Display search results for ** instead (15 products)
07 Aug 2015  |  Global
Network Security Technology Alert. Contextual Security System Ensures Application Security in Mobile Devices; Crowd Sourcing Enhances Security Intelligence; Security Risks in M2M Communications
This issue profiles a contextual security system that ensures application security in mobile devices, enhancement of security intelligence by crowd sourcing, security risks in M2M communications.
17 Jul 2015  |  Global
IT; Computing and Communications Technology Alert. Machine Learning-Based Optimized Prediction Software; Technological Enhancements in Ubiquitous Computing Enable Smarter Environments; Dimensions of Image Recognition Technology
This issue profiles machine learning-based optimized prediction software, technological enhancements in ubiquitous computing that enable smarter environments, and dimensions of image recognition technology.
03 Jul 2015  |  Global
Network Security Technology Alert. Securing Industrial Internet Enhances Implementation of Internet of Things in Industries; Intelligent Packet-Level Network Visibility Solution
This issue profiles securing industrial Internet for enhancing implementation of Internet of Things in industries, an intelligent packet-level network visibility solution, and a cost-effective encryption-as-a-service solution for securing cloud data.
19 Jun 2015  |  Global
IT; Computing and Communications Technology Alert. Wireless High Definition Video Link Solution for Drones; Data Visualization Will Improve Marketing Performance; Dimensions of Indoor Positioning System
This issue profiles a wireless high definition video link solution for drones, data visualization that will improve marketing performance, and dimensions of indoor positioning system.
05 Jun 2015  |  Global
Network Security Technology Alert. A Pattern-Based Approach toward Multi-Factor Authentication; Threat Intelligence is the Key Component of Emerging Security Practices; An Efficient Cyber-Attack Detection Solution
This issue profiles a pattern-based approach toward multi-factor authentication, threat intelligence as the key component of emerging security practices, and an efficient cyber-attack detection solution.
15 May 2015  |  Global
IT; Computing and Communications Technology Alert. Dimensions of Voice over Internet Protocol; New Age Technologies Enable Quality and Enhanced Reach in Digital Education; Dimensions of Gesture Recognition
This issue profiles dimensions of VoIP, new age technologies that enable quality and enhanced reach in digital education, and dimensions of gesture recognition.
01 May 2015  |  Global
Network Security Technology Alert. Dimensions of Big Data Security; Reducing Costs Associated with Exploit Mitigation; Artificial Intelligence-Based BYOD Security
This issue profiles dimensions of big data security, reducing costs associated with exploit mitigation, and artificial intelligence-based BYOD security.
17 Apr 2015  |  Global
IT; Computing and Communications Technology Alert. Wireless Mobile Communication Acts as a Data Carrier for Augmented Reality; Dimensions of Enterprise Mobility Management; Mobile Styluses as Fashion Accessories
This issue profiles wireless mobile communication that acts as a data carrier for augmented reality, dimensions of enterprise mobility management, and mobile styluses that doule up as fashion accessories.
03 Apr 2015  |  Global
Network Security Technology Alert. Dimensions of Data Loss Prevention; Adaptive Access Control Management System; Automated Security for Virtualized Data Centers
This issue profiles dimensions of data loss prevention, an adaptive access control management system, and automated security for virtualized data centers.
20 Mar 2015  |  Global
IT; Computing and Communications Technology Alert. Dimensions of LTE-A; Location-Based Services are Transforming the Retail Sector; Semantic Search Techniques Enable Contextual Search Engines
This issue profiles dimensions of LTE-A, location-based services that are transforming the retail sector, and semantic search techniques that enable contextual search engines.