ad management

Results 176 - 200 of 2894Sort Results By: Published Date | Title | Company Name
Published By: Entrust Datacard     Published Date: Feb 05, 2016
Given the finite lifespan of SSL certificates and their widespread use throughout an organization, there are numerous reasons to take a lifecycle management approach. It’s critical to maintain an accurate accounting of SSL certificates that doesn’t rely on manual processes and tools. This guide — intended for IT and security professionals — outlines the key elements of a certificate lifecycle management process and how to provide adequate tools and training to implement this process.
Tags : 
    
Entrust Datacard
Published By: Adobe Systems, Inc.     Published Date: Oct 22, 2010
Adobe solutions for customer experience management enable businesses to elevate customer experiences to a whole new level. Every interaction with your customers is a moment of truth.
Tags : 
adobe systems, customer experience, crm, customer care, b2b, b2c, service, customer service
    
Adobe Systems, Inc.
Published By: Adobe Systems, Inc.     Published Date: Nov 15, 2010
Adobe solutions for customer experience management enable businesses to elevate customer experiences to a whole new level. Every interaction with your customers is a moment of truth.
Tags : 
adobe systems, customer experience, crm, customer care, b2b, b2c, service, customer service
    
Adobe Systems, Inc.
Published By: Adobe Systems, Inc.     Published Date: May 17, 2011
This paper highlights the advances in closed-loop marketing that enable measurement and optimization of digital marketing efforts. It also describes the challenges that CMOs face when pursuing digital marketing strategies and how next-generation WCM solutions help CMOs overcome those challenges.
Tags : 
adobe, cmo, digital marketing, organization transformation, chief marketing officer, customer experience management, wcm, multichannel pipeline growth
    
Adobe Systems, Inc.
Published By: Dell EMC     Published Date: Oct 08, 2015
Download this whitepaper to learn more about how to capture, analyze and manage a tidal wave of structured and unstructured data, turn this data into operational intelligence, And how to overcome the limitations of databases and data management tools that weren’t designed for a world of big data with Dell.
Tags : 
    
Dell EMC
Published By: CA Technologies     Published Date: Nov 12, 2014
A Technology Adoption Profile based on a custom survey of 102 North American and European enterprise IT decision-makers with knowledge of their company’s performance and capacity management capabilities.
Tags : 
application performance, capacity management capabilities, optimizing it capacity, the demands on the it department, performance optimization
    
CA Technologies
Published By: CA Technologies     Published Date: Feb 09, 2015
This paper provides information on how CA Unified Infrastructure Management (CA UIM) delivers the essential capabilities needed to help you proactively monitor and manage alarms, performance and SLAs across even the most dynamic and complex environments.
Tags : 
ca uim, it monitoring, client mobility, cloud services, ca unified infrastructure management, it infrastructure and services
    
CA Technologies
Published By: Dell     Published Date: Feb 04, 2016
Older PCs are a risk due to a lack of robust hardware-based security, older processors, and outdated operating systems. This Cheat Sheet paper discusses the points you should consider when selecting notebooks and laptops for your mobile and remote workforce. Download this paper today to learn about how combining the right hardware upgrades with newer OS options and endpoint management software can provide the needed protection against today’s security risks.
Tags : 
hardware, tpm, it security, windows, telecommunication, byod
    
Dell
Published By: Dell     Published Date: Oct 24, 2014
Employees are increasingly using bring-your-own devices (BYOD) to work and accessing corporate IT resources from home. Until now, management of BYOD within IT was piecemeal, with most organizations cob¬bling together solutions that included mobile device management software, unified access suites, security, and hardware. Read this technology brief to learn how Windows Server 2012 R2 takes the guesswork and integration out of BYOD security and administration, providing one point of control and management for IT organizations.
Tags : 
byod, mobile device mangement, secure mobility
    
Dell
Published By: Dell Brought to you by Intel     Published Date: Dec 09, 2013
When refreshing legacy servers, Brodart took the opportunity to migrate to a virtualization environment. Dell ™ vStart virtualization-ready infrastructure helps the company improve performance, simplify management, and reduce risk.
Tags : 
dell, vstart virtualization, server, virtualization infrastructure
    
Dell Brought to you by Intel
Published By: Collaborative Consulting     Published Date: Dec 20, 2013
In this case study, a company needed to find a way to update and improve a legacy trade portal application. With the help of Collaborative, using domestic resources, the company completely replaced several legacy trade portal applications, allowing for the retirement of several application platforms and legacy databases.
Tags : 
collaborative consulting, trade portal, right price, infrastructure, better application, business documentation, inspire engagement, financial metrics
    
Collaborative Consulting
Published By: Dell     Published Date: May 04, 2015
Read this white paper and learn how: • Cloud technology bridges the gap between IT and the business, but on-premises cloud deployments often offer a lower TCO than the public cloud. • Dell enables organizations to create and manage cloud solutions customized to unique needs. • Organizations have several options for building a cloud infrastructure based on Dell solutions. • In the realm of cloud computing, Dell differentiates itself through servers, storage, networking, and integration with infrastructure and management tools. • Implementing a cloud environment requires stakeholder identification, as well as resources and capabilities.
Tags : 
    
Dell
Published By: Dell     Published Date: Feb 02, 2015
Windows 8.1 is ready to give your business the tools you need to meet your workers' changing IT needs in a way that's reliable, productive and secure. Designed to respond equally well to touch as it does to a keyboard and mouse, read this paper to learn more about how the new Windows addresses today's workforce needs by enhancing mobile productivity, end-to-end security, and addresses virtualization and management advancements.
Tags : 
dell, windows, productivity, security, apps, integration, platforms, microsoft
    
Dell
Published By: HPE     Published Date: Mar 23, 2015
With new technologies, new opportunities often emerge, especially in business. The advent of innovations, such as social media and mobile devices, is changing the ways businesses interact with customers and the ways in which customers desire to be engaged. Opportunities arising from the benefits of salesforce automation, business intelligence (BI), and customer relationship management (CRM) applications are providing new levels of insight, helping businesses acquire customers more efficiently and retain those customers longer. As a direct result, organizations that invest in better understanding potential customers are likely to see higher returns than those organizations that possess a more limited understanding of their customer base. Seeking the competitive advantage resulting from improved customer focus, IT organizations have increased investment in business intelligence and analytics and the underlying infrastructure to support those applications.
Tags : 
    
HPE
Published By: MindTouch     Published Date: Oct 02, 2019
The dynamics of the customer journey are constantly expanding and evolving. Traditional “company-first” approaches to delivering service excellence are no longer sufficient. Instead, today’s forward-thinking companies know that a more “customer-first” approach is best. Read our MindTouch-sponsored whitepaper by Lori Bocklund, President of Strategic Contact and experienced industry veteran, as she explores the ties between new self-service entry points and a strong foundation rooted in knowledge management.
Tags : 
content strategy, customer journey, customer success, digital transformation, knowledge base
    
MindTouch
Published By: Dell     Published Date: May 09, 2017
Dell’s approach to PC Lifecycle management is designed to help customers make the change from IT maintenance to innovation all while controlling their PC infrastructure costs. With this eGuide IT professionals will learn how to deploy, secure, and support PCs with unparalleled efficiency leveraging Dell’s industry-leading hardware, services, and security solutions. Access the eGuide from Dell and Intel® and you will learn: • Why IT needs to take a different approach PC lifecycle management • The four critical stages of the PC lifecycle (Plan, Deploy, Manage, and Retire) • How to partner with Dell to strategically migrate to Windows 10 • What solutions can help in each phase to reduce costs and increase IT productivity • The latest security solutions to protect data and employees
Tags : 
it maintenance, pc lifecycle, pc infrastructure, pc support, pc lifecycle management
    
Dell
Published By: Dell EMC     Published Date: May 10, 2017
While just about everyone is writing about how IT and the businesses it serves need to be transformed, the actual industry answers to both digital and IT transformation remain unclear at best. Are transformational initiatives all about analytics and big data? Or are they about the move to cloud in all its varieties? Support for mobile? More agile ways of working and developing software? Or are they actually all about crafting teams to promote more proactive dialog between the business and IT? The truth is, of course, digital and IT transformation depend on all of the above and more. They also depend on a resilient infrastructure that’s easily adapted to changing business priorities without requiring long hours spent on maintenance, updates, and addressing problems of service availability. But making all this work clearly and cohesively is far beyond the purview of almost any solution today—whether from a software management perspective or from a hardware infrastructure perspective.
Tags : 
    
Dell EMC
Published By: Dell EMC     Published Date: Feb 07, 2018
VxRail appliances, now leveraging industry leading Dell PowerEdge servers, support business critical applications and workloads in many configurations providing required reliability, availability, flexibility and performance. Every organization has its own set of business critical applications. For instance: - Database applications such as Microsoft SQL server and Oracle - Customer Relationship Management (CRM) applications such as SAP - E-mail applications such as Microsoft Exchange -Collaboration applications, such as Microsoft SharePoint Intel Inside®. Powerful Productivity Outside. Intel logo are trademarks of Intel Corporation or its subsidiaries in the U.S. and/or other countries.
Tags : 
    
Dell EMC
Published By: FICO     Published Date: Aug 27, 2012
When automating decisions, organizations need a platform for defining the policies and regulations that drive those decisions. Choosing the right business rules management system is not enough to pick the right technology.
Tags : 
business rules, fico, blazeadvisor, business rules management system, brms
    
FICO
Published By: IBM APAC     Published Date: Jun 21, 2019
Understanding cloud environments and making decisions about multiloucd management can be complex. Questions arise, such as how organizations need to change in this multicloud world. Working with enterprise customers, IBM has identified ten key pain points and related best practices that help organizations successfully navigate these transformations. This covers the following key pain points: • Cost transparency and visibility • Dynamic, up-to-date Catalog • IT to operate in two, connected models • Standardized consumption • Aggregated services for added value • Integration remains a necessity • Control without obstruction • Challenges of user management • Primary consumption: Machine-to-machine purchase • Internal and external IT role changes
Tags : 
    
IBM APAC
Published By: Creative Lodging Solutions     Published Date: Apr 16, 2015
Hotel room prices account for only a fraction of total corporate lodging costs. What could your company be overlooking? Read our “The Total Cost of Lodging” white paper to discover: •The top 3 largest costs in lodging management •The percentage of inaccurate hotel invoices •How to save on lodging Find expert answers to rising hotel rates, inaccurate billing, and inefficient systems. Read more to find out how to make your lodging program better!
Tags : 
travel management, lodging, domestic, corporate, costs, trip, human resources
    
Creative Lodging Solutions
Published By: Diligent Corporation     Published Date: Jun 29, 2015
This white paper shows how board portals can help directors and company secretaries be more effective and secure in how they communicate.
Tags : 
board portal, advantages board portal, sharing documents, sharing information, benefits of board portals, electronic board solution, electronic board meeting, electronic board papers
    
Diligent Corporation
Published By: Akamai Technologies     Published Date: Sep 11, 2017
Malicious botnets present multiple challenges to enterprises — some threaten security, and others merely impact performance or web analytics. A growing concern in the bot environment is the practice of credential stuffing, which capitalizes on both a bot’s ability to automate repeat attempts and the growing number of online accounts held by a single user. As bot technologies have evolved, so have their methods of evading detection. This report explains how the credential stuffing exploit challenges typical bot management strategies, and calls for a more comprehensive approach.
Tags : 
web analytics, frost & sullivan, bot management, botnet
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Sep 11, 2017
Bots are responsible for 30% to 70% of website traffic. They have many purposes, range from good to middling to bad, and from simple to sophisticated. Bot management solutions vary a lot too. Vendors say they can solve your bot problems. Can they? The bot management market is evolving, with many vendors of different sizes, experiences and capabilities. It’s important to solve your bot problems without getting in the way of business. In this ebook, you’ll get insight into how to evaluate bot management solutions and understand what the differences mean for you.
Tags : 
credential abuse, bots, marketing, bot management, bot solutions
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Jul 25, 2019
Heutzutage zählen die Identität der Kunden und die damit verbundenen persönlichen Daten zu den wichtigsten und wertvollsten Ressourcen jedes Unternehmens. Die Verwaltung dieser digitalen Identitäten (von der ersten Registrierung und Anmeldung bis zu den späteren Phasen der Kundenbeziehung) und die Verwertung der dazugehörigen Daten sind komplexe Aufgaben, die häufig als CIAM (Customer Identity and Access Management) bezeichnet werden. Wenn Unternehmen ein System zur Erfassung, Verwaltung und Nutzung von Daten zu digitalen Identitäten und Kunden implementieren, haben sie grundsätzlich zwei Möglichkeiten: Sie können ein eigenes Produkt entwickeln oder eine dedizierte Lösung von einem auf CIAM spezialisierten Anbieter kaufen. In diesem Whitepaper finden Sie eine detaillierte Analyse der CIAM-Implementierungsoptionen, darunter Folgendes: ? die wichtigsten Voraussetzungen für ein erfolgreiches CIAM-System für Unternehmen ? Vor- und Nachteile verschiedener Varianten der CIAM-Implementierun
Tags : 
    
Akamai Technologies
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search Resource Library