- Home
- Resources
-
Articles
- Articles
- Home
- Resources
- Articles
-
Better living through parking
- Why you need MPLS and SD WAN
- Intelligent Traffic Management and Intelligent Transportation System
- Verizon Network Analytics
- Intelligent Traffic Solutions Brief
- Cybersecurity Benchmarking: Do you out-secure the competition?
- Cybersecurity and 5G
- Small Business Webinar: Leading Through Uncertainty
- Navigating the CARES Act process
- How Tools That Leverage Blockchain Can Address Escalating Security Concerns
- Contact Center Workforce Management
- IT/OT Alignment on the Factory Floor: Tips for a Smooth Transition
- What is UCaaS and is it right for my organization?
- Zero trust security framework: benefits and downsides
- 5G network slicing: Do you have the team you need?
- How to Run a Public Meeting Online
- Why You Need Managed Detection And Response Services
- The golden age of voice communications
- Worried about fraudulent calls? Build a strong voice security strategy
- Why 56 % of large business are turning to SDN for cybersecurity
- What are successful CX leaders doing differently?
- Three ways technology can enhance your contact center performance
- Five CIO Strategies to Create a CX Roadmap
- Three reasons why the role of the CMO is now a technology job
- Retail Apocalypse? We don’t think so.
- Five technologies helping brand and CPG manufacturers survive disruption
- Digital transformation is everywhere. But did you forget to transform your security program?
- What is an ounce of cybersecurity prevention worth?
- Three Energy and Utility Trends to Watch in 2019
- Stop skimping. Cybersecurity breaches can severely hurt your bottom line.
- How 5G Impacts Your CX Strategy
- IoT Device Security: 6 Ways to Protect Against Often Overlooked Threats
- Why your digital transformation strategy requires a risk management plan
- Overcoming the challenges to digital transformation
- Three reasons why SD WAN is essential for cloud migration
- SD WAN vs. MPLS: Understanding the Difference
- Four ways AI can help build an omnichannel customer experience
- Though behind the scenes, cybersecurity is a star in the media and entertainment industries
- Why connectivity is key to digital transformation
- How Digital Transformation Impacts CX
- How technology is driving the transformation of content
- Security in the public cloud: Get peace of mind
- The Challenges and Benefits of Securing Hybrid Clouds
- Private cloud security: What’s the difference?
- When self-service is done right
- Impact of Communication in Cybersecurity
- Smart City 3.0
- FAQ: Measuring Your Security Posture: How Prepared Are You for Cyber Risks?
- Why rethinking your software culture can be a competitive advantage
- Six reasons you can’t afford to go cheap on network
- A thought experiment about shared credentials
- Acceptable use policies: Keeping your workplace secure
- Advanced threat detection – Adapting to change
- Anatomy of well-managed malware incident
- Briefing the board: Directing security evolvement
- Can you explain IoT without saying IoT?
- CIOs need to embrace digital customer experience (CX), otherwise CIO will stand for “Career Is Over”
- Creating the city of the future today
- CX Day 2017: Celebrating customer experience
- Data breaches: how long does the damage last?
- Darknet: The shady underbelly of the iceberg
- Data Breach Digest Update Data ransomware the Catch 22
- Delivering smart, sustainable energy solutions
- Data breaches in industrial environments: Safety comes first
- Error detecting data visualizations
- Help Me, Help You. Sincerely, Your Customer.
- Make sure the bad guys don’t get what they’re hoping for this Christmas
- Man vs machine, which delivers the best customer experience?
- My experience with the Kano Model
- Insider Threat: One pattern, four scenarios, thirteen countermeasures
- My superb Go-To-Gemba customer experience
- Powering the digital economy with modern utilities
- Preparing for GDPR? PCI DSS could help
- Smart cities are the wave of the future
- Smart traffic helps improve quality of life
- Social engineering: Strengthening the weakest link
- Where SMBs have the upper hand
- What to consider when planning your future digital network
- This framework ain't big enough for the both of us
- What does IoT really mean for the enterprise
- Verizons Data Breach Digest - Perspective is reality
- Retail’s Digital Roadmap
- Numbers Aren’t Enough: CX Professionals Need to Be Storytellers Too
- Mobile Customer Experience: Savvy shoppers Ready associates
- Incident Management Focus: Two Approaches to Incident Response Plans
- I Admit It: I’m Biased
- How to retain viewers with your online video services
- Virtual Network Security Services
- Announcing VERIS Community
- Are we reaching the limits of technology?
- Virtual Network Services- WAN Optimization
- Find the Right Construction Management Tools
- Usage-Based Car Insurance Solutions
- Enable Banking Virtually Anywhere with Wireless ATMS
- Verizon Intelligent Video and Smart Surveillance
- Ethernet Services & Ethernet Architecture Solutions
- VGo Mobile Telepresence Robot Case Study
- Fleet Maintenance and Performance Case Study
- Auto Dealer Solutions for Courtesy Cars Case Study
- Car Rental Solutions Streamline Rental Operations to Create New Business Models
- Smart Fleet Management Basics
- ICS Security Services
- Adaptive CX Means Liquid Personalization
- Verizon Wireless Private Network Connections
- Entertainment and Media Technology Solutions Help You Deliver More Engaging Content
- Wireless Backup Solutions
- Are you living in a glass house?
- Utilities and Energy Management Technologies
- When it comes to CX, don’t get hung up on the jargon
- Tough Love and the Customer Experience Culture
- “Retail is Dead” — and Other Rumors with no Validity
- Are your vendors the weak link in your cybersecurity?
- Banks—It’s Time To Start Talking To Each Other, Say UK Police
- Cloud storming: You need more than an umbrella to stay secure
- M2M Transportation Solutions Brief
- Network Security Solutions
- Fact Sheet: Verizon Network Analytics
- Customer Experience and the Security Paradox
- Customer Experience Mystification
- Cybersecurity In 2017: It’s Not All Doom And Gloom
- Digital Convergence: The Perfect Storm
- Does connected working kill innovation?
- Don’t make a fish climb a tree: customer preferences matter.
- EESI as Pie: Essential Elements of a Successful Intrusion
- Federal Government Modernization: Priorities for the Federal IT Executive
- Five Ways Tech Can Supercharge Your CX Team
- Get a new perspective on cybersecurity
- Have Your Metrics Become Your Master?
- How to move from product first to customer first
- IoT: from theory to practice
- Is automation your golden ticket to great CX?
- To Sell Or To Serve?
- Just because you can, doesn’t mean you should
- Keep the "personal" in personalized customer experience
- Make the right cybersecurity investments
- The four pillars of digital transformation
- Stop feeding your customers air sandwiches
- Dedicated IP Internet Services
- Retail Industry Solutions
- Connected working: think outside the box
- Travel and Hospitality Industry Solutions
- Virtual Network Services
- M2M Solutions for Government Brief
- State of the Market: Internet of Things 2017
- Grid Intelligence Water Case Study
- Private IP: Get a network that grows with your business.
- United Security Services
- Business Connections- Business Communication Solutions
- Verizon Cypher Encryption Software
- Achieve Operational Transformation with Dynamic IT Services
- Verizon Collaboration Services: Erase Boundaries and Communicate with Ease
- Workplace Mobility Strategies
- Espionage Health Check
- E-Discovery Support
- Push to Talk Plus Phones & Technology
- Security Incident Response Analytics
- Visual Interactive Calling
- Fleet management service helps improve performance and cut costs
- A Foundation for Growth with Data Center Consolidation and More
- Assessing Intrusion Detection
- Digital Advisory Services - Software Defined Networking Strategic Assessment
- Network Threat Monitoring
- Virtual Network Services-Security
- Drive Business with Fleet Telematics Solutions
- Business Smartphones Jump-Start Productivity
- Mobile Device Management
- Fleet Management Solutions Factsheet
- A better way to get the latest CPE technology
- Rapid Response Services
- Verizon Rapid Delivery Platform
- Advanced Network Experts Retainer
- Cyber Risk Management Program
- Internet Dedicated Services
- Express Connect WAN Services
- MDM Software Management with OTA Distribution
- Managed Security Services
- Computer Emergency Response Team
- Network discovery service: Discover your network’s potential
- IP Contact Center
- Network Management Solutions Brief
- Mobile Technology for Retailers
- Threat Intel and Response Services
- Business VoIP & Business Phone System Solutions
- Security Health Checks
- Law Enforcement and Public Safety Solutions Brief
- M2M Finance Solutions Brief
- Choosing a Wireless Network Provider
- 4G LTE Enables Business
- Wireless ATMs & Kiosks Factsheet
- Simplify Your Grid Solution
- Take Control of Infrastructure Security with Intelligent Video Surveillance
- Smart Lighting Technology Brief
- Grow your business with leading-edge proof of concept testing
- Managed Security Services – Analytics
- ThingSpace IoT Management
- SD WAN Services
- DDoS Protection Service: DDoS Shield
- Smart Communities Solutions
- Enterprise Mobility Management Solution from MobileIron
- Custom Apps and eForms for Mobile Devices
- Making the Case for MPLS VPNs in the Modern Enterprise
- Diary of a cybercriminal
- HP Elite x2 Business PC on the Verizon 4G LTE Network
- Private Network Traffic Management
- Retail M2M solutions
- SD WAN Service with Application Aware Routing
- Virtual Network Services Solutions Brief
- The Verizon Fleet Management System
- Verizon Condition-Based Maintenance Solutions
- Private Network Traffic and Bandwidth Management
- Verizon ThingsSpace IoT Development Platform
- The Verizon Network-Backed Asset Tracking System
- The resonant theme of RSA 2016
- Optimize Fleet Operations With Verizon Autoshare
- Unified Communications and Collaboration as a Service Factsheet
- Networkfleet Fleet Management Case Study
- Leading the way for vision zero
- How SDN can help your business transform and grow
- Helping your workers get the most out of your new cloud based communications solution
- Implementing automation in your contact center read this first
- How to keep your business communications secure
- Five reasons why your business needs software-defined networking
- The Delicate Nature of Trust
- Will SDN replace MPLS? Not so fast.
- The future of connected vehicles hinges on today’s investments.
- Disclosing cyber risk? New SEC guidance requires it.
- Revolutionize your communications: Migrating to a cloud-based platform
- The role human touch plays in the digital customer experience.
- The importance of public-private partnerships to make smart cities a reality
- Staying Ahead of the Curve
- Why network visibility is important for your business
- Are You About to Sever the Final Thread Your Dissatisfied Customer Is Clinging To?
- How to break down the barriers to SDN adoption
- Keep an eye on these five KPIs as you drive improved customer experience using artificial intelligence
- The four key steps to improving customer experience with artificial intelligence
- Staying safe online: Observing good digital hygiene
- 2017 Data Breach Digest: Half Year Anniversary
- Six ways to strengthen network security and maintain a competitive edge
- Your Endpoint Security Strategy Needs a Hug
- 5G and autonomous vehicles: turning fiction into reality
- Making cities safer for everyone
- Be a better bot boss: 3 tips for CX chatbot success
- Virtual Reality / Augmented Reality: A humanizing revolution for customer engagement
- For insurers, failure is learning—and you need to learn fast.
- Network Orchestration Enhances Digital Transformation
- It’s real: Digital transformation is already delivering results
- The Humanability of Smart Cities
- How DevOps can turn IT into the leaders of your business
- Knowledge is power: How an intelligent knowledge base powers CX
- Light the way to futureproof your smart city investment
- Why DevOps is critical for improving the customer experience
- Operation "Surprise and Delight"
- Get the SD WAN facts before you buy
- Are you "over-sharing" your customer feedback data?
- Why risk scoring is critical for your business (and your career)
- Changing consumer demands are forcing entire business models to be rethought
- Cyber security posture FAQ: know your cyber risk
- Deception Technology: A strategic imperative for detection and response
- Voice Security Strategy Best Practices
- CX Improvement: The need to put consumer data protection and privacy first
- The Digital Transformation of the NFL Stadium and the 5G Fan Experience
- How to Improve Customer Experience
- Customer Personalization: The time is now for customized experiences
- Why Cyber Risk Visibility is the Key to Security
- 2019 LinkedIn Phishing Threat
- Minimize Your Attack Surface
- How Velocity Can Impact Cyber Security Strategy
- The top 10 criteria for selecting an SD WAN vendor
- How to implement SD WAN architecture the right way
- The Power of SD WAN and 5G
- Creating an Effective Cyber Security Incident Response Plan
- Embedded Universal Integrated Circuit Card
- Embedded Universal Integrated Circuit Card
- How digital transformation is impacting the utilities sector
- How to promote teamwork among remote employees
- Three keys to managing remote employees
- Business Impact of Coronavirus: Ready in the Face of Uncertainty
- Tips to promote connectivity in digital workplace
- Accelerate Your Digital Workplace with 5G Mobility
- How to Prevent Phishing & Malware Attacks
- Tips and strategies to improve virtual meeting performance
- PCI Compliance: What to Know About Digital Payment Security
- Getting Calls When Working Remotely
- Keep your business open when your location is closed
- How to improve the customer service experience in crisis situations
- Methods & Types of Business Communication Services that Businesses Rely On
- How to Work Remotely Using Collaboration Tools
- How Mobile Hotspots Can Help When Working Remotely
- Teamwork and Collaboration Best Practices
- Remote Work Security Policy & Best Practices
- Streamline CX with Better Tech Integration
- Creating a Personalized Customer Experience
- Does your school have these five critical security features?
- Does your school have these five critical security features?
- Telehealth Relief for COVID-19
- Transform Your Network with Edge Computing
- Five ways the cloud can help improve your school's security
- How to enhance distance learning and remote employee training sessions
- Nine scary security stats educators everywhere should know
- What is Zero Trust Architecture
- Remote Work Tips for the Public Sector
- Why 56 % of large business are turning to SDN for cybersecurity
- Five top mobile security threats
- Strategic Outsourcing
- Tips for Small Businesses in a Tough Economy
- The Future of Telehealth Starts Today
- Considering Remote IT Support Solutions
- Four tips to strengthen your digital marketing strategy
- User Experience Checklist
- BYOD Security for Remote Employees
- Building a 30/60/90 Day Business Plan
- Create an Acceptable Use Policy
- Strategize with Small Business Cyber Security Plan
- Small Business Cyber Security and Data Breaches
- Sample Article Title
- Five productivity tips for your newly remote team
- Corporate Network Enhancements
- In cybersecurity, integrity matters.
- three-next-gen-technologies-that-will-define-cybersecurity-in-the-next-decade
- Creating the New Normal for Your Small Business
- Connectivity best practices for distance learning
- Scalable Network Solutions During Critical Events
- Ways to Find New Customers Now
- How to Protect Data Security
- Small Business Innovation for Big Impact
- Finding Alternative Small Business Funding
- Tips to Transition to Working from Home
- Test
- Five best practices for choosing the right security provider
- Three next-gen technologies that will define cybersecurity in the next decade
- IoT security: Why you need to encrypt your data
- Analyzing the COVID-19 data breach landscape
- Design considerations for a 5G network architecture
- Five security blind spots you might not realize you have
- How to drive business agility with remote collaboration tools
- Mapping the 5G impact in the retail industry
- 5G and IoT: The future of efficiency
- The 5G evolution: Exploring the journey from 2G to 5G
- Funding Safe and Secure Elections During the COVID-19 Pandemic
- Low-latency 5G and the opportunities it can create
- Three 5G application scenarios and how they could change your workforce
- Optimizing business communications networks by combining SD WANs and MPLS
- A guide to unified communications solutions: beyond VoIP and video
- Improving customer experience with a contact center provider
- Strategies to Get 5G Ready
- The industries that will benefit from 5G
- Optimize fleet operations through smarter supply chain disaster management
- Six design principles to help mitigate latency
- Understanding the five C’s of Latency
- Where 5G and MEC work together
- Securing your 5G edge computing architecture for business success
- Unpacking the “5G” in Verizon’s 5G edge
- Cloud computing security: Is it safer than on-premises?
- Professional Services vs. Managed Services
- How AI improves the customer experience
- The human element in cyber security: When user error is the problem
- Security threats in e-commerce: Protecting data while maintaining customer experience
- How a power grid attack threatens the energy industry
- Mobile device security in the workplace: five policies you must have
- Cloud contact center technology: empowering your employees
- How IIoT in manufacturing is made possible with MEC and 5G
- How to cultivate customer relationships through social engagement
- Supply chain communication strategies for successful management
- What is edge computing and where is it being used?
- 5G and edge computing: configuring the edge topology
- Collaboration tools: focus on interoperability to avoid tool fatigue
- How intelligent routing can improve the contact center experience
- Securing the smart city of the future
- Building a successful digital transformation strategy
- Video conferencing network requirements: delivering the best user experience
- Solving common remote work endpoint security challenges
- Real-time crime centers and law enforcement technology
- 5G and IoT edge computing: driving future business value
- Smart cities and cyber security: protecting citizens from malicious attacks
- Mapping the digital customer experience for optimal growth
- 5G and AI: creating a connected global business
- The power of AI: artificial intelligence examples for a modern world
- Edge computing vs. cloud computing: What are the benefits in higher education?
- A guide to IT/OT convergence
- IoT in retail can help improve the customer experience
- The benefits of contact and call center speech analytics software
- New collaboration tools: rolling out an enterprise application
- How cloud contact center solutions help workforce productivity
- Diversify the contact center experience to better serve your customers
- Benefits of unified communications services and platforms
- IoT risk management in the mining industry
- How virtual hold technology can boost customer satisfaction
- How cloud-based call center solutions can boost customer satisfaction
- Effective communication strategies in business for 2021 and beyond
- Vehicle tracking solutions that can help protect drivers and customers
- IoT and healthcare: near real-time health monitoring on hospital floors
- How IoT and big data are transforming the construction industry
- Nation-state cyber attacks aren't like your average cyber adversary
- AI hacking: How IT security leaders can mitigate emerging cyber risks
- What is a zero-day attack? How to prepare and respond
- Social engineering attacks to watch out for
- Four enterprise communications trends for 2021 and beyond
- Edge computing examples: what is your edge?
- 5G and telemedicine: Hospitals should take an individualized approach
- Why deepfake video is a real threat to businesses
- Fostering smart construction site solutions with a temporary network
- Learning from cyber espionage attacks like Operation Soft Cell
- User behavior analytics and the technology you need to realize its value
- The next wave of telehealth services is coming, and 5G will power it
- Secure fleet vehicle management is increasingly critical
- Construction cyber security: protecting the worksite against threats
- Professional and Managed Services Vendor: 4 Factors to Consider
- Big data security and privacy concerns in healthcare
- Is a cloud-based phone system right for your business?
- AI-powered customer engagement: Is it worth the investment?
- How pairing UCaaS and CCaaS transforms the customer experience
- The future of education technology
- Improving patient experience through on-premises telemedicine
- Innovations in healthcare technology see boost from pandemic
- Methods of communication on a construction site for a staggered team
- Lessons from the RobbinHood ransomware attack on Baltimore
- 2021 Resolutions for CISO & Security Leaders
- Condition-based monitoring is crucial for preventative maintenance
- A customer engagement strategy for insurance includes virtual call centers
- Will hosted VoIP solve your mobile communications woes?
- Guest experience hospitality: how companies can deliver a best-in-class security and customer experience
- How to budget for cyber security costs—and why it's crucial
- Session hijacking attacks: understanding and preventing them
- Can the cloud be hacked?
- How a local government IT strategy can benefit from managed services
- Cloud contact center solutions empower exceptional customer experiences
- What is 5G Network Architecture?
- How Businesses Should Prepare for 5G
- How will 5G Affect Business?
- The Future of 5G: 5G-Powered Technologies
- What is 5G Beamforming?
- The digital transformation challenges confronting retailers in 2020
- Extending the lifespan of IoT sensors in industrial devices
- Finding the future of IoT in municipal government
- Enabling manufacturing automation and factory cost controls with IIoT
- From intelligent lighting to smart metering: how energy and utilities are transforming
- How to build a smart city from the ground up
- From intelligent lighting to smart metering: how energy and utilities are transforming
- Enabling manufacturing automation and factory cost controls with IIoT
- Finding the future of IoT in municipal government
- How to Build a Smart City from the Ground Up
- How to solve public sector technology and government IT challenges
- Extending the lifespan of IoT sensors in industrial devices
- The future of healthcare technology—faster access and better information through 5G
- Virtual contact centers for small businesses: how cloud-based options help
- 5G and connected cars: the next-generation automotive industry
- Learning from a backdoor attack: the takeaways of Operation ShadowHammer
- Cyber security threats to schools and how to protect against them
- Security vulnerability scanning on an ever-expanding attack surface
- Is your organization's incident response plan up to par?
- How camera hacking threatens remote workers—and their organizations
- How data encryption protects patients
- Exceed customer expectations with these five technologies
- How cloud security best practices keep hospitals healthy
- Social media phishing is on the rise
- Considerations for a new small business network
- A work-from-home security policy is essential for businesses
- Financial services cyber security and edge computing
- How user experience testing can detect customer experience friction in e-commerce
- How the media and entertainment industry is using mobile edge computing
- Disaster recovery after a hotel data breach
- Is AI the future of personalized healthcare?
- The benefits of network slicing: flexibility and more
- How 5G will impact the future of farming
- Cyber security posture FAQ: know your cyber risk
- How public safety systems support natural disaster recovery
- Preparing for disaster with storage virtualization
- Is augmented reality the future of CX?
- 5G vs. Wi-Fi 6: how do they compare?
- Interactive voice response (IVR) systems: three tests to pass
- Cyber security for smart energy and renewables
- Digital signage can help transform public transportation
- 10 Considerations for an ideal edge computing model
-
Better living through parking
-
Better living through parking
- Why you need MPLS and SD WAN
- Intelligent Traffic Management and Intelligent Transportation System
- Verizon Network Analytics
- Intelligent Traffic Solutions Brief
- Cybersecurity Benchmarking: Do you out-secure the competition?
- Cybersecurity and 5G
- Small Business Webinar: Leading Through Uncertainty
- Navigating the CARES Act process
- How Tools That Leverage Blockchain Can Address Escalating Security Concerns
- Contact Center Workforce Management
- IT/OT Alignment on the Factory Floor: Tips for a Smooth Transition
- What is UCaaS and is it right for my organization?
- Zero trust security framework: benefits and downsides
- 5G network slicing: Do you have the team you need?
- How to Run a Public Meeting Online
- Why You Need Managed Detection And Response Services
- The golden age of voice communications
- Worried about fraudulent calls? Build a strong voice security strategy
- Why 56 % of large business are turning to SDN for cybersecurity
- What are successful CX leaders doing differently?
- Three ways technology can enhance your contact center performance
- Five CIO Strategies to Create a CX Roadmap
- Three reasons why the role of the CMO is now a technology job
- Retail Apocalypse? We don’t think so.
- Five technologies helping brand and CPG manufacturers survive disruption
- Digital transformation is everywhere. But did you forget to transform your security program?
- What is an ounce of cybersecurity prevention worth?
- Three Energy and Utility Trends to Watch in 2019
- Stop skimping. Cybersecurity breaches can severely hurt your bottom line.
- How 5G Impacts Your CX Strategy
- IoT Device Security: 6 Ways to Protect Against Often Overlooked Threats
- Why your digital transformation strategy requires a risk management plan
- Overcoming the challenges to digital transformation
- Three reasons why SD WAN is essential for cloud migration
- SD WAN vs. MPLS: Understanding the Difference
- Four ways AI can help build an omnichannel customer experience
- Though behind the scenes, cybersecurity is a star in the media and entertainment industries
- Why connectivity is key to digital transformation
- How Digital Transformation Impacts CX
- How technology is driving the transformation of content
- Security in the public cloud: Get peace of mind
- The Challenges and Benefits of Securing Hybrid Clouds
- Private cloud security: What’s the difference?
- When self-service is done right
- Impact of Communication in Cybersecurity
- Smart City 3.0
- FAQ: Measuring Your Security Posture: How Prepared Are You for Cyber Risks?
- Why rethinking your software culture can be a competitive advantage
- Six reasons you can’t afford to go cheap on network
- A thought experiment about shared credentials
- Acceptable use policies: Keeping your workplace secure
- Advanced threat detection – Adapting to change
- Anatomy of well-managed malware incident
- Briefing the board: Directing security evolvement
- Can you explain IoT without saying IoT?
- CIOs need to embrace digital customer experience (CX), otherwise CIO will stand for “Career Is Over”
- Creating the city of the future today
- CX Day 2017: Celebrating customer experience
- Data breaches: how long does the damage last?
- Darknet: The shady underbelly of the iceberg
- Data Breach Digest Update Data ransomware the Catch 22
- Delivering smart, sustainable energy solutions
- Data breaches in industrial environments: Safety comes first
- Error detecting data visualizations
- Help Me, Help You. Sincerely, Your Customer.
- Make sure the bad guys don’t get what they’re hoping for this Christmas
- Man vs machine, which delivers the best customer experience?
- My experience with the Kano Model
- Insider Threat: One pattern, four scenarios, thirteen countermeasures
- My superb Go-To-Gemba customer experience
- Powering the digital economy with modern utilities
- Preparing for GDPR? PCI DSS could help
- Smart cities are the wave of the future
- Smart traffic helps improve quality of life
- Social engineering: Strengthening the weakest link
- Where SMBs have the upper hand
- What to consider when planning your future digital network
- This framework ain't big enough for the both of us
- What does IoT really mean for the enterprise
- Verizons Data Breach Digest - Perspective is reality
- Retail’s Digital Roadmap
- Numbers Aren’t Enough: CX Professionals Need to Be Storytellers Too
- Mobile Customer Experience: Savvy shoppers Ready associates
- Incident Management Focus: Two Approaches to Incident Response Plans
- I Admit It: I’m Biased
- How to retain viewers with your online video services
- Virtual Network Security Services
- Announcing VERIS Community
- Are we reaching the limits of technology?
- Virtual Network Services- WAN Optimization
- Find the Right Construction Management Tools
- Usage-Based Car Insurance Solutions
- Enable Banking Virtually Anywhere with Wireless ATMS
- Verizon Intelligent Video and Smart Surveillance
- Ethernet Services & Ethernet Architecture Solutions
- VGo Mobile Telepresence Robot Case Study
- Fleet Maintenance and Performance Case Study
- Auto Dealer Solutions for Courtesy Cars Case Study
- Car Rental Solutions Streamline Rental Operations to Create New Business Models
- Smart Fleet Management Basics
- ICS Security Services
- Adaptive CX Means Liquid Personalization
- Verizon Wireless Private Network Connections
- Entertainment and Media Technology Solutions Help You Deliver More Engaging Content
- Wireless Backup Solutions
- Are you living in a glass house?
- Utilities and Energy Management Technologies
- When it comes to CX, don’t get hung up on the jargon
- Tough Love and the Customer Experience Culture
- “Retail is Dead” — and Other Rumors with no Validity
- Are your vendors the weak link in your cybersecurity?
- Banks—It’s Time To Start Talking To Each Other, Say UK Police
- Cloud storming: You need more than an umbrella to stay secure
- M2M Transportation Solutions Brief
- Network Security Solutions
- Fact Sheet: Verizon Network Analytics
- Customer Experience and the Security Paradox
- Customer Experience Mystification
- Cybersecurity In 2017: It’s Not All Doom And Gloom
- Digital Convergence: The Perfect Storm
- Does connected working kill innovation?
- Don’t make a fish climb a tree: customer preferences matter.
- EESI as Pie: Essential Elements of a Successful Intrusion
- Federal Government Modernization: Priorities for the Federal IT Executive
- Five Ways Tech Can Supercharge Your CX Team
- Get a new perspective on cybersecurity
- Have Your Metrics Become Your Master?
- How to move from product first to customer first
- IoT: from theory to practice
- Is automation your golden ticket to great CX?
- To Sell Or To Serve?
- Just because you can, doesn’t mean you should
- Keep the "personal" in personalized customer experience
- Make the right cybersecurity investments
- The four pillars of digital transformation
- Stop feeding your customers air sandwiches
- Dedicated IP Internet Services
- Retail Industry Solutions
- Connected working: think outside the box
- Travel and Hospitality Industry Solutions
- Virtual Network Services
- M2M Solutions for Government Brief
- State of the Market: Internet of Things 2017
- Grid Intelligence Water Case Study
- Private IP: Get a network that grows with your business.
- United Security Services
- Business Connections- Business Communication Solutions
- Verizon Cypher Encryption Software
- Achieve Operational Transformation with Dynamic IT Services
- Verizon Collaboration Services: Erase Boundaries and Communicate with Ease
- Workplace Mobility Strategies
- Espionage Health Check
- E-Discovery Support
- Push to Talk Plus Phones & Technology
- Security Incident Response Analytics
- Visual Interactive Calling
- Fleet management service helps improve performance and cut costs
- A Foundation for Growth with Data Center Consolidation and More
- Assessing Intrusion Detection
- Digital Advisory Services - Software Defined Networking Strategic Assessment
- Network Threat Monitoring
- Virtual Network Services-Security
- Drive Business with Fleet Telematics Solutions
- Business Smartphones Jump-Start Productivity
- Mobile Device Management
- Fleet Management Solutions Factsheet
- A better way to get the latest CPE technology
- Rapid Response Services
- Verizon Rapid Delivery Platform
- Advanced Network Experts Retainer
- Cyber Risk Management Program
- Internet Dedicated Services
- Express Connect WAN Services
- MDM Software Management with OTA Distribution
- Managed Security Services
- Computer Emergency Response Team
- Network discovery service: Discover your network’s potential
- IP Contact Center
- Network Management Solutions Brief
- Mobile Technology for Retailers
- Threat Intel and Response Services
- Business VoIP & Business Phone System Solutions
- Security Health Checks
- Law Enforcement and Public Safety Solutions Brief
- M2M Finance Solutions Brief
- Choosing a Wireless Network Provider
- 4G LTE Enables Business
- Wireless ATMs & Kiosks Factsheet
- Simplify Your Grid Solution
- Take Control of Infrastructure Security with Intelligent Video Surveillance
- Smart Lighting Technology Brief
- Grow your business with leading-edge proof of concept testing
- Managed Security Services – Analytics
- ThingSpace IoT Management
- SD WAN Services
- DDoS Protection Service: DDoS Shield
- Smart Communities Solutions
- Enterprise Mobility Management Solution from MobileIron
- Custom Apps and eForms for Mobile Devices
- Making the Case for MPLS VPNs in the Modern Enterprise
- Diary of a cybercriminal
- HP Elite x2 Business PC on the Verizon 4G LTE Network
- Private Network Traffic Management
- Retail M2M solutions
- SD WAN Service with Application Aware Routing
- Virtual Network Services Solutions Brief
- The Verizon Fleet Management System
- Verizon Condition-Based Maintenance Solutions
- Private Network Traffic and Bandwidth Management
- Verizon ThingsSpace IoT Development Platform
- The Verizon Network-Backed Asset Tracking System
- The resonant theme of RSA 2016
- Optimize Fleet Operations With Verizon Autoshare
- Unified Communications and Collaboration as a Service Factsheet
- Networkfleet Fleet Management Case Study
- Leading the way for vision zero
- How SDN can help your business transform and grow
- Helping your workers get the most out of your new cloud based communications solution
- Implementing automation in your contact center read this first
- How to keep your business communications secure
- Five reasons why your business needs software-defined networking
- The Delicate Nature of Trust
- Will SDN replace MPLS? Not so fast.
- The future of connected vehicles hinges on today’s investments.
- Disclosing cyber risk? New SEC guidance requires it.
- Revolutionize your communications: Migrating to a cloud-based platform
- The role human touch plays in the digital customer experience.
- The importance of public-private partnerships to make smart cities a reality
- Staying Ahead of the Curve
- Why network visibility is important for your business
- Are You About to Sever the Final Thread Your Dissatisfied Customer Is Clinging To?
- How to break down the barriers to SDN adoption
- Keep an eye on these five KPIs as you drive improved customer experience using artificial intelligence
- The four key steps to improving customer experience with artificial intelligence
- Staying safe online: Observing good digital hygiene
- 2017 Data Breach Digest: Half Year Anniversary
- Six ways to strengthen network security and maintain a competitive edge
- Your Endpoint Security Strategy Needs a Hug
- 5G and autonomous vehicles: turning fiction into reality
- Making cities safer for everyone
- Be a better bot boss: 3 tips for CX chatbot success
- Virtual Reality / Augmented Reality: A humanizing revolution for customer engagement
- For insurers, failure is learning—and you need to learn fast.
- Network Orchestration Enhances Digital Transformation
- It’s real: Digital transformation is already delivering results
- The Humanability of Smart Cities
- How DevOps can turn IT into the leaders of your business
- Knowledge is power: How an intelligent knowledge base powers CX
- Light the way to futureproof your smart city investment
- Why DevOps is critical for improving the customer experience
- Operation "Surprise and Delight"
- Get the SD WAN facts before you buy
- Are you "over-sharing" your customer feedback data?
- Why risk scoring is critical for your business (and your career)
- Changing consumer demands are forcing entire business models to be rethought
- Cyber security posture FAQ: know your cyber risk
- Deception Technology: A strategic imperative for detection and response
- Voice Security Strategy Best Practices
- CX Improvement: The need to put consumer data protection and privacy first
- The Digital Transformation of the NFL Stadium and the 5G Fan Experience
- How to Improve Customer Experience
- Customer Personalization: The time is now for customized experiences
- Why Cyber Risk Visibility is the Key to Security
- 2019 LinkedIn Phishing Threat
- Minimize Your Attack Surface
- How Velocity Can Impact Cyber Security Strategy
- The top 10 criteria for selecting an SD WAN vendor
- How to implement SD WAN architecture the right way
- The Power of SD WAN and 5G
- Creating an Effective Cyber Security Incident Response Plan
- Embedded Universal Integrated Circuit Card
- Embedded Universal Integrated Circuit Card
- How digital transformation is impacting the utilities sector
- How to promote teamwork among remote employees
- Three keys to managing remote employees
- Business Impact of Coronavirus: Ready in the Face of Uncertainty
- Tips to promote connectivity in digital workplace
- Accelerate Your Digital Workplace with 5G Mobility
- How to Prevent Phishing & Malware Attacks
- Tips and strategies to improve virtual meeting performance
- PCI Compliance: What to Know About Digital Payment Security
- Getting Calls When Working Remotely
- Keep your business open when your location is closed
- How to improve the customer service experience in crisis situations
- Methods & Types of Business Communication Services that Businesses Rely On
- How to Work Remotely Using Collaboration Tools
- How Mobile Hotspots Can Help When Working Remotely
- Teamwork and Collaboration Best Practices
- Remote Work Security Policy & Best Practices
- Streamline CX with Better Tech Integration
- Creating a Personalized Customer Experience
- Does your school have these five critical security features?
- Does your school have these five critical security features?
- Telehealth Relief for COVID-19
- Transform Your Network with Edge Computing
- Five ways the cloud can help improve your school's security
- How to enhance distance learning and remote employee training sessions
- Nine scary security stats educators everywhere should know
- What is Zero Trust Architecture
- Remote Work Tips for the Public Sector
- Why 56 % of large business are turning to SDN for cybersecurity
- Five top mobile security threats
- Strategic Outsourcing
- Tips for Small Businesses in a Tough Economy
- The Future of Telehealth Starts Today
- Considering Remote IT Support Solutions
- Four tips to strengthen your digital marketing strategy
- User Experience Checklist
- BYOD Security for Remote Employees
- Building a 30/60/90 Day Business Plan
- Create an Acceptable Use Policy
- Strategize with Small Business Cyber Security Plan
- Small Business Cyber Security and Data Breaches
- Sample Article Title
- Five productivity tips for your newly remote team
- Corporate Network Enhancements
- In cybersecurity, integrity matters.
- three-next-gen-technologies-that-will-define-cybersecurity-in-the-next-decade
- Creating the New Normal for Your Small Business
- Connectivity best practices for distance learning
- Scalable Network Solutions During Critical Events
- Ways to Find New Customers Now
- How to Protect Data Security
- Small Business Innovation for Big Impact
- Finding Alternative Small Business Funding
- Tips to Transition to Working from Home
- Test
- Five best practices for choosing the right security provider
- Three next-gen technologies that will define cybersecurity in the next decade
- IoT security: Why you need to encrypt your data
- Analyzing the COVID-19 data breach landscape
- Design considerations for a 5G network architecture
- Five security blind spots you might not realize you have
- How to drive business agility with remote collaboration tools
- Mapping the 5G impact in the retail industry
- 5G and IoT: The future of efficiency
- The 5G evolution: Exploring the journey from 2G to 5G
- Funding Safe and Secure Elections During the COVID-19 Pandemic
- Low-latency 5G and the opportunities it can create
- Three 5G application scenarios and how they could change your workforce
- Optimizing business communications networks by combining SD WANs and MPLS
- A guide to unified communications solutions: beyond VoIP and video
- Improving customer experience with a contact center provider
- Strategies to Get 5G Ready
- The industries that will benefit from 5G
- Optimize fleet operations through smarter supply chain disaster management
- Six design principles to help mitigate latency
- Understanding the five C’s of Latency
- Where 5G and MEC work together
- Securing your 5G edge computing architecture for business success
- Unpacking the “5G” in Verizon’s 5G edge
- Cloud computing security: Is it safer than on-premises?
- Professional Services vs. Managed Services
- How AI improves the customer experience
- The human element in cyber security: When user error is the problem
- Security threats in e-commerce: Protecting data while maintaining customer experience
- How a power grid attack threatens the energy industry
- Mobile device security in the workplace: five policies you must have
- Cloud contact center technology: empowering your employees
- How IIoT in manufacturing is made possible with MEC and 5G
- How to cultivate customer relationships through social engagement
- Supply chain communication strategies for successful management
- What is edge computing and where is it being used?
- 5G and edge computing: configuring the edge topology
- Collaboration tools: focus on interoperability to avoid tool fatigue
- How intelligent routing can improve the contact center experience
- Securing the smart city of the future
- Building a successful digital transformation strategy
- Video conferencing network requirements: delivering the best user experience
- Solving common remote work endpoint security challenges
- Real-time crime centers and law enforcement technology
- 5G and IoT edge computing: driving future business value
- Smart cities and cyber security: protecting citizens from malicious attacks
- Mapping the digital customer experience for optimal growth
- 5G and AI: creating a connected global business
- The power of AI: artificial intelligence examples for a modern world
- Edge computing vs. cloud computing: What are the benefits in higher education?
- A guide to IT/OT convergence
- IoT in retail can help improve the customer experience
- The benefits of contact and call center speech analytics software
- New collaboration tools: rolling out an enterprise application
- How cloud contact center solutions help workforce productivity
- Diversify the contact center experience to better serve your customers
- Benefits of unified communications services and platforms
- IoT risk management in the mining industry
- How virtual hold technology can boost customer satisfaction
- How cloud-based call center solutions can boost customer satisfaction
- Effective communication strategies in business for 2021 and beyond
- Vehicle tracking solutions that can help protect drivers and customers
- IoT and healthcare: near real-time health monitoring on hospital floors
- How IoT and big data are transforming the construction industry
- Nation-state cyber attacks aren't like your average cyber adversary
- AI hacking: How IT security leaders can mitigate emerging cyber risks
- What is a zero-day attack? How to prepare and respond
- Social engineering attacks to watch out for
- Four enterprise communications trends for 2021 and beyond
- Edge computing examples: what is your edge?
- 5G and telemedicine: Hospitals should take an individualized approach
- Why deepfake video is a real threat to businesses
- Fostering smart construction site solutions with a temporary network
- Learning from cyber espionage attacks like Operation Soft Cell
- User behavior analytics and the technology you need to realize its value
- The next wave of telehealth services is coming, and 5G will power it
- Secure fleet vehicle management is increasingly critical
- Construction cyber security: protecting the worksite against threats
- Professional and Managed Services Vendor: 4 Factors to Consider
- Big data security and privacy concerns in healthcare
- Is a cloud-based phone system right for your business?
- AI-powered customer engagement: Is it worth the investment?
- How pairing UCaaS and CCaaS transforms the customer experience
- The future of education technology
- Improving patient experience through on-premises telemedicine
- Innovations in healthcare technology see boost from pandemic
- Methods of communication on a construction site for a staggered team
- Lessons from the RobbinHood ransomware attack on Baltimore
- 2021 Resolutions for CISO & Security Leaders
- Condition-based monitoring is crucial for preventative maintenance
- A customer engagement strategy for insurance includes virtual call centers
- Will hosted VoIP solve your mobile communications woes?
- Guest experience hospitality: how companies can deliver a best-in-class security and customer experience
- How to budget for cyber security costs—and why it's crucial
- Session hijacking attacks: understanding and preventing them
- Can the cloud be hacked?
- How a local government IT strategy can benefit from managed services
- Cloud contact center solutions empower exceptional customer experiences
- What is 5G Network Architecture?
- How Businesses Should Prepare for 5G
- How will 5G Affect Business?
- The Future of 5G: 5G-Powered Technologies
- What is 5G Beamforming?
- The digital transformation challenges confronting retailers in 2020
- Extending the lifespan of IoT sensors in industrial devices
- Finding the future of IoT in municipal government
- Enabling manufacturing automation and factory cost controls with IIoT
- From intelligent lighting to smart metering: how energy and utilities are transforming
- How to build a smart city from the ground up
- From intelligent lighting to smart metering: how energy and utilities are transforming
- Enabling manufacturing automation and factory cost controls with IIoT
- Finding the future of IoT in municipal government
- How to Build a Smart City from the Ground Up
- How to solve public sector technology and government IT challenges
- Extending the lifespan of IoT sensors in industrial devices
- The future of healthcare technology—faster access and better information through 5G
- Virtual contact centers for small businesses: how cloud-based options help
- 5G and connected cars: the next-generation automotive industry
- Learning from a backdoor attack: the takeaways of Operation ShadowHammer
- Cyber security threats to schools and how to protect against them
- Security vulnerability scanning on an ever-expanding attack surface
- Is your organization's incident response plan up to par?
- How camera hacking threatens remote workers—and their organizations
- How data encryption protects patients
- Exceed customer expectations with these five technologies
- How cloud security best practices keep hospitals healthy
- Social media phishing is on the rise
- Considerations for a new small business network
- A work-from-home security policy is essential for businesses
- Financial services cyber security and edge computing
- How user experience testing can detect customer experience friction in e-commerce
- How the media and entertainment industry is using mobile edge computing
- Disaster recovery after a hotel data breach
- Is AI the future of personalized healthcare?
- The benefits of network slicing: flexibility and more
- How 5G will impact the future of farming
- Cyber security posture FAQ: know your cyber risk
- How public safety systems support natural disaster recovery
- Preparing for disaster with storage virtualization
- Is augmented reality the future of CX?
- 5G vs. Wi-Fi 6: how do they compare?
- Interactive voice response (IVR) systems: three tests to pass
- Cyber security for smart energy and renewables
- Digital signage can help transform public transportation
- 10 Considerations for an ideal edge computing model
- Home
- Resources
- Articles
-
Better living through parking
- Why you need MPLS and SD WAN
- Intelligent Traffic Management and Intelligent Transportation System
- Verizon Network Analytics
- Intelligent Traffic Solutions Brief
- Cybersecurity Benchmarking: Do you out-secure the competition?
- Cybersecurity and 5G
- Small Business Webinar: Leading Through Uncertainty
- Navigating the CARES Act process
- How Tools That Leverage Blockchain Can Address Escalating Security Concerns
- Contact Center Workforce Management
- IT/OT Alignment on the Factory Floor: Tips for a Smooth Transition
- What is UCaaS and is it right for my organization?
- Zero trust security framework: benefits and downsides
- 5G network slicing: Do you have the team you need?
- How to Run a Public Meeting Online
- Why You Need Managed Detection And Response Services
- The golden age of voice communications
- Worried about fraudulent calls? Build a strong voice security strategy
- Why 56 % of large business are turning to SDN for cybersecurity
- What are successful CX leaders doing differently?
- Three ways technology can enhance your contact center performance
- Five CIO Strategies to Create a CX Roadmap
- Three reasons why the role of the CMO is now a technology job
- Retail Apocalypse? We don’t think so.
- Five technologies helping brand and CPG manufacturers survive disruption
- Digital transformation is everywhere. But did you forget to transform your security program?
- What is an ounce of cybersecurity prevention worth?
- Three Energy and Utility Trends to Watch in 2019
- Stop skimping. Cybersecurity breaches can severely hurt your bottom line.
- How 5G Impacts Your CX Strategy
- IoT Device Security: 6 Ways to Protect Against Often Overlooked Threats
- Why your digital transformation strategy requires a risk management plan
- Overcoming the challenges to digital transformation
- Three reasons why SD WAN is essential for cloud migration
- SD WAN vs. MPLS: Understanding the Difference
- Four ways AI can help build an omnichannel customer experience
- Though behind the scenes, cybersecurity is a star in the media and entertainment industries
- Why connectivity is key to digital transformation
- How Digital Transformation Impacts CX
- How technology is driving the transformation of content
- Security in the public cloud: Get peace of mind
- The Challenges and Benefits of Securing Hybrid Clouds
- Private cloud security: What’s the difference?
- When self-service is done right
- Impact of Communication in Cybersecurity
- Smart City 3.0
- FAQ: Measuring Your Security Posture: How Prepared Are You for Cyber Risks?
- Why rethinking your software culture can be a competitive advantage
- Six reasons you can’t afford to go cheap on network
- A thought experiment about shared credentials
- Acceptable use policies: Keeping your workplace secure
- Advanced threat detection – Adapting to change
- Anatomy of well-managed malware incident
- Briefing the board: Directing security evolvement
- Can you explain IoT without saying IoT?
- CIOs need to embrace digital customer experience (CX), otherwise CIO will stand for “Career Is Over”
- Creating the city of the future today
- CX Day 2017: Celebrating customer experience
- Data breaches: how long does the damage last?
- Darknet: The shady underbelly of the iceberg
- Data Breach Digest Update Data ransomware the Catch 22
- Delivering smart, sustainable energy solutions
- Data breaches in industrial environments: Safety comes first
- Error detecting data visualizations
- Help Me, Help You. Sincerely, Your Customer.
- Make sure the bad guys don’t get what they’re hoping for this Christmas
- Man vs machine, which delivers the best customer experience?
- My experience with the Kano Model
- Insider Threat: One pattern, four scenarios, thirteen countermeasures
- My superb Go-To-Gemba customer experience
- Powering the digital economy with modern utilities
- Preparing for GDPR? PCI DSS could help
- Smart cities are the wave of the future
- Smart traffic helps improve quality of life
- Social engineering: Strengthening the weakest link
- Where SMBs have the upper hand
- What to consider when planning your future digital network
- This framework ain't big enough for the both of us
- What does IoT really mean for the enterprise
- Verizons Data Breach Digest - Perspective is reality
- Retail’s Digital Roadmap
- Numbers Aren’t Enough: CX Professionals Need to Be Storytellers Too
- Mobile Customer Experience: Savvy shoppers Ready associates
- Incident Management Focus: Two Approaches to Incident Response Plans
- I Admit It: I’m Biased
- How to retain viewers with your online video services
- Virtual Network Security Services
- Announcing VERIS Community
- Are we reaching the limits of technology?
- Virtual Network Services- WAN Optimization
- Find the Right Construction Management Tools
- Usage-Based Car Insurance Solutions
- Enable Banking Virtually Anywhere with Wireless ATMS
- Verizon Intelligent Video and Smart Surveillance
- Ethernet Services & Ethernet Architecture Solutions
- VGo Mobile Telepresence Robot Case Study
- Fleet Maintenance and Performance Case Study
- Auto Dealer Solutions for Courtesy Cars Case Study
- Car Rental Solutions Streamline Rental Operations to Create New Business Models
- Smart Fleet Management Basics
- ICS Security Services
- Adaptive CX Means Liquid Personalization
- Verizon Wireless Private Network Connections
- Entertainment and Media Technology Solutions Help You Deliver More Engaging Content
- Wireless Backup Solutions
- Are you living in a glass house?
- Utilities and Energy Management Technologies
- When it comes to CX, don’t get hung up on the jargon
- Tough Love and the Customer Experience Culture
- “Retail is Dead” — and Other Rumors with no Validity
- Are your vendors the weak link in your cybersecurity?
- Banks—It’s Time To Start Talking To Each Other, Say UK Police
- Cloud storming: You need more than an umbrella to stay secure
- M2M Transportation Solutions Brief
- Network Security Solutions
- Fact Sheet: Verizon Network Analytics
- Customer Experience and the Security Paradox
- Customer Experience Mystification
- Cybersecurity In 2017: It’s Not All Doom And Gloom
- Digital Convergence: The Perfect Storm
- Does connected working kill innovation?
- Don’t make a fish climb a tree: customer preferences matter.
- EESI as Pie: Essential Elements of a Successful Intrusion
- Federal Government Modernization: Priorities for the Federal IT Executive
- Five Ways Tech Can Supercharge Your CX Team
- Get a new perspective on cybersecurity
- Have Your Metrics Become Your Master?
- How to move from product first to customer first
- IoT: from theory to practice
- Is automation your golden ticket to great CX?
- To Sell Or To Serve?
- Just because you can, doesn’t mean you should
- Keep the "personal" in personalized customer experience
- Make the right cybersecurity investments
- The four pillars of digital transformation
- Stop feeding your customers air sandwiches
- Dedicated IP Internet Services
- Retail Industry Solutions
- Connected working: think outside the box
- Travel and Hospitality Industry Solutions
- Virtual Network Services
- M2M Solutions for Government Brief
- State of the Market: Internet of Things 2017
- Grid Intelligence Water Case Study
- Private IP: Get a network that grows with your business.
- United Security Services
- Business Connections- Business Communication Solutions
- Verizon Cypher Encryption Software
- Achieve Operational Transformation with Dynamic IT Services
- Verizon Collaboration Services: Erase Boundaries and Communicate with Ease
- Workplace Mobility Strategies
- Espionage Health Check
- E-Discovery Support
- Push to Talk Plus Phones & Technology
- Security Incident Response Analytics
- Visual Interactive Calling
- Fleet management service helps improve performance and cut costs
- A Foundation for Growth with Data Center Consolidation and More
- Assessing Intrusion Detection
- Digital Advisory Services - Software Defined Networking Strategic Assessment
- Network Threat Monitoring
- Virtual Network Services-Security
- Drive Business with Fleet Telematics Solutions
- Business Smartphones Jump-Start Productivity
- Mobile Device Management
- Fleet Management Solutions Factsheet
- A better way to get the latest CPE technology
- Rapid Response Services
- Verizon Rapid Delivery Platform
- Advanced Network Experts Retainer
- Cyber Risk Management Program
- Internet Dedicated Services
- Express Connect WAN Services
- MDM Software Management with OTA Distribution
- Managed Security Services
- Computer Emergency Response Team
- Network discovery service: Discover your network’s potential
- IP Contact Center
- Network Management Solutions Brief
- Mobile Technology for Retailers
- Threat Intel and Response Services
- Business VoIP & Business Phone System Solutions
- Security Health Checks
- Law Enforcement and Public Safety Solutions Brief
- M2M Finance Solutions Brief
- Choosing a Wireless Network Provider
- 4G LTE Enables Business
- Wireless ATMs & Kiosks Factsheet
- Simplify Your Grid Solution
- Take Control of Infrastructure Security with Intelligent Video Surveillance
- Smart Lighting Technology Brief
- Grow your business with leading-edge proof of concept testing
- Managed Security Services – Analytics
- ThingSpace IoT Management
- SD WAN Services
- DDoS Protection Service: DDoS Shield
- Smart Communities Solutions
- Enterprise Mobility Management Solution from MobileIron
- Custom Apps and eForms for Mobile Devices
- Making the Case for MPLS VPNs in the Modern Enterprise
- Diary of a cybercriminal
- HP Elite x2 Business PC on the Verizon 4G LTE Network
- Private Network Traffic Management
- Retail M2M solutions
- SD WAN Service with Application Aware Routing
- Virtual Network Services Solutions Brief
- The Verizon Fleet Management System
- Verizon Condition-Based Maintenance Solutions
- Private Network Traffic and Bandwidth Management
- Verizon ThingsSpace IoT Development Platform
- The Verizon Network-Backed Asset Tracking System
- The resonant theme of RSA 2016
- Optimize Fleet Operations With Verizon Autoshare
- Unified Communications and Collaboration as a Service Factsheet
- Networkfleet Fleet Management Case Study
- Leading the way for vision zero
- How SDN can help your business transform and grow
- Helping your workers get the most out of your new cloud based communications solution
- Implementing automation in your contact center read this first
- How to keep your business communications secure
- Five reasons why your business needs software-defined networking
- The Delicate Nature of Trust
- Will SDN replace MPLS? Not so fast.
- The future of connected vehicles hinges on today’s investments.
- Disclosing cyber risk? New SEC guidance requires it.
- Revolutionize your communications: Migrating to a cloud-based platform
- The role human touch plays in the digital customer experience.
- The importance of public-private partnerships to make smart cities a reality
- Staying Ahead of the Curve
- Why network visibility is important for your business
- Are You About to Sever the Final Thread Your Dissatisfied Customer Is Clinging To?
- How to break down the barriers to SDN adoption
- Keep an eye on these five KPIs as you drive improved customer experience using artificial intelligence
- The four key steps to improving customer experience with artificial intelligence
- Staying safe online: Observing good digital hygiene
- 2017 Data Breach Digest: Half Year Anniversary
- Six ways to strengthen network security and maintain a competitive edge
- Your Endpoint Security Strategy Needs a Hug
- 5G and autonomous vehicles: turning fiction into reality
- Making cities safer for everyone
- Be a better bot boss: 3 tips for CX chatbot success
- Virtual Reality / Augmented Reality: A humanizing revolution for customer engagement
- For insurers, failure is learning—and you need to learn fast.
- Network Orchestration Enhances Digital Transformation
- It’s real: Digital transformation is already delivering results
- The Humanability of Smart Cities
- How DevOps can turn IT into the leaders of your business
- Knowledge is power: How an intelligent knowledge base powers CX
- Light the way to futureproof your smart city investment
- Why DevOps is critical for improving the customer experience
- Operation "Surprise and Delight"
- Get the SD WAN facts before you buy
- Are you "over-sharing" your customer feedback data?
- Why risk scoring is critical for your business (and your career)
- Changing consumer demands are forcing entire business models to be rethought
- Cyber security posture FAQ: know your cyber risk
- Deception Technology: A strategic imperative for detection and response
- Voice Security Strategy Best Practices
- CX Improvement: The need to put consumer data protection and privacy first
- The Digital Transformation of the NFL Stadium and the 5G Fan Experience
- How to Improve Customer Experience
- Customer Personalization: The time is now for customized experiences
- Why Cyber Risk Visibility is the Key to Security
- 2019 LinkedIn Phishing Threat
- Minimize Your Attack Surface
- How Velocity Can Impact Cyber Security Strategy
- The top 10 criteria for selecting an SD WAN vendor
- How to implement SD WAN architecture the right way
- The Power of SD WAN and 5G
- Creating an Effective Cyber Security Incident Response Plan
- Embedded Universal Integrated Circuit Card
- Embedded Universal Integrated Circuit Card
- How digital transformation is impacting the utilities sector
- How to promote teamwork among remote employees
- Three keys to managing remote employees
- Business Impact of Coronavirus: Ready in the Face of Uncertainty
- Tips to promote connectivity in digital workplace
- Accelerate Your Digital Workplace with 5G Mobility
- How to Prevent Phishing & Malware Attacks
- Tips and strategies to improve virtual meeting performance
- PCI Compliance: What to Know About Digital Payment Security
- Getting Calls When Working Remotely
- Keep your business open when your location is closed
- How to improve the customer service experience in crisis situations
- Methods & Types of Business Communication Services that Businesses Rely On
- How to Work Remotely Using Collaboration Tools
- How Mobile Hotspots Can Help When Working Remotely
- Teamwork and Collaboration Best Practices
- Remote Work Security Policy & Best Practices
- Streamline CX with Better Tech Integration
- Creating a Personalized Customer Experience
- Does your school have these five critical security features?
- Does your school have these five critical security features?
- Telehealth Relief for COVID-19
- Transform Your Network with Edge Computing
- Five ways the cloud can help improve your school's security
- How to enhance distance learning and remote employee training sessions
- Nine scary security stats educators everywhere should know
- What is Zero Trust Architecture
- Remote Work Tips for the Public Sector
- Why 56 % of large business are turning to SDN for cybersecurity
- Five top mobile security threats
- Strategic Outsourcing
- Tips for Small Businesses in a Tough Economy
- The Future of Telehealth Starts Today
- Considering Remote IT Support Solutions
- Four tips to strengthen your digital marketing strategy
- User Experience Checklist
- BYOD Security for Remote Employees
- Building a 30/60/90 Day Business Plan
- Create an Acceptable Use Policy
- Strategize with Small Business Cyber Security Plan
- Small Business Cyber Security and Data Breaches
- Sample Article Title
- Five productivity tips for your newly remote team
- Corporate Network Enhancements
- In cybersecurity, integrity matters.
- three-next-gen-technologies-that-will-define-cybersecurity-in-the-next-decade
- Creating the New Normal for Your Small Business
- Connectivity best practices for distance learning
- Scalable Network Solutions During Critical Events
- Ways to Find New Customers Now
- How to Protect Data Security
- Small Business Innovation for Big Impact
- Finding Alternative Small Business Funding
- Tips to Transition to Working from Home
- Test
- Five best practices for choosing the right security provider
- Three next-gen technologies that will define cybersecurity in the next decade
- IoT security: Why you need to encrypt your data
- Analyzing the COVID-19 data breach landscape
- Design considerations for a 5G network architecture
- Five security blind spots you might not realize you have
- How to drive business agility with remote collaboration tools
- Mapping the 5G impact in the retail industry
- 5G and IoT: The future of efficiency
- The 5G evolution: Exploring the journey from 2G to 5G
- Funding Safe and Secure Elections During the COVID-19 Pandemic
- Low-latency 5G and the opportunities it can create
- Three 5G application scenarios and how they could change your workforce
- Optimizing business communications networks by combining SD WANs and MPLS
- A guide to unified communications solutions: beyond VoIP and video
- Improving customer experience with a contact center provider
- Strategies to Get 5G Ready
- The industries that will benefit from 5G
- Optimize fleet operations through smarter supply chain disaster management
- Six design principles to help mitigate latency
- Understanding the five C’s of Latency
- Where 5G and MEC work together
- Securing your 5G edge computing architecture for business success
- Unpacking the “5G” in Verizon’s 5G edge
- Cloud computing security: Is it safer than on-premises?
- Professional Services vs. Managed Services
- How AI improves the customer experience
- The human element in cyber security: When user error is the problem
- Security threats in e-commerce: Protecting data while maintaining customer experience
- How a power grid attack threatens the energy industry
- Mobile device security in the workplace: five policies you must have
- Cloud contact center technology: empowering your employees
- How IIoT in manufacturing is made possible with MEC and 5G
- How to cultivate customer relationships through social engagement
- Supply chain communication strategies for successful management
- What is edge computing and where is it being used?
- 5G and edge computing: configuring the edge topology
- Collaboration tools: focus on interoperability to avoid tool fatigue
- How intelligent routing can improve the contact center experience
- Securing the smart city of the future
- Building a successful digital transformation strategy
- Video conferencing network requirements: delivering the best user experience
- Solving common remote work endpoint security challenges
- Real-time crime centers and law enforcement technology
- 5G and IoT edge computing: driving future business value
- Smart cities and cyber security: protecting citizens from malicious attacks
- Mapping the digital customer experience for optimal growth
- 5G and AI: creating a connected global business
- The power of AI: artificial intelligence examples for a modern world
- Edge computing vs. cloud computing: What are the benefits in higher education?
- A guide to IT/OT convergence
- IoT in retail can help improve the customer experience
- The benefits of contact and call center speech analytics software
- New collaboration tools: rolling out an enterprise application
- How cloud contact center solutions help workforce productivity
- Diversify the contact center experience to better serve your customers
- Benefits of unified communications services and platforms
- IoT risk management in the mining industry
- How virtual hold technology can boost customer satisfaction
- How cloud-based call center solutions can boost customer satisfaction
- Effective communication strategies in business for 2021 and beyond
- Vehicle tracking solutions that can help protect drivers and customers
- IoT and healthcare: near real-time health monitoring on hospital floors
- How IoT and big data are transforming the construction industry
- Nation-state cyber attacks aren't like your average cyber adversary
- AI hacking: How IT security leaders can mitigate emerging cyber risks
- What is a zero-day attack? How to prepare and respond
- Social engineering attacks to watch out for
- Four enterprise communications trends for 2021 and beyond
- Edge computing examples: what is your edge?
- 5G and telemedicine: Hospitals should take an individualized approach
- Why deepfake video is a real threat to businesses
- Fostering smart construction site solutions with a temporary network
- Learning from cyber espionage attacks like Operation Soft Cell
- User behavior analytics and the technology you need to realize its value
- The next wave of telehealth services is coming, and 5G will power it
- Secure fleet vehicle management is increasingly critical
- Construction cyber security: protecting the worksite against threats
- Professional and Managed Services Vendor: 4 Factors to Consider
- Big data security and privacy concerns in healthcare
- Is a cloud-based phone system right for your business?
- AI-powered customer engagement: Is it worth the investment?
- How pairing UCaaS and CCaaS transforms the customer experience
- The future of education technology
- Improving patient experience through on-premises telemedicine
- Innovations in healthcare technology see boost from pandemic
- Methods of communication on a construction site for a staggered team
- Lessons from the RobbinHood ransomware attack on Baltimore
- 2021 Resolutions for CISO & Security Leaders
- Condition-based monitoring is crucial for preventative maintenance
- A customer engagement strategy for insurance includes virtual call centers
- Will hosted VoIP solve your mobile communications woes?
- Guest experience hospitality: how companies can deliver a best-in-class security and customer experience
- How to budget for cyber security costs—and why it's crucial
- Session hijacking attacks: understanding and preventing them
- Can the cloud be hacked?
- How a local government IT strategy can benefit from managed services
- Cloud contact center solutions empower exceptional customer experiences
- What is 5G Network Architecture?
- How Businesses Should Prepare for 5G
- How will 5G Affect Business?
- The Future of 5G: 5G-Powered Technologies
- What is 5G Beamforming?
- The digital transformation challenges confronting retailers in 2020
- Extending the lifespan of IoT sensors in industrial devices
- Finding the future of IoT in municipal government
- Enabling manufacturing automation and factory cost controls with IIoT
- From intelligent lighting to smart metering: how energy and utilities are transforming
- How to build a smart city from the ground up
- From intelligent lighting to smart metering: how energy and utilities are transforming
- Enabling manufacturing automation and factory cost controls with IIoT
- Finding the future of IoT in municipal government
- How to Build a Smart City from the Ground Up
- How to solve public sector technology and government IT challenges
- Extending the lifespan of IoT sensors in industrial devices
- The future of healthcare technology—faster access and better information through 5G
- Virtual contact centers for small businesses: how cloud-based options help
- 5G and connected cars: the next-generation automotive industry
- Learning from a backdoor attack: the takeaways of Operation ShadowHammer
- Cyber security threats to schools and how to protect against them
- Security vulnerability scanning on an ever-expanding attack surface
- Is your organization's incident response plan up to par?
- How camera hacking threatens remote workers—and their organizations
- How data encryption protects patients
- Exceed customer expectations with these five technologies
- How cloud security best practices keep hospitals healthy
- Social media phishing is on the rise
- Considerations for a new small business network
- A work-from-home security policy is essential for businesses
- Financial services cyber security and edge computing
- How user experience testing can detect customer experience friction in e-commerce
- How the media and entertainment industry is using mobile edge computing
- Disaster recovery after a hotel data breach
- Is AI the future of personalized healthcare?
- The benefits of network slicing: flexibility and more
- How 5G will impact the future of farming
- Cyber security posture FAQ: know your cyber risk
- How public safety systems support natural disaster recovery
- Preparing for disaster with storage virtualization
- Is augmented reality the future of CX?
- 5G vs. Wi-Fi 6: how do they compare?
- Interactive voice response (IVR) systems: three tests to pass
- Cyber security for smart energy and renewables
- Digital signage can help transform public transportation
- 10 Considerations for an ideal edge computing model
-
Better living through parking
Let's connect.
Choose your country to view contact details.
- Argentina
- Australia
- Austria
- Belgium
- Brazil
- Canada
- Chile
- China
- Colombia
- Costa Rica
- Denmark
- Finland
- France
- Germany
- Hong Kong
- India
- Ireland
- Italy
- Japan
- Korea
- Luxembourg
- Mexico
- Netherlands
- New Zealand
- Norway
- Panama
- Portugal
- Singapore
- Spain
- Sweden
- Switzerland
- Taiwan
- United Kingdom
- United States
- Venezuela
Better living through parking
Published: Sep 20, 2018
Author: Jason Schulz
It’s the end of a long week. You and your better half are due for a much-needed date night. The kids are with the sitter, the car is washed, and the mood is set. Dressed to the nines, the two of you drive downtown where you’ve scored reservations at the hottest restaurant. You leave plenty early to account for the time it’ll take to find parking.
But apparently, not early enough. It took twice as long to find a spot, and half a mile away from the restaurant at that. You finally arrive, late, sweaty and frazzled. The hostess shakes her head as she motions to the wait-listed couple who took your table.
Does it really have to be like that?
The growing problem of scarce parking doesn’t just ruin your dinner plans (though that’s reason enough for a change). People cruising the streets for places to park add unnecessary traffic to the already congested roads; and combined with taxis and ride-sharing cars dropping off passengers and patrolling for fares, vehicle density in city centers is only getting worse.
With 88% of U.S. commuters using private vehicles, and millions on the roads at the same time of the day, streets don’t have the capacity to efficiently handle the demand for more space. And when 30% of traffic congestion in downtown areas are cars looking for parking, solving the “parking problem” will go a long way toward easing overall gridlock. Especially when much of this problem is a result of lack of information. Had you known there were a handful of available spots on a side street a mere block away from the restaurant, you wouldn’t have spent that extra twenty minutes searching in vain.
Knowing about available spots
Smarter technology can help. Parking solutions can detect when vehicles are entering or leaving spaces and combine pricing data from city-owned and private spaces, then share that information with drivers looking for available spaces to make navigation and parking decisions faster while easing traffic congestion.
Parking information can be integrated into existing applications, such as MapQuest, to steer drivers to open parking. Getting better information into the hands of drivers will help cities make the most of their highest-valued real estate – on-street parking spaces.
Benefits for cities and private parking owners
Cities and private parking owners can use parking analytics to create policies and rates, adapting them to changing conditions or shifts in demand. Parking analytics help managers better understand pricing and maximize revenue in different parts of the city. This can also be adjusted for special events or if new businesses move into a location.
Parking managers can use historical and current availability and events to help decide when to expand or contract available parking, to enforce violations, and optimize staffing and associated services.
A cloud-based solution can easily transmit that information to those who need it and can be continually upgraded and modified to adapt to changing needs.
The future of intelligent parking
The World Economic Forum estimates that 48% of parking spaces will change function once autonomous vehicles (AV) are widely in use. But in order to know how a parking space will change its function it’s important to know how it was being used in the first place—drop-offs, pickups, short-term parking, long term parking, etc.—data that an intelligent parking solution can accurately provide. For example, many parking operators are beginning to reimagine their spaces by becoming more of a transit hub that supplies locations for pickups and drop-offs (to accommodate AV) as well as parking.
It will take investments from cities, private parking lot operators and car makers to integrate parking and traffic information to ease congestion, optimize city resources and ease mobility. Yet the power of delivering real-time information creates significant benefits for everyone, and especially you…
Fast-forward to a smarter day…
It’s taken six months to get another reservation at your extravagant restaurant, but this time the city has helped you prepare. Your car app shows you an accurate map where you see the location of seven open spots a mere block away. You arrive in style with time to spare. As you and your better half toast a drink at the bar, you serendipitously meet the celebrity chef, who treats you to his latest kitchen masterpiece.
Life is good with better parking.
Click here for more information on parking optimization.
Jason Schulz works in Verizon’s Smart Communities organization as a Product Manager overseeing the Parking solution.
Let's connect.
Choose your country to view contact details.
- Argentina
- Australia
- Austria
- Belgium
- Brazil
- Canada
- Chile
- China
- Colombia
- Costa Rica
- Denmark
- Finland
- France
- Germany
- Hong Kong
- India
- Ireland
- Italy
- Japan
- Korea
- Luxembourg
- Mexico
- Netherlands
- New Zealand
- Norway
- Panama
- Portugal
- Singapore
- Spain
- Sweden
- Switzerland
- Taiwan
- United Kingdom
- United States
- Venezuela