Share us:
 

it functionality

Results 201 - 225 of 298Sort Results By: Published Date | Title | Company Name
Published By: Neolane, Inc.     Published Date: Dec 30, 2008
The late 1990s marked AXA Bank’s foray into email marketing. For the first phase of this project, AXA Bank management decided to use a bulk email tool to push Web content to customers. However, this tool rapidly showed its limitations in terms of scalability and functionality. No personalization, tracking or reporting functionality was available, and many operations (such as list management) had to be performed outside the tool, by hand. Marketing teams also required constant IT support, especially as email volumes increased.  By 2002, ready for a more sophisticated approach, the bank sought to personalize and expand its online marketing to improve effectiveness.
Tags : 
email marketing, neolane, axa bank, personalizing online marketing, list management, crm software, custom content, deliverability
    
Neolane, Inc.
Published By: Polycom     Published Date: Mar 13, 2015
Bene is a European company setting trends in office furnishing with its concepts, products and services. The brand is associated with top quality and functionality, modern design and innovative technology. Bene engages in development and manufacture and provides sales and consultancy services under one umbrella. The Austrian firm is a leader in their market, a major player in Europe, and proud to create a forward looking office concepts.
Tags : 
mobile, unified communication, concept, brand, enterprise, voice, products, services
    
Polycom
Published By: K2     Published Date: Jan 07, 2016
User adoption has always been something of an issue. Despite having ready access to SharePoint, many users cling to their file-shares, or more recently, adopt other ways of collaborating and sharing documents via web-based services. A third of the organizations surveyed feel that their SharePoint project has struggled to meet their original expectations, and a further 26% feel progress has stalled. Is this because of poor training and governance, restricted functionality of SharePoint, or simply the inevitable result of being the first ECM system to move beyond the safer boundaries of compliance-based aoperations? As we will see in this report, it is likely to be a combination of all of these.
Tags : 
aiim, microsoft sharepoint, user adoption, enterprise content management, networking, security, it management, wireless
    
K2
Published By: Polycom     Published Date: Sep 15, 2015
UC—the concept of streamlining phone, email, chat, video and content collaboration—has become a corporate objective for reducing the cost and complexity of communications and increasing employee productivity. What began more than 10 years ago as a hardware-driven effort to combine PBX systems, computer servers and video infrastructure is now evolving to include software-enabled processes and functionality.
Tags : 
collaboration, communications, conferencing, enterprise, lync, microsoft, phone, polycom
    
Polycom
Published By: IBM     Published Date: May 28, 2014
The right test data management solution accelerates time to value for business-critical applications and builds relationships and efficiencies across the organization. IBM InfoSphere Optim Test Data Management closes the gap between DBAs and application developers by providing all teams with accurate, appropriately masked and protected data for their work. Developers can confirm that new application functionalities perform as expected. QA staff can validate that the application performs as intended based on the test cases, and that integrations work properly. And business leaders can be more confident that competitive functionality will be delivered on time with less risk.
Tags : 
ibm, ibm infosphere, ibm optim solutions, ibm test data, test data management, dba, database management, big data
    
IBM
Published By: Dell     Published Date: Aug 16, 2013
"As any technology becomes increasingly popular and widespread, certain pieces of inaccurate information begin to sound like facts. Moreover, as a product matures, it evolves by taking on new features, shedding old ones and improving functionality. However, many products continue to carry those myths as truisms even as the version count rises higher. Get the facts about vSphere. Read the White Paper "
Tags : 
vsphere, virtual, technology, iscsi, storage virtualization, security management, virtualization
    
Dell
Published By: Symantec     Published Date: Jul 11, 2017
Given the evolving way Web and Cloud applications are used—and the constantly shifting threat landscape organizations must confront—proxy architecture is more important than ever in terms of securing Internet access. It’s imperative to have effective compliance and company policy enforcement, and the use of a secure web gateway with advanced functionality is a key piece of an enterprise’s security architecture.
Tags : 
secure web gateway, web application, cloud application, encryption, web threats
    
Symantec
Published By: Symantec     Published Date: Jul 11, 2017
Cloud Access Security Brokers (CASBs) serve as a critical control point to ensure the secure and compliant use of cloud apps and services. Cloud service providers typically maintain a shared responsibility policy for security—they guarantee the integrity of their service infrastructure, but the customer is responsible for securing actual app usage. In addition to the growing cloud security challenges organizations face to safeguard data and protect against threats in the cloud, total volume of cloud app adoption is accelerating, with most of it being done by business units and employees without approval or security oversight from the IT organization. As a result, CASB functionality has become so critical that by 2020 it is projected that 80% of enterprises will use a CASB solution. (Gartner)
Tags : 
cloud, cloud service providers, cloud security, cloud applications
    
Symantec
Published By: IBM     Published Date: Dec 01, 2014
With the rise of mobile usage and increased mobile banking functionality, cyber criminals are targeting the mobile channel with advanced malware, cross channel attacks across online and mobile and social engineering that have typically been seen on the PC.
Tags : 
mobile malware, mobile usage, mobile security, cybercrime, security, it management, wireless, knowledge management
    
IBM
Published By: IBM     Published Date: Sep 26, 2016
SPSS and open source seamlessly complement each other. With open source, IBM makes it easy to build your own extensions, adding new functionality to existing products. Coding is not required for the use of extensions. IBM offers an extensive library of already developed extensions that can be downloaded and used immediately.
Tags : 
ibm, ibm spss, open source, statistics, modeler, open source community, networking, knowledge management
    
IBM
Published By: IBM     Published Date: Oct 17, 2016
SPSS and open source seamlessly complement each other. With open source, IBM makes it easy to build your own extensions, adding new functionality to existing products. Coding is not required for the use of extensions. IBM offers an extensive library of already developed extensions that can be downloaded and used immediately. Join IBM's open source community and instantly boost your predictive analytics.
Tags : 
ibm, analytics, open source, spss, stats, modeler, predictive analytics, enterprise applications
    
IBM
Published By: IBM     Published Date: Oct 26, 2017
Choosing a vendor for cloud-based identity and access management (IAM), also known as Identity and Access Management as a Service (IDaaS), is not a trivial task. One vendor may meet your needs today, but can it scale up to solve your challenges tomorrow? By answering five easy questions, you can get a fresh look at your options—and share the findings with the rest of your team. It’s that simple!
Tags : 
idaas, cloud based identity, access management, iam, identity governance functionality
    
IBM
Published By: Mentor Graphics     Published Date: Apr 03, 2009
The success of any consumer electronic device depends to a large extent on the appeal of the user interface (UI) and how easy the device is to use. Studies show that good cosmetic design can encourage users to explore the full range of features and often engenders the perception that a product is easier to use. So if the benefits of a great looking, easy-to-use UI are so clear, why are so many products still falling short of customer expectations? The solution lies in taking a fresh new approach a consumer electronic device UI plays. By identifying common UI functionality and implementing it in a reusable and customizable way, we can make it far easier for embedded engineers to deliver visually engaging and easy-to-use consumer electronic products.
Tags : 
inflexion platform ui, user interface, consumer electronic device, mentor graphics, ui functionality, media player, mobile phone, tv set-top box
    
Mentor Graphics
Published By: SAS     Published Date: Aug 28, 2018
With the widespread adoption of predictive analytics, organizations have a number of solutions at their fingertips. From machine learning capabilities to open platform architectures, the resources available to innovate with growing amounts of data are vast. In this TDWI Navigator Report for Predictive Analytics, researcher Fern Halper outlines market opportunities, challenges, forces, status and landscape to help organizations adopt technology for managing and using their data. As highlighted in this report, TDWI shares some key differentiators for SAS, including the breadth and depth of functionality when it comes to advanced analytics that supports multiple personas including executives, IT, data scientists and developers.
Tags : 
    
SAS
Published By: Verio Inc.     Published Date: Oct 15, 2010
Download this guide for videos and demonstrations to help grow your business. Get tips for adding value for customers with easy-to-install applications that provide the functionality they are looking for, without the headaches of setup or investment on your end.
Tags : 
verio, ecommerce, whm, vps, hosting, cpanel, vps
    
Verio Inc.
Published By: Internap     Published Date: Mar 30, 2015
In this white paper, Cloud Spectator reveals the results from a normalized comparison of performance between two cloud providers’ services, Amazon Web Services (AWS) EC2 and Internap AgileCLOUD. The analysis considered each provider’s IaaS functionality, price, and performance in typical cloud-hosted workloads.
Tags : 
internap, agile, iaas, public cloud, infrastructure, storage, cloud, agile
    
Internap
Published By: SilverSky     Published Date: Mar 26, 2014
The Radicati Group, a technology market research firm, highlights its choices for Cloud Business Email providers based on market share and functionality. They detail the criteria for a Top Performer in this market and include SilverSky in that category.
Tags : 
silversky, ibm, cloud, cloud business, email, cloud business email, market quadrant, cloud based services
    
SilverSky
Published By: SilverSky     Published Date: Mar 26, 2014
The Radicati Group, a technology market research firm, highlights its choices for Hosted Microsoft Exchange providers based on market share and functionality. They detail the criteria for a Top Performer in this market and include SilverSky in that category.
Tags : 
silversky, ibm, radicati group, technology market reserach, hosted microsoft exchange providers, hosted microsoft exchange, cloud mailbox, data center
    
SilverSky
Published By: Oracle     Published Date: Nov 21, 2013
More marketers are implementing marketing automation to maximize the value of their data, improve engagements, and effectively measure effectiveness. While automation technology also helps companies become more data-driven to improve accountability, it can be challenging to understand how to make the most of its functionality. The Marketing Automation Simplified Guide offers an introduction to the 5 Tenets of Modern Marketing, and breaks down the tips marketers need to automate and optimize: -Data and targeting -Email marketing -Lead nurturing -Lead scoring -Content marketing -Sales enablement
Tags : 
marketing automation, crm, customer relationship management, big data, marketing, digital marketing, targeting, segmentation
    
Oracle
Published By: Oracle     Published Date: Jan 22, 2014
More marketers are implementing marketing automation to maximize the value of their data, improve engagements, and effectively measure effectiveness. While automation technology also helps companies become more data-driven to improve accountability, it can be challenging to understand how to make the most of its functionality. The Marketing Automation Simplified Guide offers an introduction to the 5 Tenets of Modern Marketing, and breaks down the tips marketers need to automate and optimize: -Data and targeting -Email marketing -Lead nurturing -Lead scoring -Content marketing -Sales enablement
Tags : 
marketing automation, crm, customer relationship management, big data, marketing, digital marketing, targeting, segmentation
    
Oracle
Published By: Oracle     Published Date: Jan 22, 2014
More marketers are implementing marketing automation to maximize the value of their data, improve engagements, and effectively measure effectiveness. While automation technology also helps companies become more data-driven to improve accountability, it can be challenging to understand how to make the most of its functionality. The Marketing Automation Simplified Guide offers an introduction to the 5 Tenets of Modern Marketing, and breaks down the tips marketers need to automate and optimize: -Data and targeting -Email marketing -Lead nurturing -Lead scoring -Content marketing -Sales enablement
Tags : 
marketing automation, crm, customer relationship management, big data, marketing, digital marketing, targeting, segmentation
    
Oracle
Published By: IBM     Published Date: Jan 02, 2014
Business users need a simple but powerful way to navigate through data and find the insights to make timely, critical business decisions. Unfortunately, many users have become frustrated at their inability to quickly access and analyze the information they require. This data typically includes a combination of personal and corporate data locked in various enterprise systems. It exists in different formats and can be hard to analyze, change or share — making it difficult for people to get fast answers to business questions.
Tags : 
ibm, cognos insight guide, navigating data, interactivity, analytic functionality, enterprise analytics, personal analytics, customer service
    
IBM
Published By: IBM     Published Date: Apr 22, 2014
Researched and compiled independently by Chartis, the RiskTech100® evaluates and ranks the world’s most influential risk technology providers based on a range of criteria. IBM retains its top position in the 2014 RiskTech® 100 rankings with top scores for functionality, market presence and innovation. The Chartis report is acknowledged globally as one of the most comprehensive and prestigious studies of risk technology vendors. The report also tracks key trends and developments in the risk technology marketplace. Read the report to learn how IBM can support your risk and compliance efforts to drive business performance and better outcomes.
Tags : 
ibm, chartis, risktech100, risk technology, risk technology vendors, security, risk, compliance
    
IBM
Published By: Cisco     Published Date: Apr 10, 2015
Data center administrators face a significant challenge: They need to secure the data center without compromising the performance and functionality that new data center environments enable. Many are looking to secure the data center using solutions designed for the Internet edge, but these solutions are not enough. The data center has unique requirements around provisioning, performance, virtualization, applications, and traffic that Internet-edge security devices are simply not designed to address.
Tags : 
security, data center, performance, virtualization, application, internet, functionality, it management
    
Cisco
Published By: Cisco     Published Date: Dec 21, 2016
Self-service analytics implies that users design and develop their own reports and do their own data  analysis with minimal support by IT. Most recently, due to the availability of tools, such as those from Qlik,  Spotfire, and Tableau, self-service analytics has become immensely popular. Besides powerful analytical  and visualization capabilities, they all support functionality for accessing and integrating data sources.  With respect to this aspect of data integration four phases can be identified in the relatively short history  of self-service analytics. This whitepaper describes these four phases in detail and shows how the tools  Cisco Data Preparation (CDP) and Cisco Information Server (CIS) for data virtualization can strengthen and  enrich the self-service data integration capabilities of tools for reporting and analytics.  
Tags : 
    
Cisco
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

© 2019  Created by Boris Agranovich.

Badges  |  Report an Issue  |  Terms of Service