smi

Results 126 - 150 of 178Sort Results By: Published Date | Title | Company Name
Published By: BlackBerry     Published Date: Apr 13, 2010
n this webcast you will learn that Global Positioning System (GPS) is a series of 24 geosynchronous satellites that continually transmits position information.
Tags : 
blackberry, gps, tracking, microsoft exchange, mobile device management, mobile device management software, mobile workers, remote computing, wireless applications software, wireless computing
    
BlackBerry
Published By: BlackBerry     Published Date: Apr 13, 2010
Mobile deployments in business are growing at an accelerating rate, enabled by increasingly capable devices at attractive prices, faster, less costly, and more reliable wireless networks being deployed across wider areas, and an expanding array of mobile applications that empower the mobile workforce with an abundance of business critical functions.
Tags : 
blackberry, iphone, windows, wireless networksmicrosoft exchange, mobile device management, mobile device management software, mobile workers, remote computing, wireless applications software, wireless computing
    
BlackBerry
Published By: Polycom     Published Date: Jun 17, 2010
How to combine advanced telephony, one-touch video, and integrated business applications into a seamless, lifelike experience.
Tags : 
polycom vvx, ip uc solution, telephony, video, unified communication, media phone, integrated business application
    
Polycom
Published By: Intel Corp.     Published Date: Aug 08, 2012
Enterprise Strategy Group shares why client-side deduplication is the best. Dedupe 2.0 leverages intelligence and awareness at the source, backup server, and storage device. In these scenarios, the awareness of what data is already in the deduplicated storage and the discernment to send new data or not is performed within the production server instead of the backup server or deduplicated storage. Hence, network savings begin at the production server and backups are significantly faster since only changed data is transmitted from the production server to the storage solution.
Tags : 
dedupe, 2.0, store, once, enterprise, strategy, group, client, deduplication, dedupe, awareness, backup, server, storage, device, data
    
Intel Corp.
Published By: Oracle Social Cloud     Published Date: Jan 14, 2015
The need for social media intelligence (SMI) has increased during recent years as social media adoption rates and the number of social media sites that b-to-b organizations must track have grown. Organizations require reliable SMI tools to discover, monitor and make sense of social signals being sent by buyers, customers, influencers and even competitors.
Tags : 
social, sirius decisions, smi, b2b, b-to-b, smi, influencers, marketing strategy, social marketing, social listening, analyst report, social business, socially enabled enterprise, marketing cloud, social media, internet marketing, customer experience/engagement, social media marketing
    
Oracle Social Cloud
Published By: Citrix Online     Published Date: Jul 01, 2010
This new smith+co white paper explores the importance of the customer experience and the role of technology in creating, nurturing and strengthening customer relationships with every single interaction.
Tags : 
citrix online tech, support center, customer experience management, contact center, crm
    
Citrix Online
Published By: IBM     Published Date: Oct 11, 2016
Your organization lives and breathes data, but that data needs to be transformed between different formats as you do business, share files, transmit data and make transactions. Watch this video for a short introduction on how IBM Transformation Extender can help.
Tags : 
ibm, commerce, b2b integration, ibm transformation extender, transformation solution
    
IBM
Published By: Mentor Graphics     Published Date: Apr 03, 2009
A powerful signal integrity analysis tool must be flexibility, easy to use and integrated into an existing EDA framework and design flow. In addition, it is important for the tool to be accurate enough. This report reviews a validation study for the Mentor Graphics HyperLynx 8.0 PI tool to establish confidence in using it for power integrity analysis.
Tags : 
mentor graphics, pdn simulation, eda framework, mentor hyperlynx 8.0 pi, integrity analysis, virtual prototypes, esr, capacitor, power distribution network, vrm, voltage regulator module, signal, smas, analog models, backward crosstalk, capacitive crosstalk, controlling crosstalk, correct emc problems, correct emi problems, cross talk
    
Mentor Graphics
Published By: Mentor Graphics     Published Date: Apr 03, 2009
For advanced signaling over high-loss channels, designs today are using equalization and several new measurement methods to evaluate the performance of the link. Both simulation and measurement tools support equalization and the new measurement methods, but correlation of results throughout the design flow is unclear. In this paper a high performance equalizing serial data link is measured and the performance is compared to that predicted by simulation. Then, the differences between simulation and measurements are discussed as well as methods to correlate the two.
Tags : 
mentor graphics, equalized serial data links, design flow, high loss channels, tektronix, pcb, bit error rate, ber, ieee, serdes, simulation, system configuration, mentor graphics hyperlynx, simplified symmetric trapezoidal input, duty cycle distortion, ber contours, electronics, analog models, backward crosstalk, capacitive crosstalk
    
Mentor Graphics
Published By: Cisco     Published Date: Nov 30, 2016
“Back in the day” a smile and a handshake were the weapons of choice for sales people aiming to kill their quotas. Today, these tricks and tools of the trade have evolved, and modern sales people are collaborating with each other and connecting with their buyers more effectively as a result. In this knowledge brief, you’ll learn how they’re doing it.
Tags : 
    
Cisco
Published By: Cisco     Published Date: Dec 21, 2016
This document contains Confidential, Proprietary and Trade Secret Information (“Confidential Information”) of Radiant Advisors. No part of this publication may be reproduced, stored in a retrieval system, or transmitted in any form or any means electronic or mechanical, including photocopying and recording for any purpose other than the purchaser’s personal use without the written permission of Radiant Advisors. While every attempt has been made to ensure that the information in this document is accurate and complete, some typographical errors or technical inaccuracies may exist. Radiant Advisors does not accept responsibility for any kind of loss resulting from the use of information contained in this document. The information contained in this document is subject to change without notice.
Tags : 
    
Cisco
Published By: Cisco     Published Date: Dec 21, 2016
There is a tendency to discount the network as just simple plumbing, to think that all you have to consider is the size and the length of the pipes or the speeds and feeds of the links, and to dismiss the rest as unimportant. Just as the plumbing in a large stadium or high rise has to be designed for scale, purpose, redundancy, protection from tampering or denial of operation, and the capacity to handle peak loads, the network requires similar consideration. As users depend on the network to access the majority of the information they need to do their jobs and to transport their voice or video with reliability, the network must be able to provide resilient, intelligent transport.
Tags : 
    
Cisco
Published By: FIBRWRAP     Published Date: Jan 08, 2016
This paper will explore the advancements made in retrofitting unreinforced masonry walls with fiber reinforced polymer (FRP) systems to withstand the lateral loading induced by a seismic event.
Tags : 
fibrwrap, fiber reinforcedpolymer, frp, urm, unreinforced masonry, structure, engineering
    
FIBRWRAP
Published By: Ruckus Wireless     Published Date: Sep 28, 2009
In this free white paper, learn how it's now possible for wireless local area networks (WLANs) to deliver predictable throughput, reject interference, and generally behave just like Ethernet. Discover how beamforming, a specialized method of antenna-based RF transmission, renders inconsistent performance stable; rejects performance-impeding interference; supports reliability-sensitive applications like real-time voice and high-definition video; and eliminates packet loss, delays, and jitter. Download your copy of this free white paper now.
Tags : 
wifi, wi-fi, wlan, lan, access points, radio frequency, 802.11, phy, mac, txbf, ruckus, wireless
    
Ruckus Wireless
Published By: SpectorSoft     Published Date: Apr 01, 2015
Corporate computers and information and communications systems (collectively, “electronic resources”) remain the workhorse for most businesses, even as alternatives, such as third-party text messaging services, external social media, and cloud computing, flourish. Employees rely on corporate electronic resources for e-mail, calendaring, business contacts, Internet access, document creation and storage, and a multitude of other business applications. Consequently, for employers, it is critical to establish and maintain their right to inspect all information stored on, and to monitor all communications transmitted by, corporate electronic resources. The corporate acceptable use policy is the linchpin of that effort. The ten tips below are intended to aid employers who either want to implement an acceptable use policy for the first time, or who need to update their policy.
Tags : 
acceptable use, communications systems, text messaging, acceptable use policy, confidentiality
    
SpectorSoft
Published By: Viavi Solutions     Published Date: Oct 11, 2013
Managing UC means delivering streaming video fluidly, transmitting voice with clarity, moving IM's briskly, and send emails promptly. Easier said than done. To succeed from setup to show time, take these three tips to achieve the high performance end-users expect.
Tags : 
us applications, shortcuts to success, uc success, network instruments, achieve high performance, end-users, user expectations, network environment, qos, application and network management, optimize performance, critical applications
    
Viavi Solutions
Published By: Viavi Solutions     Published Date: Mar 21, 2016
IT today is more complex than ever. Public cloud, networks, storage systems, servers, and applications all combine to deliver today’s IT services. But how do you manage such a diverse and complex infrastructure? Can legacy tools help after this seismic shift? This document answers these questions and provides 20 tools you need to deliver services in this new hybrid IT world.
Tags : 
viavi solutions, hybrid it, public cloud, storage systems, it services, legacy tools, best practices
    
Viavi Solutions
Published By: Viavi Solutions     Published Date: Sep 30, 2016
IT today is more complex than ever. Public cloud, networks, storage systems, servers, and applications all combine to deliver today’s IT services. But how do you manage such a diverse and complex infrastructure? Can legacy tools help after this seismic shift? This document answers these questions and provides 20 tools you need to deliver services in this new hybrid IT world. Today’s IT environment provides greater promise than ever before. New technologies are driving new capabilities and even more opportunities to differentiate. The opportunity for innovation has never been greater: faster compute, more storage, and new applications all working together to drive greater efficiency and greater power. But this wave of innovations has also added greater complexity since one failure in this increasingly complex IT stack means a failure of the entire service. New consumer-focused cloud based applications are setting a high standard—nearly 100% up time with peak performance all while IT.
Tags : 
    
Viavi Solutions
Published By: Riverbed     Published Date: Sep 05, 2014
Storing data in the cloud using a Whitewater™ cloud storage gateway from Riverbed Technology overcomes what is becoming a serious challenge for IT departments: how to manage the vast, and ever-growing, amount of data that must be protected. Whitewater eliminates concerns about data security, data transmission speeds over the Internet, and data availability, while providing great flexibility and a favorable return on investment. Moving data to the cloud replaces the high costs of tape and disk storage systems with a pay-as-you-go cloud storage tier. This paper makes the business case for cloud storage, outlining where capital and operational costs can be eliminated or avoided by using the cloud for backup and archive storage.
Tags : 
data storage, cloud, it departments, security, transmission speeds
    
Riverbed
Published By: Viavi Solutions     Published Date: Apr 07, 2017
IT today is more complex than ever. Public cloud, networks, storage systems, servers, and applications all combine to deliver today’s IT services. But how do you manage such a diverse and complex infrastructure? Can legacy tools help after this seismic shift? This document answers these questions and provides 20 tools you need to deliver services in this new hybrid IT world.
Tags : 
    
Viavi Solutions
Published By: Symantec     Published Date: Apr 02, 2015
Gaining the trust of online customers is vital for the success of any company that requires sensitive data to be transmitted over the Web. Most consumers are concerned that their sensitive information will be intercepted in-transit, or perhaps the destination web site is manned by imposters with malicious intent. Read this white paper and learn how to best implement a security strategy that keeps consumers' information secure and instills the confidence they need to proceed with transactions.
Tags : 
online customer trust, sensitive data, data interception, malicious intent
    
Symantec
Published By: Symantec     Published Date: Oct 01, 2015
The foundation of trusted Internet communications are Secure Socket Link (SSL) certificates, an encryption technology installed on Web servers that permits transmission of sensitive data through an encrypted connection. Using a public-key infrastructure (PKI), SSL certificates authenticate the end-use Website and the endpoint server, making it difficult for those sites to be imitated or forged.The acquisition of SSL certificates should always be a relatively easy experience; however, the purchasing decision should never be regarded lightly. When businesses consider SSL certificates; there six Golden Rules a purchaser should keep in mind. This whitepaper provides an overview of the SSL certificated market, the six golden rules of purchasing SSL certificates and how Symantec addresses each of the golden rules. At the end of the day, people want to make sure their Web sites are secured with as little friction as possible—Symantec gives businesses every opportunity to achieve that goal.
Tags : 
ssl certificates, public-key infrastructure, web servers, website security, sensitive data, encrypted connection
    
Symantec
Published By: AlienVault     Published Date: Mar 30, 2016
Given that Point of Sale (POS) systems are used to transmit debit and credit card information in retail transactions, it's no wonder they are a desirable target for attackers. In this white paper, you'll learn about some of the common types of POS malware, how they work and best practices for protecting cardholder data. Topics covered in this white paper include: • Common types of POS malware and how they work • How attackers exfiltrate data from POS systems once they gain access • POS security techniques to protect payment card data Download your copy today to learn how to effectively detect and respond to POS malware threats.
Tags : 
    
AlienVault
Published By: AlienVault     Published Date: Oct 20, 2017
Threat Intelligence is one of the most critical weapons we can use in cyber defense. Knowing which attackers are trying to target your organization, as well as how, why, and when gives you an advantage when trying to thwart these attacks. In today’s landscape, security researchers are a modern-day version of Sherlock Holmes. They’re constantly analyzing clues to an adversary’s motives and techniques, tracking down their ephemeral footprints amidst the chaos of our cyber community. However, these researches can also make hasty conclusions before all the facts are gathered, and dismiss the most important clues during investigations. This evaluation guide is designed to help you evaluate threat intelligence service providers, so that you can effectively put threat intelligence to work for you. You’ll learn: • The 3 characteristics to look for when evaluating threat intelligence vendors • The most important questions to ask when evaluating threat intelligence vendors and what to listen for
Tags : 
    
AlienVault
Published By: iDirect     Published Date: Aug 21, 2009
With developments in IP networking in general and the Internet in particular, the ability to transmit voice calls which have been traditionally handled by the public switched telephone network (PSTN) over a lower cost IP infrastructure has become a reality. More and more users are researching VoIP capability when purchasing a connection to the Internet or simply expanding their private intranet.
Tags : 
voice over ip, ip telephony, voip, ip networking, ip networks, pstn, telephone, phone, telecom, telecommunications, ip infrastructure, infrastucture, idirect
    
iDirect
Start   Previous    1 2 3 4 5 6 7 8    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.