RSS feed Get our RSS feed

News by Topic

isp

Results 276 - 300 of 889Sort Results By: Published Date | Title | Company Name
By: IBM     Published Date: Oct 03, 2017
Every day, torrents of data inundate IT organizations and overwhelm the business managers who must sift through it all to glean insights that help them grow revenues and optimize profits. Yet, after investing hundreds of millions of dollars into new enterprise resource planning (ERP), customer relationship management (CRM), master data management systems (MDM), business intelligence (BI) data warehousing systems or big data environments, many companies are still plagued with disconnected, “dysfunctional” data—a massive, expensive sprawl of disparate silos and unconnected, redundant systems that fail to deliver the desired single view of the business.
Tags : data, enterprise resource planning, customer relationship management, business intelligence, data management systems
     IBM
By: IBM Watson Health     Published Date: Sep 29, 2017
In the world of value-based healthcare, your data is the key to extracting the most actionable insights that provide real value to your organization. But getting to those insights can prove difficult, especially if you have to connect disparate data sources. You need transparency into key insights that can help your team make more informed decisions for the success of your organization. In this listicle, we explore five ways an analytics solution can help you transform your organization through the power of insight. From risk modeling to predictive analytics, utilizing the right mix of analytics can improve patient outcomes and ultimately move your organization closer to your ideal value-based care model
Tags : value-based care, analytics, insights, data, business intelligence, ehr, fee-for-service, cognitive
     IBM Watson Health
By: Druva     Published Date: Sep 27, 2017
The public cloud’s reliability, security, and scalability offers the transformational potential to move disparate workloads to a single cloud platform for greater efficiency and agility. Discover 20 real-world benefits gained when moving backup, archival and disaster recovery to a single, native cloud platform.
Tags : backup recovery, disaster recovery, public cloud, security cloud, native cloud
     Druva
By: DellEMC and Intel®     Published Date: Sep 25, 2017
L’optimisation des infrastructures IT par des serveurs de pointe et régulièrement actualisés permet aux organisations d’améliorer l’agilité, d’augmenter l’efficacité et de réduire les OPEX. La gamme Dell EMC PowerEdge, équipée des processeurs Intel® Xeon® Platinum, offre plus d’automatisation, d’évolutivité et de sécurité pour s’assurer que les infrastructures IT fonctionnent au maximum. En savoir plus sur la nouvelle génération de serveurs PowerEdge. Des options de financement souples sont disponibles auprès de Dell Financial Services. Processeur Intel® Xeon® Intel Inside® pour une productivité exceptionnelle. Ultrabook, Celeron, Celeron Inside, Core Inside, Intel, Intel logotyp, Intel Atom, Intel Atom Inside, Intel Core, Intel Inside, Intel Inside logotyp, Intel vPro, Itanium, Itanium Inside, Pentium, Pentium Inside, vPro Inside, Xeon, Xeon Phi och Xeon Inside är varumärken som tillhör Intel Corporation eller dess dotterbolag i USA och/eller andra länder
Tags : ultrabook, celeron, celeron inside, core inside, intel, le logo intel, intel atom, intel atom inside
     DellEMC and  Intel®
By: DellEMC and Intel®     Published Date: Sep 25, 2017
Les serveurs Dell EMC PowerEdge, optimisés par la gamme de processeurs Intel® Xeon® Platinum, offrent des performances plus fiables pour la virtualisation, l’IT convergée, le Cloud hybride et le Big Data. Optimisez l’automatisation, l’évolutivité et la sécurité grâce à la mise à niveau vers la nouvelle génération de serveurs PowerEdge. Des options de financement souples sont disponibles auprès de Dell Financial Services. Processeur Intel® Xeon® Intel Inside® pour une productivité exceptionnelle. Ultrabook, Celeron, Celeron Inside, Core Inside, Intel, Intel logotyp, Intel Atom, Intel Atom Inside, Intel Core, Intel Inside, Intel Inside logotyp, Intel vPro, Itanium, Itanium Inside, Pentium, Pentium Inside, vPro Inside, Xeon, Xeon Phi och Xeon Inside är varumärken som tillhör Intel Corporation eller dess dotterbolag i USA och/eller andra länder
Tags : ultrabook, celeron, celeron inside, core inside, intel, le logo intel, intel atom, intel atom inside
     DellEMC and  Intel®
By: DellEMC and Intel®     Published Date: Sep 20, 2017
I database rappresentano spesso il motore su cui si basa l'attività missioncritical dell'azienda. Sono alla base di online store, dati riservati e sistemi di gestione dei clienti e una soluzione che supporta livelli elevati di attività del database può rappresentare un grande vantaggio per la crescita aziendale. Intel Inside® per nuove, infinite possibilità. Ultrabook, Celeron, Celeron Inside, Core Inside, Intel, il logo Intel, Intel Atom, Intel Atom Inside, Intel Core, Intel Inside, il logo Intel Inside, Intel vPro, Itanium, Itanium Inside, Pentium, Pentium Inside, vPro Inside, Xeon, Xeon Phi e Xeon Inside sono marchi di Intel Corporation o di società controllate da Intel negli Stati Uniti e/o in altri Paesi.
Tags : ultrabook, celeron, celeron inside, core inside, intel, il logo intel, intel atom, intel atom inside
     DellEMC and  Intel®
By: Quick Base     Published Date: Sep 15, 2017
Financial professionals spend a lot of time bogged down by inefficient processes and dispersed data, rather than focusing on strategy. Find out how 6 people took the lead and transformed their day-to-day financial processes in manual accounting, FP&A, and procurement. With minimal investment, they redesigned their workflows to create exponential benefits for not only their companies, but themselves: • No More Chasing People for Data • Easily Met Deadlines • Removed Need for Clunky Spreadsheets Download this eBook to learn more and see how you can write your own success story.
Tags : 
     Quick Base
By: Akamai Technologies     Published Date: Sep 12, 2017
In the face of changing consumer demands and expectations, publishers are seeking new ways to reach and engage their audiences. With this in mind, Akamai and Telegraph Media Group combined efforts to test a hypothesis: would the optimization of image display improve page load times enough to boost session lengths and ad impressions?
Tags : akamai, telegraph media group, image optimization
     Akamai Technologies
By: VSP     Published Date: Sep 08, 2017
You may not know that there can be a big difference in out-of-pocket costs for the same pair of glasses depending on where you buy them and what vision insurance you have. This infographic displays the cost with VSP's Signature Plan, versus the cost with other insurance and no insurance.
Tags : 
     VSP
By: Zebra Technologies     Published Date: Sep 07, 2017
Founded in 1898, the department store chain The Bon-Ton Stores has a long history of innovation. One of the largest regional department store operators in the United States, the retailer is constantly implementing new strategies and technologies to improve customer service in all of its sales channels – beginning with enhancing the customer’s experience on the sales floor.
Tags : inventory management, staff communication, guest safety, guest security, mobile ordering, payment solutions, loyalty/membership/rewards, access card printers
     Zebra Technologies
By: Oracle Commerce Cloud     Published Date: Sep 06, 2017
Business models are less durable than they used to be… [they] are subject to rapid displacement, disruption, and, in extreme cases, outright destruction. The basic rules of creating and capturing economic value were once very rigid. Companies tried to execute the same business models better than their competitors did. That doesn’t have to be the case anymore. Unlike product and service innovations, business-model innovations travel well from industry to industry
Tags : 
     Oracle Commerce Cloud
By: F5 Networks Inc     Published Date: Aug 25, 2017
Cyber security has been a work in progress for decades. As security pros, we’ve learned a lot about how to defend our networks. We have more tools at our disposal than ever before. And for the first time in history, we are receiving tangible support from upper management for security work. We’ve never had it so good, right? Yet, we feel more helpless than ever. Most of the time, we’re overwhelmed and feel like we’re perpetually playing catch up.
Tags : 
     F5 Networks Inc
By: CA Technologies     Published Date: Aug 24, 2017
The “connected car” market is forecasted to reach $98.42 billion by 20181. The convergence of the app economy, increased connectivity, the Internet of Things (IoT), growth of in-car screen displays and open enterprise data models is giving automotive manufacturers and their partners a wealth of opportunities to improve service delivery and backend supply-chain management.
Tags : 
     CA Technologies
By: CA Technologies     Published Date: Aug 24, 2017
• CA Live API Creator permet de livrer des prototypes opérationnels en quelques heures à peine. Convertissez vos besoins métier en logiciels opérationnels. • CA Live API Creator convient aux modélisations filaires, mais aussi aux interfaces utilisateur, à la logique, aux bases de données et aux systèmes opérationnels. C’est aussi simple qu’une feuille de calcul et tout aussi rapide. • Impressionnez vos utilisateurs métier en leur présentant des résultats en quelques heures à peine. Intégrez ensuite leurs commentaires dans la logique et le modèle de données pour finalement assurer une itération instantanée. • Tout ce dont vous avez besoin est à votre disposition. Pas d’environnement de développement intégré à installer ni à configurer. Votre navigateur suffit.
Tags : 
     CA Technologies
By: CA Technologies     Published Date: Aug 24, 2017
Avec la prolifération des applications SaaS et des appareils mobiles, la sécurité réseau n’a jamais été aussi complexe. Vos employés et vos partenaires disposent désormais d’un niveau d’accès sans précédent à votre organisation, souvent hors des limites physiques de l’entreprise. En d’autres termes, votre sécurité basée sur le périmètre ne suffit plus : les identités sont devenues le nouveau périmètre.
Tags : 
     CA Technologies
By: CA Technologies     Published Date: Aug 24, 2017
Target, Home Depot, eBay, le Bureau de gestion du personnel des États-Unis... Les incidents de sécurité majeurs subis par ces organisations (et d’autres) récemment sont survenus suite au vol ou à la compromission des informations d’identification d’un utilisateur à forts privilèges qui disposait d’un accès étendu à des systèmes sensibles. Dans près de deux tiers des cas, la violation initiale a été facilitée par la faiblesse des pratiques de sécurité mises en place par un tiers, fournisseur ou partenaire commercial, qui avait accès à un réseau interne. C’est en volant les informations d’identification de ce tiers que les attaquants ont été en mesure d’exploiter les infrastructures informatiques des entreprises visées, pour y localiser des comptes à forts privilèges qu’ils ont ensuite utilisés pour accéder à des systèmes critiques et leur porter atteinte.
Tags : 
     CA Technologies
By: Proofpoint     Published Date: Aug 21, 2017
De nos jours, les auteurs d'attaques, toujours plus inspirés, utilisent des outils automatisés pour puiser des informations sur leurs cibles dans les profils — souvent publics — disponibles sur les médias sociaux. Ils savent donc où vous travaillez. De même, le poste que vous occupez, vos centres d'intérêt, vos loisirs, votre situation matrimoniale ou encore vos précédents emplois n'ont plus aucun secret pour eux. Ils se servent de ces informations pour élaborer des messages convaincants qui vous incitent à cliquer sur une pièce jointe ou une URL malveillante. Si vous tombez dans le piège, une charge active malveillante est injectée dans votre système.
Tags : phishing, malware, des individus pris pour cible
     Proofpoint
By: Polycom     Published Date: Aug 16, 2017
A guide for adopting the latest technology that addresses the needs of the diverse and dispersed workforces and what IT peers and thought leaders are doing about the shift in workplace design.
Tags : polycom, office technology, it infrastructure, workplace design
     Polycom
By: Curalate     Published Date: Aug 16, 2017
Digital technology has completely changed how we discover products, engage with brands and share our experiences with others. Amazon revolutionized customer feedback and product reviews. Social media transformed the way people share word-of-mouth recommendations, connecting shoppers to off-the-cuff opinions, compelling visual content and real-life experiences from peers and influencers they follow and admire. Sure, TV, radio and print ads are still part of the mix but they hardly carry the same weight as they did in years passed. This statistic speaks volumes: 92% of consumers trust peer recommendations over branded advertising. With the advent of social media and digital technology, brands have a powerful new tool at their disposal that brings word-of-mouth to the masses: usergenerated content (UGC).
Tags : ugc, user generated content, revenue, curalate, social media, millenials
     Curalate
By: 8x8 Inc.     Published Date: Aug 09, 2017
Do you know what happens when a customer connects with your contact center? Not just the way in which he or she is routed to an agent, or the information accessed during the interaction— but what really happens in the conversation that makes the encounter an exceptional one? Do you have any insight into how your agent responded to that individual user, or a way to proactively ensure that other prospects and customers on any channel can have a consistent and positive experience? Are you leveraging all employees in your organization who have a stake in the customer experience, either directly or because their job influences the process? Do you feel confident that you have every metric at your disposal to make the best business decisions? Download now to learn more!
Tags : modern customer, contact center, customer engagement, branding
     8x8 Inc.
By: Dassault Systèmes     Published Date: Aug 08, 2017
Aerospace and Defense companies delivering complex products in competitive markets must overcome many challenges to manage requirements throughout the product lifecycle. Among the most difficult challenges are integrating complex systems engineering processes, promoting collaboration among multiple engineering disciplines and enabling the sharing of intellectual property within globally dispersed teams. Companies seeking a way to efficiently manage product requirements can leverage a comprehensive product lifecycle management (PLM) solution to: • Effectively reuse intellectual property to reduce time to market • Increase product innovation • Improve overall traceability of requirements throughout the product lifecycle This paper will highlight the criteria needed for a comprehensive requirements management solution that incorporates PLM to offer customers a scalable, enterprise-grade solution.
Tags : customer, product lifecycle, aerospace, defense, management, plm, dassault
     Dassault Systèmes
By: ThousandEyes     Published Date: Aug 04, 2017
ThousandEyes monitors and solves application delivery problems throughout the Internet due to data center outages, ISP performance, CDN caching and DNS availability.
Tags : data center, application delivery, isp performance, cdn caching, dns availability
     ThousandEyes
By: ThousandEyes     Published Date: Aug 04, 2017
Steve Loyd, VP of Engineering Ops, uses ThousandEyes to gain visibility in application health and Internet service provider (ISP) performance.
Tags : network performance, infrastructure improvement, internet performance, health application
     ThousandEyes
By: CA Technologies EMEA     Published Date: Aug 03, 2017
La compliance con il GDPR può essere ottenuta attraverso una combinazione di persone, processi e tecnologia. Questo documento illustra soluzioni che possano aiutare le aziende nel loro percorso verso la compliance con il GDPR. Ma è possibile estendere la protezione e rafforzare ulteriormente i controlli di sicurezza attraverso l'autenticazione forte e del rischio o la workload automation, per automatizzare l'elaborazione dei dati personali, facilitando il rispetto del GDPR e di normative analoghe. Le normative tendono a stabilire i requisiti minimi richiesti ma, nell'application economy, le aziende aperte devono garantire la due diligence per proteggere una delle risorse più importanti e critiche: le informazioni private dei clienti.
Tags : crescita esplosiva, silos di identità, nuovi requisiti, avvisi, protezione, ca technologies, gdpr, autenticazione forte
     CA Technologies EMEA
By: Hewlett Packard Enterprise     Published Date: Aug 02, 2017
Su contenido ya está disponible. Si todavía no se ha abierto en una nueva pestaña/ventana del navegador, utilice el botón siguiente.
Tags : 
     Hewlett Packard Enterprise
Start   Previous    5 6 7 8 9 10 11 12 13 14 15 16 17 18 19    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics