Skip to main content
 

response

Results 176 - 200 of 538Sort Results By: Published Date | Title | Company Name
Published By: IBM     Published Date: Jun 25, 2018
Recognizing the shift to a subscription business model required real-time customer support, Autodesk turned to IBM technology to enhance its customer experience. Using Watson Assistant, Autodesk developed a virtual agent to interact with customers, applying natural language processing (NLP) and deep learning techniques to recognize and extract the intent, context and meaning behind inquiries. Quickly resolving easy customer concerns, Watson Assistant is supporting 100,000 conversations per month, with response times 99% faster than before and leading to a 10-point increase in customer satisfaction levels for Autodesk. Find out how Watson Assistant can accelerate your customer support experience. Click here to find out more about how embedding IBM technologies can accelerate your solutions’ time to market.
Tags : 
    
IBM
Published By: Blue Coat     Published Date: Nov 23, 2015
It’s time for Proactive Incident Response: *Full logs in the SIEM, plus complete collection of packet data *Packet data indexed, easily searchable and correlated with threat intelligence and other data. Working with multiple sources of security data, threats are detected early.
Tags : 
    
Blue Coat
Published By: LogMeIn     Published Date: Jun 13, 2012
Live chat implementation can simultaneously help your business cut support costs and boost online conversions. If you've started investigating solutions then you also know there are a confusing number of choices available. This helpful guide features the responses to ten key questions that will help you identify the right product for your business.
Tags : 
live chat, customer service, online, bold chat, customer support, online support
    
LogMeIn
Published By: Citrix     Published Date: Jun 15, 2018
To meet the growing challenges of a competitive world economy, a digital transformation is taking place in the enterprise. Organizations realize that to be competitive they need to be more agile. They need to reach their customers wherever they are, and they need to be able to scale their applications to meet customer demands. To meet these challenges, organizations are deploying new microservice applications that are changing the application delivery environment. These applications are agile, configured to enable new features to be added without disrupting applications in production, and designed to automatically instantiate instances in response to increasing user demand. In short, microservices are drastically changing the way that applications are deployed and managed. This introduces a high level of complexity to network infrastructures because traditional applications are not going away. Applications will continue to be designed for both microservices and traditional 3-tier imple
Tags : 
    
Citrix
Published By: MessageLabs     Published Date: Sep 25, 2008
The Internet has proven to be a vital communications medium for worldwide commerce, but as an open and unprotected global network it can also present a wide range of threats that can cripple any business organization. Several years ago, most Internet threats were relatively benign examples of a young adolescent’s technical expertise but over time they have evolved into increasingly sophisticated domestic and foreign attacks that are designed to capture financial, personal, or strategic business information. Threats now come in the form of deliberately malicious acts, and exploitative opportunities for hackers and/or organized crime. The impact is serious, and the landscape of victims is getting broader every day. In response, no organization can afford to have its networks remain unprotected.
Tags : 
messagelabs, online threats, security, small & medium businesses, email spam, viruses, trojan horses, worms, phishing attacks, spyware, adware, honeypots, sandboxing, the wildlist
    
MessageLabs
Published By: Progress Software     Published Date: May 27, 2010
Financial services firms can achieve a higher level of operational responsiveness with the seamlessly integrated and customizable responsive process management (RPM) solution from Progress Software. Monitor, control and improve your business in real time with this suite of tools designed to help financial services firms deliver a higher level of business performance while sensing and responding in real time to changing conditions and business events. Easily integrated into your exiting IT environment, the Progress RPM solution allows financial services firms to gain real competitive advantage. Download the white paper now!
Tags : 
responsive process management, operational responsiveness, financial services, securities, trading operations, loan approval, capital markets, derivatives trading, insurance, business transaction management, business process management, complex event processing
    
Progress Software
Published By: Facebook     Published Date: Mar 07, 2012
This report provides early insights from Nielsen's BrandLift product which analyzed survey data from more than 800,000 Facebook users in response to more than 125 Facebook ad campaigns from 70 brand advertisers.
Tags : 
marketing, social media, emerging marketing, internet marketing, digital marketing
    
Facebook
Published By: WatchGuard     Published Date: Oct 16, 2012
The importance of effective security for businesses can't be understated and effective IT policies must be made. With this overwhelming amount of data in your hands, how do you ensure proper network defense and actionable incident responses?
Tags : 
watchguard, it policy, data management, aup, risk, data security
    
WatchGuard
Published By: AppNeta     Published Date: Oct 28, 2013
This article explores a new approach to assuring web-based application performance and the three key capabilities you need to ensure exceptional application delivery and end-user experience.
Tags : 
appneta, web application performance, web applications, application performance, deployment, latency, end user experience, response time, web performance optimization, delivery chain, network performance, apm, full stack, rum, stm, real user monitoring, synthetic transaction monitoring
    
AppNeta
Published By: Emulex Corporation     Published Date: Nov 07, 2013
Organizations don’t know what’s going on inside their networks, and that’s costing them real money. Deploying an intelligent recording fabric with guaranteed 100% packet capture, accuracy, and storage is fundamental to solving the problem. But how do you embrace the new paradigm? To get started, create a list of the system criteria that are mandatory to delivering reliable and complete visibility information to your engineers, so you can be sure their decision-making is on target. The impact of network performance problems on worker productivity has become a serious business risk. To mitigate it, organizations need to strategically embrace a network recording infrastructure that provides them with accurate, network-wide visibility. Only accurate visibility will empower them to slash maximum and mean response and repair times and keep network-reliant business applications and processes running. Download this Whitepaper for more information.
Tags : 
network monitoring, network visibility, technology, endace, best practices
    
Emulex Corporation
Published By: Emulex Corporation     Published Date: Nov 07, 2013
The status quo in network monitoring is no longer adequate for large organizations. It’s simply taking too long for enterprises with mission-critical networks to resolve and find the root causes of network incidents. To speed things up, enterprises must add dedicated incident response and root cause analysis capabilities that are 100% accurate and reliable to their network management arsenals. It takes so long to diagnose, fix, and eradicate network incidents that network uptime and performance are suffering. Because of this, organizations need to embrace incident response and root cause analysis capabilities to accelerate resolution times and avoid the network downtime and service degradation that can cost them thousands, if not millions, of dollars per minute. Download this Whitepaper for more information.
Tags : 
network monitoring, network visibility, technology, endace, best practices
    
Emulex Corporation
Published By: FireEye     Published Date: Mar 05, 2014
Whether they work for an up-and-coming startup or an industry giant, security response teams are under siege as never before. Today's cyber attacks are sophisticated, relentless, and devastating, costing U.S. businesses $8.9 million a year each on average. Attacking in multiple stages across multiple vectors, advanced persistent threats (APTs) and other sophisticated attacks easily evade signature-based detection and other traditional defenses. Thiswhite paper describes: The 10 most common mistakes, strategic and technical, that incident response teams make; The effect of these mistakes and how to avoid them with a well-defined incident response plan.
Tags : 
fireeye, persistent threats, advanced attacks, multi-vector, multi-stage nature, combatting advanced attacks, cohesive threat vectors, correlated threat vectors, real-time security, malicious code installs, block callbacks, threat intelligence, malware forensics, cyber warfare
    
FireEye
Published By: FireEye     Published Date: Mar 05, 2014
From sophisticated new forms of malware to nation-state sponsored attacks and the advanced persistent threat, cybersecurity incidents have evolved at a rapid pace and are taking down entire networks, successfully stealing sensitive data and costing organizations millions to remediate. In this white paper this report, you'll receive a comprehensive overview of survey results and expert analysis on: The top security threats for global organizations in 2013; The largest gaps in organization's detection and response to threats; How these gaps will be filled in the coming year - new staff, tools or services; What organizations must do to stay ahead of these advanced threats.
Tags : 
fireeye, persistent threats, advanced attacks, multi-vector, multi-stage nature, combatting advanced attacks, cohesive threat vectors, correlated threat vectors, real-time security, malicious code installs, block callbacks, threat intelligence, malware forensics, cyber warfare
    
FireEye
Published By: CEB     Published Date: May 19, 2014
This document helps general counsel identify potential information technology issues that may create legal or regulatory risks. General counsel should use the ten questions and our guidance on what to listen for in the CIO's response to pressure test the company's IT management and security controls.
Tags : 
ceb, cio, information risk, it management, security controls, general counsel, regulatory risks
    
CEB
Published By: Epicor     Published Date: Aug 01, 2017
Like many manufacturers, your shop floor operations may be challenged with inefficient standard processes, unpredictable downtime, and difficulties with machinery maintenance. A manufacturing execution system (MES) can help make the most of your shop floor’s capabilities, with tools that can identify under-performing and high-performance machines, and then optimize asset utilization accordingly. Engineers can design, refine, and implement better work processes, and operations professionals can improve preventive maintenance and response times. The result is less downtime, less scrap, more productivity, and lower cost. With the real-time information of an MES, you can transform the shop floor into an important contributor that drives the strategic direction of your business, differentiates your brand, and positions your company as a market leader.
Tags : 
enterprise resource planning (erp), manufacturing execution system (mes), manufacturing, mattec mes
    
Epicor
Published By: Epicor     Published Date: Jan 08, 2018
Like many manufacturers, your shop floor operations may be challenged with inefficient standard processes, unpredictable downtime, and difficulties with machinery maintenance. A manufacturing execution system (MES) can help make the most of your shop floor’s capabilities, with tools that can identify under-performing and high-performance machines, and then optimize asset utilization accordingly. Engineers can design, refine, and implement better work processes, and operations professionals can improve preventive maintenance and response times. The result is less downtime, less scrap, more productivity, and lower cost. With the real-time information of an MES, you can transform the shop floor into an important contributor that drives the strategic direction of your business, differentiates your brand, and positions your company as a market leader.
Tags : 
enterprise resource planning (erp), manufacturing execution system (mes), manufacturing, mattec mes
    
Epicor
Published By: CA Technologies     Published Date: Feb 13, 2015
You’re facing increasing global competition. And changing business models, such as lower-cost cloud options, enable more competitors to join the fray faster than ever. Your response? Consistently select the right projects and bring in-demand products and services to market quickly. But the evidence often tells a different story.
Tags : 
strategic planning, cloud options, global competition, in-demand products, in-demand products
    
CA Technologies
Published By: Forrester Research     Published Date: Apr 27, 2015
Download the report to learn how to prepare an Incident Response Plan that ensures your business recovers quickly and effectively.
Tags : 
security, vulnerability management, analytics, threat prevention, cyber attacks
    
Forrester Research
Published By: Gild     Published Date: Jun 10, 2015
Increase response rates, build relationships, and restore trust with candidates.
Tags : 
mass communications, recruiting email, candidates, response rates, relationship building, restore trust
    
Gild
Published By: Resilient Systems, Inc.     Published Date: Nov 24, 2015
It’s practically impossible to be completely prepared for a security incident – invariably something happens that best laid plans don’t address. But that doesn’t mean organizations shouldn’t try.
Tags : 
resilient systems, cyber security, incident response, plan, guide
    
Resilient Systems, Inc.
Published By: Resilient Systems, Inc.     Published Date: Nov 24, 2015
Maintaining a discipline of strong cybersecurity has become increasingly difficult at enterprise organizations.
Tags : 
resilient systems, incident response, platform, cybersecurity
    
Resilient Systems, Inc.
Published By: Resilient Systems, Inc.     Published Date: Nov 25, 2015
How does your business’s cyber resilience compare to other European organisations?
Tags : 
resilient, incident response, enterprise, security, enterprise applications
    
Resilient Systems, Inc.
Published By: Oracle     Published Date: Feb 21, 2018
Over the last decade we have seen the dramatic increase in adoption of Mobile as an engagement channel for consumers and employees within the enterprise. What we are seeing now is the emergence of messaging through channels like FB Messenger, WhatsApp, WeChat, Slack, SMS, as a dominant engagement channel. Over 4.1 Billion users around the world are on instant messaging apps, adopted a rate that was much faster than on social networks. What makes these channels the default choice is the expected instant response if the other person is on or the push notification that triggers the person on the other side to respond immediately. These users that use instant messaging channels to converse with their friends and family want to use the same familiar user experience and channel to instantly communicate with the enterprise. These channels are doing to apps what browsers did to client server apps i.e. these channels are rapidly becoming the next browser. This is leading to the innovations in c
Tags : 
    
Oracle
Published By: Oracle     Published Date: Feb 21, 2018
A basic chatbot isn’t that hard to build. In JavaScript, write a public REST endpoint to connect a Facebook page to some chat logic (botly is a popular option) and deploy the whole thing to run on a cloud platform. Zoom out to the bigger picture, though, and you see that Facebook is just one channel. If you use Skype, Slack, Kik, and digital voice assistants, you’ll have to build six or eight of these endpoints straight away. And chatbots are being asked to handle ever more complex responses, so you better build on a platform of machine learning and natural language processing to keep up. That’s why the question enterprise developers should be asking is not “Which chatbot service do I start with?” but “Which platform will let me crank out a chatbot today and also support multiple channels and integrate with back-end systems as these chatbots take off?”
Tags : 
    
Oracle
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.