Cookie policy: This site uses cookies (small files stored on your computer) to simplify and improve your experience of this website. Cookies are small text files stored on the device you are using to access this website. For more information on how we use and manage cookies please take a look at our privacy and cookie policies. Some parts of the site may not work properly if you choose not to accept cookies.

sections
 

row

Results 301 - 325 of 4138Sort Results By: Published Date | Title | Company Name
Published By: Akamai Technologies     Published Date: Oct 02, 2018
"According to Forrester, the right engagement model can help companies achieve double-digit growth. Simply put, establishing trust through differentiated and secure digital experiences is key to competing in today’s marketplace. Achieve the necessary balance and your company wins. This handbook is designed to start you on the road to achieving this equilibrium by creating a virtuous circle of interaction with your customers. You’ll learn: - What defines world-class digital experiences - How to balance data, experience, and security - Real-world success stories and takeaways"
Tags : 
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Oct 02, 2018
"According to Forrester, the right engagement model can help companies achieve double-digit growth. Simply put, establishing trust through differentiated and secure digital experiences is key to competing in today’s marketplace. Achieve the necessary balance and your company wins. This handbook is designed to start you on the road to achieving this equilibrium by creating a virtuous circle of interaction with your customers. You’ll learn: - What defines world-class digital experiences - How to balance data, experience, and security - Real-world success stories and takeaways"
Tags : 
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Oct 02, 2018
"According to Forrester, the right engagement model can help companies achieve double-digit growth. Simply put, establishing trust through differentiated and secure digital experiences is key to competing in today’s marketplace. Achieve the necessary balance and your company wins. This handbook is designed to start you on the road to achieving this equilibrium by creating a virtuous circle of interaction with your customers. You’ll learn: - What defines world-class digital experiences - How to balance data, experience, and security - Real-world success stories and takeaways"
Tags : 
    
Akamai Technologies
Published By: Adobe Systems, Inc.     Published Date: May 17, 2011
This paper highlights the advances in closed-loop marketing that enable measurement and optimization of digital marketing efforts. It also describes the challenges that CMOs face when pursuing digital marketing strategies and how next-generation WCM solutions help CMOs overcome those challenges.
Tags : 
adobe, cmo, digital marketing, organization transformation, chief marketing officer, customer experience management, wcm, multichannel pipeline growth, cmis
    
Adobe Systems, Inc.
Published By: Dell     Published Date: Aug 10, 2015
Download this infographic to uncover the economic benefits of private cloud and how to see a better ROI while building a solution ready for tomorrow.
Tags : 
    
Dell
Published By: Dell EMC     Published Date: Nov 02, 2015
Integrated IT platforms can be the key to success for quickly growing remote office/branch office (ROBO) sites. The Dell PowerEdge VRTX with Intel® Xeon® Processor integrated solutions platform spurs exceptional business results for remote, branch and small offices.
Tags : 
    
Dell EMC
Published By: Dell EMC     Published Date: Nov 02, 2015
A new IDG Research study reveals that IT professionals are already seriously considering converged systems. The advantages of converged systems are clear. Still, some reticence remains due to concerns about cost and ROI. Learn how converged systems bring value to the enterprise today and tomorrow. And see how Dell PowerEdge FX solutions smooth the road to convergence.
Tags : 
    
Dell EMC
Published By: Dell EMC     Published Date: Nov 13, 2015
Join us to learn how to radically reduce complexity, increase agility, and better prepare your business to meet tomorrow’s challenges with Dell converged, future-ready solution technology. Stay agile and move faster than the competition with Dell Datacenter solutions.
Tags : 
    
Dell EMC
Published By: Dell EMC     Published Date: May 11, 2016
Your growing business shouldn't run on aging hardware and software until it fails. Adding memory and upgrading processors will not provide the same benefits to your infrastructure as a consolidation and upgrade can. Upgrading and consolidating your IT infrastructure to the Dell PowerEdge VRTX running Microsoft Windows Server 2012 R2 and SQL Server 2014 can improve performance while adding features such as high availability.
Tags : 
    
Dell EMC
Published By: Dell EMC     Published Date: Nov 04, 2016
As organizations continue to virtualize their infrastructures to gain higher levels of operational efficiency, VM sprawl and resource utilization are two key factors that can quickly create havoc for IT admins. In resource-siloed infrastructures, where multiple administrators are in charge of different pieces of the infrastructure, complexity continues to grow as mission-critical data sets and organizations grow. This is especially true in dynamic, mission-critical environments, where one wrong move or lack thereof could significantly impact an application, the end-user experience, or worst case, company revenue. The impact of hyper-converged infrastructures on IT has been profound. In fact, 85% of respondents to a recent ESG survey already use or plan to use a hyper-converged solution in the coming months. Though that number appears high, it is not all that surprising. ESG also asked organizations to identify which factors drove them to deploy or considering deploying a hyper-conv
Tags : 
ubuntu, performance, windows, hyper-convergence, infrastructure
    
Dell EMC
Published By: TIBCO Software     Published Date: Jan 17, 2019
MANUFACTURING: AN INDUSTRY DRIVEN BY DISRUPTION A leading manufacturer today can be an also-ran next year. Disruption is the new normal. Maintain the status quo at your peril because no manufacturer is safe from: •? Innovative new products that can radically shift demand •? Falling prices that relentlessly pressure costs •? Dynamic business models where yesterday’s partner can become tomorrow’s competitor Turning disruption into your advantage requires continuous innovation and optimization, driven by data.
Tags : 
data, virtualization, manufacturers, customer, supply, products, optimization, product
    
TIBCO Software
Published By: Kaspersky Lab Australia and New Zealand     Published Date: Jun 09, 2016
Chemist warehouse is one of Australia's most remarkable business success stories, doubling sales and growing its national store network from 100 to more than 400 stores in just five years.
Tags : 
kaspersky, kaspersky endpoint security, security, security application, kaspersky solutions, security solutions
    
Kaspersky Lab Australia and New Zealand
Published By: International Business Systems (IBS)     Published Date: Aug 30, 2011
Revenue may be the sexy side of business, but reducing operating expenses is critical. It's no good growing your sales if the profits are leaking out
Tags : 
distribution logistics, distribution management, wholesale distribution, distribution resource management, supply chain management, erp, enterprise, resource, resource planning, ibs, enterprise applications
    
International Business Systems (IBS)
Published By: Cisco     Published Date: Jun 21, 2016
Businesses must become agile and provide differentiated service as customer demands and expectations change. Moving beyond simple phone transactions, customers are taking matters into their own hands and turning to their peers, the web and social media to find answers. Contact centers play a major role in determining the customer’s perception of a company. Often seen as brand ambassadors, agents are the main interaction point for customers. It is therefore critical that they deliver personalized communications in the channels that customers prefer. Businesses should use cloud technology to add multichannel tools and support growing demand for chat, social, SMS and video.
Tags : 
    
Cisco
Published By: Akamai Technologies     Published Date: Jun 14, 2018
"Remote access is important and growing, but how secure is it? IDC Research surveyed more than 300 IT professionals to gain insight into the specific threats and challenges faced by providing access to employees and third parties. Read this report to learn about: -How secure remote access really is -The complexity faced in implementing remote access -What happens when companies don’t have an access security solution -Why businesses must pivot from the common security mantra of “trust but verify” to “verify and never trust” in the new threat landscape
Tags : 
remote access, security
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Jun 14, 2018
IT complexity has rapidly grown with more applications, users, and infrastructure needed to service the enterprise. Traditional remote access models weren’t built for business models of today and are unable to keep up with the pace of change. Read this paper to understand how remote access can be redefined to remove the complexity, meet end-user expectation and mitigate network security risks.
Tags : 
security, multi-factor authentication, network security risks
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Jun 14, 2018
"Traditional remote access technologies—like VPNs, proxies, and remote desktops—provide access in much the same way they did 20 years ago. However, new and growing business realities—like a growing mobile and distributed workforce—are forcing enterprises to take a different approach to address the complexity and security challenges that traditional access technologies present. Read 5 Reasons Enterprises Need a New Access Model to learn about the fundamental changes enterprises need to make when providing access to their private applications."
Tags : 
vpn, proxies, security, security breach, technology
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Jun 14, 2018
"High-profile cyber attacks seem to occur almost daily in recent years. Clearly security threats are persistent and growing. While many organizations have adopted a defense-in-depth strategy — utilizing anti-virus protection, firewalls, intruder prevention systems, sandboxing, and secure web gateways — most IT departments still fail to explicitly protect the Domain Name System (DNS). This oversight leaves a massive gap in network defenses. But this infrastructure doesn’t have to be a vulnerability. Solutions that protect recursive DNS (rDNS) can serve as a simple and effective security control point for end users and devices on your network. Read this white paper to learn more about how rDNS is putting your enterprise at risk, why you need a security checkpoint at this infrastructural layer, how rDNS security solutio Read 5 Reasons Enterprises Need a New Access Model to learn about the fundamental changes enterprises need to make when providing access to their private applications.
Tags : 
rdns, dns, anti-virus, security, network defense
    
Akamai Technologies
Published By: TIBCO Software GmbH     Published Date: Jan 15, 2019
MANUFACTURING: AN INDUSTRY DRIVEN BY DISRUPTION A leading manufacturer today can be an also-ran next year. Disruption is the new normal. Maintain the status quo at your peril because no manufacturer is safe from: •? Innovative new products that can radically shift demand •? Falling prices that relentlessly pressure costs •? Dynamic business models where yesterday’s partner can become tomorrow’s competitor Turning disruption into your advantage requires continuous innovation and optimization, driven by data.
Tags : 
    
TIBCO Software GmbH
Published By: CA Technologies     Published Date: Jan 09, 2015
This white paper focuses on new ways to help and protect the Business and shows new trends which have changed the demands on IT organizations and the business. The world of IT has changed dramatically over the past 1-2 years, as cloud and mobility have changed the demands on IT organizations and the business. As a result, IT must evolve how it interacts with the business to help the business grow and succeed.
Tags : 
identity-based security, business protection, identity, security solutions, new trends to secure business, cloud computing
    
CA Technologies
Published By: KeyBanc Capital Markets     Published Date: Nov 12, 2015
Private equity and investment banking experts share observations on what a distribution company owner can expect when preparing to sell a stake in the company, and how to prepare the business to attract potential buyers’ attention and maximize the price it can command.
Tags : 
industrial distribution, industrial distribution business owner, selling a business, private equity, financial sponsor, financial investor, strategic partner, growth strategy, investment, wealth diversification, acquisition, value creation
    
KeyBanc Capital Markets
Published By: Dell     Published Date: Feb 04, 2016
Security risks have grown roughly in proportion to the meteoric growth in employee-owned mobile devices within the workplace. Meanwhile cyber-attacks are growing in sophistication and severity. According to data from a new IDG Research survey, these dynamics have IT decision makers scrambling to tighten and revise BYOD policies while addressing the holistic issue of endpoint security. Download this two-page paper detailing the IDG Research results and for expert advice on securing your organization’s data in an increasingly mobile world.
Tags : 
security risks, byod, cyber attacks, byod policies
    
Dell
Published By: TriNet     Published Date: Aug 03, 2012
In this eGuide, you'll learn about ten foundational risks that small and growing companies face and how those risks can be minimized or even eliminated.
Tags : 
entrepreneurship, human resources, managing risk, compliance, risk management
    
TriNet
Published By: TriNet     Published Date: Jun 13, 2011
Learn how a PEO can help remove business risks, contain HR costs, and enable you to focus on growing your business.
Tags : 
trinet, entrepreneur, peo, professional employer organization, smb, human resources, co-employment, talent market, due diligence, company risk, asset management, benefits
    
TriNet
Published By: TriNet     Published Date: Apr 23, 2012
Download this report to learn about success stories and recommendations on how to take full advantage of innovative technology to help your efforts to attract and retain top talent.
Tags : 
ecosystem, employers, recruiting, streamline, democratic, scientific, professional, networks, linkedin, viadeo, jobvite, branchout, facebook, hiring, career development, data center
    
TriNet
Start   Previous    6 7 8 9 10 11 12 13 14 15 16 17 18 19 20    Next    End
Search      

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.