mobile

Results 426 - 450 of 4210Sort Results By: Published Date | Title | Company Name
Published By: Ingenico     Published Date: May 02, 2018
The time of mobile point of sale (mPOS) has arrived. While the mission to adopt EMV has dominated the payments industry over the past few years, many hotels, resorts and casinos are now focusing their efforts on rapid planning and implementation of mPOS strategies. A number of emerging trends are driving this new focus, including an emphasis on enhancing guest experiences and building brand loyalty by leveraging digital and mobile technologies. Innovative hotels, resorts and casinos are using these solutions to create entirely new guest experiences that improve service speed and convenience while creating distinct competitive advantages. mPOS is increasingly becoming a key part of the picture, providing unique opportunities to improve guest service quality and engagement, create new efficiencies and cost savings, and strengthen their brand. This eBook will provide an overview of those opportunities, some key trends in the hotel & lodging industry, and guide you through the key requirem
Tags : 
    
Ingenico
Published By: Epicor     Published Date: May 01, 2018
We all know the wisdom of monitoring familiar key performance indicators (KPIs). Turns, gross margin return on investment (GMROI), sales, inventory measures, and other metrics will tell you how your business is faring—and that’s pretty important if you want to keep your hardware store in business. However, just staying in business isn’t enough in a rapidly evolving retail world, so achieving improved KPI results is essential. In this Epicor eBook, you’ll learn about eight easy-to-use tools that go beyond traditional KPIs to quickly improve business results, including: • Reviewing store-to-store sales • Identifying your top 100 items • Monitoring excess inventory • Viewing items with cost change and no retail change Learn more about these tools, and discover what else you can do to improve your KPI results by downloading this Epicor eBook. Download now and go beyond retail KPIs.
Tags : 
retail analytics software, analytics on demand, kpi analytics software, retail kpi software, real time analytics, retail pos software, mobile pos, reporting software, pos technology
    
Epicor
Published By: Epicor     Published Date: Apr 30, 2018
More and more hardware and home center retailers are using the rich and robust Epicor® Eagle N Series® solutions for higher profits and faster growth—all while building loyal customer relationships. Now, with hundreds of additional enhancements built in, Epicor Eagle N Series software can help you streamline nearly everything you do for your business so you can focus on running more efficiently and profitably. With Eagle N Series, you can: • Simplify everyday processes—natural, intuitive workflows whisk you through everyday activities • Manage complex inventory despite seasonal and trend-based demand swings • Improve overall business performance—make fast, informed decisions using intuitive on-screen analytics and dashboards What do businesses powered by Eagle N Series have to say about it? Read on to find out.
Tags : 
retail pos software, hardware pos, mobility software, mobile pos, inventory management software, customer loyalty software, mobile technology, pos technology, reporting software
    
Epicor
Published By: Tenable     Published Date: Apr 30, 2018
When it comes to IT infrastructure, it’s fair to say the perimeter has left the premises. Whether it’s discovering short-lived assets (e.g., containers), assessing cloud environments or maintaining web application security, today’s attack surface presents a growing challenge to CISOs looking to understand and reduce their cyber risk. To combat this issue, a discipline called Cyber Exposure is emerging to help organizations manage and measure this risk. This ebook provides insights on how CISOs are addressing the modern attack surface.
Tags : 
cyber exposure, iot, vulnerability management, cloud security, mobile security, container security
    
Tenable
Published By: Tenable     Published Date: Apr 30, 2018
Networks and attack surfaces are changing fast – there’s so much more than servers and endpoints. Now, you’re responsible for securing everything from cloud platforms to DevOp containers to web apps. Cyber Exposure is an emerging discipline for measuring and managing cyber risk across this modern attack surface. This ebook takes a close look at Cyber Exposure, including the Cyber Exposure gap created by legacy security offerings and the Cyber Exposure platform designed to protect all computing assets. If you’re responsible for guarding your organization’s fast-changing assets, this ebook is a must-have.
Tags : 
cyber exposure, vulnerability management, vulnerability assesment, vulnerabiility scanner, cyber risk management, cyber risk, cyber security, devops security, container security, mobile security, was, iot, ot security
    
Tenable
Published By: Mimecast     Published Date: Apr 27, 2018
Die alt hergebrachte Archivierung funktioniert nicht mehr für das moderne Unternehmen. Laut einer Umfrage von Vanson Bourne und Mimecast aus dem Jahr 2017 schätzen 88 % der globalen Organisationen ihre vorhandene Archivierungslösung als problematisch ein. Lassen Sie sich die Augen öffnen für die neuesten Erkenntnisse aus dem Bereich der modernen E-Mail-Archivierung. In diesem E-Book lernen Sie: • Warum traditionelle Archivierungssysteme für mobile Anwender nicht funktionieren • Wie Sie in Ihrer Organisation für eine erfolgreiche Archivierung alte Gewohnheiten ablegen müssen • Worauf es bei einem perfekten Archiv ankommt
Tags : 
    
Mimecast
Published By: Mimecast     Published Date: Apr 27, 2018
Die alt hergebrachte Archivierung funktioniert nicht mehr für das moderne Unternehmen. Laut einer Umfrage von Vanson Bourne und Mimecast aus dem Jahr 2017 schätzen 88 % der globalen Organisationen ihre vorhandene Archivierungslösung als problematisch ein. Lassen Sie sich die Augen öffnen für die neuesten Erkenntnisse aus dem Bereich der modernen E-Mail-Archivierung. In diesem E-Book lernen Sie: • Warum traditionelle Archivierungssysteme für mobile Anwender nicht funktionieren • Wie Sie in Ihrer Organisation für eine erfolgreiche Archivierung alte Gewohnheiten ablegen müssen • Worauf es bei einem perfekten Archiv ankommt
Tags : 
    
Mimecast
Published By: Mimecast     Published Date: Apr 27, 2018
Schicken Sie Ihre Alte Archivierungsslösung In Den Ruhestand White Paper Published By: Mimecast Die alt hergebrachte Archivierung funktioniert nicht mehr für das moderne Unternehmen. Laut einer Umfrage von Vanson Bourne und Mimecast aus dem Jahr 2017 schätzen 88 % der globalen Organisationen ihre vorhandene Archivierungslösung als problematisch ein. Lassen Sie sich die Augen öffnen für die neuesten Erkenntnisse aus dem Bereich der modernen E-Mail-Archivierung. In diesem E-Book lernen Sie: • Warum traditionelle Archivierungssysteme für mobile Anwender nicht funktionieren • Wie Sie in Ihrer Organisation für eine erfolgreiche Archivierung alte Gewohnheiten ablegen müssen • Worauf es bei einem perfekten Archiv ankommt
Tags : 
    
Mimecast
Published By: Henley & Partners     Published Date: Apr 27, 2018
Individuals interested in insuring against political and economic uncertainty, as well as those determined to capitalise on the rapidly changing mix of markets, business ventures and culture on offer around the globe, cannot afford to ignore the value of expanding their residence and citizenship options.
Tags : 
migration, globalization, mobile workers, citizenship, global citizens, investment migration
    
Henley & Partners
Published By: Mimecast     Published Date: Apr 26, 2018
Die alt hergebrachte Archivierung funktioniert nicht mehr für das moderne Unternehmen. Laut einer Umfrage von Vanson Bourne und Mimecast aus dem Jahr 2017 schätzen 88 % der globalen Organisationen ihre vorhandene Archivierungslösung als problematisch ein. Lassen Sie sich die Augen öffnen für die neuesten Erkenntnisse aus dem Bereich der modernen E-Mail-Archivierung. In diesem E-Book lernen Sie: • Warum traditionelle Archivierungssysteme für mobile Anwender nicht funktionieren • Wie Sie in Ihrer Organisation für eine erfolgreiche Archivierung alte Gewohnheiten ablegen müssen • Worauf es bei einem perfekten Archiv ankommt
Tags : 
    
Mimecast
Published By: Akamai Technologies     Published Date: Apr 25, 2018
Today every business is focused on their customers, and finding ways to better understand and serve them with differentiated digital experiences. With all of the choices available, users have become highly demanding, and quickly lose patience and trust when web and mobile app experiences are poor. Today’s digital user demands rich, engaging content that is fresh, personalized, and fast. If your websites and mobile apps can’t deliver, they’re gone. This eBook will give you insight into: Monitor how users interact with your online applications by leveraging real user data Optimize behaviors that drive the most revenue impact across user locations and devices Validate whether the optimizations resulted in desired business outcomes using real-world situations
Tags : 
monitor, optimize, validate, digital, experiences
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Apr 25, 2018
96% of users see app performance as important. A fast mobile app helps your app stand out from the rest to attain for the coveted title of “go-to” app. Download this guide to learn: The new benchmark: User expectation of an app’s response time The five key barriers to mobile app performance How to accelerate APIs and optimize image performance without expensive infrastructure or complex development work How advancements in CDN technology beyond basic caching can help improve performance
Tags : 
mobile, app, performance, barriers
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Apr 25, 2018
Today every business is focused on their customers, and finding ways to better understand and serve them with differentiated digital experiences. With all of the choices available, users have become highly demanding, and quickly lose patience and trust when web and mobile app experiences are poor. Today’s digital user demands rich, engaging content that is fresh, personalized, and fast. If your websites and mobile apps can’t deliver, they’re gone. This eBook will give you insight into: Monitor how users interact with your online applications by leveraging real user data Optimize behaviors that drive the most revenue impact across user locations and devices Validate whether the optimizations resulted in desired business outcomes using real-world situations
Tags : 
monitor, optimize, validate, digital, experiences
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Apr 25, 2018
Today every business is focused on their customers, and finding ways to better understand and serve them with differentiated digital experiences. With all of the choices available, users have become highly demanding, and quickly lose patience and trust when web and mobile app experiences are poor. Today’s digital user demands rich, engaging content that is fresh, personalized, and fast. If your websites and mobile apps can’t deliver, they’re gone. This eBook will give you insight into: Monitor how users interact with your online applications by leveraging real user data Optimize behaviors that drive the most revenue impact across user locations and devices Validate whether the optimizations resulted in desired business outcomes using real-world situations
Tags : 
monitor, optimize, validate, digital, experiences
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Apr 25, 2018
96% of users see app performance as important. A fast mobile app helps your app stand out from the rest to attain for the coveted title of “go-to” app. Download this guide to learn: The new benchmark: User expectation of an app’s response time The five key barriers to mobile app performance How to accelerate APIs and optimize image performance without expensive infrastructure or complex development work How advancements in CDN technology beyond basic caching can help improve performance
Tags : 
mobile, app, performance, barriers
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Apr 25, 2018
Today every business is focused on their customers, and finding ways to better understand and serve them with differentiated digital experiences. With all of the choices available, users have become highly demanding, and quickly lose patience and trust when web and mobile app experiences are poor. Today’s digital user demands rich, engaging content that is fresh, personalized, and fast. If your websites and mobile apps can’t deliver, they’re gone. This eBook will give you insight into: Monitor how users interact with your online applications by leveraging real user data Optimize behaviors that drive the most revenue impact across user locations and devices Validate whether the optimizations resulted in desired business outcomes using real-world situations
Tags : 
monitor, optimize, validate, digital, experiences
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Apr 25, 2018
96% of users see app performance as important. A fast mobile app helps your app stand out from the rest to attain for the coveted title of “go-to” app. Download this guide to learn: The new benchmark: User expectation of an app’s response time The five key barriers to mobile app performance How to accelerate APIs and optimize image performance without expensive infrastructure or complex development work How advancements in CDN technology beyond basic caching can help improve performance
Tags : 
mobile, app, performance, barriers
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Apr 25, 2018
APIs are increasingly powering mobile applications, websites, single-page applications, and data sharing. APIs connect across business and technology boundaries—meaning every enterprise has good reason to be developing, delivering, and consuming APIs. Learn more about: How to overcome API latency & traffic spike challenges Options to ensure 100% availability How to design a security stack for your APIs
Tags : 
api, performance, security, developing, applications, data
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Apr 25, 2018
Cyber attackers are targeting the application programming interfaces (APIs) used by businesses to share data with customers. Consumer mobile adoption, electronic goods and services, and high volumes of data have led businesses to use APIs for data exchange. Unfortunately, attackers can also use APIs to access or deny service to valuable data and systems. This white paper explores strategies for protecting APIs. You’ll learn about APIs, how and why these endpoints are targets for web application attacks, security models, and how Akamai can help.
Tags : 
api, security, interface, businesses, data, mobile, adoption
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Apr 25, 2018
APIs are increasingly powering mobile applications, websites, single-page applications, and data sharing. APIs connect across business and technology boundaries—meaning every enterprise has good reason to be developing, delivering, and consuming APIs. Learn more about: How to overcome API latency & traffic spike challenges Options to ensure 100% availability How to design a security stack for your APIs
Tags : 
api, performance, security, developing, applications, data
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Apr 25, 2018
Cyber attackers are targeting the application programming interfaces (APIs) used by businesses to share data with customers. Consumer mobile adoption, electronic goods and services, and high volumes of data have led businesses to use APIs for data exchange. Unfortunately, attackers can also use APIs to access or deny service to valuable data and systems. This white paper explores strategies for protecting APIs. You’ll learn about APIs, how and why these endpoints are targets for web application attacks, security models, and how Akamai can help.
Tags : 
api, security, interface, businesses, data, mobile, adoption
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Apr 25, 2018
APIs are increasingly powering mobile applications, websites, single-page applications, and data sharing. APIs connect across business and technology boundaries—meaning every enterprise has good reason to be developing, delivering, and consuming APIs. Learn more about: How to overcome API latency & traffic spike challenges Options to ensure 100% availability How to design a security stack for your APIs
Tags : 
api, performance, security, developing, applications, data
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Apr 25, 2018
Cyber attackers are targeting the application programming interfaces (APIs) used by businesses to share data with customers. Consumer mobile adoption, electronic goods and services, and high volumes of data have led businesses to use APIs for data exchange. Unfortunately, attackers can also use APIs to access or deny service to valuable data and systems. This white paper explores strategies for protecting APIs. You’ll learn about APIs, how and why these endpoints are targets for web application attacks, security models, and how Akamai can help.
Tags : 
api, security, interface, businesses, data, mobile, adoption
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Apr 25, 2018
APIs are increasingly powering mobile applications, websites, single-page applications, and data sharing. APIs connect across business and technology boundaries—meaning every enterprise has good reason to be developing, delivering, and consuming APIs. Learn more about: How to overcome API latency & traffic spike challenges Options to ensure 100% availability How to design a security stack for your APIs
Tags : 
api, performance, security, developing, applications, data
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Apr 25, 2018
Cyber attackers are targeting the application programming interfaces (APIs) used by businesses to share data with customers. Consumer mobile adoption, electronic goods and services, and high volumes of data have led businesses to use APIs for data exchange. Unfortunately, attackers can also use APIs to access or deny service to valuable data and systems. This white paper explores strategies for protecting APIs. You’ll learn about APIs, how and why these endpoints are targets for web application attacks, security models, and how Akamai can help.
Tags : 
api, security, interface, businesses, data, mobile, adoption
    
Akamai Technologies
Start   Previous    11 12 13 14 15 16 17 18 19 20 21 22 23 24 25    Next    End
Search      
Already a subscriber? Log in here
Please note you must now log in with your email address and password.