Skip to main content
 

aps

Results 201 - 225 of 623Sort Results By: Published Date | Title | Company Name
Published By: Mitel     Published Date: Apr 07, 2017
In businesses and organizations across the world, rooms once humming with wires, black boxes and blinking lights now sit empty. In a lonely phone closet, there’s only dust, a single lonely terminal, or perhaps a foosball table where IT pros can let off steam.
Tags : 
    
Mitel
Published By: NetSuite     Published Date: Feb 17, 2016
Frost & Sullivan surveyed 1,500 senior executives (CEOs, CFOs, CIOs and other senior managers) in seven countries (Australia, Hong Kong, Japan, Philippines, Singapore, the UK and the US). Respondents spanned all major industry sectors, ranging from manufacturing to retail. The research shows that most executives not only agree that their industry is rapidly undergoing transformation, but that flexibility and adaptability are increasingly becoming key factors for survival.
Tags : 
industry change, retail, manufacturing, flexibility, adaptability, small business, finance
    
NetSuite
Published By: IBM     Published Date: Oct 21, 2016
The greatest challenge of the big data revolution is making sense of all the information generated by today's vast digital economy. It's well enough for an organization to collect every slice of data it can reach, but how does it extract value from this massive volume of information?
Tags : 
ibm, analytics, data science, data, big data, aps data, aps
    
IBM
Published By: IBM     Published Date: Oct 21, 2016
Between the Internet of Things, customer experience and loyalty programs, social network monitoring, connected enterprise systems and other information sources, today's organizations have access to more data than they ever had before-and frankly, more than they may know what to do with. The challenge is to not just understand that data, but actualize it and use it to recognize real business value. This ebook will walk you through a sample scenario with Albert, a data scientist who wants to put text analytics to work by using the Word2vec algorithm and other data science tools.
Tags : 
ibm, analytics, aps, aps data, open data science, data science, word2vec
    
IBM
Published By: Genesys     Published Date: Feb 22, 2018
Is Your IT Team Ready to Enable Digital Transformation? Customers want fast access to information and immediate problem resolution on any device, from any location, at any time. It’s up to IT to build the foundation for this digital transformation—and increasingly, it’s cloud-based. Make sure your IT team is on track to deliver. An omnichannel contact center platform gives you a single, integrated view of the entire customer journey. And as a cloud-based solution, IT has the flexibility to deploy advanced features fast and cost-efficiently. Read this white paper from Frost & Sullivan for a pragmatic approach to: • Identify process changes and goals with lines of business • Benchmark your current infrastructure and technology gaps • Consider cloud omnichannel solutions for easier deployments and simple scalability
Tags : 
frost & sullivan, customer engagement, contact center, omnichannel
    
Genesys
Published By: CloudHealth by VMware     Published Date: Feb 13, 2019
Choosing Azure revolutionizes your environment's agility, simplicity, and innovation, but have you achieved the cost savings you expected? Discover 10 ways you can reduce your spend in Azure, including: -Terminate Zombie Assets -Delete Aged Snapshots -Rightsize Virtual Machines -Rightsize SQL Databases Read 10 Best Practices for Reducing Spend in Azure, to learn key strategies for optimizing cloud spend and saving 10-20% on your monthly Azure costs.
Tags : 
cloud management, microsoft azure, multicloud management
    
CloudHealth by VMware
Published By: IBM     Published Date: Jan 18, 2017
It's all well enough for an organization to collect every slice of data it can reach, but having more data doesn't mean you'll automatically get better insights. First, you have to figure out what you want from your data you have to find its value.
Tags : 
ibm, aps data, data science, open data science, analytics
    
IBM
Published By: IBM     Published Date: Jan 18, 2017
In the domain of data science, solving problems and answering questions through data analysis is standard practice. Data scientists experiment continuously by constructing models to predict outcomes or discover underlying patterns, with the goal of gaining new insights. But data scientists can only go so far without support.
Tags : 
ibm, analytics, aps data, open data science, data science, data engineers
    
IBM
Published By: IBM     Published Date: Jan 18, 2017
Data matters more than ever to business success. But value does not come from data alone. Rather, it comes from the insights enabled by data. No matter what your role is, or where you are in your data journey, you are looking for ways to drive innovation.
Tags : 
ibm, analytics, aps data, open data science, data science, apache spark
    
IBM
Published By: IBM     Published Date: Jan 18, 2017
IBM Compose Enterprise delivers a fully managed cloud data platform on the public cloud of your choice - including IBM SoftLayer or Amazon Web Services (AWS) - so you can run MongoDB, Redis, Elasticsearch, PostgreSQL, RethinkDB, RabbitMQ and etcd in dedicated data clusters.
Tags : 
ibm, analytics, aps data, database, cloud db toolkit
    
IBM
Published By: IBM     Published Date: Jan 18, 2017
This report is designed to help you make an informed decision about IBM Cloudant. It is based on 43 ratings and reviews of Cloudant on TrustRadius, the trusted user review site for business software.
Tags : 
ibm, analytics, aps data, database, cloud db toolkit, cloudant
    
IBM
Published By: Comcast Business     Published Date: Apr 13, 2017
The Internet of Things is perhaps one of the most transformative technologies of our time. The ability to connect devices and services to increase efficiencies, streamline operations and reduced manual labor has permeated multiple facets of our lives, enabling us to interact with technology and data in ways previously thought impossible. Download now!
Tags : 
    
Comcast Business
Published By: CyberX     Published Date: Aug 21, 2017
Today, a range of diverse cyber-adversaries — including nation-states, cybercriminals, competitors, hacktivists, and insiders/contractors — pose financial, reputational and regulatory risk to industrial and critical infrastructure organizations. The business impact can include costly production downtime, safety failures, and environmental release of hazardous materials, as well as theft of corporate secrets such as sensitive information about formulas and proprietary manufacturing processes. The challenge is compounded as organizations adopt digitization initiatives and IT/OT convergence to support the business — removing any “air-gaps” that may have existed in the past. To help security and operations teams stay ahead of the latest ICS/SCADA threats, CyberX — the industrial cybersecurity company founded by military cyber experts with nation-state experience securing critical infrastructure — has partnered with SANS to create educational content about emerging ICS threat vectors and
Tags : 
ics, scada, cyberx, cyber security, hacking, randomware
    
CyberX
Published By: Oracle     Published Date: Feb 20, 2019
Where’s Your Supply Chain’s Weak Link? Identifying and repairing gaps in your supply chain is critical to ongoing success in a digital world. Here are 5 questions you need to ask.
Tags : 
    
Oracle
Published By: Druva     Published Date: Oct 02, 2017
There is increasing urgency for organizations today to comply with regional data protection regulations or face potential financial and legal repercussions, and customer backlash. This awareness is heightened by recent headlines related to data breaches, rising risks of BYOD, and other privacy lapses that have bottom line and reputational consequences. Learn how to prepare for this new world of data privacy with actionable advice for senior IT leaders addressing data privacy concerns in their organizations. This paper covers key issues to consider when it comes to protecting corporate and employee data privacy, including: Sectorial regulations, including HIPAA and FINRA Evolving Data Protection Acts in EU countries with a strong focus on citizen privacy, data residency requirements, and concerns over data production BYOD policies blurring the lines between personal and business data Internal controls for safeguarding PII & PHI
Tags : 
data breaches, data privacy, hipaa, finra, byod, pii, phi
    
Druva
Published By: Oracle + Dyn     Published Date: Jun 29, 2017
Every user’s first interaction with your website begins with a series of DNS queries. The Domain Name System or DNS is a distributed internet database that maps human-readable names to IP addresses, ensuring users reach the correct online asset (website, application, etc) efficiently. Knowing the complexities and best practices of this layer of your online infrastructure will help your organization build redundancy, improve end-user performance and establish a top notch DR plan. Download this guide to DNS top terms and actionable concepts including: Anycast vs. Unicast networks CNAME DDoS and Hijacking Load Balancing and GSLB
Tags : 
    
Oracle + Dyn
Published By: OneLogin     Published Date: Oct 24, 2017
Corporate data spreads across an ever-growing number of applications. Users (employees, contractors, partners, and customers) access those applications over a wide range of devices. Those devices take different forms: desktops, laptops, tablets, smartphones, smartwatches. Each device may use a different operating system. The locations from where people access your data can be on-premises or off, and in any number of places around the globe. Data, users, apps, devices, locations—the sheer number of permutations and combinations is mind-boggling. This complex nature of today’s IT environment opens security gaps and exposes your business to undue risk. To illustrate, try to envision all the permutations and possible entry points for risk in your organization. Imagine that you have 400 users, each using 25 apps. When you multiply those together, that’s 10,000 potential access permissions to manage. Access permissions change as users come and go, roles change, new apps are added, and
Tags : 
    
OneLogin
Published By: Empyr     Published Date: Jun 12, 2018
This retailer wanted to acquire new customers and eliminate wasteful spend on advertising in the process. Of equal importance was their desire to re-engage lapsed customers who occasionally frequented its locations to reactivate and stimulate additional purchase opportunity.
Tags : 
    
Empyr
Published By: Empyr     Published Date: Jun 12, 2018
A major QSR brand wanted to increase business in a highly competitive category by acquiring new customers and eliminating wasteful spend on advertising in the process. Of equal importance was their desire to increase frequency and ticket size with their light lapsed guests.
Tags : 
    
Empyr
Published By: SundaySky     Published Date: Mar 06, 2018
The world is mobile. People communicate with each other on their mobile phones, they stay on schedule with the help of their smartwatches, and, perhaps most importantly, they interact with brands via mobile apps. Therefore, it’s important for brands to focus on their mobile experiences. To investigate the preferences and behaviors of consumers when using mobile applications within the U.S., SundaySky conducted an online survey with 226 total respondents.
Tags : 
    
SundaySky
Published By: SundaySky     Published Date: Mar 06, 2018
The world is mobile. People communicate with each other on their mobile phones, they stay on schedule with the help of their smartwatches, and, perhaps most importantly, they interact with brands via mobile apps. Therefore, it’s important for brands to focus on their mobile experiences. To investigate the preferences and behaviors of consumers when using mobile applications within the U.S., SundaySky conducted an online survey with 226 total respondents.
Tags : 
    
SundaySky
Published By: SundaySky     Published Date: Mar 06, 2018
The world is mobile. People communicate with each other on their mobile phones, they stay on schedule with the help of their smartwatches, and, perhaps most importantly, they interact with brands via mobile apps. Therefore, it’s important for brands to focus on their mobile experiences. To investigate the preferences and behaviors of consumers when using mobile applications within the U.S., SundaySky conducted an online survey with 226 total respondents.
Tags : 
    
SundaySky
Published By: TrendKite     Published Date: Apr 25, 2018
Sometimes a perfect storm comes together to signal a radical shift or rebirth of an industry. But it’s not enough to say public relations is in flux or rapidly changing. It’s more impactful to discuss the evolution of the change, understand the potential gaps, and be early to capitalize on opportunities created by these gaps. The path for change in the PR industry has been tumultuous. And understandably so. The irrationality of basing performance on vanity metrics is so ingrained in the profession that the left-brain, rational piece has been pushed aside. This has created a culture of estimating based on vanity metrics like AVE (ad value equivalency), leading to a dynamic where the C-suite craves that WSJ or TechCrunch story, yet doesn’t believe PR’s reporting on the value of that coverage. When everyone in the marketing stack is crunching numbers and showing real, tangible value, PR is holding onto air. Why keep setting the profession up for failure by perpetuating the cycle of abstr
Tags : 
ave, trendkite, marketing
    
TrendKite
Published By: Cisco Umbrella EMEA     Published Date: May 24, 2019
In today’s business environment, branch offices are more important than ever. For the average enterprise, branches generate the vast majority of revenue, but security at the branch is limited, if it exists at all. Learn how to enable secure branch transformation from the branch to cloud edge – without gaps.
Tags : 
    
Cisco Umbrella EMEA
Published By: Group M_IBM Q2'19     Published Date: Apr 11, 2019
This report describes the results from a groundbreaking global study by Thycotic that reveals major risk and compliance gaps in how organizations manage and secure their privileged accounts and access to sensitive systems, infrastructure and data. The 2018 Global State of Privileged Access Management (PAM) Risk & Compliance report highlights where many organizations are failing to fully put security controls in place to protect their most critical information assets.
Tags : 
    
Group M_IBM Q2'19
Start   Previous    2 3 4 5 6 7 8 9 10 11 12 13 14 15 16    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.