reach

Results 76 - 100 of 1523Sort Results By: Published Date | Title | Company Name

Location Platform Index: Mapping and Navigation (Key vendor rankings and market trends) 2018

Published By: HERE Technologies     Published Date: Dec 05, 2018
HERE was named the world’s leading location platform in 2018 (Source: Ovum), overtaking Google for the first time. Ovum’s Index assesses and ranks the major vendors in the location platform market. According to Ovum: ‘HERE has always scored well on the completeness of its offering, leading on this front for some time. Where it traditionally lagged Google was on the reach of its platform, but this has been steadily improving thanks to the wide range of verticals its platform addresses. An important factor in HERE topping the leader board has been its strong focus on the developer community.’
Tags : 
public sector, urbanization, traffic management
    
HERE Technologies

Mapping and Navigation (Key vendor rankings and market trends) 2018, Industry Report

Published By: HERE Technologies     Published Date: Dec 05, 2018
HERE was named the world’s leading location platform in 2018 (Source: Ovum), overtaking Google for the first time. Ovum’s Index assesses and ranks the major vendors in the location platform market. According to Ovum: ‘HERE has always scored well on the completeness of its offering, leading on this front for some time. Where it traditionally lagged Google was on the reach of its platform, but this has been steadily improving thanks to the wide range of verticals its platform addresses. An important factor in HERE topping the leader board has been its strong focus on the developer community.’
Tags : 
location data, transport & logistics, location services
    
HERE Technologies

How location data boosts ad relevance: a case study with adsquare

Published By: HERE Technologies     Published Date: Dec 06, 2018
adsquare offers brands insights into customer behaviors and footfall to underpin digital marketing campaigns. Using a detailed brief of the audience the brand wishes to reach, adsquare gathers data from a range of mobile, online and offline sources. This rich data gives a brand a stronger opportunity to create relevant campaigns for their audiences. It is critical to adsquare’s success that its data sources are reliable. As the world’s leading location platform in 2018 (Source: Ovum and Counterpoint Research annual indexes) HERE is building and sharing real-time location intelligence with adsquare which reveals patterns to show how and why customers make transactions in specific places.
Tags : 
location data, ad tech, location targeting
    
HERE Technologies

Relevance is everything infographic: How location data improves advertising efficiency

Published By: HERE Technologies     Published Date: Dec 06, 2018
How can brands make the most of the growing opportunities offered by location data? Understanding location and its connection to customer behavior is key to gaining full and reliable insights and making efficient change. HERE is building and sharing real-time location intelligence which reveals why customers make transactions in specific places. HERE’s Open Location Platform contextualizes consumer motivations in the world around them. As the world’s leading location platform in 2018 (Source: Ovum and Counterpoint Research annual indexes) HERE also shares its own insights into the future of reaching customers on their mobile devices as they travel, including in-car advertising.
Tags : 
location data, ad tech, location targeting
    
HERE Technologies

Simplify Your Network

Published By: Cisco     Published Date: Jun 21, 2016
Imagine you manage a warehouse for a small shipping firm. You have a simple job: route packages. But your employer expands to 25 western cities and 50 locations. After further expansion you now need to track packages coming by truck, rail, and plane and route them based on contents and weight to 10,000 different locations worldwide. While keeping traffic in and out tightly secured, making sure each package reaches its destination on time, and without going over budget.
Tags : 
    
Cisco

Credential Stuffing: A Security Epidemic

Published By: F5 Networks Inc     Published Date: Dec 08, 2017
The world set a new record for data breaches in 2016, with more than 4.2 billion exposed records, shattering the former record of 1.1 billion in 2013. But if 2016 was bad, 2017 is shaping up to be even worse. In the first six months of 2017, there were 2,227 breaches reported, exposing over 6 billion records and putting untold numbers of accounts at risk. Out of all these stolen records, a large majority include usernames and passwords, which are leveraged in 81 percent of hacking-related breaches according to the 2017 Verizon Data Breach Investigations Report. Faced with ever-growing concerns over application and data integrity, organizations must prioritize identity protection in their security strategies. In fact, safeguarding the identity of users and managing the level of access they have to critical business applications could be the biggest security challenge organizations face in 2017.
Tags : 
data breach, credential stuffing, system security, security
    
F5 Networks Inc

Preparing for the New OWASP Top 10

Published By: F5 Networks Inc     Published Date: Dec 08, 2017
There’s a reason why web application firewalls have been getting so much attention lately. It’s the same reason we keep hearing about major security and data breaches left, right, and center. Web application security is difficult—very difficult.
Tags : 
owasp, web application safety, data breaches, firewalls
    
F5 Networks Inc

30 seconds or less: How marketers can reach the ‘distracted consumer’

Published By: Oracle     Published Date: Feb 24, 2015
30 seconds or less. The average length of time that consumers spend reading or listening to online marketing communications . Marketers today are now equipped with the strategies and technologies to better capture consumer attention. To do this, they need to orchestrate individualized customer experiences across the digital channels. Read on for a statistical profile of today’s distracted consumer, followed by actionable tips for effectively communicating and converting this new type of consumer.
Tags : 
oracle, marketing, consumers, attention, message, distractions, communications, conversions
    
Oracle

Fitness Tips for the Mobile Organization

Published By: Lenovo and Intel®     Published Date: Apr 28, 2017
Learn the healthy habits for keeping your mobile workforce productive — and happy. • Focus on a brainpower boost • Sniff out the security threats • Embrace new options for workplace flexibility • Prepare for non-stop spine-tingling connectivity • Take a deep breath: durability is within reach Keep your mobile organization productive and secure with these quick tips. Read more now!
Tags : 
lenovo, mobile organization, fitness tips, mobile durability, productive organization, healthy mobile habits, workplace flexibility, non-stop connectivity
    
Lenovo and Intel®

Power Patient Engagement with Technology

Published By: Lenovo and Intel®     Published Date: Apr 28, 2017
Involved, informed patients are better able to manage their own care. Today’s technology plays a big role in helping patients to take ownership of their health and collaborate more closely with providers to achieve better outcomes. Here are 10 tips from Lenovo Health for putting technology to work to reach your patient engagement goals: • Mobile devices, tablets, and interactive technology improve the patient experience • Healthcare facilities can remotely monitor patient progress and health post-discharge • Providers can leverage patient portals and other tools to promote population health • Ensuring patient engagement success requires effective measurement • And more... Lenovo Health provides the solutions and expertise to help healthcare organizations engage patients and achieve the vision of customized care anywhere, from hospital to home. Are you meeting your patient engagement goals? Download this checklist now.
Tags : 
lenovo, lenovo health, healthcare, healthcare technology, improving patient experience, remote monitoring, lenovo health solutions, customized care
    
Lenovo and Intel®

Cybersecurity Challenges, Risks, Trends, and Impacts

Published By: Hewlett Packard Enterprise     Published Date: Mar 31, 2016
MIT Technology Review Survey: Executive Summary Are you prepared for the next breach? Only 6% of leaders say yes. Information security—or, the lack of it—is firmly on the radar for business and IT leaders in organizations of all sizes and in every sector. Many fear that their companies are ill-prepared to prevent, detect, and effectively respond to various types of cyberattacks, and a shortage of in-house security expertise remains of widespread concern. Those are among the initial findings of the Cybersecurity Challenges, Risks, Trends, and Impacts Survey, conducted by MIT Technology Review of approx. 225 business and IT executives, in partnership with Hewlett Packard Enterprise Security Services and FireEye Inc.
Tags : 
    
Hewlett Packard  Enterprise

Once More Unto the Breach: What It Takes to Defeat Cyberattackers

Published By: Hewlett Packard Enterprise     Published Date: Mar 31, 2016
Cyberattacks are now a fact of life. Yet detection still lags. In 2015, the median amount of time attackers spent inside organizations before detection was 146 days. Why are we so vulnerable? MIT Technology Review asks Andrzej Kawalec, chief technology officer for HPE Security Services and Marshall Heilman, vice-president and executive director at Mandiant, a FireEye company, what we can do to make our systems more secure.
Tags : 
    
Hewlett Packard  Enterprise

old asset

Published By: Oracle     Published Date: Jun 20, 2016
Research conducted by The Economist Intelligence Unit (EIU), sponsored by Oracle, provides answers. The results show that a proactive security strategy backed by a fully engaged C-suite and board of directors reduced the growth of cyber-attacks and breaches by 53% over comparable firms. These findings were compiled from responses by 300 firms, across multiple industries, against a range of attack modes and over a two-year period from February 2014 to January 2016. The lessons are clear. As cyber-attackers elevate their game, the response must be an enterprise solution. Only C-suites and boards of directors marshal the authority and resources to support a truly enterprise-wide approach. In sum, proactive cyber-security strategies, supported by senior management, can cut vulnerability to cyber-attack in half.
Tags : 
security, c-suite, data, cyber risk, enterprise, management, economist, intelligence unit
    
Oracle

IG Snapshots: What We Learned by Looking at Five Organizations' Information Governance Programs

Published By: OpenText     Published Date: Mar 13, 2017
This report from the Information Governance Initiative explores the challenges that five different organizations faced in reaching their information governance goals and how they overcame them.
Tags : 
ecm, content services, content marketing, ebook, information governance
    
OpenText

Endpoint Detection and Response: Automatic Protection Against Advanced Threats

Published By: CrowdStrike     Published Date: Oct 23, 2017
As damaging breaches continue to occur, more organizations are considering endpoint detection and response (EDR) solutions to address the incidents that aren't being handled adequately by their existing defenses. However, EDR solutions come in a wide variety of implementations and can vary significantly in scope and efficacy — choosing the best solution can be challenging. This white paper, “Endpoint Detection and Response: Automatic Protection Against Advanced Threats,” explains the importance of EDR, and describes how various approaches to EDR differ, providing guidance that can help you choose the product that's right for your organization. Read this white paper to learn: What makes EDR such a valuable addition to an organization's security arsenal and why finding the right approach is critical How the “EDR maturity model” can help you accurately evaluate vendor claims and choose the solution that best fits your organization’s needs How the CrowdStrike® EDR solution empowers organ
Tags : 
    
CrowdStrike

Online Team Collaboration: Reaching New Levels With an All-In-One Platform

Published By: Cisco Spark     Published Date: Feb 08, 2017
With today’s stratified business communications, small to midsize companies face challenges as they try to modernize their online collaboration workflows. They’re frequently stitching together discrete, ad hoc communications tools to perform a variety of team-based tasks, but the limitations of this approach quickly become apparent as projects grow more complex.
Tags : 
    
Cisco Spark

Strategic Originations Decisions Key to Telecom Success

Published By: FICO     Published Date: May 11, 2017
In saturated, contested telecom markets, credit origination has become a strategically important capability in acquiring and retaining the right mix of customers. Being quick and adept at making enormously complex decisions — involving product bundle eligibility and pricing, deposits, credit limits, device financing rates and terms — has far-reaching effects beyond market share and current revenue.
Tags : 
customer experience, customer experience, customer engagement, consumer credit, credit, customer interaction service, customer satisfaction, customer service
    
FICO

Running on EXPERIENCE.

Published By: Adobe     Published Date: Mar 26, 2018
Welcome to the 2017 Digital Marketing Study. Between March and April 2017, we reached out to 1,165 digital marketers in enterprise companies in the United States, Canada, the United Kingdom, France, and Germany, with an average company size of more than 7,000 employees. We’ve also gathered information and insights from leaders in several industries regarding their specific challenges, priorities, and tactics. In this report, we use this data to help companies at all levels of maturity successfully transform into an experience business. We hope you find it valuable.
Tags : 
    
Adobe

Fastest Speed, Highest Security: The Co-engineering of Oracle's New M8 Systems

Published By: Oracle CX     Published Date: Oct 19, 2017
Oracle has just announced a new microprocessor, and the servers and engineered system that are powered by it. The SPARC M8 processor fits in the palm of your hand, but it contains the result of years of co-engineering of hardware and software together to run enterprise applications with unprecedented speed and security. The SPARC M8 chip contains 32 of today’s most powerful cores for running Oracle Database and Java applications. Benchmarking data shows that the performance of these cores reaches twice the performance of Intel’s x86 cores. This is the result of exhaustive work on designing smart execution units and threading architecture, and on balancing metrics such as core count, memory and IO bandwidth. It also required millions of hours in testing chip design and operating system software on real workloads for database and Java. Having faster cores means increasing application capability while keeping the core count and software investment under control. In other words, a boost
Tags : 
    
Oracle CX

Next-Generation Secure Infrastructure Platform - Oracle SPARC M8 Launch Webcast

Published By: Oracle CX     Published Date: Oct 20, 2017
Oracle has just announced a new microprocessor, and the servers and engineered system that are powered by it. The SPARC M8 processor fits in the palm of your hand, but it contains the result of years of co-engineering of hardware and software together to run enterprise applications with unprecedented speed and security. The SPARC M8 chip contains 32 of today’s most powerful cores for running Oracle Database and Java applications. Benchmarking data shows that the performance of these cores reaches twice the performance of Intel’s x86 cores. This is the result of exhaustive work on designing smart execution units and threading architecture, and on balancing metrics such as core count, memory and IO bandwidth. It also required millions of hours in testing chip design and operating system software on real workloads for database and Java. Having faster cores means increasing application capability while keeping the core count and software investment under control. In other words, a boost
Tags : 
    
Oracle CX

SC Magazine Market Focus

Published By: Gigamon     Published Date: Oct 19, 2017
Read SC Magazine’s original research article Double Vision to learn how visibility deep into network activity and analysis of network traffic can show breaches before serious damage is done. While monitoring network traffic is hardly a new or unique technology, it is an excellent example of how visibility works. Constant vigilance of network activity is simply the best way to determine if any semblance of an attack still resides on your network. Download now!
Tags : 
    
Gigamon

Gartner Research Note on Security Trends

Published By: Gigamon     Published Date: Oct 25, 2017
Read Gartner’s research note, Top 10 Strategic Technology Trends for 2017: Adaptive Security Architecture, to improve visibility and control over your organization’s exposure to risk with a continuous, contextual and coordinated approach to security. Comprehensive protection now requires an adaptive process to predict, prevent, detect and respond to security breaches that includes DevSecOps, IoT Security, and Intelligent Security. This note walks you through key planning assumptions, analysis, best practices and specific recommendations.
Tags : 
    
Gigamon

Growing Small Businesses in the Salesforce Economy

Published By: DocuSign UK     Published Date: Nov 06, 2018
"Technology has made it possible for small businesses to reach more customers in new ways, resulting in some of the most high-growth businesses today. This new Age of the Customer brings a world of opportunities, as well as a few challenges. You can reach more potential customers than ever before, but you also have more competition for their attention and dollars. The good news is that in this high-competition, high-reward environment, businesses that are part of the Salesforce ecosystem are at the center of this new economy. Read on to learn more."
Tags : 
    
DocuSign UK

Reduce Your Costs with a Digital Strategy

Published By: DocuSign UK     Published Date: Nov 06, 2018
"One of the simplest steps that yields the biggest impact is changing the way employees and customers work with documents. Improving document workflow, removing unnecessary paper-based processes, and reducing errors can be a game changer. In this eBook, we will explore five key areas where a far-reaching digital strategy can help you save money, increase productivity, and ultimately be more profitable. "
Tags : 
    
DocuSign UK

Content as King: Why Great Video Content is the Key to Unlocking Hearts and Minds

Published By: Oath     Published Date: Mar 16, 2018
Everyone knows that content is crucial to attract, engage, and reach consumers. But while this may be true, it’s important to consider the medium involved. Right now, the format to beat is clearly video, with 51% of brands investing more in 2018 than the year prior.1 And with so many forms of video available, such as content, programmatic, and pre-roll, it’s important to understand how to use video for building both brand connections and direct response. Currently, video provides advertisers with a versatile medium to reach the audiences they want, where they want, to put the best spotlight on their story. But the question remains—what is the best way to reach your target, and how can you ensure they will pay attention to your message? Download this whitepaper to find out!
Tags : 
    
Oath
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.