profile

Results 26 - 50 of 303Sort Results By: Published Date | Title | Company Name
Published By: Dell EMC     Published Date: Aug 06, 2018
Technology is transforming how we do our jobs, and employees expect the business to accommodate their work habits. › Companies must identify roles and profiles and support their needs. Not every employee will require the same devices to get their jobs done efficiently and effectively. It is paramount for organizations to seek out specific devices to enable different worker personas. › IT must become a trusted partner to keep security top of mind. Employees showed a lack of trust toward IT when facing an issue with their device or ecosystem. It is imperative for IT to become part of the solution and not the problem; otherwise, workers will find ways to go around security policies and fix problems on their own, putting the firm at even more risk. › Employees require a more complete ecosystem. Employees need not only devices to get their jobs done effectively but an entire ecosystem as well. Without this, businesses will fall further behind in a fiercely competitive market and lose employ
Tags : 
    
Dell EMC
Published By: HERE Technologies     Published Date: Jan 08, 2019
Every day we use location apps on smartphone devices to get us where we need to go, and to find services and products we’re looking for. However, smartphone location apps aren’t just helping individuals navigate their way around. Forward-thinking businesses are using these apps to help them get their messages straight to the right audience, at the right time, too. It’s why the connected car and in-map location marketing is a growing area of opportunity—helping companies to meet KPIs whilst transforming the landscape of marketing at the same time. This on-demand webinar with experts from HERE and eMarketer discusses how to improve location-based audience segmentation and build a more accurate consumer profiles, as well as how real-time location targeting enables hyper-targeted marketing campaigns.
Tags : 
location data, ad tech, location targeting
    
HERE Technologies
Published By: Polycom     Published Date: Sep 04, 2012
Polycom's introduction of H.264 High Profile allows CIOs to meet budget challenges and power more visual communication with fewer resources, thus limiting or avoiding costly network upgrades.
Tags : 
h.264 high profile, polycom, real-time video, visual communication, video deployment, video conferencing
    
Polycom
Published By: Infor     Published Date: Jan 03, 2011
For CDS Global, Infor CRM Epiphany Interactive Advisor is being used to create real-time customer profiles based on historical, personal, and contextual data. Using a combination of real-time analytics and business rules, the data is analyzed to identify the highest-impact offers in real time so that the CSR can make an attractive offer during the call.
Tags : 
infor, cds global, interaction advisor, real-time customer profile, analytics and business rules, crm solution, customer relationship management
    
Infor
Published By: Infor     Published Date: Jan 06, 2011
For CDS Global, Infor CRM Epiphany Interactive Advisor is being used to create real-time customer profiles based on historical, personal, and contextual data. Using a combination of real-time analytics and business rules, the data is analyzed to identify the highest-impact offers in real time so that the CSR can make an attractive offer during the call.
Tags : 
infor, cds global, interaction advisor, real-time customer profile, analytics and business rules, crm solution, customer relationship management
    
Infor
Published By: Red Hat     Published Date: Jan 01, 2013
IDC profiles a range of customers successfully employing Red Hat Enterprise Linux for a full spectrum of workload types, including high-end applications previously hosted on non-x86 servers.
Tags : 
linux, business-critical workloads, workload data, ecosystem, application software, development, deployment software, infrastructure software
    
Red Hat
Published By: NFP Advisor Services     Published Date: Feb 27, 2015
Clients, especially those with a high net worth, are increasingly demanding guidance for all of their financial needs from a single source. A multidiscipline practice enables you to provide them with complete wealth management solutions, resulting in higher rates of client satisfaction, retention and referral. Learn how to exploit social media opportunities, build a strategy that's right for you, design online profiles that match your goals and much more.
Tags : 
business models, growth performance, advisor services, multidiscipline practices, business owners, complex mdp, iinvestments, insurance, financial needs
    
NFP Advisor Services
Published By: ServiceNow     Published Date: Oct 06, 2015
IT service support management tools are vital for infrastructure and operations organizations to manage support and delivery of IT services. This Magic Quadrant research profiles key vendors of enterprise ITSSM tools to help I&O leaders make better selections.
Tags : 
    
ServiceNow
Published By: Workday APAC     Published Date: Apr 11, 2019
How do some of the world’s biggest organizations transform their global HR operations? The five companies profiled in this eBook made their HR transformation journeys in very different ways, but they all arrived at the same destination—a single system that streamlines processes and boosts engagement across the entire organization. Read now to get their stories.
Tags : 
    
Workday APAC
Published By: Blue Coat Systems     Published Date: Jul 18, 2013
Several years ago, a transformation in IT began to take place; a transformation from an IT-centric view of technology to a business-centric view of technology that Forrester refers to as business technology (BT). This transformation has a profound impact on the role of the CIO. The CIO must now view himself or herself as a business enabler. He or she must focus on continuously aligning with business objectives, improving delivery capability to support business processes that bring new products and services to market more quickly, fostering innovation, and reducing costs through improved performance. In this custom Technology Adoption Profile (TAP), the data confirms this trend.
Tags : 
security, technology, business technology, cio
    
Blue Coat Systems
Published By: CA Technologies     Published Date: Apr 06, 2017
Reports of cyberattacks now dominate the headlines. And while most high-profile attacks—including the major breaches at JP Morgan, Anthem and Slack—originated outside of the victimized organizations, theft and misuse of data by privileged users is on the rise. In fact, 69% of enterprise security professionals said they have experienced the theft or corruption of company information at the hands of trusted insiders.1 There are also cases where a company’s third-party contractors, vendors or partners have been responsible for network breaches, either through malicious or inadvertent behavior.
Tags : 
cyber security, cyber attack, it security, threat analytics, risk mitigation, data security
    
CA Technologies
Published By: Silver Peak     Published Date: Apr 12, 2016
This white paper illustrates how the integration of zero touch provisioning with EdgeConnect profiles, and the further integration of local profiles into the global business intent of Silver Peak’s virtual overlays, fulfills the promise of SD-WAN with virtualised wide area networking.
Tags : 
security, integration, wan, software defined wan, edgeconnect, virtualisation, networking
    
Silver Peak
Published By: Entrust Datacard     Published Date: Jul 23, 2019
Security risks and breaches have become part of the daily landscape as companies and organizations of every size and in every vertical and industry announce that they have been compromised. In 2016 reported security breaches were up 40%, and this year is on pace to surpass that steep rise. Over the past year alone, there have been high-profile breaches in the gaming, financial services, hospitality, food service, consumer packaged goods, and retail sectors. Many of those breaches occurred due to vulnerabilities in applications and on websites. For example, this past April, the IRS announced a breach attributable to a tool designed to fetch data for the Free Application for Federal Student Aid (FAFSA) form.
Tags : 
    
Entrust Datacard
Published By: Citrix Systems     Published Date: Feb 23, 2011
By using Citrix ReceiverT, organisations are able to deliver virtualized applications and desktops to their employees' mobile devices.
Tags : 
citrix systems australia, customer profile, apple ipad, citrix receiver, employee productivity, mobile devices, virtual desktop
    
Citrix Systems
Published By: Adobe     Published Date: Apr 25, 2016
Data is the key to doing this. But simply collecting it won’t take you all the way. You must use the data to create holistic customer profiles, then use those customer profiles to create interesting, personalised and memorable experiences. This three-part, step-bystep eBook series explains how to actually use data to provide each customer with the best experience possible.
Tags : 
customer experience, marketing, data management
    
Adobe
Published By: Adobe     Published Date: Apr 25, 2016
Der Schlüssel hierzu sind Daten. Es reicht jedoch nicht aus, Daten einfach nur zu erfassen. Sie müssen anhand der Daten ganzheitliche Kundenprofile erstellen und diese anschließend verwenden, um interessante, personalisierte und nachhaltige Erlebnisse zu entwickeln. Diese dreiteilige E-Book-Reihe erläutert Schritt für Schritt, wie Sie Daten tatsächlich verwenden können, um jedem Kunden das bestmögliche Erlebnis zu bieten.
Tags : 
customer experience, marketing, data management
    
Adobe
Published By: NetApp     Published Date: Feb 15, 2017
How can hybrid-flash array users benefit from a move to all-flash? This case study profiles a large European organization that moved their VMware server and desktop environments from hybrid-flash to NetApp AFF all-flash systems
Tags : 
netapp, database performance, flash storage, data management, cost challenges
    
NetApp
Published By: Oracle     Published Date: Mar 28, 2017
Loyalty programs provide a framework to nurture guest relationships, offering recognition, perks and options to redeem rewards. Most importantly, they create guest profiles and transaction histories that yield the insights needed to foster what is demanded today: individualized guest interactions.
Tags : 
hotel, loyalty program, perks, redeem, oracle
    
Oracle
Published By: CA Technologies     Published Date: Sep 25, 2017
Reports of cyberattacks now dominate the headlines. And while most high-profile attacks—including the major breaches at JP Morgan, Anthem and Slack—originated outside of the victimized organizations, theft and misuse of data by privileged users is on the rise. In fact, 69% of enterprise security professionals said they have experienced the theft or corruption of company information at the hands of trusted insiders. There are also cases where a company’s third-party contractors, vendors or partners have been responsible for network breaches, either through malicious or inadvertent behavior.
Tags : 
threat analytic systems, siems, firewalls, entity optimization, fraud prevention, ca technologies
    
CA Technologies
Published By: IBM APAC     Published Date: Aug 25, 2017
There is a tectonic shift in the way we work. We expect the same kind of intuitive, tactile experience with our workplace technology that we now take for granted with our smartphones, tablets and gaming systems. We expect our devices to talk to each other and update automatically. Virtual meetings should be as easy to set up as a video chat, and whatever we need to do our jobs should be as easy to tailor as a streaming music or video application.
Tags : 
personal profile, news and alerts, conversation recall, system updates, productivity tips
    
IBM APAC
Published By: mindSHIFT     Published Date: Nov 29, 2007
mindSHIFT has extended its service capabilities to include software-as-a-service as well as managed IT services, and is a "compelling solution" for small and medium-sized organizations seeking a strategic source to meet their IT and business needs.
Tags : 
saas, managed it, outsourcing, vendor selection, tco, voip, ip telephony, managed services, software as a service, mindshift
    
mindSHIFT
Published By: DellEMC and Intel®     Published Date: Oct 25, 2017
Une nouvelle révolution industrielle se profile, alimentée par l’Internet of Everything, les médias sociaux et le Cloud computing, et avec elle des changements fondamentaux dans notre façon de vivre et d’agir. Les DSI d’aujourd’hui se trouvent dans une position unique pour utiliser la technologie afin de créer une valeur ajoutée et des opportunités pour l’entreprise. Intel Inside® pour de nouvelles possibilités. En savoir plus sur les solutions d'entreprise Dell EMC en collaboration avec Intel® Ultrabook, Celeron, Celeron Inside, Core Inside, Intel, le logo Intel, Intel Atom, Intel Atom Inside, Intel Core, Intel Inside, le logo Intel Inside, Intel vPro, Itanium, Itanium Inside, Pentium, Pentium Inside, vPro Inside, Xeon, Xeon Phi, et Xeon Inside sont des marques commerciales d'Intel Corporation ou de ses filiales aux États-Unis
Tags : 
ultrabook, celeron, celeron inside, core inside, intel, le logo intel, intel atom, intel atom inside, intel core, intel inside, le logo intel inside, intel vpro, itanium, itanium inside, pentium, pentium inside, vpro inside, xeon, xeon phi
    
DellEMC and  Intel®
Published By: IBM     Published Date: Sep 22, 2011
This white paper highlights the performance and scalability potential of InfoSphere DataStage 8.1 based on a benchmark test simulating a data warehouse scenario. The benchmark is designed to use the profiled situation to provide insight about how InfoSphere DataStage addresses key questions customers frequently ask when designing their information integration architecture.
Tags : 
ibm, infosphere, data performance and scalability, customers, datastage
    
IBM
Published By: Dell Storage     Published Date: Nov 28, 2012
A custom Technology Adoption Profile Commissioned by Dell and Intel.
Tags : 
dell, intel, enterprises, virtualization, cloud, private cloud
    
Dell Storage
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.


Featured FREE Resource: