lte

Results 201 - 225 of 938Sort Results By: Published Date | Title | Company Name

Contrasting Approaches for Handling Document Review

Published By: Thomson Reuters     Published Date: Jul 30, 2018
How confident is your law firm in its document review process? Learn more about cost-effective and defensible document review and the benefits of partnering with a managed review provider instead of contract attorneys. According to a recent study of Alternative Legal Service Providers (ALSPs), the use of ALSPs such as managed review providers for doc review is expected to grow by more than 50% in the next five years. The top reasons cited for using such providers aligned with the benefits listed here: to control costs and meet peak demand without increasing permanent headcount.
Tags : 
document, review, law, thomson, reuters
    
Thomson Reuters

Cost-Effectively Reaching the In-Market Auto Buyer

Published By: ValueClick Media     Published Date: Sep 24, 2008
Based on a study conducted by ValueClick Media and interactive agency Goodway 2.0, this white paper evaluates networks as an alternative to advertising on automotive information sites. The study, which includes campaign data from Chevrolet, Dodge, Honda, Hyundai and Lincoln Mercury, concludes that running ads on a large number of sites and allowing optimization technology to determine those which are most effective will lead to better results than presupposing what sites or channels will perform.
Tags : 
automotive, chevrolet, dodge, honda, hyundai, lincoln mercury, advertising alternative, optimization technology, valueclick media, goodway 2.0
    
ValueClick Media

Cray® CS300-LC™ Cluster: Warm Water Cooling at the Forefront of an HPC Industry Trend

Published By: Cray     Published Date: Apr 08, 2014
Recent IDC surveys of the worldwide high performance computing (HPC) market consistently show that cooling today's larger, denser HPC systems has become a top challenge for datacenter managers. The surveys reveal a notable trend toward liquid cooling systems, and warm water cooling has emerged as an effective alternative to chilled liquid cooling.
Tags : 
cray, hpc, high performance computing, hpc, power and cooling, cooling, warm water cooling, server hardware, servers, clustering, storage management, it spending, total cost of ownership, data center design and management
    
Cray

Cray® CS300-LC™ Cluster: Warm Water Cooling at the Forefront of an HPC Industry Trend

Published By: Cray Inc.     Published Date: Jul 22, 2014
The Cray® CS300-LC™ liquid-cooled cluster supercomputer combines system performance and power savings, allowing users to reduce capital expense and operating costs. The Trend Toward Liquid Cooling Recent IDC surveys of the worldwide high performance computing (HPC) market consistently show that cooling today's larger, denser HPC systems has become a top challenge for datacenter managers. The surveys reveal a notable trend toward liquid cooling systems, and warm water cooling has emerged as an effective alternative to chilled liquid cooling.
Tags : 
computing clusters, gpu computing, gpu cluster, x86 cluster, phi clusters, xeon phi clusters, hpc clusters, business technology
    
Cray Inc.

Creating a Kick-Ass Marketing Strategy: Find the Right Channels For Your Message and Win

Published By: The Starr Conspiracy     Published Date: Mar 29, 2013
People consume marketing messages at an alarming rate - almost 3,000 messages and ads per day. We also filter most of that. Read this whitepaper to learn how to find the right channels for your kick-ass marketing strategy and win.
Tags : 
marketing strategy, channels, marketing channels, starr conspiracy, effective channel marketing
    
The Starr Conspiracy

Creating a Successful Email Always Starts with the Subject Line

Published By: Topica     Published Date: May 12, 2011
This whitepaper on creating a successful email is packed full of great tips, strategies and insights into carrying out successful email marketing campaigns!
Tags : 
topica, email marketing, email marketing help, introduction to email marketing, successful email marketing, how to write a better subject line, e-mail design, reputation, spam filter prevention, subscription retention
    
Topica

Critical Capabilities for BPM-Platform-Based Case Management Frameworks

Published By: Pega     Published Date: Jun 21, 2016
Case management frameworks built on business process management platforms help IT solutions architects deploy case-handling applications and offer an alternative to specialized case management applications and custom coding. According to Gartner, the complex architecture required to support case management has relegated it to the status of a niche application, typically addressed by specialist, commercial off-the-shelf application providers and system integrators. Case management as a process style is being applied in many sectors beyond government, legal and insurance, including healthcare, banking, higher education and retail. Industry and cross-industry case management frameworks are now available. "Adaptive case management" hype exceeds the reality of what buyers need. Gartner evaluated 12 vendors including Pegasystems against nine critical capabilities in four use cases.
Tags : 
    
Pega

Critical Capabilities for BPM-Platform-Based Case Management Frameworks

Published By: Pega     Published Date: May 25, 2016
Case management frameworks built on business process management platforms help IT solutions architects deploy case-handling applications and offer an alternative to specialized case management applications and custom coding. According to Gartner, the complex architecture required to support case management has relegated it to the status of a niche application, typically addressed by specialist, commercial off-the-shelf application providers and system integrators. Case management as a process style is being applied in many sectors beyond government, legal and insurance, including healthcare, banking, higher education and retail. Industry and cross-industry case management frameworks are now available. "Adaptive case management" hype exceeds the reality of what buyers need. Gartner evaluated 12 vendors including Pegasystems against nine critical capabilities in four use cases. Download this Gartner analysis and gain a better understanding of the case management frameworks solutions offe
Tags : 
business optimization, business strategy, network management, business applications, best practices, business process management, solutions, case management, business intelligence, business management, collaboration
    
Pega

Customers 2015: What Will They Expect 5 Years From Now? (7 Steps to Make Sure You're Ready Today)

Published By: Mcorp Consulting     Published Date: Feb 17, 2010
See how the landscape of customer experience is being altered forever, as touchpoints continue to drive shifts in distribution, feedback and marketing channel control. In this whitepaper, you'll learn how making your touchpoints stronger, faster and smarter today will mean increased profits and stronger market positions tomorrow. (Plus 7 specific steps any company can take to improve customer experience today.)
Tags : 
mcorp, customer experience, relationship lifecycle, loyalty, retention, bottom line, touchpoint marketing, touchpoint mapping, touchpoint management, touchpoint agency, customer experience strategy, customer journey mapping, touchpoint management, customer experience measurement, customer mapping, customer satisfaction measurement, crm
    
Mcorp Consulting

Cybercrime Tactics and Techniques Q1 2019

Published By: MalwareBytes EMEA     Published Date: May 10, 2019
Enterprises, beware. Threat actors are continuing to eye businesses for high returns on investment in Q1 2019, breaching infrastructure, exfiltrating or holding data hostage, and abusing weak credentials for continued, targeted monitoring. From a steadfast increase of pervasive Trojans, such as Emotet, to a resurgence of ransomware lodged against corporate targets, cybercriminals are going after organizations with a vengeance. Yet every cloud has a silver lining, and for all the additional effort thrown at businesses, consumer threats are now on the decline. Ransomware against consumers has slowed down to a trickle and cryptomining, at a fever pitch against consumers this time last year, has all but died. Interestingly, this has resulted in an overall decline in the volume of malware detections from Q4 2018 to Q1 2019. While threat actors made themselves busy with challenging new victims, they ensnared targets in the old ways, using tried-and-true malspam and social engineering tactic
Tags : 
    
MalwareBytes EMEA

Das Beste Kommt Erst Noch

Published By: Adobe     Published Date: Jul 04, 2016
Heute lassen sich bestimmte Prognosen deutlich einfacher treffen als früher, denn heute steht uns neben einer beispiellosen Menge an Verbraucherinformationen auch die entsprechende Technologie zur Datenauswertung zur Verfügung. Marketer können präziser denn je prognostizieren, wie sich Kunden höchstwahrscheinlich verhalten werden, gelegentlich sogar, bevor die Kunden selbst dies wissen.
Tags : 
data, information available, customer, customer experience, customer relationship, database development
    
Adobe

Das Datenkapital In Ihrem Unternehmen Schutzen

Published By: Dell EMC Storage     Published Date: Aug 15, 2019
Das digitale Zeitalter verändert die Art und Weise, in der Unternehmen Daten betrachten, schützen und gewinnbringend nutzen. Sie streben jetzt mehr den je danach, zu einem digitalin Unternehmen zu werden, aber dafür sind datengesteuerte Verfahren erforderlich. In modernen Unternehmen sind Daten die Grundlage für alle Bereiche: Analysen, digitale Erfahrungen, IoT und künstliche Intelligenz sind nennenswerte Beispiele. All diese Bereiche sind wichtig für Unternehmen, die in einer digital transformierten Welt erfolgreich sein möchten, und können ohne Daten schlicht nicht funktionieren. Deshalb werden Daten statt als statische digitale Ressource zunehmend als strategische Unternehmensressource wahrgenommen.
Tags : 
    
Dell EMC Storage

Das Gestalten einer digitalen Kundenerfahrung für den mobilen Nutzer von heute

Published By: Mitel     Published Date: Apr 07, 2017
Die digitale Kundenkommunikation wird Realität Die Kundenerfahrung ist das wichtigste einer der Hauptpunkte in der radikal wettbewerbsbetonten Umgebung von heute. Mehr denn je wird diese Erfahrung durch digitale Interaktionen geformt und geschaffen. Obwohl der Großteil der Kundenkommunikation immer noch sprachbasiert ist, nehmen Verbraucher mittlerweile verstärkt digitale Methoden wie E-Mail, Web-Chat und soziale Medien in Anspruch. Sie erwarten die Flexibilität, über das Medium Ihrer Wahl zu kommunizieren, wo auch immer sie sind. Und sie erwarten, dass sie unterwegs zwischen den Medien wechseln können.
Tags : 
    
Mitel

Das Mobilitätsdilemma angehen

Published By: Lenovo UK     Published Date: Nov 09, 2018
Kopfschmerzen mit dem Potenzial für erhöhte Kosten und Risiken. Mit ThinkPad, das auf Intel® Core™ i7 vPro™ Prozessoren basiert, erhalten Sie 360-prozentige Sicherheit, zuverlässige Haltbarkeit und uneingeschränkte Produktivität für jedes einzelne Gerät. Erfahren Sie mehr in unserem Whitepaper. Ultrabook, Celeron, Celeron Inside, Core Inside, Intel, das Intel-Logo, Intel Atom, Intel Atom Inside, Intel Core, Intel Inside, das „Intel Inside“-Logo, Intel vPro, Itanium, Itanium Inside, Pentium, Pentium Inside, vPro Inside, Xeon, Xeon Phi, Xeon Inside und Intel Optane sind Marken der Intel Corporation oder ihrer Tochtergesellschaften in den USA und/oder anderen Ländern.
Tags : 
lenovo, intel, thinkpad, thinkpad x1, x1 extreme, laptop, sicherheit, produktivität, mobilität, lenovo x1, workforce mobility
    
Lenovo UK

Das Mobilitätsdilemma angehen

Published By: Lenovo UK     Published Date: May 15, 2019
Die zunehmende Mobilität verursacht für IT-Teams überall Kopfschmerzen mit dem Potenzial für erhöhte Kosten und Risiken. Mit ThinkPad, das auf Intel® Core™ i7 vPro™ Prozessoren basiert, erhalten Sie 360-prozentige Sicherheit, zuverlässige Haltbarkeit und uneingeschränkte Produktivität für jedes einzelne Gerät. Erfahren Sie mehr in unserem Whitepaper. Ultrabook, Celeron, Celeron Inside, Core Inside, Intel, das Intel-Logo, Intel Atom, Intel Atom Inside, Intel Core, Intel Inside, das „Intel Inside“-Logo, Intel vPro, Itanium, Itanium Inside, Pentium, Pentium Inside, vPro Inside, Xeon, Xeon Phi, Xeon Inside und Intel Optane sind Marken der Intel Corporation oder ihrer Tochtergesellschaften in den USA und/oder anderen Ländern.
Tags : 
lenovo, intel, thinkpad, thinkpad x1, x1 extreme, laptop, sicherheit, produktivität, mobilität, lenovo x1, workforce mobility
    
Lenovo UK

Das PC-Lebenszykluskontinuum: von der Kontrolle zur Transformation

Published By: Dell EMC EMEA     Published Date: Feb 28, 2019
Im Rahmen der Implementierung von datengesteuerten Strategien in den verschiedensten Unternehmen bleibt der PC in all seinen Varianten das wichtigste Produktivitätstool für Mitarbeiter. IT-Führungskräfte müssen das PC-Management über den gesamten PC-Lebenszyklus hinweg leiten, damit Nutzer möglichst effektiv arbeiten können. Heute gehen IT-Führungskräfte den PC-Lebenszyklus über ein Kontinuum an, das von der Kontrolle bis zur Transformation reicht. Kontrolle ist auf Optimierung ausgerichtet, während der Schwerpunkt der Transformation auf den geschäftlichen Auswirkungen von Technologie liegt. Laden Sie dieses Whitepaper herunter, um weitere Informationen zu Dell Lösungen mit Intel® Technologie zu erhalten.
Tags : 
    
Dell EMC EMEA

DAS REZEPT FÜR KUNDENBINDUNG:

Published By: Oracle     Published Date: Aug 17, 2017
Damit ein Treueprogramm ein echter Erfolg wird, muss es sowohl den Gästen als auch dem Restaurantbetrieb einen Mehrwert liefern. Um Gastronomiebetrieben aufzuzeigen, was Gäste von einem Treueprogramm erwarten, hat Oracle Hospitality eine globale Verbraucherstudie durchgeführt. Auf den folgenden Seiten finden Sie die Antworten auf diverse Fragen, darunter: • Welche Belohnungen schätzen Gäste am Treueprogramm eines Restaurants am meisten? • Bevorzugen Sie Stempelkarten aus Papier? Mobile Apps? Magnetkarten aus Kunststoff? • Aus welchen Gründen nehmen Sie nicht an einem Treueprogramm teil? • Warum verlassen Sie ein Treueprogramm oder nutzen es nicht mehr? • Welches Restaurant-Treueprogramm gefällt Ihnen am besten?
Tags : 
magnetkarte aus kunststoff, stempelkarte aus papier, mobiltelefon-app, registrierte telefonnummer, oracle
    
Oracle

Das richtige Hybrid-Modell zur Steigerung der Mobilität von Mitarbeitern

Published By: Adobe     Published Date: Apr 25, 2016
Im vorliegenden Paper beschäftigen wir uns mit der IT-Umgebung. Wie können Sie einfach zu verwaltende Dokumentenlösungen implementieren, die Desktop-Anwendungen, Apps und die Cloud aufeinander abstimmen und so den Anforderungen der modernen Arbeitswelt gerecht werden?
Tags : 
    
Adobe

Data and Identity Security

Published By: CDW Symantec     Published Date: Aug 02, 2012
With daily reports of network breaches on the way up, now is the time to double down on solid network protection. This whitepaper documents the evolution of data and identity theft and the strategic security approaches companies are taking to stay ahead of the curve.
Tags : 
data, identity, security, network, protection, mobile, security, documents, evolution, malware, sql, web, browser, hostile, e-mail, attack, password, lockdown, trusted, dlp
    
CDW Symantec

Data Center Firewall Aces Performance Test

Published By: F5 Networks Inc     Published Date: Jan 03, 2014
Turning on firewall features can sometimes result in a significant performance hit, creating an obstacle for network architects. In this Network World Clear Choice test, learn about a firewall solution that can help your business overcome these performance challenges by maxing our network capacity while also offering filtering and attack protection capabilities.
Tags : 
network world, data center, firewall, load balancer, scalability, data center management, dos protection, security, network, server traffic, application perforamce, server loading, application delivery controllers, data management, application security, firewalls, network security appliance, cloud computing
    
F5 Networks Inc

Data Integration for Dummies

Published By: Infomatica     Published Date: May 19, 2015
In this eBook, best-selling author Brian Underdahl explores the fundamentals of data integration and how the latest tools can simplify today’s (and tomorrow’s) data landscape. “Data Integration for Dummies” provides valuable reference if you need to explain data integration to the business, are looking for an alternative to hand-coding data mappings, or simply interested in expanding your knowledge.
Tags : 
data integration, it infrastructure, data sources, data landscape, data mappings, it management
    
Infomatica

Data Movement in Today’s Evolving Eco-System Topology

Published By: Teradata     Published Date: Aug 27, 2015
While your specific data throughput mileage may vary, this paper will share the factors that directly contribute to a Data Movement solution, the data storage ecosystem alternatives, and the pitfalls you may face when attempting to architect such a solution in your data warehouse environment.
Tags : 
analytics, big data, applications, lob, application integration, analytical applications, configuration management
    
Teradata

Data Protection Solutions at Midsize Organizations

Published By: Trend Micro, Inc.     Published Date: Apr 29, 2009
In January of 2008, a random sample of online technical newsletter subscribers at midsize companies (100-5,000 employees) received an email invitation to participate in a survey about data protection solutions use at their organizations. The goal of the survey was to identify sources of and/or reasons for information security breaches, and to better understand how businesses are planning to protect themselves against data leaks. The following report presents top line results of the study.
Tags : 
trend micro, data breach, smb, midsize, breaches, data breaches, data loss prevention, dlp, hackers, data protection solutions, midsize organizations, smb, physical breach, virtual breach, malicious breach, sensitive information, malicious data leaks, threats, confidential information, data loss
    
Trend Micro, Inc.

Data Protection Suite Ein gutes Team

Published By: Dell PC Lifecycle     Published Date: Aug 14, 2018
Wenn Sie kein Risiko eingehen möchten, sollten Sie die Data Protection einem Anbieter mit einer umfassenden Lösung anvertrauen. Holen Sie das Optimum aus Dell EMC Data Domain heraus – mit der leistungsfähigen Data Protection Suite.
Tags : 
    
Dell PC Lifecycle

Data Visualization Made Easy

Published By: SAS     Published Date: Mar 19, 2013
Use drag-and-drop, autocharting and data filtering to understand your data.
Tags : 
big data, visualization, interactive, data, data visualization, application integration, best practices, business activity monitoring, business analytics, business intelligence, business management, business metrics, enterprise software
    
SAS
Start   Previous    2 3 4 5 6 7 8 9 10 11 12 13 14 15 16    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.