Skip to main content
 

sam

Results 176 - 200 of 1113Sort Results By: Published Date | Title | Company Name
Published By: ThreatMetrix.     Published Date: Jan 30, 2009
This white paper highlights a surprising new approach to fraud prevention: remotely recognizing a fraudster’s PC (or other device). Even with identity (password/credit card) theft, the device stays the same!
Tags : 
threatmetrix, online fraudsters, identity thieves, fraud prevention, device intelligence
    
ThreatMetrix.
Published By: Bluecore     Published Date: Sep 27, 2018
Review a sampling of behavioral and catalog triggers as well as personalized batch sends used by a variety of retailers during the holiday season.
Tags : 
bluecore, email marketing, holiday shopping, holiday season
    
Bluecore
Published By: Bluecore     Published Date: Dec 14, 2018
A sampling of marketing campaigns launched by our retail customers that showcase the variety of ways you can engage consumers to create a truly relevant shopping experience.
Tags : 
    
Bluecore
Published By: NCM Fathom     Published Date: Feb 23, 2010
The same elements of powerful storytelling that captivate us in our everyday lives can benefit companies and their brands. NCM Fathom's white paper explores how businesses can tell their story to engage audiences, build brand preference and loyalty and deliver results that meet objectives. Bold companies like Kleenex and Siemens have shared their brand's story with customers and employees in cinemas nationwide. Download the white paper to learn more.
Tags : 
ncm, fathom, revenue, branding, advertising, ad management, digital cinema network
    
NCM Fathom
Published By: Ecessa Corporation     Published Date: Mar 11, 2009
Today’s Wide Area Networks (WANs) are experiencing increased saturation with the deployment of bandwidth-intensive applications, increased numbers of users, and the need for reliable security transmissions. IT personnel responsible for these issues acknowledge the increased congestion and have strived to maintain high levels of network performance. At the same time, IT departments are tasked with the job of lowering the cost of network infrastructure and ongoing operations. Network administrators continually face the challenge of balancing the increased use of critical applications on the Internet, while eliminating downtime and congestion from affecting user quality and day-to-day business operations.
Tags : 
adsl load balancing, vpn load balancing and redundancy, bandwidth aggregation, qos, bandwidth control, bandwidth management, multi-homing, bgp multihoming, broadband bonding, broadband failover, disaster recovery, business continuity, wan load balancing, wan failover, dsl failover, dsl load balancing, disaster recovery solutions, dual wan router, wan failover, isp failover
    
Ecessa Corporation
Published By: Intralinks     Published Date: Oct 30, 2014
While file sharing proliferates in the enterprise environment, the unsecure and unsanctioned deployment of file sharing technologies poses significant risk to organizations. Extensive new research conducted by Ponemon Institute in North America and Europe, sponsored by Intralinks, reveals that individuals are behaving badly, organizations are addressing the challenges inadequately, and IT professionals feel a loss of control. Here is just a sample of the results: Half of all respondents lack the confidence to deal with risky file sharing practices 62% of respondents accidently sent files to unauthorized individuals outside the organization 70% of organizations do not conduct regular audits to determine if file sharing activities are in compliance with regulations Download this research report now to find out: The extent of the risk associated with unsecure file sharing The individual behaviors driving and organizational responses to information lossThe key considerations for secur
Tags : 
file sharing, enterprise environment, fire sharing technologies, risk to organizations, compliance with regulations
    
Intralinks
Published By: Intralinks     Published Date: Apr 13, 2015
While file sharing proliferates in the enterprise environment, the unsecure and unsanctioned deployment of file sharing technologies poses significant risk to organizations. Extensive new research conducted by Ponemon Institute in North America and Europe, sponsored by Intralinks, reveals that individuals are behaving badly, organizations are addressing the challenges inadequately, and IT professionals feel a loss of control. Here is just a sample of the results: • Half of all respondents lack the confidence to deal with risky file sharing practices • 62% of respondents accidently sent files to unauthorized individuals outside the organization • 70% of organizations do not conduct regular audits to determine if file sharing activities are in compliance with regulations Download this research report now to find out: • The extent of the risk associated with unsecure file sharing • The individual behaviors driving and organizational responses to information loss
Tags : 
    
Intralinks
Published By: Samsung     Published Date: Dec 18, 2015
This eBook provides a few samples of mobile technology in retail so you can find just the right fit.
Tags : 
    
Samsung
Published By: IBM     Published Date: Sep 18, 2008
When bound to regulation and compliance, process manufacturers find opportunities to grow through enterprise resource planning (ERP). However, 50% of process manufacturers execute non-integrated ERP strategies. This Aberdeen Group research study reveals best practices to help you adapt or select an ERP vendor that improves your business performance.
Tags : 
erp, enterprise resource planning, cindy jutras, process, process industry, chemical, food and beverage, food, beverage, pharmaceutical, pharma, best-in-class, material requirements planning, mrp, global competition, manufacturing process, microsoft dynamics, acsis, fullscope, traceability
    
IBM
Published By: Prevero     Published Date: Feb 23, 2018
In vielen Unternehmen werden Planung und Budgetierung nach wie vor im ERP-System oder im Tabellenkalkulationsprogramm durchgeführt. Der Planungsprozess dauert meistens mehrere Monate: Startend beim Strategieprozess werden zentral Planungsmappen erstellt und an die Fachbereiche versendet. Die Controlling- Abteilung sammelt die Daten und verdichtet sie zu einem ersten Planungsstand. Zahlreiche Planungsrunden folgen.
Tags : 
budgetplanung, volatilen, zeiten, meistern
    
Prevero
Published By: IBM     Published Date: Oct 21, 2016
Between the Internet of Things, customer experience and loyalty programs, social network monitoring, connected enterprise systems and other information sources, today's organizations have access to more data than they ever had before-and frankly, more than they may know what to do with. The challenge is to not just understand that data, but actualize it and use it to recognize real business value. This ebook will walk you through a sample scenario with Albert, a data scientist who wants to put text analytics to work by using the Word2vec algorithm and other data science tools.
Tags : 
ibm, analytics, aps, aps data, open data science, data science, word2vec
    
IBM
Published By: Domino Data Lab     Published Date: Feb 08, 2019
As organizations increasingly strive to become model-driven, they recognize the necessity of a data science platform. According to a recent survey report “Key Factors on the Journey to Become Model-Driven”, 86% of model-driven companies differentiate themselves by using a data science platform. And yet the question of whether to build or buy still remains. This paper presents a framework to facilitate the decision process, and considers the four-year projection of total costs for both approaches in a sample scenario. Read this whitepaper to understand three major factors in your decision process: Total cost of ownership - Internal build costs often run into the tens of millions Opportunity costs - Distraction from your core competency Risk factors - Missed deadlines and delayed time to market
Tags : 
    
Domino Data Lab
Published By: Esker     Published Date: Jun 29, 2017
When folks in AR hear the word automation, it doesn't necessarily bring to mind the most positive, reassuring thoughts. Change is never a seamless process but distinguishing fact from fiction can go a long way. Every AR department has the same goals - reduce operating costs, collect payments faster and strengthen their relationships with customers - AR automation is simply a tool to help accomplish them. Learn why AR automation shouldn't be scary and why it matters more than ever in this insightful white paper.
Tags : 
accounts receivable management, invoice management, collections management, ar best practices, invoice portal, invoice delivery
    
Esker
Published By: Infosys     Published Date: May 30, 2018
Enterprises often accord the lowest priority for modernizing systems running business-critical applications, for fear of disruption of business as well as the time it would take for the new system to stabilize and come up to speed. A large telecom company had the same fears when they decided to modernize the reporting data warehouse which produced reports critical for making business decisions. See how Infosys helped and the five key takeaways from the project.
Tags : 
data, fortress, modernize, business, applications, telecom
    
Infosys
Published By: Infosys     Published Date: Jun 12, 2018
Enterprises often accord the lowest priority for modernizing systems running business-critical applications, for fear of disruption of business as well as the time it would take for the new system to stabilize and come up to speed. A large telecom company had the same fears when they decided to modernize the reporting data warehouse which produced reports critical for making business decisions. See how Infosys helped and the five key takeaways from the project.
Tags : 
data, fortress, modernize, business, applications, telecom
    
Infosys
Published By: Juniper Networks     Published Date: Aug 10, 2017
The digital economy is transforming the financial services sector. The pace of innovation is accelerating, customers have higher expectations than ever, and new competitors are emerging from nontraditional markets. At the same time, financial services has long been a favorite target of cyber attackers, and despite firms’ best efforts, cybersecurity threats are rising and attacks are more successful than ever. Financial services firms need a more effective, adaptable approach to detecting and stopping cyberthreats.
Tags : 
account security, data management, network security, secure systems, application security, network performance, network diagnostics
    
Juniper Networks
Published By: Workday Netherlands     Published Date: Feb 04, 2019
Ontdek de strategieën die bedrijven gebruiken om veranderingen de baas te blijven. Lees het door Workday gesponsorde Harvard Business Review Analytic Services-rapport. Leer hoe organisaties één cloud-based systeem voor finance en HR gebruiken om beslissingen te nemen op basis van data, samenwerking tussen C-level executives te ondersteunen en planningsmethoden met meer inzicht, nauwkeurigheid en snelheid te bieden.
Tags : 
financiën, workforce-technologie, digitale strategie
    
Workday Netherlands
Published By: Samsung     Published Date: Dec 18, 2015
This paper evaluates the impact of mobility for banks and examines the key steps to deploy mobile-first bank branches that enhance customer experience and streamline branch operations.
Tags : 
    
Samsung
Published By: CA Virtualization/Automation     Published Date: Dec 22, 2010
This whitepaper: Describes a 4-stage virtualization maturity lifecycle experienced by many organizations and discusses in detail (using sample project plans) the tasks and capabilities required to succeed at each stage of the maturity lifecycle.
Tags : 
virtualization, virtual, virtualisation, agility, capex, opex, vmware, hypervisor, gartner, forrester, idc, analyst, server consolidation, private, hybrid, cloud, clouds, datacenter, datacenters, ca technologies
    
CA Virtualization/Automation
Published By: CA Technologies     Published Date: Sep 25, 2017
Today’s markets move with incredible speed. You’re bombarded with new competitive threats every day— new companies, new products, and new technologies. At the same time, opportunities are opening up like never before, all demanding sophisticated evaluations and quick decisions. To varying degrees, your competitors may already be adopting agile, and their resulting ability to sense, create and adapt to change may soon leave you at a competitive disadvantage. Your organization can’t afford to be in reactionary mode any longer. You need the ability to anticipate change—and to embrace and capitalize on it quickly and with confidence.
Tags : 
organization, customer focused approach, technology, enterprise, integrations, ca technologies
    
CA Technologies
Published By: webMethods     Published Date: Aug 21, 2009
Business integration is becoming increasingly important for many companies, with the need to streamline processes for efficiency and productivity while at the same time leveraging years of IT investments and becoming a more agile business that can move swiftly to exploit market opportunities and beat competition.
Tags : 
business integration, integration, return on investment, roi, business process management, bpm, business process automation, bpa, competitive, web methods, webmethods
    
webMethods
Published By: HPE Intel     Published Date: Jan 11, 2016
A famous architect once said that the origin of architecture was defined by the first time “two bricks were put together well.” And the more bricks you have, the more important putting them together well becomes. The same holds true in our data centers. The architecture of our compute, storage and network devices has always been important, but as the demands on our IT infrastructures grow, and we add more “bricks,” the architecture becomes more critical.
Tags : 
    
HPE Intel
Published By: Cisco     Published Date: Jan 29, 2009
Small business telephone systems are available in a variety of configurations, offering an ever-growing range of features and benefits. The most advanced small business telephone systems today run on Internet Protocol (IP) networks—the same network many small businesses use to connect employees, devices and information resources.
Tags : 
cisco, small business phone systems, ip networks, internet protocol, videoconferencing, unified messaging, mobile softphones, automated attendant, paging and intercom, crm
    
Cisco
Published By: VMware AirWatch     Published Date: Nov 12, 2015
In this paper, we discuss why a bring-your-own-device (BYOD) approach to workforce mobility can be a compromise-free approach, and then how the combined capabilities of Samsung KNOX and Enterprise Mobility Management from AirWatch by VMware turn this compromise-free approach into reality.
Tags : 
vmware, byod, workspace mobility, airwatch
    
VMware AirWatch
Published By: VMware AirWatch     Published Date: May 18, 2016
In this paper, we discuss why a bring-your-own-device (BYOD) approach to workforce mobility can be a compromise-free approach, and then how the combined capabilities of Samsung KNOX and Enterprise Mobility Management from AirWatch by VMware turn this compromise-free approach into reality.
Tags : 
mobile management, mobile devices, enterprise management, information technology, best practices, business optimization
    
VMware AirWatch
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.