Cookie policy: This site uses cookies (small files stored on your computer) to simplify and improve your experience of this website. Cookies are small text files stored on the device you are using to access this website. For more information on how we use and manage cookies please take a look at our privacy and cookie policies. Some parts of the site may not work properly if you choose not to accept cookies.

sections
 

attention

Results 151 - 175 of 274Sort Results By: Published Date | Title | Company Name
Published By: Oracle Corporation     Published Date: Mar 03, 2011
Read this white paper to learn how BI can combine your explicitly-defined business rules and automatically-identified statistical information to deliver the best possible content to your customers for every single interaction.
Tags : 
customer attention, decision management, performance goals., real time management, oracle
    
Oracle Corporation
Published By: Oracle Corporation     Published Date: May 11, 2012
Read this white paper to learn how BI can combine your explicitly-defined business rules and automatically-identified statistical information to deliver the best possible content to your customers for every single interaction.
Tags : 
oracle, busines intelligence, business intelligence applications, bi applications, bi apps, 11g, cross-value, decision, analytics, functional, flow, manage, customers, enterprise applications
    
Oracle Corporation
Published By: dinCloud     Published Date: Jun 19, 2018
Too often, the debate about IT is dominated by a narrow focus on near-term objectives: shrill cries claim that the business will stop (or fail) if a feature isn’t added to the ecommerce site, if the mobility platform isn’t improved, if the network and compute back end aren’t upgraded, if storage and database performance isn’t accelerated. Often, these changes are truly essential, and demand immediate attention. However, midmarket firms can’t assemble a meaningful strategy from point responses to near-term issues. Increasingly, midmarket enterprises are finding that continued operational success requires an “agile-cloud” – an agility-oriented, cloud-based IT strategy that addresses the three core changes faced by midmarket firms: the changing nature of business infrastructure, the accelerating pace of change in business, and the expanding scope of IT.
Tags : 
virtual, data, centers, services
    
dinCloud
Published By: Northeastern University     Published Date: Oct 01, 2015
Looking for a career change or considering the ways to maximize your career? Building your your LinkedIn profile to highlight your strengths, education and experience can help you establish your personal brand and market yourself to catch the attention of potential employers and recruiters. Browse this helpful guide, brought to you by Northeastern University, to learn about best practices for producing an attention-grabbing LinkedIn profile, while also exploring other LinkedIn tools and features to extend your network. Experience Northeastern.
Tags : 
grad school, northeastern university, graduate studies, masters, mba, career growth, career change
    
Northeastern University
Published By: Northeastern University     Published Date: Oct 01, 2015
Looking for a career change or considering the ways to maximize your career? Building your your LinkedIn profile to highlight your strengths, education and experience can help you establish your personal brand and market yourself to catch the attention of potential employers and recruiters. Browse this helpful guide, brought to you by Northeastern University, to learn about best practices for producing an attention-grabbing LinkedIn profile, while also exploring other LinkedIn tools and features to extend your network. Experience Northeastern.
Tags : 
grad school, northeastern university, graduate studies, masters, mba, career growth, career change
    
Northeastern University
Published By: OutSystems     Published Date: Oct 12, 2015
The Ovum Decision Matrix: Selecting a Mobile App Development Platform Solution highlights what companies should be looking for in a MADP solution. Given the amount of time, energy, money, anxiety, and attention that is being aimed at enterprise mobility right now, this report is quite timely.
Tags : 
outsystems, ovum, madp, mobile app, application development, ovum decision matrix, platform, networking, software development, wireless, enterprise applications
    
OutSystems
Published By: IBM     Published Date: May 16, 2016
Across industries, customers today wield more power and greater choice than ever before – a power that they exercise by shifting their attention and spending (across multiple channels/devices in near-real time) from provider to provider. In this environment of hyper-connectedness and diminishing customer loyalty and fleeting human attention spans, the battle for holding customer interest and engaging him/her meaningfully requires, first and foremost, an everlasting commitment to "relevance. "Being relevant and demand-driven is of paramount importance to the media industry, but it is no less important to any industry that operates in a B2C world. However, adapting to the ever-rising expectations and changing buying behaviors of customers is becoming a Herculean task, requiring both business and technology transformation.
Tags : 
ibm, ovum, customer veiwership, customer behavior, cross-plaform, cloud, analytic architecture
    
IBM
Published By: CDW     Published Date: Nov 12, 2012
In organizations of every size, data center optimization has become an ongoing focus of attention.
Tags : 
data center optimizations, data centers, converged infrastructure, reference architecture, data center
    
CDW
Published By: Polycom     Published Date: Mar 13, 2015
The days are gone when health issues would be treated clinically in isolation from the many other factors that affect the wellbeing of individuals and communities. Today, the rising costs of health care, an aging population and increasingly complex chronic health problems are driving greater focus and attention on population health — the health outcomes of a group of individuals within a population. Indeed, these days more proactive approaches to health care and care delivery are identifying the social determinants of health for various populations such as environmental conditions, economic status, and access to resources and support.
Tags : 
health problems, social care, readmission, hospital, video solutions, telehealth, improving costs, aging population, economic status
    
Polycom
Published By: Schneider Electric     Published Date: Feb 12, 2018
Small server rooms and branch offices are typically unorganized, unsecure, hot, unmonitored, and space constrained. These conditions can lead to system downtime or, at the very least, lead to “close calls” that get management’s attention. Practical experience with these problems reveals a short list of effective methods to improve the availability of IT operations within small server rooms and branch offices. This paper discusses making realistic improvements to power, cooling, racks, physical security, monitoring, and lighting. The focus of this paper is on small server rooms and branch offices with up to 10kW of IT load.
Tags : 
    
Schneider Electric
Published By: Schneider Electric     Published Date: Feb 12, 2018
Small server rooms and branch offices are typically unorganized, unsecure, hot, unmonitored, and space constrained. These conditions can lead to system downtime or, at the very least, lead to “close calls” that get management’s attention. Practical experience with these problems reveals a short list of effective methods to improve the availability of IT operations within small server rooms and branch offices. This paper discusses making realistic improvements to power, cooling, racks, physical security, monitoring, and lighting. The focus of this paper is on small server rooms and branch offices with up to 10kW of IT load.
Tags : 
    
Schneider Electric
Published By: F5 Networks Inc     Published Date: Dec 08, 2017
There’s a reason why web application firewalls have been getting so much attention lately. It’s the same reason we keep hearing about major security and data breaches left, right, and center. Web application security is difficult—very difficult.
Tags : 
owasp, web application safety, data breaches, firewalls
    
F5 Networks Inc
Published By: ChannelAdvisor     Published Date: Jan 17, 2019
"With millions of sellers and billions of products to compete with on marketplaces, it’s easy to get buried in data every day — and still feel behind. And this is now true across almost all product verticals, as more and more niche categories become intense competitive battlegrounds. Shoppers know they have multiple options for purchasing the same item, and it’s no longer your product descriptions and images alone that capture attention. If you want to consistently rise to the top of results, a structured pricing strategy is a must. In this eBook, you’ll learn: - Complications of marketplace pricing - Benefits of strategic pricing - Pricing best practices - And more"
Tags : 
    
ChannelAdvisor
Published By: Symantec Corporation     Published Date: Feb 25, 2014
Android is on the rise. Unfortunately, popularity can also bring unwanted attention. While Android fans love the fact that it is an open development platform that offers developers the ability to build extremely rich and innovative applications, the same open nature of the Android platform is what makes it so attractive to malware creators. It’s high time for Android developers to increase their awareness of the pitfalls awaiting their users. This white paper focuses on the value of secure code signing practices for building more secure Android apps.
Tags : 
android, malware, android apps, secure code signing, symantec
    
Symantec Corporation
Published By: Symantec Corporation     Published Date: Jun 24, 2014
Android is on the rise. Unfortunately, popularity can also bring unwanted attention. While Android fans love the fact that it is an open development platform that offers developers the ability to build extremely rich and innovative applications, the same open nature of the Android platform is what makes it so attractive to malware creators. It’s high time for Android developers to increase their awareness of the pitfalls awaiting their users. This white paper focuses on the value of secure code signing practices for building more secure Android apps.
Tags : 
security, android, applications, code signing, software, developer, apps, software development
    
Symantec Corporation
Published By: Staples Business Advantage     Published Date: Jun 23, 2017
Every year, musculoskeletal disorders (MSDs) cost workplaces billions. See how attention to ergonomics can change that.
Tags : 
ergonomic, msd, improving productivity, musculoskeletal disorders
    
Staples Business Advantage
Published By: McAfee     Published Date: Feb 25, 2015
This report summarizes key steps organizations can take to harden their infrastructure, improve their responsiveness, and actively disrupt targeted attacks by paying attention IoAs
Tags : 
siem, real-time siem, attacks, real-time security, mcafee, attack prevention, targeted attacks, siem solution, siem security, security, security intelligence solution
    
McAfee
Published By: McAfee     Published Date: Feb 25, 2015
This report summarizes key steps organizations can take to harden their infrastructure, improve their responsiveness, and actively disrupt targeted attacks by paying attention IoAs.
Tags : 
siem, real-time siem, attacks, real-time security, mcafee, attack prevention, targeted attacks, siem solution, siem security, security, security intelligence solution
    
McAfee
Published By: Zendesk     Published Date: Jan 03, 2019
To successfully meet customer demands for more immediate, personalized attention, companies are leveraging new technologies that go beyond traditional voice and email. By implementing such channels as live chat, social media, mobile apps, SMS/text messages, self-help solutions, and more, companies can now be ready wherever and however the customer wants. The following report, sponsored by Zendesk, is based on an online survey of 1,044 U.S. consumers who have received online or phone customer service. The research goal was to better understand present customer expectations and to quantify the impact of customer service on business results. Questions were asked about past experiences with customer service, as well as preferences and opinions. Certain questions were repeated from a similar 2013 survey to enable trend analysis.
Tags : 
    
Zendesk
Published By: Aria Systems     Published Date: Sep 21, 2015
After featuring the Global Giants in our first edition of Recurring Revenue Innovators, we now turn our attention to the Emerging Leaders—businesses with terrific potential to break out into commercial success with a new revenue model. From subscriptions to usage to tiered and freemium models, these companies are offering products and services on terms that are irresistibleto their customers.
Tags : 
    
Aria Systems
Published By: SAS     Published Date: Aug 03, 2016
With this increased attention on building a brand as a strategic differentiator, how are marketers approaching it? A recent eMarketer global survey revealed that nearly 56 percent of marketers would increase spending on brand-building activities over the next year compared to 42 percent who said they would be focusing on demand generation. Brand awareness was a higher priority for marketers than demand generation, global business expansion efforts or event spending.
Tags : 
best practices, marketing, demand generation, business expansion, emarketer
    
SAS
Published By: PODS for Business     Published Date: Jul 24, 2017
The constant churn of product selection is not just time-consuming, it requires meticulous attention to detail, a reliable product tracking system, and significant physical space. Mastering inventory results in much more than simply organizational improvements. It can lead to increased revenues, better theft control, improved forecasting and budget setting, and even smoother customer service.
Tags : 
inventory, management, efficiency, theft control, revenue
    
PODS for Business
Published By: Microsoft Azure     Published Date: Apr 10, 2018
Help your sellers work smarter and build stronger relationships Sales teams work so hard, they can burn out quickly. It’s tough when customer contacts, sales goals, productivity tools, and social networking are all separated and siloed. Instead of working in separate systems that make day-to-day selling complex, you can help simplify the way your sellers work. And empower your team to be more productive and efficient. Our e-book, “The Savvy Seller’s Guide to Building Profitable Relationships,” is packed with advice for making selling much less painful—and more profitable. Did you know if your lead has had prior exposure to content from your company’s brand, that they’re 25% more likely to respond to your InMail? You’ll find this and more helpful facts in the e-book, including actionable insights to help your team: Identify the right leads—including pinpointing who’s on the buying committee Capture buyers’ attention Use insights and predictive intelligence from AI and machine learni
Tags : 
    
Microsoft Azure
Published By: Cisco     Published Date: Nov 17, 2014
Modern data centers have and continue to undergo transformation. Driven by familiar trends, green IT, endpoint growth, externalization, and increased resource requirements, modern data centers support more services, users, and data than ever before. The potential of new risks to the modern data center demands renewed attention to data center security. Data center architects must build in proper security controls, and policies and processes to address and mitigate these new risks.
Tags : 
endpoint proliferation, ids, ips, externalization, cisco, networking, security, software development, it management
    
Cisco
Published By: Akamai Technologies     Published Date: Nov 13, 2018
The ongoing adoption of cloud computing by communications service providers (CSPs) continues to fundamentally reshape their business models and technology strategies on several levels. One such area that is garnering significant attention is the impact of the cloud on security services. This is because security services and the vital tools they encompass can be empowered through the adoption of a carrier cloud model. This, in turn, better positions CSPs to meet the demands of their customers, including those in the small to medium-size business (SMB) market segment. The timing of this migration is optimal, since many SMBs now recognize the threats they face and realize that given their limited IT budgets and lack of security expertise, CSPs are well positioned to protect them from cyberattacks. While the opportunity for CSPs is significant, many are hesitant to make a move in this area because they want to ensure they can address SMBs’ needs and maintain control of the service in a car
Tags : 
    
Akamai Technologies
Start   Previous    1 2 3 4 5 6 7 8 9 10 11    Next    End
Search      

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.