attention

Results 126 - 150 of 279Sort Results By: Published Date | Title | Company Name
Published By: AppDynamics     Published Date: Dec 08, 2017
A 2017 study examining the impact of app performance on consumer behavior and business outcomes
Tags : 
    
AppDynamics
Published By: AppDynamics     Published Date: Dec 08, 2017
A 2017 study examining the impact of app performance on consumer behavior and business outcomes
Tags : 
    
AppDynamics
Published By: IBM     Published Date: Jul 08, 2015
This survey explores where today’s testers are spending their time, what obstacles they most often encounter, and where they think their attention should be focused.
Tags : 
survey, data-driven report, test automation, mobile testing, testing experience, testing defects, testing delays, business intelligence, database development, data quality, design and facilities, research, infrastructure management
    
IBM
Published By: Epicor     Published Date: Jan 10, 2013
The recent recession has forced distributors and manufactures to pay closer attention to the bottom line and to the financial factors that contribute to profitability.
Tags : 
epicor, gross margin, distribution, financial factors, financial components, business technology
    
Epicor
Published By: Epicor     Published Date: Jan 11, 2013
The recent recession has forced distributors and manufactures to pay closer attention to the bottom line and to the financial factors that contribute to profitability.
Tags : 
epicor, distribution, gross margin, business technology
    
Epicor
Published By: Tealeaf     Published Date: Mar 31, 2011
Given the increasing importance of connected channels to nearly all businesses and government functions, it is no wonder that analysis of these channels is getting more attention.
Tags : 
tealeaf, advanced site optimization, web analytics, digital analysis application, analytics intelligence
    
Tealeaf
Published By: PitneyBowes     Published Date: Sep 29, 2010
Recent study suggests that a new technology can capture increased consumer attention for a modest incremental cost (open-ability research).
Tags : 
pitney bowes, open envelopes, color text, graphic, mailing
    
PitneyBowes
Published By: Citrix Systems     Published Date: Feb 10, 2016
An ADC is one of the most critical elements of an organization’s datacenter and cloud architecture. As you evaluate ADC solutions, it’s essential to pay close attention to their ability to address the most important challenges in your environment. This paper highlights nine key datacenter and cloud architecture challenges that NetScaler helps solve more effectively than F5 to help you.
Tags : 
    
Citrix Systems
Published By: LogMeIn     Published Date: Jan 15, 2014
The following industry forecasts and findings highlight mobile’s growth potential and each on their own should merit merchants’ attention. Learn more about the potential of mobile growth through this whitepaper.
Tags : 
logmein, merchants and consumer, mobility, mobile mastery, industry insights, smartphones, research findings, e-tailing groups, mcommerce checklist, customer service, top merchants, cross-channel efficiency, inventory access, best practice
    
LogMeIn
Published By: CDW     Published Date: Nov 12, 2012
In organizations of every size, data center optimization has become an ongoing focus of attention.
Tags : 
data center optimizations, data centers, converged infrastructure, reference architecture, business technology, data center
    
CDW
Published By: Datastax     Published Date: Aug 07, 2018
Applications designed for the public sector rarely get the treatment and attention they need or deserve. That’s about to change. A new climate of data speed and readiness, spawned by the Right-Now Economy and the Right-Now Customer, has made unlocking the full potential of all data a key aspect to delivering powerful, mission-critical applications that enrich lives as much as they save them. Read this white paper to learn how it happens
Tags : 
    
Datastax
Published By: Anaplan     Published Date: Sep 07, 2018
For many years, large corporations have employed financial planning and analysis professionals to oversee budgeting, planning, forecasting and analysis. But the sea-change in technology, data and the competitive landscape is having a sustained impact on the FP&A function as it transforms from a predominately budgeting function to a forward-focussed strategic contributor. Now, as new cloud technology makes implementing modern FP&A quicker and cheaper, the function has become more accessible to medium-sized, or even smaller, organisations. There is a nascent but growing realisation that this corner of the finance function should be demanding more of an organisation’s attention, large or small, because having accurate and timely visibility, further into the future, could mean the difference between success and failure in today’s highly uncertain and volatile business environment.
Tags : 
    
Anaplan
Published By: ChannelAdvisor     Published Date: Jan 17, 2019
"With millions of sellers and billions of products to compete with on marketplaces, it’s easy to get buried in data every day — and still feel behind. And this is now true across almost all product verticals, as more and more niche categories become intense competitive battlegrounds. Shoppers know they have multiple options for purchasing the same item, and it’s no longer your product descriptions and images alone that capture attention. If you want to consistently rise to the top of results, a structured pricing strategy is a must. In this eBook, you’ll learn: - Complications of marketplace pricing - Benefits of strategic pricing - Pricing best practices - And more"
Tags : 
    
ChannelAdvisor
Published By: Infosys     Published Date: May 21, 2018
Customers buy products in return for money. But at the heart of our client's vision was another exchange, which was perhaps even more fundamental. Customers would give their time and attention - and in return they wanted an experience that meets their needs, what is often referred to as 'return on engagement' But how can you offer a suitable experience when you don't know enough about the customer? Our client had gathered data, but it was siloed - and there was a big disconnect between the physical and digital operations of the business. The two were not integrated, making it difficult to build a picture of the customers' widely varying needs. This was also a global business with different approaches for different markets, leading to further inefficiencies and silos. It was time to consolidate, standardize, and to really get to know the customer.
Tags : 
crm, product, exchange, customers, engagement
    
Infosys
Published By: Ephesoft     Published Date: Apr 04, 2018
If you have worked in an Accounts Payable department, you know that the premise of most AP functions is number-driven and data-driven. Invoices come in, they are processed and money goes out. While it may sound easy, the process requires special attention to details, numbers, data entry, approvals and other business processes. Organizations that use innovative, smart document capture solutions now have a simple way to streamline invoicing, improve accuracy and increase productivity.
Tags : 
    
Ephesoft
Published By: Citrix     Published Date: Jan 20, 2009
With server virtualization now well established in the world's datacenters, IT leaders are turning their attention to virtualizing and centralizing desktop PCs to address some of their toughest computing challenges: . Managing complex end-user hardware and software infrastructure . Securing networks and information assets . Supporting a global workforce in an environment of constant change
Tags : 
citrix, virtualization, desktop virtualization, blade pc, on demand, hdx, xendesktop, sla, service level agreement, scalable, streamline, tco, view composer, virtual machine, total cost of ownership, hyper-v, microsoft, datacenter, server virtualization, servers
    
Citrix
Published By: Webroot UK     Published Date: Sep 25, 2013
Managing web security in an increasingly challenging threat landscape. Cybercriminals have increasingly turned their attention to the web, which has become by farther predominant area of attack. Small wonder. Those who would do harm to our computer systems for profit or malice always manage to focus their efforts on our most vulnerable weak spots. Today, that is the web, for a wide number of reasons.
Tags : 
web security, webroot, web attack, ddos, web, internet security, malware, networking, security, enterprise applications
    
Webroot UK
Published By: Computhink     Published Date: Dec 10, 2007
In the arena of corporate governance and compliance, the Sarbanes-Oxley Act (SOX) has commanded considerable attention; in the healthcare industry, it's  HIPAA; similar regulations target the financial services and energy sectors. Organizations can use technology to meet compliance demands in a cost-effective way.
Tags : 
compliance, computhink, hipaa, sox, sarbox, sarbanes oxley, content management
    
Computhink
Published By: Marketo     Published Date: Jun 08, 2017
It’s an exciting, albeit challenging time for marketers—new channels, strategies, and technologies have empowered us to engage our buyers like never before. At the same time, due to the abundance of available information, buyer expectations have increased, leaving marketers to fight for their attention as we showcase our products and services. In response, organizations are implementing an account-based marketing (ABM) strategy. Account-based marketing offers organizations a significant return on investment (ROI) as they are faced with the need to acquire, retain, and grow high-value accounts. This comprehensive, 100+ page guide includes checklists, worksheets, examples, and advice from over 12 industry thought leaders to help marketers at any level, from beginners to experts, create and implement an effective account-based marketing strategy. Download The Definitive Guide to Account-Based Marketing to learn: • How to create a solid ABM strategy to meet your goals • What stakeholders to involve across the organization • How to identify, prioritize, and profile the right accounts • What content you need to support an ABM strategy • Which channels to leverage and how to coordinate them • How to measure the effectiveness of your ABM strategy
Tags : 
access management, security information, abm, database security, application development, risk management, endpoint management, next generation intrusion protection
    
Marketo
Published By: Marketo     Published Date: Mar 22, 2018
It’s an exciting, albeit challenging time for marketers—new channels, strategies, and technologies have empowered us to engage our buyers like never before. At the same time, due to the abundance of available information, buyer expectations have increased, leaving marketers to fight for their attention as we showcase our products and services. In response, organizations are implementing an account-based marketing (ABM) strategy. Account-based marketing offers organizations a significant return on investment (ROI) as they are faced with the need to acquire, retain, and grow high-value accounts. This comprehensive, 100+ page guide includes checklists, worksheets, examples, and advice from over 12 industry thought leaders to help marketers at any level, from beginners to experts, create and implement an effective account-based marketing strategy. Download The Definitive Guide to Account-Based Marketing to learn: How to create a solid ABM strategy to meet your goals What stakeholders to
Tags : 
    
Marketo
Published By: Oracle Corporation     Published Date: May 11, 2012
Read this white paper to learn how BI can combine your explicitly-defined business rules and automatically-identified statistical information to deliver the best possible content to your customers for every single interaction.
Tags : 
oracle, busines intelligence, business intelligence applications, bi applications, bi apps, 11g, cross-value, decision, analytics, functional, flow, manage, customers, enterprise applications, data management
    
Oracle Corporation
Published By: OpenText     Published Date: Nov 08, 2013
Once voice systems have migrated to Voice over IP, (VoIP) fax communications are the next logical addition to an IP-based environment. This white paper discusses how fax servers and new Fax over IP (FoIP) investments fit into your organizations unified communication strategy. It also calls attention to issues and challenges organizations should consider when determining how best to take advantage of traditional telephone-based systems, FoIP, or a mix of both.
Tags : 
voip, phone systems, voice over internet protocol, voice over ip
    
OpenText
Published By: ThreatTrack Security     Published Date: Jan 22, 2015
Exploit Kits: Cybercrime's Growth Industry - Cybercriminals have turned their attention away from exploiting Windows operating systems to pursuing the popular third-party applications installed on nearly every PC around the world. That is why patch management has become a critical layer in your malware defense.
Tags : 
threattrack, security, threat, track, information, admins, best, practices, training, defense, tips, web, email, smartphones, education, data, breach, prevention, malware, viper
    
ThreatTrack Security
Published By: Oracle     Published Date: Oct 22, 2015
In high volume, low margin grocery retailing, merchants have to be on their toes when it comes to driving customer demand and loyalty. This comprehensive eBook details the essential steps required to enable a commerce anywhere strategy in grocery retail. With specific attention to developing a strategy, optimizing inventory, ensuring planning is targeted and scientific, and the power of real-time analytics will provide the reader an actionable plan for success.
Tags : 
oracle retail. grocery retailing
    
Oracle
Published By: Evident.io     Published Date: Sep 13, 2017
For enterprises that use the cloud, ensuring protection starts with understanding the layers that make up the components of the cloud stack. Paying attention to each layer and addressing their unique security needs, will only bolster your enterprise’s environment. With “16 Ways to Protect Your Cloud from Ransomware,” you’ll learn about the layers that make up the cloud stack and in turn, increase your enterprise's resistance to ransomware.
Tags : 
    
Evident.io
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.

We use technologies such as cookies to understand how you use our site and to provide a better user experience. This includes personalizing content, using analytics and improving site operations. We may share your information about your use of our site with third parties in accordance with our Privacy Policy. You can change your cookie settings as described here at any time, but parts of our site may not function correctly without them. By continuing to use our site, you agree that we can save cookies on your device, unless you have disabled cookies.
I Accept