ep lan

Results 76 - 100 of 1213Sort Results By: Published Date | Title | Company Name
Published By: IBM APAC     Published Date: Nov 22, 2017
A user initiates the call and selects the source language, such as Spanish. (In this example, assume that the target language is set to English.) As the user is talking to the support representative, the audio is converted to text using the Speech to Text service. Then using Language Translator, the text is translated to English. English language text is then sent to the Text to Speech service as input. The output audio message is what the support representative hears. All of this happens in near real time. The text from Speech to Text and the Language Translator service also can be stored in a database for analytics. The same process is repeated in reverse for the audio message sent by support personnel.
Tags : 
source, language, english, spanish, speech to text, database, analytics, audio message, support
    
IBM APAC
Published By: IBM APAC     Published Date: Nov 22, 2017
AlchemyAPI’s approach to natural language processing incorporates both linguistic and statistical analysis techniques into a single unified system. This hybrid approach provides an industry-leading advantage since both techniques have benefits and drawbacks depending on the content and specific usecases. Linguistic analysis takes a basic grammatical approach to understand how words combine into phrases, and how those phrases combine into sentences. While this approach works well with editorialized text (e.g., news articles and press releases), it does not perform as well when it comes to usergenerated content, often filled with slang, misspellings and idioms. Statistical analysis, however, understands language from a mathematical standpoint and works well on “noisy” content (e.g., tweets, blog posts, and Facebook status updates). The combination of these two approaches allows for increased accuracy on a variety of content.
Tags : 
industry, advantage, linguistic, grammatical, statistical analysis, content
    
IBM APAC
Published By: Akamai Technologies     Published Date: Dec 11, 2018
Remote access is important and growing, but how secure is it? IDC Research surveyed more than 300 IT professionals to gain insight into the specific threats and challenges faced by providing access to employees and third parties. Read this report to learn about: -How secure remote access really is -The complexity faced in implementing remote access -What happens when companies don’t have an access security solution -Why businesses must pivot from the common security mantra of “trust but verify” to “verify and never trust” in the new threat landscape Note: The report is in english.
Tags : 
    
Akamai Technologies
Published By: Dell EMC     Published Date: Nov 09, 2015
Download this whitepaper and learn how planning security for a big data solution is similar to that of other data-centric platforms deployed by many IT departments.
Tags : 
    
Dell EMC
Published By: Dell EMC     Published Date: Nov 04, 2016
Whether you’re dead set on winning the America’s Cup for Britain the first time like Olympian Sir Ben Ainslie or simply determined to keep your business competitive, success demands an infrastructure that can deliver quickly. Download the case study to learn how Ainslie’s British sailing team Land Rover Bar used innovative IT to deliver agility, reliability and speed in its bid to win, and how using hyper-converged infrastructure created a competitive advantage through improved performance and collaboration, reduced risk to critical applications, and provided the ability to spin up VMs in less than 15 minutes.
Tags : 
it infrastructure, hyper-convergence, architecture, sql, microsoft exchange
    
Dell EMC
Published By: Dell EMC     Published Date: Nov 04, 2016
With the 'EMC Mission Control' center in Portsmouth, UK and a second at the America’s Cup venue in Bermuda, plus a mobile center travelling worldwide to the preliminary events, Land Rover BAR will have all its data continuously replicated. The team in Portsmouth can analyze race and testing data immediately, as well as identify and make improvements right up to and through the finals in June 2017. This allows the design team and the crew to adapt much faster. With the introduction of the VCE VxRail Appliance powered by Intel® Xeon® processors, Land Rover BAR will be able to flexibly and rapidly scale, irrespective of location, ensuring a seamless experience for the team. To learn more about the impact of the Dell EMC VCE VxRail Appliance, read this brief infographic.
Tags : 
servers, flash storage, modular platforms, software-defined, networking, infrastructure
    
Dell EMC
Published By: QTS     Published Date: Feb 04, 2016
An FCW Digital Dialogue Download this Digital Dialogue from Federal Computer Week to learn how agencies like the General Services Administration and Department of Homeland Security are using the cloud to extend their enterprise and foster innovation.
Tags : 
cloud computing, fcw, qts, carahsoft, vmware
    
QTS
Published By: TIBCO Software     Published Date: Jan 17, 2019
Cloetta is a leading confectionary company in the Nordic region of Europe and The Netherlands. Cloetta manufactures and markets confectionary, chocolate products, nuts, pastilles, chewing gum, and pick and mix concepts. Its products are in more than 40 markets worldwide, with Sweden, Finland, Denmark, Norway, the Netherlands, Germany, and the UK as the main markets.
Tags : 
data, virtualization, solution, tool, reporting, server, reports, software, inventory, sales
    
TIBCO Software
Published By: International Business Systems (IBS)     Published Date: Aug 30, 2011
Learn how inventory optimization can offer companies huge potential to maximize the value of IT investments-and keep inventory levels balanced.
Tags : 
distribution logistics, distribution management, wholesale distribution, distribution resource management, supply chain management, erp, enterprise, resource, resource planning, ibs, business technology
    
International Business Systems (IBS)
Published By: Akamai Technologies     Published Date: Jun 14, 2018
"Remote access is important and growing, but how secure is it? IDC Research surveyed more than 300 IT professionals to gain insight into the specific threats and challenges faced by providing access to employees and third parties. Read this report to learn about: -How secure remote access really is -The complexity faced in implementing remote access -What happens when companies don’t have an access security solution -Why businesses must pivot from the common security mantra of “trust but verify” to “verify and never trust” in the new threat landscape
Tags : 
remote access, security
    
Akamai Technologies
Published By: Collaborative Consulting     Published Date: Dec 23, 2013
Commercial launch is a critical and complex period in the Life Sciences product life cycle. The transition from clinical development to commercial operations can seem overwhelming as companies face considerable challenges in transforming from an R&D-driven organization to one focused on achieving in-market business and commercial excellence. Core to successful launches is preparing the company for a whole new raft of capabilities, processes, and relationships, and in doing so there are a number of factors included in this checklist that companies should consider and questions they should answer.
Tags : 
collaborative consulting, commercial launch, it infrastructure, balance representation, commercialization plan, define and track, iterative process, supply chain management, support commercial activities, integrated compliance, decision-making process, it strategy, migration strategies, it management
    
Collaborative Consulting
Published By: Akamai Technologies     Published Date: Aug 17, 2017
The rapid rate of mobile adoption provides today’s users with nearly unlimited access to data and information anytime, anywhere. While “always on” users represent a tremendous opportunity for businesses to increase engagement, revenue, and customer loyalty, they also create unprecedented mobile delivery challenges. In this e-book, we will delve into these challenges and learn how to master them by optimizing for fast APIs, mobile apps, and mobile sites. But before we do that, let’s start our mobile story with some perspective: Approximately half of you reading this e-book will do so on mobile. That fact alone should be a compelling enough reason to keep reading, but in case it’s not, the following data illustrates the impact mobile growth has had on our technological landscape.
Tags : 
mobile, mobile adoption, customer loyalty, always on
    
Akamai Technologies
Published By: Websense     Published Date: Jan 25, 2013
Increasing one's awareness of today's mobile security risks and understanding the options for solutions are two key steps in preparing for best security practices. In addition, this article discusses mobile security solutions and much more.
Tags : 
mobile security, solutions, websense, mobile security, solutions, major it security strategy, it management, data management, business technology, data center
    
Websense
Published By: Dell     Published Date: Feb 02, 2015
While Windows 7 and Windows XP continue to dominate the market, Windows 8 adoption has been fairly slow, especially in the enterprise. The end of support for Windows XP now creates a season of needed change. Prepare now to address both the challenges and opportunities of this wave of OS migrations by downloading this IT handbook. Read it for insights into planning and preparation, hardware and software compatibility considerations, as well as end user training and implementation.
Tags : 
dell, windows, productivity, security, apps, integration, platforms, microsoft, business, management, budget, training, windows 7, windows 8, mobility, security, compatibility, support, training, byod
    
Dell
Published By: Micro Focus     Published Date: Jun 07, 2018
Technology leaders need to rethink strategic planning in the age of the customer. Technology strategies are too often just collections of loosely related project plans and too focused on tech project delivery milestones. Strategies designed “by IT, for IT” fail to engage business leaders and executives because they don’t explain how tech strategy leads to better customer experience and outcomes. This report explains how technology leaders can create a strategic tech plan that is customer-led, insights-driven, fast, and connected.
Tags : 
    
Micro Focus
Published By: Dell     Published Date: May 09, 2017
Dell’s approach to PC Lifecycle management is designed to help customers make the change from IT maintenance to innovation all while controlling their PC infrastructure costs. With this eGuide IT professionals will learn how to deploy, secure, and support PCs with unparalleled efficiency leveraging Dell’s industry-leading hardware, services, and security solutions. Access the eGuide from Dell and Intel® and you will learn: • Why IT needs to take a different approach PC lifecycle management • The four critical stages of the PC lifecycle (Plan, Deploy, Manage, and Retire) • How to partner with Dell to strategically migrate to Windows 10 • What solutions can help in each phase to reduce costs and increase IT productivity • The latest security solutions to protect data and employees
Tags : 
it maintenance, pc lifecycle, pc infrastructure, pc support, pc lifecycle management
    
Dell
Published By: Akamai Technologies     Published Date: Apr 25, 2018
In September 2017, Akamai commissioned Forrester Consulting to examine how companies approach digital experience and digital security. A survey of over 350 IT executives around the world found that: Customer trust is at an all-time low and it’s hurting growth Executives are aware that customer trust is becoming critical to success Companies struggle to balance security with digital experience Failure to deliver on security impacts brand reputation, customer trust, and revenues This report, Drop A Pin At The Intersection Of Digital Experience And Security, shares insights into these findings and what sets top digital businesses apart.
Tags : 
digital, experience, security, executives, customer
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Apr 25, 2018
DDoS attackers launch hundreds of DDoS attacks every day. When a DDoS attack strikes an organization, panic is common. No one knows why systems and applications are failing, who to call, or what questions to ask. Meanwhile, senior leaders want answers. Planning ahead and being prepared is your best defense against DDoS attacks. This white paper explores best practices for building and maintaining a DDoS protection plan. You’ll learn what to expect from a DDoS attack, how to prepare, what to put in a DDoS runbook, and how to test your plan.
Tags : 
ddos, protection, practices, systems, attackers, applications, systems
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Nov 02, 2018
What to expect and how to prepare your best defense DDoS attackers launch hundreds of DDoS attacks every day. When a DDoS attack strikes an organization, panic is common. No one knows why systems and applications are failing, who to call, or what questions to ask. Meanwhile, senior leaders want answers. Planning ahead and being prepared is your best defense against DDoS attacks. This white paper explores best practices for building and maintaining a DDoS protection plan. You’ll learn what to expect from a DDoS attack, how to prepare, what to put in a DDoS runbook, and how to test your plan. In viewing this Akamai content, we would like to share your data with Akamai. Click here for more info or to opt out.
Tags : 
    
Akamai Technologies
Published By: Sage People     Published Date: Jan 22, 2019
In our latest survey report, we explore the growth challenges facing businesses and HR leaders in a rapidly changing landscape. We surveyed over 500 HR leaders in leading organisations to explore their views on these challenges, and to find out how they are supporting people and leveraging people data to help them achieve their growth goals. The survey revealed that: • It’s the war for talent, again. The greatest challenges for growing companies are winning the war for talent, growing productivity and improving workforce visibility. • Fast-growth companies share common traits in the way they manage and engage their people—we call this being a People Company. • There’s a disconnect between managers and employees in terms of what being a People Company means. • Becoming a People Company is a journey, with many organisations some way from embracing all aspects. • People Science is a thing: there’s an appetite to leverage people data and analytics, but there are blockers in the way. Re
Tags : 
    
Sage People
Published By: Adobe     Published Date: Nov 07, 2013
A key finding of this research is that most companies have a great opportunity to improve their business performance by taking a more integrated approach to managing their digital media mix.
Tags : 
adobe, econsultancy, media optimisation report, effective optimisation, media mix, tactical objectives, complex media landscape, consumer buying patterns, digital media, optimisation of media activity, online display, paid research, campaign performance, business imperatives, disparate ownership, outsourced to agency
    
Adobe
Published By: SAP     Published Date: Dec 04, 2015
Download this whitepaper to see how advanced technologies such as big data, cloud computing, mobile devices, and enterprise access to in-memory platforms, predictive analytics, and planning software can help CFOs make better and more sophisticated use of data, influence decisions, and take practical, timely action.
Tags : 
finance function, finance, cfo, big data, cloud computing, mobile, in-memory platforms, predictive analytics, planning software
    
SAP
Published By: SAP     Published Date: Dec 04, 2015
Supporting the needs of information workers requires the delivery of the latest, relevant information at the point of decision. Download this IDC Report to learn how to enable finance in a digital enterprise to plan, monitor, and predict.
Tags : 
digital enterprise, planning, monitoring, predicting, information industries, information workiers
    
SAP
Published By: Teradata     Published Date: Jun 22, 2015
Passed on May 9, 2014, the Digital Accountability and Transparency Act (DATA Act) legislation requires federal agencies to report all expenditures—grants, loans, and contracts—in order to provide American citizens and policy makers better visibility into federal spending. At first glance, new federal requirements— which are scheduled to go in effect May 2017—can seem like imposed obligations with unknown benefits to the implementers. However, wise agencies and early adopters recognize how to transform this new compliance obligation into an opportunity to advance their federal agency by becoming more data driven. The Federal Government maintains vast amounts of data, and the DATA Act establishes data standards and sharing protocols that will help agencies exploit the benefits of data mining and analytics.
Tags : 
    
Teradata
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add A White Paper

Email sales@inetinteractive.com to find out about white paper options for your company.