asp

Results 426 - 450 of 564Sort Results By: Published Date | Title | Company Name
Published By: Aerohive Networks     Published Date: Aug 22, 2014
One overlooked aspect of the BYOD phenomenon isn’t just connecting the users to the network, but how to manage them once they’re there. This paper will take you through the necessary connectivity and productivity requirements in order to ensure your network is truly ready for the mobility explosion.
Tags : 
byod, connectivity, network, mobility, requirements
    
Aerohive Networks
Published By: Kaspersky Lab     Published Date: Aug 14, 2014
Cybercriminals are creating and deploying new threats every day that are more destructive than ever before. While you may have more people devoted to IT security, established businesses like yours are vulnerable to a wider array of attacks. To keep your organization safe, it’s imperative to stay at least a few steps ahead of the bad guys. Do you know where the threats are coming from?
Tags : 
kaspersky, kaspersky lab, security, cyberthreats, corporate cyberthreats, it security, data protection
    
Kaspersky Lab
Published By: IBM     Published Date: Aug 08, 2014
“Big data”– which admittedly means many things to many people – is no longer confined to the realm of technology. Today, it is a business imperative. In addition to providing solutions to insurance companies’ long-standing business challenges, big data inspires new ways to transform processes, organizations and many aspects of the insurance industry as we know it.
Tags : 
big data, technology, insurance industry, emerging marketing, business intelligence, market research, data management/analytics
    
IBM
Published By: IBM     Published Date: Aug 06, 2014
“Big data”– which admittedly means many things to many people – is no longer confined to the realm of technology. Today, it is a business imperative. In addition to providing solutions to insurance companies’ long-standing business challenges, big data inspires new ways to transform processes, organizations and many aspects of the insurance industry as we know it.
Tags : 
ibm, insurance, data, big data, technology, business
    
IBM
Published By: Kaspersky Lab     Published Date: Jul 31, 2014
Learn about the evolution of targeted attacks, the latest in security intelligence, and strategic steps to keep your business safe. Download the whitepaper now to learn what you need to create a resilient infrastructure to guard against targeted attacks.
Tags : 
kaspersky, security, cyber attacks, cybersecurity, targeted attacks, data protection, cybersecurity framework, security intelligence
    
Kaspersky Lab
Published By: Visier     Published Date: Jul 08, 2014
Read the results of the 2014 Workforce Analytics and Planning survey where over 300 U.S.-based employers answered questions about their current workforce analytics and planning practices, investments, and future plans. Download the full report and discover key trends, including how 91% of companies aspire to increase their workforce analytics maturity over the next 24 months.
Tags : 
visier, workforce analytics, hr metrics, planning
    
Visier
Published By: Epicor     Published Date: Jun 30, 2014
View this customer success video to learn how D&S Manufacturing has utilized Epicor ERP throughout their business processes, including purchasing, operations, planning, engineering, and shipping/receiving. In the video below, D&S Manufacturing unveils how Epicor ERP has provided the foundation to integrate all aspects of the business and deliver continued commitment to their customers.
Tags : 
epicor, manufacturing, operations, cost cutting, machinery, labor, contract manufacturing, erp software, mobility
    
Epicor
Published By: DocuSign     Published Date: May 29, 2014
2014 sales success will be dictated by increasing efficiency and effectiveness of our sales teams. And important to note is how reps are currently spending time. We see that closing, processing and fulfilling orders takes about 50% of the time to get to yes in the first place. Read this whitepaper and explore advances in CRM 2.0 technology to optimize this aspect of selling.
Tags : 
docusign, cso, sales success, crm technology, esignatures
    
DocuSign
Published By: IBM     Published Date: May 27, 2014
“Big data”– which admittedly means many things to many people – is no longer confined to the realm of technology. Today, it is a business imperative. In addition to providing solutions to insurance companies’ long-standing business challenges, big data inspires new ways to transform processes, organizations and many aspects of the insurance industry as we know it.
Tags : 
ibm, big data, insurance, insurance technology, big data solutions, business value, financial data, risk data, claims data, actuarial data
    
IBM
Published By: Kaspersky     Published Date: May 20, 2014
Virtualization promises to boost efficiency and cut costs. Whether you’re running applications on physical or virtual machines, you still need to stay vigilant to guard against the constant and growing hazard of malware and other cyberthreats that can put your business at risk. This guide will show you how.
Tags : 
virtualization, kaspersky, virtualization security, cyberthreat, hackers, phishing, security breach, intrusion prevention, malware, cyberattack
    
Kaspersky
Published By: Yottaa, Inc.     Published Date: May 09, 2014
Most sites aspire to faster page load times. But in order to improve, you first need goals based on real data. Only robust performance benchmarking will tell you how your user experience stacks up against competitors, and how performance varies in all the regions you sell to. This guide presents 9 key tips to ensure you get actionable insights from benchmarking performance against competitors, including common oversights and best practices. The guide also links to free tools that can help you to accomplish your benchmarking project. Download the eBook here!
Tags : 
benchmarking, performance monitoring, website testing, page load time, web performance, optimization, testing tools, free tools, content delivery network, front end optimization, pingdom, neustar, gtmetrix, keynote, gomez, e-commerce, mobile optimization, m-commerce, website development, customer experience/engagement
    
Yottaa, Inc.
Published By: Kaspersky     Published Date: Apr 24, 2014
This paper aims to provide guidance on identifying the right security approach for your virtual environment, achieved through the correct balance between security and performance.
Tags : 
security, virtualization, security approaches, kaspersky
    
Kaspersky
Published By: Kaspersky     Published Date: Apr 24, 2014
This paper aims to provide advice on the new security issues that mobile brings, providing an evaluation of the available mobile technologies and the options to best secure your company.
Tags : 
mobile security, byod, mobile threat, malware, spyware, protection, anytime anywhere, cybercrime, kaspersky
    
Kaspersky
Published By: Datawatch     Published Date: Mar 21, 2014
Big Data is not a new problem. Companies have always stored large amounts of data—structured like databases, unstructured like documents—in multiple repositories across the enterprise. The most important aspect of big data is not how big it is, or where it should be stored, or how it should be accessed. It’s the efficacy of business intelligence tools to plumb its depths for patterns and trends, to derive insight from it that will give companies competitive advantage in an increasingly challenging business climate. Visualization allows companies to analyze big data in real-time across a variety of sources in order to make better business decisions.
Tags : 
visual data discovery, decision making software, data variety, business analysis, data visualization, big data, business analytics, business intelligence, real-time data, real-time data visualization, real-time data discovery, data variety software, data discovery software, data analysis software, data mining tools, data extraction, data reporting, pdf to excel, business reporting, data solutions
    
Datawatch
Published By: Rapid7     Published Date: Mar 19, 2014
In this guide, penetration testers will learn how to evade anti-virus detection on target machines for your Metasploit pen tests. This guide will be most useful to readers who already have some penetration testing experience and are familiar with Metasploit Pro.
Tags : 
rapid7, security, anti virus, virus protection, antivirus, spam, hackers, internet security, penetration testing, intrusion prevention
    
Rapid7
Published By: Virgin Pulse     Published Date: Mar 13, 2014
Employees are not only what they eat, sleep, and exercise. They’re not just the jobs they perform. They’re the career ladders they aspire to climb. The families they support and wish to give every opportunity to. The people with whom they connect, work, play, and pray. They’re a raft of dreams… a variety of tempos…individuals.
Tags : 
virgin pulse, employees, wellness, family, connection, productivity, engagement, health, quality of life
    
Virgin Pulse
Published By: Progress Software     Published Date: Mar 12, 2014
This paper explores some of the practices most relevant to achieving success with PaaS, focusing on ways to identify how PaaS can be best utilized within the specifics of a given organization’s overall IT needs. Practices include understanding scalability and infrastructure aspects of PaaS deployment, the need for coding wisdom in otherwise “codeless” environments, integration with on-premise systems and other cloud-based IT assets, security and more.
Tags : 
progress software, paas, platform as a service, cloud, isv, platform infrastructure, development platform, enterprise adoption
    
Progress Software
Published By: iCims     Published Date: Mar 06, 2014
In this whitepaper, explore how cutting-edge video technology can be leveraged to optimize all aspects of the recruitment process: • Video as a Candidate Engagement Tool • Video as a Screening Tool • Video as an Interviewing Tool • Video as an Onboarding Tool Now is the perfect time to dive deeper into modern video technology to see what video can do to support your recruiting staff, your candidate engagement, and your bottom line.
Tags : 
video recruiting, candidate engagement tool, human resources, hr technology, icims
    
iCims
Published By: Kaspersky Lab     Published Date: Feb 20, 2014
Don’t get caught in the crossfire. Read our special report "Who's spying on you?" to find out more about the threats of malware to your business.
Tags : 
kaspersky, malware threats, cyberespionage, internet perpetrators, security technology, internet safety, business protection, cybercriminals, cybersecurity, defend your network, defend your data, data management, innovative protection, sophisticated threats, essential data, confidential information
    
Kaspersky Lab
Published By: Kaspersky Lab     Published Date: Feb 18, 2014
Kaspersky Lab has created an eBook to help you calculate the true cost of protecting your business infrastructure, intelligence, and reputation. Download "IT Security by the Numbers: Calculating the Total Cost of Protection" to learn more.
Tags : 
kaspersky, it security, cost of production, total cost, hidden costs, cloud computing, mobile devices, web applications, virtualization, vulnerabilities, it spending, security spending, malware writers, cybercriminals, anti-malware, it environment, virus detection, software protection
    
Kaspersky Lab
Published By: Kaspersky Lab     Published Date: Feb 18, 2014
Download the Kaspersky Lab security experts' Guide to the Threat Landscape to have access to a wealth of IT security intelligence.
Tags : 
kaspersky, kaspersky lab, malware, anti-virus industry, organizational security, mobility, byod, the cloud, virtualization, it administrators, it security, monitoring intrusions, phishing, cybercriminals, system malware, infrastructure, data management, mobile malware, social networks, unpatched application
    
Kaspersky Lab
Published By: Aspect Software     Published Date: Feb 11, 2014
Learn how to perfect your customer-company communications and see how doing so will allow you to keep pace with your customers who are constantly active through social networking outlets.
Tags : 
aspect software, unified communications, contact center, customer experience., customer service, acd capabilities, unified contact center
    
Aspect Software
Published By: Aspect Software     Published Date: Feb 11, 2014
Learn the four reasons why proactive customer care translates to better customer retention and better branding for your organization.
Tags : 
aspect software, customer care, customer service, customer loyalty, customer service representatives, csr
    
Aspect Software
Published By: Aspect Software     Published Date: Feb 11, 2014
Learn why Omni-channel customer experience has become the new gold standard and see how it will allow you to deliver service when, where, and how your customers want it.
Tags : 
aspect software, unified ip, customer experience, omni-channel customer experience
    
Aspect Software
Published By: Aspect Software     Published Date: Feb 07, 2014
Learn the importance of having all your contact options on one platform and see how having the contact center at the core of the customer experience will allow for customers to interact with your organization with minimal effort.
Tags : 
aspect software, contact center, customer experience, customer service, sms
    
Aspect Software
Start   Previous    9 10 11 12 13 14 15 16 17 18 19 20 21 22 23    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.