carrier

Results 51 - 57 of 57Sort Results By: Published Date | Title | Company Name

Thinking About IP Multimedia Subsystem: An Architecture for the Future

Published By: AT&T     Published Date: Jun 25, 2008
IP Multimedia Subsystem (IMS) is an open international standard for Next Generation Networking. It supports the delivery of Voice over IP (VoIP) and various multimedia services. IMS is not in itself a service, but an architecture for service delivery. IMS was originally developed by wireless carriers within the context of the Third Generation Partnership Project (3GPP) in 2002. Since then, its advantages have led to the adoption of IMS by wireline carriers.
Tags : 
voip, voice over ip, ip telephony, ip networks, wireless ip, wireless technology, at&t, att
    
AT&T

Threat Landscape - How to predict, spot and mitigate threats

Published By: Cisco Umbrella EMEA     Published Date: Sep 02, 2019
"We live and surf in a cyber world where attacks like APT, DDOS, Trojans and Ransomware are common and easy to execute. Domain names are an integral part of any business today and apparently an integral part of an attacker's plan too. Domain names are carriers of malwares, they act as Command and Control servers and malware's ex-filtrate data too. In today's threat landscape - predicting threats, spotting threats and mitigating them is super crucial.. This is called Visibility and Analytics. Watch this on demand session with our Cisco cloud security experts Shyam Ramaswamy and Fernando Ferrari as they talk about how Cisco Umbrella and The Umbrella Research team detect anomalies, block threats and identify compromised hosts. The experts also discuss how effectively Cisco spot, react, filter out IOC, block the network communications of a malware; identify and stop a phishing campaign (unknown ones too). "
Tags : 
    
Cisco Umbrella EMEA

Transforming the Insurance Customer Experience with Business Process Automation

Published By: Interactive Intelligence     Published Date: Feb 26, 2013
What happens when customer experiences go terribly wrong? In this white paper, we look at real world examples of customer experiences going terribly wrong from different points of view -- from consumers and carriers.
Tags : 
transforming customer experience, interactive intelligence, business process automation, different points of views, customer examples
    
Interactive Intelligence

Understanding the Changing Health Coverage Paradigm: Private Exchanges 101

Published By: Aon Hewitt     Published Date: Oct 13, 2014
Are you struggling to predict and manage the rising cost of health care at your organization, while still trying to offer your employees and their families quality, affordable health coverage? Private health exchanges have emerged as a strategy employers are using to help curb this cost trend while offering employees more choice and control over their health care. Download XChanges Today to learn about this changing marketplace and how private exchanges are realigning incentives to benefit everyone in the value chain: employers, insurance carriers, employees, and providers.
Tags : 
aon, health coverage, private health exchanges, insurance, xchanges, affordable health coverage
    
Aon Hewitt

Underwriting with 20/20 Vision

Published By: RMS     Published Date: Jul 25, 2019
The insurance industry boasts some of the most sophisticated modeling capabilities in the world. And yet the average property underwriter does not have access to the kind of predictive tools that carriers use at a portfolio level to manage risk aggregation, streamline reinsurance buying and optimize capitalization.
Tags : 
    
RMS

Whitepaper: The Wild, Wild West of Mobile Apps

Published By: Webroot     Published Date: Sep 18, 2013
This whitepaper explains how exploding mobile threats challenge mobile device management (MDM) vendors, carriers, service providers, and app stores to ensure the safety of apps. Consumers and customers will hold these companies responsible for providing adequate security, and employees will expect enterprise IT departments to protect them from malicious mobile apps like they have come to expect for PC malware. The report describes how a cloud-based app reputation service protects against the risks of mobile applications in the wild: • Collects millions of applications from a variety of sources • Stores mobile app data in the world’s largest cloud-based threat database • Analyzes and scores apps on a range from malicious (e.g., known malware such as Trojans or root kits) to trustworth
Tags : 
mobile app, mobile threat, mobile device management, mobile application management, malicious mobile app, security, business technology
    
Webroot

Whitepaper: Demonstrating SD-WAN Business Value with ESG

Published By: VMware SD-WAN by VeloCloud     Published Date: May 21, 2019
For many organizations, the wide area network (WAN) infrastructure that connects an enterprise’s remote and branch offices has not changed for decades. Over the years, organizations consolidated many regional data centers into a few highly available data center locations which meant that remote locations had to connect to centralized applications over WANs and all internet traffic went through these data centers as well. This introduced bandwidth constraints and latency issues. The development in WAN optimization provided incremental and measurable improvement in WAN performance and provided some bandwidth cost containment. However, that technology typically was only deployed at the most problematic sites that struggled to achieve acceptable levels of performance and user experience. It did not solve all the issues with WAN connectivity. WAN infrastructure planning was limited to increases in capacity that were met by provisioning additional carrier MPLS (multiprotocol label switching)
Tags : 
    
VMware SD-WAN by VeloCloud
Start   Previous    1 2 3     Next   End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.