intent

Results 1 - 25 of 94Sort Results By: Published Date | Title | Company Name
Published By: IBM     Published Date: Jun 25, 2018
Recognizing the shift to a subscription business model required real-time customer support, Autodesk turned to IBM technology to enhance its customer experience. Using Watson Assistant, Autodesk developed a virtual agent to interact with customers, applying natural language processing (NLP) and deep learning techniques to recognize and extract the intent, context and meaning behind inquiries. Quickly resolving easy customer concerns, Watson Assistant is supporting 100,000 conversations per month, with response times 99% faster than before and leading to a 10-point increase in customer satisfaction levels for Autodesk. Find out how Watson Assistant can accelerate your customer support experience. Click here to find out more about how embedding IBM technologies can accelerate your solutions’ time to market.
Tags : 
    
IBM
Published By: Cisco EMEA Tier 3 ABM     Published Date: Nov 13, 2017
Intent-based networking is the difference between a network that needs continuous attention and one that simply understands what you need and makes it happen. It’s the difference between doing thousands of tasks manually and having an automated system that helps you focus on business goals. Cisco DNA is the open, software-driven platform that turns vision into reality. Virtualization, automation, analytics, and cloud, all in one architecture.
Tags : 
sd-access, segmentation, network fabric, wan, automation, cisco, analytics
    
Cisco EMEA Tier 3 ABM
Published By: Cisco EMEA Tier 3 ABM     Published Date: Nov 13, 2017
Cisco has recently unveiled its new intent-based networking strategy, called "The Network. Intuitive." The goal of intent-based networking is to allow greater levels of automation, security integration, and centralized manageability within a software subscription orientation. Intent-based networking is underpinned by Software-Defined Access (SDA), Cisco's automation engine built upon the company's Digital Network Architecture (DNA), which automates network segmentation, policy enforcement, and troubleshooting. Other core components of the announcement include a refresh of Cisco Catalyst switches, a new licensing model for infrastructure, and an all-in-one management console called DNA Center.
Tags : 
centralized operations, management, intelligent systems, multi vendor support, cloud, cisco
    
Cisco EMEA Tier 3 ABM
Published By: HPE Intel     Published Date: Jan 11, 2016
With the recent news of Dell's intent to acquire EMC, along with all the recent HP 3PAR industry accolades and market success, I thought it would be an ideal time to remind you of some very unique capabilities we have with 3PAR. Read this article learn more about the advantages of switching to a 3PAR storage solution and how HP is making the change easier than ever.
Tags : 
    
HPE Intel
Published By: Cherwell Software     Published Date: Apr 07, 2016
Curves® and Jenny Craig® operate 7,000 Curves clubs and franchises globally and 400 Jenny Craig locations supported by IT service desks in California, Texas, and Australia. The two organizations combined to form Curves Jenny Craig in November 2013. Outdated systems, known internally as “the black hole,” plagued Jenny Craig with inefficient processes and created a lack of accountability. For example, records could not be categorized or prioritized properly, tracked by date or owner, and they could be intentionally hidden in an ambiguous status. Without visibility, Jenny Craig had no way to quantify the impact of their customer service. Mary Carter, manager of IT service, summed it up, “We had no reporting prior Cherwell Service Management.” Curves was in even worse shape as they logged tickets in an Excel® spreadsheet.
Tags : 
best practices, customer support, business intelligence, business optimization
    
Cherwell Software
Published By: HP Enterprise Business     Published Date: Jan 20, 2017
The intent of this book is to provide a governance framework that will guide IT organizations in successfully implementing hybrid cloud solutions that drive digital transformation. Download now to learn more.
Tags : 
    
HP Enterprise Business
Published By: HPE     Published Date: Feb 11, 2015
According to ESG’s 2014 IT Spending Intentions Survey, improving data backup and recovery is the most often mentioned priority for midmarket organizations for the third year in a row. It is the third most frequently cited priority by enterprises and midmarket organizations overall. Additionally, business continuity and disaster recovery (BC/DR) also appear in the top-ten priority lists of both midmarket and enterprise respondents.
Tags : 
    
HPE
Published By: Oracle     Published Date: Feb 24, 2015
To succeed in this new business climate, smart businesses are adapting and realizing that the next frontier is to read and respond to the “Digital Body Language” of their prospects. This new body language is revealed through online activities such as website visits, white paper downloads, and email responses. Find out more about Digital Body Language. Download “Reading and Responding to Your Prospects’ Buying Behavior in the Online World”
Tags : 
oracle, digital marketing, b2b, rfp, feedback, signals, data, behavior, prospect interest, intent, analytics, buying process, sales, online, efficiency, business technology
    
Oracle
Published By: Silver Peak     Published Date: Apr 12, 2016
This white paper illustrates how the integration of zero touch provisioning with EdgeConnect profiles, and the further integration of local profiles into the global business intent of Silver Peak’s virtual overlays, fulfills the promise of SD-WAN with virtualised wide area networking.
Tags : 
security, integration, wan, software defined wan, edgeconnect, virtualisation, networking
    
Silver Peak
Published By: Salesforce Commerce Cloud     Published Date: Sep 16, 2016
In this report from Salesforce Commerce Cloud, formerly Demandware, several key areas are analyzed, from shopper context and experience to intent and conversion, all areas which are vital to today’s digital retailing, and how leaders in the space approach mobile shopping. Download the report now!
Tags : 
demandware, retail, mobile shopping report, mobile, mobile shopping, business technology
    
Salesforce Commerce Cloud
Published By: Deluxe     Published Date: Mar 15, 2017
Best-in-class FI marketers have embraced the power of signals. Through their everyday actions, consumers and businesses continually create signals for marketers like you. A signal is an indication of intent or behavior. Examples of activities that produce signals include making a purchase, searching online for information about a financial product, clicking on an ad, applying for a loan, and paying off debt. Each signal can be tracked, monitored, and acted upon. Reaching customers at the critical moment, in the right channel with the right message, requires keen insights about the signals they’re producing. Signals aren’t new to marketing. In fact, you may already be using new mover lists or even search engine marketing. Today, though, there is so much more valuable data available — if you know where to look and what to do with it.
Tags : 
    
Deluxe
Published By: Secureworks ABM UK 2017     Published Date: Oct 23, 2017
Achieving and maintaining a high level of information security requires information security professionals with robust skills as well as organisational, technical and operational capabilities. The gap between intent and ability to be secure is evident in our sample of UK large enterprises. Deficient companies will only close that gap when they acquire the necessary capabilities. Some of these capabilities can be purchased as information security tools or application solutions, but it is more prudent for an organisation to consider acquiring these capabilities through a service arrangement with a dedicated security services partner.
Tags : 
cyber security, cyber security framework, data security, firewall, general data protection regulation, incident and problem management, information security, intrusion detection, intrusion prevention, log management, malware, vulnerabilities, managed security services, network security, pci compliance, penetration testing, ransomware security consulting, security management, security monitoring, vulnerability assessments
    
Secureworks ABM UK 2017
Published By: NetApp     Published Date: Nov 27, 2017
Join data protection experts from Forrester Research, NetApp and AWS and find out how to secure your Microsoft Office 365 business-critical data from accidental deletion, corruption, or malicious intent.
Tags : 
    
NetApp
Published By: Lucidworks     Published Date: Aug 24, 2016
Download this eBook to learn how to optimize enterprise search and increase search relevancy using content, context, and the crowd to build better search applications.
Tags : 
search engine optimization, seo, search relevancy, search applications, search intention, ecommerce search
    
Lucidworks
Published By: Intel     Published Date: May 15, 2017
The intent of this document is to help customers who are interested in implementing security protection mechanisms in Software-Defined Networking (SDN) and Network Functions Virtualization (NFV) domains.
Tags : 
software-defined wan, security, network functions virtualization, nfv, wide area network, intel
    
Intel
Published By: HP Inc.     Published Date: Jun 15, 2018
Intent on providing options for customers, Forecast 3D offers nine different production methods. But HP Multi Jet Fusion technology is the leader of the pack. Learn how Forecast 3D has deployed HP Jet Fusion 3D printers to change the way its customers are manufacturing. Download the Case Study
Tags : 
    
HP Inc.
Published By: Carbonite     Published Date: Jan 04, 2018
Backup alone is not enough anymore. Businesses today must put a range of recoverability options in place. That’s why it is encouraging to see Carbonite, a data protection company with cloud and hybrid offerings, making fresh moves to help organizations evolve beyond legacy backup. Years ago, Carbonite pioneered cloud backup for endpoint devices. Then it expanded, buying EVault in 2015 and DoubleTake in 2017. Just as Carbonite has long been at the forefront of offering what people need from cloud-based data backup, it now appears to be just as intent on providing what IT organizations need—hybrid data protection media and mechanisms.
Tags : 
    
Carbonite
Published By: IBM     Published Date: Oct 26, 2017
The right identity and access management solution can integrate with a healthcare provider’s EMR system to help keep sensitive medical data safe—and keep the organization compliant. It can provide valuable insights and visibility into accounts, access privileges and entitlements, across the wide range of users. By closing the gaps in identity protection, organizations can fight the threats of inadvertent misuse and intentional theft that may lead to security breaches.
Tags : 
healthcare, electronic medical records, access management solutions, identity protection, medical data
    
IBM
Published By: Teradata     Published Date: May 02, 2017
Ventana’s Internet of Things (IoT) research found that the intention of organizations to embrace IoT and operational intelligence often outpace their current capabilities. Furthermore, most organizations are not ready to derive maximum value from IoT. This analyst report will take you through the Top 10 Best Practices for organizations considering how to engage with and best leverage IoT.
Tags : 
ventana, report, iot, operational intelligence, organizations
    
Teradata
Published By: Concur     Published Date: Dec 06, 2012
A straightforward guide that covers what expenses fraud is, what it costs the UK, whether you should be concerned, and what you can do about it.
Tags : 
expenses, fraud, criminal, intentional
    
Concur
Published By: Kofax     Published Date: Oct 20, 2011
In this report, we look at the drivers for ECM investment, the adoption of collaborative technologies, use of outsourcing, user priorities, views of the future as regards cloud and open source, and spend intentions for the next 12 months.
Tags : 
kofax, business, finance, ecm, investment, report, technology
    
Kofax
Published By: athenahealth     Published Date: Jun 08, 2015
In this whitepaper, we argue that traditional models for estimating HCIT costs are inadequate and overlook several business-critical variables. Our intention is not to provide a comprehensive TCO model, but to expose and examine the operational considerations that most TCO models fail to recognize or account for, and to equip executives to ask the right questions about the cost of delivering clinical and financial results stemming from technology procurement
Tags : 
hcit, heath care it, ownership, patient experience, tco
    
athenahealth
Published By: Symantec     Published Date: Dec 13, 2017
By 2021, cyber attacks are expected to cause $6 trillion in damages worldwide. To combat, spending is predicted to hit $1 trillion between 2017 and 2021. Attackers benefit from an infinite amount of time and tactics at their disposal, as they work to get around the typical static network and endpoint defenses organizations put in place. Deception can complement endpoint and network defenses, adding dynamic security mechanisms that can be customized for every environment to take the attacker’s advantage away. While endpoint and network security protects you from being compromised, deception mitigates the effects of a compromise by detecting it early and identifying the attacker intent which helps coordinate a faster and better response. Read this white paper to find out more.
Tags : 
deception, endpoint, network, security, protection, breach, attack, symantec
    
Symantec
Published By: Red Hat     Published Date: Jan 02, 2018
Once upon a time, several generations ago (in technology years), IT departments were internal departments, focused on maintaining infrastructure and services within the company. Some companies may have had external-facing services, particularly web services, but this was still generally a narrow and restricted area. IT wasn’t a revenue-generating or strategic department; it was a supporting environment viewed as a cost center. One of the outcomes of an infrastructure-focused environment is that developers lost a sense of what their code was doing. Release cycles were long, and changes were slow. A developer would work on something and throw the code into testing or operations, and it would be released months later. Because of that long lead time, engineers lost the joy of being a developer—of creating something and seeing it work in real life. One of the great, powerful changes with digital transformation and related cultural and technology changes like DevOps is that it reintroduce
Tags : 
    
Red Hat
Published By: CEB     Published Date: Nov 21, 2013
How do you know if your organization has the talent it needs to execute on its strategy? Is your organization’s talent ready to perform in the new work environment? Are your talent development programs focused on the right people?
Tags : 
ceb, big data, big data intent, global workforce, organisational talent, business objectives, productivity, innovation, talent management, workforce skills, data-based analysis, future leaders, organisational risk, global skills, landscape of diversity, global availability
    
CEB
Start   Previous   1 2 3 4    Next    End
Search      

Add A White Paper

Email sales@inetinteractive.com to find out about white paper options for your company.