connection

Results 276 - 300 of 433Sort Results By: Published Date | Title | Company Name
By: IBM APAC     Published Date: May 18, 2017
Technological advances are transforming the way we connect, disrupting the status quo and creating huge turbulence. Industries are converging, and new opportunities and threats are emerging, as never before. So how are CIOs managing their way through the mayhem? In the first installment of our latest C-suite Study, we interviewed 5,247 top executives to find out what they think the future holds and how they’re positioning their organizations to prosper in the “age of disruption.” This report delves more deeply into the views of the 1,805 CIOs who contributed to our research – and what the IT gurus of the most successful enterprises do differently.
Tags : insights, technology, cios
     IBM APAC
By: WiMAX 20/20     Published Date: Sep 27, 2007
This white paper presents how a radically consolidated, scalable core network architecture based on multi-core processor technology can significantly reduce the cost of the core network and thereby reducing the cost to serve the first WIMAX subscribers.
Tags : cost, cost efficient, cost efficiency, wimax, wireless connection, broadband, broadband wireless, dsl, cable, scalability, roi, wimax 20/20, wimax 2020
     WiMAX 20/20
By: Utimaco     Published Date: Aug 18, 2008
Most of today’s standards and compliance regulations are concerned largely with the protection of private data at rest, during transactions, and while it traverses network connections. Some of these regulations make specific recommendations or require particular technologies for compliance. For all of them, however, encryption can be employed to satisfy the protection requirements.
Tags : leak, leakage, data protection, pci, cardholder, cardholder data, utimaco, database security, data encryption, encryption, security
     Utimaco
By: HERE Technologies     Published Date: Dec 06, 2018
How can brands make the most of the growing opportunities offered by location data? Understanding location and its connection to customer behavior is key to gaining full and reliable insights and making efficient change. HERE is building and sharing real-time location intelligence which reveals why customers make transactions in specific places. HERE’s Open Location Platform contextualizes consumer motivations in the world around them. As the world’s leading location platform in 2018 (Source: Ovum and Counterpoint Research annual indexes) HERE also shares its own insights into the future of reaching customers on their mobile devices as they travel, including in-car advertising.
Tags : location data, ad tech, location targeting
     HERE Technologies
By: HERE Technologies     Published Date: Sep 26, 2018
How can brands make the most of the growing opportunities offered by location data? Understanding location and its connection to customer behaviour is key to gaining full and reliable insights and making efficient change. HERE is building and sharing real-time location intelligence which reveals why customers make transactions in specific places. HERE’s Open Location Platform contextualises consumer motivations in the world around them. As the world’s leading location platform in 2018 (Source: Ovum and Counterpoint Research annual indexes) HERE also shares its own insights into the future of reaching customers on their mobile devices as they travel, including in-car advertising.
Tags : 
     HERE Technologies
By: Epson     Published Date: Jun 22, 2018
Businesses like yours rely on e ective internal and external connections between employees to operate e ciently. But you might be discovering that the old ways of conveying important business messages are no longer enough for your sta . Relying only on telephone calls, email, and face-to-face meetings alone could be now considered a competitive disadvantage. It also makes it more di cult to attract top talent, and inhibits the communication speed most enterprises now require.
Tags : 
     Epson
By: Internet Security Systems     Published Date: Aug 21, 2009
Mobile and remote workers of all types need high-quality connections to the Internet and to their corporate networks. They need connections from branch offices, homes, airports, hotels and other locations around the world. This truly becomes a security challenge as network managers scramble to meet these needs.
Tags : mobile workforce, remote access, network security, wireless security, off-site, remote workers, internet security, internet security systems
     Internet Security Systems
By: IBM     Published Date: May 29, 2015
Learn how telecommunications providers can reboot the customer experience!
Tags : restoration, telecommunications, service providers, connection, communication, customer experience
     IBM
By: IBM     Published Date: Jul 31, 2015
Commoditization is a serious threat to the telecommunications industry. Most CSPs offer similar services at rates designed to win what has become a price war. As a result, many face decreasing margins and difficulty sustaining differentiation based on prices or products alone. On top of commoditization, CSPs also face competition from OTT providers and an increasingly knowledgeable and demanding customer base. With access to growing amounts of data from an ever-increasing number of sources and devices, today’s empowered, savvy consumers know what they want and expect to get it.
Tags : ibm, telco, csps, big data, commoditization, customer retention
     IBM
By: IBM     Published Date: Apr 26, 2016
Restoring connections: How telecommunications providers can reboot the customer experience IBM has more than 22,000 experts working in the Telecommunications industry, delivering solutions to more than 200 major communications service providers globally. IBM’s telecommunications capabilities are backed by a global network of telecom solution labs, research labs and innovation centers to support its offerings in the area of analytics, cloud, mobility, network optimization, digital transformation and global integration. IBM continues to invest significantly in key acquisitions to add expertise and capabilities that enable its clients in the telecommunications space.
Tags : ibm, ibm institute for business values, telecommunications, customer experience, communications service providers, csp, customer relationship
     IBM
By: Motorola Solutions     Published Date: Apr 26, 2019
Rosen Hotels & Resorts was looking to improve its two-way radio communications. The organization had an aging analog radio system to support its existing properties, with the main antenna located at its tallest building, the 24-story Rosen Centre Hotel. However, with the opening of a new property, Rosen Shingle Creek, the lack of wide area coverage became an immediate concern. Employees situated across departments such as catering, engineering and security, and subpar radio connections hindered collaboration and a real-time flow of information.
Tags : 
     Motorola Solutions
By: Saepio     Published Date: Apr 21, 2010
Brand marketers invest billions to create an emotional connection between their brand and prospective customers. As media fragments and customers increasingly engage with the brand in ways outside the direct control of the corporate marketer, brand positioning and messaging and the building of emotional connections with consumers becomes more challenging.
Tags : saepio, emm, roi, marketing process optimization, var, distribution, crm, mrm, distributed marketing, enterprise marketing management, campaign planning
     Saepio
By: Microsoft     Published Date: Jul 20, 2018
Imagine having a relationship with each of your customers that’s built on trust. If every one of your connections turned to you for help in solving their greatest challenges at every stage of the sales journey, what would that do to your bottom line? If you could provide every new prospect with relevant, useful insights that would make them more successful, how would your sales goals change? A new model is emerging in the sales landscape. The entire process looks vastly different than it did just a few years ago. Although that’s due in part to constantly evolving tools and technologies, the greater difference is in the mindsets of buyers. Understanding that mindset and catering to it is what catapults a successful seller into rock-star seller status. While this shift brings new possibilities, every stage of the selling process is also rife with new challenges. Greater access means more noise. Countless resources make it difficult to bring real value. These are just a few of the challen
Tags : 
     Microsoft
By: Scalebase     Published Date: Feb 19, 2013
This white paper examines how to scale MySQL databases to handle more users, more connections and more data without re-writing apps or re-architecting the database.
Tags : mysql, databases, users, data distribution, improve, performance
     Scalebase
By: Citrix Systems     Published Date: Jul 28, 2015
Organizations are looking to SDN to improve network agility by incorporating network automation in cloud computing platforms. So far the focus of SDN has been on L2-L3 switching and routing services. However applications don’t just need network connections. They also need L4-L7 network services.
Tags : 
     Citrix Systems
By: Juniper Networks     Published Date: Sep 10, 2014
Watch our Webinar to find out more about the capabilities offered by connecting networks to IT automation tools as well as capabilities offered by SDN solutions. Find out if you need to employ just one or both of these technologies.
Tags : sdn, network automation, it automation, network connection, sdn solutions, automation tools, it capabilities, networking, it management
     Juniper Networks
By: Kaseya     Published Date: Mar 12, 2015
As an IT professional, you know that when you have many users to support, every second counts! Slow remote desktop connection times and poor, unreliable connection performance can add up to significant time wasted when extended over days, weeks and months of remote control sessions.
Tags : desktop management, virtual system administrator
     Kaseya
By: Kaseya     Published Date: May 13, 2015
As an IT professional, you know that when you have many users to support, every second count. Your remote connection speed and reliability are critical to your ability to resolve issues quickly, maximizing IT efficiency and ensuring a happy and productive end user.
Tags : kaseya, hybrid, cloud, management, msp, mobile, big data
     Kaseya
By: SEEBURGER, Inc.     Published Date: Feb 16, 2012
Traditional methods of managing file transfers can't prevent or protect your enterprise from compliance violations: they're insecure, inefficient, and non-auditable.
Tags : seeburger, streamline, mft, managed file transfer, network connections, trading partners, security, business integration server
     SEEBURGER, Inc.
By: Identity Engines     Published Date: Mar 24, 2008
Guests, contractors, vendors, business partners, and other temporary users require and expect certain level of network access within organizations that they visit. Corporate network access has been typically open; internal LAN connections have seldom required authentication. Today however, regulatory and other security concerns demand that organizations adopt a more secure posture towards these short-term users.
Tags : idengines, id engines, identity engines, access control, authentication
     Identity Engines
By: Thawte     Published Date: Aug 08, 2013
"There are many reasons why now is the right time to make the move to Microsoft Exchange Server 2010,including a host of administration and security improvements. However, as with Microsoft Exchange Server 2007, Exchange 2010 requires SSL certificates to ensure the security of all connections to the email server. This guide from Thawte is designed to take the guesswork out of implementing SSL for Exchange 2010, making it easier than ever to get the SSL certificate you need for a successful and secure Exchange implementation, and to take advantage of powerful capabilities such as Subject Alternative Names (SANs)."
Tags : thawte, ssl certificate, application, web server, data collection, technology, encryption, security, data management
     Thawte
By: Centrify Corporation     Published Date: Jan 22, 2018
Centrify redefines security from a legacy static perimeter-based approach to protecting millions of scattered connections in a boundaryless hybrid enterprise. As the only industry recognized leader in both Privileged Identity Management and Identity-as-a-Service, Centrify provides a single platform to secure every user’s access to apps and infrastructure in today’s boundaryless hybrid enterprise through the power of identity services.
Tags : 
     Centrify Corporation
By: Acquia     Published Date: Feb 26, 2015
The impact of commerce on modern business is undeniable. From changing the retail experience to the introduction of pure pricing transparency, online shopping is now the primary way that brands interact with loyal and prospective customers. In this ebook, we’ll look at the trends sweeping over the commerce landscape and show you how you can take advantage of the content and commerce combination to sell your story.
Tags : audience segmentation, commerce-content connection, online shopping, acquia, it management, enterprise applications
     Acquia
By: LogMeIn Rescue     Published Date: Oct 21, 2013
Customer service has evolved from a reactive activity viewed largely as a cost center-based tactical necessity, to a proactive management task that can in many ways set a company apart from the competition. At the same time, the channels by which customers receive support are growing and fragmenting very rapidly. The telephone is still the primary mode of support, but is steadily declining as text, social media, chat, knowledge bases, email and online communities provide new avenues for customers to get the help they need. Some organizations are embracing this evolution by implementing technologies that enable them to interact with customers regardless of the channel or the device they’re using. This approach not only improves customer service, but also boosts the brand image and helps companies achieve broader business goals.
Tags : logmein, infoworld, customer service, customer support, support, support strategy, social media, mobile support, email support, remote pc access software, remote desktop connection, remote computer support, customer support channels
     LogMeIn Rescue
By: IBM     Published Date: Apr 23, 2008
Imagine using your personal desktop on any computer. You can, with the IBM Virtual Client Solution. This demo explains the backend process of server-hosted services, shows how a user’s desktop is delivered through a remote connection, and demonstrates how an administrator can shift servers for IT simplification without interrupting users.  Watch the demo now.
Tags : ibm, ibm opt it, opt it, remote desktop, vnc, virtual client, virtual machine, virtual desktop, remote access
     IBM
Start   Previous    4 5 6 7 8 9 10 11 12 13 14 15 16 17 18    Next    End
Search White Papers      

Add White Papers

Get your white papers featured in the insideHPC White Paper Library contact: Kevin@insideHPC.com