nec

Results 1 - 25 of 2764Sort Results By: Published Date | Title | Company Name
Published By: Dell and VMWare     Published Date: Oct 26, 2017
Une transformation fondamentale englobant le personnel, les processus et la technologie permet aux entreprises de rester compétitives dans l’économie d’aujourd’hui, basée sur l’innovation. Des initiatives telles que la sécurité avancée, les services de détection des fraudes, l’Internet des objets (IoT) avec ses consommateurs connectés, l’expérience de réalité virtuelle ou augmentée, l’apprentissage machine et approfondi et les applications cognitives optimisent les avantages pour l’entreprise comme la maintenance et le marketing prédictifs.
Tags : 
    
Dell and VMWare
Published By: Zendesk     Published Date: Dec 02, 2016
The importance of agility in business is not breaking news. With the rise of technology, connectivity, and mobility, chances are that you’ve had to rework everything from logistics and operations to how you process employee payroll. Changing the way you work, and the tools you work with, extends to your customer base, too. These relationships also need to be maintained and are just as dynamic as what’s happening in-house.
Tags : 
retail, ecommerce, web ecommerce, customer service, customer service, global support
    
Zendesk
Published By: OKTA     Published Date: Sep 26, 2017
Traditional web applications pre-date modern standards like SAML and OpenIDConnect, so they often use legacy authentication methods to grant end users access. Historically, providing Single Sign-On and centralized access management for end users across these legacy applications required a Web Access Management, or WAM, product. These on-premises software tools could be expensive to maintain and complex to deploy. Now, modern identity providers like Okta in conjunction with best-of-breed network management technologies offer a better way. This white paper describes how web applications that lack modern standard support can be integrated into a cloud-based Identity-as-a-service architecture.
Tags : 
    
OKTA
Published By: Adobe     Published Date: Feb 08, 2016
Today, customers make decisions about brands on a moment-by-moment basis. They expect personal and authentic experiences that build connections and deepen relationships with their favorite brands. New technology makes it possible to deliver on these expectations and succeed in today’s new era of marketing.
Tags : 
adobe, marketing, new era, crm, brands, experience, customer expectations, enterprise applications, business technology
    
Adobe
Published By: Ruckus Wireless     Published Date: Jul 16, 2018
Students and teachers at Belleville Township High School District now rely on Ruckus Networks to stay connected to laptops, tablets, and smartphones. With Ruckus Cloud Wi-Fi, the IT team at Belleville Township High School District is able to access and manage WLANs with a click of a button. Read this case study to learn why they chose Ruckus Cloud Wi-Fi, allowing Belleville to take classroom learning to the next level.
Tags : 
    
Ruckus Wireless
Published By: Workday     Published Date: Mar 19, 2018
The experts agree: Workplace learning can no longer be an "out there," disconnected processit has to be tightly and carefully woven into a worker's experience, integrated into the fabric of the modern workplace. Read the article to discover how three leading experts see the future of workplace learning unfolding today.
Tags : 
workplace learning, worker experience
    
Workday
Published By: Polycom     Published Date: May 12, 2015
For FSIs to keep up and truly connect with the modern customer, they must build a platform for a connected ecosystem right away.
Tags : 
polycom, enterprise, collaboration, fsi, compliance, customer, satisfaction, ecosystem
    
Polycom
Published By: Akamai Technologies     Published Date: May 08, 2017
We are coming to expect quality video in all our digital experiences – from online shopping to on the job training. However, as video technology has become more ubiquitous, it has also become more complex. To deliver a quality experience to users, regardless of their device and connectivity, you need a holistic video strategy. We’ve tapped into our experience to present the top issues you must address to ensure a successful online video strategy. Download now to learn more!
Tags : 
device management, data solutions, system solutions, data breach, mobile management
    
Akamai Technologies
Published By: IBM     Published Date: Feb 02, 2017
With 2.5 quintillion bytes of data created every day, it’s getting harder to separate the signals from the noise and discern the insights from the hindsight. Discover 10 key trends that will shape marketing in 2017 and get ideas for deepening customer connections, growing brand value and fueling strategic growth.
Tags : 
ibm, commerce, marketing, marketing benchmark, marketing trends
    
IBM
Published By: Aerohive     Published Date: Aug 03, 2015
This paper looks at how this mentality requires IT operations to architect an access network specifically with "mobile first" in mind.
Tags : 
mobility, mobility technology, wireless. connectivity, network, mobility first, it operations
    
Aerohive
Published By: Idera     Published Date: Oct 18, 2012
Download this paper to learn how implementing basic performance enhancements can provide tremendous improvements to the operation and performance of SharePoint within the enterprise.
Tags : 
sql, servers, database traffic, data connectivity, microsoft sharepoint, data management, business technology, data center
    
Idera
Published By: Act-On     Published Date: Oct 09, 2015
LinkedIn has evolved into a powerful lead generation tool for many businesses. Its features, like Publisher and Groups, lend themselves well to connecting businesses with prospects. With so many great features, it can be quite challenging to figure out how to use the ones that best fit your needs. To help you navigate your way through LinkedIn, we’ve put together 10 things you should be doing today to make the most of LinkedIn.
Tags : 
reachmail, linkedin, b2b best practices on linkedin, b2b companies
    
Act-On
Published By: Cisco EMEA     Published Date: Dec 13, 2017
Cisco Meraki MS switches are 100% cloud-managed and can be fully configured from any Internet-accessible location before ever being powered on. Simply add the switch serial number (or order number for large deployments) to your network using the Meraki web-based dashboard. Once added, the switch is fully configurable. When the switch is first powered on and connected to the Internet, it will pull its settings from the cloud.
Tags : 
configuration, zero touch, deployment, ports, bandwidth, wire security, trends
    
Cisco EMEA
Published By: Tyco Integrated Security     Published Date: Sep 10, 2015
Engineers are likely not who you would expect them to be. To create messages that resonate with this unique audience, you must understand them on a more personal level. Analyzing a recent worldwide survey of more than 2,600 engineering professionals, we help you get inside the minds of engineers and discover some surprising insights that enable you to relate to them on a deeper, more personal level.
Tags : 
    
Tyco Integrated Security
Published By: gyro     Published Date: Sep 10, 2015
In this e-Book, learn what engineers value, how they view themselves and what they expect from the companies with which they work.
Tags : 
engineers, gender stereotypes, hobbies, interests
    
gyro
Published By: Janrain, Inc.     Published Date: Feb 28, 2012
Your customers interact with you on social networks, but how effectively are you using social media to connect with them on your website? This white paper explores best practices to build on-site engagement by integrating social tools.
Tags : 
social login, social sharing, game mechanics, gamification, social media, social tools, social networks, facebook, twitter, linkedin, social commerce, engagement, conversion, user intelligence, customer intelligence, roi, rewards, best practices
    
Janrain, Inc.
Published By: Cleo     Published Date: Jan 03, 2017
Modern MFT is designed to connect all of your information sources and consumers in a way that drives business agility with a simple user experience to manage data movement across your organization and beyond. With legacy and outsourced MFT technologies, companies are at a disadvantage when it comes to managing business-critical file transfers. Read this white paper to learn 10 considerations when evaluating the capabilities of your existing MFT solution or a replacement to help your business better meet existing and future use-case requirement.
Tags : 
cleo, mft, mft technology, file transfer, b2b integration, enterprise applications, business technology
    
Cleo
Published By: Focus     Published Date: May 13, 2009
A network upgrade is necessary; however, you need everyone to agree. Get the help to sell it. Download your FREE research report now.
Tags : 
information technology, networking
    
Focus
Published By: Emulex Corporation     Published Date: Nov 07, 2013
Flying blind at 100G It might go something like this: Your company is a voracious consumer of bandwidth – perhaps a very large enterprise, a research lab, or a service or content provider of some description. Today you are running multiple 10Gbps network connections in the core of your network, but these links are rapidly approaching capacity. An upgrade in the not-too-distant future to 40/100G ultra-high-speed links now looks inevitable.
Tags : 
network monitoring, network visibility, technology, endace, best practices, networking
    
Emulex Corporation
Published By: EVault     Published Date: Mar 21, 2014
This simple, practical white paper will prove invaluable whether you’re starting fresh or looking to upgrade your current data protection system.
Tags : 
evault, cloud computing, cloud connected diaster, disaster recovery, natural disaster, better for business, security, data center
    
EVault
Published By: EVault     Published Date: Mar 21, 2014
Er zijn heel veel manieren om uw data te back-uppen – dan is het goed om te weten dat 12 Best Practices ze allemaal beslaan. Als u dit compacte whitepaper leest, kunt u in een paar minuten: •Bepalen of uw back-up en recovery systeem voldoet •Specifieke stappen bepalen om verbeteringen aan te brengen •Efficiëntie, betrouwbaarheid en kosten-effectiviteit verhogen Vul uw gegevens in en download
Tags : 
evault, cloud computing, cloud connected diaster, disaster recovery, natural disaster, better for business, security, data center
    
EVault
Published By: BitSight Technologies     Published Date: Feb 29, 2016
Cybersecurity is an issue facing nearly every organization today—and if you aren’t taking the necessary precautions, your company, customers, and vendors could all suffer.
Tags : 
cybersecurity, security risk, security ratings, security, it management, enterprise applications, data management, business technology
    
BitSight Technologies
Published By: EVault     Published Date: Mar 21, 2014
Il ya des millions de façons de sauvegarder vos données - Il est donc bon de savoir qu’il existe 12 meilleures pratiques qui les couvrent tous. Passez quelques minutes avec ce court livre blanc afin de: •Déterminer si votre système de sauvegarde et de restauration est limite •Identifier les différentes étapes spécifiques pour mettre en avant les améliorations •Etre moteur en terme d'efficacité, de fiabilité et de rentabilité Inscrivez-vous pour télécharger.
Tags : 
evault, cloud computing, cloud connected diaster, disaster recovery, natural disaster, better for business, security, data center
    
EVault
Published By: EVault     Published Date: Mar 21, 2014
Il ya des millions de façons de sauvegarder vos données - Il est donc bon de savoir qu’il existe 12 meilleures pratiques qui les couvrent tous. Passez quelques minutes avec ce court livre blanc afin de: •Déterminer si votre système de sauvegarde et de restauration est limite •Identifier les différentes étapes spécifiques pour mettre en avant les améliorations •Etre moteur en terme d'efficacité, de fiabilité et de rentabilité Inscrivez-vous pour télécharger.
Tags : 
evault, cloud computing, cloud connected diaster, disaster recovery, natural disaster, better for business, security, data center
    
EVault
Published By: PulseConnect     Published Date: Sep 04, 2012
It's easy to assume that automated emails don't require a lot of work on your part because, well, they're automated. In reality, automated emails require some careful thought and planning to successfully trigger messages that best connect with your recipients...and don't end up in their spam folder.
Tags : 
email marketing, email automation, conversion rates, email targeting
    
PulseConnect
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

“I am the Inspector Morse of IT journalism. I haven't a clue. D'oh” - Mike Magee