devices

Results 1351 - 1375 of 1773Sort Results By: Published Date | Title | Company Name
Published By: IBM     Published Date: May 12, 2017
In today’s world, the data is flowing from all directions: social media, phones, weather, location and sensor equipped devices, and more. Competing in this digital age requires the ability to analyze all of this data, and use it to drive decisions that mitigate risk, increase customer satisfaction and grow revenue. Using a combination of proprietary software and open source technology can give your data scientists and statisticians the analytical power they need to find and act on insights quickly. IBM® SPSS® Statistics provides all of the data analysis tools you need, and integrates with thousands of R extensions for maximum power and flexibility. In this next Data Science Central Webinar event, we will show how SPSS Statistics can help you keep up with the influx of new data and make faster, better business decisions without coding.
Tags : 
ibm, spss, data analysis, statistics, risk mitigation
    
IBM
Published By: IBM     Published Date: Jun 22, 2017
Security threats are very real, and the stakes are higher than ever. Each day, tens of thousands of malware variants are created, with new classes of threats continually added and improved upon. Savvy attackers use polymorphic programs to alter malware into new form factors after each delivery. And all of this is exacerbated by the proliferation of mobile devices, cloud computing and social media—in fact, the intersection of these technologies provides fertile new ground for threats and malware. Today’s attacks are often not random, but targeted for maximum financial gain and impact. Rogue individuals and groups are constantly innovating new ways to attack organizations’ most valuable assets. As a result, traditional methods of dealing with threats are no longer enough. Organizations need more threat intelligence than ever before in order to effectively protect themselves.
Tags : 
cyber security, global threat intelligence, malware prevention, cyber threat, protection
    
IBM
Published By: IBM     Published Date: Jul 26, 2017
Security threats are very real, and the stakes are higher than ever. Each day, tens of thousands of malware variants are created, with new classes of threats continually added and improved upon. Savvy attackers use polymorphic programs to alter malware into new form factors after each delivery. And all of this is exacerbated by the proliferation of mobile devices, cloud computing and social media—in fact, the intersection of these technologies provides fertile new ground for threats and malware.
Tags : 
mobile devices, security, data protection, data loss, information security
    
IBM
Published By: Akamai     Published Date: Apr 10, 2015
Enterprise network architectures are evolving as a result of the growth of public cloud, proliferation of mobile devices, and organizational requirement to collaborate with global users. In this on-demand webinar, Gartner Research VP and Distinguished Analyst Mark Fabbi and Akamai Technologies' Enterprise Web Experience Product Manager, Greg Lord, will provide insight into this new trend.
Tags : 
akamai, web performance, cloud services, network management, cloud networking, digital enterprise
    
Akamai
Published By: Utimaco     Published Date: Aug 18, 2008
If company laptops, PDAs, or other mobile devices can't be found, it doesn't always mean that they've been stolen. Companies often lose track of these IT assets because there's no clear record of them. Encryption and inventory management can help to safeguard against the loss of confidential data.
Tags : 
leak, leakage, data protection, encryption, asset management, mobile, laptop security, mobile security
    
Utimaco
Published By: BlackBerry     Published Date: Dec 22, 2009
The Johnson & Johnson Family of Companies is comprised of the world's premier consumer health company, the world's largest medical devices and diagnostics company, the world's fourth-largest biologics company, and the world's seventh-largest pharmaceuticals company. With over 250 operating companies in 57 countries, Johnson & Johnson's Credo is to put the needs and well-being of the people they serve first.
Tags : 
blackberry, mobile applications, johnson, pharma, cio, pim, voip, smartphones
    
BlackBerry
Published By: Mentor Graphics     Published Date: Apr 03, 2009
The success of any consumer electronic device depends to a large extent on the appeal of the user interface (UI) and how easy the device is to use. Studies show that good cosmetic design can encourage users to explore the full range of features and often engenders the perception that a product is easier to use. So if the benefits of a great looking, easy-to-use UI are so clear, why are so many products still falling short of customer expectations? The solution lies in taking a fresh new approach a consumer electronic device UI plays. By identifying common UI functionality and implementing it in a reusable and customizable way, we can make it far easier for embedded engineers to deliver visually engaging and easy-to-use consumer electronic products.
Tags : 
inflexion platform ui, user interface, consumer electronic device, mentor graphics, ui functionality, media player, mobile phone, tv set-top box
    
Mentor Graphics
Published By: Mentor Graphics     Published Date: May 21, 2009
No question the UI in electronic devices today is playing a larger role in the success of a device. Get the UI wrong and your product will have little chance of surviving. And it isn’t enough to deliver a UI that is merely functional: it has to look good too. Studies have shown that a good cosmetic design can encourage users to explore the full range of features and often, can engender the perception that a product is easier to use, which can make consumers more tolerant of product deficiencies. Learn more today!
Tags : 
mentor, user interface, electronic devices, consumer, cosmetic, graphics, nucleus, time-to-market
    
Mentor Graphics
Published By: Mentor Graphics     Published Date: Aug 19, 2009
In today’s competitive embedded markets, manufacturers need to find ways to differentiate without adversely impacting development time and cost. This is particularly true in relation to embedded devices that are designed for use by consumers. As such products become more sophisticated, user interaction via traditional switches, dials, and basic displays becomes less desirable for a number of reasons.
Tags : 
mentor graphics, embedded markets, switches, dials, display, user interface, graphical user interface, gui
    
Mentor Graphics
Published By: Splunk Inc.     Published Date: Jun 02, 2009
This document explains IT Search's ability to instantly search all the data generated by applications, servers and network devices in your IT infrastructure. Download to learn more today!
Tags : 
operations, it search, data center, splunk, business intelligence, compliance, security, it infrastructure
    
Splunk Inc.
Published By: 2ergo     Published Date: Apr 09, 2010
When Rightmove wanted to be the first to provide an innovative and engaging mobile app that would move millions of iPhone users to access extensive property search functionality, they turned to 2ergo. Learn about the challenges Rightmove faced, the solution 2ergo provided, and the unbelievable results that were achieved, including how the app ultimately ranked in the top 30 Apple "Best Apps of 2009" chart.
Tags : 
2ergo, iphone, mobile devices, apps, applications, mobile apps, smartphone, gps
    
2ergo
Published By: SAS     Published Date: Nov 16, 2018
More account openings are taking place through digital devices and online, giving the access and anonymity fraudsters need to steal or fabricate identities. Since credit fraud often starts with a falsified application, it makes sense to have strong tools to monitor loans and credit lines from that point onward. This paper discusses analytics-driven methods for validating applications and spotting trouble at all three stages of bust-out fraud schemes.
Tags : 
    
SAS
Published By: SAS     Published Date: Jan 04, 2019
As the pace of business continues to accelerate, forward-looking organizations are beginning to realize that it is not enough to analyze their data; they must also take action on it. To do this, more businesses are beginning to systematically operationalize their analytics as part of a business process. Operationalizing and embedding analytics is about integrating actionable insights into systems and business processes used to make decisions. These systems might be automated or provide manual, actionable insights. Analytics are currently being embedded into dashboards, applications, devices, systems, and databases. Examples run from simple to complex and organizations are at different stages of operational deployment. Newer examples of operational analytics include support for logistics, customer call centers, fraud detection, and recommendation engines to name just a few. Embedding analytics is certainly not new but has been gaining more attention recently as data volumes and the freq
Tags : 
    
SAS
Published By: SAS     Published Date: Jul 22, 2019
Text is the largest human-generated data source. It grows every day as we post on social media, interact with chatbots and digital assistants, send emails, conduct business online, generate reports and essentially document our daily thoughts and activities using computers and mobile devices. Increasingly, organizations want to know how all of that data can be used to drive improvements. For many, unstructured text represents a massive untapped data source with great potential for producing valuable insights that could result in significant business transformations or spur incredible social innovation. This paper looks at how organizations in banking, health care and life sciences, manufacturing and government are using SAS text analytics to drive better customer experiences, reduce fraud and improve society.
Tags : 
    
SAS
Published By: Cisco     Published Date: Nov 17, 2014
Today’s malware authors continue to increase their capabilities faster than security solutions can adapt to them. Whether it’s changing their attacks or hiding malicious code within web pages, it’s more difficult to identify legitimate network traffic. With first-generation network security devices, it is nearly impossible to defend against today’s threats. The situation will get worse before it gets better. Adversaries now utilize agile development and testing methods to develop their malware, they test new malware against the latest security software to increase effectiveness. Next-generation network security devices are emerging that provide the visibility and situational context required to meet today’s threats. These solutions use security automation to provide a sophisticated solution that is both lightweight and agile
Tags : 
malware, cisco, command and control evasion, port hopping, zero-day attacks, encapsulation, encrypted traffic
    
Cisco
Published By: AT&T     Published Date: Nov 07, 2011
Contact center hosting and cloud-based solutions are fast becoming integral to enabling customer care service for enterprises.
Tags : 
contact center services, contact center, trends in contact centers, services, solutions, customers, enterprises, at&t
    
AT&T
Published By: AT&T     Published Date: Nov 07, 2011
Reach For the Cloud to Transform How You Deliver Voice Services and Elevate the Value of Voice.
Tags : 
cloud services, cloud computing, hosted voice solution, voice services, at&t, att, at+t, crm
    
AT&T
Published By: Symantec     Published Date: Apr 04, 2013
In this business guide, we discuss how the latest code signing technology works to secure software code and content for applications that are directly downloaded to mobile devices from the Internet.
Tags : 
code signing, mobile, apps, applications, mobile applications, hacking, cyber criminals, mobile security
    
Symantec
Published By: IBM     Published Date: May 09, 2013
Employee-owned mobile devices are in the enterprise to stay. But the explosion in the numbers and types of mobile devices spawns questions that organizations must address if they are to gain the most benefits possible from employees, their devices and the business network.
Tags : 
mobility, control, change, employees, business network, mobile devices
    
IBM
Published By: BlackBerry     Published Date: Mar 11, 2013
See how BlackBerry® 10 guards against data leakage, prevents unauthorized access, secures corporate apps on personal devices and more – with advanced policies tough enough for the world’s most security-conscious organizations.
Tags : 
capabilities of blackberry 10, apps, secure corporate apps, corporate, devices, personal devices, organizations
    
BlackBerry
Published By: BlackBerry     Published Date: Mar 12, 2013
BlackBerry® 10 is an entirely new mobile computing platform that removes many of the barriers that slow down other devices. Here are just a few of the reasons end users love BlackBerry 10.
Tags : 
reasons to love blackberry 10, reasons end users, efficiently and effortless, blackberry 10, mobile devices
    
BlackBerry
Published By: BlackBerry     Published Date: Mar 12, 2013
In this case study, Ricoh Canada’s Director of Infrastructure and Operations speaks about his enthusiasm for BlackBerry® 10 devices, his findings after testing BlackBerry® Enterprise Service 10 and plans to port service to the Blackberry platform.
Tags : 
ricoh canada, blackberry 10, choosing enterprise, enterprise feedback, blackberry 10 platform
    
BlackBerry
Published By: Blackberry     Published Date: Mar 12, 2013
Ricoh Canada’s Director of Infrastructure and Operations speaks about his enthusiasm for BlackBerry® 10 devices, his findings after testing BlackBerry® Enterprise Service 10, and plans to port a field service application to the new platform.
Tags : 
enterprise feedback, choosing blackberry 10, ricoh canada, case study, enterprise case study
    
Blackberry
Published By: OutSystems     Published Date: Nov 07, 2014
This paper chronicles the adventures and misadventures of the enterprise mobile app journey based on our observations working with industry leaders who have weathered three years of pain to arrive at the same conclusions.
Tags : 
mobility, mobile devices, web apps, enterprise mobile app development
    
OutSystems
Published By: IBM     Published Date: Oct 10, 2013
A though leadership white paper discusses how virtualization, cloud computing, and the proliferation of smart devices are helping companies meet their goals and be more effective with their IT investments but are placing increased demands on the datacenter network. Organizations can no longer afford to treat the datacenter network as an afterthought, and it is not sufficient to simply throw more ports or bandwidth at the problem. IBM offers a portfolio of datacenter network planning, integration, and management services designed to maximize customers' DCN success. By working with customers to plan and implement the appropriate network design at the beginning of an IT project, IBM can help customers meet their business requirements, minimize operating costs, and build in flexibility for the future.
Tags : 
leveraging networks, virtualization, cloud intiatives, networking, cloud computing, datacenter, it investments, minimize operating costs
    
IBM
Start   Previous    48 49 50 51 52 53 54 55 56 57 58 59 60 61 62    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.


Featured FREE Resource: