identify

Results 176 - 200 of 1100Sort Results By: Published Date | Title | Company Name
Published By: Optimizely     Published Date: Apr 06, 2018
Welcome to the conversion best practices toolkit from Optimizely! You’re already one step closer to delivering meaningful digital experiences and turning prospects into customers. In an increasingly competitive landscape where customers demand more from their digital interactions with companies across a growing number of communication channels, customer acquisition can be a big challenge. In this toolkit, you’ll find a variety of resources aimed at helping you identify conversion optimization opportunities and acquire new customers with greater efficiency.
Tags : 
    
Optimizely
Published By: Workday UK     Published Date: Jan 31, 2020
"Align data and analytics with your digital strategy. Successfully incorporating data and analytics (D&A) into your digital strategy can be a struggle. If D&A investments seem to fall short of expected results and you're having trouble knowing which investments to make, you're not alone. CIOs and CDOs will have to make data-driven decisions to create efficient D&A platforms. This report from Gartner can help. Read it to learn how you can: • Use decision-making models to choose D&A investments • Collaborate with digital business stakeholders • Identify your organisation's data and analytics needs"
Tags : 
    
Workday UK
Published By: JBoss Developer     Published Date: Oct 21, 2016
Markets constantly test organizations with shifting customer expectations and competitors seeking to provide better value at a lower cost. This tension is the catalyst that continually pushes organizations to search for ways to improve their services, improve the speed which they deliver value to their customers, enable employees to get more done with less administrative overhead, and most importantly, to constantly grow by generating more revenue. This is the basis of BPM, to be able to identify and capture processes in an organization to create repeatable, measureable and consistent execution of goals to drive their business forward.
Tags : 
open source, stp, brms, kpi, management
    
JBoss Developer
Published By: Intel     Published Date: Jun 12, 2020
The world as we know it is braced for disruptions, thanks to the COVID-19 outbreak. Social distancing and temperature screenings are very much a part of our daily lives now. As industries look to get back on their feet, it’s crucial that they meet these public health requirements to keep their workforce safe and protected. With CoVIPS, developed by LivNSense and powered by Intel® technology, you can upgrade your workplace for the current times and beyond. The IoT-based platform can detect social distancing breaches and identify employees at PoE, all in real-time. It also features a thermal camera-based temperature detection and can enforce PPE compliance based on worker profiles. Discover how you can efficiently track and ensure the safety and security of your industrial workforce with CoVIPS.
Tags : 
    
Intel
Published By: Proofpoint     Published Date: Aug 10, 2017
BEC attacks are a growing threat to businesses because they prey on vulnerabilities that can’t be patched: people. That’s why employee training, financial controls, and especially technology are the keys to a strong defense and timely response. You need need a solution that does not solely depend on reputation and basic email filtering. With granular controls, advanced email solutions can identify and quarantine impostor emails before they reach an employee’s inbox.
Tags : 
security awareness, social engineering, impostor emails, email flags, financial institution, bec threats, suspicious messages
    
Proofpoint
Published By: Proofpoint     Published Date: Aug 10, 2017
With data breaches at an all-time high, the time is now for organisations to identify and protect all personal EU data, and drive towards compliance to the GDPR–failure to do so will lead to significant disruption of business. What’s more, adhering to a compliance and standards based framework can ultimately help the business attract and retain more customers. In the case of the GDPR, compliance demonstrates the organisation’s investments in security, privacy, and customer care.
Tags : 
data audit, eu data, vendor risk, organisation, technology, archive management, messaging, content protection
    
Proofpoint
Published By: IBM APAC     Published Date: Jun 24, 2019
Threats have become a board-level concern and it’s fueled a spending spree in security products over the last two years. So why don’t companies feel more prepared to identify and respond to these threats? For many organizations, disconnected point solutions have increased the complexity of their security environments, making it difficult to respond quickly to threats – and nearly impossible to demonstrate ROI. IBM Security commissioned Forrester Consulting to evaluate the state of security complexity and the effect it is having on security efficiency and effectiveness. In the study, many respondents reported taking steps to simplify their security environments and the results are promising. Fill out this form to read more about it.
Tags : 
    
IBM APAC
Published By: AppDynamics     Published Date: Sep 20, 2017
A microservice architecture provides benefits in the areas of service isolation and deployment as well as independent scalability. These benefits lead to more rapid release cycles and better use of available resources. But a microservice architecture also presents a host of new challenges in both deployment as well as performance management. The benefits to microservices far outweigh their challenges and, by identifying them early, you can plan for and ensure that your adoption of a microservices architecture goes smoothly.
Tags : 
microservice, management, business transactions, hybrid cloud, docker, environment
    
AppDynamics
Published By: TIBCO Software     Published Date: Mar 17, 2020
Analyst firms Gartner, Inc. and Forrester are projecting accelerated data virtualization adoption for both first-time and expanded deployments. What are the use cases for this technology? At its Data and Analytics Summit in London in March 2018, Gartner answered this question by identifying 13 data virtualization use cases. This paper explores each of these use cases by: Identifying key requirements Showing how you can apply TIBCO® Data Virtualization to address these needs Listing the benefits you can expect when implementing TIBCO Data Virtualization for the use case
Tags : 
    
TIBCO Software
Published By: Schneider Electric     Published Date: Jun 18, 2020
Securing your digital ecosystem It's never been more clear. Building and executing a holistic cybersecurity strategy is an urgent business imperative and competitive one, not just a technology issue. But where do you begin? Discover good practices, with use cases, on ways to: -Strengthen digital trust -Identify ecosystem threats -Protect the end-to-end ecosystem -Detect and respond quickly -Recover and share lessons learned -Improve security at IT/OT convergence
Tags : 
cybersecurity, digitization, food and beverage, cyber threats, security, cyber risk
    
Schneider Electric
Published By: Schneider Electric     Published Date: Jun 18, 2020
Technology opens new gateways for understanding, managing, and improving connectivity, which helps businesses identify and respond to the critical need to be planet- and profitability-compatible. Technology has dramatically increased the effectiveness of modern business. Specifically, digitization and the interconnectivity it has spawned — the so-called Internet of Things (IoT) — are driving powerful new ways to achieve sustainability goals. Information collected through IoT technologies can yield new insights about how resources are used and lead to wider sharing of real-time information, facilitating both human and machine interpretations of these data. This paper will explore how technologies like IoT-enabled smart sensors enable companies to respond to four sustainability megatrends changing the modern business landscape, and how technology is giving organizations the license to set ambitious sustainability goals and make informed decisions to drive the highest planetary and profi
Tags : 
digitization, big data, iot, smart technology, food & beverage, sustainability
    
Schneider Electric
Published By: CA Mainframe     Published Date: Sep 12, 2008
The CA Automated Storage Optimization Mainframe Suite provides a best-practices-based and intelligent approach to SRM, delivering the tools to identify and classify your storage assets. Access this Technology Brief to understand how to maximize use of existing storage resources and ensures protection of business-critical applications and information.
Tags : 
srm, storage resource management, zos, z/os, ibm, ibm server, ca mainframe, mainframe
    
CA Mainframe
Published By: CA Mainframe     Published Date: Sep 12, 2008
Increased regulatory scrutiny on the protection levels afforded sensitive information by those that transact and process it is causing enterprises to improve mainframe security strategies. This entails proactively investigating exposures and implementing appropriate policies, processes and technologies, including those for data z/OS tape encryption. Read this Technology Brief created by CA to learn how to identify exposure points and through the use of Tape Encryption.
Tags : 
tape library, tape backup, tape encryption, backup, encryption, best practices, ca mainframe, mainframe
    
CA Mainframe
Published By: Success Factors     Published Date: Jul 08, 2014
Technology plays an integral role in enabling businesses to have access to insightful analytics. By providing metrics on core workforce facts, workforce financials, productivity and performance, talent development and succession and human capital risk, companies are able to identify those 10- 15 metrics most important to business goals. This will enable them to present the Board of Directors with a comprehensive and concise story of workforce capabilities. The best place, we suggest, is with expert, practical guidance. Download this informative resource.
Tags : 
success factors, workforce data, boardroom, metrics, workforce facts, workforce financials, hr metrics, tecnhology
    
Success Factors
Published By: Oracle     Published Date: Oct 30, 2017
"Time is money. If you are not able to quickly make the right moves based on timely, accurate financial information, then you will lose your position in the marketplace to those companies who can. Download this guide to see how to simplify and streamline financial processes in order to identify underperforming lines of business, perform accurate cash flow projects, support expansion into new markets, and much more. "
Tags : 
simplify, streamline, financial processes, cash flow, expansion
    
Oracle
Published By: NetApp     Published Date: Nov 20, 2014
Learn how storage environments can help address high-availability needs and identify critical features necessary for businesses to meet the bar for six 9s availability. You’ll also see how two customers have leveraged NetApp storage solutions to meet their stringent requirements for uptime as they manage dynamic, high-growth businesses.
Tags : 
enterprise storage, storage solutions, requirements, high-growth business, storage
    
NetApp
Published By: Dyn     Published Date: Mar 30, 2016
IPM offers unparalleled visibility across the Internet allowing you the ability to optimize infrastructure costs, mitigate risk, and protect your revenue. Unlike APM and NPM which only provide visibility into your applications or internal network respectively, IPM provides a complete end-to-end view of the public Internet so you can: - Decide where to host content and applications for top performance - Determine the impact website partners, such as cloud providers and ISPs, have on web responsiveness - Identify optimal cloud hosts, NSPs, CDNs, and SaaS providers for Internet traffic, by region - Monitor and measure service provider performance and SLA compliance
Tags : 
dyn, internet performance management, online performance, ipm, apm, npm
    
Dyn
Published By: Monetate     Published Date: Sep 30, 2014
Personalization. It’s about the hottest topic out there for digital marketers. If you’re going to do it, though, you need to know with which customers you should start your personalization efforts. Which means you need to know which of your customers are most valuable—not always an easy task. This white paper will teach you how to identify your most valuable customers, create a personalized experience for them, optimize that experience, and begin the process again with another customer segment. Also included are three real-life examples of companies that found their most valuable customers, focused on personalizing their relationships with them, and drove additional business, increased customer loyalty and improved customer retention.
Tags : 
personalization, customer retention, customer loyalty, digital marketers
    
Monetate
Published By: Dell     Published Date: Feb 02, 2018
This paper is organized into sections describing the importance of IT infrastructure security and presents essential criteria IT leaders should use to identify end-to-end server security. 1. Trust and the Modern IT Infrastructure Why you should be concerned about server security (or the lack thereof). 2. End-to-end Server Security How Dell EMC defines end-to-end server security. In this section, we also provide crucial characteristics business and IT leaders can use to classify prospective server vendors. 3. Key Security Criteria for the Modern IT Infrastructure The security questions every IT leader should ask of their server vendor before embarking on an IT transformation. 4. Conclusion & Additional Resources The objective of this paper is to highlight the Dell EMC comprehensive approach to server security. PowerEdge servers come with security built-in, not bolted-on. Using a Cyber Resilient Architecture, Dell EMC commits to end-to-end server security on all PowerEdge servers.
Tags : 
    
Dell
Published By: CA Technologies     Published Date: Jun 04, 2015
To support digital transformation imperatives, organizations are increasingly exploring DevOps style approaches for the continuous delivery of high quality software. Unfortunately, however, many enterprises remain burdened with accumulated technical debt and legacy wasteful practices – waste that can quickly inhibit the flow of value to customers and the business. Lean thinking provides organizations with a framework by which to quickly identify all forms of waste impacting the flow of value, which DevOps practitioners can apply in a software development context to quickly pinpoint and eliminate 8 elements of waste across people, process and technology dimensions. This paper presents the 8 elements of waste framework, strategies needed to identify and eliminate waste, and the metrics needed to measure effectiveness.
Tags : 
    
CA Technologies
Published By: CA Technologies     Published Date: Jun 04, 2015
This paper presents the 8 elements of waste framework, strategies needed to identify and eliminate waste, and the metrics needed to measure effectiveness.
Tags : 
    
CA Technologies
Published By: LifeLock     Published Date: Mar 02, 2015
Find out why LifeLock identify theft protection is the right choice for your business with this quick guide to our technology, leadership team, marketing strategy and more.
Tags : 
    
LifeLock
Published By: SAP     Published Date: Jun 04, 2015
Read this eBook to learn how SuccessFactors offers a full suite of talent solutions to help you: • Attract, engage, select, and hire the right talent • Get your new hires up to speed in record time • Provide continuous performance management • Reward and retain your top talent • Identify and anticipate talent gaps • Provide learning anywhere, any time • Get content as a service • Harness the power of collaboration
Tags : 
    
SAP
Published By: SAP     Published Date: Jun 12, 2015
Read this white paper to learn how organizations are taking action on succession management to avoid nightmare situations.
Tags : 
    
SAP
Published By: Dell EMC     Published Date: Aug 22, 2017
Identifying the benefits, costs, and risks associated with an Isilon implementation, Forrester interviewed several customers with experience using Isilon. Dell EMC Isilon is a scale-out NAS platform that enables organizations to store, manage, and analyze unstructured data. Isilon clusters are composed of different node types that can scale up to 68 petabytes (PB) in a single cluster while maintaining management simplicity. Isilon clusters can also scale to edge locations and the cloud
Tags : 
    
Dell EMC
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.