RSS feed Get our RSS feed

News by Topic

scribe

Results 451 - 475 of 842Sort Results By: Published Date | Title | Company Name
By: IDFocus     Published Date: Aug 21, 2009
In the Identity Management space, there are 3 leading applications: Web access control, single sign-on, and password management. The document also describes two alternative approaches to combining these solutions.
Tags : password management, identity management, access management, iam, identity and access management, single sign on, single sign-on, access control
     IDFocus
By: iDirect     Published Date: Aug 21, 2009
The global demand for voice and data services delivered over cellular networks continues to grow as new markets open and existing ones increase capacity. The networking infrastructure to support subscriber growth and new services have experienced aggressive expansion as the worldwide economy evolves.
Tags : infrastructure, gsm, cellular, telecom, telecommunications, networking infrastructure, network expansion, voice services
     iDirect
By: IGLOO Software     Published Date: Jan 06, 2010
This case study describes how a business social software solution provides the researchers, students and institutions of PolicyNet with the ability to seek out, share insights and collaborate with their counterparts down the hallway, across the street and around the world.
Tags : igloo software, online community researcher, policynet, academic distribution, public policy, business social software, social media marketing
     IGLOO Software
By: IGLOO Software     Published Date: Jan 07, 2010
This case study describes how the MIN facilitates local and international transactions, establishes vital business connections and provides a knowledge exchange for sharing information, ideas and expertise.
Tags : igloo software, manufacturing innovation network, knowledge sharing, content management, online manufacturing, supplier networking, social networking, e-commerce
     IGLOO Software
By: iLinc     Published Date: Feb 11, 2010
This Frost & Sullivan whitepaper describes the new communications-enabled business processes (CEBP) and links it to web conferencing/collaboration.
Tags : ilinc, salesforce, webinar, presentation, cebp, web conferencing, video conferencing, visual aid
     iLinc
By: Illusive Networks     Published Date: Apr 10, 2019
APTs can be particularly harmful to financial service organizations, raising the need for early detection of malicious intruders. This white paper describes three use cases that illustrate how Illusive’s technology provides a nimble, easy-to-manage solution that guards the integrity of SWIFT services, defends legacy, custom, or “untouchable” applications and systems, and helps manage cyber risk during periods of disruptive business change.
Tags : cyber security, deception technology, endpoint security, cyber security, threat management, threat protection, illusive networks, endpoint protection
     Illusive Networks
By: Illusive Networks     Published Date: Apr 10, 2019
In today’s healthcare environments, new cyber vulnerabilities and risks open as fast as older ones get remedied. This white paper describes three use cases that illustrate how Illusive’s technology provides a nimble, easy-to-manage solution for stopping attackers that succeed in bypassing security controls.
Tags : cyber security, deception technology, endpoint security, cyber security, threat management, threat protection, illusive networks, endpoint protection
     Illusive Networks
By: Impact Radius     Published Date: Oct 14, 2014
Marketers need an attribution model that offers accuracy, transparency, and flexibility in attributing credit to the many online and offline marketing channels and campaign they fund. This paper describes the specific challenges that marketing organizations face and the approach they need to take to improve results going forward. Identify the "buying journeys" of your customers and collect the insight needed to maximize your marketing budget.
Tags : 
     Impact Radius
By: Imperva     Published Date: Jun 14, 2012
This paper describes the financial implications of Web attacks, DDoS attacks, and other Web-based threats. It shows how the SecureSphere Web Application Firewall provides a Return on Security Investment of 2090% by preventing data breaches and Website downtime.
Tags : imperva, application security, security costs, roi, firewall, ddos, web attacks, it spending
     Imperva
By: Infacta     Published Date: Jan 22, 2007
Just because somebody subscribes to your email newsletter doesn’t mean that they read it. Here are 3 tips to turn your passive subscribers into active readers.
Tags : subscribers, email subscribers, audience engagement, email marketing services/software
     Infacta
By: Infacta     Published Date: Jan 22, 2007
The lines of permission marketing are not as grey as many would suggest. It’s pretty clear cut. You either have someone’s permission to send them commerical email or you don’t. Listen to this podcast to learn more.
Tags : permission based email, list management, subscriber management, email marketing, email marketing services/software
     Infacta
By: Infacta     Published Date: Jan 22, 2007
Online consumers demand relevance, so list builders must focus on building large, highly-relevant lists rather than just gathering a bunch of email addresses. In this article, the author will discuss list size, registration methods, data collection and permission requirements.
Tags : subscriber list, subscription list, email marketing
     Infacta
By: Infor     Published Date: Feb 27, 2007
This white paper report describes an innovative, simple and effective approach to Lean Manufacturing. Simplified Market Pull (SMP) includes a 'pull' scheduling mechanism with appropriate controls and buffers that supports dramatic reductions in production lead-time and work-in-process inventory while freeing up available capacity and improving on-time performance and reliability.
Tags : productivity, supply chain management, scm, enterprise resource planning, erp, pull scheduling, smp, manufacturing
     Infor
By: Infosys     Published Date: Jan 02, 2019
Challenge: An air purifier manufacturer needed to remind customers to periodically change filters to maintain product efficiency and deliver consistent customer experience. Solution: We helped them develop a Bluetooth enabled ‘smart’ air filter, where an embedded sensor measured the effectiveness of the filter and relayed that information to an iOS or Android app. Users were alerted when filters needed replacing, and given the opportunity to buy directly through online retailers and also to subscribe to the Amazon Device Replenishment Service. Outcomes: • Increased revenue through replacement filter sales • Expected to touch 50,000 users in the first year • Integrated with Amazon Alexa for seamless digital experience • Powerful product differentiation in a crowded market
Tags : 
     Infosys
By: Infosys Technologies Limited     Published Date: Sep 22, 2010
This white paper describes creating a governance framework for managing identity.
Tags : governance, compliance, identity analytics, identity management
     Infosys Technologies Limited
By: InMage     Published Date: Feb 24, 2009
This paper describes a series of tests run to determine the viability of continuous data protection (CDP) using InMage DR Scout along with Agami Systems AIS 3000 series of unified storage systems.
Tags : inmage, dr scout, accenture, cdp, continuous data protection, agami systems ais 3000, backup, data management
     InMage
By: Intel     Published Date: Jan 06, 2014
This paper describes a step-by-step approach to designing such a system and presents an iterative methodology that applies at both the component level and the system level.
Tags : intel, hpc, high performance computing, storage, high performance storage, storage management, architecture
     Intel
By: Intel     Published Date: May 22, 2017
While holding the promise of HD quality, enriched services, and the benefits of a common packet switched access infrastructure, the adoption of infrastructure-based voice over LTE (VoLTE), along with rich communications such as video and real-time messaging, has stalled over the last few years with concerns around quality, security, and cost. During that time, the value of the phone number as a globally significant user ID and key services such as SMS and MMS have been relegated by phone manufacturers, over the top (OTT) services, and even the subscribers themselves as “technologies of last resort.” Finally, the proliferation of 4G, together with the emergence of network functions virtualization (NFV), powered by Intel®, Hewlett Packard Enterprise* (HPE), and Metaswitch*, is allowing network operators to take charge of the consumer’s communications experience, once more.
Tags : 
     Intel
By: Intel     Published Date: May 15, 2017
This white paper describes the technologies used to develop this groundbreaking solution, designed to support next-generation video transcoding models while offering significant CapEx and OpEx saving.
Tags : cost, flexibility, scalability, nfv, next-generation video, video transcoding
     Intel
By: Intel     Published Date: Apr 11, 2019
To remain competitive, manufacturers must focus on achieving new growth while driving down costs. Key to achieving this is greater flexibility and a dramatic upturn in operational efficiency across the manufacturing process. One area ripe for improvement is intralogistics transportation. Many manufacturers still rely on autonomous guide vehicles (AGVs) to undertake repetitive transport tasks; but, rigid in nature, they do not support today’s demand-driven, dynamic manufacturing environments. Intelligent autonomous mobile robots (AMRs), like SEIT* from Milvus Robotics, offer a viable and cost-effective alternative. This solution brief describes how to solve business challenges through investment in innovative technologies.
Tags : 
     Intel
By: Intel Corp.     Published Date: Aug 08, 2012
This report describes how improving the efficiency of data storage, deduplication solutions has enabled organizations to cost-justify the increased use of disk for backup and recovery. However, the changing demands on IT storage infrastructures have begun to strain the capabilities of initial deduplication products. To meet these demands, a new generation of deduplication solutions is emerging which scale easily, offer improved performance and availability and simplify management and integration within the IT storage infrastructure. HP refers to this new generation as "Deduplication 2.0.
Tags : assessing, deduplication, 2.0, second, generation, storeonce, deduplication, appliance
     Intel Corp.
By: Intellitactics     Published Date: Feb 28, 2008
Save time and money by sustaining compliance between audits. Aberdeen Group's Derek Brink describes the benefits that best in class companies achieve by taking steps to sustain compliance.
Tags : compliance, log management, security information management, sim, security event management, sem, siem, network behavior analysis
     Intellitactics
By: Intel® Services     Published Date: Aug 12, 2014
In this guide we describe how APIs and API management offer a unique opportunity for both travel suppliers and intermediaries to better control their own destinies while increasing customer satisfaction.
Tags : 
     Intel® Services
By: Iovation     Published Date: Sep 25, 2009
After $20,000 in direct losses and who knows how many lost opportunities, we just couldn't stay in reaction mode. We went looking for a proactive solution and found iovation. We were drawn to the idea of sharing fraud profiles with other subscribers. Plus, the fraud checking is done in real time and it scales to volume which eased my concerns about customer impact. Implementation was straightforward. Preventing half the fraud attempts each month pays for the system; we've seen a 95% reduction in our chargeback rate in 8 months.
Tags : iovation, sharing fraud profiles, fraud protection service, on-line mmo gaming, rmt, real money trading
     Iovation
By: ipoque     Published Date: Feb 14, 2019
Virtualized Evolved Packet Core (vEPC) is a major breakthrough in network function virtualization (NFV). When asked where they have deployed NFV in production networks, communication service providers (CSPs) consistently name vEPC as one of the top answers. Why is that? In order to maximize their processing capacity, CSPs virtualize a subset of their network applications, including mobile edge computing (MEC), base stations (small/macro cells) and the mobile core, because these systems use a large bandwidth. The mobile packet core builds the foundation of the core network on which mobile CSPs offer IP-based services to their customers. Implementing vEPC solutions can help CSPs obtain the scale necessary to accommodate growing numbers of subscribers and large amounts of traffic or connections while controlling costs and improving on quality of experience (QoE). In the past, evolved packet core (EPC) solutions were deployed on purpose-built hardware. NFV enables operators to deploy EPC c
Tags : dpi, deep packet inspection, vepc, sdn, nfv, network analytics, virtual network
     ipoque
Start   Previous    12 13 14 15 16 17 18 19 20 21 22 23 24 25 26    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics