RSS feed Get our RSS feed

News by Topic

dam

Results 1 - 25 of 474Sort Results By: Published Date | Title | Company Name
By: HPE APAC     Published Date: Jun 20, 2017
Enterprise IT is in the throes of a fundamental transformation from a careful builder of infrastructure that supports core enterprise applications to a lean and lively developer of business-enabling applications powered by infrastructure. But why is this change happening now at all, and why now? Read this paper to find out more.
Tags : infrastructure, devops, agile, hpe, it transformation, enterprise
     HPE APAC
By: Akamai Technologies     Published Date: May 24, 2017
Zum Schutz eines Unternehmens und seiner Daten ist es unerlässlich, bei der Cybersicherheit vorauszudenken. In diesem E-Book erfahren Sie, wie Sie die bestehende Infrastruktur Ihrer Website oder Ihres Rechenzentrums mit verstärkten Sicherheitsmaßnahmen in der Cloud ergänzen können. Wir stellen die verschiedenen Ansätze zur Cloudsicherheit von Akamai sowie von anderen Anbietern vor. Daraufhin sehen wir uns einige häufig verwendete, aber leider oft missverstandene Kennzahlen an, damit Sie fundierte Entscheidungen treffen und die optimale Lösung für Ihr Unternehmen finden können.
Tags : 
     Akamai Technologies
By: Akamai Technologies     Published Date: May 05, 2017
Web application and DDoS attacks hit enterprises without warning or reason. Most Distributed Denial of Service (DDoS) attacks require little skill to launch with attackers can simply rent resources from DDoS-for-hire sites at a low cost.. In comparison, DDoS attacks typically result in: • Operational disruption • Loss of confidential data • Lost user productivity • Reputational harm • Damage to partner and customer relations • Lost revenue Depending on your industry, that could add up to tens of thousands of dollars in damage – and in some cases it could be millions. Only 2% of organizations said their web applications had not been compromised in the past 12 months – 98% said they had.
Tags : ddos, technical support, data security, application security
     Akamai Technologies
By: Juniper APAC DWA Cloud Leads July 2017     Published Date: Aug 10, 2017
The digital, connected world is fundamentally changing the dynamics of the financial services industry. Consumers expect anytime and anywhere access with a customer experience commensurate with the Internet world, while fintech start-ups disrupt established value chains, driving a need to deliver faster innovation. This is creating tremendous pressure on the network, with escalating demands for performance and agility, while cost control and compliance imperatives remain as dominant as ever. This paper looks at optimal strategies for CIOs and CTOs, exploring how the future network needs to evolve to both drive operational effectiveness and enable business change, while assessing key investment and strategic considerations for equipping the network for the digital financial institution.
Tags : security information, security management, event management, system security, system management, risk management, security infrastructure, it infrastructure
     Juniper APAC DWA Cloud Leads July 2017
By: Makino     Published Date: Jun 23, 2017
Leadership at Chicago Faucets of Milwaukee, Wis., discusses how investments in flexible manufacturing systems helped drive company-wide supply chain improvements for improved delivery, inventory management and profitability in the manufacturing of its commercial faucets. Using two MMC2 flexible manufacturing cells with Makino horizontal machining centers, the company’s manufacturing team achieved the flexibility necessary to efficiently respond to real-time customer demand within an exceptionally high-mix production environment.
Tags : flexible manufacturing system, fms, machining automation, automated machining, machine tool automation, automated pallet handling, automated material handling
     Makino
By: VMware AirWatch     Published Date: Jul 19, 2017
VMware AirWatch® features a new – and more efficient – approach to Windows lifecycle management across any use case – whether deploying the OS to your remote workers, onboarding employees’ BYO machines, corporate deployments across your branch offices or managing a special line of business terminal. The unified endpoint management technologies fundamentally changes how organizations approach PC lifecycle management, allowing IT to deploy security patches and remediate vulnerabilities faster, install software more reliably and quickly and consolidate operational processes across devices on or off the domain.
Tags : 
     VMware AirWatch
By: VMware     Published Date: Jul 24, 2017
There’s no denying that today’s workforce is “mobile.” Inspired by the ease and simplicity of their own personal devices, today’s workforce relies on a variety of tools to accomplish their business tasks — desktops, smart phones, tablets, laptops or other connected devices — each with varying operating systems.  The specific tasks they need to accomplish? That depends on the person. But it’s safe to say remotely logging in and out of legacy, desktop, mobile, software as-a-service (SaaS) and cloud applications is a given. And the devices on which they work? They could be owned by the enterprise or the end user, with varying levels of company oversight, security and management. The result? An overabundance of “flexibility” that leads to fundamental IT challenges of security and manageability.
Tags : 
     VMware
By: New Voice Media     Published Date: Jul 24, 2017
Sie sind noch nicht lange als Vertriebsleiter im Inside Sales tätig? Oder leiten Sie bereits ein Inside-Sales-Team und möchten lediglich Ihr Wissen auffrischen? Dann sind Sie bei unserem ultimativen Leitfaden für den Inside Sales genau richtig. Hier erfahren Sie alles über die Personalbesetzung, Schulung, Organisation, Motivation und Optimierung Ihres Inside Sales, damit Sie bestmögliche Leistungen erzielen können.
Tags : salesforce, cloud-kontakt-center-software, • plattform für den internen vertrieb
     New Voice Media
By: Workday     Published Date: Jul 19, 2017
Today’s business climate demands that corporations have a flexible computing infrastructure. Because of the agility it provides, cloud computing is garnering interest in many organisations. As they look at such possible deployments, however, some CIOs become hamstrung by security concerns. They feel that the traditional method of securing information in premises-based systems is the best way. While that option worked for many years, the threat landscape today is more diverse and more potentially damaging than ever before.
Tags : security, it department, system set-up, cloud suppliers, frameworks, human resources, enterprise financial, planning data
     Workday
By: IBM     Published Date: May 02, 2017
The growth of virtualization has fundamentally changed the data center and raised numerous questions about data security and privacy. In fact, security concerns are the largest barrier to cloud adoption. Read this e-Book and learn how to protect sensitive data and demonstrate compliance. Virtualization is the creation of a logical rather than an actual physical version of something. such as a storage device, hardware platform, operating system, database or network resource. The usual goal of virtualization is to centralize administrative tasks while improving resilience, scalability and performance and lowering costs. Virtualization is part of an overall trend in enterprise IT towards autonomic computing, a scenario in which the IT environment will be able to manage itself based on an activity or set of activities. This means organizations use or pay for computing resources only as they need them.
Tags : data protection, data security, data optimization, organization optimization, cloud management, virtualization, data center, cloud environment
     IBM
By: Akamai Technologies     Published Date: Jun 27, 2017
Traditional remote access solutions were designed for business models of twenty years ago, but today they are distributed, mobile, and have many remote and third-party users. Read this paper to learn about a fundamentally new way to provide simple, secure remote access.
Tags : 
     Akamai Technologies
By: IBM     Published Date: Apr 21, 2017
Technology has always enabled companies to reinvent how they engage with customers. But now we are seeing a profound shift – the convergence of physical and digital customer interactions – which is fundamentally changing how customers will interact and transact with brands and businesses everywhere. To better understand these dynamics, the IBV is conducting a Customer Experience (CX) study, published as a series, with multiple reports organized by topic.
Tags : customer experience, branding, customer interaction, technological influence, customer engagement
     IBM
By: IBM     Published Date: Jul 14, 2017
Technology has always enabled companies to reinvent how they engage with customers. But now we are seeing a profound shift – the convergence of physical and digital customer interactions – which is fundamentally changing how customers will interact and transact with brands and businesses everywhere. To better understand these dynamics, the IBV is conducting a Customer Experience (CX) study, published as a series, with multiple reports organized by topic.
Tags : digital interaction, experience design, interactive experience, cross functional collaboration, customer experience, integrated data
     IBM
By: Mimecast     Published Date: Apr 18, 2017
"Email impersonation attacks—also known as CEO fraud or whaling attacks—are a growing concern for organizations of any size. These scams have led to more than $2.3 billion in losses over the last three years.* Think you’re safe on your own? Snap out of it! Download the Mimecast E-book Whaling: Anatomy of an Attack to learn the facts about these damaging and costly threats—and how you can stop them."
Tags : email security, email fraud, whaling, mimecast, loss prevention
     Mimecast
By: Virtela Communications, Inc.     Published Date: Oct 12, 2011
Multinational companies (MNCs) are facing a unique combination of escalating customer, competitive and operational pressures which are forcing them to fundamentally change the way they do business and manage their IT infrastructures supporting network, security and mobility needs. Lack of IT resources, limited capex and more complex global implementations are driving an increasing proportion of MNCs to offload, or 'out-task', various aspects of their day-to-day management responsibilities to skilled third-parties that can help perform these functions well.
Tags : health, global management service, cloud services, technology
     Virtela Communications, Inc.
By: ASG Software Solutions     Published Date: Feb 24, 2010
A recent survey of CIOs found that over 75% want to develop an overall information strategy in the next three years, yet over 85% are not close to implementing an enterprise-wide content management strategy. Meanwhile, data runs rampant, slows systems, and impacts performance. Hard-copy documents multiply, become damaged, or simply disappear.
Tags : asg, cmdb, bsm, itil, bsm, metacmdb, archiving, sap
     ASG Software Solutions
By: SAS     Published Date: Apr 25, 2017
Physicians and their patients, medical policy makers and licensing boards, pharmaceutical companies and pharmacies all must work together to stem the opioid epidemic and achieve the fundamental objectives of reducing addiction and deaths. With so many players and data sources, today’s information is partial, fragmented, and often not actionable. We don’t have the data to understand what’s happening, to adjust policy, and to motivate physicians and patients to change their behaviors. Better data and analytics can help develop better treatment protocols, both for pain in the first place and for remediation when patients are becoming dependent on the drugs.
Tags : 
     SAS
By: LogMeIn     Published Date: Mar 06, 2017
Failure to provide today’s digital consumers with seamless interactions across communications channels and platforms in a fast-evolving marketplace can do serious damage to an enterprise through lost sales, poor reviews on social media, customer churn, and excessive turnover of disgruntled agents.
Tags : logmein, omni channel, customer loyalty, customer support agent, market research, consumer research, renewals, e-commerce solutions
     LogMeIn
By: Extensis     Published Date: Mar 07, 2008
The Photography Department at The National Gallery of London wanted to give other Gallery departments better visibility into its archived library of images and reduce the administrative workload for its photographers. Read how Portfolio Server and Portfolio SQL-Connect painted the perfect solution to this challenge.
Tags : extensis, portfolio server, sql, asa, dam, digital asset management, other
     Extensis
By: Extensis     Published Date: May 04, 2008
With a library of thousands of on- and off-line slides growing by 1,200 new images monthly, chaos was spreading like a disease in The Pathology Department at Oregon Health & Science University. Until they found the perfect solution to help them organize, track and access their image library - Portfolio Server.
Tags : extensis, ohsu, library, dam, solutions, digital asset management', other
     Extensis
By: Extensis     Published Date: Apr 18, 2008
In 2006, Direct Wines Ltd identified a need for a solution that would manage the thousands of wine related images they had collected. The main use of the images, which range from images of wineries and wine makers to those of grapes, is inclusion in the company's direct mail campaigns and on the Direct Wines website.
Tags : extensis, direct wine, portfolio server, images, dam, solutions, other
     Extensis
By: Cantaloupe     Published Date: Mar 30, 2010
Social media is all around us and has fundamentally changed the way many of us communicate--both personally and professionally. Video can make your social media better, and ultimately get more leads to your website. But how best to post, measure, and use to drive traffic to your website?
Tags : cantaloupe, online video, social media, communication, facebook, twitter, seo, engagement
     Cantaloupe
By: TargetMarketing     Published Date: Jun 04, 2010
You'll find in this complimentary report from Target Marketing, a breakdown of key segmentation areas, fundamental questions to ask to formulate effective segmentation plans, a six-step road map to a comprehensive segmentation process, three segmentation pitfalls to avoid, and more.
Tags : napco, target marketing, customer segmentation, data management/analytics, direct mail/marketing
     TargetMarketing
By: Entrust Datacard     Published Date: Oct 24, 2016
The mobile device is part and parcel of daily life. It’s fundamentally changed the way consumers behave, and this influence has spread to the enterprise sector as well. For instance, patron-owned mobile devices have largely helped pave the way for the widespread emergence of bring-your-own-device (BYOD) policies. Ten years ago, the idea of a company employee logging into the enterprise system while they’re on an airplane over the Atlantic would seem far-fetched, but today such behavior is relatively commonplace. Mobility is changing how we shop, work and live our daily lives.
Tags : 
     Entrust Datacard
By: ExactTarget     Published Date: Aug 14, 2014
Marketing as you know it will never be the same. There’s a fundamental shift in relationships between brands and customers—fueled by smartphones, social media, and today’s always-on, always-connected mentality. Marketers have access to more customer data (big data) than ever before. But the quantity of data only matters if you’re smart about using it—to power 1:1 customer journeys.
Tags : marketing cloud, target, big data, brands, customers, social media, smartphones, always-on
     ExactTarget
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics