RSS feed Get our RSS feed

News by Topic

intelligence

Results 1901 - 1925 of 1959Sort Results By: Published Date | Title | Company Name
By: VMware AirWatch     Published Date: May 24, 2016
Hace menos de un año, las predicciones de los analistas inducían a los entusiastas de la movilidad a creer que se acercaba el día del juicio final para el sector de la gestión de dispositivos móviles (MDM). En un acto con analistas celebrado en 2013, un comité de analistas dijo a los asistentes que el fenómeno de uso de dispositivos personales (BYOD) desembocaría en una reducción de los precios, una caída en picado de las ventas y la desaparición de un sector. «En estos momentos, la gestión de dispositivos móviles es un caos y creo que ese mercado va a desaparecer», declaró John Girard ante los asistentes (según CRN.com). Girard predijo una transición hacia la gestión a nivel de aplicación forzada por la tendencia BYOD y la reticencia de los empleados a la gestión de dispositivos personales.
Tags : best practices, business optimization, enterprise management, business intelligence
     VMware AirWatch
By: VMware AirWatch     Published Date: May 25, 2016
La mobilité reste une opportunité stratégique importante pour les entreprises de toutes sortes, car elle peut contribuer à augmenter leur compétitivité en rendant les employés plus productifs ou en s'engageant auprès des clients de manière plus innovante. Pour atteindre ce potentiel, la mobilité des entreprises doit proposer aux utilisateurs une expérience simple sur plusieurs terminaux et offrir un espace de travail sécurisé pour les applications essentielles. Pour servir cette base d'employés mobiles et de clients, les entreprises doivent activer leurs fonctionnalités BYOD et self-service avec une plateforme établie qui s'adapte pour prendre en charge de nouveaux processus. La plateforme de gestion de la mobilité d'entreprise (EMM) offre à l'informatique la possibilité d'activer les transformations de processus métier, de favoriser de nouveaux revenus et de créer de nouvelles façons mémorables de se connecter aux clients.
Tags : best practices, business optimization, business management, application management, enterprise application, business intelligence
     VMware AirWatch
By: VMware AirWatch     Published Date: May 25, 2016
Il y a moins d’un an, les prévisions des analystes avaient laissé croire aux fervents défenseurs de la mobilité qu’une catastrophe allait toucher de plein fouet le secteur de la gestion des terminaux mobiles. Lors d’un événement réservé aux analystes qui s’est tenu en 2013, un panel de spécialistes indiquait que l’utilisation des terminaux personnels allait aboutir à une réduction des prix et faire chuter les ventes. Ils annonçaient la mort de cette industrie. La gestion des terminaux mobiles est actuellement totalement chaotique et je pense que ce marché est en train de mourir. déclarait l’analyste Gartner John Girard (CRN.com). John Girard avait prévu une nouvelle orientation dans la gestion de niveau application qui était liée à l’utilisation de terminaux personnels et à la résistance que montraient les employés devant la gestion par l’entreprise de leurs terminaux personnels.
Tags : best practices, business optimization, business management, application management, enterprise application, business intelligence
     VMware AirWatch
By: ArborNetworks     Published Date: Feb 12, 2016
Ask any cybersecurity professional and she’ll tell you that her job is getting increasingly difficult. Why? Most will point to a combination of the dangerous threat landscape, IT complexity, and their overwhelming workload. These issues are driving a major transition in enterprise security. Large organizations must move beyond a threat prevention mentality to become proactive cyber-¬-attack “hunters” that constantly monitor their networks for signs of trouble. This shift to proactive hunting will require new technologies that collect, process, and analyze massive amounts of security data, offer intelligent security analytics for real-¬-time incident detection, integrate threat intelligence to align suspicious internal activities with external threats, and provide analysts with the right data analytics features to query and manipulate data for historical investigations.
Tags : arbor networks, enterprise, cyber attack, network, data, security
     ArborNetworks
By: IBM     Published Date: Jan 15, 2016
The Cyber Security Intelligence Index offers a high-level overview of the major threats to businesses worldwide over the past year.
Tags : ibm, cyber security, overview, threats, security
     IBM
By: Qlik     Published Date: Oct 13, 2015
Business intelligence and analytics leaders must re-evaluate and evolve the capabilities of their teams to ensure that they can leverage bimodal work practices to engage, communicate and adapt to new developments in business analytics, including diagnostic and predictive analytics.
Tags : qlik, data discovery, business intelligence, analytics, user produced content, cloud, social, data visualization
     Qlik
By: Qlik     Published Date: Oct 13, 2015
Data discovery appeals strongly to business users, but some business intelligence leaders are reluctant to ensure adoption. Data discovery is filling the gap between traditional BI and advanced analytics, and this research explains why and how BI leaders should support its use.
Tags : qlik, data discovery, business intelligence, analytics, user produced content
     Qlik
By: BlackLine     Published Date: Jan 25, 2017
Download this whitepaper to learn more about how Continuous Accounting empowers the Office of Finance with real-time intelligence, enabling skilled accountants to spend more time on strategic research and analysis, and become proactive business leaders instead of reactive operators.
Tags : 
     BlackLine
By: Akamai Technologies     Published Date: Jul 02, 2018
Gartner named Akamai a Leader in their 2017 Magic Quadrant for Web Application Firewalls. A web application firewall is an essential element in your defense against application-layer attacks, which pose an ever-greater threat to productivity and security. The Akamai approach to WAF combines: An anomaly detection model A repeatable testing framework to measure effectiveness Threat intelligence to identify the latest threats A cloud platform for global scale Managed security services to help organizations better protect their websites and web applications over time
Tags : 
     Akamai Technologies
By: IBM     Published Date: Apr 04, 2016
Discover how covert threats from the dark web can impact your network, and what you can do to protect your assets.
Tags : ibm, ibm x-force threat intelligence, threat intelligence, asset protection, threat management, security
     IBM
By: IBM     Published Date: Apr 04, 2016
"Title/Main headline: IBM X-Force Threat Intelligence Quarterly - 4Q 2015 Sub Headline: How can your organization better prepare for a security incident? Blurb: 2015 has been a challenging year as insider threats, malware, and stealthy and mutating attacks have affected the threat landscape. Read the latest security research from IBM X-Force to learn: How low-level attacks can mask stealthier infiltrations The benefits of regularly maintained security procedures and response plans When patterns of irregularities can be the first indicators of compromise Call to Action/Action Statement: ""Download Now"" as the action statement"
Tags : ibm, ibm x-force threat intelligence, threat intelligence, asset protection, threat management, security
     IBM
By: IBM     Published Date: Apr 15, 2016
This white paper takes a look at the current challenges that many organizations face in addressing this growing need. It examines the different types of users and stakeholders who need or want more self-service, and lays out four factors that are critical to realizing the full potential of self-service analytics.
Tags : ibm, business analytics, self-service analytics, business intelligence
     IBM
By: IBM     Published Date: Jul 05, 2016
Download this white paper to learn why flexibility and adaptability are crucial for data architects in the hybrid cloud world.
Tags : ibm, datamart on demand, cloud, hybrid cloud, fluid data, data management, business intelligence
     IBM
By: IBM     Published Date: Jul 19, 2016
This interactive demo demonstrates how IBM’s Behavior Based Customer Insight for Banking leverages predictive analytics to help you personalize customer engagement and deliver customized actions.
Tags : ibm, banking, finance, consumer insights, business intelligence, business anlytics
     IBM
By: IBM     Published Date: Jul 20, 2016
- Learn how the best companies use online assessment analytics to predict candidate performance - Find out about the analytics intelligence used to improve quality of new hires - Learn how assessments can be used to maximize employee breakthrough performance
Tags : ibm, employee engagement, smarter workforce, pre-hire assessments, assessment analytics
     IBM
By: IBM     Published Date: Oct 11, 2016
As digital transformation accelerates, the opportunity to engage customers digitally has never been greater — but so has the threat of not delivering great customer experiences. In order for customer insights professionals to compete, the use of customer understanding to optimize experiences at scale must be at the heart of all digital transformation initiatives. Digital intelligence provides a vision and approach that captures a holistic view of the customer in order to optimize digital interactions, engagements, and experiences. During his talk James McCormick will describe the vision and need for digital intelligence; the approach needed to make it a strategic initiative, and ultimately, how it will provide a competitive advantage.
Tags : ibm, commerce, customer analytics, digital intelligence, customer experience
     IBM
By: Genesys     Published Date: Jul 13, 2018
When building artificial intelligence (AI) into your business strategy, it’s easy to become distracted by all the new technologies on the market—each one promising a better customer experience. Make decisions based on facts, not misconceptions. When you evaluate AI technologies, consider these facts: • Bots working with human agents enables a seamless customer journey • Automated self-service costs as little as 20 cents per interaction • A single platform makes it easier to deliver personalized, proactive and predictive experiences See how AI connects customer conversations in this new analyst guide, 2017 ContactBabel Inner Circle Guide to Self-Services.
Tags : 
     Genesys
By: Genesys     Published Date: Jul 13, 2018
Routing is a fundamental component of your customer experience strategy. True omnichannel routing breaks down channel silos and gathers intelligence upfront through context and data to deliver the personalized, seamless engagement your customers now expect. Learn how you can move beyond single interactions with true omnichannel routing: • Dynamically match customers from any touchpoint, over any channel, to the agent with the optimal insights, skill set and proficiency • Enable seamless transitions between digital self-service and live employee contact • Replace single, random interactions with thoughtfully designed and optimized customer journeys
Tags : 
     Genesys
By: Genesys     Published Date: Jul 13, 2018
Artificial Intelligence (AI) is staggering in its speed of handling simple requests and automating conversations. But AI solutions are not enough for the best customer experiences. Human emotions sometimes demand the human touch that only live agents can provide. Kate, Customer Experience AI by Genesys, combined with the power of human touch can improve customer experience, empower employees and dramatically reduce costs. This seamless combination of AI technology and humans, or “Blended AI by Genesys,” addresses the entire customer journey for the best possible outcomes. Download the eBook and learn how Kate and Blended AI lets you: • Personalize self-service • Connect customer conversations • Create smart agent experiences • Start small and deploy fast with MicroApps
Tags : 
     Genesys
By: Genesys     Published Date: Jul 13, 2018
Artificial intelligence (AI) can’t replicate the human touch, but it can ease your agents’ burden by handling many simple, repetitive requests. A new Forrester Consulting paper offers a look at the strengths and weaknesses of both AI and humans independently, yet how blending them together can give your customers the seamless end-to-end experience they expect. See how enterprises around the world use AI to improve customer service and uncover new revenue streams, the challenges they overcame, and why a blended solution with live agents makes sense. Download the paper to learn three key recommendations on using AI to improve agent productivity, agent satisfaction, and customer satisfaction.
Tags : 
     Genesys
By: Genesys     Published Date: Jul 13, 2018
In today’s digital world, the messaging and texting that have become a prominent part of most people’s lives are a form of asynchronous messaging. These are a simple, convenient method of communication for people on the go, with varied time in response based upon intrigue and urgency. Asynchronous messaging has become so ingrained in consumers’ lives, an expectation has evolved that businesses should be able resolve issues just as quickly and easily, and on the customer’s timetable. To keep up with consumer expectations and offer differentiated customer experiences, there is a strong case for implementing capabilities where messages can be fielded by bots using artificial intelligence, with a human touch through skilled representatives, or a combination of both within the same conversation, without losing context. Download this white paper to learn about: • 6 benefits to asynchronous messaging in B2C customer experience and operations • Incorporating asynchronous messaging into your u
Tags : 
     Genesys
By: Hewlett Packard Enterprise     Published Date: Aug 10, 2016
Download this asset to learn how running old servers impacts productivity and profitability especially for small business. Sponsored by: HPE and Intel®
Tags : intel, hpe, best practices, profitability, productivity, business management, business analytics, business intelligence
     Hewlett Packard Enterprise
By: Hewlett Packard Enterprise     Published Date: Jan 31, 2019
"Managing infrastructure has always brought frustration, headaches, and wasted time. That’s because IT professionals have to spend their days, nights, and weekends dealing with problems and manually tuning their infrastructure. Traditional monitoring and support are too far removed from infrastructure, resulting in an endless cycle of break-fix-tune-repeat. Infrastructure powered by artificial intelligence, however, can overcome the limitations of humans and traditional tools. This white paper explores how HPE InfoSight with its recommendation engine paves the path for an autonomous data center your Hybrid Cloud World."
Tags : 
     Hewlett Packard Enterprise
By: CA Technologies     Published Date: Apr 06, 2017
A number of high-profile security breaches over the last two years have highlighted the damage that a rogue systems administrator or stolen privileged credentials can cause. Today, fewer than half of all business organizations have deployed the type of privileged identity management (PIM) solution that could help improve the situation. This Ovum Decision Matrix (ODM) provides an in-depth view of the leading PIM solutions that are available to deal with these issues. It compares their technology, the market position each vendor has achieved, their ability to execute, and the overall maturity of each offering.
Tags : data assets, risk management, it security, session management, authentication management, security intelligence, information management, infrastructure management
     CA Technologies
By: Epicor Software Corporation     Published Date: Mar 21, 2017
Download Epicor BisTrack News and find out how you can best position your distribution company for profitable growth.
Tags : erp, erp system, enterprise resource planning, business system, epicor bistrack, distribution software, business intelligence, builders merchants
     Epicor Software Corporation
Start   Previous    65 66 67 68 69 70 71 72 73 74 75 76 77 78 79    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics