attention

Results 76 - 100 of 290Sort Results By: Published Date | Title | Company Name
Published By: SundaySky     Published Date: Mar 06, 2018
Brands no longer hold all the cards in their relationships with consumers. This is the age of empowered customers. They are in control, and they will quickly disengage at the first sign of irrelevance. Regaining their attention once that has happened is difficult. That is why so many CMOs and marketers are searching for new ways to engage and transform consumer relationships. Providing value-rich video ad experiences can mean the difference between being remembered for all the right reasons, and getting lost in the cacophony of advertising chatter. These kinds of ads motivate consumers to take the next-best actions that drive customer behavior change and help brands achieve their business goals far more effectively than traditional formats.
Tags : 
    
SundaySky
Published By: Sprinklr     Published Date: Feb 28, 2018
"Complacency is kryptonite for customer care. It’s an evolving organism that requires speed and constant attention, and that’s why it’s imperative to stay up-to-date. Download for help with handling the complexities of social media, driving engagement, and increasing retention."
Tags : 
social customer care, customer care, customer care program, customer service, social customer service, social media customer service, social media, social, program, plan, sprinklr
    
Sprinklr
Published By: Schneider Electric     Published Date: Feb 12, 2018
Small server rooms and branch offices are typically unorganized, unsecure, hot, unmonitored, and space constrained. These conditions can lead to system downtime or, at the very least, lead to “close calls” that get management’s attention. Practical experience with these problems reveals a short list of effective methods to improve the availability of IT operations within small server rooms and branch offices. This paper discusses making realistic improvements to power, cooling, racks, physical security, monitoring, and lighting. The focus of this paper is on small server rooms and branch offices with up to 10kW of IT load.
Tags : 
    
Schneider Electric
Published By: Schneider Electric     Published Date: Feb 12, 2018
Small server rooms and branch offices are typically unorganized, unsecure, hot, unmonitored, and space constrained. These conditions can lead to system downtime or, at the very least, lead to “close calls” that get management’s attention. Practical experience with these problems reveals a short list of effective methods to improve the availability of IT operations within small server rooms and branch offices. This paper discusses making realistic improvements to power, cooling, racks, physical security, monitoring, and lighting. The focus of this paper is on small server rooms and branch offices with up to 10kW of IT load.
Tags : 
    
Schneider Electric
Published By: Cisco     Published Date: Dec 27, 2017
Hyperconvergence has been receiving a tremendous amount of attention because it represents the next step in the evolution of IT resource delivery. This technology takes the idea of integrating compute, storage and networking that started with converged systems design and has improved on those architectures by adding deeper levels of abstraction and automation. Hyperconverged infrastructure (HCI) vendors promise simplified operation and the ability to quickly and easily expand capacity by deploying and launching additional modules; simplicity has been the key selling point for the HCI pioneers. As HCI ventures even deeper into the enterprise and cloud environments, the architectures will need to become more efficient, agile and adaptable to help IT professionals shoulder the burden of rapidly growing data sets and workloads. This report discusses the benefits of HCI and the enhancements that must be made to expand HCI deeper into the mainstream enterprise datacenter.
Tags : 
    
Cisco
Published By: F5 Networks Inc     Published Date: Dec 08, 2017
There’s a reason why web application firewalls have been getting so much attention lately. It’s the same reason we keep hearing about major security and data breaches left, right, and center. Web application security is difficult—very difficult.
Tags : 
owasp, web application safety, data breaches, firewalls
    
F5 Networks Inc
Published By: AppDynamics     Published Date: Dec 08, 2017
A 2017 study examining the impact of app performance on consumer behavior and business outcomes
Tags : 
    
AppDynamics
Published By: AppDynamics     Published Date: Dec 08, 2017
A 2017 study examining the impact of app performance on consumer behavior and business outcomes
Tags : 
    
AppDynamics
Published By: Adobe     Published Date: Dec 07, 2017
Stock photos get a bad rap sometimes. We’ve all seen images of women inexplicably smiling at their forkfuls of salad, or an unnaturally giddy customer service representative standing by. “Some stock photography just looks like stock photography,” says May Curry, a graphic design veteran with almost 20 years of experience.1 But stock photography has always been an essential part of the designer’s toolkit. When used right, it helps brands make just the right impact. Today, collections are evolving to keep pace with visual trends and create unique, attention-grabbing images-quickly and no budget. Download this whitepaper to take a look at stock's rapid transformation and how it's helping designers do beautiful work, faster than ever.
Tags : 
    
Adobe
Published By: Adobe     Published Date: Dec 07, 2017
With more and more competition for our increasingly short attention spans, it’s no wonder we’re seeing reliance on visuals as the leading form of communication across the web. Even the most well-thought-out ideas and well-written content will get lost in the shuffle if the visual elements aren’t equally compelling—or don’t communicate the right message. That’s why the imagery you choose should be as strategic as the written message behind it. It’s not enough to settle for the first applicable image you find in your stock library—you need to ensure every image is on brand and conveys the right idea. Download this whitepaper for a few ways to use imagery to meet your brand’s content marketing objectives.
Tags : 
    
Adobe
Published By: Mintigo     Published Date: Nov 20, 2017
What is ABM and why is it so cool? Rarely do new trends catch the attention of marketers with the velocity and intensity of Account Based Marketing (ABM). So what is ABM and how should marketing and sales executives strategically evaluate an ABM program for their organization? The definition of ABM is: The systematic process to use data and intelligence to discover, identify, segment, target, engage and win business.
Tags : 
    
Mintigo
Published By: Cisco EMEA     Published Date: Nov 13, 2017
Intent-based networking is the difference between a network that needs continuous attention and one that simply understands what you need and makes it happen. It’s the difference between doing thousands of tasks manually and having an automated system that helps you focus on business goals. Cisco DNA is the open, software-driven platform that turns vision into reality. Virtualization, automation, analytics, and cloud, all in one architecture.
Tags : 
sd-access, segmentation, network fabric, wan, automation, cisco, analytics
    
Cisco EMEA
Published By: Oracle     Published Date: Nov 08, 2017
IT departments are under constant pressure to do more with less. Now, as well as keeping the lights on, they are expected to deliver projects that create real business value. As more businesses use digital technologies to disrupt their markets, this pressure is intensifying. Infrastructure as a service (IaaS) is evolving against this background. Initially, it caught CIOs’ attention because it helped them cut costs. Today, IaaS underpins organizations’ agility in the face of disruption and drives innovation-led growth.
Tags : 
oracle database, enterprise, quality assurance, data center, server infrastructure, storage management, oracle
    
Oracle
Published By: Zingbox     Published Date: Nov 08, 2017
The Internet of Things (IoT) is a rapidly expanding part of the global information economy, yet security exploits show that more attention needs to be paid to making the IoT safe. Companies deploying IoT infrastructure, whether for their own use or to provide IoT services, as well as the manufacturers of IoT devices, should look to build in security from day one. This report describes the challenges inherent in securing the IoT. And explains how IoT security differs from conventional IT security.
Tags : 
    
Zingbox
Published By: AppDynamics     Published Date: Nov 02, 2017
See what keeps users interested — and what turns them off — in this must-read report.
Tags : 
    
AppDynamics
Published By: AlienVault     Published Date: Oct 20, 2017
If you haven’t had first-hand experience with ransomware in the past, chances are you’ve heard of one of the many ransomware attacks that have recently caught worldwide attention. According to a June 2016 survey from Osterman Research, nearly one in two participants indicated that their organization suffered at least one ransomware attack in the last year. In this whitepaper, we’ll cover ransomware basics and provide best practices for ransomware prevention and detection. You’ll learn: • What ransomware is, how it works, and who the attackers are • 10 best practices you can employ now to detect and prevent ransomware • How you can quickly detect ransomware and other threats with AlienVault USM Download this whitepaper now to learn more about ransomware, best practices for defense, and how AlienVault USM helps you detect ransomware quickly with a unified approach to security.
Tags : 
    
AlienVault
Published By: CA Technologies EMEA     Published Date: Oct 19, 2017
CA Technologies propose la plate-forme éprouvée qui saura offrir aux entreprises la solution de microservices évolutive et sécurisée qu’elles recherchent.
Tags : 
    
CA Technologies EMEA
Published By: CA Technologies EMEA     Published Date: Oct 19, 2017
Aujourd’hui, le numérique est omniprésent : Cloud, appareils mobiles, réseaux sociaux et Internet des objets modifient notre manière de travailler et de nous divertir.
Tags : 
api, application programming interface, psd2, open banking, json, github, api gateway, apim, api management, full api lifecycle, restful web services, api portal, gestion des api, portail api, oauth, openid connect, rest json, soap xml, api analytics, orchestration transformation
    
CA Technologies EMEA
Published By: SAS     Published Date: Oct 18, 2017
Are you thinking about adding artificial intelligence to your organization? It’s certainly a hot topic and worth the attention. This paper outlines the SAS approach to AI and explains key concepts. It also provides process and implementation tips if you are considering adding AI technologies to your business and analytical strategies.
Tags : 
    
SAS
Published By: SAS     Published Date: Oct 18, 2017
With all of the attention on machine learning, many are seeking a better understanding of this hot topic and the benefits that it could provide to their organizations. Machine learning – as well as deep learning, natural language processing and cognitive computing – are driving innovations in identifying images, personalizing marketing campaigns, genomics, and navigating the self-driving car. This e-book provides a primer on these innovative techniques as well as 10 best practices and a checklist for machine learning readiness.
Tags : 
    
SAS
Published By: Inspirus     Published Date: Oct 04, 2017
Learning and development plays a critical role in any organization. Although learning has been unequivocally linked to high-performing organizations, we believe there hasn’t been enough attention paid to the lasting effects learning plays in engaging your workforce.
Tags : 
    
Inspirus
Published By: Inspirus     Published Date: Oct 04, 2017
Generations are getting much more attention, especially when it comes to the workplace. For the first time ever, we have five generations in the workplace. Let’s look at the differences and the commonalities.
Tags : 
    
Inspirus
Published By: Evident.io     Published Date: Sep 13, 2017
For enterprises that use the cloud, ensuring protection starts with understanding the layers that make up the components of the cloud stack. Paying attention to each layer and addressing their unique security needs, will only bolster your enterprise’s environment. With “16 Ways to Protect Your Cloud from Ransomware,” you’ll learn about the layers that make up the cloud stack and in turn, increase your enterprise's resistance to ransomware.
Tags : 
    
Evident.io
Published By: Entelo     Published Date: Sep 06, 2017
Engaging with candidates is a long game. To be remembered, it's crucial to take the necessary steps to develop effective relationships, grow your network, and cleverly capture candidates' attention. Join TripAdvisor's Jeff McCarthy and Lori Busch as they share how to leverage recruitment marketing and outreach platforms to improve response rates, influence long-term relationships, and stay top of mind with candidates. In this webinar, you'll learn: TripAdvisor's messaging strategies for increasing open rates by 15% How to structure a multi-touch nurturing workflow to sustain a relationship with candidates A breakdown of TripAdvisor's Attract, Engage, and Convert model Why they emphasize employee-generated content as vital to branding and candidate engagement
Tags : 
    
Entelo
Published By: Alcatel Lucent Enterprise     Published Date: Aug 31, 2017
In the same way, the WLAN seems to be demanding more of our attention these days. IT teams are spending an increasing amount of time managing, configuring and troubleshooting to accommodate a growing number of devices and apps, and to meet user demands for ever-faster speeds and better coverage.
Tags : 
it teams, wlan, intelligent architecture, unified network, security management, iot onboarding
    
Alcatel Lucent Enterprise
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12    Next    End
Search Resource Library