Skip to main content
 

alm

Results 126 - 150 of 411Sort Results By: Published Date | Title | Company Name
Published By: AdRoll     Published Date: Dec 01, 2017
Last year, we found the vast majority of marketers are familiar with running programmatic campaigns. So when we surveyed over 1,300 marketers from Europe and North America this year, we shifted our focus and dove deeper into how they're thinking about the latest performance strategies across every stage of the marketing funnel. You will learn: • Why 57% of marketers are changing their attribution model this year • Why almost 40% of marketers spend a majority of their budgets on measurement alone • Why 69% of marketers are using dynamic email based on user behaviour • And more! See how you compare!
Tags : 
performance, marketing, professionals, channels, industry, advertising
    
AdRoll
Published By: Oracle OMC     Published Date: Nov 30, 2017
The headwinds facing traditional and online retailers in 2017 are numerous and well documented. Chief among the challenges: a sustained assault on established business models driven by changing consumer behavior and the competitive might of e-commerce giant Amazon. Large big-box players, such as Walmart and Target, are responding to the threat - and embracing the opportunity of e-commerce - by boosting online spending by hundreds of millions or even billions of dollars annually. Yet even the largest and most well-resourced players can’t simply spend their way to success. Competing with Amazon and adjusting to the changing demands of consumers means taking a hard look at the engines driving e-commerce and digital marketing operations, scouring for missed opportunities, and investing in the technologies that will fuel the innovations of tomorrow.
Tags : 
    
Oracle OMC
Published By: Oracle OMC     Published Date: Nov 30, 2017
The headwinds facing traditional and online retailers in 2017 are numerous and well documented. Chief among the challenges: a sustained assault on established business models driven by changing consumer behavior and the competitive might of e-commerce giant Amazon. Large big-box players, such as Walmart and Target, are responding to the threat - and embracing the opportunity of e-commerce - by boosting online spending by hundreds of millions or even billions of dollars annually. Yet even the largest and most well-resourced players can’t simply spend their way to success. Competing with Amazon and adjusting to the changing demands of consumers means taking a hard look at the engines driving e-commerce and digital marketing operations, scouring for missed opportunities, and investing in the technologies that will fuel the innovations of tomorrow.
Tags : 
    
Oracle OMC
Published By: BMC ESM     Published Date: Aug 20, 2009
In this Podcast with Eli Almog, Corporate Architect in BMC's CTO Office, discusses how IT managers can know when it's time to look at BSM, consider CMDB, learn how virtualization fits into your organization, and how automation can help your company retain its competitive edge.
Tags : 
bmc, automation, virtualization, cmdb, business process, it manager, it executive, corporate architect
    
BMC ESM
Published By: WatchGuard     Published Date: Oct 16, 2012
Network security intrusions and data theft incidents grab headlines almost daily. Organizations rely on WatchGuard for network solutions. Read on to understand why WatchGuard is "best-in-class by design"
Tags : 
watchguard, security, database security, security, it security, it infrastructure, intrusion prevention
    
WatchGuard
Published By: McAfee     Published Date: May 19, 2014
Este libro proporciona una visión general de la seguridad de la red y explica cómo los ciberdelincuentes pueden utilizar métodos ocultos o actualmente no detectables para acceder a los sistemas de red protegidos. Las técnicas de evasión avanzadas (AETs, Advanced Evasion Techniques) eluden las soluciones comunes actuales de seguridad de red. Pueden transportar cualquier ataque o exploración a través de dispositivos de seguridad de red y firewalls, firewall de próxima generación, detección de intrusos y sistemas de prevención e incluso enrutadores que realizan la inspección profunda de paquetes. En este libro encontrará todo sobre AETs y obtendrá consejos útiles y recomendaciones para ayudarlo a proteger su organización. Si trabaja en el gobierno, el área militar, banca, industria, comercio electrónico o con otras infraestructuras críticas, lea este libro para descubrir lo que se enfrenta y cómo protegerse mejor contra las evasiones avanzadas.
Tags : 
firewall de próxima generación, sistemas de prevención de intrusiones, firewall, seguridad contextual, detección de evasión avanzada, técnicas de evasión avanzadas, seguridad, gestión de ti
    
McAfee
Published By: McAfee     Published Date: Jun 04, 2014
El paradigma de la seguridad de red actualmente está cambiando hacia una nueva realidad a medida que los métodos avanzados de hacking son más frecuentes y difíciles de detectar. Un ejemplo de este método son las técnicas de evasión avanzadas (AETs, Advanced Evasion Techniques). Aunque se han documentado ampliamente las evasiones en los últimos quince años, los proveedores de seguridad han ignorado sistemáticamente su importancia. Algunos proveedores incluso han minimizado la importancia de la amenaza presentada cómo evasiones como siendo puramente teórica. Sin embargo este debate no logra percibir el problema principal: el riesgo de los sistemas de seguridad de red comprometidos por AETs continúa creciendo a medida que más y más los ciberdelincuentes aprovechan activamente esta vulnerabilidad. La respuesta es combinar la inspección basada en flujos con la normalización de datos en múltiples capas de protocolo.
Tags : 
firewall de próxima generación, sistemas de prevención de intrusiones, firewall, seguridad contextual, detección de evasión avanzada, técnicas de evasión avanzadas, aet, ngfw, ngips, ips de próxima generación, next generation firewall, next generation ips, seguridad, gestión de ti
    
McAfee
Published By: McAfee     Published Date: Aug 15, 2014
Este livro apresenta uma visão geral da segurança de rede e explica como os criminosos virtuais podem usar métodos ocultos e atualmente indetectáveis para invadir sistemas de rede protegidos. As técnicas de evasão avançadas (AETs, Advanced Evasion Techniques) conseguem passar pelas soluções de segurança de rede comuns atuais. Elas podem transportar ataques ou explorações, passando pelos dispositivos de segurança de rede e firewalls, firewalls de próxima geração, sistemas de detecção e prevenção de intrusões e até mesmo roteadores que executam inspeção aprofundada de pacotes. Neste livro, você aprenderá tudo sobre as AETs, além de obter informações e dicas para ajudar a proteger sua empresa. Se você trabalha no governo, na área militar, no setor financeiro, industrial, comércio eletrônico ou outros setores com infraestrutura crítica, leia este livro para conhecer o inimigo e saber como se proteger melhor contra as evasões avançadas.
Tags : 
firewall de próxima geração, sistemas de prevenção de intrusões, firewall, segurança contextual, detecção de evasão avançada, técnicas de evasão avançadas, segurança, gerenciamento de ti, next generation firewall, ngfw
    
McAfee
Published By: McAfee     Published Date: Aug 15, 2014
Atualmente, o paradigma de segurança de rede está mudando rumo a uma nova realidade, pois os métodos avançados dos hackers estão cada vez mais predominantes e difíceis de detectar. Um exemplo desses métodos são as técnicas de evasão avançadas (AET, Advanced Evasion Technique). Embora tenham sido documentadas inúmeras evasões nos últimos 15 anos, os fornecedores de segurança ignoraram sistematicamente sua importância.
Tags : 
firewall de próxima geração, sistemas de prevenção de intrusões, firewall, segurança contextual, detecção de evasão avançada, técnicas avançadas de evasão, aet, ngfw, firewall de próx ger, segurança, gerenciamento de ti, ngips, ips de próxima geração
    
McAfee
Published By: McAfee     Published Date: Sep 04, 2014
El equipo de análisis de SANS Insitute examinó el software McAfee ESM, con enfoque específicamente en las aplicaciones de SIEM y observó un “sistema de SIEM fácil de usar capaz de ejecutar un análisis de eventos amplio y profundo, además de ofrecer una evaluación rápida”.
Tags : 
siem, almacenamiento de datos, análisis de datos, ataques, análisis forense, seguridad
    
McAfee
Published By: McAfee     Published Date: Nov 07, 2014
A conformidade e os riscos financeiros costumavam ser as principais preocupações que motivavam a adoção de uma postura de gerenciamento de segurança e riscos. Leia o whitepaper e saiba como, atualmente, gerenciar os riscos permite compreender uma quantidade maior de dados: varreduras de vulnerabilidades, registros de aplicações e bancos de dados, fluxos, registros de acesso e de sessões, alertas e análise de tendências.
Tags : 
arquitetura de segurança conectada, big security data, big data, gerenciamento de registros, gerenciamento de logs, siem, segurança
    
McAfee
Published By: Avaya     Published Date: Mar 04, 2016
Break the business speed barrier Business has realized the strategic importance of the network, but it is almost impossible for today’s networks to run at business speed. Find out why — and how to do the impossible — in this paper >
Tags : 
business optimization, business strategy, network management, network performance
    
Avaya
Published By: SAP SME     Published Date: Jul 31, 2015
Los consumidores de hoy están digitalmente conectados y socialmente en red. Es hora de darles lo que quieren: conexiones personales, experiencias sin fisuras y ofertas en tiempo real de las marcas en las que confían.
Tags : 
marketing, compromiso con el cliente, recorrido del cliente, experiencia del cliente, marketing colaborativo, experiencia personalizada, omnicanal, comercio omnicanal, customer experience
    
SAP SME
Published By: SAP SME     Published Date: Aug 13, 2015
En los últimos años, las reglas de comercio han cambiado radicalmente y se ha producido una rápida transición hacia un mercado de compradores. Los clientes no solo compran, llevan a cabo una investigación exhaustiva donde comparan precios y condiciones a través de una variedad de puntos de contacto digitales. Los clientes de hoy están educados e informados, y por esto, esperan más de cada compañía con la que hacen negocios, incluso de las de servicios financieros. El nuevo imperativo es el compromiso del cliente – una interacción directa y personal con cada cliente individual, que brinde contenido relevante y oportunidades personalizadas, utilizando datos y tecnología para ganar y retener negocios.
Tags : 
banca digital, servicios financieros en línea, omnicomercio, plataforma, sistema de comercio, e-commerce, comercio electrónico, ventas en línea, tienda online, ventas móviles, plataforma digital, sistema de comercio electrónico, hybris, experiencia del cliente, plataforma de servicios financieros, sistema de retención de clientes
    
SAP SME
Published By: Hewlett Packard Enterprise     Published Date: Aug 02, 2017
Informe de la encuesta: conocimientos y revelaciones sobre flash de 1000 usuarios de almacenamiento
Tags : 
    
Hewlett Packard Enterprise
Published By: Rosetta Stone     Published Date: Jul 05, 2017
The top clients of enterprise language learning companies consist of global companies that recognize the value of multilingual employees. While companies understand the necessity of language learning, there is room for improvement in incorporating language learning into corporate culture. This report looks at what companies are doing in the realm of language learning, to understand what best-in-class organizations are doing, and to provide businesses aspiring to be truly successful on a global stage with strategies for incorporating language learning into their business model. Forbes Insights and Rosetta Stone surveyed 214 executives around the globe to find out if and how companies are training their employees to speak and work in more languages and what impact that training has on both the employees and the company. In addition, the narrative is rounded out with in-depth interviews with executives and experts.
Tags : 
    
Rosetta Stone
Published By: Intel     Published Date: Jul 27, 2017
Worldwide spending on public cloud services is set to reach USD 122.5 billion in 2017, an increase of 24.4 percent over 20161. In fact, the compound annual growth rate (CAGR) of spending on public cloud services is almost seven times that of overall IT spending growth and IDC predicts that by 2020, it will top USD 203.4 billion worldwide2. The size of the opportunity for cloud service providers (CSPs) is huge but fierce competition, accelerating innovation and the need to keep prices low continue to create enormous pressure. This paper outlines some of the primary challenges faced by CSPs in making and keeping their business profitable and suggests strategies and innovations that can help cloud businesses to take a greater share of the market opportunity.
Tags : 
    
Intel
Published By: Juniper Networks     Published Date: Aug 08, 2017
Digital Transformation and other changes drive vast and innumerable new data flows through the business, and increase pressure on IT to continually, quickly, and efficiently address a broad array of new demands. IT needs a network that empowers the business but is too often hampered by it instead. Network management as most practice it now is too complex and inefficient. The solution is automation.
Tags : 
    
Juniper Networks
Published By: Juniper Networks     Published Date: Feb 05, 2018
In reality, many applications are far from cloud ready, and some never will be. But almost every new application will be cloud enabled. So how do you evolve your data center into a private cloud and drive hybrid IT by connecting to public clouds, yet still cater for the needs of your legacy software? To try and understand the path to the cloud in greater detail, we’ve created this Infobrief from an extended interview conducted by the team at DatacenterDynamics with Juniper Networks’ Andy Ingram, the Global Vice President for Data Center and Cloud.
Tags : 
development, applications, infrastructure, storage, optimization
    
Juniper Networks
Published By: HotSchedules     Published Date: Aug 01, 2017
Restaurants are a top choice for a teen’s first job. In fact, minors comprise almost a third of the hospitality workforce. But employing such a prominent population isn’t always easy. Managers need to comply with labor laws that are regional in nature and constantly changing. They also need to contend with teens’ school schedules, which are always in flux. How’s a manager supposed to keep up?
Tags : 
employee management, human resources, minors, hospitality workforce, labor laws
    
HotSchedules
Published By: XpertHR     Published Date: Nov 13, 2018
One of the most common workplace documents is an employee handbook. If you choose to have one, it is critical to follow through in implementing and enforcing it. The National Labor Relations Board (NLRB) has increasingly taken more of an activist role in the scrutiny of employee handbook. It’s important that employers take note of the NLRB’s position on certain work rules that may affect an employee’s right to engage in protected activity, as well as an employer’s role in managing its workforce. When updating your handbook it's important to keep in mind that what is not included is almost as important as what is included. Use this whitepaper to refresh yourself on seven essential dos and don'ts of employee handbooks such as: • Topics to include in your handbook • Common risks to avoid • Provisions to consider • Best practice around updating and amending policies Plus, get tips on how to approach your handbook as a multistate employer. {Download now}
Tags : 
handbooks, employee handbooks, compliance, policies, work rules
    
XpertHR
Published By: AstuteIT_ABM_EMEA     Published Date: Feb 02, 2018
In un contesto dove le imprese cercano di replicare le modalità agili di sviluppo delle Internet company e di innovare in mercati altamente concorrenziali, lo sviluppo di applicazioni è diventato sempre più complesso. La grande mole di codice sorgente monolitico tradizionalmente alla base delle applicazioni aziendali rendono difficile avviare rapidamente nuovi servizi. Lo sviluppo distribuito e settorializzato e la distribuzione geografica dei team di sviluppo e di operations portano a problemi di allineamento aziendale. A tutto ciò si sommano le aspettative crescenti degli utenti, che rendono necessari un dimensionamento efficace e un monitoraggio costante delle distribuzioni per assicurare ai clienti prestazioni elevate e un’esperienza uniforme. E naturalmente, il tutto deve essere realizzato assicurando una disponibilità continua dei servizi.
Tags : 
microservizi, l'evoluzione, dello, sviluppo, applicazioni
    
AstuteIT_ABM_EMEA
Published By: AstuteIT_ABM_EMEA     Published Date: Feb 12, 2018
En un momento en que las empresas pretenden emular la agilidad de desarrollo de las compañías de Internet e innovar en mercados muy competitivos, el desarrollo de las aplicaciones se ha hecho cada vez más complejo. Los ingentes códigos fuente monolíticos que tradicionalmente acompañan a las aplicaciones empresariales ralentizan el lanzamiento de nuevos servicios. Además, la dispersión y aislamiento de los equipos de desarrollo y de operaciones dificultan la coordinación. A eso hay que añadirle que los usuarios son cada vez más exigentes y las empresas deben escalar y monitorizar las implementaciones para poder ofrecer una experiencia satisfactoria y un gran rendimiento. Todo ello, desde luego, sin interrumpir los servicios.
Tags : 
microservicios, evolucion, arquitectura, aplicaciones, modernas
    
AstuteIT_ABM_EMEA
Published By: Bluewater Learning     Published Date: Apr 09, 2018
As great as Cornerstone OnDemand is, anyone could use a little help solving more of their learning and talent management challenges. With the right partner, you can achieve greater business results with Cornerstone almost immediately.
Tags : 
bluewater, bluewater assurance, cornerstone ondemand support, cornerstone ondemand administration, cornerstone ondemand assurance, cornerstone ondemand reporting, cornerstone ondemand ux workflows, cornerstone ondemand content, cornerstone ondemand data, cornerstone ondemand technology, cornerstone ondemand process, cornerstone ondemand
    
Bluewater Learning
Published By: PGi     Published Date: Oct 01, 2018
You wouldn’t hold a critical investor call, customer event or shareholder’s meeting in your office bullpen. So why would you host an important virtual event on a platform intended to support small-group collaboration and teamwork? Frost & Sullivan research shows that two-thirds of companies use web conferencing on a regular basis for project collaboration. We also know that more and more of them are turning to the same solutions to host webinars for critical internal and external events. While web conferencing solutions can be used to support large-group or strategically important meetings, webinar technology is designed specifically for that purpose and will almost always deliver a better experience and a higher return on investment. Webinar tools deliver a wealth of features to help companies gain better insights into attendee sentiment for better investor relations, employee and customer experience, and lead generation and qualification: • Integrated video draws higher levels of int
Tags : 
    
PGi
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.