devices

Results 1401 - 1425 of 1646Sort Results By: Published Date | Title | Company Name
Published By: IBM     Published Date: Jan 26, 2015
There is an exponential increase in connected devices that are producing data about our homes, health, cars, and everything in between. The Internet of things (IoT) is exploding into apps that allow users to see and interact with these devices. Watson can enable IoT apps to understand the meaning and intent of the users that interact with these connected devices. Check out this webcast to learn how the cognitive services from IBM Watson available on Bluemix can make IoT apps be intelligent, overcome complexity, and support discovery and decision making.
Tags : 
ibm, bluemix, big data, intent, iot
    
IBM
Published By: IBM     Published Date: Feb 04, 2015
Businesses contain countless systems, sensors, meters, and other IT devices generating volumes of data daily.But, are your devices and systems simply sharing data or are they having a conversation that enables better business outcomes?
Tags : 
machine data, big data, data-in-motion analytics, iot
    
IBM
Published By: IBM     Published Date: Feb 04, 2015
Modern business ecosystems need to rethink their approach to innovation and integration. This book is your guide to applying the power of APIs to business challenges ranging from changing business models to embracing a world of devices and sensors.
Tags : 
api economy, business ecosystems, api technology platform, managing api's
    
IBM
Published By: IBM     Published Date: Feb 04, 2015
Read this white paper to discover how to: Accelerate the flow of messages throughout your organization and extend business value outward to smart devices and mobile phones. Create a more-responsive business by supporting rapid, reliable, and secure transport of information between your applications, systems and services. Reduce cost when you diminish complexity and reduce maintenance. Take action to drive
Tags : 
application systems, application services, it solutions, application complexity
    
IBM
Published By: Bronto     Published Date: Mar 30, 2012
With consumers practically attached to mobile devices and beginning to accept marketing messages on Facebook and Twitter, marketing efforts are less about driving to a specific channel and more about having a promotional presence in all of them and keeping the person engaged throughout the customer lifecycle. The reasons for disengaging from a purchase decision are nearly infinite, and the means to disengage are just a few taps away on a smartphone.
Tags : 
bronto, marketing, emerging marketing, digital marketing, online, digital, e-commerce
    
Bronto
Published By: Bronto     Published Date: Jan 02, 2014
Attention digital marketers, we are no longer in control. Whether they realize the true strength of their powers or not, consumers now have the upper hand of the digital marketing experience. Download this e-book to explore each phase of the customer lifecycle and detail programs to reach your customers across channels, devices and levels of engagement.By downloading now, you'll gain instant access to Chapter 1, Acquiring and Welcoming New Subscribers. Then, keep an eye on your inbox for the remaining 5 chapters over the next few weeks.
Tags : 
lifecycle marketing, customer engagement, e-commerce marketing, acquiring subscribers
    
Bronto
Published By: Bronto     Published Date: Dec 03, 2015
Bronto has teamed up with Apparel Magazine to shed some light on Millennials and how they are using mobile devices. Download our new infogram and learn!
Tags : 
bronto, mobile, millenial, mobile device, social media, crm & customer care, e-commerce
    
Bronto
Published By: Bronto     Published Date: May 18, 2017
Convenience is absolutely critical to succeeding in e-commerce. Any glitches along the path to purchase potentially result in a lost sale. That's one reason we think Apple Pay's new mobile payment feature that uses a fingerprint is going to be a game changer. Its another step in reducing hurdles to online buying. You see it, you select it, you pay with your finger. What could be more convenient? Not interested in Apple Pay? Or unable to use it? At the very least, make sure customers that shop on multiple devices are recognized, no matter which device they log into. Giving them access to their stored information will make for a much smoother checkout.
Tags : 
bronto, digital marketers, program management, customer support, critical data source, email management, world wide business research, mobile devices, visual commerce, virtual reality, overseas market
    
Bronto
Published By: Symantec     Published Date: Nov 30, 2015
Two trends make code signing more important than ever: the explosion of consumer applications for mobile and desktop devices and the proliferation of malware.
Tags : 
    
Symantec
Published By: Oracle     Published Date: Sep 30, 2014
On average, about 40 percent of e-mail opens come from mobile devices and tablets. Mobile subscribers are less engaged because they are being forced through an experience that is not optimized to help them take the action marketers are asking them to. As a marketer, it's daunting figuring out how to address this growing challenge. This guide walks you through where to begin and provides some design strategies to help you capture those clicks.
Tags : 
oracle, marketing, cloud, connected, customer, modern, mobile, email, crm & customer care
    
Oracle
Published By: Oracle     Published Date: Sep 30, 2014
"Consumers worldwide have nearly 5 billion active mobile subscriptions- that’s almost a billion and a half more active mobile subscriptions than toothbrushes sold. With more than five times more mobile devices than PCs on the planet today, as a marketer, chances are your messages are being consumed in the mobile channel. If you’re not aligning your strategies with this new reality, you may find your business headed the way of the landline."
Tags : 
oracle, marketing, cloud, connected, customer, modern, growing, mobile, subscriptions, crm & customer care
    
Oracle
Published By: Oracle     Published Date: Sep 30, 2014
Mobile devices are transforming how we interact with each other and the world. Tapping mobile potential doesn’t have to take sorcery. Don’t let your efforts to keep up create a fragmented customer experience. You need an orchestrated way to plan, respond, and thrive in the new mobile marketing world. Read how.
Tags : 
oracle, marketing, cloud, connected, customer, modern, crm & customer care
    
Oracle
Published By: Symantec Corporation     Published Date: Oct 03, 2013
Over the past decade, businesses have had to adapt to an array of technical changes, including an increasingly hostile cyber environment. We saw the early precursors of cybercrime decades ago when computer use was limited to a relatively small group of specialists and electronics enthusiasts. Innovative programmers, some still in high school, would find ways to display annoying messages on their friends’ computers and from there spread to other devices via shared floppy disks.This kind of part practical joke-part vandalism form of malware has been overshadowed by the more serious, technically complex, and financially lucrative form of today’s cybercrime. In this guide, we will examine major types of threats to information security that businesses face today as well as techniques for mitigating those threats. One of the most important tools available to us is SSL technology.
Tags : 
symantec, security, threat, report, key findings, best practice, strategy, technology
    
Symantec Corporation
Published By: Symantec Corporation     Published Date: Oct 03, 2013
Businesses face an increasingly complex set of threats to their Web applications—from malware and advanced persistent threats (APTs) to disgruntled employees and unintentional data leaks. Although there is no single security measure than can prevent all threats, there are some that provide broad-based mitigation to a number of threats. The use of SSL encryption and digital certificate-based authentication is one of them. Changes in the way we deliver services, the increasing use of mobile devices, and the adoption of cloud computing compounded by the ever-evolving means of stealing information and compromising services leave Web applications vulnerable to attack. In this chapter, we turn our attention to the combined risk of losing data and losing customer trust.
Tags : 
symantec, security, threat, report, key findings, best practice, strategy, technology
    
Symantec Corporation
Published By: Symantec Corporation     Published Date: Jun 24, 2014
News headlines have been inundated with stories of massive personal and credit card data breaches. The rising intensity and sophisticated nature of cyber attacks has created a hostile and precarious environment for businesses charged with protecting their customers’ personal data. The lucrative business of selling credit card data on the black market has made point-of-sale (PoS) devices, PoS environments, and web kiosks a prime target for cybercriminals. Read this solution brief to learn how to protect your network and PoS terminal and web kiosk endpoints from costly multi-stage cyber attacks.
Tags : 
security, pos, data, malware, cyber attacks, point-of-sale
    
Symantec Corporation
Published By: AlienVault     Published Date: Oct 20, 2017
Get All 5 Chapters of AlienVault’s How to Build a Security Operations Center (On a Budget) in 1 eBook! You'll get an in-depth look at how organizations with limited resources can set up a successful operations center for monitoring, detecting, containing, and remediating IT threats across applications, devices, systems, networks, and locations. The chapters you'll read focus on: • The roles and responsibilities involved in a security operations team • The key processes you'll need to build a security operations center • The essential security monitoring tools needed for a fully functional security operations center • How threat intelligence is used in a security operations center • Real world examples of how organizations have used AlienVault USM to power their security operations center For many organizations (unless you work for a large bank), building a SOC may seem like an impossible task. With limited resources (time, staff, and budget), setting up an operations center supported b
Tags : 
    
AlienVault
Published By: AlienVault     Published Date: Oct 20, 2017
When you're starting service with a customer, setting the tone early on is very important. That's why we've created a checklist to help you stay organized from the start and implement smart process around your Managed Security Service Provider (MSSP) service. Feel free to use it but most importantly modify it. Use this checklist to help you document: • Network information • Logging devices • Contact information • Priority escalation contacts • Scheduled events Download this whitepaper now to help lay the foundation for a successful MSSP implementation.
Tags : 
    
AlienVault
Published By: IBM     Published Date: Mar 10, 2015
Organizations developing products and systems in industries such as automotive, aerospace and defense, medical devices and consumer electronics are undergoing a transformation driven by the rapid growth in functionality delivered by software and electronics. This paper outlines an approach for using this shift to gain a competitive advantage.
Tags : 
ibm, systems development, product development, traceability, customer lifecycle
    
IBM
Published By: Lazar_Rocket Fuel     Published Date: May 05, 2016
As the number of devices multiplies at a rate that far outpaces growth in the number of actual consumers, marketers must now realize that they have to market to people, not devices. The question is: how do you do that in the most tech-savvy and cost-effective way possible? Let’s take a step-by-step approach to that challenge.
Tags : 
rocketfuel, internet of things, iot, devices, marketing, fragmented marketing, internet enabled devices, emerging marketing, internet marketing, marketing research
    
Lazar_Rocket Fuel
Published By: Act-On     Published Date: Jan 08, 2015
Ready to move past the basics of email marketing and learn new techniques to optimize your email results? This guide will give you five tips for more successful - and more profitable - email campaigns, including: How to increase engagement with responsive design, tips for better email personalization, ideas for effective trigger emails, effective ways to integrate with social media, and so much more!
Tags : 
act-on, email guide, email campaigns, mobile emails, mobile devices, personalization, personal content, email marketing
    
Act-On
Published By: AirDefense     Published Date: Apr 24, 2007
This paper presents the security risks inherit in wireless networks and explores the technical, functional and return on investment requirements needed for a monitoring solution for companies looking to protect and fortify their wireless networks from rogue wireless devices.
Tags : 
wlan, wireless security, wireless freeloaders, wireless rogue, rogue, rogues, wireless infrastructure, monitoring, network security, freeloaders, airdefense
    
AirDefense
Published By: TDI Transistor Devices     Published Date: Feb 06, 2009
Uninterruptible Power Solutions are often solved at the facility level with unnecessarily large, inefficient, expensive and complex AC UPS systems. While this provides an easy demarcation line between the facility and end equipment, with each focusing on a different part of the problem, it also results in overall operating efficiency and total cost of ownership being difficult to ascertain and optimize.
Tags : 
tdi, transistor devices, data processing, uninterruptible power solutions, ups, operating efficiency
    
TDI Transistor Devices
Published By: TDI Transistor Devices     Published Date: Feb 06, 2009
Modern Electronic Systems are quite often powered from a three-phase power source. While utilizing power modules that operate directly from three-phase power might seem to provide optimal simplicity and flexibility, the added complexity required to realize three-phase power factor corrected circuitry usually negates any potential savings.
Tags : 
tdi, transistor devices, electronic power systems, single phase power, three phase power, power transfer maximization, component count, three phase circuits
    
TDI Transistor Devices
Published By: Special Counsel     Published Date: May 14, 2015
In this white paper, we examine how smarter and more connected personal devices are spreading connectivity outward, eventually marrying personal data and services with information from the wider world.
Tags : 
personal devices, personal data, information, connectivity, innovation, internet of things
    
Special Counsel
Published By: Informatica     Published Date: Jul 07, 2011
Explore how retailers can generate a single view of customers who engage across multiple channels-online, in stores, and via call centers, on social media, and mobile devices.
Tags : 
informatica, competitive edge, customer information management mdm, master data management, multichannel retail environment, social media, single view, customer activity, loyalty
    
Informatica
Start   Previous    50 51 52 53 54 55 56 57 58 59 60 61 62 63 64    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.


Featured FREE Resource: