box

Results 301 - 325 of 436Sort Results By: Published Date | Title | Company Name
Published By: Mentor Graphics     Published Date: Apr 03, 2009
The success of any consumer electronic device depends to a large extent on the appeal of the user interface (UI) and how easy the device is to use. Studies show that good cosmetic design can encourage users to explore the full range of features and often engenders the perception that a product is easier to use. So if the benefits of a great looking, easy-to-use UI are so clear, why are so many products still falling short of customer expectations? The solution lies in taking a fresh new approach a consumer electronic device UI plays. By identifying common UI functionality and implementing it in a reusable and customizable way, we can make it far easier for embedded engineers to deliver visually engaging and easy-to-use consumer electronic products.
Tags : 
inflexion platform ui, user interface, consumer electronic device, mentor graphics, ui functionality, media player, mobile phone, tv set-top box, inflexion platform ui, pc-based ui designer tool, embedded component, presentation layer, integration api, xml-based ui template, ui perspective, embedded gui, embedded gui design, embedded gui development, embedded gui prototype, embedded ui
    
Mentor Graphics
Published By: Mentor Graphics     Published Date: May 21, 2009
No question the UI in electronic devices today is playing a larger role in the success of a device. Get the UI wrong and your product will have little chance of surviving. And it isn’t enough to deliver a UI that is merely functional: it has to look good too. Studies have shown that a good cosmetic design can encourage users to explore the full range of features and often, can engender the perception that a product is easier to use, which can make consumers more tolerant of product deficiencies. Learn more today!
Tags : 
mentor, user interface, electronic devices, consumer, cosmetic, graphics, nucleus, time-to-market, phone, media, tv set-top box, java, embedded software, pim apps, embedded component, callback, opengl, scripting, engineering, engineer
    
Mentor Graphics
Published By: IGLOO Software     Published Date: Dec 29, 2009
Extending social capabilities across your company can improve both individual and team productivity. With online communities, information is made transparent and corporate knowledge is bubbled up to where it can be used - no longer buried in email inboxes, hard drives or isolated in silos.
Tags : 
online communities, social capabilities, silo, web 2.0, igloo, branding, lifecycle
    
IGLOO Software
Published By: HP Virtualization     Published Date: Mar 22, 2010
This white paper describes a set of best practices to deploy a 1,500-user virtualized Exchange 2007 environment using VMware® ESXT 3.5. Specifically, this project demonstrates how to configure and deploy the Exchange 2007 Mailbox, Hub Transport, and Client Access server roles onto individual VMware virtual machines (VMs), which in turn are deployed onto a single VMware ESX Server. The environment includes HP ProLiant c-Class Blade servers connected to an HP StorageWorks 4400 Enterprise Virtual Array (EVA4400) Disk Array.
Tags : 
exchange 2007, vmware, esx 3.5, virtualized exchange 2007
    
HP Virtualization
Published By: Zycus     Published Date: Jul 29, 2010
Spend analysis has gradually become the top process in the procurement executive's toolbox, placing itself in the top tier of functionalities alongside e-sourcing, e-procurement and strategic sourcing solutions.
Tags : 
zycus, recession, downturn, procurement, sourcing companies, sourcing services, sourcing, reverse auction, e sourcing, eprocurement, strategic planning, procurement and outsourcing, [sourcing companies], [sourcing services], procurement strategy, procurement services, reverse auctioning, procurement management, electronic procurement, strategic procurement
    
Zycus
Published By: Box     Published Date: Jul 15, 2013
Gartner research report: Analysis of emerging market for enterprise file synchronization and sharing products and cloud based services.
Tags : 
enterprise file sync, enterprise file sharing, cloud services, file sync, cloud computing
    
Box
Published By: Box     Published Date: Jul 15, 2013
File Sharing: Risk or Remedy? Info-Tech whitepaper about best practices and solution providers for mobile content access and file sharing.
Tags : 
best practices, solution, mobile content access, mobile, file sharing, data integration, business technology, cloud computing
    
Box
Published By: Box     Published Date: Jul 15, 2013
In this Forrester's Wave File Sync and Share Platforms Q3 2013 report, the global research and advisory firm evaluates 16 file sync and share vendors: Accellion, Acronis, AirWatch, Alfresco, Box, Citrix, Dropbox, Egnyte, EMC, Google, Hightail (formerly YouSendIt,) IBM, Microsoft, Novell, Salesforce.com and WatchDox.
Tags : 
best practices, file sync, file share, content management
    
Box
Published By: SilverSky     Published Date: Mar 26, 2014
The Radicati Group, a technology market research firm, highlights its choices for Hosted Microsoft Exchange providers based on market share and functionality. They detail the criteria for a Top Performer in this market and include SilverSky in that category.
Tags : 
silversky, ibm, radicati group, technology market reserach, hosted microsoft exchange providers, hosted microsoft exchange, cloud mailbox, data center, cloud business email providers, it management, information management
    
SilverSky
Published By: SilverSky     Published Date: Mar 26, 2014
In this white paper, authored by technology market research firm The Radicati Group, the paper covers the ten reasons you should outsource your archiving solution, the seven unique benefits of archiving in the cloud and the how the SilverSky solution, powered by IBM compares.
Tags : 
silversky, ibm, radicati group, technology market research, cloud mailbox, email archiving, cloud based email archiving, archiving solution, outsource, data center, cloud business email providers, email solutions, storage, deployment, information management
    
SilverSky
Published By: Cisco     Published Date: Apr 08, 2015
Most large organizations address network security with an army of tactical point tools like firewalls, VPN gateways, IDSs/IPSs, network proxies, malware sandboxes, web and e-mail gateways, etc. This messy array of independent technologies was adequate ten years ago, but now presents a plethora of operational, policy enforcement, and monitoring challenges. Worse yet, network security defenses are becoming less and less effective at blocking targeted and sophisticated threats and advanced malware attacks.
Tags : 
next generation, firewall, malware, threat, complexity, costs, visibility, protection, network, enterprise, solution, security, data management
    
Cisco
Published By: Cisco     Published Date: Apr 08, 2015
NSS research indicates that NGFW devices are typically deployed to protect users rather than data center assets, and that the majority of enterprises will not tune the IPS module separately within their NGFW. Therefore, NSS evaluation of NGFW products is configured with the vendor pre-defined or recommended,“out-of-the-box” settings, in order to provide readers with relevant security effectiveness and performance dimensions based upon their expected usage.
Tags : 
next generation, firewall, malware, threat, complexity, costs, visibility, protection, network, enterprise, solution, security, data management
    
Cisco
Published By: Cisco     Published Date: Dec 21, 2016
When you’re a worldwide manufacturer with a premium brand, you can’t afford production bottlenecks or live with creaking systems that stifle your inventiveness. Now, with a new Cisco network architecture implemented by Black Box Network Services, Whirlpool Corporation has greater operational agility and efficiency.
Tags : 
    
Cisco
Published By: Microsoft Office 365     Published Date: Sep 26, 2017
In today’s on-demand economy, speed and flexibility are critical. The modern workforce uses multiple devices, expecting them to work seamlessly from any location, at any time. They want to communicate in real time and must have easy access to the data and productivity tools they need to do their jobs well. Office 365 harnesses the power of the cloud to improve the capabilities of the familiar Microsoft Office suite to meet these expectations. It’s a robust productivity toolbox that helps companies transform the way they engage, serve and sell to customers.
Tags : 
    
Microsoft Office 365
Published By: Cisco     Published Date: Feb 16, 2016
Over the years we’ve all heard claims of simple, seemingly magical solutions to solve security problems, including the use of sandboxing technology alone to fight advanced malware and targeted threats.
Tags : 
technology, security, security management, malware analysis, business intelligence, database security
    
Cisco
Published By: Cisco     Published Date: Dec 19, 2016
Prevention is your first line of defense. Make sure your Next-Gen Endpoint Security includes: Global Threat Intelligence – a team of threat hunters detecting the newest threats and uncovering zero-days to keep you protected 24/7 Signature-based AV Detection – let your Next-Gen Endpoint Security solution do all the AV heavy lifting and consolidate protection onto one agent Built-in Sandboxing – get static and dynamic analysis of suspicious threats, without having to deploy a third-party sandbox Proactive Protection – identify and patch vulnerabilities, and analyze and stop suspicious low-prevalence executables before they become real problems
Tags : 
    
Cisco
Published By: BOXX     Published Date: Feb 04, 2019
Download part 1 of the series and learn how to improve your product development workflow.
Tags : 
nvidia, product design, automation, product intelligence, manufacturing, business technology
    
BOXX
Published By: Cornerstone OnDemand     Published Date: Jan 31, 2018
We’re amidst disruption in the way people work and learn. Learning and Development as a function must adapt and go beyond the "check the box" approach, putting the learner experience front and center. Employees are now sitting in the driver's seat when it comes to their career path. Forward thinking organizations must move from simply managing training to creating a holistic learning experience, and transition from being training facilitators to learning curators. Modern tools will help make this transition possible. Whether you’re developing an L&D program from the ground up, or want to bring innovation into your current program, this eBook can help you structure your plans to be even more impactful for your business and for your workforce.
Tags : 
    
Cornerstone OnDemand
Published By: Cornerstone OnDemand     Published Date: Oct 02, 2018
"A learning management system (LMS) is designed to do more than “check the box” on training. It’s also a powerful platform ready to deliver meaningful, targeted education and engage workers with career development opportunities. Importantly, an LMS can help your company increase the ROI of employee training and learning. Download our quick-read guide on how an LMS can: 1. reduce costs and inefficiencies by streamlining the delivery of learning 2. reduce hiring and turnover costs by retaining high performers 3. increase new hire engagement and productivity by integrating ongoing learning with onboarding 4. drive unified success by aligning employee and organizational goals 5. reduce cost of administering compliance training"
Tags : 
    
Cornerstone OnDemand
Published By: Verio     Published Date: Jul 25, 2011
Learn the risks associated with using the POP and free email systems and how a hosted Microsoft Exchange solution can provide guaranteed availability and make email users in even the smallest businesses much more productive.
Tags : 
verio, microsoft exchange solution, pop, free email systems, availability, email reliability, hosted exchange, collaboration, productivity, mailboxes
    
Verio
Published By: Jive     Published Date: Feb 12, 2015
Remember getting your first box of LEGOS as a kid? How fun it was putting the pieces together, collaborating with your friends to create something new? Now, as an IT professional, assembling and maintaining a Lego-like collaboration infrastructure isn’t what you signed up for. Piecing together disparate systems of record for email, web meetings and other applications is about as painful as stepping on a pile of Legos. Download the e-book to learn how implementing a collaboration system connects systems of record the easy way.
Tags : 
enterprise, transition, interaction, digital business, social networks, vendor evaluations, vision, communication, collaboration, market assessment
    
Jive
Published By: Gold Lasso     Published Date: Jan 20, 2007
Organizations using e-mail marketing as a part of their overall communications plan can utilize a variety of tactics to effectively manage and reduce spam complaints. The purpose of this white paper is to educate organizations and marketers on the basics of the CAN-SPAM act by weeding through the jargon.
Tags : 
spam, spam complaints, email communication, black list, white list, deliverability, email marketing, inbox, gold lasso
    
Gold Lasso
Published By: Bronto     Published Date: Feb 01, 2018
Did you know that only one in five emails actually make it to the inbox? Where do yours end up? Deliverability can make or break your email marketing program. Yet, many marketers don’t fully understand it. We’ll show you how to create a program that beats the odds. What you'll learn: • The factors that affect deliverability. • How deliverability is calculated. • The steps you can take to improve it.
Tags : 
email, deliverability, retail
    
Bronto
Published By: SPSS     Published Date: Jun 30, 2009
This paper briefly defines text analytics, describes various approaches to text analytics, and then focuses on the natural language processing techniques used by text analytics solutions.
Tags : 
spss, text analytics, data management, statistical analysis, natural language processing techniques, computational linguistics, web sites, blogs, wikis, e-mails, instant messaging, predictive analytics, bottom up approach, documents, customer relationship management, crm, voice of the customer, competitive landscape, security threats, understanding text
    
SPSS
Published By: SPSS, Inc.     Published Date: Mar 31, 2009
This paper briefly defines text analytics, describes various approaches to text analytics, and then focuses on the natural language processing techniques used by text analytics solutions.
Tags : 
spss, text analytics, data management, statistical analysis, natural language processing techniques, computational linguistics, web sites, blogs, wikis, e-mails, instant messaging, predictive analytics, bottom up approach, documents, customer relationship management, crm, voice of the customer, competitive landscape, security threats, understanding text
    
SPSS, Inc.
Start   Previous    4 5 6 7 8 9 10 11 12 13 14 15 16 17 18    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.

We use technologies such as cookies to understand how you use our site and to provide a better user experience. This includes personalizing content, using analytics and improving site operations. We may share your information about your use of our site with third parties in accordance with our Privacy Policy. You can change your cookie settings as described here at any time, but parts of our site may not function correctly without them. By continuing to use our site, you agree that we can save cookies on your device, unless you have disabled cookies.
I Accept