less power

Results 1 - 25 of 130Sort Results By: Published Date | Title | Company Name
By: 15five     Published Date: Jul 22, 2019
Take off with OKRs! How do monumental feats of achievement like landing on the moon occur? We believe the key is marrying inspiration with the right strategy. The journey to the moon required countless teams planning and executing their contributions, all while measuring progress along the way. Your team also has the power to make the seemingly impossible happen with a process called Objectives and Key Results (OKRs). Whatever your version of landing on the moon, this book is designed to help you get there. It’s a resource for managers at all levels to implement the company-wide objectives established by leadership. We’ve included details for working with every employee so that they have measurable objectives that impact the entire company each quarter of the year.
Tags : 
     15five
By: Adobe     Published Date: Mar 03, 2017
In a world of infinite choices, customer experience is the last true differentiator. The optimal shopping experience happens when the right content is presented to a customer at precisely the right time, no matter where they choose to engage. Read The Path of Experience to learn the critical capabilities needed to drive seamless commerce experiences that keep customers coming back for more. Read the guide to learn: • The role of dynamic merchandising in engaging customers • Steps to create compelling customer experiences using audience segmentation and personalization • Ways to scale customer experiences to create powerful connections, no matter the device or channel
Tags : customer experience, merchandising, customer engagement, commerce experience, audience segmentation, personalization
     Adobe
By: Adobe     Published Date: May 15, 2018
The experience is your product. In a world of infinite choices, customer experience is the last true differentiator. The optimal shopping experience happens when the right content is presented to a customer at precisely the right time, no matter where they choose to engage. Read 'The Path of Experience' to learn the critical capabilities needed to drive seamless commerce experiences that keep customers coming back for more. Read the guide to learn: – The role of dynamic merchandising in engaging customers – Steps to create compelling customer experiences using audience segmentation and personalization – Ways to scale customer experiences to create powerful connections, no matter the device or channel
Tags : 
     Adobe
By: Adobe     Published Date: Oct 11, 2018
In a world of infinite choices, customer experience is the last true differentiator. The optimal shopping experience happens when the right content is presented to a customer at precisely the right time, no matter where they choose to engage. Read The Path of Experience to learn the critical capabilities needed to drive seamless commerce experiences that keep customers coming back for more. Read the guide to learn: The role of dynamic merchandising in engaging customers Steps to create compelling customer experiences using audience segmentation and personalization Ways to scale customer experiences to create powerful connections, no matter the device or channel Simply fill out the form to download the report.
Tags : 
     Adobe
By: Adobe     Published Date: Apr 23, 2018
The experience is your product. In a world of infinite choices, customer experience is the last true differentiator. The optimal shopping experience happens when the right content is presented to a customer at precisely the right time, no matter where they choose to engage. Read 'The Path of Experience' to learn the critical capabilities needed to drive seamless commerce experiences that keep customers coming back for more. Read the guide to learn: – The role of dynamic merchandising in engaging customers – Steps to create compelling customer experiences using audience segmentation and personalization – Ways to scale customer experiences to create powerful connections, no matter the device or channel
Tags : 
     Adobe
By: Aerohive     Published Date: Oct 12, 2011
Virtualization, cloud computing, and wireless technology are fundamentally changing enterprise computing, providing revolutionary gains in productivity and cost savings. Powerful enterprise applications can now be delivered to almost any device, anywhere, at any time.
Tags : aerohive, virtualization, cloud computing, wireless technology, access points, mobile internet devices, wi-fi devices, routing
     Aerohive
By: Akamai Technologies     Published Date: Jul 02, 2019
Customer identity and access management (CIAM) is increasingly important for brands to deliver the seamless, secure digital experiences demanded by empowered consumers. As part of its Identity and Access Management Playbook, Forrester Research provides guidance to build a customer-obsessed IAM team that has the technical skills, business influence, and interpersonal attributes to architect a CIAM strategy and roll it out across functional groups. Read the full report to learn critical considerations to make your CIAM team effective. Report highlights: ? Four essential roles for your CIAM team ? Why sharing and integrating customer data across organization barriers is critical for success ? The most important technical, business, and interpersonal skills to look for in CIAM candidates
Tags : 
     Akamai Technologies
By: Alert Logic     Published Date: May 23, 2019
In our first cyber security checklist, we provided a security overview and best practices to help organizations prevent an initial compromise from occurring. In this guide, we will help you understand practical steps you can take to mitigate techniques attackers use once they have penetrated your defenses. Once attackers have access to a machine, they can evade detection by using fileless techniques and legitimate system administration tools to do their dirty work. With this checklist, you will have a guide to help mitigate the impact of an attacker. Lastly, we will hep you understand how partnering with a company like Alert Logic can provide better defenses to stop attackers in their tracks. This checklist helps to explain how to: • How to manage and limit PowerShell access • Securing and utilizing Windows Management Instrumentation (WMI) • Ways to apply application controls • Following the principle of least privilege and applying access controls • What to monitor for to help uncover
Tags : 
     Alert Logic
By: Asentria Corporation     Published Date: Sep 04, 2007
One of the greatest challenges to any advanced wireless operation is the maintenance of continuous and economical service. Today’s networks have evolved into business-critical services that organizations rely upon every day. However, unplanned remote site downtime due to equipment and power failure, and adverse environmental conditions can severely impair network service.
Tags : telecom alarms, snmp traps, remote site managers, terminal servers, remote access, snmp monitoring, snmp, contact closures
     Asentria Corporation
By: Attunity     Published Date: Nov 15, 2018
With the opportunity to leverage new analytic systems for Big Data and Cloud, companies are looking for ways to deliver live SAP data to platforms such as Hadoop, Kafka, and the Cloud in real-time. However, making live production SAP data seamlessly available wherever needed across diverse platforms and hybrid environments often proves a challenge. Download this paper to learn how Attunity Replicate’s simple, real-time data replication and ingest solution can empower your team to meet fast-changing business requirements in an agile fashion. Our universal SAP data availability solution for analytics supports decisions to improve operations, optimize customer service, and enable companies to compete more effectively.
Tags : 
     Attunity
By: AWS     Published Date: Jan 03, 2019
Managing your data can be a challenge, but establishing an analytics solution that every user can navigate, regardless of skillset, is where organizations often need help. TIBCO® Spotfire® features AI-driven data visualizations and dashboards, which helps enables each organizational role to discover and deliver valuable insights with ease. Riteway Sales and Marketing, which helps many Southeastern supermarkets execute strategies, leveraged the power of TIBCO Spotfire to better understand individual product performance throughout their stores, achieving exponentially faster time to insight than their previous solution allowed. Watch this on-demand webinar to learn how TIBCO Spotfire, when leveraged on Amazon Web Services cloud, can help you generate deep insights in minutes. You’ll learn: • How to generate relevant, actionable insights from any data, anywhere • Some of the best practices for leveraging AI-driven visual and predictive analytics solutions in the cloud • How to
Tags : 
     AWS
By: Beyond.com     Published Date: Nov 28, 2011
Learn how a smart niche recruitment strategy can effectively and affordably target the right candidates, and significantly reduce your cost per hire.
Tags : niche recruitment, recruiting, recruitment, hire, hiring practices, qualified candidates, talent acquisition, talent sourcing
     Beyond.com
By: BlackBerry     Published Date: Apr 13, 2010
Mobile deployments in business are growing at an accelerating rate, enabled by increasingly capable devices at attractive prices, faster, less costly, and more reliable wireless networks being deployed across wider areas, and an expanding array of mobile applications that empower the mobile workforce with an abundance of business critical functions.
Tags : blackberry, iphone, windows, wireless networksmicrosoft exchange, mobile device management, mobile device management software, mobile workers, remote computing
     BlackBerry
By: BlackBerry Cylance     Published Date: Jul 02, 2018
The cyberattacks of 2017 proved more numerous, sophisticated, and ruthless than in years past. Threat actors, armed with knowledge stolen from the CIA and tools lifted from the NSA, demonstrated an elevated level of proficiency. WannaCry and NotPetya, two prominent threats from last year, successfully exploited these stolen assets in their assault on systems worldwide. As 2017 progressed, new opportunities developed in ransomware-as-a-service (RaaS), opening the gates of malware-for-profit to everyone. Advancements in fileless attacks provided new ways for threats to hide from once reliable detection methods. Malware features such as polymorphism continued to play a powerful role in evading traditional defenses. The victims of cybercrime ranged from private businesses to the fundamental practices of democracy. France and the United States saw significant data breaches during their recent presidential elections. Several high-profile companies lost their customers’ personally identifiable information to cyberattacks, blemishing their brands and costing them untold millions in recovery operations. This report contains an overview of the threat trends and malware families Cylance's customers faced in 2017. This information is shared with the goal of assisting security practitioners, researchers, and individuals in our collective battle against emerging and evolving cyberthreats.
Tags : cyber attacks, cia, nsa, wannacry, notpetya
     BlackBerry Cylance
By: Brainshark     Published Date: Jun 03, 2013
View this 2 minute video to learn why millions use SlideShark to show flawless PowerPoints on the iPad...instantly track what reps presented which PowerPoints and to whom. Update every copy of a field sales presentation with a single of a mouse...Control, manage and track individual rep usage of master presentations.
Tags : powerpoint, sales, mobile, ipad, iphone, slideshark, compliance, presentation
     Brainshark
By: Brainshark     Published Date: Oct 16, 2013
With the time investment required to develop high quality marketing content, marketers aim to maximize the use, value and impact of the content for their varied audiences. To accomplish this, they need talent, technology and processes that help them “do more with less.” Inside this E-book, you'll hear from marketers that have found a way to easily combine the power of video, mobile and social media with their existing efforts to engage their audiences and drive demand generation.
Tags : video marketing, content marketing, marketing best practices, social media, viral video, inbound marketing, outbound marketing, tracking video
     Brainshark
By: CA Technologies EMEA     Published Date: May 25, 2018
As cycles accelerate and timelines shorten, projects are being recognized—by necessity— as the delivery arm for strategy. In this environment, anything less than real-time access to real-time project data is too slow, because businesses need to know where they’re heading, not just where they’ve been. CA Project & Portfolio Management (CA PPM 15.3) has added new capabilities to support project, financial and resource management across individual initiatives and entire portfolios. We’ve also built new, embedded BI capabilities that make powerful data and insights more accessible to everyone.
Tags : budgets, project, cash, flows, finance, project, management
     CA Technologies EMEA
By: CarbonBlack     Published Date: Oct 26, 2016
Traditional antivirus (AV) just doesn’t cut it anymore. From ransomware that holds intellectual property hostage to sophisticated malware-less attacks that exploit PowerShell, scripting, and memory, endpoints are facing more security risk than ever before. As a result, companies have set their sights on the next generation of lightweight AV solutions.
Tags : security, it management
     CarbonBlack
By: Centrica Business Solutions     Published Date: Aug 14, 2018
The energy landscape has become increasingly complex. Globally, we’re relying less on centralized, steady power sources – such as gas-fired and coal-fired power stations – and more on mixed, locally-distributed renewable energy supplies including solar, wind, tidal and battery. While this is positive for the environment and carbon emissions, it makes balancing power grids a much more complex task. Power quality and reliability becomes more variable in output, while demand for power continues to increase steadily. But when it comes to energy resilience, many organizations simply don’t know where to start. What solutions are available? Which are the best ones for their specific situation and physical premises? What will be their return on investment? Is it simply the cost of doing business, or is there actually a business case? The guide will give you the tools and data to build your understanding and quantify the benefit for your organization.
Tags : energy, resilience, building, business, energy
     Centrica Business Solutions
By: Centrify Corporation     Published Date: Jan 22, 2018
Centrify redefines security from a legacy static perimeter-based approach to protecting millions of scattered connections in a boundaryless hybrid enterprise. As the only industry recognized leader in both Privileged Identity Management and Identity-as-a-Service, Centrify provides a single platform to secure every user’s access to apps and infrastructure in today’s boundaryless hybrid enterprise through the power of identity services.
Tags : 
     Centrify Corporation
By: Centrify Corporation     Published Date: Jan 22, 2018
Centrify redefines security from a legacy static perimeter-based approach to protecting millions of scattered connections in a boundaryless hybrid enterprise. As the only industry recognized leader in both Privileged Identity Management and Identity-as-a-Service, Centrify provides a single platform to secure every user’s access to apps and infrastructure in today’s boundaryless hybrid enterprise through the power of identity services.
Tags : 
     Centrify Corporation
By: Cisco     Published Date: Jan 29, 2009
Every minute counts in a small company and wireless networks are a powerful tool for boosting productivity and encouraging information sharing. With untethered access to documents, emails, applications and other network resources, employees can roam where they need to and have constant access to the tools required to do their jobs.
Tags : cisco, wireless, wireless networks, information sharing, untethered access, wlan, wireless lan, effective communication
     Cisco
By: Cisco     Published Date: Sep 15, 2015
Wi-Fi is about to get a reboot. New 802.11ac Wave 2 products will make it possible to deliver LAN-like multigigabit speeds over the wireless network for the first time, enabling previously unimagined scale and flexibility in the enterprise workspace. But how will businesses capitalize on this new capacity when most current Ethernet access cabling maxes out at 1 Gigabit per second (Gbps)? This white paper: ? Introduces the new generation of Cisco® Catalyst® switches with Multigigabit Ethernet technology, the first platforms to combine support for multigigabit wireless speeds with full power over Ethernet (PoE) in an easy-to-deploy solution ? Shows how Cisco Catalyst Multigigabit Ethernet switches use NBASE-T technology to empower you to deliver 5-Gbps speeds over your existing access cabling ? Details how Cisco Catalyst Multigigabit Ethernet switches gives you the scale and capacity you need today, while protecting your network investments for the future Are you ready to learn more?
Tags : migration, ethernet, deploy, wireless, network, it management, enterprise applications
     Cisco
By: Cisco     Published Date: Feb 23, 2016
Cisco® Unified Access establishes a framework that securely, reliably, and seamlessly connects anyone, anywhere, anytime, using any device to any resource. This framework empowers all employees with advanced services, taking advantage of an intelligent, enterprise-wide network to increase revenue, productivity, and customer satisfaction while reducing operational inefficiencies across the business. Cisco Unified Access includes services-rich network edge systems and combines a core network infrastructure embedded with integration of productivity-enhancing advanced technologies, including IP communications, mobility, security, video, and collaboration services.
Tags : framework, network infrastructure, communications, optimization
     Cisco
By: Cisco     Published Date: Jun 21, 2016
Wi-Fi is about to get a reboot. New 802.11ac Wave 2 products will make it possible to deliver LAN-like multigigabit speeds over the wireless network for the first time, enabling previously unimagined scale and flexibility in the enterprise workspace. But how will businesses capitalize on this new capacity when most current Ethernet access cabling maxes out at 1 Gigabit per second (Gbps)? This white paper: ? Introduces the new generation of Cisco® Catalyst® switches with Multigigabit Ethernet technology, the first platforms to combine support for multigigabit wireless speeds with full power over Ethernet (PoE) in an easy-to-deploy solution ? Shows how Cisco Catalyst Multigigabit Ethernet switches use NBASE-T technology to empower you to deliver 5-Gbps speeds over your existing access cabling ? Details how Cisco Catalyst Multigigabit Ethernet switches gives you the scale and capacity you need today, while protecting your network investments for the future
Tags : 
     Cisco
Start   Previous   1 2 3 4 5 6    Next    End
Search White Papers      

Add White Papers

Get your white papers featured in the insideHPC White Paper Library contact: Kevin@insideHPC.com