mobi

Results 1 - 25 of 4981Sort Results By: Published Date | Title | Company Name

4 Organizations That Are Unlocking Teams’ Full Potential With G Suite

Published By: SADA     Published Date: Oct 25, 2019
To compete in a digital economy, today’s leaders must give their teams the right skills and tools to succeed. Made for a mobile, global workforce, G Suite unlocks teams’ full potential for innovation by opening up new ways of collaborating so that people can achieve more together. When teams use G Suite, they can react at a moment’s notice, generate breakthrough ideas, and maintain a shared purpose. Read this whitepaper to find out more.
Tags : 
    
SADA

Surveillance à distance : l’évolution des centres de données

Published By: Schneider Electric     Published Date: Oct 28, 2019
Pour garder une longueur d’avance sur l’évolution des centres de données, les entreprises doivent envisager la surveillance numérique à distance. Le présent document traite de l’impact de la surveillance numérique à distance sur ces zones : ?Amélioration des performances et des coûts des systèmes embarqués ?Cybersécurité ?Cloud computing ?Analyses de mégadonnées ?Informatique mobile ?Apprentissage machine ?Automatisation pour l’efficacité de la main d’œuvre Votre entreprise sera-t-elle en mesure de garder une longueur d’avance ? Téléchargez le livre blanc pour le découvrir.
Tags : 
des centres de données, colocation, schneider electric
    
Schneider Electric

How Malware and Bots Steal Your Data

Published By: F5 Networks Singapore Pte Ltd     Published Date: Sep 09, 2019
Tech advances like the cloud, mobile technology, and the app-based software model have changed the way today’s modern business operates. They’ve also changed the way criminals attack and steal from businesses. Criminals strive to be agile in much the same way that companies do. Spreading malware is a favorite technique among attackers. According to the 2019 Data Breach Investigations Report, 28% of data breaches included malware.¹ While malware’s pervasiveness may not come as a surprise to many people, what’s not always so well understood is that automating app attacks—by means of malicious bots —is the most common way cybercriminals commit their crimes and spread malware. It helps them achieve scale.
Tags : 
    
F5 Networks Singapore Pte Ltd

Are Bots Killing Your Business Intelligence?

Published By: F5 Networks Singapore Pte Ltd     Published Date: Sep 19, 2019
"Every kind of online interaction—website visits, API calls to mobile apps, and others—is being attacked by bots. Whether it's fraud, scraping, spam, DDoS, espionage, shilling, or simply altering your SEO ranking, bots are wreaking havoc on websites as well as mobile and business applications. But that’s not all: they’re also messing with your business intelligence (BI). They can skew audience metrics, customer journeys and even ad buys, making business decisions questionable and costly. According to Forrester, ad fraud alone was set to exceed $3.3 billion in 2018. Not all bots are bad. In fact, your business depends on them. Search engine bots, for example, give your web presence visibility and authority online. Other good bots help you deliver better customer experiences—perhaps a chatbot provides instant customer assistance on your site. What’s important is enabling the good bots and blocking the bad ones."
Tags : 
    
F5 Networks Singapore Pte Ltd

Protect Users Without Frustrating Them Using AI-driven Behavioral Biometrics

Published By: BehavioSec     Published Date: Oct 04, 2019
Authentication is evolving from static one-time user action, to transparent and continuous ways of validating digital identities without imposing frustration on end users. Behavioral biometrics technologies invisibly and unobtrusively authenticate users by validating the manner in which they physically interact online. Behavioral biometrics technologies learn how individual users hold mobile devices in their hands and press their fingers on the touchscreen. On computers, the system learns how users type on keyboards and move their mouse and cursor. The BehavioSec solution gathers this behavioral data and analyzes it using advanced techniques, to ensure that the user is who you expect them to be.
Tags : 
    
BehavioSec

Protecting Financial Transactions for Users on the Go

Published By: BehavioSec     Published Date: Oct 04, 2019
A consortium of Global 2000 companies founded a joint authentication service provider to keep up with innovation at competitive Fintech companies. The new provider developed a mobile authentication app to maintain a high degree of mobile security without losing customers to UX-focused Fintech companies. As peer-to-peer (P2P) transactions grew rapidly, so did the false rejections and need for manual review. In evaluating security vendors for a more cohesive and frictionless solution, the provider selected BehavioSec for its enterprise grade capabilities to be deployed on-premise and integrate with existing legacy risk management systems.
Tags : 
    
BehavioSec

The Distributed Cloud: Infrastructure at the Edge (Korean)

Published By: Intel     Published Date: Sep 25, 2019
Distributed cloud architectures will play an important role in Communication Service Providers’ network transformations. The distributed cloud will be made of numerous edge locations, from the customer premises to mobile base stations to central offices, each of which has its benefits and constraints. CSPs will need to consider attributes such as performance, availability, security, integration, and data and traffic volume to optimize the infrastructure for a myriad of workloads. Learn more about Heavy Reading’s survey results on CSPs adopting a distributed cloud strategy and delivering new services in this white paper.
Tags : 
    
Intel

More than 80% of Organisations in Asia are not Protected Against Today's Threats

Published By: Juniper Networks     Published Date: Sep 26, 2019
"This Ovum white paper is sponsored by Juniper Networks. It reveals that organisations need to update and upgrade their cybersecurity postures to defend themselves against today's threats. More than 80% of organisations in Asia are not protected against today's threats. Many of them depend on security investments made years ago, which cannot defend against new and emerging threats. The arrival of new technologies including cloud computing, the Internet of Things, mobility, bring your own device (BYOD), and social media have massively increased attack surfaces and expanded the threat landscape. Over the past two years, there has been a global infestation of ransomware attacks, which have wrought destruction across a growing number of businesses. Crypto-jacking, attacks on critical infrastructure, and data exfiltration are now commonly affecting businesses and consumers alike. The financial impact of these attacks is increasing rapidly and has already cost some organisations hundreds o
Tags : 
    
Juniper Networks

Report: Cyber security consumer loss barometer

Published By: KPMG     Published Date: Jun 06, 2019
Find out why cyber security must be embedded into commercial strategy. With focused insight on the economics of trust for financial services, automotive, mobile and retail organisations. Read the report to understand: • how consumer expectations are shifting on the topic of digital trust • how well the priorities of consumers and security executives align • what it takes for consumers to stay with a brand when things go wrong.
Tags : 
    
KPMG

Insight: Customer Centricity and the COO

Published By: KPMG     Published Date: Jun 10, 2019
Today’s customers want 24/7 access, mobile availability, quality, low prices, fast shipping, easy returns and instantaneous service. These expectations demand that every business function be customer-centric, including operations. Read this report to find out: • how to create customer-centric operations to deliver the customer experience • the eight essential components of a connected, customer-centric enterprise • why alignment between the COO and CIO is essential • five key steps to start transforming operations to drive growth and create value.
Tags : 
    
KPMG

Why Being Data Driven Isn’t Enough

Published By: Oracle     Published Date: Sep 26, 2019
We live in a data-rich world. From visitor behavior on websites and social media interactions to mobile app usage and device communications across the Internet of Things, brands are inundated with data.
Tags : 
    
Oracle

Cross-Channel Orchestration Fundamentals

Published By: Oracle     Published Date: Sep 30, 2019
Today’s consumers are demanding: They have become more unforgiving of a poor customer experience and expect interactions on their desktop and mobile devices to be responsive, intuitive, and easy-to-use. Marketers understand that delivering the most relevant experience is the key to gaining continued satisfaction and loyalty from their digital consumers.
Tags : 
    
Oracle

Overcoming Petabyte-Scale Storage Challenges for Big Data and Analytics

Published By: Infinidat EMEA     Published Date: May 14, 2019
Big Data and analytics workloads represent a new frontier for organizations. Data is being collected from sources that did not exist 10 years ago. Mobile phone data, machine-generated data, and website interaction data are all being collected and analyzed. In addition, as IT budgets are already under pressure, Big Data footprints are getting larger and posing a huge storage challenge. This paper provides information on the issues that Big Data applications pose for storage systems and how choosing the correct storage infrastructure can streamline and consolidate Big Data and analytics applications without breaking the bank.
Tags : 
    
Infinidat EMEA

Lösungen für Storage-Aufgaben für Big Data und Analytik im Petabyte-Maßstab

Published By: Infinidat EMEA     Published Date: Oct 10, 2019
Big Data- und Analytik-Workloads bringen für Unternehmen neue Herausforderungen mit sich. Die erfassten Daten stammen aus Quellen, die vor zehn Jahren noch gar nicht existierten. Es werden Daten von Mobiltelefonen, maschinengenerierte Daten und Daten aus Webseiten-Interaktionen erfasst und analysiert. In Zeiten knapper IT-Budgets wird die Lage zusätzlich dadurch verschärft, dass die Big Data-Volumen immer größer werden und zu enormen Speicherproblemen führen. Das vorliegende White Paper informiert über die Probleme, die Big Data-Anwendungen für Storage-Systeme mit sich bringen, sowie darüber, wie die Auswahl der richtigen Storage-Infrastruktur Big Data- und Analytik-Anwendungen optimieren kann, ohne das Budget zu sprengen.
Tags : 
    
Infinidat EMEA

The Future of Knowledge Management: Agile, Governed, and AI-Ready Componentized Content Services

Published By: SDL     Published Date: Sep 20, 2019
Component Content Management: A New Paradigm in Intelligent Content Services While technology has changed the world, the way that companies manage information has inherently stayed the same. The advent of near-ubiquitous connectivity among applications and machines has resulted in a data deluge that will fundamentally alter the landscape of content management. From mobile devices to intelligent machines, the volume and sophistication of data have surpassed the ability of humans to manage it with outdated methods of collection, processing, storage, and analysis. The opportunity afforded by the advent of artificial intelligence (AI) has stimulated the market to search for a better way to capture, classify, and analyze this data in its journey to digital transformation (DX). The paradigm of document-based information management has proven to be a challenge in finding, reusing, protecting, and extracting value from data in real time. Legacy systems may struggle with fragmented information
Tags : 
    
SDL

7 Deadly IT Security Sins

Published By: Pine Cove Consulting     Published Date: Oct 03, 2019
You've seen them, and you fear them. Now let us show you how to be cleaned of them. Hackers are increasingly targeting mobile devices to steal data (emails, contacts, corporate data, financial information) and send premium rate SMS, using up your bandwidth in the process. Sophos makes it easy to secure and manage your mobile devices.
Tags : 
    
Pine Cove Consulting

Ricoh Addresses SMB Needs with Subscription-Based Cloud Workflow Solutions

Published By: Ricoh US     Published Date: Oct 04, 2019
On June 25, 2018, Ricoh announced its Cloud Workflow Solutions portfolio, a collection of cloudbased solutions and services that bring streamlined processes to SMBs in scalable, subscriptionbased packages. With an emphasis on addressing specific challenges facing smaller businesses, these solutions are meant to empower digital workplaces by eliminating manual steps, reducing manual data entry, and improving speed and accuracy to increase productivity and reduce overall costs. Many SMBs struggle to move beyond the challenges associated with content silos, lack of interoperability, and ongoing transition to mobile work environments. Much like their enterprise counterparts, smaller businesses face various complexities and pain points associated with interdepartmental workflows combined with a real need to enable employees to work when, where, and how they desire. Ricoh's Cloud Workflow Solutions platform is designed to address these challenges by streamlining and automating common busines
Tags : 
    
Ricoh US

The 2020 Vision: The Next Decade for Mobile Intelligence

Published By: MicroStrategy     Published Date: Nov 06, 2019
Mobile devices are part of nearly everything we do in life.
Tags : 
    
MicroStrategy

5 Enterprise Mobility Trends to Watch in 2019

Published By: MicroStrategy     Published Date: Nov 08, 2019
With trends such as big data, artificial intelligence and IoT dominating today’s business technology headlines, the buzz around enterprise mobility (now considered known and familiar) may have lessened, but its importance has not. Consider its key role in today’s top tech trends, and then also consider this. According to an Oxford Economics survey of 500 senior IT executives, CEOs, and other senior managers, 80% say workers cannot do their jobs effectively without a mobile device. The same survey shows: 82% say mobile devices are critical to employee productivity 82% say mobile devices are critical to agility and the speed of decision making 76% say mobile devices are critical to customer service and satisfaction 75% say mobile devices are critical to innovation and collaboration 70% say mobile devices are critical to employee satisfaction and 70% say mobile devices are critical to revenue growth. The known and familiar now demands a fresh look and focus from enterprise organizatio
Tags : 
    
MicroStrategy

MicroStrategy 2019 Whitepaper

Published By: MicroStrategy     Published Date: Nov 08, 2019
Research shows that organizations that can increase BI adoption will come out ahead in their industry, but most enterprises report that adoption remains at around 30%. How can they overcome challenges like data silos, education gaps, and more? With pervasive experiences, scalability, and an open architecture—and MicroStrategy can deliver it all in our newest platform. MicroStrategy 2019 is the industry's first modern analytics platform, featuring: Federated Analytics—guaranteeing a single version of the truth, no matter what BI tools you use Transformational Mobility—bringing analytics to every device and every constituent HyperIntelligence™—the breakthrough technology that delivers insights with zero clicks Read the MicroStrategy 2019 white paper to learn more!
Tags : 
    
MicroStrategy

MicroStrategy 2019 Whitepaper

Published By: MicroStrategy     Published Date: Nov 08, 2019
Research shows that organizations that can increase BI adoption will come out ahead in their industry, but most enterprises report that adoption remains at around 30%. How can they overcome challenges like data silos, education gaps, and more? With pervasive experiences, scalability, and an open architecture—and MicroStrategy can deliver it all in our newest platform. MicroStrategy 2019 is the industry's first modern analytics platform, featuring: Federated Analytics—guaranteeing a single version of the truth, no matter what BI tools you use Transformational Mobility—bringing analytics to every device and every constituent HyperIntelligence™—the breakthrough technology that delivers insights with zero clicks Read the MicroStrategy 2019 white paper to learn more!
Tags : 
    
MicroStrategy

MicroStrategy 2019 Whitepaper

Published By: MicroStrategy     Published Date: Nov 08, 2019
Research shows that organizations that can increase BI adoption will come out ahead in their industry, but most enterprises report that adoption remains at around 30%. How can they overcome challenges like data silos, education gaps, and more? With pervasive experiences, scalability, and an open architecture—and MicroStrategy can deliver it all in our newest platform. MicroStrategy 2019 is the industry's first modern analytics platform, featuring: Federated Analytics—guaranteeing a single version of the truth, no matter what BI tools you use Transformational Mobility—bringing analytics to every device and every constituent HyperIntelligence™—the breakthrough technology that delivers insights with zero clicks Read the MicroStrategy 2019 white paper to learn more!
Tags : 
    
MicroStrategy

MicroStrategy 2019 Whitepaper

Published By: MicroStrategy     Published Date: Nov 08, 2019
Research shows that organizations that can increase BI adoption will come out ahead in their industry, but most enterprises report that adoption remains at around 30%. How can they overcome challenges like data silos, education gaps, and more? With pervasive experiences, scalability, and an open architecture—and MicroStrategy can deliver it all in our newest platform. MicroStrategy 2019 is the industry's first modern analytics platform, featuring: Federated Analytics—guaranteeing a single version of the truth, no matter what BI tools you use Transformational Mobility—bringing analytics to every device and every constituent HyperIntelligence™—the breakthrough technology that delivers insights with zero clicks Read the MicroStrategy 2019 white paper to learn more!
Tags : 
    
MicroStrategy

5 Enterprise Mobility Trends to Watch in 2019

Published By: MicroStrategy     Published Date: Nov 08, 2019
With trends such as big data, artificial intelligence and IoT dominating today’s business technology headlines, the buzz around enterprise mobility (now considered known and familiar) may have lessened, but its importance has not. Consider its key role in today’s top tech trends, and then also consider this. According to an Oxford Economics survey of 500 senior IT executives, CEOs, and other senior managers, 80% say workers cannot do their jobs effectively without a mobile device. The same survey shows: 82% say mobile devices are critical to employee productivity 82% say mobile devices are critical to agility and the speed of decision making 76% say mobile devices are critical to customer service and satisfaction 75% say mobile devices are critical to innovation and collaboration 70% say mobile devices are critical to employee satisfaction and 70% say mobile devices are critical to revenue growth. The known and familiar now demands a fresh look and focus from enterprise organizatio
Tags : 
    
MicroStrategy

The 2020 Vision: The Next Decade for Mobile Intelligence

Published By: MicroStrategy     Published Date: Nov 08, 2019
Mobile devices are part of nearly everything we do in life. Two-thirds of the world's population is connected via one of these devices; in 2020 there will be 6.95 billion mobile users worldwide, according to Statista forecast. Apple iOS and Google Android mobile devices provide on-the-go access to the vast array of applications and information that people have come to rely on. In the next decade the use of mobile devices gain intelligence likely will significantly change how an organization does its work.
Tags : 
    
MicroStrategy
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.