tech

Results 1 - 25 of 10491Sort Results By: Published Date | Title | Company Name
Published By: Korenix UK Ltd     Published Date: Jul 29, 2014
Bringing the latest security and surveillance systems (e.g. CCTV), as well as onboard entertainment technologies (Infotainment) such as passenger display screens and WiFi services, to the demanding Rail sector is a challenge. Reliability of these onboard technologies is critical for both train operators and passengers, while also improving the maintenance of onboard devices when trains are on the move.
Tags : 
wifi; cctv; onboard technology; trains
    
Korenix UK Ltd
Published By: Dell APAC     Published Date: May 25, 2019
To compete in the digital era, organizations require a skilled and highly productive workforce, empowered by the right technology. Technology decision makers must match highly functional technology to the needs of every worker, enabling each person to have an experience that is productive and fulfilling, while taking organizational competitiveness to the next level. It’s a straightforward mandate, but is not always easy for technology decision makers to achieve.
Tags : 
    
Dell APAC
Published By: Dell APAC     Published Date: May 25, 2019
"Dell and its partners provide a range of solutions that enable their customers to transform the capabilities of the workforce. Dell commissioned Forrester Consulting to conduct a Total Economic ImpactTM (TEI) study and examine the potential benefits and costs enterprises may realize by deploying three key Workforce Enablement Solutions, namely: › Best device experience: a hardware policy combining the choice of a range of Dell PCs, tablets, and peripherals with rapid configuration and delivery. › Unified endpoint management (UEM): an integrated approach to managing mobile devices, PCs. and other workstation technologies. In this case study, implementations of Workspace ONE, VMware’s UEM solution, have been assessed. › Enterprise collaboration: includes capabilities such as messaging, conferencing, document sharing, and business use of social media. In this case study the collaboration elements of Microsoft Office 365, namely OneDrive, SharePoint, Teams, Skype for Business, and Yammer
Tags : 
    
Dell APAC
Published By: Dell APAC     Published Date: May 25, 2019
A single partner with a broad portfolio of security products can streamline the processes of purchasing, deployment and support. Dell has conceived and executed an innovative security strategy that provides data protection and threat prevention across an extensive line of products. Dell security technologies satisfy the requirements of both IT leaders and end users by protecting data, defending against threats, and enabling productivity and collaboration. In short, Dell’s approach enables organizations of all kinds to gain highly effective data security that is designed for the way people work."
Tags : 
    
Dell APAC
Published By: Dell APAC     Published Date: May 25, 2019
"A single partner with a broad portfolio of security products can streamline the processes of purchasing, deployment and support. Dell has conceived and executed an innovative security strategy that provides data protection and threat prevention across an extensive line of products. Dell security technologies satisfy the requirements of both IT leaders and end users by protecting data, defending against threats, and enabling productivity and collaboration. In short, Dell’s approach enables organizations of all kinds to gain highly effective data security that is designed for the way people work."
Tags : 
    
Dell APAC
Published By: Dell APAC     Published Date: May 25, 2019
To compete in the digital era, organizations require a skilled and highly productive workforce, empowered by the right technology. Technology decision makers must match highly functional technology to the needs of every worker, enabling each person to have an experience that is productive and fulfilling, while taking organizational competitiveness to the next level. It’s a straightforward mandate, but is not always easy for technology decision makers to achieve.
Tags : 
    
Dell APAC
Published By: Dell APAC     Published Date: May 25, 2019
"Dell and its partners provide a range of solutions that enable their customers to transform the capabilities of the workforce. Dell commissioned Forrester Consulting to conduct a Total Economic ImpactTM (TEI) study and examine the potential benefits and costs enterprises may realize by deploying three key Workforce Enablement Solutions, namely: › Best device experience: a hardware policy combining the choice of a range of Dell PCs, tablets, and peripherals with rapid configuration and delivery. › Unified endpoint management (UEM): an integrated approach to managing mobile devices, PCs. and other workstation technologies. In this case study, implementations of Workspace ONE, VMware’s UEM solution, have been assessed. › Enterprise collaboration: includes capabilities such as messaging, conferencing, document sharing, and business use of social media. In this case study the collaboration elements of Microsoft Office 365, namely OneDrive, SharePoint, Teams, Skype for Business, and Yammer
Tags : 
    
Dell APAC
Published By: Dell APAC     Published Date: May 25, 2019
"Dell and its partners provide a range of solutions that enable their customers to transform the capabilities of the workforce. Dell commissioned Forrester Consulting to conduct a Total Economic ImpactTM (TEI) study and examine the potential benefits and costs enterprises may realize by deploying three key Workforce Enablement Solutions, namely: › Best device experience: a hardware policy combining the choice of a range of Dell PCs, tablets, and peripherals with rapid configuration and delivery. › Unified endpoint management (UEM): an integrated approach to managing mobile devices, PCs. and other workstation technologies. In this case study, implementations of Workspace ONE, VMware’s UEM solution, have been assessed. › Enterprise collaboration: includes capabilities such as messaging, conferencing, document sharing, and business use of social media. In this case study the collaboration elements of Microsoft Office 365, namely OneDrive, SharePoint, Teams, Skype for Business, and Yammer
Tags : 
    
Dell APAC
Published By: Dell APAC     Published Date: May 25, 2019
To compete in the digital era, organizations require a skilled and highly productive workforce, empowered by the right technology. Technology decision makers must match highly functional technology to the needs of every worker, enabling each person to have an experience that is productive and fulfilling, while taking organizational competitiveness to the next level. It’s a straightforward mandate, but is not always easy for technology decision makers to achieve.
Tags : 
    
Dell APAC
Published By: Dell APAC     Published Date: May 25, 2019
"A single partner with a broad portfolio of security products can streamline the processes of purchasing, deployment and support. Dell has conceived and executed an innovative security strategy that provides data protection and threat prevention across an extensive line of products. Dell security technologies satisfy the requirements of both IT leaders and end users by protecting data, defending against threats, and enabling productivity and collaboration. In short, Dell’s approach enables organizations of all kinds to gain highly effective data security that is designed for the way people work."
Tags : 
    
Dell APAC
Published By: Dell APAC     Published Date: May 25, 2019
To compete in the digital era, organizations require a skilled and highly productive workforce, empowered by the right technology. Technology decision makers must match highly functional technology to the needs of every worker, enabling each person to have an experience that is productive and fulfilling, while taking organizational competitiveness to the next level. It’s a straightforward mandate, but is not always easy for technology decision makers to achieve.
Tags : 
    
Dell APAC
Published By: Dell APAC     Published Date: May 25, 2019
"Dell and its partners provide a range of solutions that enable their customers to transform the capabilities of the workforce. Dell commissioned Forrester Consulting to conduct a Total Economic ImpactTM (TEI) study and examine the potential benefits and costs enterprises may realize by deploying three key Workforce Enablement Solutions, namely: › Best device experience: a hardware policy combining the choice of a range of Dell PCs, tablets, and peripherals with rapid configuration and delivery. › Unified endpoint management (UEM): an integrated approach to managing mobile devices, PCs. and other workstation technologies. In this case study, implementations of Workspace ONE, VMware’s UEM solution, have been assessed. › Enterprise collaboration: includes capabilities such as messaging, conferencing, document sharing, and business use of social media. In this case study the collaboration elements of Microsoft Office 365, namely OneDrive, SharePoint, Teams, Skype for Business, and Yammer
Tags : 
    
Dell APAC
Published By: Dell APAC     Published Date: May 25, 2019
"A single partner with a broad portfolio of security products can streamline the processes of purchasing, deployment and support. Dell has conceived and executed an innovative security strategy that provides data protection and threat prevention across an extensive line of products. Dell security technologies satisfy the requirements of both IT leaders and end users by protecting data, defending against threats, and enabling productivity and collaboration. In short, Dell’s approach enables organizations of all kinds to gain highly effective data security that is designed for the way people work."
Tags : 
    
Dell APAC
Published By: HERE Technologies     Published Date: May 24, 2019
How secure is your company’s network? The rising frequency of employee network access is fast becoming one of the most prevalent and unmanaged risks to the protection of critical enterprise data. When coupled with increasingly sophisticated cyber-attacks, the possibility of a security breach of enterprise networks becomes more likely. As one of the world’s leading location platforms in 2018, HERE shares insights and solutions to preventing identity fraud. Discover the latest facts and statistics. Learn more about the use-case of location verification when logging into your company’s network. Download the infographic from HERE Technologies.
Tags : 
technology, mapping, location data
    
HERE Technologies
Published By: Citrix ShareFile     Published Date: Jul 02, 2019
A mobile, flexible work experience doesn’t just help you attract the best employees—it also helps your organization become more productive and innovative. Read this ebook to find out how Citrix Workspace can help you: • Empower employees and teams anywhere, on any device • Simplify and improve both security and endpoint management • Adopt new technologies more quickly and effectively
Tags : 
    
Citrix ShareFile
Published By: Dell EMC     Published Date: May 08, 2019
IDC reports companies that modernize IT infrastructure for emerging technologies such as AI thrive and see results such as launching IT services faster and closing more deals. Access this comprehensive whitepaper from Dell and Intel® to learn more.
Tags : 
    
Dell EMC
Published By: Dell EMC     Published Date: May 08, 2019
Companies face a challengning decision in this digital era?use technology to purposefully disrupt their organization and unlock new opportunites, or wait and risk being disrupted by others. To keep pace in an ever accelerating digital environment, companies need to transform their entire organization through technology. Download this eBook from Dell EMC and Intel® to learn how to modernize your business and become a digital innovator.
Tags : 
    
Dell EMC
Published By: Dell EMC     Published Date: May 09, 2019
In nearly all midmarket businesses, staff costs are the single biggest expense – meaning that productivity gains have a substantial and lasting impact on the bottom line. This Proaction Series report, commissioned by Dell, discusses technologies that deliver the fastest, clearest productivity benefits to midmarket businesses and will address: - What midmarket firms are looking to accomplish - Why they would invest in IT solutions to achieve success in this area - Required IT solutions to support process evolution Download this report for more information.
Tags : 
    
Dell EMC
Published By: Dell EMC     Published Date: May 09, 2019
Like businesses of all sizes, midmarket firms are focused on reducing operational costs and improving profitability. Midmarket firms, though, have a set of unique challenges and opportunities that will shape their ability to manage expense and boost the bottom line. This Proaction Series report, commissioned by Dell, will highlight technologies to deliver the clearest cost and profitability benefits to midmarket businesses. Access this report for more information.
Tags : 
    
Dell EMC
Published By: Dell EMC     Published Date: May 09, 2019
.As midmarket companies pursue business growth, they must deliver differentiated products and experiences without compromising business or customer data. Crucial to this is having the most up-to date IT infrastructure to support the scale and complexity of a changing application landscape. Midmarket businesses (MBs) must modernize their data centers refreshing server infrastructure and automating their IT management processes. Those that do will propel business innovation and deliver superior customer experiences with secure, fast, and reliable business technology. Download this paper, commissioned by Dell, to learn more.
Tags : 
    
Dell EMC
Published By: Akamai Technologies     Published Date: Jul 02, 2019
Loyalty and rewards programs are powerful tools for brands to boost member engagement, acquisition, and retention. Learn why leading brands are turning to modern customer identity and access management (CIAM) solutions to scale their loyalty programs, improve user experience, and maximize ROI. In this paper, we identify the challenges associated with transforming, expanding, and scaling customer loyalty and rewards programs and related membership initiatives, and present solutions based on real-world case studies from four industries. We explore the requirements for an enterprise-grade CIAM solution and address related issues such as build vs. buy and CIAM vs. IAM. By examining four diverse case studies — and the resulting identity management solutions that were implemented by the respective companies — this paper provides valuable insight for any enterprise wishing to expand or uplift its customer loyalty program to meet membership needs in the age of the consumer.
Tags : 
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Jul 02, 2019
The stakes are high for consumer brands in today’s data privacy landscape. Sophisticated cyberattacks and front-page data privacy breaches threaten to compromise customer data and damage brand trust. To succeed today, brands must implement a data security and privacy strategy that prioritizes customer trust. Are you up to the challenge? Use Forrester Research’s “Data Security and Privacy Maturity Assessment” to gauge your brand’s competencies and identify areas for improvement. You will learn: ? The four key data security and privacy competencies B2C brands must master ? How you measure up against Forrester Research’s recommended best practices ? Tips to make your data security and privacy culture a competitive differentiator
Tags : 
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Jul 02, 2019
In today’s markets, customer identities and the personal data associated with them are among the most critical and valuable assets of any enterprise. Managing these digital identities — from first registration and login to the later stages of the customer relationship — and extracting business value from the associated data are complex tasks, commonly referred to as customer identity and access management (CIAM). When implementing a system to collect, manage, and utilize digital identity and customer data, companies have two basic choices: in-house development or buying a dedicated solution from a vendor specialized in CIAM (i.e., build vs. buy). Read this white paper for an in-depth analysis of CIAM implementation options, including: ? Must-haves for a successful, enterprise-grade CIAM system ? Pros and cons of implementation options, ranging from in-house software development to commercial off-the-shelf solutions ? A real-world case study that illustrates the ROI of an effective CI
Tags : 
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Jul 02, 2019
Customer identity and access management (CIAM) is increasingly important for brands to deliver the seamless, secure digital experiences demanded by empowered consumers. As part of its Identity and Access Management Playbook, Forrester Research provides guidance to build a customer-obsessed IAM team that has the technical skills, business influence, and interpersonal attributes to architect a CIAM strategy and roll it out across functional groups. Read the full report to learn critical considerations to make your CIAM team effective. Report highlights: ? Four essential roles for your CIAM team ? Why sharing and integrating customer data across organization barriers is critical for success ? The most important technical, business, and interpersonal skills to look for in CIAM candidates
Tags : 
    
Akamai Technologies
Published By: Nozomi     Published Date: Jul 08, 2019
Read this document to learn: NN-OT-Risks-Costs-DOCUMENT How OT cyberattacks cause business disruption The costs of high profile industrial cyber security incidents How to reduce risk with OT visibility and cyber security technology Examples of OT cyber security incidents by industry Complete the form and download the Executive Brief. You'll be on your way to improving your knowledge of the industrial security challenge!
Tags : 
    
Nozomi
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.