connected

Results 151 - 175 of 1014Sort Results By: Published Date | Title | Company Name
Published By: ThingWorx     Published Date: Dec 02, 2015
The evolution of products into intelligent, connected devices— which are increasingly embedded in broader systems—is radically reshaping companies and competition.
Tags : 
thingworx, network, manufacturing, intelligent device, product, networking, security, business technology
    
ThingWorx
Published By: ThingWorx     Published Date: Dec 02, 2015
Security is a primary concern of ThingWorx customers — especially device manufacturers and end-customers that deliver and use connected products. These customers demand a proven solution that protects them and their customers against hackers, malware and unsafe operations.
Tags : 
thingworx, security, operations, audit, customer, network, networking, business technology
    
ThingWorx
Published By: ThingWorx     Published Date: Dec 03, 2015
By all accounts, the Internet of Things (IoT) is a vast, fast-developing opportunity for the enterprise and everyone connected to the enterprise. This IoT market analysis roundup by Postscapes shows the wide range of numbers that represent the IoT market.
Tags : 
thingworx, iot developer, enterprise, postscapes, software development, knowledge management, enterprise applications
    
ThingWorx
Published By: Proofpoint     Published Date: Jun 22, 2017
Doing all you can to ensure the security of Office 365 makes a lot of sense. As the volume and sophistication of advanced threats continues to evolve more rapidly than ever before, you must protect your people, data and brand from advanced attacks and compliance risks. Our security solutions provide you with industry-leading security, compliance and email continuity capabilities for your cloud based Office 365 deployment that far exceed Microsoft’s native protection. With Proofpoint, you can take advantage of the freedom, flexibility and cost savings of Office 365—without sacrificing your ability to keep users connected and protected. For more information, visit: www.proofpoint.com/office365
Tags : 
security solutions, ransomware, security technologies, protection technologies, risk assessment, it security, server protection
    
Proofpoint
Published By: Proofpoint     Published Date: Jun 22, 2017
Doing all you can to ensure the security of Office 365 makes a lot of sense. As the volume and sophistication of advanced threats continues to evolve more rapidly than ever before, you must protect your people, data and brand from advanced attacks and compliance risks. Our security solutions provide you with industry-leading security, compliance and email continuity capabilities for your cloud based Office 365 deployment that far exceed Microsoft’s native protection. With Proofpoint, you can take advantage of the freedom, flexibility and cost savings of Office 365—without sacrificing your ability to keep users connected and protected. For more information, visit: www.proofpoint.com/office365
Tags : 
security solutions, ransomware, security technologies, protection technologies, malicious email, it security, server protection
    
Proofpoint
Published By: F5 Networks Singapore Pte Ltd     Published Date: Sep 09, 2019
Have you ever wished for an army of clones to do all your thankless tasks and chores? Well, that fantasy is becoming a reality—at least on the Internet. And while they may not be actual clones, bots have begun doing lots of digital dirty work. Managing your relationship with bots—good and bad—has become an inherent part of doing business in a connected world. With more than half of online traffic initiated by autonomous programs, it’s clear that bots are a driving force of technological change, and they’re here to stay.¹ As bot technology, machine learning, and AI continue to evolve, so will the threats they pose. And while some bots are good, many are malicious—and the cybercriminals behind them are targeting your apps. Preparing your organization to deal with the impact of bots on your business is essential to developing a sustainable strategy that will enable you to grow as you adapt to the new bot-enabled world.
Tags : 
    
F5 Networks Singapore Pte Ltd
Published By: NetApp     Published Date: Jun 03, 2016
Enterprise applications are the lifeblood of IT. We rely on them for everything from optimizing manufacturing to tracking customer satisfaction. This paper examines the criteria for selecting flash storage in support of enterprise applications and makes recommendations based on the strengths of each flash system. Explore how to align enterprise application performance, management, and growth with business priorities through the use of connected flash storage systems.
Tags : 
    
NetApp
Published By: Dell and VMWare     Published Date: Oct 26, 2017
A fundamental people-process-technology transformation enables businesses to remain competitive in today’s innovation economy. Initiatives such as advanced security, fraud detection services, connected consumer Internet of Things (IoT) devices, augmented or virtual reality experience, machine and deep learning, and cognitively enabled applications drive superior business outcomes such as predictive marketing and maintenance.
Tags : 
    
Dell and VMWare
Published By: Dell and VMWare     Published Date: Oct 26, 2017
A fundamental people-process-technology transformation enables businesses to remain competitive in today’s innovation economy. Initiatives such as advanced security, fraud detection services, connected consumer Internet of Things (IoT) devices, augmented or virtual reality experience, machine and deep learning, and cognitively enabled applications drive superior business outcomes such as predictive marketing and maintenance.
Tags : 
    
Dell and VMWare
Published By: Dell and VMWare     Published Date: Oct 26, 2017
A fundamental people-process-technology transformation enables businesses to remain competitive in today’s innovation economy. Initiatives such as advanced security, fraud detection services, connected consumer Internet of Things (IoT) devices, augmented or virtual reality experience, machine and deep learning, and cognitively enabled applications drive superior business outcomes such as predictive marketing and maintenance.
Tags : 
    
Dell and VMWare
Published By: Dell and VMWare     Published Date: Oct 26, 2017
A fundamental people-process-technology transformation enables businesses to remain competitive in today’s innovation economy. Initiatives such as advanced security, fraud detection services, connected consumer Internet of Things (IoT) devices, augmented or virtual reality experience, machine and deep learning, and cognitively enabled applications drive superior business outcomes such as predictive marketing and maintenance.
Tags : 
    
Dell and VMWare
Published By: DELL IS Cloud     Published Date: Apr 13, 2018
A fundamental people-process-technology transformation enables businesses to remain competitive in today’s innovation economy. Initiatives such as advanced security, fraud detection services, connected consumer Internet of Things (IoT) devices, augmented or virtual reality experience, machine and deep learning, and cognitively enabled applications drive superior business outcomes such as predictive marketing and maintenance. Superior business outcomes require businesses to consider IT a core competency. For IT, an agile, elastic, and scalable IT infrastructure forms the crucial underpinning for a superior service delivery model. Dell EMC’s Intelligent Automation powered by Intel® Xeon® Platinum processor simplifies the management and maintenance of its PowerEdge server hardware. Designed to drive down the cost and resources associated with server lifecycle management, Intelligent Automation relies on integrated Dell Remote Access Controller(iDRAC) and OpenManage server management soft
Tags : 
    
DELL IS Cloud
Published By: Intel® Services     Published Date: Aug 15, 2014
With mobile hitting the mainstream, travel suppliers and intermediaries need to evolve their mobile offerings in order to satisfy the always-connected traveler.
Tags : 
consumer experience, api management, booking and purchase, datal flow, customer satisfaction
    
Intel® Services
Published By: Intel® Services     Published Date: Aug 11, 2014
The IHE framework and process provides a model that can help address these challenges of inefficient care coordination, disconnected data silos, and proprietary, non-scalable and cost prohibitive integration strategies.
Tags : 
    
Intel® Services
Published By: RingCentral     Published Date: Nov 10, 2015
Mobility and Bring Your Own Device (BYOD) have transformed the idea of a 9-to-5 workplace. Employees now check their email first thing in the morning and expect to stay connected whenever and wherever they go throughout the day.
Tags : 
ringcentral, cloud, phone system, mobile, workforce, byod, security, wireless
    
RingCentral
Published By: CA Technologies     Published Date: Jan 20, 2015
In the application economy, speed, innovation and quality have become table stakes. If you can’t meet your customers’ expectations, they will surely find a competitor who can. Whether your organization is in one of the sectors facing the most intense digital competition—insurance, banking, telecommunications or retail—or in a more traditional industry, how rapidly and successfully you embrace a software-driven digital transformation strategy will likely have a profound effect on your organization’s long term viability. Within this transformation sphere, the development of “omnichannel” or “digitally-connected multi-channel” capabilities is a key priority. CA Technologies can help you deliver a consistent, integrated and quality customer experience, regardless of how your customers choose to interact with you.
Tags : 
enterprise mobility management, mobile devices, software, competitive advantage, strategic requirement, wireless, enterprise applications
    
CA Technologies
Published By: ServiceNow     Published Date: Feb 24, 2017
Customer service is at an inflection point, in both the business-to-consumer and business-to-business sectors. Costs continue to skyrocket as the volume of inquiries increases, even as customer service budgets remain flat. Customer expectations seem to increase by the hour. Make a mistake or fail to resolve an issue quickly, and businesses may quickly see a decline in customer satisfaction and revenue.
Tags : 
    
ServiceNow
Published By: Ruckus Wireless     Published Date: May 05, 2016
Password-based (PEAP, TTLS) networks experience high rates of user disruption based on password changes. Disconnected devices try to connect back to the network causing severe user disruption. So, what’s the solution to this? Certificate-based wi-fi, of course!
Tags : 
ruckus wireless, wi fi, passwords, certificate wifi, user experience, networking, wireless, enterprise applications
    
Ruckus Wireless
Published By: Dynatrace     Published Date: Dec 16, 2015
Today's hyper-connected mobile consumers have high expectations. To compete, you must provide a responsive, superior digital experience. DevOps best practices of Continuous Delivery make this possible, but to do it right you will need a safety net.
Tags : 
dynatrace, software delivery, digital, performance metrics, mobile consumer, software development, it management, enterprise applications
    
Dynatrace
Published By: SAP     Published Date: May 05, 2016
How companies are using data and analytics to make their supply chains more connected and agile
Tags : 
sap, ariba, supply chains, analytics, agile, connected, enterprise applications, business technology
    
SAP
Published By: SAP Ariba     Published Date: May 05, 2016
How companies are using data and analytics to make their supply chains more connected and agile
Tags : 
sap, ariba, supply chains, analytics, agile, connected, enterprise applications, business technology
    
SAP Ariba
Published By: Microsoft     Published Date: Oct 07, 2016
Security was once largely limited to the confines of an on-premises world, but now it must extend to the cloud, as well as a myriad of mobile devices. Employees and companies now expect increasingly complex interactions with devices, apps, data, and even other users. As many companies struggle to keep up with traditional single-point solutions, and limited budgets, this pressure is creating security blind spots for IT. In a world of evolving threats, it is becoming increasingly impossible to address all of these issues with an on-premises solution.
Tags : 
technology, best practices, data, enterprise, business analytics, business intelligence, business management
    
Microsoft
Published By: CA Technologies     Published Date: Nov 02, 2016
Scaling Agile means that we apply its principles to large, even very large, groups of people. When we do this, we allow those people to be more connected to their work and its impact, despite being part of a huge system.
Tags : 
    
CA Technologies
Published By: CA Technologies     Published Date: Nov 02, 2016
Scaling Agile means that we apply its principles to large, even very large, groups of people. When we do this, we allow those people to be more connected to their work and its impact, despite being part of a huge system.
Tags : 
    
CA Technologies
Published By: CA Technologies     Published Date: Aug 22, 2017
While some are still adjusting to the idea, you’re well aware that we’re living in an application economy. For the uninformed, an application economy is where everything is driven by a connected, mobile, application-based world where your customers are far more likely to experience your brand and interact with your enterprise through a software application than a live person. But, beyond the benefits, each day you’re feeling the pressure it exerts on your budget, resources and network. You’ve seen this wave swell on the horizon, and now it’s arrived: executives are enthusiastic and asking about strategies, and line-of-business leaders are requesting faster dev times and more complex projects. Staking out your place as a leader in this new landscape will require you to develop and deliver high-impact applications faster than ever before.
Tags : 
    
CA Technologies
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.