This site uses cookies to improve your experience. To help us insure we adhere to various privacy regulations, please select your country/region of residence. If you do not select a country, we will assume you are from the United States. Select your Cookie Settings or view our Privacy Policy and Terms of Use.
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Used for the proper function of the website
Used for monitoring website traffic and interactions
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Strictly Necessary: Used for the proper function of the website
Performance/Analytics: Used for monitoring website traffic and interactions
Wednesday, February 8, 2012 -- Mobile Apps: The New Direct-To-Consumer Channel. Mobile Apps enable businesses to relate to customers one-to-one. Customers can stream your companys content, shop for goods, search for local products and services, and receive personalized serviceall from their mobile phones.
Thursday, November 29, 2012 -- Technology Outlook: A Panel of CIOs Discussing Major Trends, How They're Leveraging New Technologies, and How They're Making their Firms More Competitive Today's IT organizations are experiencing major paradigm shifts. Moderator and 2012 Association President AITP. For this annual event we?re
Tuesday, June 26, 2012 -- Digital Security: Are You as Safe as You Think You Are? Expect escalating levels of malware, fake mobile apps, and online security scams in the weeks and months to come. What Are the Biggest Digital Security Threats to You and Your Company? Are you at risk for a cyber attack? See [link] (more)
Wednesday, April 11, 2012 -- BYOD: Bring Your Own Device. As mobile devices become more prevalent, so does their use for work in addition to play. Mobile devices are also prone to being lost, and more likely to use a non-secure connection. Is it too expensive, or do the potential dangers outweigh the cost?
In today''s mobile world, SMS has widespread, near ubiquitous adoption, which is great for consumers who want to communicate with their friends and family. By giving them your mobile number, you''ve created a priority channel. They realized you can''t have that kind of information out there lying on people''s mobile devices.
One way Appallicious is already helping the City of San Francisco better connect with its citizens is the free Rec & Park app, developed in 2012, which utilizes open data to provide information on the city’s many parks. Trailblazing Government 2.0
Speakers include Scott Hunger, a principal program Manager and Lead on the Azure Application and Platform Team; Richard Campbell, cofounder of Strangeloop Networks, Jeffrey Palermo, CIO of Headspring Systems and many more! We will examine various HTML5 APIs to see how they provide key advantages to the modern web developer.
We organize all of the trending information in your field so you don't have to. Join 5,000+ users and stay up to date on the latest articles your peers are reading.
You know about us, now we want to get to know you!
Let's personalize your content
Let's get even more personalized
We recognize your account from another site in our network, please click 'Send Email' below to continue with verifying your account and setting a password.
Let's personalize your content