Cookie policy: This site uses cookies (small files stored on your computer) to simplify and improve your experience of this website. Cookies are small text files stored on the device you are using to access this website. For more information on how we use and manage cookies please take a look at our privacy and cookie policies. Some parts of the site may not work properly if you choose not to accept cookies.

sections
 

dev

Results 5551 - 5575 of 6140Sort Results By: Published Date | Title | Company Name
Published By: Marsha Lee     Published Date: Oct 21, 2010
ATEN developed patented technology to correct a particular cable-induced distortion described as skew to cut video distortion automatically with one-way signal detection and is therefore very fast.
Tags : 
kvm switch
    
Marsha Lee
Published By: BlueVolt     Published Date: May 04, 2012
The best incentive programs are those that are the most successful. Give them the right carrot. That seems obvious. But what makes an incentive program successful? Read the Incentives Programs: Can You Motivate People to Take Your Training? white paper from BlueVolt to learn how to best use incentives in a training program.
Tags : 
bluevolt, human resources, training, employee training, development, incentive programs
    
BlueVolt
Published By: SAS     Published Date: Jul 25, 2011
Major provider of online hotel, plane and car reservations uses SAS Business Analytics to optimize online customer experiences, as well increase the lifetime value of each customer.
Tags : 
sas business analytics, sas, optimize, optimization, research, development, new product, services, internet, expedia inc, analytic, ecommerce, express warranty, news, article, story
    
SAS
Published By: SAS     Published Date: Jul 25, 2011
An analytic center of excellence demonstrates that an organization is committed to making better, fact-based decision and leveraging analytics to validate assumptions and identify root causes of business problems. This paper focuses on how to form an analytic center of excellence and the value the business will derive from it.
Tags : 
coe, cost of excellence, sas, optimize, optimization, research, development, new product, services, internet, expedia inc, analytic, ecommerce, express warranty, news, article, story
    
SAS
Published By: SAS     Published Date: Apr 16, 2015
The large array of connected devices, often referred to as the “Internet of Things” (IoT), is delivering an array of new data from the sensors they contain. This data offers the promise of new services, improved efficiency and, possibly, more competitive business models.
Tags : 
    
SAS
Published By: SAS     Published Date: Apr 16, 2015
ITS technology is a general term. Two common and related forms of ITS communication technology using event stream processing are referred to as vehicle-to-vehicle (V2V) and vehicle to-infrastructure (V2X) in the US, and car-to-infrastructure (Car2X) in Europe. The two types of connected-car research and development programs often overlap and can be integrated. Car2X enables vehicle communication with the road transportation infrastructure and provides the ability to send or receive local information about traffic conditions, geo-markers (e.g. to identify pothole locations), road hazards, alerts, safety vehicles, etc. V2V focuses on connected-car technology and the anonymous communication of sensor data continuously transmitted to and from cars. Using event stream processing, this streaming data enables the real-time synthesis of information to communicate what will improve and promote driver safety, reduce crashes, and improve vehicle transportation efficiency.
Tags : 
    
SAS
Published By: SAS     Published Date: Aug 03, 2016
As the pace of business continues to accelerate, forward-looking organizations are beginning to realize that it is not enough to analyze their data; they must also take action on it. To do this, more businesses are beginning to systematically operationalize their analytics as part of a business process. Operationalizing and embedding analytics is about integrating actionable insights into systems and business processes used to make decisions. These systems might be automated or provide manual, actionable insights. Analytics are currently being embedded into dashboards, applications, devices, systems, and databases. Examples run from simple to complex and organizations are at different stages of operational deployment.
Tags : 
best practices, embedding analytics, technology, data, operational analytics
    
SAS
Published By: SAS     Published Date: Aug 03, 2016
A paradigm shift is underway in the cybersecurity industry. Cybersecurity professionals are moving from a focus on attacker prevention to attacker detection. Preventing the “bad guys” from getting in is still important, but cyber adversaries are increasingly able to bypass even the most sophisticated network defenses. Once inside, it is more important than ever to find these attackers fast, before their activities get buried in the daily volume and pulse of network communications. This is where security analytics holds promise. Security analytics provides the necessary and timely visibility into normal and abnormal network behavior. This visibility enables devices and entities acting suspiciously to be quickly identified and investigated.
Tags : 
cyber security, security, best practices, attacker prevention, paradigm shift, security analytics, technology
    
SAS
Published By: SAS     Published Date: Aug 04, 2016
Banks have been using credit scoring models for over five decades, so managing the life cycle of models is nothing new. Most have had some kind of process in place to ensure the models they develop are robust, validated and monitored from a performance perspective and that decision makers have confidence in them. In recent times, however - partly in response to the credit crisis in 2008 - the discipline of model risk management (MRM) has become more formalized and rigorous, driving the need for enterprise-level model information management systems. The regulatory scrutiny being applied to them is intensifying and spreading globally, with US and European regulators leading the charge. For example, whereas regulators were previously more interested in the numbers they were provided, now more regulators want to have a core understanding of the models banks used to generate these numbers.
Tags : 
best practices, risk management, finance, security, info systems
    
SAS
Published By: SAS     Published Date: Aug 04, 2016
The Internet of Things (IoT) – devices and sensors connected to computing systems and networks – has received enormous attention in the last few years. The attention is due, in part, to the proliferation of connected devices, from about a million in the early 1990s to more than five billion today. In addition, the technology for connecting the devices has become more affordable and easier to integrate. The result is that IoT is helping to digitize more and more business processes, from the factory floor to tracking shipments across oceans. Digitized processes are providing a continuous stream of digital data. By analyzing the data stream, businesses can refine their processes by better understanding how those processes are performing, identifying possible issues sooner and uncovering areas for improvement.
Tags : 
best practices, technology, data, competitive advantage, data stream, digitized process
    
SAS
Published By: SAS     Published Date: Apr 20, 2017
Hype and hope — Big Data has generated a lot of both. Thanks to an abundance of enterprise information systems, networks, applications and devices that churn out huge volumes of information, government agencies are awash in Big Data. Add to this data growth the emerging trend of the Internet of Things (IoT) — the network of people, data, things and processes that is increasingly linked through automated connections and sensors — and the future of Big Data can seem quite daunting.
Tags : 
    
SAS
Published By: SAS     Published Date: Apr 20, 2017
Enterprises routinely claim to be focused on the customer experience, yet few really keep that promise. What’s in the way? Fragmentation and complexity in both customer data and customer-facing processes. IIA spoke with Wilson Raj, Global Director of Customer Intelligence, and Jonathan Moran, Customer Intelligence Product Marketing at SAS Institute Inc. about how organizations can leverage technology platforms and analytics to become more completely and genuinely customer-centric – making connections in the right way, at the right time, and on the right device.
Tags : 
    
SAS
Published By: SAS     Published Date: Mar 06, 2018
Location data is found everywhere – with an item or a device, in a conversation or behavior, in machines or sensors, tied to a customer or competitor, attached to a database record or recorded from vehicles or other moving objects. Organizations want to take advantage of location data to improve decisions, create better customer engagement and experiences, reduce risks and automate business processes.
Tags : 
    
SAS
Published By: Moxa Inc.     Published Date: Aug 26, 2010
This white paper will identify the key additional advantages offered by PoE Plus and explore the enormous potential of this new technology in scenarios that previously could not take advantage of PoE.
Tags : 
poe, poe plus, power over ethernet, poe, poe plus, 802.3af, 802.3at, ethernet networking, network architecture, network management
    
Moxa Inc.
Published By: Aternity     Published Date: Dec 30, 2011
Many enterprises have developed sophisticated Application Performance Management (APM) capabilities only to find that many of the techniques that work in the data center won't work in the cloud. The cloud turns the idea of locating and predicting performance problems across cloud applications on its head.
Tags : 
aternity, technology, end user experience, cloud applications, cloud computing
    
Aternity
Published By: ScriptLogic     Published Date: Jan 11, 2012
Discover hardware and software inventory data on Windows and Mac devices and compare it to what has been purchased as well as what is actually in use.
Tags : 
    
ScriptLogic
Published By: GoToTraining     Published Date: Apr 06, 2011
This 3g Selling white paper explores the advantages of online training and how to design a best-in-class VITL program that increases ROI, improves engagement, eliminates travel costs and delivers a greater business impact.
Tags : 
citrix gototraining, virtual learning, engagement, vitl program, learning and development professionals, l&d, virtual instructor-led training, virtual training
    
GoToTraining
Published By: Focus     Published Date: Mar 10, 2011
At a recent conference of the Society for Human Resource Management (SHRM), 377 HR professionals in a master session were surveyed on "the competencies they believed required the most focus and development to prepare HR to meet future challenges and uncertainties." The number one response: Strategic Thinking.
Tags : 
productivity, citrix webinars, citrix, employee performance
    
Focus
Published By: e-DMZ Security LLC     Published Date: Sep 27, 2010
This white paper discusses key issues and offers innovative solutions to support granting access to production resources.
Tags : 
e-dmz security. emergency access, production access, access control, compliance, developer access, mission-critical, business-critical, datacenter security
    
e-DMZ Security LLC
Published By: Adobe     Published Date: May 09, 2011
C&C pros will face several challenges when mobilizing enterprise content strategies: addressing fragmented mobile device support, tailoring content delivery to device form factors, and navigating ECM vendor support options. For now, a segmented, use-case-driven approach will be the norm.
Tags : 
adobe, ecm, mobile device, c&c, enterprise content management, collaboration, ecm
    
Adobe
Published By: Okta     Published Date: Apr 29, 2015
Distributed workforces and mobile devices are disrupting business as usual. End-users are frequently accessing applications and data from outside the corporate network. This presents new security challenges for IT. Read this eGuide to learn ways to secure your mobile workforce.
Tags : 
mobile, mobile workforce, okta, security, it management
    
Okta
Published By: Okta     Published Date: May 07, 2015
Bring Your Own Device (BYOD) can be a very polarizing topic for IT. Some view it as a solution that can save money, improve end user satisfaction, and enable remote employees. For others, BYOD represents risk of data leakage, loss of control, and signing up to support an endless ecosystem of unknown devices. No matter what your opinion on BYOD is, the impact on IT policy cannot be overstated. Through 2017, Gartner reports that 90% of organizations will support some aspect of BYOD. Read this eGuide and learn how you can address several new BYOD challenges facing IT.
Tags : 
byod, okta, mobility, safety, dad, mobility management, wireless
    
Okta
Published By: Okta     Published Date: May 07, 2015
If you're migrating from an existing on-premise Exchange environment — or setting up Office 365 for a new set of users — you'll need to address how to handle users accessing Office 365 from mobile devices. Read this eGuide now to discover how you can simplify the migration and deployment process around Office 365 to mobile devices.
Tags : 
office 365, mobility, apps, data, administration, okta, wireless
    
Okta
Published By: World Data Products, Inc.     Published Date: Oct 04, 2010
This three section white paper explains strategies on how to develop, apply, and maintain a security program.
Tags : 
world data products, secure network, security policies, monitoring and testing, monitoring, network security, test and measurement
    
World Data Products, Inc.
Published By: VMware     Published Date: May 02, 2011
The cost of downtime and/or lost data can be devastating. For this reason, business continuity and disaster recovery (BC/DR) is becoming a critical mandate. Virtualization can keep your business running through many types of planned and unplanned IT outages. Download this white paper to learn more.
Tags : 
smb, vmware, virtualization, business continuity, disaster re vsphere, downtime, it failure, vms, it managementcovery, bc/dr planning solutions, high availability, taneja group
    
VMware
Start   Previous    216 217 218 219 220 221 222 223 224 225 226 227 228 229 230    Next    End
Search      

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.