smart control

Results 1 - 25 of 71Sort Results By: Published Date | Title | Company Name
Published By: Adobe     Published Date: Jun 26, 2019
The Digital Trends 2019 survey closed with more than 12,500 responses worldwide! The results are in for 2019 and once again, businesses have their sights set on improving customer experience. Data continues to dominate, with an understanding that smarter use will lead to greater rewards. Data ownership and compliance are top-of-mind. And technological advances are an exciting prospect for many. But some need more guidance to understand the benefits for their business. Discover what your top digital priorities for 2019 should be with the 2019 Digital Trends report by Econsultancy in association with Adobe. Key topics that you’ll read more about in this year’s report: • Optimising customer experience and delivering personalised experiences in real time. • Using data better for smarter audience segmentation and targeting. • Be wary of walled gardens. Control and own the data, and always be compliant. • Automation is the future. Understand the benefits, learn how to use it.
Tags : 
    
Adobe
Published By: Adobe     Published Date: Sep 23, 2019
The Digital Trends 2019 survey closed with more than 12,500 responses worldwide! The results are in for 2019 and once again, businesses have their sights set on improving customer experience. Data continues to dominate, with an understanding that smarter use will lead to greater rewards. Data ownership and compliance are top-of-mind. And technological advances are an exciting prospect for many. But some need more guidance to understand the benefits for their business. Discover what your top digital priorities for 2019 should be with the 2019 Digital Trends report by Econsultancy in association with Adobe. 4 KEYPOINTS Key topics that you’ll read more about in this year’s report: • Optimising customer experience and delivering personalised experiences in real time. • Using data better for smarter audience segmentation and targeting. • Be wary of walled gardens. Control and own the data, and always be compliant. • Automation is the future. Understand the benefits, learn how to u
Tags : 
    
Adobe
Published By: Adobe     Published Date: Sep 12, 2017
Read the Forrester Wave: Data Management Platforms to see why Adobe Audience Manager is recognized for consistency and category leadership. Forrester states, "Adobe is a smart choice for marketers focused on extending control across channels."
Tags : 
    
Adobe
Published By: Akamai Technologies Australia     Published Date: Feb 08, 2018
Credential stuffing is on the rise. Bots are getting smarter and malicious actors are getting more confident. Unfortunately, these advanced cyberattacks are also becoming more difficult to detect with standard security controls. Learn more about credential stuffing and how you can protect your business, your brand, and your customers from bots that commit fraudulent activity.
Tags : 
credential, bots, business, risk, management, security, cyberattacks
    
Akamai Technologies Australia
Published By: Aruba Networks     Published Date: Sep 18, 2013
In this whitepaper Gartner explores smartphones and tablet devices, and their applications, which are increasingly at risk of malware. IT security planners and operations managers can thwart serious malware threats for the time being with these best practices. Read this whitepaper for more information.
Tags : 
smartphones, tablet devices, malware, best practices, security planners, risk, applications, technology
    
Aruba Networks
Published By: Aventail     Published Date: Aug 21, 2009
Today's office is now anywhere that a user can get an Internet connection, a PC on a business partner's network, a handheld at a WiFi hotspot, an airport kiosk, or a computer on a home WiFi network. But secure access is not the only driving business factor remote access must be easy to use and administer as well.
Tags : 
secure remote access, remote access, wireless security, secure wifi, wifi security, wi-fi security, wifi, wi-fi
    
Aventail
Published By: BlackBerry     Published Date: May 03, 2010
Any IT person with a pulse knows that employees are flooding IT departments with requests to connect their personal smartphones to the company IT infrastructure. Notwithstanding the real productivity benefits from connected employees, until now many IT departments have turned down all such requests as a matter of policy. They calculated that the security and control risks outweighed the benefits from collaboration.
Tags : 
blackberry, smartphones, wireless, pda, enterprise servers, it management, budget, mobility
    
BlackBerry
Published By: BMC Control M     Published Date: Jul 16, 2009
A short time ago, Dell, like many other companies, embarked on a broad initiative to integrate and upgrade its IT services to better satisfy business needs. As part of this initiative, Dell addressed a job scheduling solution that had failed to keep pace with ITIL_ integration. In enterprises around the world, stale job scheduling software lingers for fear of the costs and risks of conversion. Learn more today!
Tags : 
bmc, ema, dell, dell smart, automation, integration, services, itil
    
BMC Control M
Published By: BMC Control M     Published Date: Jul 22, 2009
A short time ago, Dell, like many other companies, embarked on a broad initiative to integrate and upgrade its IT services to better satisfy business needs. As part of this initiative, Dell addressed a job scheduling solution that had failed to keep pace with ITIL_ integration. In enterprises around the world, stale job scheduling software lingers for fear of the costs and risks of conversion. Learn more today!
Tags : 
bmc, ema, dell, dell smart, automation, integration, services, itil
    
BMC Control M
Published By: Brother     Published Date: Mar 08, 2018
The last decade has seen many exciting advances in connectivity accelerated by the near universal availability of smartphones and tablets – leading to a highly interconnected world. The security of networks - and the businesses and individuals that rely on them - has become top of mind for the IT Security professionals who are responsible for ensuring the safety of the data and the networks where this information is utilized. As high-visibility security breaches occur - affecting ecommerce, banking, retail and other industries - the critical importance of the security of the infrastructure these businesses rely on continues to grow. Security in the workplace is a daily fact of life. From using ID cards to control physical access, to entering passwords to join the network, to using software to monitor and prevent unauthorized access, all are routinely used to protect critical assets and information. However, there is one key area where many organizations still have potential vulnerabili
Tags : 
network security, security breaches, pci, dss, hippa
    
Brother
Published By: Business Assyst     Published Date: Mar 26, 2007
This paper considers whether smart cards really do have a role to play in loyalty systems or whether they are simply being promoted by the suppliers of smart card technology into what they see as a fast growing, profitable marketplace.
Tags : 
customer satisfaction, customer relationship management, customer interaction service, customer experience management, smart card, smart cards, access control, business assyst
    
Business Assyst
Published By: Carbonite     Published Date: Jan 04, 2018
These days, a lot of organizations are looking to the cloud to help them protect their data. They wish to take advantage of the appealing economics and operational agility that are two of the biggest attributes of a cloud-based IT infrastructure. Leveraging the cloud can be a smart choice for any organization interested in gaining more control over costs (i.e., almost all organizations). According to ESG research, reducing costs was the second most commonly reported business driver affecting IT spending in 2016.
Tags : 
    
Carbonite
Published By: Carbonite     Published Date: Oct 10, 2018
These days, a lot of organizations are looking to the cloud to help them protect their data. They wish to take advantage of the appealing economics and operational agility that are two of the biggest attributes of a cloud-based IT infrastructure. Leveraging the cloud can be a smart choice for any organization interested in gaining more control over costs (i.e., almost all organizations). According to ESG research, reducing costs was the second most commonly reported business driver affecting IT spending in 2016
Tags : 
    
Carbonite
Published By: Cisco     Published Date: Aug 27, 2015
This whitepaper talks about the development and adoption of the (IoT) and how much of a critical element it is for smarter manufacturing.
Tags : 
smarter manufacturing, data research, inter of things, iot, customer satisfaction, big data, programmable logic controllers, supply chain logistics
    
Cisco
Published By: Citrix Systems     Published Date: Oct 07, 2014
Bring-your-own-device (BYOD) programs and policies empower people to choose the best device to get their work done, including personally-owned consumer smartphones, tablets and laptops. This white paper provides guidance for introducing BYOD to help people become more mobile and productive while IT adapts to consumerization in a simple, secure and controlled manner.
Tags : 
best practices, secure, simple, consumerization, byod, program, device, smartphones
    
Citrix Systems
Published By: Comcast Business     Published Date: Feb 06, 2019
Hospitality is a customer-focused industry, with a hotel brand’s reputation and ultimate success dependent on the quality of the experience of its guests. It is no surprise then, that digital transformation efforts within the hospitality sector are focused on technologies that improve the guest experience, from check-in to check-out and everything in between. Today’s travelers are digitally savvy, using their smartphones and mobile devices for a multitude of tasks. They expect a high-quality connection throughout the property and the ability to perform certain tasks from the hotel’s app, such as checking in and choosing their own room. They expect in-room entertainment beyond basic cable and in-room digital devices they can use to order food, book a massage or control the lighting, for example.
Tags : 
hospitality, hospitality providers, hotel technology, motel technology, guest experience, pos, digital entertainment, wifi
    
Comcast Business
Published By: CyberSource EMEA     Published Date: May 04, 2018
The digital economy is dramatically changing how your customers buy products and services, and how they interact with your business. As customers increasingly use multiple devices (including Smartphones) to make their purchases, they expect fast, consistent and highly secure experiences – and you need to deliver. At the same time, you should remain vigilant about fraud. Effective fraud management is critical, not only for reducing risk, but also for accepting more good customer orders, improving customer engagement, controlling costs and achieving competitive advantage.
Tags : 
    
CyberSource EMEA
Published By: Dell EMC     Published Date: Feb 14, 2019
Artificial intelligence (AI) is a transformative technology that will change the way organizations interact and will add intelligence to many products and services through new insights currently hidden in vast pools of data. In 2017 alone, venture capitalists invested more than $11.7 billion in the top 100 Artificial Intelligence startups, according to CB Insights1, and the breadth of Artificial Intelligence applications continues to grow. While human-like intelligence will remain the stuff of novels and movies for the near future, most organizations can and should explore practical Artificial Intelligence projects. This technology has the potential to: • Improve productivity of internal applications • Increase revenue through enhanced customer interacton and improved customer acquisiiton • Reduce costs by optimizing operations • Enhance products and services with "smart" functionality such as vision and voice interaction and control This paper provided by Dell and Intel® gives executi
Tags : 
    
Dell EMC
Published By: DigiCert     Published Date: Jun 19, 2018
The Internet of Things (IoT) has rapidly transformed the digital landscape and the world we live in. Intelligent devices and sensors connect smart cars, robotic manufacturing equipment, smart medical equipment, smart cities, industrial control systems, and much more in a way that improves lives and saves businesses billions of dollars. But along with its benefits, rapid IoT growth introduces a new dimension of security vulnerabilities that dramatically escalates the nature and seriousness of cybercrime risks. In addition to traditional confidentiality cyber risks, IoT threats include attacks that can: • Render smart appliances useless • Shut down city power grids • Threaten lives through hacked pacemakers and other medical devices. Such security flaws not only endanger lives, frustrate customers, and disrupt business operations, but they create significant cost and public relations damage for IoT developers and manufacturers.
Tags : 
    
DigiCert
Published By: Echelon     Published Date: Feb 19, 2015
Making outdoor lighting more efficient, safe, and affordable with open-standard control networking technology
Tags : 
outdoor lighting, smart lighting, smart cities, outdoor lighting controls, commercial lighting, wireless outdoor lighting, rf outdoor lighting, power-line based outdoor lighting
    
Echelon
Published By: F5 Networks Inc     Published Date: Aug 25, 2017
With the cloud transforming application development and deployment—enabling organizations to improve flexibility, automate processes, and decrease time to market—some big questions remain. One of the most important issues an organization must address is how it can best employ the smarter tools and limitless scale that the cloud offers. One way that enterprises take advantage of the benefits of the cloud is by deploying their own private cloud, which is a computing model that fosters agility while allowing organizations to maintain control of their infrastructure, while better securing their applications and their data.
Tags : 
    
F5 Networks Inc
Published By: Globalscape     Published Date: Mar 21, 2014
This whitepaper examines the way in which enterprise mobility has both increased employee productivity and decreased the security of corporate networks. The paper discusses the challenges IT managers have with controlling the "Bring Your Own Device" (BYOD) trend to allow mobile users to have access to the corporate network. Explained in the paper is the limit to visibility and control of file transfers when employees use ad hoc methods, and that educating employees on proper data access is not enough to protect the corporate network. The paper concludes by describing how Globalscape's EFT™ and Tappin™ can provide mobile access, without compromising security and controls over file sharing.
Tags : 
mobile, mobile access, remote access, byod, smartphones, tablets, laptops, ad hoc
    
Globalscape
Published By: IBM     Published Date: Apr 26, 2013
In the spring of 2012, IBM launched a comprehensive re-thinking and refresh of its IT Service Management (ITSM) offerings. The IT management products formerly known as Tivoli Service Request Manager, IT Asset Management and Change Configuration Management Database have now been combined into a single product, IBM SmartCloud Control Desk 7.5. The products span advanced support for IT and intelligent asset management, change and configuration management, service request management and service catalog, along with Cloud delivery options and built-in support for automation beyond traditional service desk workflow.
Tags : 
smartcloud, control, desk, consolidate, advances, services, management
    
IBM
Published By: IBM     Published Date: Nov 05, 2013
Across the globe, the ‘smart city’ of the future is progressively becoming a reality. Integrated transport is within reach; better co-ordination of emergency services is a now an actuality; and real-time data is turned into powerful insights, improving service delivery and citizen inclusion. Data enhances the ability to control environmental pollution and energy consumption, and to manage urban transportation. This all helps to make today´s cities more sustainable. So understanding how best to exploit the power of information and technology offers cities an important opportunity.
Tags : 
    
IBM
Published By: IBM     Published Date: Nov 05, 2013
This report provides some guidelines for how to plan a more effective Enterprise Asset Management strategy, including maturity levels, processes, and technologies in context with the synergies of IT Asset Management advances. With this background established, the report will then introduce IBM Maximo Asset Management and IBM’s SmartCloud Control Desk functionality and architecture. The report will conclude by highlighting the impact these applications have in use-case deployments in three different verticals.
Tags : 
    
IBM
Start   Previous   1 2 3    Next    End
Search      

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.