RSS feed Get our RSS feed

News by Topic

isp

Results 401 - 425 of 888Sort Results By: Published Date | Title | Company Name
By: Aruba Networks     Published Date: Nov 15, 2013
Microsoft Lync está cambiando la estructura de costes en la telefonía empresarial y está marcando una nueva experiencia para sus usuarios en la cual cada comunicación se convierte en una interacción cada vez más colaborativa y atractiva. Aquí tiene 10 consejos para asegurarse de que Lync funciona bien en los dispositivos móviles en la red. Microsoft Lync no sólo está cambiando la estructura de costes en la telefonía empresarial sino que, además, está marcando una nueva experiencia para sus usuarios en la cual cada comunicación se convierte en una interacción cada vez más colaborativa y atractiva.
Tags : just media, aruba networks, deploying lync, mobile devices, microsoft lync, cost structure, user experience, engaging interaction
     Aruba Networks
By: Aruba Networks     Published Date: Nov 15, 2013
L'802.11ac è sulla buona strada per diventare lo standard del Wi-Fi di nuova generazione. La velocità in gigabit, le migliori capacità e l'affidabilità che l'802.11ac conferisce alle reti LAN senza filo (WLAN) sono amplificate, mentre cresce a vista d'occhio l'utilizzo da parte di utenti, applicazioni e dispositivi. Sia che siate dei precursori che hanno già iniziato a pianificare o, come molte aziende, siate incerti sul da farsi, scaricando questa guida in cinque fasi potrete prepararvi e pianificare la corretta migrazione verso una rete WLAN da 802.11ac.
Tags : just media, aruba networks, emea, audit infrastructure, migrate to 802.11ac, hardware replacement, gigabit wifi, optimize to leverage
     Aruba Networks
By: Aruba Networks     Published Date: Nov 15, 2013
Il luogo di lavoro di nuova generazione sarà tutto concentrato sulla mobilità. Già nel 2013 nel mondo ci sono più dispositivi mobili che persone, e l'IT deve fornire una connettività senza interruzioni ad ogni tipo di utente — dipendenti, appaltatori, ospiti e persino clienti — che si adatti al loro ruolo e al tipo di dispositivo che utilizzano. E così, la mobilità sul posto di lavoro non giova solo agli utenti e alla produttività. La migrazione verso la mobilità genera numerosi vantaggi informatici. Scaricate questo libro bianco per scoprirli tutti…
Tags : just media, aruba networks, workplace benefits, wire-like wireless, context-aware security, user experience, automate adds, reduce network costs
     Aruba Networks
By: Aruba Networks     Published Date: Nov 15, 2013
Microsoft Lync cambia la struttura dei costi della telefonia aziendale e apre la strada ad una nuova esperienza per il cliente, in cui ogni comunicazione si trasforma in un'interazione più collaborativa e coinvolgente. Ecco 10 consigli per garantire il corretto funzionamento di Lync sui dispositivi mobili della vostra rete.
Tags : just media, aruba networks, deploying lync, mobile devices, microsoft lync, cost structure, user experience, engaging interaction
     Aruba Networks
By: Adobe     Published Date: Apr 17, 2017
Download our guide, Solving the Programmatic Puzzle, to learn how to use data and technology to simplify, clarify, and maximize your programmatic ad campaigns—so you can create connected, personalized experiences across channels. You’ll find that while data and technology are core to programmatic media buying, using them effectively doesn’t have to be complicated. Read the guide now to discover how to: • Consolidate your data to maximize your ad spend • Simplify search, display, and social campaigns • Deliver real-time, personalized ads with ease
Tags : programmatic ad campaigns, streamlined channels, media buying, consolidated data, ad management
     Adobe
By: Spredfast, Inc.     Published Date: Oct 22, 2014
During the busy holiday season, it takes exceptional marketing to stand out from the crowd. Make a statement with social integrations that place your customer at the heart of your campaign. It’s a timeless look. During the 2013 holiday season, luxury watch retailer Tourneau increased watch sales 57% by helping fans find the perfect gift with their omni-channel #TourneauKnows campaign. Just as in fashion, your brand should seek campaign inspiration further afield. Take a cue from tech sector giant, Cisco, who breathed new life into the banner ad by creating socially powered ad units. It was an arresting experience that aligned with readers of The Huffington Post, where the ads were displayed. If you are seeking new, innovative ways to capture your audience’s attention this holiday season—look no further—we’ve curated the top five social experiences for the holidays to inspire your efforts.
Tags : spredfast, holidays, social media, social experiences, creativity, instagram, daily deals, black friday
     Spredfast, Inc.
By: CA Technologies     Published Date: Jun 04, 2015
As organizações ágeis de hoje delegam às equipes de operações um tremendo desafio: implementar novas versões em produção imediatamente depois de completar o desenvolvimento e a prova. Para garantir a implementação exitosa dos aplicativos, se requer um processo automático e transparente. Este proceso é conhecido como Zero Touch Deployment™. Este white paper revisa os dois enfoques de Zero Touch Deployment: uma solução baseada em scripts e uma plataforma de automatização da implementação. O artigo explica como cada um pode resolver os principais desafios tecnológicos e organizacionais que enfrentam as organizações ágeis quando elas se dispõem a por em prática um sistema de implementação automática.
Tags : 
     CA Technologies
By: 8x8 Inc.     Published Date: Aug 09, 2017
Do you know what happens when a customer connects with your contact center? Not just the way in which he or she is routed to an agent, or the information accessed during the interaction— but what really happens in the conversation that makes the encounter an exceptional one? Do you have any insight into how your agent responded to that individual user, or a way to proactively ensure that other prospects and customers on any channel can have a consistent and positive experience? Are you leveraging all employees in your organization who have a stake in the customer experience, either directly or because their job influences the process? Do you feel confident that you have every metric at your disposal to make the best business decisions? Download now to learn more!
Tags : modern customer, contact center, customer engagement, branding
     8x8 Inc.
By: Dassault Systèmes     Published Date: Aug 08, 2017
Aerospace and Defense companies delivering complex products in competitive markets must overcome many challenges to manage requirements throughout the product lifecycle. Among the most difficult challenges are integrating complex systems engineering processes, promoting collaboration among multiple engineering disciplines and enabling the sharing of intellectual property within globally dispersed teams. Companies seeking a way to efficiently manage product requirements can leverage a comprehensive product lifecycle management (PLM) solution to: • Effectively reuse intellectual property to reduce time to market • Increase product innovation • Improve overall traceability of requirements throughout the product lifecycle This paper will highlight the criteria needed for a comprehensive requirements management solution that incorporates PLM to offer customers a scalable, enterprise-grade solution.
Tags : customer, product lifecycle, aerospace, defense, management, plm, dassault
     Dassault Systèmes
By: CA Technologies EMEA     Published Date: May 23, 2018
La protezione degli accessi privilegiati e la prevenzione delle violazioni restano preoccupazioni urgenti per le aziende di tutte le dimensioni. Gli autori di attacchi utilizzano una gamma sempre più ampia di metodi sempre più sofisticati per infiltrarsi in sistemi vulnerabili. E anche se le notizie di violazioni esterne spesso dominano le cronache, le aziende devono essere in grado di difendersi anche dalle minacce interne. In effetti, dato l'impiego oggi diffuso di outsourcing e partnership per supportare le funzioni aziendali chiave, il numero degli utenti che dispongono di accesso con privilegi ai sistemi di business critici è aumentato. In aggiunta, è essenziale per gli amministratori di sistema di oggi comprendere in che modo i sistemi vengono utilizzati, da chi e in quali condizioni. Purtroppo, le soluzioni di sicurezza standard non sono in grado di proteggere l'accesso interno/privilegiato in modo efficace e presentano gravi carenze, che mettono a rischio l'azienda.
Tags : 
     CA Technologies EMEA
By: CA Technologies EMEA     Published Date: May 24, 2018
En su libro publicado en 1966, “The Psychology of Science”, el psicólogo norteamericano Abraham Maslow abordó la idea de que los profesionales de la psicología necesitaban acometer sus métodos de tratamiento desde diferentes perspectivas para poder contar con ideas nuevas y no simplemente seguir usando las mismas teorías y técnicas creadas por Freud y sus seguidores tantos años atrás. Consciente de la posible dificultad de cambiar de punto de vista, Maslow escribió: “Si la única herramienta de la que se dispone es un martillo, es tentador abordarlo todo como si de un clavo se tratara”. Todos nosotros hemos vivido esta experiencia. Nos acostumbramos tanto a la manera en la que se han ido haciendo las cosas que a veces no nos cuestionamos las razones para seguir haciéndolo así.
Tags : 
     CA Technologies EMEA
By: CA Technologies EMEA     Published Date: May 24, 2018
En la actualidad, la tecnología digital está por todas partes; la nube, los dispositivos móviles, las redes sociales y el Internet de las cosas están cambiando nuestra forma de trabajar y divertirnos. Este entorno digital que evoluciona a gran velocidad está, además, redefiniendo las relaciones entre la compañía y sus clientes, que ahora esperan recibir una experiencia cómoda e interactiva de sus marcas favoritas. La seguridad es también una prioridad. Los riesgos son ahora mayores, pues tanto la empresa como sus clientes intercambian una cantidad cada vez mayor de datos confidenciales.
Tags : 
     CA Technologies EMEA
By: CA Technologies EMEA     Published Date: May 24, 2018
El crecimiento de su empresa es una prioridad continua. Además, a medida que la economía de las aplicaciones sigue creciendo, es probable que busque iniciativas de negocio digital para fomentar gran parte de dicho crecimiento. Algunos de los objetivos más prometedores de dicha estrategia son los siguientes: • Ofrecimiento de experiencias digitales superiores para consumidores a través de dispositivos móviles • Expansión de los flujos de mercados e ingresos a través de varios canales• Conexión de empleados y partners con los datos de la empresa en cualquier lugar y en todo momento • Lanzamiento de servicios nuevos innovadores en el Internet de las cosas (IoT)
Tags : 
     CA Technologies EMEA
By: CA Technologies EMEA     Published Date: May 24, 2018
En la economía digital, las interfaces de programación de aplicaciones (API) son esenciales para ejecutar ideas con rapidez y aprovechar nuevas oportunidades de negocio. Constituyen los pilares fundamentales de la transformación digital, ya que permiten a las organizaciones ofrecer experiencias de cliente excepcionales, crear flujos de ingresos nuevos y conectar a los empleados, los partners, las aplicaciones y los dispositivos con los datos en cualquier momento y lugar.Las API no son necesariamente una tecnología nueva, pero en el mundo digital actual, han adquirido mayor relevancia y se han vuelto importantes para todas las facetas de la empresa. A su vez, esto ha aumentado la demanda de una gestión de API eficaz. Ahora bien, ¿cómo es una solución eficaz?
Tags : 
     CA Technologies EMEA
By: CA Technologies EMEA     Published Date: May 24, 2018
L’outil de création d’API, CA Live API Creator, crée des back-ends applicatifs exposant des API REST/JSON à l’échelle de l’entreprise pour l’accès aux données et aux applications existantes. Cet outil permet aux développeurs de créer de nouvelles API REST rassemblant les données de différentes sources, par simple configuration. Ils peuvent étendre ces dernières en mettant en place des règles métier déclaratives, un traitement des événements via JavaScript et de la sécurité basée sur les rôles.Le modèle déclaratif de CA Live API Creator permet également de disposer de systèmes très évolutifs et fiables. Ses services optimisés sont plus efficaces et moins fragiles que les services codés manuellement par des développeurs et des architectes qualifiés
Tags : 
     CA Technologies EMEA
By: Reputation.com     Published Date: Jun 29, 2018
The past year ushered in some big changes for Online Reputation Management (ORM) — and the practice has become indispensable for any location-based enterprise. In 2017, review sources proliferated, consumers became more savvy about the validity of online reviews, and the position of Chief Experience Officer started to gain traction among locationbased organizations. ORM and SEO became increasingly intertwined as Google refined its search algorithms with a strong emphasis on reviews and star ratings. This year, expect to see these four trends move to the forefront: 1) Google will extend its dominance in online review volume and consumer exposure, eclipsing all other specialty sites. 2) SEO will be reinvented as user-generated reviews weigh more heavily in search rankings. 3) The voice of the customer will no longer be siloed across disconnected categories. 4) Consumer feedback from reviews and social media will drive operational improvements.
Tags : 
     Reputation.com
By: Forcepoint     Published Date: May 14, 2019
Things are not as they used to be in the enterprise. Today’s employees are mobile, they’re storing and accessing data in cloud apps, and are in disparate networks. While the present-day digital world has changed, the objective of data protection has not: you must still ensure the security of your critical data and intellectual property. However, the threat-centric security approach, with its static policies forces decisions about cyber activity with no insight into the broader context. The result is a disproportionate number of flagged activities, overwhelming security teams who have no way to understand the ones most worthy of investigation. Read Rethinking Data Security with a Risk-Adaptive Approach to learn how a human-centric, risk-adaptive approach can help your organization be more proactive in order to: • Automate policy enforcement to deter data loss events • Reduce the number of security alerts • Cut down on incident investigation time
Tags : 
     Forcepoint
By: Forcepoint     Published Date: Jun 06, 2019
Things aren't what they used to be in the enterprise. Your employees are mobile and they're storing and accessing data in cloud apps—often in disparate networks. That presents a serious challenge for old-school threat-centric security models that force you to make decisions with little insight or broader context. Download our eBook to find out how a human-centric, risk-adaptive approach to data security can free up your overwhelmed security team to focus on investigations that really matter.
Tags : 
     Forcepoint
By: Forcepoint     Published Date: Jun 06, 2019
Things are not as they used to be in the enterprise. Today’s employees are mobile, they’re storing and accessing data in cloud apps, and are in disparate networks. While the present-day digital world has changed, the objective of data protection has not: you must still ensure the security of your critical data and intellectual property without impacting an employee’s ability to do their job. The key is to gain visibility into user interactions with data and applications. Once this is achieved, you can apply a level of control based on the specific user’s risk and the sensitivity or value of the data. An organization’s data protection program must consider the human point — the intersection of users, data and networks. Enterprises must remain vigilant of data as it moves across hybrid environments and highlight the users who create, touch and move data who may pose the greatest risk to an organization.
Tags : 
     Forcepoint
By: Sprinklr     Published Date: Mar 13, 2018
"It’s more important than ever for brands to have comprehensive social media technology at their disposal. Simply buying a new solution, however, is just the beginning. Today’s brands must deploy social media software so that it allows the highest possible return on investment, empowers them to capture new opportunities, and manage the risks inherent in social media."
Tags : 
     Sprinklr
By: Veeam '18     Published Date: May 07, 2019
Alors que les entreprises accélèrent l'adoption de divers services cloud comprenant les clouds publics, privés et hybrides, la nécessité d’administrer ces environnements multicloud et d’en tirer parti devient critique. Veeam assure la disponibilité de ces environnements en protégeant les données vers, depuis et à l’intérieur des infrastructures multicloud.
Tags : 
     Veeam '18
By: Veeam '18     Published Date: May 07, 2019
Près de 50 000 PC, c’est le parc que représentent les 114 lycées de la Région des Pays de la Loire. Depuis ces ordinateurs, enseignants et lycéens produisent et partagent un grand volume de données dans les formats les plus variés, des fichiers bureautiques aux fichiers issus de logiciels spécialisés, à l’image des enseignements délivrés. Un patrimoine informationnel géré à travers une infrastructure dont la loi dite Peillon de 2013 a confié, pour les lycées, la responsabilité aux régions. Un choc pour de nombreuses régions qui ont vu du jour au lendemain la taille de leur parc informatique parfois multipliée par… 40!
Tags : 
     Veeam '18
By: BMC ASEAN     Published Date: Dec 18, 2018
Big data projects often entail moving data between multiple cloud and legacy on-premise environments. A typical scenario involves moving data from a cloud-based source to a cloud-based normalization application, to an on-premise system for consolidation with other data, and then through various cloud and on-premise applications that analyze the data. Processing and analysis turn the disparate data into business insights delivered though dashboards, reports, and data warehouses - often using cloud-based apps. The workflows that take data from ingestion to delivery are highly complex and have numerous dependencies along the way. Speed, reliability, and scalability are crucial. So, although data scientists and engineers may do things manually during proof of concept, manual processes don't scale.
Tags : 
     BMC ASEAN
By: CA Technologies EMEA     Published Date: Apr 10, 2018
Un nuevo modelo de seguridad que merece la pena entender y emular. Tradicionalmente, en materia de seguridad empresarial, se ha confiado en una estrategia tipo fuerte que blindaba los terminales de los usuarios y creaba muros en torno a la red. En la actualidad, esta estrategia no puede posibilitar ni proteger el uso de dispositivos móviles y funciones de SaaS, que se encuentran al otro lado del fuerte. En consecuencia, los directores de seguridad de la información (CISO, por sus siglas en inglés) se han dedicado a buscar nuevas soluciones capaces de proteger estas tecnologías actuales, así como de adaptarse a medida que cambian las necesidades empresariales y las amenazas.
Tags : 
     CA Technologies EMEA
Start   Previous    10 11 12 13 14 15 16 17 18 19 20 21 22 23 24    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics