pinpoint

Results 26 - 50 of 53Sort Results By: Published Date | Title | Company Name
Published By: Riverbed     Published Date: Feb 26, 2015
The Riverbed SteelCentral network performance management suite of products provides considerable advantages over those of JDSU Network Instruments because of its breadth, depth and ease of use to quickly understand and pinpoint the root cause of performance problems.
Tags : 
network performance management, performance issues, performance management, end-user experience management, cloud computing, mobile device, network management, network performance
    
Riverbed
Published By: Entrust Datacard     Published Date: Jan 16, 2015
Certain types of diseases seem to only occur within certain national boundaries. Malware is not one of them. A formidable threat to enterprise security since the 1980s, cybercrime is a truly global phenomenon, and no business is safe from its reach. A brief look at the history of malware attacks reveals a degree of variance within the virtual threat landscape that makes pinpointing and stopping such attacks extremely difficult. As the historic virus examples illustrate, the malware problem has been and will continue to be a constant threat. Since an offensive line against cybercrime is not possible, enterprises need to prepare the best defense they can.
Tags : 
entrust, malware, history, threat, concern, virus, sql, stuxnet
    
Entrust Datacard
Published By: IBM     Published Date: Jun 25, 2012
Explore the four stages to transforming an organization from a traditional marketing communicator to a customer-centric communicator.
Tags : 
retail, ibm, marketing, pinpoint, customer service, offer, online, digital
    
IBM
Published By: HP     Published Date: Jan 20, 2015
Security breaches can happen anywhere in an organization, and having the ability to analyze any form of data can give you the edge against fraud, theft, and infiltration by pinpointing abnormal behavior patterns. Understanding your security vulnerabilities requires rapid, deep analytics against business data, machine data, and unstructured human information.
Tags : 
big data, hp haven, scalable, secure data platform, ecosystem, security
    
HP
Published By: Ciena     Published Date: Jun 12, 2017
Is your infrastructure, bandwidth, and scalability getting a top grade? How much bandwidth is enough and what are your options? We'll make sure you know.
Tags : 
network bandwidth, wan, bandwidth security, dark fiber optics, education network security, self-provisioned network, integrated access device, e-rate
    
Ciena
Published By: Ciena     Published Date: Jun 12, 2017
What if operators could upgrade their R&E networks to 100G for 50 percent less CAPEX investment and extend the life of the existing routers, while actually simplifying the architecture to enable lower operational costs? Download our app note to learn how.
Tags : 
o-vpn, integrated access device, pinpoint, z-series, ciena 6500, ciena 5430, 6500-7, emotr
    
Ciena
Published By: Intouch Insight     Published Date: Jul 23, 2018
Customer experience (CX) is a top priority for most retailers, but many struggle to pinpoint where the brand vision for CX is not being delivered - especially at the individual store level.
Tags : 
    
Intouch Insight
Published By: Oracle     Published Date: Dec 13, 2011
Watch this video to learn how to pinpoint the most important metrics you can easily track and manage to increase revenue.
Tags : 
on demand, oracle on demand, instant gratification, crm, customer relationship management, deployment, saas, software-as-service
    
Oracle
Published By: Javelin Strategy & Research     Published Date: Jul 02, 2008
Javelin Strategy & Research has released a study covering data breach victims, which highlights the acute awareness among consumers about data security and the significant implications security breaches represent to businesses once consumer trust is compromised. Read this report, which also reveals Javelin's recommendations to institutions to address consumer security concerns and expectations in the event of a data breach.
Tags : 
javelin, debix, customer service, customer experience, damage control, data breach, security breach, network security
    
Javelin Strategy & Research
Published By: Flexera     Published Date: Feb 19, 2019
Driven by easy-to-consume infrastructure and services, the adoption of public cloud surged in 2018. As a result, enterprises are seeking cost management solutions tools to curb waste, optimize cloud costs, and increase transparency. However, businesses must also factor the cost of licensed software into this equation, otherwise they may leave significant savings on the table. The ""Software License Management as a Critical Part of Cloud Cost Optimization"" white paper by industry analyst Enterprise Management Associates explores the consequences of not considering software license costs when deploying in the cloud and pinpoints why it occurs. Download the white paper to learn how.
Tags : 
    
Flexera
Published By: Microsoft Office 365     Published Date: Mar 01, 2018
Digital disruption is imminent in every industry The real question is: how do you adopt technology in a way that optimizes your existing processes and transforms your organization? Of course, no two businesses are the same, and transformation will look different for each business. That's why Microsoft has pinpointed a pattern to success in digital transformation across companies - both small and large. These companies all used technology to achieve fundamental goals that ladder up to four principles: Engage customers Empower employees Optimize business processes and operations Transform products through digital content
Tags : 
    
Microsoft Office 365
Published By: Oracle Primavera     Published Date: Oct 09, 2015
As the oil and gas pipeline industry grapples with change at every level including increasing pipeline operations and expanding regulatory oversight infrastructure cost savings and operating efficiencies have become more important than ever. Both pipeline operators and contractors can benefit from utilizing EPPM solutions to help them pinpoint the best strategies to develop and implement projects from conception through execution to end game thereby helping to reduce risk and manage cost. In the end, its all about smartly using an approach, such as EPPM solutions, like those from Oracle, to help pipeline operators and contractors reduce costs at the project, portfolio, and enterprise levels through the project lifecycle. The midstream companies that are able to implement the best approach to managing risk to their operations in the most cost - effective way will be the ones to best weather another tumultuous decade to come for the oil and gas industry.
Tags : 
oracle, oil and gas, oil and gas pipeline industry, cost savings, eppm solutions, midstream oil industry, project management, project portfolio management
    
Oracle Primavera
Published By: IBM     Published Date: Feb 11, 2015
With the introduction of sophisticated threats such as advanced phishing and malware, authentication can become less effective. Authentication methods can be bypassed by fraudsters and traditional risk-based authentication solutions can cause many users to be unnecessarily challenged and disrupted, yet do not manage to reduce fraud. As fraud rises, there is a strong need for fraud tools that can detect account takeover and fraudulent transactions. IBM Security Trusteer Pinpoint Criminal Detection software offers a next generation approach that helps address the challenges of traditional risk engines.
Tags : 
criminal fraud detection, authentication methods, ibm, criminal detection software, security, software development, business intelligence, risk management
    
IBM
Published By: IBM     Published Date: Sep 08, 2016
Read this white paper to discover how predictive analytics and cognitive commerce make it possible to get instant access to integrated information and actionable insights so you can deliver superior-and profitable-interactions with customers. You'll learn: What it takes to uncover hidden trends and explore relationships across disparate data sources using natural language queries Ways to use in-depth insight to create highly relevant campaigns and content that's aligned with individual customer behaviors and preferences How to take product recommendations to new levels of accuracy with pinpoint prediction and targeting
Tags : 
ibm, ecommerce, b2c, b2c ecommerce, commerce, data, business advisor, enterprise applications
    
IBM
Published By: IBM     Published Date: Dec 01, 2014
With the introduction of sophisticated threats such as advanced phishing and malware, authentication can become less effective. Authentication methods can be bypassed by fraudsters and traditional risk-based authentication solutions can cause many users to be unnecessarily challenged and disrupted, yet do not manage to reduce fraud. As fraud rises, there is a strong need for fraud tools that can detect account takeover and fraudulent transactions. IBM Security Trusteer Pinpoint Criminal Detection software offers a next generation approach that helps address the challenges of traditional risk engines.
Tags : 
fraud detection, cybercrime, cyber threat, malware, security, it management, knowledge management, enterprise applications
    
IBM
Published By: Esker     Published Date: Mar 18, 2016
You know how to run an effective AP operation - we're not here to lecture you. This field guide is simply a handy resource for pinpointing the pains in your AP process and exploring potential solutions to fix them. Expect to take home some best practices on how to: - Secure AP invoicing cost savings of up to 80% - Drastically reduce your rate of invoice exceptions - Gain significantly more early payment discounts - Simplify workflow for every AP stakeholder Download the Accounts Payable field guide to learn more!
Tags : 
esker, accounts payable, ap team, best practices, ap stakeholder, invoice exceptions, it management, enterprise applications
    
Esker
Published By: Clicktale     Published Date: Aug 06, 2015
Web site errors eat away at conversions, KPIs, ROI, and revenues. The key to catching elusive website errors? Focus on the users. In this new ClickTale white paper, learn to identify common user dropoff or abandonment behavior patterns which traditional tools simply cannot see. Once you pinpoint the errors themselves, you can assess their impact on user experience and conversions, and prioritize remediation.
Tags : 
website design, user experience, errors, web errors, digital customer experience, website elements, website layouts, web design
    
Clicktale
Published By: AlienVault     Published Date: Oct 21, 2014
While vulnerability assessments are an essential part of understanding your risk profile, it's simply not realistic to expect to eliminate all vulnerabilities from your environment. So, when your scan produces a long list of vulnerabilities, how do you prioritize which ones to remediate first? By data criticality? CVSS score? Asset value? Patch availability? Without understanding the context of the vulnerable systems on your network, you may waste time checking things off the list without really improving security. Join AlienVault for this session to learn: The pros & cons of different types of vulnerability scans - passive, active, authenticated, unauthenticated Vulnerability scores and how to interpret them Best practices for prioritizing vulnerability remediation How threat intelligence can help you pinpoint the vulnerabilities that matter most
Tags : 
vulnerability, management, risk, prioritize, profile, environment, data, asset value
    
AlienVault
Published By: IBM     Published Date: Sep 18, 2008
As energy costs rise, your data center is being taxed and your business is at stake. CIOs are realizing they need to redesign and build energy-efficient data centers. This article simplifies that complex task. It explains how to pinpoint your biggest energy costs and match hardware, software and facilities options so you can create a truly green data center.
Tags : 
ibm, ibm mmdg, energy, green, green computing, data center, datacenter, network management
    
IBM
Published By: SoftLanding Systems     Published Date: Nov 18, 2006
This no-nonsense primer covers the benefits and basic principles of good testing, offers practical advice for getting the most out of your testing efforts, and pinpoints several areas where automation will help you achieve the most cost-effective results.
Tags : 
software testing, quality assurance, application testing, test and measurement, database development, quality assurance, scripting, software testing
    
SoftLanding Systems
Published By: RenderX     Published Date: May 27, 2008
If you're producing transactional customer communications such as statements, invoices, policy notifications, or shipping documents, you probably already have some of the basic elements you need to start using TransPromo to take your marketing campaigns to the next level. TransPromo advertising in a PDF, PostScript and AFP electronic and print format can easily be injected into your application with RenderX.
Tags : 
transpromo, xml, xsl fo, pdf, postscript, afp, xep, direct advertising
    
RenderX
Published By: RenderX     Published Date: May 27, 2008
This paper presents a complete, generic framework for creating modifiable, flowing PDF forms, based on XML content and standard XSL templates. It requires no programming to generate dynamic, fillable, custom PDF forms by mapping some RenderX XSL FO extensions to form elements.
Tags : 
itext, xsl fo, pdf, pdf forms, dynamic forms, xep, xepwin, fill-able forms
    
RenderX
Published By: Pinpoint Systems Corporation     Published Date: Feb 07, 2011
Guidelines for Implementing an Enterprise Interactive Marketing Solution to Execute a Relationship Marketing Strategy
Tags : 
relationship, interactive, marketing, call centers, multi channel
    
Pinpoint Systems Corporation
Published By: Dell Storage     Published Date: Aug 14, 2012
Engagement with customers online has evolved from novelty to necessity, with an estimated $202 billion spent in 2011 and projected 10% growth to $327 billion in 2016, according to Forrester Research. Businesses are maneuvering to connect with the growing pool of online customers, but the move to eCommerce brings new security risks with the exchange of sensitive consumer information, including cardholder data and personally identifiable information that can enable identity theft. At stake is reputation of brand, ongoing access to merchant credit lines, and substantial penalties and remediation in the event of a breach. This white paper elucidates the aspects of PCI DSS (Payment Card Industry Data Security Standards) compliance that must be considered when choosing a secure environment for servers involved in eCommerce. Whether deciding to outsource or keep data hosting in-house, any company collecting, storing or transmitting customer cardholder data needs to be compliant, and this document helps pinpoint the specific concerns and standards a company should be aware of when choosing how to keep their data secure. Understanding requirements and best practices for security policies and procedures, physical safeguards, and security technologies is essential to establishing cardholder data security and meeting QSA and SAQ audit requirements.
Tags : 
pci, compliant, data, centers, engagement, connect, ecommerce, compliance
    
Dell Storage
Published By: CA Technologies     Published Date: Jun 04, 2015
"To support digital transformation imperatives, organizations are increasingly exploring DevOps style approaches for the continuous delivery of high quality software. Unfortunately, however, many enterprises remain burdened with accumulated technical debt and legacy wasteful practices waste that can quickly inhibit the flow of value to customers and the business. Lean thinking provides organizations with a framework by which to quickly identify all forms of waste impacting the flow of value, which DevOps practitioners can apply in a software development context to quickly pinpoint and eliminate 8 elements of waste across people, process and technology dimensions. This paper presents the 8 elements of waste framework, strategies needed to identify and eliminate waste, and the metrics needed to measure effectiveness.
Tags : 
    
CA Technologies
Start   Previous    1 2 3    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.