Cookie policy: This site uses cookies (small files stored on your computer) to simplify and improve your experience of this website. Cookies are small text files stored on the device you are using to access this website. For more information on how we use and manage cookies please take a look at our privacy and cookie policies. Some parts of the site may not work properly if you choose not to accept cookies.

sections
 

data communication

Results 126 - 150 of 163Sort Results By: Published Date | Title | Company Name
Published By: BMC ASEAN     Published Date: Jan 02, 2019
Bring security and operations together to protect your organization! Collaborative workflow processes that eliminate friction between security and operations teams sharply lower the risk of data breaches and operational downtime. Enterprises can advance their business agenda by minimizing communications breakdowns that leave the organization vulnerable to cyberattacks. This book shows you how!
Tags : 
    
BMC ASEAN
Published By: IBM     Published Date: Oct 10, 2013
Mobile devices, including smartphones and tablets, enable increasing numbers of employees to work "anywhere, anytime."The security of enterprise data is a key concern, particularly on mobile devices that are easily lost or stolen. The security risk is further heightened by the proliferation of employee-owned mobile devices in many enterprises. Employees will almost always take the path of least resistance in leveraging mobile devices for business purposes, which may lead to unsafe computing practices. A clearly documented and enforceable mobile security policy is critical to reducing the risk of data loss.
Tags : 
mobile, mobile enterprise, mobile environment, security, mobile security, mobile device, wireless, mobile strategy, byod, mobile infastructure, application management, data, security, safeguarding, telecommunications, enterprise applications, telecom
    
IBM
Published By: GeoTrust     Published Date: Oct 06, 2014
As the backbone of web security, secure sockets layer (SSL) technology is a must for securing sensitive data passing over the Internet — whether that's e-commerce traffic, remote access to internal servers, or other secure communications. Usually, one SSL certificate secures just one domain name or URL; however, some common situations are better handled with a type of certificate that allows multiple domains to be secured with just one certificate. Read this guide to learn about typical situations where multiple domain certificates are the ideal solution, how multiple domain certificates work, and how to select the right multi-domain certificate for your needs.
Tags : 
ssl, domains, sensitive data, e-commerce traffic, internal servers, secure communications, multiple domains
    
GeoTrust
Published By: Meltwater     Published Date: Apr 13, 2016
Watch this webinar from Forrester analyst Sam Ngo and learn how social insights can move the needle on business objectives across your organization.
Tags : 
data management, business practices, internet, marketing, best practices, public relations, communications
    
Meltwater
Published By: IBM     Published Date: Aug 08, 2012
This white paper examines the role social media can play in presenting a more strategic view of customer data and how the right combination of technologies can deliver insight to help companies more effectively meet perpetually shifting consumer demands expressed through, and influenced by, these dynamic communication channels. Discover the implications of social media for marketing and sales, as well as IT. And learn the how and why social media tools and applications can be integrated with existing technology investments.
Tags : 
social media analytics, consumer insight, marketing digitization, ibm, facebook, strategic considerations, lower cost, influence, intimacy, scale, speed, assess, measure, integrate, predictive capabilities, virtualization, analysis
    
IBM
Published By: Dassault Systemes SolidWorks Corp.     Published Date: Mar 27, 2018
When it comes to the Internet of Things (IoT), the evolution of connected devices and data can often make it difficult for teams — including designers, engineers and communication specialists — to efficiently work together. The SOLIDWORKS connected devices ecosystem, however, provides development capabilities that easily bring teams together to manage complexities and synchronize and facilitate product development. This webinar further explains smart, connected devices and how SOLIDWORKS can leverage these capabilities to help drive business change.
Tags : 
business, devices, solidworks, standard, iot, ecosystem, development
    
Dassault Systemes SolidWorks Corp.
Published By: HP     Published Date: Dec 04, 2012
By combining communications tools such as instant messaging, presence, telephony, unified messaging, video conferencing, data sharing, and email, the technology known as unified communications (UC) lets your employees communicate and collaborate,
Tags : 
communications, video conferencing, collaborate, unified messaging, decisions, benefit, unify, networking, platforms
    
HP
Published By: Zpas     Published Date: Jun 21, 2017
Standard cabinets with front glass door with metal sides available in constant supply from ZPAS S.A.'s warehouse.
Tags : 
datacenter, cabinets, data center
    
Zpas
Published By: Spectrum Enterprise     Published Date: Jun 05, 2019
The success of every business is driven by the quality of its connections, whether with clients, employees, investors, suppliers, manufacturers or other key stakeholders. Increasingly, these relationships are measured through data-driven analytics, enhanced through video communication, and empowered through cloud computing and collaboration. As the volume of data grows, so do bandwidth requirements.
Tags : 
    
Spectrum Enterprise
Published By: Eloqua     Published Date: Apr 07, 2014
A How-To Guide for transforming your database to support effective segmentation and persona-driven communication and engagement.
Tags : 
oracle, oracle eloqua, lead scoring, marketing, sales, buying process, targeting, lead scoring, nurturing
    
Eloqua
Published By: DataDirect Technologies     Published Date: Mar 17, 2009
Connecting to a database requires a number of independent layers. The application needs to incorporate software that establishes the connection and calls to the database. A database connectivity layer needs to be in place to help manage security, communications, and data flow with the database. The database has a set of interfaces that help translate the client requests into actions within the database engine. And with the advent of .NET, the costs of managed versus non-managed code must also be considered.
Tags : 
.net, data direct, microsoft .net architecture, scaling, effective architectural design, virtual machine, intermediate language, component object model, com, windows operating system, com-based code, cpu utilization, optimize database connectivity, software development
    
DataDirect Technologies
Published By: Marketo     Published Date: Jul 13, 2015
In this ebook, we define each of those five principles, and show you what an engagement marketing strategy truly looks like. To learn how you can use engagement marketing techniques in your own marketing, download our ebook: The 5 Principles of Engagement Marketing.
Tags : 
engagement marketing, data, interactions, targeting, marketing, communications, content
    
Marketo
Published By: IBM     Published Date: Apr 20, 2017
Essentials for your organization’s first MDM deployment. IBM’s security platform provides the security intelligence to help organizations holistically protect their people, data, applications and infrastructure. IBM offers solutions for identity and access management, security information and event management, database security, application development, risk management, endpoint management, next-generation intrusion protection and more. IBM operates one of the world’s broadest security research and development, and delivery organizations.
Tags : 
mobile security, mobile device management, enterprise data, application security, information security, communication interception, business data
    
IBM
Published By: WiChorus     Published Date: Nov 05, 2007
Rising demand for multimedia applications and mobile usage requires new paradigm to shift voice-oriented cellular architecture into data-oriented networks in order to serve bandwidth hungry packet based applications which include but not limited to multimedia gaming, mobiTV, streaming media, P2P, etc. Data oriented network requires 20-fold fatter air link and backhaul as compared to typical voice communication.
Tags : 
wimax, access controller, asn-gw, gateway, base station, ofdma, edge router, farpoint group, controller, wichorus, wireless
    
WiChorus
Published By: CA Technologies     Published Date: Jun 03, 2015
"DevOps helps drive continuous collaboration with the end-customer, gaining further visibility into online and mobile application usage and its effect on the brick-and-mortar experience. The data your company can derive from this collaboration should be used to continuously validate assumptions made earlier in the development process. Today’s empowered consumers have high expectations for the companies they do business with. They expect real-time communication, instant information, and the ability to connect in multiple ways. And they want it to be simple. A DevOps approach can help to accomplish this."
Tags : 
    
CA Technologies
Published By: CA Technologies     Published Date: Jun 04, 2015
DevOps helps drive continuous collaboration with the end-customer, gaining further visibility into online and mobile application usage and its effect on the brick-and-mortar experience. The data your company can derive from this collaboration should be used to continuously validate assumptions made earlier in the development process. Today’s empowered consumers have high expectations for the companies they do business with. They expect real-time communication, instant information, and the ability to connect in multiple ways. And they want it to be simple. A DevOps approach can help to accomplish this.
Tags : 
    
CA Technologies
Published By: Juniper Networks     Published Date: Mar 27, 2018
In our 40-criteria evaluation of data center hardware platforms for software-defined networking (SDN), we identified the nine most significant players — Alcatel-Lucent Enterprise, Arista Networks, Extreme Networks (which recently acquired Brocade Communications System’s data center networking business), Cisco Systems, Cumulus Networks, Dell, Huawei, Juniper Networks, and Pluribus Networks — and researched, analyzed, and scored them. This report shows how each provider measures up and helps infrastructure and operations professionals (I&O) make the right choice.
Tags : 
    
Juniper Networks
Published By: Comcast Business     Published Date: Jan 15, 2015
Technology evolves at breakneck speed, and it plays an increasingly important role in the success of all types of businesses, regardless of size.
Tags : 
comcast, technology, business, blueprint, plan, start-up, start, future, strategy, needs, requirements, cloud, backup, data, communication, collaboration, accounting, payroll, servers, network
    
Comcast Business
Published By: Meltwater     Published Date: Apr 13, 2016
Everyone needs something to strive for to keep them on track. When you (or your boss) is wondering if you’re doing a good job, key performance indicators (KPIs) are there to answer the question and nudge you to even greater heights.
Tags : 
marketing, data, best practices, business optimization, public relations, communications
    
Meltwater
Published By: HP Data Center     Published Date: Mar 25, 2009
To accommodate increasingly dense technology environments, increasingly critical business applications, and increasingly stringent service level demands, data centers are typically engineered to deliver the highest-affordable availability levels facility-wide. Within this monolithic design approach, the same levels of mechanical, electrical, and IT infrastructure are installed to support systems and applications regardless of their criticality or business risk if unplanned downtime occurs. Typically, high redundancy designs are deployed in order to provide for all eventualities. The result, in many instances, is to unnecessarily drive up both upfront construction or retro-fitting costs and ongoing operating expenses.
Tags : 
hp data center, hybrid data center, dense technology environments, hybrid data center, critical business applications, it infrastructure, high redundancy designs, pods, right sizes, computer networks and subsystems, uninterruptible power supplies, ups, telecommunications equipment, data center dilemma, total cost of ownership, tco, always-on applications, redundant mep, multi-tiered (pod), monolithic tier
    
HP Data Center
Published By: Dun & Bradstreet     Published Date: Nov 13, 2017
Engaging potential buyers in today’s complex and noisy B2B environment demands time, effort, and intelligence. All sellers can do is hope to guide them along their journey and influence their decisions. But even the best prospects are delaying interaction with sales and are often unresponsive to traditional marketing tactics. This is forcing organisations to use relevant, timely, and holistic data to guide interactions and communications across all channels.
Tags : 
data, organisations, sales, marketing, customer profiling, relationship building
    
Dun & Bradstreet
    
Ciena
Published By: Cisco Umbrella EMEA     Published Date: Sep 02, 2019
"We live and surf in a cyber world where attacks like APT, DDOS, Trojans and Ransomware are common and easy to execute. Domain names are an integral part of any business today and apparently an integral part of an attacker's plan too. Domain names are carriers of malwares, they act as Command and Control servers and malware's ex-filtrate data too. In today's threat landscape - predicting threats, spotting threats and mitigating them is super crucial.. This is called Visibility and Analytics. Watch this on demand session with our Cisco cloud security experts Shyam Ramaswamy and Fernando Ferrari as they talk about how Cisco Umbrella and The Umbrella Research team detect anomalies, block threats and identify compromised hosts. The experts also discuss how effectively Cisco spot, react, filter out IOC, block the network communications of a malware; identify and stop a phishing campaign (unknown ones too). "
Tags : 
    
Cisco Umbrella EMEA
Published By: Oracle Service Cloud     Published Date: Mar 23, 2016
The Internet of Things (IoT) is connecting our world in ways that were unimaginable 10 years ago—collecting data on everything we do and using it to streamline our daily activities. In doing so, IoT is changing the way that consumers think about service. Service organizations must be prepared to support these new customer expectations to ensure continued satisfaction to strengthen and foster loyalty. Additionally, IoT is making its way into the enterprise, especially among organizations in industries like utilities, oil and gas, medical devices, manufacturing and telecommunications. Connected devices enable more efficient processes for maintenance and repair by constantly providing information on machines’ performance, environmental conditions, and possible failures. For example, a connected washing machine in a customer’s home could automatically send out an error report to the manufacturer when it experiences a failure. This is where field service management comes in.
Tags : 
oracle, service cloud, service management, customer interaction, internet of things
    
Oracle Service Cloud
Start   Previous    1 2 3 4 5 6 7    Next    End
Search      

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.