Cookie policy: This site uses cookies (small files stored on your computer) to simplify and improve your experience of this website. Cookies are small text files stored on the device you are using to access this website. For more information on how we use and manage cookies please take a look at our privacy and cookie policies. Some parts of the site may not work properly if you choose not to accept cookies.

sections
 

esi

Results 76 - 100 of 3130Sort Results By: Published Date | Title | Company Name
Published By: GrapeCity, Inc.     Published Date: Feb 25, 2013
When it comes to explaining information, this white paper outlines a few basic data visualization tips to improve the impact of visualizations, ensuring that the story in the data is expressed as effectively as possible.
Tags : 
ad hoc reporting, ad hoc report designer, self-service bi, business intelligence, reporting, activereports, web-based reporting, mobile bi, end user reporting, dashboards, data visualization, charts, reports, analytics, multi-tenant, self-service reporting, crystal
    
GrapeCity, Inc.
Published By: iCims     Published Date: Apr 01, 2015
In order for your organization to recruit and maintain top talent, you need modern, specialized recruitment technology that is designed to meet today's talent acquisition challenges. Learn what to look for when evaluating talent acquisition software in our free whitepaper.
Tags : 
recruiting, staffing, hiring
    
iCims
Published By: LogMeIn     Published Date: Mar 01, 2012
Traditional remote access and meeting tools were not designed as remote support tools for helpdesks and IT professionals. LogMeIn consults daily with helpdesk and operations managers and here's what we've learned are the top five hidden costs of using legacy tools to provide remote support.
Tags : 
support tools, customer support, technical support, technology, it support, service desk, help desk
    
LogMeIn
Published By: CA Technologies     Published Date: Mar 06, 2015
Le API (Application Programming Interface) costituiscono le fondamenta di questa nuova azienda "aperta", consentendo alle società di riutilizzare le risorse informative esistenti al di là dei confini dell'organizzazione.
Tags : 
    
CA Technologies
Published By: Aditi     Published Date: Jun 11, 2015
Your mobile device is speaking to your garage door. Your alarm is telling your coffee maker you are up and it’s time to get that caffeine kick going. Your car is dropping your thermostat a message, telling it to keep the house warm before you step in. This isn’t a quote from an Issac Asimov novel, it’s the reality of how the Internet of Things is making a difference to our lives. Most of us are consciously making the shift to a connected world, while at home or at work. While this has caught the public imagination, enterprises are chasing to fulfil their Internet-of-Things-ambitions and transform their customer experience. In this e-book we aim to address the 5 fundamental questions that one should not hesitate to ask about your foray into the world of Internet of Things, while telling you how it can reshape your business.
Tags : 
aditi, rfids scada, c-suite, optimization, lot, hybrid cloud, it management
    
Aditi
Published By: Brooks Digital Marketing     Published Date: Sep 22, 2010
This white paper brings to light the critical but often hidden issues involved with creating a website that many web designers are not aware of themselves.
Tags : 
website design
    
Brooks Digital Marketing
Published By: Group M_IBM Q418     Published Date: Nov 13, 2018
Since data encryption is a core piece of any security strategy, start by talking with your CIO. This guide is designed to help you determine the right questions to ask your CIO to become better informed about your bank’s cybersecurity position.
Tags : 
    
Group M_IBM Q418
Published By: Group M_IBM Q119     Published Date: Jan 18, 2019
Since data encryption is a core piece of any security strategy, start by talking with your CIO. This guide is designed to help you determine the right questions to ask your CIO to become better informed about your bank’s cybersecurity position.
Tags : 
    
Group M_IBM Q119
Published By: Datto Inc.     Published Date: May 08, 2013
The growth of the backup and disaster recovery market, and desire for increased revenues, has prompted MSPs to consider building their own BDR solutions. Learn the top 5 reasons factors MSPs need to evaluate when considering a “do-it-yourself” BDR.
Tags : 
datto, backup, disaster recovery, bdr, backup and recovery
    
Datto Inc.
Published By: Dell EMC     Published Date: May 12, 2016
A remote or branch office is very different from a traditional data center. It needs converged appliances that offer manageability, performance, flexibility, and a unique form factor.
Tags : 
    
Dell EMC
Published By: Oracle APAC     Published Date: May 24, 2018
By optimizing their on-premises IT environments and moving processes and workloads to the cloud, businesses can reduce time-to-market, increase agility, and minimize total cost of ownership. Oracle’s Linux and Virtualization offerings are designed to help you easily optimize your current on-premises environment, and offer a clear path to cloud—so you can migrate your workloads when the time is right.
Tags : 
    
Oracle APAC
Published By: GrapeCity, Inc.     Published Date: Feb 25, 2013
Since business-wide deployment of ad hoc reporting tools can be a resource-intensive process, this white paper offers five-step roadmap of evaluation steps to help fully assess the quality of the products under consideration.
Tags : 
ad hoc reporting, ad hoc report designer, self-service bi, business intelligence, reporting, activereports, web-based reporting, mobile bi, end user reporting, dashboards, data visualization, charts, reports, analytics, multi-tenant, self-service reporting, crystal
    
GrapeCity, Inc.
Published By: Schneider Electric     Published Date: Aug 15, 2017
The reference guide lays out for data center managers a step-by step approach to data center consolidation. By breaking down the process into clear and identifiable actions – all of which are covered in the sections below – a data center consolidation becomes much more manageable, and the odds of its success much higher.
Tags : 
assessment, strategical planning, design, commission, operation, additional resources, schneider electric
    
Schneider Electric
Published By: EMA     Published Date: Oct 01, 2014
A new mantra is emerging for IT professionals – Quality of Experience (QoE). In order to align monitoring and management practices with the true demands of the business, IT professionals must expand beyond traditional comfort zones of watching network and system health metrics to begin measuring and understanding the experience IT end users are having. Join EMA Vice President of Research, Jim Frey, and Fluke Networks Director of Products, Doug Roberts, for this on-demand webinar and discussion that will reveal:
Tags : 
quality of experience, qoe, monitoring, network, systems, applications, services, proactive practices
    
EMA
Published By: Juniper Networks     Published Date: Oct 19, 2015
The guidelines provided in this white paper make up some of the best practices entailed in creating an overall security policy for your organization that underlies deployment of effective firewalls.
Tags : 
juniper, firewall, threat, security, policy, configuration, packet, networking
    
Juniper Networks
Published By: Juniper Networks     Published Date: Feb 18, 2015
The 5 Steps to Firewall Planning and Design Guide provides a step-by-step summary for planning your network firewall. It also contains links to the more detailed list of useful sites and publications on the subject. If you’re designing your company’s firewall architecture, read this first.
Tags : 
firewall planning, network firewall, security policy, http, terminal server, network
    
Juniper Networks
Published By: Resilient Systems, Inc.     Published Date: Nov 24, 2015
It’s practically impossible to be completely prepared for a security incident – invariably something happens that best laid plans don’t address. But that doesn’t mean organizations shouldn’t try.
Tags : 
resilient systems, cyber security, incident response, plan, guide, security
    
Resilient Systems, Inc.
Published By: Carbonite     Published Date: Feb 22, 2017
There are five essential steps to protecting data and applications from the most common causes of data loss and downtime. IT pros who follow these steps can feel confident in their long-term organizational plan. Read this expert guide from Ben Maas, an independent consultant and system architect who has guided many companies through backup and disaster recovery (BDR) deployments.
Tags : 
backup, disaster, recovery, bdr, carbonite, environment
    
Carbonite
Published By: Carbonite     Published Date: Apr 09, 2018
There are five essential steps to protecting data and applications from the most common causes of data loss and downtime. IT pros who follow these steps can feel confident in their long-term organizational plan. Read this expert guide from Ben Maas, an independent consultant and system architect who has guided many companies through backup and disaster recovery (BDR) deployments.
Tags : 
    
Carbonite
Published By: Carbonite     Published Date: Apr 11, 2018
There are five essential steps to protecting data and applications from the most common causes of data loss and downtime. IT pros who follow these steps can feel confident in their long-term organizational plan. Read this expert guide from Ben Maas, an independent consultant and system architect who has guided many companies through backup and disaster recovery (BDR) deployments.
Tags : 
    
Carbonite
Published By: Carbonite     Published Date: Oct 10, 2018
There are five essential steps to protecting data and applications from the most common causes of data loss and downtime. IT pros who follow these steps can feel confident in their long-term organizational plan. Read this expert guide from Ben Maas, an independent consultant and system architect who has guided many companies through backup and disaster recovery (BDR) deployments.
Tags : 
    
Carbonite
Published By: CEB     Published Date: Dec 09, 2013
This guide is designed to break down the complex challenge of mitigating third-party corruption risk into manageable components. Based on hundreds of member conversations and extensive research, we believe that successful companies conduct third party due diligence in five key phases.
Tags : 
corruption risk, managing risk, compliance, risk, anticorruption, third-party corruption
    
CEB
Published By: Oracle     Published Date: Jan 21, 2014
Organizations across all sizes and industries are leveraging tools to simplify business. Traditionally, marketing technology has been very task specific, designed to operate within a single functional silo such as email campaign management or lead scoring. But marketers know the value and significance of aligning marketing automation, sales force automation (SFA), and customer relationship management (CRM) platforms in the cloud — a task that can be easily accomplished through the implementation of Marketing Technologies.
Tags : 
marketing technology, modern marketing, tenants, customer journey, segmentation, lead generation, eloqua, oracle
    
Oracle
Published By: Oracle     Published Date: Jan 22, 2014
Organizations across all sizes and industries are leveraging tools to simplify business. Traditionally, marketing technology has been very task specific, designed to operate within a single functional silo such as email campaign management or lead scoring. But marketers know the value and significance of aligning marketing automation, sales force automation (SFA), and customer relationship management (CRM) platforms in the cloud — a task that can be easily accomplished through the implementation of Marketing Technologies.
Tags : 
marketing technology, modern marketing, tenants, customer journey, segmentation, lead generation, eloqua, oracle
    
Oracle
Published By: Genesys     Published Date: Feb 12, 2019
Abbiamo chiesto a una serie di analisti e figure di riferimento del settore di indicarci quali saranno secondo loro le tendenze chiave relative all’engagement del cliente a partire dal 2017. Da tecnologie all’avanguardia come l’IoT e i Bot fino a nuove interpretazioni di idee del passato, i temi caldi indicati hanno fatto emergere cinque trend fondamentali destinati a ridefinire il futuro della Customer Experience. In questo ebook, scoprirai: I cinque trend che avranno il maggiore impatto sulla Customer Experience Come usare il machine learning per identificare tendenze e modelli utili a offrire un’eccezionale Customer Experience di nuova generazione Come avere un contact center all’avanguardia e adattarlo alle esigenze in rapida evoluzione dei clienti
Tags : 
    
Genesys
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.