explorer

Results 1 - 25 of 39Sort Results By: Published Date | Title | Company Name
Published By: Adobe     Published Date: Jan 22, 2017
Alors que vous pensiez avoir  ni dexplorer tous les domaines du digital, le paysage a de nouveau changé. Sachant que les ventes sur Internet et via les canaux mobiles représenteront presque 40% du total des ventes à compter de 2018, il est impératif que les canaux digitaux génèrent du chi re da aires.
Tags : 
    
Adobe
Published By: CA Technologies EMEA     Published Date: Oct 19, 2017
Dans un contexte où les entreprises se tournent de plus en plus vers les équipements mobiles, les services Cloud, leurs partenaires et les développeurs tiers, les API sont devenues incontournables. La passerelle d’API de CA Technologies, CA API Gateway, offre une solution unique, capable de prendre en charge les initiatives API internes. Elle offre ainsi aux entreprises la possibilité d’explorer de nouvelles voies novatrices d’exploitation des données tout en répondant aux attentes de leurs clients et en augmentant leur efficacité. CA API Gateway allie la gestion des règles à la mise en œuvre de règles d’exécution pour garantir la centralisation de l’application des règles entre l’entreprise et l’utilisateur final, indépendamment de leur localisation.
Tags : 
    
CA Technologies EMEA
Published By: Dell     Published Date: Oct 21, 2008
Normal 0 false false false EN-US X-NONE X-NONE MicrosoftInternetExplorer4   This business-value discussion tool is designed to help quantify costs and benefits with Windows Vista.
Tags : 
dell, deployment, calculator, knowledge management, data management
    
Dell
Published By: Dell Software     Published Date: Jul 18, 2012
Take the Server Security Management Quiz
Tags : 
secure copy, enterprise security reporter, security explorer, active directory, quiz, server security, scriptlogic, server data
    
Dell Software
Published By: Dell Software     Published Date: Oct 01, 2012
Quest® Security Explorer.
Tags : 
security management, desktop mangement, servers, windows servers, sql servers
    
Dell Software
Published By: Diskeeper Corporation     Published Date: Oct 30, 2008
Virtualization does have its dangers, as it incurs greater stress on physical resources. While under utilization of CPU may be a driving factor to virtualize servers, other hardware resources may become overtaxed. Given that a host system has limited ability (depends on application) to page memory used by the guest systems, the most recognized bottleneck to address is physical memory (RAM). Options to programmatically alleviate memory bottlenecks incur performance issues when the disk is re-introduced. Another major component and perhaps less acknowledged is the disk subsystem. In many cases, depending the purpose and application of the guest/virtual systems, the disk bottleneck will be the most significant barrier to performance. Normal 0 false false false EN-US X-NONE X-NONE MicrosoftInternetExplorer4
Tags : 
diskeeper corporation, virtualize servers, virtualizations, divergence, convergence, storage
    
Diskeeper Corporation
Published By: EMC Corporation     Published Date: Mar 12, 2014
Explore the Big Data universe: Launch your mission with the EMC Big Data Explorer web app.
Tags : 
emc, digital data, data growth, idc report, big data, internet of things, customer behavior, data management
    
EMC Corporation
Published By: Entrust Datacard     Published Date: May 15, 2014
To bolster consumer trust in the foundation of ecommerce before it was irreparably damaged, several CAs and browser vendors came together to establish a higher security approach based on common standards: Extended Validation SSL certificates. EV SSL is universally supported by all desktop browsers and provides an EV trust indication. All mobile browsers support EV SSL and some provide an EV indication. Extended Validation SSL certificates have the highest impact on consumers, reassuring them that the site they are visiting is legitimate through visual cues in un-modifiable parts of the browser interface “chrome.” For example, the latest versions of Microsoft Internet Explorer, Google Chrome, Mozilla Firefox, Opera and Apple Safari display the corporate name with a green background for sites protected by an Extended Validation SSL certificate.
Tags : 
entrust, ssl, ecommerce, extended validation, chrome, mobile browsers, networking, it management
    
Entrust Datacard
Published By: Gomez IT     Published Date: Apr 01, 2011
Delivering an exceptional Web experience has never been easy, but it used to be simpler: if your content looked good in Internet Explorer, you could be reasonably certain your site was working for most of your end-users.
Tags : 
multi browser, website performance, whitepaper, web application, performance
    
Gomez IT
Published By: Gomez Marketing     Published Date: May 23, 2011
Delivering an exceptional Web experience has never been easy, but it used to be simpler: if your content looked good in Internet Explorer, you could be reasonably certain your site was working for most of your end-users. Read on.
Tags : 
compuware, web performance management, multi-browser, optimal web site performance, web experience, web application, gomez performance data
    
Gomez Marketing
Published By: IBM     Published Date: Aug 05, 2014
Watson Explorer provides organizations with a combined, trusted 360-degree view of both structured and unstructured data. The solution indexes information from unstructured data sources (PDFs, Microsoft SharePoint, flat files, social media, blogs and so on) as well as structured sources for search and discovery. Organizations can leverage their data in place, respecting existing security models when creating this virtual access point to all information. Watson Explorer requires trusted master data to ensure that links are accurate and reliable, so the end user can confidently leverage a holistic view of a customer or product.
Tags : 
ibm, data, customer, watson explorer, master data, structured, it management, data management
    
IBM
Published By: IBM     Published Date: Oct 01, 2014
Gaining a more complete, trusted view of customers is a strategic goal of most organizations. The challenge is that information about customers is typically managed and stored in many different applications, management systems and data silos. And this challenge is often compounded by a lack of consistency from one application to the next. The combination of IBM InfoSphere Data Explorer and IBM InfoSphere Master Data Management addresses these challenges by creating a single, combined, trusted 360-degree view of all data related to customers, accounts, products and other entities. The combined solution enables organizations to gain a deeper understanding of customer sentiment, increase customer loyalty and satisfaction, and get the right information to the right people to provide customers what they need to solve problems, cross-sell and up-sell.
Tags : 
data integration, customer loyalty, customer service, big data, data management
    
IBM
Published By: IBM     Published Date: Jul 14, 2015
Begin your journey toward becoming a cognitive enterprise and start gaining unprecedented value from your own data. Watson Explorer reduces unnecessary research time and allows enterprises to work smarter and faster. Read this brochure to learn how Watson Explorer combines content and data with cognitive computing capabilities to help your organization work more efficiently and make better decisions.
Tags : 
ibm, watson, software, explorer, applications, developer, cloud
    
IBM
Published By: IBM     Published Date: Oct 14, 2015
Welcome to “How to put IBM Watson to work for powerful information access and insights,” where we’ll show you how Watson and its Watson Explorer application can get down to business and help your organization be more effective, more productive, and make better-informed decisions.
Tags : 
ibm, watson, application, powerful information, networking, software development, it management, data management
    
IBM
Published By: IBM     Published Date: Feb 26, 2016
With Watson Explorer, you can keep enterprise search as the foundation and transform search into Cognitive Exploration. Leveraging technological advances such as deep search and exploration, advanced content analytics, and cognitive capabilities, IBM Watson Explorer provides a unified view of the information you need, combining data from multiple internal silos and a variety of outside datasets including social media. Stop limiting your search to traditional data sources in the new, non-traditional data world.
Tags : 
watson explorer, ibm, deep search, content analytics, enterprise software
    
IBM
Published By: IBM     Published Date: Feb 26, 2016
Welcome to “How to put IBM Watson to work for powerful information access and insights,” where we’ll show you how Watson and its Watson Explorer application can get down to business and help your organization be more effective, more productive, and make better-informed decisions.
Tags : 
ibm, watson explorer, analytics, data, enterprise software
    
IBM
Published By: IBM     Published Date: Apr 20, 2016
Welcome to “How to put IBM Watson to work for powerful information access and insights,” where we’ll show you how Watson and its Watson Explorer application can get down to business and help your organization be more effective, more productive, and make better-informed decisions.
Tags : 
ibm, ibm watson, watson explorer, business intelligence, business insights, knowledge management, business technology
    
IBM
Published By: IBM     Published Date: Apr 20, 2016
Modern organizations often have huge stores of data, which can make it difficult for employees to find the information they need when they need it. In response, innovative enterprises are creating unified information applications based on cognitive computing technology in order to put invaluable information at workers' fingertips.
Tags : 
ibm, ibm watson, watson explorer, business intelligence, business decisions, innovative enterprises, knowledge management, business technology
    
IBM
Published By: Infosys     Published Date: Aug 20, 2019
Transformation Propelled By Digital Maturity: Incumbent organizations (as opposed to digital natives) fall into 3 clusters determined by their progress along the digital transformation journey. Watchers: Who regard technology as an efficiency enabler and are trying to build a foundation for digital transformation. Explorers: Those who regard technology as enabler for select functions that directly impact CX. Visionaries: Rather, place technology at the heart of their business models and culture.
Tags : 
    
Infosys
Published By: Infosys     Published Date: Sep 24, 2018
Did you know that majority of the respondents in a recent survey identified digital skillset (57%), senior leadership commitment (50%), and change management (42%) areas as the most important success factors for digital transformation? Infosys commissioned an independent survey of over 1,000 senior management level executives from organizations with annual revenues over US$ 1 billion to understand the impact of digital disruption on their organizations and how they were dealing with it. Three clusters emerged from the survey findings, based on the business objectives behind their digital transformation initiatives- Visionaries, Explorers, and Watchers. The survey provides valuable insights into how organizations can evolve from being watchers and explorers to visionaries. Key findings from the report that you can use to charter your digital future: Visionaries target higher order business objectives, such as new business models and culture, from digital transformation, while explore
Tags : 
    
Infosys
Published By: LeadLife Solutions     Published Date: Oct 20, 2008
80% of all leads produced by marketing are not followed up on by sales. A recent industry analyst report by CSO Insights reveals that many organizations could be at risk. Could your company be at serious risk of wasting valuable marketing dollars? Download the Lead Life Cycle Optimization: 2008 Analysis study today, and gain valuable insight on how you can more effectively optimize your organization's lead generation objectives specific to your business needs... Normal 0 false false false EN-US X-NONE X-NONE MicrosoftInternetExplorer4 /* Style Definitions */ table.MsoNormalTable {mso-style-name:"Table Normal"; mso-tstyle-rowband-size:0; mso-tstyle-colband-size:0; mso-style-noshow:yes; mso-style-priority:99; mso-style-qformat:yes; mso-style-parent:""; mso-padding-alt:0in 5.4pt 0in 5.4pt; mso-para-margin:0in; mso-para-margin-bottom:.0001pt; mso-pagination:widow-orphan; font-size:11.0pt; font-family:"Calibri","sans-serif"; mso-ascii-font-family:Calibri; mso-ascii-theme-font:minor-latin; mso-fareast-font-family:"Times New Roman"; mso-fareast-theme-font:minor-fareast; mso-hansi-font-family:Calibri; mso-hansi-theme-font:minor-latin; mso-bidi-font-family:"Times New Roman"; mso-bidi-theme-font:minor-bidi;}
Tags : 
leadlife solutions, lead scoring, lead nurturing, lead generation, roi, crm
    
LeadLife Solutions
Published By: LogRhythm     Published Date: Sep 26, 2008
Normal 0 false false false EN-US X-NONE X-NONE MicrosoftInternetExplorer4 /* Style Definitions */ table.MsoNormalTable {mso-style-name:"Table Normal"; mso-tstyle-rowband-size:0; mso-tstyle-colband-size:0; mso-style-noshow:yes; mso-style-priority:99; mso-style-qformat:yes; mso-style-parent:""; mso-padding-alt:0in 5.4pt 0in 5.4pt; mso-para-margin:0in; mso-para-margin-bottom:.0001pt; mso-pagination:widow-orphan; font-size:11.0pt; font-family:"Calibri","sans-serif"; mso-ascii-font-family:Calibri; mso-ascii-theme-font:minor-latin; mso-fareast-font-family:"Times New Roman"; mso-fareast-theme-font:minor-fareast; mso-hansi-font-family:Calibri; mso-hansi-theme-font:minor-latin; mso-bidi-font-family:"Times New Roman"; mso-bidi-theme-font:minor-bidi;} The Gramm-Leach-Biley Act (GLBA) was enacted to ensure protection over customer’s records and information. LogRhythm can help financial institutions implement and perform procedures to indentify risks, eliminate or reduce these risks, and to monitor and maintain the implemented processes and procedures to ensure that the identified risks are effectively managed. Please read this whitepaper for more details…
Tags : 
glba, glba compliance, gramm-leach-biley act, compliance, financial technology, finance, comply, security
    
LogRhythm
Published By: MessageLabs     Published Date: Sep 25, 2008
Normal 0 false false false EN-US X-NONE X-NONE MicrosoftInternetExplorer4 /* Style Definitions */ table.MsoNormalTable {mso-style-name:"Table Normal"; mso-tstyle-rowband-size:0; mso-tstyle-colband-size:0; mso-style-noshow:yes; mso-style-priority:99; mso-style-qformat:yes; mso-style-parent:""; mso-padding-alt:0in 5.4pt 0in 5.4pt; mso-para-margin:0in; mso-para-margin-bottom:.0001pt; mso-pagination:widow-orphan; font-size:11.0pt; font-family:"Calibri","sans-serif"; mso-ascii-font-family:Calibri; mso-ascii-theme-font:minor-latin; mso-fareast-font-family:"Times New Roman"; mso-fareast-theme-font:minor-fareast; mso-hansi-font-family:Calibri; mso-hansi-theme-font:minor-latin; mso-bidi-font-family:"Times New Roman"; mso-bidi-theme-font:minor-bidi;} The "pump 'n' dump" stock scam has been around a long time. Learn how Internet criminals are perfecting it, and how MessageLabs offers superior protection.
Tags : 
messagelabs, stock, spam, pump ‘n’ dump, fraud, dul blocklist protection
    
MessageLabs
Previous   1 2    Next    
Search      

Add A White Paper

Email sales@inetinteractive.com to find out about white paper options for your company.