game

Results 176 - 200 of 351Sort Results By: Published Date | Title | Company Name
By: Shell     Published Date: Aug 27, 2018
While simple fixes may cost a few thousand dollars, lost revenue from equipment failures can run into the millions of dollars in lost productivity and replacement costs. There can be longer-term impacts, too, if the downtime inhibits a manufacturer’s ability to meet customer needs. That’s why it is important for companies to think about lubrication and equipment maintenance holistically, recognizing that short term cost savings may be leading to bigger, preventable expenses over the long term. By adopting a total cost of ownership (TCO) program, companies can find efficiencies they didn’t even know existed and reap benefits they didn’t realize were possible. Download our white paper, “The Cost Reduction Game,” to learn more about how a TCO program can help increase equipment reliability, extend equipment life, and lower energy costs.
Tags : cost, reduction, equipment, shell, manufacturing, maintenance, reliability, contamination control
     Shell
By: Shell     Published Date: Jun 10, 2019
How lubrication can play a role in your TCO program.
Tags : 
     Shell
By: Shell     Published Date: Jun 12, 2019
How lubrication can play a role in your TCO program
Tags : 
     Shell
By: Citrix Systems     Published Date: Feb 14, 2019
"Now that 72.3% of cloud users have a mix of on-prem/off-prem clouds, the networking game has changed. Traditional app delivery solutions can’t ensure reliable, secure access in a SaaS, multi-device, hybrid, and multi-cloud world.  Get this solution brief to learn why a holistic strategy innately reduces complexities that otherwise would prohitib visibility and control in distributed architectures. The brief also explains: - The Citrix Networking approach to delivering reliability and a high-quality experience - How to ensure reliable access to apps at branch and remote locations while keeping costs low - How to provide full visibility and analytics for your network, applications, users, and data"
Tags : 
     Citrix Systems
By: Citrix Systems     Published Date: Jun 04, 2019
Now that 72.3% of cloud users have a mix of on-prem/off-prem clouds, the networking game has changed. Traditional app delivery solutions can’t ensure reliable, secure access in a SaaS, multi-device, hybrid, and multi-cloud world. Get this solution brief to learn why a holistic strategy innately reduces complexities that otherwise would prohibit visibility and control in distributed architectures. The brief also explains: The Citrix Networking approach to delivering reliability and a high-quality experience How to ensure reliable access to apps at branch and remote locations while keeping costs low How to provide full visibility and analytics for your network, applications, users, and data
Tags : 
     Citrix Systems
By: Logrhythm     Published Date: Feb 24, 2016
The time has come for CEOs and Boards to take personal responsibility for improving their companies’ cyber security. Global payment systems, private customer data, critical control systems, and core intellectual property are all at risk today. As cyber criminals step up their game, government regulators get more involved, litigators and courts wade in deeper, and the public learns more about cyber risks, corporate leaders will have to step up accordingly. This whitepaper focuses on the LogRhythm Security Intelligence Maturity Model, and how it is a valuable guide for building the necessary successive layers of threat detection and response capabilities. Download this paper now to find out more.
Tags : cyber attack, risk, cyber security, cyber criminals, cyber risks, security intelligence, threat detection
     Logrhythm
By: McAfee EMEA     Published Date: Mar 14, 2018
Machine learning is all around us, from our smart home applications to driverless automobiles. The efficiency of automated decision-making is changing the game in cybersecurity, expanding the capabilities of humans by sifting through enormous quantities of data and presenting it as actionable intelligence. Machine learning makes security teams better, and vice versa. Human-machine teams deliver the best of both worlds, allowing endpoint security to continually evolve to stop new attack tactics. Your team deserves the best that cybersecurity has to offer, and today the best endpoint security products leverage machine learning.
Tags : 
     McAfee EMEA
By: NCM Fathom     Published Date: Dec 09, 2011
Like a game of chess, content creation requires strategy. This eBook is not designed with the goal of teaching you how to play safe. It is designed to help you achieve significant wins with content that engages your audience.
Tags : fathom, business, b2b, content creation, marketing
     NCM Fathom
By: Adobe     Published Date: May 22, 2012
How will trends in search, mobile, and social media impact your marketing strategy this year? Download our latest Global Digital Advertising Update to find out.
Tags : adobe, marketing, social media, emerging marketing, media, digital, digital advertising
     Adobe
By: Movéo Integrated Branding     Published Date: Jul 11, 2013
Learn how technology is expanding modern marketing at an accelerated rate and how to strategically keep pace with the new technology without losing marketing's effectiveness
Tags : b2b, marketing, innovation, collaboration, adaptation, strategy, technology, trends, transformation, channels, partnership, clients, integration, game-changing, branding, communications, bottom-line, research, challenges, change
     Movéo Integrated Branding
By: Brandwatch     Published Date: Jun 17, 2013
To demonstrate its prowess as an insight-driven agency, Waggener Edstrom used Brandwatch to monitor and analyze the social “buzz” around the 2012 London Olympic Games—and turned social conversations into meaningful insights for its client brands.
Tags : social media monitoring, social media analytics, social media intelligence, social listening, social media strategy, social media insights, brand monitoring, twitter tracking, facebook tracking, twitter analysis, media reputatino monitoring, sentiment analysis, market research, social media tracking, social business intelligence, reputation measurement, social reporting, brand measurement, social brands, social analytics
     Brandwatch
By: NetApp     Published Date: Sep 24, 2013
Many organizations have adopted virtualization as a standard for server workloads. But virtualization has not proven to be the “game changer” many organizations had envisioned. IT departments face huge challenges related to server sprawl, which has actually increased with virtualization. Although virtualization has brought benefits beyond the physical paradigm of one operating system per server, the true optimal infrastructure for organizations comes with adopting a private cloud infrastructure. Check out this white paper to learn the benefits of a private cloud and discover how deploying one private cloud solution can provide: Consolidated resources Flexible services Easy provisioning of new environments And more
Tags : best practices, private cloud, netapp, cloud, technology, windows server, security, data center
     NetApp
By: Rsam     Published Date: Apr 28, 2016
Join Rsam and Tom Garrubba, the Senior Director of Shared Assessments, as they discuss how to develop a game plan for vendor risk that aligns with OCC 2013-29.
Tags : rsam, occ, vendor risk, risk management, networking
     Rsam
By: IBM     Published Date: Oct 13, 2017
Analytics is game-changing and can produce valuable insights from the ever-growing volume, velocity and variety of data. Business Intelligence (BI) provides the foundation for many types of Analytics. It enables companies to deliver exceptional customer experience, enhance marketing effectiveness, increase operational efficiencies, reduce financial risks, improve product quality and reliability, and so on. But businesses are also challenged to generate timecritical actionable insights and make a compelling financial business case for BI investments.
Tags : ibm, cognos analytics, business intelligence, customer experience, marketing
     IBM
By: Tracx     Published Date: Mar 08, 2017
"The social internet is big, noisy, and always in flux — which makes it really hard to know where your audience is spending their time and how to reach them there. So, we've done the research for you. (You're welcome.) Join us for this on-demand webinar to learn why a ""listen-first"" philosophy sets your team up to discover game-changing opportunities before your competitors do. In this on-demand webinar, you'll learn: *How to create your ideal social media mix *The most up-to-date audience demographics from Facebook, Instragram, Twitter, Linkedin, Pinterest, Reddit, and more *Top performing networks based on industry demographics *When to adopt new networks (and when to ignore) *Where companies like yours spend time on social media (and where the missed opportunities are)."
Tags : b2b social media, b2c social media, enterprise social, media engagement, media listening, media platform, media technology, social analytics, social analytics media, social engagement, social listening, social marketing, social media, social monitoring, social monitoring media, social optimization, social publishing, social roi tool, social software, social software media
     Tracx
By: Tenable     Published Date: Apr 30, 2018
The DevOps model drives digital transformation and the rapid delivery of new software products and services. However, this process largely takes place outside the purview of information security (InfoSec), often without their involvement. As a result, security teams struggle to keep pace. This whitepaper explores the intersection of DevOps and InfoSec, offering three reasons why security organizations will benefit by combining these two practices.
Tags : devops, dev sec ops, infosec, container security, idg, digital transformation
     Tenable
By: Interactive Intelligence     Published Date: Feb 14, 2012
Read how in this first installment of a three-part series from two industry experts: Michele Rowan, president, At Home Customer Contacts, and Tim Passios, senior director of Solutions Marketing at Interactive Intelligence.
Tags : 
     Interactive Intelligence
By: GFI     Published Date: Mar 25, 2008
This white paper explains what makes spam such an unbearable problem and how spamming tactics are evolving daily to beat anti-spam software. In the space of two months, spammers have switched from image spam to using PDF, Excel and ZIP file attachments. By using these attachments to send images instead of embedding them in the body of the email message, spammers have taken the cat-and-mouse game with anti-spam software developers to a new level.
Tags : attachment spam, filter attachment spam, image spam, pdf spam, excel spam, xls spam, stock spam, gfi, security
     GFI
By: ESET     Published Date: Jan 21, 2010
3rd International Conference on Cybercrime Forensics Education & Training. What is the information that the end-user or end-site really needs to know about an incoming threat?
Tags : eset, internet security, cybercrime, threat, malware, antivirus, trojan, vgrep, common malware enumeration, cme
     ESET
By: SAS     Published Date: Aug 03, 2016
Tax fraud is already prevalent, and fraudsters are more sophisticated and automated than ever. To get ahead of the game in detecting fraud and protecting revenue, tax agencies need to leverage more advanced and predictive analytics. Legacy processes, systems, and attitudes need not stand in the way. To explore the challenges, opportunities, and value of tax fraud analytics, IIA spoke with Deborah Pianko, a Government Fraud Solutions Architect within the SAS Security Intelligence practice.
Tags : finance, tax fraud, security, protecting revenue, opportunities, analytics
     SAS
By: Netezza IBM US     Published Date: Mar 27, 2012
IBM Netezza data warehouse appliances push the limits of analytics by fusing our ground breaking data warehouse appliances with high performance, scalable analytics that can process massive data to solve complex problems orders of magnitude faster than typical solutions. IBM Netezza Analytics, IBM's embedded advanced analytics platform delivered with every appliance, enables the development and deployment of analytics to drive game changing results.
Tags : ibm, technology, netezza, analytics, enterprise analytics, business technology
     Netezza IBM US
By: Skillsoft     Published Date: Mar 27, 2015
Everyone wants to win, not everyone knows how. Winning isn’t only important for top executives but for everyone — from the boardroom to the mailroom — who wants to get ahead and help his or her organization. The two are intertwined. For an individual, winning is personal. In the business world, winning is multidimensional. The successful salesperson, for example, helps not only himself but also his company and everyone connected with it. Even the most talented businessperson with the best intentions will get nowhere unless he or she knows how to win in today’s complex business world. Business is a game, and winning that game is a total blast! Download Winning by legendary CEO, Jack Welch with Suzy Welch and learn how to be on the winning team.
Tags : leadership, leadership development, succession planning, skills gap, talent gap, leaders, managers, jack welch
     Skillsoft
By: ITinvolve     Published Date: Jun 06, 2012
Learn why Enterprise Management Associates analyst Dennis Drogseth calls ITinvolve for Change Management "a breath of fresh air in humanizing change management and streamlining collaboration across a wide range of relevant stakeholders.
Tags : change management, cloud computing, cross-domain change management, cmdb, cms, itinvolve, enterprise applications, business technology
     ITinvolve
By: Adobe     Published Date: Aug 02, 2017
Get in on the content creation game and use it to improve the journey for your customers. Consumers are taking a much more active role in their finances; advice is freely available and most financial administration, from payments to trading, can now be done from your phone. Provide consistent messaging based on customer journey analytics; find out what information your customers are looking for, and provide the answers through the fewest possible clicks. Continually track and test these journeys to optimise the content and messaging.
Tags : consumers, customer success, content creation, content optimisation, adobe, finances
     Adobe
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search White Papers      

Add White Papers

Get your white papers featured in the Energy Efficiency Markets White Paper Library contact: Kevin@EnergyEfficiencyMarkets.com