it landscape

Results 401 - 425 of 686Sort Results By: Published Date | Title | Company Name
Published By: Citrix     Published Date: Oct 26, 2017
Now that your organization is deploying apps on premise and in the cloud, you need an ADC that can manage, monitor, and troubleshoot applications across your entire hybrid and multi-cloud landscape. How do you select a solution that can help you deploy and monitor your application infrastructure end-to-end?
Tags : 
    
Citrix
Published By: Microsoft     Published Date: Jul 20, 2018
Imagine having a relationship with each of your customers that’s built on trust. If every one of your connections turned to you for help in solving their greatest challenges at every stage of the sales journey, what would that do to your bottom line? If you could provide every new prospect with relevant, useful insights that would make them more successful, how would your sales goals change? A new model is emerging in the sales landscape. The entire process looks vastly different than it did just a few years ago. Although that’s due in part to constantly evolving tools and technologies, the greater difference is in the mindsets of buyers. Understanding that mindset and catering to it is what catapults a successful seller into rock-star seller status. While this shift brings new possibilities, every stage of the selling process is also rife with new challenges. Greater access means more noise. Countless resources make it difficult to bring real value. These are just a few of the challen
Tags : 
    
Microsoft
Published By: Interactive Intelligence     Published Date: Oct 10, 2012
Nearly two-thirds of customers who try to solve issues online or through an interactive voice response (IVR) system inevitably choose to speak with an agent. Can smartphone applications change this interaction landscape for the better?
Tags : 
mobile apps, mobile self-service, mobile applications, customer interactions
    
Interactive Intelligence
Published By: Kaspersky Lab     Published Date: Feb 18, 2014
Download the Kaspersky Lab security experts' Guide to the Threat Landscape to have access to a wealth of IT security intelligence.
Tags : 
kaspersky, kaspersky lab, malware, anti-virus industry, organizational security, mobility, byod, the cloud
    
Kaspersky Lab
Published By: Simba by Magnitude     Published Date: Jul 12, 2019
Today’s C-level executives expect data and analytics to provide them with speed and agility to deliver competitive advantage and to disrupt new markets. But, in today’s complex data environment exists a near paradox between these expectations, that companies will be able to rapidly deliver value using data and analytics--and the complexities of the data landscape, making it more difficult to find, govern, connect to and access the data needed to deliver that value. Once thing is clear: if management expectation is to be met, simplifying connectivity is a must.In this white paper, veteran analyst Mike Ferguson, Managing Director of Intelligent Business Strategies explores how simplifying data access –connectivity –aligns expectations with data realities thus decreasing time to value.
Tags : 
    
Simba by Magnitude
Published By: Inovis     Published Date: Aug 06, 2007
Major retailers and mass merchandisers are turning up the pressure on their trading partners and even other retailers to implement Global Data Synchronization (GDS) within their organizations. These advocates see GDS and participation in the Global Data Synchronization Network (GDSN) as the best path to improving the timeliness and accuracy of their supply chains, particularly once these efforts are broadly supported across the retail supply chain landscape.
Tags : 
gds, inovis, retailers, merchandisers, gdsn, data synchronization, inovis catalogue, global data synchronization
    
Inovis
Published By: ESET     Published Date: Feb 01, 2008
With the ever evolving threat landscape, what will 2008 hold for IT Managers?  This podcast provides a high level overview of a few trends to watch for this year.
Tags : 
2008 predications, it security predictions, it security, mobile devices, laptops, endpoint, operating systems, antivirus
    
ESET
Published By: ESET     Published Date: Feb 01, 2008
It is important for businesses to have a plan in place that addresses the changing threat landscape.  This podcast discusses various items for businesses to consider when developing an IT threat model.
Tags : 
threat planning, testing, penetration testing, defense in depth, multilayered, firewall, filtering, white listing
    
ESET
Published By: Skillsoft     Published Date: May 10, 2011
Is now the time to take the plunge into mobile learning or should you wait for a more stable mobile landscape to emerge? It's important for organizations to focus on some basic issues before making this important decision.
Tags : 
mobile learning, smartphones, skillsoft, learning strategy, mobile learning strategy, tablets
    
Skillsoft
Published By: Microsoft Office SharePoint Server     Published Date: Sep 29, 2008
Enterprise search has been a service in one form or another on the Microsoft intranet for more than a decade. With the release of Microsoft® Office SharePoint® Portal Server 2003, the landscape for enterprise search at Microsoft began to change. This became the foundation for the current solution, the Enterprise Search feature provided in Microsoft Office SharePoint Server 2007. Read more about the enhancements of this feature in this technical white paper.
Tags : 
microsoft, sharepoint, microsoft office, search, database search, dba, database
    
Microsoft Office SharePoint Server
Published By: SAS     Published Date: Jun 05, 2017
"The connected customer is an individual who is intimately connected to the data, outcomes, decisions and staff associated with any relationship to an organization.  To create personalized experiences, companies across all industries must pursue a more connected relationship with their customers through technology and processes focused on delivering relevant personalized experiences whenever possible. In this report, Blue Hill explores the key traits associated with supporting the connected customer through the internet of things, and provides guidance on why the internet of things will be essential across the general business landscape. "
Tags : 
    
SAS
Published By: iCims     Published Date: Apr 01, 2015
Achieving your strategic goals starts with finding the best-fit recruitment technology for your business. Learn how iCIMS' solution can give you the competitive advantage in today's hiring landscape.
Tags : 
recruiting, staffing, hiring, human resources
    
iCims
Published By: Gleanster Research     Published Date: Nov 21, 2013
This benchmark report from Gleanster Research showcases the benefits of Online Customer Community Solutions. You'll learn what to look for, how to overcome challenges, as well as analyst commentary on the full vendor landscape.
Tags : 
    
Gleanster Research
Published By: Esker     Published Date: Jan 06, 2014
How to increase profit and productivity via Accounts Payable Automation in an ERP environment
Tags : 
esker, accounts payable, erp, productivity, automation solution, erp applications, business landscape, internal processes
    
Esker
Published By: Esker     Published Date: Jan 06, 2014
How Adding AP Workflow Automation to Vendor Invoice Processing Can Make Your AP Operation Best-in-Class
Tags : 
esker, accounts payable, erp systems, end-to-end automation, productivity, automation solution, erp applications, business landscape
    
Esker
Published By: Esker     Published Date: Jan 06, 2014
Manual processing of vendor invoices presents a roadblock to the success of your accounts payable (AP) department and overall business objectives. As you look to automation to get your company on the right track, consider this guidebook your map along the 7-step path to AP automation success.
Tags : 
esker, accounts payable, erp, productivity, automation solution, erp environment, business landscape, internal processes
    
Esker
Published By: SAP     Published Date: May 11, 2012
The increasing possibilities that come from deploying mobile solutions in the workplace are now counter balanced by an exponentially complex ecosystem of options that can make navigating the corporate mobile landscape challenging - and risky.
Tags : 
mobile device management, mobile application, enterprise mobility management, mobile asset management, mobile inventory management, mobile operations management, wireless expense management, mobile application management
    
SAP
Published By: SAP     Published Date: Jul 17, 2012
Overlooking how an application fits into your overall IT landscape can lead to costly implementations. But addressing data management with middleware solutions that work seamlessly with existing applications in your company's IT environment can lead to significant benefits. Explore the value of technology decisions that support and maintain infrastructure-wide interoperability with regard to your data management solutions.
Tags : 
infrastructure, functionality, data management, technology, solutions, white paper
    
SAP
Published By: SAP     Published Date: Jul 18, 2012
A major question that companies are asking business intelligence (Bi) providers is, "What is your total cost of ownership?
Tags : 
total cost of ownership, business intelligence, tco, data explosion, power users, top-down development, simple it landscape, analytic tools
    
SAP
Published By: Limelight Networks     Published Date: Aug 22, 2012
While the globalization of business and the myriad of challenges it poses are nothing new, the explosive growth of global online commerce and the demanding worldwide competitive landscape present a variety of new obstacles for companies of all sizes.
Tags : 
web presence, website globalization, saas, mobile publishing, digital presence, limelight, global commerce
    
Limelight Networks
Published By: CDW     Published Date: Mar 27, 2015
IT departments must contend with an array of devices, operating systems and cellular carriers as well as new security threats. Even if IT departments can get a handle on the complex mobility landscape, the technology is so fluid that the picture is constantly changing. That means the IT staff has to devote time to learning about, procuring, deploying and supporting an array of devices. Busy IT departments now have another option for addressing these challenges: a monthly subscription package that provides a customizable web-based portal to automate mobile device procurement, expense management and support.
Tags : 
mobile, data, communication, tablet, smartphone, device, enterprise, tools
    
CDW
Published By: McAfee     Published Date: Apr 14, 2014
Advanced evasions will break the security protection model that most organizations are using today. Given this changing threat landscape we need to rethink traditional security models. Here’s advice on how to evade AETs.
Tags : 
next generation firewall, intrusion prevention systems, firewall, contextual security, advanced evasion detection, advanced evasion techniques
    
McAfee
Published By: Cyveillance     Published Date: Apr 03, 2015
In this white paper, we recap notable trends and events in information security from 2014 and look forward to what information security professionals should expect in 2015. The past year was a landmark one in the information security field, with massive data breaches capturing the public’s attention, powerful bugs causing headaches for IT teams and end users, DDoS attacks breaking records, and phishing remaining a general annoyance – or worse – for all Internet users. In this whitepaper, we discuss these trends as well as key areas of concern for 2015, including: - The impact of the Internet of Things - The growing importance of threat intelligence - The increasing influence of BRICS nations - The evolution of encryption standards - The changing role of the CISO
Tags : 
information security threat, information security, protection, security breach, internet security
    
Cyveillance
Published By: Cyveillance     Published Date: Apr 06, 2015
In this white paper, we examine notable trends and events in physical security from 2014 and assess what security professionals should expect in 2015. 2014 was truly an unpredictable year in the physical security and executive protection worlds, as large scale events targeted for disruption were executed relatively smoothly, while unforeseen developments in Ukraine and the Ebola outbreak caught many off guard. Looking ahead to 2015, we predict that local issues will continue to gain global importance, threat actors and activists will find new ways to utilize social media to spread their messages, and the lines between physical and digital threats will continue to converge. We also highlight ongoing developments in France, Mexico, Ukraine, and Germany.
Tags : 
information security threat, information security, protection, security breach, internet security
    
Cyveillance
Published By: Cyveillance     Published Date: Apr 10, 2015
In today’s security landscape, more vendors than ever are offering what is purported to be “threat intelligence.” Although security experts often have different definitions for this term, one thing many of them can agree on is that an intelligence-led approach to security – that is, putting threat intelligence to real-world use – is critical to protecting organizations. If the goal of an intelligence-led security strategy is to help organizations be more proactive in finding and preparing for threats to physical and digital assets, it’s crucial to define and understand exactly what threat intelligence means, and separate fact from fiction. In this whitepaper, we dispel some common myths about threat intelligence.
Tags : 
myths, cyber, threat, intelligence, fact, fiction, big data, cloud
    
Cyveillance
Start   Previous    10 11 12 13 14 15 16 17 18 19 20 21 22 23 24    Next    End
Search Resource Library