nis

Results 1701 - 1725 of 1951Sort Results By: Published Date | Title | Company Name
Published By: Desktop Sites     Published Date: Aug 21, 2009
Konect is a powerful and cost-effective serverware solution for the growing application deployment and support demands placed on IT administrators in small and mid-size businesses.
Tags : 
application deployment, deploy applications, app deployment, serverware, konect, small business, smb, smbs
    
Desktop Sites
Published By: Lookout     Published Date: Sep 25, 2017
Understanding the full range of risks to enterprise data from mobility Lookout has developed the Mobile Risk Matrix to help organisations understand the components and vectors that make up the spectrum of mobile risk – and to provide data that will help enterprises gain a deeper understanding of the prevalence and impact of mobile threats and vulnerabilities.
Tags : 
    
Lookout
Published By: AdRoll     Published Date: Jul 11, 2017
This is Econsultancy’s first State of Marketing Attribution report, published in association with AdRoll. The research is based on an online survey of practitioners in the UK, France and Germany, aiming to establish current adoption levels and types of strategies organisations are using. The study evaluates tools and processes employed as well as the potential barriers to effective use of the capability.
Tags : 
marketing attribution, adroll, marketing strategies, efficiency
    
AdRoll
Published By: Dun & Bradstreet     Published Date: Nov 13, 2017
Engaging potential buyers in today’s complex and noisy B2B environment demands time, effort, and intelligence. All sellers can do is hope to guide them along their journey and influence their decisions. But even the best prospects are delaying interaction with sales and are often unresponsive to traditional marketing tactics. This is forcing organisations to use relevant, timely, and holistic data to guide interactions and communications across all channels.
Tags : 
data, organisations, sales, marketing, customer profiling, relationship building
    
Dun & Bradstreet
Published By: Optimizely     Published Date: Apr 06, 2018
Getting the most out of A/B and other controlled tests. In the fast-moving digital world, even experts have a hard time assessing new ideas. Case in point: At Bing a small headline change an employee proposed was deemed a low priority and shelved until one engineer decided to do a quick online controlled experiment—an A/B test—to try it out. The test showed that the change increased revenue by an astonishing 12%. That experience illustrates why it’s critical to adopt an “experiment with everything” approach, say Ron Kohavi, the head of the Analysis & Experimentation team at Microsoft, and Stefan Thomke, an HBS professor. In this article they describe: How to properly design and execute A/B and other controlled tests ? Ensure test integrity ? How to interpret results and avoid pitfalls
Tags : 
    
Optimizely
Published By: Recorded Future     Published Date: Feb 13, 2019
What actually is Threat Intelligence? How are other organisations benefiting from it? How can threat intelligence strengthen all the teams in a cybersecurity organization? Find these answers in this book! Offering practical advices that you can dip into as and when you need, so you should feel free to jump straight into the chapter that interests you most. Our hope is that you will begin to see more of the ways that threat intelligence can solve real-world security problems. In this handbook uncover: - The kinds of threat intelligence that are useful to security teams and how each team can use that intelligence to solve problems and address challenges - How security analysts in the real world use threat intelligence to decide what alerts to investigate, what incidents to escalate and what vulnerabilities to patch - How information collected outside of the enterprise can help model risks more accurately and prevent fraud And more.
Tags : 
    
Recorded Future
Published By: Recorded Future     Published Date: Feb 13, 2019
What actually is Threat Intelligence? How are other organisations benefiting from it? How can threat intelligence strengthen all the teams in a cybersecurity organization? Find these answers in this book! Offering practical advices that you can dip into as and when you need, so you should feel free to jump straight into the chapter that interests you most. Our hope is that you will begin to see more of the ways that threat intelligence can solve real-world security problems. In this handbook uncover: - The kinds of threat intelligence that are useful to security teams and how each team can use that intelligence to solve problems and address challenges - How security analysts in the real world use threat intelligence to decide what alerts to investigate, what incidents to escalate and what vulnerabilities to patch - How information collected outside of the enterprise can help model risks more accurately and prevent fraud And more
Tags : 
    
Recorded Future
Published By: Recorded Future     Published Date: Apr 18, 2019
What actually is Threat Intelligence? How are other organisations benefiting from it? How can threat intelligence strengthen all the teams in a cybersecurity organization? Find these answers in this book! Offering practical advices that you can dip into as and when you need, so you should feel free to jump straight into the chapter that interests you most. Our hope is that you will begin to see more of the ways that threat intelligence can solve real-world security problems. In this handbook uncover: - The kinds of threat intelligence that are useful to security teams and how each team can use that intelligence to solve problems and address challenges - How security analysts in the real world use threat intelligence to decide what alerts to investigate, what incidents to escalate and what vulnerabilities to patch - How information collected outside of the enterprise can help model risks more accurately and prevent fraud And more
Tags : 
    
Recorded Future
Published By: Kaspersky Lab     Published Date: Feb 18, 2014
Download the Kaspersky Lab security experts' Guide to the Threat Landscape to have access to a wealth of IT security intelligence.
Tags : 
kaspersky, kaspersky lab, malware, anti-virus industry, organizational security, mobility, byod, the cloud
    
Kaspersky Lab
Published By: Rackspace     Published Date: May 15, 2019
The guide to how SQL Server 2008 end-of-service can drive IT modernization. End-of-service presents serious risks to your organisation if you don’t deal with it correctly—or worse—if you don’t deal with it at all, including the loss of access to critical security updates and Microsoft hotfixes. Also, if you don’t take action, your organisation will be exposed to potential disruption from hackers and malware. That means valuable customer data could be exposed to attack, risking monetary and reputational damage. And from a regulatory standpoint, there could be compliance issues with rules such as HIPAA, PCI, and GDPR. On the other hand, if you take well-considered action that aligns with your long-term strategy, end-of-service is also an opportunity for data estate modernisation. In this e-book, we’ll discuss how migration to Azure as part of your fix for SQL Server 2008 end-of-service solves for all these, and opens doors for the future of your data-driven business.
Tags : 
    
Rackspace
Published By: CA Tech     Published Date: Jan 04, 2016
The purpose of this study is to provide readers with a framework to evaluate the potential financial impact of CA APM on their organisations.
Tags : 
application performance management, apm, ca technologies, finance, roi, ca apm, customer experience, reduce costs
    
CA Tech
Published By: Cisco     Published Date: Jan 02, 2018
Cisco commissioned Forrester Consulting to conduct a Total Economic Impact™ (TEI) study and examine the potential return on investment (ROI) enterprises may realize by deploying Cisco TrustSec software-defined segmentation. The purpose of this study is to provide readers with a framework to evaluate the potential financial impact of Cisco on their organizations. To better understand the benefits, costs, and risks associated with TrustSec, Forrester interviewed four customers that had deployed TrustSec. The TrustSec software-defined segmentation solution simplifies the provisioning and management of highly secure access to network services and applications. Unlike access control mechanisms that work on network topology, TrustSec policies use logical grouping. Highly secure access is consistently maintained even as resources are moved in mobile and virtualized networks. A more detailed description of TrustSec is available on the Cisco TrustSec Overview page in this document.
Tags : 
    
Cisco
Published By: Genesys     Published Date: Feb 12, 2019
What if the cloud could radically improve your customer’s experience, your operations, and your bottom line? There’s a reason why many organisations are taking advantage of the benefits of cloud for contact centers. This eBook, focuses on two profiles for small contact centers, small business and small of large – a small contact center that is part of a much larger enterprise. Get key insights from independent market research that will help you make a case to take your customer communications platform to the cloud. With the right solution, your business can benefit from enterprise-quality capabilities at a price you can afford. And you can realise a return on investment in as little as three months! Download this eBook and learn: How to calculate ROI and time-to-value in different types of small contact center profiles What factors to consider when selecting a cloud vendor Three common myths about the cloud
Tags : 
    
Genesys
Published By: New Voice Media     Published Date: Apr 03, 2017
Are you a sales manager who’s new to inside sales? Or, are you already running an inside sales team but just want to polish up your knowledge? The Ultimate Guide to Inside Sales is the place to start. You’ll learn how to staff, train, organize and motivate your inside sales team for peak performance. Welcome to the complete guide on inside sales. Everything you need to know to staff, train, organise, motivate and optimise your inside sales team for peak performance is in this guide. The guide has been specially crafted to walk you through building and growing a highly successful inside sales team and give you actionable insights and tips to start making improvements today. In this guide you will learn: • How to identify your key inside sales roles • How to hire the best talent to accelerate your sales performance • How to coach your inside sales teams • How to craft your sales funnel for deeper insight into sales performance • How to structure your team’s daily activity to improve ac
Tags : 
    
New Voice Media
Published By: Redspire     Published Date: Sep 17, 2015
This Ultimate Guide will give you practical and concrete steps you can take right now to instil a data-driven culture in your organisation.
Tags : 
redspire, crm, sales, social driven marketing, crm system, crm data
    
Redspire
Published By: Microsoft     Published Date: Nov 22, 2016
Find out how your organisation can gain access to technologies that re-invigorate the apps they run today and set them up to build groundbreaking new applications using containers and microservices architectures.
Tags : 
hybrid cloud, microsoft, applications, cloud architecture, cloud container
    
Microsoft
Published By: Imprivata     Published Date: Aug 21, 2009
When the U.S. Congress passed the Health Insurance Portability and Accountability Act (HIPAA) of 1996, among the law's many provisions was the establishment of formal regulations designed to protect the confidentiality and security of patient information. In addition to mandating new policies and procedures, the HIPAA security regulations require mechanisms for controlling access to patient data on healthcare providers' information technology (IT) systems.
Tags : 
password management, enterprise single sign on, enterprise single sign-on, single sign on, single sign-on, esso, sso, hipaa
    
Imprivata
Published By: Epicor     Published Date: May 28, 2008
Today’s supply chain is, of course, the primary processing mechanism of every manufacturing company. But it’s more than that: Its multifaceted, multicompany, multinational structure makes it the most complex management challenge found in any enterprise. Supply chain management no longer means just making sure that the right resources and the right materials move to the right place at the right time.
Tags : 
scm, supply chain, epicor, lean, manufacturing, manufacturer, lean methods
    
Epicor
Published By: IBM APAC     Published Date: Nov 22, 2017
A user initiates the call and selects the source language, such as Spanish. (In this example, assume that the target language is set to English.) As the user is talking to the support representative, the audio is converted to text using the Speech to Text service. Then using Language Translator, the text is translated to English. English language text is then sent to the Text to Speech service as input. The output audio message is what the support representative hears. All of this happens in near real time. The text from Speech to Text and the Language Translator service also can be stored in a database for analytics. The same process is repeated in reverse for the audio message sent by support personnel.
Tags : 
source, language, english, spanish, speech to text, database, analytics, audio message
    
IBM APAC
Published By: Tenable     Published Date: Feb 07, 2018
While multinational companies can likely meet some of the GDPR requirements right now, most will find the path to full compliance requires many changes to business-as-usual security practices. Read this paper to learn how you should be preparing your information security program for compliance with the GDPR. Written for InfoSec leaders, the paper includes: - A glossary outlining key concepts of the Regulation - 13 essential steps you should take to help ensure GDPR compliance - A summary of infosec considerations posed by the EU Data Protection Directive 95/46/EC and GDPRD
Tags : 
security frameworks, compliance, iso 27000, cis controls, nist, pci, security regulation
    
Tenable
Published By: Ciber     Published Date: Jun 22, 2016
Download this paper to find out how Implementing a digital transformation project can certainly offer numerous benefits to a banking organisation.
Tags : 
digital, digital banking, digital banking experience, banking organisation
    
Ciber
Published By: Shell     Published Date: Nov 19, 2018
Your turbine operates in tough conditions—running at high temperatures and exposed to a ton of contaminants. As the pressure to perform builds on your turbine, your turbine oil can start to degrade. Read this brief and learn why monitoring turbine oil condition can be critical to preventing unplanned downtime. You'll also: • Discover the causes of sludge and varnish formation that lead to critical component failure • Understand how common contaminants contribute to degradation processes like hydrolysis • Find out why oil additives become depleted, significantly impacting oil life and performance GET THE BRIEF ON CAUSES AND CURES OF OIL DEGRADATION. In the brief, you’ll learn some of the common causes of turbine oil degradation that happen all the time during the course of turbine operation. Download the brief and learn how to avoid problems like contamination and varnish build-up that can really cost your operation money in unplanned maintenance, repairs, and downtime.
Tags : 
    
Shell
Published By: Workday UK     Published Date: Jan 31, 2019
Read now to learn about three key steps drawn from the “2018 Deloitte Global Human Capital Trends” report that emerging organisations can take to attract and retain top talent, including: Redefining careers Creating more personalised performance enablement to boost employee engagement Using data-driven technology and analytics to enhance business value
Tags : 
workday, workforce technology, digital strategy
    
Workday UK
Published By: Workday     Published Date: Feb 04, 2019
"Read now to learn about three key steps drawn from the “2018 Deloitte Global Human Capital Trends” report that emerging organisations can take to attract and retain top talent, including: ? Redefining careers ? Creating more personalised performance enablement to boost employee engagement ? Using data-driven technology and analytics to enhance business value "
Tags : 
workday, workforce technology, digital strategy
    
Workday
Published By: DataVail     Published Date: Jan 08, 2013
In this whitepaper, you will learn about three essential things to consider when evaluating and selecting an outsourcing partner for database administration.
Tags : 
database, administration, outsourcing, dba, database administration, infrastructure
    
DataVail
Start   Previous    62 63 64 65 66 67 68 69 70 71 72 73 74 75 76    Next    End
Search      

Add A White Paper

Email sales@inetinteractive.com to find out about white paper options for your company.