fur

Results 1 - 25 of 258Sort Results By: Published Date | Title | Company Name
Published By: Zendesk     Published Date: Jun 29, 2018
Customers are more technically savvy than ever and have come to prefer the DIY approach to solving their issues and answering their own questions. Years of research by ICMI has confirmed that customers prefer to resolve issues themselves and within their channels of choice. Furthermore, customers only seek direct interactions when they unsuccessfully exhaust their self-service options. This is backed up by data from American Express, which found that 48% of consumers prefer to speak with a customer service rep when dealing with complex issues, but only 16% prefer the same contact for simple issues. The goal of this paper is simple: We want to help you build an all-in-one knowledge base, community, and customer portal. All of which can be accomplished with a help center like Zendesk Guide.
Tags : 
    
Zendesk
Published By: Akamai Technologies     Published Date: Jun 14, 2018
"Existing security controls are outmatched — at best static and reactive. Current layers likely aren’t protecting you against all attack vectors, like the vulnerable back door that is recursive DNS. And security mechanisms that frustrate, impede, or disallow legitimate users, devices, or applications will have low adoption rates and/or will curtail productivity. Benign users may even circumvent these processes, further undermining your corporate security posture and creating more gaps in your defense-in- depth strategy. One of the many use cases associated with a zero trust security strategy is protecting your network — and most importantly, your data — from malware. "
Tags : 
dns, rdns, security, zero trust security, malware, data, network security
    
Akamai Technologies
Published By: F5 Networks Inc     Published Date: Aug 16, 2018
As the threat landscape evolves, so must our security controls and countermeasures. Recent research from F5 Labs revealed that applications are the initial targets in the majority of breaches, suggesting that any app can be an attack vector. Cybercriminals are moving their tactics further up the stack using sophisticated application-layer exploits, as well as an emerging wave of automated, bot, and IoTbased threats that are quite capable of evading simple signature or reputation-based detection. Yet, the majority of WAFs on the market today have remained largely unchanged, leaving the applayer exposed, unable to proactively monitor and protect against evolving attack vectors.
Tags : 
threats, applications, cybercriminals
    
F5 Networks Inc
Published By: F5 Networks Inc     Published Date: Sep 14, 2018
As the threat landscape evolves, so must our security controls and countermeasures. Recent research from F5 Labs revealed that applications are the initial targets in the majority of breaches, suggesting that any app can be an attack vector. Cybercriminals are moving their tactics further up the stack using sophisticated application-layer exploits, as well as an emerging wave of automated, bot, and IoTbased threats that are quite capable of evading simple signature or reputation-based detection. Yet, the majority of WAFs on the market today have remained largely unchanged, leaving the applayer exposed, unable to proactively monitor and protect against evolving attack vectors.
Tags : 
    
F5 Networks Inc
Published By: Staples Business Advantage     Published Date: Oct 13, 2016
You go to your office every day. But have you ever looked at your office through your customer’s eyes? What impression do you think it makes? Watch this short video to learn how you can make some basic changes in your office.
Tags : 
office space, furniture, designers, installers, workplace studio
    
Staples Business Advantage
Published By: Genesys     Published Date: Jul 13, 2018
Compare leading contact center infrastructure vendors. In Gartner’s 2018 Magic Quadrant for Contact Center Infrastructure, Worldwide, Genesys has once again maintained a leadership position. Placed furthest among all vendors in completeness of vision for 10 years and counting, our position continues to validate our mission to power the world’s best customer engagement solutions for organizations of all sizes—both in the cloud and on-premises. And according to Gartner peer insights, customers agree. “Great implementation that was on-time and on-budget!” 1 — CTO in the finance industry “Solid platform with a lot of features at a reasonable cost.” 1 — IT Manager of Software Engineering in the Services Industry Get the report now to learn: • How contact center vendors compare and which quadrant they are aligned to • Analyst views on the strengths and cautions of all participating vendors • How to evaluate key criteria to guide your decision-making process 1 Gartner Peer Insights rev
Tags : 
    
Genesys
Published By: Cylance     Published Date: Jul 02, 2018
SE Labs tested CylancePROTECT® in an offline environment against major threats that subsequently appeared in the wild. The test explores the product’s ability to prevent new threats from attacking endpoint systems successfully. CylancePROTECT contains technology designed to identify and block malware using what it claims to be an “artificial intelligence” (AI) model. This model can be updated over time. However, in this test we used the model created in May 2015 and did not permit further updates so that the software was unable to receive new models or edit the existing one. The test exposed systems protected by this older version of CylancePROTECT to very impactful threats discovered and reported widely after May 2015. In this way, the test shows to what extent the product was able to predict how future threats would appear. This “Predictive Advantage” (PA), the advantage that users of the product have against future adversaries, is presented in this report.
Tags : 
malware, predictive, test, response
    
Cylance
Published By: Cylance     Published Date: Aug 22, 2018
Even if one minute a day is lost to productivity drains because of PC horsepower allocation to security scans and remediation, the cost over a year across a medium-sized enterprise adds up quickly. A 10,000 employee operation would face over $10M in direct productivity losses alone. As an early trigger for expensive PC hardware refresh is an onslaught of help desk calls, many companies find that they can actually extend the hardware refresh cycle out another 12–24 months simply by employing a security solution that does not tax the PC as heavily. The indirect costs associated with brand reputation and opportunity losses add untold thousands of dollars per year as well. Further, some institutions under green initiatives monitor power consumption related to security measures favor solutions that use less energy. As such, forward-thinking enterprises are looking beyond the software license fees when evaluating security software alternatives.
Tags : 
system, resource, impact, testing, cylance
    
Cylance
Published By: Zendesk     Published Date: May 21, 2018
Customers are more technically savvy than everand have come to prefer the DIY approach to solving their issues and answering their own questions. Years of research by ICMI has confirmed that customers prefer to resolve issues themselves and within their channels of choice. Furthermore, customers onlyseek direct interactions when they unsuccessfully exhaust their self-service options. This is backed up by data from American Express, which found that 48% of consumers prefer to speak with a customer service rep when dealing with complex issues, but only16% prefer the same contact for simple issues. The goal of this paper is simple: We want to help you build an all-in-one knowledge base, community, and customer portal. All of which can be accomplished with a help center like Zendesk Guide.
Tags : 
    
Zendesk
Published By: Box     Published Date: Jun 22, 2018
• Facing a myriad of challenges from digital transformation, business today are making big bets on the best collaboration tools they need on hand to meet those challenges. From employee buy-in, to machine-learning capabilities, to security, it's important to select a service with the right capabilities to further your business goals. The challenge, however, is that with so many services to choose from it can be difficult to figure out which one is the right fit for your business. • This eBook, 5 Considerations in Choosing a Collaboration Platform in the Digital Age, will walk you through the ins and outs of what to keep in mind as you choose the best collaboration platform for you.
Tags : 
    
Box
Published By: Oracle     Published Date: Nov 28, 2017
Today’s leading-edge organizations differentiate themselves through analytics to further their competitive advantage by extracting value from all their data sources. Other companies are looking to become data-driven through the modernization of their data management deployments. These strategies do include challenges, such as the management of large growing volumes of data. Today’s digital world is already creating data at an explosive rate, and the next wave is on the horizon, driven by the emergence of IoT data sources. The physical data warehouses of the past were great for collecting data from across the enterprise for analysis, but the storage and compute resources needed to support them are not able to keep pace with the explosive growth. In addition, the manual cumbersome task of patch, update, upgrade poses risks to data due to human errors. To reduce risks, costs, complexity, and time to value, many organizations are taking their data warehouses to the cloud. Whether hosted lo
Tags : 
    
Oracle
Published By: Oracle     Published Date: Jan 08, 2018
In the age of the customer, businesses realize the need to take their big data insights further than they have before, in order to win, serve, and retain their customers. Today’s modern company has more data than ever before and is now looking to derive insights from the data that will help propel it forward. As firms move data analytics to the cloud, there is a new set of challenges and barriers to overcome, but with the help of insights-platforms-as-a-service, companies will be able to innovate with data and drive business forward.
Tags : 
    
Oracle
Published By: Cherwell Software     Published Date: Apr 07, 2016
Cherwell Service Management™ software empowers IT organizations to easily manage their infrastructure at a fraction of the cost and complexity associated with traditional, legacy IT service management software. Designed with a metadata-driven approach, the Cherwell Service Management platform can easily be configured to meet process and integration requirements without writing or touching a single line of code. Furthermore, configurations will never break during version upgrades.
Tags : 
best practices, customer support, business intelligence, business optimization
    
Cherwell Software
Published By: Commvault     Published Date: Jul 06, 2016
Forget about the complex task of building your own solution. Commvault offers a portfolio of integrated backup appliances that allow you to go from power-up to backup in less than an hour. Each appliance combines Commvault’s industry-leading software with pre-configured and optimized hardware, including an option that uses NetApp’s category-leading NetApp E-Series storage system. To further simplify ordering and deployment, the appliances include a licensing option aligned to the usable storage capacity (e.g., 36TB of NetApp E-Series storage includes 36TB of Commvault back-end terabyte licensing). Or you can purchase the hardware separately and use it with Commvault’s traditional front-end terabyte capacity licensing. Either way, Commvault serves as the single point of contact for software and hardware support issues, and the installation wizard allows you to be up and running quickly regardless of the option you choose.
Tags : 
commvault, backup appliances, netapp e-series, backup, industry leading software, netapp, turnkey solution, converged
    
Commvault
Published By: Cisco     Published Date: Jun 21, 2016
Imagine you manage a warehouse for a small shipping firm. You have a simple job: route packages. But your employer expands to 25 western cities and 50 locations. After further expansion you now need to track packages coming by truck, rail, and plane and route them based on contents and weight to 10,000 different locations worldwide. While keeping traffic in and out tightly secured, making sure each package reaches its destination on time, and without going over budget.
Tags : 
    
Cisco
Published By: Schneider Electric     Published Date: Feb 08, 2018
This paper contrasts the features of medium voltage fixed circuit breaker switchgear (FCBS) and existing withdrawable circuit breaker switgear (WCBS) designs. Modern FCBS design elements that are discussed include an internal disconnect for isolation and grounding of circuits and interlocked operation among disconnect, breaker, and grounding switch for improved safety. Furthermore, features such as lower maintenance, smaller footprint, and reduced life cycle costs that result from its simpler design will be explored. By comparing the traditional ANSI WCBS technology to that of the FCBS, this paper will demonstrate that the fixed design, which has gained widespread acceptance in global markets outside the United States, is a viable alternative to the withdrawable designs.
Tags : 
fixed circuit breaker, withdrawable circuit breaker, medium voltage, switchgear, arc flash, air insulated switchgear, gas insulated switchgear, ansi
    
Schneider Electric
Published By: Schneider Electric     Published Date: Feb 26, 2018
This on demand webinar contrasts the features of medium voltage fixed circuit breaker switchgear (FCBS) and existing withdrawable circuit breaker switgear (WCBS) designs. Modern FCBS design elements that are discussed include an internal disconnect for isolation and grounding of circuits and interlocked operation among disconnect, breaker, and grounding switch for improved safety. Furthermore, features such as lower maintenance, smaller footprint, and reduced life cycle costs that result from its simpler design will be explored. By comparing the traditional ANSI WCBS technology to that of the FCBS, this paper will demonstrate that the fixed design, which has gained widespread acceptance in global markets outside the United States, is a viable alternative to the withdrawable designs.
Tags : 
fixed circuit breaker, withdrawable circuit breaker, medium voltage, switchgear, arc flash, air insulated switchgear, gas insulated switchgear, ansi
    
Schneider Electric
Published By: SAS     Published Date: Jan 17, 2018
It’s a social world and the majority of organizations today use Microsoft Office as their chosen office productivity suite. So it’s important to deliver insights where people are working most. This paper shows how you can use results produced by SAS Visual Analytics with Microsoft Office applications – Outlook, Excel, Word, PowerPoint and SharePoint. With plenty of how-to specifics, you’ll see how easy it is to combine analytic visualizations and reports with Microsoft products to share insights, improve collaboration and drive further adoption of analytics across your organization.
Tags : 
    
SAS
Published By: FICO     Published Date: May 11, 2017
Competing in telecommunications markets is becoming extremely complicated. Responding to disruptive change from many directions, telecom companies are experimenting with new business models and offering new types of services. With this comes the potential to draw new waves of regulatory oversight, further complicating the picture.
Tags : 
customer experience, customer management, telecom, customers, finance
    
FICO
Published By: Symantec     Published Date: Aug 15, 2017
Stay ahead of the evolving threats. Organized crime is driving the rapid growth and sophisticated evolution of advanced threats that put entire website ecosystems at risk, and no organization is safe. The stealthy nature of these threats gives cybercriminals the time to go deeper into website environments, very often with severe consequences. The longer the time before detection and resolution, the more damage is inflicted. The risk and size of fines, lawsuits, reparation costs, damaged reputation, loss of operations, loss of sales, and loss of customers pile up higher and higher. The complexity of website security management and lack of visibility across website ecosystems is further impacted by the fact that it is nearly impossible to know how and where to allocate resources. Website security must be evolved in line with these growing threats and challenges.
Tags : 
    
Symantec
Published By: Oracle CX     Published Date: Oct 19, 2017
Business Enterprises today need to become more agile, meet new and increasing workload and security requirements, while reducing overall IT cost and risk. To meet these requirements many companies are turning to cloud computing. To remain competitive companies need to formulate a strategy that can easily move them from traditional on-premises IT to private or public clouds. A complete cloud strategy will likely include both private and public clouds because some applications and data might not be able to move to a public cloud. Moving to the cloud should not create information silos but should improve data sharing. Any cloud strategy should make sure that it is possible to integrate on-premises, private cloud and public cloud data and applications. Furthermore, any on-premises cloud deployments must be able to easily migrate to public cloud in the future
Tags : 
    
Oracle CX
Published By: Oracle CX     Published Date: Oct 19, 2017
Business Enterprises today need to become more agile, meet new and increasing workload and security requirements, while reducing overall IT cost and risk. To meet these requirements many companies are turning to cloud computing. To remain competitive companies need to formulate a strategy that can easily move them from traditional on-premises IT to private or public clouds. A complete cloud strategy will likely include both private and public clouds because some applications and data might not be able to move to a public cloud. Moving to the cloud should not create information silos but should improve data sharing. Any cloud strategy should make sure that it is possible to integrate on-premises, private cloud and public cloud data and applications. Furthermore, any on-premises cloud deployments must be able to easily migrate to public cloud in the future.
Tags : 
    
Oracle CX
Published By: SAP EMEA Global     Published Date: Dec 13, 2017
For manufacturers, this IDC white paper examines the current and future Internet of Things (IoT) imperative for the following discrete manufacturing industries: automotive, aerospace and defense, high tech, and industrial machinery. We highlight IoT-enabled scenarios — those possible both now and in an Industry 4.0 future with smart manufacturing. (IDC defines IoT as a network of uniquely identifiable endpoints or “things” that communicate without human interaction using IP connectivity.) These scenarios more tightly integrate “things” with other information, processes, and even value chains. Further, we demonstrate how companies in these industries leverage technology to create business value today and disruptive opportunities tomorrow.
Tags : 
    
SAP EMEA Global
Published By: Dell EMC     Published Date: Aug 23, 2018
“While 3D design tools have been around for a while, the consumerisation of VR is opening-up visualisation options at an unprecedented rate. Visualisation has evolved to a level that allows designers to produce photorealistic images of products in natural environments faster and with more accuracy, enabling even faster time-to-market and allowing customers to experience the product for themselves – and all without real-world prototyping and modelling costs. This guide is designed to give you an overview of the latest developments in visualisation and introduce our new VR Centres of Excellence in Limerick, Cork, Paris, Frankfurt, Dubai, Santa Clara or Austin, where you can experience the benefits for yourself.” Rahul Tikoo Executive Director and General Manager Dell Precision
Tags : 
    
Dell EMC
Published By: Dell EMC     Published Date: Aug 23, 2018
“3D-ontwerphulpmiddelen bestaan al een tijd, maar sinds VR steeds meer zijn weg vindt naar de consumentenmarkt, worden visualisatie-opties met ongekende snelheid beschikbaar. Visualisatie heeft zich ontwikkeld tot een niveau waarop ontwerpers sneller en nauwkeuriger fotorealistische afbeeldingen van producten kunnen maken in natuurlijke omgevingen waardoor producten sneller op de markt kunnen worden gebracht en klanten het product zelf kunnen uitproberen. Dit alles zonder de kosten van prototypes en vormgeving. In deze handleiding krijgt u een overzicht van de nieuwste ontwikkelingen in visualisatie en maakt u kennis met onze nieuwe VR Centres of Excellence in Limerick, Cork, Parijs, Frankfurt, Dubai, Santa Clara en Austin waar u de voordelen van VR zelf kunt ontdekken.” Rahul Tikoo Executive Director en General Manager Dell Precision
Tags : 
    
Dell EMC
Start   Previous   1 2 3 4 5 6 7 8 9 10 11    Next    End
Search Offers      
Get your company's offers in the hands of targeted business professionals.