Cookie policy: This site uses cookies (small files stored on your computer) to simplify and improve your experience of this website. Cookies are small text files stored on the device you are using to access this website. For more information on how we use and manage cookies please take a look at our privacy and cookie policies. Some parts of the site may not work properly if you choose not to accept cookies.

sections
 

cip

Results 126 - 150 of 1065Sort Results By: Published Date | Title | Company Name
Published By: Oracle     Published Date: Nov 22, 2018
Ever lost hot leads simply because they’re on the bottom of the pile of junk leads? Simply handing off huge lists of “leads” and then sitting back and expecting sales to call them is a recipe for disaster. After a few calls, most salespeople give up, deriding the leads as junk. And so the finger pointing begins For sales department to trust marketing’s leads, lead scoring needs to be a priority. Without it, many hot leads get tossed out with the cold leads. That’s a waste of time, money, and opportunity. 68%of top marketers report lead scoring as most responsible for improving revenue contribution of marketing. Read this guide for best practices on lead scoring and winning together with sales.
Tags : 
    
Oracle
Published By: VMware     Published Date: Sep 12, 2019
Despite massive spend to protect enterprise digital assets, security breaches are still on the rise. The disconnect between the level of investment and the volume and impact of attacks is largely attributed to outdated approaches that favor perimeter protection and point solutions despite a digital supply chain that is more distributed than ever. For these reasons and more, enterprises need to start thinking differently about cybersecurity. Security doesn’t need new products. It needs a new model. One that applies the principles of intrinsic security across the fabric of the organization, from the sales floor to the C-suite, from the infrastructure to the endpoint device. In this Essential Guidance executive brief, learn how intrinsic security differs from traditional security methods, and the steps CIOs need to take to operationalize this model for greater business agility without greater risk.
Tags : 
    
VMware
Published By: Dell     Published Date: Nov 13, 2017
In-house PC deployments can be expensive and time consuming and often times result in manual errors, short and long term support challenges, as well as delays in production system deployments. But new deployments don’t have to be hard. In this webinar, you will: 1. Learn about our newest client PC deployment offer ProDeploy Client Suite 2. Understand how we put our customers in control with the self-service portal TechDirect 3. Find out how ProDeploy Plus can help companies save up to 35%* on deployment time *Based on May 2016 Principled Technologies Report commissioned by Dell. Testing results extrapolated from a 10-system deployment to project time savings for larger deployment compared to in-house manual deployment. Actual results will vary.
Tags : 
    
Dell
Published By: Salesforce Commerce Cloud     Published Date: Jul 11, 2016
Several disruptive forces are at work across the globe, bringing in a new type of consumerism that is as personal as it is participatory. What is the impact on retailers? They’ve been forced out of their comfort zone and must extend their brand experience to wherever consumers want. Download this special report from Salesforce Commerce Cloud, formerly Demandware, for more on the democratization of retail.
Tags : 
demandware, retail, democratization of retail, operating environment, growth, customer experience, consumerism
    
Salesforce Commerce Cloud
Published By: Dell-EUC (Dell/Intel Logo) Webinar     Published Date: Nov 13, 2017
In-house PC deployments can be expensive and time consuming and often times result in manual errors, short and long term support challenges, as well as delays in production system deployments. But new deployments don’t have to be hard. In this webinar, you will: 1. Learn about our newest client PC deployment offer ProDeploy Client Suite 2. Understand how we put our customers in control with the self-service portal TechDirect 3. Find out how ProDeploy Plus can help companies save up to 35%* on deployment time *Based on May 2016 Principled Technologies Report commissioned by Dell. Testing results extrapolated from a 10-system deployment to project time savings for larger deployment compared to in-house manual deployment. Actual results will vary. Intel Inside®. Powerful Productivity Outside. Intel logo are trademarks of Intel Corporation or its subsidiaries in the U.S. and/or other countries.
Tags : 
    
Dell-EUC (Dell/Intel Logo) Webinar
Published By: 3D Systems     Published Date: May 15, 2019
Jigs and fixtures offer manufacturers a reliable process for delivering accurate, high-quality outcomes, whether for a specific part or feature, or for consistency across multiples of parts. Although the methodologies and materials for producing jigs and fixtures have evolved beyond the conventional metal tooling of years past, their position as a manufacturing staple remains constant due to the benefits they offer. This eBook discusses the use of additive manufacturing (AM) for jig and fixture applications, and demonstrates how production support can be improved in terms of speed, cost and functionality. The applications included within this eBook offer a mere glimpse at what is possible with AM for production support. The examples chosen illustrate opportunities for applying design principles and technology capabilities that are transferable across a wide range of applications.
Tags : 
    
3D Systems
Published By: NetApp     Published Date: Dec 05, 2016
Here are the five core principles for monetizing your storage like never before and winning more customer applications than ever for your cloud and hosted services. These are your keys to the next generation data center.
Tags : 
    
NetApp
Published By: NetApp     Published Date: Dec 05, 2016
An infographic showcasing the 5 architectural principles of the next generation data center including scale-out, guaranteed performance, automated management, data assurance and global efficiencies.
Tags : 
    
NetApp
Published By: CA Technologies     Published Date: Jun 27, 2014
Cet article examine deux approches du Zero Touch Deployment : une solution basée sur les scripts et une plate-forme d’automatisation de la mise en production. Il indique comment chacune de ces approches peut résoudre les principaux défis technologiques et organisationnels face auxquels se trouvent les organisations agiles lorsqu’elles décident d’implémenter un système de déploiement automatique.
Tags : 
application release automation, deploying releases, zero touch deployment, software development
    
CA Technologies
Published By: Blue Coat Systems     Published Date: Jul 18, 2013
Data breaches have become a fact of life for organizations of all sizes, in every industry and in many parts of the globe. While many organizations anticipate that at some point a non-malicious or malicious data breach will occur, the focus of this study is to understand the steps organizations are taking—or not taking--to deal with the aftermath of a breach or what we call the Post Breach Boom. Sponsored by Solera Networks, The Post Breach Boom study was conducted by Ponemon Institute to understand the differences between non-malicious and malicious data breaches and what lessons are to be learned from the investigation and forensic activities organizations conduct following the loss or theft of sensitive and confidential information. The majority of respondents in this study believe it is critical that a thorough post-breach analysis and forensic investigation be conducted following either a non-malicious or malicious security breach.
Tags : 
data, non-malicious, malicious, ponemon, solera network
    
Blue Coat Systems
Published By: BMC Software     Published Date: Jun 26, 2013
Cloud is not simply a new technology platform, it’s a new way of running your IT processes. Success changes relationships with users, with services and with operations. Learn what to anticipate as you embark on cloud – and how to ensure success not just in your datacenter, but in your business.
Tags : 
cloud management, hybrid cloud, cloud planning, cloud operations, cloud users, cloud process, it management, data center
    
BMC Software
Published By: Oracle     Published Date: Dec 31, 9999
Employee Services Systems and Technology Manager Trent Filth out talks about the benefits of choosing on-premises Oracle Fusion Human Capital Management.
Tags : 
pcl constructors inc, mobile, oracle, fusion, human capital management, hcm
    
Oracle
Published By: Oracle     Published Date: Aug 09, 2013
Paul Stephen, Sr. Program Manager of IT Operations at Zillow, and John Doel, Principal at KPMG, share lessons learned from Zillow’s Oracle Fusion HCM and Talent Management implementation.
Tags : 
fusion, hcm, customer, oracle
    
Oracle
Published By: Oracle     Published Date: Aug 15, 2013
Employee Services Systems and Technology Manager Trent Filthout talks about the benefits of choosing on-premises Oracle Fusion Human Capital Management.
Tags : 
pcl constructors inc, mobile, oracle, fusion, human capital management, hcm, enterprise applications, human resource technology
    
Oracle
Published By: Oracle     Published Date: Aug 15, 2013
Paul Stephen, Sr. Program Manager of IT Operations at Zillow, and John Doel, Principal at KPMG, share lessons learned from Zillow’s Oracle Fusion HCM and Talent Management implementation.
Tags : 
fusion, hcm, customer, oracle, enterprise applications, human resource technology
    
Oracle
Published By: Hewlett Packard Enterprise     Published Date: Jul 12, 2018
IT services such as mobile devices, smart applications and cloud-based services are transforming the way we live, work and communicate. Global technology services and businesses are embracing digital transformation, introducing Intelligent Spaces to unleash worker productivity and accelerate the pace of business. The workplace plays a critical role in an organization’s digital transformation. Forward-looking organizations recognize that you can’t build a digital business without building a digital workplace.
Tags : 
    
Hewlett Packard Enterprise
Published By: QAD     Published Date: Jan 19, 2018
QAD anticipa los problemas que pueden afectar a sus clientes y provee soluciones antes de que se den cuanta de que tienen un problema. Nos aseguramos de que nuestro producto no solo se ocupe de los principales retos si no que recomendamos soluciones para sus problemas, aparte de nuestras soluciones y servicios. Nuestro objetivo es ayudar a nuestros clientes a formar la Empresa Efectiva.
Tags : 
    
QAD
Published By: PGi     Published Date: Nov 07, 2018
Les webminaires diffèrent des réunions en ligne collaboratives basées sur l’échelle, le comportement des entreprises, les exigences des entreprises et les attentes des participants. Les webminaires sont des événements en temps réel avec de nombreuses personnes qui sont structurés, programmés, très évolutifs et qui offrent des présentations diffusées ainsi que le partage de l’écran, des votes, des sondages et des possibilités de chat. Par conséquent, ils exigent une organisation, une promotion, une réalisation et des calculs différents.
Tags : 
    
PGi
Published By: Rohde & Schwarz Cybersecurity     Published Date: Nov 28, 2017
According to many market research analysts, the global wireless access point (WAP) market is anticipated to continue its upward trajectory and to grow at an impressive compound annual growth rate (CAGR) of approximately 8% through 2020. Many enterprises are utilizing cloudcomputing technology for cost-cutting purposes, eliminating investments required for storage hardware and other physical infrastructures. With significant growth expected in Internet usage, particularly bandwidth consuming video traffic, WAP vendors need to enable their customers to monitor and improve device performance, improve end user experience, and enhance security. These customers include general enterprises that offer Internet access to patrons like airports, hotels, retail / shopping centers and so on. These external Internet access providers can differentiate themselves by offering optimum service through advanced network analytics, traffic shaping, application control, security capabilities and more.
Tags : 
utilization, challenges, dpi, benefits, airport, public, wifi, qoe
    
Rohde & Schwarz Cybersecurity
Published By: Schneider Electric     Published Date: Oct 28, 2019
Notre livre blanc « Éléments d’exploitation essentiels des centres de données » détaille 12 méthodes que vous pouvez utiliser pour élaborer une stratégie d’exploitation et de maintenance efficace. Outre des conseils et astuces pratiques, le livre blanc présente également les grandes lignes : ?Un cadre d’évaluation des programmes d’exploitation et de maintenance des centres de données ?Les 12 éléments d’un programme équilibré de gestion des installations ?Les principes de la « mentalité axée sur l’essentiel ». Entrez dans cet état d’esprit axé sur l’essentiel et téléchargez votre livre blanc gratuit dès aujourd’hui !
Tags : 
des centres de données, colocation, schneider electric
    
Schneider Electric
Published By: Schneider Electric     Published Date: Oct 28, 2019
Les modules préfabriqués sont plus rapides à déployer, plus prévisibles et permettent de réaliser plus d’économies que les centres de données traditionnels. Mais les avantages l’emportent-ils sur les inconvénients ? Le présent livre blanc répond à cette question et donne un aperçu de la situation : ? Les principales différences entre les modules préfabriqués et les centres de données traditionnels ? Les avantages et les inconvénients de chacun d’eux ? Quels environnements peuvent tirer le meilleur parti de l’approche modulaire préfabriquée ? Remplissez le formulaire pour obtenir une analyse complète des avantages et des inconvénients des modules préfabriqués pour les centres de données.
Tags : 
des centres de données, colocation, schneider electric
    
Schneider Electric
Published By: Adobe     Published Date: Mar 21, 2017
On 3 May 1978, Gary Thuerk sent an e-mail that later earned him the title “Father of Spam” (although understandably, he prefers to be called the “Father of E-marketing”). Thuerk, then a marketing manager for computer company Digital Equipment Corporation, sent a mass e-mail inviting recipients to one of two West Coast product demos for a new line of computers.
Tags : 
    
Adobe
Published By: Infomatica     Published Date: Jul 15, 2015
Read “What it take to deliver advanced analytics” to discover: Why so many analytics projects suffer and how to avoid the most common missteps The seven symptoms of bad data and how to spot them The six principles of intelligent data management and how to put them into practice so you can become a decision-ready enterprise
Tags : 
    
Infomatica
Published By: Schneider Electric     Published Date: Oct 17, 2016
Questo documento descrive dei principi di gestione esclusivi e fornisce una panoramica completa e di alto livello degli elementi necessari del programma per gestire uno stabilimento mission-critical in modo efficiente ed affidabile nel corso dell'intero ciclo di vita. Vengono forniti anche suggerimenti e consigli pratici di gestione.
Tags : 
    
Schneider Electric
Published By: Schneider Electric     Published Date: Oct 17, 2016
Questo documento descrive le cinque fasi del ciclo di vita della sala CED, identifica le attività e i problemi principali e offre suggerimenti pratici di gestione per i proprietari.
Tags : 
    
Schneider Electric
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.