Cookie policy: This site uses cookies (small files stored on your computer) to simplify and improve your experience of this website. Cookies are small text files stored on the device you are using to access this website. For more information on how we use and manage cookies please take a look at our privacy and cookie policies. Some parts of the site may not work properly if you choose not to accept cookies.

sections
 

opt

Results 501 - 525 of 5942Sort Results By: Published Date | Title | Company Name
Published By: IBM     Published Date: Jul 26, 2017
With the advent of big data, organizations worldwide are attempting to use data and analytics to solve problems previously out of their reach. Many are applying big data and analytics to create competitive advantage within their markets, often focusing on building a thorough understanding of their customer base. High-priority big data and analytics projects often target customer-centric outcomes such as improving customer loyalty or improving up-selling. In fact, an IBM Institute for Business Value study found that nearly half of all organizations with active big data pilots or implementations identified customer-centric outcomes as a top objective (see Figure 1).1 However, big data and analytics can also help companies understand how changes to products or services will impact customers, as well as address aspects of security and intelligence, risk and financial management, and operational optimization.
Tags : 
customer analytics, data matching, big data, competitive advantage, customer loyalty
    
IBM
Published By: Esker     Published Date: Jun 29, 2016
Tired of high costs, low visibility and other headaches associated with processing fax and email orders? Let us be your guide to better order management! Read the Guidebook to learn specific ways your company can save time and money with electronic order processing while keeping customers happy.
Tags : 
best practices, business optimization, business management, productivity
    
Esker
Published By: Esker     Published Date: Feb 03, 2017
Tired of high costs, low visibility and other headaches associated with processing fax and email orders? Let us be your guide to better order management! Read the Guidebook to learn specific ways your company can save time and money with electronic order processing while keeping customers happy.
Tags : 
best practices, business optimization, business management, productivity
    
Esker
Published By: Esker     Published Date: Jun 29, 2016
Order processing is most efficient when manual touch points are minimized. But when orders come in by fax or email, what’s the best way to handle them? Read our eBook, The Great SAP Order Processing Predicament, to learn how 100% electronic order processing can be achieved via one universal automation platform. Download this eBook to discover how to: - Make every order electronic - Allow customers to send fax/emails Increase speed, visibility & accuracy - Eliminate manual data entry - Manage growth without adding staff
Tags : 
best practices, business optimization, business management, productivity
    
Esker
Published By: Esker     Published Date: Feb 03, 2017
Order processing is most efficient when manual touch points are minimized. But when orders come in by fax or email, what’s the best way to handle them? Read our eBook, Addressing Manual Order Management, to learn how 100% electronic order processing can be achieved via one universal automation platform. Download this eBook to discover how to: Make every order electronic Allow customers to send fax/emails Increase speed, visibility & accuracy Eliminate manual data entry Manage growth without adding staff
Tags : 
best practices, business optimization, business management, productivity, business intelligence, business process automation, business process management
    
Esker
Published By: IBM     Published Date: Mar 04, 2014
This white paper discusses the key market trends and challenges facing organizations as they seek to deploy mobile enterprise solutions and examines the growing requirements of these firms. It also delivers an overview of how enterprises can address the challenges in terms of repackaging and optimizing applications to better operate in a converged, dynamic mobile world.
Tags : 
ibm, mobile, mobile enterprise, market trends, deployment, mobile enterprise solutions, applications, application performance
    
IBM
Published By: IBM     Published Date: Sep 10, 2009
Data protection and recovery can be a complicated problem in remote offices. But there are options. This white paper explores a range of possibilities, and shows how an adaptive data protection solution can protect remotely stored data for enterprises of all sizes.
Tags : 
ibm, applications, risks, rcovery considerations, backup, tivoli software, tivoli® storage manager fastback, remote office
    
IBM
Published By: Group M_IBM Q4'19     Published Date: Sep 27, 2019
Hybrid cloud adoption is accelerating within the financial services industry. Just recently IBM led a financial services focus group meeting with 20 banks and insurance companies. All of them indicated that they will be accelerating adoption of cloud technology over the next 12 to 18 months.
Tags : 
    
Group M_IBM Q4'19
Published By: Lenovo UK     Published Date: Nov 07, 2018
The rise of mobility is causing IT teams everywhere a headache, with the potential for increased costs and risks. But with ThinkPad powered by Intel® Core™ i7 vPro™ processors, you get 360 security, reliable durability and uncompromised productivity in each and every device. Learn more in our white paper. Ultrabook, Celeron, Celeron Inside, Core Inside, Intel, Intel Logo, Intel Atom, Intel Atom Inside, Intel Core, Intel Inside, Intel Inside Logo, Intel vPro, Itanium, Itanium Inside, Pentium, Pentium Inside, vPro Inside, Xeon, Xeon Phi, Xeon Inside, and Intel Optane are trademarks of Intel Corporation or its subsidiaries in the U.S. and/or other countries.
Tags : 
lenovo, intel, thinkpad, thinkpad x1, x1 extreme, laptop, security, productivity
    
Lenovo UK
Published By: Lenovo UK     Published Date: May 15, 2019
The rise of mobility is causing IT teams everywhere a headache, with the potential for increased costs and risks. But with ThinkPad powered by Intel® Core™ i7 vPro™ processors, you get 360 security, reliable durability and uncompromised productivity in each and every device. Learn more in our white paper. Ultrabook, Celeron, Celeron Inside, Core Inside, Intel, Intel Logo, Intel Atom, Intel Atom Inside, Intel Core, Intel Inside, Intel Inside Logo, Intel vPro, Itanium, Itanium Inside, Pentium, Pentium Inside, vPro Inside, Xeon, Xeon Phi, Xeon Inside, and Intel Optane are trademarks of Intel Corporation or its subsidiaries in the U.S. and/or other countries.
Tags : 
lenovo, intel, thinkpad, thinkpad x1, x1 extreme, laptop, security, productivity
    
Lenovo UK
Published By: Adobe     Published Date: May 15, 2018
See the 2017 retail holiday recap for learnings you can use while planning for Holiday 2018. Get the trends from last year’s holiday season so you can predict your results this year. Find out why Black Friday online sales are expected to surpass Cyber Monday’s, why bigger retailers are stealing online share from smaller retailers, and why search advertising and mobile optimization should be your top priorities this season.
Tags : 
    
Adobe
Published By: Adobe     Published Date: Apr 23, 2018
See the 2017 retail holiday recap for learnings you can use while planning for Holiday 2018. Why the target audience should care: Get the trends from last year’s holiday season so you can predict your results this year. Find out why Black Friday online sales are expected to surpass Cyber Monday’s, why bigger retailers are stealing online share from smaller retailers, and why search advertising and mobile optimization should be your top priorities this season.
Tags : 
    
Adobe
Published By: Pure Storage     Published Date: Sep 27, 2019
ENTREZ DANS UNE NOUVELLE ÈRE : CELLE DE LA VÉRITABLE CONTINUITÉ OPÉRATIONNELLE Merci pour tous les services rendus, chères reprises après sinistre. Sans vous à nos côtés toutes ces années, rien n'aurait été pareil. Oubliez la logique de sinistre/reprise des années 70. Adoptez un modèle de continuité opérationnelle adapté au monde d'aujourd'hui, en constante activité, un modèle : - Agile - Efficace - Simple SON NOM ? PURITY ACTIVECLUSTER
Tags : 
    
Pure Storage
Published By: Pure Storage     Published Date: Oct 09, 2018
Merci pour tous les services rendus, chères reprises après sinistre. Sans vous à nos côtés toutes ces années, rien n'aurait été pareil. Oubliez la logique de sinistre/reprise des années 70. Adoptez un modèle de continuité opérationnelle adapté au monde d'aujourd'hui, en constante activité, un modèle :
Tags : 
    
Pure Storage
Published By: Intel     Published Date: Dec 13, 2018
In today’s world, advanced vision technologies is shaping the next era of Internet of Things. However, gathering streaming video data is insufficient. It needs to be timely and accessible in near-real time, analyzed, indexed, classified and searchable to inform strategy—while remaining cost-effective. Smart cities and manufacturing are prime examples where complexities and opportunities have been enabled by vision, IoT and AI solutions through automatic meter reading (AMR), image classification and segmentation, automated optical inspection (AOI), defect classification, traffic management solution—just to name a few. Together, ADLINK, Touch Cloud, and Intel provide a turnkey AI engine to assist in data analytics, detection, classification, and prediction for a wide range of use cases across a broad spectrum of sectors. Learn more about how the Touch Cloud AI brings cost savings, operational efficiency and a more reliable, actionable intelligence at the edge with transformative insi
Tags : 
    
Intel
Published By: Adobe     Published Date: Mar 07, 2013
Our eighth Digital Intelligence Briefing, in association with Econsultancy highlights key digital marketing trends for 2013, and outlines the challenges and opportunities which organisations are (or should be) paying close attention to this year.
Tags : 
digital marketing trends, adobe, social media engagement, targeting and personalisation, mobile optimisation
    
Adobe
Published By: Adobe     Published Date: Nov 06, 2012
Adobe has released the 2012 Digital Marketing Optimisation Survey Results, which focuses on the key areas where digital marketers need to excel in order to ensure success: personalisation, social media, mobile, and customer experience.
Tags : 
adobe, digital marketing, optimization, optimisation, web content management, customer experience
    
Adobe
Published By: Adobe     Published Date: Jun 29, 2012
Adobe has released the results to the 2012 Digital Marketing Optimization Survey, where over 1700 global digital marketers across major industries offered insights into plans for driving revenue and growth in the coming year. With an increasing portion of marketing spend shifting to digital channels, it's more critical than ever to measure online marketing programs and initiatives to help identify where you can raise conversions and add to the bottom line.
Tags : 
adobe, marketing, optimzation, digital marketing, digital, emerging marketing
    
Adobe
Published By: Adobe     Published Date: Jun 08, 2015
Get it now and see how the usage of social streaming apps is spiking. Explore metrics to help you decide whether to go paid or organic on Facebook. Discover which regions are heating up in search engine marketing. And so much more.
Tags : 
adobe, social, facebook, search engine marketing, sem, roi, streaming apps, meerkat
    
Adobe
Published By: Adobe     Published Date: Apr 17, 2014
Social media is more than friends and likes, tweets and followers, pins and mentions. According to the Q4 2013 Adobe Digital Index Social Intelligence Report, it’s time for marketers to take social advertising seriously. With higher click-through rates and lower prices, the pressure is on to bring social into your overall media mix. Adobe can help manage, forecast, and optimize all your ads.
Tags : 
adobe, social intelligence, social media, social media marketing, social advertising, click through rate, ctr, digital marketing
    
Adobe
Published By: Adobe     Published Date: Jun 06, 2013
If you’re a marketer who is not targeting content to visitors in a personalized way, you're falling behind your competitors. Organizations need to invest budget, resources, and talent to improve user experiences across channels to succeed in 2013. See how your company measures up to the more than 1,800 digital marketers that participated in the survey.
Tags : 
content marketing, digital marketing, online marketing, online marketers, adobe
    
Adobe
Published By: McAfee     Published Date: Apr 25, 2014
As malware becomes ever more sophisticated and evasive, new technologies are emerging to uncover threats no matter how well they’re camouflaged. This paper proposes a logical design strategy for dynamic malware analysis that optimizes detection effectiveness, efficiency, and economics.
Tags : 
malware detection, data analytics, dynamic sandboxing, static analytics, zero-day malware, comprehensive threat protection, fast detection, malware analysis
    
McAfee
Published By: Akamai Technologies     Published Date: Jun 14, 2018
The cyber threat landscape is dynamic and accelerating. The Domain Name System (DNS) is a vulnerability in many organizations’ defenses that malicious actors are increasingly exploiting. The following DNS best practices, when coupled with an enterprise threat protection service, will aid you in identifying, blocking, and mitigating targeted threats such as malware, phishing, ransomware, and data exfiltration.
Tags : 
dns, cybersecurity, malware, phishing, ransomware, data exfiltration
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Dec 11, 2018
The cyber threat landscape is dynamic and accelerating. The Domain Name System (DNS) is a vulnerability in many organizations’ defenses that malicious actors are increasingly exploiting. The following DNS best practices, when coupled with an enterprise threat protection service, will aid you in identifying, blocking, and mitigating targeted threats such as malware, phishing, ransomware, and data exfiltration.
Tags : 
    
Akamai Technologies
Published By: McAfee     Published Date: Sep 04, 2014
Sepa cómo gestionar el riesgo hoy significa comprender más los datos: análisis de vulnerabilidad, registros de aplicaciones y bases de datos, flujos, registros de acceso y sesiones, alertas y análisis de tendencias.
Tags : 
arquitectura de seguridad conectada, big security data, big data, administración de registros, administración de logs, siem, seguridad
    
McAfee
Start   Previous    14 15 16 17 18 19 20 21 22 23 24 25 26 27 28    Next    End
Search      

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.