RSS feed Get our RSS feed

News by Topic

scribe

Results 26 - 50 of 813Sort Results By: Published Date | Title | Company Name
By: HERE Technologies     Published Date: Dec 05, 2018
As map providers move to a highly modular, platform-centric approach, get an understanding of the value being delivered and find out how governments can harness the benefits and apply them across regions to enhance mobility, experiences and safety. In this report by Counterpoint Technology Market Research, learn why the HERE Open Location Platform – described as super-rich and always up-to-date, is a leader in the location data arena.
Tags : public sector, urbanization, traffic management
     HERE Technologies
By: HERE Technologies     Published Date: Dec 05, 2018
As map providers move to a highly modular, platform-centric approach, get an understanding of how fleet and logistics software providers can deliver more value in their solutions to enhance efficiency, productivity, and safety. In this report by Counterpoint Technology Market Research, learn why the HERE Open Location Platform – described as super-rich, always up-to-date, and a neutral offering – is a leader in the location data arena.
Tags : location data, transport & logistics, location services
     HERE Technologies
By: HERE Technologies     Published Date: Dec 06, 2018
As map providers move to a highly modular, platform-centric approach, get an understanding of the value being delivered and how you can harness the benefits and apply them to advertisement campaigns to attain more granular segmentation, precise targeting and a better audience experience. In this report by Counterpoint Technology Market Research, learn why the HERE Open Location Platform – described as super-rich, always up-to-date, and a neutral offering – is a leader in the location data arena.
Tags : 
     HERE Technologies
By: Cisco     Published Date: Dec 04, 2015
This part of the CVD describes design considerations to implement a successful BYOD solution and different deployment models to address diverse business cases.
Tags : cisco, design, byod, deployment
     Cisco
By: Cisco     Published Date: Dec 07, 2015
This part of the CVD describes design considerations to implement a successful BYOD solution and different deployment models to address diverse business cases.
Tags : cisco, design, byod, deployment
     Cisco
By: Cisco     Published Date: Dec 08, 2015
The 2015 Guide to WAN Architecture and Design describes a hypothetical company, referred to as NeedToChange, which has a traditional approach to WAN design. It then presents Cisco's response to how NeedToChange should evolve its WAN. This e-book includes a summary of the key components of some of the emerging approaches to WAN architecture and design and concludes with a call to action that outlines a project plan that network organizations can use to evolve their WAN.
Tags : applications, systems integration, cloud, platform, wan
     Cisco
By: Cisco     Published Date: Feb 23, 2016
This part of the CVD describes design considerations to implement a successful BYOD solution and different deployment models to address diverse business cases. Other parts of the CVD provide more details on how to implement unique use cases.
Tags : business models, development, business solutions
     Cisco
By: Cisco     Published Date: Jun 21, 2016
The e-book describes a hypothetical company, referred to as Need ToChange, which has a traditional approach to WAN design. It then presents Cisco's response to how NeedToChange should evolve its WAN. This e-book includes a summary of the key components of some of the emerging approaches to WAN architecture and design and concludes with a call to action that outlines a project plan that network organizations can use to evolve their WAN.
Tags : 
     Cisco
By: Cisco     Published Date: Jun 21, 2016
This part of the CVD describes design considerations to implement a successful BYOD solution and different deployment models to address diverse business cases. Other parts of the CVD provide more details on how to implement unique use cases.
Tags : 
     Cisco
By: Financial Force     Published Date: Dec 01, 2017
This IDC Vendor Profile describes FinancialForce.com, a cloud applications company with financial management, ordering and billing, human capital management (HCM), professional services automation (PSA), and supply chain management (SCM) solutions built on the Salesforce1 platform and a 36-year heritage of building financial management solutions at UNIT4 (the former Agresso and CODA products). FinancialForce.com's accounting solution, launched in 2008 as CODA 2go, was the first on - demand financial system built entirely on the Salesforce1 Platform. Backed by Technology Crossover Ventures, Advent International, Salesforce Ventures, and UNIT4, FinancialForce.com's applications continue to be the leading finance and professional services solutions available as native Salesforce1 applications on the AppExchange.
Tags : 
     Financial Force
By: Cisco     Published Date: Jan 05, 2015
As education evolves, so does the way we teach and learn. This report focuses on one of the newest trends, still in its nascent stages—mobile learning. It describes the potential benefits of mobile learning, addresses the challenges and opportunities that introducing mobile learning presents, and provides examples from school districts that have already implemented mobile learning programs so we can learn from their best practices. The report also suggests key points to consider as you develop your plans, align your goals, and make decisions regarding mobile learning in your schools.
Tags : mobility, business solutions, cisco, mobile applications, secure mobile
     Cisco
By: VMware AirWatch     Published Date: Jul 19, 2017
Workspace™ ONE™ is VMware’s digital workspace solution, designed to give access to any application from any type of device under automated and granular policy control. VMware was one of the first adopters of Workspace ONE, deploying across its full user population in early-to mid 2016. This white paper describes the objectives that drove VMware’s decisions of how and when to deploy, plus an overview of the business results we’ve achieved so far.
Tags : 
     VMware AirWatch
By: VMware AirWatch     Published Date: Jul 19, 2017
Workspace™ ONE™ is VMware’s digital workspace solution, designed to give access to any application from any type of device under automated and granular policy control. VMware was one of the first adopters of Workspace ONE, deploying across its full user population in early-to mid 2016. This white paper describes the objectives that drove VMware’s decisions of how and when to deploy, plus an overview of the business results we’ve achieved so far.
Tags : 
     VMware AirWatch
By: Juniper Networks     Published Date: Mar 27, 2018
These guidelines explain how participating companies may use Forrester Wave™ research in their sales, marketing, and/or promotional materials. Please note that, in accordance with Forrester’s Citation Policy, a company must either be a current Forrester subscriber or have purchased reprint rights to the evaluation in order to cite from the evaluation or use the Forrester Wave findings in any of its material.
Tags : 
     Juniper Networks
By: VMware     Published Date: Feb 24, 2017
Workspace™ ONE™ is VMware’s digital workspace solution, designed to give access to any application from any type of device under automated and granular policy control. VMware was one of the first adopters of Workspace ONE, deploying across its full user population in early-to mid 2016. This white paper describes the objectives that drove VMware’s decisions of how and when to deploy, plus an overview of the business results we’ve achieved so far.
Tags : 
     VMware
By: CrowdStrike     Published Date: Oct 23, 2017
As damaging breaches continue to occur, more organizations are considering endpoint detection and response (EDR) solutions to address the incidents that aren't being handled adequately by their existing defenses. However, EDR solutions come in a wide variety of implementations and can vary significantly in scope and efficacy — choosing the best solution can be challenging. This white paper, “Endpoint Detection and Response: Automatic Protection Against Advanced Threats,” explains the importance of EDR, and describes how various approaches to EDR differ, providing guidance that can help you choose the product that's right for your organization. Read this white paper to learn: What makes EDR such a valuable addition to an organization's security arsenal and why finding the right approach is critical How the “EDR maturity model” can help you accurately evaluate vendor claims and choose the solution that best fits your organization’s needs How the CrowdStrike® EDR solution empowers organ
Tags : 
     CrowdStrike
By: FICO     Published Date: May 11, 2017
A leading communication services company serving more than 50 million individual, business and government subscribers across the United States.
Tags : customer experience, credit, credit policies
     FICO
By: SAP EMEA Global     Published Date: Dec 13, 2017
This IDC white paper examines the drivers behind the adoption of IoT technologies by public services organizations and why the IoT is becoming a key investment priority. Public services are comprised of a diverse set of organizations, including federal, regional and local governments and healthcare and social services providers. These all have mandates to improve the safety, health and quality of life of their constituents across a broad range of programs. This paper also provides market insights and describes examples of IoT implementations that highlight the diversity of scenarios in the public service sector. These diverse scenarios illustrate the impact IoT solutions can have across many citizen-centric services.
Tags : 
     SAP EMEA Global
By: Limelight Networks     Published Date: Mar 02, 2018
In the increasingly competitive OTT market, competition for viewers is high. Providers must find ways to not just deliver compelling content, but to deliver compelling viewing experiences. In this whitepaper, you’ll learn about the critical challenges facing OTT providers today and how they can be overcome to provide the broadcast quality experiences viewers expect, regardless of the device in use or the viewers location in the world. Are you ready to keep your subscribers happy and away from your competition? Download this free white paper OTT 3.0: How to Build a Better Mousetrap and learn: Why personalized content discovery is so important to viewers – and to the success of your business How to avoid internet congestion by leveraging technologies like a CDN The importance of global network scale to meet spikes in consumer traffic The impact of advertising on viewer abandonment
Tags : content delivery network, cdn, digital content delivery, mobile delivery, global content delivery, live streaming, video on demand, video delivery
     Limelight Networks
By: Oracle     Published Date: Mar 04, 2019
Watch this webinar to understand exactly where AI fits within HR. Euan Semple, speaker, writer and consultant, describes how you could apply AI and ML within HR to drive meaningful change.But before that can happen, teams need to trust the technologies they’re using.
Tags : 
     Oracle
By: Akamai Technologies     Published Date: Dec 11, 2018
Companies are pursuing digital transformation. The goal is to improve customer value, operate with greater efficiency and agility, and increase innovation. But as companies leverage new workflows, security has not kept pace, and cyber criminals are becoming more sophisticated. This white paper describes a security paradigm for today’s hostile environment: zero trust.
Tags : 
     Akamai Technologies
By: Adobe Systems, Inc.     Published Date: May 17, 2011
This paper highlights the advances in closed-loop marketing that enable measurement and optimization of digital marketing efforts. It also describes the challenges that CMOs face when pursuing digital marketing strategies and how next-generation WCM solutions help CMOs overcome those challenges.
Tags : adobe, cmo, digital marketing, organization transformation, chief marketing officer, customer experience management, wcm, multichannel pipeline growth
     Adobe Systems, Inc.
By: Akamai Technologies     Published Date: Jun 14, 2018
The moats and castle approach is an antiquated, yet a common way, of protecting the enterprise network. This paper describes a new way to protect the enterprise which hides applications from the Internet, outside of the firewall, with zero open ports and a minimal attack surface.
Tags : security, enterprise security, eaa
     Akamai Technologies
By: Akamai Technologies     Published Date: Jun 14, 2018
Companies are pursuing digital transformation. The goal is to improve customer value, operate with greater efficiency and agility, and increase innovation. But as companies leverage new workflows, security has not kept pace, and cyber criminals are becoming more sophisticated. This white paper describes a security paradigm for today’s hostile environment: zero trust.
Tags : behavioral analytics, logging analytics, zero trust security model, security, cyber criminals, security breach
     Akamai Technologies
By: CA Technologies     Published Date: Aug 01, 2014
This paper outlines why legacy service desks and even newer platforms have not delivered on expectations, it describes the requirements for a service desk solution to be truly effective in today’s business environment and it details how CA Cloud Service Management delivers on these key requirements.
Tags : service desks, service management platforms, service desk solutions, failing service desks, saas
     CA Technologies
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics