profile

Results 251 - 275 of 303Sort Results By: Published Date | Title | Company Name
Published By: HP and Intel® Xeon® processor     Published Date: Feb 10, 2012
This Taneja Group white paper sponsored by HP & Intel can help you overcome the problems caused by these changes in order to get the most out of virtualization.
Tags : 
intel, storage, 2.0, infrastructure, trends, storage, flexibility, drivers
    
HP and Intel® Xeon® processor
Published By: HP and Intel® Xeon® processor     Published Date: Feb 10, 2012
This paper examines the features and capabilities of the HP P4000 product family and shows how these SAN solutions help businesses to overcome the storage-related growing pains they typically encounter as they deploy a virtual infrastructure.
Tags : 
virtualization, cloud computing, infrastructure, design and facilities
    
HP and Intel® Xeon® processor
Published By: Riverbed     Published Date: Jan 16, 2013
In this report, Taneja Group explores how Riverbed Technology has identified a critical challenge that limits IT performance in highly distributed customer environments: costly, complex, and hardware-heavy branch offices.
Tags : 
wan, mobile, it infrastructure, virtualization, vsp, application integration, application performance management, best practices
    
Riverbed
Published By: Riverbed Technology, Inc.     Published Date: Apr 22, 2014
In this Taneja Group Product Profile we review Riverbed’s SteelFusion (formerly Granite), and examine how it marries together multiple technical advances to deliver innovative branch converged infrastructure. SteelFusion supports distributed IT by addressing traditional branch challenges – providing simplified deployment, resiliency in the face of network issues, improved protection, fast recovery from the central datacenter, and a greatly lowered OPEX.
Tags : 
riverbed, branch office recovery, branch office, data loss, risk aversion, backup recovery, virtual servers, branch operations
    
Riverbed Technology, Inc.
Published By: EMC Backup & Recovery Solutions     Published Date: Mar 22, 2010
In this Solution Profile, we will concentrate on the importance of optimizing data protection for evolving virtual networks, and on working with a trusted partner. Virtualization technology works across all sizes of business to reduce costs, control management overhead, and increase flexibility. However, virtualization also requires that companies adapt their traditional backup and data protection practices to suit the rapidly changing virtualization infrastructure.
Tags : 
emc, vmware, taneja, virtual environments, virtualization, backup, data protection, infrastructure
    
EMC Backup & Recovery Solutions
Published By: Polycom Inc.     Published Date: Oct 14, 2010
This white paper will look at High Profile from both the business and technology perspectives, and provide answers to these questions.
Tags : 
polycom, h.264 high profile, visual communication, real-time video, video compression, video conferencing, voice recognition, voice over ip
    
Polycom Inc.
Published By: LeadGenius     Published Date: Sep 13, 2016
You’re building a marketing and sales technology stack. Know what’s coming around the corner.
Tags : 
b2b, abm, account based marketing, account based sales, b2b marketing, lead generation, demand generation, marketing operations
    
LeadGenius
Published By: Adobe     Published Date: Aug 02, 2017
Beyond a customer’s digital profile is their real-world identity. Knowing this information and how it fits into the full customer journey is critical. Along with in-store purchase data, you can also gain insight into their brick-and-mortar buying habits, like the time of day they’re most likely to shop, the average time spent in a store, the frequency of their visits or the categories of products for which they shopped.
Tags : 
digital marketing, personalised content, customer nurturing, cross channel analytics, adobe, in-store interactions
    
Adobe
Published By: Marketo     Published Date: Jun 06, 2016
Download this complimentary marketing automation buyer’s guide from TrustRadius, the most trusted research platform for business technology. This guide, which places Marketo in the Top Rated category, is based upon a distillation of 1,650 in-depth reviews of 20 leading marketing automation (MA) software products on TrustRadius. In it, you’ll get tips for succeeding with marketing automation and detailed profiles of each marketing automation platform from its end users.
Tags : 
marketo, marketing automation software, marketing
    
Marketo
Published By: QTS Data Centers     Published Date: Mar 31, 2015
One of IT’s biggest balancing acts is to make data transactions easily available to authorized users while preventing all others from accessing its data assets. With high-profile data security breaches splashed across headlines nearly every day, CIOs are understandably worried about protecting their data. And for IT leaders who are considering moving their business to the cloud it is critical to ensure the provider they select has undertaken full and robust measures for physical and logical security.
Tags : 
qts, cloud, security, data transactions, cio report, cyber threats, security breaches, it leaders
    
QTS Data Centers
Published By: Nozomi     Published Date: Jul 08, 2019
Read this document to learn: NN-OT-Risks-Costs-DOCUMENT How OT cyberattacks cause business disruption The costs of high profile industrial cyber security incidents How to reduce risk with OT visibility and cyber security technology Examples of OT cyber security incidents by industry Complete the form and download the Executive Brief. You'll be on your way to improving your knowledge of the industrial security challenge!
Tags : 
    
Nozomi
Published By: Trapit     Published Date: Jun 02, 2016
To be successful, sometimes you need to be pointed in the right direction. That’s where our cheat sheet comes in. It answers your burning questions – like these: - Why do sales reps need social selling? - What are the ground rules for social selling? - How do you set up your social profiles to attract buyers? - How do you write tweets and LinkedIn updates that will spark engagement? - How do you find your buyers on social networks?
Tags : 
social selling, customer aquisition, trapit, social selling programs, content strategies
    
Trapit
Published By: Marketo     Published Date: Jun 08, 2017
It’s an exciting, albeit challenging time for marketers—new channels, strategies, and technologies have empowered us to engage our buyers like never before. At the same time, due to the abundance of available information, buyer expectations have increased, leaving marketers to fight for their attention as we showcase our products and services. In response, organizations are implementing an account-based marketing (ABM) strategy. Account-based marketing offers organizations a significant return on investment (ROI) as they are faced with the need to acquire, retain, and grow high-value accounts. This comprehensive, 100+ page guide includes checklists, worksheets, examples, and advice from over 12 industry thought leaders to help marketers at any level, from beginners to experts, create and implement an effective account-based marketing strategy. Download The Definitive Guide to Account-Based Marketing to learn: • How to create a solid ABM strategy to meet your goals • What stakeholders to involve across the organization • How to identify, prioritize, and profile the right accounts • What content you need to support an ABM strategy • Which channels to leverage and how to coordinate them • How to measure the effectiveness of your ABM strategy
Tags : 
access management, security information, abm, database security, application development, risk management, endpoint management, next generation intrusion protection
    
Marketo
Published By: Marketo     Published Date: Sep 03, 2019
Need a more significant ROI from your campaigns? Shift your thinking towards acquiring, retaining, and growing high-value accounts: companies or consumers that are high-yield and a better fit for your products or services. New channels, strategies, & technologies now help organizations of all sizes to implement an account-based marketing (ABM) strategy. Download Marketo's best-in-class Definitive Guide to Account-based Marketing and you'll learn: How to identify, prioritize, and profile the right accounts Creating a winning ABM strategy Creating the right content Which channels to leverage and how to coordinate them How to measure, analyse & optimize ABM campaigns What an ABM strategy that spans the entire customer lifecycle looks like in action
Tags : 
    
Marketo
Published By: Janrain, Inc.     Published Date: Oct 29, 2012
Learn how to collect, store, and leverage the social profile data of your most profitable website users, plus best practices and case studies for social login, sharing, gamification, and single sign-on. Get the paper now!
Tags : 
janrain, user management, vibrant audience, online users, user engagement
    
Janrain, Inc.
Published By: IBM APAC     Published Date: Aug 25, 2017
There is a tectonic shift in the way we work. We expect the same kind of intuitive, tactile experience with our workplace technology that we now take for granted with our smartphones, tablets and gaming systems. We expect our devices to talk to each other and update automatically. Virtual meetings should be as easy to set up as a video chat, and whatever we need to do our jobs should be as easy to tailor as a streaming music or video application.
Tags : 
personal profile, news and alerts, conversation recall, system updates, productivity tips
    
IBM APAC
Published By: AdRoll     Published Date: Jan 04, 2019
With over 1 billion active users and counting, it’s no secret that Instagram has rapidly become a major tool for businesses looking to drive tangible sales. From simple advertising options to shoppable post features, it’s now a platform that can help you find and meet your customers—right at their fingertips. But how can you start reaping the benefits for your business? In our new guide The E-commerce Guide to Marketing on Instagram, you’ll find the latest tactics around building awareness, growing your community, and reaching users at every stage of the buyer journey. Designed with marketers in mind, this practical guide also covers: Working with AdRoll to get the most out of the platform The Dos and Don’ts of advertising on Instagram Insightful case studies Actionable tips on everything from branding your profile to creating Instagram ads So, if you’re ready to harness the power of Instagram to take your business to new heights, download our handy guide today.
Tags : 
    
AdRoll
Published By: Adobe     Published Date: Aug 14, 2014
Adobe received the highest score for current digital experience (DX) delivery offerings in The Forrester Wave™: Digital Experience Delivery Platforms, Q3 2014 report. And, we’re continuing to innovate. Since the evaluation, we’ve launched several new capabilities that include richer support for mobile apps, increased usability through visual workflows, and a master marketing profile. Read the report to see why Adobe was named a Strong Performer and to learn more about: -The DX challenges that companies face and how they’re addressing them -The array of tools and technologies available in digital experience delivery platforms -The journey to unified, cross-channel digital experiences “Strategically, Adobe differentiates with its vision of the connective tissue between its tools, and its aim for single customer profile.” – Forrester Research, Inc.
Tags : 
digital experience, delivery platforms, mobile apps, software vendors
    
Adobe
Published By: Group M_IBM Q119     Published Date: Mar 01, 2019
The velocity of technology infrastructure change continues to accelerate, putting serious stress on Security Operations (SecOps). This has forced security folks to face the fact that operations has never really been their forte. That’s a bit harsh, but denial never helps address problems. The evidence is fairly strong that most organizations are pretty bad at security operations. How many high-profile breaches could have been avoided if one of many alerts was acted upon? How many attacks were made possible by not having properly patched servers or infrastructure? How many successful compromises resulted from human error?
Tags : 
    
Group M_IBM Q119
Published By: Symantec     Published Date: Apr 02, 2015
The discovery of the Heartbleed bug in April, 2014 exposed a serious vulnerability in OpenSSL, an open-source cryptographic library often used with applications and web servers like Apache and Nginx. This latest high profile, targeted attack allowed infiltrators access to the memory of web servers running vulnerable versions of the library. Heartbleed quickly compromised the privacy for communications applications on the Web such as e-commerce, banking, email, and instant messaging, and opened the door to the interception of user information, passwords, and identities. While the world now knows of the widespread havoc Heartbleed has caused to both businesses and individuals, it begs the question, “What happens when the next Heartbleed (or worse) comes along, and what can an organization do to weather yet another chapter in an all-too-familiar string of debilitating attacks?
Tags : 
heartbleed bug, openssl, communications applications, e-commerce, user information, passwords, security
    
Symantec
Published By: Adobe     Published Date: Sep 20, 2016
Download our new data-driven marketing guide, The Holistic Picture, to learn how multiple sources of data can be transformed into unified customer profiles. And see how you can use those profiles to create personalized experiences your customers will love.
Tags : 
adobe, data driven marketing, marketing, marketer, marketing guide, customer experience
    
Adobe
Published By: Adobe     Published Date: Apr 25, 2016
Data is the key to doing this. But simply collecting it won’t take you all the way. You must use the data to create holistic customer profiles, then use those customer profiles to create interesting, personalised and memorable experiences. This three-part, step-bystep eBook series explains how to actually use data to provide each customer with the best experience possible.
Tags : 
customer experience, marketing, data management
    
Adobe
Published By: CA Technologies     Published Date: Jun 01, 2018
Thanks to numerous, headline-making incidents in recent years, cybercrime has risen toward the top of the concern list for many organizations—and the customers with whom they do business. You’ve heard many of the stories. Major health insurers, such as Anthem, Premera BlueCross and CareFirst had personal information for millions of their customers stolen. Sony Pictures experienced a breach that not only embarrassed employees and adversely impacted the release of the high-profile film, “The Interview,” but also damaged systems and applications—making it extremely difficult for the company to conduct business. The list goes on. Some you maybe haven’t heard, like the one about CodeSpaces, a provider of version management services to developers. When attackers were able to gain access to its cloud-based management consoles, they deleted the company’s entire infrastructure and backups—ultimately forcing CodeSpaces out of business. The bad news for organizations like yours is, thanks to the
Tags : 
    
CA Technologies
Published By: Mimecast     Published Date: Jun 04, 2013
With recent high profile cases, such as the News of the World hacking scandal, hitting the news headlines, the issue of email retention has quickly moved up the IT Director’s agenda.
Tags : 
email archiving, ediscovery, compliance, legal, intrusion prevention, security, access control, anti spam
    
Mimecast
Published By: Hitachi Vantara     Published Date: May 10, 2018
Digitizing communications governance is critical as banks adopt next-generation automation and RegTech solutions to address compliance and risk-mitigation measures. Regulations are changing risk profiles, requiring oversight of the culture of risk-taking, and preventing market abuse. Hitachi Vantara solutions enable you to centrally “capture, curate, consume” all regulated employee communications across the front office, middle office and back office.
Tags : 
    
Hitachi Vantara
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13    Next    End
Search Resource Library      

Add Resources

Get your company's resources in the hands of targeted business professionals.