RSS feed Get our RSS feed

News by Topic

abs

Results 251 - 275 of 492Sort Results By: Published Date | Title | Company Name
By: Interactive Intelligence     Published Date: Apr 23, 2014
If a contact center executive could have anything, it would be certainty… of contact demand, resource availability, operational efficiency, and of agent performance and customer experience delivery. But certainty in a contact center is nearly impossible, and in the absence of a crystal ball, mathematical models provide the next best thing. They alert, evaluate operational risk, and propose business and resourcing solutions. And now, the best of these models also determine expected experience delivery.
Tags : interactive intelligence, contact center, customer service, customer experience, cost, revenue, telecom
     Interactive Intelligence
By: STARLIMS     Published Date: Apr 16, 2014
Learn how Laboratory Information Systems (LIS) are becoming outdated and see how they are being replaced by Information Management Systems that can provide flexible management capabilities that provide informatics solutions.
Tags : starlims, lims, laboratories, lis systems
     STARLIMS
By: FireEye     Published Date: Feb 28, 2014
The Top 10 Mistakes Incident Responders Make Combatting Advanced Threats
Tags : fireeye, persistent threats, advanced attacks, it security, incident response, breach investigation, information security media group, ismg
     FireEye
By: ForeScout     Published Date: Feb 18, 2014
Commissioned by ForeScout and conducted by The Tolly Group, one of the world’s leading independent product testing labs, the competitive analysis covers 34 criteria points across key functional categories: deployment, interoperability, guest management, endpoint compliance, enforcement, remediation and scalability. Before spending considerable time and resources to perform your POC, download this in-depth, 24-page report.
Tags : forescout, counteract, network access control, nac, deployment, interoperability, guest management, endpoint compliance
     ForeScout
By: VMTurbo     Published Date: Feb 11, 2014
Moving beyond monitoring, alerting and reporting to deliver an automated control system for today's virtualized data centers.
Tags : vmturbo, sizing up, operations management, virtual infrastructure, it operations, analytic engine, decision-making process, storage infrastructure
     VMTurbo
By: VMTurbo     Published Date: Feb 11, 2014
VMTurbo’s Observe-­-Advise-­-Automate model delivers intelligent and holistic visibility, analytics and automation.
Tags : vmturbo, virtualization, virtualizing business, business-critical, business applications, controlling interference, consolidation, virtual currency
     VMTurbo
By: Fortinet     Published Date: Feb 04, 2014
In 2012, NSS Labs found that most available NGFW solutions “fell short in performance and security effectiveness.” In 2013 NSS Labs noted “marked improvement” and bestowed their “recommended” rating on 6 vendors. Please download the white paper to find out who they were.
Tags : fortinet, ngfw, next generation firewall, nss labs, security
     Fortinet
By: McAfee     Published Date: Jan 28, 2014
NSS Labs provides overall exploit protection rates for 11 popular enterprise Endpoint Protection Products.
Tags : epp, endpoint, protection, threats, malware, nss
     McAfee
By: IBM     Published Date: Jan 09, 2014
Simply put, software defined storage is the abstraction of storage services from storage hardware. This term is more than just marketing hype, it’s the logical evolution of storage virtualization from simply being a storage aggregator to the end goal of storage as a service. To achieve this goal, software defined storage needs a platform from which to centralize.
Tags : ibm, storage switzerland, storage platform, sds, software defined storage, data center, storage virtualization, data protection
     IBM
By: HP - Enterprise     Published Date: Sep 16, 2013
This paper touches upon the following topics: -Critical vulnerabilities are on the decline, but still pose a significant threat -Mature technologies introduce continued risk -Mobile platforms represent a major growth area for vulnerabilities -Web applications remain a substantial source of vulnerabilities -Cross-site scripting remains a major threat to organizations and users -Effective mitigation for cross-frame scripting remains noticeably absent
Tags : internet security, intrusion detection, intrusion detection/ forensics, intrusion prevention, mobile security, network security appliance, security, security policies
     HP - Enterprise
By: Symantec     Published Date: Aug 09, 2013
Anti-virus software is a crucial piece of any organization’s security strategy. However, sifting through the marketing hype and finding the product that truly delivers the best security can be challenging. This independent research report on enterprise anti-virus protection tests five of today’s best-known anti-malware products to help your organization evaluate which would work best in your enterprise. View now to uncover who came out on top when tested upon accuracy, protection, false positives, and more.
Tags : symantec, security, threat, report, key findings, best practice, strategy, technology
     Symantec
By: Red Hat     Published Date: Jun 17, 2013
A recent Gartner research note discusses the strides DreamWorks Animation has made during its 13 years using open source technology. Red Hat has found that with cloud, virtualization, middleware, and operating system products and services, DreamWorks Animation has streamlined processes, improved techniques, and significantly reduced costs.
Tags : dreamworks, animation, production, red hat, technology, gartner, virtualization, cloud
     Red Hat
By: Dell Software     Published Date: May 28, 2013
In rigorous testing, openBench Labs found that Dell AppAssure 5? offered significant advantages in ease-of-use, backup speed and recovery time. Read their complete findings: Unified Backup: Virtual & Physical.
Tags : dell quest, appassure, dell appassure 5Ô, backup solution, openbench labs, unified backup
     Dell Software
By: HP and Intel ®     Published Date: May 06, 2013
The workplace is changing rapidly to accommodate mobile and flexible work styles, as employees expect the same computing experience when working remotely as they get in the office. And those expectations are rising rapidly among all employees — not just in the executive hallways or engineering labs. To discover more about mobile work styles and client virtualization trends in today’s enterprises, Citrix Systems and HP commissioned Forrester Consulting to survey IT decision-makers in North America, Europe, and Asia for this Technology Adoption Profile (TAP). Coupled with Forrester’s existing Forrsights data, we found that IT is turning to client virtualization to manage the growing complexity that BYOD programs and mobility initiatives have created and is embracing end-to-end solutions to overcome the toughest client virtualization challenges concerning cost, performance, scalability, and security.
Tags : mobile, virtualization, mobile workforce, remote employees
     HP and Intel ®
By: Absolute Software     Published Date: Apr 11, 2013
There has yet to be a demonstrated case where an organization has reduced ITSSM spending over a five-year period solely on the basis of licensing in the SaaS model versus the perpetual model.
Tags : absolute software, saas, ssm, saas model, cost savings, perpetual model, itssm
     Absolute Software
By: Sophos     Published Date: Mar 26, 2013
Our experts at SophosLabs look in depth at ransomware variants and delivery mechanisms, and show how you can protect your data with a complete security strategy.
Tags : ransomware, sophos, data, protect, security, strategy
     Sophos
By: Optis     Published Date: Mar 07, 2013
Integrating leave and workforce data doesn’t have to be overly complicated. With the right plans, you can make the business case to implement an integrated database so you can get the people answers you need.
Tags : integrated workforce database,   implementing integrated systems,   data quality management,   value of integrated data,   people data management,   disparate people data,   analyze leave data,   employment data
     Optis
By: Optis     Published Date: Mar 07, 2013
When employee absences can make up 36 percent of an employer’s payroll, companies need to manage leave without adding costs. Find out how an integrated system will improve the bottom line and bring people data together.
Tags : people data management, disparate people data, analyze leave data, employment data, employee benefits data, workforce data management, integrated people data, people data strategy
     Optis
By: Optis     Published Date: Mar 07, 2013
Companies can realize significant savings with an automated absence management system. Download the Optis study to see how one company saved over $8 million by reducing lost time and getting a handle on leave.
Tags : people data management, disparate people data, analyze leave data, employment data, employee benefits data, workforce data management, integrated people data, people data strategy
     Optis
By: Optis     Published Date: Feb 26, 2013
Managing employee leave has become a top priority for HR, especially as costs continue to rise. Find out how HR faces the puzzling challenge of managing leave and rising costs.
Tags : leave management system, absence management system, employee leave costs, absence management costs, leave management software, fmla management, absence management program, fmla software
     Optis
By: Optis     Published Date: Feb 26, 2013
Don’t let a lack of people data insight keep you from making the right business decisions. Learn how to become people data strategic and make your disparate data easy to understand, control and see.
Tags : people data management, disparate people data, analyze leave data, employment data, employee benfits data, workforce data management, integrated people data, people data strategy
     Optis
By: Apple Corporation     Published Date: Feb 08, 2013
Please join us at this exclusive live online seminar. It'll take about half an hour and it's absolutely free.
Tags : 
     Apple Corporation
By: McAfee     Published Date: Feb 08, 2013
NSS Labs provides overall exploit protection rates for 11 popular enterprise Endpoint Protection Products.
Tags : mcafee, epp, endpoint, protection, threats, malware, nss
     McAfee
By: Apple Corporation     Published Date: Feb 07, 2013
Please join us at this exclusive live online seminar. It'll take about half an hour and it's absolutely free.
Tags : 
     Apple Corporation
By: McAfee     Published Date: Feb 06, 2013
The move towards multi-faceted protection has been gathering pace, with more technologies coming into play to protect users from the vast and increasing number of threats.
Tags : anti malware performance test, security performance test, application control benchmark, anti virus benchmark, hips benchmark, windows 7 anti malware benchmark, anti malware protection comparison, west coast labs
     McAfee
Start   Previous    4 5 6 7 8 9 10 11 12 13 14 15 16 17 18    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics