customer environment

Results 151 - 175 of 238Sort Results By: Published Date | Title | Company Name
Published By: IBM     Published Date: Sep 30, 2016
In this exclusive report, Nucleus Research cites findings from interviews with IBM QRadar on Cloud customers who have adopted a cloud subscription model to access security intelligence & analytics capabilities. Download the report to read about the reported benefits, including better flexibility and agility to address a rapidly changing threat environment, increased IT productivity and access to a growing range of additional security services in the cloud.
Tags : 
nucleus, research guidebook, ibm qradar, cloud, networking, security, enterprise applications
    
IBM
Published By: IBM     Published Date: Jan 09, 2017
In this exclusive report, Nucleus Research cites findings from interviews with IBM QRadar on Cloud customers who have adopted a cloud subscription model to access security intelligence & analytics capabilities. Download the report to read about the reported benefits, including better flexibility and agility to address a rapidly changing threat environment, increased IT productivity and access to a growing range of additional security services in the cloud.
Tags : 
ibm, nucleus, research guidebook, ibm qradar, cloud, security, enterprise applications
    
IBM
Published By: Numara Software     Published Date: Jul 16, 2009
Delivering world class customer service in today’s fast paced business environment is becoming more difficult as information and data requires instant access.
Tags : 
footprints, numara, blackberry, mobile, service desk, on-the-go, slas, service level agreements
    
Numara Software
Published By: Pure Storage     Published Date: Jul 18, 2017
OTS' experiences with all-flash technology mirror what many customers have experienced over the past several years. Hesitatingly optimistic, OTS deployed its first AFA in a limited environment to prove the system out, and when it performed and/or exceeded the company's expectations, it quickly started moving more workloads to it over time. Like OTS, many customers do not immediately retire their legacy storage, but in moving the more demanding workloads off of their existing environments, they provide better application performance both for those applications on the AFA and for those that stay on the legacy storage. And like OTS, the majority of AFA customers have in the past year in particular come to the conclusion that all-flash technology is the future of primary storage for performance, reliability, ease of management and expansion, and economic (as measured by total cost of ownership) reasons.
Tags : 
external storage systems, flash arrays, scale-up, scale-out, managing it infrastructure, data center, idc, market intelligence
    
Pure Storage
Published By: Pure Storage     Published Date: Jul 26, 2017
OTS' experiences with all-flash technology mirror what many customers have experienced over the past several years. Hesitatingly optimistic, OTS deployed its first AFA in a limited environment to prove the system out, and when it performed and/or exceeded the company's expectations, it quickly started moving more workloads to it over time. Like OTS, many customers do not immediately retire their legacy storage, but in moving the more demanding workloads off of their existing environments, they provide better application performance both for those applications on the AFA and for those that stay on the legacy storage. And like OTS, the majority of AFA customers have in the past year in particular come to the conclusion that all-flash technology is the future of primary storage for performance, reliability, ease of management and expansion, and economic (as measured by total cost of ownership) reasons.
Tags : 
external storage systems, flash arrays, scale-up, scale-out, managing it infrastructure, data center, idc, market intelligence
    
Pure Storage
Published By: IBM     Published Date: Feb 08, 2008
Point of service is the key to every retail operation. But with e-mail marketing, in-store/self-service kiosks and more, the definition of point of service is changing. These changes create a unique opportunity to utilize advanced technologies to improve the customer experience. The IBM Retail Environment for SUSE LINUX (IRES) is designed to help retailers do just this -- while generating higher profits.
Tags : 
pos, point of service, tco, marketing, customer experience, increase sales, profitability, retail
    
IBM
Published By: Oracle     Published Date: Jan 28, 2019
Oracle Engineered Systems are architected to work as a unified whole, so organizations can hit the ground running after deployment. Organizations choose how they want to consume the infrastructure: on-premises, in a public cloud, or in a public cloud located inside the customer’s data center and behind their firewall using Oracle’s “Cloud at Customer” offering. Oracle Exadata and Zero Data Loss Recovery Appliance (Recovery Appliance) offer an attractive alternative to do-it-yourself deployments. Together, they provide an architecture designed for scalability, simplified management, improved cost of ownership, reduced downtime, zero-data loss, and an increased ability to keep software updated with security and patching. Download this whitepaper to discover ten capabilities to consider for protecting your Oracle Database Environments.
Tags : 
    
Oracle
Published By: IBM     Published Date: May 16, 2016
Across industries, customers today wield more power and greater choice than ever before – a power that they exercise by shifting their attention and spending (across multiple channels/devices in near-real time) from provider to provider. In this environment of hyper-connectedness and diminishing customer loyalty and fleeting human attention spans, the battle for holding customer interest and engaging him/her meaningfully requires, first and foremost, an everlasting commitment to "relevance. "Being relevant and demand-driven is of paramount importance to the media industry, but it is no less important to any industry that operates in a B2C world. However, adapting to the ever-rising expectations and changing buying behaviors of customers is becoming a Herculean task, requiring both business and technology transformation.
Tags : 
ibm, ovum, customer veiwership, customer behavior, cross-plaform, cloud, analytic architecture, mobile data systems
    
IBM
Published By: Schneider Electric     Published Date: Jan 26, 2018
The first event in the Partnering with Certainy Webinar Series, "Customer Demands at the Edge." Trends like IoT are driving customer experience expectations in a way that demands resiliency in local edge environments. As a result, we’re seeing a rise of edge computing (compute power coming out of the cloud and into the access layer). Customer demands manifest themselves differently based on things like company size and segment. For example, a retail customer’s business imperatives might look different from a doctor’s office. But one thing remains constant: A standardized, redundant, and repeatable physical infrastructure can protect the availability of these now-critical access-layer IT assets. APC by Schneider Electric has: The solutions you need to deliver a standardized, redundant, & repeatable infrastructure to your customers The tools you need to configure them, The alliances & certifications you trust & rely on, The program to make it profitable. Fill out your information and click "Register" to watch the kick off our Partnering with Certainty Webinar Series, “Customer Demands at the Edge: Always On, Always Connected.” This webinar originally aired on October 5th, 2017.
Tags : 
    
Schneider Electric
Published By: Schneider Electric     Published Date: Jan 26, 2018
Part 2 in our Partnering with Certainty Webinar Series, "Customer Demands at the Edge." In our last webinar, we discussed how trends & technologies like IoT and its many applications have helped drive an Always On, Always Connected mentality that has completely evolved customer experience standards. These demands are driving a need for resiliency in local edge environments, meaning compute & storage capacity is now coming back on premise for many applications – especially in industries like Healthcare, Retail, Finance, and Education. In other words, this highly distributed access layer is now becoming a compute layer – one that is mission-critical to delivering a flawless (or at least acceptable) customer experience. These environments are often make-shift wiring closets (janitor’s closets, back rooms, etc.) with no dedicated IT staff per each location. More than ever before, Healthcare, Retail, Finance, and Education customers are turning to solution providers to be that “dedicated IT staff” to find and fix problems before they start, so that the customer (or patient, or student) experience they’re working to provide remains a good one. APC by Schneider Electric has: Connected Products making it easy to remotely monitor your customers’ environments Including our NEW Smart-UPS with APC SmartConnect – the industry’s first cloud-connected UPS! A Managed Service Program to help you develop & monetize power as a managed service Fill out your information and click "Register" to watch part 2 of our Partnering with Certainty Webinar Series, “Customer Demands at the Edge: Fix My Problem Before it Starts.” This webinar originally aired on October 19th, 2017.
Tags : 
    
Schneider Electric
Published By: Schneider Electric     Published Date: Jan 26, 2018
Part 3 in our Partnering with Certainty Webinar Series, "Customer Demands at the Edge." As distributed edge environments become more critical, physical security becomes more important. Nobody would leave their data center wide open for anyone to enter, but that’s exactly how many organizations treat their edge computing sites. Often, they consist of a rack or two of gear in a non-dedicated location, perhaps a janitor’s closet, with little to no physical security. Fill out your information and click "Register" to watch the third event in our Partnering with Certainty Webinar Series, “Customer Demands at the Edge: Protect me from Downtime!” This webinar originally aired on November 9th, 2017. In this webinar, we discuss physical security best practices, including environmental issues such as temperature and humidity monitoring. We also update partners on the physical security features of the latest APC racks and the NetBotz line of security and environmental appliances, cameras and sensors.
Tags : 
    
Schneider Electric
Published By: Dell Storage     Published Date: Aug 14, 2012
Engagement with customers online has evolved from novelty to necessity, with an estimated $202 billion spent in 2011 and projected 10% growth to $327 billion in 2016, according to Forrester Research. Businesses are maneuvering to connect with the growing pool of online customers, but the move to eCommerce brings new security risks with the exchange of sensitive consumer information, including cardholder data and personally identifiable information that can enable identity theft. At stake is reputation of brand, ongoing access to merchant credit lines, and substantial penalties and remediation in the event of a breach. This white paper elucidates the aspects of PCI DSS (Payment Card Industry Data Security Standards) compliance that must be considered when choosing a secure environment for servers involved in eCommerce. Whether deciding to outsource or keep data hosting in-house, any company collecting, storing or transmitting customer cardholder data needs to be compliant, and this document helps pinpoint the specific concerns and standards a company should be aware of when choosing how to keep their data secure. Understanding requirements and best practices for security policies and procedures, physical safeguards, and security technologies is essential to establishing cardholder data security and meeting QSA and SAQ audit requirements.
Tags : 
pci, compliant, data, centers, engagement, connect, ecommerce, compliance
    
Dell Storage
Published By: Vectra Networks     Published Date: Aug 03, 2015
The data in this report is based on metadata from Vectra customers and prospects who opted to share detection metrics from their production network environments.
Tags : 
post intrusion report, metadata, network threats, network security management, it security, botnet monetization, data exfiltration, security management
    
Vectra Networks
Published By: IBM     Published Date: Jun 13, 2016
Companies are always looking for ways to determine just how effective and capable candidates can be in the workplace before they start. On paper, candidates have indicated that they can code in Python and Java or can resolve any customer service problem, but how do their skill sets compare with internal success standards, let alone everyday coding or service expectations? That’s where pre-hire assessments can be so valuable. They provide extensive insights into candidates’ skill sets, strengths, struggles, ideal working environments, and more. Top companies understand just how worthwhile such a resource is for making informed hiring decisions. In fact, Best-in-Class organizations are 45% more likely than All Others to use pre-hire assessments as part of the hiring process. Greater insights about candidates can be a game changer for the future success of any company. While there isn’t a one-size-fits-all pre-hire assessment approach to fit in with every company’s talent acquisition pr
Tags : 
ibm, aberdeen, pre-hire assessments, talent acquisition, recruiting software/services
    
IBM
Published By: IBM     Published Date: Mar 28, 2016
Smart organizations are consistently looking for ways to determine just how effective and capable candidates can be in the workplace. Sure, these candidates have said they can solve this algorithm or resolve that customer problem, but how do they stack up with internal success standards? That's why pre-hire assessments are valuable - they provide extensive insights into candidates' skill sets, pain points, ideal working environments, and more. Such information can then be used to make more informed hiring decisions that can be a game changer for the future success of any company.
Tags : 
ibm, recruiting, talent acquisition, pre-hire assessments, aberdeen group, recruiting software/services
    
IBM
Published By: IBM     Published Date: Jul 20, 2016
Smart organizations are consistently looking for ways to determine just how effective and capable candidates can be in the workplace. Sure, these candidates have said they can solve this algorithm or resolve that customer problem, but how do they stack up with internal success standards? That's why pre-hire assessments are valuable - they provide extensive insights into candidates' skill sets, pain points, ideal working environments, and more. Such information can then be used to make more informed hiring decisions that can be a game changer for the future success of any company.
Tags : 
ibm, recruiting, talent acquisition, pre-hire assessments, aberdeen group, human resource technology
    
IBM
Published By: OneLogin     Published Date: Oct 24, 2017
Corporate data spreads across an ever-growing number of applications. Users (employees, contractors, partners, and customers) access those applications over a wide range of devices. Those devices take different forms: desktops, laptops, tablets, smartphones, smartwatches. Each device may use a different operating system. The locations from where people access your data can be on-premises or off, and in any number of places around the globe. Data, users, apps, devices, locations—the sheer number of permutations and combinations is mind-boggling. This complex nature of today’s IT environment opens security gaps and exposes your business to undue risk. To illustrate, try to envision all the permutations and possible entry points for risk in your organization. Imagine that you have 400 users, each using 25 apps. When you multiply those together, that’s 10,000 potential access permissions to manage. Access permissions change as users come and go, roles change, new apps are added, and
Tags : 
    
OneLogin
Published By: Symantec Corporation     Published Date: Jun 24, 2014
News headlines have been inundated with stories of massive personal and credit card data breaches. The rising intensity and sophisticated nature of cyber attacks has created a hostile and precarious environment for businesses charged with protecting their customers’ personal data. The lucrative business of selling credit card data on the black market has made point-of-sale (PoS) devices, PoS environments, and web kiosks a prime target for cybercriminals. Read this solution brief to learn how to protect your network and PoS terminal and web kiosk endpoints from costly multi-stage cyber attacks.
Tags : 
security, pos, data, malware, cyber attacks, point-of-sale, software development
    
Symantec Corporation
Published By: Symantec     Published Date: Oct 20, 2014
Today, Symantec finds itself in an industry that is defined by tough competition, as well as an ever-changing variety of sophisticated security threats directed at its customers. To compete in this dynamic environment, Symantec has embarked on a strategy to streamline and simplify the company around its customers.
Tags : 
symantec, vmware, vcloud, data center, storage virtualization, application performance management, data center design and management
    
Symantec
Published By: Motorola Solutions     Published Date: Apr 26, 2019
ffective communications are the foundation for any good team, and the transportation and logistics (T&L) sector is no exception. Charged with managing the warehousing, inventory, and movement of freight across the supply chain — both through internal and external distribution networks — T&L professionals rely on high levels of team collaboration to get the job done right. By helping companies leverage the knowledge, talents, and insights of their people, effective team communications ensures that customers get their deliveries when, how, and where they want them. Meeting those expectations in today’s fast-paced, demanding distribution environment requires reliable, clear voice and data logistics communications that start at the warehouse and end at the point of delivery. In this white paper, we explore the key challenges that T&L companies are facing in today’s business environment and hear how instant push-to-talk and advanced video surveillance can help them develop streamlined suppl
Tags : 
    
Motorola Solutions
Published By: Dell and Nutanix     Published Date: Jan 16, 2018
Organizations increasingly require IT infrastructures that support the speed at which their businesses must operate through simplicity, efficiencies, agility, and strong performance. Hyperconverged infrastructure solutions, which enable organizations to minimize or nearly eliminate inefficiencies and complexity associated with maintaining storage and compute silos, have emerged as a strong potential solution for such organizations. IDC’s research demonstrates that organizations running workloads on Nutanix solutions such as Dell XC are benefiting are benefiting from cost and staff efficiencies, the ability to scale their infrastructure incrementally, very high resiliency, and strong application performance. This is helping interviewed Nutanix solutions customers better meet business challenges and has led many of them to establish plans for expanding their hyperconverged workload environment with Nutanix solutions.
Tags : 
technologies, infrastructure, data, social, mobile, cloud, nutanix
    
Dell and Nutanix
Published By: Red Hat     Published Date: Jan 01, 2012
A world-leading web content management and customer experience management system built its capabilities on the Ixonos Elastic Cloud – which is based on the Red Hat software stack, including value-rich Red Hat Enterprise Linux. Learn how Red Hat Enterprise Linux offered a stable, flexible environment for cloud deployments.
Tags : 
ixonos elastic cloud, software stack, red hat, ez systems, linux, cloud deployments
    
Red Hat
Published By: Red Hat     Published Date: Mar 11, 2016
When your cloud performs better, so does your business. IT is being challenged to react faster to growing customer demands. So to meet the requirements of their end users, IT organizations are increasingly turning to Infrastructure-as-a-Service (IaaS) private clouds for their ability to swiftly deploy and scale IT infrastructure. But not just any OpenStack® cloud stands up to the demands of a production-scale environment or can meet your performance, scalability, and security standards. Red Hat® Enterprise Linux® OpenStack Platform does, and will help you gain a competitive advantage.
Tags : 
    
Red Hat
Published By: VMware Dell     Published Date: Jun 05, 2008
VMware solutions help customers meet their energy saving goals by enabling safe consolidation of underutilized x86 desktops and servers onto less hardware, both through initial consolidation efforts and dynamically as computing requirements change. This white paper explains how VMware virtualization provides the foundation for dramatically more energy efficient IT environments.
Tags : 
power, data center, green, environmental, environment, spend, server virtualization, virtual machine
    
VMware Dell
Published By: UPS     Published Date: May 24, 2017
For life sciences businesses, the supply chain used to mean one thing: getting products from factory or warehouse to distributors or ultimate customers as quickly and economically as possible. Now, with today’s evolving regulatory environment, an increasingly globalized market, more complex health products, and an increased focus on the patient, pharmaceutical companies and medical device manufacturers are looking at their supply chain and logistics needs in a whole new way.
Tags : 
health care, supply chain, ups, business, science
    
UPS
Start   Previous    1 2 3 4 5 6 7 8 9 10    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.