leading information

Results 26 - 47 of 47Sort Results By: Published Date | Title | Company Name
Published By: Oco, Inc.     Published Date: Jun 24, 2008
As a Services Executive are you struggling with questions regarding what to measure, how to effectively engage with your customers, and what information should be leveraged and shared with service-chain partners and customers? Leading edge organizations are making tools and data available to their suppliers and customers with aggregated information from multiple data systems. Service-chain partners and customer personnel can now see the same views of service performance and activity. This is the next frontier to creating customer "stickiness" and business growth.
Tags : 
business analytics, oco, service management, analytical applications, dashboard, analytic, growth
    
Oco, Inc.
Published By: HERE Technologies     Published Date: Feb 12, 2019
How does a transport authority to provide the safest and most efficient road network possible? How does it ensure the supply of data on road closures, accidents and disruptive events used in its decision-making is of the highest quality? This ebook examines the process used by HERE Technologies to produce industry-leading traffic content. As the foremost global provider of traffic incident information, HERE is well placed to help transport authorities exceed expectations as it produces evermore precise and granular data around the incidents that impact traffic flow.
Tags : 
public sector, urbanization, traffic management
    
HERE Technologies
Published By: Amazon Web Services     Published Date: Feb 01, 2018
Machine learning is proving its power across virtually every industry in ways that add actionable insight and efficiency. But one can look at the rise of this transformative paradigm with a more focused lens to see AI technologies as a business tool of the highest order, one that improves processes and inspires new models. AI, in other words, has a big role to play on the balance sheet. Two leading brands in very different spaces — Capital One in financial services, John Deere in agriculture — are seeing efforts that stretch back decades come to fruition with the launch of cloud-based AI platforms. Capital One is developing digital products and experiences using machine learning to help millions of customers with their financial lives; John Deere’s Precision Agriculture solution helps farmers gain precise information about their machines and crops. In both instances, AI and a cloud platform combine to enable transformation.
Tags : 
digital, technologies, optimization, amazon
    
Amazon Web Services
Published By: Neoscale Systems, Inc.     Published Date: Sep 14, 2007
As more states pass regulations governing the security, confidentiality, and integrity of customer data, a leading national bank has recognized its need to ensure the safety and security of personal data for its thousands of customers. To ensure compliance and maintain the security of this information, the bank has deployed NeoScale’s CryptoStor Tape appliances to help accomplish its objectives.
Tags : 
storage security, storage security encryption, enterprise storage security, disk encryption, encryption technology, tape encryption, encryption key management, enterprise key management, key management for enterprise, effective encryption key management, key management system, information security, protecting offsite tape storage, disaster recovery, data privacy regulations, backup tapes, security appliance, data security, secure key management, wire-speed encryption
    
Neoscale Systems, Inc.
Published By: Microsoft Exchange     Published Date: Oct 02, 2008
Expedia is the world's leading online travel company, providing business and leisure travelers with tools and information to easily research, plan, book, and experience travel. As the company’s early rapid growth stabilized, its IT department sought ways to help employees become more productive and collaborate more effectively across long distances. To meet this goal, the department deployed Microsoft® Exchange Server 2007.
Tags : 
expedia, microsoft, microsoft exchange, exchange server, messaging, collaboration
    
Microsoft Exchange
Published By: SAP     Published Date: May 18, 2014
Leading companies and technology providers are rethinking the fundamental model of analytics, and the contours of a new paradigm are emerging. The new generation of analytics goes beyond Big Data (information that is too large and complex to manipulate without robust software), and the traditional narrow approach of analytics which was restricted to analysing customer and financial data collected from their interactions on social media. Today companies are embracing the social revolution, using real-time technologies to unlock deep insights about customers and others and enable better-informed decisions and richer collaboration in real-time.
Tags : 
sap, big data, real time data, in memory technology, data warehousing, analytics, big data analytics, data management, business insights, architecture, business intelligence, big data tools
    
SAP
Published By: Avalara     Published Date: Jan 28, 2014
Sales tax compliance and the CFO: What automation means for risk management conveys why it’s time C-level executives should take a closer look at how sales tax is managed within their organizations. This report highlights what finance and accounting professionals know (and don’t know) about managing sales tax, and more importantly, why risk of non-compliance is more important in this legislative climate. This report draws upon a recent study by Wakefield Research, which investigates what leading and emerging companies in the U.S. know about sales tax compliance — and, more importantly — what the accounting and finance professionals in the trenches are doing to safeguard their organizations from potential audits and accounting pitfalls. Download this White Paper for more information.
Tags : 
sales tax, tax liability, internet sales tax, best practices
    
Avalara
Published By: Qualys     Published Date: Jan 08, 2015
Health care organizations face a variety of security challenges—from the growing presence of online personal data to new methods of accessing and transferring medical information. Protecting sensitive data requires more vigilance than ever. Learn how your IT security peers are responding to threats from mobile and cloud technologies to address these open systems in this latest SANS survey:New Threats Drive Improved Practices: State of Cybersecurity in Health Care Organizations. Inside you’ll see all the results—revealing better awareness of risks with improved commitment of resources and support. Download now to learn more about how leading health care organizations: Assess information ecosystems — to understand gaps in infrastructure Establish data-centric security controls — focusing on information, not just infrastructure Manage identities — tying data controls closely with identity and access management Invest in incident response — documenting and maintaining a formal response p
Tags : 
it security, information ecosystems, data-centric security, identity management
    
Qualys
Published By: Websense     Published Date: Oct 18, 2010
Data Loss Prevention (DLP) solutions are moving targets. They keep changing to meet evolving regulatory requirements and business needs. It's tough to select the best DLP solution. This white paper from leading information security research firm Securosis gives you an overview of the DLP industry, technologies, and architectures.
Tags : 
websense, dlp, data loss prevention, securosis, security, data management, testing
    
Websense
Published By: Proofpoint     Published Date: Jun 22, 2017
Doing all you can to ensure the security of Office 365 makes a lot of sense. As the volume and sophistication of advanced threats continues to evolve more rapidly than ever before, you must protect your people, data and brand from advanced attacks and compliance risks. Our security solutions provide you with industry-leading security, compliance and email continuity capabilities for your cloud based Office 365 deployment that far exceed Microsoft’s native protection. With Proofpoint, you can take advantage of the freedom, flexibility and cost savings of Office 365—without sacrificing your ability to keep users connected and protected. For more information, visit: www.proofpoint.com/office365
Tags : 
security solutions, ransomware, security technologies, protection technologies, malicious email, it security, server protection
    
Proofpoint
Published By: Marketo     Published Date: Mar 11, 2014
Lead generation has become an important strategy for modern marketers, as they strive to create demand and get their messages heard by increasingly sophisticated, multi-channel buyers. In today’s complex world, marketers should use lead generation to build brand awareness, nurture prospects and customers, qualify leads, and ultimately generate measurable revenue. In this comprehensive, 160 page guide, we cover topics ranging from content marketing and website SEO to telesales and content syndication — all through the lens of lead generation. Packed full of checklists, charts, and thought leadership from the leading experts in marketing today, The Definitive Guide to Lead Generation will teach you how to collect information from prospects across every channel, and deliver the highest quality leads to your sales team.
Tags : 
marketo, lead generation, defining a lead, seo, landing pages, social media, email marketing, middle of the funnel, optimization, metrics, testing, emerging marketing, advertising agencies, marketing research, traditional marketing, pay per click (ppc)
    
Marketo
Published By: Marketo     Published Date: Feb 11, 2019
Lead generation has become an important strategy for modern marketers, as they strive to create demand and get their messages heard by increasingly sophisticated, multi-channel buyers. In today’s complex world, marketers should use lead generation to build brand awareness, nurture prospects and customers, qualify leads, and ultimately generate measurable revenue. In this comprehensive, 160 page guide, we cover topics ranging from content marketing and website SEO to telesales and content syndication — all through the lens of lead generation. Packed full of checklists, charts, and thought leadership from the leading experts in marketing today, TheDefinitive Guide to Lead Generation will teach you how to collect information from prospects across every channel, and deliver the highest quality leads to your sales team. ResizedImage389253 dog with laptop lead generation You’ll learn how to: Define a lead and understand his or her buying journey Build a robust lead generation strategy t
Tags : 
    
Marketo
Published By: Marketo     Published Date: Mar 13, 2014
Lead generation has become an important strategy for modern marketers, as they strive to create demand and get their messages heard by increasingly sophisticated, multi-channel buyers. In today’s complex world, marketers should use lead generation to build brand awareness, nurture prospects and customers, qualify leads, and ultimately generate measurable revenue. In this comprehensive, 160 page guide, we cover topics ranging from content marketing and website SEO to telesales and content syndication — all through the lens of lead generation. Packed full of checklists, charts, and thought leadership from the leading experts in marketing today, The Definitive Guide to Lead Generation will teach you how to collect information from prospects across every channel, and deliver the highest quality leads to your sales team.
Tags : 
marketo, lead generation, defining a lead, seo, landing pages, social media, email marketing, middle of the funnel, optimization, metrics, testing, internet marketing, lead generation & automation
    
Marketo
Published By: Marketo     Published Date: Dec 12, 2016
In this comprehensive, 160 page guide, we cover topics ranging from content marketing and website SEO to telesales and content syndication — all through the lens of lead generation. Packed full of checklists, charts, and thought leadership from the leading experts in marketing today, TheDefinitive Guide to Lead Generation will teach you how to collect information from prospects across every channel, and deliver the highest quality leads to your sales team.
Tags : 
marketo, mareting, lead generation, leads, marketers, emerging marketing, marketing research, traditional marketing
    
Marketo
Published By: Fujitsu     Published Date: Dec 08, 2017
Join leading industry experts from Fujitsu, Salesforce and a special guest from Canon, as they share their expert insights on the future of Digital Enterprise and how manufacturing companies can accelerate their digital transformation journey. During this interactive discussion, they will: • Reveal how to identify and prioritize your critical issues; • Show how Canon Information & Imaging Solutions, is driving growth through an innovative outcome-based service model; • Demo a real-life digital transformation story; • Show how to see more, act fast, optimize, anticipate and power innovates your way to success. This webinar also features Fujitsu's unique digital transformation approach to help you understand where you are in your digital transformation journey and the actions you can take to accelerate it. Watch for this amazing webinar and a link will be sent to you via email.
Tags : 
fujitsu glovia, glovia enterprise planning software, digital transformation, fujitsu webinar
    
Fujitsu
Published By: Proofpoint     Published Date: Jun 22, 2017
Doing all you can to ensure the security of Office 365 makes a lot of sense. As the volume and sophistication of advanced threats continues to evolve more rapidly than ever before, you must protect your people, data and brand from advanced attacks and compliance risks. Our security solutions provide you with industry-leading security, compliance and email continuity capabilities for your cloud based Office 365 deployment that far exceed Microsoft’s native protection. With Proofpoint, you can take advantage of the freedom, flexibility and cost savings of Office 365—without sacrificing your ability to keep users connected and protected. For more information, visit: www.proofpoint.com/office365
Tags : 
security solutions, ransomware, security technologies, protection technologies, risk assessment, it security, server protection
    
Proofpoint
Published By: Smarsh     Published Date: Feb 27, 2014
More organizations are deploying and migrating their information archiving to the cloud. In this report, The Radicati Group provides an overall market evaluation of 10 leading Cloud archiving providers, tips for selecting an information archiving solution and the opportunities and challenges that compliance, IT and legal professionals experience when choosing an information archiving platform.
Tags : 
compliance, e-discovery, archiving, enterprise, communications compliance, email archiving, social media archiving, byod, email retention
    
Smarsh
Published By: IBM     Published Date: Jan 10, 2014
The IBM PureFlex System TCO Analysis Tool was developed independently by leading ROI developer Alinean, Inc. This Analysis tool compares the total cost of ownership for the IBM PureFlex Solution versus a traditional dedicated or virtualized IT infrastructure by collecting information about the current computing needs and then projects the TCO for the two alternatives.
Tags : 
pureflex, pureflex system, enterprise, pureflex, pureflex system, enterprise virtualization, ibm pureflex, system platform, virtualization, tool
    
IBM
Published By: IBM     Published Date: Oct 01, 2013
The IBM PureFlex System TCO Analysis Tool was developed independently by leading ROI developer Alinean, Inc. This Analysis tool compares the total cost of ownership for the IBM PureFlex Solution versus a traditional dedicated or virtualized IT infrastructure by collecting information about the current computing needs and then projects the TCO for the two alternatives.
Tags : 
ibm, ibm pureflex, ibm pureflex system, tco, tco analysis, ibm pureflex system tco analysis tool, total cost of ownership
    
IBM
Published By: Red Hat     Published Date: Sep 08, 2017
TransUnion, a leading global risk and information solutions provider, used mainframe computers to support its global business. To improve IT performance and costs, the company launched an initiative, Project Spark, to migrate all of its applications and systems to a Red Hat® operating environment. With the new infrastructure—based on Red Hat Enterprise Linux®, Red Hat JBoss® Middleware, and other Red Hat products—TransUnion achieved faster time to market, greater competitive advantage, improved employee satisfaction, and significant operating cost savings.
Tags : 
    
Red Hat
Published By: IBM     Published Date: Aug 07, 2012
Insurers lose millions each year through fraudulent claims. Learn how leading insurance companies are using data mining techniques to target claims with the greatest likelihood of adjustment, improving audit accuracy and saving time and resources. Read this paper to learn how to combine powerful analytical techniques with your existing fraud detection and prevention efforts; build models based on previously audited claims and use them to identify potentially fraudulent future claims; ensure adjusters focus on claims most likely to be fraudulent; and deploy results to the people who can use the information to eradicate fraud and recoup money.
Tags : 
data, mining, detect, insurance, fraud, insurers, fraudulent, claims, insurance, data, mining, techniques, audit, analytical, techniques, fraud, detection, search marketing, social media
    
IBM
Published By: CDW     Published Date: Sep 17, 2014
You are being buried by data. Multimedia including videos, audio and photos. Unstructured data in presentations, documents and social media feeds. Even the voicemails and databases that used to be the primary residents of your storage system are growing beyond your ability to manage them effectively. How can you keep it all under control without buying an endless stream of disk and storage devices? Experts from EMC and other leading storage manufacturers discuss the very latest trends in storage solutions and how an effective application of storage strategy can help tame the information beast and keep performance and availability issues at bay. Attendees will learn: - What are the hidden drivers in storage growth - How businesses of all sizes can benefit from a tiered storage strategy - Why virtualization is penetrating every level of IT - What role SSD and flash will play in every storage environment - What to do now to improve storage utilization and save costs
Tags : 
storage, tiering, performance, availability, media, feeds, system, netgear, emc, buying, data, social media, manage, voicemail, presentation, residents, issues, disk
    
CDW
Previous    1 2     Next   
Search      

Add Research

Get your company's research in the hands of targeted business professionals.