RSS feed Get our RSS feed

News by Topic

lead

Results 1 - 25 of 2882Sort Results By: Published Date | Title | Company Name
By: Genesys     Published Date: Jun 06, 2017
Get this report now to learn: - Strengths and cautions to consider when evaluating cloud contact center solution providers - How the 10 cloud contact center vendors are positioned in each of the four quadrants – Leaders, Challengers, Visionaries or Niche players - Why Interactive Intelligence, a Genesys company, Named a Leader 2 years in a Row
Tags : gartner report, magic quadrant, genesys, contact centers, contact center as a service, cloud contact center solutions, cloud soulutions
     Genesys
By: KeyBank Commercial Banking     Published Date: May 10, 2017
When it comes to the middle market, Key has a dedication like no other bank. Our commitment and focus allow us to deliver relevant, actionable, and tailored solutions for middle market companies. As part of this commitment, KeyBank conducts quarterly surveys with middle market executives. We believe that the more we know, the better we can serve you. Check out what leaders are saying about the economy, future growth and cybersecurity when you download our latest quarterly report. Member FDIC. © 2017, KeyCorp. CFMA 20170424- 224928
Tags : middle market, us economy, economic outlook, customized solutions, cybersecurity, business success, business goals, business expansion
     KeyBank Commercial Banking
By: IBM APAC     Published Date: May 18, 2017
Welcome to IT as a Service For Dummies, IBM Limited Edition. IT as a Service is the emerging technique that gives technology leaders the flexibility of providing the right set of services to the business. The world of IT is changing dramatically. Businesses are increasingly discovering that IT services are becoming the foundation for the customer experience. IT as a Service isn’t simply a new delivery model for applications. Instead, IT as a Service is a new approach to providing an array of modular services that are targeted to solve changing business problems. While services can be as straightforward as compute or storage in the cloud, they can also be used to complex solutions. Other services may include microservices or integration services that enable a business to quickly create new solutions to help service customers in a more creative and efficient manner.
Tags : service, dummies, ibm, cloud, mobile
     IBM APAC
By: Aberdeen     Published Date: Jun 17, 2011
Download this paper to learn the top strategies leading executives are using to take full advantage of the insight they receive from their business intelligence (BI) systems - and turn that insight into a competitive weapon.
Tags : aberdeen, michael lock, data-driven decisions, business intelligence, public sector, analytics, federal, state
     Aberdeen
By: Cisco     Published Date: Mar 17, 2017
Digital transformation significantly improves the performance and reach of an enterprise and has become a top priority for IT and business leaders across the globe. Read on to find out how Cisco's Architecture can enable Digital Transformation.
Tags : digital transformation, architecture, business processes, best practices, customer engagement, employee engagement
     Cisco
By: Cisco     Published Date: Mar 17, 2017
We evaluate enterprise LAN vendors providing wired and wireless access layer connectivity. Network leaders should evaluate vendors based on their ability to offer the same network applications across both the wired and wireless infrastructure and address new IoT challenges.
Tags : connectivity, wireless, infrastructure, iot, internet of things, network applications, wireless infrastructure
     Cisco
By: Entrust Datacard     Published Date: Apr 26, 2017
Entrust’s SSL/TLS Best Practices Guide is a key resource for those charged with SSL (Secure Sockets Layer) and TLS (Transport Layer Security) deployment. In our guide, you’ll find expert advice from the thought leaders at Entrust on SSL/TLS certificate installation, and tips for managing security for optimal performance. Included in the SSL/TLS Best Practices Guide: Certificates and Private Keys Server Configuration Application Protection Enhanced Server Security Domain Protection Advanced Certificates Always-On SSL Our guide is designed to help make SSL/TLS certificate installation easier, so you can use SSL expertly and with confidence.
Tags : 
     Entrust Datacard
By: MarkLogic     Published Date: Jun 09, 2017
Today, data is big, fast, varied and constantly changing. As a result, organizations are managing hundreds of systems and petabytes of data. However, many organizations are unable to get the most value from their data because they’re using RDBMS to solve problems they weren’t designed to fix. Why change? In this white paper, we dive into the details of why relational databases are ill-suited to handle the massive volumes of disparate, varied, and changing data that organizations have in their data centers. It is for this reason that leading organizations are going beyond relational to embrace new kinds of databases. And when they do, the results can be dramatic
Tags : 
     MarkLogic
By: MarkLogic     Published Date: Jun 09, 2017
This eBook explains how databases that incorporate semantic technology make it possible to solve big data challenges that traditional databases aren’t equipped to solve. Semantics is a way to model data that focuses on relationships, adding contextual meaning around the data so it can be better understood, searched, and shared. Read this eBook, discover the 5 steps to getting smart about semantics, and learn how by using semantics, leading organizations are integrating disparate heterogeneous data faster and easier and building smarter applications with richer analytic capabilities.
Tags : 
     MarkLogic
By: Sitecore     Published Date: Mar 24, 2017
Getting started with personalization can seem overwhelming. We show you how with 10 easy tactics, from distinguishing between first-time web visitors and existing customers, to using real-time data to understand which calls to action will lead to conversions.
Tags : personalization, context marketing, digital experience, customer experience
     Sitecore
By: Sitecore     Published Date: Mar 27, 2017
Digitalization brings both new opportunities and confusion to even the most carefully planned selection processes for WCM. CIOs and IT leaders aiming to boost the effectiveness of their digital business strategy should use this document to help them select the most appropriate vendor and solution. Download to learn more.
Tags : 
     Sitecore
By: Oracle     Published Date: May 13, 2017
Each chapter is illustrated by examples from successful businesses that have embraced digital technologies and the best practices being implemented so that CFOs and their finance teams have the opportunity to become the new organisational wide digital guidance system for their business.
Tags : modern finance, digital age, cloud, social, mobile, big data, big data analytics, digital transformation
     Oracle
By: Oracle     Published Date: May 13, 2017
This digibook contains a step-by-step guide to overcoming the new challenges of raised expectations, big data, and globalization, with case studies and examples of how CFOs of the future are redefining reporting to improve their existing financial business process.
Tags : big data, globalisation, modern finance, case studies, best practices, finance
     Oracle
By: Proofpoint     Published Date: Jun 22, 2017
Doing all you can to ensure the security of Office 365 makes a lot of sense. As the volume and sophistication of advanced threats continues to evolve more rapidly than ever before, you must protect your people, data and brand from advanced attacks and compliance risks. Our security solutions provide you with industry-leading security, compliance and email continuity capabilities for your cloud based Office 365 deployment that far exceed Microsoft’s native protection. With Proofpoint, you can take advantage of the freedom, flexibility and cost savings of Office 365—without sacrificing your ability to keep users connected and protected. For more information, visit: www.proofpoint.com/office365
Tags : security solutions, ransomware, security technologies, protection technologies, risk assessment, it security, server protection
     Proofpoint
By: Proofpoint     Published Date: Jun 22, 2017
Doing all you can to ensure the security of Office 365 makes a lot of sense. As the volume and sophistication of advanced threats continues to evolve more rapidly than ever before, you must protect your people, data and brand from advanced attacks and compliance risks. Our security solutions provide you with industry-leading security, compliance and email continuity capabilities for your cloud based Office 365 deployment that far exceed Microsoft’s native protection. With Proofpoint, you can take advantage of the freedom, flexibility and cost savings of Office 365—without sacrificing your ability to keep users connected and protected. For more information, visit: www.proofpoint.com/office365
Tags : security solutions, ransomware, security technologies, protection technologies, malicious email, it security, server protection
     Proofpoint
By: Proofpoint     Published Date: Jun 22, 2017
Human targeted attacks continued to lead the pack in 2016. Attackers’ used automation and personalisation to increase the volume and click-through rates of their campaigns. Taking a page from the B2B e-marketer’s playbook, cyber criminals are adopting marketing best practices and sending their campaigns on Tuesdays and Thursdays when click-through rates are higher. Meanwhile, BEC and credential phishing attacks targeted the human factor directly--no technical exploits needed. Instead, they used social engineering to persuade victims into sending money, sensitive information and account credentials. Timing is everything—attackers know that hitting your employees with a well-crafted email at the just the right time produces the best results. Of course, this varies by region. So if you are responsible for worldwide SecOps, you need visibility into not only attack patterns but also when and which employees tend to click.
Tags : security solutions, ransomware, security technologies, protection technologies, malicious email, it security, server protection
     Proofpoint
By: Akamai     Published Date: Mar 08, 2017
Video leads mobile data traffic. Read this infographic to find out more facts about video and mobile data traffic.
Tags : video, mobile data traffic, mobile data, mobile video, infographic
     Akamai
By: Akamai     Published Date: Mar 08, 2017
Read on to see how you can leverage the best in class performance that leads to the highest quality, recognized reliability, and the largest globally distributed infrastructure for the greatest scale.
Tags : ott, over-the-top, reliability, quality, engagement, broadband, content, high quality
     Akamai
By: MobileIron     Published Date: Feb 15, 2017
The third edition of the Mobile Security and Risk Review is a must read and provides IT security leaders with timely information about the mobile threat landscape and the emerging risks facing their organizations. The report also includes a list of the most popular business apps, Apple VPP and DEP adoption metrics, top blacklisted mobile apps and information about healthcare and financial services industries.
Tags : 
     MobileIron
By: MobileIron     Published Date: Mar 21, 2017
Over the past few years, organizations have used a variety of tools and technologies to enable basic mobile device management (MDM) and essential apps like email and calendar. But those capabilities are inadequate for companies that want to move beyond the basics and transform their business processes by securely moving apps and data to the cloud. For AirWatch customers, this means they should start evaluating leading enterprise mobility management (EMM) platforms like MobileIron in order to achieve their mobile transformation goals. Our platform is 100% focused on building today’s modern enterprise architecture, which is quickly shifting core business processes away from legacy technologies and standardizing on mobile devices and cloud services.
Tags : 
     MobileIron
By: Autodesk     Published Date: May 22, 2017
The future of making things is here, and it is complex. Engineering leaders are under constant and growing pressure to find more innovative solutions for increasingly demanding customers in the context of an extremely competitive global market.
Tags : additive manufacturing, generative design, simulation, high-speed manufacturing, smart manufacturing, enhanced customization, innovation, rapid prototyping
     Autodesk
By: Oracle (Hospitality)     Published Date: Apr 13, 2017
For hospitality leaders, anticipating consumer trends and seeking innovations that enhance guest experiences are vital exercises that need to be practiced diligently. Now, more than ever – with the coming wave of disruptive technologies – taking these steps helps ensure success tomorrow.
Tags : hospitality, artificial intelligence, facial recognition, customer experience, restaurants, 3d printing
     Oracle (Hospitality)
By: Workday     Published Date: Mar 15, 2017
The experts agree: Workplace learning can no longer be an "out there," disconnected process- -it has to be tightly and carefully woven into a worker's experience, integrated into the fabric of the modern workplace. Read the article to discover how three leading experts see the future of workplace learning unfolding today.
Tags : workday, integrated learning, workplace success
     Workday
By: Workday     Published Date: Mar 21, 2017
Numerous studies demonstrate that a diverse and inclusive workforce is more collaborative and generates higher levels of creativity and productivity. Yet, despite the best intentions, many of today’s organizations still struggle in an attempt to increase diversity and belonging. Why? Research from the NeuroLeadership Institute suggests that unconscious thought patterns can impede organizational diversity and belonging initiatives. Register for the webinar to gain a better understanding of these challenging thought patterns and to learn the extent to which they impact such important aspects of business as decision-making, team building, hiring, innovation, and workplace success.
Tags : workday, neuroleadership, workplace success, diversity
     Workday
By: Workday     Published Date: Mar 15, 2017
Discover why Workday is positioned highest for our ability to execute and furthest for our completeness of vision in the Leaders’ quadrant in Gartner’s Magic Quadrant for cloud HCM. Gartner does not endorse any vendor, product or service depicted in its research publications, and does not advise technology users to select only those vendors with the highest ratings or other designation. Gartner research publications consist of the opinions of Gartner's research organization and should not be construed as statements of fact. Gartner disclaims all warranties, expressed or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose.
Tags : workday, hcm, gartner, customer insight
     Workday
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics