From paying for parking to store purchases, the mobile wallet will play a big role in this holiday season. Protect the valuable information your wireless device holds by following some simple tips.
Utilizing near field communications, Nicole Thompson from Verizon Wireless showcases the Isis Mobile Wallet. Allowing users to load their credit cards to their smartphones, mobile wallets offer consumers a secure mobile payment solution.
Are you thinking about the cloud? Excadel CEO and Founder Fima Katz discusses how the cloud goes hand in hand with mobility and how companies of all sizes are implementing it in their businesses.
There are a number of opportunities – and challenges – when companies offer BYOD to their employees. According to Macheen Vice President of Sales and Business Development George Kanuck, these include cost limitations, security issues and his company’s mobile enterprise solution.
Enterprises struggling with BYOD or corporate data on wireless devices need “collective mobility strategies,” says AirWatch CEO Alan Dabbiere. In most cases it is an unrealistic expectation to put a barrier between personal and corporate data; therefore, IT professionals should take a hard look at what their users need and consider flexible solutions that don’t [...]
Providing voice and messaging services to developers, Twilio’s Head of Business Development Brian Mullen talks about the many ways cloud-based services can be used to enhance an app’s service and consumer experience.
Like many isolated areas, mobile service in Yakutat, Alaska was difficult to deploy. Thankfully, the technology came to town in time to save brothers Frank Deveraux, Jr. and Vernon Schumacher when their boat anchor gave way and the vessel drifted away while they were on an isolated reef. The brothers tell an incredible survival story [...]
Good Technology President and CEO Christy Wyatt talks about the often overlooked but irreplaceable asset in any company; data. Wyatt also identifies some of the barriers to protecting data and the importance of securing it within the enterprise.