bing

Results 1 - 25 of 131Sort Results By: Published Date | Title | Company Name

How to Master Content Experience With Uberflip

Published By: Uberflip     Published Date: Jul 17, 2019
Tune in to this demo webinar to understand how Uberflip can help you master content experience and accelerate buyers through the funnel with personalized content journeys that make the most of your hard-earned clicks. You’ll walk away from this webinar knowing how Uberflip helps you: — Create and manage the content experience for the whole buyer journey, at scale. — Accelerate your buyer journey with engaging experiences that compel your audience to binge and self-educate. — Gather intelligence surrounding your audience and how they engage with your content, so you can constantly optimize how they experience it.
Tags : 
    
Uberflip

Black Diamond - Case Study

Published By: ExpertVoice     Published Date: Jun 14, 2019
Grab your harness as we take a deeper look into how Black Diamond partnered with ExpertVoice to assist with a product launch. When Black Diamond decided to manufacture their own climbing shoe, they knew how critical a successful launch would be to long- term success: the climbing shoe market is dominated by one manufacturer, and climbers are an extremely loyal group. Breaking into the market would be tough. Although ExpertVoice had a daunting task ahead of them, they knew honing in on Experts spreading wordof- mouth recommendations was key to a successful product launch.
Tags : 
    
ExpertVoice

Building Master Data Management Teams

Published By: Zynapse     Published Date: Sep 10, 2010
A whitepaper by Ventana Research describing the role and importance of partnerships between business and IT in MDM strategy
Tags : 
zynapse, erp projects, data information, data management, governance, mdm, master data management, odm, application integration, business intelligence, database development, data integration
    
Zynapse

10 Top Things to Look For in a Cloud Security Solution Provider

Published By: Akamai Technologies     Published Date: May 05, 2017
Searching for a Cloud Security Provider can be confusing. Many providers appear the same at first glance: similar metrics, similar promises. The fact is, the information you need to make a real comparison requires asking questions and probing for details that cloud services vendors don’t always volunteer. Use this list to be sure you’ve covered the essential elements for choosing the right cloud security provider to protect your organization from malicious cyberattacks.
Tags : 
cloud security, cyberattacks, cloud service, security
    
Akamai Technologies

How to Scale Your Support Without Scaling Your Team

Published By: Freshdesk     Published Date: Aug 15, 2016
Every helpdesk agent at every customer support team, anywhere in the world, dreams about Inbox Zero. However as most businesses grows from just a handful of support queries to hundreds of customers chocking the support hotline, they make the mistake of going on a hiring binge to reach that elusive promised land. The only problem? Hiring more support staff may not be the best way to scale up your customer support. This whitepaper talks about how you can scale your customer support without blindly scaling the team, with tips, ideas and insights like: - How to puncture the customer support hot-air balloon - Proactively identifying red flags and overloads - Top 4 things to know before you hire - Monitoring, understanding and reporting support trends - Tips to streamline your support process
Tags : 
    
Freshdesk

Forbes Insights: Boost Innovation with Video

Published By: Cisco     Published Date: Feb 12, 2016
Video collaboration opens up opportunities for greater interaction and innovation, regardless of industry. Everyone benefits. For example, in healthcare, video is dramatically changing the way institutions interact with customers and professionals. In recent years, a number of hospitals across the United States have been subscribing to video and voice call centers that enable them to share language interpretation services, psychiatric care services and other developing capabilities. In the process, video collaboration is affecting business outcomes, changing business processes and helping healthcare facilities achieve scale, cost and efficiency not seen before.
Tags : 
industry innovation, business practices, best practices, video collaboration, network management, network performance, content delivery, content integration
    
Cisco

Mindtree rated highly in testing report

Published By: Mindtree     Published Date: Jul 24, 2017
Short description here.
Tags : 
keywords describing the study, mindtree, test asset
    
Mindtree

From Cliche to Mission Critical

Published By: Adobe     Published Date: Dec 07, 2017
Stock photos get a bad rap sometimes. We’ve all seen images of women inexplicably smiling at their forkfuls of salad, or an unnaturally giddy customer service representative standing by. “Some stock photography just looks like stock photography,” says May Curry, a graphic design veteran with almost 20 years of experience.1 But stock photography has always been an essential part of the designer’s toolkit. When used right, it helps brands make just the right impact. Today, collections are evolving to keep pace with visual trends and create unique, attention-grabbing images-quickly and no budget. Download this whitepaper to take a look at stock's rapid transformation and how it's helping designers do beautiful work, faster than ever.
Tags : 
    
Adobe

Visually "Showing" Your Product Story

Published By: Kaon     Published Date: Feb 01, 2012
Describing product pain points without a visual is hard, and having a product at every sales engagement is near impossible. Learn how marketing tools show amazing product stories using stunning interactive visual experiences that win deals.
Tags : 
cmo, ipad, 3d products, virtual products, interactive products, mobility, sales, marketing, demonstrations, meeting, tablets, smartphone, products, interactive, trade shows, remote meeting, laptop, touch-screen, iphone, events
    
Kaon

End-To-End Server Security: The IT Leader's Guide

Published By: Dell EMC     Published Date: Feb 07, 2018
This paper is organized into sections describing the importance of IT infrastructure security and presents essential criteria IT leaders should use to identify end-to-end server security. 1. Trust and the Modern IT Infrastructure Why you should be concerned about server security (or the lack thereof). 2. End-to-end Server Security How Dell EMC defines end-to-end server security. In this section, we also provide crucial characteristics business and IT leaders can use to classify prospective server vendors. 3. Key Security Criteria for the Modern IT Infrastructure The security questions every IT leader should ask of their server vendor before embarking on an IT transformation. 4. Conclusion & Additional Resources The objective of this paper is to highlight the Dell EMC comprehensive approach to server security. PowerEdge servers come with security built-in, not bolted-on. Using a Cyber Resilient Architecture, Dell EMC commits to end-to-end server security on all PowerEdge servers.
Tags : 
    
Dell EMC

10 Top Things to look for in a Cloud Security Solution Provider

Published By: Akamai Technologies     Published Date: Aug 17, 2017
Searching for a Cloud Security Provider can be confusing. Many providers appear the same at first glance: similar metrics, similar promises. The fact is, the information you need to make a real comparison requires asking questions and probing for details that cloud services vendors don’t always volunteer. Use this list to be sure you’ve covered the essential elements for choosing the right cloud security provider to protect your organization from malicious cyberattacks.
Tags : 
cloud security, cloud solutions, data analysis, cyberattacks
    
Akamai Technologies

The Ultimate Guide to Enterprise Mobility Management

Published By: MobileIron     Published Date: Apr 15, 2015
In addition to describing how EMM works, this guide also illustrates a typical implementation journey that explains how an organization goes about deploying and managing all the pieces of an EMM to transform business processes.
Tags : 
enterprise, management, mobility, workforce, operating system, device, productivity
    
MobileIron

Localization - The Key To Global Ecommerce Growth

Published By: Global Payments     Published Date: May 02, 2019
We live in an age of unrivaled ecommerce opportunity. The number of new internet users is climbing by 248 million each year, equating to 7% annual growth. That figure in turn is dwarfed by booming ecommerce rates, which average out at 14% globally. This report offers an overview of ecommerce markets across the globe, summarizing the current situation, and identifying the most effective ways to nurture business - and the customer experience - on a local and global scale.
Tags : 
ecommerce growth, global payments, local language, localization, retail, mobile payments, alternative payment methods, chinese wallets, alipay, wechat pay, global commerce, international payment solutions
    
Global Payments

An Analysis of xss Exploitation through Remote Resource Injection

Published By: Akamai Technologies     Published Date: Sep 27, 2016
Akamai’s Threat Research team analyzed a week of cross-site scripting (xss) alert triggers to gain clarity on the nature of xss attacks. Read this case study to learn which vectors are vulnerable and specific techniques that were employed during remote resource injection exploitation attempts versus simple probing requests.
Tags : 
akamai, xss, xxs exploration, threat research, analytics, security, cybersecurity, networking, knowledge management, enterprise applications, business technology
    
Akamai Technologies

The Surprising Power of Online Experiments

Published By: Optimizely     Published Date: Apr 06, 2018
Getting the most out of A/B and other controlled tests. In the fast-moving digital world, even experts have a hard time assessing new ideas. Case in point: At Bing a small headline change an employee proposed was deemed a low priority and shelved until one engineer decided to do a quick online controlled experiment—an A/B test—to try it out. The test showed that the change increased revenue by an astonishing 12%. That experience illustrates why it’s critical to adopt an “experiment with everything” approach, say Ron Kohavi, the head of the Analysis & Experimentation team at Microsoft, and Stefan Thomke, an HBS professor. In this article they describe: How to properly design and execute A/B and other controlled tests ? Ensure test integrity ? How to interpret results and avoid pitfalls
Tags : 
    
Optimizely

End-To-End Server Security: The IT Leader's Guide

Published By: Dell     Published Date: Feb 02, 2018
This paper is organized into sections describing the importance of IT infrastructure security and presents essential criteria IT leaders should use to identify end-to-end server security. 1. Trust and the Modern IT Infrastructure Why you should be concerned about server security (or the lack thereof). 2. End-to-end Server Security How Dell EMC defines end-to-end server security. In this section, we also provide crucial characteristics business and IT leaders can use to classify prospective server vendors. 3. Key Security Criteria for the Modern IT Infrastructure The security questions every IT leader should ask of their server vendor before embarking on an IT transformation. 4. Conclusion & Additional Resources The objective of this paper is to highlight the Dell EMC comprehensive approach to server security. PowerEdge servers come with security built-in, not bolted-on. Using a Cyber Resilient Architecture, Dell EMC commits to end-to-end server security on all PowerEdge servers.
Tags : 
    
Dell

Electronic Components: The Critical Connections That Enable The Smart Home

Published By: TE Connectivity     Published Date: Feb 23, 2018
In our increasingly connected world, quality, reliability and consistency matter a great deal, particularly in the context of the smart home ecosystem. The antennas, connectors, relays, sensors, switches, terminals and tubing inside these devices play critical roles in the product’s ultimate functionality. If you don’t focus on the right components or choose the wrong or incompatible ones, then device reliability becomes an issue.
Tags : 
    
TE Connectivity

Machine learning: a silver bullet?

Published By: CyberSource EMEA     Published Date: Jun 28, 2018
It has to be quick and easy for people to pay. At the same time, fraudsters are probing the weaknesses of new digital processes. As the person who can decide whether a transaction is accepted or rejected, fraud managers have a pivotal role. They’re not just preventing losses from chargebacks. They’re gatekeepers to accepting more revenue. It’s a complex job. But get it right, and they enable their business to engage customers better – across devices and places. And that can mean supporting the very growth of the business. In this landscape, the idea that a technology like machine learning might be the answer to all the industry’s needs is attractive. But while machine learning should be a key part of an effective fraud strategy, the truth is that there’s no silver bullet. So, in this paper, we’ll look at how best to put machine learning to use. By employing it in tandem with expert insight, merchants can use it to accept the optimal number of payments. And make a direct impact on the
Tags : 
    
CyberSource EMEA

Understanding And Mitigating DDOS Attacks

Published By: Oracle     Published Date: Nov 30, 2017
DDoS attacks can impair your website, tarnish your brand, and impact your bottom line. Conventional security products like firewalls and intrusion prevention systems and newer cloud-based scrubbing services can’t protect your DNS infrastructure against today’s increasingly sophisticated attacks. The best way to defend against DDoS attacks is to trust the operation of your DNS infrastructure to a managed service provider that lives and breathes DNS. Best-of-breed managed DNS providers operate global anycast networks that mitigate DDoS threats to keep your online business up and running.
Tags : 
dns, provider, global, anycast, network, customer, pop, business
    
Oracle

Understanding And Mitigating DDOS Attacks

Published By: Oracle Dyn     Published Date: Dec 06, 2017
DDoS attacks can impair your website, tarnish your brand, and impact your bottom line. Conventional security products like firewalls and intrusion prevention systems and newer cloud-based scrubbing services can’t protect your DNS infrastructure against today’s increasingly sophisticated attacks. The best way to defend against DDoS attacks is to trust the operation of your DNS infrastructure to a managed service provider that lives and breathes DNS. Best-of-breed managed DNS providers operate global anycast networks that mitigate DDoS threats to keep your online business up and running.
Tags : 
dns, provider, global, anycast, network, customer, pop, business
    
Oracle Dyn

The data center impact of cloud, analytics, mobile, social and security

Published By: IBM     Published Date: Jun 16, 2015
An IBM white paper describing the infrastructure implications of today’s converging technology forces and the software defined, next-generation data center transformation vital to capitalizing on them.
Tags : 
enterprise infrastructure, big data, mobility, data center, it infrastructure, it security technologies, virtualizing infrastructure, converging technologies, analytics, mobile computing, application integration, best practices, business analytics, business intelligence, business process automation, risk management, server virtualization, database development, data integration, cloud computing
    
IBM

Reduce The Risk Of Insider-Related Data Loss With Intelligent, Integrated Security From IBM

Published By: IBM     Published Date: May 02, 2017
An interactive white paper describing how to get smart about insider threat prevention - including how to guard against privileged user breaches, stop data breaches before they take hold, and take advantage of global threat intelligence and third-party collaboration. Security breaches are all over the news, and it can be easy to think that all the enemies are outside your organization. But the harsh reality is that more than half of all attacks are caused by either malicious insiders or inadvertent actors.1 In other words, the attacks are instigated by people you’d be likely to trust. And the threats can result in significant financial or reputational losses.
Tags : 
insider threats, data management, organization management, data analytics, threat detection, risk management, fraud discovery, forensics investigation, incident response
    
IBM

Best FP&A Practices Webinar for Healthcare Companies

Published By: Adaptive Planning     Published Date: Apr 18, 2011
View this webinar to hear case studies describing how leading healthcare firms have been able to move beyond Excel and save time, enhance collaboration, and improve business decisions -- ultimately resulting in higher revenues and profits.
Tags : 
fp&a, adaptive planning, healthcare, collaboration, strategic value, staff planning, revenue reporting, metrics management
    
Adaptive Planning

Best FP&A Practices Webinar for Financial Services Companies

Published By: Adaptive Planning     Published Date: Apr 18, 2011
Join us for an informative webinar to hear case studies describing how leading financial services firms have been able to move beyond Excel and save time, enhance collaboration, and improve business decisions -- ultimately resulting in higher revenues and profits.
Tags : 
fp&a, adaptive planning, financial services, budgeting, strategic value, forecasting, monthly reporting, driver-based models, interest rate, collaboration, revenue analysis
    
Adaptive Planning

Next Generation Budgeting & Forecasting: Best Practices Webinar for Energy & Utility Companies

Published By: Adaptive Planning     Published Date: Jun 09, 2011
You will hear case studies describing how leading energy and utility companies worldwide have been able to move beyond Excel and save time, enhance companywide collaboration, and improve business decisions - ultimately resulting in higher revenues and profits.
Tags : 
adaptive planning, fp&a value, key performance metrics, performance management solutions, collaboration, monthly variance reporting, capital spending
    
Adaptive Planning
Start   Previous   1 2 3 4 5 6    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.