Cookie policy: This site uses cookies (small files stored on your computer) to simplify and improve your experience of this website. Cookies are small text files stored on the device you are using to access this website. For more information on how we use and manage cookies please take a look at our privacy and cookie policies. Some parts of the site may not work properly if you choose not to accept cookies.

sections
 

consumer mobile

Results 226 - 246 of 246Sort Results By: Published Date | Title | Company Name
Published By: SAS     Published Date: Aug 03, 2016
The financial collapse of 2008 had the greatest impact on the financial services industry since World War II, resulting in consolidation and extensive regulation. The crisis coincided with increased competition from emerging economic powers, nonbanks and fintech organizations. Consumer behavior, from the adoption of mobile banking to P2P payments, forced banks to retool and respond with innovative products and investments in new delivery channels. Technology changed rapidly as well. In the capital markets, trading became fully automated, with pricing, risk decisions and settlement across exchanges made in milliseconds
Tags : 
finance, best practices, productivity, economic power, consolidation, fintech, technology, data, security, risk decision
    
SAS
Published By: Worklight     Published Date: Mar 23, 2011
Key priorities that companies should be aware of when embarking on a cross-platform application strategy
Tags : 
mobile application platform, mobile app platform, mobile enterprise application platform, mobile consumer application platform, mobile app development
    
Worklight
Published By: Stevens & Tate Marketing     Published Date: Apr 12, 2011
Businesses looking to market their products and services to this new generation of consumers need to understand and embrace the benefits of using digital and mobile platforms to reach the audience of today.
Tags : 
mobile marketing, digital advertising, internet marketing, mobile advertising
    
Stevens & Tate Marketing
Published By: Limelight Networks     Published Date: May 03, 2011
In this whitepaper you will learn about the three major trends re-shaping the ecommerce landscape: Video as a way to enhance the shopping experience; Mobile as a channel for expanding marketing reach; and Personalization informed by advanced analytics.
Tags : 
limelight networks, rich-media strategies, ecommerce, online retail, consumer behavior, video, mobile, personalization, analytics
    
Limelight Networks
Published By: Adobe     Published Date: Aug 22, 2013
With more than 1 billion smartphones in consumers' pockets at the beginning of 2013, mobile is driving a second Internet revolution that's even more profound than the first one. Mobile creates new value for consumers and businesses, alters cost structures, and disrupts ecosystems. That's why marketers must move away from tactical mobile efforts to more transformative mobile marketing strategies in 2013. This fourth annual mobile trends report revisits our 2013 mobile trends, elaborates on how they will continue to evolve in 2013, and highlights new mobile trends that we expect to see this year. New to this year's report is a list of the over-hyped topics that we believe will fail to provide real business value in the short term.
Tags : 
mobile marketing, mobile trends, mobility
    
Adobe
Published By: BlackBerry     Published Date: Oct 03, 2012
An evaluation of today's four leading mobile operating systems - BlackBerry OS, Apple iOS, Windows Phone, and Google Android - revealing how they compare to each other based upon twelve categories of security and management criteria.
Tags : 
consumer mobile platforms, blackberry, mobile os, mobile operating systems, mobile security, mobile device management, wireless
    
BlackBerry
Published By: Blackberry     Published Date: Oct 03, 2012
An evaluation of today's four leading mobile operating systems - BlackBerry OS, Apple iOS, Windows Phone, and Google Android - revealing how they compare to each other based upon twelve categories of security and management criteria.
Tags : 
consumer mobile platforms, blackberry, mobile os, mobile operating systems, mobile security, mobile device management
    
Blackberry
Published By: sweetiQ     Published Date: Oct 29, 2012
Smartphones and the social, local, mobile ecosystem are the future of retail. Where once there was the yellow pages, today's mobile consumer has much more access to information. Read on to learn how to presence on the social local and mobile web.
Tags : 
local listing management, google+ local, google places, location-based marketing, local search, local search optimization, business listings, solomo, social local mobile, local search analytics, local marketing, local marketing analytics, local listing presence, local search optimization analytics, local search optimization software, local search optimization tools, local venue listings, local marketing recommendation, local search analytics, local seo analytics
    
sweetiQ
Published By: CDW     Published Date: Nov 12, 2012
Preparing for the influx of mobile computing devices in schools.
Tags : 
cdw, consumerization of technology, mobile computing devices, influx of byod
    
CDW
Published By: Adobe     Published Date: Mar 03, 2017
Today, customer identity is the only constant in digital marketing. But as consumers switch from desktop to mobile, they are more and more difficult to recognize. But it’s not impossible. The Adobe white paper, Managing Anonymous and Authenticated Experiences Across the Customer Lifecycle, explains best practices to identify your anonymous and authenticated customers while complying with regulations, contracts, and industry standards. Read the paper to learn: • The benefits of well executed personalization • How to navigate the landscape between anonymous and authenticated data • Safe and effective uses of consumer information • The technological building blocks to put these new methods to work
Tags : 
personalization, authenticated data, anonymous data, consumer information, customer life cycle, customer experience
    
Adobe
Published By: Box     Published Date: Aug 13, 2014
This paper looks at how bring-your-own policies and consumerisation of IT are transforming the way professionals and enterprises purchase, distribute and consume mobile software. Which revenue models should you use and what platforms should you target.
Tags : 
business and productivity, byod policies, mobile software
    
Box
Published By: Box     Published Date: Aug 15, 2014
This paper looks at how bring-your-own policies and consumerisation of IT are transforming the way professionals and enterprises purchase, distribute and consume mobile software. Which revenue models should you use and what platforms should you target.
Tags : 
business and productivity, byod policies, mobile software, cloud computing
    
Box
Published By: Box     Published Date: Aug 15, 2014
This paper looks at how bring-your-own policies and consumerisation of IT are transforming the way professionals and enterprises purchase, distribute and consume mobile software. Which revenue models should you use and what platforms should you target.
Tags : 
business and productivity, byod policies, mobile software, cloud computing
    
Box
Published By: Cyveillance     Published Date: Jun 20, 2014
Phishing is defined by the Financial Services Technology Consortium (FSTC) as a broadly launched social engineering attack in which an electronic identity is misrepresented in an attempt to trick individuals into revealing personal credentials that can be used fraudulently against them. In short, it’s online fraud to the highest degree. Although it’s been around for years, phishing is still one of the most common and effective online scams. The schemes are varied, typically involving some combination of spoofed email (spam), malicious software (malware), and fake websites to harvest personal information from unwitting consumers. The explosive rise of mobile devices, mobile applications, and social media networks has given phishers new vectors to exploit, along with access to volumes of personal data that can be used in more targeted attacks or spear phishing. The fact that phishing attacks are still so common highlights their efficacy and reinforces the need to implement comprehensive phishing and response plans to protect organizations. An effective phishing protection plan should focus on four primary areas: Prevention, Detection, Response, and Recovery. High-level recommendations for each of the four areas are outlined in this whitepaper.
Tags : 
cyveillance, phishing, security, cyberattacks, cybercriminals, threats
    
Cyveillance
Published By: AdRoll     Published Date: Oct 29, 2014
In this guide, we’ll help you set up the most successful retargeting campaigns during the critical holiday time of year.
Tags : 
retargeting campaigns, consumer behavior, desktop retargeting, mobile retargeting, roi, consumer targeting
    
AdRoll
Published By: IBM     Published Date: Jul 22, 2016
Read this white paper to learn how a convergence of trends in consumerization and technology is transforming healthcare, and get an in-depth look at the key challenges and opportunities ahead.
Tags : 
wedi, consumer-drive, mobile-first, healthcare, commerce, analytics, enterprise applications
    
IBM
Published By: IBM     Published Date: Apr 20, 2017
Do Android’s dessert-named updates improve device and data security enough to work for the enterprise? Android has long ruled the consumer market. Now, the latest security advancements from Google and device manufacturers, and support for Android by leading EMM solution providers, are expanding its presence in the enterprise. To help ensure security and compliance with industry standards and government regulations, enterprises need a way to protect and manage the wide range of available devices, versions, and idiosyncrasies of the world’s most popular mobile operating system.
Tags : 
access management, security information, event management, database security, application development, risk management, endpoint management, next generation intrusion protection
    
IBM
Published By: Lookout     Published Date: Mar 28, 2017
This report examines enterprise security threats for iOS and Android. While Android has higher consumer market share, iOS commands more market share in the enterprise, accounting for 72% of enterprise mobile activations in Q1 2015 compared to Android’s 26% activation share.
Tags : 
enterprise, mobile, ios, android, lookout
    
Lookout
Published By: FICO     Published Date: Jun 14, 2017
The car industry’s fortunes play an important part in the stability of the broader economy. Consumers shopping for and financing a new or used vehicle have more choices than ever before. Empowered by digital delivery channels such as self-service and mobile, individuals are now able to rapidly choose and the vehicle and loan that best fits their needs.
Tags : 
    
FICO
Published By: HERE Technologies     Published Date: Sep 26, 2018
Mobile has become the first screen for consumers in terms of internet time spent. Hyperlocal location data is unique to mobile and provides a lot of new, valuable information about consumers. Today’s sophisticated buyers demand more transparency in location data science, better campaign performance and ROI from attribution modeling. Finding the right partner that can help build the bridge between real-world consumer behavior and mobile programmatic advertising in a transparent way is essential. To meet those challenges and address the demand for top quality location data, adsquare integrated a global database of HERE Places in April 2017. By leveraging HERE Places and overlaying raw location data of anonymous users with POI data points, adsquare is able to understand exactly what consumers are doing in the real world: what places they visit, when and how often. To find out more download this paper today.
Tags : 
    
HERE Technologies
Published By: Intel     Published Date: Sep 10, 2018
Today’s tech savvy consumers are continually driving organizations to deliver a modernized shopping experience. To achieve this, retailers are pushing the edge on developing non-traditional ways in delivering sales messages. One of the best ways to engage shoppers with an in-store digital presence is through modern adaptive signages. Modern signages enable two-way interaction between customers and businesses, tapping onto cutting-edge technologies such as sensors and analytics to respond to customer behavior—helping retailers customize content on the fly. Find out how Giada Technology leveraged on Intel® processors to power up their cloud terminals to pre-process signage, sensor, and mobile data to efficiently exchange information with the cloud. Retailers are better positioned to present contextual promotions to the shoppers, delivering benefits of lesser wait-time and increased customer satisfaction.
Tags : 
    
Intel
Start   Previous    1 2 3 4 5 6 7 8 9 10     Next   End
Search      

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.