dam

Results 676 - 700 of 900Sort Results By: Published Date | Title | Company Name
By: GoToAssist     Published Date: Oct 05, 2011
This new TSIA white paper explores 3 fundamental metrics - operational, quality and cost - that you should include in your services dashboard, outlines specific measurements to track in each area and provides industry averages for key metrics to help with benchmarking.
Tags : citrix, technology, metric, tsia, operations, quality, cost, dashboard, customer, benchmarking
     GoToAssist
By: EMA     Published Date: Aug 22, 2012
Join EMA Research Director, Charles Betz, and Blazent Senior Director of Sales Engineering, Adam Clark, to learn how Blazent is pioneering a new approach to master data management that can greatly improve the business results from IT.
Tags : it infrastructure, data management, backup and recovery, data strategy, data quality, blazent, improving business results
     EMA
By: IBM     Published Date: Apr 23, 2013
Now is the time for the finance organization to step up to the challenges and become a strategic business partner in the deployment of profitability analysis across the enterprise. This requires a fundamental shift—in terms of both vision and execution. Tomorrow’s winners will be the ones that are not content simply to survive this economic onslaught, but work to emerge nimble enough to thrive. Profitability analysis is critical in this context. Read this whitepaper to learn more about profitability analysis and its benefits.
Tags : profitability, analysis, finance, projection, prediction, analytics, automation, metrics
     IBM
By: Impact Recovery Systems     Published Date: Oct 17, 2012
Solving problems related to vehicle collisions with fixed bollards while maintaining the function of access denial bollards.
Tags : 
     Impact Recovery Systems
By: MEDIAPLEX     Published Date: Dec 05, 2012
This guide is designed to help major brand marketers gain an understanding of the fundamentals of genuine cross channel marketing attribution.
Tags : analytics, attribution, data, big data, marketing data, marketing intelligence
     MEDIAPLEX
By: Vocus     Published Date: Mar 13, 2013
Content marketing attracts customers, builds trust and makes you visible - and the cost starts at zero.
Tags : vocus, content marketing, creating effective content, joe chernov, scott stratten, ann handley, adam singer
     Vocus
By: RingCentral     Published Date: Dec 05, 2013
Businesses of all sizes have a fundamental reliance on their communications infrastructure. This guide is designed to help you with the considerations you should be taking when looking to implement a new communications solution.
Tags : phone system, ringcentral, ring central, communications, business communications, wireless, business phones, wireless phones, mobile workers
     RingCentral
By: IBM     Published Date: Apr 29, 2014
With a wealth of information readily available online, consumers are now better able to compare products, services and prices—even as they shop in physical stores. When consumers interact with retailers publicly through social media, they have greater power to influence other customers or damage a brand. These and other changes in the retail industry are creating important opportunities for retailers. But to capitalize on those opportunities, retailers need ways to collect, manage and analyze a tremendous volume, variety and velocity of data.
Tags : ibm, retail, ecommerce, big data, retail technology, social media, data analytics, customer insights, customer analytics, personalization, ecommerce
     IBM
By: Corporate Visions     Published Date: Apr 03, 2014
Are your team’s seemingly small discount concessions doing major hidden damage to your profit margins? Read our FREE eBook to find out the five negotiating mistakes that may be costing you BIG money!
Tags : corporate visions, marketing, sales, sales myths, marketing myths, powerpoint, sales techiniques
     Corporate Visions
By: Adobe     Published Date: Apr 03, 2015
A lack of executive support and poor data quality are just some reasons why analytics programs fail. The guide by Adam Greco, Reenergize Your Web Analytics, identifies the key reasons for program failures and provides ten ways to make your analytics program successful. Read the guide to discover key ways to improve your analytics program, including: • How to deal with your stakeholders • How to set your analytics priorities • How to reap the rewards of change
Tags : analytics program, stakeholders, adobe, marketing, personalization
     Adobe
By: Polycom     Published Date: Feb 25, 2015
The workplace is undergoing fundamental changes, with people persistently connected by digital collaboration technologies and an evolving work environment. Understanding these key trends will enable enterprises to prepare for and implement a collaborative workplace.
Tags : polycom, collaboration, connectivity, communication, deployment, video conferencing, infrastructure, user experience, digital, global, mobile, contextual, visual, byod, social
     Polycom
By: ForgeRock     Published Date: Oct 24, 2014
Identity is a fundamental requirement to digital growth. Businesses and organizations cannot properly take advantage of mobile, cloud, or Internet of Things (IoT) technologies without a scalable and repeatable identity strategy. Without it, they have no way to identify and engage with their customers in a meaningful way — whether it be through a laptop, mobile phone, tablet, connected car, healthcare wearable, connected home device or the next great connected innovation. This guide is designed to help you understand the essentials of customer-focused identity and how it helps you engage with your customers.
Tags : revenue generator, digital growth, identity management, customer-focused, it management, enterprise applications
     ForgeRock
By: ForgeRock     Published Date: Mar 10, 2015
Identity is a fundamental requirement to digital growth. Businesses and organizations cannot properly take advantage of mobile, cloud, or Internet of Things (IoT) technologies without a scalable and epeatable identity strategy. Without it, they have no way to identify and engage with their customers in a meaningful way — whether it be through a laptop, mobile phone, tablet, connected car, healthcare wearable, connected home device or the next great connected innovation. This guide is designed to help you understand the essentials of customer-focused identity and how it helps you engage with your customers.
Tags : irm, management, time-to-market, forgerock, revenue generator, software development
     ForgeRock
By: MineralTree     Published Date: Jan 14, 2015
Yes, your company is a ripe target for fraud - but it doesn't have to be. Cybercriminals love small to medium businesses, since they have more money in their bank accounts than individuals, but often lack the sophisticated technology and vigilant processes of larger organizations. Gartner estimates that more than 10 percent of small businesses have had funds stolen from their bank accounts.
Tags : mineraltree, online fraud, business, damage, technology, bank, accounts, theft, cyber, crime, protection
     MineralTree
By: Revel Systems     Published Date: Jul 22, 2015
Hacking is a fact for life. Some hack for fame, some for sport, others for profit. In 2013 a group of hackers created and sold tens of thousands of dollars in gift cards after hacking Subway's point of sale. The 2013 "Holiday Hackers" have stolen data from 110 million innocent consumers and counting, damaging the reputation and bottom line of major retailers such as Target and Neiman Marcus, as well as credit card providers like JPMorgan.
Tags : point of sale, security for your retail shop, ipad pos, pos security
     Revel Systems
By: Microsoft Office 365     Published Date: Sep 08, 2016
Data breaches are more than a security problem. A significant attack can shake your customer base, partner relations, executive staff, profits, and revenue. Historic data breaches have cost executives their jobs, resulted in major revenue losses and damaged brand reputations.
Tags : 
     Microsoft Office 365
By: Code42     Published Date: Feb 28, 2018
Disaster Recovery Plan Roadmap Learn how automatic backup delivers guaranteed business data protection and recovery—no matter the threat. When ransomware hits, the average small business experiences two full days of downtime. One-third of businesses lose revenue and all experience brand and loyalty damage that’s harder to quantify. To stop the bleeding, most small businesses end up paying at least $2,500 to get their data back. But paying the ransom doesn’t guarantee anything. Plenty of businesses have fully complied with the ransom demands, only to have the ransomer increase the ransom request—or simply take off with the ransom and the data.
Tags : 
     Code42
By: Eaton     Published Date: Jan 26, 2016
Arc flashes—the fiery explosions that can result from short circuits in high-power electrical devices—kill hundreds of workers in the U.S. every year and permanently injure thousands more. They can also wreak financial havoc in the form of fines, lawsuits, and damage to expensive equipment. This white paper aims to fill that knowledge gap by providing introductory-level information about what arc flashes are and what you can do to prevent them.
Tags : eaton, arc flashes, data center solutions, data centers, it management, enterprise applications
     Eaton
By: IBM     Published Date: Oct 10, 2013
We all know how major security incidents can affect a company’s data, networks and corporate brand. We also know that sophisticated attacks, designed to gain continuous access to critical information or to cause damage in critical infrastructure, are becoming more severe, more frequent and more costly. But what can you do about it? The IBM white paper “Responding to—and recovering from—sophisticated security attacks” details four proactive steps that you can—and should—take now to help keep your organization safe: prioritize your business objectives and set your risk tolerance; protect your organization with a proactive security plan; prepare your response to the inevitable sophisticated attack and promote and support a culture of security awareness. Read the white paper to learn how to help keep your organization safe from sophisticated security attacks and find out how IBM can help.
Tags : security, data security, networks, branding, attacks, security, security breach, safeguarding, infastructure, risk, risk tolerance, security attacks, it management, data management
     IBM
By: IBM     Published Date: May 28, 2014
The right test data management solution accelerates time to value for business-critical applications and builds relationships and efficiencies across the organization. IBM InfoSphere Optim Test Data Management closes the gap between DBAs and application developers by providing all teams with accurate, appropriately masked and protected data for their work. Developers can confirm that new application functionalities perform as expected. QA staff can validate that the application performs as intended based on the test cases, and that integrations work properly. And business leaders can be more confident that competitive functionality will be delivered on time with less risk.
Tags : ibm, ibm infosphere, ibm optim solutions, ibm test data, test data management, dba, database management, big data, applications, business critical applications, integrations, it management, data management, data center
     IBM
By: IBM     Published Date: Nov 04, 2014
This white paper explores the five fundamental qualities of a risk-aware organization, along with five use cases of how IBM helped clients put the practices into action in the real world.
Tags : ibm, security, risk, byod, safeguard, protection, threat protection, it security, security iq
     IBM
By: IBM     Published Date: Aug 06, 2014
With a wealth of information readily available online, consumers are now better able to compare products, services and prices—even as they shop in physical stores. When consumers interact with retailers publicly through social media, they have greater power to influence other customers or damage a brand. These and other changes in the retail industry are creating important opportunities for retailers. But to capitalize on those opportunities, retailers need ways to collect, manage and analyze a tremendous volume, variety and velocity of data. If retailers succeed in addressing the challenges of “big data,” they can use this data to generate valuable insights for personalizing marketing and improving the effectiveness of marketing campaigns, optimizing assortment and merchandising decisions, and removing inefficiencies in distribution and operations.
Tags : ibm, retail, data, big data, power, stores, interact, social media
     IBM
By: Symantec     Published Date: Jun 13, 2018
The General Data Protection Regulation (GDPR) takes effect May25, 2018. If you process European Union (EU) personal data, GDPR likely applies to you—even if you’re not in the EU. That’s because the regulation is truly global in scope and applies to any organization that processes EU personal data, irrespective of where the companies are based or where the data is processed. At its heart, the GDPR legislation is about ensuring privacy is respected as a fundamental right and that personal data is kept private and secure. Elizabeth Denham, of the EU Information Commissioner Office (ICO), says “This law is not about fines. It’s about putting the consumer and citizen first” and “Issuing fines has always been and will continue to be, a last resort.” However, it’s important to note the costs of noncompliance can be severe. These can include a fine of up to 4 percent of global turnover (revenues) or €20m, whichever is higher; a temporary or permanent suspension of the right to access or proce
Tags : 
     Symantec
By: IBM     Published Date: Oct 02, 2015
Like kids in a candy store, cybercriminals can’t wait to get their hands on your company's confidential information. You need security tools that detect the latest threats before they can cause damage. This paper explains how a security intelligence platform can offer you immediate protection and help you scale for the future. In addition to helpful illustrations, the paper includes short case studies from 3 organizations.
Tags : case studies, security intelligence, cyber crime, cyber criminals, security tools, security intelligence platform, ibm security, security, it management
     IBM
By: IBM     Published Date: Apr 04, 2016
When a cyber-attack occurs, you can’t fix what you can’t see. IBM BigFix employs a single agent on endpoints - internal or external, roaming or in a fixed location - for a real-time view that allows you to see vulnerabilities and threats, and instantly take action to avoid damage.
Tags : ibm, ibm bigfix, risk management, data security, security, enterprise applications
     IBM
Start   Previous    16 17 18 19 20 21 22 23 24 25 26 27 28 29 30    Next    End
Search White Papers      

Add White Papers

Get your white papers featured in the insideHPC White Paper Library contact: Kevin@insideHPC.com