Skip to main content
 

live event

Results 51 - 75 of 123Sort Results By: Published Date | Title | Company Name
Published By: CA Technologies     Published Date: Apr 06, 2017
Privileged identity, accounts and credentials are core, critical assets for enterprises that must be highly protected through a combination of technology and processes which are enabled by privileged access management. Delivering that protection is instrumental in breaking the data breach kill chain, helping to prevent attacks and mitigating the impact of those that do occur.
Tags : 
data breach, it security, malicious spyware, security management, cloud security, system protection
    
CA Technologies
Published By: Akamai     Published Date: Mar 08, 2017
Akamai has delivered the world’s largest and most viewed live events for nearly 15 years. Leveraging this experience, Akamai’s Media Services Live solution helps simplify the live streaming experience for content producers without sacrificing streaming quality, format coverage or content security. Read on to find out more.
Tags : 
video, streaming, media services live, content, live streaming
    
Akamai
Published By: Oracle_Hospitality F&B     Published Date: Feb 13, 2017
To be successful, a loyalty program must deliver value to the guest and it must deliver value to a restaurant operator’s business. To help food and beverage operators understand what guests are seeking in a loyalty program, Oracle Hospitality conducted a global consumer survey. On the following pages, you will find the answers to these questions and more: • What rewards do guests most value in a restaurant loyalty program? • Do they prefer paper stamp cards? Mobile apps? Plastic swipe cards? • What prevents them from joining a loyalty program? • Why do they leave a loyalty program or stop using it? • What’s their favorite restaurant loyalty program?
Tags : 
    
Oracle_Hospitality F&B
Published By: Marketo     Published Date: Feb 07, 2017
Read this complimentary copy of the SiriusView: Marketing Automation Platforms 2017 and learn more about Marketo’s key differentiators including its native multi-channel experience, live event management, and content recommendation functionalities. Marketo's powerful marketing automation capabilities and seamless CRM integrations are complemented by our LaunchPoint ecosystem featuring over 500 technology and service providers that offer best-of-breed solutions for today’s marketers. The full report includes: Market evaluation and analysis of 9 marketing automation platform vendors Insights for selecting a vendor based on your organization's requirements Opportunities and challenges faced when deploying marketing automation platforms Download the report to learn about these topics and more.
Tags : 
marketo, mult-channel, native, live event management, content, marketing automation, launchpoint
    
Marketo
Published By: IBM     Published Date: Jan 26, 2017
This whitepaper talks about how organized criminals and lone fraudsters are continuously adapting to the ever-changing world we live in. Through IBM solutions for insurance fraud prevention, both enterprise and industry-wide financial institutions can prevent future fraud.
Tags : 
ibm, analytics, insurance fraud, insurance, organized crime
    
IBM
Published By: ServiceNow     Published Date: Jan 17, 2017
Provide better IT service delivery, more consistently, and with less effort This eBook, “Define Your Services for Fast and Accurate Service Delivery,“ shows you: A simple plan for defining and managing your services and building your single system of record in a CMDB Best practices for incident, change, problem and asset management, reporting, and more How to prevent unexpected downtime creating a comprehensive, connected view of business services and IT Infrastructure
Tags : 
it management, it automation, it ticketing, help desk, service desk, itsm, it service management, management, service, infrastructure
    
ServiceNow
Published By: Viavi Solutions     Published Date: Jan 04, 2017
The right Network Performance Monitoring and Diagnostics (NPMD) solution can help IT operations deliver superior performance for users. When incorporated into your IT security initiatives, deep packet inspection can strengthen your existing antivirus software, Intrusion Detection System (IDS), and Data Loss Prevention (DLP) defenses.
Tags : 
    
Viavi Solutions
Published By: Mimecast     Published Date: Jan 03, 2017
Mimecast has detected and blocked a dangerous new campaign that uses social engineering and advanced sandbox evasion techniques to deliver stealthy malware. This Email Security Advisory from Mimecast offers: - Detailed attack analysis - Mimecast viewpoint - reduce sandbox reliance - Weaponized attachments - prevention and recommendations
Tags : 
mimecast, security, email security, email, cyber security, malware
    
Mimecast
Published By: MuleSoft     Published Date: Sep 08, 2016
Many enterprises recognize the opportunities of APIs, determine that they need one, then work to quickly deliver one to market. However, without a well thought-out strategy and clearly defined roadmap, most of these APIs are brought to market with critical issues that prevent them from delivering expected business results.
Tags : 
    
MuleSoft
Published By: Limelight Platform     Published Date: Sep 06, 2016
This guide will allow you to prove and improve ROI/ROO, assist in defining KPIs and showcase how to best leverage digital in today’s changing experiential marketing landscape.
Tags : 
live marketing software, live lead generation, event marketing analytics, experiential marketing analytics, limelight marketing, experiential marketing software, experiential marketing, promotional events, live marketing, event marketing software, roi, roo, kpi, return on investment, analytics, data, consumer insight, events, experiences, onsite
    
Limelight Platform
Published By: SAS     Published Date: Aug 03, 2016
Financial institutions (FIs) must support the channels and services that consumers demand in order to remain competitive with each other and with disruptive competitors. To that end, supporting account opening, delivering new transactional features, and facilitating payments through digital channels have become table stakes. Unfortunately, the speed and convenience that these capabilities afford is a benefit to consumers and fraudsters alike. To successfully prevent fraud while retaining the benefits of offering digital financial services, FIs must understand how fraudsters are exploiting these capabilities and fight fraud with customer experience in mind.
Tags : 
finance, best practices, digital channels, demand, financial services, fraud, customer experience
    
SAS
Published By: IBM     Published Date: Jul 27, 2016
IBM's i2 Analyst’s Notebook offers a wide range of analysis and visualization capabilities that can aid in the identification of key actionable intelligence. Download this IBM White Paper to discover and deliver actionable intelligence to help identify, predict and prevent criminal, terrorist, and fraudulent activities with IBM i2 Analyst's Notebook.
Tags : 
ibm, cyber threat analysis, ibm i2 analyst notebook, analyst, cyber security, business intelligence
    
IBM
Published By: IBM     Published Date: Jul 19, 2016
This video demonstrates how IBM’s Behavior Based Customer Insight for Banking leverages predictive analytics to help you personalize customer engagement and deliver customized actions. The solution leverages advanced predictive models to analyze customer transactions and spending behavior to more deeply understand customer needs and propensities, anticipate life events, and help provide a unique customer experience.
Tags : 
ibm, banking, finance, consumer insights, business intelligence, business anlytics
    
IBM
Published By: IBM     Published Date: Jul 14, 2016
From its beginnings in the early 1990s to its present state, enterprise risk management (ERM) has experienced a significant transformation. Over the past three decades, ERM has evolved in response to a number of macroeconomic events, as well as multiple business and regulatory changes. We live in a new world that is now more volatile and uncertain than ever before. The speed of change and the velocity of risk have increased significantly. Download this white paper from ERM pioneer James Lam to learn how organizations can successfully evolve their ERM function. You'll explore the history of ERM and how events have shaped the current function in organizations, the next phase in its evolution of performance-based continuous ERM, and its seven key attributes.
Tags : 
risk management, best practices, evolution
    
IBM
Published By: IBM     Published Date: Jun 28, 2016
Software applications are the mainstay of modern business. Applications deliver business-critical services to customers and enable companies to function efficiently. To ensure performance and availability of their applications, companies must have full visibility and control of the applications and enabling infrastructure. If an outage or slowdown occurs, the company needs to know precisely where the problem originated, what caused it, and how to prevent it from occurring again.
Tags : 
software, data, best practices, productivity, applications
    
IBM
Published By: Mitel     Published Date: Jun 27, 2016
Join Mitel and industry experts on this webcast and learn how Mitel is helping SMBs deliver a seamless experience for their mobile customers through cloud. Topics to be covered in this event: • Why today’s technology fails to deliver the experience you want for your customers • What you should expect and receive from your cloud communication provider now and in the future • The impact of the mobile consumer on small and medium business customer engagement strategies • How consumer expectations have changed the workforce Moderator: Elliot Markowitz, Director, Content Marketing Services, Madison Logic
Tags : 
cloud, telephony, mobile consumer, customization, smbs, seamless experience
    
Mitel
Published By: Mitel     Published Date: Jun 27, 2016
Join Mitel and industry experts on this webcast and learn how Mitel is helping SMBs deliver a seamless experience for their mobile customers through cloud. Topics to be covered in this event: Why today’s technology fails to deliver the experience you want for your customers What you should expect and receive from your cloud communication provider now and in the future The impact of the mobile consumer on small and medium business customer engagement strategies How consumer expectations have changed the workforce
Tags : 
cloud, telephony, mobile consumer, customization, smbs, seamless experience
    
Mitel
Published By: Dynatrace     Published Date: May 20, 2016
For all Development Managers, Operations Managers and DevOps Managers, this eBook by DevOps advocate and author Gene Kim will clearly outline: - How leaders are 2.5x more likely to exceed profitability, market share and productivity goals through DevOps - Why your IT delivery model needs to be continuous and collaborative to meet demands for more features faster - Which Milestones to have in mind when plugging performance into the four pillars - culture, automation, measurement and sharing - How identifying bad patterns earlier in development prevents them from making it into production Start accelerating your own results; read this eBook now.
Tags : 
dynatrace, software development, devops, results, productivity, development
    
Dynatrace
Published By: Dynatrace     Published Date: May 20, 2016
The Art of DevOps: Embark on a mission to continuously deliver assets to the operational battlegrounds safely, securely, and quickly. This eBook gives you, a veteran of application development wars, recommendations that will put you at strategic advantage to win today's war: - Supplement manual tests with automated testing - Add advanced performance monitoring technology to your arsenal to prevent problems from infiltrating your code after check-in - Leverage best-in-class communications and advanced performance monitoring to quickly identify and prevent casualties resulting from poor performance
Tags : 
dynatrace, devops, software development, application development, testing
    
Dynatrace
Published By: CarbonBlack     Published Date: Apr 07, 2016
This in-depth report examines solution providers that deliver proactive next-generation endpoint security services (NGES) covering prevention, detection and response.
Tags : 
carbon black, ema, endpoint, security, prevention, vendor, detection, response
    
CarbonBlack
Published By: eDataSource     Published Date: Jun 15, 2015
Deliverability is the crucible of email marketing. Nothing good can happen when your email doesn’t even get to your customer’s inbox. eDataSource tracks and reports on deliverability with its Inbox metric, which nets out spam events against mailing quantity. eDataSource sees the full range of Inbox Placement performance, based on our visibility into the email activity of 53,000 brands and their customers engagement with those emails. Email marketers who’ve achieved Inbox Placement rates of at least 95% are thought to be doing pretty well. Still, we often see Inbox Placement rates in the 80s for overall brands, and in the 20s, or even less, for certain individual campaigns.
Tags : 
email marketing, emerging marketing, internet marketing
    
eDataSource
Published By: ServiceNow     Published Date: May 21, 2015
Today, enterprises are increasingly dependent on business services delivered by their IT organizations. These services underpin almost every business function, ranging from manufacturing and supply chain through to customer service and online sales. Because of their critical nature, business services need to be highly available and responsive – any disruption has a major financial and customer impact. Download this study to learn more about ServiceNow’s ServiceWatch and how it can help your organization prevent outages that could lead to: • Lost revenue • Lost employee productivity • Lost customers
Tags : 
servicenow, applications, databases, cloud, virtualization
    
ServiceNow
Published By: IBM     Published Date: Apr 09, 2015
Optimize the process of investigating and gathering evidence on attacks and data breaches with Network Forensics software. Learn how using full network packet capture data can deliver insight and analysis that cannot be achieved using only log source events and network flow details.
Tags : 
ibm, optimization, security, cyber crime, network security, it security
    
IBM
Published By: CDW     Published Date: Mar 31, 2015
The stadium has long been a communal gathering place. The excitement of a live event bonds fans and teams together, and technology can enhance that visceral connection as well as expand the in-stadium experience to the outside world. Download this infographic to see how the right technology - deployed effectively - can make a major difference.
Tags : 
networking, stadium wifi, wi-fi, technology, customer experience, wireless
    
CDW
Published By: Polycom     Published Date: Mar 13, 2015
Collaboration across the healthcare team has always been important. What’s different today? You can collaborate over video anywhere anytime to education, delivery care or get things done! Education, It’s a good thing, right? But education to prevent unnecessary re-hospitalizations is a great thing. Patients with chronic disease may find themselves in the hospital on Monday, released to go home a few days later, just to find themselves back in the Emergency room the following Monday creating an expensive cycle of declining health. Collaborative video education is breaking this cycle helping healthcare teams and patients better manage disease through community and home based education.
Tags : 
health problems, social care, readmission, hospital, video solutions, telehealth, improving costs, aging population, economic status
    
Polycom
Start   Previous    1 2 3 4 5    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.