volume

Results 1 - 25 of 548Sort Results By: Published Date | Title | Company Name
Published By: 4Retail     Published Date: Nov 19, 2009
If you find yourself under the burden of mass emails and wasting valuable time sifting through volumes of unnecessary information, read on to find out why you are not alone and how you can change your working practices by looking to alternative ways of communicating.
Tags : 
email overload, communication, document management, problem of spam, project management, global sourcing, global sourcing management, on demand collaboration solution, email viruses, communication tool, growing inboxes, document upload
    
4Retail
Published By: Aberdeen Group     Published Date: Nov 13, 2015
Aberdeen’s Content Marketing survey revealed that while 95% of marketers are using or considering using a content marketing strategy, there are some distinct differences between those using content well and those just using content. The Best-in-Class are not only creating content at volume, they are taking a much more data-driven approach to their content marketing strategy — and it’s paying off. Find out how.
Tags : 
customer acquisition, marketing leads, marketing challenges, marketing messages, contact management, data science, demand generation, email marketing, inbound marketing, lead generation, lead intelligence, market research, integrated marketing, lead nurturing, marketing analytics, social media, advertising agencies, internet marketing, crm & customer care, traditional marketing
    
Aberdeen Group
Published By: Aconex     Published Date: Jun 24, 2008
It's a common scenario in the mining and oil & gas industries: the project has been approved to proceed and the pressure is on to get multiple parties – partners, consultants, contractors and suppliers – working together efficiently to meet an aggressive schedule. This challenge is often exacerbated by globalization and by the vast volume of data that flows between the project team.
Tags : 
information management, construction, oil, mining, gas, commodities, energy, aconex, collaboration, project management
    
Aconex
Published By: Acquia     Published Date: Sep 13, 2011
Learn how you can improve performance, scalability and availability, while reducing business risk and costs with the Drupal Open Source social publishing platform and Acquia Hosting services.
Tags : 
acquia, technology, scalability, drupal, hosting services, open source social publishing platform
    
Acquia
Published By: ActivPlant     Published Date: Jun 22, 2008
For complex manufacturing environments, OEE (Overall Equipment Effectiveness) falls short when it comes to delivering improvements in productivity. That's because OEE tools were originally developed to measure the performance of stand-alone equipment or the total output of a particular line. Today's enterprises need more. This paper describes an evolution in thinking: focusing on product flow through the process.
Tags : 
equipment, scm, manufacturing, productivity, output, line output, volume, product lifecycle management, activplant
    
ActivPlant
Published By: Adobe     Published Date: Jun 29, 2012
The volume of customer data that marketing departments possess continues to grow at explosive rates. But new research from the Aberdeen Group finds that less than 40% of marketers use this information to optimize and target their campaigns. This "data rich, insight poor" phenomenon is examined in their new white paper, which identifies common analytics challenges-and shows how you can rise above them.
Tags : 
adobe, cmo, analytics, marketing, aberdeen, optimize, campaign, optimization
    
Adobe
Published By: Adobe     Published Date: Oct 06, 2015
The sheer volume of data available to marketers can be daunting, especially without a data management platform (DMP). With a DMP, marketers can handle growing data challenges, create powerful customer insights and deliver marketing campaigns that increase revenue.
Tags : 
adobe, digital advertising, social, brand, dmp, digital media platform, emerging marketing, social media, advertising agencies, internet marketing, crm & customer care, e-commerce, traditional marketing
    
Adobe
Published By: Adobe     Published Date: Feb 08, 2016
The sheer volume of data available to marketers can be daunting, especially without a data management platform (DMP). With a DMP, marketers can handle growing data challenges, create powerful customer insights and deliver marketing campaigns that increase revenue.
Tags : 
adobe, marketing, data, dmp, data management, customer insights, roi, internet marketing, crm & customer care
    
Adobe
Published By: Adobe     Published Date: Jun 22, 2017
The ability to create high-volume, high-relevance, and high-velocity content is very important for B2B marketers. The Adobe and Econsultancy B2B Digital Trends 2016-2017 report dives into all the latest digital trends and opportunities that are impacting B2B. So that you can set the new standards. Read the report to learn: • The many priorities within CX and the push to improve CX • The importance of data driven marketing within CX • Why integration across all touchpoints is essential
Tags : 
b2b marketing, content marketing, customer experience, digital trends, mobile optimization
    
Adobe
Published By: Adobe     Published Date: Aug 09, 2017
Detailed craftsmanship. Unexpected angles. Authentic stories. See what’s trending in the world of images in our Visual Trends: Volume 1 report. You’ll learn all about: • How artists are using digital technology in fine art • The increased use of drones in aerial photography • Female stereotypes being challenged on both sides of the camera
Tags : 
    
Adobe
Published By: Akamai Technologies     Published Date: Apr 13, 2018
Cyber attackers are targeting the application programming interfaces (APIs) used by businesses to share data with customers. Consumer mobile adoption, electronic goods and services, and high volumes of data have led businesses to use APIs for data exchange. Unfortunately, attackers can also use APIs to access or deny service to valuable data and systems. This white paper explores strategies for protecting APIs. You’ll learn about APIs, how and why these endpoints are targets for web application attacks, security models, and how Akamai can help.
Tags : 
api, security, interface, businesses, data, mobile, adoption
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Apr 25, 2018
Cyber attackers are targeting the application programming interfaces (APIs) used by businesses to share data with customers. Consumer mobile adoption, electronic goods and services, and high volumes of data have led businesses to use APIs for data exchange. Unfortunately, attackers can also use APIs to access or deny service to valuable data and systems. This white paper explores strategies for protecting APIs. You’ll learn about APIs, how and why these endpoints are targets for web application attacks, security models, and how Akamai can help.
Tags : 
api, security, interface, businesses, data, mobile, adoption
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Apr 25, 2018
Cyber attackers are targeting the application programming interfaces (APIs) used by businesses to share data with customers. Consumer mobile adoption, electronic goods and services, and high volumes of data have led businesses to use APIs for data exchange. Unfortunately, attackers can also use APIs to access or deny service to valuable data and systems. This white paper explores strategies for protecting APIs. You’ll learn about APIs, how and why these endpoints are targets for web application attacks, security models, and how Akamai can help.
Tags : 
api, security, interface, businesses, data, mobile, adoption
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Apr 25, 2018
Cyber attackers are targeting the application programming interfaces (APIs) used by businesses to share data with customers. Consumer mobile adoption, electronic goods and services, and high volumes of data have led businesses to use APIs for data exchange. Unfortunately, attackers can also use APIs to access or deny service to valuable data and systems. This white paper explores strategies for protecting APIs. You’ll learn about APIs, how and why these endpoints are targets for web application attacks, security models, and how Akamai can help.
Tags : 
api, security, interface, businesses, data, mobile, adoption
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Apr 25, 2018
Cyber attackers are targeting the application programming interfaces (APIs) used by businesses to share data with customers. Consumer mobile adoption, electronic goods and services, and high volumes of data have led businesses to use APIs for data exchange. Unfortunately, attackers can also use APIs to access or deny service to valuable data and systems. This white paper explores strategies for protecting APIs. You’ll learn about APIs, how and why these endpoints are targets for web application attacks, security models, and how Akamai can help.
Tags : 
api, security, interface, businesses, data, mobile, adoption
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Mar 19, 2019
Digital security has never taken on greater urgency. Today we live in a fundamentally connected ecosystem where we increasingly work, play, and indeed live most of our lives online. Whether we are enterprise users or endpoint consumers, our digital experiences are increasingly delivered to us on our connected devices - wherever we are, whenever we want them. For InfoSec professionals, this interconnected ecosystem is wreaking havoc with the idea of "the perimeter." In fact, the perimeter as we know it no longer exits. The attack surface is always shifting and continues to disperse across a wider area. At the same time, attacks continue to grow in size and volume, and are increasingly targeted. No longer can you secure the perimeter and trust that nothing will get in or out. What you need to deploy and manage is being redefined right before your eyes, with or without you. You need to take security to the edge.
Tags : 
    
Akamai Technologies
Published By: Altiscale     Published Date: Oct 19, 2015
In this age of Big Data, enterprises are creating and acquiring more data than ever before. To handle the volume, variety, and velocity requirements associated with Big Data, Apache Hadoop and its thriving ecosystem of engines and tools have created a platform for the next generation of data management, operating at a scale that traditional data warehouses cannot match.
Tags : 
big data, analytics, nexgen, hadoop, apache
    
Altiscale
Published By: Amazon Web Services     Published Date: Oct 09, 2017
Today’s organizations are tasked with managing multiple data types, coming from a wide variety of sources. Faced with massive volumes and heterogeneous types of data, organizations are finding that in order to deliver insights in a timely manner, they need a data storage and analytics solution that offers more agility and flexibility than traditional data management systems. Data Lakes are a new and increasingly popular way to store and analyse data that addresses many of these challenges. Data Lakes allow an organization to store all of their data, structured and unstructured, in one, centralized repository.
Tags : 
cost effective, data storage, data collection, security, compliance, platform, big data, it resources
    
Amazon Web Services
Published By: Amazon Web Services     Published Date: Jul 25, 2018
What is a Data Lake? Today’s organizations are tasked with managing multiple data types, coming from a wide variety of sources. Faced with massive volumes and heterogeneous types of data, organizations are finding that in order to deliver insights in a timely manner, they need a data storage and analytics solution that offers more agility and flexibility than traditional data management systems. Data Lakes are a new and increasingly popular way to store and analyze data that addresses many of these challenges. A Data Lakes allows an organization to store all of their data, structured and unstructured, in one, centralized repository. Since data can be stored as-is, there is no need to convert it to a predefined schema and you no longer need to know what questions you want to ask of your data beforehand. Download to find out more now.
Tags : 
    
Amazon Web Services
Published By: Amazon Web Services     Published Date: Jul 25, 2018
Qu'est-ce qu'un lac de données ? Les organisations doivent gérer de plus grands volumes de données, provenant de davantage de sources et contenant plus de types de données que jamais auparavant. Confrontées à des volumes massifs et hétérogènes de données, de nombreuses organisations ont compris que pour proposer des informations stratégiques pour l'entreprise en temps opportun, elles doivent disposer d'une solution d'analyse et de stockage des données qui offre plus de vitesse et de souplesse que les systèmes traditionnels. Un lac de données représente une solution nouvelle et de plus en plus répandue pour stocker et analyser les données. Cette solution relève la plupart de ces défis en permettant à une organisation de stocker l'ensemble de ses données au sein d'un même référentiel centralisé. Comme les données peuvent être stockées sous leur forme initiale, il n'est pas nécessaire de les convertir en un schéma prédéfini avant leur ingestion.
Tags : 
    
Amazon Web Services
Published By: Appcito     Published Date: Apr 09, 2015
Social media marketing ?rm ViralMint rolled out a new feature that proved so popular that the increased customer tra?c swamped the capabilities of the existing load balancer solution and greatly increased application response times. Lacking visibility into the volume or nature of its tra?c, ViralMint had no clues for how to address its issues. A fortuitous conversation led to discovery of the Appcito Cloud Application Front End (CAFE) service, which allowed ViralMint to gain control of its cloud application tra?c, retain its customers’ trust and build on its unexpected success.
Tags : 
customer traffic, load balancer solution, application response times, visibility, cloud application service, cloud application delivery, aws, amazon web services
    
Appcito
Published By: Applause Israel     Published Date: Jun 19, 2018
obile Payments have emerged as a catalyst for transactions across all markets. In underdeveloped markets, mobile payment technology is enabling businesses to sell products and services to consumers that had previously been out of reach. In developed markets, it has made the process of purchasing products and services even simpler. PayPal, one of the most popular digital payment solutions on the market, facilitated $66 billion in payment volume throughout 2015, and now has 188 million active registered user accounts across the US. Furthermore, Statista projects that mobile payments will account for more than $210 billion in transactions by 2019. Mobile payment technology is a step forward in the process of connecting businesses to the people they are serving. However, some merchants will find themselves miles behind their competitors by the time the transition to mobile payments is complete. The reason? A failure to implement the correct mobile payment strategy. An ever-increasing numbe
Tags : 
    
Applause Israel
Published By: Aprimo, Inc.     Published Date: Dec 23, 2008
To keep up with the growth and volume of its business, the marketing department at a $2B enterprise software company knew they needed a next generation marketing application to track marketing program expenditures.
Tags : 
loop marketing, enterprise campaign management, financial management, aprimo
    
Aprimo, Inc.
Published By: Arbor     Published Date: Mar 13, 2014
All enterprises need to have mitigation solutions in place. Information security is vital in the workplace and DDoS has become more complex over time. Determine whether services are the best option for primary protection through this whitepaper.
Tags : 
arbor, idc, distributed denial-of-service, ddos attack ddos solutions, dns reflection, exfiltration of data, security products, the cloud, cloud migration, high-bandwidth attacks, volumetric attacks, deployment, multi-vector threat, ips solutions, deployment models
    
Arbor
Published By: Arbor Networks     Published Date: Mar 06, 2013
This Frost & Sullivan white paper identifies what organizations need to know to protect their intellectual property and prepare for unexpected data breaches. Cyber threats continue to mutate and grow in volume. Read on to learn more.
Tags : 
defeating cyber threats, wider net, arbor networks, network security, improving ability to protect data, data security
    
Arbor Networks
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.


Featured FREE Resource: