multi point

Results 1 - 25 of 121Sort Results By: Published Date | Title | Company Name

20% faster resolution through Event Management for an US based Media & Entertainment giant

Published By: Larsen & Toubro Infotech(LTI)     Published Date: Sep 17, 2019
US based Media & Entertainment giant had challenges in multiple integration of 3rd party tools. LTI helped in implementing end to end ServiceNow modules and integration of multiple 3rd party tools like Verizon, Sharepoint, Table API etc which thereby provided higher adoption of portal with enhanced user experience.
Tags : 
application management, artificial intelligence, b2b technology, cloud applications, cloud architect
    
Larsen & Toubro Infotech(LTI)

3 Ways to Break Through Barriers to Omnichannel Success

Published By: ttec     Published Date: Jul 24, 2019
Omnichannel is one of those words everyone uses, but few use correctly. It’s not another word for multichannel. It’s a different state of existence. In our experience, multichannel is the ability to interact with customers across many different channels, but not necessarily in a cohesive fashion. As new channels become available, they are “bolted on” to existing customer experience infrastructure such as CRM or customer support systems. Too frequently, the management of these channels becomes siloed (web versus in-store sales, for example). The effect of this from the customer experience standpoint can be disjointed and jarring. For example, the resolution of an issue following a customer conversation with an associate in the contact center may not be reflected when the customer goes online or into a store. Yet the ability to offer multichannel service experience is table stakes for today’s business. If you’re not available in the channels where customers want you to be, you cease to b
Tags : 
    
ttec

5 Steps for Reducing Downtime

Published By: Marathon Technologies     Published Date: Sep 18, 2009
Many businesses struggle to guarantee application and data availability for Windows applications. They may protect the application from one type of outage (like a disk failure) while ignoring other risks. Or they can end up deploying multiple point solutions to handle different aspects of availability, increasing overall cost and complexity.
Tags : 
marathon, downtime, everrun, server, failure, outage, windows, sql, network management, servers, small business networks, server virtualization, system management software, microsoft exchange, windows server, service oriented architecture
    
Marathon Technologies

7 Benefits You Realize with a Holistic Data Protection Approach

Published By: Commvault     Published Date: Jul 06, 2016
Think of a wildfire that quickly spreads as it increases in speed and power. That is what is happening today as data growth increases the volume and management complexity of storage, backup and recovery. Now think of trying to stop that fire with a garden hose. Your traditional backup and recovery process is equally under-equipped to manage and facilitate operations that need more speed, efficiency, scalability and reliability to handle today’s 24/7, always-on environment. Here we examine the benefits of moving from a solution comprised of multiple point products to a holistic data protection platform designed to serve today’s enterprise.
Tags : 
commvault, data protection, storage, backup, recovery, holistic data protection, singe pane of glass, common code base, analytics, reporting, it management, best practices
    
Commvault

A Breakthrough in Multiparty Video Conferencing

Published By: LifeSize, a division of Logitech     Published Date: Feb 19, 2013
UVC Multipoint is the world's first virtualized, standards-based multiparty video calling solutions for on-demand meetings. Watch this video to learn about the industry's highest quality, and most powerful bridging solution.
Tags : 
video, uvc, communication, presentation sharing, video conferencing, collaboration, redundancy, virtualization, application integration, enterprise software, infrastructure management
    
LifeSize, a division of Logitech

A Guide to REST and API Design

Published By: CA Technologies     Published Date: Aug 22, 2017
In his 1966 book “The Psychology of Science,” American psychologist Abraham Maslow tackled the idea that those in the field of psychology needed to approach treatment from multiple perspectives, to take on new ideas, and not just continue using the same theories and techniques created by Freud and his followers so many years ago. Acknowledging that changing your point of view can be difficult, Maslow wrote “[I]t is tempting, if the only tool you have is a hammer, to treat everything like a nail.” We have all had this experience. We get so used to the way things have been done in the past, we sometimes don’t question the reasons for doing them.
Tags : 
    
CA Technologies

A Guide to REST and API Design

Published By: CA Technologies EMEA     Published Date: May 23, 2018
In his 1966 book “The Psychology of Science,” American psychologist Abraham Maslow tackled the idea that those in the field of psychology needed to approach treatment from multiple perspectives, to take on new ideas, and not just continue using the same theories and techniques created by Freud and his followers so many years ago. It may seem curious to refer to psychology in a work on REST and API Design, but it works to illustrate two distinctive points: (1) that all design decisions, regardless of whether they pertain to software or architecture, should be made within the context of functional, behavioral, and social requirements—not random trends; (2) when you only know how to do one thing well, everything tends to look identical. To get started, let’s take a look at REST in some detail by downloading this whitepaper today.
Tags : 
    
CA Technologies EMEA

A New Model for Government: From Connected to Collaborative

Published By: Polycom     Published Date: Sep 04, 2012
As new visual communication applications are created to harness the power of next-generation broadband, a new model for government is emerging - one that will bring interpersonal interaction into cyberspace.
Tags : 
video collaboration, government, broadband networks, video conferencing, multi-point video, point-to-point video, telepresence, tele-services
    
Polycom

A Smarter Way to Integrate with SharePoint

Published By: K2     Published Date: Jan 07, 2016
We’re experiencing a data explosion. By 2020 the data we create and copy annually will reach 44 trillion gigabytes.1 As this data disseminates into the workplace, companies add hardware and software systems to store, protect and manage it all. While data can help solve business problems, data is most helpful when it reaches those who can use it. Companies need to build Microsoft SharePoint apps that integrate with other line-of-business (LOB) systems so users can take full advantage of this data explosion. But the reality of creating apps that integrate data across organizational systems presents an intimidating challenge. To integrate multiple isolated data sources into an application that transforms data into useful information requires technical expertise, coding and ongoing maintenance. Integration also raises security and governance concerns. So it’s no surprise that only 47 percent of SharePoint users have connected their SharePoint apps with other systems.2 As a result, nearly
Tags : 
microsoft sharepoint, data integration, security, sharepoint solutions, networking, it management, knowledge management
    
K2

Advanced Malware Protection: A Buyer’s Guide

Published By: Cisco     Published Date: Jul 08, 2016
What You Will Learn: This document will identify the essential capabilities you need in an advanced malware protection solution, the key questions you should ask your vendor, and shows you how Cisco combats today’s advanced malware attacks using a combination of four techniques: • Advanced analytics • Collective global security threat intelligence • Enforcement across multiple form factors (networks, endpoints, mobile devices, secure gateways, and virtual systems) • Continuous analysis and retrospective security
Tags : 
    
Cisco

An Introduction to the Basics of Video Conferencing

Published By: Polycom     Published Date: Sep 04, 2012
This report examines the basic components of video conferencing as a fundamental tool for businesses to enhance communication and collaboration between employees, partners and customers.
Tags : 
video collaboration, video conferencing, point-to-point, multi-point, video call management, polycom realpresence platform, content management, device management
    
Polycom

Are You Ready to Implement the New COSO Framework?

Published By: webmechanix     Published Date: Mar 06, 2014
Sadly, many companies aren’t. That’s why we created this free, online assessment to help you understand the COSO framework more intimately. Answer just 17 multiple choice questions (100% confidentiality guaranteed) & get instant feedback that highlights important flaws in your current systems & point you in the right direction. Don’t get caught with your pants down. Take a few minutes right now to gain understanding of key organizational vulnerabilities regarding the new COSO framework & stay ahead of the pack.
Tags : 
coso assessment, coso framework, coso guidelines
    
webmechanix

ASG: Distinctively Positioned to Optimize Web Application Performance

Published By: ASG Software Solutions     Published Date: May 27, 2009
Application management requires visibility from multiple vantage points within the IT enterprise, combined with a centralized information store that pulls the technology pieces of the application puzzle into a coherent whole.
Tags : 
asg, cmdb, bsm, itil, configuration management, metadata, metacmdb, lob, sdm, service dependency mapping, ecommerce, bpm, workflow, itsm, critical application, cms, itsm, application integration, application performance management, best practices
    
ASG Software Solutions

Banking IT Systems Management: Challenges and Solutions

Published By: Kaseya     Published Date: May 13, 2015
Banking systems are inherently distributed in multiple branch and ATM locations, as well as home banking over the internet. As the number of access points grows, so does the complexity of IT systems management. Systems need to be readily available and productive yet secure and protected from data-breach.
Tags : 
kaseya, hybrid, cloud, management, msp, mobile, big data, finance
    
Kaseya

Best Practices for the Enterprise: How to integrate channels and maximize revenue

Published By: Oracle     Published Date: Dec 14, 2011
By integrating and aligning systems across multiple customer touch points you can drive higher conversion rates and lower operational costs, while improving the quality of each customer interaction. Take a look at this complimentary webinar to find out more.
Tags : 
on demand, oracle on demand, instant gratification, crm, customer relationship management, deployment, saas, software-as-service, software-as-a-service, pms, product management, best practices, business activity monitoring, business process automation, business process management, corporate governance, customer interaction service, customer satisfaction, customer service, product lifecycle management
    
Oracle

Bronze Membership - COMP TIA

Published By: CareerSaver     Published Date: Dec 04, 2008
Our training programs employ an array of multi-dimensional learning techniques that makes our Four Point learning system so successful. The building blocks of this proven system include audio cds for learning on the go, extensive diagnostic pre-tests, adaptive software, simulated exams, video courseware for a visual learning environment and vendor specific press books; all available well below retail cost. Our strategic partnerships with companies large and small, authors, trainers and educators allow us to provide today’s IT professional with the finest educational material available.
Tags : 
careersaver, it certification, cisco certification, microsoft certification, linux certification, network security certification, software development certification, it career advancement
    
CareerSaver

Building the Smarter Warehouse: Warehousing 2020

Published By: Zebra Technologies     Published Date: May 02, 2018
The exponential growth of omnichannel shopping and ever-burgeoning demand for faster merchandise deliveries is redefining the supply chain’s distribution of consumer products goods. A seminal shift in how shoppers increasingly buy via multiple touch points — online from desktop computers, mobile devices and in-store — has created the need for the “smarter” warehouse to serve today’s connected consumer. As retailers look to merge their brick-and-mortar and online operations to cut costs and boost efficiency, warehouse management systems must keep pace. For this report, Zebra Technologies analyzed the state of the warehousing marketplace among firms in the US and Canada with at least $15 million in annual revenues. The online survey asked IT and operations personnel in the manufacturing, retail, transportation and wholesale market segments to share their insights and business plans over the next five years, in light of a rapidly changing industry.
Tags : 
warehouse, merchandise, delivery, demand, devices, computers
    
Zebra Technologies

Building the Smarter Warehouse: Warehousing 2020

Published By: Zebra Technologies     Published Date: Aug 09, 2018
The exponential growth of omnichannel shopping and ever-burgeoning demand for faster merchandise deliveries is redefining the supply chain’s distribution of consumer products goods. A seminal shift in how shoppers increasingly buy via multiple touch points — online from desktop computers, mobile devices and in-store — has created the need for the “smarter” warehouse to serve today’s connected consumer. As retailers look to merge their brick-and-mortar and online operations to cut costs and boost efficiency, warehouse management systems must keep pace. For this report, Zebra Technologies analyzed the state of the warehousing marketplace among firms in the US and Canada with at least $15 million in annual revenues. The online survey asked IT and operations personnel in the manufacturing, retail, transportation and wholesale market segments to share their insights and business plans over the next five years, in light of a rapidly changing industry.
Tags : 
fulfillment, vision, study, technology, manufacturer
    
Zebra Technologies

Busting the Myth of the Malware "Silver Bullet"

Published By: McAfee EMEA     Published Date: Nov 15, 2017
When it comes to fighting modern malware, there is no “silver bullet” that can guard against every threat every time. That’s why McAfee takes a different approach. We combine multiple layers of advanced malware protection, detection, and correction technologies into a single endpoint defense fabric. To keep up with cyberthreat innovation, effective detection and analysis requires new state-of-the-art anti-malware technologies: Real Protect and Dynamic Application Containment, complemented by the McAfee® Advanced Threat Defense sandbox. Find out how these tools work together to systematically protect against the most dangerous malware threats.
Tags : 
malware, mcafee, cyber threat, technologies, innovation, analytics
    
McAfee EMEA

Busting the Myth of the Malware Silver Bullet

Published By: McAfee     Published Date: Mar 31, 2017
When it comes to fighting modern malware, there is no “silver bullet” that can guard against every threat every time. That’s why Intel Security takes a different approach. We combine multiple layers of advanced malware protection, detection, and correction technologies into a single endpoint defense fabric. To keep up with cyberthreat innovation, effective detection and analysis requires new state-of-the-art anti-malware technologies: Real Protect and Dynamic Application Containment, complemented by the McAfee® Advanced Threat Defense sandbox. Find out how these tools work together to systematically protect against the most dangerous malware threats.
Tags : 
malware, malware protection, malware detection, correction technologies, security, cyberthreats, cyberthreat detection
    
McAfee

Busting the Myth of the Malware Silver Bullet - French

Published By: McAfee     Published Date: Mar 31, 2017
When it comes to fighting modern malware, there is no “silver bullet” that can guard against every threat every time. That’s why Intel Security takes a different approach. We combine multiple layers of advanced malware protection, detection, and correction technologies into a single endpoint defense fabric. To keep up with cyberthreat innovation, effective detection and analysis requires new state-of-the-art anti-malware technologies: Real Protect and Dynamic Application Containment, complemented by the McAfee® Advanced Threat Defense sandbox. Find out how these tools work together to systematically protect against the most dangerous malware threats.
Tags : 
malware, malware protection, malware detection, correction technologies, security, cyberthreats, cyberthreat detection
    
McAfee

Busting the Myth of the Malware Silver Bullet - German

Published By: McAfee     Published Date: Mar 31, 2017
When it comes to fighting modern malware, there is no “silver bullet” that can guard against every threat every time. That’s why Intel Security takes a different approach. We combine multiple layers of advanced malware protection, detection, and correction technologies into a single endpoint defense fabric. To keep up with cyberthreat innovation, effective detection and analysis requires new state-of-the-art anti-malware technologies: Real Protect and Dynamic Application Containment, complemented by the McAfee® Advanced Threat Defense sandbox. Find out how these tools work together to systematically protect against the most dangerous malware threats.
Tags : 
malware, malware protection, malware detection, correction technologies, security, cyberthreats, cyberthreat detection
    
McAfee

Busting the Myth of the Malware Silver Bullet - Japanese

Published By: McAfee     Published Date: Mar 31, 2017
When it comes to fighting modern malware, there is no “silver bullet” that can guard against every threat every time. That’s why Intel Security takes a different approach. We combine multiple layers of advanced malware protection, detection, and correction technologies into a single endpoint defense fabric. To keep up with cyberthreat innovation, effective detection and analysis requires new state-of-the-art anti-malware technologies: Real Protect and Dynamic Application Containment, complemented by the McAfee® Advanced Threat Defense sandbox. Find out how these tools work together to systematically protect against the most dangerous malware threats.
Tags : 
malware, malware protection, malware detection, correction technologies, security, cyberthreats, cyberthreat detection
    
McAfee

Buyer's Criteria for Advanced Malware Protection

Published By: Cisco     Published Date: Apr 08, 2015
This document will identify the essential capabilities you should seek in an advanced malware protection solution, the key questions you should ask your advanced malware protection vendor, and shows you how Cisco combats today’s advanced malware attacks using a combination of four techniques: ? Big data analytics ? Collective global security intelligence ? Enforcement across multiple form factors (networks, endpoints, mobile devices, secure gateways, and virtual systems) ? Continuous analysis and retrospective security
Tags : 
protection, analytics, global security, intelligence, virtual, gateway, attacks, malware, big data, security, data management
    
Cisco

Case Study - OEM's Increased Global Network Performance

Published By: Virtela Communications, Inc.     Published Date: Nov 16, 2009
Faced with degrading network performance and the need to drive global expansion, Measurement Specialties partnered with Virtela to design, implement and manage a high-performance, multi-carrier MPLS network across all twelve of their global sites.
Tags : 
virtela, network performance, multi-carrier mpls network, original equipment manufacturers, point-to-point connections, network and security solutions, network management, network performance management, test and measurement, network security appliance
    
Virtela Communications, Inc.
Start   Previous   1 2 3 4 5    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.