Display search results for ** instead (391 products)
21 Dec 2015  |  Global
Moving towards an era of low carbon transportation
The research service delves into various technologies that are necessary to produce low emission vehicles (LEVs). Low emission vehicles are vehicles that emit at least 40% less emissions than a similar model vehicle. In general, this research service focuses on electric, hybrid, and fuel cell vehicles. Each type of vehicle and the technologies empo...
18 Dec 2015  |  Global
Trade, Technology, and Transparency to Shape the Workplace in 2025
The Global Future of Work—The Future Place and Structure of Work applies a multi-faceted approach to answering the question: where will work take place in 2025? Topics include international trends, such as mega-regional trade deals and right-shoring considerations; workplace design and format trends, such as smart offices and innovative retail sp...
18 Dec 2015  |  Asia Pacific
Benchmarking the Industry Excellence in Delivering Superior Customer Experience
In this Customer Experience Management study for Australia's residential electricity sector, Frost & Sullivan explores the relationship of the experiences provided by residential electricity companies for its customers. There is a discussion of the critical factors that influence customer behaviour throughout the three phases (pre-purchase, purchas...
USD 3,675.00 save 25 %
16 Dec 2015  |  North America
Although IoT is still coming into focus for many, it already connects more than nine billion devices worldwide; over the next five years, that number is expected to grow to between 20 billion and 50 billion devices. In 2025, IoT is expected to create between $4 trillion to $11 trillion in economic benefits globally. IoT is a logistical and economic...
03 Dec 2015  |  North America
This report will be useful to providers of infrastructure services, platforms, and equipment, which are interested in tracking how their customers use their infrastructure products. It will also be useful to software providers that are interested in tracking the evolution of software consumption models.
02 Dec 2015  |  North America
This paper explores the current capabilities of the 4G network infrastructure in the United States, looks at future developments, and explores the desirability of continuing to build telecommunication public policy on the proposition that there is a divide between the Internet haves and have-nots that needs to be bridged though governmental action....
26 Nov 2015  |  North America
By 2022, Fixed Geometry to Represent 2 out of 3 Installations
The global medium- and heavy-duty (MD-HD) truck market is evolving rapidly as a result of dynamic product changes as a result of emission standards, shifting the onus to research and development in the powertrain space. Turbocharging technologies will play an increasing role in powertrain strategies as power density and fuel efficiency challenges b...
25 Nov 2015  |  Global
Connected Safety and Mobility Applications are the Real Innovations from IOT in Cars
This study investigates the applications that the Internet of Cars (IOC) holds for key participants namely government, end consumers, original end manufacturers, and dealers. It explains how connected cars impact convenience, safety and security of cars. The study also explains the technology infrastructure required for implementing connected cars ...
23 Nov 2015  |  North America
Most OEMs Expected to Produce a Model with at Least 500 Pounds of Aluminum by 2025
This study presents the current trends in aluminum usage in cars and light trucks. It analyzes automotive manufacturer and supplier strategies and provides an overview of aluminum usage patterns in vehicle systems. It offers insights on aluminum usage by original equipment manufacturer (OEM) brand, vehicle segment, and key vehicle models, and ident...
20 Nov 2015  |  North America
How Much Forensics Do You Need?
When a security breach occurs, an investigation needs to be initiated. Network security forensics is the technology used not only to understand the nature of the breach, but also to trigger the beginning of remediation. Traditional network security platforms include event correlation and full packet capture. However, different security approaches i...