RSS feed Get our RSS feed

News by Topic

scribe

Results 576 - 600 of 852Sort Results By: Published Date | Title | Company Name
By: Bronto     Published Date: May 31, 2018
We subscribed to the email lists of 50 brands in the Internet Retailer Top 1000 to see what type of personalization and triggered messages they use to entice customers back to their websites. What you'll learn: • How effectively brands are using customer data to nudge them back onto the purchase path. • How triggered messages can better engage customers and keep them coming back. • How browse and cart recovery can rescue revenue that would otherwise be lost.
Tags : revenue, email, internet, retailer, website
     Bronto
By: IBM     Published Date: Jul 07, 2015
This white paper describes the pervasive lack of resiliency planning in most cloud implementations today and discusses how better up-front assessment and planning can help organizations realize the enormous potential cloud offers for improved, more agile resiliency.
Tags : ibm, resilience, cloud, design, sustain
     IBM
By: Oracle HCM Cloud     Published Date: Jun 07, 2016
Retailers face many challenges to attracting top talent in today's market. Job seekers often apply for multiple positions simultaneously, so building a strong brand is critical to winning the best candidates. This white paper describes a 3-step process for recruiting and retaining the best employees—and keeping them performing at their highest potential.
Tags : 
     Oracle HCM Cloud
By: AstuteIT_ABM_EMEA     Published Date: Feb 02, 2018
Se prevé que los ciberataques tendrán un coste de 6 billones de dólares para la economía mundial en 2021, en comparación con los 3 billones de dólares de 2016. Algunos los describen como «la mayor amenaza para empresas de todo el mundo». La preocupación pública por la seguridad de los datos está aumentando, no solo por los delitos que se cometen con los datos sustraídos, sino también por cómo usan nuestros datos personales las empresas con las que interactuamos.
Tags : rgpd, repercusion, entorno, gestion, datos
     AstuteIT_ABM_EMEA
By: Flimp Media     Published Date: Jan 21, 2010
This report, which describes the emergence of Intelligent Digital Collateral (IDC) as a valuable top-line segment of the overall rich media and video marketing category, discusses how rich media marketing isn't just for advertising anymore.
Tags : flimp, b2b, idc, intelligent digital collateral, digital sales, analytics, rich media, social media
     Flimp Media
By: HP VMware     Published Date: Mar 03, 2008
Blades are one of the fastest-growing segments in the IT industry. This white paper examines the requirements for servers, storage, and blade systems in the midmarket; describes the features and capabilities of the HP c3000; and outlines some of the challenges and opportunities HP will face as it seeks to extend its innovative HP BladeSystem c-Class product line to serve the needs of the midmarket.
Tags : blades, blade server, bladesystem, blade system, storage, virtual storage, hp vmware
     HP VMware
By: Blue Prism     Published Date: Mar 28, 2019
Robotic process automation describes the use of technology to automate tasks that are traditionally done by a human being. The technology itself mimics an end user by simulating user actions such as navigating within an application or entering data into forms according to a set of rules. RPA is often used to automate routine administrative tasks that typically require a human being to interact with multiple systems, but RPA technology is evolving to support the automation of increasingly sophisticated processes at scale within enterprise architectures rather than on the desktop. Over the past two years, RPA has been adopted by a number of business process outsourcing (BPO) providers and a growing number of end-user organizations are now deploying the technology themselves to create “virtual workforces” of robotic workers.
Tags : 
     Blue Prism
By: Neustar     Published Date: Nov 16, 2009
Mobile has hit the mainstream in the U.S. At the end of 2009, the number of mobile subscribers had grown to 280 million, reaching 87% of U.S. households. The availability of unlimited data and text messaging plans has pushed consumer mobile usage beyond voice to text messaging and Internet access.
Tags : sms mobile, neustar, roi, csc, common short code, mobile marketing, two-way communication, mobile
     Neustar
By: IBM     Published Date: Oct 17, 2013
ROI: The Value of Deployment Automation explains how a deployment automation framework can streamline release operations and increase business agility. The document describes the benefits of Deployment Automation. In addition, the whitepaper contains a formula for calculating the ROI of a Deployment Automation solution.
Tags : ibm, roi, deployment automation, deployment, automation, roi, automation framework, visibility
     IBM
By: Epicor     Published Date: Feb 02, 2011
This paper describes how the software as a service (SaaS) model delivers financial, implementation, and operational benefits to job shops and small manufacturers.
Tags : epicor, saas erp, enterprise resource planning, manufacturer, software as a service, cost of ownership
     Epicor
By: Symantec     Published Date: Nov 21, 2014
Computer viruses are yesterday’s news; automated attacks that morph rapidly, concealing themselves through encryption and deceptive packaging, are the new hotness. This paper describes how to start with improved malware reporting and gateway monitoring and how to combine this output with security intelligence from both internal and external resources. Forward thinking organizations use these and other techniques promoted by frameworks such as the Critical Security Controls. The key is to—as quickly as possible—detect hostile activity, identify and locate affected systems and devices, and respond appropriately.
Tags : computer viruses, automated attacks, encryption, deceptive packaging, security controls, security
     Symantec
By: Quest Software, Inc.     Published Date: Nov 18, 2010
This white paper describes how real organizations have handled these challenges and how a strong and reliable messaging solution like Quest Recovery Manager for Exchange could have mitigated risk, reduced cost, and improved regulatory compliance.
Tags : quest software, messaging, microsoft exchange server, quest recovery manager, business communication, migration, consolidation
     Quest Software, Inc.
By: Melissa Data Corp.     Published Date: Nov 18, 2008
This white paper describes the seven steps you need to develop a plan for data quality – one that scales to your growing business needs.
Tags : melissa data, data quality, contact data verification, address verification, validate address, address verification software, address verify, address validation software
     Melissa Data Corp.
By: Melissa Data     Published Date: Nov 18, 2008
This white paper describes the seven steps you need to develop a plan for data quality – one that scales to your growing business needs.
Tags : melissa data, data quality, contact data verification, address verification, validate address, address verification software, address verify, address validation software
     Melissa Data
By: Commvault ABM Oct     Published Date: Feb 15, 2018
Enterprises and managed service providers (MSPs) have some similar challenges in the realm of data protection. Both have to deal with expansive environments—with enterprises protecting distributed offices/geographies, and MSPs protecting many independent subscribers. Both also have been seeing production data storage and secondary protection storage demands rising. Enterprises and MSPs alike should therefore be looking for data protection architectures that have scale-out capabilities built into their core foundation.
Tags : data protection, msps, data storage, scale out data protection
     Commvault ABM Oct
By: Infosys Technologies Limited     Published Date: Sep 22, 2010
This white paper describes creating a governance framework for managing identity.
Tags : governance, compliance, identity analytics, identity management
     Infosys Technologies Limited
By: Webroot UK     Published Date: Feb 04, 2013
This case study describes how one of the UK’s leading charities used the Webroot® Web Security Service to resolve problems with its existing Web security solution, which revolved mainly around administration and reporting. In addition, since the vast majority of Scope’s workers are mobile the organization needed a solution to protect them.
Tags : scope charity, disabled, services, opportunities, complex, support, peer-to-peer suppot, education and learning
     Webroot UK
By: Cisco     Published Date: Dec 11, 2018
The goal of this review is to educate customers on the capabilities that Cisco’s SD-WAN solution provides when working with Amazon Web Services (AWS). ESG describes Cisco’s solution and highlights the business value it can deliver to customers via its integration with AWS. ESG completed this summary as part of an AWS-commissioned report to review nine SD-WAN vendors. Readers should use this review as a starting point when investigating how they can leverage the combination of AWS and Cisco for business advantage. I would like to receive email communications about products & offerings from Cisco & its Affiliates. I understand I can unsubscribe at any time. For more information on how Cisco collects and uses personal information, please see the Cisco Online Privacy Statement.
Tags : 
     Cisco
By: Citrix Systems, Inc.     Published Date: Jan 19, 2016
This white paper will put SDN into the context of a broad movement to have more of a focus on software based solutions and it will identify the key opportunities that SDN can address. It will also discuss both SDN and NV and will describe the relationship between these two emerging approaches to networking.
Tags : citrix, network, software design
     Citrix Systems, Inc.
By: Net Atlantic     Published Date: Nov 27, 2017
Essential steps you need to take to reach your subscribers’ inbox.
Tags : 
     Net Atlantic
By: IBM     Published Date: May 12, 2015
This white paper describes a holistic approach to healthcare cybersecurity, which incorporates sophisticated big data analytics to help better protect and secure the vast array of data healthcare organizations maintain.
Tags : healthcare, cybersecurity, big data, security
     IBM
By: MobileIron     Published Date: Jul 31, 2015
Most large organizations deploy or intend to deploy a broad range of mobile apps to their employees for productivity, collaboration, CRM, ERP, analytics, and industry-specific business processes. Office 365 might be the productivity solution, but the IT team needs a central platform that can provide a consistent security and policy framework across all the mobile apps the organization will deploy both today and tomorrow. This whitepaper describes the MobileIron app security model and how it can be used to secure Office 365 for mobile devices.
Tags : office 365, mobileiron, crm, erp, analytics, security model, mobile apps
     MobileIron
By: MobileIron     Published Date: Aug 04, 2016
This whitepaper describes the MobileIron app security model and how it can be used to secure Office 365 for mobile devices.
Tags : office 365, mobileiron, crm, erp, analytics, security model, mobile apps
     MobileIron
By: Symantec.cloud     Published Date: Nov 29, 2010
This three-part report describes how all businesses can benefit from SaaS services, in particular the variety of services that make up hosted services from Symantec.
Tags : messagelabs symantec hosted services, mobile workforce, saas services, security, management policies, distributed workforce
     Symantec.cloud
By: Symantec Corporation     Published Date: Feb 25, 2014
The efficacy of code signing as an authentication mechanism for software depends on the secure storage of code signing private keys used by software publishers. Companies that are diligent and willing to invest in the appropriate security measures can make the compromise of their private keys highly unlikely. This white paper describes recent security breaches and why they may have happened, along with best practices, especially for the Windows platform, which can help to safeguard the private keys associated with code signing certificates.
Tags : symantec, stuxnet, cyber-attack, security, certificate authority
     Symantec Corporation
Start   Previous    17 18 19 20 21 22 23 24 25 26 27 28 29 30 31    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics