Skip to main content
 

it changes

Results 301 - 325 of 606Sort Results By: Published Date | Title | Company Name
Published By: IBM     Published Date: Oct 22, 2013
Info-Tech Research Group Vendor Landscape reports recognize outstanding vendors in the technology marketplace. This report notes that "IBM offers a comprehensive suite of products aimed at testing the most demanding and complex apps." For more, download the report today.
Tags : 
ibm, info-tech, quality management, test champion report, microsoft, parasoft, software testing, vendor selection, market share, vendor landscape, infrastructure testing, future changes, development platform toolset, leveraging tool, testing functionality, product selection, vendor selection, information gathering, software testing solutions
    
IBM
Published By: Bazaarvoice     Published Date: Nov 05, 2014
It’s no longer enough to think of consumers as online vs. in-store. The mobile shopper is neither and both of these, becoming the norm rather than the exception. “7 Ways the Mobile Consumer Changes Everything” reveals new research.
Tags : 
bazaarvoice, mobile consumer, consumer changes, infographic, mobile use, social, mobile conversation, mobile shoppers, consumer feedback, change management
    
Bazaarvoice
Published By: Anaplan     Published Date: Aug 28, 2018
The findings of FSN’s Innovation in the Finance Function global survey prove insightful and compelling—and highlight the critical role that innovative planning technology plays in the field of finance. Organizations today are evolving their operating models in conjunction with rising globalization, the value of big data, technological advances, regulatory changes, and demographic shifts. They are also in pursuit of business growth with the same or—in some cases—fewer resources than before.
Tags : 
innovation, finance, function, global, study
    
Anaplan
Published By: Anaplan     Published Date: Sep 07, 2018
The findings of FSN’s Innovation in the Finance Function global survey prove insightful and compelling—and highlight the critical role that innovative planning technology plays in the field of finance. Organizations today are evolving their operating models in conjunction with rising globalization, the value of big data, technological advances, regulatory changes, and demographic shifts. They are also in pursuit of business growth with the same or—in some cases—fewer resources than before.
Tags : 
    
Anaplan
Published By: Anaplan     Published Date: Sep 07, 2018
The findings of FSN’s Innovation in the Finance Function global survey prove insightful and compelling—and highlight the critical role that innovative planning technology plays in the field of finance. Organizations today are evolving their operating models in conjunction with rising globalization, the value of big data, technological advances, regulatory changes, and demographic shifts. They are also in pursuit of business growth with the same or—in some cases—fewer resources than before.
Tags : 
    
Anaplan
Published By: Interactive Intelligence     Published Date: Sep 11, 2013
Contact centers have long played a vital role in the insurance industry. Prospects and customers use them to get product information and quotes and then submit applications. Insurance agents and advisors rely on contact centers to tap into expertise and handle business and technical issues. Policyholders and members make inquiries or changes to their policies, or conduct financial transactions. Claimants call in to report accidents and check on the status of their claims. The list could go on, but the meaning is clear. Contact centers are major contributors to many key parts of the insurance business, especially the parts that require direct interaction with customers or agents. As a result, contact centers now play a critical role in an insurer’s journey toward becoming more customer-centric.
Tags : 
interactive intelligence, contact centers, insurance industry, prospects, customers, product information, quotes, members, handling business
    
Interactive Intelligence
Published By: Two Sigma     Published Date: Sep 19, 2019
In this paper, we provide an overview of the Two Sigma Factor Lens, designed for analyzing multi-asset portfolios and derived from returns of broad, liquid asset class proxy indexes. This lens is intended to be: • Holistic, by capturing the large majority of cross-sectional and time-series risk for typical institutional portfolios; • Parsimonious, by using as few factors as possible; • Orthogonal, with each risk factor capturing a statistically uncorrelated risk across assets; • Actionable, such that desired changes to factor exposure can be readily translated into asset allocation changes. Finally, we discuss methods for constructing and assessing the Two Sigma Factor Lens that can be extended to produce additional risk factors for new sub-assetclasses or cross-sectional risks that may not currently be captured by the lens.1 This factor lens, and our ongoing work to expand it, form the foundations of the VennTM platform.
Tags : 
    
Two Sigma
Published By: Iovation     Published Date: Sep 25, 2009
Online businesses today face a daunting battle in combatting online fraud and abuse. Existing identity-based and credit risk scoring systems are being challenged by fraudsters and fraud rings. They capitalize on cheap identities they use to repeatedly target a business or industry. Using device identification to establish device reputations and expose repeat offenders and fraud rings changes everything.
Tags : 
software-as-a-service (saas) solution, device identification technology, discovery of hidden associations, fact-based fraud management, ip geolocation data, reputation sharing, audit logs, reputation trust rules, shared device reputation
    
Iovation
Published By: Juniper Networks     Published Date: May 04, 2018
The role of IT is changing from a traditional focus on cost-efficient enablement to a more strategic contribution. Total Cost of Ownership (TCO), while important, is being surpassed by a growing focus on automation and orchestration that is needed to fulfill enterprise demands for security, agility, and innovation. The cloud-grade enterprise network – spanning the campus, data center, and branch – must be able to respond to rapid changes in business, growing reliance on hybrid cloud architectures, and the needs of users and customers.
Tags : 
    
Juniper Networks
Published By: Juniper Networks     Published Date: Feb 05, 2018
The role of IT is changing from a traditional focus on cost-efficient enablement to a more strategic contribution. Total Cost of Ownership (TCO), while important, is being surpassed by a growing focus on automation and orchestration that is needed to fulfill enterprise demands for security, agility, and innovation. The cloud-grade enterprise network – spanning the campus, data center, and branch – must be able to respond to rapid changes in business, growing reliance on hybrid cloud architectures, and the needs of users and customers. This IP Networking Comparison Guide examines the four key areas driving enterprise network priorities and looks at key factors within each. This document will give you a clear perspective on how the various options stack up on the most important features and capabilities necessary to meet your transformation needs.
Tags : 
network, transformation, enterprise, optimization, juniper
    
Juniper Networks
Published By: HP and Intel® Xeon® processors     Published Date: Feb 07, 2012
This white paper discusses the opportunities that can be had with a cloud infrastructure and reveals the changes that need to be made to ensure a truly successful cloud infrastructure.
Tags : 
cloud, utility storage, foundation, cloud, enviornment, 3par, virtual, virtualization
    
HP and Intel® Xeon® processors
Published By: Group M_IBM Q1'18     Published Date: Dec 19, 2017
As organizations develop next-generation applications for the digital era, many are using cognitive computing ushered in by IBM Watson® technology. Cognitive applications can learn and react to customer preferences, and then use that information to support capabilities such as confidence-weighted outcomes with data transparency, systematic learning and natural language processing. To make the most of these next-generation applications, you need a next-generation database. It must handle a massive volume of data while delivering high performance to support real-time analytics. At the same time, it must provide data availability for demanding applications, scalability for growth and flexibility for responding to changes.
Tags : 
database, applications, data availability, cognitive applications
    
Group M_IBM Q1'18
Published By: ITinvolve     Published Date: Apr 16, 2013
Many IT organizations struggle to assign tickets to the right resources the first time, suffer outages and service degradations from IT changes, and have a backlog of recurring problems that continues to grow. Read this use case document to understand how social IT collaboration can breathe new life into your existing service desk or ITSM installation without the need to replace it.
Tags : 
it organizations, itinvolve, it changes, itsm installation, backlog, suffer outages
    
ITinvolve
Published By: DigiCert     Published Date: Aug 01, 2018
Website security changes are one of the only constants on the web today. By using the right certificates for your website and each webpage, you'll be prepared for any updates as they occur. The right certificate can make all the difference. Although all SSL certificates provide the same level of encryption, high-assurance certificates provide added layers of authentication to give users proof they can trust who you are—which elevates the trustworthiness of your entire site. Here’s how the certificates stack up. High-assurance OV or EV SSL on every page ensures users can easily identify your website as authentic, making it harder for phishing sites to mimic you and defraud your visitors.
Tags : 
    
DigiCert
Published By: DigiCert     Published Date: Aug 01, 2018
Website security changes are one of the only constants on the web today. By using the right certificates for your website and each webpage, you'll be prepared for any updates as they occur. The right certificate can make all the difference. Although all SSL certificates provide the same level of encryption, high-assurance certificates provide added layers of authentication to give users proof they can trust who you are—which elevates the trustworthiness of your entire site. Here’s how the certificates stack up. High-assurance OV or EV SSL on every page ensures users can easily identify your website as authentic, making it harder for phishing sites to mimic you and defraud your visitors.
Tags : 
    
DigiCert
Published By: DigiCert     Published Date: Aug 01, 2018
Website security changes are one of the only constants on the web today. By using the right certificates for your website and each webpage, you'll be prepared for any updates as they occur. The right certificate can make all the difference. Although all SSL certificates provide the same level of encryption, high-assurance certificates provide added layers of authentication to give users proof they can trust who you are—which elevates the trustworthiness of your entire site. Here’s how the certificates stack up. High-assurance OV or EV SSL on every page ensures users can easily identify your website as authentic, making it harder for phishing sites to mimic you and defraud your visitors.
Tags : 
    
DigiCert
Published By: DigiCert     Published Date: Aug 01, 2018
Website security changes are one of the only constants on the web today. By using the right certificates for your website and each webpage, you'll be prepared for any updates as they occur. The right certificate can make all the difference. Although all SSL certificates provide the same level of encryption, high-assurance certificates provide added layers of authentication to give users proof they can trust who you are—which elevates the trustworthiness of your entire site. Here’s how the certificates stack up. High-assurance OV or EV SSL on every page ensures users can easily identify your website as authentic, making it harder for phishing sites to mimic you and defraud your visitors.
Tags : 
    
DigiCert
Published By: Gomez IT     Published Date: May 24, 2011
Interest in cloud technology and cloud economics abounds. While the technology delivers immediate reductions in capital costs, Forrester believes that cloud computing's greatest benefits will come from changes to the IT technology and organizational model.
Tags : 
gomez, compuware, it infrastructure, it operations, jean-pierre garbani, marc cecere, forrester, cloud economics, cloud technology, cloud computing, mass production
    
Gomez IT
Published By: Tideway Systems     Published Date: Dec 11, 2007
IT service providers need to offer services that deliver new business opportunities whilst increasing levels of availability, controlling risks and reducing costs. This paper provides you with practical guidance based on the practices in ITIL® V3 that will help you manage application and infrastructure changes and configurations.
Tags : 
service management, itil, change management, configuration management, knowledge management, service strategy, service design, tideway, tideway systems
    
Tideway Systems
Published By: newScale     Published Date: Jan 30, 2008
Demand for IT services is outpacing the growth of IT budgets. The business constantly requests new services, requires higher service levels, and expects more consistent service delivery. With supply constrained, the only solution is to manage this demand more effectively. The new version of ITIL prescribes essential changes to help IT and the business tackle this difficult task.
Tags : 
service, service management, service catalog, newscale, itil, service catalog, service catalogue, itil service catalogue, it service catalogue
    
newScale
Published By: ITinvolve     Published Date: Apr 16, 2013
IT Service Management tools have seen very little innovation in the last several years as established vendors have focused their R&D efforts elsewhere. Read this whitepaper to learn about a new approach that will help you can resolve incidents more quickly, plan changes more accurately to avoid unintended consequences, and work down your backlog of recurring issues by leveraging the power of Social IT collaboration.
Tags : 
it service management tools, itsm, incident approach, backlog, social it collaboration
    
ITinvolve
Published By: Lumension     Published Date: Oct 20, 2014
"Just over a decade ago, the outcry over Microsoft’s security problems reached such a deafening level that it finally got the attention of Bill Gates, who wrote the famous Trustworthy Computing memo. Today, many would say that Microsoft leads the industry in security and vulnerability handling. Now, it’s Java that’s causing the uproar. But has Oracle learned anything from Microsoft in handling these seemingly ceaseless problems? In this webinar, Randy Franklin Smith from Ultimate Windows Security will start by reviewing the wide-ranging Java security changes Oracle is promising to make. They sound so much like the improvements Microsoft made back with Trustworthy Computing that I’m amazed it hasn’t been done before! We’ll move on to discuss what you can do now to address Java security in your environment. One of the banes of security with Java is the presence of multiple versions of Java, often on the same computer. Sometimes you really need multiple versions of Java to support appli
Tags : 
java, insecurity, vulverabilities, computing, security
    
Lumension
Published By: SAS     Published Date: Nov 16, 2018
Instances of fraud have become commonplace in many industries, and it’s costing organizations millions of dollars annually and placing corporate brands at risk. But despite significant investments in staff and anti-fraud software, new and emerging fraud threats keep slipping through undetected. Why? Because it’s too costly to keep anti-fraud software current. Paying a vendor to make software changes dramatically increases total cost of ownership. This paper discusses how SAS addresses this challenge with next-generation fraud solutions like SAS Visual Investigator, a cloud-ready investigation and incident management platform that end users can easily configure and adapt to detect new and evolving types of fraud.
Tags : 
    
SAS
Published By: IBM     Published Date: Jan 06, 2015
The essential bridge between an organization and its customers is the workforce. The ability to engage, develop, recognize and support employees will be critical in the decisive battle for customer loyalty. It is employees who represent the organization's brand in the market, who interact with customers on a daily basis, who analyze changes in customer preferences and who develop and maintain the technologies that help connect the physical and digital worlds. And, therefore, a motivated and properly prepared workforce will be indispensable for success in the customer-activated world.
Tags : 
customer loyalty, employee support, workforce challenges, hr solutions
    
IBM
Published By: IBM     Published Date: May 07, 2015
The essential bridge between an organization and its customers is the workforce. The ability to engage, develop, recognize and support employees will be critical in the decisive battle for customer loyalty. It is employees who represent the organization's brand in the market, who interact with customers on a daily basis, who analyze changes in customer preferences and who develop and maintain the technologies that help connect the physical and digital worlds. And, therefore, a motivated and properly prepared workforce will be indispensable for success in the customer-activated world. Watch this webcast to learn: • Key CHRO insights from the Global C-Suite Study • Three workforce challenges for HR in a customer-driven world • Three actions HR can take with real-life examples
Tags : 
workforce, employees, customer loyalty, branding, talent acquisition, ibm
    
IBM
Start   Previous    6 7 8 9 10 11 12 13 14 15 16 17 18 19 20    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.