Today’s tech savvy consumers are continually driving organizations to deliver a modernized shopping experience. To achieve this, retailers are pushing the edge on developing non-traditional ways in delivering sales messages. One of the best ways to engage shoppers with an in-store digital presence is through modern adaptive signages. Modern signages enable two-way interaction between customers and businesses, tapping onto cutting-edge technologies such as sensors and analytics to respond to customer behavior—helping retailers customize content on the fly. Find out how Giada Technology leveraged on Intel® processors to power up their cloud terminals to pre-process signage, sensor, and mobile data to efficiently exchange information with the cloud. Retailers are better positioned to present contextual promotions to the shoppers, delivering benefits of lesser wait-time and increased customer satisfaction.
Tags : 
    
Intel
Published By: Lookout     Published Date: Mar 28, 2018
Lookout has developed the Mobile Risk Matrix to help organizations understand the components and vectors that make up the spectrum of mobile risk — and to provide data that will help enterprises gain a deeper understanding of the prevalence and impact of mobile threats and vulnerabilities.
Tags : 
    
Lookout
Published By: Lookout     Published Date: Apr 18, 2018
The world has changed. Yesterday everyone had a managed PC for work and all enterprise data was behind a firewall. Today, mobile devices are the control panel for our personal and professional lives. This change has contributed to the single largest technology-driven lifestyle change of the last 10 years. As productivity tools, mobile devices now access significantly more data than in years past. This has made mobile the new frontier for a wide spectrum of risk that includes cyber attacks, a range of malware families, non-compliant apps that leak data, and vulnerabilities in device operating systems or apps. A secure digital business ecosystem demands technologies that enable organizations to continuously monitor for threats and provide enterprise-wide visibility into threat intelligence. Watch the webinar to learn more about: What makes up the full spectrum of mobile risks Lookout's Mobile Risk Matrix covering the key components of risk How to evolve beyond mobile device management
Tags : 
    
Lookout
Published By: Lookout     Published Date: Mar 28, 2018
The time has come for enterprise risk management to change. Mobile devices have become core to our personal and professional lives, yet most enterprises remain focused on traditional PC endpoints. Although many of the same elements of risk that affect PCs also apply to mobile endpoints, simply extending current PC security controls to your mobile feet is ineffective. Enterprise risk management needs to evolve to address mobile risks, and security professionals must architect mobile specifc security. To encourage this evolution, Lookout developed the Mobile Risk Matrix. Its purpose is to help security organizations understand the spectrum of risk on mobile devices and to provide data that demonstrates the prevalence of mobile risk.
Tags : 
    
Lookout
Published By: Lookout     Published Date: Mar 28, 2018
Mobile devices have rapidly become ground zero for a wide spectrum of risk that includes malicious targeted attacks on devices and network connections, a range of malware families, non-compliant apps that leak data, and vulnerabilities in device operating systems or apps. Read the four mobile security insights CISOs must know to prepare for a strategic conversation with the CEO and board about reducing mobile risks and the business value associated with fast remediation of mobile security incidents.
Tags : 
    
Lookout
Published By: Datastax     Published Date: Aug 27, 2018
" For any business that wants to successfully compete in today’s digital economy, it is not a question of if but rather how much of their business will be done with cloud applications. A cloud application is one with many endpoints including browsers, mobile devices, and/or machines that are geographically distributed. The application is intensely transactional (high velocity reads and/or writes), always available, and instantaneously responsive no matter the number of users or machines using the application. Download this free white paper and explore how DataStax customers are delivering real-time value at epic scale with their cloud applications. Explore the core database requirements that make businesses successful with cloud applications, which include continuous availability, linear scale, and geographic distribution."
Tags : 
    
Datastax
Published By: IBM     Published Date: Jul 02, 2018
Digital transformation is not a buzzword. IT has moved from the back office to the front office in nearly every aspect of business operations, driven by what IDC calls the 3rd Platform of compute with mobile, social business, cloud, and big data analytics as the pillars. In this new environment, business leaders are facing the challenge of lifting their organization to new levels of competitive capability, that of digital transformation — leveraging digital technologies together with organizational, operational, and business model innovation to develop new growth strategies. One such challenge is helping the business efficiently reap value from big data and avoid being taken out by a competitor or disruptor that figures out new opportunities from big data analytics before the business does. From an IT perspective, there is a fairly straightforward sequence of applications that businesses can adopt over time that will help put direction into this journey. IDC outlines this sequence to e
Tags : 
    
IBM
Published By: Entrust Datacard     Published Date: Sep 14, 2018
With more and more dependency on mobile and cloud, digital enablement is key to business success. Now IT has an increased impact on how to drive strategy and implementation to reach business goals. But the reality of distributed applications and connected devices has introduced new security challenges. To secure information and provide users seamless access to data, you need to reevaluate your approach to authentication. You need a modern authentication solution that is agile and secure, enabling your digital transformation. This buyer's guide will help you determine whether a cloud-based multi-factor authentication solution is right for your organization and details the top features to look for in an authentication solution to securely enable your digital transformation. Download the Cloud-Based Authentication Buyer’s Guide — to learn more.
Tags : 
authentication, knowledge-based authentication (kba), multifactor authentication, out-of-band authentication, two-factor authentication, identity as a service (idaas), enterprise mobility
    
Entrust Datacard
Published By: Epson     Published Date: May 14, 2018
Consumers worldwide continue to adopt and use technology in their shopping experience. Faced with rising customer expectations and increasing competitive pressures, retailers now are prioritizing in-store innovation. Many retailers have adopted multichannel implementations, in which mobile, web, and in-store shopping are enabled but not delivered consistently to the customer. The next step in this evolution is an omnichannel strategy, now being deployed by some retailers, which presents a consistent shopping experience across mobile, web, and in-store channels. Omnichannel also enables retailers to integrate back-end infrastructure technologies (e.g., servers, databases, etc.) and cloud-based services (e.g., loyalty programs, personalized recommendations, inventory management, etc.) to improve many aspects of store and enterprise operations. An omnichannel strategy relies on several core and supporting technologies. The key factors in evaluating any omnichannel-enabling solution includ
Tags : 
    
Epson
Published By: Epson     Published Date: May 14, 2018
Over the past few years, improvements in mobile devices, Wi-Fi, and cloud computing have made mobile point of sale (POS) solutions e ective and a ordable for businesses of all sizes. Tablets have emerged as the most popular platform for mobile POS solutions, and you may have already heard the buzz about them. There’s a reason for all the hullaballoo. In addition to integrating payments and making retail transactions more e cient than using a traditional electronic cash register (ECR), tablet POS solutions can provide robust management data. A tablet POS solution makes sense for many retailers, particularly if you’re looking to: • replace an ECR or want to have a mobile POS in place on opening day • unlock new pro t-making and cost-saving opportunities • expand your business • keep pace with ever-changing customer expectations Figuring out which tablet POS solution is the best for your business may seem like a huge challenge. But don’t worry. Taking the right approach, by using too
Tags : 
    
Epson
Published By: Nokia     Published Date: Sep 11, 2018
Many governments embrace mobile network operator (MNO) networks as partners in the quest to establish high-performance mobile broadband data capabilities supporting emergency services. The question is: Who is better placed to operate future mission-critical LTE networks, governments or MNOs?
Tags : 
nokia, wireless communications, government communications, emergency services, mobile network operations, lte networks, emergency communications
    
Nokia
Published By: Good Technology     Published Date: Sep 27, 2012
Read this whitepaper to learn how to enable mobile collaboration while maintaining data security and strict end user privacy -whether on BYOD or a mix of corporate- and employee-owned devices.
Tags : 
    
Good Technology
Published By: Evatronix     Published Date: Nov 02, 2012
ARM® TrustZone® along with Trusted Execution Environments provide a secure, integrated and convenient way to manage sensitive and valuable assets on a mobile device. It adjusts the device to the user, not vice versa, and thus opens a whole new
Tags : 
    
Evatronix
Published By: Commvault     Published Date: Jul 06, 2016
ENDPOINT DATA. It’s often one of the most forgotten aspects of an enterprise data protection strategy. Yet, content on laptops, desktops and mobile devices is among a company’s most valuable data even while it’s potentially at the greatest risk. According to IDC there will be some 1.3 billion mobile workers by 2015. However, only half of enterprises today are using some type of endpoint backup. That means that the volume of endpoint data that is in jeopardy is nothing short of significant. Download to read the buyer's checklist on endpoint data protection!
Tags : 
commvault, endpoint data protection, endpoint data, data protection, backup, encryption, data loss prevention, mobile app
    
Commvault
Published By: Commvault     Published Date: Jul 06, 2016
How do you maintain the security and confidentiality of your organization’s data in a world in which your employees, contractors and partners are now working, file sharing and collaborating on a growing number of mobile devices? Makes you long for the day when data could be kept behind firewalls and employees were, more or less, working on standardized equipment. Now, people literally work on the edge, using various devices and sending often unprotected data to the cloud. This dramatic shift to this diversified way of working has made secure backup, recovery and sharing of data an exponentially more difficult problem to solve. The best approach is to start with a complete solution that can intelligently protect, manage and access data and information across users, heterogeneous devices and infrastructure from a single console - one that can efficiently manage your data for today's mobile environment and that applies rigorous security standards to this function.
Tags : 
commvault, mobile data, file sharing, backup recovery, access, personal cloud approach, data protection, endpoint, end user recovery, control governance
    
Commvault
Published By: Hewlett Packard Enterprise     Published Date: Jul 12, 2016
Technology enables business transformation To thrive in today’s idea economy, small and midsize companies like yours are using technology to transform their business. Like your peers, you know that mobile applications, cloud-based solutions, and advanced analytics can help you increase productivity, reduce costs, and grow your business. Older servers, storage, and networking products weren’t built to handle the exploding amount of data that is being shared today. In order to take advantage of these modern applications, many companies have found that they need to close the gap between what their business demands and what their IT systems can deliver.
Tags : 
best practices, business optimization, business management, application management, enterprise application, business intelligence, transformation
    
Hewlett Packard Enterprise
Published By: Equinix     Published Date: May 18, 2015
This paper illustrates how organisations are becoming digital enterprises due to the technology implications of scale and volume.
Tags : 
technology, digital economy, network, become a digital enterprise, mobile, social, cloud, big data, digital enterprise, digital infrastructure, equinox, hybrid infrastructure, equinix solutions, optimise your network, digital world challenges, networking, byod
    
Equinix
Published By: Equinix     Published Date: May 28, 2015
Changes in where traffic originates and how much data is generated will soon have profound effects on Internet latency and end-user quality of experience.
Tags : 
data, generate data, host applications, ensure optimal performance, devices, mobile data, mobility, data traffic, data center, network, equinix, equinix solutions
    
Equinix
Published By: HPE     Published Date: Feb 11, 2015
Firms That Plan For Mobile, Cloud, Big Data, And The Impact Of Social Media Without First Taking Control Of Their Existing Application Portfolio Are Headed For Disaster.
Tags : 
    
HPE
Published By: HPE     Published Date: Feb 11, 2015
Emerging technologies, like mobile, big data and cloud, lead to increasingly complex and demanding workloads that can overwhelm outdated infrastructures. But by leveraging server and management systems designed for the technologies of today, Best-in-Class organizations can easily meet these demands and gain benefits.
Tags : 
    
HPE
Published By: DataStax     Published Date: Mar 10, 2017
Netflix, Intuit and Clear Capital. These 3 innovative companies have one thing in common. They are altering their business landscape and transforming the way people live and work through highly personalized applications. And they're doing this with Apache Cassandra™ and DataStax. Download this white paper and learn why relational technologies failed to meet the demands of Netflix, Mint Bills and Clear Capital and how these enterprises modernize their Web and Mobile applications with DataStax to drive customer engagement, loyalty and lifetime value.
Tags : 
    
DataStax
Published By: Oracle CX     Published Date: Oct 19, 2017
Modern technology initiatives are driving IT infrastructure in a new direction. Big data, social business, mobile applications, the cloud, and real-time analytics all require forward-thinking solutions and enough compute power to deliver the performance required in a rapidly evolving digital marketplace. Customers increasingly drive the speed of business, and organizations need to engage with customers on their terms. The need to manage sensitive information with high levels of security as well as capture, analyze, and act upon massive volumes of data every hour of every day has become critical. These challenges will dramatically change the way that IT systems are designed, funded, and run compared to the past few decades. Databases and Java have become the de facto language in which modern, cloud-ready applications are written. The massive explosion in the volume, variety, and velocity of data increases the need for secure and effective analytics so that organizations can make better
Tags : 
    
Oracle CX
Published By: Oracle CX     Published Date: Oct 19, 2017
Modern technology initiatives are driving IT infrastructure in a new direction. Big data, social business, mobile applications, the cloud, and real-time analytics all require forward-thinking solutions and enough compute power to deliver the performance required in a rapidly evolving digital marketplace. Customers increasingly drive the speed of business, and organizations need to engage with customers on their terms. The need to manage sensitive information with high levels of security as well as capture, analyze, and act upon massive volumes of data every hour of every day has become critical. These challenges will dramatically change the way that IT systems are designed, funded, and run compared to the past few decades. Databases and Java have become the de facto language in which modern, cloud-ready applications are written. The massive explosion in the volume, variety, and velocity of data increases the need for secure and effective analytics so that organizations can make better
Tags : 
    
Oracle CX
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search Offers      
Get your company's offers in the hands of targeted business professionals.