sign act

Results 326 - 350 of 957Sort Results By: Published Date | Title | Company Name
Published By: Menlo Security     Published Date: Jun 05, 2018
"2017 was marked by a significant number of high-profile cyber breaches. Web malware and phishing played a critical role in the vast majority of these attacks. Watch this webinar to learn from two of the industry’s leading experts – Gartner Research Analyst Peter Firstbrook and Menlo Security CTO Kowsik Guruswamy: *Why web malware and phishing are so pervasive in today's cyber attacks *What the shortcomings of today’s reactive security philosophy are *Why the web continues to present a risk to businesses *How organizations rethink their security strategy moving forward"
Tags : 
    
Menlo Security
Published By: Iterable     Published Date: Sep 07, 2018
Today’s consumers are more informed, diverse, demanding and well-connected than ever before. With nearly unrestricted access to shopping resources used for discovery, comparison, and purchase, consumers are able to shop at will, often independent of branded retailer guidance. This rise of consumer independence can be attributed to the emergence of technological advancements favoring consumer empowerment; however, the repeated failures of brands to proactively offer personalized, high-value shopping experiences at scale is a significant contributing factor of consumer exodus. This has fostered an inclination among shoppers to become self-reliant in their pursuit of purchases, effectively shutting out promotional outreach from brands. Many brands continue to fall out of touch with their customers because they’ve lost sight of their customers’ true needs. Customer centricity has long been the foundation for modern marketing, but the brands which fail at creating deeply personalized market
Tags : 
    
Iterable
Published By: Amazon Web Services EMEA     Published Date: Sep 09, 2019
Amazon Web Services (AWS) offers scalable, cost-efficient cloud services that public sector customers can use to meet mandates, reduce costs, drive efficiencies, and accelerate innovation. The procurement of an infrastructure as a service (IaaS) cloud is unlike traditional technology purchasing. Traditional public sector procurement and contracting approaches that are designed to purchase products, such as hardware and related software, can be inconsistent with cloud services (like IaaS). A failure to modernize contracting and procurement approaches can reduce the pool of competitors and inhibit customer ability to adopt and leverage cloud technology
Tags : 
    
Amazon Web Services EMEA
Published By: Group M_IBM Q119     Published Date: Dec 18, 2018
IBM LinuxONE™ is an enterprise Linux server engineered to deliver cloud services that are secure, fast and instantly scalable. The newest member of the family, IBM LinuxONE Emperor™ II, is designed for businesses where the following may be required: • protecting sensitive transactions and minimizing business risk • accelerating the movement of data, even with the largest databases • growing users and transactions instantly while maintaining operational excellence • accessing an open platform that speeds innovation
Tags : 
    
Group M_IBM Q119
Published By: Group M_IBM Q119     Published Date: Dec 20, 2018
We are renegades and realists who blend strategy, technology and creativity to tackle every client challenge. We imagine the businesses that will shape tomorrow’s world and help our clients make them real. We uncover insights from data that others can’t see and deliver progressive ideas through the use of IBM Design Thinking. We ground every strategy with a focus on delivering the ultimate experience – for customers, for employees, for shareholders. Everything we do drives measurable impact at scale. For more information, visit ibm.com/ibmix
Tags : 
    
Group M_IBM Q119
Published By: Group M_IBM Q119     Published Date: Dec 20, 2018
The security information and event management (SIEM) market is defined by the customer's need to analyze event data in real time for the early detection of targeted attacks and data breaches, and to collect, store, analyze, investigate and report on event data for incident response, forensics and regulatory compliance. The vendors included in our Magic Quadrant analysis have products designed for this purpose, and they actively market and sell these technologies to the security buying center.
Tags : 
    
Group M_IBM Q119
Published By: Group M_IBM Q119     Published Date: Mar 04, 2019
There can be no doubt that the architecture for analytics has evolved over its 25-30 year history. Many recent innovations have had significant impacts on this architecture since the simple concept of a single repository of data called a data warehouse. First, the data warehouse appliance (DWA), along with the advent of the NoSQL revolution, selfservice analytics, and other trends, has had a dramatic impact on the traditional architecture. Second, the emergence of data science, realtime operational analytics, and self-service demands has certainly had a substantial effect on the analytical architecture.
Tags : 
    
Group M_IBM Q119
Published By: Group M_IBM Q2'19     Published Date: Apr 02, 2019
There can be no doubt that the architecture for analytics has evolved over its 25-30 year history. Many recent innovations have had significant impacts on this architecture since the simple concept of a single repository of data called a data warehouse. First, the data warehouse appliance (DWA), along with the advent of the NoSQL revolution, selfservice analytics, and other trends, has had a dramatic impact on the traditional architecture. Second, the emergence of data science, realtime operational analytics, and self-service demands has certainly had a substantial effect on the analytical architecture.
Tags : 
    
Group M_IBM Q2'19
Published By: Group M_IBM Q2'19     Published Date: Apr 22, 2019
"Improving Cyber Resilience in the Insurance Industry Security automation plays a significant role when maintaining an organization's Cyber Resilience, according to IBM Resilient’s latest report, “The Ponemon Institute Study on the Cyber Resilient Organization.” Download this latest report to understand the key factors that hinder the ability for efficient and effective Cyber Resilience and gain insights and guidance for improving your security posture."
Tags : 
    
Group M_IBM Q2'19
Published By: Group M_IBM Q3'19     Published Date: Jun 24, 2019
Society simply must change the way it serves its most vulnerable members. Service delivery models are outdated and constrained by budgets, organizational structures and legislation. Citizens aren’t getting what they need to become more self-sufficient and recover from hard times or significant events such as disasters. Government isn’t keeping up with the demand generated by the complex times we live in and agencies are stressed to the breaking point by current service expectations. Something different must be done to generate better outcomes. This action requires better engagement between government and citizens which can lead to more self-reliant individuals and lower demands and costs on government. In California, one county is tackling this challenge head on and has found a better way to serve their citizens.
Tags : 
    
Group M_IBM Q3'19
Published By: Group M_IBM Q4'19     Published Date: Sep 27, 2019
Banking engagement is about to come full circle. Over the past few decades, banks have pushed customers to digital and self-service channels, with significant consequences. As customers take their transactions from the branches to the digital channels, banking has become less and less personal. Will this trend continue? To predict the future let’s first review how we got here.
Tags : 
    
Group M_IBM Q4'19
Published By: Sierra Wireless     Published Date: Jun 19, 2019
The IoT is transforming the energy industry by eliminating tradeoffs between operation, SCADA systems, maintenance and new services for assets deployed in industrial and power facilities, buildings and across the grid. When it comes to building the best IoT system for your business application, it’s vital to keep your use case and business requirements at the forefront of your technical design strategy. In the energy industry, accessing and collecting data at the edge from disparate, heterogenous, multi-site, fixed topologies and transferring that data efficiently to the cloud to perform analytics and action business decisions is still the greatest challenge. Mission-critical data collected from the edge is integral to energy facility operations and cannot be excluded or corrupted.
Tags : 
    
Sierra Wireless
Published By: ConnectWise     Published Date: Aug 22, 2019
The benefits—or lack—of a solid RMM will significantly impact your Technology Teams and your customers. During the selection process, it’s important to compare options and determine which product best meets your company’s needs. When searching for the right RMM solution, make sure you consider your clients’ needs as well as your own. You want a solution you can trust, that’s also a leader in the industry. Don’t settle on an RMM until you analyze the following 10 aspects of the solution.
Tags : 
    
ConnectWise
Published By: Oracle + Dyn     Published Date: Jun 29, 2017
DNS has recently been dubbed by Gartner Research as “mission-critical” infrastructure and as such, who you select for a DNS provider can have a significant impact on the functionality and performance of your online assets. To help with your research, download this DNS evaluation guide. You will learn the most important functions of a robust DNS provider including: Advanced traffic steering from failover to GSLB capabilities Rapid record propagation time Secondary DNS support Security expertise Keep your brand safe and your user-experience top notch by choosing the best provider for your business. Learn more now!
Tags : 
    
Oracle + Dyn
Published By: Selligent Marketing Cloud     Published Date: Mar 07, 2018
Both are fueled by a drive for progress, for pushing boundaries and advancing the status quo. In these fields, new trends are like a currency. Keeping ahead of the next big trend means being aware of the next big seller and allocating all the right resources – fashion design, manufacturing, and marketing – for maximum impact. Miss the hype and the next fashion season is bound to hurt the bottom line. New trends are also important to marketers because owning a new trend is a way to differentiate in today’s fast-moving digital landscape. It’s a way to stand out from the pack by investing strategically in the right approaches and technologies at the right time, then reaping the benefits organically by leading where others follow. Naturally, making these decisions requires a bit of trial and error. Nobody has a magic crystal ball that guarantees success. But as a rule of thumb, the companies winning in digital marketing are the ones willing to adopt new technologies while keeping an sharp.
Tags : 
2018, marketing trends, omnichannel, multichannel, automation, loyalty, crm, marketing, personlisation, campaign management, customer marketing, retention marketing, marketing cloud, marketing solution, marketing platform, artificial intelligence, prediction learning, product recommendation
    
Selligent Marketing Cloud
Published By: Sage     Published Date: Mar 07, 2018
There comes a time in a company’s growth when applications that used to work well can no longer keep up with complexities of scale. This white paper describes 3 warning signs that indicate your disconnected financial applications are holding you back. Also, learn how migrating to a unified cloud solution can improve financial forecasts, enable you to act on more accurate information, increase productivity, and more. Don’t make this mistake. In this eBook, we explain the three warning signs you must watch out for if you want to know when it’s time to move your important customer and financial information to the cloud. Then we’ll show you exactly what managing your most important information with a cloud-based accounting solution means for you and your business. Download it today.
Tags : 
    
Sage
Published By: Tricentis     Published Date: Mar 13, 2018
In a case of “if you can’t measure it, you can’t manage it,” some software project failures occur because of a lack of traceability — that is, an incomplete record of documentation around software quality assurance efforts. The lack of traceability has a significant impact on QA testing effectiveness and meeting strategic goals. However, with optimal traceability, testing becomes more efficient and enables collaboration throughout the software development lifecycle, as well as between product owners and organization leaders.
Tags : 
    
Tricentis
Published By: Xactly     Published Date: May 11, 2016
Read on to discover how companies are designing and administering their sales compensation plans, and to get additional considerations and summary findings from Xactly analysts based on an analysis of the results.
Tags : 
sales, sales planning, business management
    
Xactly
Published By: MessageLabs     Published Date: Sep 25, 2008
The Internet has proven to be a vital communications medium for worldwide commerce, but as an open and unprotected global network it can also present a wide range of threats that can cripple any business organization. Several years ago, most Internet threats were relatively benign examples of a young adolescent’s technical expertise but over time they have evolved into increasingly sophisticated domestic and foreign attacks that are designed to capture financial, personal, or strategic business information. Threats now come in the form of deliberately malicious acts, and exploitative opportunities for hackers and/or organized crime. The impact is serious, and the landscape of victims is getting broader every day. In response, no organization can afford to have its networks remain unprotected.
Tags : 
messagelabs, online threats, security, small & medium businesses, email spam, viruses, trojan horses, worms, phishing attacks, spyware, adware, honeypots, sandboxing, the wildlist
    
MessageLabs
Published By: SAS     Published Date: May 24, 2018
Information on artificial intelligence (AI) is flooding the market, media and social channels. Without doubt, it’s certainly a topic worth the attention. But, it can be difficult to sift through market hype and grandiose promises to understand exactly how AI can be applied in practical and reliable solutions. Like most technological advances, incorporating new technology into business processes requires significant leadership and effective direction that all stakeholders can easily understand. Great leaders become great by balancing strategy with tactics, future vision with current reality and strengths with weaknesses – all with the goal of accomplishing a clearly defined objective. Great leaders also understand that people are the most valuable resources within their organization. To drive and inspire their success, you must optimize strengths while recognizing inherent weaknesses. Many of our daily human experiences and interactions involve machines or devices of some sort. Technolo
Tags : 
    
SAS
Published By: Vidyo, Inc.     Published Date: Oct 18, 2010
This paper will detail the significant impact on real world power consumption that Vidyo's SVC router based video conferencing approach provides over a traditional AVC transcoder based MCU approach.
Tags : 
vidyo, video conferencing, avc, transcoder, mcu, power, streaming, h.264, router, vidyorouter, telepresence
    
Vidyo, Inc.
Published By: Technomedia-Hodes iQ     Published Date: Jul 03, 2012
Designing a sustainable business process continuum that starts with sourcing and recruiting and continues through to succession planning means the interactions between the processes can be identified and linked.
Tags : 
talent acquisition, human resources, hr management, talent, succession, development
    
Technomedia-Hodes iQ
Published By: Wildfire Interactive     Published Date: Jul 16, 2012
Given that Facebook alone has nearly a billion users, the possibilities are too significant to ignore. But how do you tap into the full potential? Our best practices ROI report focuses on 6 social marketing success stories from 5 different industries-each demonstrating a significant positive ROI for the featured brand.
Tags : 
social media, internet marketing, roi, higher roi, grow, engage, branding, monetize, understand user, social media influence
    
Wildfire Interactive
Published By: Imprivata     Published Date: Dec 06, 2013
A complete Single Sign-On and Access Management solution that simplifies user experience and improves employee productivity.
Tags : 
sso, single sign on, single sign on authentication, two factor authentication, single sign on solutions, identity and access management, epcs, e-prescribing, clinical workflow, enterprise password management, biometric authentication, citrix single sign on, cpoe meaningful use, healthcare it, vmware single sign on
    
Imprivata
Start   Previous    7 8 9 10 11 12 13 14 15 16 17 18 19 20 21    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.


Featured FREE Resource: