phi

Results 1 - 25 of 1795Sort Results By: Published Date | Title | Company Name
Published By: Cisco EMEA     Published Date: Mar 08, 2019
Learn what the Small Business cyber-threat landscape looks like today so your business can survive; reduce operational costs and grow securely; make security a priority for everyone, and protect your business with Cisco. As your business grows, it gets noticed and not all of the attention is welcome. More and more sophisticated criminal gangs are going after small businesses
Tags : 
    
Cisco EMEA
Published By: HERE Technologies     Published Date: Mar 11, 2019
Increasingly sophisticated location technology makes it possible for data scientists to gain a deeper understanding of their target audiences – and how to reach them. Accurate and precise intelligence can give more timely and complete insights into audiences than ever before. As one of the world’s leading location platforms in 2018, HERE shares insights and solutions to buying location data for better audience segmentation.
Tags : 
location data, ad tech, location targeting
    
HERE Technologies
Published By: HERE Technologies     Published Date: Mar 11, 2019
Audience segmentation is key to any marketing strategy. Without it, a brand is flying blind – wasting spend and resources. However, the good news is that increasingly sophisticated technology makes it possible for brands to gain a deeper understanding of their target audiences – and how to reach them. This is especially true of location intelligence-driven advertising which can give more timely and complete insights into audiences than ever before. As one of the world’s leading location platforms in 2018, HERE shares insights and solutions to buying location data for better audience segmentation.
Tags : 
location data, ad tech, location targeting
    
HERE Technologies
Published By: Alibaba Cloud SEA     Published Date: Mar 11, 2019
Customers have grown accustomed to high speeds and reliable connectivity. One second of network delay when accessing website, mobile app, or application service can increase your bounce rate and even decrease your customer’s trust in your brand. The typical business pain points per the above scenario are always like: Latency – While, latency problems caused by geographic distance are impossible to solve on the public Internet; Availability – Packet loss and complaints from customers can prevent you from increasing your user base; Cost - The growth of your user base and your business needs both outpace your IT budget. Security - Connections over the public Internet are vulnerable to DDoS attacks and other threats. This whitepaper describes: • Challenges that Magic Video faced before implementing Alibaba Cloud’s solutions • How Alibaba Cloud’s solutions help Magic Video build a global hybrid enterprise network, accelerate content delivery of the application, and maximize bandwidth?
Tags : 
data center, cloud computing, networking, security, china, global expansion
    
Alibaba Cloud SEA
Published By: Mimecast     Published Date: Mar 19, 2019
The Latest Threats, Confidence Killers And Bad Behaviors – And How To Fix Them Email. You use it constantly. And it’s the number-one application to keep your organization functioning. Organizations need email to stay up-and-running all the time. After all, it’s supposed to just work, right? But if email isn’t part of an organization’s core security strategy, it can become a major vulnerability. Get this report to learn: -How employees are your first and last line of defense in attacks -Ways to adjust your approach to prioritize educating the riskiest employees -The magnitude of growth around impersonation attacks and phishing
Tags : 
    
Mimecast
Published By: Mimecast     Published Date: Mar 19, 2019
An Executive Strategy Guide Brought To You By The Cyber Resilience Think Tank Big budget or not, CISOs must make threat intelligence a priority and learn how to focus on only the data that matters—data that will help mitigate future risks. Though the technical definition of threat intelligence may change depending on who you ask, one factor remains constant: If threat intelligence isn’t part of your cyber resilience strategy in some capacity, you have a massive gap on your hands. And you may be blindsided by a phishing attack, malware incident or worse. Read this Cyber Resilience Think Tank executive strategy guide to develop a plan to architect a threat intelligence program in your organization.
Tags : 
    
Mimecast
Published By: Lenovo - APAC     Published Date: Jan 28, 2019
Asian ICT infrastructure investment is exploding as businesses review and modernise their data-centre architectures to keep up with the service demands of a growing and increasingly sophisticated population. Demand for cloud services, particularly to support big-data analytics initiatives, is driving this trend. Frost & Sullivan, for example, believes the Asia-Pacific cloud computing market will grow at 28.4 percent annually through 2022. Despite this growth, many businesses are also rapidly realising that public cloud is not the best solution for every need as theydo not always offer the same level of visibility, performance, and control as on-premises infrastructure.This reality is pushing many companies towards the middle ground of hybrid IT, in which applications and infrastructure are distributed across public cloud and self-managed data centre infrastructure. Read about Medical company Mutoh and how it took advantage of the latest technology.
Tags : 
lenovodcg, nutanix, hyperconvergedinfrastructure, hci
    
Lenovo - APAC
Published By: Lenovo - APAC     Published Date: Feb 11, 2019
Asian ICT infrastructure investment is exploding as businesses review and modernise their data-centre architectures to keep up with the service demands of a growing and increasingly sophisticated population. Demand for cloud services, particularly to support big-data analytics initiatives, is driving this trend. Frost & Sullivan, for example, believes the Asia-Pacific cloud computing market will grow at 28.4 percent annually through 2022. Despite this growth, many businesses are also rapidly realising that public cloud is not the best solution for every need as theydo not always offer the same level of visibility, performance, and control as on-premises infrastructure.This reality is pushing many companies towards the middle ground of hybrid IT, in which applications and infrastructure are distributed across public cloud and self-managed data centre infrastructure. Read about Medical company Mutoh and how it took advantage of the latest technology.
Tags : 
lenovodcg, nutanix, hyperconvergedinfrastructure, hci
    
Lenovo - APAC
Published By: Intel     Published Date: Feb 28, 2019
Keeping the lights on in a manufacturing environment remains top priority for industrial companies. All too often, factories are in a reactive mode, relying on manual inspections that risk downtime because they don’t usually reveal actionable problem data. Find out how the Nexcom Predictive Diagnostic Maintenance (PDM) system enables uninterrupted production during outages by monitoring each unit in the Diesel Uninterrupted Power Supplies (DUPS) system noninvasively. • Using vibration analysis, the system can detect 85% of power supply problems before they do damage or cause failure • Information processing for machine diagnostics is done at the edge, providing real-time alerts on potential issues with ample of lead time for managers to rectify • Graphic user interface offers visual representation and analysis of historical and trending data that is easily consumable
Tags : 
    
Intel
Published By: HotSchedules     Published Date: Jan 17, 2019
Did you know that the average restaurant loses 3-10% of its purchased food before it ever makes to the table ? It’s a sad but true statistic. In an industry where effectively cutting costs can make or break your business, operators can’t afford to simply be conscious of their food waste. They need to take action. In this infographic, you’ll get a good idea of just how much food your restaurant could be wasting, and what your business stands to gain from better waste tracking.
Tags : 
    
HotSchedules
Published By: HotSchedules     Published Date: Jan 17, 2019
Restaurant inventory management is not a favorite activity among restaurant managers, but that doesn’t mean it has to be painful. The process — especially when conducted with outdated methods — is both tedious and time-consuming. But better inventory management could have a big impact on your restaurant’s bottom line. This infographic tells you how to handle objections from managers who don’t want to your inventory management system and lays out how to fix the problem with modern, mobile inventory tools.
Tags : 
    
HotSchedules
Published By: HotSchedules     Published Date: Jan 17, 2019
When was the last time you really assessed your inventory management process? Inefficient inventory processes are a time-suck and can also drive up your food costs — but it doesn’t have to be that way. In recent years, great strides have been made in restaurant management technology—specifically when it comes to inventory. This infographic will examine how restaurant operating platforms can save managers time, cut food waste costs, and create opportunities to drive your bottom line margin in more effective ways.
Tags : 
    
HotSchedules
Published By: Oracle     Published Date: Mar 18, 2019
This infographic highlights trends and technologies that will shape fi¬nancial services over the next ¬five years.
Tags : 
    
Oracle
Published By: MicroStrategy     Published Date: Jan 23, 2019
The MicroStrategy 2018 Global State of Enterprise Analytics Report, which surveyed 500 decision-makers from around the globe, reveals that leading organizations create a competitive edge through their use of data, with 63% experiencing improved efficiency and productivity, 57% realizing faster, more effective decision making, and 51% achieving better financial performance. Other top benefits include improved customer experiences, improved customer acquisition and retention, and the identification and creation of new revenue streams—all keys to digital transformation. What else did the 2018 report reveal? Read all the insights with both global and geo-specific views here. This infographic shares a few highlights from the new 44-page report which serves as a benchmarking resource for all data-driven organizations.
Tags : 
    
MicroStrategy
Published By: Genesys     Published Date: Feb 12, 2019
To remain competitive in an increasingly customer-centric world, mid-sized organizations are undergoing digital transformations of their contact centres. IDC surveyed companies in 27 countries globally, including companies from Europe, Middle East and Africa (EMEA), to examine the current market dynamics of cloud-enabled customer service environments. Eighty-five percent of the respondents fell within the small to mid-sized category with contact centres with 300 seats or fewer. Get this paper to access complete survey results for EMEA and to gain key insights including: Nearly 65% of respondents in EMEA already use or are in the process of implementing cloud-based contact centre solutions Only 13% of respondents in EMEA indicated that they currently are using a public cloud environment, the lowest among all geographies worldwide Drivers, benefits and challenges for adopting cloud contact centre technology
Tags : 
    
Genesys
Published By: TIBCO Software     Published Date: Mar 12, 2019
Fraud affects more than just your customers, it fundamentally destroys your reputation and has significant impact on your bottom line. In the first half of 2018, financial fraud from payment cards, cheques and remote banking totaled £358m in the UK alone, resulting from over a million incidents, an increase of more that 50% over the last 4 years. Have a look at this interesting Infographic to find out more.
Tags : 
fraud, fraud prevention, uk fraud, fraud detection, machine learning
    
TIBCO Software
Published By: Fujitsu America, Inc.     Published Date: Oct 22, 2018
Crime overall is decreasing, but chaotic events such as extreme weather, domestic terrorist attacks, gun violence, and opioid-related emergencies are increasing, requiring highly coordinated response protocols. From raucous inner cities to sleepy suburbs, the scope and nature of these threats demand a new way of thinking and acting– a new, frictionless collaboration among agencies, departments, and vendor partners. This is the next phase of digital age public safety. As more public safety leaders get introduced to sophisticated surveillance and big data technologies, they realize the benefits are within reach. Find out how by downloading today! Intel, the Intel logo, Intel Core, Intel vPro, Core Inside and vPro Inside are trademarks of Intel Corporation or its subsidiaries in the U.S. and/or other countries.
Tags : 
smart mobility, technology solutions, integrated management
    
Fujitsu America, Inc.
Published By: Oracle     Published Date: Mar 21, 2019
Innovation and technology are quite the buzzwords these days. Join IDC Chief Analyst, Philip Carter, and Oracle’s Vice President of Digital Innovation, Neil Sholay, as they discuss how technology is driving innovation in businesses. Watch Carter and Sholay discuss the role of Marketing in business innovation. Discover what it means to innovate, some examples of successful innovation, and what they are actually doing to scale that growth. It’s time to find out how Marketing is shaping business culture through innovative technology. Watch the talk now.
Tags : 
    
Oracle
Published By: Oracle     Published Date: Mar 21, 2019
Innovation and technology are quite the buzzwords these days. Join IDC Chief Analyst, Philip Carter, and Oracle’s Vice President of Digital Innovation, Neil Sholay, as they discuss how technology is driving innovation in businesses. Watch Carter and Sholay get to the bottom of the role of Marketing in innovation, how to set your growth KPIs, and how to overcome the internal barriers innovators can face. Find out how Marketing is stepping into the lead through new technology, innovation and growth. Watch the talk now.
Tags : 
    
Oracle
Published By: Coyote Point Systems     Published Date: Sep 02, 2010
In this paper, we'll explore how to use Coyote Point's Envoy to ensure 24x7 availability and fast connections for web content deployed at more than one geographiclocation.
Tags : 
coyote point, adc, buyer's guide, web applications, server load, server hardware, networking, virtualized network, vlb advanced, load balancing
    
Coyote Point Systems
Published By: Marketo     Published Date: Feb 11, 2019
Lead generation has become an important strategy for modern marketers, as they strive to create demand and get their messages heard by increasingly sophisticated, multi-channel buyers. In today’s complex world, marketers should use lead generation to build brand awareness, nurture prospects and customers, qualify leads, and ultimately generate measurable revenue. In this comprehensive, 160 page guide, we cover topics ranging from content marketing and website SEO to telesales and content syndication — all through the lens of lead generation. Packed full of checklists, charts, and thought leadership from the leading experts in marketing today, TheDefinitive Guide to Lead Generation will teach you how to collect information from prospects across every channel, and deliver the highest quality leads to your sales team. ResizedImage389253 dog with laptop lead generation You’ll learn how to: Define a lead and understand his or her buying journey Build a robust lead generation strategy t
Tags : 
    
Marketo
Published By: Canon Solutions America     Published Date: Feb 28, 2019
Security threats can be next to invisible, but this infographic shows exactly where your healthcare organization can be most at risk. It also gives you valuable tips for helping secure your patient data, financial documents, and medical records.
Tags : 
phi security, healthcare data privacy, data protection in healthcare, ehr solutions, ehr security, electronic health records management, hipaa breach, hipaa compliance checklist, hipaa security, how to be hipaa compliant, hipaa compliant printing, healthcare data breach, security breaches in healthcare
    
Canon Solutions America
Published By: Canon Solutions America     Published Date: Feb 28, 2019
Fully updated for 2019, this guide covers the latest technologies and best practices for print, device, document, information, and cybersecurity. Learn how you can help maintain the confidentiality, integrity, and availability of health records throughout your organization.
Tags : 
phi security, healthcare data privacy, data protection in healthcare, ehr solutions, ehr security, electronic health records management, hipaa breach, hipaa compliance checklist, hipaa security, how to be hipaa compliant, hipaa compliant printing, healthcare data breach, security breaches in healthcare
    
Canon Solutions America
Published By: ASG Software Solutions     Published Date: Jul 27, 2009
To meet the challenges of intense competition and increasing customer demands, companies must tightly align their IT service management with business issues and priorities. This paper outlines the maturity steps involved in the progression towards proactive Business Service Management (BSM) and explains how ASG's metaCMDB helps secure its seamless adoption.
Tags : 
asg, cmdb, bsm, itil, bsm, metacmdb, configuration management, metadata, metacmdb, lob, sdm, service dependency mapping, ecommerce, bpm, workflow, itsm, critical application, cms, itsm
    
ASG Software Solutions
Published By: Zebra Technologies     Published Date: Mar 19, 2019
KEEP YOUR TEAMS MOVING AND PATIENTS SAFER More and more patients are turning to Ambulatory Surgery Centers (ASC) for outpatient surgeries, diagnostic testing and preventive procedures. Case volumes continue to rise and competition for patients is intensifying. At the same time, reimbursement rates are declining. How are ASCs thriving in this rapidly-changing climate? By incorporating sophisticated data capture solutions throughout the patient journey, ASCs are enhancing patient safety, improving clinical work flows and reducing overall costs.
Tags : 
    
Zebra Technologies
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search Resource Library      

Add Resources

Get your company's resources in the hands of targeted business professionals.