att

Results 151 - 175 of 4113Sort Results By: Published Date | Title | Company Name
Published By: OpenText     Published Date: Mar 02, 2017
Leave it to the experts to manage your EDI for you, so you can focus on your business. Read about the benefits of B2B managed services in this white paper.
Tags : 
b2b integration, document exchange, edi, erp, b2b managed services
    
OpenText
Published By: Dell     Published Date: Jul 08, 2016
Dell Virtual SAN Ready Nodes with Horizon abstract and aggregate compute and memory resources into logical pools of compute capacity, while Virtual SAN pools server-attached storage to create a high-performance, shared datastore for virtual machines.
Tags : 
technology, best practices, poweredge, hyper converged, networking, mobile computing, productivity
    
Dell
Published By: Rosetta Stone     Published Date: Jan 23, 2018
Does your company foster a strong team dynamic? More than ever, effective businesses rely on employees to work internally across departments, and externally with increasingly global networks of clients. Thousands of learners were surveyed about the impact of language training with Rosetta Stone® business solutions.Results showed investing in employee language proficiency delivers five key benefits: Strengthens business operations Stimulates employee engagement Increases productivity Drives company loyalty Attracts globally-aware Millennials
Tags : 
    
Rosetta Stone
Published By: AON     Published Date: Dec 07, 2017
With all the complexities of the U.S. health care system, people consuming health care services continue to find it challenging to navigate. That’s why, for the fifth year, Aon Hewitt is pleased to partner with the National Business Group on Health (The Business Group) and The Futures Company to conduct the Consumer Health Mindset Study. The study explores the health attitudes, motivators, and preferences of consumers across the U.S.— particularly employees and their dependents as they interact with their employer-sponsored health plans, wellness programs, and the broader health landscape. Along with our findings about the consumer health mindset, we recommend practical actions you can take to meet consumers where they are and guide them in navigating health care more effectively.
Tags : 
health care services, aon hewitt, consumer health mindset, health attitudes, national business group, the futures company
    
AON
Published By: GE Power     Published Date: Jan 30, 2017
Be the first to read the 2017 top digital trend predictions for the (remove second the) the power and utility industry, and gain a competitive edge by understanding what’s next. Across the Electricity Value Network (EVN) - from generation through T&D and end user management, first movers and proactive digital adopters are far more likely to thrive in the future. Read the new Brief and learn how:
Tags : 
2017 top digital trends, power plants, utilities, power producers, electricity value network, top digital trends, power plant cyber attacks, power grids, power industry, grid operators, cloud+edge, power plant software, platform economy
    
GE Power
Published By: GE Power     Published Date: Jan 31, 2017
Don’t wait to implement your cyber protection program. An excellent place to begin developing your approach is with the newly published The U.S. Homeland Security Strategies for Defending Industrial Control Systems. See the 7 recommended strategies and learn and how digital solutions can help fulfill steps toward a more secure operating environment.
Tags : 
cyber security power plants, utilities, power producers, power plant cyber attacks, power grids, power industry, power plant software, us homeland security, cyber security strategy, powerplant security, powerplants, cyber security assessment
    
GE Power
Published By: CrowdStrike     Published Date: Aug 01, 2017
While many organizations are guarding the front door with yesterday’s signature-based antivirus (AV) solutions, today’s unknown malware walks out the back door with all their data. What’s the answer? A new white paper, “The Rise of Machine Learning in Cybersecurity,” explains machine learning (ML) technology —what it is, how it works and why it offers better protection against the sophisticated attacks that bypass standard security measures. You’ll also learn about CrowdStrike’s exclusive ML technology and how, as part of the Falcon platform’s next-gen AV solution,it dramatically increases your ability to detect attacks that use unknown malware. Download this white paper to learn:?How different types of ML are applied in various industries and why it’s such an effective tool against unknown malware?Why ML technologies differ and what factors can increase the accuracy and effectiveness of ML ?How CrowdStrike’s ML-based technology works as part of the Falcon platform’s next-generation AV
Tags : 
    
CrowdStrike
Published By: Carbonite     Published Date: Apr 09, 2018
Malware that encrypts a victim’s data until the extortionist’s demands are met is one of the most common forms of cybercrime. And the prevalence of ransomware attacks continues to increase. Cybercriminals are now using more than 50 different forms of ransomware to target and extort money from unsuspecting individuals and businesses. Ransomware attacks are pervasive. More than 4,000 ransomware attacks happen every day, and the volume of attacks is increasing at a rate of 300 percent annually.1 According to an IDT911 study, 84 percent of small and midsize businesses will not meet or report ransomware demands.2 No one is safe from ransomware, as it attacks enterprises and SMBs, government agencies, and individuals indiscriminately. While ransomware demands more than doubled in 2016 to $679 from $294 in 2015, the cost of remediating the damage and lost productivity is many multiples higher.3 Ransomware is the equivalent of catastrophic data loss, except
Tags : 
    
Carbonite
Published By: Fitbit     Published Date: Jan 23, 2018
Don’t look work get in the way of being your healthiest and happiest self! There are loads of ways to stay active at work, no matter what the scenario. Desk jobs, lunch breaks, marathon business trips—we’ve got you covered. Read on to discover how to fit more exercise into your work day.
Tags : 
    
Fitbit
Published By: Adobe     Published Date: Nov 09, 2017
To make a great first impression, take a good look at your digital enrollment process. Because it’s more than forms. It’s the start of your customer journey. A streamlined onboarding process saves customers time and hassle. It also increases conversions, improves experiences, and reduces costs. In this report, we discuss best practices for updating your digital enrollment, including: How leaders in finance do it right Increasing engagement with mobile-optimized forms and signatures Ensuring enrollment is compliant and builds trust
Tags : 
    
Adobe
Published By: Adobe     Published Date: Nov 29, 2017
Size does matter—at least when it comes to TV Everywhere (TVE) viewing, according to a new report from Adobe Digital Insights (ADI), which looked at TVE consumption trends from January 2015 to January 2017.
Tags : 
    
Adobe
Published By: Adobe     Published Date: Dec 07, 2017
Stock photos get a bad rap sometimes. We’ve all seen images of women inexplicably smiling at their forkfuls of salad, or an unnaturally giddy customer service representative standing by. “Some stock photography just looks like stock photography,” says May Curry, a graphic design veteran with almost 20 years of experience.1 But stock photography has always been an essential part of the designer’s toolkit. When used right, it helps brands make just the right impact. Today, collections are evolving to keep pace with visual trends and create unique, attention-grabbing images-quickly and no budget. Download this whitepaper to take a look at stock's rapid transformation and how it's helping designers do beautiful work, faster than ever.
Tags : 
    
Adobe
Published By: Adobe     Published Date: Dec 07, 2017
With more and more competition for our increasingly short attention spans, it’s no wonder we’re seeing reliance on visuals as the leading form of communication across the web. Even the most well-thought-out ideas and well-written content will get lost in the shuffle if the visual elements aren’t equally compelling—or don’t communicate the right message. That’s why the imagery you choose should be as strategic as the written message behind it. It’s not enough to settle for the first applicable image you find in your stock library—you need to ensure every image is on brand and conveys the right idea. Download this whitepaper for a few ways to use imagery to meet your brand’s content marketing objectives.
Tags : 
    
Adobe
Published By: Adobe     Published Date: Apr 23, 2018
The experience is your product. In a world of infinite choices, customer experience is the last true differentiator. The optimal shopping experience happens when the right content is presented to a customer at precisely the right time, no matter where they choose to engage. Read 'The Path of Experience' to learn the critical capabilities needed to drive seamless commerce experiences that keep customers coming back for more. Read the guide to learn: – The role of dynamic merchandising in engaging customers – Steps to create compelling customer experiences using audience segmentation and personalization – Ways to scale customer experiences to create powerful connections, no matter the device or channel
Tags : 
    
Adobe
Published By: Oracle CX     Published Date: Oct 19, 2017
This paper provides guidance to organizations interested in researching Oracle’s SPARC M7 and Oracle Solaris 11 security features and capabilities. It will also provide a high level overview of some of the noteworthy features that these two product offerings bring to the market. We will review industry best practices in information security as it relates to these Oracle products in the context of a secure implementation. This paper is not meant to be an in depth technical paper, position paper, or security implementation guide. It will instead endeavor to deliver a foundational level of knowledge of the SPARC M7 processor and server technology and the function set within Oracle Solaris 11 that are primarily relevant to information security as it is currently understood. The information used to compose this paper was collected from a variety of open sources, interviews with Oracle subject matter experts, and reviews of OEM (Original Equipment Manufacturer) documentation and specificatio
Tags : 
    
Oracle CX
Published By: Oracle CX     Published Date: Oct 20, 2017
Databases have long served as the lifeline of the business. Therefore, it is no surprise that performance has always been top of mind. Whether it be a traditional row-formatted database to handle millions of transactions a day or a columnar database for advanced analytics to help uncover deep insights about the business, the goal is to service all requests as quickly as possible. This is especially true as organizations look to gain an edge on their competition by analyzing data from their transactional (OLTP) database to make more informed business decisions. The traditional model (see Figure 1) for doing this leverages two separate sets of resources, with an ETL being required to transfer the data from the OLTP database to a data warehouse for analysis. Two obvious problems exist with this implementation. First, I/O bottlenecks can quickly arise because the databases reside on disk and second, analysis is constantly being done on stale data. In-memory databases have helped address p
Tags : 
    
Oracle CX
Published By: Oracle CX     Published Date: Oct 20, 2017
This whitepaper explores the new SPARC S7 server features and then compares this offering to a similar x86 offering. The key characteristics of the SPARC S7 to be highlighted are: ? Designed for scale-out and cloud infrastructures ? SPARC S7 processor with greater core performance than the latest Intel Xeon E5 processor ? Software in Silicon which offers hardware-based features such as data acceleration and security The SPARC S7 is then compared to a similar x86 solution from three different perspectives, namely performance, risk and cost. Performance matters as business markets are driving IT to provide an environment that: ? Continuously provides real-time results. ? Processes more complex workload stacks. ? Optimizes usage of per-core software licenses. Risk matters today and into the foreseeable future, as challenges to secure systems and data are becoming more frequent and invasive from within and from outside. Oracle SPARC systems approach risk management from multiple perspectiv
Tags : 
    
Oracle CX
Published By: Gigamon     Published Date: Oct 19, 2017
Download the Forrester Total Economic Impact™ of Gigamon: Cost Savings and Business Benefits Enabled by Gigamon to see how customers benefit from comprehensive and scalable visibility across their networks. This study delves into a cost-benefit analysis of the Gigamon security delivery platform, network visibility and traffic monitoring solutions that enable companies to see what matters in order to meet their security objectives, increase productivity and keep hardware, software and personnel costs in check without affecting performance.
Tags : 
    
Gigamon
Published By: Gigamon     Published Date: Oct 19, 2017
Security Delivery Platforms for Dummies introduces IT professionals to a class of technology that transforms how security and monitoring tools are deployed on the network to provide pervasive visibility. Learn how to detect threats faster by removing network blind spots, see what matters across the global enterprise and optimize your security tools’ performance and efficacy. If you’re responsible for protecting a corporate network or managing the deployment of security tools, this book is for you!
Tags : 
    
Gigamon
Published By: Gigamon     Published Date: Oct 19, 2017
Read SC Magazine’s original research article Double Vision to learn how visibility deep into network activity and analysis of network traffic can show breaches before serious damage is done. While monitoring network traffic is hardly a new or unique technology, it is an excellent example of how visibility works. Constant vigilance of network activity is simply the best way to determine if any semblance of an attack still resides on your network. Download now!
Tags : 
    
Gigamon
Published By: Gigamon     Published Date: Oct 19, 2017
Read the Gigamon white paper, Harnessing the Power of Metadata for Security, to see why metadata is the new security super power for enterprises looking to separate signals from noise, reduce time to threat detection, and improve overall security efficacy to combat ever more advanced and persistent cyber attacks. Download now!
Tags : 
    
Gigamon
Published By: Dell and Nutanix     Published Date: Oct 26, 2017
Formata da quattro aziende e dalla consociata Anteo Group, The CSI Companies offre servizi specifici per il personale in grado di soddisfare un’ampia gamma di esigenze dei clienti. Con sede a Jacksonville, in Florida, l’azienda fornisce dal 1994 servizi di incremento del personale, ricerca di dirigenti e assunzione diretta di collaboratori per clienti che operano nel settore sanitario, bancario, dei servizi finanziari, dell’hospitality, del retail e della tecnologia, solo per citarne alcuni. L’attività viene gestita dalla sede centrale e da tre uffici regionali per servire efficacemente tutti i clienti negli Stati Uniti.
Tags : 
    
Dell and Nutanix
Published By: Dell and Nutanix     Published Date: Oct 26, 2017
I database rappresentano spesso il motore su cui si basa l'attività missioncritical dell'azienda. Sono alla base di online store, dati riservati e sistemi di gestione dei clienti e una soluzione che supporta livelli elevati di attività del database può rappresentare un grande vantaggio per la crescita aziendale.
Tags : 
    
Dell and Nutanix
Published By: DocuSign UK     Published Date: Nov 06, 2018
"In today’s intensely competitive marketplace, the business world is moving rapidly to online transactions from inefficient, costly, paper-based processes. Furthermore, consumers expect to be able to interact digitally anytime, anyplace, so providing easily accessible digital touchpoints is also critical to successfully keeping and retaining your customers. No matter the size or type of business you’re in, you want to save money and increase revenue. And you want to make it all easy. Electronic signatures are a powerful way to accomplish all that. Read the report to learn how leading companies across industries are improving critical business processes using eSignatures to achieve: - Greater customer satisfaction - Higher close rates and productivity - Lower costs, greater efficiency - Improved time to revenue - Compliance and security-risk mitigation"
Tags : 
    
DocuSign UK
Published By: DocuSign UK     Published Date: Nov 06, 2018
"Technology has made it possible for small businesses to reach more customers in new ways, resulting in some of the most high-growth businesses today. This new Age of the Customer brings a world of opportunities, as well as a few challenges. You can reach more potential customers than ever before, but you also have more competition for their attention and dollars. The good news is that in this high-competition, high-reward environment, businesses that are part of the Salesforce ecosystem are at the center of this new economy. Read on to learn more."
Tags : 
    
DocuSign UK
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search Resource Library      

Add Resources

Get your company's resources in the hands of targeted business professionals.