wan

Results 1 - 25 of 1359Sort Results By: Published Date | Title | Company Name
Published By: DATAVERSITY     Published Date: Nov 05, 2014
Ask any CEO if they want to better leverage their data assets to drive growth, revenues, and productivity, their answer will most likely be “yes, of course.” Ask many of them what that means or how they will do it and their answers will be as disparate as most enterprise’s data strategies. To successfully control, utilize, analyze, and store the vast amounts of data flowing through organization’s today, an enterprise-wide approach is necessary. The Chief Data Officer (CDO) is the newest member of the executive suite in many organizations worldwide. Their task is to develop and implement the strategies needed to harness the value of an enterprise’s data, while working alongside the CEO, CIO, CTO, and other executives. They are the vital “data” bridge between business and IT. This paper is sponsored by: Paxata and CA Technologies
Tags : 
chief data officer, cdo, data, data management, research paper, dataversity
    
DATAVERSITY
Published By: Paxata     Published Date: Nov 29, 2016
Every organization looks for ways to reduce costs and run more efficiently. In fact, those are key drivers for the mainstream adoption of Hadoop and self-service BI tools. And while we can now collect and store more data than ever before, and we have enabled every information worker into a data-hungry analyst, not much consideration has been paid to the cost - including time and effort - of preparing data. Download this report to learn more about the hidden cost of data preparation.
Tags : 
    
Paxata
Published By: Paxata     Published Date: Mar 21, 2017
Every organization looks for ways to reduce costs and run more efficiently. In fact, those are key drivers for the mainstream adoption of Hadoop and self-service BI tools. And while we can now collect and store more data than ever before, and we have enabled every information worker into a data-hungry analyst, not much consideration has been paid to the cost - including time and effort - of preparing data. Download this report to learn more about the hidden cost of data preparation.
Tags : 
    
Paxata
Published By: Data Blueprint     Published Date: Apr 02, 2014
Organizations maintain data-based assets in hopes of successfully employing them in support of strategy. In an attempt to provide valued products and/or services, a customer relationship management (CRM) strategy should attempt to improve what is known about the wants and needs of existing customers. An organization may desire to transfer its inventory to its suppliers and to only play the role of transaction broker. A third strategy might be to use data to obtain significant efficiencies from productions/operations, ensuring a low cost advantage.
Tags : 
data, data management, data value, return on investment, white paper
    
Data Blueprint
Published By: Cisco EMEA Tier 3 ABM     Published Date: Jun 01, 2018
Your employees, customers, and partners need the ability to connect and collaborate, at any time, from any location— across time zones or simply across the conference table. Cisco Webex makes working together what it should be - intuitive. Teams can work faster, smarter, and more effectively than ever, while providing the peace of mind that solution administrators want.
Tags : 
cisco, webex, collaboration
    
Cisco EMEA Tier 3 ABM
Published By: Zendesk     Published Date: Jun 29, 2018
Customers are more technically savvy than ever and have come to prefer the DIY approach to solving their issues and answering their own questions. Years of research by ICMI has confirmed that customers prefer to resolve issues themselves and within their channels of choice. Furthermore, customers only seek direct interactions when they unsuccessfully exhaust their self-service options. This is backed up by data from American Express, which found that 48% of consumers prefer to speak with a customer service rep when dealing with complex issues, but only 16% prefer the same contact for simple issues. The goal of this paper is simple: We want to help you build an all-in-one knowledge base, community, and customer portal. All of which can be accomplished with a help center like Zendesk Guide.
Tags : 
    
Zendesk
Published By: Zendesk     Published Date: Jun 29, 2018
Your door is always open, regardless of your business or support hours. Today’s customers ask questions at any time of the day or night and will wait for you to respond (but not for long). This poses a challenge to most businesses: How can you anticipate which channels a customer will need or want, and how can you determine whether these channels will be efficient for your organization? The short answer is: you do. Customers want the ability to contact businesses in more than one way, and they expect each brand interaction to be consistent with the one before and after. Learn how with Zendesk's Omnichannel solution.
Tags : 
    
Zendesk
Published By: Akamai Technologies     Published Date: Apr 25, 2018
Keeping your data safe requires forward-thinking approaches to cybersecurity. Learn how you can augment your existing on-premise infrastructure with security measures in the cloud for a more robust web security posture. Download this guide to learn: Why the cloud is critical for web security How real-world DDoS attacks are testing the limits of on-site solutions Discover the questions some vendors don’t want you to ask
Tags : 
cloud, security, cyber, cloud, web, ddos
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Apr 25, 2018
DDoS attackers launch hundreds of DDoS attacks every day. When a DDoS attack strikes an organization, panic is common. No one knows why systems and applications are failing, who to call, or what questions to ask. Meanwhile, senior leaders want answers. Planning ahead and being prepared is your best defense against DDoS attacks. This white paper explores best practices for building and maintaining a DDoS protection plan. You’ll learn what to expect from a DDoS attack, how to prepare, what to put in a DDoS runbook, and how to test your plan.
Tags : 
ddos, protection, practices, systems, attackers, applications, systems
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Apr 13, 2018
DDoS attackers launch hundreds of DDoS attacks every day. When a DDoS attack strikes an organization, panic is common. No one knows why systems and applications are failing, who to call, or what questions to ask. Meanwhile, senior leaders want answers. Planning ahead and being prepared is your best defense against DDoS attacks. This white paper explores best practices for building and maintaining a DDoS protection plan. You’ll learn what to expect from a DDoS attack, how to prepare, what to put in a DDoS runbook, and how to test your plan.
Tags : 
ddos, protection, practices, systems, attackers, applications, systems
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Apr 13, 2018
Keeping your data safe requires forward-thinking approaches to cybersecurity. Learn how you can augment your existing on-premise infrastructure with security measures in the cloud for a more robust web security posture. Download this guide to learn: Why the cloud is critical for web security How real-world DDoS attacks are testing the limits of on-site solutions Discover the questions some vendors don’t want you to ask
Tags : 
cloud, security, cyber, cloud, web, ddos
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Apr 25, 2018
Keeping your data safe requires forward-thinking approaches to cybersecurity. Learn how you can augment your existing on-premise infrastructure with security measures in the cloud for a more robust web security posture. Download this guide to learn: Why the cloud is critical for web security How real-world DDoS attacks are testing the limits of on-site solutions Discover the questions some vendors don’t want you to ask
Tags : 
cloud, security, cyber, cloud, web, ddos
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Apr 25, 2018
DDoS attackers launch hundreds of DDoS attacks every day. When a DDoS attack strikes an organization, panic is common. No one knows why systems and applications are failing, who to call, or what questions to ask. Meanwhile, senior leaders want answers. Planning ahead and being prepared is your best defense against DDoS attacks. This white paper explores best practices for building and maintaining a DDoS protection plan. You’ll learn what to expect from a DDoS attack, how to prepare, what to put in a DDoS runbook, and how to test your plan.
Tags : 
ddos, protection, practices, systems, attackers, applications, systems
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Apr 25, 2018
Keeping your data safe requires forward-thinking approaches to cybersecurity. Learn how you can augment your existing on-premise infrastructure with security measures in the cloud for a more robust web security posture. Download this guide to learn: Why the cloud is critical for web security How real-world DDoS attacks are testing the limits of on-site solutions Discover the questions some vendors don’t want you to ask
Tags : 
cloud, security, cyber, cloud, web, ddos
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Apr 25, 2018
DDoS attackers launch hundreds of DDoS attacks every day. When a DDoS attack strikes an organization, panic is common. No one knows why systems and applications are failing, who to call, or what questions to ask. Meanwhile, senior leaders want answers. Planning ahead and being prepared is your best defense against DDoS attacks. This white paper explores best practices for building and maintaining a DDoS protection plan. You’ll learn what to expect from a DDoS attack, how to prepare, what to put in a DDoS runbook, and how to test your plan.
Tags : 
ddos, protection, practices, systems, attackers, applications, systems
    
Akamai Technologies
Published By: TIBCO Software APAC     Published Date: May 31, 2018
Ask the average business user what they know about Business Intelligence (BI) and data analytics, and most will claim to understand the concepts. Few, however, will profess to know how analytics works or to have the skills needed to put it into practice. Despite being knowledgeable about their industry and experienced in running their organizations, the majority of business users lack expertise in analytics and visualization techniques—but that doesn’t stop them from wanting to have a go. This situation has led to ease of use and accessibility becoming the main focus for recent updates from all the leading BI vendors—but making tools easier and more widely accessible is only part of the answer. A better approach is to work both sides of the gap. To make tools that can empower business users to discover and unlock value in their data—and that extend capabilities for experts, so they can share the analytics workload, improve efficiency, and focus on higher level work. Unfortunately, the
Tags : 
    
TIBCO Software APAC
Published By: Sage     Published Date: May 14, 2018
Compliance is one of the top challenges facing any payroll and HR department. It’s up to you to ensure that all personnel business practices follow current laws and that you are keeping proper records to document your company’s compliance. While an efficient payroll system can help to enhance employee moral and boost your reputation, mistakes in record-keeping and compliance can result in punitive penalties– even lawsuits. Of course, no business wants to expose itself to such financial and reputational risk. However, keeping up to date with payroll legislation can be a complex task. It’s reported that as many as one in three small businesses are penalised for incorrect payroll. To protect your company from costly fines and even litigation, you need to stay informed about employment laws, reporting rules, and changing workforce compliance issues. In this guide, we look at the challenges and the payroll solutions that will help your payroll department meet its compliance requirements wit
Tags : 
    
Sage
Published By: Akamai Technologies     Published Date: Apr 25, 2018
DDoS attackers launch hundreds of DDoS attacks every day. When a DDoS attack strikes an organization, panic is common. No one knows why systems and applications are failing, who to call, or what questions to ask. Meanwhile, senior leaders want answers. Planning ahead and being prepared is your best defense against DDoS attacks. This white paper explores best practices for building and maintaining a DDoS protection plan. You’ll learn what to expect from a DDoS attack, how to prepare, what to put in a DDoS runbook, and how to test your plan.
Tags : 
ddos, protection, practices, systems, attackers, applications, systems
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Apr 25, 2018
Keeping your data safe requires forward-thinking approaches to cybersecurity. Learn how you can augment your existing on-premise infrastructure with security measures in the cloud for a more robust web security posture. Download this guide to learn: Why the cloud is critical for web security How real-world DDoS attacks are testing the limits of on-site solutions Discover the questions some vendors don’t want you to ask
Tags : 
cloud, security, cyber, cloud, web, ddos
    
Akamai Technologies
Published By: IBM     Published Date: Jun 04, 2018
"Today’s business users want to use all types of data to create compelling, shareable visualizations. But charts and graphs alone may not convey all the information, especially when they are part of a complex series. An audience can best understand analytic results when those results tell a story that connects all the pieces together. The right visuals can also reinforce the lessons buried in the data. Stories are powerful mechanism to communicate with people. Stories stick and make insights actionable, so it goes without saying that storytelling is a very powerful (soft) skill. In this webinar, you'll learn how to effectively apply storytelling best practices to get your message across. Especially in the world of BI, it is getting more and more important to effectively communicate business results. Watch this webinar to learn how to use IBM Cognos Analytics to: · Create the important elements of a good story · Put the data in context · Select the best type of ch
Tags : 
data analytics, data storytelling, business intelligence
    
IBM
Published By: Akamai Technologies     Published Date: Jul 02, 2018
What to expect and how to prepare your best defense DDoS attackers launch hundreds of DDoS attacks every day. When a DDoS attack strikes an organization, panic is common. No one knows why systems and applications are failing, who to call, or what questions to ask. Meanwhile, senior leaders want answers. Planning ahead and being prepared is your best defense against DDoS attacks. This white paper explores best practices for building and maintaining a DDoS protection plan. You’ll learn what to expect from a DDoS attack, how to prepare, what to put in a DDoS runbook, and how to test your plan.
Tags : 
    
Akamai Technologies
Published By: HireVue     Published Date: May 16, 2018
OVERVIEW Unilever is a global player in the fast-moving consumer goods (FMCG) sector, with nearly a third of the world’s population using its products every day. The company has more than 169,000 employees working around the world, and its leaders estimate that within three years, as many as 60 percent of those employees will be Millennials. Critical to Unilever’s ongoing success will be its ability to attract these recent college graduates. For its signature Future Leaders Programme, the company wanted its recruitment efforts to get ahead of the curve. The existing process was rooted in paper-based applications, phone interviews with recruiters, and manual assessment tests. It took four to six months to sift through 250,000 applications and ultimately hire 800 individuals. The company sought to radically transform this process using online gamification, digitally recorded interviews, and science-based assessment tests and data analysis. In this case study, we: • Explain the chal
Tags : 
    
HireVue
Published By: Workday     Published Date: Jan 16, 2018
Financial transformation by definition is not something you can bolt on—it requires a willingness to question long-held assumptions and envision where you want to go and a total technology rethink. In the next blog, we’ll take a closer look at how one, unified, cloud-based system can create the perfect environment for finance to handle transaction processing and compliance and control while delivering the answers the business needs.
Tags : 
financial, technology, innovation, optimization, business, workday
    
Workday
Published By: Workday UK     Published Date: Mar 08, 2018
Career management is at a crossroads. What employees and organisations want and need has shifted drastically in recent years, leading to big changes in how companies approach career development. What’s causing these seismic shifts? And how are today’s organisations responding? Read this report, full of research findings and real-world examples, to learn: •Why organisations are overhauling their strategies •The six shifts impacting career management •The challenges organisations face when modifying their approaches If you’re looking to better develop your workforce and adapt to changing employee expectations, this guide is for you.
Tags : 
    
Workday UK
Published By: NEC     Published Date: Aug 25, 2009
This is a case study which shows how Voorhees College implemented a revolutionary communications solution based around a service-orientated Unified Communications architecture from NEC to provide students, faculty and staff in five locations with software-based voice and desktop communications tools to achieve a 40 percent savings over its previous traditional telephony solution.
Tags : 
voorhees, nec, desktop communications, communications, service orientated, widearea network, wan, unified communications architecture, tco, soa, service oriented architecture
    
NEC
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.