code

Results 226 - 250 of 498Sort Results By: Published Date | Title | Company Name
By: MemSQL     Published Date: Nov 15, 2017
Data Warehousing in the Age of Artificial Intelligence This Ebook will guide you through building and deploying scalable, production-ready artificial-intelligence applications. Inside, you will find several artificial intelligence use cases, code samples to help you get started, and an outline of high throughput data processing architectures necessary for developing AI applications.
Tags : data warehousing, artificial intelligence, data piplelines
     MemSQL
By: Intouch Insight     Published Date: May 15, 2018
From "actionable insights" to "voice of the employee (VOE)", there are many buzzwords related to customer experience management. This handy 3-page guide will help you decode all of the industry buzzwords. Inside you'll find: • Age of the Customer • CX Action Campaigns • Data Mining • Double-Barreled Question • Key Driver Analysis • Net Promoter Score • Omnichannel • Many more!
Tags : 
     Intouch Insight
By: EverString     Published Date: Jul 27, 2018
You have lots of leads, but finding the right match is getting harder and harder. You know the good leads are out there. They might even be looking for you. The trouble is, those good leads are hidden among so many bad ones. Your sales and marketing teams know this. They’re facing a deluge of data, not all of it reliable, and they’re trying to decode that data using outdated point solutions and imperfect criteria. Which means a lot of time spent running campaigns, initiating conversations and booking meetings that go nowhere. If this were the dating world, we’d be talking about a calendar full of bad first dates. Everyone’s “swiping right,” but no one’s truly matching. No one’s getting a second date. No one’s committing. Something just isn’t working. We can’t help you if you’re dating. But if you’re trying to sell your company’s products and services—well, the game is about to change. Instead of moving through a volume of potential customers as quickly as possible to build pipeline, th
Tags : 
     EverString
By: Zebra Technologies     Published Date: May 02, 2018
Up to 14% of medical records include inaccurate, potentially dangerous patient data as a direct result of failures in patient identification. Often, errors can be attributed to outdated manual processes, such as oral verification or written wristbands, which can impact the standard of care delivered. In this white paper Zebra Technologies outlines the benefits of an automated barcode wristband solution, including insight into: Reducing common Patient ID errors The advantages of automated Patient ID processes over manual The best automated barcoding options
Tags : patient, identification, streamline, hospital, processes, optimization, zebra
     Zebra Technologies
By: Zebra Technologies     Published Date: May 02, 2018
Up to 5% of all hospitalized patients are affected by ADEs. Implementing a comprehensive Barcode Medication Administration (BCMA) program can help, reducing medication errors up to 80%. In this white paper Zebra Technologies uncovers best practices for adopting Barcode Medication Administration, including: The importance of building a multidisciplinary implementation team The role of efficient, well-defined workflows How accurate data management and reporting are essential to ongoing BCMA success
Tags : safety, technology, zebra, medical, administration
     Zebra Technologies
By: SDL Web Content Management Solutions     Published Date: Jul 26, 2010
It's hard to believe, but some enterprises still use custom-coded Web content management (WCM)solutions. However, consumer demands have forced firms to shift from just managing and publishing Web sites to the daunting complexities of multichannel customer engagement, and it has becomeuntenable to build and maintain the required tools. With few exceptions, any firm with a custom-coded WCM platform should begin transitioning to a commercial or open source solution. For some firms,open source products offer the attractions of custom-coding with lesser software development and maintenance burdens.
Tags : wcm, web content management, multichannel, sdl, custom code, engagement, content integration, content management system
     SDL Web Content Management Solutions
By: Smartling     Published Date: Jul 17, 2014
Using Smartling’s robust translation management system and turnkey Global Delivery Network, NiceLabel, a leading developer of barcode and RFID labeling software, has seen a 45% increase in website leads and more than doubled its translation return on investment. In this case study, you’ll learn how NiceLabel used Smartling’s cloud-based solution to simplify, streamline, and accelerate all of its translation projects.
Tags : smartling, website translation, translate website, website internationalization, internationlize website, translate efficiently, efficient translation, global marketing
     Smartling
By: Riverbed     Published Date: Nov 02, 2016
"Performance issues today are compounded by increasingly complex infrastructures that IT teams must contend with when delivering applications. As a result detecting and fixing performance problems is hard. Sluggish end-user transactions may present themselves as being slow due to the code. However, that slowness is often not the root cause, but rather a symptom of an underlying infrastructural issue hidden from view. Examine common, yet elusive application performance problems that reveal themselves only when you look at them from the right vantage point. Get the field guide today!"
Tags : 
     Riverbed
By: Riverbed     Published Date: Nov 02, 2016
In an era of business that demands unrivaled agility, most organizations are stuck on networks that are still hardware-bound, router-heavy, and hard-coded. Fortunately, the software-defined movement is ushering in a whole new way to manage enterprise WANs. Read this white paper from CIO.com and Riverbed to explore the business drivers behind SD-WAN. See what benefits SD-WAN can deliver your organization, and gain some insights into overcoming the potential obstacles of adopting an SD-WAN to unlock its full potential.
Tags : 
     Riverbed
By: MuleSoft     Published Date: Nov 27, 2018
In today’s digitally disrupted economy, organizations across industries face competition at unparalleled heights. As a result, differentiation through business automation has become synonymous with convenience and speed. However, since the technology landscape is changing at an increasing pace, business automation shouldn’t be thought of as a one-time, centralized effort in a discrete process. Rather, organizations should view business automation as a way to decentralize access to systems and enable the broader organization. Download this whitepaper to learn: The value of business automation Why traditional approaches to business automation – such as custom code, implementing standalone solutions, or using point-to-point connections – do not suffice. The benefits of an API-led approach to business automation. How organizations like Wells Fargo, the State of Colorado, Tic:Toc, and Addison Lee achieved business automation success using APIs.
Tags : 
     MuleSoft
By: Panda Security     Published Date: Jan 16, 2008
A new white paper from Panda Security discusses the new breed of silent online threats that can bypass traditional antivirus programs and penetrate even the most highly 'protected' networks.  Additionally, the sheer volume of malware has overwhelmed the antivirus industry as a whole. Collective Intelligence is a new global security model specifically designed to combat the next evolution of malicious code.
Tags : malware, virus, anti-virus, spyware, anti-spyware, anti-malware, bot, botnet
     Panda Security
By: Mocana     Published Date: Jun 18, 2010
Until recently, designing or building a wireless device meant cobbling together whatever security implementations you could find, often with open source and other code that is usually too big and too slow for device environments.
Tags : mocana, nano wireless security, wpa2, device developer, open source code, wireless application software, wireless infrastructure, wireless security
     Mocana
By: Attachmate     Published Date: Feb 05, 2014
Watch this video and find out how easy it can be to make your legacy mainframe applications work with new technologies. Using Attachmate Verastream, you can roll out integrated, fully functional applications tailored to each line of business. They get the modern capabilities they need and you get quick development cycles because you don’t have to change host application code. The demo breaks the process down into some basic steps that will help you breathe new life into your legacy mainframe assets.
Tags : attachmate, verastream, functional applications, development cycle, best practices, legacy applications, legacy systems, legacy modernization
     Attachmate
By: Twilio     Published Date: Aug 21, 2012
Twilio is a cloud communications platform that lets you use standard web languages to build voice, VoIP and SMS applications via a simple web API. Build intelligent communication solutions in the cloud.
Tags : twilio, csc, common short codes, short code marketing, sms marketing
     Twilio
By: Jive Software     Published Date: Dec 02, 2014
Join Jive and Rajat Paharia -- "the father of gamification" -- for a discussion on how to better motivate, engage, and create true loyalty. Jive is digging into the hottest books in the social collaboration space. Join the Jive Book Club for exclusive invites to webinars with the authors, an invite to the Jive Community group to share your thoughts with your peers and the chance to win prizes – you might even learn something new! Their first selection is Loyalty 3.0: How Big Data & Gamification are Revolutionizing Customer & Employee Engagement by Rajat Paharia — the “father of gamification.” Loyalty 3.0 is a Wall Street Journal and New York Times best-seller that cracks the code on the ways big data and gamification can motivate, engage, and create true loyalty your customers, employees, and partners.
Tags : employee engagement, customer engagement, social collaboration, big data
     Jive Software
By: Code42     Published Date: Jul 12, 2017
Read the white paper today to learn how to keep your data on endpoints beyond your network.
Tags : deduplication,  worker productivity,  backup solution,  recover data, data security,  protecting data
     Code42
By: Code42     Published Date: Jul 12, 2017
Read the white paper today to learn more about how OneDrive creates these security issues when used as a backup solution.
Tags : onedrive,  backup solution,  backup,  restore data,  cyber protection, data security,  security issues
     Code42
By: Code42     Published Date: Apr 22, 2016
Rapid changes in technology and software, and the nearly universal shift to electronically stored information (ESI), has made eDiscovery more complex and expensive. In a movement to simplify and standardize their procedures—and dissolve some of the extra tensions surrounding litigation—many organizations are bringing phases of the eDiscovery process in house, in particular legal hold. Among other benefits, Code42 eDiscovery simplifies legal hold management. Litigation preparation can be a large task crossing over many departments, but will consistently feature two main players: Legal and IT. This document focuses on those two groups, and aims to enable one to see the eDiscovery world through the point of view of one group—or the other. Read more to find out the details.
Tags : code 42, legal process, ediscovery, litigation issues, enterprise applications
     Code42
By: Code42     Published Date: Apr 22, 2016
Today, in the age of information, people are paid for their ideas: to create original knowledge products or add value to existing products. Given their self-reliance, it is not surprising that workers take pride in their outputs—up to half of employees take a portfolio of files with them when they leave. When employees move on, many feel entitled to the work they’ve created.They presume it is acceptable to transfer work documents to personal computers, removable media, tablets, smartphones or online file sharing apps. Some pilfered data is innocuous and already in the public realm. But some of it is classified. Read this paper to find out how to collect and secure data to protect operations, reputation and continuity when employees leave.
Tags : data protection, code 42, data security, intellectual property, database security, information management, secure content management
     Code42
By: Code42     Published Date: Apr 22, 2016
The study’s findings highlight discrepancies—between IT departments and end users—in the approach and attitudes toward data protection. The results provide compelling evidence that there is vast room for improvement in securing critical data flowing between the corporate enterprise and endpoint devices. Read this paper to find how to protect your data today.
Tags : datastrophe study, code 42, data protection, data backups, anti spyware, anti virus, application security, authentication
     Code42
By: Code42     Published Date: Apr 22, 2016
Data loss, theft or breach is inevitable, but backup assures recovery, continuity and rapid response. Endpoint data backup is at the core of an enterprise data security strategy. Modern endpoint backup goes well beyond backup and restore, delivering risk reduction across the enterprise and addressing perennial IT and business problems. Discover more by reading this whitepaper.
Tags : endpoint backups, data visability, code 42, data loss, data recovery, backup and recovery, disaster recovery, data protection
     Code42
By: Code42     Published Date: Apr 22, 2016
Read this whitepaper to find out strategic solutions to your data protection issues.
Tags : data protection, data control, code 42, data visibility, encryption, hacker detection, network security appliance, security management
     Code42
By: Code42     Published Date: Apr 22, 2016
Dramatic changes are underway in offices around the world, with Macs rapidly gaining market share in modern enterprises. Read this white paper to discover the industry-wide transitions to Macs, and tips to smooth your integration of Apple devices.
Tags : mac, code 42, apple devices, modern offices, business integration, linux, productivity, project management
     Code42
By: Citrix ShareFile     Published Date: Apr 11, 2017
Do you know why data encryption is important for your accountancy firm? Read this eBook to learn how using advanced encryption allows you to: • Protect your data and reputation while meeting clients’ cybersecurity expectations • Eliminate paperwork and other bothersome or time-consuming processes associated with data storage and sharing • Comply with regulations and ethics codes
Tags : encryption, compliance, data encryption, data protection, regulation compliance, efficiency
     Citrix ShareFile
By: Citrix ShareFile     Published Date: Apr 14, 2017
Do you know why data encryption is important for your accountancy firm? Read this eBook to learn how using advanced encryption allows you to: • Protect your data and reputation while meeting clients’ cybersecurity expectations • Eliminate paperwork and other bothersome or time-consuming processes associated with data storage and sharing • Comply with regulations and ethics codes
Tags : encryption protection, data security, data management, customer protection, data breach, it security, firewall, password protection
     Citrix ShareFile
Start   Previous    3 4 5 6 7 8 9 10 11 12 13 14 15 16 17    Next    End
Search White Papers      

Add White Papers

Get your company's white papers in the hands of targeted business professionals.