attention

Results 201 - 225 of 290Sort Results By: Published Date | Title | Company Name
Published By: Oracle Corporation     Published Date: Mar 03, 2011
Read this white paper to learn how BI can combine your explicitly-defined business rules and automatically-identified statistical information to deliver the best possible content to your customers for every single interaction.
Tags : 
customer attention, decision management, performance goals., real time management, oracle
    
Oracle Corporation
Published By: Oracle Corporation     Published Date: May 11, 2012
Read this white paper to learn how BI can combine your explicitly-defined business rules and automatically-identified statistical information to deliver the best possible content to your customers for every single interaction.
Tags : 
oracle, busines intelligence, business intelligence applications, bi applications, bi apps, 11g, cross-value, decision, analytics, functional, flow, manage, customers
    
Oracle Corporation
Published By: Oracle Social Cloud     Published Date: Feb 17, 2015
Last year's Super Bowl was disappointing on every level and simply could not live up to the hype. 2015 could not have provided a more opposite result. This was the year of the emotional rollercoaster. NBC is known for their heartfelt sports coverage and has mastered the art of storytelling, all on full display for Sunday's game. The network leveraged all their best tactics with outstanding results. The game was high drama at its best and kept the audience engaged to the very end. Brands had serious competition from the games itself this year, but brought their own flood of emotions with some familiar storylines that garnered significant social conversation volume to very unexpected commercials eliciting strong negative feedback. In this analysis we will examine how brands used social media to continue the conversation, leverage assets and advocates, and even create intentional mistakes to earn attention.
Tags : 
oracle, brand strategy, super bowl, social media strategy, engagement, continuing the conversation
    
Oracle Social Cloud
Published By: OutSystems     Published Date: Oct 12, 2015
The Ovum Decision Matrix: Selecting a Mobile App Development Platform Solution highlights what companies should be looking for in a MADP solution. Given the amount of time, energy, money, anxiety, and attention that is being aimed at enterprise mobility right now, this report is quite timely.
Tags : 
outsystems, ovum, madp, mobile app, application development, ovum decision matrix, platform
    
OutSystems
Published By: Palo Alto Networks     Published Date: Jun 09, 2014
Cybersecurity has become a leading topic both within and beyond the corporate boardroom. This attention is well-founded and marks a transition from information security being a concern primarily for businesses and governments to it being broadly acknowledged as an issue that impacts and requires the attention of everyone, from individual consumers to entire countries.
Tags : 
palo alto, security, network security, threats, malware, zero trust, breach, security breaches, network protection, cybersecurity
    
Palo Alto Networks
Published By: Palo Alto Networks     Published Date: Apr 25, 2017
Security practitioners and threat actors are constantly developing new techniques to gain advantages over the other. In recent years, security teams have stepped up their approaches to protecting their infrastructure by fortifying their network perimeter defenses, building up protections against advanced malware, upgrading vulnerable operating systems, automating the delivery of patches to stop exploits, and developing counter-measures to spot intruders. The threat actors looking to circumvent these measures are shifting their attention toward the next weakest link in the security chain – the user.
Tags : 
    
Palo Alto Networks
Published By: Pega     Published Date: Apr 04, 2016
Millennials are different than any other generation before them. They are making major decisions later in life—from choosing a career, getting married, buying a home and yes, investing in life insurance. And while they are more tech savvy than their predecessors and want to make purchasing from any device of their choosing, they still value face-to-face interaction, contrary to popular belief. Insurance and financial companies need to understand the unique dynamics of the millennial generation in order to better service and exceed expectations of this growing consumer base. They need to meet their tech-savvy expectations, while also understanding Millennials still value one-to-one attention. In fact, 48% of Millennials said they would be more likely to make a speedy financial or insurance-related decision if a person who they trusted took the time to explain the benefits and risks. Download this whitepaper and learn how to better tap into the growing millennial market.
Tags : 
    
Pega
Published By: Pega     Published Date: May 24, 2016
Millennials are different than any other generation before them. They are making major decisions later in life—from choosing a career, getting married, buying a home and yes, investing in life insurance. And while they are more tech savvy than their predecessors and want to make purchasing from any device of their choosing, they still value face-to-face interaction, contrary to popular belief. Insurance and financial companies need to understand the unique dynamics of the millennial generation in order to better service and exceed expectations of this growing consumer base. They need to meet their tech-savvy expectations, while also understanding Millennials still value one-to-one attention. In fact, 48% of Millennials said they would be more likely to make a speedy financial or insurance-related decision if a person who they trusted took the time to explain the benefits and risks. Download this whitepaper and learn how to better tap into the growing millennial market.
Tags : 
    
Pega
Published By: Perimeter     Published Date: Jul 17, 2007
Click here and get a head start on these Hackers by learning how they are turning their attention to new ways to deliver viruses, crash unsuspecting users’ computers, and steal social security numbers, passwords, bank account numbers, etc.
Tags : 
vulnerability, hacker, hacker detection, hacker prevention, ips, intrusion prevention, intrusion detection, ids, spam, spam filtering, security policies, gateway av, risk management, perimeter, perimeter esecurity
    
Perimeter
Published By: PGi     Published Date: Oct 01, 2018
Large companies have made considerable investments in video webcasting to their external audiences. Now they need to turn their attention toward internal communications—for reasons that can enhance their competitiveness and bottom line. As companies undergo a digital transformation, the playing field becomes increasingly technology-democratized and fierce. In this climate, an organization’s employees are one of its most, if not the most, valuable competitive differentiators. And the same energy and focus that companies put toward reaching their external audiences needs to go toward reaching and engaging their employees. Here’s where strong internal communications can pay big dividends. High-performing companies recognize the significant impact effective internal communication has on their business. Chief among the gains are: • Increased productivity. • Improved brand trust and company loyalty among employees. • Increased company alignment within and between departments and remote loc
Tags : 
    
PGi
Published By: PitneyBowes     Published Date: Sep 29, 2010
Recent study suggests that a new technology can capture increased consumer attention for a modest incremental cost (open-ability research).
Tags : 
pitney bowes, open envelopes, color text, graphic, mailing
    
PitneyBowes
Published By: PODS for Business     Published Date: Jul 24, 2017
The constant churn of product selection is not just time-consuming, it requires meticulous attention to detail, a reliable product tracking system, and significant physical space. Mastering inventory results in much more than simply organizational improvements. It can lead to increased revenues, better theft control, improved forecasting and budget setting, and even smoother customer service.
Tags : 
inventory, management, efficiency, theft control, revenue
    
PODS for Business
Published By: Polycom     Published Date: Mar 13, 2015
The days are gone when health issues would be treated clinically in isolation from the many other factors that affect the wellbeing of individuals and communities. Today, the rising costs of health care, an aging population and increasingly complex chronic health problems are driving greater focus and attention on population health — the health outcomes of a group of individuals within a population. Indeed, these days more proactive approaches to health care and care delivery are identifying the social determinants of health for various populations such as environmental conditions, economic status, and access to resources and support.
Tags : 
health problems, social care, readmission, hospital, video solutions, telehealth, improving costs, aging population, economic status
    
Polycom
Published By: Prodiance Corp.     Published Date: Dec 22, 2008
Since the National Association of Insurance Commissioners (NAIC) made revisions to the Financial Reporting Model Regulation (Model Audit Rule) in June 2006, the insurance industry’s attention to the risks associated with financial reporting has been on the rise. Structured similarly to Section 404 of the Sarbanes‐Oxley Act, the Model Audit rule places a significant burden on C‐level executives to ensure their oversight in the internal controls for financial reporting (ICFR) process. Executives within these insurance organizations, both public and private, will be required to evaluate their internal controls in preparation for the first reports due in 2010 for the 2009 reporting period.
Tags : 
prodiance, sarbanes‐oxley act, security and integrity of data, analytics, risk assessment, optimization
    
Prodiance Corp.
Published By: Qualys     Published Date: Nov 11, 2009
New network vulnerabilities appear constantly and the ability for IT security professionals to handle new flaws, fix misconfigurations and protect against threats requires constant attention. However, with shrinking budgets and growing responsibilities, time and resources are at constrained. Therefore, sifting through pages of raw vulnerability information yields few results and makes it impossible to accurately measure your security posture.
Tags : 
qualys, network secure, it security, vulnerability, it budget, risk management, vulnerability management, misconfigurations, guard
    
Qualys
Published By: Qualys     Published Date: Nov 11, 2009
New network vulnerabilities appear constantly and the ability for IT security professionals to handle new flaws, fix misconfigurations and protect against threats requires constant attention.
Tags : 
qualys, network secure, it security, vulnerability, it budget, risk management, vulnerabilities
    
Qualys
Published By: Qualys     Published Date: Nov 05, 2013
Regardless of platform, the Web has become a hub of information and productivity. The browser has evolved to become one of the most-used applications, which has drawn the attention of cyber criminals – making it a potential Achilles heel for security.
Tags : 
qualys, qualys browsercheck, security, web security, application security, web browser, cyber criminals, vulnerability, browser security
    
Qualys
Published By: QuinStreet     Published Date: Feb 05, 2009
As the world continues to analyze energy availability and the long-term effects of climate change, businesses too are turning their attention to an area of opportunity—reduction of carbon emissions, energy conservation and supply chain sustainability. Many businesses are finding that these initiatives go beyond simple good-citizenship to real business opportunities and bottom line savings that can contribute financial value to the organization while meeting demanding customer requirements. Join Today!
Tags : 
quinstreet, csr, corporate social responsibility, globalization, product lifecycle management, plm, performance management, performance measurement
    
QuinStreet
Published By: Quocirca     Published Date: Apr 09, 2008
Today, many organizations are increasingly reliant on software application development to deliver them competitive edge. Simultaneously, they are progressively opening up their computer networks to business partners, customers and suppliers and making use of next-generation programming languages and computing techniques to provide a richer experience for these users. However, hackers are refocusing their attention on the vulnerabilities and flaws contained in those applications.
Tags : 
quocirca, application security
    
Quocirca
Published By: Qwest Business.     Published Date: Jan 27, 2010
Managing Complexity in the Extended Enterprise. Regardless of company size, businesses must balance the increasing cost and effort involved in managing the network with other business functions that also require time, resources, personnel, and management attention.
Tags : 
qwest business, network managed services, enterprise applications, enterprise resource planning, total cost of ownership, productivity, performance management
    
Qwest Business.
Published By: Riverbed     Published Date: Nov 08, 2012
No one likes to wait. Today everyone expects instantaneous responded from website and applications, and the longer they take to deliver, the more likely people will shift their attention. Learn how Stingray accelerates websites and other web apps.
Tags : 
stingray, aptimizer, web content optimization, accelerate websites, riverbed
    
Riverbed
Published By: Riverbed     Published Date: Apr 14, 2017
Many organizations transitioning from on-premises Microsoft applications to Office 365 will experience performance problems due to geographic factors and use of the Internet for connectivity. IT can minimize performance issues and deliver an acceptable experience to end users by paying careful attention to network design.
Tags : 
    
Riverbed
Published By: Riverbed     Published Date: Nov 02, 2016
Many organizations transitioning from on-premises Microsoft applications to Office 365 will experience performance problems due to geographic factors and use of the Internet for connectivity. IT can minimize performance issues and deliver an acceptable experience to end users by paying careful attention to network design.
Tags : 
    
Riverbed
Published By: RPM Direct Marketing     Published Date: Jun 25, 2010
Being successful today and in the future will require a smarter marketing approach. Advertising clutter is at an all-time high and consumers are overwhelmed with thousands of marketing messages every day. There's more and more online and offline messages competing for our limited attention and most of us cannot deal with the tidal wave of advertising aimed in our direction.
Tags : 
rpm, direct marketing, results, roi, rapid performance, marketing message
    
RPM Direct Marketing
Published By: Sage EMEA     Published Date: Jan 29, 2019
Sage pays close attention to what your business demands For nearly 40 years, Sage has followed through on its founding commitment: Making sure we deliver what our customers need. That dedication has helped us become one of the world’s largest suppliers of enterprise management solutions, used by more than 3 million businesses of all types and sizes around the world. Sage helps drive today’s business builders with a new generation of solutions to manage everything from money to people wherever they’re needed, offering the freedom to work with mobility. Above all else, we’re driven to satisfy our customers and keep them coming back. That commitment has paid off. We beat SAP (19), Oracle (25) and Microsoft (34) with our Net Promoter Score (NPS)—a respected customer-satisfaction, customer-experience, and loyalty indicator widely used by Fortune 500 companies. The industry NPS average is 31.75, meaning we are 58% better than the average, and 88% above our closest competition. It shows t
Tags : 
    
Sage EMEA
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12    Next    End
Search Resource Library