[信息传输、软件和信息技术服务业,交通运输、仓储和邮政业] [2020-09-29]
Supply chain management software provides a real-time analytical platform, which manages the flow of product and information across the supply chain network. This software is designed to enhance and strengthen the supply chain operations in an organization by managing production, inventory, sourcing, transportation, and supervising the product demand. In addition, it provides better visibility to organizations with a cross-functional access, and offers exception-based process management platforms, which enable staff to micro-manage steady-state processes. This software can be customized on the basis of enterprise requirements. Its subcategories include supply chain planning, transportation management system (TMS), warehouse management system (WMS), manufacturing execution system, and others. The report features the information on supply chain management software and services offered by key vendors. Furthermore, it highlights the strategies of the key market players to improve the market share and sustain competition.
[信息传输、软件和信息技术服务业] [2020-09-29]
Virtual training is a training method in which a simulated virtual environment is created to test certain abilities of a trainee that can contribute to the learning process. It is widely applicable in-flight simulation, simulationbased gaming, serious games, healthcare training, energy, transportation training, e-learning, military & navy, digital manufacturing, and others. The significant impacting factors include increase in awareness about virtual training and simulation, costeffective benefits of virtual training and simulation technology, and rise in defense, healthcare, and education expenditure. In few regions such as Africa, people are willing to adopt the technology, but lack of infrastructure and availability of solutions resist them to do so. This negatively impacts the market. Moreover, absence of novelty in products may lead to loss of interest of consumers in outdated technology and would stick to the existing one, rather than buying another one. Thus, lack of investments in R&D is projected to impact negatively on the virtual training and simulation market. Advancements in virtual training and simulation technology positively affects the market growth and is expected to continue this in the near future.
[信息传输、软件和信息技术服务业] [2020-09-28]
[专用设备制造业,计算机、通信和其他电子设备制造业,仪器仪表制造业,信息传输、软件和信息技术服务业] [2020-09-28]
Radar is an electronic system, which measures the range and behavior of objects by transmitting an electromagnetic pulse at the object. High-power radar using large dish antennas has been used to measure distances to the moon and other planets, asteroids, and artificial satellites. In addition, radar systems are widely used in air traffic control, aircraft navigation, and marine navigation. For the purpose of analysis, the global radar market is segmented into product type, platform, application, end user, and region. By product type, the market is fragmented into continuous wave radar, pulse radar, and others. On the basis of platform, it is classified into marine, air, ground, and space. The applications covered in the study include air traffic control, remote sensing, ground traffic control, and space navigation & control. Depending on end user, the market is differentiated into automotive, aviation, industrial, weather monitoring, military & defense, and others.
[信息传输、软件和信息技术服务业] [2020-09-28]
The key objective of open source intelligence tool is to clean, rearrange, and enhance the available raw data into the desired format to enable informed & better decision-making in less time. In addition, open source intelligence has transformed the process, changing tedious and time-consuming attempts to master various data sources. Numerous advantages provided by open source intelligence include structuring of huge amount of data and to easily process large volume of data. Moreover, the report features information on open source intelligence tools and services offered by key vendors. Furthermore, it highlights the strategies adopted by the key market players to improve the market share and sustain competition. For instance, in Feb 2020, Recorded Future, Inc. introduced new security operation and response module, which will enable collaboration across security functions while providing a single authoritative source for all intelligence needs. The key players profiled in the open source intelligence market include Alfresco Software Inc., Digital Clues, Expert Systems S.p.A, Google LLC, Maltego Technologies GmbH, OffSec Service Limited, Octogence Technologies Pvt. Ltd., Palantir Technologies Inc., Recorded Future, Inc., and Thales Group.
[信息传输、软件和信息技术服务业] [2020-09-28]
[信息传输、软件和信息技术服务业,金融业,租赁和商务服务业] [2020-09-28]
Management decision is the process of improving decision making by using all available information to increase precision, consistency, and agility of decisions and making good choices taking known risks and time constraints into consideration. It is a process, or a set of processes used to improve and streamline action items. It makes use of different tools such as business rules, business intelligence, continuous improvement, artificial intelligence, and predictive analytics. It treats decisions as reusable assets and introduces technology at decision point to automate decision-making process. This decision may be fully automated or presented as possible choices for a human to select. Management decision software is designed specifically for business managers to provide them better control over the organization’s decision strategies. By using this software, enterprises can authorize, control, and automate decisions to enhance value, maintain consistency in customer communications, and ensure compliance with regulations. The report features the information on management decision software and services offered by key vendors. Furthermore, it highlights the strategies of the key market players to improve the market share and sustain competition.
[租赁和商务服务业,信息传输、软件和信息技术服务业] [2020-09-28]
Infrastructure as a service is a cloud computing service where enterprises lease servers for compute and storage in the cloud. These online services offer high-level APIs used to dereference different low-level details of underlying network infrastructure such as physical computing resources, data partitioning, scaling, location, security, backup and others. With IaaS users can run any operating system or applications on the leased servers without the operating & maintenance costs of these servers. The report focuses on the growth prospects, restraints, and market analysis. The study provides Porter’s five forces analysis of the industry to understand the impact of various factors such as bargaining power of suppliers, competitive intensity of competitors, threat of new entrants, threat of substitutes, and bargaining power of buyers on the market. In addition, the report analyzes the profiles of key players operating in the market, which include Amazon Web Services, Inc., Microsoft Corporation, IBM Corporation, Redcentric PLC., Google, Inc., VMware, Inc., Oracle Corporation, EMC Corporation, Rackspace Hosting, Inc., and Red Hat, Inc.
[计算机、通信和其他电子设备制造业,信息传输、软件和信息技术服务业] [2020-09-27]
Adoption of in-memory computing, also known as IMC, is on the rise. This can be attributed to the growing demand for faster processing and analytics on big data, the need for simplifying architecture as the number of various data sources increases, and technology enhancements that are optimizing their Total Cost of Ownership. In-memory computing, fundamentally comprises of RAM storage and parallel distributed processing. The adoption, however, is dependent on how businesses understand the value it can add, such as, Usage of less hardware to support the required performance, to reduce the upfront capital costs and Lifetime extension for the hardware and software via increased performance. Further, the demand to process huge and growing datasets in real-time are acting as catalyst towards the in-memory computing middleware adoption. Over the past several years, companies across a broad range of industries have been observed commencing adoption of in-memory computing platforms to achieve the application performance and scalability they need to achieve their digital transformation or omnichannel customer experience. Some of the use cases are in banking and financial services, retail, healthcare, to name a few. For instance, the BFSI sector deploys the in-memory computing to facilitate smooth investment banking transactions, insurance claim processing & modelling, among others. Risk and Asset Management firms used the technology to gain an understanding on range and probabilities of probable investment outcomes through complex simulations.
[信息传输、软件和信息技术服务业,计算机、通信和其他电子设备制造业] [2020-09-27]
The number of PCs, laptops, smartphones, tablets, and point-of-sale terminals has witnessed tremendous growth with the rise in population and the increased digitalization in industrial processes. This increase in different smart devices is generating several endpoints in networks, all over the world. Hence, there is a rising need for security, owing to the increased number of endpoint devices. Multiple types of endpoint security mediums have been recognized, such as firewalls or antiviruses. These mediums monitor the data and update the same in the server, which has become a requisite for the current technology-based industry. The increased internet accessibility, machine-to-machine communication, and growth in automation are all driving the market. With the increased employment in the software industry, employees are using different PCs and mobiles in offices, and companies are running servers on a variety of operating systems, which can lead to cyberthreats at any instance. Endpoint security suites are being used to maintain security and control, supporting the endpoint flexibility. Endpoint security vendors are offering cloud-based options to customers, for their endpoint security deployments. With the rising adoption of cloud-based solutions, for many applications, like email, there is an increase in the adoption of cloud-based security as well. Endpoint security systems help companies attain enhanced endpoint visibility and detect hidden endpoint exploit processes. With the increasing number of mobiles and other touch devices, such as tablets and POS, endpoint security companies are designing software with higher management flexibility, giving the users several choices for protection. The endpoint security market was saturated and commoditized. However, it has witnessed renewed growth, as many companies are evaluating their vendor relationships and trying to invest in efficient and higher functionality endpoint security solutions.