"Tech Solutions - one byte at a time!"
DigiBytes.com is the digital library of solutions for business and technology professionals.

Login Register Login
For Admins

loss

Results 76 - 100 of 532Sort Results By: Published Date | Title | Company Name
Published By: Microsoft     Published Date: Mar 23, 2018
Für Vertriebsorganisationen bedeutet die Ansprache, Gewinnung und Bindung von Kunden mehr als nur die Steuerung von Kontaktpunkten. Vielmehr zählt alles zwischen persönlichen und digitalen Kontakten dazu, und das gesamte Unternehmen sollte an der Kundenbindung beteiligt sein. Durch produktive Verbindungen und Beziehungen, die aufgebaut und gepflegt werden, können Sie das Vertrauen und Markenbewusstsein bei Ihren Kunden steigern. Customer-Engagement-Strategien beeinflussen alle Interaktionen, Prozesse und Entscheidungen – und sie sind der wichtigste Faktor für die Umsatzsteigerung. Bei einer branchenübergreifenden Microsoft-Umfrage unter Vertriebsleitern im Mai 2016 lag die Kundenbindung als treibende Kraft für das Umsatzwachstum auf dem ersten Platz, gefolgt von taktischen Treibern wie Automatisierung und Produktivität.
Tags : 
skeptisch, zogerlich, aufgeschlossen, treibend, microsoft, verkauf, digitale
    
Microsoft
Published By: Microsoft     Published Date: Jan 09, 2018
Für Vertriebsorganisationen bedeutet die Ansprache, Gewinnung und Bindung von Kunden mehr als nur die Steuerung von Kontaktpunkten. Vielmehr zählt alles zwischen persönlichen und digitalen Kontakten dazu, und das gesamte Unternehmen sollte an der Kundenbindung beteiligt sein. Durch produktive Verbindungen und Beziehungen, die aufgebaut und gepflegt werden, können Sie das Vertrauen und Markenbewusstsein bei Ihren Kunden steigern.
Tags : 
skeptisch, zogerlich, aufgeschlossen, treibend, microsoft, verkauf, digitale
    
Microsoft
Published By: DellEMC and Intel®     Published Date: Sep 20, 2017
The CSI Companies umfasst vier Entitäten und die angeschlossene Anteo Group, die Personalund Spezialservices bereitstellen, um eine Vielzahl von Kundenanforderungen zu erfüllen. Seit 1994 bietet das Unternehmen mit Sitz in Jacksonville, Florida, Personalaufstockungsservices, Vermittlung von Führungskräften und Direktanstellungen von Mitarbeitern für Kunden in den Bereichen Gesundheitswesen, Finanzdienstleistungen, Bankwesen, Einzelhandel/Bewirtung, Technologie und anderen Branchen. Das Unternehmen unterstützt Kunden landesweit von seinem Hauptsitz und drei regionalen Büros. Intel Inside®. Neue Möglichkeiten Outside. Ultrabook, Celeron, Celeron Inside, Core Inside, Intel, das Intel-Logo, Intel Atom, Intel Atom Inside, Intel Core, Intel Inside, das Intel Inside-Logo, Intel vPro, Itanium, Itanium Inside, Pentium, Pentium Inside, vPro Inside, Xeon, Intel Xeon Phi und Xeon Inside sind Marken der Intel Corporation oder ihrer Tochtergesellschaften in den USA und/oder anderen Ländern
Tags : 
ultrabook, celeron, celeron inside, core inside, intel, das intel-logo, intel atom, intel atom inside, intel core, intel inside, das intel inside-logo, intel vpro, itanium, itanium inside, pentium, pentium inside, vpro inside, xeon
    
DellEMC and  Intel®
Published By: Dell and VMWare     Published Date: Oct 26, 2017
The CSI Companies umfasst vier Entitäten und die angeschlossene Anteo Group, die Personalund Spezialservices bereitstellen, um eine Vielzahl von Kundenanforderungen zu erfüllen. Seit 1994 bietet das Unternehmen mit Sitz in Jacksonville, Florida, Personalaufstockungsservices, Vermittlung von Führungskräften und Direktanstellungen von Mitarbeitern für Kunden in den Bereichen Gesundheitswesen, Finanzdienstleistungen, Bankwesen, Einzelhandel/Bewirtung, Technologie und anderen Branchen. Das Unternehmen unterstützt Kunden landesweit von seinem Hauptsitz und drei regionalen Büros.
Tags : 
    
Dell and VMWare
Published By: Dell and Nutanix     Published Date: Oct 26, 2017
The CSI Companies umfasst vier Entitäten und die angeschlossene Anteo Group, die Personalund Spezialservices bereitstellen, um eine Vielzahl von Kundenanforderungen zu erfüllen. Seit 1994 bietet das Unternehmen mit Sitz in Jacksonville, Florida, Personalaufstockungsservices, Vermittlung von Führungskräften und Direktanstellungen von Mitarbeitern für Kunden in den Bereichen Gesundheitswesen, Finanzdienstleistungen, Bankwesen, Einzelhandel/Bewirtung, Technologie und anderen Branchen. Das Unternehmen unterstützt Kunden landesweit von seinem Hauptsitz und drei regionalen Büros.
Tags : 
    
Dell and Nutanix
Published By: Dell PC Lifecycle     Published Date: Feb 13, 2018
IT-marktonderzoeksbureau IDC heeft een wereldwijd onderzoek uitgevoerd onder meer dan 3500 IT-leiders over de hele wereld en kwam tot de conclusie dat bedrijven op alle niveaus PC Lifecycle as a Service modellen in overweging nemen om de kosten te verlagen, de vernieuwingscycli te verkorten en betere apparatuur te verwerven voor hun medewerkers. Dell PC as a Service (PCaaS) biedt een combinatie van hardware, software, levenscyclusservices en financiering in één complete oplossing, met een enkele, voorspelbare prijs per seat per maand. Dit alles wordt aangeboden door Dell Financial Services. Leer meer over Dell oplossingen powered by Intel®
Tags : 
onderzoek, service, snel, wint, populariteit, dell
    
Dell PC Lifecycle
Published By: Dell PC Lifecycle     Published Date: Feb 13, 2018
Als gevolg van de kosten en complexiteit van het computerbeheer houden IT-afdelingen weinig tijd over voor innovatie. Door de snel ontwikkelende technologieën en bedrijfsbehoeften is het lastiger om in te spelen op nieuwe trends die veranderen hoe technologie wordt geleverd en gebruikt. Ook heeft hardwaretechnologie niet het eeuwige leven. Hardware heeft een levenscyclus, een meetbaar begin en einde aan de productiviteit en waarde. Het is de taak van IT de levenscyclus van pc's te optimaliseren, maar ook te zorgen voor strategische doorbraken voor de organisatie. Leer meer over Dell oplossingen powered by Intel®
Tags : 
levenscyclus, optimaliseren, intel, dell
    
Dell PC Lifecycle
Published By: Dell PC Lifecycle     Published Date: Feb 20, 2018
De traditionele vorm van levenscyclusbeheer voor pc’s is een inefficiënt en duur proces dat uw bedrijf veel tijd en geld kost. Met de PCaaS-oplossing van Dell EMC (PC-as-a-Service) kan de zakelijke aanpak van uw IT-infrastructuur worden getransformeerd. Externe werkzaamheden vormen een dagelijks aspect van het moderne bedrijfsleven en daarmee is het risico op inbreuk van kritieke data enorm toegenomen. Gegevensverlies kan uw bedrijf stilleggen en leiden tot zakelijk verlies, reputatieschade en zelfs boetes. Leer meer over Dell oplossingen powered by Intel®.
Tags : 
bespaar, tijd, geld, dell
    
Dell PC Lifecycle
Published By: Intacct Corporation     Published Date: Jan 26, 2016
Download the white paper, “Developing P&L Reports to Improve Visibility” and learn how to improve: • Insight into organizational performance through a reliable and actionable P&L statement • Visibility into operational, competitive or strategic issues • Data integrity with a single source of truth for profit and loss information
Tags : 
    
Intacct Corporation
Published By: Datto Inc.     Published Date: Mar 07, 2013
Bardissi Enterprises experienced the pain of data loss first hand, when their previous BDR solution failed. Datto met their long list of requirements, to ensure business continuity.
Tags : 
disaster recovery, backup and recovery, bdr, ibc, intelligent business continuity, business continuity, datto
    
Datto Inc.
Published By: MobileIron     Published Date: Aug 03, 2016
In this edition we discuss emerging risks, report OS enterprise share, and list the top blacklisted consumer apps. We conclude with our recommendations for enterprises to protect their assets against mobile risks and threats. Several new mobile attacks have emerged that threaten enterprises. Most are re-using old tactics against mobilespecific services, such as SideStepper’s use of Man-In-The-Middle (MITM) against MDM, rather than employing new techniques or exploiting new vulnerabilities. When attacks against users are successful, they can result in the loss of both personal and business data.
Tags : 
    
MobileIron
Published By: Vectra Networks     Published Date: Nov 05, 2015
Covert communications are key enablers of cyber attacks that allow remote humans to patiently manage and direct their attacks undetected. Attackers choose these vehicles specifically for their ability to evade signatures, malware sandboxes and reputation lists. To learn how Vectra empowers security teams to automatically pinpoint active cyber attacks as they’re happening, correlate threats with the hosts that are under attack, prioritize attacks that pose the greatest business risk, and quickly prevent or mitigate loss, register to get the white paper Detecting Covert Communications.
Tags : 
malicious covert communications, cyber attacks, undetected attacks, business risk, prevent and mitigate loss, security
    
Vectra Networks
Published By: Microsoft     Published Date: Jul 07, 2016
Enable, protect, and manage mobile productivity Protecting email and other corporate data on mobile devices—without bogging down workers—is one of today’s biggest challenges faced by IT pros today. With the massive, global proliferation of mobile devices, it can be a struggle to manage and secure these devices and your data, both on approved enterprise applications and shadow IT. Download this free e-book to learn how to control the uncontrollable and create a solution that: • Enables continuous management, so your employees are more productive. • Offers threat protection, so you can detect abnormal user behavior, suspicious activities, known malicious attacks, and security issues right away. • Guards against data leakage. • Provides security after loss or theft of mobile devices. • Helps protect your Microsoft Office email, files, and apps.
Tags : 
mobile devices, enterprise, best practices, management, business intelligence, productivity
    
Microsoft
Published By: Carbonite     Published Date: Apr 09, 2018
There are five essential steps to protecting data and applications from the most common causes of data loss and downtime. IT pros who follow these steps can feel confident in their long-term organizational plan. Read this expert guide from Ben Maas, an independent consultant and system architect who has guided many companies through backup and disaster recovery (BDR) deployments.
Tags : 
    
Carbonite
Published By: Oracle ZDLRA     Published Date: Jan 10, 2018
Business leaders expect two things from IT: keep mission-critical applications available and high performing 24x7 and, if something does happen, recover to be back in business quickly and without losing any critical data so there is no impact on revenue stream. Of course, there is a gap between this de facto expectation from nontechnical business leaders and what current technology is actually capable of delivering. For mission-critical workloads, which are most often hosted on databases, organizations may choose to implement high availability (HA) technologies within the database to avoid downtime and data loss.
Tags : 
recovery point, recovery time, backup appliance, san/nas, service level agreement, oracle
    
Oracle ZDLRA
Published By: Oracle ZDLRA     Published Date: Jan 10, 2018
Traditional backup systems fail to meet the database protection and recovery requirements of modern organizations. These systems require ever-growing backup windows, negatively impact performance in mission-critical production databases, and deliver recovery time objectives (RTO) and recovery point objectives (RPO) measured in hours or even days, failing to meet the requirements of high-volume, high transactional databases -- potentially costing millions in lost productivity and revenue, regulatory penalties, and reputation damage due to an outage or data loss.
Tags : 
data protection, backup speed, recovery, overhead, assurance, storage, efficiency, oracle
    
Oracle ZDLRA
Published By: Dyn     Published Date: Oct 04, 2016
With nearly 80% of businesses experiencing four or more disruptions to their site each month, Aberdeen Group recently conducted a study to get to the root of today's internet performance challenges. Read the findings and discover how companies: Improve resolution times resulting from web outages - 65% of companies experience an hour or more to repair an internet related outage Increase customer satisfaction by 30% - A consistent, reliable and fast web experience is your key to happy, loyal customers Protect revenue - 60% of businesses record a minute of downtime resulting in a $1,000 loss in revenue Are your online services and sites built for resiliency or destined for the headlines? Get the report to find out how leading organizations are bucking the stats and implementing Internet Performance Management (IPM ) tools to boost time to resolution and improve site performance.
Tags : 
performance management, website, internet, dns, web service management
    
Dyn
Published By: IBM     Published Date: Oct 19, 2015
IBM InfoSphere Information Server connects to many new ‘at rest’ and streaming big data sources, scales natively on Hadoop using partition and pipeline parallelism, automates data profiling, provides a business glossary, and an information catalog, plus also supports IT.
Tags : 
ibm, infosphere, data profiling, business glossary, partition, pipeline parallelism, information server, data sources, hadoop, networking, security, data management
    
IBM
Published By: Workday Netherlands     Published Date: Sep 20, 2018
In het huidige IT-landschap zijn veel organisaties een 'cloud-first' benadering gaan volgen voor bedrijfssystemen. Maar hoe weet u met zoveel aanbieders die SaaS-oplossingen aanbieden welke aanbieder u in staat stelt de echte voordelen te behalen die SaaS te bieden heeft? Op welke kenmerken moet u letten als u een SaaS-oplossing overweegt en wat zijn de echte gevolgen voor moderne ondernemingen?
Tags : 
    
Workday Netherlands
Published By: Workday Netherlands     Published Date: Sep 20, 2018
Lees deze whitepaper van CIO.com om te ontdekken waarom een cloudarchitectuur een moderne organisatie het meeste te bieden heeft. Ook vindt u hier waardevolle tips voor het evalueren van cloudoplossingen.
Tags : 
    
Workday Netherlands
Published By: Viavi Solutions     Published Date: Jul 21, 2017
Rapid increases in network traffic volumes, security threats and application complexity all underscore the importance for lossless data capture, analysis and storage to provide crucial raw data for post event analysis and remediation. Viavi commissioned Tolly to evaluate the performance of its Observer GigaStor family of capture, analysis, and storage solutions. Specifically the tests that focuses on bench marking maximum sustained full packet capture/write rates and greatest burst performance with no packet loss while delivered robust encryption of stored network data.
Tags : 
ethernet, service troubleshooting, storage solutions, stored network data, network traffic, security threats, network analysis, write data
    
Viavi Solutions
Published By: CA Technologies     Published Date: Jul 13, 2015
Issuers need to balance eCommerce payment transaction security and a smooth customer checkout experience. The crux of the matter is how to provide a seamless checkout experience for legitimate customers so they won’t abandon their transaction or use a different form of payment while at the same time stopping illegitimate attempts to transact. The use of behavior-based authentication to determine which transactions should be impacted by requiring the customer to go through additional means of authentication is critical for reducing customer friction while creating better assurance that the transaction is legitimate. Rules are an important component when providing this risk- and behavior-based authentication. When models are added, and used to guide the application of risk-based rules, the impact upon illegitimate authentication attempts can be greatly increased while the impact on legitimate customers is decreased, providing a better experience for the cardholder and loss reduction for
Tags : 
ecommerce, 3dsecure, risk analytics, behavioral
    
CA Technologies
Published By: CA Technologies     Published Date: Jul 13, 2015
The explosive growth of eCommerce has focused attention on security concerns associated with online payment transactions. Cardholders worry about the safety of online transactions while card issuers are concerned about balancing the risks and costs of payment fraud with a loss of revenue caused by transaction abandonment. The 3-D Secure protocol allows payment card issuers to reduce fraud in payment transactions by verifying cardholder identity during Card Not Present (CNP) transactions. Before a transaction is authorized, a cardholder can be challenged to enter a password, answer a question, or use some other form of authentication credential. This interruption in the transaction often causes legitimate customers to abandon the purchase resulting in loss of revenue for the issuer. The challenge is how to reduce fraud without impacting the user purchase experience.
Tags : 
ca technologies, cnp, emv, otp, 3dsecure, data management
    
CA Technologies
Published By: NetApp     Published Date: Nov 13, 2017
Read the ebook and learn how to guard your MS Office 365 data against malicious or accidental data loss with NetApp Cloud Control and AWS.
Tags : 
    
NetApp
Published By: Mimecast     Published Date: Jun 02, 2016
Email impersonation attacks—also known as CEO fraud or whaling attacks—are a growing concern for organizations of any size. These scams have led to more than $2.3 billion in losses over the last three years.* Think you’re safe on your own? Snap out of it! Download the new Mimecast E-book Whaling: Anatomy of an Attack to learn the facts about these damaging and costly threats—and how you can stop them. *US Federal Bureau of Investigation, 4/2016
Tags : 
mimecast, whaling, phishing, email attacks, email security, internet security, security, enterprise applications
    
Mimecast
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Special Report

In this webinar Black Duck Software (www.blackducksoftware.com), together with representatives of SAP, will review the benefits open source offers to development organizations, the management challenges it presents, and approaches for addressing those challenges.

Add Research

Get your company's research in the hands of targeted business professionals.

Modern Analyst Media Modern Analyst Media
Modern Analyst Requirements Modern Analyst Media Modern Analyst DigiBytes
Copyright 2009-2014 by Modern Analyst Media LLC Home  |  Featured Bytes  |  Popular Bytes  |  All Topics  |  Vendor Directory