lite

Results 1 - 25 of 140Sort Results By: Published Date | Title | Company Name
Published By: Act-On     Published Date: Jan 07, 2016
Go beyond just sales and marketing alignment and include customer success to build a winning Team Trifecta that will allow you, and your company, to make the most of the opportunity that is — literally — sitting right under your noses. In this eBook, we’ll show you how to build your own successful Team Trifecta and imagine what is possible with an approach that yields comprehensive results across every stage of the customer lifecycle. You’ll learn how to deliver dramatic improvements from small investments that generate big returns – such as customer retention.
Tags : 
customer success, productivity, team trifecta, customer lifecycle
    
Act-On
Published By: Adobe     Published Date: Feb 09, 2016
This white paper reveals how business are using mobile today.
Tags : 
mobility, mobile, mobile device, mobile security, mobile strategies, mobile experiences, mobile computing, mobile data systems, mobile workers, customer satisfaction
    
Adobe
Published By: Aerohive     Published Date: May 14, 2015
A whitepaper on how to enable modern classrooms to deliver immersive, personalised learning experiences, enhance campus productivity, and adopt new curriculum standards.
Tags : 
mobile computing, mobile data systems, mobile workers, wireless infrastructure, wireless phones, virtualization, infrastructure
    
Aerohive
Published By: AlienVault     Published Date: Oct 21, 2014
Event logs provide valuable information to troubleshoot operational errors, and investigate potential security exposures. They are literally the bread crumbs of the IT world. As a result, a commonly-used approach is to collect logs from everything connected to the network "just in case" without thinking about what data is actually useful. But, as you're likely aware, the "collect everything" approach can actually make threat detection and incident response more difficult as you wade through massive amounts of irrelevant data. Join us for this session to learn practical strategies for defining what you actually need to collect (and why) to help you improve threat detection and incident response, and satisfy compliance requirements.
Tags : 
alienvault, troubleshooting operational errors, potential security exposures, satisfy compliance requirements, security, it management, knowledge management
    
AlienVault
Published By: Anaplan     Published Date: Sep 07, 2018
Le principal avantage des projets bien pense?s et bien conduits, c’est qu’ils aboutissent immanquablement au me?me re?sultat. Un cahier des charges est e?tabli, un appel d’offres est lance?, un plan projet est agre?e?, une solution est trouve?e, la mise en oeuvre se fait dans les conditions pre?vues… et le premier constat des utilisateurs est que le re?sultat final ne correspond plus aux besoins du moment. Dans un monde dont le rythme de transformation s’acce?le?re, les enjeux d’une bonne planification et mode?lisation se de?placent. Si la qualite? des mode?les et des simulations demeure importante, la capacite? a? modifier des plans, revoir des organisations, simuler des hypothe?ses impre?vues, le tout en quelques minutes, devient une impe?rieuse ne?cessite?. Un nombre croissant d’entreprises fait confiance a? Anaplan pour relever ce de?fi. Découvrez à travers cet Ebook les 5 témoignages de UFF, AXA, AccorHotels, Schneider Electric et Onduline.
Tags : 
    
Anaplan
Published By: Anaplan     Published Date: Sep 19, 2018
Le principal avantage des projets bien pense?s et bien conduits, c’est qu’ils aboutissent immanquablement au me?me re?sultat. Un cahier des charges est e?tabli, un appel d’offres est lance?, un plan projet est agre?e?, une solution est trouve?e, la mise en oeuvre se fait dans les conditions pre?vues… et le premier constat des utilisateurs est que le re?sultat final ne correspond plus aux besoins du moment. Dans un monde dont le rythme de transformation s’acce?le?re, les enjeux d’une bonne planification et mode?lisation se de?placent. Si la qualite? des mode?les et des simulations demeure importante, la capacite? a? modifier des plans, revoir des organisations, simuler des hypothe?ses impre?vues, le tout en quelques minutes, devient une impe?rieuse ne?cessite?. Un nombre croissant d’entreprises fait confiance a? Anaplan pour relever ce de?fi. Découvrez à travers cet Ebook les 5 témoignages de UFF, AXA, AccorHotels, Schneider Electric et Onduline.
Tags : 
    
Anaplan
Published By: AT&T     Published Date: Jun 25, 2008
When evaluating the pros and cons of DSL and cable modem Internet access, enterprises should factor speed, cost, installation, consistency and security into the decision-making process. While the right access choice is a function of location, availability and service offerings, DSL is often the better option for remote workers, satellite offices and traveling employees.
Tags : 
dsl, cable, internet, internet connection, connection, connectivity, data line, at&t, att, connection speed, isp, networking, infrastructure, network management, network performance
    
AT&T
Published By: Avaya     Published Date: Mar 10, 2016
Midmarket enterprises are quite literally caught in the middle. They do not have the economies of scale of large enterprises, and their communications challenges are too complex to solve with an appstore. Although midmarket businesses have similar goals and requirements as larger enterprises, they don’t have the same degree of resources to accomplish them.
Tags : 
communication, reporting, network management, best practices, network performance, content delivery
    
Avaya
Published By: AWS     Published Date: Dec 17, 2018
Watch this webinar to discover how AbeBooks simplified their ETL process with Matillion, loading data directly into Amazon Redshift, enhancing business intelligence (BI) performance, and enabling business users to perform jobs on their own.
Tags : 
    
AWS
Published By: Benz Marketing Group     Published Date: Mar 07, 2011
Agency A-List Contender Benz Marketing Group opens several satellite Offices in the State of California, United States
Tags : 
advertising, marketing, business, economics, growth, public relations, management, california, news
    
Benz Marketing Group
Published By: BlackBerry     Published Date: Apr 13, 2010
n this webcast you will learn that Global Positioning System (GPS) is a series of 24 geosynchronous satellites that continually transmits position information.
Tags : 
blackberry, gps, tracking, microsoft exchange, mobile device management, mobile device management software, mobile workers, remote computing, wireless applications software, wireless computing, mobile computing, mobile data systems, pda, smart phones, wireless application software, wireless communications, wireless hardware, wireless infrastructure, wireless messaging, wireless phones
    
BlackBerry
Published By: BlackBerry     Published Date: Oct 03, 2012
Seeing an opportunity to help its customers and local distributors, TFC worked with BlackBerry® Alliance Elite Member FloatPoint Media Inc. to develop the custom iGasketT app. The result? Improved user safety and a wider worldwide market.
Tags : 
blackberry, mobile applications, application development, case study, mobile computing, wireless application software, wireless phones
    
BlackBerry
Published By: BlackBerry Cylance     Published Date: Jul 02, 2018
Matthew Coy, Safelite’s Vice President of Information Technology, is responsible for overseeing all aspects of the company’s IT infrastructure, including selecting, administering, and supporting technology products. The company handles personally identifiable information, including credit card information and insurance data collected from several sources, and must comply with insurance industry regulations and the Payment Card Industry Data Security Standard. Safelite is the target of constant external attacks. The organization experienced ongoing security issues stemming from infected software, drivebys and other malicious downloads. According to Matthew, “A lot of malware and email viruses were making it through the environment, all bypassing our email security and AV.” Not only were the security controls ineffective, the previous AV platform required nearly 150 hours per week to manage. Matthew knew Safelite needed to make a change, and fast. Having worked with Cylance® at two previous companies, he was confident CylancePROTECT® could significantly improve Safelite’s endpoint security. Read the full case study to learn about the results Cylance was able to deliver.
Tags : 
safe, lite, cybersecurity, data
    
BlackBerry Cylance
Published By: BMC ASEAN     Published Date: Dec 18, 2018
From the impact of disruptive technologies to the imperative of digital transformation, businesses today must find new ways to innovate or risk being left behind. While data flowing rapidly between the Internet of Things and multi-cloud computing environments brings tremendous opportunity, there’s also a great deal of complexity. Artificial intelligence (AI) and machine learning (ML) are part of the new wave of solutions capturing the minds of enterprise leaders to respond to these new opportunities and complexities. Digitally literate leaders who are highly cognizant of this wave, are jumping in headfirst and applying AI and ML to solve real business challenges—making enterprise goals of enabling cost savings via smarter operations and decision making come to fruition. BMC Cognitive Service Management (CSM) addresses the complexities of multi-cloud computing by applying intelligence, automation, and predictive capabilities. CSM employs a differentiated approach with a more holistic
Tags : 
    
BMC ASEAN
Published By: BMC ASEAN     Published Date: Dec 18, 2018
DevOps is fast becoming a core competency required to gain competitive advantage. At its most basic level, DevOps is a team approach to drive agile modern application development and operations to deliver high quality critical digital business services. Cloud services are fundamentally changing the way applications are developed. The near ubiquitous, lowfriction access to cloud computing for developers, who can literally access powerful computing resources at the touch of a keystroke or swipe of a credit card, has fundamentally altered the software development lifecycle (SDLC).
Tags : 
    
BMC ASEAN
Published By: CA Technologies EMEA     Published Date: Oct 19, 2017
OAuth est un protocole Web relativement nouveau qui régit l’octroi d’un accès limité aux applications et données. il a été conçu pour permettre aux utilisateurs d’octroyer un accès restreint aux ressources dont ils sont propriétaires (images résidant sur un site tel que Flickr ou smugMug, par exemple) à un client tiers tel qu’un site d’impression de photos par exemple. ce livre blanc de cA Technologies décrit ce qu’est OAuth et vous montre comment faciliter son implémentation au sein de votre organisation.
Tags : 
    
CA Technologies EMEA
Published By: CA Technologies EMEA     Published Date: Sep 13, 2018
En résumé L’emploi de technologies personnelles qui facilitent les communications et simplifient la vie est désormais ancré dans les habitudes des employés. Toutefois, de nombreux outils professionnels sont restés à la traîne. La plupart des solutions de gestion de portefeuilles de projets peinent à fournir des moyens simples pour l’exécution des tâches quotidiennes. Elles ne facilitent pas la communication contextuelle qui aiderait pourtant à résoudre les problèmes, et elles manquent de fonctionnalités clés, comme la capacité de se focaliser uniquement sur les données pertinentes, d’accéder à des informations complémentaires et de correctement anticiper les résultats financiers et de modèles.
Tags : 
    
CA Technologies EMEA
Published By: Canam Software Labs, Inc.     Published Date: Jan 24, 2011
How to convert your XML sample or XML schema (XSD) to COBOL data structure/COPYBOOK.
Tags : 
convert xsd xml wsdl to copybook, cobol data binding, technology
    
Canam Software Labs, Inc.
Published By: CDW     Published Date: Mar 27, 2015
Mobile devices are ubiquitous. The wide variety of functions they provide on the go — everything from making phone calls to checking email to literally millions of applications — has created widespread demand around the globe for this technology. With the right tools, an organization can extend the workplace far beyond its own physical walls. And employees can be active at any time within the 24-hour cycle; whenever inspiration strikes, a smartphone or tablet can quickly harness their productivity.
Tags : 
mobile, help desk, phone call, productivity, smartphone, tablet, email, applications, wireless, enterprise applications
    
CDW
Published By: CDW     Published Date: Jan 15, 2016
Established in 1919, Junior Achievement USA is the world’s largest organization dedicated to educating K–12 students about workforce readiness, entrepreneurship and financial literacy through experiential, hands-on programs. The nonprofit organization reaches more than 4.6 million students per year in 201,444 classrooms and after-school locations. Nearly 220,000 volunteers, including businesspeople, parents, college students and retirees, support JA programs.
Tags : 
cdw, junior achievement usa, financial literacy, ja programs, networking, knowledge management, personal finance
    
CDW
Published By: Cherwell Software     Published Date: Jun 21, 2018
Some would have you believe that ITIL® is on its way out. That it’s no longer relevant in today’s fast-paced digital environment. But ITIL still holds many timeless truths. As a set of best practice recommendations, ITIL provides a solid foundation and a common language for IT service management (ITSM) in these rapidly changing times. The problems arise when ITIL is seen as dogma. If you apply it too literally—as rules to follow, instead of recommendations to consider—ITIL will slow you down. You’re left struggling to keep up with ever-increasing user demands, not to mention your enterprise’s need to modernize and digitally transform. If you suspect ITIL is slowing you down, read on to uncover the seven ways ITIL has commonly been misapplied—and gain guidance on how you can go faster, while still upholding ITIL principles.
Tags : 
itil, implementation, digital
    
Cherwell Software
Published By: Cisco     Published Date: Sep 25, 2014
IT leaders are likely to need multiple UC vendors; however, changing expectations and product development are closing the gap between best-of-breed and good-enough technology. Assess your UC practices to see whether the features offered by your UC vendor are good enough for a single-vendor approach.
Tags : 
quadrant, unified, communications, solutions, operate, enterprises, practices, markets, mainstream, adoption phase, gartner, midsize, large, deployment, enterprise applications, data management
    
Cisco
Published By: Cisco     Published Date: May 14, 2015
Toutes les architectures IT ne sont pas égales. Que vous mettiez à jour votre infrastructure existante ou que vous partiez de zéro pour en créer une nouvelle, il est sage de choisir une solution qui facilite le déploiement et rationalise la gestion tout en maintenant des coûts raisonnables.
Tags : 
cloud computing, erp, productivity, applications, efficiency, cisco, migration, network management, power and cooling, data center design and management
    
Cisco
Published By: Cisco     Published Date: May 15, 2015
Nous assistons à une profonde transformation du data center en infrastructure partagée. Pour faciliter cette transition pour les entreprises, Cisco et NetApp ont conçu FlexPod, une plate-forme de cloud privé, validée par Microsoft pour l'exécution des applications Microsoft. Reposant sur les meilleurs serveurs, commutateurs, systèmes de stockage et logiciels du secteur, la plate-forme FlexPod aide les entreprises à satisfaire rapidement leurs besoins en matière de virtualisation et simplifie l'évolution vers une infrastructure ITaaS (IT en tant que service) tout en réduisant le coût et les risques associés à un tel effort.
Tags : 
cloud computing, erp, productivity, applications, efficiency, cisco, migration, network architecture, network management, network performance, network performance management, network provisioning, data center design and management
    
Cisco
Published By: Cisco     Published Date: Mar 17, 2017
There’s a war being waged on all our networks, and security researchers around the world are on the front lines. Here’s the inside story of how our elite security-research team neutralized one of the biggest threats in years.
Tags : 
cyersecurity, security, treat and vulnerability management, networks, cybercriminals, attacks
    
Cisco
Start   Previous   1 2 3 4 5 6    Next    End
Search Resource Library      

Add Resources

Get your company's resources in the hands of targeted business professionals.