mobile devices

Results 1 - 25 of 925Sort Results By: Published Date | Title | Company Name
Published By: Adobe     Published Date: Feb 18, 2020
Manage large groups of users, control access to cloud services, and further secure your environment from one central place with the Adobe Admin Console for enterprise. Adobe Creative Cloud gives you the world's best creative apps so you can turn your brightest ideas into your greatest work across your desktop and mobile devices.
Tags : 
    
Adobe
Published By: Epson     Published Date: Feb 03, 2020
63% of all consumers use mobile devices to research products, compare prices and access promotions while shopping. They expect stores to be fast, flexible and mobile-friendly. The right mPOS can help: 1. Reduce customer wait times 2. Keep payments and data secure 3. Improve your store's operations 4. Improve the customer experience If you’re thinking about adding an mPOS solution to your business, there are 6 important features to consider. Download this whitepaper to find out more.
Tags : 
    
Epson
Published By: Forcepoint     Published Date: Feb 03, 2020
Mobile devices and cloud-based applications that empower teams to work anywhere have been a boon for business productivity, agility, and innovation. However, this new way of working presents a new challenge for cybersecurity teams: securing mobile devices accessing cloud applications that store sensitive data outside the control of on-premises security solutions.
Tags : 
    
Forcepoint
Published By: Ricoh US     Published Date: Jan 29, 2020
The first thing most people probably think about when they hear the word “connect” is their smartphone. This is for good reason, considering more than 5 billion people in the world have mobile devices1, and the average American spends over four hours each day connecting with other people through a mobile device2. But as fast and responsive and sleek as they have become, the devices themselves aren’t what keep us enraptured. Smartphones are tools. They’re a conduit to virtually anything you could want to watch, read, listen to, play or learn about. That’s what we really find so indispensable; unfettered access to entertainment, communication, information.
Tags : 
    
Ricoh US
Published By: Flexential     Published Date: Jan 21, 2020
The hybrid cloud has arrived for the enterprise, but it comes with a complication: the speed of light. Between the cloud and the end user (including IoT devices that count as ‘users’), there is an emerging need for an intermediate environment that can satisfy real-time compute requirements without incurring the latency of reaching all the way to the cloud. ‘Edge compute’ is the phrase used to describe what covers this middle ground, but the optimal location for edge compute resources remains open to question. As it turns out, there is more than one edge. There is certainly the far edge that reaches all the way to end users, mobile devices and remote sensors. But there is also a strong case for a near edge – an intermediate location that is closer than the cloud but doesn’t reach the granularity of individual IoT devices. The edge is increasingly important because compute resources have become widely distributed. In the case of the public cloud, those resources can be in indeterminate f
Tags : 
    
Flexential
Published By: Digital Realty     Published Date: Jan 15, 2020
MOBITV, the first company to bring live and on-demand TV to mobile devices, wanted to: Provide easy, straightforward access for broadband and wireless operators to connect on MOBITV’s platform Offer proximity and accessibility to multichannel video programming distributors (MVPDs) and content providers on the East Coast, connecting to their circuits directly Facilitate continued growth without necessitating architectural reconfiguration of the IT environment See how they were able to achieve it through Digital Realty's Connected Campus network.
Tags : 
    
Digital Realty
Published By: Algolia     Published Date: Jan 08, 2020
Despite the success of e-commerce, consumers’ overall experiences with e-commerce have been less than natural. The modern day keyboard was designed to force users to type slower. Swiping is a learned behavior limited to mobile devices. Users are trained to search the Internet by focusing on the right keywords. And let’s face it, no one really enjoys wearing an awkward headset that covers their eyes for more than a couple of minutes. Delivering the right experience, at the right time, through the right device is critical. The next revolution in e-commerce will be powered by the most natural form of human interaction: voice. This eBook is designed to help plan for and capitalize on voice search as it prepares to enter mainstream adoption.
Tags : 
    
Algolia
Published By: Akamai Technologies     Published Date: Dec 18, 2019
"Despite years of publicity, phishing remains the largest insider threat that organizations face. The business impact of employees unwittingly give up personal and corporate information to phishing attempts is staggering: • 93% of IT security breaches are the direct result of some form of phishing • 34% of all phishing attacks explicitly target enterprises • 1 in 3 customers will stop doing business with a company that experiences a cybersecurity breach Further exacerbating this alarming trend, users generally access social network and messaging apps through mobile devices, which tend to be the weakest link in an enterprise’s security structure. Read this white paper to learn more about the state of phishing threats and its impact on the enterprise. "
Tags : 
    
Akamai Technologies
Published By: MalwareBytes EMEA     Published Date: Nov 20, 2019
Digital transformation has revolutionized the way businesses operate, providing a foundational shift in how they meet market demands and deliver value to customers. At the same time, it has created an explosion of data and endpoints, with the proliferation of mobile and IoT devices. Both require vigilant...
Tags : 
digital enterprise, cyber resilient, explosion of data
    
MalwareBytes EMEA
Published By: Cisco Umbrella EMEA     Published Date: Nov 15, 2019
Not all cloud security solutions are created equal. You’ll want to look for a solution that meets the needs of today’s mobile, cloud-connected workforce, and is easy to manage on a day-to-day basis. Find out why security built into the foundation of the internet is better able to provide visibility into internet activity across all locations, users and devices, on and off-network.
Tags : 
    
Cisco Umbrella EMEA
Published By: ToneTag     Published Date: Nov 14, 2019
Increasingly, retailers in APAC face the combined challenges of more demanding customers, shrinking profitability, increased competition, and complex online-offline experiences. That’s why more retailers are adopting data-over-sound technology. This technology allows customers to make mobile payments using sound to communicate with payment devices like credit card readers, or kiosk machines. It also enables novel customer experiences, which allow retailers to drive in-the-moment sales, improve loyalty program stickiness, and eliminate queues, among other benefits. And because it doesn’t require the Internet, and works even on feature phones, it can be leveraged in a number of scenarios such in pop-up markets, food courts, concerts, and door-to-door deliveries, among others. Inside This Guide: • The top 5 ways retailers are using data-over-sound • 14 benefits for retailers • Why sound-based experiences will take over APAC
Tags : 
    
ToneTag
Published By: ToneTag     Published Date: Nov 14, 2019
It’s critical for BFSI and fintech firms in APAC to enable frictionless payments to win the customer experience war. Making it easier and more intuitive for customers to make payments opens new revenue channels for BFSI and fintech, increases customer loyalty, and attracts more merchants. That’s why more APAC’s BFSI and fintech innovators are adopting data-over-sound technology. This technology allows customers to make mobile payments using sound to communicate with payment devices like credit card readers, or other phones. It is also flexible: It can transform any device with a speaker or a microphone into a payment device. This includes ATMs, food kiosks, etc. The benefit? BFSI and fintech firms can re-use existing assets, driving down innovation cost. Plus, it doesn’t require the Internet, and works even on feature phones. This makes it ideal to acquire customers in rural and semi-rural markets. Inside This Guide: • The top 5 ways BFSI and fintech firms are using data-over-
Tags : 
    
ToneTag
Published By: MicroStrategy     Published Date: Nov 08, 2019
With trends such as big data, artificial intelligence and IoT dominating today’s business technology headlines, the buzz around enterprise mobility (now considered known and familiar) may have lessened, but its importance has not. Consider its key role in today’s top tech trends, and then also consider this. According to an Oxford Economics survey of 500 senior IT executives, CEOs, and other senior managers, 80% say workers cannot do their jobs effectively without a mobile device. The same survey shows: 82% say mobile devices are critical to employee productivity 82% say mobile devices are critical to agility and the speed of decision making 76% say mobile devices are critical to customer service and satisfaction 75% say mobile devices are critical to innovation and collaboration 70% say mobile devices are critical to employee satisfaction and 70% say mobile devices are critical to revenue growth. The known and familiar now demands a fresh look and focus from enterprise organizatio
Tags : 
    
MicroStrategy
Published By: MicroStrategy     Published Date: Nov 08, 2019
With trends such as big data, artificial intelligence and IoT dominating today’s business technology headlines, the buzz around enterprise mobility (now considered known and familiar) may have lessened, but its importance has not. Consider its key role in today’s top tech trends, and then also consider this. According to an Oxford Economics survey of 500 senior IT executives, CEOs, and other senior managers, 80% say workers cannot do their jobs effectively without a mobile device. The same survey shows: 82% say mobile devices are critical to employee productivity 82% say mobile devices are critical to agility and the speed of decision making 76% say mobile devices are critical to customer service and satisfaction 75% say mobile devices are critical to innovation and collaboration 70% say mobile devices are critical to employee satisfaction and 70% say mobile devices are critical to revenue growth. The known and familiar now demands a fresh look and focus from enterprise organizatio
Tags : 
    
MicroStrategy
Published By: MicroStrategy     Published Date: Nov 08, 2019
Mobile devices are part of nearly everything we do in life. Two-thirds of the world's population is connected via one of these devices; in 2020 there will be 6.95 billion mobile users worldwide, according to Statista forecast. Apple iOS and Google Android mobile devices provide on-the-go access to the vast array of applications and information that people have come to rely on. In the next decade the use of mobile devices gain intelligence likely will significantly change how an organization does its work.
Tags : 
    
MicroStrategy
Published By: MicroStrategy     Published Date: Nov 06, 2019
Mobile devices are part of nearly everything we do in life.
Tags : 
    
MicroStrategy
Published By: Panasonic     Published Date: Oct 10, 2019
Thousands of federal employees are issued mobile devices every year to carry out their agency’s mission. The government has strict security standards for such devices, but a new poll by Government Business Council (GBC) suggests that employee perceptions may be at odds with organizational priorities regarding security of these mobile devices.
Tags : 
    
Panasonic
Published By: Panasonic     Published Date: Oct 10, 2019
Mobility is critical to government productivity, but mobile data and devices present attractive targets to cybercriminals seeking to exploit vulnerabilities across the spectrum.
Tags : 
    
Panasonic
Published By: Panasonic     Published Date: Oct 10, 2019
The U.S. military continues to develop its quick-strike potential, seeking greater capacity to project force globally, quickly and on several fronts simultaneously. Support services are integral to that effort, particularly in the area of logistics and asset maintenance. In its 2018 National Defense Strategy, the Department of Defense identified the development of “resilient and agile logistics” among its key modernization goals.
Tags : 
    
Panasonic
Published By: BehavioSec     Published Date: Oct 04, 2019
Authentication is evolving from static one-time user action, to transparent and continuous ways of validating digital identities without imposing frustration on end users. Behavioral biometrics technologies invisibly and unobtrusively authenticate users by validating the manner in which they physically interact online. Behavioral biometrics technologies learn how individual users hold mobile devices in their hands and press their fingers on the touchscreen. On computers, the system learns how users type on keyboards and move their mouse and cursor. The BehavioSec solution gathers this behavioral data and analyzes it using advanced techniques, to ensure that the user is who you expect them to be.
Tags : 
    
BehavioSec
Published By: Pine Cove Consulting     Published Date: Oct 03, 2019
You've seen them, and you fear them. Now let us show you how to be cleaned of them. Hackers are increasingly targeting mobile devices to steal data (emails, contacts, corporate data, financial information) and send premium rate SMS, using up your bandwidth in the process. Sophos makes it easy to secure and manage your mobile devices.
Tags : 
    
Pine Cove Consulting
Published By: HERE Technologies     Published Date: Oct 02, 2019
How can brands create relevant, authentic advertising experiences with real-world location intelligence? Innovative brands and marketers are looking for data sets and services that contextualize consumer movements and habits in the world around them. Understanding location and its connection to customer behavior is key to increasing the effectiveness of retail campaigns and diving deeper into audience behavioral patterns. HERE enables relevant and authentic experiences through real-time location intelligence. As the world’s leading location platform*, HERE also shares its insights into the future of reaching customers on their mobile devices as they travel. *Souce: Ovum and Counterpoint Research annual indexes
Tags : 
    
HERE Technologies
Published By: HERE Technologies     Published Date: Oct 01, 2019
How can brands create relevant, authentic advertising experiences with real-world location intelligence? Innovative brands and marketers are looking for data sets and services that contextualize consumer movements and habits in the world around them. Understanding location and its connection to customer behavior is key to increasing the effectiveness of retail campaigns and diving deeper into audience behavioral patterns. HERE enables relevant and authentic experiences through real-time location intelligence. As the world’s leading location platform*, HERE also shares its insights into the future of reaching customers on their mobile devices as they travel. *Souce: Ovum and Counterpoint Research annual indexes
Tags : 
    
HERE Technologies
Published By: Oracle     Published Date: Sep 30, 2019
Today’s consumers are demanding: They have become more unforgiving of a poor customer experience and expect interactions on their desktop and mobile devices to be responsive, intuitive, and easy-to-use. Marketers understand that delivering the most relevant experience is the key to gaining continued satisfaction and loyalty from their digital consumers.
Tags : 
    
Oracle
Published By: BehavioSec     Published Date: Sep 30, 2019
Authentication is evolving from static one-time user action, to transparent and continuous ways of validating digital identities without imposing frustration on end users. Behavioral biometrics technologies invisibly and unobtrusively authenticate users by validating the manner in which they physically interact online. Behavioral biometrics technologies learn how individual users hold mobile devices in their hands and press their fingers on the touchscreen. On computers, the system learns how users type on keyboards and move their mouse and cursor. The BehavioSec solution gathers this behavioral data and analyzes it using advanced techniques, to ensure that the user is who you expect them to be.
Tags : 
    
BehavioSec
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.