tech

Results 176 - 200 of 7440Sort Results By: Published Date | Title | Company Name
Published By: Datastax     Published Date: Aug 23, 2017
The world today is interacting at every level - consumers, business customers and employees - through cloud applications, and these cloud applications are transforming customer experiences. So what is a cloud application? Any application that has many geographically distributed endpoints (e.g. browsers, mobile devices or machines) should be considered a cloud application and treated accordingly.
Tags : 
datastax, technology, customer experience, cloud
    
Datastax
Published By: Datastax     Published Date: Aug 23, 2017
A holistic approach to using customer data to enable data-driven decisions for attracting, retaining, and delivering value through customer experience is what is going to drive many business initiatives over the next 12-month period. Though they each have varying degrees of capability to transform their customer experience applications and remain continuously available no matter what is critical to their success. Companies surveyed are eager to deliver a great customer experience and capture market share, but many CX journeys are hindered by business unit siloes, insufficient budget, and technical challenges. The responses provide key insights into the business priorities, challenges, and data technology needs of companies embarking on or in the midst of their CX journey.
Tags : 
datastax, customer data
    
Datastax
Published By: NetApp     Published Date: Sep 19, 2017
Use this Gartner report to help identify opportunities to optimize IT operations and accelerate your DevOps transformation. Avoid risk and drive value to your business by: implementing best practices, selecting the right tools and technologies, experimenting with agile practices, and aligning roles for success.
Tags : 
netapp, database performance, flash storage, data management, cost challenges, gartner, operations, business value
    
NetApp
Published By: NetApp     Published Date: Sep 21, 2017
This report provides insight into how 250 global IT professionals are currently using storage automation, the challenges they face, and their aspirations in next generation data center technology.
Tags : 
netapp, database performance, flash storage, data management, cost challenges, automation
    
NetApp
Published By: Hewlett Packard Enterprise     Published Date: Aug 02, 2017
HPE Synergy para principiantes
Tags : 
    
Hewlett Packard Enterprise
Published By: Hewlett Packard Enterprise     Published Date: Aug 02, 2017
Su contenido ya está disponible. Si todavía no se ha abierto en una nueva pestaña/ventana del navegador, utilice el botón siguiente.
Tags : 
    
Hewlett Packard Enterprise
Published By: Sprinklr     Published Date: Sep 28, 2017
After the largest tech merger in history, Dell and EMC needed to align their marketing and social departments. Karen Quintos took the challenge and along with Alison Herzog formed the Chief Customer Office.
Tags : 
customer service, customer relationships, customer experience, customer retention, voice of the customer, social customer service, customer journey
    
Sprinklr
Published By: Sprinklr     Published Date: Sep 28, 2017
At the Sprinklr Digital Transformation Summit in Nashville, Cisco Chairman John Chambers issued a stark warning during his keynote address: “75 percent of the companies in this room will be digital in just four years, that’s the good news,” Chambers said to the audience. “The bad news? It’s only going to work for a third of you, because you won’t reinvent yourself.”
Tags : 
customer experience, customer retention, customer service, digital marketing, digital marketing strategy, technology trends, voice of the customer, social customer service
    
Sprinklr
Published By: Sprinklr     Published Date: Oct 18, 2017
The promise of the Internet of Things is huge, but how can leaders extract real value from it? Four key areas can provide easy entry points to tap into the IoT, and quickly begin to realize value with IoT technologies. To find out how you can extract value from the IoT, check out this recent IBV study.
Tags : 
ibv, ibm, iot technologies
    
Sprinklr
Published By: UPS     Published Date: Aug 30, 2017
New technology solutions are emerging in the healthcare supply chain, helping make specimen logistics faster and smarter. These tech trends are also helping to mitigate risk and control variables in sample transport and storage. Read this infographic to learn how lab and CRO decision-makers should be looking for over the next three to five years.
Tags : 
healthcare supply chain, specimen logistics, digital supply newtork, dsn, ups
    
UPS
Published By: UPS     Published Date: Sep 28, 2017
This series explores the role of modern digital technology in the evolution of manufacturing production, defined here as the value chain of internal and external contributors to the manufacture and delivery of products. Each chapter is designed to help operators visualize how they can build-out production of the future, and how to leverage help from the value chain to make faster progress.
Tags : 
manufacturing production, digital supply chain, smart operations, digital transformation, industrial internet of things
    
UPS
Published By: Inspirus     Published Date: Oct 04, 2017
Many companies in HR technology claim to affect engagement — and many of them do! But most only touch one or two pieces of the engagement puzzle, and it’s tough to get a complete picture of how you’re affecting the entire employee experience. Think about the highlights of your work experiences for a moment. Maybe you won employee of the month. Maybe you hit a big goal and your team had a party to celebrate. Or maybe your team threw a baby shower or took a moment to appreciate the 10 years you spent growing with your company. You might consider those moments as you think about your work experiences, but you probably consider a number of other moments as well. The employee experience isn’t just one thing — it’s the sum of many different experiences across our relationships, our work, our personalities, and our lives. Making the connection to the individual is critical for success. When we look at how we make an impact on engagement, we can’t just look at one or two things; we have to con
Tags : 
    
Inspirus
Published By: Mimecast     Published Date: Apr 18, 2017
"Whaling attacks have risen in recent months and these emails are more difficult to detect because they don’t contain a malicious hyperlink or attachment, and rely solely on social-engineering to trick their targets. In order to combat these attacks, organizations must be aware of the dangers presented by whaling, or CEO fraud, and put the right safeguards in place. Mimecast conducted a whaling attack survey with 500 organizations around the globe and the results were alarming. Read this report to learn: - The five key phases of a whaling attack - How to protect your organization from a whaling attack through company exercises, education, and technology. - What Mimecast is offering to combat these attacks in its industry-leading Targeted Threat Protection service."
Tags : 
cyber security, cyber fraud, impersonation attacks, ceo fraud, whaling
    
Mimecast
Published By: Mimecast     Published Date: Apr 18, 2017
"With over 112 billion emails sent and received on a daily basis, email continues to be the dominant form of business communication. Organizations must formulate a strategy for not just storing email but meeting compliance requirements, responding to litigation requests and providing instant access to these important conservations. While this has traditionally been accomplished with on-premises technology, the cloud has transformed archiving by delivering new capabilities at lower costs. Read the whitepaper for key takeaways: - The emergence of email archiving as a business requirement - The challenges associated with traditional on-premises solutions - How the cloud has changed email archiving - How organizations can benefit from it"
Tags : 
email archiving, cloud, cloud based infrastructure, cyber security, cloud security
    
Mimecast
Published By: Mimecast     Published Date: Apr 18, 2017
"It’s no secret that organizations find themselves the target of increasingly sinister and highly sophisticated phishing, spear-phishing, whaling and ransomware attacks. While risks are clearly mounting, many organizations still aren’t keeping up with the challenge. Download Resetting Your Email Security Strategy to learn: - How employees are your first and last line of defense in attacks and why proper education is key. - How you can fix your processes against modern threats like whaling - The critical role of today’s cyber security technologies - Why your security strategy is doomed to failure without strong leadership"
Tags : 
email security, ransomware, phishing, whaling, security strategy
    
Mimecast
Published By: Mimecast     Published Date: Aug 22, 2017
Navigating a turbulent cybersecurity climate can be hard – especially as threats like Petya and WannaCry continue to cripple organizations. Business disruption, downtime, technical failure and data loss are all real risk factors that can’t be ignored. The power of preparedness is in your hands. Get expert insight, tips and guidance from industry thought leaders on how to build a cyber resilience plan for email in this e-book.
Tags : 
cyber resilience, petya, wannacry, cybersecurity
    
Mimecast
Published By: NuCompass     Published Date: Oct 04, 2017
You don’t have to be a Fortune 100 company to have a smart, effective relocation program. Even if you only move a handful of new and current employees every year, there are a few ideas that can help you be effective.
Tags : 
employee relocation, relocation, relocation program, new hire relocation, mobility, mobility services, mobility program, employee move
    
NuCompass
Published By: NuCompass     Published Date: Oct 04, 2017
Relocation is in a massive state of disruption, and it’s all thanks to innovative consumer technology. In this white paper, we discuss how NuCompass has adapted our service offering to meet the changing needs of our customers and their workforce.
Tags : 
employee relocation, relocation, relocation program, global mobility, international relocation, new hire relocation, mobility, mobility services
    
NuCompass
Published By: Fujitsu     Published Date: Aug 01, 2017
Fujitsu Workplace Assessment offers the ideal first step towards achieving the optimum balance of structure and autonomy for your organization. Get in touch today to find out more about how Fujitsu can help you create a connected, mobile, flexible and secure working environment for all your employees.
Tags : 
generation y, employees, corporate, technology, byod, workplace, workforce, service delivery
    
Fujitsu
Published By: Fujitsu     Published Date: Aug 01, 2017
Regardless of which model you choose, BYOD needs to be carefully planned to get the full benefits without increasing costs. Decisions must also be made about whether to accept some cost increases as a trade-off for benefits that improve your bottom line. To be successful, both for the business and for employees, BYOD must balance conflicting expectations to create an equilibrium in which both parties get what they want – while also each giving something in return. Many factors will influence the true cost of your BYOD program, but the decision should not be based purely on cost considerations. Research by analyst firm Forrester found that nearly 70% of companies increased their bottom line revenues as a result of deploying BYOD programs5 – so some cost increases may well be a price worth paying.
Tags : 
hardware costs, devices, byod, technology, online communities, intel, productivity goals
    
Fujitsu
Published By: OKTA     Published Date: Sep 26, 2017
Traditional web applications pre-date modern standards like SAML and OpenIDConnect, so they often use legacy authentication methods to grant end users access. Historically, providing Single Sign-On and centralized access management for end users across these legacy applications required a Web Access Management, or WAM, product. These on-premises software tools could be expensive to maintain and complex to deploy. Now, modern identity providers like Okta in conjunction with best-of-breed network management technologies offer a better way. This white paper describes how web applications that lack modern standard support can be integrated into a cloud-based Identity-as-a-service architecture.
Tags : 
    
OKTA
Published By: Virtela Communications, Inc.     Published Date: Oct 12, 2011
Multinational companies (MNCs) are facing a unique combination of escalating customer, competitive and operational pressures which are forcing them to fundamentally change the way they do business and manage their IT infrastructures supporting network, security and mobility needs. Lack of IT resources, limited capex and more complex global implementations are driving an increasing proportion of MNCs to offload, or 'out-task', various aspects of their day-to-day management responsibilities to skilled third-parties that can help perform these functions well.
Tags : 
health, global management service, cloud services, technology
    
Virtela Communications, Inc.
Published By: Virtela Communications, Inc.     Published Date: Oct 13, 2011
Christian Kane is an Enterprise Mobility Management Research Analyst with Forrester Research, where he helps clients develop and improve their desktop and mobile strategy. His research spans mobile hardware, mobile operating systems, mobile device management solutions, and mobile applications.
Tags : 
cloud computing, technology, virtela, device management, christian kane, mobility management, research
    
Virtela Communications, Inc.
Published By: Akamai Technologies     Published Date: Apr 26, 2010
Collaboration in the enterprise requires a triumvirate of people, process and technology to be successful. With the plethora of collaboration applications available today, both IT professionals and collaboration business users alike need to take a holistic approach to be successful with collaboration. This paper lets you know about some of the common pitfalls and how to avoid them.
Tags : 
akamai, collaboration, collaboration software, firewall, enterprise software, web conferencing, travel costs, twitter
    
Akamai Technologies
Published By: Coyote Point Systems     Published Date: Sep 02, 2010
At a projected market of over $4B by 2010 (Goldman Sachs), virtualizationhas firmly established itself as one of the most importanttrends in Information Technology. Virtualization is expectedto have a broad influence on the way IT manages infrastructure.Major areas of impact include capital expenditure and ongoingcosts, application deployment, green computing, and storage.
Tags : 
coyote point, adc, buyer's guide, web applications, server load, server hardware, networking, virtualized network
    
Coyote Point Systems
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.