RSS feed Get our RSS feed

News by Topic

act

Results 76 - 100 of 13819Sort Results By: Published Date | Title | Company Name
By: Group M_IBM Q2'19     Published Date: Apr 01, 2019
Delivering personalized customer experience remains the top business challenge for communications service providers (CSPs). Ovum's recently published 2018 ICT Enterprise survey saw almost all CSP IT executives interviewed identify delivering personalized customer experience as one of their three most important business challenges for the next 18 months. This trend emphasizes the high priority CSPs place on how customer relationships are managed. However, several factors have an impact on CSPs' ability to identify and then deliver customers' core needs. These include understanding the data sets they should focus on; collecting, cleansing, and consolidating these data sets; and having the right expertise to mine the data sets.
Tags : 
     Group M_IBM Q2'19
By: Group M_IBM Q2'19     Published Date: Apr 02, 2019
There can be no doubt that the architecture for analytics has evolved over its 25-30 year history. Many recent innovations have had significant impacts on this architecture since the simple concept of a single repository of data called a data warehouse. First, the data warehouse appliance (DWA), along with the advent of the NoSQL revolution, selfservice analytics, and other trends, has had a dramatic impact on the traditional architecture. Second, the emergence of data science, realtime operational analytics, and self-service demands has certainly had a substantial effect on the analytical architecture.
Tags : 
     Group M_IBM Q2'19
By: Group M_IBM Q2'19     Published Date: Apr 08, 2019
IBM provides a security incident response (IR) solution called Resilient that helps its customers address security incidents quickly in an automated and orchestrated manner. IBM commissioned Forrester Consulting to conduct a Total Economic Impact™ (TEI) study and examine the potential return on investment (ROI) enterprises may realize by deploying Resilient. The purpose of this study is to provide readers with a framework to evaluate the potential financial impact of the Resilient platform on their organizations.
Tags : 
     Group M_IBM Q2'19
By: Group M_IBM Q2'19     Published Date: Apr 22, 2019
"Improving Cyber Resilience in the Insurance Industry Security automation plays a significant role when maintaining an organization's Cyber Resilience, according to IBM Resilient’s latest report, “The Ponemon Institute Study on the Cyber Resilient Organization.” Download this latest report to understand the key factors that hinder the ability for efficient and effective Cyber Resilience and gain insights and guidance for improving your security posture."
Tags : 
     Group M_IBM Q2'19
By: Group M_IBM Q2'19     Published Date: May 03, 2019
"Your workers demand an extraordinary level of flexibility and convenience in how they use their devices ... Meaning it’s up to you to support a vast assortment of endpoints, including laptops and desktops (both PCs and Macs), tablets and hybrid devices, smartphones, and even the Internet of Things (IoT). And not only do your users expect support for a wide variety of form factors, but they also require cross-platform support for all major platforms, including iOS and macOS, Android, and Windows. To complicate the situation further, they run different versions of those platforms—for example, they may run Windows XP SP3, Windows 10, or anything in between. Read onward and learn how the industry’s first cognitive UEM platform, MaaS360 with Watson, delivers a single, strategic management and security solution to drive your organization’s digital business transformation—no matter what endpoints your enterprise is putting to work."
Tags : 
     Group M_IBM Q2'19
By: Group M_IBM Q2'19     Published Date: May 28, 2019
In our always-on, always-connected world, healthcare consumers expect instant access to customer service, not just from 9 AM to 5 PM. It’s often no longer good enough for health plans to staff call centers during standard business hours. Members today typically want to be able to log in and help themselves to the answers they need from self-service channels whenever they want — and they want the experience to be highly personal. One contact center benchmark study (see next page) revealed self-service channels can be a win-win for both businesses and consumers.1 When done well, self-service solutions can help businesses improve customer satisfaction while reducing costs. And consumers appreciate the convenience of getting answers quickly and efficiently.
Tags : 
     Group M_IBM Q2'19
By: Oracle     Published Date: Jun 04, 2019
How confident are you and your peers about the data and security practices you’re working with? We asked 5,000 executives globally, across 24 markets and have some interesting results to share. For example, up to half of IT leaders consider their data is manageable but struggle to gain meaningful insights from it. Yet, while AI and autonomous technology could help relieve this situation, they aren’t high on the priority list. Read our report to find out more about executives’ views about data in connection with security, ethics, and visualisation. Read the report
Tags : 
     Oracle
By: Uberflip     Published Date: Jun 11, 2019
B2B marketing teams rely on content to fuel their campaigns and generate pipeline for their organizations. As such, every year marketing teams spend hundreds of thousands of dollars creating exponentially more content in an effort to reach and influence their buyers. But even with this proliferation of content, marketers everywhere still struggle to leverage their content to win and retain customers.
Tags : 
     Uberflip
By: Anaplan     Published Date: Mar 12, 2019
In this paper, learn how Tata Steel Europe achieved 2-3x faster and more efficient planning Tata Steel Europe (TSE) knew they wanted to connect supply chain processes to the rest of the business—and that required a true platform. “The deciding factor was the robust nature of Anaplan’s platform. It is not just a planning solution for supply chain planning experts,” said Ardy Duwel, Head of Commercial Projects Office at TSE. “We wanted something that would scale to meet the needs of our planning professionals while bringing the rest of our business into the planning process."
Tags : 
     Anaplan
By: Anaplan     Published Date: Mar 12, 2019
In this paper, learn how Tata Steel Europe achieved 2-3x faster and more efficient planning Tata Steel Europe (TSE) knew they wanted to connect supply chain processes to the rest of the business—and that required a true platform. “The deciding factor was the robust nature of Anaplan’s platform. It is not just a planning solution for supply chain planning experts,” said Ardy Duwel, Head of Commercial Projects Office at TSE. “We wanted something that would scale to meet the needs of our planning professionals while bringing the rest of our business into the planning process."
Tags : 
     Anaplan
By: Oracle     Published Date: Jun 04, 2019
Finance leaders believe data management is a burden on businesses. Yet less than half of organisations have a data management strategy in place. But data management strategies positively impact security across all lines of business. Poor data management practices inevitably lead to poor outcomes, with bad decisions based on bad data. Data must also be protected, with weak practices leading to cyber breaches. And the reputational damage to an organisation’s brand cannot be underestimated. However, when managed well, data offers a competitive advantage. In the past, data was typically informed historical reporting, with internal needs and compliance taking priority. There is a new data paradigm. Data is the new currency in the digital age.
Tags : 
     Oracle
By: Oracle     Published Date: Jun 10, 2019
In our recent report, we look into the reasons why HR feel less than confident in their ability to manage the volume of data securely and ethically. From extracting the right type of insights to improving employee productivity and engagement to managing the skills pipeline. We look forwards to how HR can improve their systems by using automated technologies such as artificial intelligence and machine learning. Read the survey today to see how your organisation compares to your peers.
Tags : 
     Oracle
By: Bell Micro     Published Date: Jun 14, 2010
This paper describes the benefits, features and best practices using a XIV in a SAP environment.
Tags : bell micro, sap application, best practices, ibm xiv, storage system
     Bell Micro
By: Mimecast     Published Date: Jun 03, 2019
Knowing where to look and what to watch out for is half the battle. Download this report to understand the most pervasive types of email threats, how security professionals perceive them and what they’re doing to combat them. Most importantly, you’ll walk away with actionable steps to improve your organization’s email security and cyber resilience. Gain valuable insight from 1,025 global IT decision makers on email-based attacks, cyber resilience, business continuity, awareness training and threat intelligence.
Tags : 
     Mimecast
By: Forcepoint     Published Date: Jun 06, 2019
As more and more companies are encouraging their employees to work from anywhere, on any device, data loss prevention (DLP) has evolved from an option to a requirement. In the past, DLP has been associated with complicated deployments and pervading operational management issues, yet DLP is not so much a product but a strategy—success depends on methodology and execution. Download the whitepaper for insightful guidance on implementing DLP. Key topics include: • Latest data-breach trends • Assessing DLP vendors • Nine-step framework • Best practices to ensure success
Tags : 
     Forcepoint
By: Forcepoint     Published Date: Jun 06, 2019
Things are not as they used to be in the enterprise. Today’s employees are mobile, they’re storing and accessing data in cloud apps, and are in disparate networks. While the present-day digital world has changed, the objective of data protection has not: you must still ensure the security of your critical data and intellectual property without impacting an employee’s ability to do their job. The key is to gain visibility into user interactions with data and applications. Once this is achieved, you can apply a level of control based on the specific user’s risk and the sensitivity or value of the data. An organization’s data protection program must consider the human point — the intersection of users, data and networks. Enterprises must remain vigilant of data as it moves across hybrid environments and highlight the users who create, touch and move data who may pose the greatest risk to an organization.
Tags : 
     Forcepoint
By: Forcepoint     Published Date: Jun 06, 2019
Today’s organizations turn to the cloud for all types of productivity-gaining tools – including security. Features such as security for mobile users and data loss protection are key, but it’s also important to separate fact from fiction when looking at the infrastructure of the provider. This ebook helps you consider the importance of: Data center locations Security controls, data privacy, availability, reliability, and performance What your organization or agency actually needs Download the ebook to discover five common misconceptions about cloud-based security infrastructure, and what you should really be looking for in a cloud-based security solution.
Tags : 
     Forcepoint
By: Forcepoint     Published Date: Jun 06, 2019
Office 365, Salesforce, and other cloud apps deliver a boost in employee productivity, but this benefit comes at a price. Once data moves outside an enterprise, security teams lose visibility and control into how it’s accessed and used. There is also the risk of unsanctioned apps or Shadow IT – the cloud apps setup and managed outside of IT that they have no visibility of; all this leaves an organization having to manage up to 1,000 cloud apps*.  Deploying a CASB solution can help you discover and assess risk from unsanctioned cloud apps and control sanctioned cloud app use. Through a hands-on evaluation, ESG discovered that Forcepoint CASB: Reduces threat response times Grants visibility and context into user activity Controls user access to cloud apps from different locations/devices Read the ESG evaluation for rare insight into Forcepoint CASB by a respected third-party analyst.
Tags : 
     Forcepoint
By: Forcepoint     Published Date: Jun 06, 2019
Your people access and share data using a myriad of different cloud apps. The bad news is, you probably have no idea how your data is used, where it travels to and the level of associated risk. You’ve lost visibility and control. The good news is, we can help get it back. Register now for a FREE Cloud Threat Assessment and detailed report of your cloud-application risk posture. This in-depth assessment will show you: Cloud usage patterns. How potentially harmful activities happen in cloud applications across your organization. Geographical usage. Which countries your data is traveling to and from (you may be surprised). Privileged users. Do you have more administrators than you need? Dormant users. Are you overspending on unused licenses? Riskiest users. Who are your riskiest users and why? You'll receive customized assessments on Office365, Box, G Suite, and Salesforce.com.
Tags : 
     Forcepoint
By: Motorola Solutions     Published Date: Jun 05, 2019
THE TIME IS NOW TO CREATE AN ENGAGING SHOPPING EXPERIENCE FOR EVERY CUSTOMER. In the world of retail, the customer is always right. That’s why retailers today must ensure their staff is well-informed, well-coordinated, armed and ready with the right information to satisfy customers in stores. Whether it’s a customer’s question about a product or a request for a different size, shoppers expect retail associates to be empowered with accurate answers and attentive service. Above all, stores need to rely on strong communication technologies so retailers can deliver a seamless experience for shoppers and keep them coming back. When retailers create an engaging experience, customer interactions turn into transactions and occasional buyers turn into loyal brand advocates. Motorola Solutions Two-Way Business Radios are helping retailers across the nation enhance customer and employee interactions, efficiency and safety both in stores and warehouses – but which business radio model is right for
Tags : 
     Motorola Solutions
By: Aryaka Networks     Published Date: Sep 06, 2018
Makino, a leader in manufacturing, required a global network to transfer massive amounts of data from their HQ to regional tech departments. Learn why Makino replaced their MPLS circuits with Aryaka.
Tags : 
     Aryaka Networks
By: List Sotheby's International Realty, Singapore     Published Date: Jun 11, 2019
The former Keppel Harbour was transformed into the vibrant marina-waterfront living precinct that it is today. To date, the Keppel Bay waterfront is lined by three iconic residential developments – Caribbean At Keppel Bay, Reflections At Keppel Bay and Corals At Keppel Bay – with a total of 2,464 apartments. As the Keppel Bay precinct matures over the years, the marina-waterfront housing lifestyle has taken roots and offers an attractive living concept to prospective buyers. Being situated on the mainland, Keppel Bay also have the advantage of being closer to amenities and have better accessibility and connectivity. Following the announced extension of the CCL to include three more stations (Keppel, Cantonment and Prince Edward) to close the circle, Keppel Bay will be directly connected to Marina Bay in the Downtown Core. When these stations are in operation by 2025, travel time between Keppel Bay and the CBD will be reduced by one-third of the current travel time.
Tags : 
     List Sotheby's International Realty, Singapore
By: DataCore     Published Date: Jun 06, 2019
More than 54% of companies have experienced a downtime event that lasted more than 8 hours – one full work day – in the past 5 years. And the risk of major disruptions to business continuity practices looms ever larger – primarily due to the troubling dependencies on the location, topology and suppliers of data storage. Download this infographic and see how you can preserve proven Business Continuity practices despite inevitable changes to your data storage infrastructure.
Tags : business continuity, disaster recovery, data protection, software defined storage, virtualization, storage, downtime, high availability
     DataCore
By: DataCore     Published Date: Jun 06, 2019
With so many moving pieces involved in business continuity and disaster recovery planning, anticipating the downstream impact of new SAN arrays, hyperconverged systems, and disaster recovery site relocation is increasingly more difficult. Learn how DataCore™ SDS services help you adapt your safeguards accordingly in the face of these common initiatives and business challenges: - Storage Array Replacement - Mergers and Acquisitions - Cloud Replication - Hyperconverged Infrastructure - Multi-Site Metro Cluster
Tags : business continuity, disaster recovery, data protection, software defined storage, virtualization, storage, downtime, high availability
     DataCore
By: DataCore     Published Date: Jun 06, 2019
Nothing in Business Continuity circles ranks higher in importance than risk reduction. Yet the risk of major disruptions to business continuity practices looms ever larger today, mostly due to the troubling dependencies on the location, topology and suppliers of data storage. Get insights on how to avoid spending time and money reinventing BC/DR plans every time your storage infrastructure changes.
Tags : business continuity, disaster recovery, data protection, software defined storage, virtualization, storage, downtime, high availability
     DataCore
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics