framework

Results 101 - 125 of 571Sort Results By: Published Date | Title | Company Name
Published By: Cisco     Published Date: Dec 27, 2017
The market for communications is shifting to one in which multi-modal interactions will become the norm. Voice, video, and messaging Communications and Collaboration will drive the future of this market. As messaging becomes a larger part of the Communications landscape, Mobile Collaboration is poised to take on a larger enterprise role, by way of shifting email to more of a confirmation tool. Moreover, the convergence of content types under UCC will be greatly enhanced by a categorized and dynamic ontology-driven knowledge framework that goes beyond search. Once the framework supports are in place, UCC will accelerate its momentum at an even greater rate than it already is today. This Research Note identifies the new elements of UCC and how enterprises can plan for the shift to multi-modal communications.
Tags : 
    
Cisco
Published By: Cisco     Published Date: Jan 02, 2018
Cisco commissioned Forrester Consulting to conduct a Total Economic Impact™ (TEI) study and examine the potential return on investment (ROI) enterprises may realize by deploying Cisco TrustSec software-defined segmentation. The purpose of this study is to provide readers with a framework to evaluate the potential financial impact of Cisco on their organizations. To better understand the benefits, costs, and risks associated with TrustSec, Forrester interviewed four customers that had deployed TrustSec. The TrustSec software-defined segmentation solution simplifies the provisioning and management of highly secure access to network services and applications. Unlike access control mechanisms that work on network topology, TrustSec policies use logical grouping. Highly secure access is consistently maintained even as resources are moved in mobile and virtualized networks. A more detailed description of TrustSec is available on the Cisco TrustSec Overview page in this document.
Tags : 
    
Cisco
Published By: Cisco     Published Date: Dec 20, 2018
Edison has followed the development and use of Cisco’s Application Centric Infrastructure (ACI) over the past five years. Cisco ACI delivers an intent-based networking framework to enable agility in the datacenter. It captures higher-level business and user intent in the form of a policy and translates this intent into the network constructs necessary to dynamically provision the network, security, and infrastructure services.
Tags : 
    
Cisco
Published By: Cisco     Published Date: Jan 03, 2019
This IDC study represents the vendor assessment model called the IDC MarketScape. This research is a quantitative and qualitative assessment of the characteristics that explain a vendor's chances for present and future success worldwide. This study assesses the capability and business strategy of 12 global enterprise videoconferencing vendors. This evaluation is based on a comprehensive framework and a set of parameters expected to be most conducive to success in providing enterprise videoconferencing solutions, for both the short term and the long term.
Tags : 
    
Cisco
Published By: Cision     Published Date: May 02, 2016
In the following paper, we will share the following key strategies that will fuel a successful social media strategy for your business. We will: - Outline the six strategies and technologies for creating a framework for success - Map out a social implementation model for setting up the distribution of your content in order to protect your brand when third-party platforms, such as Google and Facebook, inevitably make changes - Share the right way to think about measuring, monitoring and managing your social media strategy and performance
Tags : 
cision, social media, social media strategy, marketing
    
Cision
Published By: Citrix     Published Date: Jul 25, 2014
While enterprise mobility brings opportunity for your users and organization, it also invites risk. Organizations can use this white paper as a mobile security framework and a checklist for evaluating enterprise mobility vendors.
Tags : 
secure, mobility, management, checklist
    
Citrix
Published By: Citrix Systems     Published Date: Nov 23, 2015
The purpose of this study is to provide a framework for businesses to evaluate the potential financial impact that NetScaler can have in their organizations based on results from existing customers.
Tags : 
citrix, netscaler, business benefits, networks, applications, cost savings
    
Citrix Systems
Published By: Citrix Systems     Published Date: Feb 14, 2019
"As work moves beyond walls, you need a new security framework that enables more flexibility, productivity, and innovation, not less. Citrix offers a comprehensive security approach that delivers the secure contextual access you need to provide an enhanced user experience while you maintain control. Get this brief to explore how Citrix can help you: - Put the right controls in place to secure SaaS and Internet access - Use a single solution to deliver an integrated experience for end-users and admins alike - Consolidate multiple and disparate access solutions into one"
Tags : 
    
Citrix Systems
Published By: Citrix Systems, Inc.     Published Date: Jan 27, 2016
While enterprise mobility brings opportunity for your users and organization, it also invites risk. Organizations can use this white paper as a mobile security framework and a checklist for evaluating enterprise mobility vendors.
Tags : 
citrix, security, enterprise, mobility
    
Citrix Systems, Inc.
Published By: Clarizen     Published Date: Sep 23, 2015
Read more to find out how Clarizen became the ideal solution for delivering the much-needed framework for planning and executing, and at the same time, seamlessly aligning with the collaborative manner in which the Cisco Systems wanted to manage projects and programs.
Tags : 
cisco systems, cisco capital, clarizen, cloud based solutions, productivity, project management, program management, cross functional collaboration
    
Clarizen
Published By: Cloudamize     Published Date: Apr 04, 2017
As you think about migrating to the public cloud, it’s challenging to know where to start. This guide discusses 10 key considerations to address as you think about moving to the cloud and serves as a framework to help you understand which critical decisions you need to make.
Tags : 
moving to the cloud, cloud computing cost, cloud cost analysis, tco cloud, cloud calculator, cost of cloud computing, cloud computing cost calculator, cloud cost management, cloud migration strategy, migrating to the cloud, cloud migration tools, cloud migration, cloud cost comparison, cloud tco, cloud cost, cloud management, cloud optimization, public cloud, cloud provisioning, capacity planning
    
Cloudamize
Published By: Cohesity     Published Date: May 09, 2018
The growing importance—and complexity—of data protection means old approaches no longer will get the job done in an era of exploding data volumes and ever-changing business requirements. It’s time to reimagine and reengineer your IT infrastructure for a more efficient, affordable and manageable data protection framework.
Tags : 
    
Cohesity
Published By: Cohesity     Published Date: Aug 09, 2019
The growing importance—and complexity—of data protection means old approaches no longer will get the job done in an era of exploding data volumes and ever-changing business requirements. It’s time to reimagine and reengineer your IT infrastructure for a more efficient, affordable and manageable data protection framework.
Tags : 
    
Cohesity
Published By: CollabNet     Published Date: Jan 11, 2013
Like Scrum itself, the process of moving an organization to an Agile framework is best achieved using an iterative approach that employs frequent inspect-and-adapt cycles.
Tags : 
collabnet, enterprise success, transformation strategy, collabnet agile coaches
    
CollabNet
Published By: CollabNet     Published Date: Jan 11, 2013
This document, written by thought leader and certified CollabNet Scrum trainer and coach Michael James, condenses the essence of Scrum into 6 pages. It's a must read for agile enthusiasts and anyone who wants to learn more about Scrum.
Tags : 
scrum, agile, software development, framework, project management
    
CollabNet
Published By: Comcast Business     Published Date: Mar 24, 2015
Today’s K-12 schools are hungry for bandwidth. The reason is clear: highperforming, reliable and easily expanded network services support the latest classroom innovations, including videoconferencing, 1:1 computing, distance learning and modern learning management systems. It’s no surprise then that progressive educators now see a direct link between the overall success of their school districts and access to high-capacity networks. This emerged as a clear trend in new research by the Center for Digital Education (CDE) — a commanding 98 percent of administrators and IT representatives said the future of K-12 education hinges on ubiquitous connectivity. This white paper lays a framework for planning and implementing high-performance networks. In addition to explaining why now’s the time to plan network upgrades, this paper answers one of the fundamental questions asked by IT managers at schools everywhere: “How much network capacity will we actually need?”
Tags : 
education, network modernization, high-performance networks, bandwith, classroom innovations
    
Comcast Business
Published By: Coupa     Published Date: Mar 07, 2016
User adoption of automated business processes for procurement, invoicing and expense management still hovers around 20-40%. Coupa’s modern, easy-to-use, easy-to-configure platform can change that. Coupa helps extend the reach of your Oracle ERP system, by plugging seamlessly into your established framework.
Tags : 
    
Coupa
Published By: Cranfield University     Published Date: Apr 01, 2015
Marketing value metrics enable marketers to measure the impact of marketing activity against organisational goals more effectively and empowers marketing teams and their leaders to justify and defend their plans to their CEOs and CFOs. The model presented in this free chapter has been developed by Professor Stan Maklan, Dr Stan Maklan and Peter Mouncey from the renowned Cranfield School of Management and provide a metrics-based framework for developing and implementing marketing strategies that are measurable and accountable.
Tags : 
marketing value metrics, marketing metrics model, business goals and marketing, measuring marketing effectiveness
    
Cranfield University
Published By: Crimson Hexagon     Published Date: Oct 10, 2013
Download this case study to learn how Crimson Hexagon developed a framework for measuring advertising effectiveness by analyzing the online conversations surrounding Target's major Black Friday ad campaigns in 2011 and 2012.
Tags : 
campaign effectiveness, ad campaign effectiveness, online conversation, ad agencies, ad appraisal
    
Crimson Hexagon
Published By: Crimson Hexagon     Published Date: Oct 10, 2013
In order to develop a framework for evaluating the success of non-traditional advertising. Crimson Hexagon analyzed the online conversions surrounding the 8-bit video game released by Old Spice in Dec. 2013, in which users play the game's eponymous hero. Download this case study to learn more about their findings.
Tags : 
old spice, online conversations, measuring consumer engagement
    
Crimson Hexagon
Published By: CrowdStrike     Published Date: Feb 14, 2019
How adopting a framework can optimize cybersecurity Today’s threat landscape has created new challenges for security analysts and incident responders, as the number of alerts and their complexity have increased significantly. Organizations with small IT teams are overwhelmed, often lacking the time or resources to investigate every alert. Failing to do so means a high-risk threat might go unnoticed. This can result in a devastating breach, damaging an organization's finances and reputation. This white paper discusses how CrowdStrike is solving these challenges, by implementing the MITRE ATT&CK™ Framework across multiple CrowdStrike processes and product features to help improve analyst’s productivity and prevent breaches. This provides many benefits, including time savings; adding advanced context to security alerts and information; and enabling a common, shared language. However, it also provides some hidden advantages, especially concerning cybersecurity. Read this whitepaper to lear
Tags : 
    
CrowdStrike
Published By: CyberSource EMEA     Published Date: Jun 28, 2018
Mobile devices are everywhere. 95% of UK millennials now use smartphones1; and it’s estimated that across the globe, nearly a billion more people now use mobile phones today than did five years ago.2 Mobile commerce will continue to grow as smartphones continue to be adopted. For example, forecasts for Europe’s EU 5 (France, Germany, Italy, Spain and the United Kingdom) show mCommerce will account for 43.8% of eCommerce sales by 2020, compared to 32.9% in 2016.3 As fraud teams determine which orders to accept or reject, fraud managers are key to providing a seamless mobile checkout experience. But they also need to protect their business from fraud – and from the damage it can cause to bottom line, customer experience and brand.
Tags : 
    
CyberSource EMEA
Published By: Cyveillance     Published Date: Apr 03, 2015
Protecting a business – including its information and intellectual property, physical infrastructure, employees, and reputation – has become increasingly difficult. Online threats come from all sides: internal leaks and external adversaries; domestic hacktivists and overseas cybercrime syndicates; targeted threats and mass attacks. And these threats run the gamut from targeted to indiscriminate to entirely accidental. Like many security trends and frameworks, the early stages of adoption often involve inconsistent definitions, challenges with justification and management communication and an unknown path to implementation. In this white paper, we: • Review the current threatscape and why it requires this new approach • Offer a clarifying definition of what cyber threat Intelligence is • Describe how to communicate its value to the business and • Lay out some concrete initial steps toward implementing Intelligence-Led Security
Tags : 
intellectual property, hackers, protection, leaks, security, threatscape
    
Cyveillance
Published By: Dassault Systèmes     Published Date: Jul 21, 2017
This white paper outlines a framework that emphasizes digitization and business transformation and the new opportunities pull processes bring.
Tags : 
technology efficiency, market dynamics, data privacy, data security, device management, platform management, enterprise management
    
Dassault Systèmes
Published By: Dassault Systèmes     Published Date: Jun 19, 2018
This white paper outlines a framework that emphasizes digitization and business transformation and the new opportunities pull processes bring. The mechanism of “Pull” processes—those triggered by an actual event instead of a forecast—is nothing new. It is at the heart of many successful manufacturing strategies. Recent technological advances in digitization, including the harnessing of Big Data analytics, the use of the cloud, Business Process Management (BPM), social media, IIoT, and mobility, have extended the power of Pull beyond Lean manufacturing. In the wake of the current technological innovation wave, it is not uncommon for manufacturers to not know what next step to take. In light of these new developments, this white paper will focus on the mechanism of business transformation enabled by these technologies, which can be attributed to two major forces: the power of Pull and digitization. Nine practical applications are detailed, showing how innovative manufacturers can better
Tags : 
    
Dassault Systèmes
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      
Already a subscriber? Log in here
Please note you must now log in with your email address and password.