Skip to main content
 

corporate

Results 51 - 75 of 1064Sort Results By: Published Date | Title | Company Name
Published By: IBM APAC     Published Date: Nov 22, 2017
Using IBM Watson’s cognitive capabilities, companies can quickly differentiate their customer service quality by being more pro active and responsive to customer needs. Simply put, chatbots and virtual agents are the future of customer interactions. Building apps from scratch that incorporate natural language processing, speech to text recognition, visual recognition, analytics, and artificial intelligence requires broad expertise in these disciplines, large staffs, and a huge financial commitment. Making use of IBM Watson cognitive services brings these capabilities in-house quickly and without the capital investment that would be needed to develop the technologies within an organization.
Tags : 
decision making, deeper data, insights, cognitive, analytics, ibm, watson, virtual agents
    
IBM APAC
Published By: IBM APAC     Published Date: Nov 22, 2017
AlchemyAPI’s approach to natural language processing incorporates both linguistic and statistical analysis techniques into a single unified system. This hybrid approach provides an industry-leading advantage since both techniques have benefits and drawbacks depending on the content and specific usecases. Linguistic analysis takes a basic grammatical approach to understand how words combine into phrases, and how those phrases combine into sentences. While this approach works well with editorialized text (e.g., news articles and press releases), it does not perform as well when it comes to usergenerated content, often filled with slang, misspellings and idioms. Statistical analysis, however, understands language from a mathematical standpoint and works well on “noisy” content (e.g., tweets, blog posts, and Facebook status updates). The combination of these two approaches allows for increased accuracy on a variety of content.
Tags : 
industry, advantage, linguistic, grammatical, statistical analysis, content
    
IBM APAC
Published By: Akamai Technologies     Published Date: Dec 11, 2018
Existing security controls are outmatched — at best static and reactive. Current layers likely aren’t protecting you against all attack vectors, like the vulnerable back door that is recursive DNS. And security mechanisms that frustrate, impede, or disallow legitimate users, devices, or applications will have low adoption rates and/or will curtail productivity. Benign users may even circumvent these processes, further undermining your corporate security posture and creating more gaps in your defense-in- depth strategy. One of the many use cases associated with a zero trust security strategy is protecting your network — and most importantly, your data — from malware.
Tags : 
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Dec 11, 2018
The challenges that IT security professionals face grow more complex daily: Cyberthreats are sophisticated and ever-evolving, the workforce is varied and mobile, and access to the corporate network must be customized and efficient.
Tags : 
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Dec 17, 2018
Employees, devices, and applications are no longer locked away inside the corporate perimeter. They’re on the web and on the go. Providing security for a new breed of anytime, anywhere workers and cloud-based applications requires a novel approach: a zero trust security model. Assuming that every user, request, and server is untrusted until proven otherwise, a zero trust solution dynamically and continually assesses trust every time a user or device requests access to a resource. But zero trust offers more than a line of defense. The model’s security benefits deliver considerable business value, too. Read this white paper to learn more about: -Protecting your customers’ data -Decreasing the time to breach detection -Gaining visibility into your enterprise traffic -Reducing the complexity of your security stack -Solving the security skills shortage -Optimizing the end-user experience -Facilitating the move to the cloud
Tags : 
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Jun 14, 2018
"Existing security controls are outmatched — at best static and reactive. Current layers likely aren’t protecting you against all attack vectors, like the vulnerable back door that is recursive DNS. And security mechanisms that frustrate, impede, or disallow legitimate users, devices, or applications will have low adoption rates and/or will curtail productivity. Benign users may even circumvent these processes, further undermining your corporate security posture and creating more gaps in your defense-in- depth strategy. One of the many use cases associated with a zero trust security strategy is protecting your network — and most importantly, your data — from malware. "
Tags : 
dns, rdns, security, zero trust security, malware, data, network security
    
Akamai Technologies
Published By: Dell     Published Date: Oct 24, 2014
Employees are increasingly using bring-your-own devices (BYOD) to work and accessing corporate IT resources from home. Until now, management of BYOD within IT was piecemeal, with most organizations cob¬bling together solutions that included mobile device management software, unified access suites, security, and hardware. Read this technology brief to learn how Windows Server 2012 R2 takes the guesswork and integration out of BYOD security and administration, providing one point of control and management for IT organizations.
Tags : 
byod, mobile device mangement, secure mobility
    
Dell
Published By: TriNet     Published Date: Nov 26, 2012
Download this eGuide to learn 7 ways to help build a strong company culture within the workplace to help your company thrive.
Tags : 
corporate culture, competitive advantage, company culture, human capital
    
TriNet
Published By: KeyBank Commercial Banking     Published Date: Nov 08, 2017
See what’s on the minds of middle market leaders by reading our latest quarterly report now.
Tags : 
middle market, us economy, economic outlook, business acquisitions, business expansion, treasury regulations, corporate tax reform
    
KeyBank Commercial Banking
Published By: Key Private Bank     Published Date: Apr 05, 2018
When it comes to building portfolios for wealth creation, Key Private Bank experts believe our clients are best served by a disciplined approach that incorporates both active and passive strategies. We understand the debate over which methodology generates better outcomes has been going on for decades, but with the right team by your side you’ll reap the benefits of a method that’s time-tested. Learn the whys and hows of both passive and active investing, and what to do to maximize their benefits, your portfolio and wealth when you read our latest whitepaper. © 2018 KeyCorp. E92127 180314-372281
Tags : 
investment, investing, investment portfolio, passive investing, active investing, passive or active investing, active vs passive investing, investment strategies, market opportunities, passive indexing, index funds, investment performance, investment styles, actively managed funds, index mutual funds, why passive investing, benefits of passive investing, what is active investing
    
Key Private Bank
Published By: SAS     Published Date: Nov 04, 2015
Big data evolution: forging new corporate capabilities for the long term is an Economist Intelligence Unit report, sponsored by SAS. It explores how far along companies are on their data journey and how they can best exploit the massive amounts of data they are collecting.
Tags : 
sas, big data, big data evolution, economist intelligence unit, eiu, data journey
    
SAS
Published By: HPE     Published Date: Mar 23, 2015
If you’ve noticed more employees accessing the corporate network using their personally owned mobile devices, you’re not alone. Many employees are boosting their productivity by using their smartphones and tablets at work. Gone are the days of corporate IT departments dictating the types of mobile devices that could access the network. Bring your own device (BYOD) policies, while increasing employee satisfaction and productivity, are straining corporate networks. This white paper describes the limitations of legacy networks, especially for supporting BYOD. Understanding these limitations can pave the way for a successful BYOD management policy for campus and branch networks.
Tags : 
corporate network, personal devices, smartphone, tablet, legacy networks, byod
    
HPE
Published By: PulseSecure     Published Date: Apr 01, 2015
Learn how to craft enterprise plans for your organization’s mobile security and see how this will allow your organization to properly implement a Bring Your Own Device environment to improve employee’s productivity.
Tags : 
mobile devices, corporate network, security, secure access solutions
    
PulseSecure
Published By: PulseSecure     Published Date: Apr 01, 2015
Learn how to properly empower your organization for mobile productivity and see how you can deploy and provision for this device-based access with improved security and management policies.
Tags : 
mobile productivity, mobile access, security, connectivity, byod, corporate network
    
PulseSecure
Published By: PulseSecure     Published Date: Apr 01, 2015
Learn how to achieve an app centric approach to enterprise mobility and see how this will enable workers to stay connected to corporate systems through a vast array of device types and wireless connectivity options while simultaneously increasing productivity and becoming more customer-centric.
Tags : 
enterprise mobility, applications, byod, mobile strategy, security
    
PulseSecure
Published By: Dell EMC     Published Date: Feb 23, 2017
Desktop and application virtualization have steadily gained ground to address a broad range of use cases across organizations of all sizes. According to ESG research, over the past few years, desktop virtualization has consistently risen to be included among the five most commonly-identified IT priorities, alongside such perennial corporate objectives as fortifying cybersecurity and managing data growth.
Tags : 
    
Dell EMC
Published By: Creative Lodging Solutions     Published Date: Apr 16, 2015
Hotel room prices account for only a fraction of total corporate lodging costs. What could your company be overlooking? Read our “The Total Cost of Lodging” white paper to discover: •The top 3 largest costs in lodging management •The percentage of inaccurate hotel invoices •How to save on lodging Find expert answers to rising hotel rates, inaccurate billing, and inefficient systems. Read more to find out how to make your lodging program better!
Tags : 
travel management, lodging, domestic, corporate, costs, trip
    
Creative Lodging Solutions
Published By: Quantum     Published Date: Jan 24, 2017
Is your organization ready to take the plunge into in-house video production? The benefits can be substantial, but making the move requires some preparation. The IT infrastructure you use for enterprise applications might not be able to meet the rigorous requirements of video production. And you might not want video production teams to use resources from your existing infrastructure, since doing so could affect the performance of other applications. Whether you’re just getting started with in-house video or ramping up production, consider these five best practices for building an IT environment optimized for video work. The right approach to IT is essential for developing efficient collaborative workflows and maximizing the value of your video content.
Tags : 
corporate video, corporate communications, video storage, enterprise video, enterprise storage, media production, video production, video marketing, video training, video communications, in-house video production
    
Quantum
Published By: Quantum     Published Date: Jun 20, 2017
In the past, the production of professional quality corporate videos was delegated to outside agencies. Corporate business units hired marketing firms and video production houses because those outside agencies were the only ones with both the required expertise and the expensive equipment needed to generate high-quality results. Quantum teamed up with the Communications Media Management Association (CMMA) to survey their members—media production managers from leading enterprises—to learn more about the benefits and challenges of creating video in-house. Download the eBook, “The Changing Landscape of Corporate Video Production” to get the following questions answered and more: • Will in-house creative teams continue to ramp up in production? • What video formats are they currently producing and delivering? • How are they archiving their content? • What challenges are in-house teams facing as they generate more content? Today, that is changing. As the cost of video production technology drops, more corporations are recognizing the value of bringing production in-house. According to a recent report by Vidyard, 85% of businesses surveyed now have internal staff and resources producing videos in-house.
Tags : 
change, landscape, corporate video production, quantum
    
Quantum
Published By: Adobe     Published Date: Nov 07, 2013
Worldwide social network ad spending is expected to reach nearly $9 billion in 2013, a 33% increase over 2012. While Facebook will maintain a significant share of the 2013 total ($5.48 billion), that leaves $3.5 billion to be spent on fast-rising Twitter, Chinese social networks, social games, LinkedIn and other sites.
Tags : 
adobe, emarketer, worldwide social network ad spending, advertising spending, ad spending, incorporated ad spending, social networks, ad revenues, ad targeting, target audiences, social media audience, spend forecast, social media, internet marketing
    
Adobe
Published By: Adobe     Published Date: Nov 25, 2013
Without document classification in play, it's impossible to know what to protect. The mobile ecosystem makes workers infinitely more productive, which is one reason that it won’t go away. This white paper explores the question: How can IT govern and protect content in such ad hoc and semi-structured environments? Please download whitepaper to learn more.
Tags : 
document, document classification, document security, mobile, mobile workforce, cloud-based, mobile, mobile ecosystem, it governance, semi-structured environments, sensitive documents, corporate liabilities, enterprise, enterprise solutions
    
Adobe
Published By: Red Hat     Published Date: Jan 01, 2013
Traditional security measures such as network firewalls are no longer enough to keep an enterprise secure. With Red Hat Enterprise Linux, security mechanisms are incorporated and applied at the core of every solution, and security is extended to include all the open source packages that make up Red Hat Enterprise Linux. As a result, customers experience a higher quality of service.
Tags : 
red hat, datacenters, enterprise, linux, security mechanisms, network firewalls
    
Red Hat
Published By: Pega     Published Date: Apr 04, 2016
It is no secret banks are losing customers, and fast. A recent Finextra/Pegasystems survey pegs that 78% of banks have lost business in the last 12 months. The question is “Why?”. It all comes down to engaging with customers before, during and even after the sales process. Nearly all banks are struggling with the impact of client due diligence and KYC (know your customer) regulation on their onboarding processes, and are painfully aware that lack of speed, process visibility and repeat data requests are frustrating their corporate customers. The same holds true for service, where corporates are crying out for improvement, as well as omni-channel access and quick turnaround of service requests and inquiries. To stop the sales decline, banks need to begin doing all these things well. They will then be more competitive in the market as well as retain and win new business. Download this research study and gain a better understanding of how banks can better meet the needs of their customers
Tags : 
    
Pega
Published By: Dell     Published Date: Nov 12, 2018
Today, IT leaders address the PC lifecycle across a continuum from control to transformation. Control is geared to optimization, while transformation focuses on the business impact of technology. Though the two approaches differ, they are not in opposition. They strive for the same goals and face similar challenges. As IT leaders provide their workforce with the tools to carry out the corporate mission, they should develop a PC lifecycle strategy that encompasses the key organizational needs of systems management, end-user productivity, business innovation and data-centric security. Read this Dell whitepaper to learn more about the findings of a recent Forrester Consulting study, “Digital Transformers Innovate, Digital Controllers Optimize”. This paper will help clarify the PC lifecycle continuum, from the basics of control to the advanced levels of transformation, so you will be better equipped to determine the needs of your organization on that spectrum.
Tags : 
    
Dell
Published By: Red Hat     Published Date: Jan 01, 2013
Traditional security measures such as network firewalls are no longer enough to keep an enterprise secure. With Red Hat Enterprise Linux, security mechanisms are incorporated and applied at the core of every solution, and security is extended to include all the open source packages that make up Red Hat Enterprise Linux. As a result, customers experience a higher quality of service.
Tags : 
red hat, security systems, server operating system, next-generation datacenters, enterprise linux, security innovation, evade network defenses, dynamic datacenters, virtualization technologies, cloud computing practices
    
Red Hat
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.