text

Results 26 - 50 of 713Sort Results By: Published Date | Title | Company Name

Ovum Report: Market Landscape: B2B Integration Managed Services Providers

Published By: OpenText     Published Date: Mar 02, 2017
Market-leading research group Ovum recently conducted a comparison of B2B integration managed services providers. Get your copy for a full vendor comparison and see why OpenText™ is positioned as the leader in B2B integration managed services.
Tags : 
ovum report, b2b integration, managed services, edi solutions
    
OpenText

Are You Focused On What Matters? How to Optimize Your Data Interchange

Published By: OpenText     Published Date: Mar 02, 2017
Leave it to the experts to manage your EDI for you, so you can focus on your business. Read about the benefits of B2B managed services in this white paper.
Tags : 
b2b integration, document exchange, edi, erp, b2b managed services
    
OpenText

Unlock the Value of Your Supply Chain

Published By: OpenText     Published Date: Mar 02, 2017
Watch this webinar with IDC supply chain experts to learn how embedded analytics can provide deeper supply chain intelligence and help you extract maximum value from data for your supply chain operations.
Tags : 
idc webinar, analytics, supply chain intelligence, supply chain operations
    
OpenText

Achieve Real-Time Visibility Across Your Supply Chain

Published By: OpenText     Published Date: Mar 02, 2017
Watch the video to learn how Procure-to-Pay (P2P) solutions automate B2B processes to help you gain better visibility into transaction lifecycles, improve efficiency, and increase the speed and accuracy of order, shipping, and invoice processing.
Tags : 
supply chain, b2b, procure-to-pay, shipping, invoicing
    
OpenText

AIIM eBook Revolution or Evolution: 10 Strategies to Navigate the Shift from ECM to Content Services

Published By: OpenText     Published Date: Mar 13, 2017
Read this AIIM ebook to get a list of action items that will help you make the transition to content services.
Tags : 
ecm, content services, content marketing, ebook, information governance
    
OpenText

IG Snapshots: What We Learned by Looking at Five Organizations' Information Governance Programs

Published By: OpenText     Published Date: Mar 13, 2017
This report from the Information Governance Initiative explores the challenges that five different organizations faced in reaching their information governance goals and how they overcame them.
Tags : 
ecm, content services, content marketing, ebook, information governance
    
OpenText

Scale Mountains of Enterprise Content Management Challenges Infographic

Published By: OpenText     Published Date: Mar 13, 2017
Take a look at this infographic to learn how Enterprise Information Management solutions can help you make better decisions faster, gain competitive advantage, speed time-to-value, and empower your organization.
Tags : 
eim, infographic, analytics, data management
    
OpenText

Magic Quadrant for the CRM Customer Engagement Center

Published By: Pega     Published Date: May 25, 2016
IT leaders working on customer service projects must display an incredible amount of diligence. An organization’s CRM system has become its lifeline to customers, but as customer needs evolve so has the requirements of CRM. According to Gartner, today’s CRM solution must include a laundry list of capabilities outside its traditional core functionality including: native mobile support of the vendor's customer service and support business applications; real-time analytics; industry-specific functionality and workflow; context mining of voice and text; scalable cloud-based systems; social media engagement; suggested next agent action; multimodal capabilities, such as chat within mobile self-service; and even co-browsing. Gartner surveyed the CRM field and evaluated each vendor including Pegasystems. Download this Gartner Magic Quadrant analysis and gain a better understanding each vendors’ CRM Customer Engagement Center solutions.
Tags : 
best practices, customer support, business intelligence, business optimization, customer engaement, business management, business process management, customer interaction service
    
Pega

The Forrester Wave: Dynamic Case Management, Q1 2016

Published By: Pega     Published Date: May 25, 2016
The customer experience is critical in today’s fast-paced, demanding world. With so many options at the buyer’s fingertips and the rise of social sharing media, one bad customer experience can haunt an organization. According to” The Forrester Wave™: Dynamic Case Management, Q1 2016” report, in order to improve customer experience, firms must tackle the incident process through smart handling of exceptions, applying analytics for context, and offering real-time and mobile interaction. Here is where dynamic case management (DCM) can be a competitive advantage and Forrester identified 14 of the most significant vendors across 21 criteria in this space with Pegasystems among vendors who lead the pack. Download this Forrester Wave report to see the full 21-criteria evaluation of the dynamic case management (DCM) market and gain insight into the 14 most significant software vendors in order to help enterprise architecture (EA) professi
Tags : 
case management, forrester, dynamics, enterprise, best practices, business integration, business intelligence, enterprise software
    
Pega

The Forrester Wave: Real-Time Interaction Management, Q3 2015

Published By: Pega     Published Date: May 25, 2016
Customer insights professionals face the challenging task of delivering contextually relevant experiences across the customer life cycle. They need to work with their business technology counterparts to integrate enterprise marketing technologies that manage customer data, provide real-time analytics and insights, and automate cross-channel interactions. Here is where Real-Time Interaction Management (RTIM) is critical, according to The Forrester Wave™: Real-Time Interaction Management, Q3 2015 report, which identified the 11 most significant technology providers in this space across 35 criteria. Forrester defines RTIM as “Enterprise marketing technology that delivers contextually relevant experiences, value, and utility at the appropriate moment in the customer life cycle via preferred customer touchpoints,” and identifies Pegasystems as one a leader in this very diversified pack. Download this Forrester Wave report to
Tags : 
interaction management, business technology, enterprise, forrester, best practices, pegasystems, business analytics, open source
    
Pega

The Rise of the Identity-Defined Workspace

Published By: VMware     Published Date: Feb 24, 2017
In the world of the digital workspace, employees want to get access to apps and data, with one-touch single sign-on simplicity from any device, anywhere. This poses problems for organizations as they try to ensure security and control with contextual controls, such as device type, device posture, network location, and a host of other conditions. Download this infographic to see how VMware Workspace™ ONE™ is the identity-powered solution your organization has been looking for.
Tags : 
    
VMware

The Rise of the Identity-Defined Workspace

Published By: VMware     Published Date: Feb 24, 2017
In the world of the digital workspace, employees want to get access to apps and data, with one-touch single sign-on simplicity from any device, anywhere. This poses problems for organizations as they try to ensure security and control with contextual controls, such as device type, device posture, network location, and a host of other conditions. Download this infographic to see how VMware Workspace™ ONE™ is the identity-powered solution your organization has been looking for.
Tags : 
    
VMware

The Rise of the Identity-Defined Workspace

Published By: VMware     Published Date: Feb 24, 2017
In the world of the digital workspace, employees want to get access to apps and data, with one-touch single sign-on simplicity from any device, anywhere. This poses problems for organizations as they try to ensure security and control with contextual controls, such as device type, device posture, network location, and a host of other conditions. Download this infographic to see how VMware Workspace™ ONE™ is the identity-powered solution your organization has been looking for.
Tags : 
    
VMware

The Rise of the Identity-Defined Workspace

Published By: VMware     Published Date: Feb 24, 2017
In the world of the digital workspace, employees want to get access to apps and data, with one-touch single sign-on simplicity from any device, anywhere. This poses problems for organizations as they try to ensure security and control with contextual controls, such as device type, device posture, network location, and a host of other conditions. Download this infographic to see how VMware Workspace™ ONE™ is the identity-powered solution your organization has been looking for.
Tags : 
    
VMware

The Rise of the Identity-Defined Workspace

Published By: VMware     Published Date: Feb 24, 2017
In the world of the digital workspace, employees want to get access to apps and data, with one-touch single sign-on simplicity from any device, anywhere. This poses problems for organizations as they try to ensure security and control with contextual controls, such as device type, device posture, network location, and a host of other conditions. Download this infographic to see how VMware Workspace™ ONE™ is the identity-powered solution your organization has been looking for.
Tags : 
    
VMware

The Rise of the Identity-Defined Workspace

Published By: VMware     Published Date: Feb 24, 2017
In the world of the digital workspace, employees want to get access to apps and data, with one-touch single sign-on simplicity from any device, anywhere. This poses problems for organizations as they try to ensure security and control with contextual controls, such as device type, device posture, network location, and a host of other conditions. Download this infographic to see how VMware Workspace™ ONE™ is the identity-powered solution your organization has been looking for.
Tags : 
    
VMware

Conducting the Cross

Published By: Adobe     Published Date: Sep 12, 2017
"Discover new strategies for creating, managing, and orchestrating cross-channel campaigns. Read our guide now to learn how you can: --Integrate processes and data for cross-channel campaign success --Create personalized, contextual campaigns across channels and devices --Leap ahead of the competition with authentic cross-channel experiences"
Tags : 
    
Adobe

10 Goals for a Perfectly Balanced Email Marketer

Published By: Adobe     Published Date: Mar 26, 2018
If you’re wondering whether you should really prioritize email in your marketing—especially when new channels continually emerge—consider this: 91 percent of marketing executives agree that email is their most effective channel.1 Clearly, email isn’t just here to stay, it’s the mainstay. And with the ability to personalize and contextualize messages, upgrade mobile campaigns, and better understand customer needs, email marketing has evolved into a stronger and smarter version of its former self.
Tags : 
    
Adobe

Vision from the Harbor

Published By: Adobe     Published Date: Mar 26, 2018
It’s iconic. Concrete sails riding gentle waves. A million subtly textured tiles reflecting “the mood of the harbor.”1 The Sydney Opera House is recognizable by nearly everyone, a structure so loved and venerated it stands “alongside the Taj Mahal, the Acropolis, and the Great Pyramids” as a World Heritage site, “a cultural site having outstanding universal value.
Tags : 
    
Adobe

Magic Quadrant for Digital Marketing Hubs

Published By: Adobe     Published Date: Mar 27, 2018
Vendors from advertising, marketing automation and analytics are racing to deliver personalized digital marketing at scale. Marketing leaders need a system that can integrate and coordinate data and activities across channels, devices and contexts, continuously and in real time.
Tags : 
    
Adobe

Enhanced Data Center Security with SPARC and Oracle Solaris

Published By: Oracle CX     Published Date: Oct 19, 2017
This paper provides guidance to organizations interested in researching Oracle’s SPARC M7 and Oracle Solaris 11 security features and capabilities. It will also provide a high level overview of some of the noteworthy features that these two product offerings bring to the market. We will review industry best practices in information security as it relates to these Oracle products in the context of a secure implementation. This paper is not meant to be an in depth technical paper, position paper, or security implementation guide. It will instead endeavor to deliver a foundational level of knowledge of the SPARC M7 processor and server technology and the function set within Oracle Solaris 11 that are primarily relevant to information security as it is currently understood. The information used to compose this paper was collected from a variety of open sources, interviews with Oracle subject matter experts, and reviews of OEM (Original Equipment Manufacturer) documentation and specificatio
Tags : 
    
Oracle CX

Gartner Research Note on Security Trends

Published By: Gigamon     Published Date: Oct 25, 2017
Read Gartner’s research note, Top 10 Strategic Technology Trends for 2017: Adaptive Security Architecture, to improve visibility and control over your organization’s exposure to risk with a continuous, contextual and coordinated approach to security. Comprehensive protection now requires an adaptive process to predict, prevent, detect and respond to security breaches that includes DevSecOps, IoT Security, and Intelligent Security. This note walks you through key planning assumptions, analysis, best practices and specific recommendations.
Tags : 
    
Gigamon

Security Evolved: Why It's Time To Bring Together Identity, Access and Real-Time Threat Prevention

Published By: Preempt     Published Date: Nov 02, 2018
Enterprises and the threats that target them have all fundamentally evolved over the past decade. In response, the security industry has generated an enormous amount of point solutions and technologies to try and keep pace. However, for all of this innovation and change, the underlying enforcement architecture has remained largely unchanged. A new modern approach to preempting threats is required. One that augments the existing architecture instead of replaces it. This new approach brings full enterprise and business context to real-time enforcement decisions. Identity, behavior, devices, anomalies, and risk all play a real-time role. Just as importantly, enforcement and access options can be graded based on the risk to the business, and policies can actively seek out and adapt to new information.
Tags : 
    
Preempt

HP SmartStream Designer With HP Mosaic and HP Collage

Published By: HP Inc.     Published Date: May 20, 2019
HP SmartStream Designer is a powerful, easy-to-use variable data printing (VDP) tool enabling users of HP Indigo and other HP digital presses to create sophisticated high-value jobs and personalized campaigns. A software plug-in for Adobe® InDesign® or Adobe Illustrator®, HP SmartStream Designer makes it possible to personalize any job with images, text and designs, for maximum impact. It has an easy to-use interface and can be easily integrated with over a dozen third-party dynamic applications. It also features rich database logic and preflight capabilities.
Tags : 
    
HP Inc.

The Watson API Mashup Guide

Published By: IBM APAC     Published Date: Nov 22, 2017
A user initiates the call and selects the source language, such as Spanish. (In this example, assume that the target language is set to English.) As the user is talking to the support representative, the audio is converted to text using the Speech to Text service. Then using Language Translator, the text is translated to English. English language text is then sent to the Text to Speech service as input. The output audio message is what the support representative hears. All of this happens in near real time. The text from Speech to Text and the Language Translator service also can be stored in a database for analytics. The same process is repeated in reverse for the audio message sent by support personnel.
Tags : 
source, language, english, spanish, speech to text, database, analytics, audio message
    
IBM APAC
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.