Cookie policy: This site uses cookies (small files stored on your computer) to simplify and improve your experience of this website. Cookies are small text files stored on the device you are using to access this website. For more information on how we use and manage cookies please take a look at our privacy and cookie policies. Some parts of the site may not work properly if you choose not to accept cookies.

sections
 

all ict

Results 301 - 325 of 359Sort Results By: Published Date | Title | Company Name
Published By: Cisco     Published Date: Jan 15, 2015
Today’s adversaries continue to increase their capabilities faster than the defenses deployed to stop them. Whether they are obfuscating their attacks or hiding malicious code within webpages and other files, they are making it more and more difficult to profile and identify legitimate network traffic. This is especially true in firstgeneration network security devices that restrict protection and policies to ports and protocols.
Tags : 
firewall, buyers guide, protocols, next generation, networks, computing, cloud, innovation, enterprise, datacenter, social, analytics, it management
    
Cisco
Published By: Cisco     Published Date: Jan 15, 2015
Service providers around the world share concerns about running out of bandwidth. Business challenges surrounding continued bandwidth growth, linked to video, mobility, and cloud applications, are significant. Service providers also report declining revenue from a cost-per-bit perspective, so not only does the network need to grow, it also needs to grow more cost effectively. The Cisco Virtual Networking Index™ (Cisco VNI™) predicts that over 50 billion devices will be connected over these networks by 2020. The network effects of the Internet of Things, LTE mobility, and mobile video are just beginning to be understood. In a world where mobile device network additions are growing four times faster than the population, and machine-to-machine (M2M) device network additions are growing five times faster than mobile device additions, this problem is clearly becoming highly important and requires a good solution.
Tags : 
cloud, growth, traffic, projection, account, network, it management, enterprise applications
    
Cisco
Published By: Cisco     Published Date: Jan 15, 2015
While this dramatic growth occurs, projections call for the cloud to account for nearly two-thirds of data center traffic and for cloud-based workloads to quadruple over traditional servers. That adds another element to the picture: changing traffic patterns. Under a cloud model, a university, for example, can build its network to handle average traffic volumes but then offload data on heavier trafficked days to a public cloud service when demand dictates, such as when it’s time to register for the next semester of classes.
Tags : 
cloud, growth, traffic, projection, account, network, it management, enterprise applications
    
Cisco
Published By: HP     Published Date: May 14, 2014
What worked in storage yesterday is not necessarily effective for today or tomorrow. Legacy storage is too complex and not well aligned with today’s business strategies and objectives. Many storage platforms are not up to the challenge of today’s unpredictable workloads and unconstrained data growth. They don’t offer the adaptability, agility and consolidated management capabilities IT requires, which means that IT needs a future-proof storage architecture. Learn about the next generation in storage.
Tags : 
converged storage, legacy storage, future proof storage, storage, hp converged storage
    
HP
Published By: HP     Published Date: May 27, 2014
The technology industry is constantly changing. Usually, it evolves along a progression of somewhat predictable lines. But every 20 years or so, a sea change shakes its very foundation. Tried-and-true practices that underpinned the previous model may no longer apply. It happened, for example when our industry transitioned from the mainframe to a client/server model. That change required a rethinking of the IT model from top to bottom. Download to learn more!
Tags : 
intel, converged infrastructure, mobile users, applications, virtualization, enterprises, it management, enterprise applications
    
HP
Published By: Lattice Engines     Published Date: Jun 19, 2014
Everyone is talking about predictive analytics these days, but what does it mean for B2B marketers? Find out how top demand generation professionals are using predictive applications powered by leading edge data science to optimize all stages of the funnel. Read Lattice Engine’s latest ebook, Decoding Predictive Marketing, and learn where predictive fits into your marketing mix.
Tags : 
lead scoring, marketing automation, predictive analytics, predictive marketing, predictive lead scoring, b2b marketing, lead nurturing, lead management, lead prioritization, lattice engines, demand generation, lead qualification, qualifying leads, score leads, lead score
    
Lattice Engines
Published By: Sailthru     Published Date: Jul 01, 2015
The ability to know the next action of an individual customer is gold, quite literally, as this knowledge translates directly into revenue. True predictive intelligence has arrived, and it’s one of the most incredibly exciting advancements in modern marketing. With good reason given that for many brands as much as 95% of future revenue comes from a mere 5% of customers! But with any major advancement, messaging landmines threaten a marketer’s ability to identify the technologies that can actually deliver on the predictive promise.
Tags : 
ecommerce, publishing, data science, predictive marketing, customer experience, personalization, marketing, strategy, technology
    
Sailthru
Published By: IBM     Published Date: Mar 07, 2014
2 Page Written Case Study on Consolidated Communications that discusses the challenges they were facing and how IBM's Predictive Insights capability helped them find problems in their network infrastructure before they actually occurred.
Tags : 
consolidated communications, ibm, predictive insights, infrastructure, problem solving, network
    
IBM
Published By: Total Merchant Services     Published Date: Jul 02, 2009
Accepting credit cards at your business, whether online or at your physical location, can be a challenging task.  The Credit Card Processing Industry is highly fragmented, with many companies offering conflicting or a confusing range of services.  This fact filled paper will provide you with a framework to make an informed decision for your payment system including; Equipment Costs, Rates, Types of Processing and Terms of the Agreement.
Tags : 
total merchant services, payment processing provider, credit cards
    
Total Merchant Services
Published By: Symantec     Published Date: Oct 01, 2015
The foundation of trusted Internet communications are Secure Socket Link (SSL) certificates, an encryption technology installed on Web servers that permits transmission of sensitive data through an encrypted connection. Using a public-key infrastructure (PKI), SSL certificates authenticate the end-use Website and the endpoint server, making it difficult for those sites to be imitated or forged.The acquisition of SSL certificates should always be a relatively easy experience; however, the purchasing decision should never be regarded lightly. When businesses consider SSL certificates; there six Golden Rules a purchaser should keep in mind. This whitepaper provides an overview of the SSL certificated market, the six golden rules of purchasing SSL certificates and how Symantec addresses each of the golden rules. At the end of the day, people want to make sure their Web sites are secured with as little friction as possible—Symantec gives businesses every opportunity to achieve that goal.
Tags : 
ssl certificates, public-key infrastructure, web servers, website security, sensitive data, encrypted connection, security
    
Symantec
Published By: Crownpeak     Published Date: Jun 03, 2015
Enterprises have long personalized their visitor's web experiences, typically through product recommendations or basic user segmentation. However, today's customers demand more real-time, in-the-moment experiences that meet their needs whenever, wherever. The technology behind this level of personalized marketing continues to advance by adding situational, predictive and real-time elements to keep up with customer expectations.
Tags : 
forrester research, personalization, next generation personalization, personalized experience, customer experience, personalized marketing, digital experience, contextual experience, user experience, emerging marketing, internet marketing, web content management, wcm, crm, customer care
    
Crownpeak
Published By: Radius Intelligence     Published Date: Jun 15, 2015
Market expansions are a viable strategy when a company’s growth in an existing market has stalled. However, marketers often rely on intuition and qualitative data to inform decisions around market fit and size. In this whitepaper, marketing technology expert, David Raab, explores how the shift in data and predictive solutions streamlines the market expansion process. The paper will reveal 4 keys to a successful market expansion, common mistakes to avoid, and show marketers how to win customers in new market segments.
Tags : 
predictive marketing, predictive analytics, b2b marketing, predictive b2b marketing, predictive technology, b2b marketing technology, customer insights, customer acquisition, segmentation, targeting, real-time analytics, total addressable market, multi-channel optimization, pipeline prioritization, predictive scoring, lead prediction, account targeting, predictive intelligence, marketing intelligence
    
Radius Intelligence
Published By: Secure Computing     Published Date: Feb 27, 2007
This industry white paper takes the mystery out of the key differences in the main classes of firewall architectures. It was independently written by Marcus J. Ranum, a world-renowned expert on security system design and implementation. It includes fundamental lessons about building application layer firewalls, technical examples, and concludes with predictions about the future of firewall technology.
Tags : 
security, firewalls, firewall, internet security, intrusion detection, intrusion prevention, application security, email security, network security, secure computing, securecomputing
    
Secure Computing
Published By: St Bernard Software     Published Date: Aug 21, 2009
Download this white paper from St. Bernard Software to read about a variety of contemporary, Internet-borne threats that are making it foolhardy for any business to provide unfettered Internet access for its users.
Tags : 
filtering, email security, firewall, access control, employee internet access, internet security, web security, restrictions, st bernard, st. bernard, network management, traffic management
    
St Bernard Software
Published By: LANDesk     Published Date: Feb 12, 2007
As IT departments work to transition from "firefighting mode" to becoming more proactive and responsive, a key step along the path is to implement labor-saving automation tools that allow more tasks to be done more rapidly, using fewer resources and with greater predictability and reliability.
Tags : 
it management, productivity, project management, service management, groupware workflow, business process automation, bpa, it automation, automating it, security management, landesk
    
LANDesk
Published By: ALL ICT Ltd     Published Date: Mar 26, 2008
The aim of this document is to assist organizations protecting their assets – tangible and intangible – through a Security Management Program. This program provides a holistic, hands-on, and consistent approach for securing the organization against serious security breaches, such as data leakage, while providing the organization with the required flexibility to adapt itself to the business needs and to remain competitive in the market.
Tags : 
allict, all ict, security management, security, network security
    
ALL ICT Ltd
Published By: Project Success, Inc.     Published Date: Jun 23, 2008
One of the difficulties of managing projects that involve several (perhaps many) organizations is that the group has no pre-established procedures for handling actions that cross organizational boundaries. With no procedures in place, confusion and miscommunication will result, which will lead to unnecessary delays, wasted resources, and potentially even conflict among the organizations.
Tags : 
project, project management, project success, psi
    
Project Success, Inc.
Published By: LaGarde     Published Date: Sep 10, 2008
It's difficult to pick up a news report without reading about another data breach or case of identity theft. With so much personal and financial information stored and transmitted electronically, consumers are at greater risk than ever of becoming victims of fraud.
Tags : 
lagarde, pci, pci-dss, pci dss, compliance, credit card, payment card, data protection, identity theft
    
LaGarde
Published By: Data Guard Systems, Inc     Published Date: May 06, 2009
The data security challenges for financial services providers—from the solo accounting professional to the midsize accounting firm to world’s largest corporation, from CPAs to CFPs to credit counselors—have never been as challenging as they are in today’s turbulent times. And although the large data breaches at the most recognizable companies receive the most publicity, small companies and solo offices can also be victims, according to the Better Business Bureau.
Tags : 
online identity theft, encryption software, advanced password protection, alertboot, identity, theft, dataguard, credit card, payment, fraud, anti-virus, anti-spam, pre-boot authentication, advanced password protection, file-based password protection, encryption, full disk, file encryption, breach, breaches
    
Data Guard Systems, Inc
Published By: SAS     Published Date: Nov 04, 2015
How does marketing compare to a game of pool? Sometimes you hit a good shot – 9 ball corner pocket – like when you’ve marketed a product and your customer purchases it. But sometimes your shot misses, and you knock in your opponent’s ball. You could even knock your ball into the pocket, but mistakenly knock your opponent’s ball into a different pocket at the same time. Of course, you can’t predict everything in a game of pool – or in marketing. A campaign may reveal a weakness that sends customers scuttling to a competitor. A new product can cannibalize an existing product line. Customers could leave one of your legacy product lines to consume one of your newly launched products – perhaps causing you to lose some revenue. But unlike pool, it’s hard to observe and measure with the naked eye what’s happening in marketing. The way to improve your chances of success is to build a solid measurement plan that lets you define and measure diagnostic metrics.
Tags : 
sas, marketing analytics, data driven decision making, consumer behavior, marketing mix, networking, data center
    
SAS
Published By: Anthem Marketing Solutions     Published Date: Oct 28, 2010
The third installment of a bi-annual study produced by Anthem Marketing Solutions reveals that the competition between physical stores and online retailers is rapidly shifting across a range of prices and item categories. While common wisdom dictates that better deals will be found more frequently online, the analysis concludes that shopping in stores can yield much higher savings when shoppers are looking for the lowest price.
Tags : 
online vs. offline, in-store pricing, online pricing, pricing trends
    
Anthem Marketing Solutions
Published By: IBM     Published Date: Aug 07, 2012
Most organizations appreciate the potential benefits that customer can reap but many face difficulties effectively turning information into actionable insights. Read this white paper to learn how an effective customer analytics strategy can help drive top-line growth, avoid unnecessary costs and increase customer satisfaction. Understand where your organization is in its pursuit to gain deeper customer insights with four stages of organizational capabilities and associated customer analytics strategies: gain insight from the information explosion; share information internally and across value chain; move from reaction to prediction; and adapt business models that enable faster creation of value.
Tags : 
customer amalytics. ibm, analytics framework, external data sharing, internal data sharing, increased loyalty, cross sell, wallet share, net promoter score, sales conversion rate, improved regency, improved frequency, improved monetary value, multi-channel next best action, mnba
    
IBM
Published By: Adobe     Published Date: Aug 05, 2014
Marketers have more channels to choose from than ever before. In 2014, their choices will become even more numerous, thanks to increasing device proliferation, the Internet of Things and the digitisation of offline channels. Crucial to succeeding in this increasingly complex world is the one concept underlying all marketing channels and the very best programs: data in, data out. In this report, we predict how data-driven marketing will evolve in 2014.
Tags : 
marketers, marketing channels, data, internet, data-driven
    
Adobe
Published By: IBM     Published Date: Oct 24, 2013
Today, the retail industry faces daunting challenges as a result of current uncertain economic conditions, conflicting market influences and changes to financial reporting standards. Traditional point solutions utilized in the various phases of the real estate life cycle are no longer adequate to meet these challenges. This whitepaper examines the benefits of implementing life cycle management solutions in the retail environment.
Tags : 
lifecycle management, real estate systems integration, real estate, retail, retailer, new lease accounting standard, fasb, iasb, workplace management system, iwms, facility management, integrated workplace, telecom
    
IBM
Published By: Oracle     Published Date: Jul 05, 2017
The fast-evolving digital landscape is changing the game for all organizations. The way we consume content, conduct research, consume video and music, and drive efficiency in our work environment is raising the bar for digital experience. Organizations that rely on the internet to reach customers and drive revenue increasingly turn to cloud-based infrastructure and content delivery networks (CDNs) to achieve the reach and global footprint needed to keep up with customer demands. Delivering these services with high availability and performance across an unpredictable internet over which you have very little visibility and control is a major challenge.
Tags : 
it infrastructure, operations professionals, digital experience, time to resolution, cloud, dns
    
Oracle
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.