ports

Results 651 - 675 of 682Sort Results By: Published Date | Title | Company Name
Published By: eDataSource     Published Date: Jun 15, 2015
Deliverability is the crucible of email marketing. Nothing good can happen when your email doesn’t even get to your customer’s inbox. eDataSource tracks and reports on deliverability with its Inbox metric, which nets out spam events against mailing quantity. eDataSource sees the full range of Inbox Placement performance, based on our visibility into the email activity of 53,000 brands and their customers engagement with those emails. Email marketers who’ve achieved Inbox Placement rates of at least 95% are thought to be doing pretty well. Still, we often see Inbox Placement rates in the 80s for overall brands, and in the 20s, or even less, for certain individual campaigns.
Tags : 
email marketing, emerging marketing, internet marketing
    
eDataSource
Published By: Oracle     Published Date: Jun 20, 2016
To maintain status in this fast-changing retail environment, stores will need to do more than provide the instant gratification of connecting consumers with products. Learn how global specialty brand Swarovski and leading national sports apparel brand Lids Sports Group, are delivering inspired experiences with Oracle Retail Xstore and reaping big returns.
Tags : 
retail, convergence, content management, best practices
    
Oracle
Published By: Venafi     Published Date: Mar 04, 2015
This technical case study addressing key and certificate security issues is designed for security conscious enterprises to understand real-life attack scenarios that threaten their businesses in today’s world. This white paper demonstrates a recent attack that used cryptographic keys and digital certificates as well as guidance on how to protect certificates and keys and quickly discover and remediate breaches. This paper should be read by more technical IT security staff who are interested in detailed attack methods and remediation tactics. The executive summary is intented for IT Security leaders (CISOs and their direct reports) and addresses the proof-of-concept attack impacts on the business. The attack scenario described in this technical white paper is based on a reproduction of a real-world attack in a Raxis test environment that simulated an enterprise security infrastructure.
Tags : 
venafi, ssh keys, vpn credentials, digital certificates
    
Venafi
Published By: SAP     Published Date: Apr 24, 2015
Watch this case study to see how Adidas is going from sports to fashion and uses SAP's Fashion Management Solution to manage their business, end to end.
Tags : 
fashion management solution, sportswear, athletic clothing, sap, end to end
    
SAP
Published By: Polycom     Published Date: Feb 16, 2017
"When you’re evaluating video conferencing vendors, the IDC industry analyst reports provide key insight to help you determine which provider is right for your organization. In 2016, Polycom was named a leader in the IDC MarketScape: Worldwide Enterprise Videoconferencing Equipment 2016 Vendor Assessment. Download the reports to: Understand what is happening in the video conferencing market Learn what you should look for in a video conferencing vendor, and the current abilities of each player in the market See why IDC name Polycom a leader Discover when you should consider Polycom’s video portfolio."
Tags : 
polycom, business technology, idc marketplace, enterprise video conferencing
    
Polycom
Published By: Dell EMC     Published Date: Nov 04, 2016
With the 'EMC Mission Control' center in Portsmouth, UK and a second at the America’s Cup venue in Bermuda, plus a mobile center travelling worldwide to the preliminary events, Land Rover BAR will have all its data continuously replicated. The team in Portsmouth can analyze race and testing data immediately, as well as identify and make improvements right up to and through the finals in June 2017. This allows the design team and the crew to adapt much faster. With the introduction of the VCE VxRail Appliance powered by Intel® Xeon® processors, Land Rover BAR will be able to flexibly and rapidly scale, irrespective of location, ensuring a seamless experience for the team. To learn more about the impact of the Dell EMC VCE VxRail Appliance, read this brief infographic.
Tags : 
it infrastructure, hyper-convergence, architecture, sql, microsoft exchange
    
Dell EMC
Published By: Uberflip     Published Date: Jun 30, 2017
In this eBook, you will learn how implementing the right processes and tools to gather analytics, implement scoring, prove ROI, and create comprehensive reports on your content marketing efforts will provide the insight you need to make data-driven decisions. In turn, these decisions won’t just improve your content marketing performance, but will also allow you to meet your overarching business objectives.
Tags : 
    
Uberflip
Published By: Samsung     Published Date: Feb 02, 2016
With increases in digital viewership, arenas have had to make fundamental changes to fill stadium seats. One of these is the use of digital signage for live sports.
Tags : 
samsung, digital, display, sports venues
    
Samsung
Published By: Microsoft Office 365     Published Date: Nov 15, 2016
Download the free A to Z eBook to learn more about data security, employee productivity, IT Support and cost. Also, see how the competition measures up against Office 365. Here are a few must-knows when it comes to Office 365: Data compliance out of the box. Built-in security and privacy features; meets key industry standards and supports FERPA, HIPPAA and EU. Online or offline across all devices. Whether you are in the office or on the go, Office applications let you create, edit and share from your PC/MAC or your iOS, Android™ or Windows device with anyone in real time. Work off a single platform and eliminate third-party apps. With our suite of apps, such as Enterprise Content Management, Cloud PBX, and Microsoft MyAnalytics, you can trust that a single vendor is providing you the tools you need to get work done.
Tags : 
    
Microsoft Office 365
Published By: AWS     Published Date: May 18, 2018
We’ve become a world of instant information. We carry mobile devices that answer questions in seconds and we track our morning runs from screens on our wrists. News spreads immediately across our social feeds, and traffic alerts direct us away from road closures. As consumers, we have come to expect answers now, in real time. Until recently, businesses that were seeking information about their customers, products, or applications, in real time, were challenged to do so. Streaming data, such as website clickstreams, application logs, and IoT device telemetry, could be ingested but not analyzed in real time for any kind of immediate action. For years, analytics were understood to be a snapshot of the past, but never a window into the present. Reports could show us yesterday’s sales figures, but not what customers are buying right now. Then, along came the cloud. With the emergence of cloud computing, and new technologies leveraging its inherent scalability and agility, streaming data
Tags : 
    
AWS
Published By: AWS     Published Date: Oct 01, 2019
As organizations choose to leverage Kubernetes on-premises and in the cloud, the complexity of management is a growing challenge, due to the lack of consistency and different tools needed across hybrid deployments. With the Cisco Hybrid Solution for Kubernetes on AWS, you can easily set up and manage your on-premises and Amazon Elastic Kubernetes Service (Amazon EKS) clusters with one solution. Download the eBook to learn how this comprehensive offering can help you quickly deploy Kubernetes clusters with consistency and supports the full lifecycle of containerized and non-containerized apps.
Tags : 
    
AWS
Published By: Juniper Networks     Published Date: Aug 03, 2017
Agility creates more opportunities for new business and stronger bottom lines. Research from more than a half-dozen experts supports it all. What makes Uber’s and Airbnb’s network infrastructures unique The top factor shaping network strategies today Research from industry experts including Gartner and McKinsey
Tags : 
business agility, data usage, network infrastructure, information technology
    
Juniper Networks
Published By: Citrix ShareFile     Published Date: Oct 04, 2019
Your small business is primed for a growing future—but with every new employee and client, you have more files to store and manage. Without a strong file sharing solution, it’s tough for your IT team to manage secure, anywhere access to key files for all your users. The solution is to adopt an enterprise-grade file sharing platform that grows with you. In this e-book, you’ll learn how enterprise-grade file sharing supports your growth with: • More efficient collaboration processes • Streamlined security and compliance • Unified access to files across locations and devices
Tags : 
    
Citrix ShareFile
Published By: IBM     Published Date: Mar 30, 2017
To meet the business imperative for enterprise integration and stay competitive, companies must manage the increasing variety, volume and velocity of new data pouring into their systems from an ever-expanding number of sources. They need to bring all their corporate data together, deliver it to end users as quickly as possible to maximize its value, and integrate it at a more granular level than ever before—focusing on the individual transaction level, rather than on general summary data. As data volumes continue to explode, clients must take advantage of a fully scalable information integration architecture that supports any type of data integration technique such as extract, transfer and load (ETL), data replication or data virtualization.
Tags : 
data integration, data security, data optimization, data virtualization, database security
    
IBM
Published By: IBM     Published Date: May 16, 2017
Technology has always enabled companies to reinvent how they engage with customers. But now we are seeing a profound shift – the convergence of physical and digital customer interactions – which is fundamentally changing how customers will interact and transact with brands and businesses everywhere. To better understand these dynamics, the IBV is conducting a Customer Experience (CX) study, published as a series, with multiple reports organized by topic.
Tags : 
customer experience, digital perforamnce, it performance, digital experience, digital experience monitoring
    
IBM
Published By: IBM     Published Date: Oct 16, 2017
This white paper examines how some of the ways organizations use big data make their infrastructures vulnerable to attack. It presents recommended best practices organizations can adopt to help make their infrastructures and operations more secure. And it discusses how adding advanced security software solutions from IBM to their big-data environment can fill gaps that big-data platforms by themselves do not address. It describes how IBM® Security Guardium®, an end-to- end solution for regulatory compliance and comprehensive data security, supports entitlement reporting; user-access and activity monitoring; advanced risk analytics and real-time threat detection analytics; alerting, blocking, encryption and other data protection capabilities, as well as automated compliance workflows and reporting capabilities, to stop threats.
Tags : 
security, big data, ibm, data protection
    
IBM
Published By: Cox Business     Published Date: Dec 19, 2016
Reliable and secure network connectivity is no longer optional. It supports critical priorities for healthcare providers, including enhancing patient care outcomes, improving operational efficiency and boosting financial returns. If a healthcare provider’s network infrastructure is not resilient, reliable and secure, the provider will not be able to reap the benefits of its healthcare IT investments.
Tags : 
    
Cox Business
Published By: Cox Business     Published Date: Dec 19, 2016
Exposing data or suffering downtime not only creates risks to patient safety, supports identity theft and damages the hospital's reputation, but can also result in signi?cant HIPAA penalties. The costs include the time your staff spends responding to the attack and lost productivity when systems are unavailable or work needs to be redone. Investing in computer and network security is a smart ?nancial decision for hospitals.
Tags : 
    
Cox Business
Published By: Lookout     Published Date: Mar 28, 2017
In the past year, Gartner has provided guidance on the differences between Enterprise Mobility Management (EMM) and mobile security solutions. The excerpts below highlight some key takeaways from recent Gartner research, and Lookout encourages organizations to read the full reports to learn more.
Tags : 
insights, mobile, emm, security, lookout
    
Lookout
Published By: Progress     Published Date: Jan 06, 2017
Digitalization brings both new opportunities and confusion to even the most carefully planned selection processes for WCM. CIOs and IT leaders aiming to boost the effectiveness of their digital business strategy should use this document to help them select the most appropriate vendor and solution. Gartner Magic Quadrant reports are the standard of excellence for vendor evaluation, research and reporting. While many vendors are evaluated, only a select few meet the stringent criteria for inclusion. Continuing its long-standing tradition, Gartner has released the 2016 Magic Quadrant for Web Content Management (WCM). Progress is recognized as a “Challenger” in this year's report, based on a combination of completeness of vision and ability to execute. This is the third consecutive inclusion for the company's award-winning web content management and digital experience solutions. Web content management is an integral piece to any successful digital transformation strategy. In our minds t
Tags : 
    
Progress
Published By: Datastax     Published Date: Aug 15, 2018
Built on a production-certified version of Apache Spark™ and with integrated search and graph capabilities, DSE Analytics provides highly available, production-ready analytics that enables enterprises to securely build instantly responsive, contextual, always-on applications and generate ad-hoc reports. Read this white paper to learn about the specific features and capabilities of DSE Analytics, and why DSE Analytics is designed for the Right-Now Enterprise.
Tags : 
    
Datastax
Published By: Mitto     Published Date: Jun 06, 2017
APQC reports that 30% of CFOs that are unhappy with their current planning solution.1 Most FP&A professionals want a planning and forecast process that is fast and repeatable. They want the financial data to be accurate and transparent to the deepest levels. They need planning tools that provide structure to streamline the process and flexibility to accommodate changes in the business. And they require analysis and reporting that bring visibility to the state of the business and lead to actionable insights. This paper details five best practices that Finance teams can follow to improve their planning and forecasting and influence the strategy of an organization.
Tags : 
veritas, backup, recovery, netbackup
    
Mitto
Published By: Google     Published Date: Dec 03, 2018
The Internet of Things is growing fast: By 2025, IoT devices will transmit an estimated 90 zettabytes of data to their intended targets, according to IDC. Armed with information, businesses can revolutionise everything from fraud detection to customer service. But first, they need an architecture that supports real-time analytics so they can gain actionable insights from their IoT data. Read the complete report sponsored by Google Cloud, and learn how to mitigate key IoT-related challenges.
Tags : 
    
Google
Published By: Group M_IBM Q1'18     Published Date: Jan 04, 2018
IBM® InfoSphere® Big Match for Hadoop helps you analyze massive volumes of structured and unstructured customer data to gain deeper customer insights. It can enable fast, efficient linking of data from multiple sources to provide complete and accurate customer information—without the risks of moving data from source to source. The solution supports platforms running Apache Hadoop such as IBM Open Platform, IBM BigInsights, Hortonworks and Cloudera.
Tags : 
hadoop, infosphere, data, customer insights
    
Group M_IBM Q1'18
Published By: Tenable     Published Date: Feb 05, 2018
Ready, set, collaborate, automate – a mindset change for strengthening security. Industry research suggests there is significant interest in making DevOps more secure. In fact, Gartner reports "by 2021, DevSecOps practices will be embedded in 80% of rapid development teams, up from 15% in 2017." To help you effectively integrate security into your organization’s DevOps practice, Tenable encourages you to read the Gartner report, “10 Things to Get Right for Successful DevSecOps.” Loaded with specific detailed recommendations, the report covers topics including: - Integrating security and compliance testing seamlessly into DevOps processes - Scanning for known vulnerabilities and miscongurations in all open-source and third-party components - Scaling infosec into DevOps by using a security champion model
Tags : 
secure devops, gartner, analyst report, container security
    
Tenable
Start   Previous    14 15 16 17 18 19 20 21 22 23 24 25 26 27 28    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.


Featured FREE Resource: