business internet

Results 201 - 225 of 270Sort Results By: Published Date | Title | Company Name
Published By: Meltwater     Published Date: Apr 13, 2016
Watch this webinar from Forrester analyst Sam Ngo and learn how social insights can move the needle on business objectives across your organization.
Tags : 
data management, business practices, internet, marketing, best practices, public relations, communications
    
Meltwater
Published By: VMware SD-WAN by VeloCloud     Published Date: Feb 19, 2019
oftware-Defined WAN, or SD-WAN for short, is at the leading edge of software-based networking deployments. SD-WAN offers significant business value for organizations with distributed branches in terms of business agility and the ability to leverage Internet bandwidth economics – put simply, cost savings. This Software-Defined WAN For Dummies book explains the way for IT and business managers to migrate to a distributed network which is less complex, more flexible and easier to manage. With this book, VMware and Dan Pitt make an important contribution to better understanding the future of WAN implementations.
Tags : 
software-based networking, vmware, sd-wan
    
VMware SD-WAN by VeloCloud
Published By: VMware SD-WAN by VeloCloud     Published Date: May 20, 2019
Software-Defined WAN, or SD-WAN for short, is at the leading edge of software-based networking deployments. SD-WAN offers significant business value for organizations with distributed branches in terms of business agility and the ability to leverage Internet bandwidth economics – put simply, cost savings. This Software-Defined WAN For Dummies book explains the way for IT and business managers to migrate to a distributed network which is less complex, more flexible and easier to manage. With this book, VMware and Dan Pitt make an important contribution to better understanding the future of WAN implementations
Tags : 
    
VMware SD-WAN by VeloCloud
Published By: IBM     Published Date: Oct 07, 2014
A comprehensive study by Solitaire Interglobal Ltd. (SIL) on the business impact of security incursions in today's IT environment. This ground-breaking research, based on 64,200 client data points explores how the vulnerabilities in today's virtualized, internet-connected, cloud-oriented environment can affect your businesses.
Tags : 
ibm, security, cloud, cloud security, solitaire interglobal, it environment, cloud environment, security incursions, vulnerabilities, it management
    
IBM
Published By: Group M_IBM Q2'19     Published Date: Apr 03, 2019
Data is the lifeblood of business. And in the era of digital business, the organizations that utilize data most effectively are also the most successful. Whether structured, unstructured or semi-structured, rapidly increasing data quantities must be brought into organizations, stored and put to work to enable business strategies. Data integration tools play a critical role in extracting data from a variety of sources and making it available for enterprise applications, business intelligence (BI), machine learning (ML) and other purposes. Many organization seek to enhance the value of data for line-of-business managers by enabling self-service access. This is increasingly important as large volumes of unstructured data from Internet-of-Things (IOT) devices are presenting organizations with opportunities for game-changing insights from big data analytics. A new survey of 369 IT professionals, from managers to directors and VPs of IT, by BizTechInsights on behalf of IBM reveals the challe
Tags : 
    
Group M_IBM Q2'19
Published By: IBM     Published Date: Mar 28, 2016
To succeed today, organizations need to take advantage of information technology in every area of their business. Talent acquisition is no exception. Robust, reliable technology can help recruiters more effectively engage with candidates. According to Aberdeen Group, the user experience is key. It is more important than ever to have friendly and interactive platforms. In terms of talent acquisition, companies that prioritize the candidate experience are more than twice as likely to improve their cost per hire on a year–by-year basis.1 In addition, social capabilities can enable recruiting professionals to use the Internet for job applications, social referrals and video interviewing. Mobile integration also enables users to connect with information where and when they need it. With better tools and insight into people and data, organizations can much more quickly identify talent, match capabilities to market needs, retain the best talent and improve recruiting outcomes. Simply put, rec
Tags : 
ibm, talent acquisition, human resources, recruiting
    
IBM
Published By: Dynatrace     Published Date: May 21, 2019
The Internet of Things (IoT) is exploding across every industry, everywhere, starting a new chapter in digital transformation. As new use-cases for IoT continue to emerge, the digital experiences they enable will become increasingly critical to business success, connecting all aspects of human society. Based on a global survey of 800 CIOs, this report examines the challenges organizations face as they begin to explore and deploy Internet of Things (IoT) use-cases and web-scale applications.
Tags : 
    
Dynatrace
Published By: CDW     Published Date: Feb 27, 2015
CDW’s Technology Insights guides provide a high-level, informative take on today’s most pressing IT solution areas and related issues. Speaking to the interests and concerns of IT managers and their staff, as well as their enterprise counterparts, the guides provide up-to-date summaries, strategic guidance and best practice tips on the technologies driving IT operations forward.
Tags : 
software management, sam, software security, cloud computing, enterprise content management, business intelligence, office productivity apps, network security, internet security, network security appliance, security management, best practices, business management, data protection, mobile device management, it management, business technology
    
CDW
Published By: Microsoft     Published Date: May 16, 2016
By implementing a strategy to capitalize on the Internet of Things trend, you can stop just running your business and start making it thrive. Download this whitepaper to learn 10 reasons your business needs a strategy to capitalize on the Internet of Things today.
Tags : 
iot, internet of things, microsoft, business, devices, cloud services, intelligence tools, line-of-business assets
    
Microsoft
Published By: SpectorSoft     Published Date: Apr 01, 2015
Corporate computers and information and communications systems (collectively, “electronic resources”) remain the workhorse for most businesses, even as alternatives, such as third-party text messaging services, external social media, and cloud computing, flourish. Employees rely on corporate electronic resources for e-mail, calendaring, business contacts, Internet access, document creation and storage, and a multitude of other business applications. Consequently, for employers, it is critical to establish and maintain their right to inspect all information stored on, and to monitor all communications transmitted by, corporate electronic resources. The corporate acceptable use policy is the linchpin of that effort. The ten tips below are intended to aid employers who either want to implement an acceptable use policy for the first time, or who need to update their policy.
Tags : 
acceptable use, communications systems, text messaging, acceptable use policy, confidentiality, security, it management, knowledge management, data management
    
SpectorSoft
Published By: Cisco     Published Date: Mar 10, 2011
Read this paper to know the 10 ways that businesses can save money with VoIP.
Tags : 
cisco, business phone system, voip, voice over internet protocol, voice communication, data network
    
Cisco
Published By: Vendor Guru     Published Date: Dec 21, 2007
Customer relationship management (CRM) systems are being implemented by a variety of companies looking for a competitive advantage in the global marketplace. Without customer loyalty, many companies won’t be able to thrive and grow. Today’s consumers are more demanding because they have a greater variety of choices, including doing business on the Internet and via automated phone systems. Many expect access to customer service 24 hours a day.
Tags : 
vendor guru custom question campaign, vendor guru, vendorguru, quinstreet, crm, crm tool, crm solution, customer service, customer relationship, data integration, marketing automation, sales management, analytics
    
Vendor Guru
Published By: BigCommerce     Published Date: Oct 16, 2018
Businesses who have lived through the evolution of the digital age are well aware that we’ve experienced a generational shift in technology. The rise of software as a service (SaaS), cloud, mobile, big data, the Internet of Things (IoT), social media, and other technologies have disrupted industries and changed customers’ expectations. In our always-on, buy anything anywhere world, customers want their shopping experiences to be personalized, dynamic, and convenient. As a result, many businesses are trying to reinvent themselves. Success in a fast-paced economy depends on continually adapting and innovating. Companies have to move quickly to keep up; there’s no time for disjointed technologies and old systems that don’t serve the customer-obsessed mentality needed to thrive in the digital age.
Tags : 
    
BigCommerce
Published By: Aria Systems     Published Date: Dec 08, 2015
The Internet of Things offers countless opportunities to grow your business, increase recurring revenue, and retain satisfied customers for longer periods of time. If you can measure it, you can monetize it. And when you combine the vast amounts of big data available with the IoT, there are endless opportunities ($14.4 trillion worth!) for monetization across all industries and functions—from healthcare to B2B to automotive and nearly everything in between. The following articles will help you maximize and monetize the Internet of Things.
Tags : 
aria, mot, monetization of things, internet of things, iot, b2b, networking, it management, wireless, enterprise applications
    
Aria Systems
Published By: VMWare     Published Date: May 08, 2018
The business case for hyper-converged infrastructure (HCI) has never been stronger than it is in 2018. IT leaders are under the gun to modernize their infrastructures to accommodate hybrid cloud environments, unrestrained data growth, the Internet of Things (IoT), the consumerization of IT and a wide range of company-specific challenges.
Tags : 
    
VMWare
Published By: F5 Networks Singapore Pte Ltd     Published Date: Jun 18, 2019
In today's digitalized economy, web applications and the browsers that connect to them predominantly rely on the Secure Socket Layer (SSL) and Transport Layer Security (TLS) protocols to encrypt sensitive business information and personally identifiable information (PII) – such as customers’ credit card details, user account passwords, corporate sales and payroll data, etc. – before sending them securely over the internet. SSL/TLS encryption ensures information transmitted over the internet through e-mails, e-commerce and online banking transactions and a myriad of cloud and online services are kept secure.
Tags : 
    
F5 Networks Singapore Pte Ltd
Published By: Group M_IBM Q2'19     Published Date: Apr 10, 2019
A new era of business reinvention is dawning. Organizations are facing an unprecedented convergence of technological, social and regulatory forces. As artificial intelligence, automation, Internet of Things, blockchain and 5G become pervasive, their combined impact will reshape standard business architectures. The “outside-in” digital transformation of the past decade is giving way to the “inside-out” potential of data exploited with these exponential technologies. We call this next-generation business model the Cognitive Enterprise.
Tags : 
    
Group M_IBM Q2'19
Published By: CopiaTECH     Published Date: Mar 18, 2008
Unmanaged Internet access presents many challenges to organizations that rely on the Web for day-to-day business. Even seemingly-harmless Internet use may expose organizations to productivity loss and serious security threats. While large organizations may have access to expensive, sophisticated security solutions, mid-sized and smaller organizations may not have the budgets or technical staffing required to protect against these threats.
Tags : 
websense, copiatech
    
CopiaTECH
Published By: Semcasting     Published Date: Aug 29, 2013
This white paper will guide you through a series of third party studies that have been completed recently on the diminishing reach and effectiveness of audience targeting with cookies. The numbers are challenging and it appears it may be time for an alternative to the cookie.
Tags : 
digital targeting, ip targeting, online business marketing, online targeting, online ad targeting, internet marketing, digital target, online marketing strategies, ip address targeting, ip geo targeting ip zones, online retail marketing, retail marketing, online privacy, third-party cookies, retargeting, retail marketing services
    
Semcasting
Published By: Semcasting     Published Date: Feb 19, 2014
This white paper will guide you through a series of third party studies that have been completed recently on the diminishing reach and effectiveness of audience targeting with cookies. The numbers are challenging and it appears it may be time for an alternative to the cookie.
Tags : 
digital targeting, ip targeting, online business marketing, online targeting, online ad targeting, internet marketing, online marketing, online marketing strategies, digital target, behavioral targeting online, targeted online advertising, ip address targeting, ip geo targeting, internet marketing business, ip zones, retail marketing, online retail marketing, retail trade area, retail marketing services, retail marketing ideas
    
Semcasting
Published By: Fathom SEO     Published Date: Jan 28, 2008
Learn what it takes to produce online videos that drive sales, leads and publicity for your business. This guide explains why Internet video is growing at such a rapid pace and offers tips on how to begin your own video marketing campaigns.
Tags : 
video marketing, youtube, online video, online movie, online sales, web video, lead generation, sales, marketing, video, web site, emerging marketing, fathom, fathom seo
    
Fathom SEO
Published By: Quocirca     Published Date: May 14, 2008
Virtual private networks (VPNs) are the technologies most widely used by organizations today in the provision of remote access to their networks for employees, business partners and suppliers. Of the VPNs available, IPSec (Internet Protocol Security) VPNs provide the most complete remote access solution, although they have traditionally been seen as costly and difficult to deploy. 
Tags : 
vpn, ipsec, remote access quocirca
    
Quocirca
Published By: Riverbed     Published Date: May 08, 2015
Applications are the life of any enterprise and key enablers of workforce productivity and business agility. But, the application landscape is changing rapidly - the number and type of applications is increasing, the move to cloud and SaaS for application delivery is growing, bandwidth costs are decreasing and the reliability of the Internet has improved. Inevitably, there are also changes in network and infrastructure topologies.
Tags : 
hybrid, riverbed, saas, applications, enterprise, it management
    
Riverbed
Start   Previous    1 2 3 4 5 6 7 8 9 10 11    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

“I am the Inspector Morse of IT journalism. I haven't a clue. D'oh” - Mike Magee