RSS feed Get our RSS feed

News by Topic

gma

Results 1 - 25 of 108Sort Results By: Published Date | Title | Company Name
By: VMware     Published Date: Sep 12, 2019
cloud is no longer an option — it’s inevitable. But cloud strategies differ extensively, based on the context of your organization and investments. drivers such as industry, risk tolerance, and preparation dictate the pace, scope, and technologies you need. However, every cloud strategy should share key activities. This report guides infrastructure and operations (i&O) pros through forrester’s cloud maturity assessment so they can gauge where their firms are on their journeys and discover which core competencies they need to strengthen or develop to enable their pragmatic cloud reality. This is an update of a previously published report; forrester reviews and revises it periodically for continued relevance and accuracy.
Tags : 
     VMware
By: Two Sigma     Published Date: Sep 19, 2019
In this paper, we provide an overview of the Two Sigma Factor Lens, designed for analyzing multi-asset portfolios and derived from returns of broad, liquid asset class proxy indexes. This lens is intended to be: • Holistic, by capturing the large majority of cross-sectional and time-series risk for typical institutional portfolios; • Parsimonious, by using as few factors as possible; • Orthogonal, with each risk factor capturing a statistically uncorrelated risk across assets; • Actionable, such that desired changes to factor exposure can be readily translated into asset allocation changes. Finally, we discuss methods for constructing and assessing the Two Sigma Factor Lens that can be extended to produce additional risk factors for new sub-assetclasses or cross-sectional risks that may not currently be captured by the lens.1 This factor lens, and our ongoing work to expand it, form the foundations of the VennTM platform.
Tags : 
     Two Sigma
By: StrongMail     Published Date: Jul 31, 2009
The rise of social media is intrinsically connected to email, which was itself the first social network. Email marketers must leverage this complementary channel to expand their reach beyond the email list, realizing the power of viral marketing in the social web.
Tags : strongmail, social media, email marketing, emarketing, roi, swyn, networks, social networking
     StrongMail
By: StrongMail     Published Date: Jun 08, 2008
The growing trend towards insourcing marketing and transactional email is being driven by businesses that are looking for ways to improve their email programs, increase data security and lower costs. When evaluating whether it makes more sense to leverage an on-premise or outsourced solution, it's important to understand how the traditional arguments have changed.
Tags : strongmail, social media, email marketing, on-premise advantage, transactional email, insourcing, bounce management, spam trappers
     StrongMail
By: StrongMail     Published Date: Sep 08, 2010
With more than 500 million active users, Facebook can be an extremely effective channel for engaging customers around your brand. However, before you rush out to build a fan page, you need to first understand the best way to interact with them based on conversations about your brand that are already happening on the social web.
Tags : strongmail, email, facebook, channel, social networking, crm solutions/software, customer experience/engagement, mobile marketing
     StrongMail
By: Tagman     Published Date: Mar 21, 2011
This white paper examines the true costs associated with the Tagging of websites to implement and track the performance of online marketing technologies such as web analytics, display ad serving and search marketing. This research was conducted by TagMan, a smart container tag with real-time attribution and web-page acceleration.
Tags : web analytics, tagging, real time attribution, web page acceleration, tagman, e-commerce solutions
     Tagman
By: Ricoh     Published Date: Sep 28, 2018
xxx
Tags : 
     Ricoh
By: 3D Systems     Published Date: Mar 07, 2019
To stay competitive, manufacturers have to meet the rapidly changing needs of customers while retaining high quality products, at the same time as controlling costs. Product lifetimes are shrinking and customers are expecting more customization and innovation. Agility is the key to staying ahead of the competition and meeting the needs of customers. The FabPro 1000 entry-level industrial 3D printer delivers production-grade parts, at high speed, with six sigma repeatability, and can be used across a distributed manufacturing and engineering enterprise. With a low cost of entry, FabPro 1000 enables agile manufacturing operations to meet customer needs rapidly and effectively empowers engineers to deliver more value and quality in the product development process. To find out more download this whitepaper today!
Tags : 
     3D Systems
By: Zebra     Published Date: Oct 12, 2011
Using Zebra's Technologies, supermarket chain Wegmans was able to increase their production rate and improve their read rate. Read this case study to find out more about Wegmans and what Zebra can do for you!
Tags : zebra industry solutions, barcode industry solutions, barcode business solutions, bar code industry solutions, bar code business solutions, rfid industry solutions, rfid business solutions, rfid industry solutions
     Zebra
By: Blue Coat Systems     Published Date: Aug 12, 2013
The use of SSL encryption for all enterprise Internet traffic is growing steadily. Applications that make use of SSL – such as SharePoint, Exchange, WebEx, Salesforce.com and Google Apps – are commonplace. Even email applications like Gmail, Yahoo, and Zimbra are being used in workplace environments as hosted email or BYOD apps. It’s clear that organizations now need complete visibility into the SSL traffic coming across the WAN. They need the ability to preserve complete network and web histories from encrypted network and web traffic for compliance, regulatory and logging requirements. Blue Coat has solutions today to address the SSL dilemma.
Tags : blue coat, ssl, ssl visibility
     Blue Coat Systems
By: Secureworks     Published Date: Nov 11, 2016
This paper sets out five major areas of focus for the practical CISO.
Tags : managed security services, ciso, security, risk management, security, threat and vulnerability management
     Secureworks
By: LifeWorks     Published Date: Dec 04, 2018
For many years, an organization’s approach to employee mental well- being was simply “leave your problems at the door”. But those days are gone. Not only are mental and emotional health issues losing their stigma, but businesses are realizing that failure to understand and fulfill employees’ total well-being requirements, such a physical and financial well-being, ultimately leads to reduced productivity and output.
Tags : 
     LifeWorks
By: Schneider Electric     Published Date: Oct 31, 2017
Most successful data center migration projects share similar practices, such as expertise, preparation, management, execution, communication and business alignment. The purpose of this research is not to provide an extensive examination of each one of these practices. Rather, it is to provide a pragmatic list of best practices. This list was derived from observations of numerous Gartner clients involved in data center migration projects over the last six years.
Tags : planning, contingency plan, testing, migration, preparation, project team, audit, closure
     Schneider Electric
By: RedHat     Published Date: May 10, 2017
A practical path to IT modernization powered by Intel and Red Hat This paper discusses the challenges involved in making this decision and offers recommendations as to how to approach IT modernization in a pragmatic, structured way.
Tags : intel, red hat, it modernization, agility, efficiency, reduce costs
     RedHat
By: HP     Published Date: Mar 15, 2013
HP Webinar: Automate Your Way to the Pragmatic Cloud
Tags : 
     HP
By: SAP SME     Published Date: Nov 02, 2017
La medicina de precisión está cambiando principalmente la forma en que se desarrollan las terapias. Ha extendido sus implicaciones para todo, desde genómica hasta dispositivos médicos y crea nuevos modelos para las empresas.
Tags : 
     SAP SME
By: Google     Published Date: Apr 26, 2018
No one in today’s highly connected world is exempt from security threats like phishing, ransomware, or denial-of-service (DoS) attacks. Certainly not Google. Google operates seven services with more than one billion active users each (including Google Search, YouTube, Maps, and Gmail). We see every type of attack, bad software, and bad actors—multiple times a day—and we’re proud of what our people, processes, and technology do to stop them. Google has published more than 160 academic research papers on computer security, privacy, and abuse prevention and has privately warned other software companies of weaknesses discovered in their systems. Within Google, we enforce a zero-trust security model, which monitors every device on the internal network.
Tags : 
     Google
By: CA Technologies EMEA     Published Date: Sep 11, 2018
DevOps ist nicht mehr topaktuell. Auch Continuous Delivery oder sogar das „Shift-Left“-Paradigma ist nicht mehr als innovativ zu bezeichnen. Dieses White Paper zeigt auf, wie Sie DevOps-Tools und -Verfahren kundenorientiert einsetzen können, um einen geschäftlichen Nutzen zu erzielen. Dabei wird auf die aktuellen Herausforderungen für Unternehmen eingegangen, wenn sie versuchen, durch DevOps-Innovationen mehr als nur technische Vorteile zu realisieren. Zudem werden die Lücken aufgezeigt, die die Unternehmen in den Continuous Delivery-Ketten schließen müssen, um erfolgreich zu sein. Schließlich befasst sich dieses White Paper auch damit, wie die Themen Anwendereinbindung und Customer Experience in allen Phasen der Bereitstellungspipeline als wichtige Überlegung einbezogen werden.
Tags : 
     CA Technologies EMEA
By: CA Technologies EMEA     Published Date: Sep 11, 2018
La metodología DevOps ya no se considera vanguardista. Tampoco lo es la entrega continua, ni siquiera el paradigma de la resolución en origen. En este libro blanco, se explica cómo aprovechar las herramientas y prácticas de DevOps de una manera orientada a los clientes para crear valor de negocio. Se analizan los retos actuales a los que la mayoría de las organizaciones se enfrentan al extender las innovaciones de DevOps más allá del ámbito técnico, se identifican los vacíos que las compañías deben llenar dentro de las cadenas de entrega continua para abordar dichos retos y se explica cómo lograr que el compromiso con los usuarios y la experiencia de los clientes sean una consideración primordial en todas las etapas del canal de entrega.
Tags : 
     CA Technologies EMEA
By: Secureworks ABM UK 2017     Published Date: Oct 23, 2017
Finding a strategic partnership with a trusted security expert that can assist you in all the aspects of information security is vital. SecureWorks is a market leader in security that can close the security gap in organisations by evaluating security maturity across an enterprise, help define security strategies and implement and manage security program plans. We are a true strategic partner that can help a CISO embed security at all levels of the organisation.
Tags : cyber security, cyber security framework, data security, firewall, general data protection regulation, incident and problem management, information security, intrusion detection
     Secureworks ABM UK 2017
By: CA Technologies     Published Date: Jun 05, 2014
An eBooklet discussing the pitfalls of DevOps, how you can avoid them, and how to get started on your DevOps journey.
Tags : devops, a guide to devops, integrated journey
     CA Technologies
By: CA Technologies     Published Date: Jun 04, 2015
There has been growing buzz about DevOps. DevOps is a methodology that unites the often separate functions of software development (Dev) and production and operations (Ops) into a single, integrated, and continuous process. DevOps is about breaking down the barriers between Dev and Ops. It leverages people, processes, and technology to stimulate collaboration and innovation across the entire software development and release process. Dev and Ops should always be part of an integrated process, but that’s not always as easy as it sounds. You may be stuck in what we call “Dysfunction Junction.” Read this eBooklet to learn about the pitfalls of DevOps, how you can avoid them, and how to get started on your DevOps journey.
Tags : 
     CA Technologies
By: Mimecast     Published Date: Nov 14, 2018
Mike Rothman, President and Analyst at Securosis, and author of The Pragmatic CSO, conducted this study, which breaks down how companies can most effectively change employee security behavior and lower risk. If you want a blueprint for developing an effective program, this is a great place to start.
Tags : 
     Mimecast
By: Rackspace     Published Date: Mar 20, 2019
Running an IT backend that is secure, scalable and well-managed is resource draining for any enterprise. Challenger, Singapore’s largest IT retailer, took a more pragmatic route by transforming on a Online to Offline (O2O) model. For the journey, it partnered with Rackspace to accelerate the value of its AWS cloud migration, by tapping its proven AWS expertise, strong managed services portfolio, and familiarity with local regulatory compliance and cloud security demands
Tags : 
     Rackspace
By: Esker     Published Date: Jun 29, 2016
Automation is widely used in the business world. Still, the concept of order processing automation remains a bit of an enigma - even among those who already know a thing or two about it. That's why it's critical to give yourself a refresher before driving the project forward and getting stakeholders on board. This eBook highlights the six key stakeholders in order management that need to be challenged to go beyond the status quo. Automation aligns with their priorities - it's your job to deliver that message. Download this eBook now to learn more about the key roles in an order processing automation project.
Tags : best practices, business optimization, business management, productivity, business process
     Esker
Start   Previous   1 2 3 4 5    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics