Skip to main content
 

bring

Results 51 - 75 of 1171Sort Results By: Published Date | Title | Company Name
Published By: DRIP     Published Date: Aug 23, 2019
The Spice House has a long history of pioneering how spices are sold. Since 1957, its flagship brick-and-mortar location has been a go-to hub for grabbing a cup of coffee and taking in the full spice experience—smelling, grinding, tasting, touching, and talkin’ spices and their backstories with the owners. Today, The Spice House sells more than 400 spices, blends, rubs, and extracts across several retail locations and the ecommerce store. See how Drip ecommerce CRM helps The Spice House bring a great instore experience to their online space.
Tags : 
    
DRIP
Published By: Group M_IBM Q3'19     Published Date: Aug 22, 2019
The mandate for procurement organizations is clear – cost reduction alone no longer ensures success; creating value is equally important. How was Horizon Blue Cross Blue Shield able to achieve their desired future state? In this webinar, we will discuss: • Why procurement needs a strategic makeover, the current adoption of emerging technologies by procurement, and the challenges faced by procurement executives. • How the procurement team is driving towards an increased ROI through a more modern and user-friendly experience that enables the overarching enterprise business strategy. • How IBM is playing as a procurement partner by bringing to the table the latest and greatest technologies and services to solidify competitive advantage and differentiation.
Tags : 
    
Group M_IBM Q3'19
Published By: ConnectWise     Published Date: Aug 22, 2019
Profits are the name of the game for a lot of technology solution providers, but keeping them coming in the door isn’t always simple. Building a solid foundation starts with a strong, efficient sales team. This eBook helps outline the five keys to creating and maintaining a well-oiled sales machine that allows you to bring in more business and encourage recurring revenue from your existing clients.
Tags : 
    
ConnectWise
Published By: MicroStrategy     Published Date: Aug 21, 2019
To survive and thrive in an era of accelerating digital disruption, organizations require accessible data, actionable insights, continuous innovation, and disruptive business models. It’s no longer enough to prioritize and implement analytics – leaders are being challenged to stop doing analytics just for analytics’ sake and focus on defined business outcomes. In addition, these leaders are being challenged to bring predictive capabilities and even prescriptive recommended actions into production at scale. As AI and accelerated growth and transformation become top of mind, many enterprises are realizing that their current segmented analytics approach isn’t built to last, and that real transformation will require proper endto- end data management, data security, and a data processing platform company-wide. The year 2019 will be a turning point for many organizations that realize being data-driven doesn’t guarantee future success.
Tags : 
    
MicroStrategy
Published By: Apstra     Published Date: Aug 19, 2019
You may have read in the news about horrific security gaps that have the potential of bringing down whole infrastructures, leaking critical business and personal data, and exposing organizations to massive liability. There is no question that improving organizations’ security posture is a critical requirement for infrastructure and security teams.
Tags : 
    
Apstra
Published By: Dell EMC Storage     Published Date: Aug 15, 2019
Das digitale Zeitalter hat zu einer starken Zunahme von Daten geführt, die moderne Unternehmen voranbringen. Bei korrekter Nutzung dieser Daten können Unternehmen in sämtlichen Geschäftsbereichen bessere Geschäftsergebnisse erzielen. Durch die Verwendung zur Unterstützung unterschiedlicher Workflows, Analysen und Aktivitäten werden Daten in Datenkapital transformiert – eine digitale Ressource, die einen Werttreiber für das Unternehmen darstellt. Wie stark ein Unternehmen seine organisatorische Denkweise auf dieses Datenkapital ausrichtet – sowohl im Hinblick auf die Verwendung von Daten als auch auf die Art und Weise, in der es in Datentechnologie investiert – kann nachhaltige Auswirkungen auf den Erfolg des Unternehmens haben. Im Februar 2019 gaben Dell EMC und Intel Forrester Consulting den Auftrag, zu bewerten, ob es schon bald eine Voraussetzung für den Erfolg sein wird, bei jeder Gelegenheit Daten und Analysen nutzen und anwenden zu können. Forrester führte daraufhin eine globale
Tags : 
    
Dell EMC Storage
Published By: Dell EMC Storage     Published Date: Aug 15, 2019
Das digitale Zeitalter verändert die Art und Weise, in der Unternehmen Daten betrachten, schützen und gewinnbringend nutzen. Sie streben jetzt mehr den je danach, zu einem digitalin Unternehmen zu werden, aber dafür sind datengesteuerte Verfahren erforderlich. In modernen Unternehmen sind Daten die Grundlage für alle Bereiche: Analysen, digitale Erfahrungen, IoT und künstliche Intelligenz sind nennenswerte Beispiele. All diese Bereiche sind wichtig für Unternehmen, die in einer digital transformierten Welt erfolgreich sein möchten, und können ohne Daten schlicht nicht funktionieren. Deshalb werden Daten statt als statische digitale Ressource zunehmend als strategische Unternehmensressource wahrgenommen.
Tags : 
    
Dell EMC Storage
Published By: Dell EMC Storage     Published Date: Aug 15, 2019
Damit die für eine Business-Transformation erforderliche Flexibilität erreicht werden kann, muss die Modernisierung des Rechenzentrums als Kernkompetenz wahrgenommen werden. Voraussetzung hierfür ist eine hochmoderne IT-Infrastruktur, die das Ausmaß und die Komplexität einer sich wandelnden Technologielandschaft unterstützen kann. Unternehmen müssen diese Notwendigkeit erfüllen, indem sie die SDDC-Prinzipien (Software-Defined-Datacenter) übernehmen, auf Modernisierung setzen und ihre IT-Managementprozesse automatisieren. Alle, die dies beherzigen, können mit schneller, sicherer und zuverlässiger Unternehmenstechnologie geschäftliche Innovationen voranbringen und überragende Kundenerfahrungen bieten. Im Dezember 2018 beauftragte Dell Technologies Forrester Consulting mit der Bewertung des geschäftlichen Nutzens einer modernen Infrastruktur in den Rechenzentren von Unternehmen. Forrester führte eine Onlineumfrage unter 508 für die IT-Infrastrukturtechnologie zuständigen Entscheidungsträg
Tags : 
    
Dell EMC Storage
Published By: Lenovo - APAC     Published Date: Aug 13, 2019
How much money does the average data breach cost? How many days of downtime does ransomware cause? How many millions of people have their data exposed? Discover the vast impact on time, money & productivity of security breaches. Investing up front in strong security, will save you in the long run. Comprehensive end-to-end security not only reduces the risk of being compromised, it also brings benefit to the business., Taking steps to invest in the right solutions, that use rigorous, trackable and auditable security standards, across their entire supply chain is a must to mitigate risks. ThinkShield provides that and so much more. It is a security solution that offers end-to-end protection that drives productivity, innovation, and profitability.
Tags : 
    
Lenovo - APAC
Published By: Trend Micro     Published Date: Aug 13, 2019
While threat prevention continues to improve with the use of advanced techniques, adversaries are outpacing these advances requiring security teams to implement threat detection and response programs. Security teams are often addressing the process haphazardly, using disconnected point tools and manual processes that consume too many analysts and result in slow mean-time to detection and response. While EDR has enabled security teams to take important steps forward for detection and response, ultimately it can only look at the endpoints which limits the scope of threats that can be detected and if something is detected, limits the view of who and what is affected and thus, how best to respond. ESG therefore recommends looking beyond the endpoint and utilizing natively integrated security solutions across more than just one vector to improve detection and response times. The more data you can knit together, the more effective you can be to uncover the security incidents most dangerous to your organization. Watch this webinar to learn about the value of XDR: connecting detection and response across multiple security layers. Dave Gruber, senior analyst at ESG, shares recent research and his views on the evolution of threat detection and response; making the case for expanding the capabilities and expectations of detection and response solutions. Wendy Moore, VP of Product Marketing, discusses Trend Micro’s own XDR strategy and the unique value that Trend Micro can bring to detection, investigation and response.
Tags : 
    
Trend Micro
Published By: Google     Published Date: Aug 05, 2019
"Agile BI requires more than just agile dashboards. True agility means prototyping data models quickly so business users can continuously iterate on them. Application development and delivery professionals working on BI initiatives should consider adding DWA platforms to their BI toolbox. This Forrester report discusses how seven data warehouse automation vendors bring Agile options to all phases of BI/analytics application development. Read more to find out how these platforms help facilitate shorter development cycles."
Tags : 
data warehouse automation, forrester, agile solutions, business intelligence, analytics
    
Google
Published By: Iovation     Published Date: Aug 02, 2019
Aite Group’s second Payment Services Directive (PSD2) Research Report, commissioned by iovation, a TransUnion Company, provides an in-depth analysis of how those in the payment services and e-commerce market should prepare to handle the new strong customer authentication (SCA) requirements under PSD2. See the results of the actual market status in Europe regarding the main changes that PSD2 will bring to the e-commerce payments market. This complimentary, custom report, PSD2: Advent of the New Payments Market in Europe, will teach you what Aite Group concluded after interviewing 20 payments executives from European banks, other PSPs, merchants, payment networks and industry experts.
Tags : 
payment services directive, psd2 regulation
    
Iovation
Published By: VMware SD-WAN by VeloCloud     Published Date: Aug 01, 2019
SD-WAN is designed for modern business. With it, you can apply software-defined principles to automate, optimize, and accelerate application performance over the WAN to meet business outcomes. Quite simply, SD-WAN is one of the smartest ways to modernize connectivity to the branch office and bring end-to-end simplicity across the network. Read this e-book now to discover 6 ways SD-WAN redefines branch office networking.
Tags : 
    
VMware SD-WAN by VeloCloud
Published By: Juniper Networks     Published Date: Jul 31, 2019
The Security Operations Center (SOC) is the first line of defense against cyber attacks. They are charged with defending the business against the many new and more virulent attacks that occur all day, every day. And the pressure on the SOC is increasing. Their work is more important, as the cost of data breaches are now substantial. The Ponemon Institute’s “2017 Cost of Data Breach Study” says the average cost of an incursion is $3.62 million. The study also says larger breaches are occurring, with the average breach impacting more than 24,000 records. And with new regulations such as the EU’s General Data Protection Requirement (GDPR) putting stiff financial penalties on breaches of personal data, the cost of a breach can have material impact on the financial results of the firm. This trend toward increasingly onerous statutory demands will continue, as the U.S. is now considering the Data Privacy Act, which will bring more scrutiny and accompanying penalties for breaches involving
Tags : 
application management, application performance, network infrastructure, network management, network security
    
Juniper Networks
Published By: Juniper Networks     Published Date: Jul 31, 2019
More than 80% of organizations in Asia are not protected against today's threats. Many of them depend on security investments made years ago, which cannot defend against new and emerging threats. The arrival of new technologies including cloud computing, the Internet of Things, mobility, bring your own device (BYOD), and social media have massively increased attack surfaces and expanded the threat landscape. New agile solutions are required that can address today's threats and enable organizations to adjust their security posture as the threat landscape evolves. Download this whitepaper to know more about key recommendations including: • Working with third parties to evaluate your current cybersecurity posture and identify vulnerabilities • Upgrading and update your cybersecurity assets with a particular focus on ensuring that firewalls are upgraded • Ensuring that your organization has a unified view of your assets and the threat environment
Tags : 
network management, network security, network security appliance, security, security architecture
    
Juniper Networks
Published By: Workday     Published Date: Jul 30, 2019
Workday brings finance, HR, and supply chain into a single agile system, so your organization can adapt to the ever-changing healthcare industry. Watch this quick demo to see how you can streamline operations, transform your care continuum, and more.
Tags : 
    
Workday
Published By: Workday     Published Date: Jul 30, 2019
Blockchain is no longer just some mysterious technology built for Bitcoin. Organizations are using blockchain technology to solve today’s fast-moving business challenges and prepare for what the future brings. Read this report to learn how you can benefit from blockchain.
Tags : 
    
Workday
Published By: Rackspace     Published Date: Jul 23, 2019
Santikos Entertainment relies on Rackspace’s security experts and certified AWS engineers to deliver a movie-going experience that fits the digital age.
Tags : 
    
Rackspace
Published By: HERE Technologies     Published Date: Jul 23, 2019
On-demand services that transport people in high volumes over short distances have a crucial role to play in changing urban transportation. New technology and data bring a wealth of opportunity for new mobility service providers to optimize, keep customers satisfied and achieve the operational superiority for which they’re all striving. This ebook looks at the critical role location intelligence can play in helping on-demand organizations make that extra drop-off each hour. By reading this ebook, you will discover: - How accurate location, asset and routing data can aid fleet optimization and improve service response times - How accurate pick-up and trip destination ETAs ensure time isn’t wasted connecting users with drivers - How services can calculate the fastest possible route between multiple waypoints to maximize journey efficiency
Tags : 
here tech, mapping, location data, location intelligence, car sharing, ride sharing, e-scooters sharing
    
HERE Technologies
Published By: TIBCO Software     Published Date: Jul 22, 2019
AA Ireland specializes in home, motor, and travel insurance and provides emergency rescue for people in their homes and on the road, attending to over 140,000 car break downs every year, 80% of which are fixed on-the-spot. “In each of the last five years, the industry lost a quarter billion in motor insurance," says Colm Carey, chief analytics officer. "So, there's a huge push for new data, models, ways to segment and pick profitable customer types—and get a lot more sophisticated. Our goal is to optimize pricing, understand the types of customers we're bringing, and the types we're trying to attract. We would like to tie that across the business. Marketing will run a campaign, trying to attract a lot of customers, but maybe they're not the right type. "We wanted to step away from industry standard software and go with something that was powerful and future-proof. In 2016, we had an opportunity to analyze all software. We chose the TIBCO® System of Insight with TIBCO BusinessWorks™ i
Tags : 
    
TIBCO Software
Published By: Expert System     Published Date: Jul 18, 2019
Robotic Process Automation (RPA) is helping companies reduce costs and improve on quality and productivity by automating some of their most time consuming, rule-based and replicable business processes. RPA is especially effective in the banking and insurance sector where it brings speed and efficiency to customer service and compliance. Based on artificial intelligence algorithms, Expert System’s Cogito cognitive technology enables an automatic, human-like understanding of the content of text documents. Applied to RPA, Cogito adds greater business value and ROI for both repetitive and complex information-intensive processes. Using Cogito, companies can expect up to 53% savings on activities such as FTEs and warranty management, and cost reductions of 30 to 60% for email management and quote processing, etc.
Tags : 
    
Expert System
Published By: Expert System     Published Date: Jul 18, 2019
Although computers are better when it comes to processing and making calculations, they haven’t been able to accomplish some of the most basic human tasks, until now. Thanks to cognitive computing, machines are bringing human-like intelligence to many business applications, including big data. So, what is cognitive computing? According to Forbes, “cognitive computing comes from a mashup of cognitive science—the study of the human brain and how it functions—and computer science.” This definition is a good place to start. However, to really understand what cognitive computing is, we have to go a little deeper.
Tags : 
    
Expert System
Published By: 15five     Published Date: Jul 17, 2019
The original Great eBook of Employee Questions was so popular that we created this outstanding sequel. In The Return of the Question Master, you’ll find over 60 new questions along with detailed information about why they are valuable and when they should be asked. The seed of question mastery is within us all, but it must be nurtured like any other skill. We hope that by asking these powerful questions you will receive insightful answers to help you and your team gain a better understanding of yourselves, your culture, and the product or service you are bringing into the world.
Tags : 
    
15five
Published By: Canon Solutions America     Published Date: Jul 15, 2019
Student portals, mobile printing, Chromebooks…Technology has changed the way students learn and interact with your school. But it’s also made you more vulnerable to cyberthreats. This brief will bring you up to date on the new rules of data security.
Tags : 
    
Canon Solutions America
Published By: HERE Technologies     Published Date: Jul 11, 2019
On-demand services that transport people in high volumes over short distances have a crucial role to play in changing urban transportation. New technology and data bring a wealth of opportunity for new mobility service providers to optimize, keep customers satisfied and achieve the operational superiority for which they’re all striving. This ebook looks at the critical role location intelligence can play in helping on-demand organizations make that extra drop-off each hour. By reading this ebook, you will discover: - How accurate location, asset and routing data can aid fleet optimization and improve service response times - How accurate pick-up and trip destination ETAs ensure time isn’t wasted connecting users with drivers - How services can calculate the fastest possible route between multiple waypoints to maximize journey efficiency
Tags : 
urban mobility, here tech, mapping
    
HERE Technologies
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.