RSS feed Get our RSS feed

News by Topic

opt

Results 1 - 25 of 5502Sort Results By: Published Date | Title | Company Name
By: Nice Systems     Published Date: Feb 26, 2019
NICE, the leader in workforce management, introduces the most advanced forecasting tools on the market with WFM 7.0. Building on its recognition as the industry standard, NICE WFM 7.0 Forecasting with Artificial Intelligence chooses the optimal daily forecast model to provide staffing levels and budgeting that are more accurate than those delivered by any other WFM solution.
Tags : 
     Nice Systems
By: 3D Systems     Published Date: May 14, 2019
For more than two centuries, industrial factory production has excelled in four key aspects: repeatability of the process, durability of parts produced, productivity of the workflow, and an economical total cost of operation. Factory workflows have been optimized to produce the best possible parts in volume, as inexpensively as possible. Any new production method or workflow process that hopes to be accepted alongside this standard process must meet or improve on these time-tested elements. To learn more, download this whitepaper today.
Tags : 
     3D Systems
By: PGi     Published Date: May 03, 2019
As businesses give employees more power to work wherever and whenever they want, IT and business leaders are tasked with creating connected, collaborative work environments that are optimized for all devices. Rather than investing in point solutions that employees may or may not use, many organizations are investing in Unified Communications (UC) — more specifically, UC as a Service (UCaaS) or UC services delivered through the cloud.
Tags : 
     PGi
By: Schneider Electric     Published Date: May 20, 2019
Developing an optimal arc flash protection strategy for a given facility can be difficult due to the number of solutions and system variables involved. Effective arc flash hazard reduction is best achieved by establishing an overall system protection strategy that accounts for safety and operational requirements as well as system reliability and availability. An overview of available solution categories and application guidance based on experience in a wide variety of facility types is presented in order to assist engineers trying to implement “safety by design” principles to help deal with arc flash hazards. The approach provided addresses the complexities of the trade-offs between competing priorities and provides tools that help users develop effective protection strategies for the unique circumstances in a given facility.
Tags : consulting, protection strategy, schneider electric
     Schneider Electric
By: Schneider Electric     Published Date: May 20, 2019
Keeping aging switchgear performing at optimum performance levels can be challenging. When it comes to the reliability of an electrical distribution system, it’s not a question of if a system component will malfunction, but when. Electrical equipment ultimately degrades and reaches the end of its useful life, no matter how much maintenance is performed. And, with the advancements in the design of the new circuit breakers, those with older technology are no longer considered sustainable solutions. Plant managers and engineers must ensure continuity of operations and develop a plan to replace or upgrade aging switchgear. Facilities without a properly-implemented strategy put operations at risk that could lead to safety issues, equipment damage and/or downtime.
Tags : modernization, electrical distribution system, schneider electric
     Schneider Electric
By: IBM APAC     Published Date: May 14, 2019
Clients can realize the full potential of artificial intelligence (AI) and analytics with IBM’s deep industry expertise, technology solutions and capabilities and start to infuse intelligence into virtually every business decision and process. IBM’s AI & Analytics Services organization is helping enterprises get their data ready for AI and ultimately achieve stronger data-driven decisions; access deeper insights to provide improved customer care; and develop trust and confidence with AI-powered technologies focused on security, risk and compliance. Artificial intelligence (AI) is moving beyond the hype cycle, as more and more organizations seek to adopt AI-related technologies. These organizations are focusing on prioritizing functional areas and use cases, placing a stronger emphasis on topline growth, taking up a renewed interest in their data infrastructure and articulating greater unease about the skills of their knowledge workers. This report explores how they are approaching str
Tags : 
     IBM APAC
By: Here Technologies     Published Date: Mar 29, 2019
This is an at-a-glance guide to the ways location data can help you increase the efficiency of your fleet, optimizing delivery routes and ETAs. Presented to you by HERE, one of the world’s leading location platforms in 2018.
Tags : location data, transport & logistics, location services
     Here Technologies
By: Here Technologies     Published Date: Apr 01, 2019
On-demand companies rely on fast, accurate and robust mapping and location technologies to provide their users with a superior experience. Find out how real-time, predictive and historical traffic data can be applied to traffic-enabled routing algorithms to influence route calculations and automatically plot multiple routes with waypoints sequencing. Discover how HERE can help you communicate updated ETAs and provide an optimized experience to your drivers and customers.
Tags : location data, transport & logistics, location services
     Here Technologies
By: CheckMarx     Published Date: Apr 03, 2019
As new code deployments accelerate through wider adoption of DevOps methodology, maintaining software security is crucial to you and your customers. Is your software security program up to the challenge? If you’re not getting the most out of your software security program, our security experts may be able to diagnose your difficulties. We’ve created a list of specific recommendations on how to improve your program for better, faster results. We present to you “How to make your software security program successful: 10 Essential Best Practices.”
Tags : 
     CheckMarx
By: Group M_IBM Q2'19     Published Date: Apr 02, 2019
One of the biggest changes faces organizations making purchasing and deployment decisions about analytic databases -- including relational data warehouses -- is whether to opt for a cloud solution.
Tags : 
     Group M_IBM Q2'19
By: Group M_IBM Q2'19     Published Date: Apr 08, 2019
Empowering the Automotive Industry through Intelligent Orchestration With the increasing complexity and volume of cyberattacks, organizations must have the capacity to adapt quickly and confidently under changing conditions. Accelerating incident response times to safeguard the organization's infrastructure and data is paramount. Achieving this requires a thoughtful plan- one that addresses the security ecosystem, incorporates security orchestration and automation, and provides adaptive workflows to empower the security analysts. In the white paper "Six Steps for Building a Robust Incident Response Function" IBM Resilient provides a framework for security teams to build a strong incident response program and deliver organization-wide coordination and optimizations to accomplish these goals.
Tags : 
     Group M_IBM Q2'19
By: Sangoma     Published Date: Jan 30, 2013
Sangoma has introduced the most cost-effective, easiest to provision and easiest to manage line of enterprise SBCs on the market. The four available options deliver maximum flexibility when selecting a solution -- Learn how they can help you.
Tags : sangoma session border controllers, sbc series, carriers, enterprise, cost effective, easy to manage, sbc
     Sangoma
By: Genesys     Published Date: Feb 12, 2019
To remain competitive in an increasingly customer-centric world, mid-sized organizations are undergoing digital transformations of their contact centres. IDC surveyed companies in 27 countries globally, including companies from Europe, Middle East and Africa (EMEA), to examine the current market dynamics of cloud-enabled customer service environments. Eighty-five percent of the respondents fell within the small to mid-sized category with contact centres with 300 seats or fewer. Get this paper to access complete survey results for EMEA and to gain key insights including: Nearly 65% of respondents in EMEA already use or are in the process of implementing cloud-based contact centre solutions Only 13% of respondents in EMEA indicated that they currently are using a public cloud environment, the lowest among all geographies worldwide Drivers, benefits and challenges for adopting cloud contact centre technology
Tags : 
     Genesys
By: Genesys     Published Date: Feb 12, 2019
Customer interactions, across all channels, are of strategic importance in today’s world. Managing those interactions to assure the customer is seeing the best face of the company is vital. At the forefront is making sure you are providing useful, easy to navigate cloud-based Interactive Voice Response systems for your customers that places the emphasis on: Meeting the customers’ needs The increase in self service options An intelligent, efficient way that drives costs down and satisfaction up. Let Genesys help you meet these criteria and guide you to designing, developing and delivering a best-in-class IVR Platform that ensures a Great Customer Experience. Improve your game and score more wins across the business, with your customers. Achieve your IVR goals by downloading our IVR Playbook here.
Tags : 
     Genesys
By: Anaplan     Published Date: Apr 09, 2019
5 best practices for world-class zero-based budgeting A traditional budgeting process based on extrapolating the previous year’s spend fails to provide the detailed insight needed to achieve a material change in the cost base, particularly when line item expenses are already high-aggregated. But zero-based budgeting (ZBB) can—and that’s what’s driving its increasing adoption in these volatile economic times. Download this white paper to discover: • Benefits of implementing a ZBB process at your organization • 5 best-practice approaches to implementing ZBB • Tips for leveraging ZBB in your organization in today’s volatile economy
Tags : 
     Anaplan
By: Forcepoint     Published Date: May 14, 2019
Keep Your Organization Up to Speed As your organization expands, you need a resilient, fast, and secure network — balancing all three is no easy task. A software-defined wide area network (SD-WAN) provides a competitive advantage over traditional service provider options and "hub and spoke" architectures. This is where a software-defined WAN (SD-WAN) comes to the rescue. And deploying it today can provide a quantifiable competitive advantage. Gartner estimates SD-WAN has less than 5% market share today, but predicts 25% of users will manage their WAN through software within two years. "Secure Enterprise SD-WAN for Dummies" guides you step-by-step how to manage and secure digital networks with SD-WAN, with instructions even the most novice networking professional can understand. Read “Secure Enterprise SD-WAN for Dummies” and gain a competitive edge today!
Tags : 
     Forcepoint
By: Forcepoint     Published Date: May 14, 2019
Transforming Cloud Connectivity & Security in Distributed Networks Today’s digital transformation initiatives frequently begin with moving applications and data to the cloud. But traditional networking and security infrastructure, such as backhauling data from remote locations to central offices over MPLS lines, can’t keep up. Fortunately, new approaches that also move connectivity and security to the cloud are rapidly overcoming these hurdles. Technologies such as direct-to-cloud SD-WAN and site-to-site VPNs dramatically cut the cost of connectivity. However, they put pressure on other parts of the organization to adopt new ways of defending each site against internet intruders, protecting the use of web content, and securing data stored in cloud apps. In this webcast, we’ll discuss a new, integrated approach to connectivity and security. Used by enterprises and government agencies around the world to manage as many as 1,500 sites from a single console, Forcepoint’s branch security
Tags : 
     Forcepoint
By: Forcepoint     Published Date: May 14, 2019
Downtime Is Not an Option: High Availability Next Generation Firewall Access to applications, data, and resources on the Internet is mission-critical for every organization. Downtime is unacceptable. Security for that network must also be highly available and not cause performance degradation of the network. The increased workload of security devices as they analyze traffic and defend users from malicious attacks strains computing resources. The next generation of security solutions must build in high availability that can scale as the business changes. Download this whitepaper to find out how high availability is at the core of the Forcepoint NGFW (Next Generation Firewall).
Tags : 
     Forcepoint
By: Forcepoint     Published Date: May 14, 2019
IDC Infobrief: How Security Solutions Enable Cloud Success Cloud applications have transformed how organizations conduct business, increasing productivity and reducing costs. However, moving to the cloud means critical data now flows outside the organization’s traditional security boundaries. Unsurprisingly, security concerns still rank as the number one reason for not using cloud services*. This IDC InfoBrief, sponsored by Forcepoint, outlines five key security considerations and best practices for safe cloud adoption, including: Multi-cloud adoption: exposing challenges for security architectures Cloud-first and GDPR implications Cloud application visibility and control Data management and DLP in the cloud Leveraging User and Entity Behavior Analytics (UEBA) for protection Read the eBook to find out the five information security lessons learned from transitioning to the cloud. *IDC’s 2017 CloudView Survey; IDC’s 2017 CloudImpact Survey
Tags : 
     Forcepoint
By: Forcepoint     Published Date: May 14, 2019
As more and more companies are encouraging their employees to work from anywhere, on any device, data loss prevention (DLP) has evolved from an option to a requirement. In the past, DLP has been associated with complicated deployments and pervading operational management issues, yet DLP is not so much a product but a strategy—success depends on methodology and execution. Download the whitepaper for insightful guidance on implementing DLP. Key topics include: • Latest data-breach trends • Assessing DLP vendors • Nine-step framework • Best practices to ensure success
Tags : 
     Forcepoint
By: Forcepoint     Published Date: May 14, 2019
The constant presence of internal and external threats, along with increased worldwide regulations such as the General Data Protection Regulation (GDPR), have continued to drive the adoption of data loss prevention (DLP) solutions. In the “Data Loss Prevention – Market Quadrant 2018” report, The Radicati Group estimates the DLP market will double from $1.1 billion in 2018 to $2.2 billion by 2022. Once again, Forcepoint has been named a Top Player in this year’s report, citing strengths such as integration with Forcepoint CASB to extend DLP policies into cloud applications and more.
Tags : 
     Forcepoint
By: Forcepoint     Published Date: May 14, 2019
Keep Your Organization Up to Speed As your organization expands, you need a resilient, fast, and secure network — balancing all three is no easy task. A software-defined wide area network (SD-WAN) provides a competitive advantage over traditional service provider options and "hub and spoke" architectures. This is where a software-defined WAN (SD-WAN) comes to the rescue. And deploying it today can provide a quantifiable competitive advantage. Gartner estimates SD-WAN has less than 5% market share today, but predicts 25% of users will manage their WAN through software within two years. "Secure Enterprise SD-WAN for Dummies" guides you step-by-step how to manage and secure digital networks with SD-WAN, with instructions even the most novice networking professional can understand. Read “Secure Enterprise SD-WAN for Dummies” and gain a competitive edge today!
Tags : 
     Forcepoint
By: Forcepoint     Published Date: May 14, 2019
Transforming Cloud Connectivity & Security in Distributed Networks Today’s digital transformation initiatives frequently begin with moving applications and data to the cloud. But traditional networking and security infrastructure, such as backhauling data from remote locations to central offices over MPLS lines, can’t keep up. Fortunately, new approaches that also move connectivity and security to the cloud are rapidly overcoming these hurdles. Technologies such as direct-to-cloud SD-WAN and site-to-site VPNs dramatically cut the cost of connectivity. However, they put pressure on other parts of the organization to adopt new ways of defending each site against internet intruders, protecting the use of web content, and securing data stored in cloud apps. In this webcast, we’ll discuss a new, integrated approach to connectivity and security. Used by enterprises and government agencies around the world to manage as many as 1,500 sites from a single console, Forcepoint’s branch security
Tags : 
     Forcepoint
By: Forcepoint     Published Date: May 14, 2019
Downtime Is Not an Option: High Availability Next Generation Firewall Access to applications, data, and resources on the Internet is mission-critical for every organization. Downtime is unacceptable. Security for that network must also be highly available and not cause performance degradation of the network. The increased workload of security devices as they analyze traffic and defend users from malicious attacks strains computing resources. The next generation of security solutions must build in high availability that can scale as the business changes. Download this whitepaper to find out how high availability is at the core of the Forcepoint NGFW (Next Generation Firewall).
Tags : 
     Forcepoint
By: Forcepoint     Published Date: May 14, 2019
IDC Infobrief: How Security Solutions Enable Cloud Success Cloud applications have transformed how organizations conduct business, increasing productivity and reducing costs. However, moving to the cloud means critical data now flows outside the organization’s traditional security boundaries. Unsurprisingly, security concerns still rank as the number one reason for not using cloud services*. This IDC InfoBrief, sponsored by Forcepoint, outlines five key security considerations and best practices for safe cloud adoption, including: Multi-cloud adoption: exposing challenges for security architectures Cloud-first and GDPR implications Cloud application visibility and control Data management and DLP in the cloud Leveraging User and Entity Behavior Analytics (UEBA) for protection Read the eBook to find out the five information security lessons learned from transitioning to the cloud. *IDC’s 2017 CloudView Survey; IDC’s 2017 CloudImpact Survey
Tags : 
     Forcepoint
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics