lte

Results 201 - 225 of 964Sort Results By: Published Date | Title | Company Name

2014 Top Insights for Procurement & Operations Executives

Published By: CEB     Published Date: Dec 03, 2014
As cost and productivity expectations persist, many functions are rethinking the way their work gets done to remain both efficient and innovative. But not all business partners may welcome these kinds of transformations. To stay progressive, the best companies enable employees to exercise greater influence over internal clients and alter the entrenched views their function.
Tags : 
procurement insights, operations insights, productivity expectations, proactive business, procurement organizations, productive supplier partnerships, supplier relationship management, procurement leaders, procurement executives, operations professionals, operations leaders, operations executives
    
CEB

A single, secure solution for document-sharing, web meetings, social business and more

Published By: Central Desktop     Published Date: Aug 05, 2011
Central Desktop is the ideal collaboration software for technology companies looking for a secure, powerful solution that will reduce costs, enhance team collaboration and improve project management. It helps IT directors and teams keep documentation up-to-date, share files, manage versions, and keep internal business units from using unapproved, non secure services for sharing documents online and internally. >>>Register to learn more
Tags : 
social collaboration, online collaboration, collaboration software, team collaboration, sharepoint alternative, project collaboration, online team collaboration, online project management, it collaboration, it project management, microsoft sharepoint, internet security, network security appliance, security management, single sign on, analytical applications, business intelligence, configuration management, data integration, collaboration
    
Central Desktop

Personalization Technology Brief: Traditional Approaches Contrasted with ChoiceStream’s Universal

Published By: ChoiceStream     Published Date: Feb 04, 2009
ChoiceStream's approach towards personalization differs dramatically from others.  In "Traditional Approaches Contrasted with ChoiceStream's Universal Recommender" technology brief you'll learn about the components of personalization systems.  Most importantly, you’ll learn how to choose a winning algorithm that provides the right personalization solution for your online store.
Tags : 
choicestream, personalization technology brief, universal recommender, best-of-breed personalization, collaborative filtering, preference capture, algorithms
    
ChoiceStream

Seven Key Requirements for Personalized Recommendation Services

Published By: ChoiceStream     Published Date: Feb 04, 2009
ChoiceStream’s “Seven Key Requirements for Personalized Recommendation Services” white paper outlines e-commerce recommendation services and key capabilities that can improve sales revenue and customer engagement.  You’ll also receive a Recommendation Evaluation Scorecard to help you objectively summarize critical core requirements in order to maximize your return on investment.
Tags : 
choicestream, personalized recommendation services, quality recommendations, collaborative filtering, in-session click analysis, cohorts, cross-sells, cross-promotions, blacklists, seamless multi-channel support
    
ChoiceStream

Running Out of Bandwidth? Take a Fresh Look at 100G

Published By: Cisco     Published Date: Jan 15, 2015
Service providers around the world share concerns about running out of bandwidth. Business challenges surrounding continued bandwidth growth, linked to video, mobility, and cloud applications, are significant. Service providers also report declining revenue from a cost-per-bit perspective, so not only does the network need to grow, it also needs to grow more cost effectively. The Cisco Virtual Networking Index (Cisco VNI) predicts that over 50 billion devices will be connected over these networks by 2020. The network effects of the Internet of Things, LTE mobility, and mobile video are just beginning to be understood. In a world where mobile device network additions are growing four times faster than the population, and machine-to-machine (M2M) device network additions are growing five times faster than mobile device additions, this problem is clearly becoming highly important and requires a good solution.
Tags : 
cloud, growth, traffic, projection, account, network, it management, enterprise applications
    
Cisco

2015 Gartner Magic Quadrant for Contact Center Infrastructure

Published By: Cisco     Published Date: Nov 17, 2015
Contact center infrastructure vendors continue to expand their solution offerings to include broader feature sets, including omnichannel routing, and alternative delivery models. Companies should evaluate vendors' technology and ability to deliver in relevant regions.
Tags : 
gartner, cisco, magic quadrant, contact center infrastructure, networking, security, it management, knowledge management, enterprise applications
    
Cisco

Lopez Research: An Introduction to the Internet of Things

Published By: Cisco     Published Date: Nov 17, 2015
IoT describes a system where items in the physical world, and sensors within or attached to these items, are connected to the Internet via wireless and wired Internet connections. These sensors can use various types of local area connections such as RFID, NFC, Wi-Fi, Bluetooth, and Zigbee. Sensors can also have wide area connectivity such as GSM, GPRS, 3G, and LTE.
Tags : 
iot, internet of things, data management, business efficiency, manufacturing process, customer satisfaction, business intelligence, automation, networking, security
    
Cisco

Feeling the Pain of Scaling on AWS? Theres a Private Cloud alternative your developers will love.

Published By: Cisco     Published Date: Jan 05, 2016
Check out this infographic to learn more about how Tapjoy provides tools for developers to power and monetize their mobile applications.
Tags : 
    
Cisco

Network Readiness Guide

Published By: Cisco     Published Date: Jan 12, 2016
Network readiness is an important factor in any new IT project at companies both large and small. New applications seem to require more bandwidth than the applications that they replace. These applications can also bring in new users, sometimes by the thousands. In some cases, the network services and/or capacity are not ready for these changes, and the IT rollout suffers. This guide covers the following topics: bandwidth, wireless, firewalls, content filtering, proxy servers, and others.
Tags : 
cisco, byod, connectivity, education, networking environment, digital revolution, higher education, networking, security, it management, wireless
    
Cisco

2015 Gartner Magic Quadrant for Contact Center Infrastructure

Published By: Cisco     Published Date: Feb 12, 2016
Contact center infrastructure vendors continue to expand their solution offerings to include broader feature sets, including omnichannel routing, and alternative delivery models. Companies should evaluate vendors' technology and ability to deliver in relevant regions.
Tags : 
contact center, cisco, omnichannel routing, cloud computing, cloud infrastructure, business activity monitoring, business intelligence, data warehousing, data center
    
Cisco

2015 Gardner Magic Quadrant: Group Video Systems Offer

Published By: Cisco     Published Date: Feb 12, 2016
Contact center infrastructure vendors continue to expand their solution offerings to include broader feature sets, including omnichannel routing, and alternative delivery models. Companies should evaluate vendors' technology and ability to deliver in relevant regions.
Tags : 
gardner magic quadrant, cisco, contact center, omnichannel routing, best practices, cloud computing, application performance management, business activity monitoring, business analytics, business process automation, data center
    
Cisco

Infographic: Feeling the Pain of Scaling on AWS?

Published By: Cisco     Published Date: Apr 15, 2016
Theres a Private Cloud alternative your developers will love.
Tags : 
cloud management, cloud services, cloud management, best practices, infrastructure, cloud computing
    
Cisco

Best Practices Guide to Cisco Enterprise Campus Infrastructure

Published By: Cisco     Published Date: Oct 08, 2015
This document consolidates the enterprise campus network design and deployment guidelines with various best practices from multiple deeply focused Cisco Validated Design Guides. The best practices conclusions are derived from thorough solution-level end-to-end characterization of various levels of system types, network design alternatives, and enterprise applications.
Tags : 
cisco infrastructure, enterprise network, network design, infrastructure, migration, network architecture, network management, network performance, network performance management, quality of service, remote access, remote network management
    
Cisco

Defending against todays critical threats February 2019 Threat Report

Published By: Cisco EMEA     Published Date: Mar 08, 2019
When it comes to the threat landscape, its important to take a look in the rearview mirror once in a while. As with driving, not only do you get a good look at whats behind you, but you can often spot whats coming up quick, set to overtake you. Thats the spirit of this threat report. Weve picked out five key stories from the last year or so, not just because they were big events, but because we think these threats, or similar ones, could very well appear in the near future. Take modular threats like Emotet and VPNFilter, for example. These are threats that can deliver an on-demand menu of attacks and threats, depending on which device is infected or the intended goal of the attacker. We saw plenty of such modular threats in recent history, and wouldnt be surprised if we see more in the future. Email remains the darling delivery method of attackers, with threats from cryptomining to Emotet using it to spread. Its also highly likely that other threats, such as unauthorized M
Tags : 
    
Cisco EMEA

Cloud Evaluation Guide

Published By: Cisco Systems     Published Date: Jun 27, 2013
This practical guide can help you choose the best cloud solution for your company. If you are considering alternatives to an on-premises communications system, you need to thoroughly understand the issues and options. Since anyone with a server and an Internet connection can become a cloud vendor, how do you know what to ask, or who to believe? This guide gives you a three-step process, or evaluation guide, you can use to cut through the hype and make an informed decision.
Tags : 
cloud solution, integrated solution, application, network, on-premises communication system, technology, networking, knowledge management, data management, business technology, data center
    
Cisco Systems

Whitepaper: Your users have left the perimeter. Are you ready?

Published By: Cisco Umbrella EMEA     Published Date: Oct 12, 2018
Not long ago, even the most astute executives couldnt fully anticipate how quickly emerging technologies would transform their business operations and even their business models. Laptops, smartphones, and other mobile devices; high-bandwidth wireless networks; and cloud-based computing services have proven to be among the most impactful of these advances, collectively untethering workers from office environments and fundamentally altering work behaviors. employees today work anytime, anywhere while accessing applications and data that reside on company servers and in the cloud. Cisco Umbrella can help your business overcome these problems, download this whitepaper today to find out more.
Tags : 
    
Cisco Umbrella EMEA

Threat Landscape - How to predict, spot and mitigate threats

Published By: Cisco Umbrella EMEA     Published Date: Sep 02, 2019
"We live and surf in a cyber world where attacks like APT, DDOS, Trojans and Ransomware are common and easy to execute. Domain names are an integral part of any business today and apparently an integral part of an attacker's plan too. Domain names are carriers of malwares, they act as Command and Control servers and malware's ex-filtrate data too. In today's threat landscape - predicting threats, spotting threats and mitigating them is super crucial.. This is called Visibility and Analytics. Watch this on demand session with our Cisco cloud security experts Shyam Ramaswamy and Fernando Ferrari as they talk about how Cisco Umbrella and The Umbrella Research team detect anomalies, block threats and identify compromised hosts. The experts also discuss how effectively Cisco spot, react, filter out IOC, block the network communications of a malware; identify and stop a phishing campaign (unknown ones too). "
Tags : 
    
Cisco Umbrella EMEA

Why Outstanding Omni-Channel Service is the Key to Success and how to get it

Published By: Citibank     Published Date: Oct 10, 2019
While great products are great, having a great product is no longer enough. Products alone simply dont win anymore. Say youve just launched a brilliant product or service. A myriad of near-identical alternatives from competitors will likely flood the market almost immediately. Differentiating yours from theirs has become a lot more difficult. Not to mention that technology has made it easier than ever for customers to shop around. From gathering information, to interacting with brands and purchasing products, its never been simpler to find the cheapest, fastest, smartest alternative, anywhere in the world.
Tags : 
    
Citibank

Extending the benefits of desktop virtualization to mobile laptop users.

Published By: Citrix     Published Date: Sep 17, 2013
Desktop virtualization is attractive to organizations of all types and sizes worldwide because of its many compelling benefits. Download here to learn about XenClient, an innovative, clientside alternative for delivering virtual desktops, which allows IT to extend the benefits of desktop virtualization to laptop users whether they are working online or offline.
Tags : 
remote access, access control, mobile computing, mobile workers, messaging, virtualization, mobile device management
    
Citrix

A Secure, IT-approved Alternative to Personal File Sharing Services in the Enterprise

Published By: Citrix     Published Date: Apr 10, 2017
Unauthorised employee use of personal file sharing services such as Dropbox and Box represents security risks to businesses.
Tags : 
enterprise software, file sharing, enterprise solutions, enterprise applications
    
Citrix

Solve the Application Visibility Challenge with NetScaler Insight Center

Published By: Citrix NetScaler     Published Date: May 06, 2013
The ability to observe, diagnose, and subsequently improve the performance of business-critical applications is essential to ensuring a positive user experience and maintaining the highest levels of employee productivity and customer satisfaction. The challenge of establishing an effective application visibility and control function is only growing, as trends such as mobility, virtualization, and cloud computing fundamentally alter datacenter and application architectures. With NetScaler Insight Center enterprises get: Unparalleled application visibility and invaluable operational intelligence; Increased operational efficiency, as troubleshooting and capacity planning efforts are greatly simplified; An optimized user experience that drives greater employee productivity and customer satisfaction; Increased assurance that governing SLAs will always be met; and, Reduced total cost of ownership, based on having a low-cost, low-impact solutionparticularly compared to traditional
Tags : 
application visibility, netscaler insight center, optimized user experience, low cost, citrix, knowledge management, enterprise applications
    
Citrix NetScaler

Location, Reliability and Service: Choosing the Right Colocation Provider

Published By: Cobalt Networks     Published Date: Jun 25, 2014
Not all colocation providers offer the same value and functionality, and many come with inherent risks. When choosing a colocation provider, careful consideration is essential. This white paper discusses: Rregional considerations in selecting a colocation provider, Las Vegas as an alternative to California markets and Phoenix for serving West Coast end users, Power, civic infrastructure, and weather as advantages to colocating in Las Vegas
Tags : 
cobalt networks, colocation, providers, regional considerations, civic infrastructure, las vegas, weather advantages, knowledge management, enterprise applications
    
Cobalt Networks

How Digital 2.0 Is Driving Bankings Next Wave of Change

Published By: Cognizant     Published Date: Oct 23, 2018
In the last few years, a wave of digital technologies changed the banking landscape - social/ mobile altered the way banks engage with customers, analytics enabled hyper personalized offerings by making sense of large datasets, Cloud technologies shifted the computing paradigm from CapEx to OpEx, enabling delivery of business processes as services from third-party platforms. Now, a second wave of disruption is set to drive even more profound changes - including robotic process automation (RPA), AI, IOT instrumentation, blockchain distributed ledger and shared infrastructure, and open banking platforms controlled by application programming interfaces (API). As these technologies become commercialized, and demand increases for digitally-enabled services, we will see unprecedented disruption, as non-traditional banks and fintechs rush into all segments of the banking space. This whitepaper examines key considerations for banks as they explore value in the emerging Digital 2.0 world.
Tags : 
cognizant, banking, digital
    
Cognizant

Offshoring Reconsidered

Published By: Collaborative Consulting     Published Date: Jan 15, 2014
Since the late 1990s, offshoring has become a deeply entrenched practice at many North American organizations. However, changing economic factors and the emergence of formerly hidden problems with offshoring have led Gartner to look at compelling alternatives, notably domestic rural sourcing.
Tags : 
collaborative consulting, gartner, offshoring, onshore value, value proposition, domestic sourcing, data backup, it services, software development, it management, collaboration, collaborative commerce, information management, business technology
    
Collaborative Consulting

Network Costs of Spam

Published By: COMDOM Software     Published Date: Aug 09, 2007
This paper provides an overview of costs of spam facing large organizations, such as multinational enterprises, universities, and governments, as well as small and medium sized businesses that own or operate networks used by employees and other end users.
Tags : 
spam, bayesian, filter, filtering, block, blocking, spamming, phishing, total cost of ownership, tco, messaging, email, email security, mail server, mail servers, comdom, comdom software, network architecture, network management, network security
    
COMDOM Software
Start   Previous    2 3 4 5 6 7 8 9 10 11 12 13 14 15 16    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.