leveraging

Results 426 - 450 of 676Sort Results By: Published Date | Title | Company Name

5 Reasons to Leverage Google Data Studio

Published By: MoreVisibility     Published Date: Dec 19, 2017
Google has recently released several new products. One of the best visualization tools to hit the market is Google Data Studio. Not only is this product free to all Google Accounts, it’s a great way to visualize your data into a comprehensive report for your business. Here, we will highlight 5 reasons why you should be leveraging Google Data Studio to enhance your reporting.
Tags : 
    
MoreVisibility

Instantly connecting developers across the miles

Published By: GoToMeeting     Published Date: Jun 09, 2010
This new white paper examines the key challenges remote developers and teams face while exploring the advantages of leveraging an online collaboration solution to instantly connect, eliminate travel and expedite projects.
Tags : 
citrix gotomeeting, remote developer, online collaboration, remote access, remote network management, video conferencing, voice recognition, voice over ip, collaboration
    
GoToMeeting

Using Social Media to Advance Your Online Training Program eGuide

Published By: Citrix Online     Published Date: Jun 09, 2010
This new eGuide explores the latest uses and trends in social media and provides strategies for leveraging social media to improve the online training experience for both trainers and students.
Tags : 
citrix gototraining, social media, online training, video conferencing, human resources services, employee training software
    
Citrix Online

The Best of Both Worlds: How to Effectively Leverage Social Media Relationships

Published By: GoToWebinar     Published Date: Aug 02, 2011
This eBook explores how organizations can connect and nurture relationships with prospects and customers by effectively leveraging social media and real-time collaboration tools.
Tags : 
gotowebinar, citrix, meetings, online meetings, collaboration, gotomeeting, go to meeting, sharing resources, meeting, desktop, sharing, resources, virtualization, cloud, green it, desktop management, access control, desktop security, remote, data recovery
    
GoToWebinar

Improve Customer Experience with Actionable Artificial Intelligence (IIA)

Published By: SAS     Published Date: Apr 25, 2017
Artificial intelligence and related forms of advanced analytics hold enormous potential for marketers to expand and deepen customer intelligence, improve business processes, and deliver engaging customer experiences. But many marketing organizations are just getting their feet wet in leveraging these technologies. To learn about the opportunities and challenges, IIA spoke with Analise Polsky, Business Solutions Manager, SAS Best Practices and Jonathan Moran, Principal Product Marketing Manager, SAS Customer Intelligence Solutions.
Tags : 
    
SAS

Evolving Datacenter Architectures: Cloud-ready IT

Published By: HP and Intel® Xeon® processors     Published Date: Feb 12, 2013
In this paper, we highlight the features necessary to move beyond server virtualization by leveraging key integration capabilities between IT components, with a particular focus on the role that storage plays in the evolution of the data center.
Tags : 
datacenter, data center, architecture, virtualization, network, infrastructure, network architecture, network performance, application integration, data replication, cloud computing, infrastructure management
    
HP and Intel® Xeon® processors

Whitepaper: Phishing 2.0: Why phishing is the No. 1 web threat, and how web security can protect you

Published By: Webroot     Published Date: Sep 18, 2013
This whitepaper discusses a major new threat vector — “phishing 2.0.” While many IT professionals have become less concerned with phishing as it seems these attacks only fool naive consumers, a new generation of sophisticated phishing attacks now target businesses. These phish evade traditional antivirus and antiphishing products. Using targeted information — often gathered from social media sites — they fool even security-savvy employees into divulging sensitive information or visiting websites that infect machines with dangerous malware. Learn more about: • Uncovering phishing emails and phishing websites in real time • Limiting the amount of personal information employees expose on social media sites • Leveraging the world’s largest cloud-based threat network
Tags : 
phishing, web threat, web security, malware, security, business technology
    
Webroot

Building a Successful SDN Strategy for the Evolving Network Infrastructure

Published By: Silver Peak     Published Date: Oct 28, 2013
GigaOM’s research analyst Mark Leary and Silver Peak’s virtualization and cloud expert, Vivian Xu, discuss the benefits of a SDN (Software-Defined Network). See how industry leaders are leveraging SDN principles to that overcome the challenges of moving data across distance and create more flexibility.
Tags : 
silver peak, network, infrastructure, sdn strategy, software defined network, sdn, network architecture, network management, network performance, network performance management
    
Silver Peak

Leveraging Mobility to Improve Sales

Published By: Oracle     Published Date: Nov 14, 2013
Sales people spend more time out of the office than in. When they are out of the office, they need information at their fingertips. And in today’s more mobile, more collaborative, and more data-rich business world, the needs of corporate sales forces are radically changing.
Tags : 
sales, mobility, technology, sales process, relationship management, collaboration, business analytics, data management, business technology
    
Oracle

Leveraging Mobility to Improve Sales

Published By: Oracle     Published Date: Nov 27, 2013
Sales people spend more time out of the office than in. When they are out of the office, they need information at their fingertips. And in today’s more mobile, more collaborative, and more data-rich business world, the needs of corporate sales forces are radically changing.
Tags : 
sales, mobility, technology, sales process, relationship management, collaboration, business analytics, data management, business technology
    
Oracle

Jobvite 2013 Social Recruiting Survey Results Ebook

Published By: Jobvite     Published Date: Sep 24, 2013
Social recruiting has grown up and has seen universal adoption across industries. Anyone not leveraging social referrals is behind the curve. Download Jobvite's 6th Annual Social Recruiting Survey Results to see how your social recruiting strategy compares.
Tags : 
social recruiting, social recruitment, new hires, talent management, jobvite, recruit workers, workforce management
    
Jobvite

Marketo for Enterprise: Overview Demo

Published By: Marketo     Published Date: Oct 08, 2014
In this on-demand demo, learn how leading enterprise marketing teams are leveraging Marketo’s customer engagement platform to increase lead conversion, improve marketing ROI and integrate social campaigns.
Tags : 
marketo, enterprise marketing, lead conversion, marketing roi
    
Marketo

Marketo for Enterprise: Overview Demo

Published By: Marketo     Published Date: Dec 11, 2015
In this on-demand demo, learn how leading enterprise marketing teams are leveraging Marketo’s customer engagement platform to increase lead conversion, improve marketing ROI and integrate social campaigns.
Tags : 
webinar, marketo, demo, crm, lead conversion, marketing, roi, business technology
    
Marketo

How Agile Insurers are Improving the Bottom Line

Published By: DocuSign     Published Date: Jun 25, 2014
The Internet has empowered consumers with self-service, and the insurance industry is adapting and innovating amongst its competitors to create a great online experience. It is imperative for insurers to decide where best to invest in technology - streamlining customer- or agent-initiated processes. Effectively leveraging the right technology helps insurers enable both the agent and customer.
Tags : 
docusign, self service, insurance industry, ombud, key interactions, technology, enterprise applications
    
DocuSign

Secure Apps + Instant Access: Connect any user to any app with zero changes to the network

Published By: BubblewrApp     Published Date: Jan 20, 2015
"Agile companies push new application versions to production every few weeks, sometimes even faster. With super-fast Beta cycles being the norm, getting various user groups, such as remote QA teams, access to staging environments can slow down your delivery timelines. What if you could enable secure access for any number of users in 15 minutes? BubblewrApp’s Service Access Service (SAS) is a turnkey, cloud-based service that acts as the first line of defense for your applications. BubblewrApp’s SAS enables its customers to grant easy access to applications deployed ""behind the firewall"" (on premise) or ""inside the Virtual Private Cloud"" (in a public cloud) from any remote location. Customers can begin leveraging SAS within minutes without requiring any changes to pre-existing network and security policies. The result is a vastly superior secure application access model that enables a zero CapEx, low OpEx model for secure application access, both on premise and in the public cloud."
Tags : 
secure access, security policies, new applications, delivery timeline, cloud-based service, sas, application access model, software development, enterprise applications
    
BubblewrApp

Grow Your IoT Security Business by Investing in Real-Time Discovery, Visibility and Control

Published By: Great Bay Software     Published Date: Jan 04, 2018
By 2020 Gartner estimates the proliferation of IoT with a market installed base of 20.4 billion endpoint devices, comprised of both "smart" and "dumb" devices, each leveraging multiple communication types. As each of these devices can become a target entry point for hackers, endpoint and network visibility is a top concern for CISOs responsible for security and risk management.
Tags : 
iot, iot security, iot endpoint security, gartner
    
Great Bay Software

Leveraging Endpoint Backup for Legal Holds & e-Discovery

Published By: Code42     Published Date: Jan 13, 2016
Read this white paper to learn how the common approaches to e-Discovery miss the mark and how endpoint backup can streamline the collection and preservation of electronically stored information.
Tags : 
code42, e-discovery, endpoint backup, e-discovery methods, data collection, compliance requirements, security, it management, knowledge management, enterprise applications
    
Code42

Architecting Active Directory Federation across Office 365, Azure and On Premises IT

Published By: Rackspace     Published Date: Mar 08, 2016
We’ll discuss why hybrid makes sense, common concerns, pitfalls to consider, and best practices for setting up your hybrid infrastructure leveraging Azure Active Directory services with Office 365.
Tags : 
rackspace, office 365, azure, on premise, active directory federation, security, enterprise applications, business technology
    
Rackspace

Accelerate And Modernize Container Application Delivery With SUSE

Published By: AWS     Published Date: Jun 04, 2019
Description Organizations are shifting to containers for its many benefits, including increased developer productivity and an improved, modernized environment for customized applications. While Kubernetes helps organizations get the most out of those benefits, it is complex by nature and can be difficult to manage on your own. Developers need a solution that drives productivity without needing to worry about managing infrastructure. SUSE Cloud Application Platform on Amazon Web Services (AWS) provides a lean and fast platform to accelerate containerized application delivery. By leveraging a managed Kubernetes environment, SUSE makes it easier for DevOps teams to deliver applications, accelerate innovation, and improve IT responsiveness.
Tags : 
    
AWS

Empower your Developers and Drive Productivity by Leveraging Kubernetes

Published By: AWS     Published Date: Jun 04, 2019
Description Zendesk is a customer service software company that serves over 125,000 organizations around the world. Wanting to create better experiences for its end users and their customers, Zendesk realized that operating on-premises made it difficult for their developers to provision the resources needed to innovate. To simplify the developer experience, Zendesk migrated to AWS and used containers to bolster portability between on-premises and the cloud. Now operating a massive, distributed container-based environment, Zendesk needed an all-in-one monitoring solution that matched their environment's scale and agility.
Tags : 
    
AWS

Data Webinar: Leveraging Kubernetes

Published By: AWS     Published Date: Aug 26, 2019
Empower your developers and drive productivity by leveraging Kubernetes. Carmen Puccio, Principal Solutions Architect, Amazaon Web Services, Inc. Michael Gerstenhaber, Director of Product, Datadog Jon Moter, Senior Principal Engineer, Zendesk
Tags : 
    
AWS

Getting the most out of Kubernetes management across Amazon EKS and your on-premises environment

Published By: AWS     Published Date: Oct 14, 2019
Containers have become the new infrastructure standard for development teams. While the “DIY container approach” (un-orchestrated containers) still has its use cases (e.g. low latency, longer compute jobs, predictable traffic), production-grade deployments require orchestration. DevOps teams are increasingly leveraging the benefits of Kubernetes and accelerating its adoption, taking it from a 27% adoption rate in 2018 to a 48% adoption rate in 2019 according to the RightScale “2019 State of the Cloud Report,” from Flexera. The same report also positions Amazon Elastic Kubernetes Service (Amazon EKS) as one of the fastest-growing managed Kubernetes offerings available, with a 44% adoption rate. Previously, containers were a technology deployed by individual teams – and were typically used for “application testing” in the enterprise world. Today, many organizations are now not only seeing the benefits of operationalizing containers to deploy production applications, but also re-positioni
Tags : 
    
AWS

The New BYOD: 5 Best Practices for a Productive BYOD Program (German)

Published By: VMware     Published Date: Feb 24, 2017
Today's savviest enterprises are leveraging BYOD as a tool to drive mobile accessibility, increase IT oversight, and enable employees to complete business tasks anytime, anywhere, on any device. Considering the risks, there must be a strategy for managing and securing these BYOD devices. BYOD programs provide users with a secure, IT-approved method for accessing corporate resources from their personal devices. This white paper outlines the basic measures business leaders and IT professionals are taking to turn their BYOD programs into major productivity gains.
Tags : 
    
VMware

The New BYOD: 5 Best Practices for a Productive BYOD Program (Italian)

Published By: VMware     Published Date: Feb 24, 2017
Today's savviest enterprises are leveraging BYOD as a tool to drive mobile accessibility, increase IT oversight, and enable employees to complete business tasks anytime, anywhere, on any device. Considering the risks, there must be a strategy for managing and securing these BYOD devices. BYOD programs provide users with a secure, IT-approved method for accessing corporate resources from their personal devices. This white paper outlines the basic measures business leaders and IT professionals are taking to turn their BYOD programs into major productivity gains.
Tags : 
    
VMware

Business Answers at Your Fingertips: The Real-Time Value of BI

Published By: SAP     Published Date: Mar 24, 2011
This Aberdeen Research brief hones in on the critical time element of a Best-in-Class BI strategy. The research shows that these top performers are leveraging real-time or near real-time analytics in order to proactively manage their business and drive substantial performance improvements.
Tags : 
bi strategy, real-time analytics, performance boost, business insight, business analytics, business intelligence
    
SAP
Start   Previous    11 12 13 14 15 16 17 18 19 20 21 22 23 24 25    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.