it capabilities

Results 301 - 325 of 1239Sort Results By: Published Date | Title | Company Name

Payment and Commerce Digital Edge Playbook

Published By: Equinix EMEA     Published Date: Mar 21, 2019
The Digital Edge Playbook for Payments and Commerce outlines how industry leaders are transforming their digital edge to leverage an ecosystem-based value chain for real-time insights and a frictionless experience. Our simple, three-step strategy offers proven best practices on how to re-architect your presence, integrate cloud and SaaS capabilities and enable new offerings based on interconnected collaboration. Download this whitepaper today to find out more.
Tags : 
    
Equinix EMEA

Top commercial fleet management trends powered by location technology

Published By: HERE Technologies     Published Date: Feb 13, 2019
Discover the four big trends in fleet management being powered by location services. Trends to help you differentiate your solutions and enable transportation companies to overcome their logistical challenges and increase asset utilization. Discover what’s making the biggest impact, together with how, by integrating some of these trends into your solutions, you can position yourself as the service provider of choice in fleet and transportation management solutions. And find out how HERE is delivering features, from comprehensive mapping capabilities and real-time location data, to truck-specific attributes, to help you do just that. Download the eBook now
Tags : 
location data, transport & logistics, location services
    
HERE Technologies

Cisco Open Network Architecture

Published By: Cisco     Published Date: Sep 17, 2015
This paper illustrates how Cisco Open Network architecture for service providers supports the software-driven applications, cloud capabilities, and business models that help you seize opportunities and get ahead.
Tags : 
cisco open network architecture, apis, service providers, virtualization, cloud computing, infrastructure, ip networks, network architecture
    
Cisco

Small bank leverages HP Converged Infrastructure for high performance

Published By: HPE     Published Date: Jun 06, 2016
This case study reveals how HP Converged Infrastructure is an essential part of robust business continuity planning and disaster recovery capabilities.
Tags : 
hpe converged infrastructure, high performance, hpe, converged infrastructure, virtualization, cloud computing, infrastructure, infrastructure management
    
HPE

Aerospace & Defense: Digital Continuity Throughout Production

Published By: Dassault Systèmes     Published Date: Sep 22, 2017
The business models of Aerospace and Defense manufacturers often derive revenue from a number of sources including aircraft and completions as well as aftermarket business. The shop floor affects two of these key sources of revenue. In order to grow the business organically, while maintaining margins, the enterprise needs to deliver more, through the implementation of unprecedented levels of flexible production. Download this white paper to find out how the unique capabilities of DELMIA make it possible to manage change along the value stream, from engineering design to shop-floor work instructions.
Tags : 
aerospace, aviation, manufacturing, product development, plm, product lifecycle management, automation, data
    
Dassault Systèmes

MEETING THE CHALLENGES OF CHANGE AND COMPLEXITY WITH FABRICATION PLANNING

Published By: Dassault Systèmes     Published Date: Sep 22, 2017
The view ahead for the aerospace and defense industry shows us growth and change. Air traffic has been following a pattern of steady increase that calls for larger aircraft fleets. At the same time, OEMs and suppliers are under mounting pressure to simplify processes, reduce costs and move products to market more quickly – while remaining in compliance with changing environmental regulations. Download this white paper to find out how the unique capabilities of DELMIA make it possible to manage change along the value stream, from engineering design to shop-floor work instructions.
Tags : 
aerospace, aviation, manufacturing, product development, plm, product lifecycle management, automation, data
    
Dassault Systèmes

Deluxe Corporation Transforms Business Model With Hitachi Managed Cloud Solutions and Hitachi UCP

Published By: Hitachi Vantara     Published Date: Mar 21, 2018
Challenge: Ensure that technology infrastructure will support business transformation, new growth and services. Solution: Implement highly automated converged infrastructure and managed cloud services from Hitachi Vantara. Outcomes: Use new capabilities to integrate acquired companies, deploy next-generation security and speed time to the market.
Tags : 
    
Hitachi Vantara

Location Platform Index: Mapping and Navigation, 1H18

Published By: HERE Technologies     Published Date: Sep 05, 2018
Ovum's 1H18 Location Platform Index is a tool that assesses and ranks the major vendors in the location platform market, with particular reference to the mapping and navigation space. The index evaluates vendors on two main criteria: the completeness of their platform and their platform's market reach. It considers the core capabilities of a location platform along with the information that the platform opens to developers and the wider location community. The index provides an overview of the market and assesses the strengths and weaknesses of each player. It also highlights the key trends in the mapping space that vendors must keep up with if they want to stay ahead of the game.
Tags : 
    
HERE Technologies

Connected Public Safety Agency WP

Published By: Cisco     Published Date: Nov 18, 2015
According to the United Nations, on average, more than 200 million people were affected and more than 70,000 were killed by natural disasters annually. Given the fact that one of the primary responsibilities of government is to protect the public and minimize the effects of such calamities, citizens now demand that public-sector safety organizations be proactive, and respond promptly and effectively to all types of crisis situations, including catastrophes, terror events, and threats to critical infrastructure. To effectively respond to these challenges, public safety agencies must be able to rely on secure networks with integrated voice, video, and data capabilities. With these networks and their associated assets, agencies can obtain more timely and accurate information, enhancing situational awareness and improving response times.
Tags : 
cisco, public safety, disaster response, networking, security
    
Cisco

On-Demand Webinar: Threats on the Inside

Published By: Mimecast     Published Date: Jan 17, 2019
Two-thirds of all internally generated email sent is from employees communicating within an organization*. Yet most IT organizations only focus on inbound email when it comes to protecting against cyber-attacks. In doing so, they ignore the serious risks posed by internal and outbound emails and the actions of two at risk groups of users - the compromised and careless employee. Mimecast Internal Email Protect extends the security capabilities of Targeted Threat Protection to provide advanced inside-the-perimeter defenses. Watch this on-demand webinar where Mimecast’s Chief Trust Officer, Marc French, and Cyber Security Strategist, Bob Adams discuss: The top things to do to optimize your Targeted Threat Protection implementation and prepare for addressing the threats on the inside. The multiple ways internal email threats start, and why human error nearly always plays a role. The scale and impact of attacks that spread via internal email. How to extend your current protection with Mim
Tags : 
    
Mimecast

Embedded Analytics: What it is and why you Should Care

Published By: Logi Analytics     Published Date: Jan 12, 2016
This informative white paper highlights analytics tools, placing utmost importance on correctly enabling embedded analytics for competitive advantage.
Tags : 
embedded analytics, analytic tools, analytics, data, collect data, reports, application integration, analytical applications
    
Logi Analytics

Top Ten Best Practices in Embedded Analytics

Published By: Logi Analytics     Published Date: Jan 12, 2016
Access this resource for the top 10 reasons why embedded analytics will bolster your existing business applications, and see real ways your operations can benefit from such insights.
Tags : 
embedded analytics, analytic tools, analytics, data, collect data, reports, application integration, business analytics
    
Logi Analytics

TechTarget: 4 Strategies for Keeping Critical Networks Secure

Published By: Juniper Networks     Published Date: Feb 01, 2016
Juniper’s integrated security solutions are known for successfully protecting some of the world’s most demanding mission-critical environments, based on four core criteria from TechTarget: Breadth of capabilities in one solution Mission-critical performance and reliability Threat intelligence: open source and expertise
Tags : 
    
Juniper Networks

The IoT Imperative for Consumer Industries

Published By: SAP     Published Date: Nov 22, 2017
Consumer industries are facing once in a lifetime changes in the way they engage and interact with their customers and consumers. Whether consumer products, retail, or wholesale, there are two broadly unifying trends. First, consumers have both heightened influence and increased expectations. Second, several largely untapped digital technologies have the potential to enable new capabilities to better satisfy customer needs. For the key consumer industries of agribusiness, consumer products, life sciences, retail, and wholesale, the Internet of Things (IoT) will enable many new opportunities. These industries have a shared goal and challenge: to be able to create and offer engaging end consumer and/or customer experiences at scale. Part of the way that companies will achieve this goal and respond to this challenge is by developing digital transformation (DX) strategies. Such strategies enable new and potentially disruptive capabilities with a broad range of technologies.
Tags : 
consumer, industries, interactions, customers, products, retails, wholesale, influence
    
SAP

Technology That Powers Your Hotel Operations and Distribution

Published By: Oracle     Published Date: Nov 02, 2016
This whitepaper provides an overview of Oracle OPERA Cloud platform, the key business processes it enables, the key capabilities the platform offers, and the benefits for hoteliers.
Tags : 
    
Oracle

The Science of Client Insight: Increase Financial Services Revenue Through Improved Engagement

Published By: IBM     Published Date: Jul 21, 2016
This e-book explores the many uses of client insights for banking and wealth management. By using sophisticated analytics and cognitive capabilities, your organization can gain deep understanding of what matters most to your clients. Knowing them well helps to provide targeted, personalized service that they value and increases their loyalty. It’s a smart pathway for reducing churn and generating new revenue models through meaningful cross-selling opportunities in today’s customer-centric world.
Tags : 
ibm, banking, client insight, financial services, engagement, client insights, knowledge management, enterprise applications
    
IBM

IBM i2 Enterprise Insight Analysis for Cyber Intelligence

Published By: IBM     Published Date: May 26, 2017
Securing your infrastructure, your customer interactions and protecting your data are critical to preserving your reputation and your bottom line. Many cyber attacks remain undetected for up to eight months1 and can cost an organization an average of 11 million USD.2 Today’s cyber actors are becoming more sophisticated, agile and capable of getting past any network security. Organizations must evolve, replacing traditional defensive security strategies with a proactive, intelligence-driven offense to prevent and disrupt these threats. IBM® i2® Enterprise Insight Analysis is a next generation intelligence solution that enables organizations to incorporate cyber threat hunting into their security strategy and turn their defense into a proactive offense.It helps organizations uncover critical insights about their threats and threat actors so they can mitigate and counter more threats with a combination of multi-dimensional visualte analysis capabilities
Tags : 
ibm, ibm i2, cyber security, customer interaction, enterprise insight analysis
    
IBM

Intelligence-Led Security

Published By: IBM     Published Date: May 26, 2017
A significant challenge for many organizations has been enabling their analysts to find the "unknown unknown." Whether that unknown is malware lurking within the enterprise or within slight variations in fraudulent transactions, the result has been the same: enterprises continue to fall victim to cybercrime. IBM is addressing this challenge with IBM i2 Enterprise Insight Analysis. By pairing multi-dimensional visual analysis capabilities with powerful analytics tools, IBM is giving the analyst team an effective early-detection, cyberintelligence weapon for its arsenal.
Tags : 
security. ibm, ibm i2, cyber-intelligence, fraud, malware
    
IBM

IBM i2 Analyst’s Notebook Premium

Published By: IBM     Published Date: Jul 26, 2017
This white paper is intended for: • Potential users such as analysts and investigators who want information about i2 Analyst’s Notebook Premium and the benefits it provides • System administrators who wish to gain a high-level understanding of the product and the system prerequisites that are needed to install and run the application • Users who wish to learn how to exploit the maximum value of i2 Analyst’s Notebook Premium. This document provides an overview of the i2 Analyst’s Notebook Premium product. For more information on product features and capabilities in specific versions visit: ibm.com/smartercities.
Tags : 
ibm product, analyst notebook premium, product capabilities, information analysis
    
IBM

Tolly Evaluation: IBM Security Access Manager

Published By: IBM     Published Date: Oct 26, 2017
Web applications are often the most vulnerable part of a company’s infrastructure and yet are typically given direct paths to the internet, thus leaving these vulnerabilities exposed. IBM commissioned Tolly to evaluate IBM Security Access Manager for its Web protection effectiveness and performance as well as its identity federation, risk management and mobile one-time password capabilities. Tolly found that IBM Security Access Manager provided effective, high-performance threat protection while conveniently providing identity federation features and flexible risk-based access options.
Tags : 
access manager, identity federation, risk management, authentication capabilities, threat protection
    
IBM

How to Integrate Machine Vision into Industrial Systems

Published By: Intel     Published Date: Feb 28, 2019
The confluence of AI and Industry 4.0 is transforming image processing. As image vision becomes widespread, there is an increasing need to transition stand-alone imaging to an integrated driver of automation feeding insights back into the business systems that monitor overall factory performance. Download the whitepaper to learn more about fitting multiple demands into a single platform— • Building an industrial system with advanced functions like machine vision and Industry 4.0 connectivity • Minimizing the footprint of the systems to save space, cost and power consumption • Adhering to principles of long life, safety, reliability, real-time control functionality alongside AI and IIOT capabilities
Tags : 
    
Intel

XtremIO 15 Minute Guide

Published By: EMC Corporation     Published Date: Nov 07, 2014
Opportunities to truly innovate are rare. Yet today, flash technology has created the opportunity to not only deliver massive I/O performance, but to transform ease-of-use, array capabilities, and business value. Welcome to the all-flash storage array from EMC XtremIO - where unimaginable performance is only the start.
Tags : 
flash technology, i/o performance, ease-of-use, array capabilities, business value, enterprise applications
    
EMC Corporation

Top 5 Reasons Why XtremIO for Oracle DBA Productivity

Published By: EMC Corporation     Published Date: Nov 07, 2014
XtremIO all-flash-arrays (AFAs) are engineered for Oracle DBA requirements through a powerful, vastly simplified scale-out performance architecture, with unique compression, deduplication and snapshot capabilities.
Tags : 
performance architecture, unique compression, deduplication, snapshot capabilities, all-flash-arrays, enterprise applications
    
EMC Corporation

Magic Quadrant for WAN Optimization Controllers

Published By: Blue Coat Systems     Published Date: Jul 05, 2011
The wide-area network optimization controller market is maturing rapidly, but remains dynamic, with a high level of innovation from vendors. Organizations looking to acquire WOC capabilities should identify their specific needs and conduct real-life trials before committing to any purchase.
Tags : 
blue coat, wan optimization, secure web gateway, application performance monitoring, magic quadrant, optimization controllers, network performance management, wide area networks
    
Blue Coat Systems

IDC Marketscape – PSA ERP 2017 Report

Published By: Workday     Published Date: Mar 13, 2018
It’s important for services organizations to have a scalable ERP system that is easy to deploy and use. But figuring out which vendor best suits your specific needs can be a challenge. This IDC MarketScape report provides a look into the capabilities service organizations should expect from cloudenabled PSA ERP applications. Read an excerpt of the report to learn what it takes for an ERP system to lead your company into the future.
Tags : 
erp system, cloud, psa
    
Workday
Start   Previous    6 7 8 9 10 11 12 13 14 15 16 17 18 19 20    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.