RSS feed Get our RSS feed

News by Topic

ip technology

Results 301 - 325 of 432Sort Results By: Published Date | Title | Company Name
By: Polycom     Published Date: Dec 18, 2014
Polycom invited customers and partners around the world to participate in a survey that focused on collaboration challenges. More than 5,000 business professionals from all job levels, functions and vertical sectors responded, candidly sharing insights about their obstacles and the strategies they deploy to overcome them. Download the full survey report and discover why 85% of our respondents believe video conferencing helps them achieve their business goals, and find out how you can use technology to defy distance within your organization as well.
Tags : business, video, conference, multicultural, meetings, communication, cio, digital
     Polycom
By: Landis + Gyr     Published Date: May 30, 2017
Learn how five asset management strategies have evolved to unlock real-time data. Today, many utilities are developing transformative, data-driven asset management strategies that build on their advanced metering infrastructure (AMI) investments. The results? Improved reliability, customer satisfaction, efficiency, and long-term planning. In this white paper, we examine the relationship between asset management and technology: • How technology advances have driven the evolution of asset management • 5 asset management strategies built on real-time data • How you can prepare for a distribution-centric world
Tags : asset management, analytics, data, ami, landis
     Landis + Gyr
By: Cisco     Published Date: Dec 20, 2018
This research finds that huddle spaces deliver tremendous value to businesses, with 9 out of 10 participants stating the adoption of open space environments is increasing the need for these huddle spaces. Huddle spaces require a wide variety of technologies to enable users and the business, such as audio and video conferencing abilities, digital whiteboards and scheduling solutions. Users stated that ease of use, solution reliability, and similar technology in each huddle space is key to their productivity. But nearly 8 out 10 users shared they were frustrated with meeting room technology recently. These problems generate support calls to IT on a weekly, if not daily, basis
Tags : 
     Cisco
By: Blue Prism     Published Date: Mar 28, 2019
Robotic process automation describes the use of technology to automate tasks that are traditionally done by a human being. The technology itself mimics an end user by simulating user actions such as navigating within an application or entering data into forms according to a set of rules. RPA is often used to automate routine administrative tasks that typically require a human being to interact with multiple systems, but RPA technology is evolving to support the automation of increasingly sophisticated processes at scale within enterprise architectures rather than on the desktop. Over the past two years, RPA has been adopted by a number of business process outsourcing (BPO) providers and a growing number of end-user organizations are now deploying the technology themselves to create “virtual workforces” of robotic workers.
Tags : 
     Blue Prism
By: Ipswitch     Published Date: Mar 14, 2014
In this case study, you’ll learn how Rochester General Hospital leveraged MOVEit’s point and click simplicity to set up, manage and track more than 70 different file transfer operations between hospital servers and the systems used by payers and outside healthcare providers.
Tags : ipswitch, moveit, sensitive data, managed file transfer solution, file transfer, file transfer systems, records management, data security
     Ipswitch
By: McAfee     Published Date: Mar 31, 2017
W32/Pinkslipbot is a self-propagating malware family created to steal personal and financial data from its victims. Download this white paper to get an in-depth technical look into Pinkslipbot and learn how Intel Security technology can help protect against Pinkslipbot.
Tags : pinkslipbot, malware protection, malware, technology
     McAfee
By: McAfee     Published Date: Mar 31, 2017
W32/Pinkslipbot is a self-propagating malware family created to steal personal and financial data from its victims. Download this white paper to get an in-depth technical look into Pinkslipbot and learn how Intel Security technology can help protect against Pinkslipbot.
Tags : pinkslipbot, malware protection, malware, technology
     McAfee
By: Outreach.io     Published Date: Apr 09, 2018
Modern business-to-business (B2B) buyers have unprecedented access to information to support their buying process and, as a result, have become more self-reliant in the evaluation process. This has made B2B sellers’ jobs harder; not only do they have less control in earlier stages of the sales cycle, but they have to work harder to connect and engage with buyers, turning prospects into customers. Sales technologies have helped modernize how sellers and sales leaders manage their pipelines and execute contracts, but technology gaps around engagement persist, making it difficult for sellers to keep pace with, connect with, and support buyer engagement. The common outcome: Sellers become slaves to their CRM systems, focused more on updating reports and logging their activities than they are in driving business results.
Tags : 
     Outreach.io
By: Salesforce.com     Published Date: Jun 17, 2013
The Sales Cloud gives you everything you need to connect with customers—from complete, up-to-date account information to social insights, all in once place. Learn how.
Tags : customer relationship management, crm, technology, value matrix, support sales, marketing, customer service, crm solutions
     Salesforce.com
By: WhichVoIP     Published Date: Jul 23, 2010
Receive FREE customized, no obligation, business VoIP phone service quotes and learn how your company can benefit from VoIP (Voice over IP) technology.
Tags : whichvoip, business phone quote, hosted voip phone system, voice over internet protocol, ip pbx, voip service provider, small business, advertising agencies
     WhichVoIP
By: Fortinet EMEA     Published Date: Nov 26, 2018
Most organizations are in the midst of some form of digital transformation (DX), transforming how they bring products and services to the market—and ultimately deliver value to their customers. But DX initiatives also bring complexity for the network operations team. With business-critical services distributed across multiple clouds, this leads to potential performance issues, especially at branch locations. Given these realities, it is no wonder that software-defined wide-area network (SD-WAN) technology is rapidly going mainstream. Unfortunately, SD-WAN is an example of the paradox of DX: transformative technology can potentially move the business to the next level, but the expanded attack surface it creates can expose the organization to significant risk. That is why an SD-WAN deployment, like every other DX effort, should be accompanied by a security transformation (SX) that rethinks outdated principles, broadens protection beyond the data center, and integrates the security archit
Tags : 
     Fortinet EMEA
By: Google     Published Date: Apr 26, 2018
No one in today’s highly connected world is exempt from security threats like phishing, ransomware, or denial-of-service (DoS) attacks. Certainly not Google. Google operates seven services with more than one billion active users each (including Google Search, YouTube, Maps, and Gmail). We see every type of attack, bad software, and bad actors—multiple times a day—and we’re proud of what our people, processes, and technology do to stop them. Google has published more than 160 academic research papers on computer security, privacy, and abuse prevention and has privately warned other software companies of weaknesses discovered in their systems. Within Google, we enforce a zero-trust security model, which monitors every device on the internal network.
Tags : 
     Google
By: Cisco     Published Date: Jan 08, 2016
Financial services organizations have a unique relationship with technology: electronic data and transactions are the core of this industry. Financial services firms remain vigilant because they are constantly under attack. Hackers that gain access to customer accounts or financial data can profit either by using it themselves or by selling it to other criminal organizations. - There are many differences between perception and reality when it comes to security in this industry. For example, its emphasis on fraud prevention creates the perception that financial services is highly evolved in terms of its security readiness. However, this study finds that financial services firms’ security is on a par with the security of firms in other industries. - Regulations may lead to change and investments, but they also take time to take effect. Organizations should not wait for such requirements before they make improvements. Neither should they assume that compliance gives them full protection. Regulations cannot cover every aspect in such a fast-paced environment.
Tags : cisco, financial services, perception gaps, small business
     Cisco
By: McAfee     Published Date: Apr 25, 2014
While enterprises appear to be aware of advanced malware and its security challenges, the measures to defend against it need some attention and investment. This report presents survey results that gauge enterprise awareness of advanced malware and what measures are being taken to defend against it.
Tags : advanced malware, protection, network breaches, intrusion provention systems (ips), web and email gateway protection, tracking malware, malware analysis and detection, blocking and remediating malware
     McAfee
By: Juniper Networks     Published Date: Oct 20, 2015
Juniper Networks Fabric Technology
Tags : data center, network, operations, business agility
     Juniper Networks
By: Fitbit     Published Date: Jan 23, 2018
Social connectedness is essential to employee health. The need for social connections in ingrained in us from the day we are born. What’s more, humans are known to be naturally social animals and need to have relationships with others, both in our personal lives and in the workplace. But where did this desire for social connectedness come from, and what does it really mean for employees’ health and wellness? Download our white paper, “Social connectedness: The secret to employee health and happiness” to learn: • The science behind social connectedness • How social behaviors impact our health and the workplace • How to incorporate social technology into your wellness program You’ll also receive key takeaways on driving social engagement in your wellness program.
Tags : 
     Fitbit
By: Gleanster     Published Date: Nov 10, 2011
This Gleansight benchmark report is based on the experiences of 387 companies and includes the following sections: Reasons to Implement, Challenges, Value Drivers, Core Technologies and Success Story. It also includes a Vendor Landscape with descriptions, rankings and analysis of 39 solution providers. Social intelligence is being increasingly used today to describe the next rung on the evolutionary ladder of listening to and acting upon consumer conversation on the social web. That rung maps to a number of technology innovations. Chief among them are improved capabilities around analyzing and integrating all sources of voice-of-the-customer data to generate more actionable insights. Social intelligence also speaks to an emerging corporate mindset regarding the strategic importance of social data and the need to better capitalize upon it. This Gleansight benchmark report reveals how Top Performers are achieving success when it comes to the incessant quest to extract customer insights and take actions that ultimately translate into revenue growth, cost reduction, risk reduction and relationship enhancement.
Tags : social intelligence, marketing, social media, gleanster, business intelligence, market research, usability, social media marketing
     Gleanster
By: ServiceNow     Published Date: Aug 24, 2011
This white paper takes a look at the adoption and evolution of social IT within ServiceNow.
Tags : social it, social media, build relationships, improve service, collaboration, post it, tag it, tweet it
     ServiceNow
By: IBM     Published Date: Apr 29, 2014
Social media is reshaping the relationships that customers have with products, services and brands. Read this white paper to learn how the right combination of technologies can help you understand emerging consumer trends and increase the ROI of your marketing campaigns.
Tags : ibm, retail, social media, social media analytics, consumer insights, customer relationships, roi, business technology
     IBM
By: IBM     Published Date: Aug 06, 2014
Social media is reshaping the relationships that customers have with products, services and brands. Read this white paper to learn how the right combination of technologies can help you understand emerging consumer trends and increase the ROI of your marketing campaigns.
Tags : ibm, retail, social media, analytics, insights, actionable, relationships, technology
     IBM
By: Gleanster     Published Date: Dec 14, 2011
This benchmark report is 28 pages and is based on the experiences of 389 companies. It includes the following sections: Reasons to Implement, Challenges, Value Drivers, Core Technologies and Success Story. It also includes a Vendor Landscape section with company descriptions, analyst commentaries and comparative rankings for 41 technology solution providers.
Tags : gleanster, social media, marketing, engagement, social media marketing, customer relations, interactive marketing, web analytics
     Gleanster
By: Dassault Systemes SolidWorks Corp.     Published Date: Mar 27, 2018
Valley Dairy Farm Automation (VDFA) is a leading manufacturer of customized, innovative dairy farm automation products. After experiencing a rapid demand for its products, the company needed to expand its product offerings in order to deliver the best possible job for its customers. This case study reveals how VDFA implemented SOLIDWORKS solutions to establish its Lyntech subsidiary, tripled product offerings, advanced dairy farm automation technology, and minimized mistakes and design errors in the process.
Tags : solidworks, solutions, valley, dairy, farm, automation
     Dassault Systemes SolidWorks Corp.
By: Vocus, Inc     Published Date: Jan 16, 2009
Rapid media changes make it challenging for PR professionals to keep up.  Discover methods to navigate through today’s media landscape, while you stay ahead of the changes. Uncover techniques for building strong media relationships using the latest technology, to achieve PR success.
Tags : vocus, media landscape, pr professionals, public relations, media relationships, pr success
     Vocus, Inc
By: SAP Inc.     Published Date: Jun 16, 2009
Improving your call center may be more easily attainable — and more important — now than ever before. Recognizing that customer interaction is an important differentiator, organizations can increase the focus on their customers’ experience while keeping a firm grip on costs by leveraging the full potential of state-of-the-art technology.
Tags : customer service, customer satisfaction, customer retention, retention, loyalty, crm, customer, client
     SAP Inc.
By: Adobe     Published Date: May 16, 2012
This paper explores the impact that digital communication skills, using processes associated with digital storytelling, is having on disciplines including liberal arts, humanities, and cross-curricular humanities/technology collaboratories.
Tags : adobe, digital communcation, digital communication skills, disciplines, skills, communication, storytelling, liberal arts
     Adobe
Start   Previous    4 5 6 7 8 9 10 11 12 13 14 15 16 17 18    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics