request

Results 1 - 25 of 188Sort Results By: Published Date | Title | Company Name
Published By: RMS     Published Date: Jul 18, 2019
The more holistic view of risk a property underwriter can get, the better decisions they are likely to make. In order to build up a detailed picture of risk at an individual location, underwriters or agents at coverholders have, until now, had to request exposure analytics on single risks from their portfolio managers and brokers. Also, they had to gather supplementary risk data from a range of external resources, whether it is from Catastrophe Risk Evaluation and Standardizing Target Accumulations (CRESTA) zones to look-ups on Google Maps.
Tags : 
    
RMS
Published By: ETQ     Published Date: Jul 10, 2019
Across all industries, document control is one of the most important processes to get right. It ensures documents are updated and revision-controlled, allowing you to effectively route them for review, approval and distribution. Download now to learn more about the key document processes that drive quality: Document Creation Document Routing, Review and Approval Integration with Employee Training Document Change Requests
Tags : 
    
ETQ
Published By: Genesys     Published Date: Dec 20, 2018
Artificial Intelligence (AI) is staggering in its speed of handling simple requests and automating conversations. But AI solutions are not enough for the best customer experiences. Human emotions sometimes demand the human touch that only live agents can provide. Kate, Customer Experience AI by Genesys, combined with the power of human touch can improve customer experience, empower employees and dramatically reduce costs. This seamless combination of AI technology and humans, or “Blended AI by Genesys,” addresses the entire customer journey for the best possible outcomes. Download the eBook and learn how Kate and Blended AI lets you: • Personalize self-service • Connect customer conversations • Create smart agent experiences Start small and deploy fast with MicroApps
Tags : 
    
Genesys
Published By: Cherwell Software     Published Date: Feb 24, 2017
Are you ready to transform your service desk and unleash the power of effective and affordable IT service management? Schedule your demo of Cherwell Service Management® today.
Tags : 
    
Cherwell Software
Published By: Oracle CX     Published Date: Oct 20, 2017
Databases have long served as the lifeline of the business. Therefore, it is no surprise that performance has always been top of mind. Whether it be a traditional row-formatted database to handle millions of transactions a day or a columnar database for advanced analytics to help uncover deep insights about the business, the goal is to service all requests as quickly as possible. This is especially true as organizations look to gain an edge on their competition by analyzing data from their transactional (OLTP) database to make more informed business decisions. The traditional model (see Figure 1) for doing this leverages two separate sets of resources, with an ETL being required to transfer the data from the OLTP database to a data warehouse for analysis. Two obvious problems exist with this implementation. First, I/O bottlenecks can quickly arise because the databases reside on disk and second, analysis is constantly being done on stale data. In-memory databases have helped address p
Tags : 
    
Oracle CX
Published By: Infosys     Published Date: May 30, 2018
In the wake of data hacks and privacy concerns, enterprises are working extra hard to make sure they secure customer data from external threats. But what about securing data internally? Organizations unknowingly leave a big security hole in their own systems when they fail to have structured internal processes to handle access requests for employees, which could have disastrous implications for data security. A leading US bank sought to move its internal applications to a secure system for a standard and consistent access rights experience. See how Infosys helped and the five key takeaways from the project.
Tags : 
internal, applications, data, hacks, privacy, enterprises
    
Infosys
Published By: Akamai Technologies     Published Date: Dec 17, 2018
Employees, devices, and applications are no longer locked away inside the corporate perimeter. They’re on the web and on the go. Providing security for a new breed of anytime, anywhere workers and cloud-based applications requires a novel approach: a zero trust security model. Assuming that every user, request, and server is untrusted until proven otherwise, a zero trust solution dynamically and continually assesses trust every time a user or device requests access to a resource. But zero trust offers more than a line of defense. The model’s security benefits deliver considerable business value, too. Read this white paper to learn more about: -Protecting your customers’ data -Decreasing the time to breach detection -Gaining visibility into your enterprise traffic -Reducing the complexity of your security stack -Solving the security skills shortage -Optimizing the end-user experience -Facilitating the move to the cloud
Tags : 
    
Akamai Technologies
Published By: ESET     Published Date: Jun 08, 2011
ESET NOD32 Antivirus 4, ESET's Business Solution offers complete server-to-endpoint protection. Request a free trial today.
Tags : 
eset, free trial, nod32 antivirus 4, antivirus, malware, threats, productivity, endpoint protection
    
ESET
Published By: Dell EMC     Published Date: Aug 17, 2017
Databases are often the driving force behind a company’s mission-critical work. They power online stores, confidential records, and customer management systems, so a solution that sustains high levels of database work can be a big advantage as your company grows. We found that the Dell EMC™ VxRail™ P470F hyperconverged system with VMware® vSAN™ could allow you to do more database work than the HPE Hyper Converged 380 (HC 380) with StoreVirtual VSA. The four-node Dell EMC solution processed more orders with faster response times, so more users can fulfill requests quicker—whether they’re placing orders in a store, accessing databases of client info, or adding to company records.
Tags : 
database, database solution, hyperconverged system, database performance, database optimization
    
Dell EMC
Published By: ServiceNow     Published Date: Oct 02, 2015
ServiceNow ExpressSM brings together all the great features you need to address these common IT Service Management challenges and more. • Revolutionize request management with a self-service portal and automated routing • Track assets centrally though an integrated CMDB across all IT processes • Make reporting timely and informative with one-click reporting, dashboards and gauges
Tags : 
    
ServiceNow
Published By: ServiceNow     Published Date: Oct 02, 2015
Only ServiceNow Express delivers all this as one enterprise-grade cloud service— designed to solve IT service management challenges for enterprises of all sizes. The 3 Pillars of IT Service Management Excellence arE: • Automated Request Management • Integrated Asset Tracking • Intuitive Reporting
Tags : 
    
ServiceNow
Published By: Pega     Published Date: Apr 04, 2016
It is no secret banks are losing customers, and fast. A recent Finextra/Pegasystems survey pegs that 78% of banks have lost business in the last 12 months. The question is “Why?”. It all comes down to engaging with customers before, during and even after the sales process. Nearly all banks are struggling with the impact of client due diligence and KYC (know your customer) regulation on their onboarding processes, and are painfully aware that lack of speed, process visibility and repeat data requests are frustrating their corporate customers. The same holds true for service, where corporates are crying out for improvement, as well as omni-channel access and quick turnaround of service requests and inquiries. To stop the sales decline, banks need to begin doing all these things well. They will then be more competitive in the market as well as retain and win new business. Download this research study and gain a better understanding of how banks can better meet the needs of their customers
Tags : 
    
Pega
Published By: Pega     Published Date: Aug 12, 2016
Today’s banks are facing enormous pressures that include regulatory requirements, hefty penalties, increasing customer service demands, and ferocious competition from other financial institutions rapidly embracing customer-centric technology. Despite these challenges, banks can’t afford to scale down any efforts to ensure the highest standards of customer service
Tags : 
pega, customer service, finextra, service requests, inquiry handling
    
Pega
Published By: Hyland Software     Published Date: Jun 16, 2016
Fueled by new technologies, expanding regulations and greater patient expectations, there’s a clinical content gold rush in the healthcare market. Sources and types of clinical content grow at an exponential rate and through increasingly refined input methods, including voice and improved OCR, clinicians capture more unstructured information about their patients than ever before. Making all clinically relevant content available together, in one place seems like a simple request. Must the response be so complex?
Tags : 
healthcare, technology, solutions, best practices, business management, process management, analytics, content management
    
Hyland Software
Published By: Sage EMEA     Published Date: Jan 29, 2019
Ready to work faster, simpler, and more flexibly? Now you can. With today’s technology advancements, there’s no need to settle for less when it comes to your enterprise management solution. And now, with the introduction of Sage Business Cloud, you can future-proof your business with the only management solution you’ll ever need. Sage Business Cloud enables you to come onto the platform at any stage of your business and allows you to grow over time by adding new products as you need them. These include core cloud products across accounting, financials, enterprise management, and HR, as well as a thriving ecosystem that draws from more than 200 ISVs. Request a business review and discover how the right enterprise management solution can help you manage growth, improve efficiency, make smarter decisions, and reduce IT cost and complexity.
Tags : 
    
Sage EMEA
Published By: Oracle     Published Date: Aug 09, 2013
As an HR leader, what keeps you up at night? Is it meeting your executives’ demands for a greater contribution to the company’s strategic vision? Is it the requests to cut operational costs while simultaneously increasing efficiency? Most likely it’s the daunting combination of the two. HR success today means: • Streamlining core HR processes to eliminate waste and increase staff productivity • Ensuring that your talent strategy aligns with company goals and drives bottom line success • Investing in the right technology to ensure both local agility and global scalability
Tags : 
oracle hcm
    
Oracle
Published By: Oracle     Published Date: Aug 15, 2013
As an HR leader, what keeps you up at night? Is it meeting your executives’ demands for a greater contribution to the company’s strategic vision? Is it the requests to cut operational costs while simultaneously increasing efficiency? Most likely it’s the daunting combination of the two. HR success today means: • Streamlining core HR processes to eliminate waste and increase staff productivity • Ensuring that your talent strategy aligns with company goals and drives bottom line success • Investing in the right technology to ensure both local agility and global scalability
Tags : 
oracle hcm
    
Oracle
Published By: Pega     Published Date: May 24, 2016
It is no secret banks are losing customers, and fast. A recent Finextra/Pegasystems survey pegs that 78% of banks have lost business in the last 12 months. The question is “Why?”. It all comes down to engaging with customers before, during and even after the sales process. Nearly all banks are struggling with the impact of client due diligence and KYC (know your customer) regulation on their onboarding processes, and are painfully aware that lack of speed, process visibility and repeat data requests are frustrating their corporate customers. The same holds true for service, where corporates are crying out for improvement, as well as omni-channel access and quick turnaround of service requests and inquiries. To stop the sales decline, banks need to begin doing all these things well. They will then be more competitive in the market as well as retain and win new business. Download this research study and gain a better understanding of how banks can better meet the needs of their customers
Tags : 
    
Pega
Published By: Akamai Technologies     Published Date: Sep 27, 2016
Akamai’s Threat Research team analyzed a week of cross-site scripting (xss) alert triggers to gain clarity on the nature of xss attacks. Read this case study to learn which vectors are vulnerable and specific techniques that were employed during remote resource injection exploitation attempts versus simple probing requests.
Tags : 
akamai, xss, xxs exploration, threat research, analytics, security, cybersecurity
    
Akamai Technologies
Published By: Red Hat     Published Date: Jun 23, 2016
The Middleware Services Group within Information Technology Services (ITS) at the University of North Carolina at Chapel Hill needed a comprehensive, dynamic solution for frequent server provisioning requests and, in particular, managed servers. Without such a solution, the likelihood that users would employ outside vendors significantly increased. Use of outside vendors would potentially increase security concerns, present additional costs, and further complicate system administration. Moving to a fully-interoperable Platform-as-a-Service (PaaS) offering, built on OpenShift Enterprise by Red Hat, has allowed the middleware services team to deliver a flexible development and hosting environment that has fostered innovation and increased peace of mind.
Tags : 
best practices, technology, productivity, enterprise, red hat
    
Red Hat
Published By: SolidFire_NetApp     Published Date: Oct 10, 2016
With increasing demands being made on enterprise IT departments to keep up with the accelerating pace of business, infrastructure has to enable more dynamic, eficient application and IT service delivery. Unfortunately, more ofen than not, IT provisioning can be a bottleneck. Traditional means are ofen ineficient. When developers plan their projects and estimate the server, networking, and storage resources they need, they ofen overestimate and pad their requests to ensure what actually gets provisioned is adequate. The formal request comes via an IT ticket, and then the waiting begins. Days, possibly weeks go by before they get the resources they need, and all the while they’re unable to iterate on and evolve core business oferings.
Tags : 
    
SolidFire_NetApp
Published By: CA Technologies     Published Date: Aug 22, 2017
OAuth is an emerging Web standard for authorizing limited access to applications and data. It is designed so that users can grant restricted access to resources they own—such as pictures residing on a site like Flickr or SmugMug—to a third-party client like a photo printing site. In the past, it was common to ask the user to share their username and password with the client, a deceptively simple request masking unacceptable security risk. In contrast to this, OAuth promotes a least privilege model, allowing a user to grant limited access to their applications and data by issuing a token with limited capability.
Tags : 
    
CA Technologies
Published By: CA Technologies     Published Date: Aug 22, 2017
While some are still adjusting to the idea, you’re well aware that we’re living in an application economy. For the uninformed, an application economy is where everything is driven by a connected, mobile, application-based world where your customers are far more likely to experience your brand and interact with your enterprise through a software application than a live person. But, beyond the benefits, each day you’re feeling the pressure it exerts on your budget, resources and network. You’ve seen this wave swell on the horizon, and now it’s arrived: executives are enthusiastic and asking about strategies, and line-of-business leaders are requesting faster dev times and more complex projects. Staking out your place as a leader in this new landscape will require you to develop and deliver high-impact applications faster than ever before.
Tags : 
    
CA Technologies
Published By: Red Hat     Published Date: Nov 30, 2015
FICO, a financial services provider, wanted to address small-to-medium business (SMB) and midmarket customer requests for solutions without on-premise installation. To transition from an on-premise model to a cloud- and services-based infrastructure, FICO chose to build an OpenStack® cloud using Red Hat® solutions, including OpenShift by Red Hat and Red Hat Enterprise Linux® OpenStack Platform. As a result, FICO generated US$10 million in sales to new customers, reduced solution time to market by 50%, and lowered storage and overall infrastructure costs.
Tags : 
fico, smb, customer requests
    
Red Hat
Published By: Akamai Technologies     Published Date: Mar 10, 2016
The web application firewall (WAF) is among the most complex security technologies on the market today. The complexity of managing a WAF includes a pre-defined list of rules to identify thousands of potential exploits, intelligence about new attack vectors, and identifying malicious HTTP requests from legitimate HTTP traffic. Read this white paper to learn how to combine attack detection with threat intelligence using our cloud platform and managed security services to better protect your web applications.
Tags : 
akamai technology, web application security, http, best practices
    
Akamai Technologies
Start   Previous   1 2 3 4 5 6 7 8    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.


Featured FREE Resource: