internet connection

Results 1 - 25 of 54Sort Results By: Published Date | Title | Company Name
Published By: Schneider Electric     Published Date: Apr 23, 2019
The supply chain for manufacturers and distributors is facing challenges around increased analytics, multichannel fulfillment, talent shortages, and the use of new technologies such as wireless, augmented reality, robotics and machine-to-machine (M2M). At the same time, there is continued focus on cost reduction and sustainability. The Industrial Internet of Things is driving a huge transformation as it increases the interconnection between connected devices and analytics. The smart manufacturing enterprise can seize opportunities to maximize efficiency and safety through networking and intuitive collaboration with its users. This eBook shares practical steps to follow for a smart material handling and logistics approach.
Tags : 
material handling, logistics, conveying
    
Schneider Electric
Published By: Alibaba Cloud SEA     Published Date: Mar 11, 2019
Customers have grown accustomed to high speeds and reliable connectivity. One second of network delay when accessing website, mobile app, or application service can increase your bounce rate and even decrease your customers trust in your brand. The typical business pain points per the above scenario are always like: Latency While, latency problems caused by geographic distance are impossible to solve on the public Internet; Availability Packet loss and complaints from customers can prevent you from increasing your user base; Cost - The growth of your user base and your business needs both outpace your IT budget. Security - Connections over the public Internet are vulnerable to DDoS attacks and other threats. This whitepaper describes: Challenges that Magic Video faced before implementing Alibaba Clouds solutions How Alibaba Clouds solutions help Magic Video build a global hybrid enterprise network, accelerate content delivery of the application, and maximize bandwidth?
Tags : 
data center, cloud computing, networking, security, china, global expansion
    
Alibaba Cloud SEA
Published By: Spectrum Enterprise     Published Date: Mar 01, 2019
To support business continuity, many organizations eagerly avoid putting all their eggs in one basket. Understanding the critical role of last-mile connectivity and always-available Internet access, savvy firms utilize redundant wide area network (WAN) and Internet connections from multiple service providers to ensure network availability in addition to load balancing. Despite the good intentions, their Internet connectivity risks may still be in a single basket. That is because internet service providers (ISPs) and competitive local exchange carriers (CLECs) may operate using leased network infrastructure from the same incumbent local exchange carrier (ILEC).
Tags : 
    
Spectrum Enterprise
Published By: Cisco Umbrella EMEA     Published Date: Dec 03, 2018
Your users, especially when working outside of the office, no longer need to always connect to the corporate network to get work done. They often connect directly to SaaS apps. And, lets face it, employees also dont turn on the VPN if theyre using their work laptop for personal use which means theyre left with very little security protection. Plus, many organizations are now using direct internet connections at branch offices, which means employees and guest users dont get the protection of your traditional security stack. Not only are more offices connecting directly to the internet its estimated that 70% of branch offices already have some direct internet access but attackers recognize these weak points in their targets and have started exploiting them more. To solve these new challenges, security controls must also shift to the cloud. This in-depth white paper describes how security must evolve to protect users anywhere they access the internet.
Tags : 
    
Cisco Umbrella EMEA
Published By: Akamai Technologies     Published Date: Nov 13, 2018
Competitive pressures from peers are forcing CSPs to evolve beyond connectivity and offer incremental valueadded services to sustain revenue growth. Security services are an obvious candidate for consideration since awareness of the need for security protections is extremely high due to regular media coverage highlighting Internet exploits. Threat trends and strong alignment with large customer segments are creating opportunity for CSPs to offer a foundational layer of web protection for every Internet access connection. They can provide a previously unavailable level of web security that reduces the risk their customers face, without imposing a configuration or management burden.
Tags : 
    
Akamai Technologies
Published By: Spectrum Enterprise     Published Date: Oct 29, 2018
Bandwidth. Speed. Throughput. These terms are not interchangeable. They are interrelated concepts in data networking that help measure capacity, the time it takes to get from one point to the next and the actual amount of data youre receiving, respectively. When you buy an Internet connection from Spectrum Enterprise, youre buying a pipe between your office and the Internet with a set capacity, whether it is 25 Mbps, 10 Gbps, or any increment in between. However, the bandwidth we provide does not tell the whole story; it is the throughput of the entire system that matters. Throughput is affected by obstacles, overhead and latency, meaning the throughput of the system will never equal the bandwidth of your Internet connection. The good news is that an Internet connection from Spectrum Enterprise is engineered to ensure you receive the capacity you purchase; we proactively monitor your bandwidth to ensure problems are dealt with promptly, and we are your advocates across the Internet w
Tags : 
    
Spectrum Enterprise
Published By: Atlantic Broadband Business     Published Date: Jul 30, 2018
From professional services and hospitality to healthcare and retail, businesses thrive when they have fast, reliable Internet connections. You need reliable connections to send sales transactions, upload files, transmit payroll data, and take advantage of cloud-based applications for sales, finance, and shipping. Then remember all of the different devices in your office like mobile phones, wearables, tablets, and even desktop phones and the need becomes even greater.
Tags : 
atlantic broadband, transmit, data, payroll, cloud, data
    
Atlantic Broadband Business
Published By: Symantec     Published Date: Dec 13, 2017
Symantec Endpoint Protection Mobile (SEP Mobile) offers the most comprehensive, highly accurate and effective mobile threat defense solution, delivering superior depth of threat intelligence to predict and detect an extensive range of existing and unknown threats. SEP Mobiles predictive technology uses a layered approach that leverages massive crowdsourced threat intelligence, in addition to both device- and server-based analysis, to proactively protect mobile devices from malware, network threats, and app/OS vulnerability exploits, with or without an Internet connection.
Tags : 
mobile, security, technology, deployment, enterprise, crow sourced, intelligence
    
Symantec
Published By: Intel     Published Date: May 23, 2017
Using the IP Multimedia System (IMS) architecture, Communications Service Providers (CSPs) can offer session-based services. Any Internet Protocol/Session Internet Protocol (IP/SIP) device can establish a session with the control servers Call Session Control Function (CSCF) and then establish connections with other IP/ SIP devices to deliver voice, video, and data sessions between the two end-clients.
Tags : 
    
Intel
Published By: Datastax     Published Date: May 15, 2017
Companies are in a race to set themselves apart from the competition in a meaningful way. Pre-Internet and pre-cloud, beating the competition meant out-advertising them, out-spending them, out-maneuvering them, or getting to a certain demographic before they did. Today it means using data to connect with the customer on a meaningful level. Connection breeds loyalty, which breeds recurring revenue. A huge marketing or advertising budget wont help you much if youre not able to connect with your customer IN THE MOMENT to capitalize on what the customer is doing right now.
Tags : 
datastax, data, data management, cloud
    
Datastax
Published By: SAS     Published Date: Apr 20, 2017
Hype and hope Big Data has generated a lot of both. Thanks to an abundance of enterprise information systems, networks, applications and devices that churn out huge volumes of information, government agencies are awash in Big Data. Add to this data growth the emerging trend of the Internet of Things (IoT) the network of people, data, things and processes that is increasingly linked through automated connections and sensors and the future of Big Data can seem quite daunting.
Tags : 
    
SAS
Published By: U.S. Cellular     Published Date: Aug 24, 2016
Primary internet connections fail for a variety of reasons: severe weather, downed poles and lines or simply heavier than usual network congestion. Business continuity solutions provide businesses with back-up internet access via a cellular network when primary Wide Area Network (WAN) connections fail or are over-loaded. These solutions enable businesses to: Maintain seamless, uninterrupted access to the internet Process credit card transactions Access to important information stored online This paper will provide an overview of business continuity solutions, examples of in-use scenarios and a path to adoption in an easy to understand and digestible way. Download now.
Tags : 
    
U.S. Cellular
Published By: U.S. Cellular     Published Date: Aug 23, 2016
Primary internet connections fail for a variety of reasons: severe weather, downed poles and lines or simply heavier than usual network congestion. Business continuity solutions provide businesses with back-up internet access via a cellular network when primary Wide Area Network (WAN) connections fail or are over-loaded. These solutions enable businesses to: Maintain seamless, uninterrupted access to the internet Process credit card transactions Access to important information stored online This paper will provide an overview of business continuity solutions, examples of in-use scenarios and a path to adoption in an easy to understand and digestible way. Download now.
Tags : 
    
U.S. Cellular
Published By: SAS     Published Date: Aug 04, 2016
Machine learning and the Internet of Things (IoT) are two of the hottest terms out there today for utilities. Both have the power to create an increasingly autonomous grid that can eventually handle billions of endpoints on utility networks, but the industry may not be maximizing the benefit of these disruptive innovations, nor adequately leveraging the connection between the two of them.
Tags : 
best practices, networks, utility network, autonomous grid, innovation, competitive advantage, business analytics, business intelligence
    
SAS
Published By: Okta     Published Date: Jul 19, 2016
With a secure foundation in place to manage internal IT, many IT leaders are thinking about a foundation for the entire business. In the new world of mobile apps, cloud services, and the Internet of Everything, people, processes, data, and devices are all converging to reshape how day-to-day business is done. Companies are reaching out to customers and partnersand even intelligent objects like connected cars and monitoring systemsand modifying the products and services they bring to market as a result. To an unprecedented degree, the future of an enterprise lies in the hands of the CIO and her IT staff who orchestrate these connections and act on the benefits they bring. IT leaders are finding new opportunities in an era of digital disruption. This executive brief provides a quick overview of how they are driving growth and increasing efficiency by securely connecting the digital enterprise with customers, partners, suppliers and distributors.
Tags : 
identity, idaas, iam, identity lifecycle management, mobile, provisioning, active directory, security
    
Okta
Published By: Cisco     Published Date: Jul 11, 2016
If you need to deploy and scale applications faster to increase revenue, Ciscos integrated infrastructure solutions can help you achieve your goalsand reduce risk. Technology transitionssuch as cloud, mobility, big data, and the Internet of Thingsbring together people, processes, data, and things to make resources and connections more valuable to your business. They also challenge the role of IT in the enterprise. For your IT department to stay relevant to your lines of business, it must deliver value faster and invest in innovation. Cisco Unified Computing System (Cisco UCS) integrated infrastructure makes it possible to deliver Fast ITa new IT model that transforms your data center infrastructure into an environment that is fast, agile, smart, and secure. You can break down the IT barriers that are holding your business back and create solutions that capture the value of new connections and information.
Tags : 
    
Cisco
Published By: Cisco     Published Date: Jul 11, 2016
Cisco estimates that the Internet of Everything (IoE) the networked connection of people, process, data, and things will generate $19 trillion in Value at Stake for the private and public sectors combined between 2013 and 2022. More than 42 percent of this value $8 trillion will come from one of IoEs chief enablers, the Internet of Things (IoT). Defined by Cisco as the intelligent connectivity of physical devices, driving massive gains in efficiency, business growth, and quality of life, IoT often represents the quickest path to IoE value for private and public sector organizations. This paper combines original and secondary research, as well as economic analysis, to provide a roadmap for maximizing value from IoT investments. It also explains why, in the worlds of IoT and IoE, the combination of edge computing/analytics and data center/cloud is essential to driving actionable insights that produce improved business outcomes.
Tags : 
    
Cisco
Published By: Cisco     Published Date: Jun 21, 2016
Technology transitionssuch as cloud, mobility, big data, and the Internet of Thingsbring together people, processes, data, and things to make resources and connections more valuable to your business. They also challenge the role of IT in the enterprise. For your IT department to stay relevant to your lines of business, it must deliver value faster and invest in innovation. Cisco Unified Computing System (Cisco UCS) integrated infrastructure makes it possible to deliver Fast ITa new IT model that transforms your data center infrastructure into an environment that is fast, agile, smart, and secure. You can break down the IT barriers that are holding your business back and create solutions that capture the value of new connections and information.
Tags : 
    
Cisco
Published By: CradlePoint     Published Date: May 17, 2016
Retailer Uses Cradlepoint Solution to Provide Wireless Failover & Redundancy for Point-of-Sale (PoS) Systems Cradlepoint devices provide wireless backup of wired Internet connections for retail superstores in the Blinds To Go system. In the event of an outage of the primary Internet land line (T1/fi ber, DSL, or cable) at a Blinds To Go site, Cradlepoint devices automatically switch to its wireless 3G/4G broadband connection within 30 seconds. The point-of-sale (POS) systems connected to the Cradlepoint router continue to operate at broadband speeds without further interruption, ensuring continuous uptime for POS transactions at the Blinds To Go superstore.
Tags : 
    
CradlePoint
Published By: CradlePoint     Published Date: May 17, 2016
Always-on Connections for Store Networks and Powering Intelligent Systems In the fast-paced world of retail, network reliability is everythingbut so are security, agility, and cost-effectiveness. Retailers want it all, and they depend on their IT administrators to balance these needs. Whether its ensuring an always-on connection for store networks, powering intelligent systems aimed at swaying buyer behavior, or transmitting real-time analytics to inform marketing and inventory decisions, the bedrock of successful retailing is a network that can support the growing list of mission-critical applications dependent on secure Internet connectivity. In the past, finding a solution to balance these demands has been difficult at best. Less expensive wired options like DSL mean hours of downtime each month. Alternatives like T1 connections deliver more uptime but carry a price tag that usually puts large-scale distributed deployments out of reach.
Tags : 
    
CradlePoint
Published By: Okta     Published Date: May 09, 2016
With a secure foundation in place to manage internal IT, many IT leaders are thinking about a foundation for the entire business. In the new world of mobile apps, cloud services, and the Internet of Everything, people, processes, data, and devices are all converging to reshape how day-to-day business is done. Companies are reaching out to customers and partnersand even intelligent objects like connected cars and monitoring systemsand modifying the products and services they bring to market as a result. To an unprecedented degree, the future of an enterprise lies in the hands of the CIO and her IT staff who orchestrate these connections and act on the benefits they bring. IT leaders are finding new opportunities in an era of digital disruption. This executive brief provides a quick overview of how they are driving growth and increasing efficiency by securely connecting the digital enterprise with customers, partners, suppliers and distributors.
Tags : 
    
Okta
Published By: Silver Peak     Published Date: Feb 11, 2016
he WAN has always been about connecting users to applications and moving data, but the playing field has now changed with datacenters migrating to the cloud along with missioncritical applications. .
Tags : 
wan, enterprises, saas, broadband internet, data, connectivity, connection, cloud
    
Silver Peak
Published By: Cisco     Published Date: Nov 17, 2015
IoT describes a system where items in the physical world, and sensors within or attached to these items, are connected to the Internet via wireless and wired Internet connections. These sensors can use various types of local area connections such as RFID, NFC, Wi-Fi, Bluetooth, and Zigbee. Sensors can also have wide area connectivity such as GSM, GPRS, 3G, and LTE.
Tags : 
iot, internet of things, data management, business efficiency, manufacturing process, customer satisfaction, business intelligence, automation
    
Cisco
Published By: Symantec     Published Date: Oct 01, 2015
The foundation of trusted Internet communications are Secure Socket Link (SSL) certificates, an encryption technology installed on Web servers that permits transmission of sensitive data through an encrypted connection. Using a public-key infrastructure (PKI), SSL certificates authenticate the end-use Website and the endpoint server, making it difficult for those sites to be imitated or forged.The acquisition of SSL certificates should always be a relatively easy experience; however, the purchasing decision should never be regarded lightly. When businesses consider SSL certificates; there six Golden Rules a purchaser should keep in mind. This whitepaper provides an overview of the SSL certificated market, the six golden rules of purchasing SSL certificates and how Symantec addresses each of the golden rules. At the end of the day, people want to make sure their Web sites are secured with as little friction as possibleSymantec gives businesses every opportunity to achieve that goal.
Tags : 
ssl certificates, public-key infrastructure, web servers, website security, sensitive data, encrypted connection, security
    
Symantec
Published By: Cisco     Published Date: Sep 16, 2015
Were experiencing a disruptive period of data transformationand managing todays database infrastructures during this disruptive period is not only critically important, but also more challenging than ever. An historic growth in data and cutting-edge technology trends, like the Internet of Everything, is causing an explosion in connections and data creation that is reshaping everything we do.
Tags : 
enterprise, policy-based, infrastructure, cloud, visibility, scalability, network architecture, network management
    
Cisco
Start   Previous   1 2 3    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.