devices

Results 376 - 400 of 1773Sort Results By: Published Date | Title | Company Name

How to manage mCommerce fraud. A framework for fraud managers.

Published By: CyberSource EMEA     Published Date: Jun 28, 2018
Mobile devices are everywhere. 95% of UK millennials now use smartphones1; and it’s estimated that across the globe, nearly a billion more people now use mobile phones today than did five years ago.2 Mobile commerce will continue to grow as smartphones continue to be adopted. For example, forecasts for Europe’s EU 5 (France, Germany, Italy, Spain and the United Kingdom) show mCommerce will account for 43.8% of eCommerce sales by 2020, compared to 32.9% in 2016.3 As fraud teams determine which orders to accept or reject, fraud managers are key to providing a seamless mobile checkout experience. But they also need to protect their business from fraud – and from the damage it can cause to bottom line, customer experience and brand.
Tags : 
    
CyberSource EMEA

Machine learning: a silver bullet?

Published By: CyberSource EMEA     Published Date: Jun 28, 2018
It has to be quick and easy for people to pay. At the same time, fraudsters are probing the weaknesses of new digital processes. As the person who can decide whether a transaction is accepted or rejected, fraud managers have a pivotal role. They’re not just preventing losses from chargebacks. They’re gatekeepers to accepting more revenue. It’s a complex job. But get it right, and they enable their business to engage customers better – across devices and places. And that can mean supporting the very growth of the business. In this landscape, the idea that a technology like machine learning might be the answer to all the industry’s needs is attractive. But while machine learning should be a key part of an effective fraud strategy, the truth is that there’s no silver bullet. So, in this paper, we’ll look at how best to put machine learning to use. By employing it in tandem with expert insight, merchants can use it to accept the optimal number of payments. And make a direct impact on the
Tags : 
    
CyberSource EMEA

NexCOBOT Leverages Intel® Vision Accelerator Design Products to Deliver Robotics with AI

Published By: Intel     Published Date: Dec 13, 2018
Robots play a key role in achieving manufacturing efficiencies and reducing labor intensive operations across diverse industries. Traditional machine vision has its limitations, however—typically, it can only conduct defect detection and classification based on fixed rules and work in fixed environments. To add on, the complexity of robotic system design poses challenges for many manufacturers to identify and integrate subsystems from multiple vendors. The future of robot and machine solutions is a production environment where devices, machines, robots, and sensors are interoperable. Find out how NexCOBOT integrates AI-driven vision capabilities into robotics to improve quality and accuracy over traditional machine vision—as well as providing an open and modular solution for users to develop a robot control system that best fits their particular application requirements.
Tags : 
    
Intel

SANS Whitepaper: Network Architecture with Security in Mind

Published By: Gigamon     Published Date: Feb 20, 2019
As the hunger for bandwidth and the number of devices within enterprise networks continue to increase, collaboration between NetOps and SecOps for a fast, secure network is a must. Download the SANS whitepaper Network Architecture with Security in Mind and learn about a new security approach that relies on pervasive visibility to send the right data to the right tools that are already in place, rather than adding more performance-hindering layers of security
Tags : 
    
Gigamon

Mobile App Engagement: The Power is Now in Marketing's Hands

Published By: Oracle Marketing Cloud     Published Date: Oct 06, 2017
Given the fact that there are more mobile devices on the planet than there are human beings, engaging with customers via mobile should be a priority. Another interesting fact is that 90% of a consumer’s time while on a mobile device is spent in a brand’s app. Then consider this from Forrester: “Today’s customers demand a seamless, integrated brand experience delivered to them with ultimate simplicity and relevancy in real time.” Are you ready to deliver on these demands? To learn how to create relevant, high-quality customer experiences on any mobile device, download this guide.
Tags : 
    
Oracle Marketing Cloud

Learn how HP Jet Fusion technology makes 3D printing compact, colorful and cost-effective

Published By: HP Inc.     Published Date: Jun 12, 2018
With the HP Jet Fusion 300/500 series of 3D printers, future-ready technology is at hand – and handy – for small and medium businesses, design firms, and universities. Read this brochure to get the details on how HP Jet Fusion 3D devices are designed for convenient in-house production. You’ll be making prototypes and functional parts at new levels of speed and precision, in full color, black or white. Get the brochure
Tags : 
    
HP Inc.

Explore how HP is charting a new course for 3D printing

Published By: HP Inc.     Published Date: Jun 12, 2018
You can stop waiting for what’s next in 3D printing. With the HP Jet Fusion 300/500 series of 3D printers, HP has redefined the process of prototyping and manufacturing. We invite you to explore how to make functional parts faster, cost-effectively, and in full color with HP Jet Fusion 3D devices. HP is what’s next for automated, in-house production. Visit the website to learn more
Tags : 
    
HP Inc.

Ovum Decision Matrix: Selecting a Middleware-as-a-Service Suite for Hybrid Integration, 2017–18

Published By: TIBCO Software     Published Date: May 31, 2018
Integration is the lifeblood of today’s digital economy, and middleware is the software layer connecting different applications, services, devices, data sources, and business entities. This Ovum Decision Matrix (ODM) is a comprehensive evaluation to help enterprise IT leaders, including chief information officers (CIOs), enterprise/integration architects, integration competency center (ICC)/integration center of excellence (CoE) directors, and digital transformation leaders select a middleware-as-aservice (MWaaS) suite best suited to their specific hybrid integration requirements. Download this whitepaper to read further on Hybrid integration suites for cloud service, API-led, B2B, and mobile application integration.
Tags : 
    
TIBCO Software

Relevance is everything: How location data improves advertising efficiency- Info

Published By: HERE Technologies     Published Date: Sep 26, 2018
How can brands make the most of the growing opportunities offered by location data? Understanding location and its connection to customer behaviour is key to gaining full and reliable insights and making efficient change. HERE is building and sharing real-time location intelligence which reveals why customers make transactions in specific places. HERE’s Open Location Platform contextualises consumer motivations in the world around them. As the world’s leading location platform in 2018 (Source: Ovum and Counterpoint Research annual indexes) HERE also shares its own insights into the future of reaching customers on their mobile devices as they travel, including in-car advertising.
Tags : 
    
HERE Technologies

IT Automation for Dummies

Published By: VMware     Published Date: Apr 09, 2019
In the modern digital age, traditional barriers to entry and time to market have fallen. Agile businesses can turn an idea into an app, host it in the cloud, and quickly deliver it to millions of customers on their chosen devices and platforms. In comparison, many larger enterprises miss new business opportunities because they’re mired in managing complex, legacy infrastructure, inefficient cross-functional workflow and approval processes, and lengthy audit and compliance requirements.
Tags : 
    
VMware

Acronis Access Advanced

Published By: Acronis EMEA     Published Date: May 18, 2015
Download this datasheet to discover the main benefits of Acronis Access Advanced.
Tags : 
acronis, acronis access advanced, secure mobile access, security, content security, devices, secure access, share content
    
Acronis EMEA

Baseball, BI & Netsuite

Published By: Netsuite     Published Date: Jul 24, 2017
Baseball has always collected in-game data. However, until recently, fans didn’t have easy access to the various statistics that coaches used for key decisions important for the development of the players and success on the baseball field. It’s not unlike how traditional business intelligence is delivered. Data and reports are set aside for a few experts who determine what is important for you. Today, baseball statistics are widely available during broadcasts on TV, PCs and mobile devices. Basic data displays like inning and score are enhanced with metrics meaningful to students of the game, such as pitch speed, strikeout percentages and hit zones. It’s a good example of vital information being delivered in real-time, on demand and in context.
Tags : 
    
Netsuite

LTI’s ERP Cloudification helped achieving In-time delivery with ZERO defect

Published By: Larsen & Toubro Infotech(LTI)     Published Date: Mar 28, 2019
Leading medical devices company were facing business continuity post acquisition, thereby increasing maintenance costs accordingly. LTI proposed to implement Oracle Fusion Cloud which helped in faster and minimal requirement of technical manpower. Download complete case study.
Tags : 
    
Larsen & Toubro Infotech(LTI)

5 Mobile Predictions for 2016

Published By: Swrve     Published Date: Mar 07, 2016
This white paper explores 5 ways in which this process will move forward in 2016 - with a practical focus on what is actually likely to happen in the next 12 months.
Tags : 
mobile trends, mobile predictions, mobility, mobility trends, mobile devices, customer engagement, customer experience, mobile computing
    
Swrve

6 A/B TESTS

Published By: Swrve     Published Date: Mar 07, 2016
This practical guide lists six key tests that will deliver real ROI for your mobile business.
Tags : 
mobility, mobile business, roi, return of investment, mobile devices, roi for your mobile business, mobile computing, mobile workers
    
Swrve

Learn How to Improve Your Hospital’s Pain Management Workflow

Published By: GetWellNetwork, Inc.     Published Date: Nov 22, 2013
Learn how to improve the efficiency of your pain management workflow and see how these changes will improve the day to day tasks for your nurses allowing them to work more effectively.
Tags : 
getwell network, pain management, pain management workflow, joint commission, pain assessment documentation, pain management workflow, performance improvement, managing patient pain levels
    
GetWellNetwork, Inc.

Eliminate EDA Workflow Bottlenecks

Published By: Pure Storage     Published Date: Oct 09, 2017
Semiconductors run and connect today’s technology-driven world, powering all the electronic systems and products around us. Critical to communication, entertainment, work, medical diagnoses, travel, socializing, and making new discoveries, these specialized chips are ubiquitous. And chip designs grow ever more sophisticated in order to power new generations of devices, computers, the Internet, and the cloud. To enable new applications and use cases – like the Internet of Things – semiconductor vendors have continually pushed the boundaries of their designs to accommodate new fabrication processes that make chips smaller, more power efficient (to make personal devices last longer), and able to pack more gates into smaller dies (to make them more powerful).
Tags : 
verification, storage, customer, innovation, management, pure storage
    
Pure Storage

Learn how to Protect Against Advanced Evasion Techniques

Published By: McAfee     Published Date: Feb 17, 2014
Learn about the weak points in current network security devices and disover the solution in protecting against against advanced hacking methods
Tags : 
cyber security, advanced evasion, aets, security, network security, firewall, cyber attack, anti spyware
    
McAfee

Enterprise WiFi Buyers Guide: Building a More Secure Network

Published By: Aerohive     Published Date: Jun 01, 2015
Learn how organisations can easily and securely on-board a range of users and devices by issuing individual pre-shared keys on the same SSID.
Tags : 
wi-fi security, wlan, secure network, network, firewall, security, wireless security, access control
    
Aerohive

Creating the Services of Tomorrow

Published By: Cisco     Published Date: Sep 17, 2015
This infographic illustrates how technologies, applications, and trends are driving a transformation in service provider business models and network infrastructures.
Tags : 
technology, network infrastructures, technology trends, smartphones, wearable devices, internet of things, network, cisco esp
    
Cisco

Expand your Market Opportunities

Published By: Cisco     Published Date: Sep 17, 2015
Around the world, millions of patients remotely monitor vitals signs, download wellness applications, and get access to caregivers through mobile devices.
Tags : 
expand your market opportunities, diversify services, mobile phone, internet access, service providers, network, network architecture, mobile computing
    
Cisco

One-to-One Learning 2.0

Published By: Fujitsu     Published Date: Feb 26, 2018
The hallmark of the digital age is change – constant, rapid, and often disruptive. The computer itself has changed from mainframe to minicomputers, personal desktops to laptops, handheld devices to mobile computers. We now have tiny embedded computers in cars, in washing machines and even in cats and dogs. How we live our lives has changed. Virtually every activity humans engage in, is impacted by computers and that’s constantly changing too. No surprise then, that K-12 education was also impacted by the constant transformation of computers. Intel, the Intel logo, Intel Core, Intel vPro, Core Inside and vPro Inside are trademarks of Intel Corporation or its subsidiaries in the U.S. and/or other countries
Tags : 
learning, digital, lessons, education, solutions, fujitsu
    
Fujitsu

Downtime by DDoS: Taking an Integrated Multi-Layered Approach

Published By: Arbor     Published Date: Sep 15, 2014
DDoS attacks are the primary threat to the availability of your network. In 2014, the number of DDoS attacks continues its trend upward in both size and complexity. Today, attacks topping 100Gbps have become common. So have complex threats such as application-layer attacks against DNS and encrypted Web services. Taxing security teams even more is the rise in multi vector attacks which target applications, existing stateful infrastructure like Firewalls and IPS devices and upstream connectivity, all in a single sustained attack.
Tags : 
ddos attacks, it security, application layer attacks, application security, firewalls, hacker detection, intrusion detection, intrusion prevention
    
Arbor

Public Safety, Justice, and IoE WP and Infographic

Published By: Cisco     Published Date: Nov 18, 2015
The Internet of Everything (IoE) is a continuous interaction among people, processes, data, and things. Sensors, networks, and smart devices are ubiquitous, providing a torrent of streaming data or big data. The Internet of Things (IoT), which is a network of physical objects accessed through the Internet that can sense and communicate, is a component of IoE. Cisco is helping customers and strategic partners leverage the full potential of IoE to achieve radical results across all sectors and industries. Indeed, IoE is capable of helping public safety and justice agencies increase cost efficiency, improve safety and security, provide better response times, and increase productivity.
Tags : 
ioe, public safety, justice, emergency response, networking, security, enterprise applications
    
Cisco

Perimeter-only IT security is over

Published By: Cisco Umbrella EMEA     Published Date: Oct 12, 2018
The increase in mobile devices and cloud applications has changed everything, from where we work, to how we communicate, collaborate, and store information. A new approach to security is needed. The cloud is no longer a trend or a movement. It’s now so integrated into IT and infrastructures that, for many companies, it’s simply how business is done. The availability of mobile devices and cloud services has redefined how and where people work. Applications and servers are moving to the cloud faster than ever to take advantage of cost savings, scalability, and accessibility. The age of perimeter-only security is over. Find out more today about how Cisco can help.
Tags : 
    
Cisco Umbrella EMEA
Start   Previous    9 10 11 12 13 14 15 16 17 18 19 20 21 22 23    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.