Mobile payments News
May 09, 2017
Enterprise IT teams can now buy data center hardware based on just what they use, rather than receive the one big bill that has long been a cornerstone of on-prem purchases.
April 07, 2017
Bad-bots are being used by cybercriminals to automate many time-consuming activities to perpetrate their crimes. Payment card fraud is an area of particular concern as large data bases of stolen ...
February 24, 2017
This is a guest post for the Computer Weekly Developer Network written by Patrick McFadin, chief evangelist at DataStax -- the company develops and provides support for a commercial edition of the ...
February 01, 2017
In this case study, learn how SD-WAN adoption dramatically simplified a major oil company's wide area network while improving security and increasing flexibility.
Mobile payments Get Started
Bring yourself up to speed with our introductory content
A McKesson Corporation population health expert explains advanced cost accounting techniques for value-based care, alternative payment models and revenue optimization. Continue Reading
Bug-finding programs are valuable to enterprises, but they require a lot of planning and effort to be effective. Sean Martin looks at what goes into taking a bug bounty program public. Continue Reading
As we become 'digital by nature,' a good enterprise disaster recovery/business continuity plan must put data first, says Harvey Koeppel. He lays out 10 tips. Continue Reading
Evaluate Mobile payments Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
As many in health IT know, the theft of patient health data has developed into an epidemic with breaches involving millions of health records in 2016, according to the Department of Health and ... Continue Reading
The FIDO authentication standard could eventually bypass passwords, or at least augment them, as government and industry turns to more effective authentication technologies. Continue Reading
Barclays now uses a biometric authentication system for phone banking customers, where 'voice prints' can replace passwords. Expert Michael Cobb explains the security risks. Continue Reading
Manage Mobile payments
Learn to apply best practices and optimize your operations.
Everyone is talking about digital transformation, but in the process, mobile is often an afterthought. Expert Christopher Ward explains why mobile needs to be number one. Continue Reading
Mobile and social CRM have reshaped the customer experience, creating two-way conversations and multichannel endeavors. Continue Reading
The ubiquitous nature of social media and mobile devices has conditioned consumers to expect on-demand customized service delivered quickly to their platform of choice. But reaching customers on mobile and social channels isn't always easy. Harnessing the data generated by these new channels of engagement poses numerous data management and integration challenges. Mobile and social CRM tools can speed customer service, encourage mutually beneficial two-way communication and enrich customer relationships.
In this e-book chapter, consultant Steve Signoff writes that mobile and social CRM tools symbiotically working to connect with customers and prospects have become a requirement for companies to compete successfully. He looks at a "morphing, modernizing and shifting" CRM market that is expected to reach $37 billion by 2017 and explains that mobile and social CRM tools have to be "woven into the fabric" of any viable customer engagement strategy. Companies need these tools to track, analyze, communicate and manage relationships with customers and prospects. Collaboration technologies that allow immediate customer feedback are not only reshaping company operations in sales and marketing, but also influencing product development and marketing decisions.Continue Reading
Problem Solve Mobile payments Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
Attackers can gather payment card data by carrying out distributed guessing with a minimal amount of existing information. Expert Michael Cobb explains how this attack works. Continue Reading
The SWIFT network has increasingly been abused by cybercriminals to carry out bank fraud and theft. Expert Michael Cobb explains possible ways to boost security. Continue Reading
Creating a powerful user experience (UX) is the holy grail of mobile app development, according to SearchCIO columnist and former CIO Harvey Koeppel. But the journey there is fraught with obstacles, including managing and designing apps that appropriately handle data risks, multiple device and operating system constraints, environmental considerations, and legacy system constraints. The undoing of many journeys is a result of failing to balance UX with the "granddaddy" of all these obstacles: mobile data security risks.
In this SearchCIO handbook, Koeppel gives an account of his own journey to harmonizing user experience and mobile data security, and offers 13 CIO pointers to help ensure your quest is a success. In our second piece, CTO Niel Nickolaisen advises IT leaders on how to take a balanced approach to mobile app development. Lastly, Senior News Writer Nicole Laskowski runs down seven UX design tips for a winning mobile app. Continue Reading