rent

Results 1 - 25 of 3287Sort Results By: Published Date | Title | Company Name
Published By: Interactions     Published Date: Oct 29, 2019
We all know that the customer experience is a big deal. By 2020, customer experience will overtake price and product as the key differentiator. But due to the complicated nature of integrating a large-scale, customer-facing technology like an IVA, many companies don’t know where to start or how to ensure they are creating the best possible virtual assistant. We’ve compiled some key technologies and features that should be top of mind when assessing internal expertise or selecting an external vendor.
Tags : 
    
Interactions
Published By: SendBird     Published Date: Nov 14, 2019
Why buyer-to-seller chat for marketplaces? Experts understand marketplace apps as a challenge in scaling both supply- and demand-side at the same time. Once trust and sufficient liquidity are achieved, the value of marketplaces shift to fostering transparent and efficient transactions. There’s no better way to connect buyer and seller than in-app messaging. Real-time messaging connects your marketplace’s buyers and sellers across multiple apps and platforms so they can engage and inform both supply and demand to transact more quickly. This creates more efficient transactions for the marketplace platform. Jeff Jordan, former eBay and current General Partner of Andreessen Horowitz, said that to manage a marketplace well you need to “Maintain complete transparency in the marketplace so that participants (especially buyers but sellers too) have perfect information on products and their pricing [...] Focus heavily on safety so the marketplace is as safe as possible to create the trust requi
Tags : 
    
SendBird
Published By: F5 Networks Singapore Pte Ltd     Published Date: Sep 09, 2019
Have you ever wished for an army of clones to do all your thankless tasks and chores? Well, that fantasy is becoming a reality—at least on the Internet. And while they may not be actual clones, bots have begun doing lots of digital dirty work. Managing your relationship with bots—good and bad—has become an inherent part of doing business in a connected world. With more than half of online traffic initiated by autonomous programs, it’s clear that bots are a driving force of technological change, and they’re here to stay.¹ As bot technology, machine learning, and AI continue to evolve, so will the threats they pose. And while some bots are good, many are malicious—and the cybercriminals behind them are targeting your apps. Preparing your organization to deal with the impact of bots on your business is essential to developing a sustainable strategy that will enable you to grow as you adapt to the new bot-enabled world.
Tags : 
    
F5 Networks Singapore Pte Ltd
Published By: Riskified     Published Date: Nov 04, 2019
To maximize success, eCommerce merchants need to be familiar with the unique shopping behavior and fraud trends of the holiday season. We’ve identified six key ‘sub-seasons’ and insights pertaining to geographies, channels and shipping methods - to give actionable tips to ensure a safe and profitable season. This report explores how merchants can stay competitive and boost revenue, while meeting the sophisticated expectations of holiday shoppers. What you will get from this report: 1. Tools to enable more cross-border eCommerce: Get insights to help you capitalize on the holiday season’s opportunities 2. Fraud trends for different segments of the holiday season: Better manage risk during the most lucrative quarter for eCommerce merchants 3. Insights on six key holiday sub-seasons: Identify unique consumer preferences to boost revenue
Tags : 
    
Riskified
Published By: Corrigo     Published Date: Nov 01, 2019
PropTech is disrupting the facilities management and real estate industries – from big data and IoT to artificial intelligence and augmented reality. The latest advances in PropTech are accelerating change in facilities management like never before, driving bottom line value and helping future-proof FM operations. The promise of PropTech is why our Corrigo team is investing so heavily in frictionless, self-learning platforms to help our clients use technology to truly transform their businesses. But as we amplify FM ops with new technology, we are just as passionate about helping our clients optimize their current processes. Why? Because making even small changes today can mean huge savings for their bottom line. In fact, 80% of organizations are leaking more FM value right now than they could immediately gain with new, emerging tech strategies. That’s no small leak – it’s a staggering loss for organizations of all sizes. After analyzing 700 million facilities management transactions a
Tags : 
    
Corrigo
Published By: Corrigo     Published Date: Nov 01, 2019
Think about all the ways your life today is different than it was ten years ago. Think about how you shop, how you get around, how you plan travel, and how you stay in touch. So many things that used to be a hassle are now almost effortless. If your life feels different, it’s because you’re living in a new era – what experts are calling the 4th Industrial Revolution. You’ve probably heard some of the more catch-phrased components – big data, artificial intelligence, deep analytics. Some of these still seem like science fiction, but they are very real, very active, and crucial parts of what we at Corrigo call the Intelligence Economy. In the Intelligence Economy, data is collected, crunched, and activated to solve problems and create greater value for customers, partners, and employees. It’s the information, insights, and automations that enhance experiences, predict needs, strengthen connections, and deliver the right info or action at the right time, in the right way. And the Intellig
Tags : 
    
Corrigo
Published By: Oracle     Published Date: Sep 25, 2019
Research shows that legacy ERP 1.0 systems were not designed for usability and insight. More than three quarters of business leaders say their current ERP system doesn’t meet their requirements, let alone future plans 1. These systems lack modern best-practice capabilities needed to compete and grow. To enable today’s data-driven organization, the very foundation from which you are operating needs to be re-established; it needs to be “modernized”. Oracle’s goal is to help you navigate your own journey to modernization by sharing the knowledge we’ve gained working with many thousands of customers using both legacy and modern ERP systems. To that end, we’ve crafted this handbook outlining the fundamental characteristics that define modern ERP.
Tags : 
    
Oracle
Published By: F5 Networks Singapore Pte Ltd     Published Date: Sep 19, 2019
"Security analysts have a tougher job than ever. New vulnerabilities and security attacks used to be a monthly occurrence, but now they make the headlines almost every day. It’s become much more difficult to effectively monitor and protect all the data passing through your systems. Automated attacks from bad bots that mimic human behavior have raised the stakes, allowing criminals to have machines do the work for them. Not only that, these bots leave an overwhelming number of alert bells, false positives, and inherent stress in their wake for security practitioners to sift through. Today, you really need a significant edge when combating automated threats launched from all parts of the world. Where to start? With spending less time investigating all that noise in your logs."
Tags : 
    
F5 Networks Singapore Pte Ltd
Published By: F5 Networks Singapore Pte Ltd     Published Date: Sep 19, 2019
"The fast pace of innovation demanded by today’s digital businesses challenges traditional processes for the deployment and governance of application delivery and supporting infrastructure. To address the increased pace of change, many organizations are transforming by adopting DevOps: a set of practices which employs continuous integration processes, breaking down the silos between development and operations teams. As cycle times accelerate, and development teams adopt more Agile delivery methodologies, the traditional model for application security can be a drag on the speed and agility inherent in a continuous integration process. This creates a natural friction. Security teams can be perceived as slowing down or blocking delivery. At the same time, however, the apps are exposed to significant threats. The goal of continuous integration is to deliver more frequent releases with more new capabilities to market, faster. It’s all about speed."
Tags : 
    
F5 Networks Singapore Pte Ltd
Published By: F5 Networks Singapore Pte Ltd     Published Date: Sep 19, 2019
"Have you ever wished for an army of clones to do all your thankless tasks and chores? Well, that fantasy is becoming a reality—at least on the Internet. And while they may not be actual clones, bots have begun doing lots of digital dirty work. Managing your relationship with bots—good and bad—has become an inherent part of doing business in a connected world. With more than half of online traffic initiated by autonomous programs, it’s clear that bots are a driving force of technological change, and they’re here to stay.1 As bot technology, machine learning, and AI continue to evolve, so will the threats they pose. And while some bots are good, many are malicious—and the cybercriminals behind them are targeting your apps. Preparing your organization to deal with the impact of bots on your business is essential to developing a sustainable strategy that will enable you to grow as you adapt to the new bot-enabled world."
Tags : 
    
F5 Networks Singapore Pte Ltd
Published By: ServiceNow     Published Date: Oct 23, 2019
IT faces the challenge of consolidating, maintaining, and understanding complex configuration data and often this data is found in many different repositories. But there’s a better way to solve these challenges. The configuration management database (CMDB) consolidates disparate IT management systems into a single system of action. This ipaper provides you with the fundamentals to help ensure your configuration data management project with CMDB is a success.
Tags : 
servicenow, it management, data management
    
ServiceNow
Published By: SES     Published Date: Aug 01, 2019
A divisão digital impede o aproveitamento de todo o potencial das regiões carentes do planeta. Neste artigo, o autor mostra como uma rede 5G pode reduzir drasticamente a divisão digital e melhorar as condições econômicas em todo o mundo. Veja como a tecnologia de satélite pode aumentar a conectividade em regiões carentes e beneficiar a telemedicina, o emprego remoto e as oportunidades em educação.
Tags : 
    
SES
Published By: BehavioSec     Published Date: Oct 04, 2019
Authentication is evolving from static one-time user action, to transparent and continuous ways of validating digital identities without imposing frustration on end users. Behavioral biometrics technologies invisibly and unobtrusively authenticate users by validating the manner in which they physically interact online. Behavioral biometrics technologies learn how individual users hold mobile devices in their hands and press their fingers on the touchscreen. On computers, the system learns how users type on keyboards and move their mouse and cursor. The BehavioSec solution gathers this behavioral data and analyzes it using advanced techniques, to ensure that the user is who you expect them to be.
Tags : 
    
BehavioSec
Published By: Intel     Published Date: Sep 25, 2019
While NFV remains both technically and business relevant today, many communications service providers (CoSPs) have found implementation very complex. NFV implementation will require further evolution in order to fully address operational and business requirements. This white paper reviews factors currently driving the network virtualization evolution and examines the impact of adopting an innovative model based on software and hardware disaggregation.
Tags : 
    
Intel
Published By: KPMG     Published Date: Jun 06, 2019
Many organisations will be using AI sooner than anyone expects. Prepare now to address the risks from these advanced technologies with this comprehensive framework from our risk experts. Download this practical resource to see AI risk description, control topic and control description, COBIT process and COBIT area for 17 different AI risks.
Tags : 
    
KPMG
Published By: KPMG     Published Date: Jun 10, 2019
GDPR has prompted banks to re-evaluate their data protection policies. Going beyond pure compliance can help establish consumer trust as a point of differentiation. Read this report to find out: • the ethical challenges and risks arising from the use of customer data • how to start embedding principles for ethical data handling in your organisation • the competitive advantages that come from getting data ethics right.
Tags : 
    
KPMG
Published By: KPMG     Published Date: Jun 10, 2019
Forces such as consumerisation, expanding regulatory requirements and the shift to outcome-based pricing are all compelling procurement leaders to re-evaluate strategies. Read this briefing to find out: • the key disruptors shaping the future of procurement • how to develop an agenda to deal with disruption • seven key areas of difference between current and future procurement models • essential questions to inform your strategic thinking.
Tags : 
    
KPMG
Published By: KPMG     Published Date: Sep 05, 2019
If procurement organisations are to sustain their value to the enterprise, they must pivot to new operating models that embed customer-centricity in their technology, process and people. Read this report to discover: • the four convergence trends driving change and opportunity for procurement organisations • the nine differentiators for customer-centric procurement leaders • how and why you should be leveraging CX procurement technology."
Tags : 
    
KPMG
Published By: KPMG     Published Date: Oct 09, 2019
Complying with financial and economic sanctions is likely to pose new challenges after Brexit. Explore the issues with KPMG experts Karen Briggs and Neal Dawson, with Maya Lester QC and Arjun Ahluwalia, Head of Sanctions Advisory at HSBC UK. Listen now to discover: • Details of current sanctions policy and post-Brexit implications • How financial and economic sanctions impact the private sector • How manage compliance better by using sanctions technology.
Tags : 
    
KPMG
Published By: KPMG     Published Date: Oct 09, 2019
Changing attitudes to data privacy leave many firms in a precarious position. When there is so much regulatory variation in different markets, how do firms balance their responsibility for customers’ data with maximising value from that data? Listen now to discover: • The current state of play for data privacy – understanding what your customers want and what the regulators want • How to lay solid foundations to help you adapt to the changing landscape • How to ensure your privacy strategy supports growth.
Tags : 
    
KPMG
Published By: Blend     Published Date: Oct 07, 2019
Every lender, bank, and credit union has different product mixes and marketing priorities, but one thing they all share is the goal of winning, retaining, and growing our customer relationships. Typically, there are two ways to maximize customer engagement: seek margin with products like credit cards, or seek volume and deeper relationships with products like home equity. This report analyzes both of these options through three key lenses: current market conditions, access to today’s high-quality borrowers, and the rich opportunity for integrated, targeted marketing. Our goal is to enable you to determine the best way to fine-tune your strategic customer engagement for 2019 by helping you: Review current market conditions. Connect with higher-quality borrowers. Develop a 360-degree, integrated marketing mix.
Tags : 
    
Blend
Published By: Abacus Labs     Published Date: Oct 31, 2019
This guide will help you from start to finish while researching and evaluating expense reporting solutions. We help you determine your needs based on your existing processes, stakeholder goals, and current market availability. The guide also includes a helpful worksheet and questionnaire for vendors so you can easily compare platforms and make sure your needs can be met.
Tags : 
    
Abacus Labs
Published By: Oracle     Published Date: Sep 26, 2019
It’s not uncommon to find slick-looking user interfaces, well-run product demos, and exciting sales narratives when evaluating a data management platform (DMP), but don’t let those features distract from the elements needed for day-to-day and long-term strategic success of a DMP. Whether you’re looking to invest in a DMP for the first time or want to switch to a new provider, there are a few crucial factors to consider before signing on the dotted line. Key functionality, architecture, and partnership dynamics are all important factors, but they rarely surface until your team is hands-on and using the platform. Once you dig in, it can quickly become apparent that a shiny interface and smart storytelling are a distraction from what really matters—at this point, it’s often too late. Avoid buyer’s remorse by considering these seven facets of all DMP providers before making your decision.
Tags : 
    
Oracle
Published By: Oracle     Published Date: Sep 26, 2019
If you’re planning to sell products and services to today’s fast-moving global consumers, there’s no way around it—you need a website. And to make sure that website delivers an experience that fuels conversions and revenue, testing and optimization are crucial. There are lots of different ways to test your website. However, while some tests will help you optimize, others will just take up your time and give nothing useful back in return. This guide will show you how to build and run the right kind of website test and decode the results to get the answers you need.
Tags : 
    
Oracle
Published By: CloudHealth by VMware     Published Date: Aug 22, 2019
Public clouds have fundamentally changed the way organizations build, operate, and manage applications. Security for applications in the cloud is composed of hundreds of configuration parameters and is vastly different from security in traditional data centers. According to Gartner, “Through 2020, at least 95% of cloud breaches will be due to customer misconfiguration, mismanaged credentials or insider theft, not cloud provider vulnerabilities”1. The uniqueness of cloud requires that security teams rethink classic security concepts and adopt approaches that address serverless, dynamic, and distributed cloud infrastructure. This includes rethinking security practices across asset management, compliance, change management, issue investigation, and incident response, as well as training and education. We interviewed several security experts and asked them how public cloud transformation has changed their cloud security and compliance responsibilities. In this e-book, we will share the top
Tags : 
    
CloudHealth by VMware
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search Resource Library      

Add Resources

Get your company's resources in the hands of targeted business professionals.