Cookie policy: This site uses cookies (small files stored on your computer) to simplify and improve your experience of this website. Cookies are small text files stored on the device you are using to access this website. For more information on how we use and manage cookies please take a look at our privacy and cookie policies. Some parts of the site may not work properly if you choose not to accept cookies.

sections
 

searching

Results 1 - 25 of 75Sort Results By: Published Date | Title | Company Name
Published By: ConnectWise     Published Date: Aug 22, 2019
Patches correct bugs, flaws and provide enhancements, which can prevent potential user impact, improve user experience and potentially save your technicians time researching and repairing issues that could have already been resolved or prevented with an existing update. Clients generally understand that their systems need to be patched, but they likely do not have the expertise to comfortably approve and install patches without help. When operating within the IT services industry, patching is one of the first areas that competitors auditing your clients will assess. Developing best practices to manage the risks associated with the approval and deployment of patches is critical to your IT department's service offering.
Tags : 
    
ConnectWise
Published By: ConnectWise     Published Date: Aug 22, 2019
The benefits—or lack—of a solid RMM will significantly impact your Technology Teams and your customers. During the selection process, it’s important to compare options and determine which product best meets your company’s needs. When searching for the right RMM solution, make sure you consider your clients’ needs as well as your own. You want a solution you can trust, that’s also a leader in the industry. Don’t settle on an RMM until you analyze the following 10 aspects of the solution.
Tags : 
    
ConnectWise
Published By: Akamai Technologies     Published Date: May 05, 2017
Searching for a Cloud Security Provider can be confusing. Many providers appear the same at first glance: similar metrics, similar promises. The fact is, the information you need to make a real comparison requires asking questions and probing for details that cloud services vendors don’t always volunteer. Use this list to be sure you’ve covered the essential elements for choosing the right cloud security provider to protect your organization from malicious cyberattacks.
Tags : 
cloud security, cyberattacks, cloud service, security
    
Akamai Technologies
Published By: DocuSign     Published Date: Feb 13, 2017
Greg Baran, Director of Enterprise Applications at Vocus, speaks about DocuSign's seamless integration with Salesforce allowed them to focus on their business process rather than the technology. Vocus is always searching for new ways to DocuSign! Find out about DocuSign for Salesforce:
Tags : 
    
DocuSign
Published By: Cisco Spark     Published Date: Jun 22, 2017
The most successful businesses are greater than the sum of their parts. When individuals work together well, they fill in each other's blind spots and build on each other's great ideas. These conversations ultimately help teams be more productive, reduce time-to-market and come up with more innovative ideas. But if your teams are spread across different offices, or working from home, can you create the same collaborative magic? Web-based collaboration tools claim to break down the collaboration barriers that distance can build. Everyone agrees they can reduce the time and cost of travel. And yes, these tools can stream your colleagues' voices, facial expressions, and slide decks into your meeting room, so you can get a clearer picture of verbal and behavioral signals. But if you're researching collaboration platforms, you'll hear skepticism, too. Naysayers declare that: People won’t participate because they’re afraid of digital change. You just can’t trust the security of collaborati
Tags : 
    
Cisco Spark
Published By: Oracle CX     Published Date: Oct 19, 2017
This paper provides guidance to organizations interested in researching Oracle’s SPARC M7 and Oracle Solaris 11 security features and capabilities. It will also provide a high level overview of some of the noteworthy features that these two product offerings bring to the market. We will review industry best practices in information security as it relates to these Oracle products in the context of a secure implementation. This paper is not meant to be an in depth technical paper, position paper, or security implementation guide. It will instead endeavor to deliver a foundational level of knowledge of the SPARC M7 processor and server technology and the function set within Oracle Solaris 11 that are primarily relevant to information security as it is currently understood. The information used to compose this paper was collected from a variety of open sources, interviews with Oracle subject matter experts, and reviews of OEM (Original Equipment Manufacturer) documentation and specificatio
Tags : 
    
Oracle CX
Published By: 3D Systems     Published Date: Feb 28, 2019
Metal 3D printing is revolutionizing the manufacturing process. Complex shapes, enhanced functional properties and lightweighting are some of the unique benefits delivered by additive manufacturing (AM). While there is plenty of information about printing techniques, materials and hardware, a critical element is rarely mentioned: the need for an integrated software solution for metal additive manufacturing. It takes more than a 3D CAD model and a good printer to get a successful print. Metal AM software handles all preparation and optimization actions that are required for a printed part to meet the desired CAD model specifications. This ebook provides an overview of the preparation and optimization process for AM, explains the importance of software to the profitability of any additive manufacturing business and suggests what to look for when researching AM software solutions.
Tags : 
    
3D Systems
Published By: Limelight Network     Published Date: Aug 12, 2019
The UK’s number one property website, Rightmove.co.uk, provides home hunters with both website and mobile access to over one million available properties daily. Their website and mobile platforms make searching for and researching properties to buy or rent, easy. Rightmove continues to grow with over 50 million-page impressions a day, often topping 55 million. Since its initial launch in 2000, there have been almost 40 million properties listed, with a library of over 2.5 billion active and archived images. Rightmove customers, including UK and overseas-based estate and letting Agents as well as new home developers are uploading 2 million images every day. Tim Harding, Head of Operations at Rightmove, is responsible for ensuring these images are available to home hunters visiting the site at all times, no matter what device they are using or where they are located. After two years at Rightmove, Tim has seen a tremendous increase in the amount of images posted per property, along with g
Tags : 
    
Limelight Network
Published By: Akamai Technologies     Published Date: Aug 17, 2017
Searching for a Cloud Security Provider can be confusing. Many providers appear the same at first glance: similar metrics, similar promises. The fact is, the information you need to make a real comparison requires asking questions and probing for details that cloud services vendors don’t always volunteer. Use this list to be sure you’ve covered the essential elements for choosing the right cloud security provider to protect your organization from malicious cyberattacks.
Tags : 
cloud security, cloud solutions, data analysis, cyberattacks
    
Akamai Technologies
Published By: ShoreTel     Published Date: Oct 26, 2012
This white paper discusses the benefits of researching the total cost of ownership for a UC system and how businesses can lower their total cost of ownership (TCO) by selecting a simple yet sophisticated solution.
Tags : 
shoretel, tco, total cost of ownership, uc system, unified communication system, enterprise applications, telecom
    
ShoreTel
Published By: Adobe     Published Date: Oct 05, 2016
Retailers are always searching for ways to enhance the in-store shopping experience. Now, beacon technology allows them to reach out to customers on mobile as they shop, to deliver special offers and real-time answers to their in-store questions.
Tags : 
customer experience, ecommerce, customer relationship, customer
    
Adobe
Published By: Adobe     Published Date: Oct 05, 2016
Retailers are always searching for ways to enhance the in-store shopping experience. Now, beacon technology allows them to reach out to customers on mobile as they shop, to deliver special offers and real-time answers to their in-store questions.
Tags : 
customer experience, ecommerce, customer relationship, customer
    
Adobe
Published By: Adobe     Published Date: Oct 05, 2016
Retailers are always searching for ways to enhance the in-store shopping experience. Now, beacon technology allows them to reach out to customers on mobile as they shop, to deliver special offers and real-time answers to their in-store questions.
Tags : 
customer experience, ecommerce, customer relationship, customer
    
Adobe
Published By: Adobe     Published Date: Mar 21, 2017
Every part of your customers’ experience counts, especially when they’re researching and shopping around for where they want to put their money. It’s one of the most emotional and complex of all consumer decisions. That’s because money matters. Banking. Investing. Insurance.
Tags : 
    
Adobe
Published By: MobileIron     Published Date: Feb 05, 2016
Mobile platforms have leapfrogged PC security for years, but as mobile device adoption explodes worldwide, these platforms face more security threats than ever before. While mobile devices are still safer than PCs, hackers are relentlessly searching for new ways to exploit these operating systems and gain access to their valuable data. Four major threats are currently targeting iOS and Android devices using very clever tactics. In fact, users may not know their devices have been compromised until after their data has been hacked.
Tags : 
mobile malware, activesync, mobile platforms, hackers, data threat, android, ios
    
MobileIron
Published By: MobileIron     Published Date: Aug 04, 2016
Mobile platforms have leapfrogged PC security for years, but as mobile device adoption explodes worldwide, these platforms face more security threats than ever before. While mobile devices are still safer than PCs, hackers are relentlessly searching for new ways to exploit these operating systems and gain access to their valuable data. Four major threats are currently targeting iOS and Android devices using very clever tactics. In fact, users may not know their devices have been compromised until after their data has been hacked.
Tags : 
mobile malware, activesync, mobile platforms, hackers, data threat, android, ios
    
MobileIron
Published By: SAP     Published Date: May 20, 2015
Best practices and resources for companies researching, justifying, developing, launching, and maintaining successful B2B e-commerce operations
Tags : 
b2b, ecommerce playbook, operations, consumers, mobile browsers
    
SAP
Published By: Deluxe     Published Date: Mar 15, 2017
Best-in-class FI marketers have embraced the power of signals. Through their everyday actions, consumers and businesses continually create signals for marketers like you. A signal is an indication of intent or behavior. Examples of activities that produce signals include making a purchase, searching online for information about a financial product, clicking on an ad, applying for a loan, and paying off debt. Each signal can be tracked, monitored, and acted upon. Reaching customers at the critical moment, in the right channel with the right message, requires keen insights about the signals they’re producing. Signals aren’t new to marketing. In fact, you may already be using new mover lists or even search engine marketing. Today, though, there is so much more valuable data available — if you know where to look and what to do with it.
Tags : 
    
Deluxe
Published By: Oracle PaaS/IaaS/Hardware     Published Date: Jul 25, 2017
"This paper provides guidance to organizations interested in researching Oracle’s SPARC M7 and Oracle Solaris 11 security features and capabilities. It will also provide a high level overview of some of the noteworthy features that these two product offerings bring to the market. We will review industry best practices in information security as it relates to these Oracle products in the context of a secure implementation. This paper is not meant to be an in depth technical paper, position paper, or security implementation guide. It will instead endeavor to deliver a foundational level of knowledge of the SPARC M7 processor and server technology and the function set within Oracle Solaris 11 that are primarily relevant to information security as it is current understood. The information used to compose this paper was collected from a variety of open sources, interviews with Oracle subject matter experts, and reviews of OEM (Original Equipment Manufacturer) documentation and specification
Tags : 
    
Oracle PaaS/IaaS/Hardware
Published By: Patsnap     Published Date: Jul 25, 2016
IP data can be used for a lot more than traditional patent searching. In this white paper we look at how the insights from IP can be used to identify and mitigate risks. And we used virtual reality as our guide.
Tags : 
virtual reality, vr headset, oculus rift, head mounted display, immersive experience, microsoft
    
Patsnap
Published By: Oracle Marketing Cloud     Published Date: Oct 05, 2017
These days, everyone knows people use multiple channels for shopping, researching products, and communicating with friends and colleagues. Marketers have responded by using a variety of channels to communicate their message. In fact 55% of marketers use at least 10 channels within their marketing channel-mix according to the findings of recent Aberdeen research. The facts are: Utilizing multiple channels has become the ‘new normal.' Simply adding yet another channel within the channel-mix is not enough for marketers to differentiate their business. Instead, savvy marketers distinguish themselves by orchestrating campaigns across all channels to deliver truly personalized and consistent conversations. Download this guide to learn the business value marketers derive by mastering orchestration of omni-channel marketing campaigns. It’ll also reveal several building blocks marketers must use to achieve superior results.
Tags : 
    
Oracle Marketing Cloud
Published By: Oracle     Published Date: Nov 30, 2017
The DNS is an often-overlooked protocol. Historically, many companies believed they could either run their own DNS service in-house or simply use a bundled option provided by their hosting or CDN provider. However, with the rise in DDoS attacks and continued migration to the cloud, the mission-critical nature of the DNS has become quite apparent to companies around the world. As a result, many are searching for a managed DNS provider.
Tags : 
dns, email delivery, global ip, network, connectivity, isp, service provider
    
Oracle
Published By: Oracle Dyn     Published Date: Dec 06, 2017
The DNS is an often-overlooked protocol. Historically, many companies believed they could either run their own DNS service in-house or simply use a bundled option provided by their hosting or CDN provider. However, with the rise in DDoS attacks and continued migration to the cloud, the mission-critical nature of the DNS has become quite apparent to companies around the world. As a result, many are searching for a managed DNS provider.
Tags : 
dns, vendors, dns, ddos, attack, cyber security
    
Oracle Dyn
Published By: VMware AirWatch     Published Date: Feb 21, 2017
"Mobile and cloud deployment issues are dominating the concerns of organizations today. End-user mobility and flexibility versus IT control and visibility are the opposing requirements challenging even the most nimble of environments. Organizations are searching for several key capabilities to address this dichotomy: • Infrastructure that is optimized for end users to drive down costs, simplify acquisition, upgrade easily, and support policy management • Flexibility in delivering workspaces to users—on-premises, cloud, and offline—all within a unified workspace with single sign-on • Management capabilities encompassing the entire ecosystem and providing security, compliance, and management of day-to-day end-user environments Download this asset to learn how VMware addresses these needs more effectively than Citrix with the VMware mobile-cloud architect."
Tags : 
    
VMware AirWatch
Published By: Concur     Published Date: Aug 15, 2017
Automation is only part of the solution, however. While most systems track clear-cut T&E purchases, the reality is that some T&E costs simply can’t be captured by traditional solutions. And they impact your bottom line whether you track them or not. To truly manage all spending, you have to know what to look for and where to look. And this guide is a great place to start.
Tags : 
researching, booking, data, travel, safety, tax liabilities, concur
    
Concur
Start   Previous   1 2 3    Next    End
Search      

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.