"Tech Solutions - one byte at a time!"
DigiBytes.com is the digital library of solutions for business and technology professionals.

Login Register Login
For Admins

cep

Results 1 - 25 of 848Sort Results By: Published Date | Title | Company Name
Published By: Cisco     Published Date: Dec 27, 2017
Flexible work arrangements (FWAs) can come in many forms, including telecommuting, compressed workweeks and flexible scheduling that allows employees to perform tasks outside of core business hours. Improvements in technology have made FWAs possible for a broader segment of the labor force, but some of these arrangements have yet to achieve widespread acceptance in many organizations’ workplace cultures. However, SHRM research shows that participation in some FWAs has risen in recent years, and these measures have yielded positive results for companies’ recruitment and retention efforts, as well as their employees’ development and productivity.
Tags : 
    
Cisco
Published By: Carbonite     Published Date: Jan 04, 2018
It’s the moment every IT department dreads: A data loss event takes your business offline and the countdown clock begins. Despite spending countless hours safeguarding against and preparing for this moment, the impact of downtime is immediate and all-consuming. While IT pros can’t always avoid data loss events, they can prepare for them to ensure minimal downtime. To better understand the IT experience during a data disaster, EVault commissioned Spiceworks Voice of IT to survey IT pros regarding disaster recovery practices and perceptions. All survey respondents were based in the U.S. and have influence over backup/disaster recovery purchase decisions. This e-book will explore the impact of downtime and data loss on IT departments for small and midsize businesses.
Tags : 
    
Carbonite
Published By: CA Technologies EMEA     Published Date: Oct 19, 2017
Nous avons tous vécu cette expérience. Nous nous habituons tellement à la manière dont les choses se font que nous ne remettons pas souvent en cause les raisons pour lesquelles nous les faisons
Tags : 
api, application programming interface, psd2, open banking, json, github, api gateway, apim
    
CA Technologies EMEA
Published By: CA Technologies EMEA     Published Date: Oct 23, 2017
Pour dynamiser le marché ou rester compétitives, les entreprises doivent livrer leurs produits logiciels plus rapidement que jamais. Les méthodes traditionnelles d’assurance qualité ne sont cependant pas en mesure de supporter cette cadence soutenue. Bien qu’ils aient aidé les organisations à améliorer la qualité du code, les mécanismes d’intégration continue ne prennent pas en charge les tests de bout en bout à l’échelle du cycle de vie du code.
Tags : 
continuous testing, déploiement automatique, livraison continue, test, assurance qualité, développement, qualité du code, test
    
CA Technologies EMEA
Published By: CA Technologies EMEA     Published Date: Oct 23, 2017
Faites passer rapidement vos idées du stade de la conception au stade du développement, sans sacrifier la qualité, grâce à un écosystème de livraison continue de bout en bout capable de mettre en œuvre des tests rigoureux selon la fonctionnalité utilisateur souhaitée.
Tags : 
continuous testing, déploiement automatique, livraison continue, test, assurance qualité, développement, qualité du code, test
    
CA Technologies EMEA
Published By: Lookout     Published Date: Aug 30, 2017
This report examines enterprise security threats for iOS and Android. While Android has higher consumer market share, iOS commands more market share in the enterprise, accounting for 72% of enterprise mobile activations in Q1 2015 compared to Android’s 26% activation share1 . The perception that iOS is more secure has helped drive its enterprise adoption, but this perception comes largely from security trends observed in the consumer space. Android, with a more open mobile platform and 81% global market share2 , predictably invites more broad-based attacks than iOS. When it comes to iOS and Android in the enterprise, however, both need threat protection because at a fundamental level both platforms are subject to similar vulnerabilities and attack methods. iOS attacks may be relatively uncommon today, but they have happened and can occur. Moreover, enterprises increasingly rely on iOS app-distribution methods that forgo Apple’s app-review and they face the risk that attackers will cont
Tags : 
enterprise security, enterprise mobile security, ios attacks, mobile threat protection, android attacks
    
Lookout
Published By: CA Technologies EMEA     Published Date: Aug 03, 2017
Tenuto conto del fatto che la GDPR è stato annunciato formalmente solo di recente, si evidenzia un buon livello di consapevolezza tra i partecipanti. Una volta informati sul regolamento, l'88% degli intervistati ha dichiarato che la propria azienda deve affrontare difficoltà tecnologiche per la compliance alla GDPR. Il percorso verso la compliance è percepito come molto laborioso.
Tags : 
generazione di dati sintetici, virtualizzazione di servizi, controllo e protezione dei database, masking dei dati, warehouse dei dati, ca technologies, gdpr
    
CA Technologies EMEA
Published By: Datavail     Published Date: Jan 12, 2018
Your enterprise performance management systems like Hyperion are mission critical. If you’re a Hyperion administrator, manager, or even a finance director, you know a crash, bug, or performance issue can delay reporting and take hours or even days to fix. Fortunately, keeping Hyperion running smoothly – and catching these issues before they happen – is not as impossible or time-consuming as you might believe. Join us for this webinar as we explore and debunk 9 misconceptions of Hyperion Performance Management that are keeping you from effectively managing your platform so financial processes run smoothly.
Tags : 
    
Datavail
Published By: Group M_IBM Q1'18     Published Date: Dec 21, 2017
Consider the volume of business content that your organization generates or receives every day: applications, forms, reports, office documents, audio, video, and even social media about your company. If it is poorly managed, not digitized, or disconnected from critical business processes, it creates chaos. This chaos impacts your ability to deliver exceptional customer service; it slows down important processes, increases security risk, and negatively impacts revenue. Conversely, controlling content chaos can significantly improve your analytics strategy by gaining insight and business value from dark or unstructured data sources. In this eBook, learn how cognitive and cloud-based Enterprise Content Management, or ECM, can help you protect your content while gaining a competitive advantage from it as you grow.
Tags : 
business content, volume, cloud-based, enterprise content management, ecm
    
Group M_IBM Q1'18
Published By: Palo Alto Networks     Published Date: Nov 15, 2017
Your network is more complex than ever before. Your employees are accessing any application they want, using work or personal devices. Oftentimes, these applications span both personal and work-related usage, but the business and security risks are often ignored. Prospective employees are asking about application usage policies before accepting a job.
Tags : 
firewall, optimization, security risks, business, devices, employees, technology
    
Palo Alto Networks
Published By: Palo Alto Networks     Published Date: Nov 15, 2017
Your network is more complex than ever before. Your employees are accessing any application they want, using work or personal devices. Often times, these applications span both personal and work related usage, but the business and security risks are often ignored. Prospective employees are asking about application usage policies before accepting their new job. Adding another layer of complexity is the concern about the effectiveness of your cybersecurity posture. Is your business a target for a cyberattack Is it a question of when, as opposed to if? And are you as prepared as you could be? The complexity of your network and your security infrastructure may limit or slow your ability to respond to these and other cybersecurity challenges.
Tags : 
firewall, customer, optimization, employees, devices, cyber security, technology
    
Palo Alto Networks
Published By: Coyote Point Systems     Published Date: Sep 02, 2010
The idea of load balancing is well defined in the IT world: A network device accepts traffic on behalf ofa group of servers, and distributes that traffic according to load balancing algorithms and the availabilityof the services that the servers provide. From network administrators to server administrators to applicationdevelopers, this is a generally well understood concept.
Tags : 
coyote point, adc, buyer's guide, web applications, server load, server hardware, networking, virtualized network
    
Coyote Point Systems
Published By: MokiMobility     Published Date: Oct 11, 2012
Sports apparel retailer Fanzz uses iPad kiosks to accept in-store orders on their website, increasing the number of sales on their site and keeping more in-store customers.
Tags : 
    
MokiMobility
Published By: CrowdTwist     Published Date: Jan 09, 2018
2017 loyalty trends highlight a strong focus on meeting customer expectations with exceptional customer experiences. Loyalty programs are becoming more sophisticated, moving beyond the traditional spend and get model, to omnichannel and multichannel programs that recognize customers for every interaction they make with a brand. Smart marketers are capturing and leveraging loyalty data to understand their customers better and market effectively to them. Download this e-book to learn more about the current trends shaping loyalty programs today.
Tags : 
    
CrowdTwist
Published By: AdRoll     Published Date: Dec 20, 2017
There is a great misconception that the purpose of attribution modelling is to arrive at a singular, concrete truth; however, the reality is much more nuanced. Attribution modeling is actually an ongoing process of improving how we measure marketing’s impact in order to improve our decision making over time. There are a number of attribution principles that still confuse marketers: Why is attribution a process and not an end state? Why is making small steps forward really better than doing nothing? Why does the perfect attribution model not exist? What makes attribution an ROI investment and not a cost center? With the many attribution myths, challenges, and philosophies in mind, AdRoll and Econsultancy have partnered for a second year in a row to produce The State of Marketing Attribution 2017. This time around we’ve broaden our focus beyond Europe to include content that also covers North America and Asia-Pacific.
Tags : 
marketing attribution, attribution modeling, roi, attribution
    
AdRoll
Published By: goTransverse     Published Date: Oct 15, 2015
Stratecast regularly examines the monetization processes and functions within the communications service provider (CSP) sector. This week’s SPIE looks at how other industries are now benefiting from monetization concepts first developed within telecom; and how taking advantage of the details within the monetization process itself enables innovation in surprising new ways. This report also assesses how one company—goTransverse—is enabling a variety of customers across various industries to change how they do business; applying monetization principles in somewhat unconventional ways.
Tags : 
    
goTransverse
Published By: SAP     Published Date: May 18, 2014
From its conception, this special edition has had a simple goal: to help SAP customers better understand SAP HANA and determine how they can best leverage this transformative technology in their organization. Accordingly, we reached out to a variety of experts and authorities across the SAP ecosystem to provide a true 360-degree perspective on SAP HANA.
Tags : 
sap, big data, real time data, in memory technology, data warehousing, analytics, big data analytics, data management
    
SAP
Published By: SAP     Published Date: May 18, 2014
This white paper, produced in collaboration with SAP, provides insight into executive perception of real-time business operations in North America. It is a companion paper to Real-time Business: Playing to win in the new global marketplace, published in May 2011, and to a series of papers on real-time business in Europe, Asia-Pacific and Latin America.
Tags : 
sap, big data, real time data, in memory technology, data warehousing, analytics, big data analytics, data management
    
SAP
Published By: Frontier Communications     Published Date: Dec 22, 2016
This infographic highlights a few common misconceptions about protecting yourself when Mother Nature wreaks vengeance, your workplace becomes a no man’s land, or cybercriminals attack.
Tags : 
    
Frontier Communications
Published By: Cisco     Published Date: Feb 12, 2016
See how Cisco video collaboration tools can help your business get back to getting things done.
Tags : 
video collaboration tools, cisco, best practices, software tools, business process management
    
Cisco
Published By: Cherwell Software     Published Date: Apr 07, 2016
Highlights for Children, Inc. was founded in 1946 with the belief “that children are the world’s most important people.” Since its inception, the organization has been dedicated to helping children “become their best selves and become confident, caring, curious, and creative individuals.” Today, the Highlights for Children, Inc., family of companies includes educational publishers who publish textbooks and offer educational seminars for teachers, as well as a consumer division that publishes books, digital products, and four magazines for children ages 0-12. The flagship magazine is Highlights for Children, well known for its Fun with a Purpose.
Tags : 
best practices, customer support, business intelligence, business optimization
    
Cherwell Software
Published By: Cisco     Published Date: Dec 04, 2015
See how Cisco video collaboration tools can help your business get back to getting things done.
Tags : 
video, collaboration, tools, cisco, best practices, business analytics
    
Cisco
Published By: Cisco     Published Date: Jan 08, 2016
Ce résumé du guide de conception présente les points essentiels d'un WAN intelligent Cisco, la technologie clé et ses utilisations possibles ainsi que des ressources connexes supplémentaires.
Tags : 
    
Cisco
Published By: Cisco     Published Date: Jun 21, 2016
The Internet of Things may be a hot topic in the industry but it’s not a new concept. In the early 2000’s, Kevin Ashton was laying the groundwork for what would become the Internet of Things (IoT) at MIT’s AutoID lab. Ashton was one of the pioneers who conceived this notion as he searched for ways that Proctor & Gamble could improve its business by linking RFID information to the Internet. The concept was simple but powerful. If all objects in daily life were equipped with identifiers and wireless connectivity, these objects could be communicate with each other and be managed by computers.
Tags : 
    
Cisco
Published By: SAS     Published Date: Jan 17, 2018
Delivering exceptional customer experiences has become a key differentiator for top organizations today. Now you can see where your peers and competitors stand in the new Forbes Insights report Data Elevates the Customer Experience. This report is a comprehensive follow-up to an October 2015 preliminary pulse survey conducted among 105 executives of large global organizations. It identifies three categories of organizations – leaders, explorers and laggards – and measures the progress they have made with the data-driven customer experience based on three key pillars: organization (people), openness (data) and orchestration (processes). Read the results, find out where you stand and glean some new ideas from your peers about how to elevate the customer experience.
Tags : 
    
SAS
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Special Report

In this webinar Black Duck Software (www.blackducksoftware.com), together with representatives of SAP, will review the benefits open source offers to development organizations, the management challenges it presents, and approaches for addressing those challenges.

Add Research

Get your company's research in the hands of targeted business professionals.

Modern Analyst Media Modern Analyst Media
Modern Analyst Requirements Modern Analyst Media Modern Analyst DigiBytes
Copyright 2009-2014 by Modern Analyst Media LLC Home  |  Featured Bytes  |  Popular Bytes  |  All Topics  |  Vendor Directory