voc

Results 1 - 25 of 286Sort Results By: Published Date | Title | Company Name
Published By: VMware     Published Date: Sep 12, 2019
Whether a CIO is on a four-year trajectory or has plans to stay much longer, there’s a way to thrive in this role as business priorities continuously evolve. I advocate producing early wins, setting sights on specific goals at specific points in time, and delivering on those goals whether you plan to be at a company for the long term or expect to move on soon after passing the four-year mark.
Tags : 
    
VMware
Published By: F5 Networks Singapore Pte Ltd     Published Date: Sep 19, 2019
"Every kind of online interaction—website visits, API calls to mobile apps, and others—is being attacked by bots. Whether it's fraud, scraping, spam, DDoS, espionage, shilling, or simply altering your SEO ranking, bots are wreaking havoc on websites as well as mobile and business applications. But that’s not all: they’re also messing with your business intelligence (BI). They can skew audience metrics, customer journeys and even ad buys, making business decisions questionable and costly. According to Forrester, ad fraud alone was set to exceed $3.3 billion in 2018. Not all bots are bad. In fact, your business depends on them. Search engine bots, for example, give your web presence visibility and authority online. Other good bots help you deliver better customer experiences—perhaps a chatbot provides instant customer assistance on your site. What’s important is enabling the good bots and blocking the bad ones."
Tags : 
    
F5 Networks Singapore Pte Ltd
Published By: Barracuda     Published Date: Oct 14, 2019
Traditional email-security defenses aren’t enough anymore. In today’s rapidly evolving threat environment, to stop email-borne threats, you must effectively defend against phishing and other potentially-devastating social-engineering attacks. These sophisticated threats are often able to bypass defenses using back-door techniques, including email spoofing, spear phishing and personal email fraud to penetrate network defenses and wreak havoc. Here’s a total email-protection strategy that can help radically reduce an organization’s susceptibility to attacks.
Tags : 
    
Barracuda
Published By: TIBCO Software     Published Date: Sep 16, 2019
A tendência atual na indústria de manufatura se inclina para os produtos feitos sob medida em lotes pequenos e com tempo de entrega reduzido. Com frequência, esta mudança pode alterar a produção, o que acarreta em um maior tempo de inatividade das máquinas, custos de produção mais altos, desperdício de produtos e a necessidade de voltar a produzir os produtos defeituosos. Assista esse webinar para conhecer como as soluções Smart Manufacturing da TIBCO pode ajudá-lo a superar esses desafios. Você também verá uma demonstração da tecnologia da TIBCO em ação, e como ela melhora os processos de produção e otimização, assim como reduz os custos.
Tags : 
    
TIBCO Software
Published By: KPMG     Published Date: Jun 06, 2019
Discover how the CMO is evolving from brand guru into customer advocate. With key actions for creating a truly customer-centric marketing organisation. Read this report to discover: • how and why the marketing organisation must transform • why CMOs must expand their knowledge and responsibilities beyond traditional marketing • how to measure success in a customer-centric environment • seven key actions for creating a customer-centric marketing organisation.
Tags : 
    
KPMG
Published By: NICE inContact     Published Date: Sep 18, 2019
Ready to step up your revenue in eight easy steps? Get this guide and start transforming your customer experience immediately. It’s helped other businesses reach up to 30% of their revenue goal – and it’ll work for your contact center too. This white paper includes strategies for: • Empowering and rewarding customer advocates • Encouraging and responding to customer feedback • Developing a plan for continuous improvement • Future-proofing processes and tools
Tags : 
    
NICE inContact
Published By: Spectrum Enterprise     Published Date: Oct 29, 2018
Bandwidth. Speed. Throughput. These terms are not interchangeable. They are interrelated concepts in data networking that help measure capacity, the time it takes to get from one point to the next and the actual amount of data you’re receiving, respectively. When you buy an Internet connection from Spectrum Enterprise, you’re buying a pipe between your office and the Internet with a set capacity, whether it is 25 Mbps, 10 Gbps, or any increment in between. However, the bandwidth we provide does not tell the whole story; it is the throughput of the entire system that matters. Throughput is affected by obstacles, overhead and latency, meaning the throughput of the system will never equal the bandwidth of your Internet connection. The good news is that an Internet connection from Spectrum Enterprise is engineered to ensure you receive the capacity you purchase; we proactively monitor your bandwidth to ensure problems are dealt with promptly, and we are your advocates across the Internet w
Tags : 
    
Spectrum Enterprise
Published By: Cisco     Published Date: Mar 26, 2019
Uncover the riskiest 1% of threats you’ve been missing. In hours. Not days or months. Nearly all endpoint security solutions claim to block 99% of malware. But what about the 1% of threats they miss? The most dangerous 1% of threats will wreak havoc on your network. If you rely solely on traditional point-in-time technologies, such as antivirus, those threats can go undetected for 200 days on average. For months on end, they can be creeping in and moving laterally across your network causing damage through stealthy malware campaigns without you even knowing it—until it’s too late.
Tags : 
    
Cisco
Published By: SAP     Published Date: May 18, 2014
For years, experienced data warehousing (DW) consultants and analysts have advocated the need for a well thought-out architecture for designing and implementing large-scale DW environments. Since the creation of these DW architectures, there have been many technological advances making implementation faster, more scalable and better performing. This whitepaper explores these new advances and discusses how they have affected the development of DW environments.
Tags : 
sap, big data, real time data, in memory technology, data warehousing, analytics, big data analytics, data management
    
SAP
Published By: Commvault     Published Date: Jul 06, 2016
It’s no secret that today’s unprecedented data growth, data center consolidation and server virtualization are wreaking havoc with conventional approaches to backup and recovery. Here are five strategies for modern data protection that will not only help solve your current data management challenges but also ensure that you’re poised to meet future demands.
Tags : 
commvault, data growth, datacenter consolidation, server virtualization, backup, recovery, data management, scalability
    
Commvault
Published By: Oracle     Published Date: Sep 05, 2014
CMOs face a major dilemma: While 75% of CEOs want marketing to become more ROI-focused and attribute revenue to efforts, they’re also being tasked to innovate and lead their companies into the digital age. Read how the Oracle Marketing Cloud provides marketing leaders with data-driven solutions to unify marketing resources and empower Modern Marketing teams to deliver personalized customer experiences across each channel.
Tags : 
roi, marketing, cmo, resources, modern, cloud, digital age, resources
    
Oracle
Published By: Oracle     Published Date: Feb 24, 2015
30 seconds or less. The average length of time that consumers spend reading or listening to online marketing communications . Marketers today are now equipped with the strategies and technologies to better capture consumer attention. To do this, they need to orchestrate individualized customer experiences across the digital channels. Read on for a statistical profile of today’s distracted consumer, followed by actionable tips for effectively communicating and converting this new type of consumer.
Tags : 
oracle, marketing, consumers, attention, message, distractions, communications, conversions
    
Oracle
Published By: SAP SME     Published Date: May 09, 2017
Se você é líder de negócios, de RH ou de tecnologia com visão de futuro, ou profissional de RH com diversos desafios imediatos, o SAP® SuccessFactors® pode ajudá-lo a simplificar o RH, motivando seu pessoal e gerando resultados para a empresa.
Tags : 
    
SAP SME
Published By: SAP SME     Published Date: May 09, 2017
Estamos no despontar da próxima grande transformação ecnológica, onde tudo está conectado e os softwares são parte de nossas vidas. Essa mudança traz novas oportunidades e novos desafios. O ciclo de inovação está de 5 a 10 vezes mais rápido e as empresas somente poderão ser competitivas caso a complexidade seja reduzida, os negócios sejam reinventados e os dados sejam utilizados para geração de valor para clientes e investidores. Com o SAP S/4HANA, você pode agora viabilizar uma empresa digital e conduzir essa geração de valor.
Tags : 
    
SAP SME
Published By: SAP SME     Published Date: May 22, 2017
Demo sistema de gestão para start up´s e empresas de pequeno porte. O SAP Business One permite que você gerencie toda a dinâmica de sua empresa em crescimento – desde as principais operações, passando por RH, geração de relatórios financeiros, vendas, faturamento até a gestão de contatos.
Tags : 
    
SAP SME
Published By: DocuSign     Published Date: Feb 13, 2017
Greg Baran, Director of Enterprise Applications at Vocus, speaks about DocuSign's seamless integration with Salesforce allowed them to focus on their business process rather than the technology. Vocus is always searching for new ways to DocuSign! Find out about DocuSign for Salesforce:
Tags : 
    
DocuSign
Published By: Monotype     Published Date: Mar 24, 2017
Brand Advocate
Tags : 
    
Monotype
Published By: Dome9     Published Date: Apr 25, 2018
Last year at this time, we forecast a bumpy ride for infosec through 2017, as ransomware continued to wreak havoc and new threats emerged to target a burgeoning Internet of Things (IoT) landscape. ‘New IT’ concepts – from DevOps to various manifestations of the impact of cloud – seemed poised to both revolutionize and disrupt not only the implementation of security technology, but also the expertise required of security professionals as well. Our expectations for the coming year seem comparatively much more harmonious, as disruptive trends of prior years consolidate their gains. At center stage is the visibility wrought by advances in data science, which has given new life to threat detection and prevention – to the extent that we expect analytics to become a pervasive aspect of offerings throughout the security market in 2018. This visibility has unleashed the potential for automation to become more widely adopted, and not a moment too soon, given the scale and complexity of the thre
Tags : 
    
Dome9
Published By: Automation Anywhere     Published Date: Feb 21, 2019
The Augmented Human Enterprise is an independent academic study into the reality and future of automation and AI technologies in the workplace. The future impact of automation and AI on businesses and the people working within them is under constant debate. Advocates hail a future utopia, detractors foresee our dystopian demise. But what's the reality today? A team of academics at Goldsmiths, University of London set out to investigate the real-life impact of automation on work and found that augmented workplaces–those with collaboration between human and machines–score 33% higher on factors deemed to make a workplace more human.
Tags : 
    
Automation Anywhere
Published By: Dell EMC     Published Date: Nov 04, 2016
As organizations continue to virtualize their infrastructures to gain higher levels of operational efficiency, VM sprawl and resource utilization are two key factors that can quickly create havoc for IT admins. In resource-siloed infrastructures, where multiple administrators are in charge of different pieces of the infrastructure, complexity continues to grow as mission-critical data sets and organizations grow. This is especially true in dynamic, mission-critical environments, where one wrong move or lack thereof could significantly impact an application, the end-user experience, or worst case, company revenue. The impact of hyper-converged infrastructures on IT has been profound. In fact, 85% of respondents to a recent ESG survey already use or plan to use a hyper-converged solution in the coming months. Though that number appears high, it is not all that surprising. ESG also asked organizations to identify which factors drove them to deploy or considering deploying a hyper-conv
Tags : 
ubuntu, performance, windows, hyper-convergence
    
Dell EMC
Published By: Dell EMC     Published Date: Feb 23, 2017
As organizations continue to virtualize their infrastructures to gain higher levels of operational efficiency, VM sprawl and resource utilization are two key factors that can quickly create havoc for IT admins. In resource-siloed infrastructures, where multiple administrators are in charge of different pieces of the infrastructure, complexity continues to grow as mission-critical data sets and organizations grow. This is especially true in dynamic, mission-critical environments, where one wrong move or lack thereof could significantly impact an application, the end-user experience, or worst case, company revenue.
Tags : 
    
Dell EMC
Published By: Emerson Network Power     Published Date: Mar 02, 2011
In this whitepaper, we will explain trends that drive management challenges that data center operators are faced with.
Tags : 
emerson network power, avocent, data center automation, cloud computing, data center
    
Emerson Network Power
Published By: Emerson Network Power     Published Date: Mar 02, 2011
A new perspective on managing the critical infrastructure gaps is emerging. Read on for more.
Tags : 
emerson network power, avocent, data center, infrastructure management
    
Emerson Network Power
Published By: Teradata     Published Date: Jul 07, 2015
As cyber security challenges continue to grow, new threats are expanding exponentially and with greater sophistication—rendering conventional cyber security defense tactics insufficient. Today’s cyber threats require predictive, multifaceted strategies for analyzing and gaining powerful insights into solutions for mitigating, and putting an end to, the havoc they wreak.
Tags : 
    
Teradata
Published By: Akamai Technologies     Published Date: Mar 19, 2019
Digital security has never taken on greater urgency. Today we live in a fundamentally connected ecosystem where we increasingly work, play, and indeed live most of our lives online. Whether we are enterprise users or endpoint consumers, our digital experiences are increasingly delivered to us on our connected devices - wherever we are, whenever we want them. For InfoSec professionals, this interconnected ecosystem is wreaking havoc with the idea of "the perimeter." In fact, the perimeter as we know it no longer exits. The attack surface is always shifting and continues to disperse across a wider area. At the same time, attacks continue to grow in size and volume, and are increasingly targeted. No longer can you secure the perimeter and trust that nothing will get in or out. What you need to deploy and manage is being redefined right before your eyes, with or without you. You need to take security to the edge.
Tags : 
    
Akamai Technologies
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.