could

Results 1 - 25 of 718Sort Results By: Published Date | Title | Company Name
Published By: CyberSource     Published Date: Apr 25, 2019
Download this white paper to find out how you could augment your fraud management with Decision Manager machine learning insights from more than 68 billion annually processed Visa and CyberSource transactions – matched with flexible rules-based fraud strategies. • Detect fraud more accurately with robust data and insights on ever-changing fraud patterns • Protect your bottom line by reducing fraud and chargebacks • Increase acceptance rates with the only fraud solution that uses machine learning to generate and test new rules-based strategies from your historic data …and more.
Tags : 
    
CyberSource
Published By: Schneider Electric     Published Date: Apr 23, 2019
Schneider Electric surveyed over 400 worldwide machine builders and factory end users in 2015. The questions they answered all centered around what their machines and plants would need to look like in 2020 if their businesses were to sustain growth and boost productivity. Their feedback has shaped (and will continue to shape) Schneider Electric digitized solution investments. Key requirements identified included: • Tools that could accommodate a younger, less skilled, and less experienced workforce • A need for simpler integration through open software connectivity and more open field buses • A need for whole lifecycle support of the products they purchase Read this eBook to see answers to some of these identified key points from those surveyed.
Tags : 
machine, digitization, industry 4.0, business models, smart machines
    
Schneider Electric
Published By: Rackspace     Published Date: May 09, 2019
Closing the communication gap around security and digital transformation: According to a recent report, 95% of CIOs expect cyber-threats to increase over the next three years. But, despite cybersecurity being front of mind for board members and IT decision-makers, many admit they do not have an appropriate security strategy in place. In this eBook we will: • Discuss why organisations do not have a strategy in place for cybersecurity, despite the board and ITDMs recognising it as a key priority • Explore the challenges ITDMs face communicating with the board about organisational priorities and skills disconnect • Reveal what ITDMs can do to help close the looming 'security strategy gap' that is widening day by day, and could be detrimental to the organisation's cloud security Download our eBook now to learn how to close the security gap in your organisation.
Tags : 
    
Rackspace
Published By: Rackspace     Published Date: May 15, 2019
The guide to how SQL Server 2008 end-of-service can drive IT modernization. End-of-service presents serious risks to your organisation if you don’t deal with it correctly—or worse—if you don’t deal with it at all, including the loss of access to critical security updates and Microsoft hotfixes. Also, if you don’t take action, your organisation will be exposed to potential disruption from hackers and malware. That means valuable customer data could be exposed to attack, risking monetary and reputational damage. And from a regulatory standpoint, there could be compliance issues with rules such as HIPAA, PCI, and GDPR. On the other hand, if you take well-considered action that aligns with your long-term strategy, end-of-service is also an opportunity for data estate modernisation. In this e-book, we’ll discuss how migration to Azure as part of your fix for SQL Server 2008 end-of-service solves for all these, and opens doors for the future of your data-driven business.
Tags : 
    
Rackspace
Published By: Zscaler     Published Date: May 15, 2019
Cloud sandboxing protection is as essential to security as keys are to encryption. Preventing CIOs and CISOs from having to make excuses when it comes to APTs, zero-days, and ransomware.
Tags : 
    
Zscaler
Published By: Genesys     Published Date: Feb 12, 2019
What if the cloud could radically improve your customer’s experience, your operations, and your bottom line? There’s a reason why many organisations are taking advantage of the benefits of cloud for contact centers. This eBook, focuses on two profiles for small contact centers, small business and small of large – a small contact center that is part of a much larger enterprise. Get key insights from independent market research that will help you make a case to take your customer communications platform to the cloud. With the right solution, your business can benefit from enterprise-quality capabilities at a price you can afford. And you can realise a return on investment in as little as three months! Download this eBook and learn: How to calculate ROI and time-to-value in different types of small contact center profiles What factors to consider when selecting a cloud vendor Three common myths about the cloud
Tags : 
    
Genesys
Published By: Gameffective     Published Date: Feb 26, 2019
Read this Microsoft case study about how Microsoft's Consumer Support Services - with its global network of support centers and thousands of agents - used digital motivation to drive agent performance and learning. Microsoft wanted new ways to recognize and reward agents while increasing their productivity. The focus was to change behaviors, develop skills, encourage sales, and drive outcomes. Microsoft identi?ed gami?cation as a solution to these needs. The company believed it could be more successful at encouraging and recognizing agents for positive outcomes through each customer interaction. Read the case study to learn how Microsoft: Increased productivity through gamification Drove agent performance with rewards, to change behaviors and business outcomes Improved agent knowledge and ability to apply the new information learned.
Tags : 
    
Gameffective
Published By: Citrix Systems     Published Date: Feb 14, 2019
"If you're moving to multi-, hybrid-, or cloud-based infrastructures, your networking solution could be the key to a streamlined transition. In our e-book, ""How your network can take on the cloud — and win,"" you'll learn how the right network solution will simplify app delivery and protect your entire infrastructure, so that you can navigate your journey to the cloud with confidence. Download our e-book and find out how: - Reduce risks with secure contextualized access - Ensure reliability and performance - Make informed decisions using intelligent insights and visibility"
Tags : 
    
Citrix Systems
Published By: CareerBuilder     Published Date: Apr 24, 2019
AKAs can be any alternative name or date of birth used by or associated with the candidate in the past. Conducting the search on AKA names can help ensure that you do not miss records that were logged under another name, for example a maiden name or an abbreviated version of a first name. When someone is arrested, if they do not have an ID on them they’ll be booked under whatever name they give to the police. Richard could be Rick, Elizabeth could be Beth, and John Joseph Smith-Johnson could be Joe Smith. These additional names are called alias names. When we look for records, we only have the name and date of birth to go on. Today, very often the individuals arrested provide an alternate name. If you are ONLY using the current legal name, or have search limitations such as LAST NAME ONLY, you might be missing records.
Tags : 
    
CareerBuilder
Published By: OneUpWeb     Published Date: Jun 16, 2010
Could your website be doing more? Find out in Oneupweb's latest study. Today, the design and usability of your website directly affects your bottom line. Discover if it's driving sales, or driving them away with the new measurement you need to determine the success of your site's design.
Tags : 
oneupweb, usability, driving sales, e-commerce, ecommerce, task, clickability, demographics, design, website design
    
OneUpWeb
Published By: Ability Commerce     Published Date: May 18, 2009
The Pro's and Con's of Frequency for online retailers. There is a happy medium for the frequency of an email newsletter or special promotions. The more you mail in the short term, the more revenue you will see, but what are the long term effects?
Tags : 
ability commerce, seo, email frequency, roi, pci, ecommerce, e-commerce, order management, load time
    
Ability Commerce
Published By: HPE & Intel®     Published Date: Oct 10, 2016
What if you could reduce the cost of running Oracle databases and improve database performance at the same time? What would it mean to your enterprise and your IT operations?
Tags : 
database, hpe, intel, data, oracle database, database management, database development, database security, data warehousing
    
HPE & Intel®
Published By: Cisco EMEA     Published Date: Mar 08, 2019
When it comes to the threat landscape, it’s important to take a look in the rearview mirror once in a while. As with driving, not only do you get a good look at what’s behind you, but you can often spot what’s coming up quick, set to overtake you. That’s the spirit of this threat report. We’ve picked out five key stories from the last year or so, not just because they were big events, but because we think these threats, or similar ones, could very well appear in the near future. Take modular threats like Emotet and VPNFilter, for example. These are threats that can deliver an on-demand menu of attacks and threats, depending on which device is infected or the intended goal of the attacker. We saw plenty of such modular threats in recent history, and wouldn’t be surprised if we see more in the future. Email remains the darling delivery method of attackers, with threats from cryptomining to Emotet using it to spread. It’s also highly likely that other threats, such as unauthorized M
Tags : 
    
Cisco EMEA
Published By: Cisco EMEA     Published Date: May 15, 2018
Your employees, customers, and partners need the ability to connect and collaborate, at any time, from any location—across time zones or simply across the conference table. And those workplaces are expanding faster than ever, powered by mobile and cloud usage that makes virtual meetings essential. With scalable and secure voice, video, and content sharing, real-time collaboration can happen anywhere. Staying connected can lead to improved productivity and faster decision-making, as well as better customer service. But only if the technology offers a seamless experience and is intuitive enough to drive user adoption. While the need for better meetings is universal, not all conferencing tools are the same. Choosing the wrong tool could actually decrease productivity by wasting valuable meeting time troubleshooting the technology, or by providing a negative experience that will deter users from embracing it. This is especially true in situations where poor meeting quality could impact
Tags : 
    
Cisco EMEA
Published By: Cisco EMEA     Published Date: Jun 01, 2018
What if defenders could see the future? If they knew an attack was coming, they could stop it, or at least mitigate its impact and help ensure what they need to protect most is safe. The fact is, defenders can see what’s on the horizon. Many clues are out there—and obvious. The Cisco 2018 Annual Cybersecurity Report presents our latest security industry advances designed to help organizations and users defend against attacks. We also look at the techniques and strategies that adversaries use to break through those defenses and evade detection. The report also highlights major findings from the Cisco 2018 Security Capabilities Benchmark Study, which examines the security posture of enterprises and their perceptions of their preparedness to defend against attacks.
Tags : 
    
Cisco EMEA
Published By: Uberflip     Published Date: Dec 20, 2018
In today’s world, marketers know that producing content isn’t enough. If they’re going to continue to make an investment in creating content, they need to do more to ensure it performs. We’ve long since known that combining content with a remarkable experience will allow it to reach its full potential, and allow marketers to see results. But as with any emerging category, content experience was not without its detractors. After all, what kind of results could you expect from an investment in the experience around that content? If you’ve ever wondered why you should care about content experience, and wanted something a little more concrete than a few anecdotes from marketers, or third-party stats, then look no further.
Tags : 
    
Uberflip
Published By: Veritas     Published Date: Sep 30, 2016
Learn how a typical organization could save over $120,000 in three years with Veritas NetBackup™ Appliances over traditional build-your-own (BYO) media servers. Veritas provides the industry’s only integrated and purpose-built backup and recovery appliances to address the financial challenges organizations face today.
Tags : 
    
Veritas
Published By: Hewlett Packard Enterprise     Published Date: Aug 02, 2017
What if you could reduce the cost of running Oracle databases and improve database performance at the same time? What would it mean to your enterprise and your IT operations? Oracle databases play a critical role in many enterprises. They’re the engines that drive critical online transaction (OLTP) and online analytical (OLAP) processing applications, the lifeblood of the business. These databases also create a unique challenge for IT leaders charged with improving productivity and driving new revenue opportunities while simultaneously reducing costs.
Tags : 
cost reduction, oracle database, it operation, online transaction, online analytics
    
Hewlett Packard Enterprise
Published By: Hewlett Packard Enterprise     Published Date: Aug 02, 2017
Increased access to data and more channels of communication have given citizens renewed civic power. Public-sector agencies must be just as responsive as any other enterprise with which citizens interact. If you’re an optimist, imagining the results of a hyperconnected citizenry is exciting. As long as government is responsive, greater citizen involvement could help reduce problems that plague modern society, including poverty, disenfranchisement and even crime.
Tags : 
data access, technology development, public sector, data security
    
Hewlett Packard Enterprise
Published By: Cisco EMEA     Published Date: Mar 14, 2018
What if defenders could see the future? If they knew an attack was coming, they could stop it, or at least mitigate its impact and help ensure what they need to protect most is safe. The fact is, defenders can see what’s on the horizon. Many clues are out there—and obvious. For years, Cisco has been warning defenders about escalating cybercriminal activity around the globe. In this, our latest annual cybersecurity report, we present data and analysis from Cisco threat researchers and several of our technology partners about attacker behavior observed over the past 12 to 18 months.
Tags : 
    
Cisco EMEA
Published By: Cisco EMEA     Published Date: Mar 26, 2019
Imagine if you could see deep into the future. And way back into the past, both at the same time. Imagine having visibility of everything that had ever happened and everything that was ever going to happen, everywhere, all at once. And then imagine processing power strong enough to make sense of all this data in every language and in every dimension. Unless you’ve achieved that digital data nirvana (and you haven’t told the rest of us), you’re going to have some unknowns in your world. In the world of security, unknown threats exist outside the enterprise in the form of malicious actors, state-sponsored attacks and malware that moves fast and destroys everything it touches. The unknown exists inside the enterprise in the form of insider threat from rogue employees or careless contractors – which was deemed by 24% of our survey respondents to pose the most serious risk to their organizations. The unknown exists in the form of new devices, new cloud applications, and new data. The unk
Tags : 
    
Cisco EMEA
Published By: Cisco EMEA     Published Date: Mar 26, 2019
The modern workplace is anywhere Complex work. Specialised teams all over the place. They’re in offices, homes, hotels, cars and airports. It could hardly be any more different to the days when people sat in neat rows of desks. That’s the modern reality of business life—it’s happening everywhere at once. Not only that, it’s happening on all kinds of devices, from desktop to mobile. And every generation of worker expects to have its workstyle accommodated. Today, co- workers mingle flexibly in pairs and groups, and those teams thrive on exchanging creative energy. They meet up in spaces designed specifically to encourage the cross-pollination of ideas. Their disruptive new concepts are where the next big growth opportunities are. The modern workplace is one where ongoing innovation is valued above all else. And flexibility extends well beyond four walls. Think about the way you work today and how it has evolved. Chances are it’s no longer 9 ‘til 5. Mobile employees, contract workers, fr
Tags : 
    
Cisco EMEA
Published By: Akamai Technologies     Published Date: May 05, 2017
Web application and DDoS attacks hit enterprises without warning or reason. Most Distributed Denial of Service (DDoS) attacks require little skill to launch with attackers can simply rent resources from DDoS-for-hire sites at a low cost.. In comparison, DDoS attacks typically result in: • Operational disruption • Loss of confidential data • Lost user productivity • Reputational harm • Damage to partner and customer relations • Lost revenue Depending on your industry, that could add up to tens of thousands of dollars in damage – and in some cases it could be millions. Only 2% of organizations said their web applications had not been compromised in the past 12 months – 98% said they had.
Tags : 
ddos, technical support, data security, application security
    
Akamai Technologies
Published By: LifeSize, a division of Logitech     Published Date: Sep 08, 2015
Video conferencing has long been thought of as the technology for the other half, something to be used by the Fortune 500 companies and executives in corner offices, the ones handling mergers and acquisitions and the like—not something that the average business could afford or make use of. In the last few years, however, a series of technological advances have changed that notion, making video conferencing not only a viable technology for businesses of all sizes but a necessity.
Tags : 
business processes, compatibility, costs, quality, network management, business intelligence, data quality, productivity
    
LifeSize, a division of Logitech
Published By: Hewlett Packard Enterprise     Published Date: Nov 06, 2017
Imagine the benefits that a VDI environment could realize during a boot storm. All the VMs are based on the same template, and therefore they all have the same set of files during initial boot. Normally, 100 VMs all booting at the same time would require a significant number of HDDs, but with this hyperconverged infrastructure platform, the first VM to boot reads the block off the HDD, which promotes that block into cache. Now the next 99 VMs can all access that same block from cache. That’s a 100:1 IOPS reduction on the IOPS-bound disks.
Tags : 
hardware, policy, scaling challenges, technical, employees, business, hyperconverged
    
Hewlett Packard Enterprise
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search Resource Library      

Add Resources

Get your company's resources in the hands of targeted business professionals.