response

Results 351 - 375 of 597Sort Results By: Published Date | Title | Company Name
Published By: Cisco     Published Date: Jan 29, 2009
For small and medium-sized businesses (SMBs), the impacts of a disaster can result in loss of or lack of access to data, applications, and work facilities. Those with disaster recovery plans in place fared much better than those without such contingency plans.
Tags : 
cisco, disaster preparedness, medium-sized businesses, smb, contingency plans, business continuity, recovery management, data protection, failover, points of failure, workforce continuity plan, disaster recovery plan, disaster response, voip
    
Cisco
Published By: Microsoft Dynamics CRM     Published Date: Mar 02, 2010
While the new generation of self-service applications for the Web and IVR is excellent, successful self-service programs will depend on giving customers choices and striking the right balance.
Tags : 
microsoft dynamics crm, contact call center, self-service application, ivr, interactive voice response, customer service interaction, live agent support, automated self-service, automation
    
Microsoft Dynamics CRM
Published By: IBM Software     Published Date: Feb 03, 2012
Read this in-depth Aberdeen Group report, based on responses from 117 executives of successful companies, to find out how best-in-class businesses are proactively managing these challenges. You'll learn these techniques for optimizing maintenance and operations-and more.
Tags : 
asset management, software, ibm, technology, operations, maintenance, optimization
    
IBM Software
Published By: IBM Software     Published Date: Sep 13, 2011
As marketing programs become more expensive, and response and conversion rates plummet, knowing your customers is key to maximizing the profitability of your direct marketing campaigns. View this brief video to learn how you can gain valuable insight into your customers' behaviors and more accurately predict how they will respond to your marketing efforts.
Tags : 
ibm, analytics toolkit, marketers, customer behavior, technology, profitability
    
IBM Software
Published By: SAS     Published Date: Apr 25, 2017
Reacting to our customer’s “moments of truth” will require unique, personalized responses in real time that transcend traditional marketing and span channels and devices. This is more than marketing maturity: it’s the new marketing imperative.
Tags : 
    
SAS
Published By: NetIQ     Published Date: Jul 27, 2011
In this on-demand webinar, John Kindervag, Senior Analyst at Forrester Research, defines "zero-trust architecture," outlines the 5 steps needed to make this model actionable, and explains how his clients are adopting a "zero-trust architecture."
Tags : 
zero trust, netiq, advanced threats, apt prevention, cybercrime, incident response, network analysis and visibility, network forensics, network security monitoring, situational awareness, threat geek, threat intelligence, threat mitigation, enterprise, networks, data, kindervag, forrester, architecture
    
NetIQ
Published By: IBM Cloud Business     Published Date: Jul 12, 2011
Get under the hood: This technical note describes how to transform XML response into a JavaT-usable response by creating Plain Old Java Objects (POJOs) and calling JAXB's unmarshal method. Simplify how to send requests to create new instances based on images that request parameters from Java classes.
Tags : 
ibm corp., java, programming languages, software development, software/web development
    
IBM Cloud Business
Published By: IBM Unica     Published Date: Feb 09, 2012
Download this white paper to learn how forward-thinking organizations are deploying real-time marketing strategies to generate offers based on deep customer profiles, transaction histories, and other rich, real-time context.
Tags : 
ibm, real-time, marketing, customer satisfaction, response rates, real-time content, marketing research, marketing solutions
    
IBM Unica
Published By: TeamQuest     Published Date: Mar 28, 2013
Is Virtualized IT Stalled On Delivering Performance? Read this white paper to discover some solutions that help address performance problems head-on.
Tags : 
virtualized it, teamquest, deliverying performance, response time, applications, performance
    
TeamQuest
Published By: IBM     Published Date: Aug 08, 2012
While economic recovery is clearly in process, your capital and operational budgets are still extremely tight. At the same time, your maintenance organization is being pressured to take a stance of zero tolerance toward safety incidents while reducing maintenance costs and minimizing asset downtime. Read this in-depth Aberdeen Group report, based on responses from 117 executives of successful companies, to find out how best-in-class businesses are proactively managing these challenges. You'll learn these techniques for optimizing maintenance and operations-and more: creating a culture of collaboration among teams across your enterprise; empowering decision makers with appropriate, highly accurate metrics; and leveraging predictive management and analytics to manage assets throughout their life cycle.
Tags : 
ibm, technology, software, asset performance management, economic recovery, operational budgets, capital, asset management, maintenance cost
    
IBM
Published By: IBM     Published Date: Jan 09, 2013
Today's office is everywhere. Remote devices have created a 24/7, instantaneous response, work environment. Challenging economic times have facilitated a do more with less corporate mentality.
Tags : 
experience, employee, web experiences, simplify, ibm intranet experience suite
    
IBM
Published By: SAP     Published Date: Jul 17, 2012
Although IDC is expecting worldwide spending on business analytics software to be $33 billion in 2012, technology is only part of the story. The growing demand for faster response and deeper business insight is forcing companies to adopt a more pervasive approach to business intelligence (BI) that supports evidence-based decision making. Higher BI and analytics competency and pervasiveness are achieved when organizational culture, business processes, and technologies are designed and implemented with the goal of improving or automating all strategic, operational, and tactical decision making capabilities of all stakeholders. Access this paper to learn essential best practices for creating a solid BI and analytics strategy.
Tags : 
sap, best practices, business intelligence, analytics strategy, technology
    
SAP
Published By: CDW     Published Date: Jan 15, 2016
A growing number of organizations are realizing the benefits of mobile devices, including increased productivity, enhanced efficiency and speedier response times. Yet while the use of mobile devices typically leads to lower costs and additional revenue opportunities, it also brings challenges associated with device and application procurement, data connections, service costs, content management and — most important — security.
Tags : 
cdw, effective mobile policy, mobile devices, revenue opportunities, application procurement
    
CDW
Published By: Polycom     Published Date: Apr 30, 2013
Wearable operational video (such as helmet cams), mobile cameras and sensors, and other visual technologies can provide crucial intelligence, which then can be gathered, communicated to personnel in disparate locations, and integrated to enable unified collaboration for public security responses. The possibility is emerging for a new generation of video applications that will enhance public security and disaster management.
Tags : 
videoconferencing, telepresence, video application, real time video, intelligence, security, crisis management
    
Polycom
Published By: Dell SecureWorks     Published Date: Sep 13, 2013
Accelerating Incident Response: How Integrated Services Reduce Risk and the Impact of a Security Breach
Tags : 
dell, dell secureworks, security breach, incident response
    
Dell SecureWorks
Published By: IBM     Published Date: Jun 20, 2013
The global financial crisis of 2008 still reverberates today. Sluggish economic growth, stricter regulatory requirements and rapidly changing consumer behavior are placing unprecedented demands on the banking industry. In recent years, banks – particularly those with substantial retail operations – have relied on the lethargy of their customers to maintain their business. Customer loyalty has been based more on proximity of local branches and convenience of ATM networks than the quality of customer care or products and services priced and tailored to a bank’s best customers. In response to the financial crisis, banks have focused on wringing complexity and costs from their systems – exacerbated by mergers and acquisitions – while dealing with new and tighter regulations. Yet, their traditional “one-size-fits-all” mass-marketing approach to customers has remained constant.
Tags : 
customer-centric, increase revenue, relationships, operations
    
IBM
Published By: Box     Published Date: Jan 16, 2015
Looking for the right Flash Array for you? Tired of all data being treated the same but want to save time and budget? Flash storage is helping to address the latency inherent with disk drives, enabling you to virtualize more, and reduce application response times. It's an inescapable fact that the $/GB of flash is much higher than disk drives. So why do the majority of storage vendors indiscriminately accelerate all data, regardless of its value to your business? All-flash arrays waste money by storing non-critical data in flash, and hybrid arrays can't control whether mission-critical or non-critical data accesses flash, leading to unpredictable performance. So what do you do to find a solution that addresses both of these issues? Download now and see NexGen's approach to value-driven data management. Make it simple to control what data is stored in flash and affordably tailor application performance to match your organizations priorities now!
Tags : 
nexgen, hybrid, flash, cisco, nexus, vmware
    
Box
Published By: ThreatTrack Security     Published Date: May 21, 2015
This report provides a 360 degree view of organizations' security threats, response plans, processes, and investments. More than 800 security decision makers and practitioners were surveyed in December 2014 across North America and Europe.
Tags : 
cyberthreat, security, malware, defense
    
ThreatTrack Security
Published By: ThreatTrack Security     Published Date: May 21, 2015
Download this eBook to learn how ThreatSecure can detect active advanced attacks and help increase the effectiveness of security and incident response teams.
Tags : 
advanced protection, cyberthreat, security, incident response team, threatsecure
    
ThreatTrack Security
Published By: Cherwell Software     Published Date: Jan 28, 2019
Leading Cancer Center Implements Lean Service Desk to Provide Vital Support to Medical Staff Learn how the IT team at Seattle Cancer Care Alliance built a brand new service desk from scratch in just five months. Key improvements include significant time savings via quick and easy workflow automation; faster issue resolution and response times due to real-time dashboards; and a new culture of continuous improvement surrounding the implementation of lean methodologies and ITSM best practices.
Tags : 
    
Cherwell Software
Published By: QuickPivot     Published Date: Aug 26, 2015
Direct mail creates opportunities that old time direct marketers never imagined.
Tags : 
direct mail, infrastructure, data, response rate
    
QuickPivot
Published By: Polycom     Published Date: Jun 29, 2017
Law firms are under increasing pressure to respond quickly – often within hours – to client demands. Failure to increase agility can result in costly client churn, but law firms are often ill-equipped to be so nimble. As a result, it may be time to consider a technology that has been proven integral to law firms around the world - video collaboration. In under 30 minutes, we'll explain: Common use cases for video collaboration - going way beyond team meetings to the tasks at the heart of practicing law The types of solutions deployed - if you think an expensive, wall-mounted, on premise solution is your only option, you may be surprised by what's available From the meeting room to the courtroom - hear how a this technology is proliferating the courtroom and how the best lawyers will be equipped to take full advantage
Tags : 
video collaboration, law technology, client satisfaction, response time
    
Polycom
Published By: LogRhythm     Published Date: Feb 22, 2018
Some organizations have formal security operations centers (SOCs). Formal 24x7 SOCs are tightly secured areas where teams of dedicated analysts carefully monitor for threats around the clock, every day of the year. The analysts are checking their organization’s enterprise security controls to identify possible signs of intrusion and compromise that may require a response by the organization’s incident responders.
Tags : 
    
LogRhythm
Published By: LogRhythm     Published Date: Feb 22, 2018
Security and risk management leaders are implementing and expanding SIEM to improve early targeted attack detection and response. Advanced users seek SIEM with advanced profiling, analytics and response features.
Tags : 
    
LogRhythm
Published By: CrowdStrike     Published Date: Nov 28, 2018
As damaging breaches continue to occur, more organizations are considering endpoint detection and response (EDR) solutions to address the incidents that aren't being handled adequately by their existing defenses. However, EDR solutions come in a wide variety of implementations and can vary significantly in scope and efficacy — choosing the best solution can be challenging. This white paper, “Endpoint Detection and Response: Automatic Protection Against Advanced Threats,” explains the importance of EDR, and describes how various approaches to EDR differ, providing guidance that can help you choose the product that's right for your organization. Read this white paper to learn: • What makes EDR such a valuable addition to an organization's security arsenal and why finding the right approach is critical • How the “EDR maturity model” can help you accurately evaluate vendor claims and choose the solution that best fits your organization’s needs • How the CrowdStrike® EDR solution empowers
Tags : 
    
CrowdStrike
Start   Previous    8 9 10 11 12 13 14 15 16 17 18 19 20 21 22    Next    End
Search      
Already a subscriber? Log in here
Please note you must now log in with your email address and password.