rpo

Results 201 - 225 of 2811Sort Results By: Published Date | Title | Company Name
Published By: IBM     Published Date: Dec 12, 2006
The purpose of this paper is to highlight the issues, requirements, and technologies available for automated advanced name recognition.
Tags : 
business process automation, data integration, data quality, information management, customer service, data management, enterprise software, contact management
    
IBM
Published By: McAfee     Published Date: Sep 15, 2014
Attacks today incorporate increasingly sophisticated methods of social engineering and client-side software manipulation to exfiltrate data without detection. Some attackers leverage so-called spearphishing to entice employees to give up access information and spread their attacks to other enterprise systems; others use password crackers against compromised applications in order to gain further access rights to the network. The attackers might also set up channels for command and control communications with the compromised systems, as in the case of the Zeus or SpyEye bot infections.
Tags : 
network protection, it security, firewall, hacker detection, security management
    
McAfee
Published By: Entrust Datacard     Published Date: May 15, 2014
Complying with the North American Electric Reliability Corporation (NERC) Critical Infrastructure Protection Standards
Tags : 
entrust, nerc, cyber attacks, non compliance, security, it management
    
Entrust Datacard
Published By: Aerohive     Published Date: Feb 06, 2008
Craig Mathias, Principal of the Farpoint Group, explores the advent of cooperative control, an innovative new class of wireless infrastructure from Aerohive Networks. Aerohive’s cooperative control architecture gives you all of the benefits of autonomous access points and controller-based infrastructures, without the high OPEX or CAPEX associated with either approach. Cooperative control architecture represents an innovative approach to wireless LAN systems, one that incorporates a number of interesting features and corresponding benefits.
Tags : 
wireless lan, wlan, wireless architecture, wireless infrastructure, aerohive, wifi, wi-fi, wireless
    
Aerohive
Published By: Cisco EMEA     Published Date: Nov 08, 2018
Enterprise IT is changing. It’s evolving from a rigid, static, manually configured and managed architecture to one where connectivity is dynamic, application services are on demand, and processes are automated. Enterprise networking is evolving along with IT. This has been evident in the past several years in initiatives such as enterprise digitization and as-a-service consumption models, as well as their enablers, including BYOD, IoT and cloud. Add to this, all of the security implications of each initiative. The purpose of this paper is to assess the switching requirements for next-generation campus networks incorporating wired switches, wireless LANs and WAN routers in an intuitive, intent-based network supporting cloud, mobility, IoT and digitization, with pervasive security.
Tags : 
    
Cisco EMEA
Published By: Dassault Systèmes     Published Date: Aug 08, 2017
Aerospace and Defense companies delivering complex products in competitive markets must overcome many challenges to manage requirements throughout the product lifecycle. Among the most difficult challenges are integrating complex systems engineering processes, promoting collaboration among multiple engineering disciplines and enabling the sharing of intellectual property within globally dispersed teams. Companies seeking a way to efficiently manage product requirements can leverage a comprehensive product lifecycle management (PLM) solution to: • Effectively reuse intellectual property to reduce time to market • Increase product innovation • Improve overall traceability of requirements throughout the product lifecycle This paper will highlight the criteria needed for a comprehensive requirements management solution that incorporates PLM to offer customers a scalable, enterprise-grade solution.
Tags : 
customer, product lifecycle, aerospace, defense, management, plm, dassault
    
Dassault Systèmes
Published By: EMC Corporation     Published Date: Jun 14, 2013
Aerospec, a system engineering and manufacturing company, leverages VNXe and VMware to cut operating costs, increase reliability. They have seen a 2x increase in data access and 75% increase in storage utilization.
Tags : 
data, data access, reliability, redundant data, storage solution, information protection, application, storage utilization
    
EMC Corporation
Published By: Lenovo     Published Date: Nov 09, 2018
L'aumento della mobilità sta causando mal di testa a tutti i team IT, con potenziali aumenti di costi e rischi. Ma con ThinkPad basato su processori Intel® Core™ i7 vPro™, ottieni sicurezza a 360, durata affidabile e produttività senza compromessi in tutti i dispositivi. Scopri di più nel nostro white paper. Ultrabook, Celeron, Celeron Inside, Core Inside, Intel, il logo Intel, Intel Atom, Intel Atom Inside, Intel Core, Intel Inside, il logo Intel Inside, Intel vPro, Itanium, Itanium Inside, Pentium, Pentium Inside, vPro Inside, Xeon, Xeon Phi, Xeon Inside e Intel Optane sono marchi di Intel Corporation o di società controllate da Intel negli Stati Uniti e/o in altri Paesi.
Tags : 
lenovo, intel, thinkpad, thinkpad x1, x1 extreme, laptop, sicurezza, produttività
    
Lenovo
Published By: Lenovo UK     Published Date: May 15, 2019
L'aumento della mobilità sta causando mal di testa a tutti i team IT, con potenziali aumenti di costi e rischi. Ma con ThinkPad basato su processori Intel® Core™ i7 vPro™, ottieni sicurezza a 360, durata affidabile e produttività senza compromessi in tutti i dispositivi. Scopri di più nel nostro white paper. Ultrabook, Celeron, Celeron Inside, Core Inside, Intel, il logo Intel, Intel Atom, Intel Atom Inside, Intel Core, Intel Inside, il logo Intel Inside, Intel vPro, Itanium, Itanium Inside, Pentium, Pentium Inside, vPro Inside, Xeon, Xeon Phi, Xeon Inside e Intel Optane sono marchi di Intel Corporation o di società controllate da Intel negli Stati Uniti e/o in altri Paesi.
Tags : 
lenovo, intel, thinkpad, thinkpad x1, x1 extreme, laptop, sicurezza, produttività
    
Lenovo UK
Published By: Gleanster Research     Published Date: Nov 06, 2012
For major corporations, these new data management and visualization tools can supplement their core BI initiatives, providing a friendlier front end that builds on existing investments. For smaller organizations, these tools may be the only ones they need. In this 38-page benchmark report, you'll learn how Top Performers use Agile Business Intelligence.
Tags : 
gleanster, agile business, business, technology, data, business technology
    
Gleanster Research
Published By: BlackBerry     Published Date: Jun 01, 2020
There are now more mobile devices in the world?—?over 7 billion?—?than there are people. But the explosion of mobile devices has also spawned a parallel, more insidious, phenomenon: the rise of mobile malware and cyberattacks Enterprises are confronting a tough challenge: the growing threat of malware attacks aimed at mobile devices, and especially the apps that run on them. According to Aberdeen, the most effective mobile security solutions should incorporate the principle of “zero trust”. While there are many mobile threat solutions on the market, CylancePROTECT delivers a uniquely powerful set of capabilities. Download this report to see how CylancePROTECT can work for you.
Tags : 
    
BlackBerry
Published By: Automation Anywhere APAC     Published Date: Aug 15, 2019
Global corporate enterprise AI practitioners are clearly still dealing with infrastructure issues related to talent and technology. End-to-end processes remain stubbornly carbon-based. Rule-based automation is truly not yet globally scaled across the majority of organizations. Double the AI And yet, the AI & Intelligent Automation Network members went from 21%, having deployed Intelligent Enterprise solutions to over 44% in just one year’s time. Over 4/5 expect to deploy AI in under two years The stated goal for deployment is just under 83% by the end of 2020. Considering the fact that they’ve essentially got two years, and those ranks have doubled in one year – doubling again in two years is achievable. Incidentally, that same number was only 67% a year ago. 50% expect to be established, globally scaling or refining AI in under two years Global corporate enterprise is in fact slowly but surely transforming into the intelligent enterprise of tomorrow. Having said that, it will be
Tags : 
analyst, artificial intelligence, intelligent automation, rpa
    
Automation Anywhere APAC
Published By: Workday APAC     Published Date: Apr 03, 2020
AirAsia has grown from a domestic airline in Malaysia into Asia's leading low-cost airline serving more than 130 destinations across the Asia Pacific. AirAsia has a very mobile workforce—from cabin crews, to pilots and airport ground staff. Learn how Workday Human Capital Management has given it the right data to make better decisions and kept its people engaged—even at 40,000 feet.
Tags : 
    
Workday APAC
Published By: TIBCO Software     Published Date: Mar 11, 2020
"Airports generate a lot of data – from passengers departing, arriving and in transit; airport operations devices and systems; airline companies; travel platforms; transportation systems; and retailers. Typically, only a small subset of this data is used – but the potential of correlating all data opens up possibilities from operational efficiency improve the airport services quality. Learn how the Airports of Rome leveraged data to transform from one of the world’s worst passenger services to breaking the record for the highest passenger satisfaction score and the best airport in Europe for two consecutive years."
Tags : 
    
TIBCO Software
Published By: Nokia     Published Date: Mar 20, 2020
The adoption of Industry 4.0 digital technologies, such as IoT, AI, machine learning and data analytics are expected to revolutionize the operations of airports, introducing greater automation, improved processes, better tracking and handling of everything from aircraft to baggage — all with the goal of improving the passenger experience. Essential to this digital transformation will be high performing, secure and very reliable wireless communications. Neither the Wi-Fi networks currently in operation in most airports nor the public mobile networks that serve them have what is required to support the most ambitious digital transformation of the airport. In this paper, we examine the goals of this transformation, the key requirements that will have to be met, and the strengths and weaknesses of the various wireless technologies available today — keeping in mind what is coming in the future, as well. We argue that airports have to think in terms of a purpose-built private wireless netw
Tags : 
    
Nokia
Published By: VMware AirWatch     Published Date: Sep 11, 2015
One of the most common questions being asked by many customers recently is “How does AirWatch support Office 365?” Many ask if AirWatch can control access to Office 365 (O365) not only on their corporate desktop systems, but most importantly on their mobile devices.
Tags : 
    
VMware AirWatch
Published By: VMware AirWatch     Published Date: May 18, 2016
One of the most common questions being asked by many customers recently is “How does VMware AirWatch support Office 365?” Many ask if AirWatch can control access to Office 365 (O365) not only on their corporate desktop systems, but most importantly on their mobile devices. Fortunately, AirWatch provides tremendous support to help organizations leverage O365 on their mobile devices and our recent integration with VMware® Identity Manager provides an industry-first adaptive access control framework to ensure that all work applications, including O365, can only be accessed on managed and compliant devices.
Tags : 
application management, best practices, mobile support, mobile, systems management, business optimization
    
VMware AirWatch
Published By: Skytap     Published Date: Aug 23, 2017
The majority of Fortune 500 companies, along with many other enterprises, currently run business critical applications on AIX on IBM Power Systems. For these businesses, incorporating AIX workloads into an enterprise cloud strategy can present significant challenges, most notably the lack of support for these workloads from typical cloud infrastructure providers. Skytap Cloud is the only public cloud that offers support for AIX workloads alongside applications running on x86 architectures. This guide details the considerations involved and best practices for migrating your AIX workloads to Skytap Cloud.
Tags : 
    
Skytap
Published By: Resonate     Published Date: May 30, 2018
A great product is no longer sufficient to guarantee strong sales and loyal customers. Today's empowered consumers not only reject corporate irresponsibility but also seek brands that proactively promote beliefs and values aligned with their own. Marketing leaders should read this report to learn how to identify and prioritize relevant values that resonate with their consumers, authentically integrate those values across the organization, and help build the evidence-based case to earn consumers' and stakeholders' trust.
Tags : 
    
Resonate
Published By: Allbound     Published Date: Jan 13, 2016
In this ebook, you’ll learn how businesses are using technology and the cloud to transform their channel ecosystems into a model of collaboration and empowerment, injecting purpose and engagement into partner relationships, and building a channel-wide culture of customer success for both manufacturers and their resellers.
Tags : 
channel marketing, sales acceleration, customer success, collaboration, content
    
Allbound
Published By: Intel     Published Date: Apr 09, 2019
Video data is a key part of surveillance as well as many other types of IoT implementations. But video data can be complex and costly to gather, transmit, and analyze. AllGoVision* provides an innovative analytics solution, purpose-built for video data. Powered by Intel® architecture, the solution has been deployed in more than 100 installations in 35 countries. It rapidly analyzes video from surveillance cameras for designated parameters, including specified factors, behavior patterns, motion tracking of people and objects, and environmental monitoring.
Tags : 
    
Intel
Published By: Silverpop     Published Date: Feb 04, 2013
This ebook gives you a good starting point to help you take your email program to a higher level.
Tags : 
email marketing, engagement, crm, social, mobile, engegement, testing, optimization
    
Silverpop
Published By: Symantec Corporation     Published Date: Jul 11, 2014
Always On SSL is a fundamental, cost-effective security measure that provides end-to-end protection for website visitors by enforcing the use of encryption with SSL certificates from a trusted Certificate Authority on every single page.
Tags : 
symantec, ssl certificates, tco, third party vendors, hidden costs, ssl benefits, management platform, it professionals
    
Symantec Corporation
Published By: Cymfony     Published Date: Jul 11, 2007
The Internet has become a hospitable environment for people looking to advance aggressive forms of criticism against corporations. The same social media technologies that strengthen your company’s relationship with consumers also make is easy for a single critic to mount an aggressive campaign against you. This whitepaper will present new research that reveals what drives this type of aggressive behavior.
Tags : 
collaboration, customer behavior, customer service, online behavior, criticism, crm, customer relationship, customer satisfaction
    
Cymfony
Published By: Cymfony     Published Date: Jul 11, 2007
The Internet has become a hospitable environment for people looking to advance aggressive forms of criticism against corporations. The same social media technologies that strengthen your company’s relationship with consumers also make is easy for a single critic to mount an aggressive campaign against you. This whitepaper will present new research that reveals what drives this type of aggressive behavior.
Tags : 
collaboration, customer behavior, customer service, online behavior, criticism, crm, customer relationship, customer satisfaction
    
Cymfony
Start   Previous    2 3 4 5 6 7 8 9 10 11 12 13 14 15 16    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.