identify

Results 1 - 25 of 971Sort Results By: Published Date | Title | Company Name
By: Retroficiency     Published Date: Nov 07, 2013
Each year, utilities ramp up their targets to deliver energy savings through commercial efficiency programs. As these mandates become increasingly difficult to achieve, utilities need to target and engage commercial customers in a more sophisticated and proactive way. Advanced energy analytics can enable utilities to identify the highest potential candidates for efficiency and increase their conversion rates by delivering highly focused messages on appropriate projects and programs.
Tags : retroficiency, energy efficiency, energy savings, advanced energy analytics
     Retroficiency
By: Instructure     Published Date: Aug 27, 2019
Need some help picking a learning management platform? The right learning management platform can play a huge role in your institution’s success, including that of faculty and students. Therefore, you have some homework to do. Don’t worry, we’ve made it easy. Read our Higher Education Guide to choosing a Learning Management Platform for insights on: • Understanding how a true Learning Management Platform should work • Identifying the unique needs and wants of your users • Aligning a platform to your institution’s goals • Planning for future scalability • And more. Get your guide today and study up on how to choose a great learning management platform for your institution!
Tags : 
     Instructure
By: Pure Storage     Published Date: Sep 13, 2019
"By asking the right questions as you design your hybrid cloud, you maximize your chances for success. What do you want to achieve? Identifying your goals will help you zero in on the biggest pain points and attack those first. Description Learn how to increase the effectiveness of your hybrid cloud with a focus on data strategies for running hybrid applications. Use this guide to: Discover key Differences between enterprise IT environments and the public cloud. Learn if you can support enterprise applications in the public cloud. See if you can support cloud-native applications on-premises. Understand if you can protect data cross your hybrid cloud."
Tags : 
     Pure Storage
By: Pure Storage     Published Date: Sep 13, 2019
"By asking the right questions as you design your hybrid cloud, you maximize your chances for success. What do you want to achieve? Identifying your goals will help you zero in on the biggest pain points and attack those first. Description Learn how to increase the effectiveness of your hybrid cloud with a focus on data strategies for running hybrid applications. Use this guide to: Discover key Differences between enterprise IT environments and the public cloud. Learn if you can support enterprise applications in the public cloud. See if you can support cloud-native applications on-premises. Understand if you can protect data cross your hybrid cloud."
Tags : 
     Pure Storage
By: HERE Technologies     Published Date: Aug 28, 2019
Mapping, tracking, positioning and real-time data arekey to supporting defense and intelligence initiatives. Governments and agencies need location data they can trust to track and adjust fixed and mobile resources to address rapidly changing events and circumstances. With Ovum's Location Platform Index: Mapping and Navigation, agencies can assess location platform industry leaders and identify the platform that best meets their product development demands. This year, HERE Technologies cemented its role as the industry leader, earning the highest ranking, and besting Google, for the second time in a row. Download your free report to learn: The relative strengths and weaknesses of each vendor, including data, enablers and features Vendor strategies to keep up with changes in technologies and trends The specific workings of the location platform market, and to better understand what constitutes a healthy location platform and which provider offers the correct portfolio and the necess
Tags : data, platform, mapping, developers, index, vendors, capabilities, maps
     HERE Technologies
By: SiteImprove     Published Date: Sep 13, 2019
This report is an attempt to understand what marketing leaders view as their top issues with regard to corporate websites and broader digital presences, and to identify their focus areas today and over the next 12 months. The results point to a desire for marketers to optimise the customer experience across every touchpoint. That aim is commendable but, as our research makes clear, there are serious obstacles along the way.
Tags : 
     SiteImprove
By: Cisco Umbrella EMEA     Published Date: Aug 08, 2019
"Some solutions promise to check all the boxes on network security. But it turns out, they're checking all the wrong ones. Don't get frustrated. Cisco Umbrella can help, and you can be up and running before your next coffee break. Check out our simple security checklist to learn how to identify red flags and put an end to empty security promises. "
Tags : 
     Cisco Umbrella EMEA
By: Cisco Umbrella EMEA     Published Date: Sep 02, 2019
AI is not a trend! Cisco has been doing it for years to help businesses across the globe quickly and easily identify banking trojans, botnets, phishing and ransomware. In this recorded webinar, we go beyond the hype.
Tags : 
     Cisco Umbrella EMEA
By: Cisco Umbrella EMEA     Published Date: Sep 02, 2019
"We live and surf in a cyber world where attacks like APT, DDOS, Trojans and Ransomware are common and easy to execute. Domain names are an integral part of any business today and apparently an integral part of an attacker's plan too. Domain names are carriers of malwares, they act as Command and Control servers and malware's ex-filtrate data too. In today's threat landscape - predicting threats, spotting threats and mitigating them is super crucial.. This is called Visibility and Analytics. Watch this on demand session with our Cisco cloud security experts Shyam Ramaswamy and Fernando Ferrari as they talk about how Cisco Umbrella and The Umbrella Research team detect anomalies, block threats and identify compromised hosts. The experts also discuss how effectively Cisco spot, react, filter out IOC, block the network communications of a malware; identify and stop a phishing campaign (unknown ones too). "
Tags : 
     Cisco Umbrella EMEA
By: TIBCO Software     Published Date: Feb 13, 2019
Analyst firms Gartner, Inc. and Forrester are projecting accelerated data virtualization adoption for both first-time and expanded deployments. What are the uses cases for this technology? At its Data and Analytics Summit in London in March 2018, Gartner answered this question by identifying 13 data virtualization use cases. This paper explores each of these use cases by: Identifying key requirements Showing how you can apply TIBCO® Data Virtualization to address these needs Listing the benefits you can expect when implementing TIBCO Data Virtualization for the use case
Tags : 
     TIBCO Software
By: Amazon Web Services EMEA     Published Date: Sep 09, 2019
Local and regional governments around the world are using the cloud to transform services, improve their operations, and reach new horizons for citizen services. The Amazon Web Services (AWS) cloud enables data collection, analysis, and decision making for smarter cities. This whitepaper provides strategic considerations for local and regional governments to consider as they identify which IT systems and applications to move to the cloud. Real examples that show how cities can stop wasting money, move faster, and innovate.
Tags : 
     Amazon Web Services EMEA
By: Group M_IBM Q3'19     Published Date: Jun 24, 2019
Digital technology is redefining possibilities in Energy, Environment and Utilities. Disruptive forces, emerging consequences, pressing challenges, and provocative opportunities. Learn how industries benefited from your data. Learn how IBM E&U describes disruptions manifested in Energy, Environment and Utilities. IBM identifies three ways your company focus can to stay ahead of the competition in pressing challenges. Additionally, identifying three provocative opportunity actions that are needed to get going.
Tags : 
     Group M_IBM Q3'19
By: Group M_IBM Q3'19     Published Date: Jun 24, 2019
Delivering personalized customer experience remains the top business challenge for communications service providers (CSPs). Ovum's recently published 2018 ICT Enterprise survey saw almost all CSP IT executives interviewed identify delivering personalized customer experience as one of their three most important business challenges for the next 18 months. This trend emphasizes the high priority CSPs place on how customer relationships are managed. However, several factors have an impact on CSPs' ability to identify and then deliver customers' core needs. These include understanding the data sets they should focus on; collecting, cleansing, and consolidating these data sets; and having the right expertise to mine the data sets.
Tags : 
     Group M_IBM Q3'19
By: Group M_IBM Q3'19     Published Date: Aug 29, 2019
Which of your applications should move to the cloud? Is public, private, or hybrid cloud the right choice? And should you use containers, or Platform-as-a-Service technologies? Whether you’re trying to optimize your existing landscape, strengthen your foundation, or innovate with newer technologies that are delivered via cloud platforms, you need to know where to start. In this webcast, hear how IBM helped The Tribune Publishing Company build an effective plan to accelerate their digital transformation. Learn how IBM can also help you analyze your full portfolio, identify opportunities to optimize and automate your infrastructure and determine which applications to move, and the potential business value.
Tags : 
     Group M_IBM Q3'19
By: Asurint     Published Date: Aug 05, 2019
The majority of employers today perform background investigations of some type, according to the National Association of Professional Background Screeners (NAPBS). All background checks aren’t created equal, however. Whether you’re seeking to improve existing talent acquisition capabilities or are among the employers introducing a new background search policy, it’s vital to identify the right partner for background checks With so many options on the market, the quest for the best-fit background screening provider can seem overwhelming at first. To help cut through the clutter, we’ve compiled five basic questions, which home in on the central issues related to background checks and can help any organization identify the companies most capable of meeting their needs. ©
Tags : 
     Asurint
By: MicroStrategy     Published Date: Aug 28, 2019
The Constellation AstroChartTM supplies a visual guide of the trends impacting Data to Decisions. After assessing boardroom priorities, organizations should employ AstroCharts to inform portfolio management. This report contains two AstroCharts: one identifying Business Trends and one identifying Technology Trends. The AstroCharts’ vertical axes plot “Organizational Adoption” rates from Mainstream to Early Adopter to Bleeding Edge. Horizontal axes plot “Business Impact,” the impact of the trend on an organization’s business model, from Incremental to Transformational to Exponential. The Constellation AstroChart moves beyond both the hype and constraints of the standard 2 x 2 grid to identify the dynamics impacting the entire market. This report applies Constellation’s AstroChart to the Constellation’s business theme of Data to Decisions. This research domain examines the enablement of data-driven decisions across organizations. Holistic, data-informed decisions require a multidisciplin
Tags : 
     MicroStrategy
By: Masergy     Published Date: Sep 18, 2019
Slow is the new broken, and SD-WAN is helping IT teams move at the speed of today’s digital innovation. But an SD-WAN investment requires you to make critical decisions around architectural design, the use of broadband connectivity, and security. How do you navigate those decisions and identify the right service provider? Zeus Kerravala, Founder and Principal Analyst at ZK Research, offers his guide to investing in SD-WAN.
Tags : 
     Masergy
By: Iovation     Published Date: Aug 02, 2019
The digitalization of business processes and the advent of mobile computing have given rise to the next generation of fraud. Cybercriminals have a variety of tools and techniques—as well as opportunities—to steal money and services. Furthermore, traditional fraud prevention tools often fail to stop this fraudulent activity. Companies need a new approach to fraud prevention—one that stops fraud early and preserves the user experience. Companies with an online presence must have the ability to: Detect and respond to fraudulent activity before incurring losses Leverage human insight and machine learning to identify advanced fraud Work with other fraud analysts to identify larger fraud trends and stop cybercriminals on a global scale Block more fraud while reducing fraud prevention costs This book explores how companies can leverage a next-generation fraud prevention solution to stop more fraud while reducing costs and providing a positive user experience for trusted customers.
Tags : 
     Iovation
By: Iovation     Published Date: Aug 02, 2019
Insurance fraud is back with a vengeance. With four out of ten mobile claims estimated to be fraudulent, using connected devices have made it easier than ever for fraudsters to commit insurance crimes. Gather insights from the live panel discussion hosted by MoneyLIVE & TransUnion. As fraud experts examine current trends & impacts of insurance fraud in today's digital age and learn how to overcome insurance fraud while protecting your customer relationships. What you will learn: Key trends behind fraud and the way in which they are impacting insurers. How to tackle fraud and identify red flags by using a holistic approach. Explore trigger points that can help warn insurers of when there is a high chance of fraudulent activity. Identify the genuine customers and their genuine claims from the fraudsters.
Tags : botnet, insurance claims fraud, fraud rings, account takeover
     Iovation
By: Juniper Networks     Published Date: Jul 31, 2019
More than 80% of organizations in Asia are not protected against today's threats. Many of them depend on security investments made years ago, which cannot defend against new and emerging threats. The arrival of new technologies including cloud computing, the Internet of Things, mobility, bring your own device (BYOD), and social media have massively increased attack surfaces and expanded the threat landscape. New agile solutions are required that can address today's threats and enable organizations to adjust their security posture as the threat landscape evolves. Download this whitepaper to know more about key recommendations including: • Working with third parties to evaluate your current cybersecurity posture and identify vulnerabilities • Upgrading and update your cybersecurity assets with a particular focus on ensuring that firewalls are upgraded • Ensuring that your organization has a unified view of your assets and the threat environment
Tags : network management, network security, network security appliance, security, security architecture
     Juniper Networks
By: Genesys     Published Date: Jun 19, 2019
Contact centers often pool agents into large groups of generalists to distribute work evenly. Skills-based routing takes this a step further with specialized groups. But neither approach scales properly to identify all opportunities and drive business outcomes on each interaction. Predictive routing uses artificial intelligence (AI) and machine learning to create balance—meeting targets and giving customers a personalized experience. Read Demystifying AI: Creating an AI partnership that maximizes business results to learn how predictive routing systematically: Evaluates historical and real-time data to make predictions; Makes the best customer-agent match to drive desired outcomes; Keeps agents engaged and reduces handle times.
Tags : 
     Genesys
By: SAP Concur     Published Date: Aug 07, 2019
"Spend Management is the planning, process, and system of managing business dollars to positively affect the production of products and services. Spend management usualy includes processes relating to procurement, supply chain management, and outsourcing. Optimal spend management relies on the ability to understand and control company spend through automation tools and analytics. Steps to Strategic Spend Management All CFOs are concerned with how their company is spending its money. However, this is of particular concern for CFOs of small to mid-size businesses who need to manage their cash flow effectively to survive. To survive and maintain a competitive advantage, companies need to be strategic in their spend management and identify ways to invest wisely to meet current demands and fuel growth for the future. Expense and invoice management can no longer be viewed as simply a cost center. Download this white paper to explore five initiatives that can help guide your company towa
Tags : 
     SAP Concur
By: Nuance Communications     Published Date: Mar 16, 2010
The recent economic downturn has created some formidable challenges for the retail banking industry. Fraud and identify theft are on the rise, costing banks big money and raising customer concerns about security.
Tags : nuance, retail banking, fraud, identify, contact, theft, outbound
     Nuance Communications
By: Nuance Communications     Published Date: Jun 17, 2009
The response to possible bank card fraud is one of the most important factors affecting the relationship that customers have with their bank. For customer-centric financial institutions who issue millions of bank cards, any instance of possible fraud is both a business risk to be managed and an opportunity to strengthen customer relationships.
Tags : nuance, retail banking, fraud, identify, contact, theft, outbound, business risk
     Nuance Communications
By: Nuance Communications     Published Date: May 28, 2010
Register today to view to the webcast Proactive Notifications for Financial Services: Using Automated Customer Communications to Manage Risk and Retain Customers.
Tags : nuance, retail banking, fraud, identify, contact, theft, outbound, business risk, financial services
     Nuance Communications
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search White Papers      

Add White Papers

Get your white papers featured in the Energy Efficiency Markets White Paper Library contact: Kevin@EnergyEfficiencyMarkets.com