RSS feed Get our RSS feed

News by Topic

asp

Results 1 - 25 of 564Sort Results By: Published Date | Title | Company Name
By: Sage     Published Date: Oct 17, 2013
See why an appropriate time and attendance system that meets your organization’s needs can help to eliminate and prevent most of the negative aspects of inaccurate and unreliable timekeeping for your business.
Tags : employee productivity, workforce management, company culture, employee performance
     Sage
By: IBM     Published Date: Apr 20, 2017
Protecting confidential data while keeping mobile users productive. The terms Data Leak Prevention (DLP) and Container are beginning to dominate the mobile management conversation. Over the past few years great strides have been made in providing the tools and solutions that offer management and security for mobile devices; both for devices the enterprise owns and those that employees own. While these solutions generally meet the need to secure the device, they have been lacking in some of the more sophisticated security aspects that are commonplace in laptop and distributed network deployments. Specifically lacking are the robust DLP controls common in laptop management solutions.
Tags : 
     IBM
By: Kaspersky     Published Date: Feb 05, 2015
This Kaspersky guide shows the benefits that only and Integrated Platform Security Solution can bring.
Tags : integrated platform security, security solution, integrated security technologies, endpoint protection platforms, epps
     Kaspersky
By: IBM     Published Date: Feb 02, 2017
Many marketers are trying to better understand the customer journey, but factors such as a lack of data and system integrations, breakdowns in process, misguided focus, and inattention to key aspects of the buyer experience are preventing them from doing so. Learn how you can overcome these challenges and many others to deliver a better customer experience and drive more revenue.
Tags : ibm, marketing, commerce, customer journey, crm & customer care
     IBM
By: Carbon Black     Published Date: Aug 20, 2018
Companies are facing massive cyber security challenges – many of which are rooted in the endpoint. In fact, according to IDC, 70% of successful breaches begin at the endpoint. If you are a Kaspersky Lab customer, and still have breaches in your endpoint security, then something isn’t working. Perhaps you’re struggling to prevent advanced attacks, or your security team may be burdened by maintaining overly complex policies. You and your end users may even be facing performance issues. If you are experiencing any of these issues, then your endpoint security products may actually be creating more problems than they solve. Ask these questions and find out for yourself.
Tags : 
     Carbon Black
By: Uberall     Published Date: Oct 08, 2018
Your store locator is a critical component on your website; it’s the moment of truth when an online shopper becomes and offline customer. And while it may seem like a simple tool, there are several key factors that will transform the user experience from functional to best-in-class. See how you can optimize this key aspect of your customer journey.
Tags : store, locator, experience, optimize, local marketing, customer journey
     Uberall
By: Uberall     Published Date: Apr 12, 2019
Your store locator is a critical component on your website; it’s the moment of truth when an online shopper becomes an offline customer. And while it may seem like a simple tool, there are several key factors that will transform the user experience from functional to best-in-class. See how you can optimize this key aspect of your customer journey.
Tags : locator, uberall, store locator, location marketing, local listings
     Uberall
By: Cox Communications     Published Date: Nov 10, 2014
One of the most fundamental aspects of marketing your business is having the right technology in place, And at the forefront of your technology hub should be a reliable phone service. Having a dependable phone network your company can is vital in more ways that one. Even in today's world of competing technology and emerging tech-trends, a proper phone system is the link that enables you to connect with anyone, from co-workers down the hallway to the business partner on the other side of the globe.
Tags : tech-trends, voip, pbx, hosted pbx, sip, ports, did, pots
     Cox Communications
By: Visier     Published Date: Jul 08, 2014
Read the results of the 2014 Workforce Analytics and Planning survey where over 300 U.S.-based employers answered questions about their current workforce analytics and planning practices, investments, and future plans. Download the full report and discover key trends, including how 91% of companies aspire to increase their workforce analytics maturity over the next 24 months.
Tags : visier, workforce analytics, hr metrics, planning
     Visier
By: Adobe     Published Date: Aug 02, 2017
Customer experience (CX) continues to dominate the agenda, and it is clear from the research that retailers collectively grasp the importance of a personalised and mobilefriendly experience which is relevant at every stage of the customer journey. It makes absolute sense for retailers to focus on optimising the mobile experience as part of their CX initiatives. CX is a differentiator for retail brands and, as part of this trend, the mobile experience in particular will increasingly define your brand.
Tags : digital skills, culture, strategy, data management, processing, technology, ux design
     Adobe
By: Microsoft Azure     Published Date: Apr 10, 2018
Prepare your business for the future of customer service. In a world where price and product can easily be matched, customer experience has become a key brand differentiator. It’s never been more important to understand customer expectations, perceptions, preferences, and trends. The 2017 Microsoft State of Global Customer Service report found that customer service impacts brand choice and loyalty for 96% of consumers around the globe. The 32-page report offers insights from 5,000 survey participants. Learn how you can stay ahead of the competition and earn customers for life with intelligent customer service. Find trend details and actionable data on: The growing importance of service in a customer’s choice of or loyalty to a brand The most important aspects of a good customer service experience The most frustrating aspects of a poor customer service experience Expectations of the millennial customer segment Channel preferences based on geography Customer expectations for self-serv
Tags : 
     Microsoft Azure
By: Dome9     Published Date: Apr 25, 2018
Last year at this time, we forecast a bumpy ride for infosec through 2017, as ransomware continued to wreak havoc and new threats emerged to target a burgeoning Internet of Things (IoT) landscape. ‘New IT’ concepts – from DevOps to various manifestations of the impact of cloud – seemed poised to both revolutionize and disrupt not only the implementation of security technology, but also the expertise required of security professionals as well. Our expectations for the coming year seem comparatively much more harmonious, as disruptive trends of prior years consolidate their gains. At center stage is the visibility wrought by advances in data science, which has given new life to threat detection and prevention – to the extent that we expect analytics to become a pervasive aspect of offerings throughout the security market in 2018. This visibility has unleashed the potential for automation to become more widely adopted, and not a moment too soon, given the scale and complexity of the thre
Tags : 
     Dome9
By: Akamai Technologies     Published Date: Mar 19, 2019
All three of our stories in this issue of the State of the Internet / Security report are about things most organizations aren’t examining. Whether the cause is that organizations don’t perceive some issues as important to their environment, if they don’t have tooling to monitor these issues, or if the resources to monitor this traffic are not available, this traffic is often being overlooked. Each of the stories in this issue of the State of the Internet / Security report looked at aspects of security (credential abuse/APIs/IPv6) that are often overlooked by the mainstream but are nevertheless important to day-to-day operations. These stories create a backdrop for what we expect to see in the upcoming quarters and years.
Tags : 
     Akamai Technologies
By: AstuteIT_ABM_EMEA     Published Date: Feb 28, 2018
Viele Unternehmen, die einen Wechsel in die Cloud in Angriff nehmen, verlagern erst einmal sekundäre Daten vor Ort in den Cloud-Speicher. Bei Kosten von einem Bruchteil eines Cents pro Gigabyte ist der wirtschaftliche Aspekt sehr interessant – wer möchte nicht von drastisch gesenkten Speicherkosten profitieren? Die Entscheidung, Petabyte von Daten in die Cloud zu senden, sollte jedoch nicht leichtfertig getroffen werden. Wir bei Veritas wissen, dass eine solide Datenverwaltung in der Cloud vor allem globale Datentransparenz voraussetzt. Nachdem Sie Ihre Daten verstanden und visualisiert haben, können Sie: • SIE KLASSIFIZIEREN • SIE VERLAGERN • DATENANOMALIEN IDENTIFIZIEREN Im Folgenden finden Sie wichtige Tipps, mit denen sichergestellt wird, dass der Wechsel in die Cloud erhebliche Kosten einspart und gleichzeitig Datenrisiken vermeidet.
Tags : bestimmungen, cloud, astute, speicher, unternehmen
     AstuteIT_ABM_EMEA
By: Astute IT DACH     Published Date: Feb 28, 2018
Viele Unternehmen, die einen Wechsel in die Cloud in Angriff nehmen, verlagern erst einmal sekundäre Daten vor Ort in den Cloud-Speicher. Bei Kosten von einem Bruchteil eines Cents pro Gigabyte ist der wirtschaftliche Aspekt sehr interessant – wer möchte nicht von drastisch gesenkten Speicherkosten profitieren? Die Entscheidung, Petabyte von Daten in die Cloud zu senden, sollte jedoch nicht leichtfertig getroffen werden. Wir bei Veritas wissen, dass eine solide Datenverwaltung in der Cloud vor allem globale Datentransparenz voraussetzt. Nachdem Sie Ihre Daten verstanden und visualisiert haben, können Sie: • SIE KLASSIFIZIEREN • SIE VERLAGERN • DATENANOMALIEN IDENTIFIZIEREN Im Folgenden finden Sie wichtige Tipps, mit denen sichergestellt wird, dass der Wechsel in die Cloud erhebliche Kosten einspart und gleichzeitig Datenrisiken vermeidet.
Tags : bestimmungen, cloud, astute, speicher, unternehmen
     Astute IT DACH
By: SAS     Published Date: Mar 06, 2018
Despite heavy, long-term investments in data management, data problems at many organizations continue to grow. One reason is that data has traditionally been perceived as just one aspect of a technology project; it has not been treated as a corporate asset. Consequently, the belief was that traditional application and database planning efforts were sufficient to address ongoing data issues.
Tags : 
     SAS
By: Palo Alto Networks     Published Date: Dec 04, 2015
Simplify your maintenance management software evaluation process with this 2015 software pricing guide!
Tags : palo alto, maintenance management, pricing guide, software guide
     Palo Alto Networks
By: Cornerstone OnDemand     Published Date: Jul 28, 2017
Employee management tools that are paper-driven and spreadsheet-oriented are no longer viable workforce development strategies. The modern worker wants performance evaluations to be goal-oriented and feedback-focused, with learning opportunities that are self-driven and personalized to their own career aspirations. Combining Performance with Learning helps employees and managers create meaningful career-building plans that lead to bottom line growth.
Tags : management tools, performance evaluations, bottom line growth, workforce development
     Cornerstone OnDemand
By: Cornerstone OnDemand     Published Date: Jan 31, 2018
Employee management tools that are paper-driven and spreadsheet-oriented are no longer viable workforce development strategies. The modern worker wants performance evaluations to be goal-oriented and feedback-focused, with learning opportunities that are self-driven and personalized to their own career aspirations. Combining Performance with Learning helps employees and managers create meaningful career-building plans that lead to bottom line growth.
Tags : 
     Cornerstone OnDemand
By: Cornerstone OnDemand     Published Date: Jun 29, 2018
Employee management tools that are paper-driven and spreadsheet oriented are no longer viable workforce development strategies. The modern worker wants performance evaluations to be goal oriented and feedback-focused, with learning opportunities that are self-driven and personalized to their own career aspirations. Combining Performance with Learning helps employees and managers create meaningful career-building plans that lead to bottom line growth.
Tags : growth, strategy, development, spreadsheet, workforce
     Cornerstone OnDemand
By: Tyco Integrated Security     Published Date: Dec 08, 2014
Security measures are becoming important aspects of new business opportunities. See how they are benefitting businesses beyond simply securing the environment.
Tags : video surveillance, access control, business intelligence, security
     Tyco Integrated Security
By: Marathon Technologies     Published Date: Sep 18, 2009
Many businesses struggle to guarantee application and data availability for Windows applications. They may protect the application from one type of outage (like a disk failure) while ignoring other risks. Or they can end up deploying multiple point solutions to handle different aspects of availability, increasing overall cost and complexity.
Tags : marathon, downtime, everrun, server, failure, outage, windows, sql
     Marathon Technologies
By: Aspect Software     Published Date: Nov 06, 2014
Learn about the 7 critical capabilities to look for when deploying a cloud contact center solution.
Tags : aspect, cloud, cloud contact center, contact center, customer service
     Aspect Software
By: Cornerstone OnDemand     Published Date: Aug 27, 2015
We believe that to be the best leader you can be, you need to be a fearless, bold, effective coach on a daily basis. Aspirational, right? The path to greatness seldom runs smoothly though, so here are a few strategies to get you started.
Tags : management, applications, software, productivity, workflow
     Cornerstone OnDemand
By: OnForce     Published Date: Apr 22, 2007
“8 Ways Every Solution provider Can Profit from Rollouts Now” demonstrates how rollouts are creating strong sales opportunities for solution providers of all sizes. Importantly, it also addresses how solution providers have finally “cracked the code” of transforming this high-volume business, which is extremely service intensive, into a high-profit business via innovative on-site service delivery models that let them find the contract IT service professionals they need, right when they need them.
Tags : service model, roll-out, rollout, roll-outs, rollouts, customer service, var, vars
     OnForce
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics