devices

Results 1526 - 1550 of 1793Sort Results By: Published Date | Title | Company Name
Published By: Citrix Systems, Inc.     Published Date: Jan 19, 2016
Learn how web applications and mobile devices impact ITís ability to successfully defend against cyberthreats, and find out why SDN may be the solution.
Tags : 
citrix, cyberthreat, report, defense
    
Citrix Systems, Inc.
Published By: Citrix Systems, Inc.     Published Date: Jan 19, 2016
Customers, employees and partners are more frequently accessing web-delivered services from their mobile devices. At the same time, attackers are constantly discovering new ways to compromise security, including advanced malware and application layer attacks. Without the right tools, you are vulnerable. NetScaler gives you the visibility and control to manage, accelerate, and secure all your web properties, so you can deliver both the service and security your users demand. To learn more about web security and NetScaler, read the full report: Defend Web Properties from Modern Threats with Citrix NetScaler
Tags : 
citrix, security, netscaler, web
    
Citrix Systems, Inc.
Published By: IBM     Published Date: Feb 27, 2014
Organizations developing products and systems in industries such as automotive, aerospace and defense, medical devices and consumer electronics are undergoing a transformation driven by the rapid growth in functionality delivered by software and electronics. This paper outlines an approach for using this shift to gain a competitive advantage.
Tags : 
ibm, ibm software, systems engineering, business agility, smart products, traceability, engineering information, collaboration, engineering disciplines, business objectives, change management, compliance standards, systems age, engineering process, information integration, communication
    
IBM
Published By: IBM     Published Date: Feb 27, 2014
Learn the best practices that the mobile technology leaders are using and see how your organization could benefit from an infrastructure that supports mobile devices and other mobile solutions.
Tags : 
mobile, best practices, mobile technology, mobile solutions, mobile devices, mobile collaboration, byod, bring your own device, mobile applications, network, device
    
IBM
Published By: IBM     Published Date: Feb 27, 2014
Learn about the necessary security precautions that must be enabled so your employees can use mobile devices in a world where mobility is key.
Tags : 
security essentials, cio, mobility, security precautions, ibm, bring your own device, byod
    
IBM
Published By: IBM     Published Date: Apr 15, 2014
Organizations developing products and systems in industries such as automotive, aerospace and defense, medical devices and consumer electronics are undergoing a transformation driven by the rapid growth in functionality delivered by software and electronics. This paper outlines an approach for using this shift to gain a competitive advantage.
Tags : 
ibm, product development, systems development, it engineering, business objectives, traceability, collaboration
    
IBM
Published By: Oracle     Published Date: Oct 02, 2013
Once a popular topic in IT circles, cloud computing is now part of the business vernacular. Itís mentioned in the C-suite, itís mentioned around the water cooler where employees discuss their latest mobile devices and itís now a part of consumer advertising campaigns.
Tags : 
oracle, marketing, saas, lob, crm & customer care
    
Oracle
Published By: Oracle     Published Date: Oct 02, 2013
Migrating to a new interconnected service culture, powered by smart devices and the Web
Tags : 
oracle, customer experience, 2013 trends to watch, search marketing
    
Oracle
Published By: Symantec     Published Date: Jun 18, 2015
Learn how to properly secure your enterprise in the cloud and see why it is important to safely move your organization to the cloud.
Tags : 
mobile devices, enterprise in the cloud, data breach, centralized servcers
    
Symantec
Published By: IBM     Published Date: Nov 19, 2014
As the use of mobile devices exponentially expands, so too does security threats to the increasing number of mobile applications that companies rely on. As a result, companies struggle to keep pace with mobile application security and face the risk of embarrassing and costly data breaches. In this technical session, youíll learn how Worklight Application Scanning helps you deliver applications that arenít susceptible to the most common types of malware, including SQL Injection and Cross-Site Scripting. In addition, youíll learn how this powerful tool helps address the OWASP Top 10 Mobile Risks for 2014.
Tags : 
application screening, user feedback, mobile app development, cloud-based services
    
IBM
Published By: IBM     Published Date: Jan 26, 2015
There is an exponential increase in connected devices that are producing data about our homes, health, cars, and everything in between. The Internet of things (IoT) is exploding into apps that allow users to see and interact with these devices. Watson can enable IoT apps to understand the meaning and intent of the users that interact with these connected devices. Check out this webcast to learn how the cognitive services from IBM Watson available on Bluemix can make IoT apps be intelligent, overcome complexity, and support discovery and decision making.
Tags : 
ibm, bluemix, big data, intent, iot
    
IBM
Published By: IBM     Published Date: Feb 04, 2015
Businesses contain countless systems, sensors, meters, and other IT devices generating volumes of data daily.But, are your devices and systems simply sharing data or are they having a conversation that enables better business outcomes?
Tags : 
machine data, big data, data-in-motion analytics, iot
    
IBM
Published By: IBM     Published Date: Feb 04, 2015
Modern business ecosystems need to rethink their approach to innovation and integration. This book is your guide to applying the power of APIs to business challenges ranging from changing business models to embracing a world of devices and sensors.
Tags : 
api economy, business ecosystems, api technology platform, managing api's
    
IBM
Published By: IBM     Published Date: Feb 04, 2015
Read this white paper to discover how to: Accelerate the flow of messages throughout your organization and extend business value outward to smart devices and mobile phones. Create a more-responsive business by supporting rapid, reliable, and secure transport of information between your applications, systems and services. Reduce cost when you diminish complexity and reduce maintenance. Take action to drive
Tags : 
application systems, application services, it solutions, application complexity
    
IBM
Published By: Bronto     Published Date: Mar 30, 2012
With consumers practically attached to mobile devices and beginning to accept marketing messages on Facebook and Twitter, marketing efforts are less about driving to a specific channel and more about having a promotional presence in all of them and keeping the person engaged throughout the customer lifecycle. The reasons for disengaging from a purchase decision are nearly infinite, and the means to disengage are just a few taps away on a smartphone.
Tags : 
bronto, marketing, emerging marketing, digital marketing, online, digital, e-commerce
    
Bronto
Published By: Bronto     Published Date: Jan 02, 2014
Attention digital marketers, we are no longer in control. Whether they realize the true strength of their powers or not, consumers now have the upper hand of the digital marketing experience. Download this e-book to explore each phase of the customer lifecycle and detail programs to reach your customers across channels, devices and levels of engagement.By downloading now, you'll gain instant access to Chapter 1, Acquiring and Welcoming New Subscribers. Then, keep an eye on your inbox for the remaining 5 chapters over the next few weeks.
Tags : 
lifecycle marketing, customer engagement, e-commerce marketing, acquiring subscribers
    
Bronto
Published By: Bronto     Published Date: Dec 03, 2015
Bronto has teamed up with Apparel Magazine to shed some light on Millennials and how they are using mobile devices. Download our new infogram and learn!
Tags : 
bronto, mobile, millenial, mobile device, social media, crm & customer care, e-commerce
    
Bronto
Published By: Bronto     Published Date: May 18, 2017
Convenience is absolutely critical to succeeding in e-commerce. Any glitches along the path to purchase potentially result in a lost sale. That's one reason we think Apple Pay's new mobile payment feature that uses a fingerprint is going to be a game changer. Its another step in reducing hurdles to online buying. You see it, you select it, you pay with your finger. What could be more convenient? Not interested in Apple Pay? Or unable to use it? At the very least, make sure customers that shop on multiple devices are recognized, no matter which device they log into. Giving them access to their stored information will make for a much smoother checkout.
Tags : 
bronto, digital marketers, program management, customer support, critical data source, email management, world wide business research, mobile devices, visual commerce, virtual reality, overseas market
    
Bronto
Published By: Symantec     Published Date: Nov 30, 2015
Two trends make code signing more important than ever: the explosion of consumer applications for mobile and desktop devices and the proliferation of malware.
Tags : 
    
Symantec
Published By: Oracle     Published Date: Sep 30, 2014
On average, about 40 percent of e-mail opens come from mobile devices and tablets. Mobile subscribers are less engaged because they are being forced through an experience that is not optimized to help them take the action marketers are asking them to. As a marketer, it's daunting figuring out how to address this growing challenge. This guide walks you through where to begin and provides some design strategies to help you capture those clicks.
Tags : 
oracle, marketing, cloud, connected, customer, modern, mobile, email, crm & customer care
    
Oracle
Published By: Oracle     Published Date: Sep 30, 2014
"Consumers worldwide have nearly 5 billion active mobile subscriptions- thatís almost a billion and a half more active mobile subscriptions than toothbrushes sold. With more than five times more mobile devices than PCs on the planet today, as a marketer, chances are your messages are being consumed in the mobile channel. If youíre not aligning your strategies with this new reality, you may find your business headed the way of the landline."
Tags : 
oracle, marketing, cloud, connected, customer, modern, growing, mobile, subscriptions, crm & customer care
    
Oracle
Published By: Oracle     Published Date: Sep 30, 2014
Mobile devices are transforming how we interact with each other and the world. Tapping mobile potential doesnít have to take sorcery. Donít let your efforts to keep up create a fragmented customer experience. You need an orchestrated way to plan, respond, and thrive in the new mobile marketing world. Read how.
Tags : 
oracle, marketing, cloud, connected, customer, modern, crm & customer care
    
Oracle
Published By: Symantec Corporation     Published Date: Oct 03, 2013
Over the past decade, businesses have had to adapt to an array of technical changes, including an increasingly hostile cyber environment. We saw the early precursors of cybercrime decades ago when computer use was limited to a relatively small group of specialists and electronics enthusiasts. Innovative programmers, some still in high school, would find ways to display annoying messages on their friendsí computers and from there spread to other devices via shared floppy disks.This kind of part practical joke-part vandalism form of malware has been overshadowed by the more serious, technically complex, and financially lucrative form of todayís cybercrime. In this guide, we will examine major types of threats to information security that businesses face today as well as techniques for mitigating those threats. One of the most important tools available to us is SSL technology.
Tags : 
symantec, security, threat, report, key findings, best practice, strategy, technology
    
Symantec Corporation
Published By: Symantec Corporation     Published Date: Oct 03, 2013
Businesses face an increasingly complex set of threats to their Web applicationsófrom malware and advanced persistent threats (APTs) to disgruntled employees and unintentional data leaks. Although there is no single security measure than can prevent all threats, there are some that provide broad-based mitigation to a number of threats. The use of SSL encryption and digital certificate-based authentication is one of them. Changes in the way we deliver services, the increasing use of mobile devices, and the adoption of cloud computing compounded by the ever-evolving means of stealing information and compromising services leave Web applications vulnerable to attack. In this chapter, we turn our attention to the combined risk of losing data and losing customer trust.
Tags : 
symantec, security, threat, report, key findings, best practice, strategy, technology
    
Symantec Corporation
Published By: Symantec Corporation     Published Date: Jun 24, 2014
News headlines have been inundated with stories of massive personal and credit card data breaches. The rising intensity and sophisticated nature of cyber attacks has created a hostile and precarious environment for businesses charged with protecting their customersí personal data. The lucrative business of selling credit card data on the black market has made point-of-sale (PoS) devices, PoS environments, and web kiosks a prime target for cybercriminals. Read this solution brief to learn how to protect your network and PoS terminal and web kiosk endpoints from costly multi-stage cyber attacks.
Tags : 
security, pos, data, malware, cyber attacks, point-of-sale
    
Symantec Corporation
Start   Previous    55 56 57 58 59 60 61 62 63 64 65 66 67 68 69    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.


Featured FREE Resource: