Cookie policy: This site uses cookies (small files stored on your computer) to simplify and improve your experience of this website. Cookies are small text files stored on the device you are using to access this website. For more information on how we use and manage cookies please take a look at our privacy and cookie policies. Some parts of the site may not work properly if you choose not to accept cookies.

sections
 

dev

Results 51 - 75 of 5977Sort Results By: Published Date | Title | Company Name
Published By: ttec     Published Date: Jul 24, 2019
By the time most customers reach a human employee with a question, chances are they have already researched online or tried to self-serve. This means employee transformation is required to develop more sophisticated employees in the age of automation to solve more advanced customer issues. Because front-line jobs are becoming more complex, employees need to be tactical, technical, and ready to emotionally handle these new types of interactions. Recently, Lamont Exeter, head of Learning & Development at TTEC Digital, teamed up with Tim Duranleau of SAP Litmos in a webinar to discuss ways that companies can combine learning and technology to create more sophisticated employees. Below are some key highlights from the discussion.
Tags : 
    
ttec
Published By: Panasonic     Published Date: Apr 23, 2019
Technology is critical to mission success. However, hostile physical environments and specialized use cases put more stringent demands on mobile devices being used by the U.S. Navy and U.S. Marine Corp (USMC). Robert Murphy describes the unique requirements for these programs.
Tags : 
    
Panasonic
Published By: Panasonic     Published Date: Apr 23, 2019
Thousands of federal employees are issued mobile devices every year to carry out their agency’s mission. The government has strict security standards for such devices, but a new poll by Government Business Council (GBC) suggests that employee perceptions may be at odds with organizational priorities regarding security of these mobile devices.
Tags : 
    
Panasonic
Published By: Panasonic     Published Date: Apr 23, 2019
Mobility is critical to government productivity, but mobile data and devices present attractive targets to cybercriminals seeking to exploit vulnerabilities across the spectrum. Federal agencies are no strangers to cybersecurity attacks, and several recent high-profile breaches involving mobile devices demonstrate ongoing vulnerabilities in government’s expanding network of endpoints. This issue brief describes what can be done to protect devices, data and networks, including multi-factor authentication to authorization controls and user education.
Tags : 
    
Panasonic
Published By: Virtela Communications, Inc.     Published Date: Oct 13, 2011
Christian Kane is an Enterprise Mobility Management Research Analyst with Forrester Research, where he helps clients develop and improve their desktop and mobile strategy. His research spans mobile hardware, mobile operating systems, mobile device management solutions, and mobile applications.
Tags : 
cloud computing, technology, virtela, device management, christian kane, mobility management, research
    
Virtela Communications, Inc.
Published By: Coyote Point Systems     Published Date: Sep 07, 2010
If your organization's servers run applications that are critical to your business, chances are that you'd benefit from an application delivery solution. Today's Web applications can be delivered to users anywhere in the world and the devices used to access Web applications have become quite diverse.
Tags : 
coyote point, adc, buyer's guide, web applications, server load, server hardware, networking, load balancing, network architecture, network management, servers, small business networks
    
Coyote Point Systems
Published By: Coyote Point Systems     Published Date: Sep 02, 2010
The idea of load balancing is well defined in the IT world: A network device accepts traffic on behalf ofa group of servers, and distributes that traffic according to load balancing algorithms and the availabilityof the services that the servers provide. From network administrators to server administrators to applicationdevelopers, this is a generally well understood concept.
Tags : 
coyote point, adc, buyer's guide, web applications, server load, server hardware, networking, virtualized network, vlb advanced, load balancing, network architecture, servers, traffic management, cloud computing, data center design and management
    
Coyote Point Systems
Published By: Adobe     Published Date: Jun 26, 2019
Like the oxygen we breathe, journey analytics brings life to the customer behind those devices, over time getting to know their favorite pastry choice, when they’re most likely to buy gas, and how long they stay online while in the station’s café. If you want your customers to enjoy seamless, personalized experiences, you need to treat them like people. That means marketing to the person — not the device. When you know a customer’s interests, wants, and needs — perhaps even before they do — you’ve succeeded at becoming a true experience business. For some, this may require a shift from analytics as a tool to analytics as a way of life. It may also mean evolving corporate or office culture.
Tags : 
    
Adobe
Published By: Adobe     Published Date: Jun 26, 2019
Customers expect to have the same experience with a store no matter where they are shopping – in a brick and mortar location, on the store’s website via laptop or on the store’s app via mobile device. Combining online and offline data helps retailers stay informed about their customers so they can drive customer loyalty and increase revenue.
Tags : 
    
Adobe
Published By: Adobe     Published Date: Jun 26, 2019
Email marketing still work really well. But the world of email is changing. The inbox is fragmented like never before. Messages have to be more relevant, delivered at the right time, and still be considered important enough to read. If any of the signs in this piece sound familiar, it may be time for your organization to put a plan in place to move from ‘sending emails’ to developing a marketing automation program that meets the needs of your customers better.
Tags : 
    
Adobe
Published By: Adobe     Published Date: Jun 26, 2019
It’s your first cruise vacation and you’re ready to board. You check one last time to be sure the smart wristband the cruise line sent you last week is securely fastened. Then you join the rest of the crowd on the dock. As you calculate which boarding line is shortest, a crew member glances at your wristband and directs you to a special entrance. No waiting. Once at your room, a sensor verifies the ID in your device and the door opens automatically, saving you from having to juggle bags to find a key.
Tags : 
    
Adobe
Published By: Juniper Networks     Published Date: Jul 29, 2019
Get the Secrets to Designing a Resilient, Secure Campus Network. Download our 2019 buyer's guide to learn more. It’s challenging to design, deploy, and manage a campus network. Adding to this, aging equipment can slow your network down and hinder your ability to advance IT innovations that help keep your business competitive. What's more, the proliferation of devices and IoT sensors can expose your network to cyberattacks and other security threats. Our 2019 Buyer’s Guide can help you modernize your campus network, reducing OpEx while delivering a richer, more reliable user experience. Learn about the key trends and challenges that shape your campus network design and the essential considerations that should influence your selection process.
Tags : 
multiprotocol label switching (mpls), switching, ethernet network services, data center design, data center management
    
Juniper Networks
Published By: Juniper Networks     Published Date: Jul 31, 2019
More than 80% of organizations in Asia are not protected against today's threats. Many of them depend on security investments made years ago, which cannot defend against new and emerging threats. The arrival of new technologies including cloud computing, the Internet of Things, mobility, bring your own device (BYOD), and social media have massively increased attack surfaces and expanded the threat landscape. New agile solutions are required that can address today's threats and enable organizations to adjust their security posture as the threat landscape evolves. Download this whitepaper to know more about key recommendations including: • Working with third parties to evaluate your current cybersecurity posture and identify vulnerabilities • Upgrading and update your cybersecurity assets with a particular focus on ensuring that firewalls are upgraded • Ensuring that your organization has a unified view of your assets and the threat environment
Tags : 
network management, network security, network security appliance, security, security architecture
    
Juniper Networks
Published By: Cohesity     Published Date: Aug 09, 2019
IT organizations everywhere are undergoing significant transformation to keep pace with the needs of their businesses. They’re tasked with consolidating data centers and migrating both workloads and data to the cloud. The transition has been easier for some than others. As hybrid architectures increasingly become the norm, how are enterprises gaining complete visibility, simplifying management, and making use of all of their data—both on-premises and in the cloud? Five enterprises explain how they’ve replaced multiple products that created legacy data silos with Cohesity – a single, hyperconverged softwaredefined platform with native Microsoft Azure integration for simplified secondary data and applications. For them, Cohesity and Azure together boost IT agility while lowering costs, solving critical secondary data challenges from long-term retention, storage tiering, test/dev, disaster recovery and cloud-native backup in a proven hybrid cloud architecture.
Tags : 
    
Cohesity
Published By: Cohesity     Published Date: Aug 09, 2019
Data for secondary workloads – backup, test/dev, disaster recovery, and archiving to name a few – have become siloed the same way application data has, leading to multiple point solutions to manage an increasing amount of data. This white paper looks at the evolution of these challenges and offers practical advice on ways to store, manage and move secondary data in hybrid cloud architectures while extracting the hidden value it can provide.
Tags : 
    
Cohesity
Published By: Cohesity     Published Date: Aug 09, 2019
An Italian bank with an appetite for innovation and infrastructure standardization, automated, and cloud-ready Cohesity Data platform. In two years, the organization has simplified its secondary stage environment with a single data management pane to improve backup SLAs, cut costs, and deliver up-to-date and relevant data for test & dev and analytics teams at scale to test fast, fail fast, and innovate fast.
Tags : 
    
Cohesity
Published By: NEC     Published Date: Sep 29, 2009
Written by: IDC Abner Germanow, Jonathan Edwards, Lee Doyle IDC believes the convergence of communications and mainstream IT architectures will drive significant innovation in business processes over the next decade.
Tags : 
it architecture, idc, automation, automated order processing, soa, service oriented architecture, soap, http, xml, wsdl, uddi, esbs, jee, .net, crm, san
    
NEC
Published By: Genesys     Published Date: Jun 19, 2019
Successfully managing a contact center requires a collaborative, multidisciplinary approach to handle a broad range of operational and tactical tasks. Planning, day-to-day operations and quality management must be seamlessly orchestrated, along with human resources functions like recruitment, learning and development, and employee scheduling. Read this executive brief to learn how to transition to an AI strategy that can take your team – and business results – to the next level. See how you can: Create an AI strategy with a single data model that includes routing, interaction analytics, forecasting/scheduling and predictive engagement Harness the power of your data to align customers with the best resource Drive employee effectiveness by ensuring you hire the right people and manage their performance to drive their success over the long term
Tags : 
    
Genesys
Published By: MuleSoft     Published Date: Apr 15, 2019
Financial services has seen more disruptive technologies introduced over the past three years than any other industry. To meet customer expectations for on-demand delivery, banks must look beyond digitizing existing services and establish open banking platforms for connected digital services. Read this whitepaper to learn: Three strategic mindsets that drive digital transformation in banking. A four step strategy for building an Open Banking digital platform strategy with APIs. How one global top tier bank developed a digital platform to transcend disjointed customer experiences.
Tags : 
    
MuleSoft
Published By: MuleSoft     Published Date: Jun 27, 2019
Banks of all sizes, from multinational firms to regional credit unions, face unparalleled pressure to digitally transform in the face of evolving customer expectations. Learn how a top 10 bank partnered with MuleSoft to address these pressures by developing an application network to rapidly modernize legacy systems, digitally transform mortgage lending, and accelerate Salesforce implementation. Read this whitepaper to learn: How banks can leverage APIs to accelerate integration between core banking systems, legacy applications, and modern SaaS endpoints. The step-by-step approach a top 10 bank took to build a Center for Enablement (C4E) and transform their SDLC to accelerate application development. How the bank created unified customer experiences across different product lines, from mortgages to wealth management, across in-person, and digital engagement channels.
Tags : 
    
MuleSoft
Published By: Drift     Published Date: Aug 05, 2019
This guide is used to deploy conversational sales to your sales development team. It will answer the following questions: • How to introduce live chat to your sales team • How to analyze good and bad conversations • How to coach your team to have better conversations • How to align a sales development representative (SDR) team with account executives and a marketing team This handbook uses the Conversational Framework to inform how you engage with, understand, and recommend the right thing to the right buyers at the right time
Tags : 
    
Drift
Published By: Ounce Labs, an IBM Company     Published Date: Jan 26, 2010
A range of application security tools was developed to support the efforts to secure the enterprise from the threat posed by insecure applications. But in the ever-changing landscape of application security, how does an organization choose the right set of tools to mitigate the risks their applications pose to their environment? Equally important, how, when, and by whom are these tools used most effectively?
Tags : 
owasp, ounce wagner, csrf, xss, cross-site scripting, sql, security management strategy, source code analysis, web application firewalls, web application scanner
    
Ounce Labs, an IBM Company
Published By: Ounce Labs, an IBM Company     Published Date: Dec 29, 2009
Countless studies and analyst recommendations suggest the value of improving security during the software development life cycle rather than trying to address vulnerabilities in software discovered after widespread adoption and deployment. The justification is clear.For software vendors, costs are incurred both directly and indirectly from security flaws found in their products. Reassigning development resources to create and distribute patches can often cost software vendors millions of dollars, while successful exploits of a single vulnerability have in some cases caused billions of dollars in losses to businesses worldwide. Vendors blamed for vulnerabilities in their product's source code face losses in credibility, brand image, and competitive advantage.
Tags : 
source code vulnerability testing, independent model, centralized model, distributed model, software development life cycle, source code scanning, application security, source code security testing
    
Ounce Labs, an IBM Company
Published By: Attivio     Published Date: Aug 20, 2010
With the explosion of unstructured content, the data warehouse is under siege. In this paper, Dr. Barry Devlin discusses data and content as two ends of a continuum, and explores the depth of integration required for meaningful business value.
Tags : 
attivio, data warehouse, unified information, data, content, unstructured content, integration, clob, blob
    
Attivio
Published By: ASG Software Solutions     Published Date: Jun 08, 2008
As organizations have improved service delivery, they have also turned their focus to presenting business value more positively. These organizations are beginning to develop true BSM systems in two ways: by understanding the metrics that successful businesses employ to determine the value of IT, and by linking these metrics and associated business services to IT infrastructure components.
Tags : 
asg, cmdb, bsm, metadata, metacmdb, lob, ecommerce, bpm, workflow, itil, cmdmdb, service optimization
    
ASG Software Solutions
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.