point service

Results 126 - 150 of 226Sort Results By: Published Date | Title | Company Name
Published By: YouSendIt     Published Date: Dec 02, 2008
Discover why sending large e-mail attachments and other digital files is becoming increasingly problematic.  Download this informative data sheet now to learn how FTP flaws can result in exposure; why large email attachments aren’t getting through; risks of delivering files via CD-ROM; and how new digital delivery developments make it possible to send large files, fast and securely.
Tags : 
file transfer, content delivery, digital content delivery, attachment, email, ftp, security, confidentiality
    
YouSendIt
Published By: YouSendIt, Inc.     Published Date: Dec 02, 2008
Discover why sending large e-mail attachments and other digital files is becoming increasingly problematic.  Download this informative data sheet now to learn how FTP flaws can result in exposure; why large email attachments aren’t getting through; risks of delivering files via CD-ROM; and how new digital delivery developments make it possible to send large files, fast and securely.
Tags : 
file transfer, content delivery, digital content delivery, attachment, email, ftp, security, confidentiality
    
YouSendIt, Inc.
Published By: Lumension     Published Date: Aug 29, 2014
Server systems are, by definition, more important than individual endpoints. They must provide services to hundred, or even thousands, of endpoints and, naturally, must be secure. Traditional anti-virus (AV) solutions can provide protection for servers. However, constantly running AV processes, along with potentially frequent signature updates, can consume resources that could otherwise be used to provide application services to users. Read this evaluation by Tolly, commissioned by Lumension, as the dive into the impact on server resources of the alternative application control solution compared with traditional AV solutions from Microsoft Corp, Symantec Corp, and Trend Micro, Inc.
Tags : 
server, security, anti-virus, endpoint security
    
Lumension
Published By: Interactive Intelligence     Published Date: Feb 26, 2013
Insurers are renewing their focus on top line growth-seeking ways to increase premium volumes while at the same time improving profitability. Properly interacting with customers creates revenue on all ends. Read on to learn about key user interaction
Tags : 
integrated content, communications, key business issues, points of contact, upselling, account management, client services, knowledge management
    
Interactive Intelligence
Published By: CA Technologies EMEA     Published Date: Aug 07, 2017
CA’s portfolio is designed to drive efficiency from planning through production. A core component of our continuous delivery portfolio is CA Release Automation, a market-leading application release automation solution that delivers full application deployment automation and release coordination across stages, environments and teams. The solution’s analytic capabilities enable DevOps teams to plan, manage, analyze and optimize the continuous delivery pipeline from a single control point. In addition, the portfolio includes CA Agile Central, CA Agile Requirements Designer, CA Service Virtualization and CA Test Data Manager. We continue to invest in and enhance the portfolio, most recently via the acquisition of BlazeMeter, an innovative, SaaS-based performance and load-testing solution.
Tags : 
digital experience, mobile applications, business success, innovations, market, risk and cost, software development, ca technologies
    
CA Technologies EMEA
Published By: Datastax     Published Date: Apr 04, 2017
Banks are at an inflection point. According to a recent research by Viacom, 1 in every 3 U.S. consumers are open to switching banks in the next 90 days. Financial services companies need to break through the competition to gain customer trust and loyalty. Building a 360° view of the customer can help banks grow customer retention and loyalty, upsell high margin products and provide compelling interactions. However, this is no easy task as complexity increases when retail banks engage their customers across multiple channels and financial products. Gaining visibility into every customer interaction, across your business silos, and with every engagement channel is critical to making the right decisions to deliver amazing customer experiences. This white paper examines the challenges Financial Services Institutions (FSIs) face when building a 360° view of the customer to transform their customer experience and how to overcome them.
Tags : 
datastax, competition, personalization, customer loyalty
    
Datastax
Published By: DataStax     Published Date: Mar 10, 2017
Banks are at an inflection point. According to a recent research by Viacom, 1 in every 3 U.S. consumers are open to switching banks in the next 90 days. Financial services companies need to break through the competition to gain customer trust and loyalty. Building a 360° view of the customer can help banks grow customer retention and loyalty, upsell high margin products and provide compelling interactions. However, this is no easy task as complexity increases when retail banks engage their customers across multiple channels and financial products. Gaining visibility into every customer interaction, across your business silos, and with every engagement channel is critical to making the right decisions to deliver amazing customer experiences. This white paper examines the challenges Financial Services Institutions (FSIs) face when building a 360° view of the customer to transform their customer experience and how to overcome them.
Tags : 
    
DataStax
Published By: Quovant     Published Date: Oct 01, 2019
Even with the greatest level of talent on your in-house legal team, you will at some point, need the services of external counsel. When an organization rates its outside law firms, selecting just the right data might be a challenge. Business leaders may not be lawyers, so it may be necessary to rely on the self-assessment of firms to determine the “health” of their programs. But does it need to be that subjective? Hard data is an essential tool when it comes to performance evaluation. There are specific metrics organizations can use to evaluate law firm performance. While it may not be “all about the money,” these key metrics can provide insight into how your panel handles its work and the value of the results you receive.
Tags : 
    
Quovant
Published By: LifeSize, a division of Logitech     Published Date: Jan 12, 2011
There are key points to consider when looking for a videoconferencing system. As independent Telecommunications and IT consultants, part of what we do is to evaluate various products and systems regularly for mid-to-large enterprise clients, from 500 to over 30,000 employees. At a high level evaluation elements include costs, technology and features, and service.
Tags : 
lifesize, roi, telecommunication, best user experience, ip networks, ip telephony, call center management, call center software
    
LifeSize, a division of Logitech
Published By: Hewlett Packard Enterprise     Published Date: May 11, 2018
Chaque jour, nous sommes confrontés à des choix plus ou moins critiques risquant de changer notre vie. Acheter ou louer ? Créer sa propre entreprise ou travailler pour un patron ? Avec ou sans vinaigrette ? D'accord, la vinaigrette ne risque pas vraiment de changer votre vie... Le point commun aux décisions de ce type est que nous nous sentons généralement confrontés à un choix assez étroit entre deux propositions : X ou Y ? Et nous ne sommes pas seuls : les entreprises et leurs services IT ont tendance à construire leur infrastructure IT en mode soit/soit.
Tags : 
    
Hewlett Packard Enterprise
Published By: Marketo     Published Date: Feb 17, 2011
Use this PowerPoint as another tool to justify lead management and marketing automation. Customize the slides to your company's template, insert your own metrics and share with your peers however you see fit. Show how improved lead management will create more demand for your company's products or services with this custom presentation.
Tags : 
marketo, marketing automation, lead management, nurturing, sales leads, demand generation
    
Marketo
Published By: Echopass     Published Date: Sep 07, 2007
Not all companies that have adopted multi-sourcing have realized the expected levels of savings.  A single over-arching problem is often the cause when multi-sourcing delivers disappointing results in service and/or savings.
Tags : 
multi-sourcing, call center outsourcing, remote agents, disaster prevention, ip call center, ip contact center, contact center solutions, contact center software
    
Echopass
Published By: Microsoft Dynamics     Published Date: Jul 09, 2007
When White Pass & Yukon Route Railroad recast its business model, revenues gained speed, but the cumbersome UNIX system labored through long lines of customers, discouraged timely reporting, and imprisoned data behind arcane rules and menus.  Find out what WP&YR did to help increase sales 13 percent, clear out slow-moving items, save steps and stoke the profit engine.
Tags : 
unix, tourism, profitability, retail management, microsoft, microsoft retail management, dynamics, point-of-sale
    
Microsoft Dynamics
Published By: Amazon Web Services     Published Date: Nov 19, 2012
Amazon Web Services provides a highly reliable, scalable, low-cost infrastructure platform in the cloud that powers hundreds of thousands of businesses in more than 190 countries around the world.
Tags : 
aws sharepoint, enterprise sharepoint, microsoft sharepoint, microsoft sharepoint download, microsoft sharepoint online, microsoft sharepoint solutions, ms sharepoint, ms sharepoint services
    
Amazon Web Services
Published By: Promisec     Published Date: Mar 20, 2012
One of the greatest challenges to enforcing IT security and compliance lies at the endpoints, especially within Microsoft infrastructures. Learn how agentless technology has become mandatory in seeing, analyzing, and fixing Windows endpoint issues.
Tags : 
endpoint, endpoint management, endpoint control, compliance, it compliance, security, security compliance, agentless
    
Promisec
Published By: Adobe     Published Date: Nov 05, 2014
When mobile is done right, businesses reap the benefits. Companies using mobile analytics see an 11.2% increase in marketing ROI compared to a 15.9% decrease for companies that don’t. The Aberdeen Group report, Mobile Analytics: Precision Marketing across Mobile Touch-Points, provides insights into better mobile strategies. Read the report to see how incorporating analytics into your mobile marketing strategy will: • Increase brand awareness • Raise your return on marketing investments • Boost average order value • Improve time-to-market of products and services
Tags : 
mobile analytics, precision marketing, mobile touch-points, mobile analytics
    
Adobe
Published By: VMware     Published Date: Feb 24, 2017
IT organizations are largely siloed between the desktop and mobile management worlds. IT has addressed management of mobile devices with modern enterprise mobility management (EMM) solutions. However, Windows desktops have been managed separately using older PC lifecycle management (PCLM) technologies, which have fallen short of basic IT and end user expectations of today’s evolved, mobile-cloud workforce. The VMware AirWatch® Unified Endpoint Management (UEM) solution is a single, platform-independent approach for managing every device and every operating system across any organizational use case. The solution combines traditional client management requirements with modern EMM efficiencies enabling IT to deliver OS policies, patches, and apps over-the-air. Cloud-first management with instant push technologies and self-service capabilities ensure lower cost management, better security, and peak user experience regardless of the device being used to access the corporate environment.
Tags : 
    
VMware
Published By: CA Technologies EMEA     Published Date: Apr 10, 2018
Défi Les organisations engagées dans un processus de transformation numérique sont davantage préoccupées par des questions liées au risque et à la sécurité, ce qui n’a rien de surprenant. Les initiatives de transformation numérique entraînent inévitablement une augmentation du nombre de points d’accès à l’infrastructure de l’entreprise qui se situent en dehors des contrôles existants et sont accessibles par des identités plus nombreuses et plus variées qui prolifèrent à l’intérieur d’une infrastructure distribuée et dynamique. Solution Connaître vos utilisateurs privilégiés, c’est connaître vos risques. Les outils de gestion des accès à forts privilèges doivent eux-mêmes être en mesure de supporter l’automatisation du processus d’autorisation et permettre l’évolutivité grâce à la prise en charge des opérations dynamiques et de l’infrastructure éphémère, comme les comptes d’administration AWS (Amazon Web Services) pour les identités humaines.
Tags : 
    
CA Technologies EMEA
Published By: ServiceSource     Published Date: Jun 18, 2019
Market shifts and evolutions over time have brought us to a very unique point in B2B commerce. We’ve rapidly accelerated through several transitions: from a product economy, to the service economy, to the subscription economy, and today, the experience economy. Download the whitepaper to learn how ServiceSource can provide the most comprehensive and streamlined customer journey experience that spans the entire B2B customer lifecycle.
Tags : 
    
ServiceSource
Published By: Riverbed     Published Date: Jan 28, 2014
The purpose of this book is to introduce you to common network performance management (NPM) issues and give you a new way of looking at solving them. This perspective allows you to see your network from your users’ point of view, namely, the services and applications they use and their experience with them. Of course, you can still get down to the other flow and packet levels, but macro-level visibility is a key differentiator in your ability to monitor and troubleshoot network performance efficiently.
Tags : 
application performance management, application performance monitoring, big data apm, network performance management, network performance monitoring, network performance troubleshooting, networking, it management
    
Riverbed
Published By: Red Hat APAC     Published Date: Jul 16, 2019
https://asset.madisonlogic.com/production/asset-approval/35341_78975_preview.html?v=1563344610178 Red Hat CTO for global service providers, Ian Hood, and TelecomTV talk about multi edge compute capacity and the fundamental need to have a common platform to deliver future services. ‘If you are not feeling some pain, you are not driving fast enough’, says Red Hat CTO, Global Service Provider, Ian Hood. The race to 5G is definitely on, and the use cases are clear. You can talk about multi edge compute capacity and other technical issues, but the fundamental thing is to have a common platform to deliver future services. We need to get to the point where IoT Everywhere, virtualized video and all the applications that come from new 5G services are delivered seamlessly. Even blockchain has a clear future within the telco environment where the world of eSIMs, secure roaming charges and identity management can alls be based on blockchain technology.
Tags : 
    
Red Hat APAC
Published By: IBM     Published Date: Feb 08, 2008
Point of service is the key to every retail operation. But with e-mail marketing, in-store/self-service kiosks and more, the definition of point of service is changing. These changes create a unique opportunity to utilize advanced technologies to improve the customer experience. The IBM Retail Environment for SUSE LINUX (IRES) is designed to help retailers do just this -- while generating higher profits.
Tags : 
pos, point of service, tco, marketing, customer experience, increase sales, profitability, retail
    
IBM
Published By: Oracle ZDLRA     Published Date: Jan 10, 2018
Business leaders expect two things from IT: keep mission-critical applications available and high performing 24x7 and, if something does happen, recover to be back in business quickly and without losing any critical data so there is no impact on revenue stream. Of course, there is a gap between this de facto expectation from nontechnical business leaders and what current technology is actually capable of delivering. For mission-critical workloads, which are most often hosted on databases, organizations may choose to implement high availability (HA) technologies within the database to avoid downtime and data loss.
Tags : 
recovery point, recovery time, backup appliance, san/nas, service level agreement, oracle
    
Oracle ZDLRA
Published By: Dyn     Published Date: Jul 29, 2015
In this O'Reilly report, author Andy Still points out: • How the advantages of using cloud-based systems outweigh the disadvantages • How you can closely monitor system elements that you don’t control, with Real User Monitoring (RUM) and other tools • How to use a CDN and cache data as close to users as possible • How to architect your systems to gracefully handle potential cloud service failures
Tags : 
optimization, cloud, infrastructure, web operations, cloud migration, real user monitoring, cdn, cloud service failures
    
Dyn
Published By: Trend Micro     Published Date: May 03, 2018
Skills and resources — these are the two elements that make up an attacker’s arsenal. An attacker, however, cannot set out to break security or even perform sophisticated attacks without finding weak points in a system first. Massive malware attacks, email-borne heists, hacked devices, and disrupted services — all of these require a vulnerability in the network, whether in the form of technology or people, in order to be pulled off. Trend Micro has looked into the current and emerging threats, as well as the security approaches tailored for the landscape. Read on to find out how to make informed decisions with regard to the security focus areas that will figure prominently in 2018.
Tags : 
    
Trend Micro
Start   Previous    1 2 3 4 5 6 7 8 9 10    Next    End
Search Resource Library      

Add Resources

Get your company's resources in the hands of targeted business professionals.