mine

Results 126 - 150 of 1659Sort Results By: Published Date | Title | Company Name
Published By: Aventri     Published Date: Apr 29, 2019
"Revenue focused executives have four metrics that determine their success or failure: number of opportunities, size of opportunities, win rate, and speed to revenue. All teams work together to make sure that they achieve these goals and that they have the processes in place to optimize around them. Event management software is one piece of the puzzle that is designed to generate revenue. Read this eBook to see how event management software helps to speed up the buying process and win more deals!"
Tags : 
    
Aventri
Published By: Trimble     Published Date: May 02, 2019
As a construction estimator, you know firsthand how hard it is to accurately estimate the labor and materials required to complete a building project. The potential pitfalls are everywhere. And then you’re under the gun to produce the estimate quickly—and you almost always are—producing a precise estimate can be downright nerve-racking. But estimating doesn’t need to be so hard. In fact, you already possess something very valuable that can help you produce more accurate construction estimates—and minimize the danger of costly mistakes. Claim your FREE eBook to uncover the missing link to producing precise estimates.
Tags : 
    
Trimble
Published By: Dell EMC     Published Date: Nov 04, 2016
Whether you’re dead set on winning the America’s Cup for Britain the first time like Olympian Sir Ben Ainslie or simply determined to keep your business competitive, success demands an infrastructure that can deliver quickly. Download the case study to learn how Ainslie’s British sailing team Land Rover Bar used innovative IT to deliver agility, reliability and speed in its bid to win, and how using hyper-converged infrastructure created a competitive advantage through improved performance and collaboration, reduced risk to critical applications, and provided the ability to spin up VMs in less than 15 minutes.
Tags : 
it infrastructure, hyper-convergence, architecture, sql, microsoft exchange, storage management, business intelligence
    
Dell EMC
Published By: CA Technologies     Published Date: Nov 12, 2014
This white paper examines why unified IT monitoring is an important enabling technology for both enterprises and management service providers, including both the organizational and strategic impacts as well as the business case surrounding it. It goes further to examine CA Unified Infrastructure Management as an example of unified IT monitoring, and reviews three case studies where the solution has been deployed for active use in a unified manner.
Tags : 
complete it visualization, it operations visibility, application visibility, infrastructure management, uim, enterprise applications, data management, virtualization, cloud computing, infrastructure
    
CA Technologies
Published By: CA Technologies     Published Date: Feb 09, 2015
This white paper examines why unified IT monitoring is an important enabling technology for both enterprises and management service providers.
Tags : 
complete it visualization, it operations visibility, application visibility, infrastructure management, uim, it management, enterprise applications, data management, virtualization, cloud computing, infrastructure
    
CA Technologies
Published By: Dell     Published Date: Jan 29, 2019
White Paper Published by Dell Both public and private organizations acknowledge that managing the PC life cycle becomes more complicated and expensive as the variety of PC devices and employee workstyles increase. In order to be fully productive, different groups of employees have different needs in terms of end-user device hardware, software, and configuration. Dell and Intel® commissioned Forrester Consulting to conduct a Total Economic Impact™ (TEI) study and examine the potential return on investment (ROI) enterprises may realize by leveraging Intel® Core™ vPro processors and Dell’s ProDeploy Plus and ProSupport Plus services.
Tags : 
    
Dell
Published By: Dell     Published Date: May 04, 2015
This resource examines the performance and TCO for a leading public cloud service provider against the Intel Processor-powered Dell approach with Microsoft private cloud. Read on to learn which one provides better value and performance.
Tags : 
    
Dell
Published By: Zendesk Ltd     Published Date: Sep 11, 2018
As companies increasingly look to provide a better experience for customers, offering support across multiple channels is becoming more popular than ever. According to the Aberdeen Group, companies doubled the number of channels they use to interact with customers between 2012 and 2017. But there’s a difference between providing support on a few channels and delivering a truly integrated omnichannel solution. Using the Zendesk Benchmark, our crowd-sourced index of customer service interactions from 45,000 participating organizations across 140 countries, we examined why companies are going omnichannel and what sets the companies using Zendesk for omnichannel support apart from everyone else.
Tags : 
    
Zendesk Ltd
Published By: HPE     Published Date: Mar 23, 2015
This Porter Consulting report analyzes enterprise campus networking solutions from Aruba Networks, Cisco, HP and Ruckus Wireless. The paper examines key business and technology trends affecting enterprises with 500-5000 employees. We identify fundamental requirements IT decision makers should consider when evaluating campus networking solutions including: • Ensuring simple, secure and cost-effective user access • Supplying adequate bandwidth and quality of service • Streamlining deployment and operations • Supporting emerging standards and technology requirements Our goal is to provide business and technical decision makers with a guide to the key players and their strengths.
Tags : 
    
HPE
Published By: Akamai Technologies     Published Date: Aug 11, 2017
Examine the business impact of malware, ransomware, and phishing, as well as the cost of the average data breach. Given the significant economic impact of these threats, understanding your financial exposure and employing a layered defense simply makes sense.
Tags : 
domain name system (dns), cloud security, threat protection, threat prevention, phishing, ransomware, security threats, malware
    
Akamai Technologies
Published By: MindTouch     Published Date: Oct 02, 2019
Understanding the important role that your support content plays (i.e. help docs, user guides, FAQs, troubleshooting steps, product information, etc.) can help organizations avoid creating frustrating journeys for their customers who simply need help. Undervaluing how customers seek answers is a critical oversight. To understand why, it helps to examine the place they’re most likely to start: Google.
Tags : 
content strategy, customer engagement, customer journey, customer success, digital transformation, knowledge base, online help, product documentation, search engine optimization (seo)
    
MindTouch
Published By: CA Technologies     Published Date: Nov 07, 2014
Les supports mobiles, sociaux et de cloud computing ont aidé à éliminer les vieux périmètres réseau. La nouvelle entreprise ouverte doit faire avec un large éventail d'utilisateurs, d'appareils et d'applications, sans limites définies. De nouveaux modèles de sécurité sont essentiels pour à la fois permettre et protéger les activités commerciales dans ce monde nouveau. Téléchargez le guide.
Tags : 
mobile media, social media, mobile workers, security in the cloud, removal of the network perimeters, remote access, access control, application security, web service security, mobile computing, wifi, wireless security, cloud computing
    
CA Technologies
Published By: Dell EMC     Published Date: Feb 07, 2018
Technology is quickly moving to the forefront of business priorities as organizations undertake digital and IT transformation projects that enable strategic differentiation in a world where users leverage applications and data in new ways. Organizations in all industries must better align with changing customer preferences to avoid being disrupted by a new crop of nimble competitors. Technology will increasingly determine how businesses define and distinguish themselves in the market. IDC has noted that most organizations were not born digital but instead have legacy business processes, applications, and infrastructure that require modernization and automation. As a result, businesses must embark on an IT transformation initiative to modernize and automate their legacy infrastructure to prime themselves to achieve their digital business goals and initiatives. Intel Inside®. Powerful Productivity Outside. Intel logo are trademarks of Intel Corporation or its subsidiaries in the U.S. a
Tags : 
    
Dell EMC
Published By: Polycom     Published Date: Sep 04, 2012
This report examines the basic components of video conferencing as a fundamental tool for businesses to enhance communication and collaboration between employees, partners and customers.
Tags : 
video collaboration, video conferencing, point-to-point, multi-point, video call management, polycom realpresence platform, content management, device management
    
Polycom
Published By: Polycom     Published Date: Sep 04, 2012
This brief examines telepresence in every stage of the human justice process, demonstrating how this technology can not only make services more efficient and affordable, but also more accessible - and therefore more just.
Tags : 
telepresence, video conferencing applications, video collaboration, justice system, video conferencing
    
Polycom
Published By: Schneider Electric     Published Date: Jun 06, 2017
If not, you are increasing the risk for costly, unplanned downtime. However, despite the importance of having a reliable flow of electricity, over half of building owners rely on reactive maintenance programs to care for their equipment. This means they wait until equipment fails completely before initiating corrective action, which is typically 3-4 times more costly than taking preventive measures. A good first step to go from being reactive to proactive is having a power system assessment performed to determine the current state and reliability of your electrical system. For more information on Power System Assessments, download our white paper, "Assessing the Health of a Facility's Electrical Power Distribution System".
Tags : 
electrical engineering services, electrical reliability, electrical risk assessment, power system assessment, risk assessment
    
Schneider Electric
Published By: ShoreTel     Published Date: Oct 26, 2012
Total cost of ownership is a key metric for assessing costs, benefits and risks of a UC solution, enabling organizations to properly evaluate competing solutions. This white paper examines the total cost of ownership measured in different ways.
Tags : 
shoretel, unified communications solutions, ucs, total cost of ownership, telecom, telecom solution, benchmarking, enterprise applications
    
ShoreTel
Published By: Akamai Technologies     Published Date: Apr 25, 2018
In September 2017, Akamai commissioned Forrester Consulting to examine how companies approach digital experience and digital security. A survey of over 350 IT executives around the world found that: Customer trust is at an all-time low and it’s hurting growth Executives are aware that customer trust is becoming critical to success Companies struggle to balance security with digital experience Failure to deliver on security impacts brand reputation, customer trust, and revenues This report, Drop A Pin At The Intersection Of Digital Experience And Security, shares insights into these findings and what sets top digital businesses apart.
Tags : 
digital, experience, security, executives, customer
    
Akamai Technologies
Published By: Venafi     Published Date: Aug 07, 2015
This paper reveals how not securing all of your keys and certificates enables cybercriminals to bypass controls like threat detection, data protection, firewalls, VPNs, DLP, privileged access, and authentication systems that you expect will mitigate threats.
Tags : 
security, protect keys, security controls, cyber-attacks, cybercriminals, threat detection, data protection, firewalls, authentication, protect digital certificates, reduce risks, access control, anti spam, anti spyware, anti virus, application security, disaster recovery, security management, security policies
    
Venafi
Published By: Iron Mountain     Published Date: Aug 28, 2014
This paper examines a new paradigm for Health Information and Records Management (HIRM) and provides practical guidance to help HIM professionals unwind paper records, offload the burden of low-value production work and lead the transition from traditional records management to an optimized HIRM model.
Tags : 
iron mountain, health information management, information governance, healthcare it, electronic health records, ehr, him, him professionals, hirm, records management
    
Iron Mountain
Published By: EMC Corporation     Published Date: Dec 19, 2014
The Magic Quadrant is an independent analysis of the integrated systems vendors. Gartner determined the vendor placement based on each company's ability to execute and completeness of vision. According to Gartner, VCE is cited as a leader in the leader's quadrant by having a solid track record, significant presence, strong vision and innovation, as well as a clear understanding of the market.
Tags : 
integrated systems vendors, vendor placement, innovation, presence, analysis, it management, enterprise applications
    
EMC Corporation
Published By: Jonckers     Published Date: Apr 11, 2011
In this whitepaper, we will discuss: 5 Important Questions to Ask Yourself to Determine Need; Supplier Dependency; Time to Market; Cost Tolerance; Risk and more!
Tags : 
jonckers, strategic sourcing, project timelines lsp, localization, project management, ad management, crm and sales tools, localization, machine translation, product development life cycle, pdlc)
    
Jonckers
Published By: Jonckers     Published Date: Apr 11, 2011
This case study examines Adobe's globalization efforts in transforming traditional practices to global content value chains and outlines how Adobe's been able to do it successfully.
Tags : 
jonckers, multilingual product content, value chain, machine translation, localization, adobe systems, global content value chain, gcvc
    
Jonckers
Published By: Red Hat Government     Published Date: Jul 21, 2011
An IDC executive report examines the future of cloud computing, focusing on design goals that support portability of applications and data, which will certainly avoid expensive and time-consuming fixes.
Tags : 
cloud computing, interoperability, red hat, open source, idc, enterprise linux, enterprise solutions, virtualization, linux, unix, redhat, government, governance
    
Red Hat Government
Published By: Possible EMC     Published Date: Dec 22, 2014
The Magic Quadrant is an independent analysis of the integrated systems vendors. Gartner determined the vendor placement based on each company's ability to execute and completeness of vision. According to Gartner, VCE is cited as a leader in the leader's quadrant by having a solid track record, significant presence, strong vision and innovation, as well as a clear understanding of the market.
Tags : 
integrated systems vendors, vendor placement, innovation, presence, analysis, it management, enterprise applications
    
Possible EMC
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.