Cookie policy: This site uses cookies (small files stored on your computer) to simplify and improve your experience of this website. Cookies are small text files stored on the device you are using to access this website. For more information on how we use and manage cookies please take a look at our privacy and cookie policies. Some parts of the site may not work properly if you choose not to accept cookies.

sections
 

critical

Results 26 - 50 of 2620Sort Results By: Published Date | Title | Company Name
Published By: Wheelhouse Enterprises     Published Date: Jul 02, 2010
Phone systems are a critical part of any business infrastructure. While phone system buyers read the buyers guides, research the different brands, and create elaborate RFPs, there is no substitute for learning from other phone system buyers' mistakes. Here is a list of 10 regrettable mistakes businesses have made when buying a phone systems.
Tags : 
wheelhouse, voip, business phone, sip, ecommerce, business infrastructure, communication, telephony
    
Wheelhouse Enterprises
Published By: Wheelhouse Technologies     Published Date: Mar 23, 2012
Phone systems are a critical part of any business infrastructure. Here is a list of 10 regrettable mistakes businesses have made when buying a phone system.
Tags : 
phone system, wheelhouse, wheelhouse, technologies, yachts, fleets, workboats, marine
    
Wheelhouse Technologies
Published By: Cyveillance     Published Date: Apr 10, 2015
In today’s security landscape, more vendors than ever are offering what is purported to be “threat intelligence.” Although security experts often have different definitions for this term, one thing many of them can agree on is that an intelligence-led approach to security – that is, putting threat intelligence to real-world use – is critical to protecting organizations. If the goal of an intelligence-led security strategy is to help organizations be more proactive in finding and preparing for threats to physical and digital assets, it’s crucial to define and understand exactly what threat intelligence means, and separate fact from fiction. In this whitepaper, we dispel some common myths about threat intelligence.
Tags : 
myths, cyber, threat, intelligence, fact, fiction, big data, cloud
    
Cyveillance
Published By: WatchGuard Technologies     Published Date: Apr 21, 2010
With these ten critical questions as your guide, you can cut through the marketing hype and zero in on the key features and benefits that should guide your decision.
Tags : 
watchguard technologies, anti spam, security, tco, xcs, anti-phishing, data loss prevention, encryption
    
WatchGuard Technologies
Published By: Metalogix     Published Date: Jan 10, 2014
Microsoft SharePoint is the fastest growing product in Microsoft history. Its adoption rate has been exponential with millions of documents being stored daily. With its growth, critical documents and procedures are now being stored in SharePoint. It is fundamental that SharePoint maintains its healthy status, and application performance is a key component for a successful deployment, adoption and monitoring of SharePoint.
Tags : 
sharepoint, sharepoint performance, sharepoint adoption, optimize sharepoint, sharepoint diagnostics, sharepoint tuning, sharepoint performancetuning, sharepoint performance monitoring
    
Metalogix
Published By: Uberall     Published Date: Oct 08, 2018
Your store locator is a critical component on your website; it’s the moment of truth when an online shopper becomes and offline customer. And while it may seem like a simple tool, there are several key factors that will transform the user experience from functional to best-in-class. See how you can optimize this key aspect of your customer journey.
Tags : 
store, locator, experience, optimize, local marketing, customer journey
    
Uberall
Published By: Uberall     Published Date: Apr 12, 2019
Your store locator is a critical component on your website; it’s the moment of truth when an online shopper becomes an offline customer. And while it may seem like a simple tool, there are several key factors that will transform the user experience from functional to best-in-class. See how you can optimize this key aspect of your customer journey.
Tags : 
locator, uberall, store locator, location marketing, local listings
    
Uberall
Published By: Lumesse     Published Date: May 15, 2015
This paper explores how critical it is to have an agile talent management strategy in place. Being mobile and social are key to attracting, developing and retaining the cream of Gen Z.
Tags : 
gen z, employees, retain talent, talent management, strategy, generation z, workplace, hr trends
    
Lumesse
Published By: eFax     Published Date: May 15, 2007
If faxing is a critical component to your business, you want to be sure you make a wise decision on how to do it. This paper offers 10 tips to help you sort through the myriad of choices in order to get the best combination of features and flexibility.
Tags : 
fax, faxing, ip faxing, ip telephony, fax over ip, efax, infrastructure, ip networking
    
eFax
Published By: Cleo     Published Date: Jan 03, 2017
Modern MFT is designed to connect all of your information sources and consumers in a way that drives business agility with a simple user experience to manage data movement across your organization and beyond. With legacy and outsourced MFT technologies, companies are at a disadvantage when it comes to managing business-critical file transfers. Read this white paper to learn 10 considerations when evaluating the capabilities of your existing MFT solution or a replacement to help your business better meet existing and future use-case requirement.
Tags : 
cleo, mft, mft technology, file transfer, b2b integration, enterprise applications
    
Cleo
Published By: Mimecast     Published Date: Nov 28, 2017
With the healthcare industry as the #1 target for ransomware attacks, it’s critical to ensure steps are taken to prevent, detect and respond to these attacks without downtime – and without loss of patient data. A multi-layered approach to protective controls – including a Secure Email Gateway (SEG) with advanced threat protection capabilities – will start your healthcare organization on the right path to ransomware resilience. Download and use this top 10 list of how to protect your organization now. Use it as a reference tool for frequent health checks of your own ransomware resilience program.
Tags : 
healthcare, ransomware, ransomware attack, seg, secure email gateway
    
Mimecast
Published By: Skillsoft     Published Date: Apr 01, 2011
Equipping the workforce with the critical perspectives and peripheral vision it needs to be business effective has become one of the single most vexing challenges facing organizations today. SkillSoft's 10x10x10 framework can help.
Tags : 
skillsoft, 10x10x10 framework
    
Skillsoft
Published By: SkillSoft MKG     Published Date: Oct 09, 2010
Equipping the workforce with the critical perspectives and peripheral vision it needs to be business effective has become one of the single most vexing challenges facing organizations today. SkillSoft's 10x10x10 framework can help.
Tags : 
skillsoft, 10x10x10 framework, global workforce, framework
    
SkillSoft MKG
Published By: ServiceSource     Published Date: Nov 01, 2013
How strong is your renewal program? Are you able to predict and analyze your performance correctly? ServiceSource® believes that the real yardstick of renewal performance lies in a comprehensive set of key performance indicators (KPIs) that can tell a much broader story. Over the last 13 years and over 145 engagements, we’ve identified these twelve critical factors for successfully measuring and growing your renewal revenue. This whitepaper provides a detailed overview of those KPIs.
Tags : 
reducing customer churn, servicesource, maximize revenue, essential kpis, renewal opportunity, renewal results, sales process, performance drivers
    
ServiceSource
Published By: LogMyCalls     Published Date: Oct 20, 2014
We analyzed millions of calls in Q1, and there's gold to be mined out of every customer conversation, data that will improve marketing.
Tags : 
call tracking, conversation analytics, marketing analytics, business intelligence, big data, call intelligence, marketing conversion rate, prove roi
    
LogMyCalls
Published By: Active Power     Published Date: Aug 30, 2011
This paper discusses the methods of implementing a short ride through system with higher reliability and predictability than with traditional methods
Tags : 
caterpillar, electrical and electronic, backups, caterpillar inc., high availability, backup power, backup power supply, battery backup
    
Active Power
Published By: AppZen     Published Date: Jun 17, 2019
Modern finance teams are embracing AI to audit their invoice-based spend. With AI, they can review all of their invoices prior to payment to spot errors, fraud, and contract violations. AppZen customers have identified 16 critical invoice audit and contract compliance use cases that only AI can make possible.
Tags : 
    
AppZen
Published By: PEER 1 Hosting     Published Date: Dec 16, 2013
A Peer1 Guide to Ramping up eCommerce Websites for the Holidays : 18 Critical Steps to Prepare Your Site for Seasonal Traffic.
Tags : 
peer 1 hosting, seasonal traffic, peer1 guide, ecommerce, website traffic, holiday revenues
    
PEER 1 Hosting
Published By: CEB     Published Date: Dec 05, 2013
This short guide will help you to understand the short-term priorities for your department by comparing the importance allocated to each critical activity against its organizational effectiveness.
Tags : 
legal services, legal strategies, managing counsel
    
CEB
Published By: Viavi Solutions     Published Date: Mar 21, 2016
At Viavi Solutions® we’ve had the benefit of observing a number of hybrid cloud deployments up close. All sectors of IT users—from small to large enterprises, governmental groups, and even cloud service providers (CSPs) who themselves have begun to offer managed cloud services from third-party platforms—touch the hybrid cloud environment. CIOs, especially, face new challenges in deploying or expanding their enterprise presence in the cloud. This white paper examines four critical areas—migration, security, costs, and visibility—where CIOs can make major differences in the successful execution of hybrid cloud strategies. We’ve listed 20 fundamental questions CIOs can discuss with both their internal deployment groups and their external CSP/system integrator in preparation for a migration to or an expansion of hybrid cloud services.
Tags : 
viavi solutions, hybrid clouds, networking, it management, wireless, enterprise applications
    
Viavi Solutions
Published By: Viavi Solutions     Published Date: Apr 14, 2017
At Viavi Solutions® we’ve had the benefit of observing a number of hybrid cloud deployments up close. All sectors of IT users from small to large enterprises, governmental groups, and even cloud service providers (CSPs) who themselves have begun to offer managed cloud services from third-party platforms—touch the hybrid cloud environment. CIOs, especially, face new challenges in deploying or expanding their enterprise presence in the cloud. This white paper examines four critical areas—migration, security, costs, and visibility—where CIOs can make major differences in the successful execution of hybrid cloud strategies. We’ve listed 20 fundamental questions CIOs can discuss with both their internal deployment groups and their external CSP/system integrator in preparation for a migration to or an expansion of hybrid cloud services.
Tags : 
cloud privacy, cloud security, cloud management, cloud assurance, cloud visibility, enterprise management, data management
    
Viavi Solutions
Published By: AdRoll     Published Date: Oct 29, 2014
In this guide, we’ll help you set up the most successful retargeting campaigns during the critical holiday time of year.
Tags : 
retargeting campaigns, consumer behavior, desktop retargeting, mobile retargeting, roi, consumer targeting
    
AdRoll
Published By: Citrix Systems, Inc.     Published Date: Jan 27, 2016
Gartner evaluates nine vendors’ enterprise mobility management (EMM) solutions against 11 critical capabilities in the 2015 Critical Capabilities for Enterprise Mobility Management Suites report.
Tags : 
citrix, gartner, enterprise, mobility, management, mobility, ip telephony, network security
    
Citrix Systems, Inc.
Published By: Cisco     Published Date: Nov 17, 2015
The introduction of innovative new form factors, software infrastructure and cloud services is reshaping enterprise video collaboration. The following vendors offer potential for greater reach, scale and interoperability while addressing the most critical video use cases.
Tags : 
cisco, gartner, magic quadrant, video collaboration, enterprise videos, it management, enterprise applications
    
Cisco
Published By: Dice     Published Date: Jul 01, 2015
As the federal workforce nears retirement age, it is crucial for the government to hire members of the millennial generation, particularly in the mission-critical fields of science, technology, engineering and math where there is stiff competition with the private sector.
Tags : 
recruiting, management, talent, connectivity. culture, millenial
    
Dice
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.