Cookie policy: This site uses cookies (small files stored on your computer) to simplify and improve your experience of this website. Cookies are small text files stored on the device you are using to access this website. For more information on how we use and manage cookies please take a look at our privacy and cookie policies. Some parts of the site may not work properly if you choose not to accept cookies.

sections
 

generation

Results 201 - 225 of 1581Sort Results By: Published Date | Title | Company Name
Published By: Hewlett Packard Enterprise     Published Date: Oct 23, 2017
Midsized firms operate in the same hypercompetitive, digital environment as large enterprises—but with fewer technical and budget resources to draw from. That’s why it is essential for IT leaders to leverage best-practice processes and models that can help them support strategic business goals such as agility, innovation, speed-tomarket, and always-on business operations. A hybrid IT implementation can provide the infrastructure flexibility to support the next generation of high-performance, data-intensive applications. A hybrid foundation can also facilitate new, collaborative processes that bring together IT and business stakeholders.
Tags : 
digital environment, hyper competitive, business goals, hybrid it, technology, hpe
    
Hewlett Packard Enterprise
Published By: Soffront     Published Date: Aug 21, 2009
In the decade since customer relationship management (CRM) software first appeared on the market, implementation of the enterprise application suite that helps businesses find new customers, retain existing customers and otherwise increase revenues have gained a reputation as being risky ventures, subject to user rejection, cost overruns, and missed deadlines.
Tags : 
crm, customer relationship mangement, crm software, crm application, crm app, customer retention, customer satisfaction, lead generation
    
Soffront
Published By: Act-On     Published Date: Apr 18, 2014
In this report, we demystify lead nurturing, offering best practices that you can follow when developing your own winning program.
Tags : 
marketing automation, marketing, roi, benefits, grow your business, lead generation, social media, lead management strategy
    
Act-On
Published By: Act-On     Published Date: Aug 28, 2012
Experts Matt Heinz, President of Heinz Marketing, and Craig Rosenberg, VP of Sales and Marketing of Focus and The Funnelholic share the eight linear steps to getting started, and making lead scoring work for you.
Tags : 
lead scoring, best practices, act-on, lead generation
    
Act-On
Published By: SAP     Published Date: Jul 18, 2016
The workforce and the workplace are changing, and HR needs to evolve with them – to better manage a multigenerational talent pool, legions of external workers, and dispersed teams that collaborate digitally across time zones and cultures. Read the best practices guide to learn how to transform HR.
Tags : 
    
SAP
Published By: UBM Technology     Published Date: Oct 19, 2017
If you follow the advice outlined in this ebook, you’ll find that over time you’ll be able to cultivate a strong brand that your prospects and customers love and respond to. That, combined with a strong approach to lead generation, is a winning combination.
Tags : 
    
UBM Technology
Published By: Cisco     Published Date: Jul 08, 2016
Modern networks and their components are constantly evolving and traditional next-generation firewalls are not able to provide the level of protection organizations require. In this paper you will learn: • Why typical next-generation firewalls that focus primarily on application visibility and control offer an incomplete approach to threat defense • What organizations need to defeat advanced threats in a resource-constrained environment • What benefits you can gain with the Cisco Firepower™ Next-Generation Firewall (NGFW), the industry’s first fully integrated, threat-focused NGFW
Tags : 
    
Cisco
Published By: Cisco     Published Date: Dec 19, 2016
Today’s threat landscape has forced us, once again, to evolve how we think about and deliver effective security to protect endpoints (PCs, Macs, Linux, mobile devices, etc). Malware today is either on an endpoint or it’s headed there. Advanced malware is dynamic, can compromise environments from an array of attack vectors, take endless form factors, launch attacks over time, and can quickly exfiltrate data from endpoints. Such malware, including polymorphic and environmentally aware malware, is very good at masking itself and evading traditional security tools, which can lead to a breach. As a result, it’s no longer a question of “if” malware can penetrate defenses and get onto endpoints, it’s a question of “when”.
Tags : 
    
Cisco
Published By: IBM     Published Date: Apr 09, 2015
Driven by demands to unify and extend protection across a broad spectrum of threats, EMA sees in this trend the rise of Converged Network Security (CNS) systems that integrate a wide range of capabilities and break down silos in network defense more than ever before. Scott Crawford, Managing Research Director, Security and Risk Management at EMA Research highlights specific examples of the ways in which these converged security systems put today’s more advanced capabilities to work in practical application. The IBM Security Network Protection XGS 5000 is profiled as an example of this trend, delivering not only intelligence driven, application aware defense against a variety of threats, but also the extensibility required to equip today’s organizations to confront whatever may come tomorrow.
Tags : 
data security, ibm, converged network security, security risk, networking, security, it management
    
IBM
Published By: IBM     Published Date: Jul 15, 2015
In this report, EMA highlights specific examples of the ways in which these converged security systems put today’s more advanced capabilities to work in practical application.
Tags : 
network management, network security, enterprise management, security technology, converged security systems, application protocols, network architecture
    
IBM
Published By: IBM     Published Date: Feb 11, 2015
A number of network security technologies have arisen that claim to be the "next generation" of network defense - but what does this concept actually mean? How is the threat landscape changing the way we think about and deploy network security solutions? Scott Crawford, Managing Research Director, Security and Risk Management at EMA Research provides insight into what we can expect in the area of network security and how to leverage new technologies to meet today's security challenges in light of other considerations such as overall complexity and performance.
Tags : 
network security, threat landscape, network security solutions, network defense, security challenges, security, it management
    
IBM
Published By: IBM     Published Date: Apr 09, 2015
A number of network security technologies have arisen that claim to be the "next generation" of network defense - but what does this concept actually mean? How is the threat landscape changing the way we think about and deploy network security solutions? Scott Crawford, Managing Research Director, Security and Risk Management at EMA Research provides insight into what we can expect in the area of network security and how to leverage new technologies to meet today's security challenges in light of other considerations such as overall complexity and peformance.
Tags : 
data security, ibm, risk management, network security, security threat, networking, security, it management
    
IBM
Published By: LogiXML     Published Date: May 04, 2007
The term Business Intelligence 2.0 (BI 2.0) is cropping up more and more in the industry, generally referring to the next generation of BI just as Web 2.0 has come to refer to the next generation of the Web.
Tags : 
business intelligence, olap, data analysis, xml, ajax, collaborative bi, dashboards, reporting
    
LogiXML
Published By: HP - Enterprise     Published Date: Feb 06, 2013
We are children of the information generation. No longer tied to large mainframe computers, we now access information via applications, mobile devices, and laptops to make decisions based on real-time data.
Tags : 
big security, big data, secure data
    
HP - Enterprise
Published By: IBM     Published Date: Oct 13, 2017
Blue Hill provides guidance on 1) the Customer Journey leading to a new generation of analytic tools, 2) key value propositions associated with moving to tools such as IBM Cognos Analytics and IBM Watson Analytics, and 3) recommendations for best practices in maximizing the value of insightful and predictive analytics for enterprise data.
Tags : 
blue hill research, data analytics, ibm cognos, watson analytics, enterprise data
    
IBM
Published By: Intel     Published Date: May 22, 2017
While IMS is not new, complete virtualization of IMS (vIMS) is new. Network functions virtualization (NFV) provides operators with the ability to rapidly and inexpensively deploy, configure, launch, and upgrade services, which can lead to faster time to market and lower operating costs, providing an important competitive advantage against traditional CSPs and new OTT service providers. It can also reduce the business risk associated with new service introductions. This agility allows operators to offer trials of new service offerings on a much larger scale, leading to acceleration of new revenue generation.
Tags : 
    
Intel
Published By: Intel     Published Date: Aug 17, 2017
Virtualizing the IMS will bolster competitiveness for communications service providers. This Intel solution brief details how vIMS and NFV provides operators the ability to rapidly and inexpensively deploy, configure, launch, and upgrade services and provide a competitive advantage and accelerating new revenue generation.
Tags : 
    
Intel
Published By: First Data     Published Date: Apr 25, 2013
Traditional direct mail campaigns often deliver anemic response rates and direct mail campaigns sweetened with discounts don’t fare much better. Poor results combined with escalating printing and mailing costs and changing consumer expectations means that businesses must find more effective ways to get consumers’ attention.
Tags : 
direct mail, gift cards, prepaid incentive, coupon, call to action, incentive cards, direct marketing, customer experience
    
First Data
Published By: Arkadin     Published Date: Sep 11, 2013
Cost effective, simple to deploy, next generation HD video conferencing solutions are no longer limited to C-level boardrooms, today enabling face-to-face meetings at the knowledge worker level delivering high levels of engagement and increased productivity.
Tags : 
: video conferencing, video collaboration, cloud-based video conferencing, hd-video conferencing, mobile video conferencing, mobile video communications, enterprise video conferencing, saas video conferencing
    
Arkadin
Published By: Box     Published Date: Aug 13, 2014
This report explains how a new generation of secure, enterprise cloud services creates the opportunity to mitigate many of these security challenges by centralizing documents onto a single cloud platform.
Tags : 
security in the cloud, box, mobility, secure enterprise cloud services, centralisation of documents
    
Box
Published By: Box     Published Date: Aug 15, 2014
This report explains how a new generation of secure, enterprise cloud services creates the opportunity to mitigate many of these security challenges by centralizing documents onto a single cloud platform.
Tags : 
security in the cloud, box, mobility, secure enterprise cloud services, centralisation of documents, network security, cloud computing
    
Box
Published By: Box     Published Date: Aug 15, 2014
This report explains how a new generation of secure, enterprise cloud services creates the opportunity to mitigate many of these security challenges by centralizing documents onto a single cloud platform.
Tags : 
security in the cloud, box, mobility, secure enterprise cloud services, centralisation of documents
    
Box
Published By: Red Hat     Published Date: Nov 08, 2017
This BPM.com whitepaper examines the role of business process management (BPM) software in enabling physical things to be connected to digital processes in the context of the Internet of Things (IoT)—exploring both the required capabilities for the next generation of BPM platforms as well as the benefits offered by BPM and IoT.
Tags : 
digital transformation, digital interface, business process management, internet of things, big data
    
Red Hat
Published By: Brainshark     Published Date: Oct 16, 2013
With the time investment required to develop high quality marketing content, marketers aim to maximize the use, value and impact of the content for their varied audiences. To accomplish this, they need talent, technology and processes that help them “do more with less.” Inside this E-book, you'll hear from marketers that have found a way to easily combine the power of video, mobile and social media with their existing efforts to engage their audiences and drive demand generation.
Tags : 
video marketing, content marketing, marketing best practices, social media, viral video, inbound marketing, outbound marketing, tracking video
    
Brainshark
Published By: CA WA     Published Date: May 12, 2008
Enterprise Job Scheduling, once the back office function of Operations in the mainframe world, has evolved to become a critical factor in the real time enterprise (RTE). Think you know all there is to know about job scheduling? Take another look and learn how the next generation of job scheduling is evolving into IT Workload Automation, and how CA can help your company realize the real time enterprise.
Tags : 
roi, bpa, business process automation, ca wa, workload automation, job scheduling
    
CA WA
Start   Previous    2 3 4 5 6 7 8 9 10 11 12 13 14 15 16    Next    End
Search      

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.