overview

Results 26 - 50 of 679Sort Results By: Published Date | Title | Company Name
Published By: CodeBaby     Published Date: Nov 27, 2012
Healthcare organizations are integrating intelligent virtual assistants to enhance online experience and reduce costs. This guide overviews the capabilities and benefits of using virtual assistants to engage, optimize, and complement existing service channels.
Tags : 
online self-service, customer experience, customer service, intelligent virtual assistants, conversion optimization, tech support, crm, web self-service, contact center management, virtual agent, knowledgebase, ecommerce, mcommerce, live chat, website optimization, multi-channel branding
    
CodeBaby
Published By: Scalebase     Published Date: Mar 08, 2013
Technology analyst firm 451 Research offers a brief overview of ScaleBase’s Data Traffic Manager software for dramatic scaling of MySQL databases beyond the capabilities of MySQL 5.6.
Tags : 
shard, cluster, high availability, failover, mariadb, mysql, read/write, scalability, capacity planning, scalebase, 451 group overview, research
    
Scalebase
Published By: AlienVault     Published Date: Oct 20, 2017
In this report, you'll read 451 Research's review of AlienVault USM Anywhere. USM Anywhere is AlienVault's offering of centralized security information and event management for resource-constrained organizations embracing Amazon and Microsoft cloud architectures. The report covers the following areas: • 451's overview of AlienVault USM Anywhere • A brief look at the history of AlienVault • How USM Anywhere compares to competitors • A SWOT analysis of USM Anywhere Download the report now to learn more about AlienVault's unique approach to threat detection in cloud and hybrid cloud environments
Tags : 
    
AlienVault
Published By: Sigaba     Published Date: Aug 21, 2009
This white paper reviews the five most common current approaches to messaging security. While the five approaches discussed here are not the comprehensive list of available solutions, they are the basis for most variations of messaging security solutions available today.
Tags : 
email security, security management, security policies, secure instant messaging, intranets, messaging, sigaba
    
Sigaba
Published By: DNN Corp.     Published Date: Jun 30, 2014
This planning checklist offers an overview of the 5 most important elements to consider when planning a customer support community.
Tags : 
dnn, online communities, marketing communities, community management, email marketing
    
DNN Corp.
Published By: BrightEdge     Published Date: Apr 15, 2013
Download this whitepaper for an overview of how BrightEdge and Facebook are working together to target the "Social SEO" opportunity. This paper outlines simple and highly effective ways to address the Social SEO opportunity.
Tags : 
enterprise seo, content optimization, enterprise seo management, search engine optimization, seo, seo blog, seo careers, seo managment, seo platform, seo platform software, seo software, seo success stories, seo white paper, seo white papers, seo case study, seo case studies, seo technology, seo tool, seo tools, seo tracking
    
BrightEdge
Published By: SAS     Published Date: Mar 01, 2012
This white paper provides a top-level overview explaining what business analytics can do for your company - and the 8 key steps to accelerating product innovation, optimizing pricing and discovering drivers of financial performance.
Tags : 
sas, analytics, business analytics, business intelligence, customer intelligence, data management, fraud & financial crimes, high-performance analytics, it management, ondemand solutions, performance management, risk management, sas® 9.3, supply chain intelligence, sustainability management
    
SAS
Published By: MuleSoft     Published Date: Nov 27, 2018
Traditional insurers are no longer safe with insurtechs challenging incumbents to rethink their business and operating models. This mass disruption creates increased pressure on IT to deliver intrinsic business value, including new services, customer touchpoints, and experiences. Successful insurance transformation requires rethinking the traditional IT operating model to allow IT to focus on creating reusable assets that empower lines of business. Doing so increases IT’s delivery capacity, making businesses more agile. Read this whitepaper to learn: An overview of the challenges insurers are facing in the industry. How a new IT operating model – API-led connectivity – allows IT teams to unlock data from legacy systems and drive reuse across the enterprise. Strategies for using APIs to create a single view of the customer and build connected customer experiences.
Tags : 
    
MuleSoft
Published By: Adverity     Published Date: Jun 15, 2018
A Beginner's Guide to Marketing Data Analytics Marketing Data is big & highly fragmented Big data is messy. It’s scattered across platforms, it’s diverse, and in its raw form, it’s practically unusable. We know, it’s a painful truth. The fact of the matter is that having a lot of data doesn’t necessarily mean that you have the answers to your most pressing questions. Looking for the most relevant bits in your pile of big data is like looking for a needle in a haystack. But don't you worry - we are here to help. This handy e-book will give you a short overview what quality matters, why data is so important and what you need to pay attention to. Best thing is: getting this ebook is super easy. Just fill out the form to the right and voilá - your download is ready. Enjoy this read!
Tags : 
marketing business intelligence, saas marketing optimization, measuring marketing performance, roi analytics, automated report generator, performance based marketing, online marketing data, roi metrics, marketing reports, roi reporting, reporting generator, automated reporting tool, marketing dashboard, marketing data, marketing intelligence, report software, marketing reporting, marketing metrics, performance marketing, marketing performance
    
Adverity
Published By: Hewlett Packard Enterprise     Published Date: Jul 12, 2018
Discover how HPE Advisory Consulting Services consolidates and modernizes workloads and technology siloes, simplifying administration, and improving automation. Learn how IT organizations can support on-demand IT services and enable DevOps, self-service IT and agile development practices, while reducing equipment and operating expenses. This HPE Blueprint provides them with an overview of the steps they need to consider to achieve this outcome. This is valuable information to the IT person, particularly when they don’t know where to begin.
Tags : 
    
Hewlett Packard Enterprise
Published By: Impact Radius     Published Date: Feb 13, 2015
Download this guide and learn: • The main concerns guiding purchasing decisions in the performance marketing space • A comprehensive overview of the major features offered in today’s marketplace • The differences between SaaS, affiliate network, and in-house solutions • Guidance in selecting a solution to fit your business objectives and marketing goals
Tags : 
    
Impact Radius
Published By: Ruckus Wireless     Published Date: Jul 11, 2018
In an era of "lean IT," the centralized management capabilities of cloud-managed Wi-Fi make it an attractive option to manage and maintain wireless LANs (WLANs) across multiple locations. The decision to move WLAN management to the cloud requires one key assurance: end-to-end security from user devices to the cloud. This means that user data must be protected over the WAN and in the data center. These security measures should not require on-staff WLAN security expertise to manage. And security measures should be largely transparent to users. This paper provides an overview of the security architecture of Ruckus Cloud Wi-Fi, as well as best practices for specific security scenarios.
Tags : 
    
Ruckus Wireless
Published By: Jamf     Published Date: Nov 05, 2018
There are no signs of Apple device growth slowing down in the enterprise. In fact, 3 out of 4 employees now choose an iPhone or iPad for their mobile device. Our guideon the basics of device management will help you enhance iPhone, iPad and iOS management skills by providing you with: • An introduction to iPhone, iPad and iOS management • Explanation of Apple services and programs available • Outline of lifecycle management stages • Insight for infrastructure planning • Overview of the industry-leading Apple management solution
Tags : 
    
Jamf
Published By: VMware     Published Date: Feb 24, 2017
With Windows 10, Microsoft introduces a consolidated operating system (OS) platform that changes how organizations treat the management of End-User Computing (EUC) environments. This new way of managing Windows is more closely aligned to the enterprise mobile management (EMM) based approaches found in mobile management tools today. This whitepaper provides an overview of how Windows management evolved from a rigid and disruptive PC-centric approach to one offering a flexible and light-touch model. It will also delve into the specific management technologies that Windows 10 introduces, as well as leveraging conventional Windows management tools that are in use today.
Tags : 
    
VMware
Published By: Adobe     Published Date: Mar 17, 2016
An electronic signature - also known as an “e-signature” - is a simple, legally-binding way to indicate consent or approval digitally. While legally valid and enforceable in nearly every industrialized country around the world, some countries may have different laws when it comes to e-signatures.
Tags : 
adobe, electronic signature, digital signature
    
Adobe
Published By: McAfee     Published Date: Mar 31, 2017
This e-book provides an overview of private cloud models, the underlying technologies that enable successful deployments and the security challenges—and benefits—of deploying a private cloud. Finally, it discusses security technologies and approaches that maximize protection, minimize risk and leverage the private cloud to drive innovation.
Tags : 
cloud security, cloud, private cloud, security technology
    
McAfee
Published By: McAfee     Published Date: Mar 31, 2017
This e-book provides an overview of private cloud models, the underlying technologies that enable successful deployments and the security challenges—and benefits—of deploying a private cloud. Finally, it discusses security technologies and approaches that maximize protection, minimize risk and leverage the private cloud to drive innovation.
Tags : 
cloud security, cloud, private cloud, security technology
    
McAfee
Published By: McAfee     Published Date: Mar 31, 2017
This e-book provides an overview of private cloud models, the underlying technologies that enable successful deployments and the security challenges—and benefits—of deploying a private cloud. Finally, itdiscusses security technologies and approaches that maximize protection, minimize risk and leverage the private cloud to drive innovation.
Tags : 
cloud security, cloud, private cloud, security technology
    
McAfee
Published By: Sunbelt Software     Published Date: Mar 13, 2008
Messaging archiving can help organizations solve all of these problems and can satisfy a wide range of legal compliance, regulatory, storage management, knowledge management and other problems. This Osterman Research white paper discusses the several reasons to implement a messaging archiving system and provide an overview of Sunbelt Software’s offering focused squarely on the archiving space.
Tags : 
email archiving, pst, archive, archiving, compliance, records storage, sunbelt
    
Sunbelt Software
Published By: New Relic     Published Date: Apr 07, 2015
Whether you’ve already moved to the Cloud or are getting ready to migrate, this document will walk you through everything you need to start improving the performance of your Azure applications with New Relic. From instructions to get started, a basic feature overview, to Azure monitoring best practices, this guide is full of useful information for New Relic newbies.
Tags : 
    
New Relic
Published By: Okta     Published Date: May 09, 2016
With a secure foundation in place to manage internal IT, many IT leaders are thinking about a foundation for the entire business. In the new world of mobile apps, cloud services, and the Internet of Everything, people, processes, data, and devices are all converging to reshape how day-to-day business is done. Companies are reaching out to customers and partners—and even intelligent objects like connected cars and monitoring systems—and modifying the products and services they bring to market as a result. To an unprecedented degree, the future of an enterprise lies in the hands of the CIO and her IT staff who orchestrate these connections and act on the benefits they bring. IT leaders are finding new opportunities in an era of digital disruption. This executive brief provides a quick overview of how they are driving growth and increasing efficiency by securely connecting the digital enterprise with customers, partners, suppliers and distributors.
Tags : 
    
Okta
Published By: Okta     Published Date: Jul 19, 2016
With a secure foundation in place to manage internal IT, many IT leaders are thinking about a foundation for the entire business. In the new world of mobile apps, cloud services, and the Internet of Everything, people, processes, data, and devices are all converging to reshape how day-to-day business is done. Companies are reaching out to customers and partners—and even intelligent objects like connected cars and monitoring systems—and modifying the products and services they bring to market as a result. To an unprecedented degree, the future of an enterprise lies in the hands of the CIO and her IT staff who orchestrate these connections and act on the benefits they bring. IT leaders are finding new opportunities in an era of digital disruption. This executive brief provides a quick overview of how they are driving growth and increasing efficiency by securely connecting the digital enterprise with customers, partners, suppliers and distributors.
Tags : 
identity, idaas, iam, identity lifecycle management, mobile, provisioning, active directory, security, cloud applications
    
Okta
Published By: Intel Corp.     Published Date: Nov 21, 2017
This whitepaper will provide an overview into Artificial Intelligence, as the next big wave in computing.
Tags : 
    
Intel Corp.
Published By: ProjectLocker     Published Date: Aug 21, 2009
This paper provides a brief overview of Wiki and its emerging importance in the business marketplace. It describes ways in which many major corporations are taking advantage of this new social software to transform their business practices, and lays out a short set of guidelines to consider before implementing your own Wiki solution.
Tags : 
collaboration, corporate portals, information management, intranets, messaging, wiki, wikipedia, social marketing, project locker, projectlocker
    
ProjectLocker
Published By: Oracle Corporation     Published Date: Apr 01, 2013
Discover how to accelerate database performance, handle change and growth in scalable, incremental steps, and deliver mission-critical data availability and protection with this unique commercial solution.
Tags : 
database, oracle, storage, data, data warehousing
    
Oracle Corporation
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      
Already a subscriber? Log in here
Please note you must now log in with your email address and password.