post

Results 176 - 200 of 462Sort Results By: Published Date | Title | Company Name
Published By: Data Stax     Published Date: Apr 27, 2012
This paper examines key data management challenges facing modern businesses and explains how DataStax Enterprise provides the first post-relational database solution to handle real-time, analytic, and search data without using RDBMS solutions.
Tags : 
datastax, data stax, data management, database management, database, enterprise, search data, rdbms, post-relational, enterprise applications
    
Data Stax
Published By: Wildfire Interactive     Published Date: Jun 14, 2012
Did you know you reach only a fraction of your fanbase every time you post a branded message on Facebook? Whether your fans receive your content in their newsfeeds depends on a Facebook algorithm called EdgeRank. We partnered with the experts at EdgeRank Checker to uncover what makes EdgeRank tick-and how you can use it to your advantage.
Tags : 
marketing, facebook, engagement, reach, social media, advertising, social media campaigns
    
Wildfire Interactive
Published By: McAfee     Published Date: Nov 07, 2014
A conformidade e os riscos financeiros costumavam ser as principais preocupaes que motivavam a adoo de uma postura de gerenciamento de segurana e riscos. Leia o whitepaper e saiba como, atualmente, gerenciar os riscos permite compreender uma quantidade maior de dados: varreduras de vulnerabilidades, registros de aplicaes e bancos de dados, fluxos, registros de acesso e de sesses, alertas e anlise de tendncias.
Tags : 
arquitetura de segurana conectada, big security data, big data, gerenciamento de registros, gerenciamento de logs, siem, segurana, security
    
McAfee
Published By: Palo Alto Networks     Published Date: Dec 11, 2013
Oferecido por um Tempo Limitado. Obtenha Sua Cpia Hoje. Tome uma deciso informada sobre o firewall correto para sua empresa com O Guia do Comprador para Firewall. Esse guia oferece: - Os fundamentos da tecnologia de firewall moderno - Os dez requisitos crticos de negcios que seu prximo firewall precisa atender - Informaes sobre como criar uma solicitao para proposta (SPP) de vendedor - Um plano de teste funcional para auxiliar no processo de seleo de firewall
Tags : 
firewalls, tecnologia, palo alto, application security
    
Palo Alto Networks
Published By: FireEye     Published Date: Mar 05, 2014
Never before have state and local governments been expected to do so much with so little. Even as budgets remain tight in a post-recession environment, tech-savvy citizens demand higher levels of service, they want to pay taxes by credit card, renew their driver's license online, and check traffic from their smartphone. These responsibilities make cyber security critical for state agencies, municipalities, and public utilities. Governments possess residents' most sensitive information - including inviolable personal data such as Social Security numbers and birth certificates. This white paper highlights: Why traditional tools fail to detect advanced attacks; Gaining a cohesive, correlated view of all major threat vectors; How to leverage signature-less, real-time security that thwarts zero-Day attacks.
Tags : 
fireeye, persistent threats, advanced attacks, multi-vector, multi-stage nature, combatting advanced attacks, cohesive threat vectors, correlated threat vectors, real-time security, malicious code installs, block callbacks, threat intelligence, malware forensics, cyber warfare, security
    
FireEye
Published By: Adobe     Published Date: Nov 02, 2018
Every day, demanding customers, unforeseen competition, and disruptive new technologies hammer home that we have entered the age of the customer, where established business operations no longer work. Yet, most marketing functions still rely on decades-old methods that undermine their ability to create post-digital brand experiences and help their firms become customer-focused. Smart CMOs recognize that it is time to pivot their marketing function around the customer, rather than transactions, sales, their brand, or day-to-day operations. In March 2018, Adobe commissioned Forrester Consulting to evaluate the link between email innovation and customer obsession. To explore this topic, Forrester conducted an online survey with 256 US consumers who use personal email and 260 marketing technology and strategy decision makers at US companies with 500 or more employees. We found that email marketing can provide a way to launch customer-obsessed marketing at organizations. In fact, companies t
Tags : 
    
Adobe
Published By: AlienVault     Published Date: Aug 14, 2015
Join us for this technical session to learn how AlienVault USM can help you achieve PCI DSS compliance and improve your overall security posture.
Tags : 
    
AlienVault
Published By: Epicor     Published Date: Jul 06, 2017
You rely on cloud technology more than you may realizewhen you post to social media, download music, or view your bank balance online. These everyday uses are not so different from the opportunities the cloud affords your business. Cloud technology has proven to do several things very wellimprove cash flow, increase business capabilities, and simplify processes across the organizationall in a platform thats more accessible and reliable than on-premises hardware. Migrating to the cloud brings faster access to the data and processes your business needs to compete and grow in todays marketplace. Download this white paper from Epicor Software to learn why moving to the cloud is easier than you might expect.
Tags : 
erp software, enterprise resource planning software, saas, distribution
    
Epicor
Published By: iCompass Technologies     Published Date: Feb 06, 2015
You know every tax dollar counts: The post-recession drop in funding coupled with mounting financial commitments and legislative demands for improved access to information leave no choice but to make operations more efficient. Agenda automation software eliminates manual tasks associated with creating, distributing, and publishing agendas, reduces the prep time (by as much as 50% or more) and associated costs of meetings while introducing a flexibility that makes tight deadlines easier to manage. The impact is far reaching, from improved transparency to freeing up staff time to work on other priorities. It not only pays for itself in paper savings, it brings money back into the budgetfrom $300 to $1000 per meeting, depending on the size of the organization. Learn more about how easy it can be to automate your meeting agendas, and what you can get back as a result.
Tags : 
agenda management, meeting management, meeting management software, records management, records management software, paperless document management, local government transparency, agenda automation, local government software, municipal government software, city government software, e-government software, digital governing, agenda automation software, citizen engagement software, government transparency initiatives, granicus, iqm2, agenda pal, novus agenda
    
iCompass Technologies
Published By: Mimecast     Published Date: May 09, 2018
Der Mimecast ESRA Report (E-Mail Security Risk Assesment) beleuchtet die Leistungsfhigkeit verschiedener E-Mail Security Lsungen. Der ESRA Report wird quartalsweise durchgefhrt und auch der aktuelle Report stellt Lcken bei vielen Systemen im Schutz von Unternehmen gegen bsartige Dateitypen, Ransomware, Phishing und weiteren Angriffsversuchen ber E-Mail fest. Fast ein Viertel der "unsicheren" E-Mails werden an die Posteingnge der Benutzer bermittelt. Erfahren Sie in dem Report, wie Sie Ihre Cyber Resilience fr E-Mails erhhen und mit einem mehrschichtigen Ansatz fr Ihre Office 365 Umgebung deutlich die Sicherheit fr Ihr Unternehmen steigern.
Tags : 
    
Mimecast
Published By: Mimecast     Published Date: May 09, 2018
Der Mimecast ESRA Report (E-Mail Security Risk Assesment) beleuchtet die Leistungsfhigkeit verschiedener E-Mail Security Lsungen. Der ESRA Report wird quartalsweise durchgefhrt und auch der aktuelle Report stellt Lcken bei vielen Systemen im Schutz von Unternehmen gegen bsartige Dateitypen, Ransomware, Phishing und weiteren Angriffsversuchen ber E-Mail fest. Fast ein Viertel der "unsicheren" E-Mails werden an die Posteingnge der Benutzer bermittelt. Erfahren Sie in dem Report, wie Sie Ihre Cyber Resilience fr E-Mails erhhen und mit einem mehrschichtigen Ansatz deutlich die Sicherheit fr Ihr Unternehmen steigern.
Tags : 
    
Mimecast
Published By: FICO     Published Date: Mar 14, 2017
In this Executive Brief, we share best practices in how to evaluate and deploy layered controls that will help you develop a holistic approach to controls, investigate and control where risk is introduced, assess your risk appetite and benchmark your cybersecurity posture against others in your industry.
Tags : 
network security and data protection, advance threat defense, network visibility, security analytics, mobile security, cyber security detection software
    
FICO
Published By: XpertHR     Published Date: Oct 23, 2017
USE THIS GUIDE TO Learn how and why mergers and acquisitions fail to achieve their goals; Learn how and why HR can and should be involved in the process to boost the likelihood of success; Identify strategic goals before, during and after a restructure; Gain insight on obstacles and risk factors in a post-integration environment. Get a FREE Trial! Visit www.
Tags : 
    
XpertHR
Published By: Madden Communications     Published Date: Sep 28, 2017
More sales. Cost efficiency. Higher profits. Every marketer wants these, but over-emphasizing unit cost of POP materials over the total cost of production makes them miss out on chances to achieve them. Taking a Total Cost of Ownership (TCO) approach to supply chain management for brand activations enables marketers to grow their business more quickly and profitably. It entails, however, embracing new ways of thinking that can involve unlearning the status quo. This piece looks at factors comprising the three main categories contributing to Total Cost of Ownership: Direct Costs, Indirect Costs, and Post-Purchase Costs.
Tags : 
    
Madden Communications
Published By: Excellus BlueCross BlueShield     Published Date: Nov 13, 2018
Telemedicine has the potential to deliver significant savings to both employees and businesses when people actually use it. This toolkit includes posters, videos, mirror clings, and more to introduce your team to the service and encourage them to take advantage of it.
Tags : 
telemedicine, healthcare, health benefits, health plans, health insurance, excellus, bcbs
    
Excellus BlueCross BlueShield
Published By: IBM Watson Health     Published Date: Nov 21, 2017
The shift to value-based care means that healthcare organizations should expand their concept of return on investment (ROI) to include the ability of solutions to increase efficiency and contain healthcare costs. Data analytics and automation capabilities have become important tools for providers aiming to maximize value-based payments. Learn from this whitepaper about the best ways for healthcare organizations to measure health IT ROI in the value-based environment, including specific examples of how certain providers are approaching this challenge.
Tags : 
value-based care, healthcare costs, health outcomes, health it, health information technology, hospital performance, operational performance, hospital performance improvement, operational performance, operational benchmarks, comparative analysis, post-acute network alignment, provider alignment, hospital spending, hospital financial benchmarks, hospital operational benchmarks
    
IBM Watson Health
Published By: Canon Solutions America     Published Date: May 24, 2019
Tired of posting to Facebook and getting no business in return? Learn what youre doing wrongand what to do insteadin this 4-part guide by John Foley, Jr., ranked 15th most influential Chief Marketing Officer on social media by Forbes magazine
Tags : 
    
Canon Solutions America
Published By: Ahead     Published Date: Jun 05, 2019
Digital Business Continues to Move the Cyber Goal Posts Fortune magazine estimates that by the year 2020, US companies will spend $101 billion per year on cyber security, up 38% from 2016. With all of the money being invested in cyber security, why do the pace and complexity of new security threats continue to rise year after year? A big reason is that todays digital business involves a more mobile workforce with expectations of immediate and on demand access to data fronted by intuitive and engaging user experiences, and often underpinned by public cloud infrastructure for increased agility and time to market.
Tags : 
    
Ahead
Published By: Resonate     Published Date: Jan 24, 2018
B2C marketers need CMOs and top Customer Insights leadership to guide their teams in driving customer-obsessed strategies. While most think they are, given regular interaction with customers, in reality, most marketing leaders still prioritize internal rubrics over solving actual customer problems. In this Resonate Webinar, featuring guest, Shar VanBoskirk, VP, Principal Analyst at Forrester Research, youll learn how to transform your marketing team into creators of post-digital brand experiences and leaders of enterprise-wide customer obsession. Key takeaways will include: - Why Marketing today is failing - How emphasis on customer understanding, brand strategy, and brand experience will turn Marketing into the leader in customer strategies for the entire firm - What Marketing Leadership must do in order to enact, and maintain this shift
Tags : 
customer strategy, marketing strategy, consumer intelligence software
    
Resonate
Published By: CloudTask     Published Date: May 11, 2018
In a world where every competitor claims to be the best, it's extremely challenging to differentiate yourself as a market leader. Effective differentiation is one of the main challenges businesses face while trying to convert traffic into B2B leads. Essentially, it all comes down to great service and personalization Great service doesn't just include solving problems post sale, it also means being in the right place to answer questions and provide information pre-sale. The more your prospects believe that you are there to serve them and their specifc needs, the more likely it is that they will become genuine leads and eventually customers.
Tags : 
    
CloudTask
Published By: Aviatrix     Published Date: Jun 11, 2018
In evaluating the security posture for your Global Transit Network, your first question might be: Why do I even need additional security? Isnt what Amazon provides out of the box adequate? This is not the right question to ask first. Its important to appreciate that, while Amazon says it has a shared security model, your Amazon EC2 instance may not meet your security requirements by default. Though Amazon makes specific security features available to you, its still up to you to choose judiciously among the many native and third-party options. As part of our fact-filled AWS Bootcamp series, Aviatrix CTO Sherry Wei and Neel Kamal, head of field operations at Aviatrix, walk through five use cases and examine what Amazon provides, and the questions you need to be asking to implement Amazon services or add additional ones that are appropriate for your business. After examining each use case, well show you how we handle it for our own business. Who Should Watch? Anyone responsi
Tags : 
aws, aws vpc, aws transit vpc, secure transit vpc, vpc egress filter
    
Aviatrix
Published By: dinCloud     Published Date: Jun 19, 2018
Under the leadership of Stephen Arndt, consulting CIO, Medicalodges a Kansas-based post-acute healthcare company was looking to transition away from maintaining its own hardware on premises and needed a partner to help its small IT team maintain and monitor its data center infrastructure. As a healthcare services provider, Medicalodges is subject to HIPAA regulation. In order to maintain compliance, the company required a solution with inherent business continuity and redundancy.
Tags : 
healthcare, company, infrastructure, data, center
    
dinCloud
Published By: TIBCO Software     Published Date: Sep 16, 2019
Os bancos em todo o mundo esto apostando muito em inteligncia artificial e machine learning para lhes dar a vantagem tecnolgica necessria para obter servios bancrios em tempo real, personalizados e preditivos. Um marco ajudar a diferenciar os primeiros ganhadores e fornecer vantagens contnuas em inteligncia. Faa o download deste IDC Analyst Infobrief para saber como os melhores bancos do mundo esto se tornando mais pessoais, preditivos e mais em tempo real do que nunca. O que voc conhecer: 8 tendncias que refletem o nvel de preparao do banco para a inteligncia conectada 9 armadilhas para evitar e 9 maneiras de pular os obstculos Os elementos bsicos pessoais, preditivos e em tempo real da IA e ML para os bancos Lderes de destaque com base na pesquisa da IDC Financial Insights e em seus respectivos casos de uso Orientao essencial do IDC para os bancos lderes
Tags : 
    
TIBCO Software
Published By: TIBCO Software     Published Date: Sep 16, 2019
Los bancos de todo el mundo estn apostando fuertemente a la inteligencia artificial y el machine learning a fin de obtener la ventaja tecnolgica que necesitan para ofrecer servicios bancarios ms personalizados, predictivos y en tiempo real. Un marco ayudar a diferenciar a los primeros ganadores y ofrecerles ventajas continuas en inteligencia. Descargue este IDC Analyst Infobrief que le permitir conocer cmo los mejores bancos del mundo se estn volviendo ms personales, ms predictivos, y ms en tiempo real que nunca. Lo que usted conocer: Las ocho tendencias que reflejan el nivel de preparacin de los bancos para la inteligencia conectada Los nueve obstculos que evitar y las nueve formas de salvar las brechas Los elementos bsicos personales, predictivos y de tiempo real de la IA y el ML para los bancos Los lderes destacados de acuerdo con la investigacin de IDC Financial Insights y sus respectivos casos de uso Una gua esencial de IDC para los bancos lderes
Tags : 
    
TIBCO Software
Published By: Apptio     Published Date: Oct 09, 2019
"Ready to communicate IT cost and value in terms your business unit partners understand? The Apptio TBM Unified Model (ATUM) standardizes the financial information necessary for IT leaders to manage their technology business. Use this poster as a resource to: Establish better alignment between IT, Finance, and other business units by using common language around IT costs Confidently manage the business of IT with the backing of peer-derived best practices Understand 10 essential metrics you should track to communicate the business value of IT "
Tags : 
    
Apptio
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.