RecruitingBlogscom

Follow Us:

 

core technologies

Results 26 - 46 of 46Sort Results By: Published Date | Title | Company Name
Published By: Epson     Published Date: May 14, 2018
Consumers worldwide continue to adopt and use technology in their shopping experience. Faced with rising customer expectations and increasing competitive pressures, retailers now are prioritizing in-store innovation. Many retailers have adopted multichannel implementations, in which mobile, web, and in-store shopping are enabled but not delivered consistently to the customer. The next step in this evolution is an omnichannel strategy, now being deployed by some retailers, which presents a consistent shopping experience across mobile, web, and in-store channels. Omnichannel also enables retailers to integrate back-end infrastructure technologies (e.g., servers, databases, etc.) and cloud-based services (e.g., loyalty programs, personalized recommendations, inventory management, etc.) to improve many aspects of store and enterprise operations. An omnichannel strategy relies on several core and supporting technologies. The key factors in evaluating any omnichannel-enabling solution includ
Tags : 
    
Epson
Published By: Intel     Published Date: Aug 10, 2012
3rd generation Intel® CoreT vProT processors fight sophisticated crimeware with built-in security technologies that work below and beyond the OS
Tags : 
it security, intel, monitoring, reporting, remediation, automatic monitoring, contagions, built-in-security, virtual realms, hardware-based security, intel ipt, software based convenience, anti-virus, security software, memory, network, display, disk, security, it management
    
Intel
Published By: CDW-Trend Micro     Published Date: Mar 26, 2015
In today’s ‘always on, always connected’ world where sensitive data is almost certain to be stored electronically, organizations can no longer afford to operate without some form of Endpoint Protection. The costs related to network downtime or stolen data resulting from malicious attacks significantly outweighs that of maintaining an up to date solution. Although the unified nature of Endpoint Protection has made extensive security functionality easier to manage, selecting the right products can be a difficult task. This whitepaper aims to explain how the core functionality of Enterprise Protection suites have developed, what to look for in a solution, and which technologies will need to be considered in the future. In today’s business environment, it is no longer a question of whether to invest in Endpoint Protection, but a question of which solution is right for your organization.
Tags : 
endpoint security, data security, endpoint protection, enterprise protection, technology, networking, security, it management
    
CDW-Trend Micro
Published By: Emarsys     Published Date: Feb 14, 2018
Expectations for dramatically improved customer experiences (CX) are driving retail investments in omnichannel technologies that provide competitive differentiation beyond core products and services. As retailers pursue more advanced capabilities, artificial intelligence (AI) technologies provide innovative opportunities for retail marketers. It is, therefore, mission-critical for retail decision-makers to understand how ready their organizations are to embrace AI technologies with the potential to propel them forward as industry leaders.
Tags : 
marketing, retail, ecommerce, customer experiences
    
Emarsys
Published By: Qualys     Published Date: Nov 05, 2013
Organizations have traditionally viewed vulnerability scanners as a tactical product, largely commoditized and only providing value around audit time. But with limited resources and a real need to reduce risk, organizations need the ability to pull in threat-related data, combine it with an understanding of what is vulnerable, and figure out what is at risk. This report from Securosis outlines how yesterday's vulnerability scanners are evolving to meet this need, emerging as a much more strategic component of an organization's control set than in the past. Learn how vulnerability scanners are evolving to provide real value beyond vulnerability reports for auditors - emerging as a strategic component helping organizations effectively lower risks.
Tags : 
qualys, securosis, vulnerability, vulnerability management, scanning, infrastructure, core technologies, value-add technologies, enterprise applications, enterprise integration, vulnerability scanners, threat management, security platforms, cloud
    
Qualys
Published By: HP & Intel     Published Date: Sep 18, 2012
3rd generation Intel Core vPro processors' built-in security technologies deliver and protect business clients where current technologies cannot reach.
Tags : 
intel, security, it threats, threat management, malware, data loss prevention, identity protection
    
HP & Intel
Published By: SAS     Published Date: Jun 06, 2018
The Internet of Things (IoT) is rapidly emerging as a core transformational technology of the digital era. The ability to gather data from sensors embedded throughout an enterprise can drive insights and operational efficiencies from the supply chain to the customer. But IoT and Industrial IoT (IIoT) implementations require high degrees of IT/OT convergence - collaboration and integration between information technology and operational technology groups - to succeed. These two groups, however, often have different goals, performance metrics, and perspectives on both the collaboration and the outcome. This SAS/HPE-sponsored paper helps readers get a better understanding of the relationship, either real or perceived, between these two groups. Futurum Research surveyed the state of the relationship between IT and OT teams as it pertains to the design, implementation, and creation of value through IoT technologies.
Tags : 
    
SAS
Published By: Gleanster     Published Date: Nov 10, 2011
This Gleansight benchmark report is based on the experiences of 387 companies and includes the following sections: Reasons to Implement, Challenges, Value Drivers, Core Technologies and Success Story. It also includes a Vendor Landscape with descriptions, rankings and analysis of 39 solution providers. Social intelligence is being increasingly used today to describe the next rung on the evolutionary ladder of listening to and acting upon consumer conversation on the social web. That rung maps to a number of technology innovations. Chief among them are improved capabilities around analyzing and integrating all sources of voice-of-the-customer data to generate more actionable insights. Social intelligence also speaks to an emerging corporate mindset regarding the strategic importance of social data and the need to better capitalize upon it. This Gleansight benchmark report reveals how Top Performers are achieving success when it comes to the incessant quest to extract customer insights and take actions that ultimately translate into revenue growth, cost reduction, risk reduction and relationship enhancement.
Tags : 
social intelligence, marketing, social media, gleanster
    
Gleanster
Published By: Gleanster     Published Date: Dec 14, 2011
This benchmark report is 26 pages and is based on the experiences of 319 companies. It includes the following sections: Reasons to Implement, Challenges, Value Drivers, Core Technologies and Success Story. It also includes a Vendor Landscape section with company descriptions, analyst commentaries and comparative rankings for 47 technology solution providers.
Tags : 
gleanster, marketing, email marketing, personalization, b2b, customers, email campaigns
    
Gleanster
Published By: Gleanster Research     Published Date: Nov 10, 2011
This Gleansight benchmark report is based on the experiences of 229 companies and includes the following sections: Reasons to Implement, Challenges, Value Drivers, Core Technologies and Success Story. It also includes a Vendor Landscape with descriptions and analysis of 32 solution providers. Most organizations today have business intelligence (BI) tools or at least some way of churning out reports. Fewer have a true business intelligence strategy or a well-architected BI platform for generating actionable insights. Broadly considered, BI encompasses all aspects of gathering, storing, cleansing, analyzing and distributing data. This Gleansight benchmark report reveals how Top Performers are justifying their investments in next-generation BI capabilities, how they're overcoming implementation and organizational hurdles, and how, as a result of their investments, they're now able to make more timely and better informed business decisions across multiple organizational functions.
Tags : 
gleanster, business, benchmark, business intelligence, roi
    
Gleanster Research
Published By: IBM     Published Date: Oct 14, 2014
Capitalizing on the transformative potential of private cloud requires leveraging the differentiators that will drive exponential value down the road. This IBM white paper discusses the core differentiators that drive transformative business value and to how best incorporate them into your environment, based on the latest research, technologies and solutions.
Tags : 
private cloud, business value, business agility, hybrid era, it management, knowledge management, business technology
    
IBM
Published By: AdRoll     Published Date: Jul 11, 2017
Account-based marketing (ABM) has recently become a popular term among business-to-business (B2B) marketers. ABM refers to a marketing practice where efforts focus on a predetermined set of customers who meet certain criteria. A set of customers can be narrowly defined and specific—like CIOs, or decision makers at Fortune 100 companies. It also can be more fluid and based on a set of parameters—like marketing directors at financial institutions or technology companies. At its core, ABM combines long-standing marketing best practices with new technologies. It allows marketers to target the right prospects with personalized marketing messages and then automate their entire customer acquisition process
Tags : 
account-based marketing, new technology, automation, business-to-business, personalized marketing
    
AdRoll
Published By: AdRoll     Published Date: Jul 11, 2017
Account-based marketing (ABM) has recently become a popular term among business-to-business (B2B) marketers. ABM refers to a marketing practice where efforts focus on a predetermined set of customers who meet certain criteria. A set of customers can be narrowly defined and specific—like CIOs, or decision makers at Fortune 100 companies. It also can be more fluid and based on a set of parameters—like marketing directors at financial institutions or technology companies. At its core, ABM combines long-standing marketing best practices with new technologies. It allows marketers to target the right prospects with personalized marketing messages and then automate their entire customer acquisition process
Tags : 
account-based marketing, business-to-business, personalized marketing, automation
    
AdRoll
Published By: AdRoll     Published Date: Jul 11, 2017
Account-based marketing (ABM) has recently become a popular term among business-to-business (B2B) marketers. ABM refers to a marketing practice where efforts focus on a predetermined set of customers who meet certain criteria. A set of customers can be narrowly defined and specific—like CIOs, or decision makers at Fortune 100 companies. It also can be more fluid and based on a set of parameters—like marketing directors at financial institutions or technology companies. At its core, ABM combines long-standing marketing best practices with new technologies. It allows marketers to target the right prospects with personalized marketing messages and then automate their entire customer acquisition process
Tags : 
account-based marketing, business-to-business, personalized marketing, automation
    
AdRoll
Published By: IBM     Published Date: May 30, 2008
Not all data is created equal, however, and deriving business value from information dispersed over many different sources means integrating, analyzing and optimizing heterogeneous types and sources of information throughout its lifecycle. Find out how, when deployed together in the same environment, IBM TotalStorage Productivity Center, IBM System Storage SAN Volume Controller and IBM Tivoli Storage Manager deliver the core technologies need to help customers tier their storage based on classes of service.
Tags : 
information lifecycle, information management, tivoli, storage management, leveraging information, ibm, ibm li, li campaign, storage
    
IBM
Published By: IBM     Published Date: Jun 11, 2008
Good governance of a service-oriented architecture is becoming a core competency. This Magic Quadrant report by Gartner examines the market for SOA governance through a set of integrated technologies. It evaluates leaders, challengers and innovators in the SOA governance technology market, providing feature information and strengths and cautions for each.
Tags : 
soa, ibm, ebf, governance, infrastructure
    
IBM
Published By: Gleanster     Published Date: Dec 14, 2011
This benchmark report is 28 pages and is based on the experiences of 389 companies. It includes the following sections: Reasons to Implement, Challenges, Value Drivers, Core Technologies and Success Story. It also includes a Vendor Landscape section with company descriptions, analyst commentaries and comparative rankings for 41 technology solution providers.
Tags : 
gleanster, social media, marketing, engagement, social media marketing, customer relations
    
Gleanster
Published By: Adobe     Published Date: Aug 14, 2014
Adobe received the highest score for current digital experience (DX) delivery offerings in The Forrester Wave™: Digital Experience Delivery Platforms, Q3 2014 report. And, we’re continuing to innovate. Since the evaluation, we’ve launched several new capabilities that include richer support for mobile apps, increased usability through visual workflows, and a master marketing profile. Read the report to see why Adobe was named a Strong Performer and to learn more about: -The DX challenges that companies face and how they’re addressing them -The array of tools and technologies available in digital experience delivery platforms -The journey to unified, cross-channel digital experiences “Strategically, Adobe differentiates with its vision of the connective tissue between its tools, and its aim for single customer profile.” – Forrester Research, Inc.
Tags : 
digital experience, delivery platforms, mobile apps, software vendors
    
Adobe
Published By: MobileIron     Published Date: Mar 21, 2017
Modern enterprises are rapidly shifting core business processes away from legacy technologies and standardizing on mobile devices and cloud services. As a result, these organizations are quickly outgrowing basic mobile device management (MDM) capabilities and apps like email and calendar. Building a secure mobile and cloud architecture now requires a comprehensive approach to enterprise mobility management (EMM). It requires a unified platform with defense-grade security, massive scalability, a broad ecosystem of technology partners, enhanced Office 365 security, and integrated desktop and mobile management. And it has to provide all of this without locking customers into a proprietary technology stack.
Tags : 
    
MobileIron
Published By: Juniper Networks     Published Date: Jun 22, 2017
This document is targeted at networking and virtualization architects interested in deploying VMware NSX network virtualization in a multi-hypervisor environment based on the integrated solution from VMware and Juniper. VMware’s Software Defined Data Center (SDDC) vision leverages core data center virtualization technologies to transform data center economics and business agility through automation and non disruptive deployment that embraces and extends existing compute, network and storage infrastructure investments. NSX is the component providing the networking virtualization pillar of this vision. As a platform, NSX provides partners the capability of integrating their solution and build on the top of the existing functionalities. NSX enables an agile overlay infrastructure for public and private cloud environments leveraging Juniper’s robust and resilient underlay infrastructure that also helps bridge the physical and virtual worlds using the L2 gateway functionality.
Tags : 
network security, account security, data management, network security, secure systems, application security, network performance, network diagnostics
    
Juniper Networks
Published By: Workday France     Published Date: Mar 08, 2018
Historiquement les notions de gouvernance, de conformité, de contrôle et d'audit n'ont été pensées qu'après coup dans les modules financiers des logiciels ERP classiques. Ce sujet a longtemps été ignoré à l'occasion de la conception, du développement et de l’évaluation des logiciels de gestion d’entreprise. Le contrôle n’est pas aussi urgent que le traitement des transactions, pas aussi visible que le reporting financier ou pas aussi passionnant que le décisionnel. Il vient donc souvent dans un second temps. De nos jours, la gouvernance est devenue centrale. C'est sur ce précepte que Workday a conçu ses solutions. Au début des logiciels de gestion, dans les années 80 et 90, le contrôle était loin d'être une priorité. Les lois Sarbanes-Oxley, Basel II et IFRS n’existaient pas encore et « l’audit hors logiciel » était monnaie courante. Les « gros ERP » ont résolu ce problème comme ils le pouvaient, en rachetant des technologies ou en créant des fonctionnalités qui ont été ensuite intégré
Tags : 
    
Workday France
Previous    1 2     Next   
Search      

Add Research

Get your company's research in the hands of targeted business professionals.

© 2019  Created by RecruitingBlogs.   Powered by

Badges  |  Report an Issue  |  Terms of Service

scroll to the top