Cookie policy: This site uses cookies (small files stored on your computer) to simplify and improve your experience of this website. Cookies are small text files stored on the device you are using to access this website. For more information on how we use and manage cookies please take a look at our privacy and cookie policies. Some parts of the site may not work properly if you choose not to accept cookies.

sections
 

person

Results 176 - 200 of 1853Sort Results By: Published Date | Title | Company Name
Published By: Akamai Technologies     Published Date: Apr 25, 2018
Today every business is focused on their customers, and finding ways to better understand and serve them with differentiated digital experiences. With all of the choices available, users have become highly demanding, and quickly lose patience and trust when web and mobile app experiences are poor. Today’s digital user demands rich, engaging content that is fresh, personalized, and fast. If your websites and mobile apps can’t deliver, they’re gone. This eBook will give you insight into: Monitor how users interact with your online applications by leveraging real user data Optimize behaviors that drive the most revenue impact across user locations and devices Validate whether the optimizations resulted in desired business outcomes using real-world situations
Tags : 
monitor, optimize, validate, digital, experiences
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Apr 25, 2018
Today every business is focused on their customers, and finding ways to better understand and serve them with differentiated digital experiences. With all of the choices available, users have become highly demanding, and quickly lose patience and trust when web and mobile app experiences are poor. Today’s digital user demands rich, engaging content that is fresh, personalized, and fast. If your websites and mobile apps can’t deliver, they’re gone. This eBook will give you insight into: Monitor how users interact with your online applications by leveraging real user data Optimize behaviors that drive the most revenue impact across user locations and devices Validate whether the optimizations resulted in desired business outcomes using real-world situations
Tags : 
monitor, optimize, validate, digital, experiences
    
Akamai Technologies
Published By: Salesforce Commerce Cloud     Published Date: Jul 11, 2016
Several disruptive forces are at work across the globe, bringing in a new type of consumerism that is as personal as it is participatory. What is the impact on retailers? They’ve been forced out of their comfort zone and must extend their brand experience to wherever consumers want. Download this special report from Salesforce Commerce Cloud, formerly Demandware, for more on the democratization of retail.
Tags : 
demandware, retail, democratization of retail, operating environment, growth, customer experience, consumerism
    
Salesforce Commerce Cloud
Published By: 3D Systems     Published Date: May 15, 2019
La technologie de Frittage sélectif par laser (SLS) est au cœur d'une tendance croissante à la fabrication personnalisée de masse et au prototypage fonctionnel. La disponibilité de technologies de fabrication additive, de matériaux et de finitions adaptés transforme la fabrication. La fabrication thermoplastique numérique directe à partir de données numériques offre une qualité exceptionnelle tout en ouvrant la porte à de nouveaux paramètres de conception que n'autorise pas le moulage par injection.
Tags : 
    
3D Systems
Published By: 3D Systems     Published Date: May 15, 2019
La tecnologia di sinterizzazione laser selettiva (SLS) è al centro dell'attenzione e in forte crescita nella produzione di massa personalizzata e nella prototipazione funzionale. Le giuste tecnologie additive, i materiali e le finiture stanno trasformando il modo di produrre. La manifattura termoplastica diretta digitale offre una qualità eccezionale che apre la porta a nuovi parametri di design non attuabili con il tradizionale stampaggio a iniezione. La produzione additiva di termoplastici evita anche i lunghi tempi di consegna e gli investimenti iniziali negli stampi e nelle attrezzature per lo stampaggio a iniezione. Se si misurano i pezzi finiti sui tre parametri: qualità, "time to market" e costo per metro cubo, in molte situazioni l'SLS industriale porta a una soluzione globalmente migliore.
Tags : 
    
3D Systems
Published By: Oracle     Published Date: Feb 28, 2018
In tutto il mercato, stiamo vivendo tutti una trasformazione digitale con il cloud e l'interruzione digitale sta cambiando il modo in cui vengono gestiti gli affari, come funzionano le persone e come funziona l'economia del business.
Tags : 
database oracle, enterprise, controllo qualità, data center, infrastruttura server, gestione archiviazione, oracle
    
Oracle
Published By: DellEMC and Intel® Xeon® processor     Published Date: Apr 13, 2017
AEW Energie in Svizzera utilizza l'hyper-converged infrastructure per ridurre i tempi di gestione e liberare personale da dedicare ad attività specializzate.
Tags : 
case study, hyper-converged infrastructure, hyperconvergence, cut costs, time management
    
DellEMC and  Intel® Xeon® processor
Published By: DellEMC and Intel® Xeon® processor     Published Date: Apr 13, 2017
AEW Energie, en Suisse, utilise l’infrastructure hyperconvergée pour réduire le temps de gestion et permettre au personnel de se concentrer sur les tâches spécialisées.
Tags : 
case study, hyper-converged infrastructure, hyperconvergence, cut costs, time management
    
DellEMC and  Intel® Xeon® processor
Published By: DellEMC and Intel® Xeon® processor     Published Date: Apr 13, 2017
Les plates-formes convergées Dell EMC ont permis au groupe ProMedica de déployer son système de gestion des dossiers médicaux personnels Epic et d’améliorer les soins prodigués aux patients, tout en favorisant la croissance.
Tags : 
case study, dell emc, hyperconvergence, converged platforms, converged infrastructure
    
DellEMC and  Intel® Xeon® processor
Published By: Dell EMEA     Published Date: Sep 09, 2019
Ingen kan jämföra sig med Dell när det kommer till livslängd. Våra maskiner har inte bara kapacitet, hanterbarhet och säkerhetsfunktioner som IT-avdelningen kan lita på, de är dessutom utformade för en lång livscykel vilket minskar avfalls- och återvinningskostnader. Det är inte konstigt att de har funnits så länge. Så ser bakgrunden ut, men hur är det med framtiden? Latitude 7400 2-i-1 använder den nya Dell Express-inloggningen. Den upptäcker att användaren är där, väcker systemet på ungefär en sekund och loggar in användaren med ansiktsigenkänning och Windows Hello. Användaren kan bara sätta sig vid skrivbordet och börja jobba, utan att behöva trycka på control-alt-delete eller sträcka sig till strömbrytaren. Det är faktiskt världens första PC som använder en närhetssensor driven av Intel® Context Sensing Technology. När användaren tar en paus upptäcker Latitude att personen har gått iväg och låser sig själv för att spara på batteriet och skydda datorn. Ladda ner det nu om du vill
Tags : 
    
Dell EMEA
Published By: Dell EMC     Published Date: May 09, 2019
Data security is a top priority and a daunting challenge for most organizations. Costly data breaches are incresing in number and sophiscation, and a growing list of regulations mandate that personal data be protected. At the same time, security technologies must not impede user productivity by creating obstacles or slowing performance, otherwise users might disable or circumvent them. A robust security strategy that includes authentication, encryption and advanced malware prevention enables an organization to keep data safe while enabling the way people work. Dell has conceived and executed an innovative securtiy strategy that provides date protection and threat prevention across an extensive line of products. Download this white paper from Dell and Intel® to learn more.
Tags : 
    
Dell EMC
Published By: CA Technologies     Published Date: Jun 27, 2014
Développement et production sont sur de mauvaises voies. Le développement se concentre sur des innovations plus rapides et sur la mise en oeuvre de nouveautés. La production a quant à elle pour objectif la stabilité, le contrôle et la prévisibilité. Souvent, ces deux équipes ne dépendent pas des mêmes personnes dans l’organisation. Elles semblent évoluer sur deux voies différentes. Peu importe la vitesse à laquelle elles avancent, elles ne se rencontrent jamais. Seules, les équipes de développement et de production IT auront souvent du mal à communiquer, encore plus à collaborer, et resteront engluées dans des processus manuels. Résultat : des employés qui ne travaillent pas bien ensemble, des logiciels qui ne fonctionnent pas de manière fiable et des clients qui envisagent d’aller voir la concurrence. Vous voilà peut-être coincé dans ce que nous appelons un « noeud de dysfonctionnement.
Tags : 
devops, software development, production, devops journey, devops advice
    
CA Technologies
Published By: Blue Coat Systems     Published Date: Jun 26, 2013
While mobile threats are still largely mischiefware and have not yet broken the device’s security model but instead more focused on for-pay texting scams or stealing personal information, the dangers are still rife. This white paper from BlueCoat examines the mobile threat landscape and the behavioral patterns of mobile users that make them most vulnerable to data loss, malicious applications, fraud and other mobile threats.
Tags : 
mobile threats, security, malicious applications, data loss prevention, fraud, technology, malware, networking, wireless, data center
    
Blue Coat Systems
Published By: Blue Coat Systems     Published Date: Jun 26, 2013
Given the new threats inherent in an increasingly mobile workforce and the blurring of lines between business and personal use of devices, it is clear that conventional methods of securing the perimeter in this new environment are not up to the task. This white paper from BlueCoat explains how organizations can most effectively maximize their security efforts by incorporating a cloud-based solution as part of a unified approach.
Tags : 
web security, mobile threats, security, cloud, application, technology, solution, networking, wireless, data center
    
Blue Coat Systems
Published By: Blue Coat Systems     Published Date: Jul 18, 2013
While mobile threats are still largely mischiefware and have not yet broken the device’s security model but instead more focused on for-pay texting scams or stealing personal information, the dangers are still rife. This white paper from BlueCoat examines the mobile threat landscape and the behavioral patterns of mobile users that make them most vulnerable to data loss, malicious applications, fraud and other mobile threats.
Tags : 
mobile, malware, security, scams, bluecoat, data loss
    
Blue Coat Systems
Published By: Blue Coat Systems     Published Date: Jul 18, 2013
Given the new threats inherent in an increasingly mobile workforce and the blurring of lines between business and personal use of devices, it is clear that conventional methods of securing the perimeter in this new environment are not up to the task. This white paper from BlueCoat explains how organizations can most effectively maximize their security efforts by incorporating a cloud-based solution as part of a unified approach.
Tags : 
web security, mobile, workforce, bluecoat, security
    
Blue Coat Systems
Published By: BMC Software     Published Date: Jun 25, 2013
Enterprise users today are busier than ever and have grown accustomed to convenience and simplicity when they use technology in their personal lives. To stay productive at work, they demand faster, easier access to IT services, no matter where they are. BMC Software is meeting the changing demands of service delivery with a new approach to IT self-service. MyIT lets you give them everything they need — all from one simple, intuitive app. Imagine a world where users help themselves and you spent less time on trouble tickets and more time on strategic IT initiatives. No need to imagine, this world exists. Try MyIT today!
Tags : 
enterprise, technology, it services, self-service, technology, software, strategy, it management, enterprise applications
    
BMC Software
Published By: Akamai Technologies     Published Date: Apr 25, 2018
Today every business is focused on their customers, and finding ways to better understand and serve them with differentiated digital experiences. With all of the choices available, users have become highly demanding, and quickly lose patience and trust when web and mobile app experiences are poor. Today’s digital user demands rich, engaging content that is fresh, personalized, and fast. If your websites and mobile apps can’t deliver, they’re gone. This eBook will give you insight into: Monitor how users interact with your online applications by leveraging real user data Optimize behaviors that drive the most revenue impact across user locations and devices Validate whether the optimizations resulted in desired business outcomes using real-world situations
Tags : 
monitor, optimize, validate, digital, experiences
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Jul 02, 2019
In today’s markets, customer identities and the personal data associated with them are among the most critical and valuable assets of any enterprise. Managing these digital identities — from first registration and login to the later stages of the customer relationship — and extracting business value from the associated data are complex tasks, commonly referred to as customer identity and access management (CIAM). When implementing a system to collect, manage, and utilize digital identity and customer data, companies have two basic choices: in-house development or buying a dedicated solution from a vendor specialized in CIAM (i.e., build vs. buy). Read this white paper for an in-depth analysis of CIAM implementation options, including: ? Must-haves for a successful, enterprise-grade CIAM system ? Pros and cons of implementation options, ranging from in-house software development to commercial off-the-shelf solutions ? A real-world case study that illustrates the ROI of an effective CI
Tags : 
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Jul 02, 2019
Customer identity and access management (CIAM) is increasingly important for brands to deliver the seamless, secure digital experiences demanded by empowered consumers. As part of its Identity and Access Management Playbook, Forrester Research provides guidance to build a customer-obsessed IAM team that has the technical skills, business influence, and interpersonal attributes to architect a CIAM strategy and roll it out across functional groups. Read the full report to learn critical considerations to make your CIAM team effective. Report highlights: ? Four essential roles for your CIAM team ? Why sharing and integrating customer data across organization barriers is critical for success ? The most important technical, business, and interpersonal skills to look for in CIAM candidates
Tags : 
    
Akamai Technologies
Published By: Pega     Published Date: May 24, 2016
Millennials are different than any other generation before them. They are making major decisions later in life—from choosing a career, getting married, buying a home and yes, investing in life insurance. And while they are more tech savvy than their predecessors and want to make purchasing from any device of their choosing, they still value face-to-face interaction, contrary to popular belief. Insurance and financial companies need to understand the unique dynamics of the millennial generation in order to better service and exceed expectations of this growing consumer base. They need to meet their tech-savvy expectations, while also understanding Millennials still value one-to-one attention. In fact, 48% of Millennials said they would be more likely to make a speedy financial or insurance-related decision if a person who they trusted took the time to explain the benefits and risks. Download this whitepaper and learn how to better tap into the growing millennial market.
Tags : 
    
Pega
Published By: Pega     Published Date: May 24, 2016
In today’s “always on” digital world every point of engagement with a customer—from a service call to a marketing email—is a critical moment for retail banks where the customer relationship is put to the test over and over again. And while in most cases banks are delivering satisfactory customer service to their clients, they are missing key opportunities to provide deeper personalization. With nearly one in four consumers saying they would start looking for a new bank if they received poor customer service, banks need to evolve with their customers and always be looking at innovative ways to communicate and service them more efficiently. Download this research study and get a deeper understanding of the challenges facing today’s banks and the technology solutions they must embrace to keep pace with consumer demands.
Tags : 
    
Pega
Published By: Pega     Published Date: May 24, 2016
As the marketing landscape continues to shift and evolve, marketers are being tasked with a multitude of responsibilities, not the least of which involves adopting new platforms and strategies to operate in a real-time world and provide relevant content across every conceivable delivery platform. This has opened a whole new world of challenges—and opportunities—for marketers as personalization has been brought to the forefront of the strategy for many organizations. These requirements are making it all the more imperative for organizations to be able to craft robust experiences that are targeted to the needs and desires of all of their customers. In a world where customers have a multitude of options for nearly everything they are looking to purchase—and where new contenders are willing to offer almost anything to gain their business and loyalty if given the opportunity—the demand to know and effectively engage customers has never been greater. Download this whitepaper and discover how
Tags : 
    
Pega
Published By: Hewlett Packard Enterprise     Published Date: Jul 12, 2018
Discover how HPE Advisory Consulting Services consolidates and modernizes workloads and technology siloes, simplifying administration, and improving automation. Learn how IT organizations can support on-demand IT services and enable DevOps, self-service IT and agile development practices, while reducing equipment and operating expenses. This HPE Blueprint provides them with an overview of the steps they need to consider to achieve this outcome. This is valuable information to the IT person, particularly when they don’t know where to begin.
Tags : 
    
Hewlett Packard Enterprise
Published By: CA Technologies     Published Date: Aug 26, 2016
It’s impossible for a day to pass in which we don’t hear news of yet another data breach, with its resulting loss of proprietary secrets, financial records or personal information. These incidents span all sectors of the economy: commerce, education and government
Tags : 
    
CA Technologies
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.