technologies

Results 226 - 250 of 3681Sort Results By: Published Date | Title | Company Name
Published By: Epicor     Published Date: Aug 28, 2018
By now, mobile technology has become an essential part of people’s lives. As both consumers and staff trend more toward a younger, digitally savvy demographic, lumber and building materials (LBM) businesses need to take advantage of mobile tools or risk losing to the competition. Mobile technologies can bring incredible benefits to LBM enterprises for delivery and dispatch, field sales, the selling floor, and the warehouse. To better help you seize the mobile advantage, Epicor has identified eight ways your LBM business can leverage mobile technologies to foster growth, including: • Serving your customers with the latest information • Serving your customers with timely, accurate deliveries • Driving revenue with increased efficiency • Streamlining operations Check out this Epicor tipsheet and discover how else your LBM business can benefit from mobile technologies.
Tags : 
lumber, building materials, lbm, erp, bistrack, lumber distributors
    
Epicor
Published By: HPE     Published Date: Feb 11, 2015
Emerging technologies, like mobile, big data and cloud, lead to increasingly complex and demanding workloads that can overwhelm outdated infrastructures. But by leveraging server and management systems designed for the technologies of today, Best-in-Class organizations can easily meet these demands and gain benefits.
Tags : 
    
HPE
Published By: Oracle     Published Date: Feb 24, 2015
30 seconds or less. The average length of time that consumers spend reading or listening to online marketing communications . Marketers today are now equipped with the strategies and technologies to better capture consumer attention. To do this, they need to orchestrate individualized customer experiences across the digital channels. Read on for a statistical profile of today’s distracted consumer, followed by actionable tips for effectively communicating and converting this new type of consumer.
Tags : 
oracle, marketing, consumers, attention, message, distractions, communications, conversions, expectations, profile, experiences, individual, brand advocates, interactions, technology
    
Oracle
Published By: Salesforce     Published Date: Nov 19, 2015
Based on responses from more than 1,100 adults who currently have investments, the research found the wave of millennials (ages 18-34) entering the market is not only putting pressure on financial advisors to use newer technologies in managing their money, but also pushing even Gen Xers (ages 35-54) and baby boomers (ages 55+) toward more modern financial tools, such as modeling on mobile devices or online portfolio rebalancing.
Tags : 
    
Salesforce
Published By: LogMeIn     Published Date: Mar 19, 2015
Support organizations are implementing new technologies and processes to better connect customers with technical support teams, and customer satisfaction is paramount. However, most organizations admit they're not proactively aligning their priorities with their customers’ expectations. Are the needs of the support team different from what customers want and expect? Recent research by HDI delves into the two groups’ expectations and priorities— according to support professionals—and explores how closely they're aligned. Download this white paper to learn more.
Tags : 
customer support, customer expectations, support technology, technical support
    
LogMeIn
Published By: Concur Technologies     Published Date: Oct 08, 2015
This report examines the strategic actions being taken by companies to enable the expense report that writes itself. It covers what is being done and how it affects the overall ability of companies to create the effortless expense report.
Tags : 
t&e, expense report, concur, reduce spending
    
Concur Technologies
Published By: Lenovo and Intel     Published Date: Jan 19, 2017
Nowhere is technology more important than in healthcare, where the integrity of devices, systems, and infrastructure ultimately impacts patient lives. When evaluating existing technologies or considering investment in new solutions, there are a number of key factors healthcare entities must take into account. With this checklist, we’ll help you: ? Identify common demands ? Get an easy-to-use technology evaluation checklist ? See an example of how to apply new technology solutions
Tags : 
lenovo, healthcare, infrastructure
    
Lenovo and Intel
Published By: AWS     Published Date: Sep 05, 2018
Big data alone does not guarantee better business decisions. Often that data needs to be moved and transformed so Insight Platforms can discern useful business intelligence. To deliver those results faster than traditional Extract, Transform, and Load (ETL) technologies, use Matillion ETL for Amazon Redshift. This cloud- native ETL/ELT offering, built specifically for Amazon Redshift, simplifies the process of loading and transforming data and can help reduce your development time. This white paper will focus on approaches that can help you maximize your investment in Amazon Redshift. Learn how the scalable, cloud- native architecture and fast, secure integrations can benefit your organization, and discover ways this cost- effective solution is designed with cloud computing in mind. In addition, we will explore how Matillion ETL and Amazon Redshift make it possible for you to automate data transformation directly in the data warehouse to deliver analytics and business intelligence (BI
Tags : 
    
AWS
Published By: Pega     Published Date: May 25, 2016
The shift to digital business continues to gain momentum with no signs easing anytime soon. Smart organizations realize this and are accelerating investments in projects that put digital technologies at the center of their business models. The new requirements of digital transformation are forcing a major change in how companies evaluate and deploy Business Process Management (BPM) platforms and services. In “The Forrester Wave™: BPM Platforms For Digital Business, Q4 2015” report, the research organization used a 31 criteria evaluation process identifying the 12 most significant software providers in the category. Download this Forrester Wave report and gain insight regarding how well each vendor fulfills the criteria and where they stand in relation to each other to help enterprise architecture (EA) professionals select the right partner to manage their business’ critical content.
Tags : 
digital business, technology, best practices, forrester, enterprise
    
Pega
Published By: Pega     Published Date: May 25, 2016
Customer insights professionals face the challenging task of delivering contextually relevant experiences across the customer life cycle. They need to work with their business technology counterparts to integrate enterprise marketing technologies that manage customer data, provide real-time analytics and insights, and automate cross-channel interactions. Here is where Real-Time Interaction Management (RTIM) is critical, according to The Forrester Wave™: Real-Time Interaction Management, Q3 2015 report, which identified the 11 most significant technology providers in this space across 35 criteria. Forrester defines RTIM as “Enterprise marketing technology that delivers contextually relevant experiences, value, and utility at the appropriate moment in the customer life cycle via preferred customer touchpoints,” and identifies Pegasystems as one a leader in this very diversified pack. Download this Forrester Wave report to
Tags : 
interaction management, business technology, enterprise, forrester, best practices, pegasystems
    
Pega
Published By: CrowdStrike     Published Date: Aug 01, 2017
While many organizations are guarding the front door with yesterday’s signature-based antivirus (AV) solutions, today’s unknown malware walks out the back door with all their data. What’s the answer? A new white paper, “The Rise of Machine Learning in Cybersecurity,” explains machine learning (ML) technology —what it is, how it works and why it offers better protection against the sophisticated attacks that bypass standard security measures. You’ll also learn about CrowdStrike’s exclusive ML technology and how, as part of the Falcon platform’s next-gen AV solution,it dramatically increases your ability to detect attacks that use unknown malware. Download this white paper to learn:?How different types of ML are applied in various industries and why it’s such an effective tool against unknown malware?Why ML technologies differ and what factors can increase the accuracy and effectiveness of ML ?How CrowdStrike’s ML-based technology works as part of the Falcon platform’s next-generation AV
Tags : 
    
CrowdStrike
Published By: DataStax     Published Date: Mar 10, 2017
Netflix, Intuit and Clear Capital. These 3 innovative companies have one thing in common. They are altering their business landscape and transforming the way people live and work through highly personalized applications. And they're doing this with Apache Cassandra™ and DataStax. Download this white paper and learn why relational technologies failed to meet the demands of Netflix, Mint Bills and Clear Capital and how these enterprises modernize their Web and Mobile applications with DataStax to drive customer engagement, loyalty and lifetime value.
Tags : 
    
DataStax
Published By: Oath     Published Date: Nov 17, 2017
The medium is evolving at a rapid pace, perhaps faster than any other. New technologies are emerging regularly—such as native, instream, and outstream— and each carries as many opportunities as they do challenges.
Tags : 
    
Oath
Published By: Symantec     Published Date: Jul 31, 2017
Uncover shadow data lurking in the cloud with the industry’s first integrated cloud security solution that combines the best-in-class data loss prevention (DLP) and cloud access security broker (CASB) technologies from Symantec.
Tags : 
cloud, cloud security, dlp, casb
    
Symantec
Published By: CA Technologies EMEA     Published Date: Sep 14, 2018
CA Privileged Access Manager Schützt und steuert privilegierte Anwender und die Anmeldeinformationen, die sie für die Nutzung und das Management Ihrer digitalen Infrastruktur verwenden. Die Lösung erzwingt proaktiv Security-Richtlinien und rollenbasierte Begrenzungen für Zugriffe privilegierter Anwender – und überwacht und zeichnet gleichzeitig die Aktivitäten privilegierter Anwender in virtuellen, physischen und Cloud-basierten Umgebungen auf.
Tags : 
    
CA Technologies EMEA
Published By: Adobe     Published Date: Mar 26, 2018
Ten years ago, the iPhone came into our lives and our world was utterly transformed. Since then, mobile devices have changed the way we communicate, take photos, find our way, even find our soul mates. With the advent of new technologies like artificial intelligence and virtual reality, the next decade promises to be even more transformative.
Tags : 
    
Adobe
Published By: Adobe     Published Date: Apr 23, 2018
Download our new white paper, Retail Stores of the Future, to learn how you can bring the best of online shopping to brick-and-mortar stores. You’ll see how new digital marketing technologies and strategies can be applied to in-store interactions—so you can create immersive experiences everywhere your customers go. Read the white paper now to discover: • How retailers are blending innovative technologies with traditional shopping • Four key approaches they’re using to build Stores of the Future • The interactive tools they’re employing to enrich in-store experiences
Tags : 
    
Adobe
Published By: Oracle CX     Published Date: Oct 19, 2017
The Software in Silicon design of the SPARC M7 processor, and the recently announced SPARC S7 processor, implement memory access validation directly into the processor so that you can protect application data that resides in memory. It also includes on-chip Data Analytics Accelerator (DAX) engines that are specifically designed to accelerate analytic functions. The DAX engines make in-memory databases and applications run much faster, plus they significantly increase usable memory capacity by allowing compressed databases to be stored in memory without a performance penalty. The following Software in Silicon technologies are implemented in the SPARC S7 and M7 processors: Note: Security in Silicon encompasses both Silicon Secured Memory and cryptographic instruction acceleration, whereas SQL in Silicon includes In-Memory Query Acceleration and In-Line Decompression. Silicon Secured Memory is the first-ever end-to-end implementation of memory-access validation done in hardware. It
Tags : 
    
Oracle CX
Start   Previous    3 4 5 6 7 8 9 10 11 12 13 14 15 16 17    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.