voc

Results 51 - 75 of 288Sort Results By: Published Date | Title | Company Name
By: BI WORLDWIDE     Published Date: Dec 22, 2014
As a manufacturer, your uncontrolled distribution channel has a lot of places to focus their attention. So how do you break through the clutter? Reward and recognition programs have long been used to engage channel partners and align their activities with manufacturers’ goals. Applying behavioral economics to your program design will drive extra focus and effort. Learn ten best practices to follow when designing your next channel reward and recognition program.
Tags : customer loyalty, loyalty program, customer engagement, brand loyalty, brand advocacy, channel engagement, channel incentives, channel loyalty
     BI WORLDWIDE
By: BI WORLDWIDE     Published Date: Dec 22, 2014
The current loyalty program environment is challenging but rife with opportunity. Many poorly designed programs are driving loyalty fatigue and mercenary loyalty. However, there are more loyalty memberships than ever before and those companies that are successful in driving engagement and true loyalty are experiencing significant returns. The programs that “get it right” and earn genuine loyalty don’t just repurpose an old tactical model or copy the competition – they are unique and create or reinforce differentiation in the marketplace. Learn how to design a loyalty program that focuses on the entire lifecycle of a customer.
Tags : customer loyalty, loyalty program, customer engagement, brand loyalty, brand advocacy, channel engagement, channel incentives, channel loyalty
     BI WORLDWIDE
By: CA Technologies     Published Date: Jun 04, 2015
As empresas que dependem muito da TI para prestar serviços aos clientes são movidas constantemente pelas pressões do mercado para desenvolver e lançar novas funções de software que atendam às exigências cada vez maiores. Facilitar a colaboração entre o desenvolvimento e as operações de TI e colocar o aplicativo no mercado mais rapidamente e com maior qualidade são fundamentais para o sucesso dos negócios. Este resumo da solução apresenta informações sobre o movimento do DevOps, por que ele é importante e como é possível cruzar o abismo para melhorar a colaboração e gerar rapidamente valor para a empresa. Você aprenderá como as soluções da CA Technologies para DevOps otimizarão seu portfólio de tecnologias de TI em um ritmo de versões mais previsível e rápido, permitindo confirmar os resultados de cada fase do ciclo de vida do software que sejam positivos para a empresa.
Tags : 
     CA Technologies
By: CA Technologies     Published Date: Aug 10, 2015
No atual cenáriode negócios, variável e ultra-competitivo, acabaram os dias em que as empresas gastavam meses, ou mesmo anos, criando, testando e implementando um aplicativo, serviço ou novas ferramentas para o mercado. Os clientes, usuários de tecnologia e o mercado como um todo, são mais ágeis do que nunca, e suas exigências de uma nova funcionalidade inovadora têm crescido em consequência disso. Em outras palavras, os clientes não se contentam em esperar pelo próximo grande lançamento e não estão dispostos a lidar com falhas e deficiências quando ele chega. Neste documento você aprenderá como uma solução de Release Automation pode ajudar sua organização a simplificar e acelerar seus processos de entrega de aplicativos.
Tags : 
     CA Technologies
By: Dynatrace     Published Date: May 20, 2016
For all Development Managers, Operations Managers and DevOps Managers, this eBook by DevOps advocate and author Gene Kim will clearly outline: - How leaders are 2.5x more likely to exceed profitability, market share and productivity goals through DevOps - Why your IT delivery model needs to be continuous and collaborative to meet demands for more features faster - Which Milestones to have in mind when plugging performance into the four pillars - culture, automation, measurement and sharing - How identifying bad patterns earlier in development prevents them from making it into production Start accelerating your own results; read this eBook now.
Tags : dynatrace, software development, devops, results, productivity, development, it management, enterprise applications
     Dynatrace
By: Cisco     Published Date: Apr 11, 2016
El panorama de amenazas actual no se parece en nada al de hace solamente 10 años. Los ataques simples que provocaban daños controlables han dado lugar a operaciones modernas de ciberdelito que son sofisticadas, están bien financiadas y son capaces de generar interrupciones importantes en las organizaciones y en la infraestructura nacional. Estos ataques avanzados son difíciles de detectar, además permanecen en las redes por mucho tiempo y acumulan recursos de red para lanzar ataques a todas partes.
Tags : 
     Cisco
By: Staples     Published Date: Nov 23, 2016
Is an eco-conscious facility too expensive? No, it doesn’t have to break the bank.
Tags : green cleaning, sustainable facility solutions, sustainability, leed certification, sustainable cleaning solutions, facility manager, sustainable building, dilution ratio
     Staples
By: AWS     Published Date: Jun 15, 2016
If cloud architectures were human beings, their development stage would fall squarely in the middle of adolescence. Enterprises are at an inflection point with their cloud deployments as they migrate from ad hoc projects to full-fledged, mature, integrated cloud architectures. The discussion around cloud reflects the trepidation and uncertainty that come with adolescence: Cloud advocates express excitement, whereas others voice concern about these developments.
Tags : 
     AWS
By: Juniper Networks     Published Date: Jul 31, 2019
Cybercrime has rapidly evolved, and not for the better. What began in the 1990s as innocent pranks designed to uncover holes in Windows servers and other platforms soon led to hacker Kevin Mitnick causing millions of dollars in malicious damages, landing him in prison for half a decade and raising the awareness of cybersecurity enough to jump-start a multimillion-dollar antivirus industry. Then came the script kiddies, unskilled hackers who used malicious code written by others to wreak havoc, often just for bragging rights. If only that were still the case.
Tags : application management, application performance, network infrastructure, network management, network security
     Juniper Networks
By: Schneider Electric     Published Date: Jun 05, 2018
Power industries - including Nuclear, Fossil, Hydro, Wind and Geothermal - are susceptible to a variety of cyber threats which can wreak havoc on control systems. Management, engineering and IT must commit to a comprehensive approach that encompasses threat prevention, detection and elimination.
Tags : smart control, power generation, power industry, empowered operators, optimized assets, future of automation, reliability, safety
     Schneider Electric
By: Rackspace     Published Date: Sep 04, 2019
In this hands-on guide, our AWS Amazing Minds share advice on how to navigate and optimise your cloud journey on AWS, tackling the 9 most common questions around upskilling on AWS, automation, DevSecOps, customised cloud and more. Our customers were the catalyst for creating the Amazing Minds series. Independent research combined with insights from our day-to-day business interactions, told us unequivocally that they wanted to be part of the journey. We also know that a secure and high-performing cloud journey is at its best when it’s a shared experience. Download the guide to see how you can achieve how performance outcomes on AWS, and save time and money whilst doing so.
Tags : 
     Rackspace
By: Infinidat EMEA     Published Date: Oct 10, 2019
La transformación digital está provocando un crecimiento exponencial en el almacenamiento de datos empresarial. Se necesita un enfoque totalmente nuevo para crear y escalar la infraestructura del almacenamiento.
Tags : 
     Infinidat EMEA
By: Cisco Umbrella EMEA     Published Date: Oct 12, 2018
Why Cisco Umbrella is the simplest decision you can make to improve your company’s security. You have to make some serious security decisions when you’re an IT leader. That’s because both the volume and sophistication of attacks are intensifying relentlessly — and it’s clear that conventional defenses alone are no longer adequate. More effective blocking of attackers is particularly important because under-the-radar attacks are wreaking havoc on enterprises that rely on antivirus products, firewalls, and sandboxing alone. Umbrella is a proven service provider whose security services are completely nondisruptive. Download this whitepaper to find out more.
Tags : 
     Cisco Umbrella EMEA
By: Cisco Umbrella EMEA     Published Date: Dec 03, 2018
Why Cisco Umbrella is the simplest decision you can make to improve your company’s security. You have to make some serious security decisions when you’re an IT leader. That’s because both the volume and sophistication of attacks are intensifying relentlessly — and it’s clear that conventional defenses alone are no longer adequate. More efective blocking of attackers is particularly important because under-the-radar attacks are wreaking havoc on enterprises that rely on antivirus products, frewalls, and sandboxing alone. A mere 30 minutes from now, any business can be more secure than it was before. That’s the simple reality of DNS-layer security.
Tags : 
     Cisco Umbrella EMEA
By: Oracle     Published Date: Mar 28, 2017
For the hospitality industry, it’s an important question that needs unequivocal answers. After all, millennials, comprising individuals born between 1981 and the late 1990s, now represent the largest generational demographic in the U.S. With a population of 83 million, they outnumber baby boomers and Generation Xers, and wield enormous spending clout – an estimated $200 billion annually. A hefty share of that pie is earmarked for hospitality: 77% of U.S. millennials say they visit a restaurant once a week or more, and each millennial is projected to spend an average of $3,900 on travel this year.*
Tags : millennials, hospitality, restaurant, food, service, oracle
     Oracle
By: Bazaarvoice     Published Date: Oct 15, 2012
Our survey of 100 members of The CMO Club reveals most CMOs gather insights from first-person, always-on online consumer conversations, and share them across their organizations, to power more than just marketing.
Tags : bazaar voice, social marketing, social data, research, social data, marketing data, consumer awareness
     Bazaarvoice
By: Avocent     Published Date: Aug 22, 2011
By enabling services for controlling access to the infrastructure and monitoring for activity, management decisions can be made to improve data center services.
Tags : avocent, data center services, infrastructure, ema, data center operations control, controlled data center infrastructure, data center
     Avocent
By: Vocia     Published Date: Aug 24, 2011
Day-to-day operations of public venues are increasingly complex. Examine common requirements and functions of a successful critical paging solution-whether for a hospital, shopping center or sports arena.
Tags : vocia, critical paging systems, paging solutions, public venues, communication system technologies, outputs, inputs, amplifiers
     Vocia
By: Vocia     Published Date: Aug 24, 2011
Traditional overhead paging technology has evolved into advanced network-based paging systems. Examine industry trends that drive the need for a future-proof, critical paging system for today's healthcare facilities.
Tags : vocia, hospital sound systems, hospital paging systems, network-based paging, hcfm, network media systems, hospital paging infrastructure, biamp systems
     Vocia
By: Esker     Published Date: Jun 29, 2016
Automation is widely used in the business world. Still, the concept of order processing automation remains a bit of an enigma - even among those who already know a thing or two about it. That's why it's critical to give yourself a refresher before driving the project forward and getting stakeholders on board. This eBook highlights the six key stakeholders in order management that need to be challenged to go beyond the status quo. Automation aligns with their priorities - it's your job to deliver that message. Download this eBook now to learn more about the key roles in an order processing automation project.
Tags : best practices, business optimization, business management, productivity, business process
     Esker
By: EngageSciences     Published Date: Nov 04, 2014
Discover the latest research on the fundamental impact UGC is having on brands, and how it can drive audience acquisition, boost engagement and optimise commerce.
Tags : user generated content, ugc, advocacy marketing, content aggregation, content curation, social commerce, social media marketing, the power of user generated content
     EngageSciences
By: EngageSciences     Published Date: Nov 04, 2014
This infographic illustrates the power of the user generated content and the 4 main ways this can work for your brand.
Tags : user generated content, ugc, advocacy marketing, content aggregation, content curation, social commerce, social media marketing, the power of user generated content
     EngageSciences
By: SAP     Published Date: Nov 04, 2015
Download this eBook to learn more about these 6 strategies to simplify retail marketing: 1. Collect, consolidate, and analyze data 2. Integrate marketing and merchandising 3. Offer a consistent omnichannel experience 4. Deliver real-time, personalized customer engagements 5. Measuring marketing ROI 6. Stimulate loyalty and advocacy
Tags : retail marketing, sap, data analytics, merchandising, omnichannel experience, customer engagement, roi, customer loyalty
     SAP
By: FICO     Published Date: Jun 07, 2016
As IT departments’ lists of backlogged application development projects keep growing, so does the speed of new development requests from line-of-business personnel. For many IT departments, the speed of business — the speed of requests for additional developments — can’t be met under current practices. This inability to keep pace with critical development requests, supporting timely strategy modifications, seriously impacts an enterprise’s profitability. The solution FICO advocates — one that accounts for budget constraints, legacy operational realities and quality assurance — is to empower line-of-business personnel as Citizen Developers, giving them the right set of technology assets to quickly, safely and cost effectively participate in application development.
Tags : 
     FICO
By: CA Technologies EMEA     Published Date: Aug 24, 2017
Las cuentas de usuario con privilegios, ya se usurpen, sean objeto de abuso o, simplemente, se usen de forma incorrecta, se encuentran en el corazón de la mayoría de las infracciones relativas a datos. Los equipos de seguridad evalúan, cada vez más, soluciones de gestión de accesos con privilegios (PAM) completas para evitar el perjuicio que podría provocar un usuario malintencionado con privilegios altos o un usuario con privilegios que está cansado, estresado o que, sencillamente, comete un error. La presión que ejercen los ejecutivos y los equipos de auditoría para reducir la exposición de la empresa aseguran el esfuerzo, pero las soluciones de PAM completas pueden acarrear costes ocultos, según la estrategia de implementación adoptada.
Tags : almacen de contrasenas, monitorizacion de contrasenas, entornos hibridos
     CA Technologies EMEA
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12    Next    End
Search White Papers      

Add White Papers

Get your white papers featured in the Energy Efficiency Markets White Paper Library contact: Kevin@EnergyEfficiencyMarkets.com