point service

Results 151 - 175 of 221Sort Results By: Published Date | Title | Company Name
Published By: Dyn     Published Date: Jul 29, 2015
In this O'Reilly report, author Andy Still points out: • How the advantages of using cloud-based systems outweigh the disadvantages • How you can closely monitor system elements that you don’t control, with Real User Monitoring (RUM) and other tools • How to use a CDN and cache data as close to users as possible • How to architect your systems to gracefully handle potential cloud service failures
Tags : 
optimization, cloud, infrastructure, web operations, cloud migration, real user monitoring, cdn, cloud service failures
    
Dyn
Published By: Lenovo     Published Date: Sep 27, 2018
Smarter and more efficient workplaces are becoming a norm as these spaces enhance productivity, collaboration, and efficiency. Lenovo offers the best-in-class solutions to make the organizational workplace efficiency a reality. Starting from endpoint devices which enable workspace optimization to IT automation services, we bridge the gap between user requirements and IT deployments.
Tags : 
    
Lenovo
Published By: SAS     Published Date: Mar 06, 2018
When designed well, a data lake is an effective data-driven design pattern for capturing a wide range of data types, both old and new, at large scale. By definition, a data lake is optimized for the quick ingestion of raw, detailed source data plus on-the-fly processing of such data for exploration, analytics, and operations. Even so, traditional, latent data practices are possible, too. Organizations are adopting the data lake design pattern (whether on Hadoop or a relational database) because lakes provision the kind of raw data that users need for data exploration and discovery-oriented forms of advanced analytics. A data lake can also be a consolidation point for both new and traditional data, thereby enabling analytics correlations across all data. With the right end-user tools, a data lake can enable the self-service data practices that both technical and business users need. These practices wring business value from big data, other new data sources, and burgeoning enterprise da
Tags : 
    
SAS
Published By: IBM     Published Date: Mar 04, 2014
The age of the customer. Possibly no term better illustrates the current era of business. Customers expect their experience to be flawless at every touchpoint, and with competitors only a click (or tap) away, company leaders have a strong incentive to deliver. Online retailers have set a high standard in the way that they engage customers on an ongoing basis—not just during the commercial transaction, but before, during and after each interaction with the customer. Can service providers in industries such as banking, insurance, healthcare and government meet the challenge?
Tags : 
business operations, business process management, bpm, process automation, smarter process, age of customer, business activity monitoring, business analytics, business process automation, corporate portals, document management, information management, records management, search and retrieval, search engines
    
IBM
Published By: Neolane, Inc.     Published Date: Apr 01, 2010
This whitepaper is a call-to-action for all marketers to re-assess antiquated outbound marketing techniques. Marketers need to develop dialogues with customers and prospects to deliver relevant, timely, personalized information throughout the customer lifecycle and reinforce consistent messages across inbound and outbound channels.
Tags : 
neolane, customer experiences, inbound, outbound, call centers, point-of-service, customer service, crm
    
Neolane, Inc.
Published By: CarbonBlack     Published Date: Apr 07, 2016
This in-depth report examines solution providers that deliver proactive next-generation endpoint security services (NGES) covering prevention, detection and response.
Tags : 
carbon black, ema, endpoint, security, prevention, vendor, detection, response, it management, data management
    
CarbonBlack
Published By: Amazon Web Services, Inc     Published Date: Sep 16, 2013
Deploy a Microsoft SharePoint 2010 server farm on the Amazon Web Services (AWS) Cloud in 6 simple steps. Save money on IT infrastructure costs with no long term commitments. Learn how with our planning and implementation Guide, which also includes deployment tools, templates, and a video tutorial. Download Today!
Tags : 
aws sharepoint, enterprise sharepoint, microsoft sharepoint, microsoft sharepoint download, microsoft sharepoint online, microsoft sharepoint solutions, ms sharepoint, ms sharepoint services, online sharepoint, portal sharepoint, sharepoint, sharepoint application, sharepoint collaboration, sharepoint enterprise, sharepoint enterprise cal, sharepoint enterprise trial, sharepoint implementation, sharepoint installation, sharepoint integration, sharepoint microsoft
    
Amazon Web Services, Inc
Published By: Aimia     Published Date: Mar 25, 2014
Identify the most important inflection points along your customer journey from curious newcomers to brand loyalists. In this Retail Brief, learn the 10 most important loyalty moments of truth — and offer a few guidelines for getting them right.
Tags : 
aimia, inflection points, marketing, customer loyalty, customer interaction, loyalty program. post-purchase service, interaction data, purchase cycle, business insights, customer interaction service, customer relationship management, customer satisfaction, customer service
    
Aimia
Published By: Adobe     Published Date: Nov 05, 2014
When mobile is done right, businesses reap the benefits. Companies using mobile analytics see an 11.2% increase in marketing ROI compared to a 15.9% decrease for companies that don’t. The Aberdeen Group report, Mobile Analytics: Precision Marketing across Mobile Touch-Points, provides insights into better mobile strategies. Read the report to see how incorporating analytics into your mobile marketing strategy will: • Increase brand awareness • Raise your return on marketing investments • Boost average order value • Improve time-to-market of products and services
Tags : 
mobile analytics, precision marketing, mobile touch-points, mobile analytics
    
Adobe
Published By: Polycom     Published Date: Sep 07, 2016
"Seeing is believing. How we connect and collaborate is changing. It’s no longer about reviewing a PowerPoint deck or a document sent out in advance in the meeting invite over a voice bridge. It’s now about collaborating and working in real time with voice, video and content sharing—as a team. Together, Microsoft and Polycom make it simple. Watch now an interactive session covering the following hot topics: How the new Office 365 Services and Skype for Business Online change the collaboration experience and reduce conferencing/communications costs. How you can turn your conference rooms and huddles spaces into productive, collaborative workspaces. Polycom RealPresence Trio and how it accommodates our 3 collaboration needs: Voice, Content and Video. How easy it is to set up and how easy it is for users to connect. How flexible your workspace transition plan can be. Don’t miss this session featuring Polycom and Skype for Business solutions experts, Peter Huboi and Jovito Salonga, for a d
Tags : 
business optimization, business strategy, network management, business applications, best practices, business process management, collaboration, productivity, business management
    
Polycom
Published By: K2     Published Date: Jan 07, 2016
User adoption has always been something of an issue. Despite having ready access to SharePoint, many users cling to their file-shares, or more recently, adopt other ways of collaborating and sharing documents via web-based services. A third of the organizations surveyed feel that their SharePoint project has struggled to meet their original expectations, and a further 26% feel progress has stalled. Is this because of poor training and governance, restricted functionality of SharePoint, or simply the inevitable result of being the first ECM system to move beyond the safer boundaries of compliance-based aoperations? As we will see in this report, it is likely to be a combination of all of these.
Tags : 
aiim, microsoft sharepoint, user adoption, enterprise content management, networking, security, it management, wireless, knowledge management
    
K2
Published By: Adobe_Edelman     Published Date: Jun 07, 2017
With the explosion of touch points and ways to communicate, the public today is more connected than ever before with the government. The transformation for your own agency can begin right now. We’ve created this roadmap for understanding what best practices exist and how we can surprise and delight your users with new digital services. You’ll also learn new strategies to help put your agency on the path to digital transformation, as well as practical tips for getting the job done.
Tags : 
adobe, customer experience, mobile-friendly service, digital growth, public sector
    
Adobe_Edelman
Published By: Avaya     Published Date: Nov 21, 2017
In an industry like automobile sales and service, responsiveness can easily mean the difference between a service appointment, a large-ticket sale – or a customer taking their business elsewhere. Despite its reputation for meeting and exceeding customer needs, Voss Auto Network was using an aging communications system. The network of dealerships, including eight locations across Ohio, serves over 500 employees. Getting calls even when “walking the lot,” quickly retrieving voicemails, and having the ability to easily track missed calls all proved key to taking customer service, sales, and repeat business to the next level.
Tags : 
    
Avaya
Published By: IBM     Published Date: Nov 12, 2013
Customers are more demanding, the competitive landscape is more dynamic, and the very structure of companies is evolving rapidly. What can executives and business leaders do to stay ahead of the curve? Read this eBook to find out how software as a service (SaaS) can transform your business into a more competitive, customer-centric organization.
Tags : 
software as a service, saas, executive, saas solutions, business process innovation, analytics, knowledge management, enterprise applications, cloud computing
    
IBM
Published By: IBM     Published Date: Nov 12, 2013
The age of the customer. Possibly no term better illustrates the current era of business. Customers expect their experience to be flawless at every touchpoint, and with competitors only a click (or tap) away, company leaders have a strong incentive to deliver. Online retailers have set a high standard in the way that they engage customers on an ongoing basis—not just during the commercial transaction, but before, during and after each interaction with the customer. Can service providers in industries such as banking, insurance, healthcare and government meet the challenge?
Tags : 
business operations, business process management, bpm, process automation, smarter process, age of customer, business activity monitoring, business analytics, business process automation, corporate portals, document management, information management, records management, search and retrieval, search engines
    
IBM
Published By: Symantec     Published Date: Jul 11, 2017
Cloud Access Security Brokers (CASBs) serve as a critical control point to ensure the secure and compliant use of cloud apps and services. Cloud service providers typically maintain a shared responsibility policy for security—they guarantee the integrity of their service infrastructure, but the customer is responsible for securing actual app usage. In addition to the growing cloud security challenges organizations face to safeguard data and protect against threats in the cloud, total volume of cloud app adoption is accelerating, with most of it being done by business units and employees without approval or security oversight from the IT organization. As a result, CASB functionality has become so critical that by 2020 it is projected that 80% of enterprises will use a CASB solution. (Gartner)
Tags : 
cloud, cloud service providers, cloud security, cloud applications
    
Symantec
Published By: IBM     Published Date: Feb 24, 2015
Mobile capture is quickly becoming an important differentiators for many companies and organizations, especially those in traditionally document-intensive fields like banking, insurance, healthcare and government operations. According to a 2014 study conducted by AIIM, 45% of companies feel that mobile capture is vitally important, pointing to the competitive need for improved process agility and customer service across the board. Discover the top 10 questions to ask before you make your investment in mobile capture.
Tags : 
mobile capture, ibm, process agility, customer service, it management, knowledge management, enterprise applications
    
IBM
Published By: IBM     Published Date: Apr 04, 2016
CASBs provide CISOs with a critical control point for cloud service visibility, security and compliance. Use Gartner CASB frameworks to support continuous cloud service discovery, adaptive access, verification, protection and the prioritization of CASB evaluation criteria.
Tags : 
ibm, gartner, cloud, cloud security, casb, ciso, security, cloud computing
    
IBM
Published By: IBM     Published Date: Jul 15, 2016
"According to the 2016 State of Endpoint Security Survey released by the SANS™ Institute 44% of respondents report that one or more of their endpoints have been breached in the past 24 months. - Desktops, laptops and servers are the most compromised endpoints - Login and access credentials are the most commonly exfiltrated information - 55% of respondents spend 3 or more hours per compromised endpoint - Over 70% of respondents find it difficult or impossible to determine when an incident is fully remediated These statistics encompass a wide set of industries, from financial services to education. So while each network is uniquely built to support your particular business, none is immune from being breached."
Tags : 
best practices, security, technology, next gen, business analytics, business intelligence, business management
    
IBM
Published By: IBM     Published Date: Sep 30, 2016
"According to the 2016 State of Endpoint Security Survey released by the SANS™ Institute 44% of respondents report that one or more of their endpoints have been breached in the past 24 months. - Desktops, laptops and servers are the most compromised endpoints - Login and access credentials are the most commonly exfiltrated information - 55% of respondents spend 3 or more hours per compromised endpoint - Over 70% of respondents find it difficult or impossible to determine when an incident is fully remediated These statistics encompass a wide set of industries, from financial services to education. So while each network is uniquely built to support your particular business, none is immune from being breached."
Tags : 
ibm, security, big fix, endpoint security, sans report, network security, networking, enterprise applications
    
IBM
Published By: IBM     Published Date: Jan 09, 2017
According to the 2016 State of Endpoint Security Survey released by the SANS™ Institute 44% of respondents report that one or more of their endpoints have been breached in the past 24 months. - Desktops, laptops and servers are the most compromised endpoints - Login and access credentials are the most commonly exfiltrated information - 55% of respondents spend 3 or more hours per compromised endpoint - Over 70% of respondents find it difficult or impossible to determine when an incident is fully remediated These statistics encompass a wide set of industries, from financial services to education. So while each network is uniquely built to support your particular business, none is immune from being breached."
Tags : 
ibm, security, big fix, endpoint security, sans report, network security, enterprise applications
    
IBM
Published By: Group M_IBM Q119     Published Date: Feb 22, 2019
Society simply must change the way it serves its most vulnerable members. Service delivery models are outdated and constrained by budgets, organizational structures and legislation. Citizens aren’t getting what they need to become more self-sufficient and recover from hard times or significant events such as disasters. Government isn’t keeping up with the demand generated by the complex times we live in and agencies are stressed to the breaking point by current service expectations. Something different must be done to generate better outcomes. This action requires better engagement between government and citizens which can lead to more self-reliant individuals and lower demands and costs on government. In California, one county is tackling this challenge head on and has found a better way to serve their citizens.
Tags : 
    
Group M_IBM Q119
Published By: Microsoft Dynamics     Published Date: Jul 09, 2007
When White Pass & Yukon Route Railroad recast its business model, revenues gained speed, but the cumbersome UNIX system labored through long lines of customers, discouraged timely reporting, and imprisoned data behind arcane rules and menus.  Find out what WP&YR did to help increase sales 13 percent, clear out slow-moving items, save steps and stoke the profit engine.
Tags : 
unix, tourism, profitability, retail management, microsoft, microsoft retail management, dynamics, point-of-sale, customer service, inventory management, microsoft dynamics, business analytics, business integration, business management, business metrics, business process management
    
Microsoft Dynamics
Published By: Marketo     Published Date: Feb 17, 2011
Use this PowerPoint as another tool to justify lead management and marketing automation. Customize the slides to your company's template, insert your own metrics and share with your peers however you see fit. Show how improved lead management will create more demand for your company's products or services with this custom presentation.
Tags : 
marketo, marketing automation, lead management, nurturing, sales leads, demand generation
    
Marketo
Published By: Cisco     Published Date: Nov 17, 2014
Modern data centers have and continue to undergo transformation. Driven by familiar trends, green IT, endpoint growth, externalization, and increased resource requirements, modern data centers support more services, users, and data than ever before. The potential of new risks to the modern data center demands renewed attention to data center security. Data center architects must build in proper security controls, and policies and processes to address and mitigate these new risks.
Tags : 
endpoint proliferation, ids, ips, externalization, cisco, networking, security, software development, it management
    
Cisco
Start   Previous    1 2 3 4 5 6 7 8 9    Next    End
Search Resource Library      

Add Resources

Get your company's resources in the hands of targeted business professionals.