RSS feed Get our RSS feed

News by Topic

reality

Results 226 - 250 of 422Sort Results By: Published Date | Title | Company Name
By: Coupa     Published Date: Aug 10, 2016
Less can really mean more. Less paper pushing and less human touch mean more visibility, more compliance and more savings across the organization. Download your guide to touchless e-Invoicing to learn why.
Tags : business management, automation, best practices
     Coupa
By: Adobe     Published Date: Apr 04, 2018
Recently the S&P 500 experienced something new: its top four most valuable companies at closing were Apple, Google, Microsoft, and Amazon—all tech companies. It’s a tech world out there, and one increasingly driven by a mastery of mobile. This reality is changing not only consumer expectations, market conditions, and competitive dynamics, but it’s also changing—and challenging— traditional approaches to corporate strategy.
Tags : 
     Adobe
By: Incapsula     Published Date: Nov 06, 2017
Does your website load in two seconds or less? If not, you could be disappointing nearly half of your customers. According to Kissmetrics, 47 percent of e-commerce users expect websites to load in less than two seconds – and nearly a quarter of them will abandon your website entirely if it takes longer than four seconds. Additionally, 50 percent of customers shop on their mobile phones. In other words, your website needs to load fast and be optimized or your customers will leave. The reality is that an e-commerce company can increase revenue by up to 7 percent just by making the load time one second faster. So, how can your company improve its site performance and make it faster? The best practices outlined in this whitepaper can reduce your site’s loading time, improve your user experience, and ultimately increase your company’s revenue.
Tags : 
     Incapsula
By: Aprimo     Published Date: May 01, 2012
The explosion of digital channels is creating a widening gap between classic single click attribution and the reality that marketers face when planning cross-channel campaigns with multiple touch points across many digital screens. This Aprimo White Paper will demonstrate some of the ways marketers can transform attribution and better manage marketing spend, improve planning and enhance the customer journey.
Tags : aprimo, marketing, customer relations, crm, customer satisfaction, customer data, marketing strategy, crm solutions/software
     Aprimo
By: Cisco     Published Date: Nov 17, 2015
With 50 to 100 billion things expected to be connected to the Internet by 2020, we are now experiencing a major paradigm shift that is revolutionizing business. More and more of the objects we use every day—including those in our factories, utilities, and railroads—are used to capture and distribute information that is helping us know more and do more. The TechWiseTV team and guest experts take an in-depth look at how industries like these are utilizing the data they are gathering from the factory floor all the way out to the field. This exploration into how the Internet of Things actually works in the real world and what your organization must do to take full advantage of it is a great opportunity to understand the practical challenges and specific technology involved in bringing all this potential to life.
Tags : cisco, connected factory, internet of things, iot solutions, data management, convergence, business process management, data integration
     Cisco
By: AppDynamics     Published Date: Dec 08, 2017
This Whitepaper looks into the technologies once relegated to the pages of science fiction novels—artificial intelligence, digital currency, and self-driving cars to name a few—have become a reality. Enterprises must innovate with high velocity and at massive scale to stay competitive. Cloud adoption has become a strategic imperative for enterprises—it’s the price required to transform into a digital business.
Tags : 
     AppDynamics
By: AppDynamics     Published Date: Dec 08, 2017
This Whitepaper looks into the technologies once relegated to the pages of science fiction novels—artificial intelligence, digital currency, and self-driving cars to name a few—have become a reality. Enterprises must innovate with high velocity and at massive scale to stay competitive. Cloud adoption has become a strategic imperative for enterprises—it’s the price required to transform into a digital business.
Tags : 
     AppDynamics
By: Entrust Datacard     Published Date: Jan 24, 2014
As mobile momentum in the workplace continues, so do the opportunities to leverage connected mobile devices to bolster security, enable new business capabilities and effectively defeat desktop-based malware. Entrust’s latest Infographic, Mobile Security: Perception vs. Reality, explores the perceptions of IT decision-makers and why more and more enterprises are investing in mobility in 2013 and beyond.
Tags : entrust, security, mobile security, infographic, malware, mobile devices
     Entrust Datacard
By: Entrust Datacard     Published Date: Jan 24, 2014
Mobile Security Gains Traction as Enterprises Embrace New Technology
Tags : entrust, security, mobile, mobile security, mobile devices, malware
     Entrust Datacard
By: Entrust Datacard     Published Date: Sep 14, 2018
With more and more dependency on mobile and cloud, digital enablement is key to business success. Now IT has an increased impact on how to drive strategy and implementation to reach business goals. But the reality of distributed applications and connected devices has introduced new security challenges. To secure information and provide users seamless access to data, you need to reevaluate your approach to authentication. You need a modern authentication solution that is agile and secure, enabling your digital transformation. This buyer's guide will help you determine whether a cloud-based multi-factor authentication solution is right for your organization and details the top features to look for in an authentication solution to securely enable your digital transformation. Download the Cloud-Based Authentication Buyer’s Guide — to learn more.
Tags : authentication, knowledge-based authentication (kba), multifactor authentication, out-of-band authentication, two-factor authentication, identity as a service (idaas), enterprise mobility
     Entrust Datacard
By: Dell     Published Date: Oct 23, 2008
The stark reality of the data center today is mixed platforms, operating systems and hardware. Fortunately Windows Vista has been engineered to integrate smoothly into these so-called hybrid environments, as you’ll learn in this podcast featuring Microsoft expert Chris Ross.
Tags : dell, integration of windows vista, vista hybrid environments
     Dell
By: HP Data Center     Published Date: Feb 18, 2009
The recent release of the Environmental Protection Agency (EPA) study on data center energy efficiency is adding fuel to the fire in the research and development of new ways to reduce energy use in centers. The findings, summarized on the EPA website, are staggering: Data centers consumed about 60 billion kilowatt-hours (kWh) in 2006, roughly 1.5 percent of total US electricity consumption -Energy consumption of servers and data centers has doubled in the past five years and is expected to almost double again in the next five years to more than 100 billion kWh, costing about $7.4 billion annually.
Tags : green data centers, epa, hp data center, energy consumption, server rack consumption, environmental protection agency, digital power, leed rating system
     HP Data Center
By: PitneyBowes     Published Date: Sep 29, 2010
Our recent survey of business-to-business (B2B) companies across the UK, France, Germany and the USA reveals that TransPromo is moving from a much-talked-about projection to a widely implemented reality.
Tags : pitney bowes, b2b communications, transpromo, transactional mail, customer relationship
     PitneyBowes
By: Citrix Systems     Published Date: Nov 10, 2014
Today’s enterprises face new requirements for their datacenter and cloud architectures, from keeping pace cost-effectively with fast-growing traffic to ensuring optimal application performance no matter how quickly business needs or the enterprise environment evolve. At the same time, IT must reduce costs and datacenter sprawl, ensure security and uptime, and prepare for a new generation of cloud computing initiatives. While many Application Delivery Controller (ADC) solutions promise to meet demanding customer needs, the reality often falls short. Taking a closer look at the available options and how they measure up against the criteria that matter most, it becomes clear that NetScaler beats the competition—providing better performance and scalability than F5 Networks, Inc.
Tags : dos, denial of service, netscaler, defense, network, low-bandwith, attacks, transactions
     Citrix Systems
By: Blue Coat Systems     Published Date: Aug 07, 2012
For anywhere, anytime, any-device mobile engagement, implementing a stateless architecture calls for building protection in the application layer, moving from device management to risk-based device inspection, performing real-time threat detection and mitigation, and leveraging cloud technologies.
Tags : mobility, it security, security & risk, s&r, infrastructure operations, i&o, devices, augmented reality
     Blue Coat Systems
By: LogMeIn     Published Date: Jul 18, 2014
A research report on streamlining the customer experience with mobile chat.
Tags : mcommerce, live chat, boldchat, logmein, customer support, mobile trends, mobile users, crm solutions/software
     LogMeIn
By: LogMeIn     Published Date: Oct 08, 2015
This white paper illustrates the best live chat practices that can help make your company’s dream of excellence a reality.
Tags : live chat, customer service, customer support, live chat success, best practices for agents and admins, customer experience/engagement
     LogMeIn
By: McAfee     Published Date: Feb 06, 2013
Take the stealth, creativity and patience of Stuxnet, the commercialism, wide distribution and easy-to-use toolkits of Zeus, and you understand the potency of today’s malware. Start planning now to protect your intellectual property and other assets.
Tags : zues, stuxnet, stealthy threats, rootkits, malware, rootkit binaries, zero-day vulnerabilities, botnet
     McAfee
By: McAfee     Published Date: Mar 07, 2013
HIPAA and HITECH require individually identifiable protected health information (PHI) be secured. The unfortunate reality for IT professionals is that these acts of Congress aren't prescriptive regarding what needs to be done about computer systems.
Tags : best database security solution, database activity monitoring, hipaa compliance, hitech compliance, phi, ephi, vulnerability manager for databases
     McAfee
By: BMC Software     Published Date: May 19, 2014
Your people and business can do amazing things when technology runs at its best. The new ITSM experience helps organizations achieve greatness in today’s mobile, social and user-centric reality. Discover a better way for users to access service and support anywhere, anytime. Explore enhanced productivity for IT staff, and seamless integration across IT operation management systems. Download now.
Tags : bmc, itsm solutions, changing business, cloud, cios, software, it organizations, saas
     BMC Software
By: QlikTech     Published Date: Aug 27, 2013
There is an incredible amount of interest in the topic of Big Data at present: for some organisations its use is an operational reality, providing unprecedented ability to store and analyse large volumes of disparate data that are critical to the organization’s competitive success. It has enabled people to identify new opportunities and solve problems they haven’t been able to solve before. Download this whitepaper to learn more.
Tags : big data, qlikview, big data solutions, opportunity, business opportunity, competitive success, store, analyse
     QlikTech
By: Polycom     Published Date: Dec 18, 2017
Effective, engaging collaboration that leverages video conferencing should incorporate features like content sharing, clear participant rosters, easy call management controls and Instant Messaging. But, according to Microsoft research, some 97 percent of meeting rooms aren’t adequately equipped to handle video. In fact, a majority of these rooms host the most rudimentary of collaboration solutions like a digital projector and an audio connection for conference calls. And, while most of these enterprises are adopting Skype for Business for end-users, the reality is that many of their conference rooms lack the ability to connect to Skype for Business calls, which eliminates effective collaboration tools like video and content sharing. Download this guide to see how to create engaging voice and video meeting experience with Skype for Business.
Tags : skype for business, collaboration, video conferencing, content sharing, call management controls, microsoft office 365
     Polycom
By: Gigaom     Published Date: Sep 16, 2019
We’ve heard it before. A data warehouse is a place for formally-structured, highly-curated data, accommodating recurring business analyses, whereas data lakes are places for “raw” data, serving analytic workloads, experimental in nature. Since both conventional and experimental analysis is important in this data-driven era, we’re left with separate repositories, siloed data, and bifurcated skill sets. Or are we? In fact, less structured data can go into your warehouse, and since today’s data warehouses can leverage the same distributed file systems and cloud storage layers that host data lakes, the warehouse/lake distinction’s very premise is rapidly diminishing. In reality, business drivers and business outcomes demand that we abandon the false dichotomy and unify our data, our governance, our analysis, and our technology teams. Want to get this right? Then join us for a free 1-hour webinar from GigaOm Research. The webinar features GigaOm analyst Andrew Brust and special guest, Dav
Tags : 
     Gigaom
By: Red Hat     Published Date: Mar 28, 2019
Digital business brings to mind innovative technologies: mobile devices, intelligent sensors, wearable devices, virtual reality, chatbots, blockchain, machine learning, and other technology. For some, it also reflects the rapid rise of new digitally native businesses that have disrupted traditional business models and destabilized established companies and industry sectors. For the majority of organizations, digital business means pivoting to a culture of organizational agility, where the rapid pace of demand can only be satisfied by faster and more flexible development and delivery models. As most organizations do not have the luxury of completely rebuilding their technology foundation or immediately adopting new practices and mindsets, they are embracing gradual yet fundamental shifts in culture, processes, and technology to support greater velocity and agility.
Tags : 
     Red Hat
By: Cloudian     Published Date: Feb 15, 2018
Not so long ago, if you asked a business executive, “what is the most irreplaceable part of your business?” they might have pointed at their building or their employees. The really forward-thinking execs may have chosen their customers. But the reality is that businesses have insurance to deal with the loss of a building; they can hire new employees; and they can acquire new customers. The one thing that is truly irreplaceable is their data. Lose that and you really are out of business. The potential risks to your data can be as subtle as the malfunction of tiny areas on a disk drive or as enormous as the failure of an entire data center. That means it’s not enough just to protect your data — you must also select the best way to protect it. To deliver that protection in an economical and rapidly recoverable way requires a system that gives you complete control to determine levels of data protection based on the type of data. In this paper, we’ll talk about the science of data protect
Tags : 
     Cloudian
Start   Previous    3 4 5 6 7 8 9 10 11 12 13 14 15 16 17    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics