connection

Results 126 - 150 of 435Sort Results By: Published Date | Title | Company Name
By: Equinix     Published Date: Jul 06, 2016
This paper revelas how Equinix empowers a leading provider of digital supply chain solutions to transform your industry’s business model via a scalable and robust interconnection solution.
Tags : customer experience, customer relationship, content management, content digital media
     Equinix
By: Equinix     Published Date: Jul 13, 2016
This paper revelas how Equinix empowers a leading provider of digital supply chain solutions to transform your industry’s business model via a scalable and robust interconnection solution.
Tags : customer experience, customer relationship, content management, content digital media
     Equinix
By: Equinix     Published Date: Jul 08, 2016
This paper revelas how Equinix empowers a leading provider of digital supply chain solutions to transform your industry’s business model via a scalable and robust interconnection solution.
Tags : customer experience, customer relationship, content management, content digital media
     Equinix
By: Cisco     Published Date: Sep 16, 2015
We’re experiencing a disruptive period of data transformation—and managing today’s database infrastructures during this disruptive period is not only critically important, but also more challenging than ever. An historic growth in data and cutting-edge technology trends, like the Internet of Everything, is causing an explosion in connections and data creation that is reshaping everything we do.
Tags : enterprise, policy-based, infrastructure, cloud, visibility, scalability
     Cisco
By: MessageLabs     Published Date: Jul 16, 2009
What you don't know can destroy your business. It's hard to imagine modern business without the internet but in the last few years it has become fraught with danger. Internet crooks are the dotcom entrepreneurs of crime, using the power of computers and the interconnections of the network against innocent businesses to make money. Learn more today!
Tags : messagelabs, email security, web security, virus, spam, spyware, phishing
     MessageLabs
By: KPMG     Published Date: Jul 11, 2018
Despite multi-billions of investment, only a small number of UK firms succeed in making customer experience a source of value. How can you join them and get CX investments flowing through to your bottom line? Read this report to understand: • how CX leaders are reappraising organisational structures to get closer to the customer • what four key principles they follow to build a connected customer experience • how they are using events in customers’ lives to drive innovation and set new standards in customer experience • how the connections enabled by CX platforms work as a springboard for success.
Tags : 
     KPMG
By: Cisco     Published Date: Jun 24, 2015
This paper reveals how new Fast IT model enables IT departments to shift focus from spending too much time keeping the lights on to capturing the value of today’s connections and preparing for the future.
Tags : fast it, it departments, it professionals, roadmap
     Cisco
By: Lane Telecommunications     Published Date: Apr 14, 2009
The fax market is changing significantly though not in the way predicted by many. Far from an inevitable decline brought about by the emergence of e-mail, the demand for fax, particularly from larger companies, is actually growing. The way that fax is managed within the business is also undergoing a significant period of transition.
Tags : kudos, lane, lane telecommunications, fax over ip, foip, ip network, integrated business communications, integrated ip
     Lane Telecommunications
By: Teradata     Published Date: Mar 10, 2014
A look at the importance of customer data-who they are, what they do, what they're interested in, what motivates them-in creating a holistic customer view. This paper looks at how data-driven marketing creates more loyal and more satisfied customers.
Tags : teradata, customer view, data-driven marketing, loyalty, customer satisfaction, analytics, customer engagement, digital marketing
     Teradata
By: SilkRoad Technology     Published Date: Feb 24, 2016
For decades, learning in a corporate environment consisted of a day or a week of classroom-based training. However, technological advances delivered on the promise of a more complex learning protocol with automated, virtual, and experiential elements. At Connections 2014, SilkRoad’s annual user conference, a panel of learning professionals convened to discuss five major learning themes this year, including integration, mobility, engagement, compliance, and analytics.
Tags : silkroad, human resources, industry trend, learning
     SilkRoad Technology
By: Pure Storage     Published Date: Nov 02, 2017
FlashBlade fabric modules implement a unified network that connects all blades to each other and to the data center network. With full connectivity, all blades can serve as client connection endpoints, as authorities that process client requests, and as storage managers that transfer data to and from flash and NVRAM.
Tags : storage systems, network, hardware components, architectural, storage software, integrated software
     Pure Storage
By: Forcepoint     Published Date: May 14, 2019
2018 NSS Labs SD-WAN Group Test In this report, NSS Labs simulated an enterprise network that has branches connected to a data center through two links: an MPLS line and a commercial broadband connection. They reviewed a select number of vendors, testing their throughput performance, video quality and VoIP quality as well as security effectiveness. NSS Labs verified that Forcepoint NGFW handled all of their use cases and offers all the operational capabilities that they recommend as necessary for SD-WAN as well as scoring 100% across all security tests, blocking all evasion techniques. “Forcepoint is one of the few vendors to support all of the use cases and capabilities we tested as well as strong security in their SD-WAN solution. They should be on the short list for any organization that’s looking to connect and protect their distributed enterprise.” - Vikram Phatak, CEO, NSS Labs Read the report and learn how Forcepoint delivers SD-WAN with enterprise scale and security to ma
Tags : 
     Forcepoint
By: Forcepoint     Published Date: May 14, 2019
2018 NSS Labs SD-WAN Group Test In this report, NSS Labs simulated an enterprise network that has branches connected to a data center through two links: an MPLS line and a commercial broadband connection. They reviewed a select number of vendors, testing their throughput performance, video quality and VoIP quality as well as security effectiveness. NSS Labs verified that Forcepoint NGFW handled all of their use cases and offers all the operational capabilities that they recommend as necessary for SD-WAN as well as scoring 100% across all security tests, blocking all evasion techniques. “Forcepoint is one of the few vendors to support all of the use cases and capabilities we tested as well as strong security in their SD-WAN solution. They should be on the short list for any organization that’s looking to connect and protect their distributed enterprise.” - Vikram Phatak, CEO, NSS Labs Read the report and learn how Forcepoint delivers SD-WAN with enterprise scale and security to ma
Tags : 
     Forcepoint
By: Forcepoint     Published Date: May 14, 2019
2018 NSS Labs SD-WAN Group Test In this report, NSS Labs simulated an enterprise network that has branches connected to a data center through two links: an MPLS line and a commercial broadband connection. They reviewed a select number of vendors, testing their throughput performance, video quality and VoIP quality as well as security effectiveness. NSS Labs verified that Forcepoint NGFW handled all of their use cases and offers all the operational capabilities that they recommend as necessary for SD-WAN as well as scoring 100% across all security tests, blocking all evasion techniques. “Forcepoint is one of the few vendors to support all of the use cases and capabilities we tested as well as strong security in their SD-WAN solution. They should be on the short list for any organization that’s looking to connect and protect their distributed enterprise.” - Vikram Phatak, CEO, NSS Labs Read the report and learn how Forcepoint delivers SD-WAN with enterprise scale and security to ma
Tags : 
     Forcepoint
By: Genesys     Published Date: Jun 13, 2018
Ease, effectiveness and emotion drive great customer service, but top-line growth requires that application development and delivery (AD&D) professionals keep an eye on trends. Forrester Research has identified 10 customer service trends in 2018 for AD&D and others who support customer service. Before you strategize on improving your quality of service, read this Forrester Report by Vice President and Principal Analyst Kate Leggett. You’ll learn which investments are critical and the advantages of: • Focusing on context and inquiry type to deliver the best customer experience • Using automation and AI to uncover new revenue streams and transform operations • Exploring new labor models to maximize human connections in a digital world
Tags : customer service, ease, effectiveness, automation
     Genesys
By: Genesys     Published Date: Jul 13, 2018
Ease, effectiveness and emotion drive great customer service, but top-line growth requires that application development and delivery (AD&D) professionals keep an eye on trends. Forrester Research has identified 10 customer service trends in 2018 for AD&D and others who support customer service. Before you strategize on improving your quality of service, read this Forrester Report by Vice President and Principal Analyst Kate Leggett. You’ll learn which investments are critical and the advantages of: • Focusing on context and inquiry type to deliver the best customer experience • Using automation and AI to uncover new revenue streams and transform operations • Exploring new labor models to maximize human connections in a digital world
Tags : 
     Genesys
By: Oracle     Published Date: Sep 30, 2014
Read this report by Forrester Research, Inc. for a better understanding of customer life-cycle marketing systems, a look at the landscape of CLCMS technology providers, and key recommendations for CMOs to prepare for and adopt these new but necessary tools. Fragmentation of the customer journey, due to the growth of digital channels, platforms and content, has forced marketing to be more relevant and responsive. In this paper, Forrester calls on CMOs to adopt the customer life-cycle as a guiding framework and deploy “customer life-cycle marketing systems” (CLCMS). Learn more by downloading the report.
Tags : oracle, marketing, cloud, connected, customer, modern, optimize, marketing
     Oracle
By: SilkRoad Technology     Published Date: Feb 24, 2016
At Connections 2014, SilkRoad’s annual user conference, a panel of human resources professionals convened to discuss timely onboarding issues including automation, socialization, duration, and ownership.
Tags : silkroad, human resources, onboarding, hr professional
     SilkRoad Technology
By: Fortinet EMEA     Published Date: Nov 26, 2018
Endpoint devices continue to be one of the favorite targets for cyberattacks. A successfully compromised laptop provides a foothold for a threat to move laterally and infect other endpoints within the organization. To address this critical vulnerability, security leaders must integrate endpoint security into their broader network security architecture. A deep connection between endpoint and network security offers key improvements to holistic enterprise protection. It provides risk-based visibility of all endpoint devices, establishes policy-based access controls, enables real-time threat intelligence sharing, and automates security responses and workflows for effective and efficient protection that conserves time and money.
Tags : 
     Fortinet EMEA
By: VMware Citrix     Published Date: Jan 23, 2018
VMware Horizon and Workspace ONE is the most complete solution for delivering, managing, and protecting Windows desktops, applications, and online services across devices, locations, media, and connections. To learn more about how Workspace ONE delivers and manages any device by integrating identity, application, and enterprise mobility management: Visit http://www.vmware.com/products/horizon
Tags : vmware, horizon, workspace, delivering, managing, applications, desktop, online services
     VMware Citrix
By: NextGen     Published Date: Jan 29, 2015
Congratulations! You're on the right path toward a more flexible, powerful HIE solution (and greater peace of mind). The thought of moving to a new HIE solution can be tough. But as one of our new replacement clients, Rob Hack, Executive Director at HealtheConnections, recently said "The risk of doing nothing was far greater than the risk of making a switch." Hear some real client examples in our next communications.
Tags : mirth, data, healthcare, practitioners, insurers, billing/scheduling, systems, health
     NextGen
By: Symantec     Published Date: Oct 01, 2015
The foundation of trusted Internet communications are Secure Socket Link (SSL) certificates, an encryption technology installed on Web servers that permits transmission of sensitive data through an encrypted connection. Using a public-key infrastructure (PKI), SSL certificates authenticate the end-use Website and the endpoint server, making it difficult for those sites to be imitated or forged.The acquisition of SSL certificates should always be a relatively easy experience; however, the purchasing decision should never be regarded lightly. When businesses consider SSL certificates; there six Golden Rules a purchaser should keep in mind. This whitepaper provides an overview of the SSL certificated market, the six golden rules of purchasing SSL certificates and how Symantec addresses each of the golden rules. At the end of the day, people want to make sure their Web sites are secured with as little friction as possible—Symantec gives businesses every opportunity to achieve that goal.
Tags : ssl certificates, public-key infrastructure, web servers, website security, sensitive data, encrypted connection, security
     Symantec
By: Lookout     Published Date: Aug 28, 2017
Mobile devices have rapidly become ground zero for a wide spectrum of risk that includes malicious targeted attacks on devices and network connections, a range of malware families, non-compliant apps that leak data, and vulnerabilities in device operating systems or apps. Read the four mobile security insights CISOs must know to prepare for a strategic conversation with the CEO and board about reducing mobile risks and the business value associated with fast remediation of mobile security incidents.
Tags : mobile security, mobile risks, device attacks, network attacks, malware attack
     Lookout
By: Amazon Web Services     Published Date: Sep 05, 2018
Today’s businesses generate staggering amounts of data, and learning to get the most value from that data is paramount to success. Just as Amazon Web Services (AWS) has transformed IT infrastructure to something that can be delivered on-demand, scalably, quickly, and cost-effectively, Amazon Redshift is doing the same for data warehousing and big data analytics. Amazon Redshift offers a massively parallel columnar data store that can be spun up in just a few minutes to deal with billions of rows of data at a cost of just a few cents an hour. Organizations choose Amazon Redshift for its affordability, flexibility, and powerful feature set: • Enterprise-class relational database query and management system • Supports client connections with many types of applications, including business intelligence (BI), reporting, data, and analytics tools • Execute analytic queries in order to retrieve, compare, and evaluate large amounts of data in multiple-stage operations
Tags : 
     Amazon Web Services
By: Phoenix Contact USA     Published Date: Nov 09, 2010
A WirelessHART gateway with WLAN connection means better communication, flexibility and increased efficiency for your HART sensor network.
Tags : industrial wireless technology, wirelesshart, wirelesshart gateway
     Phoenix Contact USA
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search White Papers      

Add White Papers

Get your white papers featured in the insideHPC White Paper Library contact: Kevin@insideHPC.com