Share us:
 

it functionality

Results 201 - 225 of 306Sort Results By: Published Date | Title | Company Name
Published By: Polycom     Published Date: Sep 24, 2014
Unified communications (UC) has been a market in the making for well over a decade, as companies look to improve corporate collaboration. UC, the concept of streamlining phone, email, chat, video and content collaboration, has become a corporate objective for reducing the cost and complexity of communications and increasing employee productivity. What began 10 years ago as a hardware-driven effort to combine PBX systems, computer servers and video infrastructure, is now evolving to include software-enabled processes and functionality.
Tags : 
improving, collaboration, business, corporate, lync, video, content, objective, communication, chat, complexity, cost, market, unified, employee, productivity, email, hardware, software development, enterprise applications
    
Polycom
Published By: Actiance, Inc.     Published Date: Nov 04, 2014
Despite the range of functionality offered in Office 365, like any cloud-based offering, it cannot be all things to all customers. There are features missing in Office 365 that will prompt some customers to consider the use of third-party, cloud-based, or on-premise tools to enhance Office 365’s native capabilities. Specifically, these third-party enhancements are focused primarily on the security, archiving, and encryption capabilities built into Office 365. Read now!
Tags : 
actiance, microsoft office 365, security, compliance, control, it management, knowledge management
    
Actiance, Inc.
Published By: Rackspace     Published Date: Mar 08, 2016
Watch as industry experts discuss strategies for overcoming design, deployment, and monitoring challenges in a Microsoft Cloud Platform environment. They examine real-life situations in which Rackspace architected and deployed Microsoft Private Cloud at scale, across multiple geographies. You’ll get first-hand what Red Hat has learned along the way, such as how to approach the integration of Database-as-a-Service (DBaaS) functionality, designing resilient architectures and failover, as well as building for scale.
Tags : 
microsoft private cloud, microsoft server, hyper-v, windows azure, microsoft cloud platform, rackspace, red hat, it management
    
Rackspace
Published By: SAP     Published Date: Apr 13, 2011
With the business intelligence functionality in SAP® Business All-in-One solutions, your company can gain visibility, insight, operational alignment, and accountability to increase revenue, margins, and liquidity; streamline processes; improve agility; and become a best-run business.
Tags : 
sap solutions, small businesses, midsize companies, business intelligence, sap business all-in-one, erp, transparency, best practices, business management, business process management
    
SAP
Published By: SAP     Published Date: Nov 22, 2011
Become acquainted with the script logic functionality available in SAP BusinessObjects Planning and Consolidation 7.x, version for SAP NetWeaver. Review use cases for script logic, its architecture, various ways to execute it, and a few basic key words. Designed for individuals who will be end users of SAP BusinessObjects Planning and Consolidation or who require a product overview. The goal is to work with the SAP BusinessObjects Planning and Consolidation Excel, Word, PowerPoint and Web interfaces.
Tags : 
sap, businessobject, planning, business, technology, excel, word, powerpoint, project management, finance, best practices, business analytics, business intelligence, business management, analytical applications
    
SAP
Published By: SAS     Published Date: Mar 06, 2018
With decisions riding on the timeliness and quality of analytics, business stakeholders are less patient with delays in the development of new applications that provide reports, analysis, and access to diverse data itself. Executives, managers, and frontline personnel fear that decisions based on old and incomplete data or formulated using slow, outmoded, and limited reporting functionality will be bad decisions. A deficient information supply chain hinders quick responses to shifting situations and increases exposure to financial and regulatory risk—putting a business at a competitive disadvantage. Stakeholders are demanding better access to data, faster development of business intelligence (BI) and analytics applications, and agile solutions in sync with requirements.
Tags : 
    
SAS
Published By: SAS     Published Date: Mar 06, 2018
As explored in this paper, the SAS Fraud Framework supports a complete, modular, enterprise-level program integrity solution that helps payers prevent, detect and manage fraud, waste and abuse across all silos and lines of business. Its fully integrated components offer both top-down and bottom-up functionality for exposing hidden and risky networks. This approach gives payers enhanced detection capabilities, greater insight into case management and improved operational efficiency while decreasing overall cost of ownership. The result is highly effective, early, and even preventative detection of fraud, waste, abuse and corruption that improves operational efficiency and reduces health care costs.
Tags : 
    
SAS
Published By: Intermedia     Published Date: Nov 10, 2008
There are two main BlackBerry smartphone mobile connectivity options, and they are quite different. The first is the BlackBerry Internet Service, in which your mobile carrier acts as a liaison between your email and your BlackBerry smartphone. The second option is to use a BlackBerry Enterprise Server, which directly links your wireless device to your email, contacts, calendars and business applications— virtually automatically and almost instantly. If you’re using a BlackBerry smartphone solely for personal email, then a BlackBerry Internet Service account is all you need, and you can stop reading here. But if you’re a business user and are only using BlackBerry Internet Service, you’re leaving lots of important functionality unused.
Tags : 
intermedia, blackberry enterprise server, blackberry business user, blackberry internet service, blackberry smartphone, wireless, pda, smart phones, wireless application software, wireless communications, wireless hardware
    
Intermedia
Published By: Neolane, Inc.     Published Date: Dec 30, 2008
The late 1990s marked AXA Bank’s foray into email marketing. For the first phase of this project, AXA Bank management decided to use a bulk email tool to push Web content to customers. However, this tool rapidly showed its limitations in terms of scalability and functionality. No personalization, tracking or reporting functionality was available, and many operations (such as list management) had to be performed outside the tool, by hand. Marketing teams also required constant IT support, especially as email volumes increased.  By 2002, ready for a more sophisticated approach, the bank sought to personalize and expand its online marketing to improve effectiveness.
Tags : 
email marketing, neolane, axa bank, personalizing online marketing, list management, crm software, custom content, deliverability, e-commerce, email marketing, emerging marketing, international marketing, lead generation, rich media
    
Neolane, Inc.
Published By: Polycom     Published Date: Mar 13, 2015
Bene is a European company setting trends in office furnishing with its concepts, products and services. The brand is associated with top quality and functionality, modern design and innovative technology. Bene engages in development and manufacture and provides sales and consultancy services under one umbrella. The Austrian firm is a leader in their market, a major player in Europe, and proud to create a forward looking office concepts.
Tags : 
mobile, unified communication, concept, brand, enterprise, voice, products, services, innovative technology, manufacture, functionality, enterprise applications, data management
    
Polycom
Published By: K2     Published Date: Jan 07, 2016
User adoption has always been something of an issue. Despite having ready access to SharePoint, many users cling to their file-shares, or more recently, adopt other ways of collaborating and sharing documents via web-based services. A third of the organizations surveyed feel that their SharePoint project has struggled to meet their original expectations, and a further 26% feel progress has stalled. Is this because of poor training and governance, restricted functionality of SharePoint, or simply the inevitable result of being the first ECM system to move beyond the safer boundaries of compliance-based aoperations? As we will see in this report, it is likely to be a combination of all of these.
Tags : 
aiim, microsoft sharepoint, user adoption, enterprise content management, networking, security, it management, wireless, knowledge management
    
K2
Published By: Polycom     Published Date: Sep 15, 2015
UC—the concept of streamlining phone, email, chat, video and content collaboration—has become a corporate objective for reducing the cost and complexity of communications and increasing employee productivity. What began more than 10 years ago as a hardware-driven effort to combine PBX systems, computer servers and video infrastructure is now evolving to include software-enabled processes and functionality.
Tags : 
collaboration, communications, conferencing, enterprise, lync, microsoft, phone, polycom, skype, voice over ip, telecom
    
Polycom
Published By: IBM     Published Date: May 28, 2014
The right test data management solution accelerates time to value for business-critical applications and builds relationships and efficiencies across the organization. IBM InfoSphere Optim Test Data Management closes the gap between DBAs and application developers by providing all teams with accurate, appropriately masked and protected data for their work. Developers can confirm that new application functionalities perform as expected. QA staff can validate that the application performs as intended based on the test cases, and that integrations work properly. And business leaders can be more confident that competitive functionality will be delivered on time with less risk.
Tags : 
ibm, ibm infosphere, ibm optim solutions, ibm test data, test data management, dba, database management, big data, applications, business critical applications, integrations, it management, data management, data center
    
IBM
Published By: Dell     Published Date: Aug 16, 2013
"As any technology becomes increasingly popular and widespread, certain pieces of inaccurate information begin to sound like facts. Moreover, as a product matures, it evolves by taking on new features, shedding old ones and improving functionality. However, many products continue to carry those myths as truisms even as the version count rises higher. Get the facts about vSphere. Read the White Paper "
Tags : 
vsphere, virtual, technology, iscsi, storage virtualization, security management, virtualization
    
Dell
Published By: Symantec     Published Date: Jul 11, 2017
Given the evolving way Web and Cloud applications are used—and the constantly shifting threat landscape organizations must confront—proxy architecture is more important than ever in terms of securing Internet access. It’s imperative to have effective compliance and company policy enforcement, and the use of a secure web gateway with advanced functionality is a key piece of an enterprise’s security architecture.
Tags : 
secure web gateway, web application, cloud application, encryption, web threats
    
Symantec
Published By: Symantec     Published Date: Jul 11, 2017
Cloud Access Security Brokers (CASBs) serve as a critical control point to ensure the secure and compliant use of cloud apps and services. Cloud service providers typically maintain a shared responsibility policy for security—they guarantee the integrity of their service infrastructure, but the customer is responsible for securing actual app usage. In addition to the growing cloud security challenges organizations face to safeguard data and protect against threats in the cloud, total volume of cloud app adoption is accelerating, with most of it being done by business units and employees without approval or security oversight from the IT organization. As a result, CASB functionality has become so critical that by 2020 it is projected that 80% of enterprises will use a CASB solution. (Gartner)
Tags : 
cloud, cloud service providers, cloud security, cloud applications
    
Symantec
Published By: IBM     Published Date: Dec 01, 2014
With the rise of mobile usage and increased mobile banking functionality, cyber criminals are targeting the mobile channel with advanced malware, cross channel attacks across online and mobile and social engineering that have typically been seen on the PC.
Tags : 
mobile malware, mobile usage, mobile security, cybercrime, security, it management, wireless, knowledge management, enterprise applications
    
IBM
Published By: IBM     Published Date: Sep 26, 2016
SPSS and open source seamlessly complement each other. With open source, IBM makes it easy to build your own extensions, adding new functionality to existing products. Coding is not required for the use of extensions. IBM offers an extensive library of already developed extensions that can be downloaded and used immediately.
Tags : 
ibm, ibm spss, open source, statistics, modeler, open source community, networking, knowledge management, enterprise applications
    
IBM
Published By: IBM     Published Date: Oct 17, 2016
SPSS and open source seamlessly complement each other. With open source, IBM makes it easy to build your own extensions, adding new functionality to existing products. Coding is not required for the use of extensions. IBM offers an extensive library of already developed extensions that can be downloaded and used immediately. Join IBM's open source community and instantly boost your predictive analytics.
Tags : 
ibm, analytics, open source, spss, stats, modeler, predictive analytics, enterprise applications
    
IBM
Published By: IBM     Published Date: Oct 26, 2017
Choosing a vendor for cloud-based identity and access management (IAM), also known as Identity and Access Management as a Service (IDaaS), is not a trivial task. One vendor may meet your needs today, but can it scale up to solve your challenges tomorrow? By answering five easy questions, you can get a fresh look at your options—and share the findings with the rest of your team. It’s that simple!
Tags : 
idaas, cloud based identity, access management, iam, identity governance functionality
    
IBM
Published By: Mentor Graphics     Published Date: Apr 03, 2009
The success of any consumer electronic device depends to a large extent on the appeal of the user interface (UI) and how easy the device is to use. Studies show that good cosmetic design can encourage users to explore the full range of features and often engenders the perception that a product is easier to use. So if the benefits of a great looking, easy-to-use UI are so clear, why are so many products still falling short of customer expectations? The solution lies in taking a fresh new approach a consumer electronic device UI plays. By identifying common UI functionality and implementing it in a reusable and customizable way, we can make it far easier for embedded engineers to deliver visually engaging and easy-to-use consumer electronic products.
Tags : 
inflexion platform ui, user interface, consumer electronic device, mentor graphics, ui functionality, media player, mobile phone, tv set-top box, inflexion platform ui, pc-based ui designer tool, embedded component, presentation layer, integration api, xml-based ui template, ui perspective, embedded gui, embedded gui design, embedded gui development, embedded gui prototype, embedded ui
    
Mentor Graphics
Published By: SAS     Published Date: Aug 28, 2018
With the widespread adoption of predictive analytics, organizations have a number of solutions at their fingertips. From machine learning capabilities to open platform architectures, the resources available to innovate with growing amounts of data are vast. In this TDWI Navigator Report for Predictive Analytics, researcher Fern Halper outlines market opportunities, challenges, forces, status and landscape to help organizations adopt technology for managing and using their data. As highlighted in this report, TDWI shares some key differentiators for SAS, including the breadth and depth of functionality when it comes to advanced analytics that supports multiple personas including executives, IT, data scientists and developers.
Tags : 
    
SAS
Published By: Verio Inc.     Published Date: Oct 15, 2010
Download this guide for videos and demonstrations to help grow your business. Get tips for adding value for customers with easy-to-install applications that provide the functionality they are looking for, without the headaches of setup or investment on your end.
Tags : 
verio, ecommerce, whm, vps, hosting, cpanel, vps
    
Verio Inc.
Published By: Internap     Published Date: Mar 30, 2015
In this white paper, Cloud Spectator reveals the results from a normalized comparison of performance between two cloud providers’ services, Amazon Web Services (AWS) EC2 and Internap AgileCLOUD. The analysis considered each provider’s IaaS functionality, price, and performance in typical cloud-hosted workloads.
Tags : 
internap, agile, iaas, public cloud, infrastructure, storage, cloud, agile, servers, small business networks, blade servers, storage management, it spending, return on investment, total cost of ownership, database security, cloud computing, data center design and management
    
Internap
Published By: SilverSky     Published Date: Mar 26, 2014
The Radicati Group, a technology market research firm, highlights its choices for Cloud Business Email providers based on market share and functionality. They detail the criteria for a Top Performer in this market and include SilverSky in that category.
Tags : 
silversky, ibm, cloud, cloud business, email, cloud business email, market quadrant, cloud based services, security, deployment, it management, platforms, email security, messaging, cloud computing
    
SilverSky
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

© 2019  Created by Boris Agranovich.

Badges  |  Report an Issue  |  Terms of Service