att

Results 151 - 175 of 3854Sort Results By: Published Date | Title | Company Name
Published By: HPE     Published Date: Feb 11, 2015
According to ESG’s 2014 IT Spending Intentions Survey, improving data backup and recovery is the most often mentioned priority for midmarket organizations for the third year in a row. It is the third most frequently cited priority by enterprises and midmarket organizations overall. Additionally, business continuity and disaster recovery (BC/DR) also appear in the top-ten priority lists of both midmarket and enterprise respondents.
Tags : 
    
HPE
Published By: Oracle     Published Date: Sep 05, 2014
CMOs face a major dilemma: While 75% of CEOs want marketing to become more ROI-focused and attribute revenue to efforts, they’re also being tasked to innovate and lead their companies into the digital age. Read how the Oracle Marketing Cloud provides marketing leaders with data-driven solutions to unify marketing resources and empower Modern Marketing teams to deliver personalized customer experiences across each channel.
Tags : 
roi, marketing, cmo, resources, modern, cloud, digital age, resources, innovate, solutions, data-driven, customer, dilemma, solution, data integration, business technology
    
Oracle
Published By: Oracle     Published Date: Feb 24, 2015
30 seconds or less. The average length of time that consumers spend reading or listening to online marketing communications . Marketers today are now equipped with the strategies and technologies to better capture consumer attention. To do this, they need to orchestrate individualized customer experiences across the digital channels. Read on for a statistical profile of today’s distracted consumer, followed by actionable tips for effectively communicating and converting this new type of consumer.
Tags : 
oracle, marketing, consumers, attention, message, distractions, communications, conversions, expectations, profile, experiences, individual, brand advocates, interactions, technology
    
Oracle
Published By: Dell     Published Date: May 13, 2016
No matter your line of business, technology implemented four years ago is likely near its end of life and may be underperforming as more users and more strenuous workloads stretch your resources thin. Adding memory and upgrading processors won't provide the same benefits to your infrastructure as a consolidation and upgrade can. Read this research report to learn how upgrading to Dell's PowerEdge VRTX with Hyper-V virtualization, Microsoft Windows Server 2012 R2, and Microsoft SQL Server 2014 could reduce costs while delivering better performance than trying to maintain aging hardware and software.
Tags : 
    
Dell
Published By: LogMeIn     Published Date: Mar 19, 2015
Companies have long emphasized touchpoints - the many critical moments when customers interact with the organization and its offerings on their way to purchase and after. But the narrow focus on maximizing satisfaction at those moments can create a distorted picture, suggesting that customers are happier with the company than they actually are. It also diverts attention from the bigger - and more important - picture: the customer's end-to-end journey. Download this white paper to learn more about customer experience.
Tags : 
customer experience, customer satisfaction, purchasing, customer journey
    
LogMeIn
Published By: SAP     Published Date: May 03, 2016
Find out how cloud-based SAP SuccessFactors talent management solutions can help you with all of your HR needs, from recruiting and onboarding to training and promoting your staff.
Tags : 
sap, employee, hire, retain, retention, workforce, enterprise applications, human resource technology, business technology
    
SAP
Published By: Lenovo and Intel®     Published Date: Apr 28, 2017
ThinkCentre Tiny: Robust, flexible computing, where and when it matters We all love laptops, tablets, and mobile devices; but, sometimes you need a powerful desktop that still fits neatly in small, awkward, or even non-traditional spaces. Enter Tiny. In this eBook, we dive into the diverse settings where Tiny has proven to be the better fit. Get the eBook now!
Tags : 
lenovo, flexible computing, thinkcentre, thinkcentre tiny, powerful desktop, evolving workspaces, integrated productivity
    
Lenovo and Intel®
Published By: Lenovo and Intel®     Published Date: Apr 28, 2017
ThinkCentre Tiny: Robust, flexible computing, where and when it matters for Higher Education We all love laptops, tablets, and mobile devices; but, sometimes Higher Education needs a powerful desktop that fits neatly in small, awkward, or even non-traditional spaces. Enter Tiny. In this eBook, we dive into the diverse settings where Tiny has proven to be the better fit. Get the eBook now.
Tags : 
lenovo, higher education, thinkcentre, digital classroom, classroom technology, flexible computing
    
Lenovo and Intel®
Published By: Lenovo and Intel®     Published Date: Apr 28, 2017
Better technology drives more engaged learning. Getting students engaged in the classroom is always challenging. Keeping them engaged is often the more difficult battle! Windows 10 Pro paired with innovative Lenovo tablet, laptop, and desktop computers provides the perfect user experience-driven solution — where technology is never a constraint to innovation or engagement. Learn more, get this eBook.
Tags : 
lenovo, classroom technology, education, windows 10 pro, classroom engagement, digital classroom
    
Lenovo and Intel®
Published By: Cisco     Published Date: Oct 11, 2016
The Cisco® 2016 Midyear Cybersecurity Report—which presents research, insights, and perspectives from Cisco Security Research—updates security professionals on the trends covered in our previous security report while also examining developments that may affect the security landscape later this year.
Tags : 
cybersecurity, attackers, http, ransomeware, malware
    
Cisco
Published By: Hewlett Packard Enterprise     Published Date: Mar 31, 2016
MIT Technology Review Survey: Executive Summary Are you prepared for the next breach? Only 6% of leaders say yes. Information security—or, the lack of it—is firmly on the radar for business and IT leaders in organizations of all sizes and in every sector. Many fear that their companies are ill-prepared to prevent, detect, and effectively respond to various types of cyberattacks, and a shortage of in-house security expertise remains of widespread concern. Those are among the initial findings of the Cybersecurity Challenges, Risks, Trends, and Impacts Survey, conducted by MIT Technology Review of approx. 225 business and IT executives, in partnership with Hewlett Packard Enterprise Security Services and FireEye Inc.
Tags : 
    
Hewlett Packard  Enterprise
Published By: Hewlett Packard Enterprise     Published Date: Mar 31, 2016
Cyberattacks are now a fact of life. Yet detection still lags. In 2015, the median amount of time attackers spent inside organizations before detection was 146 days. Why are we so vulnerable? MIT Technology Review asks Andrzej Kawalec, chief technology officer for HPE Security Services and Marshall Heilman, vice-president and executive director at Mandiant, a FireEye company, what we can do to make our systems more secure.
Tags : 
    
Hewlett Packard  Enterprise
Published By: Hewlett Packard Enterprise     Published Date: Mar 31, 2016
Is your organization prepared for a cyberattack? Most aren’t. 86% of organizations surveyed lack adequate cybersecurity capabilities. Read MIT Technology Review’s latest infographic, based on their survey of 225 business and IT leaders, and learn if you have cybersecurity holes and how to patch them.
Tags : 
    
Hewlett Packard  Enterprise
Published By: Hewlett Packard Enterprise     Published Date: Apr 13, 2016
To understand your organization’s risk profile: “You should start with a simple question: What are your digital assets and the cyber threats facing them,” says HPE Security Services CTO, Andrzej Kawalec. Watch the MIT Technology Review interview with HPE’s Kawalec and FireEye's Vitor Desouza in order to protect your organization from what has become daily, even hourly, attacks for many.
Tags : 
    
Hewlett Packard  Enterprise
Published By: Oracle     Published Date: Jun 20, 2016
Research conducted by The Economist Intelligence Unit (EIU), sponsored by Oracle, provides answers. The results show that a proactive security strategy backed by a fully engaged C-suite and board of directors reduced the growth of cyber-attacks and breaches by 53% over comparable firms. These findings were compiled from responses by 300 firms, across multiple industries, against a range of attack modes and over a two-year period from February 2014 to January 2016. The lessons are clear. As cyber-attackers elevate their game, the response must be an enterprise solution. Only C-suites and boards of directors marshal the authority and resources to support a truly enterprise-wide approach. In sum, proactive cyber-security strategies, supported by senior management, can cut vulnerability to cyber-attack in half.
Tags : 
security, c-suite, data, cyber risk, enterprise, management, economist, intelligence unit, enterprise applications
    
Oracle
Published By: OpenText     Published Date: Mar 02, 2017
Leave it to the experts to manage your EDI for you, so you can focus on your business. Read about the benefits of B2B managed services in this white paper.
Tags : 
b2b integration, document exchange, edi, erp, b2b managed services
    
OpenText
Published By: Dell     Published Date: Jul 08, 2016
Dell Virtual SAN Ready Nodes with Horizon abstract and aggregate compute and memory resources into logical pools of compute capacity, while Virtual SAN pools server-attached storage to create a high-performance, shared datastore for virtual machines.
Tags : 
technology, best practices, poweredge, hyper converged, networking, mobile computing, business technology
    
Dell
Published By: Rosetta Stone     Published Date: Jan 23, 2018
Does your company foster a strong team dynamic? More than ever, effective businesses rely on employees to work internally across departments, and externally with increasingly global networks of clients. Thousands of learners were surveyed about the impact of language training with Rosetta Stone® business solutions.Results showed investing in employee language proficiency delivers five key benefits: Strengthens business operations Stimulates employee engagement Increases productivity Drives company loyalty Attracts globally-aware Millennials
Tags : 
    
Rosetta Stone
Published By: AON     Published Date: Dec 07, 2017
With all the complexities of the U.S. health care system, people consuming health care services continue to find it challenging to navigate. That’s why, for the fifth year, Aon Hewitt is pleased to partner with the National Business Group on Health (The Business Group) and The Futures Company to conduct the Consumer Health Mindset Study. The study explores the health attitudes, motivators, and preferences of consumers across the U.S.— particularly employees and their dependents as they interact with their employer-sponsored health plans, wellness programs, and the broader health landscape. Along with our findings about the consumer health mindset, we recommend practical actions you can take to meet consumers where they are and guide them in navigating health care more effectively.
Tags : 
health care services, aon hewitt, consumer health mindset, health attitudes, national business group, the futures company
    
AON
Published By: GE Power     Published Date: Jan 30, 2017
Be the first to read the 2017 top digital trend predictions for the (remove second the) the power and utility industry, and gain a competitive edge by understanding what’s next. Across the Electricity Value Network (EVN) - from generation through T&D and end user management, first movers and proactive digital adopters are far more likely to thrive in the future. Read the new Brief and learn how:
Tags : 
2017 top digital trends, power plants, utilities, power producers, electricity value network, top digital trends, power plant cyber attacks, power grids, power industry, grid operators, cloud+edge, power plant software, platform economy
    
GE Power
Published By: GE Power     Published Date: Jan 31, 2017
Don’t wait to implement your cyber protection program. An excellent place to begin developing your approach is with the newly published The U.S. Homeland Security Strategies for Defending Industrial Control Systems. See the 7 recommended strategies and learn and how digital solutions can help fulfill steps toward a more secure operating environment.
Tags : 
cyber security power plants, utilities, power producers, power plant cyber attacks, power grids, power industry, power plant software, us homeland security, cyber security strategy, powerplant security, powerplants, cyber security assessment
    
GE Power
Published By: CrowdStrike     Published Date: Aug 01, 2017
While many organizations are guarding the front door with yesterday’s signature-based antivirus (AV) solutions, today’s unknown malware walks out the back door with all their data. What’s the answer? A new white paper, “The Rise of Machine Learning in Cybersecurity,” explains machine learning (ML) technology —what it is, how it works and why it offers better protection against the sophisticated attacks that bypass standard security measures. You’ll also learn about CrowdStrike’s exclusive ML technology and how, as part of the Falcon platform’s next-gen AV solution,it dramatically increases your ability to detect attacks that use unknown malware. Download this white paper to learn:?How different types of ML are applied in various industries and why it’s such an effective tool against unknown malware?Why ML technologies differ and what factors can increase the accuracy and effectiveness of ML ?How CrowdStrike’s ML-based technology works as part of the Falcon platform’s next-generation AV
Tags : 
    
CrowdStrike
Published By: Carbonite     Published Date: Apr 09, 2018
Malware that encrypts a victim’s data until the extortionist’s demands are met is one of the most common forms of cybercrime. And the prevalence of ransomware attacks continues to increase. Cybercriminals are now using more than 50 different forms of ransomware to target and extort money from unsuspecting individuals and businesses. Ransomware attacks are pervasive. More than 4,000 ransomware attacks happen every day, and the volume of attacks is increasing at a rate of 300 percent annually.1 According to an IDT911 study, 84 percent of small and midsize businesses will not meet or report ransomware demands.2 No one is safe from ransomware, as it attacks enterprises and SMBs, government agencies, and individuals indiscriminately. While ransomware demands more than doubled in 2016 to $679 from $294 in 2015, the cost of remediating the damage and lost productivity is many multiples higher.3 Ransomware is the equivalent of catastrophic data loss, except
Tags : 
    
Carbonite
Published By: Fitbit     Published Date: Jan 23, 2018
Don’t look work get in the way of being your healthiest and happiest self! There are loads of ways to stay active at work, no matter what the scenario. Desk jobs, lunch breaks, marathon business trips—we’ve got you covered. Read on to discover how to fit more exercise into your work day.
Tags : 
    
Fitbit
Published By: Adobe     Published Date: Nov 09, 2017
To make a great first impression, take a good look at your digital enrollment process. Because it’s more than forms. It’s the start of your customer journey. A streamlined onboarding process saves customers time and hassle. It also increases conversions, improves experiences, and reduces costs. In this report, we discuss best practices for updating your digital enrollment, including: How leaders in finance do it right Increasing engagement with mobile-optimized forms and signatures Ensuring enrollment is compliant and builds trust
Tags : 
    
Adobe
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.

We use technologies such as cookies to understand how you use our site and to provide a better user experience. This includes personalizing content, using analytics and improving site operations. We may share your information about your use of our site with third parties in accordance with our Privacy Policy. You can change your cookie settings as described here at any time, but parts of our site may not function correctly without them. By continuing to use our site, you agree that we can save cookies on your device, unless you have disabled cookies.
I Accept