traditional pr

Results 226 - 250 of 842Sort Results By: Published Date | Title | Company Name
Published By: HERE Technologies     Published Date: Sep 26, 2018
HERE was named the world’s leading location platform in 2018 (Source: Ovum), overtaking Google for the first time. Ovum’s Index assesses and ranks the major vendors in the location platform market. According to Ovum: ‘HERE has always scored well on the completeness of its offering, leading on this front for some time. Where it traditionally lagged Google was on the reach of its platform, but this has been steadily improving thanks to the wide range of verticals its platform addresses. An important factor in HERE topping the leader board has been its strong focus on the developer community.’
Tags : 
    
HERE Technologies
Published By: Larsen & Toubro Infotech(LTI)     Published Date: Jan 31, 2019
LTI helped a leading global bank digitize its traditional product ecosystem for AML transaction monitoring. With the creation of a data lake and efficient learning models, the bank successfully reduced false positives and improved customer risk assessment. Download Complete Case Study.
Tags : 
    
Larsen & Toubro Infotech(LTI)
Published By: athenahealth     Published Date: Apr 30, 2013
Traditional EMRs consistently fail to help physicians make more money, do less work, and deliver better care. High up-front fees with traditional EMRs are one factor, but the greatest problem with traditional EMRs is that they are designed without an understanding of the fundamental economics of a patient encounter.
Tags : 
patient workflow, ehr, physician, meaningful use, analytics, data
    
athenahealth
Published By: Dun & Bradstreet     Published Date: Oct 21, 2016
It is important to understand the different business situations where traditional predictive analytics can be best applied and where anticipatory analytics may be a more appropriate approach to solve the business problem. One is not necessarily superior to the other – it’s about which methodology is best utilized in solving the specific business problem. Conventional response modeling, revenue potential modeling, wallet share analysis, traditional risk scoring and other analytic practices will always be important tools for businesses far-and-wide, but as more companies focus on analytics to inform growth, they’ll have employ the right team and identify the right partners to work with in order to successfully leverage anticipatory analytics to gain a competitive advantage. Looking forward, we anticipate anticipatory analytics playing an important role in your future. Download this white paper to learn more.
Tags : 
    
Dun & Bradstreet
Published By: Akamai Technologies     Published Date: Mar 07, 2019
Traditional remote access technologies—like VPNs, proxies,and remote desktops—provide access in much the same way they did 20 years ago. However, new and growing business realities—like a growing mobile and distributed workforce—are forcing enterprises to take a different approach to address the complexity and security challenges that traditional access technologies present. Read this whitepaper to learn 5 key reasons why it’s time for enterprises to adopt a new remote access model.
Tags : 
    
Akamai Technologies
Published By: Hitachi Vantara     Published Date: Mar 20, 2018
Digital transformation is disrupting traditional, tried-and-true business process and leaving many enterprises scrambling for alternatives. Although the customer remains king for business success, data is quickly becoming an organization’s most strategic asset for reaching, interacting with and retaining customers. With ransomware attacks on the rise, a strict regulatory environment, and nimble, competitive upstarts entering the market, protecting and extracting value from your most strategic asset is a business imperative — and a formidable challenge.
Tags : 
    
Hitachi Vantara
Published By: Cisco Umbrella EMEA     Published Date: Oct 22, 2018
Can your organization afford to wait until after an attack happens to protect your users and your data? Perimeter security provides visibility and control for employee activity only when employees remain on a corporate network. What about roaming users who bypass the VPN? Or employees working in cloud applications? Web gateways only protect employees from threats over web ports 80 and 443. Today’s security must provide comprehensive protection across all ports and protocols to fill the gaps in the security stack. Hear from Eric Ahlm, Research Director at Gartner and Meg Diaz, Head of Product Marketing for Cisco Umbrella. Eric and Meg will address the challenges companies face as they compare modern convenience with the known risks of relinquishing visibility and control, especially as more sensitive data moves to the cloud. Join us for the guidance you need to stay ahead of the curve in 2018. We’ll discuss the right answer for protecting data in the digital age.
Tags : 
    
Cisco Umbrella EMEA
Published By: Cisco Umbrella EMEA     Published Date: Dec 03, 2018
The cloud — at one point it was a revolution in the workplace. Now it is simply accepted as an efficient way to get business done. Most of today’s IT security was built to protect a well-defined network infrastructure, but that is yesterday’s architecture. When users and assets move outside the network perimeter where the traditional security stack can no longer protect them, your enterprise is exposed to an entirely new set of risks. And with more apps and sensitive data living in the cloud or on mobile devices, gaps emerge that leave organizations susceptible to attacks. Read this flipbook to see how you can take your security to new heights. We'll explain the challenges driving the shift in the market and how you can take advantage of these changes and improve security for your organization.
Tags : 
    
Cisco Umbrella EMEA
Published By: Cisco Umbrella EMEA     Published Date: Dec 03, 2018
Your users, especially when working outside of the office, no longer need to always connect to the corporate network to get work done. They often connect directly to SaaS apps. And, let’s face it, employees also don’t turn on the VPN if they’re using their work laptop for personal use — which means they’re left with very little security protection. Plus, many organizations are now using direct internet connections at branch offices, which means employees and guest users don’t get the protection of your traditional security stack. Not only are more offices connecting directly to the internet — it’s estimated that 70% of branch offices already have some direct internet access — but attackers recognize these weak points in their targets and have started exploiting them more. To solve these new challenges, security controls must also shift to the cloud. This in-depth white paper describes how security must evolve to protect users anywhere they access the internet.
Tags : 
    
Cisco Umbrella EMEA
Published By: SAP     Published Date: Nov 22, 2017
In today’s market, discrete manufacturers must stay focused on traditional objectives — increasing uptime and throughput in the plant and closely managing costs throughout their operations. At the same time, they must also create and offer more integrated products and services and even new business models to enhance the customer experience. These new offerings incorporate increasing amounts of technology — including Internet of Things. Indeed, by 2018, nearly one-third of industry leaders will be disrupted by competitors that are digitally-enabled. For manufacturers, this IDC white paper examines the current and future Internet of Things (IoT) imperative for the following discrete manufacturing industries: automotive, aerospace and defense, high tech, and industrial machinery. We highlight IoT-enabled scenarios — those possible both now and in an Industry 4.0 future with smart manufacturing.
Tags : 
market, traditional objectives, uptime, plant, managing, costs, operations, offerings
    
SAP
Published By: IBM     Published Date: May 26, 2017
Securing your infrastructure, your customer interactions and protecting your data are critical to preserving your reputation and your bottom line. Many cyber attacks remain undetected for up to eight months1 and can cost an organization an average of 11 million USD.2 Today’s cyber actors are becoming more sophisticated, agile and capable of getting past any network security. Organizations must evolve, replacing traditional defensive security strategies with a proactive, intelligence-driven offense to prevent and disrupt these threats. IBM® i2® Enterprise Insight Analysis is a next generation intelligence solution that enables organizations to incorporate cyber threat hunting into their security strategy and turn their defense into a proactive offense.It helps organizations uncover critical insights about their threats and threat actors so they can mitigate and counter more threats with a combination of multi-dimensional visualte analysis capabilities
Tags : 
ibm, ibm i2, cyber security, customer interaction, enterprise insight analysis
    
IBM
Published By: Group M_IBM Q119     Published Date: Mar 05, 2019
In this digital world, fast and reliable movement of digital data, including massive sizes over global distances, is becoming vital to business success across virtually every industry. The Transmission Control Protocol (TCP) that has traditionally been the engine of this data movement, however, has inherent bottlenecks in performance (Figure 1), especially for networks with high, round-trip time (RTT) and packet loss, and most pronounced on high-bandwidth networks. It is well understood that these inherent “soft” bottlenecks arcaused by TCP’s AdditiveIncrease-Multiplicative-Decrease (AIMD) congestion avoidance algorithm, which slowly probes the available bandwidth of the network, increasing the transmission rate until packet loss is detected and then exponentially reducing the transmission rate. However, it is less understood that other sources of packet loss, such as losses due to the physical network media, not associated with network congestion equally reduce the transmission rate.
Tags : 
    
Group M_IBM Q119
Published By: Vocia     Published Date: Aug 24, 2011
Traditional overhead paging technology has evolved into advanced network-based paging systems. Examine industry trends that drive the need for a future-proof, critical paging system for today's healthcare facilities.
Tags : 
vocia, hospital sound systems, hospital paging systems, network-based paging, hcfm, network media systems, hospital paging infrastructure, biamp systems, health it, ehr, unified communications
    
Vocia
Published By: Esker     Published Date: Dec 19, 2016
There is a noticeable shift occurring in the world of order management. Traditionally, projects related to order-taking were spearheaded by the customer service department. Not anymore. The pressures of today’s global economy have forced supply chain functions to play a more direct and strategic role in reducing costs, improving the customer experience, and driving added value throughout the organization. Naturally, supply chain leaders now have a significantly higher rate of interest and involvement in order management initiatives. Supply chain leaders work in a competitive environment, and in order to get ahead of the competition, they are increasingly turning to order processing automation solutions. Find out the four key reasons automation is emerging in the supply chain. Download now!
Tags : 
    
Esker
Published By: Esker     Published Date: Dec 19, 2016
Electronic Data Interchange, commonly referred to as EDI, is a process that allows data to be exchanged between businesses in a standard electronic format. Sales order processing is an area of business where EDI is used extensively. However, up to one-third of EDI orders can contain exceptions — this is where problems surface. Traditional handling methods cause a host of challenges for customer service professionals and the business as a whole. This eBook aims to expose these issues, while showing how order processing automation can work with existing EDI environments to streamline exception handling and fix any potential problems before they mess up your ERP system and bottom line. Learn more about EDI Exceptions, download now!
Tags : 
    
Esker
Published By: NetApp     Published Date: Sep 24, 2013
"As IT continues to implement advanced capabilities, as well as traditional services such as server virtualization, storage systems become more complex. The complexity only increases because of the rapid growth of data that needs to be managed. View this resource to learn the results of ESG Lab hands-on evaluation of NetApp storage systems with a focus on those enterprise-class capabilities required to manage increasingly large and complex storage environments."
Tags : 
storage infrastructure, clustered storage, technology, scalability, application, storage solution, non-disruptive operations
    
NetApp
Published By: NetApp     Published Date: Sep 24, 2013
"Flash technology is becoming more prominent in the storage industry. Offering superior speed and reliability when compared to traditional hard disk drives – flash storage is a flexible and increasingly cost-effective technology that can be used to optimize enterprise storage environments. This ebook explores the many uses and benefits of flash storage technology in the enterprise. Check it out to discover and learn all you need to: * Optimize storage performance * Leverage server flash as storage cache * Reduce the footprint of your storage infrastructure in the data center "
Tags : 
flash technology, storage industry, superior speed, cost effective, cloud, optimization, storage cache, data center
    
NetApp
Published By: NetApp     Published Date: Sep 30, 2013
IT teams are working harder than ever in the face of massive data growth, complex operations, and time and budget constraints. Access this white paper to discover an operating system that addresses the limitations of traditional approaches to IT, removing IT constraints and allowing you to respond to business demands more readily.
Tags : 
cloud computing, communication, bluewolf, self-service, technology, cloud
    
NetApp
Published By: Oracle     Published Date: Mar 09, 2017
In this white paper, IDC discusses the inherent difficulties associated with traditional backup schemes and the changing dynamics of data protection strategies. We examine Oracle's Zero Data Loss Recovery Appliance (ZDLRA) and the role it can play in providing significantly improved service levels for all types of Oracle databases.
Tags : 
    
Oracle
Published By: VMware, Inc     Published Date: Oct 28, 2014
Traditional disaster recovery solutions are expensive and complex. That’s making disaster recovery in the cloud a compelling alternative for many small-to-mid sized companies. Cloud solutions are more affordable, require less commitment, and offer more capacity—an ideal combination for resource-strapped organizations. VMware vCloud® Air™ Disaster Recovery is easy to deploy and offers flexible terms and scalable resource options. It enables you to improve upon your existing disaster recovery plans—or put a new plan into operation—with minimal cost and resources. Here are three great reasons to get started now with vCloud Air Disaster Recovery.
Tags : 
cloud, disaster recovery, alternative, resource-strapped organizations, scalable resource options
    
VMware, Inc
Published By: NetApp     Published Date: Dec 09, 2014
Although the cost of flash storage solutions continues to fall, on a per-gigabyte capacity basis, it is still significantly more expensive to acquire than traditional hard drives. However, when the cost per gigabyte is examined in terms of TCO, and the customer looks past the pure acquisition cost and accounts for “soft factors” such as prolonging the life of a data center, lower operating costs (for example, power and cooling), increased flexibility and scalability, or the service levels that a flash solution enables, flash solution costs become increasingly competitive with spinning media.
Tags : 
flash storage, netapp, tco, flash storage solutions, soft factors, flash solution
    
NetApp
Published By: Polycom     Published Date: Oct 17, 2016
With its CX5100 and CX5500 products, Polycom (the sponsor of this study) has taken an innovative approach to resolving this situation. The CX5100 and CX5500 are 360 degree camera systems that sit in the middle of the conference room table, providing remote Skype for Business/Lync users with a better “connection” to the meeting room. And unlike traditional video conferencing systems, the “camera in the middle of the table” approach is flexible enough to support both standard / formal meetings and teaming sessions.
Tags : 
    
Polycom
Published By: Workforce Software     Published Date: Mar 04, 2015
The traditional functions of a time and attendance system still matter, but newer solutions can deliver so much more. Join this informative webcast to learn some of specific advantages that cloud delivery offers for time and attendance, and for an update on the security best practices that vendors should employ to keep your system—and your data—safe. The presenters will also describe how a modern solution can improve decision-making, boost productivity, and provide a better view of your total workforce.
Tags : 
workforce software, cloud, time attendance, modern solution
    
Workforce Software
Published By: Mitel     Published Date: Apr 25, 2018
This is a time of rapid and dramatic progress in the cloud communications landscape. New technological innovations help companies incorporate location-independent systems, allowing workers to collaborate and communicate wherever they may be. And all signs indicate this is only the beginning, with the industry poised for unprecedented growth. In fact, as enterprise software moves to the cloud, the traditional unified communications space is having its own dramatic shift. The consumer experiences from Snapchat to Instagram to Facebook among other consumer technologies—are changing the expectations for communications. New models for collaboration and engagement, supported by big data and the cloud, provide a whole new world of opportunities.
Tags : 
evolution, consumer, demands, cloud, communications
    
Mitel
Published By: SilkRoad Technology     Published Date: Feb 24, 2016
It’s a new day for corporate training and those who manage learning functions. Today, traditional training programs aren’t enough to meet growing demands for better company performance, consistent compliance, changing employee expectations, and cost control.
Tags : 
silkroad, human resources, learning, development
    
SilkRoad Technology
Start   Previous    3 4 5 6 7 8 9 10 11 12 13 14 15 16 17    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.


Featured FREE Resource: