Cookie policy: This site uses cookies (small files stored on your computer) to simplify and improve your experience of this website. Cookies are small text files stored on the device you are using to access this website. For more information on how we use and manage cookies please take a look at our privacy and cookie policies. Some parts of the site may not work properly if you choose not to accept cookies.

sections
 

attention

Results 101 - 125 of 298Sort Results By: Published Date | Title | Company Name
Published By: CA Technologies     Published Date: Jul 13, 2015
The explosive growth of eCommerce has focused attention on security concerns associated with online payment transactions. Cardholders worry about the safety of online transactions while card issuers are concerned about balancing the risks and costs of payment fraud with a loss of revenue caused by transaction abandonment. The 3-D Secure protocol allows payment card issuers to reduce fraud in payment transactions by verifying cardholder identity during Card Not Present (CNP) transactions. Before a transaction is authorized, a cardholder can be challenged to enter a password, answer a question, or use some other form of authentication credential. This interruption in the transaction often causes legitimate customers to abandon the purchase resulting in loss of revenue for the issuer. The challenge is how to reduce fraud without impacting the user purchase experience.
Tags : 
ca technologies, cnp, emv, otp, 3dsecure
    
CA Technologies
Published By: Spredfast, Inc.     Published Date: Feb 03, 2014
Learn how metrics effectively measure your social media presence and how they can help you understand which social channels your organization may need to focus more attention on.
Tags : 
metrics, social media presence, social media, social channels, brand, facebook, twitter, linkedin
    
Spredfast, Inc.
Published By: Ephesoft     Published Date: Apr 04, 2018
If you have worked in an Accounts Payable department, you know that the premise of most AP functions is number-driven and data-driven. Invoices come in, they are processed and money goes out. While it may sound easy, the process requires special attention to details, numbers, data entry, approvals and other business processes. Organizations that use innovative, smart document capture solutions now have a simple way to streamline invoicing, improve accuracy and increase productivity.
Tags : 
    
Ephesoft
Published By: Epicor     Published Date: Oct 29, 2018
Times are changing. Consumer’s attitudes towards gardening have changed dramatically in recent years. The garden and landscape industries are still powerful draws, but competition for consumers’ attention is fierce-successful garden retail centers must adjust to these changing times. In this whitepaper, written by retail garden and hardware industry expert Ian Baldwin, explains the importance of customer loyalty by understanding and adapting to the new ways customers shop by matching the in-store experience to today’s buyers’ needs. View this whitepaper written by industry expert to learn how to create the best shopping experience for your lawn and garden customers.
Tags : 
customer loyalty, customer engagement, garden retail, garden center customers, customer loyalty, customer satisfaction, online merchandising
    
Epicor
Published By: GoToMeeting     Published Date: Aug 11, 2010
Effectively engaging prospects is one of the greatest challenges you'll encounter with a virtual sales presentation. If you don't hold a prospect's attention, you probably won't make the sale. This new What Works! eBook explores best practices for effectively engaging prospects in a virtual environment to shorten the sales cycle, beat the competition and close more business.
Tags : 
citrix, virual sales presentation, web conference, virtual environment, sales cycle, prospect engagement, content, strategy
    
GoToMeeting
Published By: Symantec     Published Date: Nov 30, 2015
Noël approche. La dinde est bien dodue... mais attention à ne pas vous la faire plumer.
Tags : 
    
Symantec
Published By: BlackBerry     Published Date: Oct 03, 2012
Finally, there's a way for IT to give both aspects the attention they deserve. Find out what BlackBerry Balance® can do for your organization.
Tags : 
it control, information technology, user experience, mobile solutions, mobile security, security, wireless
    
BlackBerry
Published By: Blackberry     Published Date: Oct 03, 2012
Finally, there's a way for IT to give both aspects the attention they deserve. Find out what BlackBerry Balance® can do for your organization.
Tags : 
it control, information technology, user experience, mobile solutions, mobile security
    
Blackberry
Published By: KPMG     Published Date: Jul 11, 2018
In the consumer packaged goods sector, consumer expectations are becoming harder to satisfy profitably. But, with the right focus, it is possible. Read this report to find out: • how top performers are transforming to become customer-centric businesses • how the best brands keep pace with consumers’ changing preferences • how leading organisations are accessing the capabilities they need for growth • what they are doing to win the battle for consumers’ attention. Download the report now
Tags : 
    
KPMG
Published By: IBM     Published Date: Jun 20, 2014
In this video, see how Greenwell Financial marketers use IBM's Digital Experience platform to make customers the center of attention to drive business value. This demo highlights IBM's latest capabilities including Site Wizard, Digital Data Connector, Marketing Center, Media Analytics and more.
Tags : 
ibm, digital experience, digital strategy, marketing, digital experience platform, social media analytics, customer engagement
    
IBM
Published By: Zendesk     Published Date: Jan 03, 2019
Today's marketplace is hypercompetitive. Brands compete for attention, hoping they can turn that attention into a loyal customer. But too many companies are not able to build a long-term relationship that results in a loyal customer because the customer had a poor experience. To remain competitive, brands need to create compelling integrated customer experiences that continue to evolve and reduce the friction between company and customer over the lifetime of the relationship. This IDC Vendor Spotlight discusses the current challenge that organizations face in providing a differentiating customer support experience and the potential that technology offers as a lever to improve the customer support experience.
Tags : 
    
Zendesk
Published By: Hewlett Packard Enterprise     Published Date: Jan 31, 2019
With the maturing of the all-flash array (AFA) market, the established market leaders in this space are turning their attention to other ways to differentiate themselves from their competition besides just product functionality. Consciously designing and driving a better customer experience (CX) is a strategy being pursued by many of these vendors.This white paper defines cloud-based predictive analytics and discusses evolving storage requirements that are driving their use and takes a look at how these platforms are being used to drive incremental value for public sector organizations in the areas of performance, availability, management, recovery, and information technology (IT) infrastructure planning.
Tags : 
    
Hewlett Packard Enterprise
Published By: OpenText     Published Date: Nov 08, 2013
Once voice systems have migrated to Voice over IP, (VoIP) fax communications are the next logical addition to an IP-based environment. This white paper discusses how fax servers and new Fax over IP (FoIP) investments fit into your organizations unified communication strategy. It also calls attention to issues and challenges organizations should consider when determining how best to take advantage of traditional telephone-based systems, FoIP, or a mix of both.
Tags : 
voip, phone systems, voice over internet protocol, voice over ip
    
OpenText
Published By: Asentria Corporation     Published Date: Sep 04, 2007
In the high-stakes battle of Internet providers, WiMAX represents the latest up-and-comer to challenge DSL and cable technologies. This new wireless technology is gaining attention for its ability to provide high-speed, high-throughput broadband connections over distances of up to 30 miles instead of a few hundred feet. Exhibiting a surprising amount of utility, WiMAX can be used for a number of different applications.
Tags : 
telecom alarms, snmp traps, remote site managers, terminal servers, remote access, snmp monitoring, snmp, contact closures, fault management, network management, remote site monitoring, remote site alarms, environmental monitoring, network alarm monitoring, network alarm management, remote telemetry units, alarm management system, network management systems, network monitoring, protocol mediation
    
Asentria Corporation
Published By: HERE Technologies     Published Date: Sep 26, 2019
Misplacing sizable, expensive tooling equipment inside large industrial complexes, factories and warehouses is a problem that doesn't get the attention it deserves. When essential inventory gets lost, whole production lines can grind to a halt. Indoor tracking is the optimal way to keep tabs on all mobile equipment around the factory floor. As one of the world's leading location platforms, HERE shares insights and solutions for implementing indoor tracking in a way that can streamline and optimize production processes. Read the eBook to discover how to: • locate inventory and assets quickly to lower downtime and improve job satisfaction • save money spent on replacing lost tools and wasted employee time • use insights into asset utilization for forecasting or maintenance schedules.
Tags : 
    
HERE Technologies
Published By: Quantum Metric     Published Date: Oct 18, 2019
Attaining your customers’ undivided attention is a key challenge for any online business. This challenge is amplified, however, when they explore your brand via their mobile device. Using Quantum Metric’s unique dataset, this infographic showcases the importance of keeping your mobile visitors engaged. Mobile visitors purchase 4X less than desktop visitors among Fortune-500 companies.
Tags : 
    
Quantum Metric
Published By: Cyveillance     Published Date: Apr 03, 2015
In this white paper, we recap notable trends and events in information security from 2014 and look forward to what information security professionals should expect in 2015. The past year was a landmark one in the information security field, with massive data breaches capturing the public’s attention, powerful bugs causing headaches for IT teams and end users, DDoS attacks breaking records, and phishing remaining a general annoyance – or worse – for all Internet users. In this whitepaper, we discuss these trends as well as key areas of concern for 2015, including: - The impact of the Internet of Things - The growing importance of threat intelligence - The increasing influence of BRICS nations - The evolution of encryption standards - The changing role of the CISO
Tags : 
information security threat, information security, protection, security breach, internet security, networking, security, it management
    
Cyveillance
Published By: Pega     Published Date: Apr 04, 2016
Millennials are different than any other generation before them. They are making major decisions later in life—from choosing a career, getting married, buying a home and yes, investing in life insurance. And while they are more tech savvy than their predecessors and want to make purchasing from any device of their choosing, they still value face-to-face interaction, contrary to popular belief. Insurance and financial companies need to understand the unique dynamics of the millennial generation in order to better service and exceed expectations of this growing consumer base. They need to meet their tech-savvy expectations, while also understanding Millennials still value one-to-one attention. In fact, 48% of Millennials said they would be more likely to make a speedy financial or insurance-related decision if a person who they trusted took the time to explain the benefits and risks. Download this whitepaper and learn how to better tap into the growing millennial market.
Tags : 
    
Pega
Published By: Mass Relevance     Published Date: Jun 12, 2014
Don’t just put a sponsor’s logo in your ads (and vice versa). Instead, give interested brands a way to really grab the audience’s attention. View social sponsorship best practices for live events, on-air promotion, and website integration plus case studies from networks, agencies, and sponsors. Don't miss how the 25th annual College Slam sponsor Denny's drove 60,000 tweets during ESPN's live broadcast.
Tags : 
sponsorship offerings, sports sponsorship, on-air promotion, and website integration, networking
    
Mass Relevance
Published By: Mimecast     Published Date: Oct 02, 2019
When it comes to securing email and protecting against cyberattacks, most organizations focus their attention and resources on inbound emails. Yet, only 40% of email originates through inbound system traffic. The other 60% of email traffic is introduced via internal-to-internal (40%) or outbound (20%) email communications. This E-book takes a close look at several email-related activities that employees often engage in that contribute to the spread of insider threats and discusses what measures organizations can take to protect themselves.
Tags : 
    
Mimecast
Published By: ForeScout     Published Date: Aug 15, 2017
In this IDC Perspective report, research director Abhi Dugar looks at IoT security in the context of widespread cloud adoption, paying special attention to enterprises that maintain hybrid deployments.
Tags : 
    
ForeScout
Published By: Symantec     Published Date: Jan 15, 2014
This year’s ISTR once again covers the wide-ranging threat landscape, with data collected and analyzed by Symantec’s security experts. In this summary, we call out seven areas that deserve special attention.
Tags : 
symantec, cyberespionage, mobile security, mobile device security, threat report, cyberattacks, cyber attacks, data protection, spear phishing, phishing, spam, virus, malware, hackers, cyber criminals, internet security, network security
    
Symantec
Published By: IBM     Published Date: Apr 19, 2016
Big Data has generated much interest and attention in the media of late. Indeed, several authors have recently raised the question of whether Big Data approaches, such as Hadoop, will pronounce the death sentence on the conventional data warehouse. In this survey we investigate the current state of the data warehouse and examine its recent challenger in the form of Big Data solutions as an alternative. Is the new technology really complementary or is the reign of the data warehouse nearing an end?
Tags : 
ibm, ibm pure data system, big data, data analytics, analytics architecture, data warehouse
    
IBM
Published By: IBM     Published Date: Jul 05, 2016
Big Data has generated much interest and attention in the media of late. Indeed, several authors have recently raised the question of whether Big Data approaches, such as Hadoop, will pronounce the death sentence on the conventional data warehouse. In this survey we investigate the current state of the data warehouse and examine its recent challenger in the form of Big Data solutions as an alternative. Is the new technology really complementary or is the reign of the data warehouse nearing an end?
Tags : 
ibm, ibm pure data system, big data, data analytics, analytics architecture, data warehouse, data center
    
IBM
Published By: IBM     Published Date: Oct 13, 2016
Big Data has generated much interest and attention in the media of late. Indeed, several authors have recently raised the question of whether Big Data approaches, such as Hadoop, will pronounce the death sentence on the conventional data warehouse. In this survey we investigate the current state of the data warehouse and examine its recent challenger in the form of Big Data solutions as an alternative. Is the new technology really complementary or is the reign of the data warehouse nearing an end?
Tags : 
ibm, ibm pure data system, big data, data analytics, analytics architecture, data warehouse, enterprise applications, data center
    
IBM
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12    Next    End
Search      

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.