SlideShare a Scribd company logo
Introducing
Proximity Mobile
Intelligence
The Proximity Platform
Proximity will deliver a unique user experience
Space
Planning
Apply our
Technology
Mobile
Applications
Space Planning
Network Discovery
Our technology is based on patented security
To initiate network discovery and space planning, a proposed network
diagram which lays out PROXiMITTER™ devices in strategic locations is
illustrated.
Space Planning Network Discovery
Proposed Security on Devices
• Security available on the devices
– Embedded security on devices
– Mobile security on the iOS and Android devices
• Consumer Analytics
– Customer information is protected. Prevents
identity theft.
Data Analytics Consumer Dashboard
The Dashboard Application
The Dashboard Application
Intelligent Applications
Security Patented Data Encryption
Proximity leverages Secure Channels patented
encryption on all its product offerings.
SECURE CHANNELS SA
Secure Channels is a Swiss company that licenses
patented encryption technology for data storage
and communications.
Apply our technology
We can apply our geolocation technology to indoor and outdoor settings
 Proximity’s geolocation technology is a hybrid of networking devices
that is capable of bringing a new and innovative traveler or visitor
experience to Airport Terminals.
 Our platform provides intelligence through sensing proximity wi-fi and
bluetooth devices. Our PROXiMITTER devices communicate signals to
our secure cloud servers even through in-house networking
infrastructure.
 The result is a seamless deployment of our platform. Proximity can
co-exist with existing wi-fi networks securing its data through Secure
Channel’s patented data encryption.
Secure Geolocation Our Technology
We make our technology work - this is what
our customers are expecting.
We focus on the customer experience
Mobile Applications
A unique experience through iPhone and Android mobile apps
 Proximity will deliver a secure and innovative customer mobile
application designed to bring a unique experience to every mobile or
device user.
 Our mobile application strategy begins with a feature set or collection
of the customer’s business or organizational highlights.
 The application will feature a product or service list display, coupon
or ticket management and emergency security notifications (for
property management) all integrated with Proximity’s secure
geolocation application.
Mobile Applications Strategy
New Mobile Application
Our customers deserve unparalleled quality in technology and innovation which can only
be delivered by Proximity.
Secure and Intelligent
Mobile Apps - Proximity

More Related Content

What's hot

Five questions to help you choose the right mobile connectivity provider. Kar...
Five questions to help you choose the right mobile connectivity provider. Kar...Five questions to help you choose the right mobile connectivity provider. Kar...
Five questions to help you choose the right mobile connectivity provider. Kar...
Karina Popova
 
Expedite care
Expedite careExpedite care
Expedite care
ExpediteCare
 
Perimeter Protection: "Stairway to IP"
Perimeter Protection: "Stairway to IP"Perimeter Protection: "Stairway to IP"
Perimeter Protection: "Stairway to IP"cias-elettronica
 
Kura M2M IoT Gateway
Kura M2M IoT GatewayKura M2M IoT Gateway
Kura M2M IoT Gateway
Eurotech
 
Workshop. Using wherever SIM, Arduino and API as IoT Alert System for Real Ti...
Workshop. Using wherever SIM, Arduino and API as IoT Alert System for Real Ti...Workshop. Using wherever SIM, Arduino and API as IoT Alert System for Real Ti...
Workshop. Using wherever SIM, Arduino and API as IoT Alert System for Real Ti...
Karina Popova
 
Introducing MSite Mobile for Lenel (Feb14)
Introducing MSite Mobile for Lenel (Feb14)Introducing MSite Mobile for Lenel (Feb14)
Introducing MSite Mobile for Lenel (Feb14)
Human Recognition Systems
 
About Check4Green
About Check4GreenAbout Check4Green
About Check4Green
Check Green
 
Squareway, a Secure Private 3G Network, Cyrille Manente, Vivaction
Squareway, a Secure Private 3G Network, Cyrille Manente, VivactionSquareway, a Secure Private 3G Network, Cyrille Manente, Vivaction
Squareway, a Secure Private 3G Network, Cyrille Manente, Vivaction
Alan Quayle
 
Be a Virtual Mobile Network for your M2M/IoT Devices, Martin Giess, EMnify
Be a Virtual Mobile Network for your M2M/IoT Devices, Martin Giess, EMnifyBe a Virtual Mobile Network for your M2M/IoT Devices, Martin Giess, EMnify
Be a Virtual Mobile Network for your M2M/IoT Devices, Martin Giess, EMnify
Alan Quayle
 
Intelligence Driven Security
Intelligence Driven SecurityIntelligence Driven Security
Intelligence Driven Security
MarketingArrowECS_CZ
 
Mobile surveillance software
Mobile surveillance softwareMobile surveillance software
Mobile surveillance software
VMukti Solutions Pvt. Ltd.
 
Device Management for Connected Devices
Device Management for Connected Devices Device Management for Connected Devices
Device Management for Connected Devices WSO2
 
9.35am robert humphrey
9.35am robert humphrey9.35am robert humphrey
9.35am robert humphrey
Argyle Executive Forum
 
World's Most Secure Privacy Phones
World's Most Secure Privacy PhonesWorld's Most Secure Privacy Phones
World's Most Secure Privacy Phones
John Adam
 
Cognia mobile recording information sheet
Cognia mobile recording information sheetCognia mobile recording information sheet
Cognia mobile recording information sheet
Cognia
 
IoT Platform Meetup - Oracle
IoT Platform Meetup - OracleIoT Platform Meetup - Oracle
IoT Platform Meetup - Oracle
Filip Kolář
 
CONNECTOR73 - communication between business and customers
CONNECTOR73 - communication between business and customersCONNECTOR73 - communication between business and customers
CONNECTOR73 - communication between business and customers
Владимир Афанасьев
 
Open Source M2M IoT Gateways
Open Source M2M IoT GatewaysOpen Source M2M IoT Gateways
Open Source M2M IoT Gateways
Eurotech
 

What's hot (20)

Five questions to help you choose the right mobile connectivity provider. Kar...
Five questions to help you choose the right mobile connectivity provider. Kar...Five questions to help you choose the right mobile connectivity provider. Kar...
Five questions to help you choose the right mobile connectivity provider. Kar...
 
All Covered Secure-Article
All Covered Secure-ArticleAll Covered Secure-Article
All Covered Secure-Article
 
Expedite care
Expedite careExpedite care
Expedite care
 
Perimeter Protection: "Stairway to IP"
Perimeter Protection: "Stairway to IP"Perimeter Protection: "Stairway to IP"
Perimeter Protection: "Stairway to IP"
 
Kura M2M IoT Gateway
Kura M2M IoT GatewayKura M2M IoT Gateway
Kura M2M IoT Gateway
 
Workshop. Using wherever SIM, Arduino and API as IoT Alert System for Real Ti...
Workshop. Using wherever SIM, Arduino and API as IoT Alert System for Real Ti...Workshop. Using wherever SIM, Arduino and API as IoT Alert System for Real Ti...
Workshop. Using wherever SIM, Arduino and API as IoT Alert System for Real Ti...
 
Introducing MSite Mobile for Lenel (Feb14)
Introducing MSite Mobile for Lenel (Feb14)Introducing MSite Mobile for Lenel (Feb14)
Introducing MSite Mobile for Lenel (Feb14)
 
About Check4Green
About Check4GreenAbout Check4Green
About Check4Green
 
Squareway, a Secure Private 3G Network, Cyrille Manente, Vivaction
Squareway, a Secure Private 3G Network, Cyrille Manente, VivactionSquareway, a Secure Private 3G Network, Cyrille Manente, Vivaction
Squareway, a Secure Private 3G Network, Cyrille Manente, Vivaction
 
Be a Virtual Mobile Network for your M2M/IoT Devices, Martin Giess, EMnify
Be a Virtual Mobile Network for your M2M/IoT Devices, Martin Giess, EMnifyBe a Virtual Mobile Network for your M2M/IoT Devices, Martin Giess, EMnify
Be a Virtual Mobile Network for your M2M/IoT Devices, Martin Giess, EMnify
 
Intelligence Driven Security
Intelligence Driven SecurityIntelligence Driven Security
Intelligence Driven Security
 
Mobile surveillance software
Mobile surveillance softwareMobile surveillance software
Mobile surveillance software
 
Device Management for Connected Devices
Device Management for Connected Devices Device Management for Connected Devices
Device Management for Connected Devices
 
9.35am robert humphrey
9.35am robert humphrey9.35am robert humphrey
9.35am robert humphrey
 
World's Most Secure Privacy Phones
World's Most Secure Privacy PhonesWorld's Most Secure Privacy Phones
World's Most Secure Privacy Phones
 
Cognia mobile recording information sheet
Cognia mobile recording information sheetCognia mobile recording information sheet
Cognia mobile recording information sheet
 
Service_iOmando_ENG 2
Service_iOmando_ENG 2Service_iOmando_ENG 2
Service_iOmando_ENG 2
 
IoT Platform Meetup - Oracle
IoT Platform Meetup - OracleIoT Platform Meetup - Oracle
IoT Platform Meetup - Oracle
 
CONNECTOR73 - communication between business and customers
CONNECTOR73 - communication between business and customersCONNECTOR73 - communication between business and customers
CONNECTOR73 - communication between business and customers
 
Open Source M2M IoT Gateways
Open Source M2M IoT GatewaysOpen Source M2M IoT Gateways
Open Source M2M IoT Gateways
 

Viewers also liked

Microsoft - Close Proximity Communication System
Microsoft - Close Proximity Communication SystemMicrosoft - Close Proximity Communication System
Microsoft - Close Proximity Communication SystemDeepak Bhagchandani
 
Chryssoula Themelis - Tele Proximity | VocTEL 2015
Chryssoula Themelis - Tele Proximity | VocTEL 2015Chryssoula Themelis - Tele Proximity | VocTEL 2015
Chryssoula Themelis - Tele Proximity | VocTEL 2015
VocTEL Conference
 
Discovery of Convoys in Network Proximity Log
Discovery of Convoys in Network Proximity LogDiscovery of Convoys in Network Proximity Log
Discovery of Convoys in Network Proximity Log
Coldbeans Software
 
Linteri RetailShow 2014
Linteri RetailShow 2014Linteri RetailShow 2014
Linteri RetailShow 2014
Lukasz Felsztukier
 
Creating a Digital 6th Sense with LTE Direct
Creating a Digital 6th Sense with LTE DirectCreating a Digital 6th Sense with LTE Direct
Creating a Digital 6th Sense with LTE Direct
Qualcomm Research
 
LTE-Direct
LTE-DirectLTE-Direct
LTE-Direct
Jerin Jose
 
Future tech trend for public safety proximity-based service
Future tech trend for public safety proximity-based serviceFuture tech trend for public safety proximity-based service
Future tech trend for public safety proximity-based service
Yi-Hsueh Tsai
 
D2D - Device to Device Communication
D2D - Device to Device CommunicationD2D - Device to Device Communication
D2D - Device to Device Communication
Francisco Bento da Silva Neto
 
An overview of D2D in 3GPP LTE standard
An overview of D2D in 3GPP LTE standardAn overview of D2D in 3GPP LTE standard
An overview of D2D in 3GPP LTE standard
ssk
 

Viewers also liked (10)

Master defense
Master defenseMaster defense
Master defense
 
Microsoft - Close Proximity Communication System
Microsoft - Close Proximity Communication SystemMicrosoft - Close Proximity Communication System
Microsoft - Close Proximity Communication System
 
Chryssoula Themelis - Tele Proximity | VocTEL 2015
Chryssoula Themelis - Tele Proximity | VocTEL 2015Chryssoula Themelis - Tele Proximity | VocTEL 2015
Chryssoula Themelis - Tele Proximity | VocTEL 2015
 
Discovery of Convoys in Network Proximity Log
Discovery of Convoys in Network Proximity LogDiscovery of Convoys in Network Proximity Log
Discovery of Convoys in Network Proximity Log
 
Linteri RetailShow 2014
Linteri RetailShow 2014Linteri RetailShow 2014
Linteri RetailShow 2014
 
Creating a Digital 6th Sense with LTE Direct
Creating a Digital 6th Sense with LTE DirectCreating a Digital 6th Sense with LTE Direct
Creating a Digital 6th Sense with LTE Direct
 
LTE-Direct
LTE-DirectLTE-Direct
LTE-Direct
 
Future tech trend for public safety proximity-based service
Future tech trend for public safety proximity-based serviceFuture tech trend for public safety proximity-based service
Future tech trend for public safety proximity-based service
 
D2D - Device to Device Communication
D2D - Device to Device CommunicationD2D - Device to Device Communication
D2D - Device to Device Communication
 
An overview of D2D in 3GPP LTE standard
An overview of D2D in 3GPP LTE standardAn overview of D2D in 3GPP LTE standard
An overview of D2D in 3GPP LTE standard
 

Similar to Proximity LLC Mobile Intelligence

Manley Solutions M2M Strategy 2013
Manley Solutions M2M Strategy 2013Manley Solutions M2M Strategy 2013
Manley Solutions M2M Strategy 2013
stumanley
 
Sly presentation ver 2.0
Sly presentation ver 2.0Sly presentation ver 2.0
Sly presentation ver 2.0
ankushkaushish
 
I3 Technologies Corporation Profile
I3 Technologies Corporation ProfileI3 Technologies Corporation Profile
I3 Technologies Corporation Profilejaymieann
 
M I Dentity 3 G 040111
M I Dentity 3 G 040111M I Dentity 3 G 040111
M I Dentity 3 G 040111
Jan Vekemans
 
CyberHive Offers High Performance VPN for Rapid and Secure Vehicle Connectivi...
CyberHive Offers High Performance VPN for Rapid and Secure Vehicle Connectivi...CyberHive Offers High Performance VPN for Rapid and Secure Vehicle Connectivi...
CyberHive Offers High Performance VPN for Rapid and Secure Vehicle Connectivi...
online Marketing
 
BASS Company profile
BASS Company profileBASS Company profile
BASS Company profile
Rasheed Al Sulh
 
Io t solutions schildknecht ag en_2021
Io t solutions schildknecht ag en_2021Io t solutions schildknecht ag en_2021
Io t solutions schildknecht ag en_2021
Dhilan Atapattu
 
Io t solutions schildknecht ag en_2021
Io t solutions schildknecht ag en_2021Io t solutions schildknecht ag en_2021
Io t solutions schildknecht ag en_2021
DhilanAtapattu1
 
DVCOM
DVCOMDVCOM
DVCOM
dvcom2
 
DVCOM
DVCOMDVCOM
DVCOM
dvcom2
 
IoT Products
IoT Products IoT Products
IoT Products
prasanna112
 
Secure your Business
Secure your BusinessSecure your Business
Secure your Business
VASCO Data Security
 
Orbit-Company Profile 2015
Orbit-Company Profile 2015Orbit-Company Profile 2015
Orbit-Company Profile 2015Tarek Medini
 
CONCIEL Security Systems V2 (002)
CONCIEL Security Systems V2 (002)CONCIEL Security Systems V2 (002)
CONCIEL Security Systems V2 (002)Riad MAALOUF
 
Vizocom Company Overview
Vizocom Company OverviewVizocom Company Overview
Vizocom Company Overview
Dino Sergio
 
DIGIPASS for Apps
DIGIPASS for AppsDIGIPASS for Apps
DIGIPASS for Apps
VASCO Data Security
 
DMCOM_capability statement_v1
DMCOM_capability statement_v1DMCOM_capability statement_v1
DMCOM_capability statement_v1Rudy Moniaga
 

Similar to Proximity LLC Mobile Intelligence (20)

Manley Solutions M2M Strategy 2013
Manley Solutions M2M Strategy 2013Manley Solutions M2M Strategy 2013
Manley Solutions M2M Strategy 2013
 
LIGHTHOUSE INTEGRATED PROFILE
LIGHTHOUSE INTEGRATED PROFILELIGHTHOUSE INTEGRATED PROFILE
LIGHTHOUSE INTEGRATED PROFILE
 
LIGHTHOUSE INTEGRATED PROFILE
LIGHTHOUSE INTEGRATED PROFILELIGHTHOUSE INTEGRATED PROFILE
LIGHTHOUSE INTEGRATED PROFILE
 
Sly presentation ver 2.0
Sly presentation ver 2.0Sly presentation ver 2.0
Sly presentation ver 2.0
 
I3 Technologies Corporation Profile
I3 Technologies Corporation ProfileI3 Technologies Corporation Profile
I3 Technologies Corporation Profile
 
M I Dentity 3 G 040111
M I Dentity 3 G 040111M I Dentity 3 G 040111
M I Dentity 3 G 040111
 
CyberHive Offers High Performance VPN for Rapid and Secure Vehicle Connectivi...
CyberHive Offers High Performance VPN for Rapid and Secure Vehicle Connectivi...CyberHive Offers High Performance VPN for Rapid and Secure Vehicle Connectivi...
CyberHive Offers High Performance VPN for Rapid and Secure Vehicle Connectivi...
 
BASS Company profile
BASS Company profileBASS Company profile
BASS Company profile
 
Io t solutions schildknecht ag en_2021
Io t solutions schildknecht ag en_2021Io t solutions schildknecht ag en_2021
Io t solutions schildknecht ag en_2021
 
Io t solutions schildknecht ag en_2021
Io t solutions schildknecht ag en_2021Io t solutions schildknecht ag en_2021
Io t solutions schildknecht ag en_2021
 
DVCOM
DVCOMDVCOM
DVCOM
 
DVCOM
DVCOMDVCOM
DVCOM
 
IoT Products
IoT Products IoT Products
IoT Products
 
Secure your Business
Secure your BusinessSecure your Business
Secure your Business
 
Tranter it project new quote
Tranter it project new quoteTranter it project new quote
Tranter it project new quote
 
Orbit-Company Profile 2015
Orbit-Company Profile 2015Orbit-Company Profile 2015
Orbit-Company Profile 2015
 
CONCIEL Security Systems V2 (002)
CONCIEL Security Systems V2 (002)CONCIEL Security Systems V2 (002)
CONCIEL Security Systems V2 (002)
 
Vizocom Company Overview
Vizocom Company OverviewVizocom Company Overview
Vizocom Company Overview
 
DIGIPASS for Apps
DIGIPASS for AppsDIGIPASS for Apps
DIGIPASS for Apps
 
DMCOM_capability statement_v1
DMCOM_capability statement_v1DMCOM_capability statement_v1
DMCOM_capability statement_v1
 

Recently uploaded

A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
sonjaschweigert1
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Aggregage
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
Product School
 
Welocme to ViralQR, your best QR code generator.
Welocme to ViralQR, your best QR code generator.Welocme to ViralQR, your best QR code generator.
Welocme to ViralQR, your best QR code generator.
ViralQR
 
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfSAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
Peter Spielvogel
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
RinaMondal9
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Ramesh Iyer
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
Ralf Eggert
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 

Recently uploaded (20)

A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
Welocme to ViralQR, your best QR code generator.
Welocme to ViralQR, your best QR code generator.Welocme to ViralQR, your best QR code generator.
Welocme to ViralQR, your best QR code generator.
 
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfSAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 

Proximity LLC Mobile Intelligence

  • 2. The Proximity Platform Proximity will deliver a unique user experience Space Planning Apply our Technology Mobile Applications
  • 3. Space Planning Network Discovery Our technology is based on patented security
  • 4. To initiate network discovery and space planning, a proposed network diagram which lays out PROXiMITTER™ devices in strategic locations is illustrated. Space Planning Network Discovery
  • 5. Proposed Security on Devices • Security available on the devices – Embedded security on devices – Mobile security on the iOS and Android devices • Consumer Analytics – Customer information is protected. Prevents identity theft.
  • 10. Security Patented Data Encryption Proximity leverages Secure Channels patented encryption on all its product offerings. SECURE CHANNELS SA Secure Channels is a Swiss company that licenses patented encryption technology for data storage and communications.
  • 11. Apply our technology We can apply our geolocation technology to indoor and outdoor settings
  • 12.  Proximity’s geolocation technology is a hybrid of networking devices that is capable of bringing a new and innovative traveler or visitor experience to Airport Terminals.  Our platform provides intelligence through sensing proximity wi-fi and bluetooth devices. Our PROXiMITTER devices communicate signals to our secure cloud servers even through in-house networking infrastructure.  The result is a seamless deployment of our platform. Proximity can co-exist with existing wi-fi networks securing its data through Secure Channel’s patented data encryption. Secure Geolocation Our Technology
  • 13. We make our technology work - this is what our customers are expecting. We focus on the customer experience
  • 14. Mobile Applications A unique experience through iPhone and Android mobile apps
  • 15.  Proximity will deliver a secure and innovative customer mobile application designed to bring a unique experience to every mobile or device user.  Our mobile application strategy begins with a feature set or collection of the customer’s business or organizational highlights.  The application will feature a product or service list display, coupon or ticket management and emergency security notifications (for property management) all integrated with Proximity’s secure geolocation application. Mobile Applications Strategy
  • 17. Our customers deserve unparalleled quality in technology and innovation which can only be delivered by Proximity. Secure and Intelligent Mobile Apps - Proximity