Cookie policy: This site uses cookies (small files stored on your computer) to simplify and improve your experience of this website. Cookies are small text files stored on the device you are using to access this website. For more information on how we use and manage cookies please take a look at our privacy and cookie policies. Some parts of the site may not work properly if you choose not to accept cookies.

sections
 

inel

Results 26 - 43 of 43Sort Results By: Published Date | Title | Company Name
Published By: Hewlett Packard Enterprise     Published Date: May 10, 2019
Die Leistung von Unternehmensanwendungen hat unmittelbaren Einfluss auf die geschäftlichen Aktivitäten und Ergebnisse. Die Qualität der Anwendungsbereitstellung hängt davon ab, wie reibungslos die zugrunde liegende Dateninfrastruktur betrieben werden kann. Die optimale Anwendungsleistung und -bereitstellung lässt sich in komplexen Umgebungen nur schwer erreichen. Viele IT-Infrastruktur- und Betriebsteams haben ihre Belastungsgrenze bereits erreicht. Vorausschauende Analysen und maschinelles Lernen können in diesem Zusammenhang viel bewirken
Tags : 
    
Hewlett Packard Enterprise
Published By: SAS     Published Date: Jan 17, 2018
This RSR custom research report explores the impact of omnichannel methods on merchandising, marketing and the supply chain; specifically, what analytical capabilities address the challenges that omnichannel selling and fulfillment pose for retailers. Consumers today routinely begin their shopping journeys online, but complete their purchases in nearby stores, in their “home” stores or delivered directly to their doors. Retail analytics enables organizations to capture data from their customers' journeys. Retailers that successfully deliver relevant omnichannel experiences while gaining a more sophisticated understanding of demand (where and how it is initiated) will enhance their brands’ value and create compelling and profitable customer relationships.
Tags : 
    
SAS
Published By: UL EduNeering     Published Date: Jul 05, 2012
Third party intermediaries have played starring roles in some of the most highly publicized global corruption trials. By any measure, third party intermediaries routinely rank high on the list of compliance worries for brand companies.
Tags : 
fda, gmp, gcp, gxp, cms, osha, qsr, 21 cfr part 11
    
UL EduNeering
Published By: Cisco     Published Date: Jan 05, 2015
Be inspired by these mobility success stories by downloading these case studies: • Pinellas County Integrates Wired and Wireless Networks • Cisco Meraki Architecture Construction - C&S Companies • Hospital Pioneers Wi-Fi Patient Apps with Cisco BYOD Solution • Cisco CMX Connects Evergreen Brickworks Video
Tags : 
mobility, business solutions, cisco, mobile applications, secure mobile
    
Cisco
Published By: Cisco     Published Date: Apr 10, 2015
Let these case studies show how you can succeed with mobility, too. Pinellas County Integrates Wired and Wireless Networks Cisco Meraki Architecture Construction - C&S Companies Hospital Pioneers Wi-Fi Patient Apps with Cisco BYOD Solution Cisco CMX Connects Evergreen Brickworks Video
Tags : 
cisco, case study, byod, wireless, wifi, network integration, cmx, bandwidth management
    
Cisco
Published By: Juniper Networks     Published Date: Aug 07, 2017
Warum maschinelles Lernen entscheidend zur Cybersicherheit beiträgt
Tags : 
    
Juniper Networks
Published By: Cisco     Published Date: Aug 03, 2015
County Integrates Wired and Wireless Networks.
Tags : 
    
Cisco
Published By: NetIQ     Published Date: Aug 05, 2011
In this white paper, you'll learn about how Novell Sentinel can make protecting your system against these costly security threats easy and efficient. Keep security threats out and your data safe.
Tags : 
novell, novell sentinel, netiq, bulldog solutions, identity and security, security management, siem solutions, log management
    
NetIQ
Published By: AstuteIT_ABM_EMEA     Published Date: Feb 02, 2018
D’ici à 2021, le coût de la cybercriminalité pour l’économie mondiale devrait atteindre les 6 000 milliards de dollars, soit deux fois plus que les 3 000 milliards de dollars de 2016. En parallèle à ce que certains qualifient de « pire menace pour les entreprises du monde entier », les gens s'inquiètent de plus en plus de la sécurité de leurs données – non seulement des capacités des cybercriminels à utiliser des données volées pour usurper leur identité, mais aussi de l’utilisation de leurs données personnelles par les entreprises avec lesquelles ils interagissent.
Tags : 
rgpd, impact, sur, votre, gestion, donnees
    
AstuteIT_ABM_EMEA
Published By: Microsoft Dynamics CRM     Published Date: Mar 30, 2010
This report reveals how Best-in-Class firms distinguish themselves from all others by routinely benchmarking and measuring their service performance; implementing effective measuring, monitoring and tracking systems; integrating service KPIs with company-wide CRM or ERP systems, wherever possible; and establishing a formal process for automatically collecting and disseminating data.
Tags : 
microsoft dynamic crm, service benchmarking, metrics, customer satisfaction, data management, mttr, kpi, metrics measuring program
    
Microsoft Dynamics CRM
Published By: Progress     Published Date: Mar 06, 2017
The Digital Ultimatum, is your first step towards building a future-proof organization that optimizes the customer experience and routinely achieves organizational excellence.
Tags : 
    
Progress
Published By: Progress     Published Date: Oct 09, 2017
"The old rules no longer apply. Digital technologies have radically transformed the business landscape, yet many organizations have completely ignored this reality. A new survey of IT decision makers found 96% see digital transformation as important or critical, yet 55% say they have one year or less to respond before they financially suffer. By failing to prepare for new technologies, devices and systems, organizations have threatened their own survival. The Digital Ultimatum, is your first step towards building a future-proof organization that optimizes the customer experience and routinely achieves organizational excellence."
Tags : 
    
Progress
Published By: Symantec     Published Date: Jul 11, 2017
In our 25-criteria evaluation of endpoint security suite providers, we identified the 15 most significant ones — Bromium, Carbon Black, CrowdStrike, Cylance, ESET, IBM, Intel Security, Invincea, Kaspersky Lab, Landesk, Palo Alto Networks, SentinelOne, Sophos, Symantec, and Trend Micro — and researched, analyzed, and scored them. This report shows how each provider measures up and helps S&R professionals make the right choice.
Tags : 
endpoint security, security, threat prevention, threat detection, security solution
    
Symantec
Published By: Envisional     Published Date: Dec 21, 2006
Now that millions of ordinary, non-geeky families are routinely downloading TV shows and movies without a second thought, digital piracy has clearly gone mainstream.  Download this paper to learn methods for preventing video piracy.
Tags : 
piracy, copyright, copyright infringement, digital piracy, fcc, envisional
    
Envisional
Published By: IBM     Published Date: Feb 17, 2016
In our benchmark research, at least half of participants that use spreadsheets to support a business process routinely say that these tools make it difficult for them to do their job. Yet spreadsheets continue to dominate in a range of business functions and processes. At the heart of the problem is a disconnect between what spreadsheets were originally designed to do, and how they are actually used today in corporations.
Tags : 
ibm, spreadsheets, ventana research, switch, spreadsheets, software development, it management, convergence
    
IBM
Published By: Sophos     Published Date: Jul 01, 2013
Gone is the day of the corporate-issued BlackBerry device. With its finely ingrained policies, BlackBerry was once the go-to mobile device for security-savvy enterprises. Research from IDC shows that iPhone and Android now hold over 80% of market share, with Windows Phone 8 and BlackBerry completing for the third spot. The rising trend of mobility consumerization has reached a point where it is increasingly difficult for IT organizations to settle on a standard mobile device. This whitepaper will help you identify each device platform’s security features—and choose the right platform for your business.
Tags : 
mobile device, security
    
Sophos
Published By: IBM     Published Date: Dec 21, 2012
Interact with trusted BI content and enjoy the same user experience whether you are online at the office, using a smart phone or tablet computers on the road or offline.
Tags : 
ibm, cognos, mobile, inelligence, business intelligence
    
IBM
Published By: Akamai Technologies     Published Date: May 24, 2017
Sicherheit und Performance wurden einst als separate Aspekte angesehen, für die ganz unterschiedliche Lösungen erforderlich sein sollten. Cyberkriminelle haben jedoch neue und überaus effektive Möglichkeiten gefunden, die Ihre Website in beiderlei Hinsicht gefährden. Erfolgreiche Lösungen müssen daher Sicherheitslöcher stopfen und parallel die Performance am Frontend optimieren. Wie ist das möglich? In diesem Bericht gehen wir auf browserbasierte Lösungen ein, welche gleichzeitig die Sicherheit optimieren und die Performance für den Endnutzer verbessern. Wir untersuchen verschiedene Techniken für den Umgang mit inhaltsbezogenen Browserproblemen, wie z. B. HSTS, Inlineframe und Prefetching. Der Bericht behandelt zudem Service-Worker- und browserbasierte Skripts, die viele Sicherheits- und Performanceoptionen bieten. Laden Sie den Bericht jetzt herunter und erfahren Sie, wie Sie Sicherheit und Performance gleichermaßen verbessern können.
Tags : 
    
Akamai Technologies
Previous    1 2     Next   
Search      

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.