internet

Results 351 - 375 of 1466Sort Results By: Published Date | Title | Company Name
Published By: Loop Commerce     Published Date: Mar 08, 2019
As retail continues its internet-influenced change and customer demand for “right now” service increases, a new area is open for business. There is no reason to send a shirt that is the wrong size or give an impersonal gift card. G-Commerce is here, offering a new type of personalized transaction and digitalized merchandise for those shopping for others. Learn how Loop Commerce's flagship product, GiftNow: • Increased % of sales from gifts by 2X • Drove 24% of Christmas Eve sales • Increased 6X demand over gift cards Retailers can grab last-minute shoppers literally up to the moment before a holiday, and increase profits through fewer merchandise returns.
Tags : 
    
Loop Commerce
Published By: B Channels     Published Date: May 01, 2018
Industrial Internet of Things (IIoT) originally described IoT as used across several industries: manufacturing, logistics, oil and gas, transportation, energy/utilities, mining and metals, aviation and other industrial sectors. Download this paper to understand the research insights of the future of IoT.
Tags : 
    
B Channels
Published By: Cisco     Published Date: Sep 27, 2018
Asia Pacific is an exciting region where great strides are being made in digital transformation. It is home to significantly diverse economies and is remarkably leading the charge in developing connected cities of the future—smart cities. Many economies are seeing the benefits of these rapid developments, and as the Internet of Things (IoT) becomes commonplace in organizations and workers continue to work remotely and flexibly, more devices are becoming connected to the Internet.
Tags : 
    
Cisco
Published By: Cisco     Published Date: Sep 27, 2018
As the world of traditional manufacturing fuses with information technology, organizations are tapping into a level of technical orchestration never attainable before. Symphonies of systems facilitate real - time interactions of people, machines, assets, systems, and things. This is the Smart Factory; the factory ecosystem of the future. It is an application of the Industrial Internet of Things (IIoT) built with sets of hardware and software that collectively enable processes to govern themselves through machine learning and cognitive computing
Tags : 
    
Cisco
Published By: Symantec     Published Date: Jul 30, 2014
This paper explains how malware works and the implications to clients, customers and the wider community.
Tags : 
how malware works, implications of malware, impacts of malware, website security, internet threats, security
    
Symantec
Published By: Symantec     Published Date: Jul 30, 2014
This paper explains how malware works and the implications to clients, customers and the wider community.
Tags : 
how malware works, implications of malware, impacts of malware, website security, internet threats, security
    
Symantec
Published By: Symantec     Published Date: Jul 30, 2014
This paper explains how malware works and the implications to clients, customers and the wider community.
Tags : 
how malware works, implications of malware, impacts of malware, website security, internet threats, security
    
Symantec
Published By: Symantec     Published Date: Jul 30, 2014
This paper explains how malware works and the implications to clients, customers and the wider community.
Tags : 
how malware works, implications of malware, impacts of malware, website security, internet threats, security
    
Symantec
Published By: Symantec     Published Date: Jul 30, 2014
This paper explains how malware works and the implications to clients, customers and the wider community.
Tags : 
how malware works, implications of malware, impacts of malware, website security, internet threats, security
    
Symantec
Published By: Symantec     Published Date: Jul 30, 2014
This paper explains how malware works and the implications to clients, customers and the wider community.
Tags : 
how malware works, implications of malware, impacts of malware, website security, internet threats, security
    
Symantec
Published By: SES     Published Date: Oct 12, 2016
In this eBook, we explore the top 5 connectivity trends that are shaping the data landscape in Asia-Pacifi c, and how satellite serves as a key enabler to drive the future of connectivity
Tags : 
connectivity, wireless communications, collaboration, asia pacific, internet of things, mobile connectivity, bandwidth
    
SES
Published By: Infor     Published Date: Mar 03, 2017
Analysts and industry experts agree: Digital disruption in manufacturing is on the horizon. Technologies like the Internet of Things, dynamic enterprise management, global supply chain visibility, and machine learning are already changing the way manufacturers produce goods and interact with customers. Further changes will continue to intensify issues and reveal opportunities.
Tags : 
cio, finance, digital, manufacturing, enterprise, enterprise applications
    
Infor
Published By: Infor     Published Date: Mar 03, 2017
Analysts and industry experts agree: Digital disruption in manufacturing is on the horizon. Technologies like the Internet of Things, dynamic enterprise management, global supply chain visibility, and machine learning are already changing the way manufacturers produce goods and interact with customers. Further changes will continue to intensify issues and reveal opportunities.
Tags : 
cfo, finance, digital, manufacturing, enterprise, enterprise applications
    
Infor
Published By: Sophos     Published Date: Mar 30, 2017
With an estimated 500,000 'Internet of Things' devices using default security credentials it's little wonder that the recent Mirai botnet's DDoS attack was able to cause such widespread disruption. But it isn't just the average home-user that's at risk. Organizations like yours are being targeted with bespoke malware in order to compromise your network and add your servers and devices to malicious botnets. This paper explains why these attacks are so successful, how a typical infection takes place and what security systems your organization should have in place to defend against botnet proliferation.
Tags : 
web protection, email protection, web application firewall, intrusion protection, sandboxing, threat protection
    
Sophos
Published By: Riverbed     Published Date: Jun 05, 2017
This IDC Technology Spotlight looks at the role of Riverbed in accelerating digital transformation by addressing the new requirements for a cloud-ready enterprise.
Tags : 
digital transformation, cloud, cloud-ready, iot, internet of things, analytic, mobile, cloud applications
    
Riverbed
Published By: Teradata     Published Date: May 02, 2017
To understand the challenges and opportunities with the Internet of Things, MIT Sloan Management Review’s 2016 Global Executive Study conducted a comprehensive study with business executives, managers, and IT professionals globally. Through the survey results and interviews with subject matter and industry experts, MIT Sloan Management Review was able to reveal the business value and competitive issues from the Internet of Things (IoT). This comprehensive report dives into data sharing with competitors, analytic talent management, and the intersection with governing the data. Analytics is unsurprisingly is shown as the key to IoT success.
Tags : 
data, sharing, analytics, iot, mit
    
Teradata
Published By: Teradata     Published Date: May 02, 2017
Ventana’s Internet of Things (IoT) research found that the intention of organizations to embrace IoT and operational intelligence often outpace their current capabilities. Furthermore, most organizations are not ready to derive maximum value from IoT. This analyst report will take you through the Top 10 Best Practices for organizations considering how to engage with and best leverage IoT.
Tags : 
ventana, report, iot, operational intelligence, organizations
    
Teradata
Published By: Trend Micro, Inc.     Published Date: Jul 19, 2011
In a new video, security analyst Rich Mogull discusses mobile data protection topics and addresses many issues, including, the latest trends in mobile security, mobile device management, and mobile data protection.
Tags : 
trend micro, internet content security, smart protection network, internet security, enterprise business security, worry-free business security, web threat management, australia, cloud, android mobile security, antivirus, consumerisation of it, enterprise mobile management, enterprise mobile security, enterprise network security, mobile device management, ipad mobile device, ipad, iphone, it strategy
    
Trend Micro, Inc.
Published By: Trend Micro, Inc.     Published Date: Jul 19, 2011
The Consumerisation of Enterprise Mobility: A Formidable Challenge for CIOs, but a great opportunity. Download the Trend Micro Enterprise Security Whitepaper: The Consumerisation of Enterprise Mobility to learn the secrets to data protection on mobile devices.
Tags : 
trend micro, internet content security, smart protection network, internet security, enterprise business security, worry-free business security, web threat management, australia, cloud, android mobile security, antivirus, consumerisation of it, enterprise mobile management, enterprise mobile security, enterprise network security, mobile device management, ipad mobile device, ipad, iphone, it strategy
    
Trend Micro, Inc.
Published By: Ayla Networks     Published Date: Feb 10, 2016
In July 2014, a Forbes business article declared: “The Internet of Things (IoT) is changing manufacturing as we know it.” From boosting efficiency, to reducing costs, and gaining a competitive edge, the IoT is widely seen as the future for manufactured products. But it’s an enormous leap for manufacturers to go from making traditional, everyday products to making connected IoT products.
Tags : 
    
Ayla Networks
Published By: IBM     Published Date: Jan 22, 2016
The Internet of Things (IoT) presents both huge opportunities and huge challenges to the developers of tomorrows 'always-connected' products.
Tags : 
ibm, agile, product, development, iot, connected products, wireless, enterprise applications, business technology
    
IBM
Published By: IBM     Published Date: Jan 22, 2016
IBM Rational DOORS Next Generation is the latest requirements management tool, designed for collaboration and to provide a single platform for managing requirements to help project teams work more effectively.
Tags : 
ibm, iot, management, requirements, rational doors, collaboration, software development, it management, enterprise applications, business technology
    
IBM
Published By: IBM     Published Date: Jan 22, 2016
The Internet of Things (IoT) offers exciting options for innovation through new business models and services that create new revenue opportunities.
Tags : 
ibm, iot, guide, business, roi, software development, enterprise applications, business technology
    
IBM
Published By: IBM     Published Date: May 03, 2016
The impact of the Internet of Things on product development: Discover how to transform your engineering processes and tools to gain a competitive advantage from the Internet of Things
Tags : 
ibm, watson, internet of things, iot, product development, continuous engineering, software development, business technology
    
IBM
Published By: Entrust Datacard     Published Date: Jul 21, 2015
Entrust offers software authentication platforms that strengthen security in a wide range of identity and transaction ecosystems.
Tags : 
internet of things, authentication, security, identity, safety, technology, security technology, security infrastructure, software authentication platforms
    
Entrust Datacard
Start   Previous    8 9 10 11 12 13 14 15 16 17 18 19 20 21 22    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.