cross device

Results 1 - 25 of 221Sort Results By: Published Date | Title | Company Name
Published By: Intel     Published Date: Dec 13, 2018
Robots play a key role in achieving manufacturing efficiencies and reducing labor intensive operations across diverse industries. Traditional machine vision has its limitations, however—typically, it can only conduct defect detection and classification based on fixed rules and work in fixed environments. To add on, the complexity of robotic system design poses challenges for many manufacturers to identify and integrate subsystems from multiple vendors. The future of robot and machine solutions is a production environment where devices, machines, robots, and sensors are interoperable. Find out how NexCOBOT integrates AI-driven vision capabilities into robotics to improve quality and accuracy over traditional machine vision—as well as providing an open and modular solution for users to develop a robot control system that best fits their particular application requirements.
Tags : 
    
Intel
Published By: Cisco     Published Date: Dec 11, 2018
The most significant IT transformation of this century is the rapid adoption of cloud-based applications. Most organizations are now dependent on a number of SaaS and IaaS platforms to deliver customer satisfaction and empower employee productivity. IT teams are responsible for delivering a high quality user experience for cloud applications while they struggle to manage a secure environment with advanced persistent threats. The WAN is the fabric to connect and control access between remote users and cloud-based applications. The WAN fabric needs to identify application type, location, apply prioritization and route traffic across the appropriate (multiple) WAN links to deliver on user experience. Different types of users/devices connecting to the cloud (via the Internet) means security policies must be enforced at branch, data center and in the cloud.
Tags : 
    
Cisco
Published By: Motorola Solutions     Published Date: Nov 29, 2018
When it comes to worker safety, mitigating downtime, and boosting productivity, nothing is faster than right NOW. Organizations across various industry segments — construction, food and beverage, chemical and industrial, and transportation equipment manufacturers — are juggling a mix of communication devices, slowing response times. Gaps in coverage, poor battery life and aging equipment reduce your ability to safely and efficiently meet production deadlines. The power of NOW puts instant communications at your workers’ fingertips — because when communication slows, production slows. Manufacturers today are under immense pressure to produce goods safely, efficiently and profitably. Meeting these goals requires reliable, clear voice and data communications. So the production line is always moving. So well-executed logistics exceed expectations. So materials and operations are tracked to maintain efficiency. So your most valuable assets — your people — are safe and connected. Unified tea
Tags : 
    
Motorola Solutions
Published By: Motorola Solutions     Published Date: Nov 29, 2018
In today’s increasingly mobile world, Energy workers require instant communication and access to data intelligence wherever the job may take them. From the oil rig to the electric grid and everywhere in between, having the right data, in the right hands, at the right time, no matter the environment or device of choice — is simply non-negotiable. Organizations across various Energy segments — oil & gas, electric utilities, water utilities, and mining — are currently juggling a mix of communication devices and are hindered by gaps in coverage, poor battery life and fragile equipment that cannot withstand harsh environmental conditions. Yet, citizens rely on their homes being heated in the winter, on clean running water, and on lights that turn on when they flip the switch. Meeting these expectations requires reliable, clear voice and data communications for Energy workers day-in and day-out. So oil & gas workers can communicate safely in hazardous environments. So precious resources are
Tags : 
    
Motorola Solutions
Published By: MuleSoft     Published Date: Nov 27, 2018
“Today’s shoppers expect more than a transactional relationship with retailers; they want a seamless and personalized journey that reflects the context of how they shop across devices and channels. The key to success lies in connecting in-store software with online systems so retailers can provide an uninterrupted experience wherever customers shop.” - Ross Mason, Founder of MuleSoft Driving digital transformation in retail requires connectivity across an ever-increasing number of applications, data and devices. Because of this, connectivity has emerged as a bottleneck that slows the development of new applications and the adoption of new technologies to meet customer demands. In response, leading retail and CPG companies have adopted API-led connectivity, which eliminates this connectivity bottleneck and enables a 2-5x faster IT project delivery across the value chain. Download this eBook to learn: How leading retailers like Buffalo Wild Wings, TAL Apparel and PetSmart are leverag
Tags : 
    
MuleSoft
Published By: Fortinet EMEA     Published Date: Nov 26, 2018
When it comes to securing all the parts of a modern distributed network, endpoints remain the most vulnerable outlier. Mobility has brought a flood of different devices that cross in and out of enterprise networks on a daily basis. This public exposure, combined with inadequate traditional endpoint security and a high degree of user autonomy, makes these devices prime targets for malware infections and other forms of sophisticated attack that seek to exploit the broader organization. And threat actors are finding enormous success along these vectors. To stay competitive, most organizations are currently embracing digital transformation (DX)—including cloud services, smart Internet of Things (IoT) devices, and greater mobility. These adaptations provide organizations with faster and more seamless access to critical information, regardless of the device being used to access it. However, as distributed networks expand and become more difficult to manage, the endpoint remains a weak link i
Tags : 
    
Fortinet EMEA
Published By: Arkadin     Published Date: Nov 20, 2018
Are you considering cloud-based video conferencing? Organizations today are seeking simple HD video conferencing solutions with a seamless and consistent user experience across devices. Preparation is key in realizing the benefits of cloud-based video conferencing, so we've put together a list of the most important items to consider to help get you started.
Tags : 
virtual, cloud, cloud-based, video, hd video, conferencing, preparation, solutions
    
Arkadin
Published By: Citrix Systems     Published Date: Nov 13, 2018
Nowadays, employees expect intuitive tools that are not only easy to use but also enable them to work when, where, and how they need without constraint. Get this e-book to learn five ways Citrix Workspace prioritizes user experience and security by providing: -Easy access to all apps, desktops, and files -Reliable, high-quality 3-D graphics, videoconferencing and virtual apps from any location -File sharing across devices -Mobile productivity apps
Tags : 
    
Citrix Systems
Published By: Salesforce     Published Date: Nov 09, 2018
The pillars that are driving a superior customer service experience are changing. It used to be that just answering a customer’s question correctly and in a somewhat timely manner would cut it — but in 2016 that’s not so. Your customers carry more devices, and are more connected, informed and empowered. Today’s ultra-smart customer demands connected, seamless interactions, experiences where they can choose the service that best suits their needs and consistently offers personalized journeys across all devices. More often than not, the future of business success often depends on whether companies can deliver on those expectations.
Tags : 
    
Salesforce
Published By: Adobe     Published Date: Nov 02, 2018
Improving the customer experience is a strategic imperative for most organizations today, but delivering an engaging experience across the growing number of digital customer touch points can be a daunting challenge. Organizations must deliver responsive experiences that “play well” on smartphones, PCs, and tablets. They must publish content to installed app experiences on mobile and other connected devices, to social channels, and to email campaigns. They must manage global sites in different languages, localize the experience for different markets, and — increasingly — personalize the experience for different customer personas or segments. A modern digital experience management platform is essential for any organization hoping to make digital experience delivery a core competency. IDC interviewed organizations using Adobe Experience Manager Sites (AEM Sites) to understand the impact of the platform on their ability to create, manage, and deliver digital experiences. Study participants
Tags : 
    
Adobe
Published By: Adobe     Published Date: Oct 24, 2018
Adobe Audience Manager uses identity management tools and device graphs to tie device IDs to individuals or groups. If a customer starts using a device you don’t recognize, you can use second-party data available through a network or co-op to supplement your own, building a complete view of your customer. This allows you to send consistent messaging across devices, whether your customers log in to your site or not.
Tags : 
    
Adobe
Published By: Juniper Networks     Published Date: Oct 02, 2018
As customers demand and expect more of a digitized experience, the scale and volume of secure data that’s being transmitted across the network is increasing exponentially. At the same time, across the APAC region high digital connectivity, contrasted with low cybersecurity awareness, growing cross-border data transfers and weak regulations have made this data a global target. The growth in the “as-a-service” nature of the cybercrime marketplace is also fueling an increase in the number of traditional crime groups and individuals drawn into cyber offending. New sources of vulnerability from mobile, BYOD, CYOD, web-services and IoT devices are further broadening the cyber threat landscape with ever-more sophisticated forms of malware and DDoS attacks. Download the IDC Report to get some tips on how to stay protected against cybercrime.
Tags : 
    
Juniper Networks
Published By: Group M_IBM Q418     Published Date: Oct 02, 2018
Across enterprises of all kinds, data is multiplying rapidly in both quantity and variety. Across multi-cloud environments, new sources are exponentially increasing the growing stream of information, including the Internet of Things, social media, mobile devices, virtual reality implementations and optical tracking.
Tags : 
    
Group M_IBM Q418
Published By: TIBCO Software EMEA     Published Date: Sep 12, 2018
The Internet of Things (IoT) didn’t just connect everything everywhere; It laid the groundwork for the next industrial revolution. Connected devices sending data was only one achievement of the IoT—but one that helped solve the problem of data spread across countless silos that was not collected because it was too voluminous and/or too expensive to analyze. Now, with advances in cloud computing and analytics, cheaper and more scalable factory solutions are available. This, in combination with the cost and size of sensors continuously being reduced, supplies the other achievement: the possibility for every organization to digitally transform. Using a Smart Factory system, all relevant data is aggregated, analyzed, and acted upon. Sensors, devices, people, and processes are part of a connected ecosystem providing: • Reduced downtime • Minimized surplus and defects • Deep insights • End-to-end real-time visibility
Tags : 
internet of things, connected ecosystem, big data, operations monitoring, process control, analytical techniques
    
TIBCO Software EMEA
Published By: Group M_IBM Q418     Published Date: Sep 10, 2018
Every day, companies generate mountains of data that are critical to their business. With that data comes a clear challenge: How do you protect exabytes of data that's strewn across global data centers, computer rooms, remote offices, laptops, desktops, and mobile devices, as well as hosted by many different cloud providers, without choking business agility, employee productivity, and customer experience? The solution lies not in throwing more technology at the network, but in taking specific steps to identify malicious actions and respond to them in order to fix the issue, a process known as operationalizing security.
Tags : 
    
Group M_IBM Q418
Published By: MobileIron     Published Date: Aug 20, 2018
MobileIron knows that cybercriminals are continuously generating more advanced ways to steal your data by any means necessary. That’s why we are committed to continually innovating and delivering new solutions that help our customers win the race against time to get ahead of the latest mobile security threats. As part of that commitment, MobileIron Threat Defense supports the five critical steps to deploying advanced, on-device mobile security. Our solution provides a single, integrated app that delivers several key advantages: • A single app of threat protection is fully integrated with EMM. • No user action is required to activate or update on-device security. • Advanced mobile security blocks known and zero-day threats across iOS and Android devices with no Internet connectivity required. • Machine-learning algorithms instantly detect and remediate on-device DNA threats.
Tags : 
mobile, threat, defense, strategy, mobileiron, innovation
    
MobileIron
Published By: Dell     Published Date: Aug 08, 2018
In order to keep pace with the growth of business mobility without falling prey to its potential risks, IT must be able to efficiently address complex issues ranging from service provisioning, device procurement, and security oversight. Why? Information workers need access to often sensitive information across a wide range of business applications and devices from wherever they are. In other words, security and privacy policies that doesn’t impede end-user productivity will empower workers and boost their performance. In July 2017, Dell commissioned Forrester to conduct a study of the 21st century workforce and how their new habits, attitudes, and workstyles are reshaping the world of work. With more personas in a single organization to cater to, businesses are failing to deliver against workforce demands. To get their tasks done, workers are circumventing security policies to get what they want, in their moment of need. Organizations have to understand the different behaviors across
Tags : 
    
Dell
Published By: Ruckus Wireless     Published Date: Jul 11, 2018
In an era of "lean IT," the centralized management capabilities of cloud-managed Wi-Fi make it an attractive option to manage and maintain wireless LANs (WLANs) across multiple locations. The decision to move WLAN management to the cloud requires one key assurance: end-to-end security from user devices to the cloud. This means that user data must be protected over the WAN and in the data center. These security measures should not require on-staff WLAN security expertise to manage. And security measures should be largely transparent to users. This paper provides an overview of the security architecture of Ruckus Cloud Wi-Fi, as well as best practices for specific security scenarios.
Tags : 
    
Ruckus Wireless
Published By: Cylance     Published Date: Jul 02, 2018
Phoenix Children’s CISO, Daniel Shuler, and its IT security team are responsible for protecting 5,000 endpoints in the hospital and across more than 20 clinics in the region. Endpoints include physician and staff laptops and desktops, nursing stations, servers, Windows-based clinical devices, credit card payment processors, and point-of-sale terminals. These endpoints are used to store and/or process personal health information (PHI), and payment and credit card information. They must comply with HIPAA for PHI and voluntarily comply with the Payment Card Industry Data Security Standard (PCI-DSS) for credit card data. The IT security team’s existing industry-leading AV solution claimed to provide visibility into malicious activity aimed at the endpoints. It continuously reported all endpoints were safe, sound, and secure. This caused Daniel to be suspicious. He knew from experience that such low levels of endpoint malicious activity was highly unlikely. Read the full case study to learn about the results Cylance was able to deliver.
Tags : 
hospital, cyber, security, data
    
Cylance
Published By: IBM     Published Date: Jun 29, 2018
Every day, companies generate mountains of data that are critical to their business. With that data comes a clear challenge: How do you protect exabytes of data that's strewn across global data centers, computer rooms, remote offices, laptops, desktops, and mobile devices, as well as hosted by many different cloud providers, without choking business agility, employee productivity, and customer experience? The solution lies not in throwing more technology at the network, but in taking specific steps to identify malicious actions and respond to them in order to fix the issue, a process known as operationalizing security.
Tags : 
    
IBM
Published By: CyberSource EMEA     Published Date: Jun 28, 2018
It has to be quick and easy for people to pay. At the same time, fraudsters are probing the weaknesses of new digital processes. As the person who can decide whether a transaction is accepted or rejected, fraud managers have a pivotal role. They’re not just preventing losses from chargebacks. They’re gatekeepers to accepting more revenue. It’s a complex job. But get it right, and they enable their business to engage customers better – across devices and places. And that can mean supporting the very growth of the business. In this landscape, the idea that a technology like machine learning might be the answer to all the industry’s needs is attractive. But while machine learning should be a key part of an effective fraud strategy, the truth is that there’s no silver bullet. So, in this paper, we’ll look at how best to put machine learning to use. By employing it in tandem with expert insight, merchants can use it to accept the optimal number of payments. And make a direct impact on the
Tags : 
    
CyberSource EMEA
Published By: Monetate     Published Date: Jun 27, 2018
A robust testing and optimization program is critical to the success of any travel and hospitality online bookings and reservations engine. Discover how personalization can help you drive impact using your pre-exisiting creative and analytical assets. In this handy guide you’ll learn how Monetate’s testing, segmenting and optimization program helps travel and hospitality companies: • Recognize visitors and customers across devices to deliver connected experiences. • Optimize bookings funnels to raise bookings conversion rates and revenues. • Segment customers to deliver truly customized content. • Decrease the customers time to purchase by serving the right trip, excursion or reservation.
Tags : 
    
Monetate
Published By: Box     Published Date: Jun 22, 2018
• Business is changing faster than ever, and disruptors doing things in digital ways are leading the charge in just about every market. If you're not already managing your content in the cloud, it’s time to make a shift. • With Box, teams are unified, collaboration is sped up and productivity is amplified. This ebook illustrates how real Box customers are using the power of the cloud to get every part of their extended enterprise working together, from mobile productivity to streamlined business processes. o Marketing collaboration is integrated when internal teams and external partners work from one digital hub o Sales teams and workers in the field are empowered across any device with mobile productivity o HR streamlines processes for better team workflow and a stronger onboarding experience • To read how Box customers are using Cloud Content Management to enact practical transformation across teams, and to find out how you too can use Box to benefit every line of business within
Tags : 
    
Box
Published By: Applause Israel     Published Date: Jun 19, 2018
At the center of every shopping experience is the payment process. The way that brands connect their products and services to their customers, and in turn receive their payments, is the foundation upon which shopping is built. Digital payments, both online and in-store, are transforming that foundation. 80% of Americans are now shopping through online channels on at least a monthly basis, and digital payments have become a primary stream of revenue for brands across all channels1. While offering digital payment options has the potential to simplify life for customers and increase conversion rates, they are creating an additional layer of complexity that is challenging to keep up with. Between the expanding number of digital payment technologies, the increasing number of devices payments can be completed on, and the continuous blurring of digital and physical buying experiences, it is critical to ensure payments will be successful for every person on every device and in every location.
Tags : 
    
Applause Israel
Published By: SAS     Published Date: May 24, 2018
Digital transformation is a reality for marketers that is wrapped in both opportunities and headaches. Marketers understand the choices and expectations that their customers now have, and they are up for the challenge. But marketers also have many obstacles to overcome to deliver the consistently good, timely and engaging customer experience, across devices, that customers demand. The good news is that the marketing technology industry is rapidly evolving to address these challenges. And in the same way that consumers have an abundance of choices, marketers also have many options when it comes to choosing partners to help. But where to start, and how to choose the right partners?
Tags : 
    
SAS
Start   Previous   1 2 3 4 5 6 7 8 9    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.


Featured FREE Resource: