uc

Results 176 - 200 of 17726Sort Results By: Published Date | Title | Company Name
Published By: Shell     Published Date: Jun 12, 2019
How lubrication can play a role in your TCO program
Tags : 
    
Shell
Published By: Citrix Systems     Published Date: Jun 04, 2019
Security threats come in a variety of different forms — from network to web and app attacks. As these form factors continue to morph, they often evade traditional security measures, leaving organizations scrambling to protect their digital ecosystem. With a comprehensive end-to-end security solution, your organization can securely deliver the apps and data your teams need to be productive. Check out our e-book and discover: Why a holistic security approach is crucial What a new security approach looks like How Citrix solutions provide security across your entire stack
Tags : 
    
Citrix Systems
Published By: Citrix Systems     Published Date: Jun 04, 2019
As companies scale, they add solutions leaving employees having to deal with multiple gateways or access points to get to their applications, apps, and data. It creates a poor user experience, slows productivity, and opens organizations to security risks. With Citrix Workspace, IT is able to simplify connections with remote access while maintaining security and control. Download our e-book and find out how we can: Provide users with one access point and single sign-on (SSO) Ensure secure access to apps in the data center, cloud, or delivered as SaaS applications across any device Help IT reduce complexity and meet compliance and security policies
Tags : 
    
Citrix Systems
Published By: Citrix Systems     Published Date: Jun 04, 2019
Whether your organization is going all in on cloud or they have a more conservative approach, the undeniable reality is that workloads are moving to the cloud at warp speed. And with many IT leaders concerned that the complexity of the network hampers their organization's ability to migrate apps to the cloud, it's up to you to transform the network to meet the new demands. Read this e-book to learn how a unified app-delivery strategy can help you: Increase IT efficiency Reduce security risks Free IT staff to focus on more strategic initiatives
Tags : 
    
Citrix Systems
Published By: Citrix Systems     Published Date: Jun 04, 2019
Now that 72.3% of cloud users have a mix of on-prem/off-prem clouds, the networking game has changed. Traditional app delivery solutions can’t ensure reliable, secure access in a SaaS, multi-device, hybrid, and multi-cloud world. Get this solution brief to learn why a holistic strategy innately reduces complexities that otherwise would prohibit visibility and control in distributed architectures. The brief also explains: The Citrix Networking approach to delivering reliability and a high-quality experience How to ensure reliable access to apps at branch and remote locations while keeping costs low How to provide full visibility and analytics for your network, applications, users, and data
Tags : 
    
Citrix Systems
Published By: Citrix Systems     Published Date: Jun 04, 2019
Help your teams be even more productive. By giving them a secure, reliable connection with high-definition access to the apps and data they need, they'll be able to keep projects moving forward seamlessly — even across low bandwidth or high-latency networks. What's more, IT will be able to manage it all efficiently. Download our white paper. You'll discover how Citrix Workspace offers a high-definition (HDX) virtualized experience that rivals that of a local PC, and: Decreases your demand for bandwidth Increases your user density per hosting server Supports voice, video, and display—even 3D professional graphics!
Tags : 
    
Citrix Systems
Published By: Citrix Systems     Published Date: Jun 04, 2019
Learn how a digital workspace can help you: Deliver the apps and data people need to be productive Improve performance with unified analytics Unify access to apps across hybrid environments Get this e-book that explains how a digital workspace can simplify IT while delivering the experience your employees expect.
Tags : 
    
Citrix Systems
Published By: Citrix Systems     Published Date: Jun 04, 2019
While many organizations are rapidly accelerating to the cloud, plenty are still reluctant to make the move because they worry their infrastructure isn’t. Control, reliability, security, and visibility don’t have to be speed bumps that slow your digital transformation. Whether moving to multi-, hybrid-, or cloud-based infrastructures, the right networking solution can help you securely navigate your journey to the cloud with confidence.
Tags : 
    
Citrix Systems
Published By: Citrix Systems     Published Date: Jun 04, 2019
Discover why ninety-four percent of organizations surveyed are already modifying, overhauling, or reassessing their network infrastructure to facilitate application delivery in hybrid- and multi-cloud environments. Read this e-book to learn why you should re-architect your network infrastructure to optimize application delivery: Ensure end-to-end network visibility for your operations Gain real-time analytics for application optimization and uptime Scale your application infrastructure according to workload demand Read the e-book today to find out all six must-haves for application delivery in the cloud.
Tags : 
    
Citrix Systems
Published By: Citrix Systems     Published Date: Jun 04, 2019
In this white paper you’ll learn how Citrix Workspace can help your workforce become more productive while improving manageability and security, including how you can: Simplify adoption in any type of cloud environment Reduce risk wherever and however people access Office 365 Give employees a great experience for every app they use
Tags : 
    
Citrix Systems
Published By: Citrix Systems     Published Date: Jun 04, 2019
Cloud is rapidly changing the ways we work — and the rate at which work will continue to change is only going to increase. To get the full business benefits of the cloud, your organization needs an agile infrastructure that allows people to securely connect to the data they need, and has the flexibility to adapt as technology evolves. Citrix Workspace will ensure you're able to do just that — improve business agility, increase productivity, and support any cloud or device as your future tech needs change. Download our e-book and find out how: To secure SaaS and web apps A single sign-on simplifies and secures log on To centralize routes to and from your data
Tags : 
    
Citrix Systems
Published By: FICO EMEA     Published Date: May 31, 2019
The telecommunications market is highly saturated. In most of the developed world, nearly everyone who wants a mobile phone has one. There are opportunities for carriers to increase service usage or upsell customers on higher-value devices or services, but each new account generally comes at a competitor’s expense—so customer retention is crucial. Telecom service providers need to reduce losses, prevent churn and maximise revenue on their offerings. FICO’s Best Next Action™ technology can be an important tool to achieve all of these objectives, either by presenting new offer terms or cross-selling other products and accessories to enhance the customer’s telecommunications experience—the handset upgrade, better financing terms, insurance on the handset or a subscription service for content. o Prevent account churn o Optimise service utilisation o Segment accounts o Tailor the contact method to the account
Tags : 
telecommunications, advanced analytics, telco, customer retention
    
FICO EMEA
Published By: FICO EMEA     Published Date: May 31, 2019
: FICO commissioned an independent research study by TM Forum to look at how global telecommunication providers are using (and plan to use) machine learning and advanced analytics to improve the customer experience in credit risk and beyond. This in-depth report includes key insights from a global survey as well as executive interviews with leading communication service providers such as Telstra, Vodafone, Sky, Globe Telecom, and BT on their vision for leveraging artificial intelligence to stop fraud, better engage customers across channels, improve risk management, and drive collection results. Read this report to understand: o What CSPs see as the biggest drivers for deploying advanced analytics over the next two years o How and where BT, Globe Telecom, Vodafone UK, Sky and Telstra are using analytics, from marketing through origination o The opportunities and pitfalls around financing devices as opposed to or in addition to subsidising them o The scope for analytics to improve c
Tags : 
csp, advanced analytics, telco, improve credit risk, reduce fraud loss
    
FICO EMEA
Published By: Recorded Future     Published Date: Apr 18, 2019
Enterprises increasingly operate in a digitally interconnected world where third parties like suppliers, customers, channel partners, and others are often directly connected to their internal IT systems, and where their underlying IT infrastructure may be owned and managed by an outside organization. These business relationships can knowingly or unknowingly introduce different types of risks that need to be identified and managed as if these third parties were part of the enterprise itself. Recorded Future's latest risk intelligence offering enables threat intelligence teams to better understand, monitor, and measure their real-time exposure to these third-party risks. Armed with this information, organizations can better assess and prioritize risk mitigation actions.
Tags : 
    
Recorded Future
Published By: Recorded Future     Published Date: Apr 18, 2019
This white paper outlines current approaches to implementing SIEM and enriching security products with threat intelligence.
Tags : 
    
Recorded Future
Published By: CoreSite     Published Date: May 30, 2019
This research report shows the statistics behind U.S. based Media and Entertainment organizations’ adoption of data storage and compute solutions. Touching on the latest trends and specifically researched for the IT departments to see how their peers and competitors are investing to reach future business and technology goals.
Tags : 
    
CoreSite
Published By: NEC     Published Date: Sep 14, 2009
This white paper is a business briefing for C-Level Executives on how integrating a range of technologies - including unified communications, service oriented architecture, virtualization and cloud computing - can transform the productivity and profitability of large enterprises.
Tags : 
nec, virtualization, soa, service oriented architecture, cloud computing, unified communications, sla, slas, service level agreement, vaas, mashup, enterprise communications
    
NEC
Published By: NEC     Published Date: Dec 16, 2009
The proliferation of communications channels has set expectations around cost and productivity benefits. Unified Communications (UC) is proffered as a way of helping bring them all together, but companies struggle to justify the business case for it. Against this background, how important is UC as an approach to streamlining communications, and how can businesses exploit it?
Tags : 
nec, business communication, productivity, unified communications, uc delivery
    
NEC
Published By: NEC     Published Date: Jan 28, 2010
Case Study: NEC provided intuitive and user friendly technology to enrich the whole guest experience with improved service times, personalized assistance and quality communications.
Tags : 
nec, peninsula shanghai, hotel, network solutions, real-time communication, productivity, ip telephony server, wireless technology, unified communications
    
NEC
Published By: Velaro     Published Date: May 06, 2014
Did you know that those who respond to a proactive online chat invitation are 6 times more likely to buy than the average website visitor? Download this paper for practical advice on using proactive chat to increase sales online sales and customer satisfaction.
Tags : 
live chat, live chat software, proactive live chat, online sales conversions, ecommerce, online customer experience, customer support productivity, online sales
    
Velaro
Published By: Ounce Labs, an IBM Company     Published Date: Dec 29, 2009
Countless studies and analyst recommendations suggest the value of improving security during the software development life cycle rather than trying to address vulnerabilities in software discovered after widespread adoption and deployment. The justification is clear.For software vendors, costs are incurred both directly and indirectly from security flaws found in their products. Reassigning development resources to create and distribute patches can often cost software vendors millions of dollars, while successful exploits of a single vulnerability have in some cases caused billions of dollars in losses to businesses worldwide. Vendors blamed for vulnerabilities in their product's source code face losses in credibility, brand image, and competitive advantage.
Tags : 
source code vulnerability testing, independent model, centralized model, distributed model, software development life cycle, source code scanning, application security, source code security testing
    
Ounce Labs, an IBM Company
Published By: Ounce Labs, an IBM Company     Published Date: Jul 08, 2009
The Business Case for Data Protection, conducted by Ponemon Institute and sponsored by Ounce Labs, is the first study to determine what senior executives think about the value proposition of corporate data protection efforts within their organizations. In times of shrinking budgets, it is important for those individuals charged with managing a data protection program to understand how key decision makers in organizations perceive the importance of safeguarding sensitive and confidential information.
Tags : 
ounce labs, it securitym it risk, software applications, ciso, pci dss, hipaa, glba, data security, source code vulnerabilities, source code analysis, it security, cryptography
    
Ounce Labs, an IBM Company
Published By: Attivio     Published Date: Aug 20, 2010
With the explosion of unstructured content, the data warehouse is under siege. In this paper, Dr. Barry Devlin discusses data and content as two ends of a continuum, and explores the depth of integration required for meaningful business value.
Tags : 
attivio, data warehouse, unified information, data, content, unstructured content, integration, clob, blob
    
Attivio
Published By: Attivio     Published Date: Aug 20, 2010
Current methods for accessing complex, distributed information delay decisions and, even worse, provide incomplete insight. This paper details the impact of Unified Information Access (UIA) in improving the agility of information-driven business processes by bridging information silos to unite content and data in one index to power solutions and applications that offer more complete insight.
Tags : 
attivio, data warehouse, unified information, data, content, unstructured content, integration, clob, blob
    
Attivio
Published By: SAP     Published Date: Dec 14, 2010
While your competitors sit back, download this free paper to learn how to cut costs, boost profits, build loyalty, and solve a myriad of day-to-day business challenges.
Tags : 
sap, data strategy, competitive data, reduce costs, increase profits, employee improvement, business performance
    
SAP
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.