it issues

Results 1 - 25 of 694Sort Results By: Published Date | Title | Company Name
Published By: InMoment     Published Date: Oct 14, 2019
In today’s experience economy, a simple request for feedback on a receipt is not enough to accurately determine your guests’ needs. Guests need to be presented with the option to share feedback at the right time for them—whenever, wherever, and however they want to. At the same time, the volume of feedback requests and the length of surveys often result in survey fatigue and other negative emotions in guests. This is just one of the complex issues restaurant brands find themselves facing today. Others include: • How do I understand the experience every individual guest has with my brand? • How do I communicate with them in a way that they’re more likely to give feedback? • How can I demonstrate awareness of the guests’ situations and acknowledge their needs?
Tags : 
    
InMoment
Published By: AWS     Published Date: Oct 09, 2019
Cyberattacks and undetected threats present constant risks to the safety of critical data and applications. CrowdStrike can help you overcome that risk with unified endpoint protection and real-time monitoring. This solution helps your organization gain visibility across your entire AWS environment and automatically detect and mitigate threats before they impact your business. Register now to learn how CrowdStrike has helped Oak Hill Advisors (OHA), a global investment firm, secure the assets in their AWS environment by immediately assessing issues and automating their incident responses.
Tags : 
    
AWS
Published By: KPMG     Published Date: Oct 09, 2019
Complying with financial and economic sanctions is likely to pose new challenges after Brexit. Explore the issues with KPMG experts Karen Briggs and Neal Dawson, with Maya Lester QC and Arjun Ahluwalia, Head of Sanctions Advisory at HSBC UK. Listen now to discover: • Details of current sanctions policy and post-Brexit implications • How financial and economic sanctions impact the private sector • How manage compliance better by using sanctions technology.
Tags : 
    
KPMG
Published By: AWS     Published Date: Oct 07, 2019
Cyberattacks and undetected threats present constant risks to the safety of critical data and applications. CrowdStrike can help you overcome that risk with unified endpoint protection and real-time monitoring. This solution helps your organization gain visibility across your entire AWS environment and automatically detect and mitigate threats before they impact your business. Register now to learn how CrowdStrike has helped Oak Hill Advisors (OHA), a global investment firm, secure the assets in their AWS environment by immediately assessing issues and automating their incident responses.
Tags : 
    
AWS
Published By: AWS     Published Date: Oct 07, 2019
While monitoring is critical for any business, it is especially imperative for highly regulated industries such as healthcare. With patient data to protect and regulatory standards to meet, you need to make sure your teams are building solutions that comply. If you’re not compliant, you need to be able to quickly remediate issues, so you can still get your products out to market and deliver better patient care.
Tags : 
    
AWS
Published By: ASME     Published Date: Oct 03, 2019
One of the most frustrating aspects of the measurement of severe pyroshock events is the acceleration offset that almost invariably occurs. Dependent on its magnitude, this can result in large, low-frequency errors in both shock response spectra (SRS) and velocity-based damage analyses. Fortunately, recent developments in accelerometer technology, signal conditioning, and data acquisition systems have reduced these errors significantly. Best practices have been demonstrated to produce offset errors less than 0.25% of Peak-Peak value in measured near-field pyrotechnic accelerations: a remarkable achievement. This paper will discuss the sensing technologies, including both piezoelectric and piezoresistive, that have come together to minimize these offsets. More important, it will document the many other potential contributors to these offsets. Included among these are accelerometer mounting issues, cable and connector sources, signal conditioning amplitude range/bandwidth, and digitizi
Tags : 
    
ASME
Published By: Mimecast     Published Date: Oct 02, 2019
By any measure, Office 365 is a success as millions of Microsoft seats transition from on-premises Exchange to a cloud-based email service as part of Office 365. While Microsoft has been offering hosted email solutions for more than 20 years, they have hit their stride with Office 365, the third major iteration of the company’s foray into hosted/cloud-based email and collaboration. This white paper discusses the key issues that decision makers need to consider as they evaluate the email, security, and resilience capabilities of Office 365. After reading this analyst perspective completed by Michael Osterman of Osterman Research, we believe you will better understand: Special considerations related to hybrid Exchange and Office 365 email deployments The importance of programmatic security efficacy rather than simple functionality How to ensure business messaging continuity in the context of Office 365 outages Whether third-party backup/recovery is critical for protecting your infrastr
Tags : 
    
Mimecast
Published By: ttec     Published Date: Oct 01, 2019
In an age of tech-savvy customers and self-service channels, do companies still need to invest in contact centers and staff to provide support? The answer is, yes. Consumers have been trained to find the information they need on their own online or with their mobile device. But when they do pick up to the phone and reach out to customer service, they expect representatives to solve what are often complex questions. They expect human interactions. This enormous shift in which customer service representatives are perceived as a last resort puts increased pressure on contact center associates who already have the odds stacked against them. The staff must be trained to quickly handle issues that frequently require access to a wide variety of information, but a lack of investment means many associates are often unprepared and lack the right resources to help customers. To change the outcome, customer service representatives need the right training and tools to not only understand the issue,
Tags : 
    
ttec
Published By: NetSpi     Published Date: Oct 01, 2019
All organizations should aspire to have the people, processes, and tools necessary to effectively execute an on-going penetration testing program. Failure to do so may result in poor tool selections, testing mistakes, and faulty interpretation of results that often lead to a false sense of security putting the enterprise at risk. IT security and audit staff, along with their managers and directors, should read this paper to clarify any misunderstandings about penetrating testing - from the true purposes and goals, to important process considerations, to tools and tester selection issues, and finally to safe and effective ethical hacking approaches.
Tags : 
    
NetSpi
Published By: Datastax     Published Date: Sep 27, 2019
In this white paper, you’ll learn about the three most important issues surrounding data management in the age of IoT. You'll also learn how DataStax Enterprise, built on Apache Cassandra™ and native to hybrid cloud environments, is paving the way for the future of data management. Download the white paper to learn more now.
Tags : 
    
Datastax
Published By: Group M_IBM Q4'19     Published Date: Sep 25, 2019
• Simplify business process modeling: Quickly build processes in a straightforward cloud-based interface designed for both IT and business users • Improve process efficiency and accuracy: A central process repository eliminates version control and consistency issues by providing users real-time access to process workflows • Enhance cross-team collaboration: A shared team workspace engages all business process owners, encouraging cross-team participation and continuous process improvement
Tags : 
    
Group M_IBM Q4'19
Published By: NetSpi     Published Date: Sep 20, 2019
All organizations should aspire to have the people, processes, and tools necessary to effectively execute an on-going penetration testing program. Failure to do so may result in poor tool selections, testing mistakes, and faulty interpretation of results that often lead to a false sense of security putting the enterprise at risk. IT security and audit staff, along with their managers and directors, should read this paper to clarify and misunderstandings about penetrating testing - from the true purposes and goals, to important process considerations, to tools and tester selection issues, and finally to safe and effective ethical hacking approaches.
Tags : 
    
NetSpi
Published By: Intel     Published Date: Sep 20, 2019
Skilled IT teams understand that one cloud does not fit all. Compliance issues may demand that some data be held internally. Budget-imposed total cost of ownership (TCO) limits may push other data out to public clouds. Hence, a scalable multi-cloud infrastructure becomes imperative. This whitepaper addresses key questions commonly raised by CIOs considering the move to multi-cloud. Further, it sheds light on how Intel® technologies such as the 2nd Generation Intel® Xeon® Scalable processors and Intel® Optane™ DC Persistent Memory can help boost your cloud credentials.
Tags : 
    
Intel
Published By: Anaplan     Published Date: Sep 11, 2019
Prior to implementing the Anaplan platform, RSA Group had a tedious spreadsheet-based, nine-month planning cycle riddled with data quality issues, which was compounded by siloed, functional fragmentation across the company. As a result, the finance team was spending a significant amount of time cleaning data rather than analyzing it to provide insight to key stakeholders throughout the business. Using the Anaplan platform, RSA Group reduced their financial planning process from nine months to five months. The workforce planning team experienced a 50% improvement in productivity. The business can now own their connected plans, resulting in improved decision support to business users, as well as improved customer service and financial results.
Tags : 
    
Anaplan
Published By: Shell U.K. Limited     Published Date: Sep 05, 2019
We harness Shell gas-to-liquids (GTL) technology to create high-purity process oils that open exciting opportunities for your products and operations. Conventional process oils are derived from crude oil, whereas Shell Risella X and Shell Ondina X are made from pure synthesis gas. That frees them from the impurities and large molecular variations found in mineral oils. Using GTL process oils could enhance your processes and final products to give you a competitive advantage. [478] Have you ever experienced product quality issues caused by variations in process oil batches? Do you need a low-viscosity process oil, but have concerns about the effect of volatiles on working conditions? Could you offer enhanced products if you had process oils with distinct characteristics, for example, an extremely narrow hydrocarbon distribution range? Our GTL process oils contain a high proportion of paraffinic hydrocarbons and are very pure, which provides key qualities for many applications. For in
Tags : 
shell, risella, ondina, process oils, gas-to-liquids, gtl, purity, pure, volatility, colourless, colorless, odourless, odorless, viscosity index
    
Shell U.K. Limited
Published By: Trend Micro     Published Date: Sep 05, 2019
“EDR alone is simply not enough to empower security pros to detect, investigate, and respond to attacks at the pace they need to keep up with modern attackers. A broader detection and response approach is needed.” Register now and receive this exclusive white paper. Dave Gruber, ESG Senior Analyst takes a look at how you can increase the efficiency and effectiveness of detection and response through XDR, along with: • Strategic insight into the current state of threat detection and response, providing you with ESG’s comprehensive research and findings. • Current challenges affecting today’s organizations, including the time and resources required and numerous gaps that EDR exposes. • Valuable foresight into what’s next and how XDR—detection and response across email, endpoint, servers, cloud workloads, and network—can help solve these issues.
Tags : 
    
Trend Micro
Published By: Group M_IBM Q3'19     Published Date: Sep 04, 2019
This white paper considers the pressures that enterprises face as the volume, variety, and velocity of relevant data mount and the time to insight seems unacceptably long. Most IT environments seeking to leverage statistical data in a useful way for analysis that can power decision making must glean that data from many sources, put it together in a relational database that requires special configuration and tuning, and only then make it available for data scientists to build models that are useful for business analysts. The complexity of all this is further compounded by the need to collect and analyze data that may reside in a classic datacenter on the premises as well as in private and public cloud systems. This need demands that the configuration support a hybrid cloud environment. After describing these issues, we consider the usefulness of a purpose-built database system that can accelerate access to and management of relevant data and is designed to deliver high performance for t
Tags : 
    
Group M_IBM Q3'19
Published By: Gigamon     Published Date: Sep 03, 2019
This white paper will examine the security issues introduced by more data over faster networks, how an architectural approach can solve those challenges and introduces the GigaSECURE® Security Delivery Platform, the leading next-generation network packet broker purpose-built for security tools to work more efficiently across physical, virtual and cloud environments. In fact, IHS Markit1 has named Gigamon the market leader and the best-known vendor in the space with #1 market share in multiple industries – 36% overall and 59% in the government sector.
Tags : 
    
Gigamon
Published By: Gigamon     Published Date: Sep 03, 2019
Your organization depends on all kinds of inline tools to keep your network up and running, but those same tools can fail, leaving you vulnerable. Moreover, as network speeds increase, slower tools can bottleneck network traffic, making organizations purchase more and more tools, which then introduce complexity and cost. There is a better way to increase network resiliency while reducing security issues, and that’s inline bypass.
Tags : 
    
Gigamon
Published By: Spectrum Enterprise     Published Date: Aug 29, 2019
Many businesses attempting to implement digital strategies are held back by subpar Internet connectivity. Networks with insufficient bandwidth and inconsistent performance cause a wide range of problems that prevent businesses from competing effectively. Such issues can range from unsatisfying online experiences for customers to unreliable connectivity for employees to the inability to run latency-sensitive applications and share large files. In short, their networks are delivering poor value that affects nearly all areas of their businesses.
Tags : 
    
Spectrum Enterprise
Published By: ANSYS     Published Date: Aug 28, 2019
The most problematic scenario engineers encounter when analyzing large deformation solutions using the finite element method is convergence issues due to mesh distortion. This is typical, for example, during simulation of elastomeric sealing or metal forming applications. Complex nonlinearities due to mechanical and/or thermal behavior arise in such cases from inherent material properties, geometric changes and establishment or separation of contact interfaces. The manual rezoning feature which was released in ANSYS 10.0 gave analysts a highly customizable, albeit labor-intensive, workflow to change and repair the mesh whenever needed after an unconverged solution. However, since the release of ANSYS 15.0, the latest “NonLinear ADaptivity” (NLAD) feature and accompanying enhancements are as automatic as one can imagine for repairing mesh distortion, overcoming convergence difficulties, refining the mesh to capture local phenomenon and achieving the “true” design solution.
Tags : 
    
ANSYS
Published By: ConnectWise     Published Date: Aug 22, 2019
At the end of the day, monitoring is all about finding problems before they cause issues for your users, and managing expectations when problems do crop up. Once critical and basic coverage is handled, start monitoring devices to keep everything tied together. If a switch, router, or hub goes down, or a printer starts having issues, you’ll know before the complaints start rolling in. When you automate recurring processes or tasks, your team can focus on delivering value instead of putting out fires.
Tags : 
    
ConnectWise
Published By: VMware     Published Date: Aug 16, 2019
It can be stressful to be at the heart of your organization's digital transformation initiatives. You're the IT pro everyone is trusting to balance two top business priorities: maximizing end-user productivity and minimizing threats. Modern management ensures you can do both. Download this customer experience to learn how two IT leaders describe how they are improving employee productivity and addressing complex management issues head-on with a modern approach to management.
Tags : 
    
VMware
Published By: Achievers     Published Date: Aug 16, 2019
Understanding HR and Engagement Leaders’ Challenges and Opportunities How can organizations understand the gaps in employee expectations, anticipate the most pressing issues, and adopt the processes and technology that make it scalable? Achievers surveyed HR and engagement leaders’ on the front lines of engagement who understand the challenges and opportunities facing the workplace today. In this report, discover how you can address: • The most pressing engagement challenges for organizations today • The role of employee empowerment and trust in engagement success. • Technology and culture changes that can ensure success
Tags : 
    
Achievers
Published By: Automation Anywhere APAC     Published Date: Aug 15, 2019
Global corporate enterprise AI practitioners are clearly still dealing with infrastructure issues related to talent and technology. End-to-end processes remain stubbornly carbon-based. Rule-based automation is truly not yet globally scaled across the majority of organizations. Double the AI And yet, the AI & Intelligent Automation Network members went from 21%, having deployed Intelligent Enterprise solutions to over 44% in just one year’s time. Over 4/5 expect to deploy AI in under two years The stated goal for deployment is just under 83% by the end of 2020. Considering the fact that they’ve essentially got two years, and those ranks have doubled in one year – doubling again in two years is achievable. Incidentally, that same number was only 67% a year ago. 50% expect to be established, globally scaling or refining AI in under two years Global corporate enterprise is in fact slowly but surely transforming into the intelligent enterprise of tomorrow. Having said that, it will be
Tags : 
analyst, artificial intelligence, intelligent automation, rpa
    
Automation Anywhere APAC
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.