consumer applications

Results 76 - 85 of 85Sort Results By: Published Date | Title | Company Name
Published By: HP - Enterprise     Published Date: Jun 05, 2013
Mobile applications have swept across geographic boundaries, cultures, and enterprises faster than any previous technology innovation. Consumers around the world use them to find their way when they travel by car and verify flight details when they travel by air. They check bank balances and sports scores, reserve theater tickets and dining reservations, shop online, pay bills, download entertainment, and participate in dozens of other everyday activities—using convenient portable devices like smart phones and tablets. The demand for this kind of convenience has spilled over into the world of work as well, and employees today expect to use their mobile devices to check email, participate in meetings, access files—even use enterprise applications, like ERP and CRM, that drive business processes.
Tags : 
mobile application, mobile convenience, business opportunities, travel
    
HP - Enterprise
Published By: Intermec     Published Date: Aug 09, 2012
Tablet computing is one of the fastest growing categories of consumer electronics, led by the Apple iPad. This buzz is leading many businesses to explore new uses for tablet computers, and some devices are finding their way into evaluation trials on forklifts and other vehicle applications in the distribution center. This white paper compares ruggedized enterprise tablets to purpose-built vehicle mount computers, and addresses mounting, survivability, power, compatibility, and cost considerations between the two product categories.
Tags : 
intermec, tablet, computing, ipad, computers, compatibility
    
Intermec
Published By: Gladson     Published Date: Aug 25, 2010
Informational Retailing - transformation of shoppers taking control of the way that they research, select and buy products by using a diverse array of sources to gather product information when and where they want it.
Tags : 
consumer packaged goods, category management, cpg manufacturers, product databases, informational retailing, e-commerce, online shopping, interactive
    
Gladson
Published By: IBM     Published Date: Aug 08, 2012
This white paper examines the role social media can play in presenting a more strategic view of customer data and how the right combination of technologies can deliver insight to help companies more effectively meet perpetually shifting consumer demands expressed through, and influenced by, these dynamic communication channels. Discover the implications of social media for marketing and sales, as well as IT. And learn the how and why social media tools and applications can be integrated with existing technology investments.
Tags : 
social media analytics, consumer insight, marketing digitization, ibm, facebook, strategic considerations, lower cost, influence
    
IBM
Published By: Cyveillance     Published Date: Jun 20, 2014
Phishing is defined by the Financial Services Technology Consortium (FSTC) as a broadly launched social engineering attack in which an electronic identity is misrepresented in an attempt to trick individuals into revealing personal credentials that can be used fraudulently against them. In short, it’s online fraud to the highest degree. Although it’s been around for years, phishing is still one of the most common and effective online scams. The schemes are varied, typically involving some combination of spoofed email (spam), malicious software (malware), and fake websites to harvest personal information from unwitting consumers. The explosive rise of mobile devices, mobile applications, and social media networks has given phishers new vectors to exploit, along with access to volumes of personal data that can be used in more targeted attacks or spear phishing. The fact that phishing attacks are still so common highlights their efficacy and reinforces the need to implement comprehensive phishing and response plans to protect organizations. An effective phishing protection plan should focus on four primary areas: Prevention, Detection, Response, and Recovery. High-level recommendations for each of the four areas are outlined in this whitepaper.
Tags : 
cyveillance, phishing, security, cyberattacks, cybercriminals, threats
    
Cyveillance
Published By: AWS     Published Date: May 18, 2018
We’ve become a world of instant information. We carry mobile devices that answer questions in seconds and we track our morning runs from screens on our wrists. News spreads immediately across our social feeds, and traffic alerts direct us away from road closures. As consumers, we have come to expect answers now, in real time. Until recently, businesses that were seeking information about their customers, products, or applications, in real time, were challenged to do so. Streaming data, such as website clickstreams, application logs, and IoT device telemetry, could be ingested but not analyzed in real time for any kind of immediate action. For years, analytics were understood to be a snapshot of the past, but never a window into the present. Reports could show us yesterday’s sales figures, but not what customers are buying right now. Then, along came the cloud. With the emergence of cloud computing, and new technologies leveraging its inherent scalability and agility, streaming data
Tags : 
    
AWS
Published By: DellEMC and Intel®     Published Date: Sep 25, 2017
A fundamental people-process-technology transformation enables businesses to remain competitive in today’s innovation economy. Initiatives such as advanced security, fraud detection services, connected consumer Internet of Things (IoT) devices, augmented or virtual reality experience, machine and deep learning, and cognitively enabled applications drive superior business outcomes such as predictive marketing and maintenance. Procesador Intel® Xeon® Intel Inside®. Produtividade poderosa no exterior. Ultrabook, Celeron, Celeron Inside, Core Inside, Intel, Intel logotyp, Intel Atom, Intel Atom Inside, Intel Core, Intel Inside, Intel Inside logotyp, Intel vPro, Itanium, Itanium Inside, Pentium, Pentium Inside, vPro Inside, Xeon, Xeon Phi och Xeon Inside är varumärken som tillhör Intel Corporation eller dess dotterbolag i USA och/eller andra länder
Tags : 
ultrabook, celeron, celeron inside, core inside, intel, el logotipo de intel, intel atom, intel atom inside
    
DellEMC and  Intel®
Published By: DellEMC and Intel®     Published Date: Oct 18, 2017
A fundamental people-process-technology transformation enables businesses to remain competitive in today’s innovation economy. Initiatives such as advanced security, fraud detection services, connected consumer Internet of Things (IoT) devices, augmented or virtual reality experience, machine and deep learning, and cognitively enabled applications drive superior business outcomes such as predictive marketing and maintenance. Intel Inside®. New Possibilities Outside. Ultrabook, Celeron, Celeron Inside, Core Inside, Intel, Intel Logo, Intel Atom, Intel Atom Inside, Intel Core, Intel Inside, Intel Inside Logo, Intel vPro, Itanium, Itanium Inside, Pentium, Pentium Inside, vPro Inside, Xeon, Xeon Phi, and Xeon Inside are trademarks of Intel Corporation or its subsidiaries in the U.S. and/or other countries.
Tags : 
ultrabook, celeron, celeron inside, core inside, intel, intel logo, intel atom, intel atom inside
    
DellEMC and  Intel®
Published By: Dell Server     Published Date: Aug 08, 2018
A fundamental people-process-technology transformation enables businesses to remain competitive in today’s innovation economy. Initiatives such as advanced security, fraud detection services, connected consumer Internet of Things (IoT) devices, augmented or virtual reality experience, machine and deep learning, and cognitively enabled applications drive superior business outcomes such as predictive marketing and maintenance. Superior business outcomes require businesses to consider IT a core competency. For IT, an agile, elastic, and scalable IT infrastructure forms the crucial underpinning for a superior service delivery model. Dell EMC’s Intelligent Automation powered by Intel® Xeon® Platinum processor simplifies the management and maintenance of its PowerEdge server hardware. Designed to drive down the cost and resources associated with server lifecycle management, Intelligent Automation relies on integrated Dell Remote Access Controller(iDRAC) and OpenManage server management soft
Tags : 
    
Dell Server
Published By: Intel     Published Date: Sep 10, 2018
Digital transformation has pioneered an ever-evolving landscape in the omnichannel retail experience. To efficiently meet consumer demands, retailers consider a fully immersive omnichannel customer experience as integral to their engagement strategy. With increasingly varied technologies such as NFC-based payments, digital signage with rich-media experiences, wireless technologies and IoT technologies—present great opportunities and complexities. New technologies are often being rolled out without a centrally managed approach leading to siloed solution landscape, making deployment difficult. Uncover the path to simplify and automate, where the Reliant Platform delivered performance, scalability, reliability, security, and inter-operability Reliant needs for retail applications.
Tags : 
    
Intel
Start   Previous    1 2 3 4     Next   End
Search Resource Library