Cookie policy: This site uses cookies (small files stored on your computer) to simplify and improve your experience of this website. Cookies are small text files stored on the device you are using to access this website. For more information on how we use and manage cookies please take a look at our privacy and cookie policies. Some parts of the site may not work properly if you choose not to accept cookies.

sections
 

critical

Results 2551 - 2575 of 2675Sort Results By: Published Date | Title | Company Name
Published By: Third Brigade     Published Date: Nov 27, 2006
This white paper identifies critical vulnerabilities that most organizations overlook when they secure their web applications. It also introduces host intrusion defense with deep packet inspection as a new, effective  approach for shielding these vulnerabilities.
Tags : 
web application security, application security, web security, web service security, security management, internet security, ips, intrusion prevention
    
Third Brigade
Published By: Progress     Published Date: Oct 09, 2017
Tailoring experiences for customers is critical to make your business standout. Customization works well for organizations that want to enhance their standard customer experience but don’t have the necessary tools or strategy for in-depth personalization. Learn about the 5 best practices for customizing websites and the 5 biggest challenges marketers face while customizing their websites.
Tags : 
    
Progress
Published By: Progress     Published Date: Jan 22, 2019
Tailoring experiences for customers is critical to make your business standout. Customization works well for organizations that want to enhance their standard customer experience but don’t have the necessary tools or strategy for in-depth personalization. Learn about the 5 best practices for customizing websites and the 5 biggest challenges marketers face while customizing their websites.
Tags : 
    
Progress
Published By: Progress     Published Date: Jan 22, 2019
Tailoring experiences for customers is critical to make your business standout. Customization works well for organizations that want to enhance their standard customer experience but don’t have the necessary tools or strategy for in-depth personalization. Learn about the 5 best practices for customizing websites and the 5 biggest challenges marketers face while customizing their websites.
Tags : 
    
Progress
Published By: NetApp     Published Date: Dec 12, 2013
Despite the hype, Big Data has introduced critical challenges for modern organizations – and unprepared organizations risk getting buried beneath an avalanche of information. In this informative webcast, join industry and business intelligence (BI) expert Wayne Eckerson as he tackles the challenges of Big Data. Uncover practical tips and tactics for driving value with your Big Data platform – watch now to learn more.
Tags : 
netapp, big data, webinar, webcast, unprepared organizations, avalanche of info, business intelligence, alcatel lucent
    
NetApp
Published By: Cisco     Published Date: Jun 03, 2015
In this webinar, you'll receive valuable information that answers critical IT questions for today and tomorrow.
Tags : 
data center, software, networking, applications, hybrid cloud, sdn, bandwidth management, infrastructure
    
Cisco
Published By: Oracle     Published Date: Jan 20, 2017
"Many large enterprises struggle to decide which workloads and systems should be deployed in the public cloud versus on premise. With a strong on-premises platform in place, organizations benefit from increased reliability, speed, and security. On the other hand, by leveraging the public cloud, they gain increased flexibility and recovery capabilities. So, what goes best where? Jim Rapoza, Senior Research Analysts at Aberdeen Group and Chuck Hollis, Senior VP at Oracle, will provide guidance aimed at helping organizations choose the right platforms for their critical workloads. They will analyze how Best-in-Class enterprises effectively integrate on-premises solutions and the public cloud, and recommend steps that businesses can take to become IT infrastructure leaders."
Tags : 
    
Oracle
Published By: IBM Corporation     Published Date: Jun 09, 2011
Learn the 10 critical database activities & behaviors enterprises should audit now.
Tags : 
ibm, guardium, database, audit, security, risk, monitoring, webcast
    
IBM Corporation
Published By: IBM     Published Date: Feb 03, 2010
Catch the latest analyst insights on what matters in the UC market - what is critical - the value of telephony integration - and the benefits of a sound call control strategy.
Tags : 
ibm ep, empowering people, telephony integration, unified communications, collaboration cost, ip telephony
    
IBM
Published By: LiveHive     Published Date: Feb 16, 2016
When building out a sales organization and sales process, one of the most critical success factors is having a well-aligned, collaborative Inside Sales and Field team. Join Ledi Imeraj, Senior Sales Executive, LiveHive, who has led and mentored sales professionals for several years, as she shares best practices on Inside Sales success in supporting the Field.
Tags : 
livehive, collaboration, inside sales, sales process
    
LiveHive
Published By: PGi     Published Date: Oct 01, 2018
You wouldn’t hold a critical investor call, customer event or shareholder’s meeting in your office bullpen. So why would you host an important virtual event on a platform intended to support small-group collaboration and teamwork? Frost & Sullivan research shows that two-thirds of companies use web conferencing on a regular basis for project collaboration. We also know that more and more of them are turning to the same solutions to host webinars for critical internal and external events. While web conferencing solutions can be used to support large-group or strategically important meetings, webinar technology is designed specifically for that purpose and will almost always deliver a better experience and a higher return on investment. Webinar tools deliver a wealth of features to help companies gain better insights into attendee sentiment for better investor relations, employee and customer experience, and lead generation and qualification: • Integrated video draws higher levels of int
Tags : 
    
PGi
Published By: Black Duck Software     Published Date: Dec 29, 2015
Today, companies are more concerned than ever about software security threats. With some 95 percent of companies relying on open source software, its security is now a critical focus for CEOs, COOs, and boards of directors. Learn which security tools and methodologies are best suited for your organization's environment.
Tags : 
black duck, open source, application security, security, compliance, appsec, software vulnerabilities, risk management
    
Black Duck Software
Published By: Black Duck Software     Published Date: May 18, 2016
Today, companies are more concerned than ever about software security threats. With some 95 percent of companies relying on open source software, its security is now a critical focus for CEOs, COOs, and boards of directors. Learn which security tools and methodologies are best suited for your organization's environment.
Tags : 
black duck, open source, security, security testing tools, software, enterprise applications
    
Black Duck Software
Published By: Epicor Software     Published Date: Feb 26, 2015
Online consumers are redefining the fulfillment landscape. Wholesalers need to unlock the value of integrated business data. Only full insight into all areas of the distributor’s business will provide the necessary clarity to make decisions they can stand behind. This confidence can be achieved only if they have the required data and technology at hand at the right time. The total technology investment is not small. But, it may mean the future viability of the wholesale distribution segment. Why now is the critical time to invest.
Tags : 
wholesale distribution, online consumers, integrated business data, it management
    
Epicor Software
Published By: Outreach.io     Published Date: Sep 17, 2019
A sales engagement platform (SEP) helps sales organizations stand out and sell easier. Although a relatively new technology, it is now seen as one of the most important platforms for the modern sales tech stack, with 92% of surveyed sales organizations calling it critical to their team’s success. This eBook is intended for readers interested in learning more about SEPs and how it enables more engagement with less effort. Readers will get an overview of a SEP and the advantages for executing key sales workflows, how it easily integrates with your existing sales stack, and core functionalities that solve historical problems for sales teams. Finally, we close by highlighting a real-life example of the great advancements one customer achieved just five months after implementing a SEP.
Tags : 
    
Outreach.io
Published By: Microsoft Visual Studio Team System     Published Date: Feb 25, 2009
ALM is much more than just writing code. All three aspects—governance, development, and operations are important. Maximizing the value of the applications we create means doing all three aspects of ALM well. Achieving this goal isn’t easy, especially when today’s ALM tools aren’t as well integrated as they could be. Yet there’s no way around it: Taking a broad, holistic view of ALM is essential for improving this critical business process.
Tags : 
vsts, alm, application lifecycle management, software development lifecycle, sdlc, governance, it management
    
Microsoft Visual Studio Team System
Published By: IBM     Published Date: Jul 27, 2016
IBM i2 Enterprise Insight Analysis helps analysts and investigators turn large data sets into comprehensive intelligence, in near real-time. With the help of advanced analytics and visual analysis capabilities, analysts can uncover hidden connections, patterns and trends buried in disparate data. Equip analysts and those on the front line with the tools they need to generate actionable intelligence, with mission critical speed.
Tags : 
ibm, cyber threat analysis, ibm i2 enterprise insight analysis, cyber security, business intelligence, security
    
IBM
Published By: IBM     Published Date: Oct 06, 2016
Defensive weak spots are just waiting to be found and exploited by persistent cyber attackers. But with cyber threat analysis, you quickly identify, disrupt and mitigate breaches by uncovering critical insights unseen by traditional defenses.
Tags : 
cyber security, threats, enterprise insight analysis, data computation, intelligence
    
IBM
Published By: Crownpeak     Published Date: Aug 25, 2016
Here’s why Digital Quality Management is mission-critical for any global enterprise, and how it’s helping digital marketers achieve their objectives.
Tags : 
crownpeak, digital marketing, digital quality management, marketing, marketers, digital governance, dqm, online marketing
    
Crownpeak
Published By: Gleanster Research     Published Date: Oct 22, 2013
This Deep Dive from Gleanster research will explore why some marketing technologies may not be the best solution for distributed marketers and how an merging class of technology called “local marketing automation” is enabling corporate marketing to oversee brand consistency and simultaneously give local marketers autonomy and control over communications to their local target audiences.
Tags : 
    
Gleanster Research
Published By: FICO EMEA     Published Date: Aug 30, 2019
Fraud is a serious concern for the communications industry, with proceeds and services used by organised crime and terrorist networks. Whilst reliable statistics are difficult to come by, industry association Communications Fraud Control Association (CFCA) estimates the total global fraud loss at around $29bn annually. Of this, over $7bn is attributed to subscription fraud and account takeover. In an industry which is undergoing widespread digital transformation to streamline customer journeys and reduce operating costs through automation, preventing fraud is critical. Learn More
Tags : 
telecom subscription fraud, prevent fraud, fight fraud
    
FICO EMEA
Published By: IBM     Published Date: Nov 10, 2016
Within any organization, business content – applications, forms, reports, office documents, audio, video, and social media – is poorly managed and often out-of-reach of critical business processes. And, when business content is invisible, unclassified or unmanaged, it creates chaos. Content chaos causes a breakdown in the flow of information between an organization and its customers, its partners and even within itself – failures that often impact customer engagement, business agility, and the capacity to collaborate securely and effectively. It's time you learn how to put your business content to work.
Tags : 
ibm, analytics, ecm, business cost, business process, enterprise applications
    
IBM
Published By: Domino Data Lab     Published Date: May 23, 2019
As data science becomes a critical capability for companies, IT leaders are finding themselves responsible for enabling data science teams with infrastructure and tooling. But data science is much more like an experimental research organization than the engineering and business teams that IT organizations support today. Compounding the challenge, data science teams are growing fast, often by 100% a year. This guide will quickly help you understand what data science teams do to build their predictive models and how to best support them. Learn how to modernize IT’s approach to ensure your company’s data science teams perform their best, and maximize impact to the business. Some highlights include: Why data science should not be treated like engineering. How to go beyond simple infrastructure allocation and give data science teams capabilities to manage their workflows and model lifecycle. Why agility and special hardware to support burst computing are so important to data science break
Tags : 
    
Domino Data Lab
Published By: Stratus Technologies     Published Date: Sep 30, 2008
The Choices from many reputable suppliers of IT managed services can appear very much alike. Yet when you have a mission-critical business process whose function must not be interrupted, you know your requirements call for something above and beyond. This paper serves as a field guide to help you identify key characteristics that set a critical managed IT service apart from even highly capable general-purpose offerings.
Tags : 
stratus technologies, it services, business impact analysis (bia), recovery point (rpo), recovery time objectives (rto), business continuity (bc), disaster recovery (dr) protection, service level agreement (sla)
    
Stratus Technologies
Published By: SpringCM     Published Date: Dec 06, 2006
You’ve made the decision: the overall ease and economics of implementing Software-as-a-Service (SaaS) appeal to you, and you have selected an application that delivers what you need for your business.  The last hurdle is the service component itself — making sure that critical factors like security, speed, and reliability that will affect your users’ experience meet your standards.
Tags : 
saas, on-demand, on demand, real time, real-time, appication selection, vendor selection, software selection
    
SpringCM
Start   Previous    93 94 95 96 97 98 99 100 101 102 103 104 105 106 107    Next    End
Search      

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.