behavior

Results 226 - 250 of 619Sort Results By: Published Date | Title | Company Name
By: Red Hat     Published Date: Jun 19, 2019
IT and business are changing rapidly. Growth opportunities in new markets, evolving customer behaviors and preferences, increased competitive pressure, and new standards in regulatory compliance are causing organizations to adapt their operations and processes.1 Even so, rigid legacy IT infrastructure can keep you from adjusting to change and reduce the business value of IT. These complex environments often limit flexibility, speed, and scalability, resulting in slow application and service delivery. As a result, your organization can experience broad effects, especially within your IT operations and development teams. Developers need resources to be provisioned and scaled quickly so they can begin work immediately when an idea strikes. They also want more control over those resources while they are in use. However, with complex, hard-to-manage environments and manual processes, IT operations teams often struggle to provide resources and services at the speed that developers demand. Th
Tags : 
     Red Hat
By: Red Hat     Published Date: Jun 26, 2019
An introduction to the Forrester analyst report: How to Capture the Benefits of Microservice Design There has always been a relationship between an application and the platform and services which run it. For a long time, that relationship was very tight and encompassed a lot of areas related to the application design, from the language the application could be written in to administrative behaviors like monitoring and logging, even things like transaction management, frontend UI development, or integration methods. In a sense, the application platform was just another design consideration for the application. A few years ago, as significant changes in platform technology like cloud, containers, and virtual machines started rolling out, the primary emphasis for CTOs and application architects was on how to move to those platforms. The platform choice was a major part of the application. The focus was ó one way or another ó getting into ďthe cloud.Ē Thereís been a shift in customersí pri
Tags : 
     Red Hat
By: Forcepoint     Published Date: May 14, 2019
IDC Infobrief: How Security Solutions Enable Cloud Success Cloud applications have transformed how organizations conduct business, increasing productivity and reducing costs. However, moving to the cloud means critical data now flows outside the organizationís traditional security boundaries. Unsurprisingly, security concerns still rank as the number one reason for not using cloud services*. This IDC InfoBrief, sponsored by Forcepoint, outlines five key security considerations and best practices for safe cloud adoption, including: Multi-cloud adoption: exposing challenges for security architectures Cloud-first and GDPR implications Cloud application visibility and control Data management and DLP in the cloud Leveraging User and Entity Behavior Analytics (UEBA) for protection Read the eBook to find out the five information security lessons learned from transitioning to the cloud. *IDCís 2017 CloudView Survey; IDCís 2017 CloudImpact Survey
Tags : 
     Forcepoint
By: Forcepoint     Published Date: May 14, 2019
Security spending is expected to reach $120 billion by 2021, yet the amount of data loss events seems to be increasing. Legacy DLP solutions, which rely on traditional threat blocking policies, have been unable to evolve to address these threats. Organizations need to fundamentally rethink how they address cybersecurity for todayís modern threats. Watch this webcast to understand how taking a Risk-Adaptive approach enables security to fluctuate based on the threat environment. See how Dynamic Data Protection, an industry-first solution, uses human-centric behavior analytics to continuously determine the risk cyber identities pose, based on their actions.
Tags : 
     Forcepoint
By: Forcepoint     Published Date: May 14, 2019
IDC Infobrief: How Security Solutions Enable Cloud Success Cloud applications have transformed how organizations conduct business, increasing productivity and reducing costs. However, moving to the cloud means critical data now flows outside the organizationís traditional security boundaries. Unsurprisingly, security concerns still rank as the number one reason for not using cloud services*. This IDC InfoBrief, sponsored by Forcepoint, outlines five key security considerations and best practices for safe cloud adoption, including: Multi-cloud adoption: exposing challenges for security architectures Cloud-first and GDPR implications Cloud application visibility and control Data management and DLP in the cloud Leveraging User and Entity Behavior Analytics (UEBA) for protection Read the eBook to find out the five information security lessons learned from transitioning to the cloud. *IDCís 2017 CloudView Survey; IDCís 2017 CloudImpact Survey
Tags : 
     Forcepoint
By: Forcepoint     Published Date: May 14, 2019
IDC Infobrief: How Security Solutions Enable Cloud Success Cloud applications have transformed how organizations conduct business, increasing productivity and reducing costs. However, moving to the cloud means critical data now flows outside the organizationís traditional security boundaries. Unsurprisingly, security concerns still rank as the number one reason for not using cloud services*. This IDC InfoBrief, sponsored by Forcepoint, outlines five key security considerations and best practices for safe cloud adoption, including: Multi-cloud adoption: exposing challenges for security architectures Cloud-first and GDPR implications Cloud application visibility and control Data management and DLP in the cloud Leveraging User and Entity Behavior Analytics (UEBA) for protection Read the eBook to find out the five information security lessons learned from transitioning to the cloud. *IDCís 2017 CloudView Survey; IDCís 2017 CloudImpact Survey
Tags : 
     Forcepoint
By: Vehicle Tracking Solutions     Published Date: May 31, 2018
Safety is a top priority for companies with a fleet of drivers and vehicles. It starts with hiring and screening new employees with safe driving records and qualifications. You may even have written safety policies. However, having visibility into your driverís whereabouts and their behaviors behind the wheel is key in identifying and preventing risks before it costs your business. Do you wish that you could sit in the passenger seat of every vehicle in your fleet to watch driver behavior? With data-driven fleet safety management software from Silent Passenger you can. According to NHTSA, the cause of 94% of collisions is driver error. By monitoring unsafe driver behaviors such as speeding, hard braking, and fast acceleration is key to preserving fleet safety. A reliable fleet safety management software delivers key business intelligence that helps maintain fleet efficiency and productivity on the road. Improve Safety and Reduce Operational Costs Running a safer fleet can have a signif
Tags : 
     Vehicle Tracking Solutions
By: Gameffective     Published Date: Feb 26, 2019
Read this Microsoft case study about how Microsoft's Consumer Support Services - with its global network of support centers and thousands of agents - used digital motivation to drive agent performance and learning. Microsoft wanted new ways to recognize and reward agents while increasing their productivity. The focus was to change behaviors, develop skills, encourage sales, and drive outcomes. Microsoft identi?ed gami?cation as a solution to these needs. The company believed it could be more successful at encouraging and recognizing agents for positive outcomes through each customer interaction. Read the case study to learn how Microsoft: Increased productivity through gamification Drove agent performance with rewards, to change behaviors and business outcomes Improved agent knowledge and ability to apply the new information learned.
Tags : 
     Gameffective
By: Blue Prism     Published Date: Mar 15, 2019
Blue Prism, the inventor of the term Robotic Process Automation (RPA) and the market leader in enterprise RPA, recently engaged Knowledge Capital Partners (KCP) to survey their client deployments. We used proprietary KCP research tools, and this report summarizes our findings. Based on finalized quantitative survey results as well as our ever-growing library of qualitative case investigations, the report analyzes the management practices and behaviors that underpin the exceptional value achieved by Blue Prism customers as outlined in our January 2018 report ďRobotic Process Automation: Benchmarking the Client Experience.Ē
Tags : 
     Blue Prism
By: Alere Wellbeing     Published Date: Oct 18, 2011
Learn about new technologies for tobacco cessation and how they can effect real, measurable behavior change in the tobacco users at your organization - and save you from excess healthcare costs.
Tags : tobacco cessation benefit, text to quit, quit smoking app, wellness program, specialized program, quitting tobacco, nicotine addiction, specialized treatment, evidence based, roi, smokers, quit for life program, alere wellbeing
     Alere Wellbeing
By: Trend Micro     Published Date: May 03, 2018
Since the early days of the Gartner Magic Quadrant for this category, there have been successive waves of innovation. Back in 2002, integrated firewalls captured the marketís (and Gartnerís) attention. Over the years, weíve seen technologies, such as full disk encryption, data loss prevention (DLP), behavioral detection, application control, and more recently, machine learning, as effective new ways to protect endpoints, detect threats and give security teams peace of mind. Trend Micro has consistently been part of these innovation waves. Itís clear that the market is excited about Endpoint Detection & Response (EDR). There are two drivers for this, and we are committed to delivering effective solutions in both areas.
Tags : 
     Trend Micro
By: Riverbed     Published Date: Feb 26, 2015
The goal of understanding and managing service behavior remains elusive. Failure to adopt operational practices such as service portfolio management, process refinement, consolidation of tools, and consolidation of the organizational entities themselves explain most of the trouble.
Tags : service management, application visibility, operational practices, infrastructure, application monitoring, database monitoring, cloud performance management
     Riverbed
By: Aprimo     Published Date: Feb 03, 2012
Changing buyer behaviors require business-to-business (B2B) online marketers in order to contact potential customers as well as clients in new methods, simply by delivering content which is customized to their requirements, role, degree of curiosity, as well as stage of problem-solving. This has created advertising automation the mission-critical system with regard to B2B online marketers, but too many advertising frontrunners brain lower the automation path without completely realizing what they are getting into.
Tags : marketing automation, b2b, marketing, aprimo, lead generation, online marketing, digital marketing
     Aprimo
By: AppDynamics     Published Date: Dec 08, 2017
A 2017 study examining the impact of app performance on consumer behavior and business outcomes
Tags : 
     AppDynamics
By: AppDynamics     Published Date: Dec 08, 2017
A 2017 study examining the impact of app performance on consumer behavior and business outcomes
Tags : 
     AppDynamics
By: Silverpop     Published Date: Jun 15, 2012
People are increasingly using smartphones for researching, social networking and "checking in" on Foursquare. Learn how you can tap the power of location-based marketing, using customers' real-world behaviors and location to reach them when it's most relevant.
Tags : marketing, silverpop, social media, social marketing, mobile marketing, social media campaigns
     Silverpop
By: F5 Networks Inc     Published Date: Jan 22, 2009
Understanding HTTP and how these headers control behavior of web-based applications can lead to better end-user performance, as well as making it easier to choose an application acceleration solution that addresses the shortcomings of HTTP and browser-based solutions.
Tags : fundamentals of http, web-based applications, http, application acceleration solution, browser-based solutions, enterprise applications
     F5 Networks Inc
By: Unica     Published Date: Nov 04, 2010
Facing an unprecedented pace of change, you, like many marketers,may be struggling to create meaningful conversations with your audience.While you may be turning up the volume, if you are still using pushstrategies to shout out your messages, your buyers may be tuningout.
Tags : unica, interactive marketing, behavioral marketing, personalization, email marketing, target marketing, ebook, integration
     Unica
By: Aternity     Published Date: Jul 20, 2012
Read in only 5 pages about how Global 2000 organizations are monitoring end user behavior in physical and virtual desktop environments with Aternity's Frontline Performance Intelligence Platform. Monitor the Cloud, drive SLAs, Citrix/VDI monitoring, and much more.
Tags : technology, help desk, management, it management
     Aternity
By: SeeWhy     Published Date: Nov 28, 2011
Conversion is good and abandonment is bad, right? Maybe not. After completing a study on 600,000 conversion cases, the SeeWhy Conversion Academy research team found three common abandonment behaviors that can predict the likelihood of a purchase and help improve overall conversions.
Tags : seewhy, abandonment, marketing, conversion, marketing research, purchase, customer
     SeeWhy
By: LogMeIn     Published Date: Jan 12, 2015
This paper briefly covers the relevant trends that are affecting user behavior, and offers new criteria for selecting an audio conferencing solution provider that meets your organizationís needs.
Tags : audio conferencing solutions, logmein joinme, trends affecting user behaviour
     LogMeIn
By: LogMeIn     Published Date: Jun 23, 2015
This report will help companies understand the relationship between support interactions, channels, and improving loyalty by investing in the right technology and resources to keep up with customersí ever-changing behavior and preferences.
Tags : improving loyalty, customer loyalty, customer care, contact center, multi-device, customer relationships, technology
     LogMeIn
By: LogMeIn     Published Date: Oct 08, 2015
In this eBook evaluates trends in Millennial mobile habits, career aspirations, and workplace behavior to help determine what to expect as the generational scales begin to tip Ė and how you can prepare for the future of work.
Tags : millennial workplace invasion, future of business, millennial generation
     LogMeIn
By: Skillsoft     Published Date: Jul 23, 2014
This ExecBlueprint provides practical advice for developing such a code that will go beyond ďwindow dressingĒ and inspire leaders and employees alike to build and sustain a compliant and ethical culture. While acting ethically is important for its own sake, the authors also provide pragmatic reasoning for fostering such a culture: ethical organizations earn the trust ó and loyalty ó of employees, customers, and investors. Accordingly, the code should be simple to understand, widely circulated, and aggressively enforced. But most importantly: adherence starts at the top.
Tags : skillsoft, ethical workplace, compliance, code of conduct, industry standards, rules, employee behavior, corporate behavior, enterprise applications
     Skillsoft
By: Merkle     Published Date: Oct 19, 2012
As media and channels proliferate with the upsurge in digital touchpoints, we have access to massive volumes of customer data. This leads to the personalization of customer interactions that drive customer strategy as a business strategy.
Tags : brand experience, customer experience, customer insights, communication management, marketing accountability, roi, data management, customer centricity, crm, buying behaviors, segmentation, customer lifecycle, integrated, customer solutions, target segmented customers, measurement, marketing strategy, competitive advantage, business strategy, customer value
     Merkle
Start   Previous    3 4 5 6 7 8 9 10 11 12 13 14 15 16 17    Next    End
Search White Papers      

Add White Papers

Get your white papers featured in the insideHPC White Paper Library contact: Kevin@insideHPC.com