adi

Results 226 - 250 of 3987Sort Results By: Published Date | Title | Company Name
Published By: Service Now     Published Date: Jan 26, 2018
At the highest level of organizations, a new management directive has emerged to meet the changed nature of customer demands and interactions as well as the need to differentiate within the market. This directive has one goal: providing a differentiated customer service experience. As products become increasingly commoditized, organizations can set themselves apart from their competitors by providing a unique customer service experience that creates a "relationship" based on intangible benefits that their customers will find hard to give up. While this vision is theoretically sound, it requires a significant tactical shift in business thinking and processes. The modern customer's habits and service requirements have changed radically. Meeting these needs challenges many historically held beliefs and practices regarding the customer and modes of interaction.
Tags : 
    
Service Now
Published By: Kapost     Published Date: Jan 16, 2014
Today, the internet has changed the way buyers discover solutions. More people are meeting and researching vendors online than ever before. Your ideal customers are reading blog posts and articles, checking Facebook, Twitter, and LinkedIn profiles, and forming opinions based on what you say and share online. Before they call to get to know your company better, they turn to Google for answers and information. If a competing vendor appears smarter, more interesting, or more reliable than you, your buyers will reach out to them first. These online engagements have changed the rules of buyer/brand communications. So how can you and your company form meaningful relationships with buyers who are getting to know you long before they’ve been introduced?
Tags : 
content marketing, content strategy, content management, content planning, content distribution, marketing campaigns, marketing campaign management, content marketing platform
    
Kapost
Published By: Workday Nordics     Published Date: Feb 27, 2018
This whitepaper looks into Governance, compliance, control, and audit, and how its been traditionally treated as afterthoughts, or even irritants, in the financial modules of classic “big ERP” software. It has been easy and, unfortunately, typical to ignore this topic when planning, building, and evaluating enterprise business software. Control concepts are not as urgent as transaction processing, as visible as financial reporting, or as exciting as analytics so they are almost always an afterthought. Today we can’t afford for governance to be an afterthought, and from day one Workday was built with that in mind.
Tags : 
    
Workday Nordics
Published By: McAfee     Published Date: Feb 06, 2013
It’s a critical time for security efforts to move beyond the traditional software operating stack and monitor operations from a new vantage point closer to, and within, the hardware level.
Tags : 
rootkits, kernel-mode malware, malware signatures, operating system level heuristics, kernel-mode rootkits, user-mode rootkits, koutodoor, tdss
    
McAfee
Published By: SAS     Published Date: Mar 06, 2018
Known for its industry-leading analytics, data management and business intelligence solutions, SAS is focused on helping organizations use data and analytics to make better decisions, faster. The combination of self-service BI and analytics positions you for improved productivity and smarter business decisions. So you can become more competitive as you use all your data to take better actions. Instead of depending on hunch-based choices, you can make decisions that are truly rooted in discovery and analytics. And you can do it through an interface that anyone can use. At last, your business users can get close enough to the data to manipulate it and draw their own reliable, fact-based conclusions. And they can do it in seconds or minutes, not hours or days. Equally important, IT remains in control of data access and security by providing trusted data sets and defined processes that promote the valuable, user-generated content for reuse and consistency. But, they are no longer forced
Tags : 
    
SAS
Published By: Achievers     Published Date: Mar 21, 2012
Organizations spend over $48 billion per year on employee rewards and recognition programs; however there are critical limitations to the traditional approach. In this research bulletin, Bersin & Associates discusses how Rewards and Recognition has changed to cater today's workforce.
Tags : 
employee recognition, employee engagement, employee rewards, hr trends, generation, gen x, gen y, millennials
    
Achievers
Published By: Fugue     Published Date: Mar 27, 2017
Directed at cloud architecting concerns, this paper covers streamlining complexity at scale, knowing infrastructure state, and using easily repeatable patterns that bolster security, compliance, and disaster recovery. Get this white paper now.
Tags : 
cloud management, cloud infrastructure management, cloud operating systems, cloud, cloud infrastructure, cloud computing, cloud adoption, cloud migration
    
Fugue
Published By: FireEye     Published Date: Feb 28, 2014
Organizations face a new breed of cyber attacks that easily thwart traditional defenses. These advanced attacks are targeted. They are persistent. And they are devastatingly effective at breaching your systems and stealing your sensitive data. This paper examines: The limitations of existing security solutions; Several security architectures, including sandbox-based products; An architecture built from the ground up to truly protect against today's advanced attacks.
Tags : 
fireeye, persistent threats, advanced attacks, data centers, cyber-attacks, speed of detection, accuracy of detection, small businesses
    
FireEye
Published By: Cleversafe     Published Date: Dec 07, 2012
A new storage method is revolutionizing data management, reducing costs while increasing reliability and security.
Tags : 
paradigm, shift, digital, storage, revolutionizing, software development, it management, business technology
    
Cleversafe
Published By: SAS     Published Date: Aug 03, 2016
The financial collapse of 2008 had the greatest impact on the financial services industry since World War II, resulting in consolidation and extensive regulation. The crisis coincided with increased competition from emerging economic powers, nonbanks and fintech organizations. Consumer behavior, from the adoption of mobile banking to P2P payments, forced banks to retool and respond with innovative products and investments in new delivery channels. Technology changed rapidly as well. In the capital markets, trading became fully automated, with pricing, risk decisions and settlement across exchanges made in milliseconds
Tags : 
finance, best practices, productivity, economic power, consolidation, fintech, technology, data
    
SAS
Published By: JBoss Developer     Published Date: Oct 21, 2016
Java applications have been a central technology for enterprises for two decades. This wealth of data, functionality, and knowledge are critical to enterprises. With Java-based applications, modern development can build on a platform that enables cloud-native architectures while simultaneously supporting existing applications. This combination of traditional enterprise-wide monoliths and cloud-based application deployment allows organizations to take advantage of existing knowledge and resources while actively moving toward newer application models.
Tags : 
middleware, java, big data, analytics, mobile development
    
JBoss Developer
Published By: Red Hat     Published Date: Jan 02, 2018
Organizations are at a strategic crossroads. According to IDC analysts,1 two-thirds of CEOs will center their corporate strategies around digital transformation initiatives. The goal of digital transformation is only partly to make existing functions more effective. The greater goal is to be able to do new things and use existing data in new, better ways. Yet, 72% of current IT spending2—and the focus of IT resources—is on maintaining existing systems. This creates tension between what needs to be done today and what should be done for the future. Middle-tier applications, according to IDC,3 are the core of a digital transformation strategy because they provide data integration, messaging, and application programming interface (API) management. Middle-tier applications also provide a platform for application development and management that can handle traditional enterprise applications and cloud-native, distributed applications. Specifically, a Java™ EE-based application platform can
Tags : 
    
Red Hat
Published By: Prezi     Published Date: Feb 18, 2016
Download this case study to learn how Lufthansa CSO Sadiq Gillani used Prezi's open canvas to present at TEDxBerlin.
Tags : 
    
Prezi
Published By: ALE     Published Date: Dec 05, 2018
A hospital’s network is the foundation for the critical applications that run on it, where most of those applications are related to the hospitals core businesses. The return on the investments made in EMR (electronic medical records), PACS (picture archiving and communication system), clinical imaging systems and workstations on wheels, can only be truly realized if those assets are always available to the people in need in a reliable, secure and highly optimized way, at a fixed location, or while mobile. Find out how to simplify network management and enhance application and service visibility with Smart Analytics and PALM by downloading this whitepaper today.
Tags : 
    
ALE
Published By: Apptio     Published Date: Jul 16, 2019
Your business partners need IT to deliver innovation and agility, but traditional budgeting processes struggle to do either. Interested in adopting a zero-based budgeting approach to your organization? Download this eBook to learn: - The limitations of traditional budgeting vs. zero-based budgeting - How to benchmark your budgets against business outcomes - Five myths about zero-based budgeting and why they are wrong - How to confidently build zero-based budgets with the right tool
Tags : 
    
Apptio
Published By: Oracle     Published Date: Feb 21, 2018
Over the last decade we have seen the dramatic increase in adoption of Mobile as an engagement channel for consumers and employees within the enterprise. What we are seeing now is the emergence of messaging through channels like FB Messenger, WhatsApp, WeChat, Slack, SMS, as a dominant engagement channel. Over 4.1 Billion users around the world are on instant messaging apps, adopted a rate that was much faster than on social networks. What makes these channels the default choice is the expected instant response if the other person is on or the push notification that triggers the person on the other side to respond immediately. These users that use instant messaging channels to converse with their friends and family want to use the same familiar user experience and channel to instantly communicate with the enterprise. These channels are doing to apps what browsers did to client server apps i.e. these channels are rapidly becoming the next browser. This is leading to the innovations in c
Tags : 
    
Oracle
Published By: Skillsoft     Published Date: Jan 19, 2017
An introductory guide on how to use learning to catapult your customer experience to excellence. Get tips on how to apply learning at every phase of the customer life cycle, the benefits you'll gain, and examples of how leading organizations are putting external learning into practice.
Tags : 
sumtotal systems, customer experience, customer life cycle, external learning, business technology
    
Skillsoft
Published By: SumTotal Systems     Published Date: Jan 19, 2017
An introductory guide on how to use learning to catapult your customer experience to excellence. Get tips on how to apply learning at every phase of the customer life cycle, the benefits you'll gain, and examples of how leading organizations are putting external learning into practice.
Tags : 
sumtotal systems, customer experience, customer life cycle, external learning, business technology
    
SumTotal Systems
Published By: Oracle     Published Date: Oct 20, 2017
Oracle’s software in silicon technology is truly revolutionary for providing security and workload performance increases beyond the scale of traditional new processor technology improvements. It was the vision of Oracle over 4 years ago to integrate application acceleration and security capabilities at the processor level, which enables the highest levels of security and the highest application performance levels. Software in Silicon technology is an example why Oracle software runs best on Oracle systems and will be incorporated across Oracle systems and software products including engineered systems and operating systems.
Tags : 
    
Oracle
Published By: Oracle CX     Published Date: Oct 19, 2017
Oracle’s software in silicon technology is truly revolutionary for providing security and workload performance increases beyond the scale of traditional new processor technology improvements. It was the vision of Oracle over 4 years ago to integrate application acceleration and security capabilities at the processor level, which enables the highest levels of security and the highest application performance levels. Software in Silicon technology is an example why Oracle software runs best on Oracle systems and will be incorporated across Oracle systems and software products including engineered systems and operating systems.
Tags : 
    
Oracle CX
Published By: Webroot Inc     Published Date: Jan 14, 2015
Traditional endpoint security has failed to keep up with today’s threats and is exposing organizations to unacceptable levels of risk. It’s time for smarter, next-generation malware prevention to replace or supplement traditional defenses. New approaches to malware can wrest back control and give security administrators greater visibility and control over their endpoints at a lower cost than traditional solutions. This paper looks at the endpoint threats organizations are facing, the means to combat those threats, and why next-generation, cloud-driven protection offers the smartest way to prevent endpoint malware infections.
Tags : 
malware prevention, endpoint security, levels of risk, threats, cloud-driven protection
    
Webroot Inc
Published By: Workday     Published Date: Jan 17, 2019
Enterprise software upgrades have traditionally been a real headache. But do they have to be? See how the experience of a major application upgrade process differs for two CIOs—one using on-premise software and one using Workday.
Tags : 
    
Workday
Published By: Workday     Published Date: Jul 30, 2019
Enterprise software upgrades have traditionally been a real headache. But do they have to be? See how the experience of a major application upgrade process differs for two CIOs—one using on-premise software and one using Workday.
Tags : 
    
Workday
Published By: Workday UK     Published Date: Jan 31, 2019
Enterprise software upgrades have traditionally been a real headache. But do they have to be? See how the experience of a major application upgrade process differs for two CIOs – one using on-premise software and one using Workday.
Tags : 
workday, workforce technology, digital strategy
    
Workday UK
Published By: Workday     Published Date: Feb 04, 2019
Enterprise software upgrades have traditionally been a real headache. But do they have to be? See how the experience of a major application upgrade process differs for two CIOs – one using on-premise software and one using Workday.
Tags : 
workday, workforce technology, digital strategy
    
Workday
Start   Previous    3 4 5 6 7 8 9 10 11 12 13 14 15 16 17    Next    End
Search      

Add A White Paper

Email sales@inetinteractive.com to find out about white paper options for your company.