connected

Results 126 - 150 of 894Sort Results By: Published Date | Title | Company Name
Published By: Instructure     Published Date: Sep 25, 2019
Whether you’re looking to implement your first Learning Management System (LMS) or move from a legacy system, this guide to evaluating different LMSs will support you in your journey towards a simpler and more connected learning experience. While it’s important that you know exactly what you need from an LMS, this is also an opportunity to think laterally, question your processes, and introduce some new ideas or ways of working. A good LMS will put your business in a stronger position by enabling course designers and trainers to innovate, support organisations in maximising return on their investment and help students to succeed and complete courses.
Tags : 
    
Instructure
Published By: Equinix EMEA     Published Date: May 22, 2019
Much has been written about the impact of technology on insurance, this most traditional of industries. Artificial intelligence (AI), connected cars, drones and the Internet of Things (IoT) are all becoming integral to the insurance and automotive industries. This becomes obvious when using your car’s navigation system – an everyday action that might well lead to a chain of events few would even think of today. To find out more download this whitepaper today.
Tags : 
    
Equinix EMEA
Published By: ThingWorx     Published Date: Dec 02, 2015
The evolution of products into intelligent, connected devices— which are increasingly embedded in broader systems—is radically reshaping companies and competition.
Tags : 
thingworx, network, manufacturing, intelligent device, product, networking, security, business technology
    
ThingWorx
Published By: ThingWorx     Published Date: Dec 02, 2015
Security is a primary concern of ThingWorx customers — especially device manufacturers and end-customers that deliver and use connected products. These customers demand a proven solution that protects them and their customers against hackers, malware and unsafe operations.
Tags : 
thingworx, security, operations, audit, customer, network, networking, business technology
    
ThingWorx
Published By: ThingWorx     Published Date: Dec 03, 2015
By all accounts, the Internet of Things (IoT) is a vast, fast-developing opportunity for the enterprise and everyone connected to the enterprise. This IoT market analysis roundup by Postscapes shows the wide range of numbers that represent the IoT market.
Tags : 
thingworx, iot developer, enterprise, postscapes, software development, knowledge management, enterprise applications
    
ThingWorx
Published By: Proofpoint     Published Date: Jun 22, 2017
Doing all you can to ensure the security of Office 365 makes a lot of sense. As the volume and sophistication of advanced threats continues to evolve more rapidly than ever before, you must protect your people, data and brand from advanced attacks and compliance risks. Our security solutions provide you with industry-leading security, compliance and email continuity capabilities for your cloud based Office 365 deployment that far exceed Microsoft’s native protection. With Proofpoint, you can take advantage of the freedom, flexibility and cost savings of Office 365—without sacrificing your ability to keep users connected and protected. For more information, visit: www.proofpoint.com/office365
Tags : 
security solutions, ransomware, security technologies, protection technologies, risk assessment, it security, server protection
    
Proofpoint
Published By: Proofpoint     Published Date: Jun 22, 2017
Doing all you can to ensure the security of Office 365 makes a lot of sense. As the volume and sophistication of advanced threats continues to evolve more rapidly than ever before, you must protect your people, data and brand from advanced attacks and compliance risks. Our security solutions provide you with industry-leading security, compliance and email continuity capabilities for your cloud based Office 365 deployment that far exceed Microsoft’s native protection. With Proofpoint, you can take advantage of the freedom, flexibility and cost savings of Office 365—without sacrificing your ability to keep users connected and protected. For more information, visit: www.proofpoint.com/office365
Tags : 
security solutions, ransomware, security technologies, protection technologies, malicious email, it security, server protection
    
Proofpoint
Published By: KPMG     Published Date: Sep 04, 2019
Banking is rapidly being transformed by one, distinct theme: digital technology. For those leading the charge, there is no longer a distinction between a business strategy and a technology strategy. There is just strategy driven by technology and the client needs it will evolve to continually meet. In this new world, upgrading existing operations and making legacy systems fit new challenges is not going to be enough. To succeed, banks need to become future-ready, connected enterprises, backed by a new type of technology and operating model that is nimble enough to adapt to new challenges and growth opportunities.
Tags : 
    
KPMG
Published By: NetApp     Published Date: Jun 03, 2016
Enterprise applications are the lifeblood of IT. We rely on them for everything from optimizing manufacturing to tracking customer satisfaction. This paper examines the criteria for selecting flash storage in support of enterprise applications and makes recommendations based on the strengths of each flash system. Explore how to align enterprise application performance, management, and growth with business priorities through the use of connected flash storage systems.
Tags : 
    
NetApp
Published By: Dell and VMWare     Published Date: Oct 26, 2017
A fundamental people-process-technology transformation enables businesses to remain competitive in today’s innovation economy. Initiatives such as advanced security, fraud detection services, connected consumer Internet of Things (IoT) devices, augmented or virtual reality experience, machine and deep learning, and cognitively enabled applications drive superior business outcomes such as predictive marketing and maintenance.
Tags : 
    
Dell and VMWare
Published By: Dell and VMWare     Published Date: Oct 26, 2017
A fundamental people-process-technology transformation enables businesses to remain competitive in today’s innovation economy. Initiatives such as advanced security, fraud detection services, connected consumer Internet of Things (IoT) devices, augmented or virtual reality experience, machine and deep learning, and cognitively enabled applications drive superior business outcomes such as predictive marketing and maintenance.
Tags : 
    
Dell and VMWare
Published By: Dell and VMWare     Published Date: Oct 26, 2017
A fundamental people-process-technology transformation enables businesses to remain competitive in today’s innovation economy. Initiatives such as advanced security, fraud detection services, connected consumer Internet of Things (IoT) devices, augmented or virtual reality experience, machine and deep learning, and cognitively enabled applications drive superior business outcomes such as predictive marketing and maintenance.
Tags : 
    
Dell and VMWare
Published By: Dell and VMWare     Published Date: Oct 26, 2017
A fundamental people-process-technology transformation enables businesses to remain competitive in today’s innovation economy. Initiatives such as advanced security, fraud detection services, connected consumer Internet of Things (IoT) devices, augmented or virtual reality experience, machine and deep learning, and cognitively enabled applications drive superior business outcomes such as predictive marketing and maintenance.
Tags : 
    
Dell and VMWare
Published By: Dell EMC & Intel     Published Date: Apr 13, 2018
A fundamental people-process-technology transformation enables businesses to remain competitive in today’s innovation economy. Initiatives such as advanced security, fraud detection services, connected consumer Internet of Things (IoT) devices, augmented or virtual reality experience, machine and deep learning, and cognitively enabled applications drive superior business outcomes such as predictive marketing and maintenance. Superior business outcomes require businesses to consider IT a core competency. For IT, an agile, elastic, and scalable IT infrastructure forms the crucial underpinning for a superior service delivery model. Dell EMC’s Intelligent Automation powered by Intel® Xeon® Platinum processor simplifies the management and maintenance of its PowerEdge server hardware. Designed to drive down the cost and resources associated with server lifecycle management, Intelligent Automation relies on integrated Dell Remote Access Controller(iDRAC) and OpenManage server management soft
Tags : 
    
Dell EMC & Intel
Published By: Intel® Services     Published Date: Aug 15, 2014
With mobile hitting the mainstream, travel suppliers and intermediaries need to evolve their mobile offerings in order to satisfy the always-connected traveler.
Tags : 
consumer experience, api management, booking and purchase, datal flow, customer satisfaction
    
Intel® Services
Published By: Intel® Services     Published Date: Aug 11, 2014
The IHE framework and process provides a model that can help address these challenges of inefficient care coordination, disconnected data silos, and proprietary, non-scalable and cost prohibitive integration strategies.
Tags : 
    
Intel® Services
Published By: RingCentral     Published Date: Nov 10, 2015
Mobility and Bring Your Own Device (BYOD) have transformed the idea of a 9-to-5 workplace. Employees now check their email first thing in the morning and expect to stay connected whenever and wherever they go throughout the day.
Tags : 
ringcentral, cloud, phone system, mobile, workforce, byod, security, wireless, knowledge management, business technology
    
RingCentral
Published By: CA Technologies     Published Date: Jan 20, 2015
In the application economy, speed, innovation and quality have become table stakes. If you can’t meet your customers’ expectations, they will surely find a competitor who can. Whether your organization is in one of the sectors facing the most intense digital competition—insurance, banking, telecommunications or retail—or in a more traditional industry, how rapidly and successfully you embrace a software-driven digital transformation strategy will likely have a profound effect on your organization’s long term viability. Within this transformation sphere, the development of “omnichannel” or “digitally-connected multi-channel” capabilities is a key priority. CA Technologies can help you deliver a consistent, integrated and quality customer experience, regardless of how your customers choose to interact with you.
Tags : 
enterprise mobility management, mobile devices, software, competitive advantage, strategic requirement, wireless, enterprise applications
    
CA Technologies
Published By: ServiceNow     Published Date: Feb 24, 2017
Customer service is at an inflection point, in both the business-to-consumer and business-to-business sectors. Costs continue to skyrocket as the volume of inquiries increases, even as customer service budgets remain flat. Customer expectations seem to increase by the hour. Make a mistake or fail to resolve an issue quickly, and businesses may quickly see a decline in customer satisfaction and revenue.
Tags : 
    
ServiceNow
Published By: Ruckus Wireless     Published Date: May 05, 2016
Password-based (PEAP, TTLS) networks experience high rates of user disruption based on password changes. Disconnected devices try to connect back to the network causing severe user disruption. So, what’s the solution to this? Certificate-based wi-fi, of course!
Tags : 
ruckus wireless, wi fi, passwords, certificate wifi, user experience, networking, wireless, enterprise applications, business technology
    
Ruckus Wireless
Published By: Dynatrace     Published Date: Dec 16, 2015
Today's hyper-connected mobile consumers have high expectations. To compete, you must provide a responsive, superior digital experience. DevOps best practices of Continuous Delivery make this possible, but to do it right you will need a safety net.
Tags : 
dynatrace, software delivery, digital, performance metrics, mobile consumer, software development, it management, enterprise applications
    
Dynatrace
Published By: SAP     Published Date: May 05, 2016
How companies are using data and analytics to make their supply chains more connected and agile
Tags : 
sap, ariba, supply chains, analytics, agile, connected, enterprise applications, business technology
    
SAP
Published By: SAP Ariba     Published Date: May 05, 2016
How companies are using data and analytics to make their supply chains more connected and agile
Tags : 
sap, ariba, supply chains, analytics, agile, connected, enterprise applications, business technology
    
SAP Ariba
Published By: Microsoft     Published Date: Oct 07, 2016
Security was once largely limited to the confines of an on-premises world, but now it must extend to the cloud, as well as a myriad of mobile devices. Employees and companies now expect increasingly complex interactions with devices, apps, data, and even other users. As many companies struggle to keep up with traditional single-point solutions, and limited budgets, this pressure is creating security blind spots for IT. In a world of evolving threats, it is becoming increasingly impossible to address all of these issues with an on-premises solution.
Tags : 
technology, best practices, data, enterprise, business analytics, business intelligence, business management
    
Microsoft
Published By: CA Technologies     Published Date: Nov 02, 2016
Scaling Agile means that we apply its principles to large, even very large, groups of people. When we do this, we allow those people to be more connected to their work and its impact, despite being part of a huge system.
Tags : 
    
CA Technologies
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.