Skip to main content
 

life

Results 301 - 325 of 1738Sort Results By: Published Date | Title | Company Name
Published By: Dell EMC & Intel     Published Date: Apr 13, 2018
A fundamental people-process-technology transformation enables businesses to remain competitive in today’s innovation economy. Initiatives such as advanced security, fraud detection services, connected consumer Internet of Things (IoT) devices, augmented or virtual reality experience, machine and deep learning, and cognitively enabled applications drive superior business outcomes such as predictive marketing and maintenance. Superior business outcomes require businesses to consider IT a core competency. For IT, an agile, elastic, and scalable IT infrastructure forms the crucial underpinning for a superior service delivery model. Dell EMC’s Intelligent Automation powered by Intel® Xeon® Platinum processor simplifies the management and maintenance of its PowerEdge server hardware. Designed to drive down the cost and resources associated with server lifecycle management, Intelligent Automation relies on integrated Dell Remote Access Controller(iDRAC) and OpenManage server management soft
Tags : 
    
Dell EMC & Intel
Published By: Dell EMC & Intel     Published Date: Apr 13, 2018
A new industrial revolution is barreling ahead, fueled by the Internet of Everything, social media, and cloud computing - bringing about fundamental changes in the way that we live and act. CIOs today are in a unique position to utilize technology to create business value and opportunity. This requires a careful balance of the traditional skills of the CIO, managing the data center infrastructure while driving business strategy and impacting the customer experience. The Dell EMC PowerEdge server powered by Intel® Xeon® Platinum processor systems are the CIO’s key tools in this transformation. They are the bedrock of the modern data center – providing scalable system architectures that ensures control of the IT lifecycle while delivering a cyber-resilient environment. Intel Inside®. New Possibilities Outside.
Tags : 
    
Dell EMC & Intel
Published By: Dell EMC & Intel     Published Date: Apr 13, 2018
Today’s businesses are rapidly transforming to prepare for the changes taking place in the global economy. Companies of all sizes can benefit from tools that automate the deployment and ongoing maintenance of server environments. Put another way, in today’s digital economy, where users need access to intelligible data faster, IT organizations must employ tools that automate the delivery of IT as a Service (ITaaS). Dell EMC’s Intelligent Automation powered by Intel® Xeon® Platinum processor simplifies the management and maintenance of its PowerEdge server hardware. Designed to drive down the cost and resources associated with server lifecycle management, Intelligent Automation relies on integrated Dell Remote Access Controller(iDRAC) and OpenManage server management software to deliver reliable and efficient automation to PowerEdge Servers. Intel Inside®. New Possibilities Outside.
Tags : 
    
Dell EMC & Intel
Published By: Bazaarvoice     Published Date: May 17, 2013
Learn how authentic customer feedback helps card issuers, online and retail banks, insurance companies, and credit unions drive sales, loyalty, and lifetime customer value - while remaining compliant with industry regulations.
Tags : 
customer acquisition, customer retention, customer innovation, compliance, financial service providers
    
Bazaarvoice
Published By: Senn Delaney     Published Date: Aug 21, 2008
Mergers and acquisitions are a fact of life in today's highly competitive global business environment. Unfortunately, up to one third of mergers fail within five years, and as many as 80 percent never live up to their full potential. A great deal of evidence indicates that the ultimate success of mergers and the amount of time it takes to get them on track is determined by how well the cultural aspects of the transition are managed.
Tags : 
senn delaney, mergers, acquisitions, sbc, at&t, customer focused, brand management, customer-centric, employee management, employee engagement
    
Senn Delaney
Published By: Okta     Published Date: Jul 01, 2015
Are you facing a classic username and password proliferation problem? See how National Geographic leveraged Okta to create policy around employee usernames and passwords, prevent rogue IT scenarios, and provide significant cost savings and end-user productivity benefits.
Tags : 
    
Okta
Published By: Okta     Published Date: Aug 24, 2015
Are you facing a classic username and password proliferation problem? See how National Geographic leveraged Okta to create policy around employee usernames and passwords, prevent rogue IT scenarios, and provide significant cost savings and end-user productivity benefits.
Tags : 
    
Okta
Published By: Reevoo     Published Date: Jan 13, 2012
It goes against every instinct, but displaying negative reviews on your website helps sales online and offline. And that's not all. Bad reviews can also increase customer loyalty and life-time value, provide unbeatable business insight and help you win back unhappy customers
Tags : 
reevoo, reviews, customer experience, customer satisfaction, marketing, business, customer loyalty, business insight, sales
    
Reevoo
Published By: LifeLock     Published Date: May 31, 2012
With LifeLock® identity theft protection as part of your employee benefits package, you can differentiate your company from your competition and better retain top employees.
Tags : 
    
LifeLock
Published By: LifeLock     Published Date: Jul 31, 2012
With LifeLock® identity theft protection as part of your employee benefits package, you can differentiate your company from your competition and better retain top employees.
Tags : 
lifelock, human resources, identity protection, benefits, solutions
    
LifeLock
Published By: Micro Focus     Published Date: Feb 24, 2015
With today’s ‘touch of a button’, always-on lifestyles, consumers expect information to be quickly accessible to customer-facing staff. They expect the same efficiency they get from their own phones or devices. Yet all too often business data is mired in outdated, slow systems and applications. These systems are difficult to work with, making each call or transaction slow to process as a result. This impacts customer satisfaction and reduces throughput. It affects productivity.
Tags : 
microfocus, rumba, customer service, real time web application, insurance quotes, business efficiency
    
Micro Focus
Published By: MobileIron     Published Date: Feb 05, 2016
To help you succeed on your mobile journey, this guide outlines essential best practices and recommendations across all four stages of the mobile app lifecycle: Design, Develop, Deploy, and Maintain. It’s ideal for organizations that are ready to move beyond enabling basic apps, such as email and calendar, on mobile devices. It also provides operational guidance for deploying and maintaining existing mobile apps.
Tags : 
mobile apps, best practices, mobiletron, phones
    
MobileIron
Published By: MobileIron     Published Date: May 23, 2016
Managing your device keeps getting more complex and your admins are juggling more complicated security and management tasks than ever before. Until now, you have needed many complex and disparate tools to secure and manage your devices. But now Windows 10 and MobileIron make your life much simpler by streaming many traditional PC management responsibilities.
Tags : 
security, mobile device, windows, best practices, streaming, device management
    
MobileIron
Published By: MobileIron     Published Date: May 23, 2016
Managing your devices keeps getting more complex and your admins are juggling more complicated security and management tasks than ever before. Until now, you have needed many complex and disparate tools to secure and manage your devices. But now Windows 10 and MobileIron makes your life much simpler and streamlines many traditional PC management responsibilities. 415
Tags : 
security, mobileiron, best practices, windows, device management
    
MobileIron
Published By: MobileIron     Published Date: Aug 04, 2016
To help you succeed on your mobile journey, this guide outlines essential best practices and recommendations across all four stages of the mobile app lifecycle: Design, Develop, Deploy, and Maintain. It’s ideal for organizations that are ready to move beyond enabling basic apps, such as email and calendar, on mobile devices. It also provides operational guidance for deploying and maintaining existing mobile apps.
Tags : 
mobile apps, best practices, mobiletron, phones
    
MobileIron
Published By: OutSystems     Published Date: Oct 12, 2015
This guide will help you grasp the vast and growing landscape of point solutions that exist to accelerate mobile app dev. A functional matrix will help you navigate the app lifecycle and better understand the challenges each tool addresses.
Tags : 
outsystems, mobile app, application development, app lifecycle, operating system
    
OutSystems
Published By: JBoss Developer     Published Date: Feb 05, 2016
As Oracle Java Composite Application Platform Suite (CAPS) nears the end of its life cycle, healthcare organizations are switching to Red Hat JBoss Fuse to prepare for future business needs. Red Hat JBoss Fuse represents existing use cases on a more flexible, standards-compliant platform. With over 100 different connectors, Red Hat JBoss Fuse offers extensive integration coverage to optimize data flow — both to internal users and to external healthcare partners — on-premise, on mobile devices, or in the cloud.
Tags : 
jboss, redhat, oracle, java, java composite application platform, fuse, integration, data optimization
    
JBoss Developer
Published By: Sitrion     Published Date: Feb 11, 2016
You know your smartphone has incredible power in your personal life. So why can’t you have that same power in your professional life? In a business context, the mobile industry is still in its infancy. Even with the consumerization of IT, enterprise mobility has a way to go to catch up to the robust productivity capabilities of the consumer world.
Tags : 
smartphone, productivity, business management, enterprise mobility
    
Sitrion
Published By: Microsoft     Published Date: Jul 07, 2016
Enable, protect, and manage mobile productivity Protecting email and other corporate data on mobile devices—without bogging down workers—is one of today’s biggest challenges faced by IT pros today. With the massive, global proliferation of mobile devices, it can be a struggle to manage and secure these devices and your data, both on approved enterprise applications and shadow IT. Download this free e-book to learn how to control the uncontrollable and create a solution that: • Enables continuous management, so your employees are more productive. • Offers threat protection, so you can detect abnormal user behavior, suspicious activities, known malicious attacks, and security issues right away. • Guards against data leakage. • Provides security after loss or theft of mobile devices. • Helps protect your Microsoft Office email, files, and apps.
Tags : 
mobile devices, enterprise, best practices, management
    
Microsoft
Published By: CA Technologies     Published Date: Aug 22, 2017
Organizations undergoing digital transformations are dealing with amplified concerns around risk and security, which isn’t surprising. Digital transformation initiatives inevitably result in more points of access to enterprise infrastructure that are outside of existing controls, accessible by a greater number and more diverse set of identities, and proliferated across a distributed and dynamic infrastructure.
Tags : 
    
CA Technologies
Published By: CA Technologies     Published Date: Aug 24, 2017
Every enterprise has a wide variety of IT requirements where integration is needed. The rapid proliferation and adoption of cloud and mobile technologies has accentuated the financial impact of these needs. In response, the integration space has matured to include feature-rich stacks from enterprise integration vendors that provide full, multi-layer platforms in the form of an Enterprise Service Bus (ESB) or SOA suite. But with these very broad capabilities comes complexity—multi-layer stacks can be difficult and costly to install, debug, administer and secure.
Tags : 
    
CA Technologies
Published By: Collective Health     Published Date: Nov 28, 2016
Collective Health offered a contemporary health benefits infrastructure that was able to use the data that’s surrounding us in the healthcare space and leverage it in a way that was new and exciting to us,” said Milt. Combining technology, design, and humans, Collective Health’s holistic approach brought Activision Blizzard’s benefits goals to life.
Tags : 
    
Collective Health
Published By: Juniper Networks     Published Date: Aug 10, 2017
Resistance to change is futile. Financial services are becoming more embedded in the banking customer’s everyday life, driving unprecedented levels of change across the industry. The unfolding digital economy is ushering a new era of technology adoption in banking. From cloud to open banking APIs, these play a defining role in enabling banks to create new digital products and services, refresh the bank branch, find new customer segments, and monetize underutilized data and information assets.
Tags : 
opening banking, api, data, currency, cloud transformation, frictionless banking, business model disruption
    
Juniper Networks
Published By: Google     Published Date: Apr 26, 2018
No one in today’s highly connected world is exempt from security threats like phishing, ransomware, or denial-of-service (DoS) attacks. Certainly not Google. Google operates seven services with more than one billion active users each (including Google Search, YouTube, Maps, and Gmail). We see every type of attack, bad software, and bad actors—multiple times a day—and we’re proud of what our people, processes, and technology do to stop them. Google has published more than 160 academic research papers on computer security, privacy, and abuse prevention and has privately warned other software companies of weaknesses discovered in their systems. Within Google, we enforce a zero-trust security model, which monitors every device on the internal network.
Tags : 
    
Google
Published By: CA Technologies EMEA     Published Date: Sep 07, 2018
Continuous testing is the practice of testing across every activity in the SDLC to uncover and fix unexpected behaviors as soon as they are injected. Continuous testing is the embedding of testing as a fundamental and ongoing aspect of every activity through the application lifecycle, from requirements through production, to ensure the business value is being achieved as expected. As the pace of business continues to quicken, companies are starting to recognize that to stay competitive the process of developing and releasing software needs to change. Release cadence has greatly accelerated. There is no occasion anymore for a six- to 18-month find-and-fix turnaround in which the customer will find the delay acceptable. Things need to move faster, and they need to be ready and perfect faster. Download this whitepaper to find out how CA Technologies can help with your Continuous Testing.
Tags : 
    
CA Technologies EMEA
Start   Previous    6 7 8 9 10 11 12 13 14 15 16 17 18 19 20    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.