RSS feed Get our RSS feed

News by Topic

act

Results 13626 - 13650 of 14745Sort Results By: Published Date | Title | Company Name
By: ALE     Published Date: Jan 10, 2019
The purpose of this design guide is to present the requirements and considerations relevant to the transportation vertical along with design options, best practices and configuration guidelines. While this design guide is focused on Shortest Path Bridging (SPB-M) based networks, it also addresses data networking solutions applicable for this transportation vertical. Although several modes of transport exist, this document focuses on rail (metro, heavy, light) and road transport. More specifically, this document focuses on the fixed network infrastructure underpinning the multiple systems that enable the safe and reliable operation of rail and intelligent transport systems. To find out more download this whitepaper today.
Tags : 
     ALE
By: PitneyBowes     Published Date: Sep 29, 2010
Our recent survey of business-to-business (B2B) companies across the UK, France, Germany and the USA reveals that TransPromo is moving from a much-talked-about projection to a widely implemented reality.
Tags : pitney bowes, b2b communications, transpromo, transactional mail, customer relationship
     PitneyBowes
By: Red Hat     Published Date: Sep 08, 2017
TransUnion, a leading global risk and information solutions provider, used mainframe computers to support its global business. To improve IT performance and costs, the company launched an initiative, Project Spark, to migrate all of its applications and systems to a Red Hat® operating environment. With the new infrastructure—based on Red Hat Enterprise Linux®, Red Hat JBoss® Middleware, and other Red Hat products—TransUnion achieved faster time to market, greater competitive advantage, improved employee satisfaction, and significant operating cost savings.
Tags : 
     Red Hat
By: Monetate     Published Date: Jun 27, 2018
A robust testing and optimization program is critical to the success of any travel and hospitality online bookings and reservations engine. Discover how personalization can help you drive impact using your pre-exisiting creative and analytical assets. In this handy guide you’ll learn how Monetate’s testing, segmenting and optimization program helps travel and hospitality companies: • Recognize visitors and customers across devices to deliver connected experiences. • Optimize bookings funnels to raise bookings conversion rates and revenues. • Segment customers to deliver truly customized content. • Decrease the customers time to purchase by serving the right trip, excursion or reservation.
Tags : 
     Monetate
By: IBM     Published Date: Jan 08, 2016
Attracting candidates and retaining current employees is a lot like attracting and retaining customers.
Tags : ibm, human resources, talent, acquisition, strategies enterprise, mobile, security, saas
     IBM
By: IBM     Published Date: Jul 22, 2016
In this webcast you will learn about: - The new dynamic and market landscape for talent - New imperatives and talent strategies for organizations - Lessons from best practice organizations
Tags : ibm, talent acquisition, talent acquisition technology, human resources, recruiting
     IBM
By: Dur-A-Flex     Published Date: May 14, 2018
Previous best practices for cleaning healthcare facilities centered on sanitizing frequently touched objects, such as bed rails or call buttons, because these objects were believed to be major sources of contagion. However, this new study finds that floors are the largest potential source of pathogens after reviewing five participating Cleveland-area hospitals. Specifically, the following findings are highlighted in the study: • Patient room floors in five hospitals were found to be contaminated with healthcare-associated pathogens. • High-touch objects often came to be in direct contact with the floor. • Touching objects on the floor frequently resulted in transfer of pathogens to hands. • Floors in hospital rooms are overlooked as a source for pathogen dissemination, with potentially dangerous results.
Tags : 
     Dur-A-Flex
By: Darktrace     Published Date: Jun 17, 2019
Trek is one of the world’s largest bicycle companies, producing more bikes in the United States each year than any other company. As a leading manufacturer of high-quality bicycle components and technologies, Trek considers the protection of its intellectual property and designs of paramount importance.
Tags : 
     Darktrace
By: Darktrace     Published Date: Jun 21, 2019
Trek is one of the world’s largest bicycle companies, producing more bikes in the United States each year than any other company. As a leading manufacturer of high-quality bicycle components and technologies, Trek considers the protection of its intellectual property and designs of paramount importance.
Tags : 
     Darktrace
By: VMware AirWatch     Published Date: May 19, 2016
In the cacophony of business headlines, news of data security breaches come through like a high-tempo drum beat. In fact, the number of incidents keeps growing at a rate of 66 percent CAGR, with a cost per breach of $5.9 million. And some of the world’s most recognized brands are sustaining bruises to their reputations and harmful hits to their bottom lines as they scramble to repair the damages. Enterprise IT organizations are facing an elusive enemy perpetrators who range from sophisticated cyber criminals and government-sponsored spies to hackers and script kiddies, and who have motives as diverse as money, politics, or simply youthful mischief.
Tags : data security, enterprise, data protection, mobile security, anti spyware
     VMware AirWatch
By: VMware AirWatch     Published Date: May 19, 2016
Innovation in business mobility is adding up to opportunity for the enterprise— opportunity to accelerate employee productivity, increase collaboration, and streamline business processes through mobile applications. At the same time, IT organizations are keen to control costs and maintain safeguards around their corporate information. With the goal of striking a balance between opportunity and control, increasing numbers of IT decision makers are adopting enterprise mobility management (EMM) solutions. But how do you know your organization is poised to make the move to EMM, or if you should be leveraging more from an existing EMM solution? Here are five cues to consider that the time is right to adopt EMM for your organization.
Tags : innovation, opportunity, best practices, productivity, mobile, application
     VMware AirWatch
By: VMware AirWatch     Published Date: May 19, 2016
We work at home. We take conference calls in the backseat of a taxi. We even tap out emails from 30,000 feet. Mobility is radically redefining the way we work, because it’s redefining where and when we can work. It’s why Keith Perske, executive managing director of workplace innovation for Collier’s, thinks it’s time to adopt a new description of the workplace: “Today’s workplace is an integrated set of locations, technology, programs and work practices that connect people and enable employees to contribute and be productive. That’s the new workplace definition.” And with the emergence of this modern workplace, users are expecting a mobile experience that’s simple, convenient, and a boon to their productivity. In order to deliver on these expectations, IT organizations are making business mobility a priority in their investment decisions. Which is why we’ve identified five potent mobility trends that warrant attention and also present opportunities to transform the enterprise
Tags : technology, innovation, work practices, best practices, mobility, trends
     VMware AirWatch
By: Trend Micro, Inc.     Published Date: Apr 29, 2009
Companies rely on knowledge assets, such as product formulas and customer databases. VPNs and network monitors can protect proprietary information from outsiders; but, they won't do much to prevent access by internal users. With the popularity of wireless networks, USB drives and other portable devices, it's all too easy for insiders to leak key data. This white paper explains how Trend Micro LeakProof 3.0 protects sensitive data at rest, in use, and in motion.
Tags : trend micro, data breach, breaches, data breaches, data loss prevention, dlp, hackers, data leak
     Trend Micro, Inc.
By: Trend Micro     Published Date: Aug 07, 2019
As the threat landscape evolves, organizations have accepted the fact that they have to take a more proactive detection approach to advanced threats rather than relying on traditional defenses. As a result, customers have turned to detection and response tools that allow for proactive “hunting” for Indicators of Attack (IoA) and reactive “sweeping” for indicators of compromise (IoCs). Once found, those tools are required to automatically respond to attacks or to at least provide for an action from the Incident Response (IR) staff. Unfortunately, due to the number and complexity of both these attacks and the detection/response tools, organizations struggle to hire enough qualified staff and stay on top of the discovered threats. This is compounded by a worldwide cybersecurity skills shortage. Managed detection and response (XDR) provides advanced threat hunting, detection, and response as a service to organizations that seek assistance for their own IR staff, or for those who wish to o
Tags : 
     Trend Micro
By: Trend Micro     Published Date: Oct 12, 2012
The security software you choose for virtual environments will have a significant impact on your organization's return on investment.
Tags : information technology, security, software, trend micro
     Trend Micro
By: Aimia     Published Date: Mar 25, 2014
Identify the most important inflection points along your customer journey from curious newcomers to brand loyalists. In this Retail Brief, learn the 10 most important loyalty moments of truth — and offer a few guidelines for getting them right.
Tags : aimia, inflection points, marketing, customer loyalty, customer interaction, loyalty program. post-purchase service, interaction data, purchase cycle
     Aimia
By: Bronto     Published Date: Feb 21, 2014
How will you maximize sales this year? What new strategies and automation tactics should you implement? With the constant evolution of commerce marketing, online retailers need to find new ways to reach customers and keep them engaged. This white paper offers interviews with Bronto’s marketing strategists as they provide insight on how to create personalized campaigns
Tags : bronto, marketing, ecommerce, online marketing, trends, marketing strategy, mobile marketing, purchasing
     Bronto
By: Veracode     Published Date: Oct 28, 2016
Trends and Tactics: How IT Professionals are Approaching AppSec Today
Tags : veracode, security, devops, appsec
     Veracode
By: Stratus Technologies     Published Date: Jan 31, 2017
he pursuits to reduce costs and avoid unplanned downtime remain primary operational goals in industrial plants. A convergence of factors has created an opportunity for industrial organizations such as manufacturing, oil and gas, chemicals and water treatment companies to aggressively pursue both. Although the pace of investment can be relatively slow in industrial automation (IA), technological advances, economic trends and market pressures have created an environment in which plants are compelled to modernize operational technology (OT) in order to ensure maximum efficiency and minimum process interruptions. Simply put, OT is getting old. The industrial sector is heavily capital-intensive and traditionally utilizes equipment with long lifecycles. Organizations with such outdated automation systems are in dire need of OT modernization to keep up with the pace of change, customer demands and business priorities, and reduce the risk of critical failures and costly downtime. Download th
Tags : stratus, performance improvements, downtime, operations, unplanned downtime, operational technology
     Stratus Technologies
By: CradlePoint     Published Date: Sep 04, 2014
Once considered experimental merchandising for adventurous retailers and cash-strapped entrepreneurs, pop-up stores have become an established national phenomenon and a legitimate means of testing product, generating buzz, building brand awareness, and driving sales for big-name retailers and ambitious upstarts alike. Growth in mobile broadband technology is expanding the possibilities for a diverse array of applications in mobile pop-up. Furthermore, the “fly-by-night” qualities that might have characterized early pop-ups have now been supplanted by dependable, secure infrastructure solutions that put temporary retail locations on par with their more permanent counterparts. Download the whitepaper to learn more!
Tags : pop-up stores, secure infrastructure solutions, mobile pop-up, cradlepoint
     CradlePoint
By: IBM     Published Date: Sep 30, 2016
Uncovering the Risks of SAP Cyber Breaches by Ponemon Institute How are organizations truly managing cybersecurity risks in their SAP ecosystem? Ponemon Institute’s latest study of 607 global IT security practitioners reveals senior level perceptions about SAP, its security challenges, and the risk of data breaches and cyberattacks.
Tags : ibm, security, ponemon institute, technology, fraud, sap, cyber breaches
     IBM
By: Infor     Published Date: Feb 27, 2007
There's no place to hide and ride out the fundamental transformation underway in the automotive industry today. Ignore changes caused by this transformation and you risk your long-term survival. But with pains can come gains, and innovative automotive executives know there's a way to turn today's adversity into long-term business advantage.
Tags : supply chain management, productivity, enterprise resource planning, manufacturing, customer satisfaction, manufacturing, automotive, assembly line
     Infor
By: TIBCO Software     Published Date: Sep 16, 2019
Para la mayoría de los equipos de operaciones de pago, el control de costos representa un gran dolor de cabeza -y en gran medida se origina del manejo de fraudes: • Los equipos de investigación dedican mucho tiempo solamente a reunir los datos necesarios para tomar decisiones. • Los motores de detección siempre están tratando de ponerse al día con los patrones de fraude más recientes. • Las regulaciones que cambian constantemente incrementan el tiempo y el costo necesarios para lograr el cumplimiento y cubrir los estándares de auditoría. Dado su alcance e impacto, reemplazar los sistemas de fraude centrales no es una opción para la mayoría de las empresas. Pero contrario a reemplazarlos, usted puede mejorar el proceso de investigación con la investigación aumentada, y mejorar el proceso de detección mediante el reforzamiento de los sistemas actuales. Este reporte describe tres formas en que las empresas de servicios financieros pueden utilizar las soluciones de TIBCO para reducir el
Tags : 
     TIBCO Software
By: TIBCO Software     Published Date: Sep 16, 2019
A maior dor de cabeça para a maioria das equipes de operações de pagamento é o controle de custos - e grande parte disso vem do gerenciamento de fraudes: • As equipes de investigação perdem muito tempo apenas reunindo os dados necessários para tomar as decisões. • Os mecanismos de detecção estão sempre se atualizando com os mais recentes padrões de fraude. • Os regulamentos em constante mudança aumentam o tempo e o custo necessários para alcançar a conformidade e atender aos padrões de auditoria. Dado seu escopo e impacto, substituir os principais sistemas de fraude não é uma opção para a maioria das empresas. Mas, em vez de substituí-los, você pode melhorar o processo investigativo com uma investigação ampliada e aprimorar o processo de detecção aperfeiçoando os sistemas atuais. Este relatório descreve três maneiras pelas quais as empresas de serviços financeiros podem usar as soluções TIBCO para reduzir o custo das investigações por meio de uma melhor detecção, e simplificar a co
Tags : 
     TIBCO Software
Start   Previous    539 540 541 542 543 544 545 546 547 548 549 550 551 552 553    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics