voc

Results 1 - 25 of 289Sort Results By: Published Date | Title | Company Name

7 Best Practices for Simplifying Data Center Cable Management

Published By: Data Center Frontier LLC     Published Date: Nov 11, 2019
Data center cable management is often considered a problem reserved for network engineering teams, but bad cable design can wreak havoc across your entire enterprise. “Spaghetti” cabinets and other symptoms of ill-considered cabling make it more difficult to complete equipment installations, troubleshooting, and maintenance. They can create an unsafe operating environment for your equipment by restricting airflow to racks, trapping dust, keeping cables warm, and making it impossible to understand at a glance how your devices are connected. Bad cable management practices can even hinder modern data center environments from adapting to new technologies like IoT and big data, provisioning IT resources on demand to support business innovation, and utilizing data center capacity to promote scalability, efficiency, and cost effectiveness.
Tags : 
    
Data Center Frontier LLC

THE 9 MOST COMMON AWS DEPLOYMENT QUESTIONS, ANSWERED

Published By: Rackspace     Published Date: Nov 06, 2019
In this hands-on guide, our AWS Amazing Minds share advice on how to navigate and optimise your cloud journey on AWS, tackling the 9 most common questions around upskilling on AWS, automation, DevSecOps, customised cloud and more. Our customers were the catalyst for creating the Amazing Minds series. Independent research combined with insights from our day-to-day business interactions, told us unequivocally that they wanted to be part of the journey. We also know that a secure and high-performing cloud journey is at its best when it’s a shared experience. Download the guide to see how you can achieve how performance outcomes on AWS and save time and money whilst doing so.
Tags : 
    
Rackspace

4 FM Leaks that Wreak Havoc

Published By: Corrigo     Published Date: Nov 01, 2019
PropTech is disrupting the facilities management and real estate industries – from big data and IoT to artificial intelligence and augmented reality. The latest advances in PropTech are accelerating change in facilities management like never before, driving bottom line value and helping future-proof FM operations. The promise of PropTech is why our Corrigo team is investing so heavily in frictionless, self-learning platforms to help our clients use technology to truly transform their businesses. But as we amplify FM ops with new technology, we are just as passionate about helping our clients optimize their current processes. Why? Because making even small changes today can mean huge savings for their bottom line. In fact, 80% of organizations are leaking more FM value right now than they could immediately gain with new, emerging tech strategies. That’s no small leak – it’s a staggering loss for organizations of all sizes. After analyzing 700 million facilities management transactions a
Tags : 
    
Corrigo

Radically Reduce Susceptibility to Email Attacks

Published By: Barracuda     Published Date: Oct 14, 2019
Traditional email-security defenses aren’t enough anymore. In today’s rapidly evolving threat environment, to stop email-borne threats, you must effectively defend against phishing and other potentially-devastating social-engineering attacks. These sophisticated threats are often able to bypass defenses using back-door techniques, including email spoofing, spear phishing and personal email fraud to penetrate network defenses and wreak havoc. Here’s a total email-protection strategy that can help radically reduce an organization’s susceptibility to attacks.
Tags : 
    
Barracuda

Infinidat Elastic Data Fabric

Published By: Infinidat EMEA     Published Date: Oct 10, 2019
La transformación digital está provocando un crecimiento exponencial en el almacenamiento de datos empresarial. Se necesita un enfoque totalmente nuevo para crear y escalar la infraestructura del almacenamiento.
Tags : 
    
Infinidat EMEA

Are Bots Killing Your Business Intelligence?

Published By: F5 Networks Singapore Pte Ltd     Published Date: Sep 19, 2019
"Every kind of online interaction—website visits, API calls to mobile apps, and others—is being attacked by bots. Whether it's fraud, scraping, spam, DDoS, espionage, shilling, or simply altering your SEO ranking, bots are wreaking havoc on websites as well as mobile and business applications. But that’s not all: they’re also messing with your business intelligence (BI). They can skew audience metrics, customer journeys and even ad buys, making business decisions questionable and costly. According to Forrester, ad fraud alone was set to exceed $3.3 billion in 2018. Not all bots are bad. In fact, your business depends on them. Search engine bots, for example, give your web presence visibility and authority online. Other good bots help you deliver better customer experiences—perhaps a chatbot provides instant customer assistance on your site. What’s important is enabling the good bots and blocking the bad ones."
Tags : 
    
F5 Networks Singapore Pte Ltd

Blueprint for Growth: The Ultimate Guide for Turning Customers into Advocates

Published By: NICE inContact     Published Date: Sep 18, 2019
Ready to step up your revenue in eight easy steps? Get this guide and start transforming your customer experience immediately. It’s helped other businesses reach up to 30% of their revenue goal – and it’ll work for your contact center too. This white paper includes strategies for: • Empowering and rewarding customer advocates • Encouraging and responding to customer feedback • Developing a plan for continuous improvement • Future-proofing processes and tools
Tags : 
    
NICE inContact

Inteligência conectada nos melhores bancos do mundo

Published By: TIBCO Software     Published Date: Sep 16, 2019
Os bancos em todo o mundo estão apostando muito em inteligência artificial e machine learning para lhes dar a vantagem tecnológica necessária para obter serviços bancários em tempo real, personalizados e preditivos. Um marco ajudará a diferenciar os primeiros ganhadores e fornecerá vantagens contínuas em inteligência. Faça o download deste IDC Analyst Infobrief para saber como os melhores bancos do mundo estão se tornando mais pessoais, preditivos e mais em tempo real do que nunca. O que você conhecerá: • 8 tendências que refletem o nível de preparação do banco para a inteligência conectada • 9 armadilhas para evitar e 9 maneiras de pular os obstáculos • Os elementos básicos pessoais, preditivos e em tempo real da IA e ML para os bancos • Líderes de destaque com base na pesquisa da IDC Financial Insights e em seus respectivos casos de uso • Orientação essencial do IDC para os bancos líderes
Tags : 
    
TIBCO Software

Três maneiras de gerar reduções de custo em investigações de falso positivo

Published By: TIBCO Software     Published Date: Sep 16, 2019
A maior dor de cabeça para a maioria das equipes de operações de pagamento é o controle de custos - e grande parte disso vem do gerenciamento de fraudes: • As equipes de investigação perdem muito tempo apenas reunindo os dados necessários para tomar as decisões. • Os mecanismos de detecção estão sempre se atualizando com os mais recentes padrões de fraude. • Os regulamentos em constante mudança aumentam o tempo e o custo necessários para alcançar a conformidade e atender aos padrões de auditoria. Dado seu escopo e impacto, substituir os principais sistemas de fraude não é uma opção para a maioria das empresas. Mas, em vez de substituí-los, você pode melhorar o processo investigativo com uma investigação ampliada e aprimorar o processo de detecção aperfeiçoando os sistemas atuais. Este relatório descreve três maneiras pelas quais as empresas de serviços financeiros podem usar as soluções TIBCO para reduzir o custo das investigações por meio de uma melhor detecção, e simplificar a co
Tags : 
    
TIBCO Software

Inteligência na Manufatura: mantenha seus processos sob controle (webinar)

Published By: TIBCO Software     Published Date: Sep 16, 2019
A tendência atual na indústria de manufatura se inclina para os produtos feitos sob medida em lotes pequenos e com tempo de entrega reduzido. Com frequência, esta mudança pode alterar a produção, o que acarreta em um maior tempo de inatividade das máquinas, custos de produção mais altos, desperdício de produtos e a necessidade de voltar a produzir os produtos defeituosos. Assista esse webinar para conhecer como as soluções Smart Manufacturing da TIBCO pode ajudá-lo a superar esses desafios. Você também verá uma demonstração da tecnologia da TIBCO em ação, e como ela melhora os processos de produção e otimização, assim como reduz os custos.
Tags : 
    
TIBCO Software

Executive Perspective: The CIO In 4.3 years

Published By: VMware     Published Date: Sep 12, 2019
Whether a CIO is on a four-year trajectory or has plans to stay much longer, there’s a way to thrive in this role as business priorities continuously evolve. I advocate producing early wins, setting sights on specific goals at specific points in time, and delivering on those goals whether you plan to be at a company for the long term or expect to move on soon after passing the four-year mark.
Tags : 
    
VMware

The 9 most common AWS deployment questions, answered

Published By: Rackspace     Published Date: Sep 04, 2019
In this hands-on guide, our AWS Amazing Minds share advice on how to navigate and optimise your cloud journey on AWS, tackling the 9 most common questions around upskilling on AWS, automation, DevSecOps, customised cloud and more. Our customers were the catalyst for creating the Amazing Minds series. Independent research combined with insights from our day-to-day business interactions, told us unequivocally that they wanted to be part of the journey. We also know that a secure and high-performing cloud journey is at its best when it’s a shared experience. Download the guide to see how you can achieve how performance outcomes on AWS, and save time and money whilst doing so.
Tags : 
    
Rackspace

Cybercrime’s Most Wanted: Guide to Protection

Published By: Juniper Networks     Published Date: Jul 31, 2019
Cybercrime has rapidly evolved, and not for the better. What began in the 1990s as innocent pranks designed to uncover holes in Windows servers and other platforms soon led to hacker Kevin Mitnick causing millions of dollars in malicious damages, landing him in prison for half a decade and raising the awareness of cybersecurity enough to jump-start a multimillion-dollar antivirus industry. Then came the script kiddies, unskilled hackers who used malicious code written by others to wreak havoc, often just for bragging rights. If only that were still the case.
Tags : 
application management, application performance, network infrastructure, network management, network security
    
Juniper Networks

CERTIFICATE MANAGEMENT: POLICY, AUTOMATION AND ENTRUST DATACARD VALUE

Published By: Entrust Datacard     Published Date: Jul 23, 2019
PKI is becoming a critical underpinning to help organizations succeed as they roll out new digital business models. Establishing a trusted infrastructure through PKI will help businesses take smart risks, evolve quickly and manage relationships with customers, partners, vendors and employees more effectively. Certificate management is a crucial part of a robust PKI implementation, ensuring visibility and adherence to policy throughout the certificate lifecycle: from identity vetting, to issuance, to renewal to revocation. As Gartner noted in its recent report, “PKI is Gearing Up for the Internet of Things”
Tags : 
    
Entrust Datacard

Navigating the energy transition

Published By: Group M_IBM Q3'19     Published Date: Jun 24, 2019
Digital technology is redefining possibilities in Energy, Environment and Utilities. Disruptive forces, emerging consequences, pressing challenges, and provocative opportunities. Learn how industries benefited from your data. Learn how IBM E&U describes disruptions manifested in Energy, Environment and Utilities. IBM identifies three ways your company focus can to stay ahead of the competition in pressing challenges. Additionally, identifying three provocative opportunity actions that are needed to get going.
Tags : 
    
Group M_IBM Q3'19

Abandoning the Perimeter Mindset

Published By: Zscaler     Published Date: Jun 19, 2019
You can’t impose controls on something you don’t own. And in today’s cloud- and mobile-oriented enterprise, no one truly owns the network. The Internet has become the one network that every corporate worker uses and that no corporate IT can control. The emergence of cloud, ubiquitous networks, smartphones and smart (or dumb) networked devices are wreaking havoc over the traditional command-and-control IT mode of operation. This shift is different from anything we’ve experienced before, because nobody owns the network.
Tags : 
    
Zscaler

Case Study - Sunwarrior

Published By: ExpertVoice     Published Date: Jun 17, 2019
Sunwarrior, a leading naturals brand, partnered with ExpertVoice to build product advocacy with influential experts to drive full-price consumer sales. Since 2015, they’ve been working with ExpertVoice to empower industry professionals — sales associates at Fresh Thyme, Sprouts, GNC, Vitamin Shoppe and more — with compelling behind-the-scenes content and exclusive product access to elevate their recommendations — and impact Sunwarrior’s bottom line.
Tags : 
    
ExpertVoice

Framework of Advocacy

Published By: ExpertVoice     Published Date: Jun 14, 2019
Of course you want to ensure your customers have a good experience, that you’re creating brand loyalists and building a positive reputation along the way, but most importantly, you want to impact your bottom line. That’s where advocacy marketing comes in. Advocacy marketing is harnessing the voices of your brand’s fans and leveraging them to increase sales. Also known as word-of-mouth marketing, advocacy marketing is using happy customers to promote your business — and sell more
Tags : 
    
ExpertVoice

Customer Centricity and the CMO

Published By: KPMG     Published Date: Jun 06, 2019
Discover how the CMO is evolving from brand guru into customer advocate. With key actions for creating a truly customer-centric marketing organisation. Read this report to discover: • how and why the marketing organisation must transform • why CMOs must expand their knowledge and responsibilities beyond traditional marketing • how to measure success in a customer-centric environment • seven key actions for creating a customer-centric marketing organisation.
Tags : 
    
KPMG

Retail: Communications Buying Guide

Published By: Motorola Solutions     Published Date: Jun 05, 2019
THE TIME IS NOW TO CREATE AN ENGAGING SHOPPING EXPERIENCE FOR EVERY CUSTOMER. In the world of retail, the customer is always right. That’s why retailers today must ensure their staff is well-informed, well-coordinated, armed and ready with the right information to satisfy customers in stores. Whether it’s a customer’s question about a product or a request for a different size, shoppers expect retail associates to be empowered with accurate answers and attentive service. Above all, stores need to rely on strong communication technologies so retailers can deliver a seamless experience for shoppers and keep them coming back. When retailers create an engaging experience, customer interactions turn into transactions and occasional buyers turn into loyal brand advocates. Motorola Solutions Two-Way Business Radios are helping retailers across the nation enhance customer and employee interactions, efficiency and safety both in stores and warehouses – but which business radio model is right for
Tags : 
    
Motorola Solutions

Cisco Umbrella Customer Experience: OmniAccess

Published By: Cisco Umbrella EMEA     Published Date: May 24, 2019
Our Customer Advocacy team have just finalized another customer video with Spanish Partner OmniAccess. The video will be translated in Italian and Spanish. The content is that Omnicasse is using Umbrella to secure connectivity for private yachts and cruise ships in the Mediterranean and beyond. OmniAccess utilizes many capabilities within Umbrella, including the roaming client, the reporting API and Investigate. This is a great one for EMEA and we are looking into getting this translated for Spain.
Tags : 
    
Cisco Umbrella EMEA

Navigating the energy transition

Published By: Group M_IBM Q2'19     Published Date: Apr 10, 2019
Digital technology is redefining possibilities in Energy, Environment and Utilities. Disruptive forces, emerging consequences, pressing challenges, and provocative opportunities. Learn how industries benefited from your data. Learn how IBM E&U describes disruptions manifested in Energy, Environment and Utilities. IBM identifies three ways your company focus can to stay ahead of the competition in pressing challenges. Additionally, identifying three provocative opportunity actions that are needed to get going.
Tags : 
    
Group M_IBM Q2'19

Navigating the energy transition

Published By: Group M_IBM Q2'19     Published Date: Apr 10, 2019
Digital technology is redefining possibilities in Energy, Environment and Utilities. Disruptive forces, emerging consequences, pressing challenges, and provocative opportunities. Learn how industries benefited from your data. Learn how IBM E&U describes disruptions manifested in Energy, Environment and Utilities. IBM identifies three ways your company focus can to stay ahead of the competition in pressing challenges. Additionally, identifying three provocative opportunity actions that are needed to get going.
Tags : 
    
Group M_IBM Q2'19

Cisco AMP for Endpoints

Published By: Cisco     Published Date: Mar 26, 2019
Uncover the riskiest 1% of threats you’ve been missing. In hours. Not days or months. Nearly all endpoint security solutions claim to block 99% of malware. But what about the 1% of threats they miss? The most dangerous 1% of threats will wreak havoc on your network. If you rely solely on traditional point-in-time technologies, such as antivirus, those threats can go undetected for 200 days on average. For months on end, they can be creeping in and moving laterally across your network causing damage through stealthy malware campaigns without you even knowing it—until it’s too late.
Tags : 
    
Cisco

From the Core to the Edge: 7 Reasons You Need Security at the Edge

Published By: Akamai Technologies     Published Date: Mar 19, 2019
Digital security has never taken on greater urgency. Today we live in a fundamentally connected ecosystem where we increasingly work, play, and indeed live most of our lives online. Whether we are enterprise users or endpoint consumers, our digital experiences are increasingly delivered to us on our connected devices - wherever we are, whenever we want them. For InfoSec professionals, this interconnected ecosystem is wreaking havoc with the idea of "the perimeter." In fact, the perimeter as we know it no longer exits. The attack surface is always shifting and continues to disperse across a wider area. At the same time, attacks continue to grow in size and volume, and are increasingly targeted. No longer can you secure the perimeter and trust that nothing will get in or out. What you need to deploy and manage is being redefined right before your eyes, with or without you. You need to take security to the edge.
Tags : 
    
Akamai Technologies
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.