Cookie policy: This site uses cookies (small files stored on your computer) to simplify and improve your experience of this website. Cookies are small text files stored on the device you are using to access this website. For more information on how we use and manage cookies please take a look at our privacy and cookie policies. Some parts of the site may not work properly if you choose not to accept cookies.

sections
 

gen

Results 26 - 50 of 7126Sort Results By: Published Date | Title | Company Name
Published By: IBM     Published Date: Jul 14, 2017
Technology has always enabled companies to reinvent how they engage with customers. But now we are seeing a profound shift – the convergence of physical and digital customer interactions – which is fundamentally changing how customers will interact and transact with brands and businesses everywhere. To better understand these dynamics, the IBV is conducting a Customer Experience (CX) study, published as a series, with multiple reports organized by topic.
Tags : 
digital interaction, experience design, interactive experience, cross functional collaboration, customer experience, integrated data
    
IBM
Published By: VIDEOHUB     Published Date: Mar 14, 2012
When you sign up and complete $2500 worth of advertising on Videohub Marketplace, we add $500 to your account, which you can use immediately in crease your reach or save for a future campaign.
Tags : 
acudeo, adwords, beet tv, bright cove, buy video ad, dealer marketing, google ad, hotel marketing, iab, jw player, local business marketing, local tv, local video marketing, long tail tv, online video ad, ova, pre roll, real estate marketing, restaurant marketing, spot tv
    
VIDEOHUB
Published By: LeadLife Solutions     Published Date: Oct 20, 2008
Being first in mind with leads, prospects, and customers means maximizing your sales and marketing resources and your revenue. Many of us think that interacting early with a lead is enough. But the reality is nurturing leads can create more sales than the initial lead generation itself. It's also about nurturing your customer base. Being first in mind has a tremendous impact on business...
Tags : 
leadlife solutions, demand generation, revenue retention
    
LeadLife Solutions
Published By: IBM     Published Date: Nov 13, 2014
This webcast examines a large government agency struggling to provide stable test environments to support their partner landscape. Learn how service virtualization was used to simulate their department's core systems for a lower risk, less expensive, and stable testing environment.
Tags : 
service virutalization, core systems, testing environments, it management, enterprise applications
    
IBM
Published By: IBM     Published Date: Apr 20, 2017
Protecting confidential data while keeping mobile users productive. The terms Data Leak Prevention (DLP) and Container are beginning to dominate the mobile management conversation. Over the past few years great strides have been made in providing the tools and solutions that offer management and security for mobile devices; both for devices the enterprise owns and those that employees own. While these solutions generally meet the need to secure the device, they have been lacking in some of the more sophisticated security aspects that are commonplace in laptop and distributed network deployments. Specifically lacking are the robust DLP controls common in laptop management solutions.
Tags : 
    
IBM
Published By: Lumesse     Published Date: May 15, 2015
This paper explores how critical it is to have an agile talent management strategy in place. Being mobile and social are key to attracting, developing and retaining the cream of Gen Z.
Tags : 
gen z, employees, retain talent, talent management, strategy, generation z, workplace, hr trends, hr technology, recruitment, social media hr
    
Lumesse
Published By: Uberflip     Published Date: Jan 03, 2019
No matter what industry you’re in or role you have, we all share a universal interest in trends. As marketers, we look to Google Trends to understand what keywords and search terms are most popular; we look for trending hashtags and conversations on social to inform the content we put out; and we put “Trends” sessions on our agendas at conferences because we know they’ll draw an audience. We’ve tapped into this almost universal desire to understand what the masses are doing.
Tags : 
    
Uberflip
Published By: CloudHealth by VMware     Published Date: Feb 13, 2019
While cost is often cited as the reason why people move to the cloud, it's not always that simple. Many organizations have noticed cloud bills 2-3x higher than expectations, when not managed properly. Have you achieved the savings you expected? Learn 10 ways you can reduce your spend in AWS, including: -Terminate Zombie Assets -Rightsize EC2 Instances & EBS Volumes -Upgrade instances to the latest generation -Delete Disassociated Elastic IP Addresses Check out this eBook to find out how you can better manage your costs through pro-tips from cloud experts.
Tags : 
cloud management, amazon web services, multicloud management, amazon ec2
    
CloudHealth by VMware
Published By: CloudHealth by VMware     Published Date: Apr 15, 2019
While cost is often cited as the reason why people move to the cloud, it's not always that simple. Many organisations have noticed cloud bills 2-3x higher than expectations, when not managed properly. Have you achieved the savings you expected? Learn 10 ways you can reduce your spend in AWS, including: Terminate Zombie Assets Rightsize EC2 Instances & EBS Volumes Upgrade instances to the latest generation Delete Disassociated Elastic IP Addresses Check out this eBook to find out how you can better manage your costs through pro-tips from cloud experts.
Tags : 
    
CloudHealth by VMware
Published By: McAfee     Published Date: Aug 14, 2014
URL filtering is a must for enterprise policy management. While the process is not difficult to implement, you can make it even easier and more effective by adhering to 10 best practices for URL filtering.
Tags : 
url filter, firewall url, web filtering, website blocking, white listing, next generation firewall, ngfw, ngfw features, security, enterprise applications
    
McAfee
Published By: Birst     Published Date: Jul 16, 2013
Birst’s Salesforce Reporting and Analytics helps sales managers analyze all of the critical salesforce.com data to uncover insightful pipeline information. Combining sales data with marketing, financial and operational data to obtain a comprehensive view of the pipeline is where Birst excels.
Tags : 
business intelligence, agile bi, self service bi, bi in the cloud, unified bi, mobile bi, embedded analytics, business analytics, sales analytics, hr analytics, marketing analytics, financial analytics, supply chain analytics, automated data management, dashboards, infrastructure
    
Birst
Published By: MicroStrategy     Published Date: Jan 23, 2019
By 2025, the total amount of data produced will grow to 175 zettabytes, according to IDC’s Data Age 2025 Report. How will enterprises evolve over the next year to manage and make the most of this unprecedented growth? Download 10 Enterprise Analytics Trends to Watch in 2019 to learn how leading organizations will win with embedded and augmented analytics, HyperIntelligence, collaboration, enterprise AI strategies, and more. This eBook details the transformational technologies data-driven organizations will need to leverage to get and stay ahead in 2019 and beyond, with contributions from thought leaders, including: Mike Gualtieri of Forrester Research Ray Wang and Doug Henschen of Constellation Research Mark Smith and David Menninger of Ventana Research Chandana Gopal of IDC Ronald van Loon, and more. Is your organization ready for the data-driven future? Read 10 Enterprise Analytics Trends to Watch in 2019 today to find out.
Tags : 
    
MicroStrategy
Published By: MicroStrategy     Published Date: Apr 11, 2019
By 2025, the total amount of data produced will grow to 175 zettabytes, according to IDC’s Data Age 2025 Report. How will enterprises evolve over the next year to manage and make the most of this unprecedented growth? Download 10 Enterprise Analytics Trends to Watch in 2019 to learn how leading organizations will win with embedded and augmented analytics, HyperIntelligence, collaboration, enterprise AI strategies, and more. This eBook details the transformational technologies data-driven organizations will need to leverage to get and stay ahead in 2019 and beyond, with contributions from thought leaders, including: Mike Gualtieri of Forrester Research Ray Wang and Doug Henschen of Constellation Research Mark Smith and David Menninger of Ventana Research Chandana Gopal of IDC Ronald van Loon, and more. Is your organization ready for the data-driven future? Read 10 Enterprise Analytics Trends to Watch in 2019 today to find out.
Tags : 
    
MicroStrategy
Published By: Diligent     Published Date: Aug 05, 2016
When organizations engage a board portal provider, they are entrusting them to safeguard sensitive documents and provide a system for managing access to those documents. This trust goes beyond technical specifications.
Tags : 
board portal, document management, security management
    
Diligent
Published By: Infor     Published Date: Jun 13, 2017
El retorno de la inversión de la digitalización se puede acelerar reduciendo costes o aumentando ingresos. Según se detalla en «El próximo gran paso en fabricación: construir un Ecosistema industrial digital», casi dos terceras partes de los fabricantes esperan que las tecnologías de fabricación digitales, les ayuden a reducir los gastos generales al menos en un 11%.
Tags : 
    
Infor
Published By: CDW     Published Date: Feb 27, 2015
The real test of any SAM system goes beyond creating a one-time Effective Licensing Position (ELP) for a given software publisher. To be truly valuable, the SAM solution has to have the ability to manage change. Being able to work from a dependable list of software that has been approved by, and which also serves the business, means that finite IT & SAM resources are not wasted through the support of legacy software that might be deemed redundant, and should keep a company on track technically by not becoming dependent on aging software. This 10 –Minute Guide from SAM experts at Snow Software will show how to establish and maintain a Software Catalog for the purpose of ensuring that your software estate remains relevant and fit for its business purpose.
Tags : 
software management, sam, software security, cloud computing, enterprise content management, business intelligence, office productivity apps, network security, internet security, network security appliance, security management, best practices, business management, data protection, mobile device management, snow, bank of ireland, assets, it management
    
CDW
Published By: McAfee     Published Date: Aug 14, 2014
What factors should you consider before investing in a next-generation firewall? Discover these 10 features that are essential for enterprise network security.
Tags : 
next generation firewall, firewall features, firewall checklist, firewall rfp, ngfw, security, network security
    
McAfee
Published By: Cyveillance     Published Date: Apr 10, 2015
In today’s security landscape, more vendors than ever are offering what is purported to be “threat intelligence.” Although security experts often have different definitions for this term, one thing many of them can agree on is that an intelligence-led approach to security – that is, putting threat intelligence to real-world use – is critical to protecting organizations. If the goal of an intelligence-led security strategy is to help organizations be more proactive in finding and preparing for threats to physical and digital assets, it’s crucial to define and understand exactly what threat intelligence means, and separate fact from fiction. In this whitepaper, we dispel some common myths about threat intelligence.
Tags : 
myths, cyber, threat, intelligence, fact, fiction, big data, cloud, networking, security
    
Cyveillance
Published By: Diligent     Published Date: Jul 10, 2017
The Corporate Secretaries International Association (CSIA) is a Geneva-registered global organisation whose mission is ‘‘to develop and grow the study and practice of Secretaryship, to improve professional standards, the quality of governance practice and organisational performance.’’ CSIA was established in 2010 as a not-for-profit organisation committed to improving the recognition and understanding of the practice of corporate secretaryship and the role of the corporate secretary. Its structure as an international federation of professional bodies enables it to effectively represent those practitioners who work at the frontline of governance.
Tags : 
communication, client-agency relationships, budgeting, digital marketing, personal relation improvement, resource management
    
Diligent
Published By: CA Technologies EMEA     Published Date: Sep 13, 2018
Piů di 400.000 lavoratori di circa 400 societŕ, tra cui Polycom, Qantas e Toyota, usano giŕ CA Project & Portfolio Management SaaS (CA PPM SaaS) per ridurre i costi, promuovere l'adozione e applicare processi decisionali piů intelligenti. Con l'aiuto di CA Services, le aziende possono distribuire e configurare facilmente CA PPM SaaS, semplificando il processo di acquisto, utilizzo e gestione della soluzione.
Tags : 
    
CA Technologies EMEA
Published By: Akamai Technologies     Published Date: Aug 17, 2017
Die Suche nach dem richtigen Cloudsicherheitsanbieter ist kein einfaches Unterfangen. Viele Anbieter scheinen auf den ersten Blick gleich: ähnliche Kennzahlen, ähnliche Versprechungen. Um allerdings einen echten Vergleich ziehen zu können, müssen Sie Informationen sammeln, Fragen stellen und Details herausfinden, die viele Cloudanbieter nur ungern preisgeben. Mithilfe dieser Liste können Sie sich anhand fundierter Informationen für den richtigen Cloudsicherheitsanbieter entscheiden, der Ihr Unternehmen vor Cyberangriffen schützt.
Tags : 
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: May 24, 2017
Die Suche nach dem richtigen Cloudsicherheitsanbieter ist kein einfaches Unterfangen. Viele Anbieter scheinen auf den ersten Blick gleich: ähnliche Kennzahlen, ähnliche Versprechungen. Um allerdings einen echten Vergleich ziehen zu können, müssen Sie Informationen sammeln, Fragen stellen und Details herausfinden, die viele Cloudanbieter nur ungern preisgeben. Mithilfe dieser Liste können Sie sich anhand fundierter Informationen für den richtigen Cloudsicherheitsanbieter entscheiden, der Ihr Unternehmen vor Cyberangriffen schützt.
Tags : 
    
Akamai Technologies
Published By: Mitel     Published Date: Apr 07, 2017
Les solutions sur site exigent un investissement initial élevé ainsi que d'importants frais récurrents de gestion, de maintenance et de mise ŕ niveau de la technologie.
Tags : 
    
Mitel
Published By: Mitel     Published Date: Apr 07, 2017
Les solutions sur site exigent un investissement initial élevé ainsi que d'importants frais récurrents de gestion, de maintenance et de mise ŕ niveau de la technologie.
Tags : 
    
Mitel
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.