rpa

Results 126 - 150 of 160Sort Results By: Published Date | Title | Company Name

Why IBM Flex System is the Best Blade Solution on the Market

Published By: IBM     Published Date: Sep 27, 2013
This document explains briefly how and why IBM Flex System surpasses mere blade systems.
Tags : 
ibm, ibm flex system, best blade solution, storage, ibm pureflex system, networking, platform systems, integrated systems, compute nodes, blade systems, chassis, storage, data management, storage management, storage virtualization, business technology
    
IBM

How Watson Engagement Advisor Works

Published By: IBM     Published Date: Feb 26, 2016
"When it comes to customer service, millennials have little patience and incredibly high expectations. In the United States, this segment's buying power will surpass that of any other single generation in 2017. Are you ready to meet these demands? IBM Watson Engagement Advisor goes far beyond the conventional call center automation mandate of controlling operational costs - it empowers customers to serve themselves however and whenever suits them best. Whether it's troubleshooting their account, getting advice on which products to buy, or resetting their password, Watson Engagement Advisor is available 24x7 through any device to get to the heart of customers’ needs, faster. "
Tags : 
ibm, watson engagement advisor, analytics, customer service, application integration, business intelligence, customer interaction service, customer relationship management, enterprise software
    
IBM

MarketingSherpa's 25 Marketing Lessons - A Complimentary eBook

Published By: HubSpot, Inc.     Published Date: May 19, 2010
MarketingSherpa has compiled 25 marketing lessons based on independent research featured in MarketingSherpa's Benchmark Reports. You have questions - get the answers.
Tags : 
hubspot, search, sem, search engine marketing, marketing sherpa, email lists, lead generation, demand generation, sales process, social media
    
HubSpot, Inc.

Monitoring Employee Productivity in a Roaming Workplace

Published By: SpectorSoft     Published Date: Apr 22, 2014
Remote employees have more opportunity for distraction, lack of training, and inability to be refocused on task than their in-office counterparts, so companies need to get serious about ways to gain visibility into the activities of their remote employees to gauge productivity
Tags : 
employee monitoring, user activity monitoring, security, insider threats, data breach, employee privacy, employee investigation, incident response
    
SpectorSoft

ESG Whitepaper- Why StoreOnce Federated Deduplication Matters to HP and should to you too

Published By: HP     Published Date: Aug 08, 2014
Deduplication is not new—and HP was certainly not the first to market it. Instead, by watching how deduplication was introduced and listening to the evolving demands of customers who struggle with storage and backup issues, HP built StoreOnce as a next-generation or “Dedupe 2.0” architecture that is available now. With its formidable enterprise experience, server and storage product lines, and broad partner ecosystem, HP intends to catch up with and, in fact, surpass the status quo to bring better deduplication at a lower cost.
Tags : 
federated, storeonce, deduplication, storage, it benefits, backup systems, challenges, challenges, technologies, enterprise applications
    
HP

Gen Z vs. Millennials: The Changing Landscape of Loyalty

Published By: CrowdTwist     Published Date: Aug 04, 2017
Millennials have officially surpassed the Baby Boomers as the nation’s largest living generation and newcomers Generation Z are rising in the ranks, poised for consumer domination with $44 billion in spending power. It’s expected that Generation Z will make up 40 percent of consumers by 2020. Never has understanding these two generations been as critical for brands in their pursuit of establishing consumer loyalty. CrowdTwist conducted research into the similarities and differences between Generation Z and Millennials, how they engage with brands, their shopping habits, their brand loyalty and their attitudes towards loyalty programs. This report provides an overview of those findings as well as recommendations for brands investing in loyalty strategies for current and future consumers.
Tags : 
gen z, millennials, crowdtwist, branding, loyalty, consumers
    
CrowdTwist

Gen Z vs. Millennials: The Changing Landscape of Loyalty

Published By: CrowdTwist     Published Date: Aug 29, 2017
Millennials have officially surpassed the Baby Boomers as the nation’s largest living generation and newcomers Generation Z are rising in the ranks, poised for consumer domination with $44 billion in spending power. It’s expected that Generation Z will make up 40 percent of consumers by 2020. Never has understanding these two generations been as critical for brands in their pursuit of establishing consumer loyalty. CrowdTwist conducted research into the similarities and differences between Generation Z and Millennials, how they engage with brands, their shopping habits, their brand loyalty and their attitudes towards loyalty programs. This report provides an overview of those ?ndings as well as recommendations for brands investing in loyalty strategies for current and future consumers.
Tags : 
    
CrowdTwist

Cybercriminalité – Une menace toujours plus présente

Published By: Thawte     Published Date: Oct 06, 2015
Au Royaume-Uni, le coût de la cybercriminalité a atteint le chiffre record de 27 milliards de livres. Mais quelle est la menace réelle pour votre entreprise? Violations de données, usurpation d’identité, phishing, spams, malwares, vulnérabilités... découvrez l’ampleur du risque et les mesures à prendre pour vous protéger.
Tags : 
cybercrime, business threats, phishing and spam, identity theft, security
    
Thawte

ListGrabber: Tool to Capture Contact Lists/Leads from free lead sources on the Internet

Published By: eGrabber     Published Date: Sep 21, 2009
The Internet has many free sources of leads that you can use to market your product or service. ListGrabber is a powerful sales lead capture tool that allows you to build your own lead or prospect lists from various publicly available sources of free leads on the Internet. You can capture contact lists from online directories (like yellowpages.com, superpages.com, whitepages.com), association websites, membership directories, etc. and enter them into an Excel spreadsheet or any database (ACT!, Outlook, Excel, GoldMine, etc.) This sales and marketing software enables you to: . Capture name, address, email, phone and fax number, etc of likely prospects . Automatically transfer the captured contacts into an Excel spreadsheet or any other database . Complete your online lead generation in seconds . Start your cold calling and email/telemarketing campaigns sooner . Capture contact information found in email signatures, spreadsheets and documents Cost: $249.95 Download your Trial Copy Today.
Tags : 
lead, listgrabber, act, outlook, excel, goldmine, yellowpages, whitepages, superpages, leads, lead generation, egrabber, public
    
eGrabber

Practical Threat Management for Educational Institutions

Published By: AlienVault     Published Date: Mar 30, 2016
The public demands accountability for data breaches involving systems that include personally identifiable information (PII) and expects that all educational institutions will have the same levels of security that Fortune 500 companies do. However, most educational institutions have fewer IT security resources than their larger enterprise counterparts, yet they face the same threats from attackers. Fortunately, there are solutions. This whitepaper by SANS instructor Jake Williams walks through an example of a typical breach in an education organization, highlighting common ways attackers gain access to a network and practical steps to reduce risk. Download this whitepaper to learn: • Common security gaps that make educational institutions vulnerable to attack • Practical security controls that won't break the bank • Key questions to evaluate security vendors • A checklist summarizing steps you should take now to improve security
Tags : 
    
AlienVault

Retail's Guide to Holiday Planning

Published By: AdRoll     Published Date: Aug 22, 2017
For most retailers, the holidays are a frenzied rush of juggling multiple campaigns, meeting revenue goals, and hitting lofty numbers before the year is up. It’s far from a relaxing time of year. The holiday season has become critically important to online retailers. With the rise of Black Friday, Small Business Saturday, Cyber Monday, Green Monday, Super Saturday, and Boxing Day, the definition of “the holidays” has expanded substantially. While these retail days have helped distribute the holiday rush across a wider range, they’ve also made holiday campaign planning far more complex. Expanding digital channels, such as mobile and social media, have added to the immense opportunities that the holidays provide. Just last year, mobile accounted for 50.3% of all e-commerce traffic, surpassed desktop traffic for the first time ever. Knowing this, it shouldn’t be a surprise that 38% of shoppers now say they will not return to a retailer’s website if it’s not mobile optimized.
Tags : 
holiday planning, retail, black friday, social media, mobile
    
AdRoll

Email Marketing Case Study: Meade Automotive Group

Published By: eROI     Published Date: Jan 23, 2007
Email marketing was an unexplored avenue for Meade Auto and they were open to its potential as a tool to help create awareness and sell cars. Learn how eROI helped Meade to implement a successful email marketing campaign for their Lexus dealerships that surpassed their expectations.
Tags : 
email marketing, newsletter design, viral marketing
    
eROI

Jump-start collaboration in real-time with IBM

Published By: IBM     Published Date: Mar 04, 2009
As a small to midsize business owner, you understand that in order to grow, you need to be able to communicate and collaborate with people, quickly and easily. But you have limited budgets and IT resources. You want security-rich solutions that will extend your assets, improve operating efficiencies and grow as your company grows. IBM offers you reliable solutions that can help you compete with your larger counterparts.
Tags : 
ibm, lotus, lotus complete messaging, communication and collaboration, security-rich solutions, business-grade instant messaging, ibm lotus domino, web conferencing, voip, lotus sametime, security, enterprise applications, video conferencing, voice over ip
    
IBM

Information Security for SMBs: Ensuring End-to-End Care of Data Assets

Published By: Quocirca     Published Date: Jan 11, 2008
Small and medium-sized businesses (SMBs) can benefit from the expansive use of information technology (IT) just as much as their larger counterparts. Indeed, in many cases they have to, because to trade they need to interact with business partners of all sizes and IT failure affects not just internal users but those of third parties.
Tags : 
insight report, quocirca, smb, small business, soho, mid-sized business, smbs, data security, network security, small business it, it networks, securing data, networking, security, data management, infrastructure, small business networks, database security
    
Quocirca

Soaring Not Surfing: Small- and Medium-Sized Businesses Make the Connection

Published By: Quocirca     Published Date: Jun 13, 2008
Over the past decade, the internet has evolved from a technical environment into a commercial marketplace. The impact on consumers and large enterprises has been significant, but what about the small and medium sized business? With few of the skills and resources of their larger counterparts, these organizations need to get the best value from the internet and the network based services it enables, without risking day-to-day operations.
Tags : 
quocirca, smb, smbs, small business, medium business, mid-sized business, connectivity, ip networks, small business networks
    
Quocirca

IT Asset Management: Saving Money, Reducing Risk

Published By: NetSupport     Published Date: Nov 14, 2007
A majority of organizations do not have efficient ways of keeping track of their IT assets. That opens them up to dangers like system downtime from improperly implemented upgrades, potential licensing violations, poor customer service, overpaying on license fees and improper usage of software and the Internet by employees.
Tags : 
itam, asset management, spend management, cost savings, cost control, risk management, it management, software compliance, net support, netsupport, network management, it spending
    
NetSupport

A Guide to Application Delivery Optimization and Server Load Balancing for the SMB Market

Published By: KEMP Technologies     Published Date: Aug 04, 2008
Today’s small-to-medium sized businesses (SMB) are undergoing the same IT evolution as their enterprise counterparts, only on a smaller scale. For SMBs, website reliability, flexible scalability, performance and ease of management are as essential to SMB website infrastructure as they are to an enterprise. It’s fare to say that these capabilities are an important operational imperative for businesses of all sizes.
Tags : 
load balancer, load balancing, application delivery, ssl acceleration, application optimization, windows terminal services, terminal services, content switching, server load balancing, application security, network security, kemp, kemp technologies, servers, small business networks, application performance management
    
KEMP Technologies

Process Control Yields Cost Effective Weld Integrity - RPAS

Published By: Orbitform Group     Published Date: Jan 07, 2009
Today, resistance welding takes many forms across numerous applications in diverse market seg-ments. While each company must decide the most efficient welding technology for its various operations, the parameters that govern such decisions often change, sometimes rather quickly over short time intervals. This means decision makers must constantly monitor welding processes to ensure the right technology is applied to each application and done so in a cost effective manner.
Tags : 
orbitform, welding process control, resistance welding, welding technology, wlan, wan, networking, ethernet networking, vpn, wide area networks
    
Orbitform Group

How to Create High-Conversion Content for Lead Generation: 5 Key Questions Answered

Published By: GoToWebinar     Published Date: Apr 06, 2011
This brief explores these questions and offers advice and strategies for content creation and distribution.
Tags : 
lead generation, webinar, high-conversion content, citrix gotowebinar, marketing sherpa, web conferencing
    
GoToWebinar

Evolution of Regulatory Capital Planning, Measurement and Management

Published By: SAS     Published Date: Aug 03, 2016
Banks and financial institutions have faced a spate of regulations centered on capital adequacy since the financial crisis started in 2008. The Basel Committee on Banking Supervision (BCBS) initiated a series of reforms to strengthen risk, capital and liquidity rules across banks. Among the important changes recommended are new rules for calculating Tier I and Tier II capital and the inclusion of additional risk measurement components for market risk, liquidity risk and counterparty risk. Despite these changes, a key drawback of the Basel framework is its focus on historical capital adequacy. While being useful, it does not help assess the impact of stress events on banks from an ex-ante basis. Hence regulatory agencies in several jurisdictions have mandated banks to define a forward-looking capital plan that incorporates stress scenarios.
Tags : 
best practices, business management, finance, banking, financial crisis, business analytics
    
SAS

Get Started with Facebook Advertising - 5 Key Tips to Get Great ROI

Published By: Facebook     Published Date: Apr 07, 2011
Heard the buzz about advertising on Facebook but not sure where to get started? We interviewed Facebook's Director of Monetization for 5 must-have tips on how to achieve success using Facebook's Ad Platform.
Tags : 
facebook, marketingsherpa, ad platform, roi, social media marketing, branding, internet marketing
    
Facebook

CMO Perspectives on Social Marketing ROI

Published By: Sysomos     Published Date: May 26, 2011
A strategy for monetizing social media marketing and measuring ROI.
Tags : 
marketwire sysomos, marketingsherpa, cmo perspectives, social media monetization, social marketing roi, sergio balegno
    
Sysomos

How Online Retailers Can Tap into the Emerging Site Monetization Boom

Published By: Searchandise     Published Date: Jun 21, 2011
Reliance on retail sites provides unprecedented opportunity for retailers to look at their sites as media venues, and retail search media has emerged. Think paid search for retail websites and their mobile counterparts.
Tags : 
retail search media, retail media, advertising
    
Searchandise

Dell EMC Hyperconverged VxRack System 1000

Published By: Dell EMC     Published Date: Feb 23, 2017
Enterprises of all sizes are undergoing massive data center modernization initiatives. They are looking to use technology to cut costs and drive competitive advantage. At the core of many of these transformations is an effort to reengineer IT delivery models to enable cloudlike flexibility of resources, and reduce both capital expenditures and operational overhead. That is giving rise to the private cloud movement. Indeed, private cloud adoption is accelerating and maturing. IT organizations are looking to the private cloud for the elasticity it can provide to add or remove resources as required. In fact, ESG research reveals that more than three-quarters of organizations would classify their private cloud deployment as either an advanced internal cloud or a basic internal cloud. Those organizations that have virtualized at least half of their production applications are more than twice as likely as their more physical infrastructure-dependent counterparts to categorize their environme
Tags : 
    
Dell EMC

Deep Dive into Security and Privacy

Published By: Cloud Sherpas     Published Date: Nov 06, 2015
Watch this webinar replay to explore the principles that guide Google’s security and privacy policies in order to understand how going Google can transform your organisation without compromising security.
Tags : 
security, cloud, cloud computing, security cloud computing, security and privacy, google, google apps, application security, application integration, virtualization, infrastructure, infrastructure management
    
Cloud Sherpas
Start   Previous    1 2 3 4 5 6 7    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.