Skip to main content
 

alm

Results 151 - 175 of 467Sort Results By: Published Date | Title | Company Name
Published By: pepperjam     Published Date: Jun 18, 2019
We get it: When it comes to choosing affiliate providers, you have choices. But with so many features and offerings to compare, making the right—or even the most informed choice can feel daunting. And it doesn’t have to. You need an affiliate provider that can give you the tools and expertise you need to be successful. See for yourself how Pepperjam stacks up against the competition and make the choice that’s right for you. You’re almost there! Just complete the form to download the Buyer’s Quick Guide to Affiliate Providers!
Tags : 
    
pepperjam
Published By: Forcepoint     Published Date: Apr 20, 2016
Nel 2014, le violazioni dei dati hanno compromesso più di 700 milioni di informazioni, con perdite finanziarie stimate di almeno 400 milioni di dollari e gli incidenti di sicurezza sono aumentati fino al 66%. Ma non lasciare che la paura soffochi la crescita. Il report “Data Theft Prevention” si concentra su come innovare in completa sicurezza da una prospettiva più ampia, più mirata e più intelligente nell'applicazione.
Tags : 
security, data theft prevention, data security, security application
    
Forcepoint
Published By: Adaptive Planning     Published Date: Apr 25, 2012
In 2006 the world economy was booming, partly on the back of triple-A investment innovations. Then, suddenly, the boom ended. What fascinates the authors is the fact that almost no one saw the 2008 economic crisis coming. In this article, the authors come to terms with the reality that, in economics and business, accurate forecasts aren't possible. Therefore, they say, managers need to develop a different attitude about the future.
Tags : 
adaptive, business, finance, forecasting, business planning, budget
    
Adaptive Planning
Published By: Redstor UK     Published Date: Mar 12, 2018
The General Data Protection Regulation is set to shake up modern data protection laws. With large-scale data breaches making news headlines on a weekly basis throughout 2017, data regulation authorities across Europe will be hoping this can help resolve the challenges of data protection. However, with so many questions around how to comply it is still unclear how far this regulation spreads. Technologists are now looking for answers, wanting to know how the GDPR will affect backup and nonprimary data sets and what needs to be done to be compliant. This white paper will explore and understand aspects of the regulation to help answer questions and give clarity over what data is covered by the GDPR and what organisations need to do to be compliant. Redstor have specialised in assisting organisations with data protection and management for almost two decades. Providing compliant services around the areas of Data Backup, Disaster Recovery and Archiving.
Tags : 
    
Redstor UK
Published By: IBM     Published Date: Mar 29, 2017
Not just some data—all of it. Internal, external, structured, unstructured, historical, real-time. And what if you could do it without a huge infrastructure project? You can. Take a closer look at how three companies capitalized on more data—almost instantly—with IBM® BigInsights® on Cloud.
Tags : 
analyze, data, cloud, ibm, analytics
    
IBM
Published By: Entrust Datacard     Published Date: Jun 09, 2017
Security professionals attribute more than 63% of confirmed breaches to weak, default or stolen passwords. Analysts say more than 80% of all confirmed breaches involve privileged credentials. And the average cost of a data breach totals more than $3.8M. Almost every story reporting statistics like these concludes with “the password is dead.” The world clearly must move on from passwords in the battle to protect data – or at least attempt to phase them out.
Tags : 
    
Entrust Datacard
Published By: EMC Corporation     Published Date: May 27, 2014
RSA Technical Brief: The openness of today's networks and the growing sophistication of advanced threats make it almost impossible to prevent cyber attacks and intrusions. This technical brief discusses why combating advanced threats depends on organizations shifting more security resources from prevention to detection and remediation, and developing intelligence-driven security programs.
Tags : 
emc, security operations, security analytics, intelligence-driven security, threat detection, security monitoring, critical incident response
    
EMC Corporation
Published By: Brightcove     Published Date: Sep 17, 2014
6 Billion hours of video are watched EACH MONTH on YouTube .... That's almost 1 HOUR for every person on Earth! There is no denying the power and reach of YouTube. But, are quality issues common with YouTube videos negatively impacting your brand? We investigate.
Tags : 
online video quality, consumer perception, distribution strategies, emerging marketing
    
Brightcove
Published By: Microsoft     Published Date: Nov 08, 2013
Learn how Forrester researched Microsoft’s Application Lifecycle Management and found that it increases productivity, lowers costs, and creates more agile IT organizations.
Tags : 
microsoft, application lifecycle management, increase roi, cutting development cycles, microsoft alm, increase productivity, create agile it organization, forrester consulting
    
Microsoft
Published By: ServiceNow     Published Date: May 21, 2015
Today, enterprises are increasingly dependent on business services delivered by their IT organizations. These services underpin almost every business function, ranging from manufacturing and supply chain through to customer service and online sales. Because of their critical nature, business services need to be highly available and responsive – any disruption has a major financial and customer impact. Download this study to learn more about ServiceNow’s ServiceWatch and how it can help your organization prevent outages that could lead to: • Lost revenue • Lost employee productivity • Lost customers
Tags : 
servicenow, applications, databases, cloud, virtualization
    
ServiceNow
Published By: IBM     Published Date: Aug 24, 2017
Data governance is all about managing data, by revising that data to standardize it and bring consistency to the way it is used across numerous business initiatives. What’s more, data governance ensures that critical data is available at the right time to the right person, in a standardized and reliable form. A benefit that fuels better organization of business operations, resulting in improved productivity and efficiency of that organization. Thus, the importance of proper data governance cannot be understated. The concepts of data governance have evolved, where the first iteration of data governance, often referred to as version 1.0, focused on three simplistic elements: objectives, structure and processes; having a limited focus and scope due to its tactical usage. The opportunity from the growing value of data in the realm of analytics, business intelligence, and generating insights was left unrealized. Today, organizations are moving towards what can be called Data Governance 2.0,
Tags : 
ibm, unified governance strategy, data management, data governance
    
IBM
Published By: Datastax     Published Date: May 15, 2017
Customer experience might be a relatively new term, but the concept goes back millennia. In Ancient Greece, the retailer’s relationship with the customer was deep and personal, and that’s because the seller knew almost every customer extremely well. What happened? Mass distribution and mass marketing, for one. But now, thanks to technology, we are returning to being able to form a deep, personal relationship with the customer. Read this eBook to learn about the retailer’s journey from knowing the customer to depersonalization to using powerful technology to go back to the types of vendor-buyer relationships that existed thousands of years ago.
Tags : 
datastax, customer experience, buying initiatives
    
Datastax
Published By: Datastax     Published Date: Aug 23, 2017
Relational databases had their day and are still viable for certain use cases, but the advent of the cloud and subsequent proliferation of cloud applications is putting an almost unmanageable burden on their capabilities. Read this eBook to learn why your RBMS fails at scale, and why it’s no longer a viable option for today’s distributed, super fast-paced, cloud-friendly world.
Tags : 
cloud, application, rbms
    
Datastax
Published By: ServiceNow     Published Date: Sep 18, 2018
Where are you on the journey to performance analytics excellence? Almost all businesses use some form of analytics, but many are still not applying them to measure performance against quantifiable goals. Use this maturity model to see how far you’ve come on the path to performance analytics—and how far you need to go. No matter where you’re starting from, there’s a path to performance analytics. Discover how ServiceNow Performance Analytics could benefit your business by downloading this eBook.
Tags : 
performance, analytics, servicenow
    
ServiceNow
Published By: Group M_IBM Q2'19     Published Date: Apr 01, 2019
Delivering personalized customer experience remains the top business challenge for communications service providers (CSPs). Ovum's recently published 2018 ICT Enterprise survey saw almost all CSP IT executives interviewed identify delivering personalized customer experience as one of their three most important business challenges for the next 18 months. This trend emphasizes the high priority CSPs place on how customer relationships are managed. However, several factors have an impact on CSPs' ability to identify and then deliver customers' core needs. These include understanding the data sets they should focus on; collecting, cleansing, and consolidating these data sets; and having the right expertise to mine the data sets.
Tags : 
    
Group M_IBM Q2'19
Published By: Group M_IBM Q3'19     Published Date: Jun 24, 2019
The cloud is ubiquitous. Whether we think about it consciously or not, almost all of us are using cloud services. That could be a music service such as Spotify, storage such as Dropbox, communications via Gmail, or a software-as-a-service application such as Salesforce. Cloud services touch all of our lives.
Tags : 
    
Group M_IBM Q3'19
Published By: TeamQuest     Published Date: Sep 04, 2014
Enterprise Holdings (EHI) is the corporate parent of Enterprise Rent-A-Car, Alamo Rent A Car, National Car Rental and Enterprise CarShare. With annual revenues of $16.4 billion and more than 78,000 employees, EHI and its affiliates own and operate almost 1.4 million cars and trucks. This makes it the largest car rental service provider in the world measured by revenue, employees and fleet.
Tags : 
business metrics, automated forecasting, automated data collection
    
TeamQuest
Published By: Urban Airship     Published Date: Oct 18, 2017
Push notifications for mobile and web that boost customer engagement & retention. Our data study of 63 million new app users shows that when brands send high value push notifications more frequently (sometimes more than one a day!) users are more likely to engage and keep their app. So what kinds of push notifications should you be sending? Download this eBook for 50+ examples you can use to increase the frequency of your notifications (web or app) — and reap the bottom line benefits.
Tags : 
    
Urban Airship
Published By: IBM APAC     Published Date: Mar 19, 2018
Unstructured data has exploded in volume over the past decade. Unstructured data, media files and other data can be created just about anywhere on the planet using almost any smart device available today. As the amount of unstructured data grows exponentially, customers using this data need to be able to take advantage of the right storage solutions to support all of their file and object data requirements. IBM® recently added a new storage system to their Spectrum product family, IBM Spectrum Network Attached Storage (NAS). IBM Spectrum NAS adds another software-defined file storage system to IBM’s current unstructured data storage solutions, IBM Spectrum Scale™ and IBM Cloud Object Storage (COS). Below, we will discuss the three systems and supply some guidance on when and where to use each of them.
Tags : 
    
IBM APAC
Published By: AdRoll     Published Date: Dec 01, 2017
Last year, we found the vast majority of marketers are familiar with running programmatic campaigns. So when we surveyed over 1,300 marketers from Europe and North America this year, we shifted our focus and dove deeper into how they're thinking about the latest performance strategies across every stage of the marketing funnel. You will learn: • Why 57% of marketers are changing their attribution model this year • Why almost 40% of marketers spend a majority of their budgets on measurement alone • Why 69% of marketers are using dynamic email based on user behaviour • And more! See how you compare!
Tags : 
performance, marketing, professionals, channels, industry, advertising
    
AdRoll
Published By: Oracle OMC     Published Date: Nov 30, 2017
The headwinds facing traditional and online retailers in 2017 are numerous and well documented. Chief among the challenges: a sustained assault on established business models driven by changing consumer behavior and the competitive might of e-commerce giant Amazon. Large big-box players, such as Walmart and Target, are responding to the threat - and embracing the opportunity of e-commerce - by boosting online spending by hundreds of millions or even billions of dollars annually. Yet even the largest and most well-resourced players can’t simply spend their way to success. Competing with Amazon and adjusting to the changing demands of consumers means taking a hard look at the engines driving e-commerce and digital marketing operations, scouring for missed opportunities, and investing in the technologies that will fuel the innovations of tomorrow.
Tags : 
    
Oracle OMC
Published By: Oracle OMC     Published Date: Nov 30, 2017
The headwinds facing traditional and online retailers in 2017 are numerous and well documented. Chief among the challenges: a sustained assault on established business models driven by changing consumer behavior and the competitive might of e-commerce giant Amazon. Large big-box players, such as Walmart and Target, are responding to the threat - and embracing the opportunity of e-commerce - by boosting online spending by hundreds of millions or even billions of dollars annually. Yet even the largest and most well-resourced players can’t simply spend their way to success. Competing with Amazon and adjusting to the changing demands of consumers means taking a hard look at the engines driving e-commerce and digital marketing operations, scouring for missed opportunities, and investing in the technologies that will fuel the innovations of tomorrow.
Tags : 
    
Oracle OMC
Published By: BMC ESM     Published Date: Aug 20, 2009
In this Podcast with Eli Almog, Corporate Architect in BMC's CTO Office, discusses how IT managers can know when it's time to look at BSM, consider CMDB, learn how virtualization fits into your organization, and how automation can help your company retain its competitive edge.
Tags : 
bmc, automation, virtualization, cmdb, business process, it manager, it executive, corporate architect
    
BMC ESM
Published By: WatchGuard     Published Date: Oct 16, 2012
Network security intrusions and data theft incidents grab headlines almost daily. Organizations rely on WatchGuard for network solutions. Read on to understand why WatchGuard is "best-in-class by design"
Tags : 
watchguard, security, database security, security, it security, it infrastructure, intrusion prevention
    
WatchGuard
Published By: McAfee     Published Date: May 19, 2014
Este libro proporciona una visión general de la seguridad de la red y explica cómo los ciberdelincuentes pueden utilizar métodos ocultos o actualmente no detectables para acceder a los sistemas de red protegidos. Las técnicas de evasión avanzadas (AETs, Advanced Evasion Techniques) eluden las soluciones comunes actuales de seguridad de red. Pueden transportar cualquier ataque o exploración a través de dispositivos de seguridad de red y firewalls, firewall de próxima generación, detección de intrusos y sistemas de prevención e incluso enrutadores que realizan la inspección profunda de paquetes. En este libro encontrará todo sobre AETs y obtendrá consejos útiles y recomendaciones para ayudarlo a proteger su organización. Si trabaja en el gobierno, el área militar, banca, industria, comercio electrónico o con otras infraestructuras críticas, lea este libro para descubrir lo que se enfrenta y cómo protegerse mejor contra las evasiones avanzadas.
Tags : 
firewall de próxima generación, sistemas de prevención de intrusiones, firewall, seguridad contextual, detección de evasión avanzada, técnicas de evasión avanzadas, seguridad, gestión de ti
    
McAfee
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.