Mobile distracted shoppers buy more, study suggests
A small study suggests people who use their mobiles while shopping are more likely to make unplanned purchases and forget items they had planned to buy.
A small study suggests people who use their mobiles while shopping are more likely to make unplanned purchases and forget items they had planned to buy.
Commonwealth Bank of Australia (CBA) has seen a 400 per cent increase in the number of payments made with a mobile since it introduced Apple Pay in January, the bank revealed today.
Commonwealth Bank of Australia will “trial and explore” 5G edge computing technologies over the coming months, in collaboration with Telstra and Ericsson.
Ivan Ortiz has packed in his head of technology role at Australian bookmaking company, UBET, to take on a similar role in the financial services sector at LGIAsuper.
NAB’s digital banking brand UBank has launched a fitness tracker inspired, in-app tool to help users save and spend within their budget.
Proactive is Apple’s name for an intelligent iOS 9 technology wants to help you get things done – but shockingly it tries to keep your private life private.
Last week, I finally received my Apple Watch. I plan to write a number of related Watch tips and tricks stories, and I like to be able to provide visual aids in my posts whenever possible, so one of the first questions I asked myself was, How do I take a screen shot on the Apple Watch?
Weddings. Job promotions. News articles. Facebook thinks it knows what the best stories are to drop in your news feed. But some users might want to see things their own way.
Running late for a meet up with friends or an appointment? Share a location securely and for a limited time period with smartphone application Glympse. It's a free download for Android, iOS, Windows Phone and BlackBerry.
Using your smartphone or tablet to control your Tivo box is easy and offers a lot of flexibility in recording shows and channel surfing.
Companies have accepted that BYOD is a reality. The challenge now is striking a balance between security and flexibility.
Apple hopes to bolster its position in the enterprise mobility management (EMM) market in September with its new iOS 9 software, which packs key features and overdue enhancements for IT administrators. Apple's Volume Purchase Program (VPP), a specialized App Store and service that lets businesses purchase software licenses in bulk and then distribute apps to multiple users, will soon give admins more options to install, update and remove business apps.
After traveling all day, the last thing you want to do is wait in a long line to check into your hotel. And when you finally get to the front desk, it seems like the hotelier has to type a million keystrokes into the computer before finally handing you your room key.
Many social media apps have features that show up when you swipe in different directions, or functionality that isn't visible at first glance. But Snapchat might have ‘em all beat because it has a handful of hidden features and gestures that are only discovered through frequent usage or word of mouth. Frequent users of Snapchat may have noticed several places within the app that display numbers and emoticons, but most people either don't know these features exist or don't know what they mean.
Apple's budding partnership with IBM culminated in the release of AppleCare for Enterprise, the company's business-specific support service, but for the vast majority of organizations that use Apple products the initiative is nothing more than a glorified Genius Bar. CIOs and IT professionals welcome Apple's recent interest in the enterprise, but many are still unclear on the levels of support and services the consumer giant offers -- and few are satisfied with Apple's commitment.
The risk of data loss and security breaches from mobile computing is substantial, whether it’s lost devices, hackers gaining entry via mobile employees or the steady stream of new threats coming out. The good news is that organizations can still reap the benefits of mobile computing by combining sound security policies with end user training, intelligent device selection and by taking steps to secure their most valuable data.