different

Results 1 - 25 of 1544Sort Results By: Published Date | Title | Company Name
Published By: Interactions     Published Date: Oct 29, 2019
We all know that the customer experience is a big deal. By 2020, customer experience will overtake price and product as the key differentiator. But due to the complicated nature of integrating a large-scale, customer-facing technology like an IVA, many companies don’t know where to start or how to ensure they are creating the best possible virtual assistant. We’ve compiled some key technologies and features that should be top of mind when assessing internal expertise or selecting an external vendor.
Tags : 
    
Interactions
Published By: Riskified     Published Date: Nov 04, 2019
To maximize success, eCommerce merchants need to be familiar with the unique shopping behavior and fraud trends of the holiday season. We’ve identified six key ‘sub-seasons’ and insights pertaining to geographies, channels and shipping methods - to give actionable tips to ensure a safe and profitable season. This report explores how merchants can stay competitive and boost revenue, while meeting the sophisticated expectations of holiday shoppers. What you will get from this report: 1. Tools to enable more cross-border eCommerce: Get insights to help you capitalize on the holiday season’s opportunities 2. Fraud trends for different segments of the holiday season: Better manage risk during the most lucrative quarter for eCommerce merchants 3. Insights on six key holiday sub-seasons: Identify unique consumer preferences to boost revenue
Tags : 
    
Riskified
Published By: KPMG     Published Date: Jun 06, 2019
Many organisations will be using AI sooner than anyone expects. Prepare now to address the risks from these advanced technologies with this comprehensive framework from our risk experts. Download this practical resource to see AI risk description, control topic and control description, COBIT process and COBIT area for 17 different AI risks.
Tags : 
    
KPMG
Published By: KPMG     Published Date: Jun 10, 2019
GDPR has prompted banks to re-evaluate their data protection policies. Going beyond pure compliance can help establish consumer trust as a point of differentiation. Read this report to find out: • the ethical challenges and risks arising from the use of customer data • how to start embedding principles for ethical data handling in your organisation • the competitive advantages that come from getting data ethics right.
Tags : 
    
KPMG
Published By: KPMG     Published Date: Sep 05, 2019
If procurement organisations are to sustain their value to the enterprise, they must pivot to new operating models that embed customer-centricity in their technology, process and people. Read this report to discover: • the four convergence trends driving change and opportunity for procurement organisations • the nine differentiators for customer-centric procurement leaders • how and why you should be leveraging CX procurement technology."
Tags : 
    
KPMG
Published By: KPMG     Published Date: Oct 09, 2019
Changing attitudes to data privacy leave many firms in a precarious position. When there is so much regulatory variation in different markets, how do firms balance their responsibility for customers’ data with maximising value from that data? Listen now to discover: • The current state of play for data privacy – understanding what your customers want and what the regulators want • How to lay solid foundations to help you adapt to the changing landscape • How to ensure your privacy strategy supports growth.
Tags : 
    
KPMG
Published By: Jeppesen     Published Date: Oct 01, 2019
"Empower your employees to streamline the process, decrease the risk and improve the cost of flight. Get this infographic to learn how different types of airline personnel use Jeppesen Aviator to boost the efficiency of flight operations."
Tags : 
    
Jeppesen
Published By: Blend     Published Date: Oct 07, 2019
Every lender, bank, and credit union has different product mixes and marketing priorities, but one thing they all share is the goal of winning, retaining, and growing our customer relationships. Typically, there are two ways to maximize customer engagement: seek margin with products like credit cards, or seek volume and deeper relationships with products like home equity. This report analyzes both of these options through three key lenses: current market conditions, access to today’s high-quality borrowers, and the rich opportunity for integrated, targeted marketing. Our goal is to enable you to determine the best way to fine-tune your strategic customer engagement for 2019 by helping you: Review current market conditions. Connect with higher-quality borrowers. Develop a 360-degree, integrated marketing mix.
Tags : 
    
Blend
Published By: Oracle     Published Date: Sep 26, 2019
If you’re planning to sell products and services to today’s fast-moving global consumers, there’s no way around it—you need a website. And to make sure that website delivers an experience that fuels conversions and revenue, testing and optimization are crucial. There are lots of different ways to test your website. However, while some tests will help you optimize, others will just take up your time and give nothing useful back in return. This guide will show you how to build and run the right kind of website test and decode the results to get the answers you need.
Tags : 
    
Oracle
Published By: CloudHealth by VMware     Published Date: Aug 22, 2019
Public clouds have fundamentally changed the way organizations build, operate, and manage applications. Security for applications in the cloud is composed of hundreds of configuration parameters and is vastly different from security in traditional data centers. According to Gartner, “Through 2020, at least 95% of cloud breaches will be due to customer misconfiguration, mismanaged credentials or insider theft, not cloud provider vulnerabilities”1. The uniqueness of cloud requires that security teams rethink classic security concepts and adopt approaches that address serverless, dynamic, and distributed cloud infrastructure. This includes rethinking security practices across asset management, compliance, change management, issue investigation, and incident response, as well as training and education. We interviewed several security experts and asked them how public cloud transformation has changed their cloud security and compliance responsibilities. In this e-book, we will share the top
Tags : 
    
CloudHealth by VMware
Published By: CloudHealth by VMware     Published Date: Sep 05, 2019
Public clouds have fundamentally changed the way organizations build, operate, and manage applications. Security for applications in the cloud is composed of hundreds of configuration parameters and is vastly different from security in traditional data centers. According to Gartner, “Through 2020, at least 95% of cloud breaches will be due to customer misconfiguration, mismanaged credentials or insider theft, not cloud provider vulnerabilities”1. The uniqueness of cloud requires that security teams rethink classic security concepts and adopt approaches that address serverless, dynamic, and distributed cloud infrastructure. This includes rethinking security practices across asset management, compliance, change management, issue investigation, and incident response, as well as training and education. We interviewed several security experts and asked them how public cloud transformation has changed their cloud security and compliance responsibilities. In this e-book, we will share the top
Tags : 
    
CloudHealth by VMware
Published By: Tricentis     Published Date: Aug 19, 2019
Let’s face it. Businesses don’t want—or need—perfect software. They want to deliver new, businessdifferentiating software as soon as possible. To enable this, we (Development and Testing teams) need fast feedback on whether the latest innovations will work as expected or crash and burn in production. We also need to know if these changes somehow broke the core functionality that the customer base—and thus the business—depends upon. This is where Continuous Testing comes in. Continuous Testing is the process of executing automated tests as part of the software delivery pipeline in order to obtain feedback on the business risks associated with a software release candidate as rapidly as possible.
Tags : 
    
Tricentis
Published By: Tricentis     Published Date: Aug 19, 2019
The way that we develop and deliver software has changed dramatically in the past 5 years—but the metrics we use to measure quality remain largely the same. Despite seismic shifts in business expectations, development methodologies, system architectures, and team structures, most organizations still rely on quality metrics that were designed for a much different era. Every other aspect of application delivery has been scrutinized and optimized as we transform our processes for DevOps. Why not put quality metrics under the microscope as well? Are metrics like number of automated tests, test case coverage, and pass/fail rate important in the context of DevOps, where the goal is immediate insight into whether a given release candidate has an acceptable level of risk? What other metrics can help us ensure that the steady stream of updates don’t undermine the very user experience that we’re working so hard to enhance? To provide the DevOps community an objective perspective on what quality
Tags : 
    
Tricentis
Published By: TIBCO Software     Published Date: Jul 22, 2019
What if you could use just one platform to detect all types of major financial crimes? One platform to handle the analytical tasks of fraud detection, including: Data processing and aggregation Data visualization Statistical/mathematical/machine learning modeling Batch/real-time scoring One platform that could successfully reduce complex and time-consuming fraud investigations by combining extremely different domains of knowledge including Business, Economics, Finance, and Law. A platform that can cover payments, credit card transactions, and know your customer (KYC) processes, as well as similar use cases like anti-money laundering (AML), trade surveillance, and crimes such as insurance claims fraud. Learn more about TIBCO's comprehensive software capabilities behind tackling all these types of fraud in this in depth whitepaper.
Tags : 
    
TIBCO Software
Published By: Infinidat EMEA     Published Date: May 14, 2019
Infrastructure efficiency and effectiveness directly support profit and growth as competition increases in the cloud and managed service provider (xSP) market. Savvy service providers understand that storage choices have a profound impact on not only their profit and growth, but also on their customer experience and retention. They also know that storage challenges in all those areas increase exponentially with scale. Infinidat storage platforms allow service providers to build and scale differentiated, profitable solutions without worrying about storage. Infinidat technology enables unprecedented efficiency, performance, and resiliency, while flexible business models make it easy for service providers to operationalize those platform advantages—including unique co-branding and promotional opportunities as part of the Powered by Infinidat program. Cloud providers worldwide trust their businesses to Infinidat storage. This paper explores a path for service providers to unlock greater sc
Tags : 
    
Infinidat EMEA
Published By: ConnectWise     Published Date: Aug 22, 2019
There is no easy way to establish the “going rate” for comparable services, because all services are differentiated by other forces, such as individual processes, brand equity, and features. If you’re going to price your services simply based on the competition, you’d better ensure you’re making an exact apples-to-apples comparison, which is easier said than done and not something we recommend. Consider instead, a model where your pricing is based on how much it truly costs you to perform one hour of service. In this eBook, we show you how to calculate your full hourly overhead burden–so you can set the right price for your IT services.
Tags : 
    
ConnectWise
Published By: Pine Cove Consulting     Published Date: Oct 03, 2019
Organizations are struggling to stop cyberattacks. Time for a different approach? Check out this infographic, based on an independent survey of 3,100 IT managers in 12 countries, and learn more by vising our website at www.pinecc.com
Tags : 
    
Pine Cove Consulting
Published By: Rackspace     Published Date: Nov 06, 2019
Insights into avoiding migration regret amongst CxO’s: The decision to move business workloads and applications to the cloud impacts all parts of the business and isn’t a decision isolated to the IT team. Our latest research study on the different motives, concerns and experiences of executive peers and business stakeholders when securing buy-in for a strategic IT move found 97% of C-level executives in ANZ suffered from migration regret during their first cloud migration. Packed with telling hindsight, over 200 c-suite executives shared their expectations and experiences during the cloud migration journey. They reveal what they would have done differently - namely enhanced communication and a clear plan of action - and offer practical advice to help others get buy-in internally and secure funding to support a move to the cloud.
Tags : 
    
Rackspace
Published By: IBM APAC     Published Date: Oct 04, 2019
Companies across the world are adopting a hybrid cloud environment as part of their digital transformation initiative. They need a platform that provides the elasticity and automatic provisioning of the public cloud with the economic viability of the private cloud. IBM’s LinuxONE is an enterprise-grade Linux server with a unique architecture designed to meet the needs of a vast range of enterprise computing workloads within a multi-cloud environment. Here are just a few reasons why you should consider LinuxONE: • Differentiating your cloud services • Reduced costs • Security everywhere Download the e-book for more details.
Tags : 
    
IBM APAC
Published By: IBM APAC     Published Date: Oct 11, 2019
Several countries in the Asian region are experiencing strong growth in their economies, but a large part of the population of many of these countries remains unbanked. In such a scenario, Techcombank, a bank in Vietnam, knew it had to deliver a differentiated banking experience for its prospective customers. The bank had to transform its IT infrastructure and it zeroed in on IBM LinuxONE because of its ability to handle very large and variable workloads, combined with strong security and cost-efficiency. As a result, it was able to handle 4X the transactions during peak season effortlessly along with 44% lower total cost of ownership while also winning new customers. Find out more.
Tags : 
    
IBM APAC
Published By: MicroStrategy     Published Date: Nov 08, 2019
A&BI platforms are transitioning from delivering simple, manual self-service to supporting more advanced, automated analytic use cases via growing, augmented, ML-driven capabilities. Data and analytics leaders should enable broader use cases to increase their investments’ business impact. Analytics and business intelligence (A&BI) platforms exhibit differences in functional capabilities, particularly in their support for advanced analytics, data source connectivity and embedded functionality. As the market matures, the capabilities required to build and deliver user-friendly analytics dashboards are the least differentiated. The trend toward assisting users with augmented data discovery functionality continues, but many products still lack enough support for this critical capability. When viewed across the whole span of capabilities, significant differences remain between competing platforms and, therefore, also between which are most appropriate for a given use case. In some cases, th
Tags : 
    
MicroStrategy
Published By: Cherwell Software     Published Date: Oct 28, 2019
To keep up with the growing needs of students, faculty and staff, higher ed IT departments must deliver a modern and seamless digital experience—often despite significant budget and staffing hurdles. In this peer report, IT leaders at four different universities share how they’re using Cherwell’s IT service management (ITSM) solution to tackle common challenges and create extraordinary results in three key areas: efficiency, campus-wide user experience and enterprise-level innovation. What they’ve accomplished is only the start: • Halving customization and configuration time while boosting user satisfaction • Improving service delivery and enabling campus-wide collaboration • Helping departments beyond IT to pursue their own automation initiatives By replacing legacy systems, automating manual workflows, enabling self-help and much more, IT pros are making radically new realities possible with a streamlined and customizable approach to ITSM. Download the report to read their stor
Tags : 
    
Cherwell Software
Published By: Cherwell Software     Published Date: Oct 28, 2019
: Today’s learning environments would be unrecognizable to past generations. Professors distribute and issue syllabi and assignments online. Students collaborate on group projects using Google Docs, Doodle and other technologies. Password reset requests alone could keep an entire IT team busy. To face this onslaught of technological demands without breaking the budget, campuses need a powerful, flexible and affordable ITSM platform. Read this eBook to learn how eight different colleges and universities are using Cherwell ITSM to achieve: • A higher level of productivity (for example, implementing a self-service portal for password resets that slashed service requests by 65 percent) • Faster service delivery (for example, cutting the global computer refresh cycle from three years to seven months) • Less configuration time (for example, one school reduced configuration time by 74 percent). To learn more about how leading campuses have easily and affordably improved their operational
Tags : 
    
Cherwell Software
Published By: AppZen     Published Date: Oct 21, 2019
Spend-related regulatory violations come in the form of different types of payments or gifts, including those to sanctioned organizations or people; debarred organizations or people; organizations or people on an export control list; foreign officials or government-owned entities; politically-exposed people; and healthcare professionals or organizations. How do you know if you have these violations hiding in your organization's expenses, contracts, or invoices? It’s not easy to weed them out, and if you don’t have an automated, systematic approach, doing so is prohibitively time consuming.
Tags : 
    
AppZen
Published By: Medius     Published Date: Oct 01, 2019
Only a best-of-breed AP automation solution can offer the high levels of fully automated, touchless, invoice processing that your organization needs to scale your business operations.MediusFlow is the leading cloudbased solution for Dynamics users that automates the entire accounts payable process, enabling increased efficiency, touchless invoice processing as well as better financial visibility and control. This guide will help you understand... • What AP automation is • The different options available • What to consider when selecting a solution • How to evaluate solutions
Tags : 
ap automation, invoice processing, invoice automation, accounts payable automation, accounting software, accounting automation, microsoft dynamics automation
    
Medius
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

“I am the Inspector Morse of IT journalism. I haven't a clue. D'oh” - Mike Magee