down time

Results 1 - 25 of 626Sort Results By: Published Date | Title | Company Name
Published By: 8x8 Inc.     Published Date: Feb 13, 2017
Enterprise conferencing and collaboration technologies today stand at an exciting crossroads. Solutions that were once considered consumer technologies are moving into the enterprise. Never has this trend been more pronounced than now, as consumerization of IT and mobile device proliferation increasingly break down the walls between business and consumer use. As a result, enterprise solutions must become increasingly simpler to deploy and more intuitive to use. At the same time they must deliver a secure and seamless communications experience. As the worlds of consumer and business communications blend, walking the line between the two has become top of mind for users and IT decision makers alike. Businesses must capitalize on these tectonic shifts in user preferences by deploying agile communications that today’s mobile users need in order to collaborate effectively wherever they are.
Tags : 
continuous communication, consumer technologies, mobile device proliferation
    
8x8 Inc.
Published By: 8x8 Inc.     Published Date: Feb 13, 2017
Many companies claim to offer enterprise grade communications solutions. But how is “enterprise grade” measured and what should you look for? This fact-filled white paper outlines 8 ways to determine whether or not your provider is equipped to offer an enterprise-grade communications solution. Download this complimentary white paper: The 8 Criteria for Enterprise-Grade Communications as a Service 8x8 shares full technical details on what to expect from an enterprise-grade service platform that stands above the rest. You’ll learn the 8 criteria to look for including: What to expect when it comes to service level guarantees What geo-routing technology is and why it’s critical for optimizing global call clarity and reliability What you should look for in your communications provider’s network for global operations and superior service Which security and compliance certifications to expect from your provider Specific uptime and reliability metrics to ask your provider for How analytics
Tags : 
communications, enterprise grade, communications solution, 8x8, geo-routing
    
8x8 Inc.
Published By: Aberdeen Group     Published Date: Jun 02, 2011
The focus of this document is to quantify the cost of IT-induced business downtime.
Tags : 
aberdeen, datacenter uptime, roi, disaster recovery, best-in-class, industry average, laggard, sla, service level agreement, business continuity, business interruptions, cost of downtime, data protection
    
Aberdeen Group
Published By: Acronis     Published Date: Dec 28, 2011
According to a 2010 ESG survey, 73% of midmarket companies face "significant revenue loss or other adverse business impact" within three hours of experience downtime. Read this article to find out why you need the automated disaster recovery plan that's built in to Acronis Backup & Recovery® 11!
Tags : 
automated disaster recovery, server backup, server disaster recovery, server data protection, windows server backup, vmware disaster recovery, hyper-v disaster recovery, server backup, backup vmware, backup hyper-v, acronis, acronis backup & recovery, image-based backup, backup virtual machine
    
Acronis
Published By: Acronis EMEA     Published Date: May 18, 2015
Download this case study to learn about the backup product they chose and how it gave them with a unified data and application database backup solution that simplified the procuring, learning and integrating of additional products, while saving time, lowering costs, and more.
Tags : 
backup, data protection, database backup application solution, data security, unified data, recovery, backup data
    
Acronis EMEA
Published By: Adobe     Published Date: Aug 14, 2014
Download the Forrester 2014 Mobile Trends report to discover the trends that are transforming business as we know it—and the strategies you need to gain a competitive edge. You’ll learn about the mobile innovations that will shape 2014, and the overhyped fads that are likely to fizzle. Get the report now to uncover crucial mobile insights for the coming year and learn how to: Use mobile analytics to meet customer needs in real time Make a business case for mobile marketing Improve customer and employee processes with mobile strategies
Tags : 
mobile trends, mobile analytics, mobile marketing, mobile strategies, mobile innovations, business intelligence, market research
    
Adobe
Published By: Adobe     Published Date: Aug 14, 2014
Download the new Adobe Digital Index report to see how your online marketing practices compare to the best-of-the-best websites across five industries, including retail, media and entertainment, travel and hospitality, financial services, and high tech. You’ll see critical metrics on everything from mobile trends to conversion rates—so you can develop new strategies for success in 2014. Get the report now to learn and discover: - New mobile usage trends - The power of continual site improvement - Why time spent on websites is higher than ever
Tags : 
online marketing, marketing practices, mobile usage trends, web analytics, market research, mobile marketing
    
Adobe
Published By: Adobe     Published Date: Apr 17, 2017
Download our new guide, Up Close and Personal, to learn how you can make the most of marketing’s hottest real estate — the mobile device. You’ll discover the tools and strategies you need to adopt a mobile-first mindset, so you can connect personally with customers. Right where they live. Get the guide now to explore the three Cs of mobile engagement: • Context — maximize mobile capabilities to make it relevant • Connection — discover strategies to make it personal • Cadence — learn to orchestrate content and time it right
Tags : 
mobile device, marketing, mobile-first mindset, mobile capabilities, engagement
    
Adobe
Published By: Adobe     Published Date: Apr 17, 2017
Download our guide, Solving the Programmatic Puzzle, to learn how to use data and technology to simplify, clarify, and maximize your programmatic ad campaigns—so you can create connected, personalized experiences across channels. You’ll find that while data and technology are core to programmatic media buying, using them effectively doesn’t have to be complicated. Read the guide now to discover how to: • Consolidate your data to maximize your ad spend • Simplify search, display, and social campaigns • Deliver real-time, personalized ads with ease
Tags : 
programmatic ad campaigns, streamlined channels, media buying, consolidated data, ad management
    
Adobe
Published By: Adobe     Published Date: May 16, 2017
Download our new guide, Up Close and Personal, to learn how you can make the most of marketing’s hottest real estate — the mobile device. You’ll discover the tools and strategies you need to adopt a mobile-first mindset, so you can connect personally with customers. Right where they live. Get the guide now to explore the three Cs of mobile engagement: • Context — maximize mobile capabilities to make it relevant • Connection — discover strategies to make it personal • Cadence — learn to orchestrate content and time it right
Tags : 
    
Adobe
Published By: Adobe     Published Date: Jun 22, 2017
Download our new guide, Your Most Crucial Conversation, to learn how you can use personalized, real-time offers to give your customers what they need, right when they need it—so you can earn their trust and keep them coming back for more. Read the guide to discover how to: • Break down internal silos and speak consistently to customers • Deliver contextually relevant experiences for upsell, cross-sell, loyalty and retention • Make the transition to real-time personalization
Tags : 
personalization, retention, conversation, cross-sell, customer loyalty
    
Adobe
Published By: Adobe     Published Date: Sep 28, 2016
Download our new guide, Your Most Crucial Conversation, to learn how you can use personalized, real-time offers to give your customers what they need, right when they need it—so you can earn their trust and keep them coming back for more. Read the guide to discover how to: - Break down internal silos and speak consistently to customers - Deliver contextually relevant experiences for upsell, cross-sell, loyalty and retention - Make the transition to real-time personalization?
Tags : 
adobe, marketing, marketers, customers, customer engagement, customer loyalty, customer retention, crm & customer care, marketing research, traditional marketing
    
Adobe
Published By: Adobe     Published Date: Sep 28, 2016
Download our new guide, Up Close and Personal, to learn how you can make the most of marketing’s hottest real estate — the mobile device. You’ll discover the tools and strategies you need to adopt a mobile-first mindset, so you can connect personally with customers. Right where they live. Get the guide now to explore the three Cs of mobile engagement: • Context — maximize mobile capabilities to make it relevant • Connection — discover strategies to make it personal • Cadence — learn to orchestrate content and time it right
Tags : 
adobe, marketing, marketers, mobile, engagement, emerging marketing, internet marketing, traditional marketing
    
Adobe
Published By: Adobe     Published Date: Nov 09, 2017
Airfare is increasing. Car rentals are down. Ecotourism is at an all-time high. The truth is, travel and hospitality is in flux. Read the Adobe Digital Insights report US Travel Trends in 2017 to see what’s going on in the industry, including major trends and predictions. You’ll learn all about: •What motivates today’s customers to book travel reservations •Why virtual (VR) and augmented reality (AR) are new disruptors in the industry •Travel predictions for Summer 2017, including major holiday weekends
Tags : 
    
Adobe
Published By: Akamai Technologies     Published Date: Nov 10, 2017
Ponemon Institute surveyed 569 individuals in IT security who are familiar with credential stuffing and are responsible for the security of their companies’ Internet properties. The survey identified key stats about credential stuffing, including the costs organizations incur to prevent damage, and the financial consequences when attackers succeed. According to respondents, these attacks cause costly application downtime, loss of customers, and involvement of IT security that can result in a cost of millions of dollars. The survey highlights the challenges in identifying who is accessing their websites using stolen credentials, as well as the difficulty in preventing and remediating these attacks.
Tags : 
poneman, credential stuffing, it security, damage mitigation, research report
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Apr 25, 2018
96% of users see app performance as important. A fast mobile app helps your app stand out from the rest to attain for the coveted title of “go-to” app. Download this guide to learn: The new benchmark: User expectation of an app’s response time The five key barriers to mobile app performance How to accelerate APIs and optimize image performance without expensive infrastructure or complex development work How advancements in CDN technology beyond basic caching can help improve performance
Tags : 
mobile, app, performance, barriers
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Apr 25, 2018
96% of users see app performance as important. A fast mobile app helps your app stand out from the rest to attain for the coveted title of “go-to” app. Download this guide to learn: The new benchmark: User expectation of an app’s response time The five key barriers to mobile app performance How to accelerate APIs and optimize image performance without expensive infrastructure or complex development work How advancements in CDN technology beyond basic caching can help improve performance
Tags : 
mobile, app, performance, barriers
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Apr 25, 2018
96% of users see app performance as important. A fast mobile app helps your app stand out from the rest to attain for the coveted title of “go-to” app. Download this guide to learn: The new benchmark: User expectation of an app’s response time The five key barriers to mobile app performance How to accelerate APIs and optimize image performance without expensive infrastructure or complex development work How advancements in CDN technology beyond basic caching can help improve performance
Tags : 
mobile, app, performance, barriers
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Apr 25, 2018
96% of users see app performance as important. A fast mobile app helps your app stand out from the rest to attain for the coveted title of “go-to” app. Download this guide to learn: The new benchmark: User expectation of an app’s response time The five key barriers to mobile app performance How to accelerate APIs and optimize image performance without expensive infrastructure or complex development work How advancements in CDN technology beyond basic caching can help improve performance
Tags : 
mobile, app, performance, barriers
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Oct 02, 2018
"Ponemon Institute surveyed 538 individuals in IT security who are familiar with credential stuffing and are responsible for the security of their companies’ Internet properties. According to respondents, the challenges in identifying who is accessing their websites using stolen credentials complicates the ability to prevent and remediate these attacks. The survey identified key stats about credential stuffing, including the costs organizations incur to prevent damage, and the financial consequences when attackers succeed. These costs are broken out into downtime, lost customers, remediation and fraud-related expenses. The survey also highlights the need for focused accountability and appropriate budget to protect businesses."
Tags : 
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Oct 02, 2018
"Ponemon Institute surveyed 538 individuals in IT security who are familiar with credential stuffing and are responsible for the security of their companies’ Internet properties. According to respondents, the challenges in identifying who is accessing their websites using stolen credentials complicates the ability to prevent and remediate these attacks. The survey identified key stats about credential stuffing, including the costs organizations incur to prevent damage, and the financial consequences when attackers succeed. These costs are broken out into downtime, lost customers, remediation and fraud-related expenses. The survey also highlights the need for focused accountability and appropriate budget to protect businesses."
Tags : 
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Oct 02, 2018
"Ponemon Institute surveyed 538 individuals in IT security who are familiar with credential stuffing and are responsible for the security of their companies’ Internet properties. According to respondents, the challenges in identifying who is accessing their websites using stolen credentials complicates the ability to prevent and remediate these attacks. The survey identified key stats about credential stuffing, including the costs organizations incur to prevent damage, and the financial consequences when attackers succeed. These costs are broken out into downtime, lost customers, remediation and fraud-related expenses. The survey also highlights the need for focused accountability and appropriate budget to protect businesses."
Tags : 
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Oct 02, 2018
"Ponemon Institute surveyed 538 individuals in IT security who are familiar with credential stuffing and are responsible for the security of their companies’ Internet properties. According to respondents, the challenges in identifying who is accessing their websites using stolen credentials complicates the ability to prevent and remediate these attacks. The survey identified key stats about credential stuffing, including the costs organizations incur to prevent damage, and the financial consequences when attackers succeed. These costs are broken out into downtime, lost customers, remediation and fraud-related expenses. The survey also highlights the need for focused accountability and appropriate budget to protect businesses."
Tags : 
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Oct 02, 2018
"Ponemon Institute surveyed 538 individuals in IT security who are familiar with credential stuffing and are responsible for the security of their companies’ Internet properties. According to respondents, the challenges in identifying who is accessing their websites using stolen credentials complicates the ability to prevent and remediate these attacks. The survey identified key stats about credential stuffing, including the costs organizations incur to prevent damage, and the financial consequences when attackers succeed. These costs are broken out into downtime, lost customers, remediation and fraud-related expenses. The survey also highlights the need for focused accountability and appropriate budget to protect businesses."
Tags : 
    
Akamai Technologies
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.