RSS feed Get our RSS feed

News by Topic

mmo

Results 1 - 25 of 738Sort Results By: Published Date | Title | Company Name
By: Dell EMC     Published Date: Feb 23, 2017
Take a look at how your storage peers solved their VDI challenges: complexity, end-user experience, and cost. Learn how Dell EMC XtremIO and Unity, powered by Intel® Xeon® processors, can solve your VDI storage challenges, too.
Tags : 
     Dell EMC
By: Dell EMC     Published Date: Feb 23, 2017
Want to join your peers in database storage nirvana? Learn how many organizations have benefited from the Dell EMC All-Flash portfolio, powered by Intel® Xeon® processors—and how it can help you can solve the most common database storage challenges: Time-to-market, consolidation, and complexity.
Tags : 
     Dell EMC
By: Dell EMC     Published Date: Feb 23, 2017
Desktop and application virtualization have steadily gained ground to address a broad range of use cases across organizations of all sizes. According to ESG research, over the past few years, desktop virtualization has consistently risen to be included among the five most commonly-identified IT priorities for 2016, alongside such perennial corporate objectives as fortifying cybersecurity and managing data growth.
Tags : 
     Dell EMC
By: Dun & Bradstreet     Published Date: Mar 03, 2017
Creating predictive analytics from alternative data has become the current focus of the biggest quant trading firms in the industry The democratization of financial services data and technology, together with more intense competition, makes the needs of today’s market participants vastly different from those of previous generations. Firms must locate untapped sources of data for both public and non-public companies. This alternative data, such as payment data and other non-public information, from sources beyond the common channels, can be a predictive indicator of market performance; a difference maker in assisting firms as they develop models to evaluate their investments. By combining our unique data sets with advanced analytics, traders, analysts and managers can seek predictive signals and actionable information utilizing their own models. View our research report to learn how alternative data, our 'Information Alpha,' can help you earn differentiated investment returns.
Tags : 
     Dun & Bradstreet
By: Dun & Bradstreet     Published Date: Mar 03, 2017
Navigating Uncertainty & Disruption in a Post-Brexit World Risk management and finance professionals are navigating an unprecedented period of uncertainty. In a post-Brexit world, how can business leaders best navigate disruption? Data has become the most valuable business commodity, but not all data is meaningful. Data that helps you uncover hidden associations with customers, partners and suppliers can be a true catalyst for business transformation and growth. In this ebook, we have mapped out the crucial steps in the journey towards operationalizing relationship data to: - Define Relationship Data - Use relationship data to unlock new opportunities - Apply relationship data across the organization to drive growth
Tags : 
     Dun & Bradstreet
By: Schneider Electric     Published Date: Oct 17, 2016
This white paper analyzes these costs and presents a flexible architecture to accommodate a well-specified density, and discusses the importance of operational policies in enforcing the specification.
Tags : 
     Schneider Electric
By: Schneider Electric     Published Date: Oct 17, 2016
This paper explains how the requirements for building management are affected by the presence of a mission critical data center or IT room (data rooms) and describes key attributes to look for in an effective BMS system. Common pitfalls of implementing and using a BMS for sites with IT along with advice on how to avoid them are also provided.
Tags : 
     Schneider Electric
By: ServiceNow     Published Date: Feb 24, 2017
At the highest level of organizations, a new management directive has emerged to meet the changed nature of customer demands and interactions as well as the need to differentiate within the market. This directive has one goal: providing a differentiated customer service experience. As products become increasingly commoditized, organizations can set themselves apart from their competitors by providing a unique customer service experience that creates a "relationship" based on intangible benefits that their customers will find hard to give up. While this vision is theoretically sound, it requires a significant tactical shift in business thinking and processes. The modern customer's habits and service requirements have changed radically. Meeting these needs challenges many historically held beliefs and practices regarding the customer and modes of interaction.
Tags : 
     ServiceNow
By: iCims     Published Date: Jan 24, 2017
The decision to keep your current applicant tracking system (ATS for short) or switch to a new ATS, is often a difficult one to make. Switching to a new applicant tracking system can be costly and a perceivable headache to implement. However, when you find an ATS that meets your company’s unique needs while providing resources to help your company both today and tomorrow; then switching could be the best decision your company makes. The right applicant tracking system should provide solutions to your most common pain points, saving you time, money, and energy.
Tags : 
     iCims
By: Oracle     Published Date: Jan 09, 2017
The ubiquitous nature of mobile devices can seemingly diminish their value, making them a commodity to be taken for granted. But their true power hasn’t begun to be tapped — especially by hoteliers.
Tags : mobility, mobile devices, hospitality, hotels, customer experience, customer relationship
     Oracle
By: Oracle     Published Date: Feb 27, 2017
It is a common refrain that is getting increasingly louder: We want more control. And guests want it during every phase of the travel lifecycle. That growing desire became evident in our research as guests expressed their interest in various ways.
Tags : 
     Oracle
By: IBM     Published Date: Jan 27, 2017
A solid information integration and governance program must become a natural part of big data projects, supporting automated discovery, profiling and understanding of diverse data sets to provide context and enable employees to make informed decisions. It must be agile to accommodate a wide variety of data and seamlessly integrate with diverse technologies, from data marts to Apache Hadoop systems. And it must automatically discover, protect and monitor sensitive information as part of big data applications.
Tags : 
     IBM
By: Schneider Electric     Published Date: Feb 17, 2017
In this paper, we describe and critique the common physical infrastructure practices seen today, propose a method of analyzing the resiliency needed, and discuss best practices that will ensure employees remain connected to their business critical applications.
Tags : best practices, business applications
     Schneider Electric
By: Mimecast     Published Date: Feb 13, 2017
Mimecast has seen firsthand that not all email security systems perform equally well. But, until now, we’ve lacked the comparative data to prove our perceptions. In order to address this head-on, Mimecast has launched the Email Security Risk Assessment (ESRA). The Mimecast ESRA has three goals: 1. To test the Mimecast cloud security service against an individual organization’s incumbent email security system. To help the organization understand the relative efficacy of the security systems and to see the number, type and severity of email-borne threats that are currently getting into the organization. 2. To inform the security industry with hard data on the effectiveness of various commonly-deployed email security systems. 3. To inform the security industry with hard data regarding the number, type and severity of email-borne threats that are being actively used in attacks. Download Now!
Tags : mimecast, email. esra, email security, cloud security
     Mimecast
By: Acxiom Corporation     Published Date: Feb 24, 2011
A Chief Marketing Officer's Roadmap. In this paper Acxiom shows how Media Mix Optimization can help overcome the complex challenges of today's marketing. Herein we not only detail both the "Journey" of MMO and its rewards but also how to avoid several key hurdles along the way.
Tags : acxiom, optimization, media mix, mmo, halo effects, cmo, chief marketing officer, mobile marketing
     Acxiom Corporation
By: Akamai Technologies     Published Date: Apr 26, 2010
Collaboration in the enterprise requires a triumvirate of people, process and technology to be successful. With the plethora of collaboration applications available today, both IT professionals and collaboration business users alike need to take a holistic approach to be successful with collaboration. This paper lets you know about some of the common pitfalls and how to avoid them.
Tags : akamai, collaboration, collaboration software, firewall, enterprise software, web conferencing, travel costs, twitter
     Akamai Technologies
By: IBM     Published Date: Jan 09, 2017
According to the 2016 State of Endpoint Security Survey released by the SANS™ Institute 44% of respondents report that one or more of their endpoints have been breached in the past 24 months. - Desktops, laptops and servers are the most compromised endpoints - Login and access credentials are the most commonly exfiltrated information - 55% of respondents spend 3 or more hours per compromised endpoint - Over 70% of respondents find it difficult or impossible to determine when an incident is fully remediated These statistics encompass a wide set of industries, from financial services to education. So while each network is uniquely built to support your particular business, none is immune from being breached."
Tags : ibm, security, big fix, endpoint security, sans report, network security
     IBM
By: WhatCounts     Published Date: May 05, 2010
Lifecycle marketing is changing the way companies interact with prospects and customers through the email channel. This white paper explores five common questions and some ideas on how to jumpstart your lifecycle marketing efforts.
Tags : lifecycle, email marketing, whatcounts, emarketing, roi, segmentation, nurturing, lead generation
     WhatCounts
By: Zynapse     Published Date: Sep 10, 2010
UNSPSC enables preference item management, better spend analysis, supply standardization and information control. Whether you are deliberating on the need for a common product and classification standard for your company, or are an advanced UNSPSC adopter, we hope that "Adopting UNSPSC" will answer some of your questions and perhaps help you in some way to improve your purchasing and supply management processes.
Tags : zynapse, erp projects, unspsc, data information, data management, governance, mdm, master data management
     Zynapse
By: IBM     Published Date: Feb 02, 2017
Many marketers are trying to better understand the customer journey, but factors such as a lack of data and system integrations, breakdowns in process, misguided focus, and inattention to key aspects of the buyer experience are preventing them from doing so. Learn how you can overcome these challenges and many others to deliver a better customer experience and drive more revenue.
Tags : ibm, marketing, commerce, customer journey, crm & customer care
     IBM
By: Levene Strategies     Published Date: Oct 25, 2011
Writing effective Federal proposals is a necessary component of doing business with the Government. Learn how to avoid several common mistakes.
Tags : 
     Levene Strategies
By: VMware AirWatch®     Published Date: Feb 24, 2017
Mobility, having permeated our cultural ethos, has subsequently transformed the enterprise. No longer considered a frill, its ripple effect on our workforce can be seen in the way IT handles security and productivity. As IT administrators catch up with their new responsibilities, enterprise mobility management (EMM) solutions flood the market. Explore key questions to ask on your EMM journey, including: - Does this EMM platform address my use case? - Does it support common platforms? - Does it control access to corporate resources? - And more
Tags : 
     VMware AirWatch®
By: Eaton     Published Date: Feb 09, 2017
Budgeting for electricity, securing adequate supplies of it and finding ways to use less of it are all common topics of conversation among data center operators. Ensuring that the power their IT resources rely on is both dependable and clean, sadly, can sometimes be an afterthought.
Tags : 
     Eaton
By: Viavi Solutions     Published Date: Jan 04, 2017
In the age of information, staying on top of emerging threats requires IT teams to leverage existing tools in innovative ways, such as applying deep packet inspection and analysis from performance monitoring solutions for advanced security forensics. Based on recent insight gathered from 322 network engineers, IT directors and CIOs around the world, 85 percent of enterprise network teams are now involved with security investigations, indicating a major shift in the role of those teams within enterprises. Large-scale and high-profile security breaches have become more common as company data establishes itself as a valuable commodity on the black market. As such, enterprises are now dedicating more IT resources than ever before to protect data integrity.
Tags : 
     Viavi Solutions
By: Entrust Datacard     Published Date: Oct 24, 2016
The mobile device is part and parcel of daily life. It’s fundamentally changed the way consumers behave, and this influence has spread to the enterprise sector as well. For instance, patron-owned mobile devices have largely helped pave the way for the widespread emergence of bring-your-own-device (BYOD) policies. Ten years ago, the idea of a company employee logging into the enterprise system while they’re on an airplane over the Atlantic would seem far-fetched, but today such behavior is relatively commonplace. Mobility is changing how we shop, work and live our daily lives.
Tags : 
     Entrust Datacard
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics