pervasive

Results 26 - 50 of 114Sort Results By: Published Date | Title | Company Name
By: Oracle APAC ZO OD Prime Volume CX ABM Leads June 2017     Published Date: Jul 11, 2017
Mobile, relationship intelligence, and sales coaching are necessities for today’s sales organization and are pervasive capabilities for every sales automation solution category. No vendor solely offers these capabilities without complementing them with other functions. Instead, they are embedded across the categories mentioned above. For example, sales content management providers cannot compete without extensive mobile expertise; market intelligence and customer success do not work without relationship intelligence; and sales coaching is not constrained only to the sales performance management vendors.
Tags : sales content management, customer success, market intelligence, sales acceleration, sales performance management, partner relationship, contract life cycle
     Oracle APAC ZO OD Prime Volume CX ABM Leads June 2017
By: Oracle APAC ZO OD Prime Volume CX ABM Leads June 2017     Published Date: Jul 11, 2017
What this case study reveals is that, with the right leadership, it is possible to turn a company around and make it far more responsive and relevant to its customers, and as a result deliver growth and profits. The upshot of D+M's cultural and business transformation has been a return to growth and profitability. The entire enterprise has played its part, which is why the annual Chairman's Award has recognized individuals who have lived the winning cultural values and achieved excellence in performance. Winners have included factory workers and services people. The firm also continues to innovate with HEOS WMS capabilities extending to the other brands. Customer experience continues to be an area of deep cross-functional focus, and feedback from customers provides a clear indication that the customer experience throughout their buying and ownership journeys is rated highly.
Tags : visionary leadership, adaptive enterprise architecture, simplified processes, continuous innovation, rewarding pervasive cx, acute sensing capabilities, collaborative
     Oracle APAC ZO OD Prime Volume CX ABM Leads June 2017
By: Gigamon     Published Date: Mar 26, 2019
As the hunger for bandwidth and the number of devices within enterprise networks continue to increase, collaboration between NetOps and SecOps for a fast, secure network is a must. Download the SANS whitepaper Network Architecture with Security in Mind and learn about a new security approach that relies on pervasive visibility to send the right data to the right tools that are already in place, rather than adding more performance-hindering layers of security.
Tags : 
     Gigamon
By: Gigamon     Published Date: Feb 20, 2019
As the hunger for bandwidth and the number of devices within enterprise networks continue to increase, collaboration between NetOps and SecOps for a fast, secure network is a must. Download the SANS whitepaper Network Architecture with Security in Mind and learn about a new security approach that relies on pervasive visibility to send the right data to the right tools that are already in place, rather than adding more performance-hindering layers of security
Tags : 
     Gigamon
By: Rackspace     Published Date: Jan 09, 2012
Distributed computing has been pervasive in IT organisations for nearly two decades, but the tables are beginning to turn. This whitepaper discusses Rackspace's experience in quick deployment and hosting of VDI environments.
Tags : rackspace, technology, virtual desktop, vdi, infrastructure, data center
     Rackspace
By: IBM     Published Date: Jun 16, 2015
Read the white paper to learn how a good data center strategy can help you prepare for the rigors and unpredictability of emerging technologies. Find out how IBM’s predictive analytics are helping companies build more accurate, forward-looking data center strategies and how those strategies are leading to more agile, efficient and resilient infrastructures.
Tags : data center, predictive analytics, data center strategy, resilient infrastructure, cloud computing, social collaboration, business analytics, emerging technologies, virtualization, automation
     IBM
By: Carbonite     Published Date: Jan 04, 2018
Malware that encrypts a victim’s data until the extortionist’s demands are met is one of the most common forms of cybercrime. And the prevalence of ransomware attacks continues to increase. Cybercriminals are now using more than 50 different forms of ransomware to target and extort money from unsuspecting individuals and businesses. Ransomware attacks are pervasive. More than 4,000 ransomware attacks happen every day, and the volume of attacks is increasing at a rate of 300 percent annually. According to an IDT911 study, 84 percent of small and midsize businesses will not meet or report ransomware demands. No one is safe from ransomware, as it attacks enterprises and SMBs, government agencies, and individuals indiscriminately. While ransomware demands more than doubled in 2016 to $679 from $294 in 2015, the cost of remediating the damage and lost productivity is many multiples higher.
Tags : 
     Carbonite
By: FireEye     Published Date: Apr 07, 2013
Malware activity has become so pervasive and attacks so successful at penetrating legacy defenses.
Tags : fireye, threat report, malware, threat landscape, legacy defenses, advanced persistent threat, apt
     FireEye
By: Waterline Data & Research Partners     Published Date: Nov 07, 2016
For many years, traditional businesses have had a systematic set of processes and practices for deploying, operating and disposing of tangible assets and some forms of intangible asset. Through significant growth in our inquiry discussions with clients, and in observing increased attention from industry regulators, Gartner now sees the recognition that information is an asset becoming increasingly pervasive. At the same time, CDOs and other data and analytics leaders must take into account both internally generated datasets and exogenous sources, such as data from partners, open data and content from data brokers and analytics marketplaces, as they come to terms with the ever-increasing quantity and complexity of information assets. This task is clearly impossible if the organization lacks a clear view of what data is available, how to access it, its fitness for purpose in the contexts in which it is needed, and who is responsible for it.
Tags : 
     Waterline Data & Research Partners
By: Teradata     Published Date: Jul 15, 2015
This paper examines the value of big data applications as a means to ensure pervasive availability of big data analytics in the organization.
Tags : analytics, big data, applications, lob
     Teradata
By: SAP     Published Date: Jul 18, 2016
Retail is a data-intensive industry. Knowing the customer better than competition and having the ability to orchestrate business decisions is the new retail competitive battlefield. Read the white paper to learn customer insights on the future of retail analytics.
Tags : 
     SAP
By: SAP     Published Date: Jul 18, 2016
The broad shift from on-premises to cloud deployments has begun, and spending on cloud business analytics will grow five times faster than similar on-premises solutions. Read the white paper to learn some of drivers and the roadblocks of cloud-based business analytics solution deployments, and the offerings from SAP in this market.
Tags : 
     SAP
By: AWS     Published Date: Dec 19, 2018
Cisco and Amazon Web Services (AWS) believe not only in making it simple to connect to the cloud, but also to protect your cloud services. Security is not just an on-premises or a cloud thing. It’s every-“thing” and everywhere. Gaining pervasive security means you need visibility across your entire IT environment to help you effectively identify and mitigate security threats. Cisco Stealthwatch Cloud provides scalable visibility and delivers secure network behavioral analysis across on-premises and AWS environments to help identify anomalous activity that could indicate a security threat. This self-learning security solution continually refines its behavioral models as it monitors your environment, ultimately improving its functionality and reducing the costs required for manual security checks and updates. Watch our webinar to learn how JetBrains increased transparency and reduced threat exposure by deploying Stealthwatch Cloud on AWS. Along with increased infrastructure protection,
Tags : 
     AWS
By: Group M_IBM Q1'18     Published Date: Feb 09, 2018
Organizations are looking to use DXPs as they move from web-centric to more pervasive, multichannel digital experiences. This Magic Quadrant will help those responsible for a range of customer-, employee- and partner-facing initiatives find the most suitable vendor for their needs.
Tags : gartner magic quadrant, gartner, digital experience, dxp, multichannel
     Group M_IBM Q1'18
By: Group M_IBM Q418     Published Date: Sep 10, 2018
All of cyberspace and its underlying infrastructure is vulnerable to a wide range of risk and exposure from both physical and cyber threats and perils. Sophisticated cyber individuals and groups exploit standalone and congregated vulnerabilities to steal money and information, or disrupt, endanger and damage operations. The combination of wide opportunity for crime in cyberspace and the ability to execute from geographically-dispersed locations has produced a transformation of traditional criminal activities.
Tags : 
     Group M_IBM Q418
By: TIBCO Software     Published Date: Feb 14, 2019
Digital business initiatives have expanded in scope and complexity as companies have increased the rate of digital innovation to capture new market opportunities. As applications built using fine-grained microservices and functions become pervasive, many companies are seeing the need to go beyond traditional API management to execute new architectural patterns and use cases. APIs are evolving both in the way they are structured and in how they are used, to not only securely expose data to partners, but to create ecosystems of internal and/or third-party developers. In this datasheet, learn how you can use TIBCO Cloud™ Mashery® to: Create an internal and external developer ecosystem Secure your data and scale distribution Optimize and manage microservices Expand your partner network Run analytics on your API performance
Tags : 
     TIBCO Software
By: TIBCO Software     Published Date: Feb 14, 2019
Digital business initiatives have expanded in scope and complexity as companies have increased the rate of digital innovation to capture new market opportunities. As applications built using fine-grained microservices and functions become pervasive, many companies are seeing the need to go beyond traditional API management to execute new architectural patterns and use cases. APIs are evolving both in the way they are structured and in how they are used, to not only securely expose data to partners, but to create ecosystems of internal and/or third-party developers. In this datasheet, learn how you can use TIBCO Cloud™ Mashery® to: Create an internal and external developer ecosystem Secure your data and scale distribution Optimize and manage microservices Expand your partner network Run analytics on your API performance
Tags : 
     TIBCO Software
By: Menlo Security     Published Date: Jun 05, 2018
"2017 was marked by a significant number of high-profile cyber breaches. Web malware and phishing played a critical role in the vast majority of these attacks. Watch this webinar to learn from two of the industry’s leading experts – Gartner Research Analyst Peter Firstbrook and Menlo Security CTO Kowsik Guruswamy: *Why web malware and phishing are so pervasive in today's cyber attacks *What the shortcomings of today’s reactive security philosophy are *Why the web continues to present a risk to businesses *How organizations rethink their security strategy moving forward"
Tags : 
     Menlo Security
By: Centrica Business Solutions     Published Date: Aug 14, 2018
We live in an era of increased business risk and while news headlines focus on threats to business such as cyber-crime and global terrorism, there is a more pervasive and immediate issue in the form of security and continuity of the energy supply of every business.
Tags : energy, impact, resilience, strategy
     Centrica Business Solutions
By: Topsy     Published Date: Jul 16, 2013
Marketing today is real-time, always-on, pervasive, and constant—but following these 5 simple rules guarantees that you’ll stand out from the crowd.
Tags : twitter, advertising, real-time, realtime marketing, real-time marketing, social marketing, social strategy, social listening, social data, social analytics, social media analytics, social intelligence, data mining, big data, social media tools, social analysis tools, social media analysis tools, social media monitoring, social media monitoring tools, social media marketing
     Topsy
By: Emulex Corporation     Published Date: Nov 07, 2013
An intelligent, searchable recording fabric with 100% accuracy sounds pretty useful. But can you calculate a solid ROI to justify it? We all know intuitively that there are substantial bottomline benefits to reducing unplanned network downtime and improving the management of corporate risk. It follows that it also pays dividends to free up highly skilled Tier 1 and Tier 2 engineers to handle resolving the most difficult and costly network issues while using less expensive personnel to handle easier ones. But justifying a network investment on a soft, intuitive argument like this alone doesn’t usually suffice. And, depending on what industry you are in, the cost savings potential will vary. At the high end, in many financial and brokerage institutions, a minute of downtime can cost the company millions of dollars. So being able to shave even a single minute off network downtime with a pervasive monitoring tool represents an immediate recovery of the fabric investment.
Tags : network monitoring, network visibility, technology, endace, best practices, networking
     Emulex Corporation
By: Polycom     Published Date: Jul 30, 2014
Video conferencing is rapidly moving out of the conference room and onto the desktop, smartphone, and tablet. Thanks to inclusion of video as a core UC component, enterprise technology leaders are increasingly deploying video to individuals as part of their unified communications initiatives, while integrating personal video into room systems, and enabling conferencing beyond the enterprise.
Tags : pervasive, video, collaboration, conference room, desktop, smartphone, tablet, communication, youtube, technology, flexibility
     Polycom
By: Rosetta Stone     Published Date: Jul 05, 2017
In global, multicultural organizations, simply expecting all employees to speak one common language, such as English, marginalizes the potential impact of international talent and leaves monolingual staff ill-equipped to help the organization compete effectively in a globalized environment. In an increasingly global economy, U.S. companies will perform better by hiring individuals who can communicate in foreign languages and helping current employees develop language skills. Forbes Insights, in conjunction with Rosetta Stone, surveyed more than 100 executives at large U.S. businesses (annual revenues of more than $500 million) and found that language barriers have a broad and pervasive impact on business operations. The survey found that foreign language skills will be even more vital in the future and that language abilities can help executives advance their careers, speed overseas expansion, and boost corporate—as well as personal—success.
Tags : 
     Rosetta Stone
By: Ephesoft     Published Date: May 31, 2018
With the digitization of modern life, consumers have come to expect the same kind of real-time response and control from mortgage companies as they have experienced in other aspects of their lives. As a result of pervasive services like two-day or even same-day delivery from Amazon Prime, TV On Demand and made-to-order Nikes, consumers expect underwriters to process loans and communicate with them in a similarly personalized, real-time way. In response, traditional mortgage originators are transitioning legacy processes to compete with the game-changing speed of born digital disruptors like Rocket Mortgage and Better.com. This infographic outlines the eight technology trends that are top-of-mind for leading lenders.
Tags : 
     Ephesoft
By: Cisco     Published Date: Jun 16, 2014
How Cisco® Web Security enables better data and brand protection for today’s enterprises.
Tags : web security, cisco, brand protection, security
     Cisco
Start   Previous    1 2 3 4 5    Next    End
Search White Papers      

Add White Papers

Get your white papers featured in the insideHPC White Paper Library contact: Kevin@insideHPC.com