businesses

Results 301 - 325 of 2552Sort Results By: Published Date | Title | Company Name

Are You Meeting Today's Mobile Mandate?

Published By: Akamai Technologies     Published Date: Aug 17, 2017
The rapid rate of mobile adoption provides today’s users with nearly unlimited access to data and information anytime, anywhere. While “always on” users represent a tremendous opportunity for businesses to increase engagement, revenue, and customer loyalty, they also create unprecedented mobile delivery challenges. In this e-book, we will delve into these challenges and learn how to master them by optimizing for fast APIs, mobile apps, and mobile sites. But before we do that, let’s start our mobile story with some perspective: Approximately half of you reading this e-book will do so on mobile. That fact alone should be a compelling enough reason to keep reading, but in case it’s not, the following data illustrates the impact mobile growth has had on our technological landscape.
Tags : 
mobile, mobile adoption, customer loyalty, always on
    
Akamai Technologies

Are You Providing Your Customers With The Satisfying Experience That Will Keep Them Coming Back

Published By: Cisco     Published Date: Jan 29, 2009
In a marketplace where too many products and services are chasing too little demand, businesses face a daunting challenge: do everything possible to attract and retain customers.The stakes are high.
Tags : 
cisco, customer satisfaction, crm, customer attrition, retain customers, customer infidelity, trouble-free shopping experience, knowing your customer, customer experience roadmap, barriers to information, barriers to connectivity, converging networks, ip communication tools, customer interaction service, customer relationship management, customer service
    
Cisco

Are You Ready For 2018'S Compliance Firestorm?

Published By: Mimecast     Published Date: Dec 20, 2018
Over the last few years government agencies have been concerned with protection of personal data and consequences of data breaches on business and citizens. That’s driven businesses to look how rules and regulations can help guide organizations to build systems and processes that protect peoples data. Watch now to learn more.
Tags : 
    
Mimecast

Are you ready for GDPR? CA can help

Published By: CA Technologies EMEA     Published Date: Aug 07, 2017
A big part of GDPR compliance will focus on how data is collected going forward. But a substantial emphasis will fall on the data businesses already hold. With many mainframes containing generations-old data, a manual data audit is completely unrealistic. That’s where CA comes in. CA Data Content Discovery enables organizations to find, classify and protect mission essential mainframe data—three valuable steps toward achieving GDPR compliance.
Tags : 
gdpr, personal data, social information, ip addresses, ca technologies, mainframe security, anonymize data, privacy projects
    
CA Technologies EMEA

Are Your Smart Phones Tough Enough for Work?

Published By: Intermec     Published Date: Jun 20, 2013
Millions of new smart phones continue to ship every month, and many of them find their way into businesses to help workers do their jobs in innovative new ways. However, many of these same phones will be replaced within a year because they are not durable enough to work reliably in new enterprise work environments. In this white paper, learn why emerging enterprise applications require ruggedness and reliability.
Tags : 
smart phones, durability, enterprise applications, ruggedness, reliability, mobile workers, wireless hardware, wireless infrastructure, wireless phones
    
Intermec

Asserting Control, Seizing Opportunity in High Tech: 5 Critical Success Factors

Published By: Microsoft Dynamics     Published Date: Jul 11, 2007
Until recently, many high-tech manufacturers – especially small and medium-sized businesses – have been able to survive by applying 80% of their operational focus to 20% or less of their critical customers and suppliers. That was then. The new mandate from channel masters is for more intense, collaborative relationships with fewer suppliers.
Tags : 
industry directions, oem, manufacturing, manufacturer, scm, supply chain, ems, electronics manufacturing, productivity, plm, product lifecycle management, cost control, r&d, r & d, enterprise resource, erm, erp, microsoft dynamics, business integration, business management
    
Microsoft Dynamics

Assessing the Financial Impact of HPE InfoSight Predictive Analytics

Published By: Hewlett Packard Enterprise     Published Date: May 10, 2019
Applications are the engines that drive today’s digital businesses. When the infrastructure that powers those applications is difficult to administer, or fails, businesses and their IT organizations are severely impacted. Traditionally, IT assumed much of the responsibility to ensure availability and performance. In the digital era, however, the industry needs to evolve and reset the requirements on vendors. HPE Nimble Storage has broken away from convention and transformed how storage is managed and supported with the HPE InfoSight predictive analytics platform. HPE engaged ESG to conduct a quantitative survey of the HPE Nimble Storage installed base, as well as non-HPE Nimble Storage customers, to better assess how HPE InfoSight positively impacts customer environments. To find out more download this whitepaper today.
Tags : 
    
Hewlett Packard Enterprise

Assessing The IT Energy Efficiency of Your Business: A Step-by-Step Guide

Published By: IBM     Published Date: Sep 18, 2008
Powering your IT hardware often costs more than double the price of the actual machine. While this fact alone motivates businesses to build more energy efficient data centers, IBM's Project Big Green details the additional operational and social benefits for businesses. Read more on IBM's holistic approach to reducing your IT energy use to save you money.
Tags : 
ibm, network management, networking, green, green computing, green datacenter, green data center, data center, environmental
    
IBM

Assuring Digital Trust

Published By: Infosys     Published Date: Sep 05, 2019
In today's hyperconnected and digitized world, cybersecurity has become an important strategic imperative owing to the sophistication of cybercrime. Digital businesses require complex and distributed interactions among people, applications and data - on premise, off-premise, on mobile devices and in the cloud. The result is an increase in the attack surfaces that are hard to protect and defend. As the perimeter continues to diminish, visibility into the environment gets tougher. Operational Technology (OT) and the Internet of Things (IoT) massively expand the scope of security strategy and operations. When a massively distributed fleet of autonomous devices that can make decisions is combined, directly affecting the physical state of people and things, there is a considerable risk to manage. This issue is not limited to the chief information security officer (CISO) but needs the involvement and sponsorship of the leadership and the board.
Tags : 
    
Infosys

Australian Business Expectations for the National Broadband Network

Published By: Macquarie Telecom     Published Date: Jan 11, 2011
Access Economics was engaged by Macquarie Telecom to interpret the survey results in conjunction with relevant research studies and four case studies of businesses that expect the NBN to drive significant change in their business model.
Tags : 
macquarie telecom, national broadband network, ict development, high speed broadband, hsbb, nbn, australian business, managed hosting, telecommunication, voice, data, ip networks, ip telephony, network management, database development, data warehousing, colocation and web hosting
    
Macquarie Telecom

Automate Container Security Using DevOps Processes on AWS with Trend Micro

Published By: AWS     Published Date: Jun 03, 2019
Background Businesses are often challenged with the complexities of protecting their physical, virtual, and cloud workloads while also meeting their part of the Amazon Web Services (AWS) Shared Responsibility Model. IT security leaders are inundated with too many security tools that aren’t built for their specific environments. Additionally, these responsibilities often entail large amounts of manual processes and people to administer them. As such, there is a need for a solution that provides a secure environment for you to transact your business without slowing you down. Trend Micro™ Deep Security™ is optimized to support the broadest set of platforms and environments (on-premises, virtual, on AWS, or containers) while delivering multiple threat defense techniques to help DevOps teams rapidly detect security incidents, fulfill compliance requirements, and securely deploy containers.
Tags : 
    
AWS

Automate Container Security Using DevOps Processes on AWS with Trend Micro

Published By: AWS     Published Date: Jun 03, 2019
Background Businesses are often challenged with the complexities of protecting their physical, virtual, and cloud workloads while also meeting their part of the Amazon Web Services (AWS) Shared Responsibility Model. IT security leaders are inundated with too many security tools that aren’t built for their specific environments. Additionally, these responsibilities often entail large amounts of manual processes and people to administer them. As such, there is a need for a solution that provides a secure environment for you to transact your business without slowing you down. Trend Micro™ Deep Security™ is optimized to support the broadest set of platforms and environments (on-premises, virtual, on AWS, or containers) while delivering multiple threat defense techniques to help DevOps teams rapidly detect security incidents, fulfill compliance requirements, and securely deploy containers.
Tags : 
    
AWS

Automate Container Security Using DevOps Processes on AWS with Trend Micro

Published By: AWS     Published Date: Oct 07, 2019
Businesses are often challenged with the complexities of protecting their physical, virtual, and cloud workloads while also meeting their part of the Amazon Web Services (AWS) Shared Responsibility Model. IT security leaders are inundated with too many security tools that aren’t built for their specific environments. Additionally, these responsibilities often entail large amounts of manual processes and people to administer them. As such, there is a need for a solution that provides a secure environment for you to transact your business without slowing you down. Trend Micro™ Deep Security™ is optimized to support the broadest set of platforms and environments (on-premises, virtual, on AWS, or containers) while delivering multiple threat defense techniques to help DevOps teams rapidly detect security incidents, fulfill compliance requirements, and securely deploy containers. In this webinar, you’ll learn real customer use cases that have successfully leveraged Trend Micro Deep Securit
Tags : 
    
AWS

Automate Container Security Using DevOps Processes on AWS with Trend Micro

Published By: AWS     Published Date: Oct 09, 2019
Businesses are often challenged with the complexities of protecting their physical, virtual, and cloud workloads while also meeting their part of the Amazon Web Services (AWS) Shared Responsibility Model. IT security leaders are inundated with too many security tools that aren’t built for their specific environments. Additionally, these responsibilities often entail large amounts of manual processes and people to administer them. As such, there is a need for a solution that provides a secure environment for you to transact your business without slowing you down. Trend Micro™ Deep Security™ is optimized to support the broadest set of platforms and environments (on-premises, virtual, on AWS, or containers) while delivering multiple threat defense techniques to help DevOps teams rapidly detect security incidents, fulfill compliance requirements, and securely deploy containers. In this webinar, you’ll learn real customer use cases that have successfully leveraged Trend Micro Deep Securit
Tags : 
    
AWS

Automate Now! Achieve Immediate Cost, Productivity and Security Benefits by Automating IT

Published By: KACE     Published Date: Nov 14, 2006
This Enterprise Management Associates (EMA) white paper takes a close look at automated IT management, especially for  medium-sized businesses.
Tags : 
it management, ema, enterprise management associates, automated it, it automation, smb, smbs, network management, manual it management, kace, security, remote network management, high availability, business process automation, service management
    
KACE

Automated Machine Learning on AWS with DataRobot

Published By: Datarobot     Published Date: May 14, 2018
Organizations across industries look to technology, not only as a way to run their operations more smoothly, but as a way to gain competitive advantage. Artificial Intelligence (AI) and machine learning have transformed the businesses that are aggressively adopting these technologies, allowing them to systematically solve business problems faster and more effectively.
Tags : 
    
Datarobot

Automated Security at the Speed of DevOps

Published By: AWS     Published Date: Oct 07, 2019
Software development has evolved from rigid waterfall methodologies to more streamlined approaches, like Agile and more recently DevOps. This evolution has taken place in large part to shorten development life cycles and meet increased business demands. Today, businesses of all sizes have built an advantage by implementing a DevOps culture and processes, which break down silos between development and operations, allowing organizations to create better software faster. As organizations implement DevOps on Amazon Web Services (AWS), they need to understand the security implications. The AWS Shared Responsibility Model makes clear that AWS secures what’s “on the cloud,” while the customer is responsible for securing their assets “in the cloud.” When AWS customers go about securing their DevOps environments, they need to do so in a way that provides robust protection without limiting developer agility.
Tags : 
    
AWS

Automating Data Flows to your Business Intelligence System

Published By: Tidal Software     Published Date: Sep 03, 2008
Businesses can gain greater value from their BI investment by improving the way in which data flows to the BI system are managed. Many problems result when the ETL process is handled by a patchwork of scripting, custom coding, and various built-in schedulers that are part of existing ETL solutions, because these systems do not provide end-to-end execution, monitoring, and control of the ETL process.
Tags : 
business intelligence, data warehousing, data management, data integration, etl, extract–transform-load, bi operations, bi management, informatica, cognos, ibm datastage, sas, business objects, crystal enterprise, tidal, tidal software, application integration, analytical applications
    
Tidal Software

Automating Fax & Email Orders into ERP Systems

Published By: Esker     Published Date: Jun 29, 2016
In a perfect world, every sales order your company receives would go straight into your business system. But in reality, orders sent by fax and email end up as paper that gets pushed around the office. And those are the ones that cost the most to process. Learn about a solution to: - Automate fax, email, EDI, and other orders into your ERP or other business applications. - Eliminate the cost and errors of manual order processing - Consolidate resources to simplify your IT landscape. You’ll also find out how the technology works and what it has done for other businesses.
Tags : 
sales, solutions, best practices, business process, business management, business intelligence
    
Esker

Automating Fax & Email Orders into SAP Systems

Published By: Esker     Published Date: Dec 08, 2014
In a perfect world, every sales order your company receives would go straight into your SAP system. But in reality, orders sent by fax and email end up as paper that gets pushed around the office. And those are the ones that cost the most to process. Learn about a solution to: • Automate fax, email, EDI, and other orders into SAP applications • Eliminate the cost and errors of manual order processing • Consolidate resources to simplify your IT landscape You’ll also find out how the technology works and what it has done for other businesses.
Tags : 
automation, sap, erp system, fax, email, edi, cost savings, solutions, electronic processing, sales orders, enterprise applications, electronics
    
Esker

Automating Fax, Email & EDI Orders in an ERP Environment

Published By: Esker     Published Date: Dec 08, 2014
In a perfect world, every sales order your company receives would go straight into your business system. But in reality, orders sent by fax and email end up as paper that gets pushed around the office. And those are the ones that cost the most to process. Learn about a solution to: • Automate fax, email, EDI, and other orders into your ERP or other business applications • Eliminate the cost and errors of manual order processing • Consolidate resources to simplify your IT landscape You’ll also find out how the technology works and what it has done for other businesses.
Tags : 
automation, erp system, fax, email, edi, cost savings, solutions, electronic processing, sales orders, enterprise applications, electronics
    
Esker

Automating Fax, Email & EDI Orders into SAP Systems

Published By: Esker     Published Date: Jun 29, 2016
In a perfect world, every sales order your company receives would go straight into your SAP system. But in reality, orders sent by fax and email end up as paper that gets pushed around the office. And those are the ones that cost the most to process. Learn about a solution to: - Automate fax, email, EDI, and other orders into SAP applications - Eliminate the cost and errors of manual order processing - Consolidate resources to simplify your IT landscape You’ll also find out how the technology works and what it has done for other businesses.
Tags : 
sales, solutions, best practices, business process, business management, business intelligence
    
Esker

Automating Fax, Email & EDI Orders into SAP Systems

Published By: Esker     Published Date: Feb 03, 2017
In a perfect world, every sales order your company receives would go straight into your SAP system. But in reality, orders sent by fax and email end up as paper that gets pushed around the office. And those are the ones that cost the most to process. Learn about a solution to: Automate fax, email, EDI, and other orders into SAP applications Eliminate the cost and errors of manual order processing Consolidate resources to simplify your IT landscape You’ll also find out how the technology works and what it has done for other businesses.
Tags : 
sales, solutions, best practices, business process, business management, business intelligence
    
Esker

Automating Fax, Email and EDI Orders into ERP Systems

Published By: Esker     Published Date: Jun 29, 2016
In a perfect world, every sales order your company receives would go straight into your ERP system. But in reality, orders sent by fax and email end up as paper that gets pushed around the office. And those are the ones that cost the most to process. Learn about a solution to: - Automate fax, email, EDI, and other orders into ERP applications - Eliminate the cost and errors of manual order processing - Consolidate resources to simplify your IT landscape You’ll also find out how the technology works and what it has done for other businesses.
Tags : 
sales, solutions, best practices, business process, business management, business intelligence, business process management
    
Esker

Automating Operations: Digitizing Back Office Communications

Published By: Adobe     Published Date: Nov 04, 2014
In this Gigaom Research Webinar, we will examine the schism between the automated enterprise and the manual operations that support it, assess the tools and processes available to bring the back office up to speed, and present a roadmap to bring business agility and consistency to your operations. We will discuss real-world examples and draw lessons that businesses of all sizes can use.
Tags : 
adobe, communications, business automation, business communications, operations, human resources, office compliance, wireless communications, wireless messaging, collaboration, content delivery, document management, information management, messaging, records management, search and retrieval, payroll software, financial management, business technology
    
Adobe
Start   Previous    6 7 8 9 10 11 12 13 14 15 16 17 18 19 20    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.