Cookie policy: This site uses cookies (small files stored on your computer) to simplify and improve your experience of this website. Cookies are small text files stored on the device you are using to access this website. For more information on how we use and manage cookies please take a look at our privacy and cookie policies. Some parts of the site may not work properly if you choose not to accept cookies.

sections
 

location

Results 601 - 625 of 814Sort Results By: Published Date | Title | Company Name
Published By: Comcast Business     Published Date: May 07, 2018
Companies today are as distributed as their customer base, with branch offices and satellite locations scattered well beyond traditional boundaries. For many, these distributed sites are the face of the company to the customer, with most—if not all— customer interactions occurring in these locations and not in the corporate headquarters. Banks and finance centers, retail stores and even urgent care centers all fit within the category of the branch office, with each location connected to the corporate headquarters and, increasingly each other. Together, they make up the distributed enterprise. However, each location is its own entity and must be able to operate independently of headquarters to ensure business can continue even if one or other locations experience technical issues. Distributed locations, therefore, must be equipped to handle all manner of customer interactions – and evolving customer expectations—and do so in a way that anticipates what the customers want next. From pers
Tags : 
    
Comcast Business
Published By: MobileIron     Published Date: Aug 20, 2018
In the PC era, employees operated from within a well defined enterprise IT perimeter and passwords were sufficient to establish user trust. However, in today’s mobile-cloud environment, the enterprise perimeter has dissolved and business information is available to users on a variety of endpoints, apps, services, networks, locations. In this dynamic access environment, organizations need a different approach to security that is able to: • Establish user trust using multiple factor authentication • Correlate user trust with other factors such as endpoint, app, network, and more • Apply adaptive, risk-based policies that match the user’s environment
Tags : 
security, enterprise, cloud
    
MobileIron
Published By: Cisco     Published Date: Nov 18, 2015
Imagine you manage a warehouse for a small shipping firm. You have a simple job: route packages. But your employer expands to 25 western cities and 50 locations. After further expansion you now need to track packages coming by truck, rail, and plane and route them based on contents and weight to 10,000 different locations worldwide. While keeping traffic in and out tightly secured, making sure each package reaches its destination on time, and without going over budget. You might be wondering how things could get so complicated so quickly. But as an IT professional, you are nodding your head, because it all sounds very familiar.
Tags : 
cisco, network, business growth, virtual network, networking, security
    
Cisco
Published By: Cisco     Published Date: Jun 21, 2016
Imagine you manage a warehouse for a small shipping firm. You have a simple job: route packages. But your employer expands to 25 western cities and 50 locations. After further expansion you now need to track packages coming by truck, rail, and plane and route them based on contents and weight to 10,000 different locations worldwide. While keeping traffic in and out tightly secured, making sure each package reaches its destination on time, and without going over budget.
Tags : 
    
Cisco
Published By: Cisco     Published Date: Jul 11, 2016
Imagine you manage a warehouse for a small shipping firm. You have a simple job: route packages. But your employer expands to 25 western cities and 50 locations. After further expansion you now need to track packages coming by truck, rail, and plane and route them based on contents and weight to 10,000 different locations worldwide. While keeping traffic in and out tightly secured, making sure each package reaches its destination on time, and without going over budget. You might be wondering how things could get so complicated so quickly. But as an IT professional, you are nodding your head, because it all sounds very familiar. More Users + More Devices = More Complexity
Tags : 
    
Cisco
Published By: Cisco     Published Date: Dec 21, 2016
Imagine you manage a warehouse for a small shipping firm. You have a simple job: route packages. But your employer expands to 25 western cities and 50 locations. After further expansion you now need to track packages coming by truck, rail, and plane and route them based on contents and weight to 10,000 different locations worldwide. While keeping traffic in and out tightly secured, making sure each package reaches its destination on time, and without going over budget. You
Tags : 
    
Cisco
Published By: Dell EMC     Published Date: Nov 04, 2016
While some distributed enterprises look to the cloud to reduce server sprawl and centralize operations, in many cases, the cloud simply isn’t feasible. Maybe the offices are in remote locations with limited Internet service or low-bandwidth connectivity causes issues such as latency and availability. Download the solutions brief to discover why VCE VxRail hyper-converged appliances from Dell EMC are ideal for consolidating multiple applications in a remote location onto a single, high-performance and high-availability platform that’s easy to deploy and manage.
Tags : 
distributed enterprises, vmware, storage, virtualization, software management, appliances
    
Dell EMC
Published By: Cisco     Published Date: Dec 28, 2015
Cloud adoption is growing, but relatively few organizations have advanced cloud strategies. Achieving greater levels of cloud adoption allows organizations to materially improve strategic allocation of IT budgets, lower IT costs, reduce time to provision IT services, increase revenue, and improve ability to meet SLAs. Private cloud adoption is greater than public cloud. Additionally, private cloud/OpenStack adopters are more likely to expect better business outcomes IDC sees web-scale public cloud making way for enterprise-class “provider-based cloud”.
Tags : 
cisco, cloud adoption, productivity, open stack, private cloud, public cloud, networking, software development, it management, wireless
    
Cisco
Published By: CenturyLink Technology Solutions     Published Date: Feb 25, 2014
Read “Six Important Considerations When Choosing a Colocation Provider,” now, and make sure you are taking everything into consideration as you go down this path for your business.
Tags : 
centurylink, it applications, telecommunications, colocation, networking, infrastructure, network integration, internetworking hardware, colocation and web hosting
    
CenturyLink Technology Solutions
Published By: IAG Consulting     Published Date: Aug 24, 2010
If your organization is not predictably successful in technology projects, there is likely an issue in requirements. CIO?s must take action and own requirements maturity improvement. CIOs are in the best position to sell requirements maturity improvement to the organization and can greatly help the process by effectively communicating required actions, and ensuring a suitable resources allocation. There are 6 things your CIO needs to know to help him/her in their role of requirements change advocate.
Tags : 
iag, project management, project management, maturity, consulting, cio, maturity
    
IAG Consulting
Published By: Oracle PaaS/IaaS/Hardware     Published Date: Jul 25, 2017
"Businesses understand more than ever that they depend on data for insight and competitive advantage. And when it comes to data, they have always wanted easy access and fast performance. But how is the situation different now? Today, organizations want those elements and more. They want IT to strip away the limitations of time with faster deployment of new databases and applications. They want IT to reduce the limitations of distance by giving remote and branch offices better and more reliable access. And in a global world where business never stops, they want IT to ensure data availability around the clock. If IT can deliver databases and applications faster, on a more automated and consistent basis, to more locations without having to commit onsite resources, IT will be free to focus on more strategic projects."
Tags : 
    
Oracle PaaS/IaaS/Hardware
Published By: Turn     Published Date: Mar 09, 2016
No marketer wants to risk the integrity of their brand by displaying ads in unsafe locations. In the great cross-channel chase for customers, advertisers want to engage target audiences in as many contexts as possible – across devices, media, and ad formats. Find out how the right brand safety tools can help your navigate this complex landscape, and deliver the right creative in the right context, every time.
Tags : 
programmatic, ebook, brand protection, brand safety, omnichannel advertising, multichannel advertising, dsp, demand side platform
    
Turn
Published By: Here Technologies     Published Date: Mar 29, 2019
By making use of the right technology, transportation and logistics (T&L) companies can reinvent their industry with superior customer service, increased revenues, and reduced costs. This whitepaper looks at the obstacles facing the T&L industry and examines how fleet planning and trip analysis software businesses can help by enabling faster and smarter data-driven decision-making. As the world’s leading location platform in 2018 (Source: Ovum and Counterpoint Research annual indexes) HERE can help T&L companies improve fleet management.
Tags : 
here technologies, transport and logistics
    
Here Technologies
Published By: HERE Technologies     Published Date: Feb 12, 2019
By making use of the right technology, transportation and logistics (T&L) companies can reinvent their industry with superior customer service, increased revenues, and reduced costs. This whitepaper looks at the obstacles facing the T&L industry and examines how fleet planning and trip analysis software businesses can help by enabling faster and smarter data-driven decision-making. As the world’s leading location platform in 2018 (Source: Ovum and Counterpoint Research annual indexes) HERE can help T&L companies improve fleet management.
Tags : 
location data, transport & logistics, location services
    
HERE Technologies
Published By: IBM     Published Date: Nov 03, 2017
Massive shifts within the digital business landscape are sparking immense opportunities and reshaping every sector. In some cases, complete upheaval is happening at lightning-fast speed. In other instances, digital undercurrents are stirring beneath the surface as organizations scramble to monetize vast volumes and variety of data in an effort to sharpen their competitive edge and not be blindsided by unforeseen events that completely upend existing business models. While long-standing industry leadership might be no match for the next cool app, agility, speed and the ability to harness more data than was ever imagined is fueling powerful possibilities for reinvention among companies of every size. Data is following rapidly from mobile devices and social networks, as well as from every connected product, machine and infrastructure. This data holds the potential for deep insights that can replace guesswork and approximations as to locations, behaviors, patterns and preferences. As the w
Tags : 
digital business, data, data-driven enterprise, innovation, ibm
    
IBM
Published By: Roundbuzz     Published Date: Mar 13, 2013
Most businesses see SMS as an expensive version of email with no analytics capabilities. But, when coupled with location, SMS can re-invent itself as a truly powerful in-bound marketing channel.
Tags : 
sms marketing, text marketing, mobile coupon, location based marketing, mobile marketing, in-store marketing, text messaging, sms messaging, geo-fence, loyalty marketing, mobile loyalty, mobile rewards
    
Roundbuzz
Published By: Absolute Software     Published Date: Jan 29, 2008
Does your PC lifecycle management (PCLM) reflect the issues associated with mobile users? Many organizations face expensive inefficiencies by not managing mobile assets effectively. These inefficiencies include dispersed and manual data collection, and inventory tools that are dependent on a connection to the company network.
Tags : 
absolute, intel, laptop, saas, managing laptops, pclm, computrace, absolute software, it asset management, remote data delete, geolocation tracking, theft recovery, service guarantee, lock down, rapid recovery, stolen, data defense, theft deterrence, pc protection, tpm
    
Absolute Software
Published By: Absolute Software     Published Date: Jan 27, 2010
This whitepaper explains how organizations can reduce their energy bills by remotely regulating computers. Topics include typical workplace computer usage, how to calculate your potential energy savings, debunking power management myths, and how you can assign multiple power saving profiles to clients.
Tags : 
computrace, absolute software, it asset management, remote data delete, geolocation tracking, theft recovery, service guarantee
    
Absolute Software
Published By: Quocirca     Published Date: Dec 02, 2008
The internet offers any business the opportunity to present a commercial image independent of the organization's size and location. Small and medium sized businesses (SMBs) across the UK have exploited the internet as it has evolved from an interesting medium for the technology-aware to an essential commercial platform. With this increasing importance, and the internet’s ability to extend the reach of a business, it is valuable to realize precisely what different internet service providers (ISPs) offer before buying. This includes evaluating service level and support capabilities and understanding how these vary throughout the UK.
Tags : 
quocirca, smbs, internet service providers, information technology, security
    
Quocirca
Published By: Sprinklr     Published Date: Feb 28, 2018
"Retail depends on social. Social depends on you. Learn best practices for building a better retail experience through social. To help kick-start your planning, we've gathered our most popular retail content in ""Social Strategies for Retail."""
Tags : 
social strategies, retail, social media, consumers, digital, social media, social, physical locations, data, social conversations, visual experiences, sprinklr, consumer reviews, consumer ratings, location intelligence, social engagement, marketing strategy
    
Sprinklr
Published By: WebEx     Published Date: Apr 02, 2009
This document educates end-users and decision makers on Software-as-a-Service (SaaS), where it differs from traditional software, and what the key benefits are when deploying SaaS applications. In addition, this document also provides the reader with a comprehensive look at the Total Cost of Ownership (TCO) analysis any decision maker should complete before making a choice between a SaaS or a traditional software deployment.
Tags : 
webex, software-as-a-service, saas, saas applications, tco, total cost of ownership, traditional software deployment, break-even point, on-demand software, apis, multi-tenant, single-tenant, application service provider, asp, it requirements, core software applications, context software applications, cost allocations, eos, groupware applications
    
WebEx
Published By: Group M_IBM Q418     Published Date: Sep 10, 2018
All of cyberspace and its underlying infrastructure is vulnerable to a wide range of risk and exposure from both physical and cyber threats and perils. Sophisticated cyber individuals and groups exploit standalone and congregated vulnerabilities to steal money and information, or disrupt, endanger and damage operations. The combination of wide opportunity for crime in cyberspace and the ability to execute from geographically-dispersed locations has produced a transformation of traditional criminal activities.
Tags : 
    
Group M_IBM Q418
Published By: Dell EMC     Published Date: Jun 29, 2016
The EMC IsilonSD product family combines the power of Isilon scale-out NAS with the economy of software-defined storage. IsilonSD Edge is purpose built to address the needs associated with growing unstructured data in enterprise edge location including remote and branch offices. Read the solution brief to find out more about the power of software-defined storage combined with EMC Isilon.
Tags : 
storage, data, best practices, enterprise
    
Dell EMC
Published By: VMware SD-WAN by VeloCloud     Published Date: May 20, 2019
What is SD-WAN? Software-Defined Wide Area Network (SD-WAN) is the application of software-based network technologies to WAN connections to more effectively route all network traffic between headquarters or data centers, remote and branch offices, and the cloud. More simply, it is the method of leveraging the benefits of the cloud, the bandwidth of broadband and existing enterprise-wide network infrastructure to more efficiently and cost effectively transmit media (data, video, voice) and quickly access cloud applications from every location in the network. SD-WAN dynamically utilizes multiple available connections (MPLS, broadband, LTE) to find the optimal delivery path for traffic across the entire network, shaping the bandwidth as needed to eliminate jitter and dropped data packets, thereby delivering an optimal user experience regardless of location. The more sophisticated solutions will first attempt to dynamically steer traffic to the best available link and if the available link
Tags : 
    
VMware SD-WAN by VeloCloud
Published By: VMware SD-WAN by VeloCloud     Published Date: Feb 19, 2019
As organizations prioritize digital transformation initiatives, many are finding that legacy networks are holding them back. To support new business models, cloud adoption, and an explosion in connected devices, modern networks must support interoperability across data centers, multiple clouds, branch locations, and edge devices. Applications now run at every point on this spectrum, and they are critical to businesses’ ability to win in hypercompetitive marketplaces. Yet, even as business success has become more dependent on this new architecture, and the amount of data flowing across connections has increased, many organizations still lack a unified approach to management, automation, and security.
Tags : 
virtual cloud network, cloud adoption, data automation
    
VMware SD-WAN by VeloCloud
Start   Previous    16 17 18 19 20 21 22 23 24 25 26 27 28 29 30    Next    End
Search      

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.