geolocation

Results 1 - 11 of 11Sort Results By: Published Date | Title | Company Name
Published By: Quova     Published Date: Oct 27, 2008
Learn what real-time geolocation technology can do for online businesses. Discover how companies like yours are achieving cost-per-click improvements of up to 30 percent, while lowering home page drop-off rates by as much as 70 percent—and how you can do the same. Also, discover how knowing a Web visitor’s location can help you sell more product; increase customer loyalty; comply with state and country regulations; and track campaign effectiveness. Download your copy now.
Tags : 
quova, geolocation technology, quova, geolocation data, geographically targeted advertisement
    
Quova
Published By: F5 Networks Inc     Published Date: Feb 24, 2010
Learn how accurate geolocation data can provide greater business value and insight through enhanced visibility.
Tags : 
geolocation, application delivery, unified application, data delivery platform, data integration, content delivery network, cloud balancing
    
F5 Networks Inc
Published By: Iovation     Published Date: Sep 25, 2009
Online businesses today face a daunting battle in combatting online fraud and abuse. Existing identity-based and credit risk scoring systems are being challenged by fraudsters and fraud rings. They capitalize on cheap identities they use to repeatedly target a business or industry. Using device identification to establish device reputations and expose repeat offenders and fraud rings changes everything.
Tags : 
software-as-a-service (saas) solution, device identification technology, discovery of hidden associations, fact-based fraud management, ip geolocation data, reputation sharing, audit logs, reputation trust rules, shared device reputation
    
Iovation
Published By: Absolute Software     Published Date: Feb 23, 2010
A majority of environments today are cross-platform, combining both PCs and Macs. The result has become a common IT challenge: How can you maintain Macs in a network environment with a PC-centric infrastructure and with Windows-based network services?
Tags : 
computrace, absolute software, it asset management, remote data delete, geolocation tracking, theft recovery, service guarantee
    
Absolute Software
Published By: Intel     Published Date: Apr 16, 2019
When seeking a new cloud service provider (CSP), uptime and data sovereignty will be decisive considerations for many customers. At a time when cloud outages can bring down a huge number of web services and make the news, reliability is a hot topic. There is also a growing sensitivity towards where workloads are hosted, following introduction of regulations. Download Intel's latest eGuide, 'Meet Your Customers’ Biggest Cloud Concerns’ to discover: • How to boost uptime with hardware engineered for reliability • The ways telemetry can be used to call attention to potential problems before they occur • How to protect against the threat of cybercrime with a multi-layered approach to security • Why data geolocation is increasingly important, and how you can help with location tagging.
Tags : 
    
Intel
Published By: Intel     Published Date: Apr 16, 2019
When seeking a new cloud service provider (CSP), uptime and data sovereignty will be decisive considerations for many customers. At a time when cloud outages can bring down a huge number of web services and make the news, reliability is a hot topic. There is also a growing sensitivity towards where workloads are hosted, following introduction of regulations. Download Intel's latest eGuide, 'Meet Your Customers’ Biggest Cloud Concerns’ to discover: • How to boost uptime with hardware engineered for reliability • The ways telemetry can be used to call attention to potential problems before they occur • How to protect against the threat of cybercrime with a multi-layered approach to security • Why data geolocation is increasingly important, and how you can help with location tagging.
Tags : 
    
Intel
Published By: Absolute Software     Published Date: Jan 19, 2010
This whitepaper explains step-by-step how you can deploy a complete Snow Leopard disk image to a Mac OS X computer, even while it is being used. No immediate boot from a server, FireWire drive, or boot DVD is necessary, and no pre-configuration of the target computer is required.
Tags : 
computrace, absolute software, it asset management, remote data delete, geolocation tracking, theft recovery, service guarantee
    
Absolute Software
Published By: Absolute Software     Published Date: Jan 27, 2010
Deploying patches in a timely fashion soon after they become available helps secure the OS and prevent the majority of data breaches. However, many computer systems are often not patched for months or not at all.
Tags : 
computrace, absolute software, it asset management, remote data delete, geolocation tracking, theft recovery, service guarantee
    
Absolute Software
Published By: Here Technologies     Published Date: Mar 29, 2019
Advertisers are beginning to invest in location insights which give them data on how and why transactions are made in specific places. And with nearly all smartphones equipped with geolocation abilities, advertisements can be made location-aware with improved precision for targeting. Understanding location is key to gaining improved insights. HERE offers data sets and services that advertisers can use to contextualize consumer movements and habits in the world around them to provide well-timed and relevant advertising.
Tags : 
location data, ad tech, location targeting
    
Here Technologies
Published By: Absolute Software     Published Date: Jan 29, 2008
Does your PC lifecycle management (PCLM) reflect the issues associated with mobile users? Many organizations face expensive inefficiencies by not managing mobile assets effectively. These inefficiencies include dispersed and manual data collection, and inventory tools that are dependent on a connection to the company network.
Tags : 
absolute, intel, laptop, saas, managing laptops, pclm, computrace, absolute software, it asset management, remote data delete, geolocation tracking, theft recovery, service guarantee, lock down, rapid recovery, stolen, data defense, theft deterrence, pc protection, tpm
    
Absolute Software
Published By: Absolute Software     Published Date: Jan 27, 2010
This whitepaper explains how organizations can reduce their energy bills by remotely regulating computers. Topics include typical workplace computer usage, how to calculate your potential energy savings, debunking power management myths, and how you can assign multiple power saving profiles to clients.
Tags : 
computrace, absolute software, it asset management, remote data delete, geolocation tracking, theft recovery, service guarantee
    
Absolute Software
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

“I am the Inspector Morse of IT journalism. I haven't a clue. D'oh” - Mike Magee