blu

Results 1 - 25 of 455Sort Results By: Published Date | Title | Company Name
By: Mimecast     Published Date: Nov 14, 2018
Mike Rothman, President and Analyst at Securosis, and author of The Pragmatic CSO, conducted this study, which breaks down how companies can most effectively change employee security behavior and lower risk. If you want a blueprint for developing an effective program, this is a great place to start.
Tags : 
     Mimecast
By: Bluecore     Published Date: Oct 23, 2018
If you’re not one of those retailers, you’re likely busy playing catch-up to them – and that’s not a position in which anyone wants to be. Since eCommerce began, a small handful of leaders have set the pace. They’ve innovated quickly and delivered incredibly valuable and convenient shopping experiences. And in doing so, they shaped consumer expectations. Take Amazon. Over a decade ago, the online giant seemingly rewrote the natural laws of retail by managing to deliver more, better, faster – all with unmatched accuracy and ease. Now, consumers expect an Amazon-like experience everywhere they shop, and anything else feels subpar.
Tags : email, personalization, retailer, shopping, consumer, bluecore
     Bluecore
By: Bluecore     Published Date: Oct 23, 2018
AFTER DECADES IN THE LIMELIGHT, email remains the most powerful channel for eCommerce marketers. And this success continues even as many eCommerce marketing teams rely heavily on batch and blast emails that go to their entire list without any customization. While such efforts clearly bring in revenue, they also leave money — a lot of money — on the table. Recognizing that largely untapped opportunity, top eCommerce marketers have started to take a more strategic approach to email. In addition to traditional batch and blast campaigns, these marketers now tailor messages based on both their customers’ behaviors and changes to their product data in order to send more customized and timely messages.
Tags : bluecore, retail, email, report, ecommerce, marketing
     Bluecore
By: Bluecore     Published Date: Nov 13, 2018
DON’T LET ONE-TIME BUYERS BECOME ONLY-TIME BUYERS One-time buyers are retail gold: They present an incremental revenue stream and a chance to foster valuable new customer relationships. But while that first purchase is an achievement and the mark of a strong customer acquisition program, what comes after that first purchase is just as important. And for most retailers, it’s what comes after that presents the biggest problem.
Tags : consumer, buyers, customer, one, time, revenue
     Bluecore
By: Mitutoyo     Published Date: Aug 24, 2018
Today’s factory intelligence is the collaborative orchestration of people and machines. By blending intelligence from multiple sources, factories are truly becoming smarter. But it’s not just about the machines. Rather, people are improving machines through a true partnership that turns human experience into smarter machines. This shift marks a re?orientation to a thought process that’s more natural to people. After decades of working with 2D blueprints, designs and dimensioned drawings, factory intelligence leverages 3D models that are easier for people to comprehend and use. Plus, many people find more satisfaction in intelligent factory work that challenges them to manage relationships among machines, rather than repeatedly working on a single piece in a line. In smarter factories, people direct machines to adjust for shifting customer requirements and market demands.
Tags : factory intelligence, 3d models, market demands, model-based enterprise, supply chain, precision metrology, cmm
     Mitutoyo
By: Cisco Umbrella EMEA     Published Date: Dec 03, 2018
What is ransomware? Ransomware is a malicious software designed to hold a user’s files (such as healthcare records, financial contracts, manufacturing blueprints, software code, and other documents) for ransom by encrypting them and demanding the user pay a fee (often in Bitcoin) to decrypt them. How ransomware works Attackers initiate attacks using an array of tactics. Ransomware infections often first begin with an exploit kit — which are software kits designed to identify software vulnerabilities on endpoints and then upload and execute malicious code on the endpoint. Although variants of ransomware behave differently — there are many ways that Cisco can help. Download this whitepaper today to find out more.
Tags : 
     Cisco Umbrella EMEA
By: Excellus BlueCross BlueShield     Published Date: Sep 20, 2018
When employees don’t understand their high deductible health plans (HDHPs), they’re less likely to use them. Educate your team with this.
Tags : high deductible health plan, voluntary benefits, benefits administration, benefits management, pharmaceuticals, pharmacy/prescriptions, customer satisfaction, pharmacy benefits manager, pharmacy benefits management, pbm solutions
     Excellus BlueCross BlueShield
By: Excellus BlueCross BlueShield     Published Date: Oct 17, 2018
When it comes to protecting yourself against breast cancer, knowledge is power. This toolkit covers everything from warning signs and the importance of early detection to what you can expect during a mammogram.
Tags : breast cancer, breast cancer awareness, healthcare, health benefits, health, health plans, excellus bcbs, excellus, employee benefits, health insurance, mammograms, cancer screenings, early detection, women’s health, self-examination
     Excellus BlueCross BlueShield
By: Bluewater Learning     Published Date: Apr 09, 2018
As great as Cornerstone OnDemand is, anyone could use a little help solving more of their learning and talent management challenges. With the right partner, you can achieve greater business results with Cornerstone almost immediately.
Tags : bluewater, bluewater assurance, cornerstone ondemand support, cornerstone ondemand administration, cornerstone ondemand assurance, cornerstone ondemand reporting, cornerstone ondemand ux workflows, cornerstone ondemand content, cornerstone ondemand data, cornerstone ondemand technology, cornerstone ondemand process, cornerstone ondemand
     Bluewater Learning
By: Bluewater Learning     Published Date: Nov 02, 2018
Would you like to make better-informed decisions about where to invest your time & resources? Are you interested in gaining more insight into what is working, what isn't, & why? There is a movement towards advanced & predictive analytics in the Learning & Talent Management space. But what does that really mean? Bluewater's team of consultants & developers can help you define what analytics means for your company.
Tags : 
     Bluewater Learning
By: MuleSoft     Published Date: Nov 27, 2018
IT teams across industries face growing pressure to deliver projects faster while reducing costs. All too often, dated legacy systems hinder IT’s ability to accomplish either of these objectives. Legacy systems can also slow the speed at which IT can deliver new projects to support the business. For these reasons, legacy modernization has emerged as a key strategic imperative. But where should organizations start? One large global bank provides a detailed blueprint for how large enterprises can do so. Read this legacy modernization blueprint to learn: The bank’s legacy modernization strategy, and how they used Anypoint Platform Best practices for modernizing legacy SOA web services How to think about re-architecting monolithic applications into microservices The role that APIs play in driving an effective legacy modernization strategy
Tags : 
     MuleSoft
By: Cantaloupe     Published Date: Mar 30, 2010
The hype about video search has just begun which means lots of questions, lots of new experts, and not enough time to sort through it all. This new whitepaper "An Effective Video SEO Strategy in Three Phases" will give you the blueprint for getting started and beyond. Learn all about: the 2 things you should be doing right now to improve your video search engine optimization; widespread myths about what works and what doesn't; Advanced tips for even greater results and more!
Tags : cantaloupe, online video, social media, search, communication, facebook, twitter, seo, engagement
     Cantaloupe
By: SAS     Published Date: Aug 28, 2018
Despite heavy, long-term investments in data management, data problems at many organizations continue to grow. One reason is that data has traditionally been perceived as just one aspect of a technology project; it has not been treated as a corporate asset. Consequently, the belief was that traditional application and database planning efforts were sufficient to address ongoing data issues. As our corporate data stores have grown in both size and subject area diversity, it has become clear that a strategy to address data is necessary. Yet some still struggle with the idea that corporate data needs a comprehensive strategy. There’s no shortage of blue-sky thinking when it comes to organizations’ strategic plans and road maps. To many, such efforts are just a novelty. Indeed, organizations’ strategic plans often generate very few tangible results for organizations – only lots of meetings and documentation. A successful plan, on the other hand, will identify realistic goals along with a r
Tags : 
     SAS
By: SAS     Published Date: Aug 28, 2018
Starting data governance initiatives can seem a bit daunting. You’re establishing strategies and policies for data assets. And, you’re committing the organization to treat data as a corporate asset, on par with its buildings, its supply chain, its employees or its intellectual property. However, as Jill Dyché and Evan Levy have noted, data governance is a combination of strategy and execution. It’s an approach that requires one to be both holistic and pragmatic: • Holistic. All aspects of data usage and maintenance are taken into account in establishing the vision. • Pragmatic. Political challenges and cross-departmental struggles are part of the equation. So, the tactical deployment must be delivered in phases to provide quick “wins” and avert organizational fatigue from a larger, more monolithic exercise. To accomplish this, data governance must touch all internal and external IT systems and establish decision-making mechanisms that transcend organizational silos. And, it must provi
Tags : 
     SAS
By: Levene Strategies     Published Date: Oct 25, 2011
Writing effective Federal proposals is a necessary component of doing business with the Government. Learn how to avoid several common mistakes.
Tags : 
     Levene Strategies
By: Entrust Datacard     Published Date: Aug 10, 2016
Consolidate SSL providers and processes, without interruption, using Entrust SSL management and monitoring services This whitepaper provides a blueprint for migrating to Entrust SSL certificates and related services. It’s based on experiences that help many customers, in a wide variety of environments, bring their SSL certificate management under centralized administration.
Tags : 
     Entrust Datacard
By: Red Hat     Published Date: Sep 09, 2018
As applications and services become more central to business strategy, and as distributed methodologies like agile and DevOps change the way teams operate, it is critical for IT leaders to find a way to integrate their backend systems, legacy systems, and teams in an agile, adaptable way. This e-book details an architecture called agile integration, consisting of three technology pillars—distributed integration, containers, and APIs—to deliver flexibility, scalability, and reusability.
Tags : 
     Red Hat
By: Cisco EMEA     Published Date: Nov 13, 2017
As BluePearl’s business continues to grow and its strategy evolves, its investment in Cisco® technology is protected. When BluePearl moves to a centralized data center in the near future, all Cisco HyperFlex nodes can still be managed as one integrated infrastructure.
Tags : data management, cisco, hyperflex, converged, platform, management, infrastructure
     Cisco EMEA
By: Hewlett Packard Enterprise     Published Date: Mar 26, 2018
Modern storage arrays can’t compete on price without a range of data reduction technologies that help reduce the overall total cost of ownership of external storage. Unfortunately, there is no one single data reduction technology that fits all data types and we see savings being made with both data deduplication and compression, depending on the workload. Typically, OLTP-type data (databases) work well with compression and can achieve between 2:1 and 3:1 reduction, depending on the data itself. Deduplication works well with large volumes of repeated data like virtual machines or virtual desktops, where many instances or images are based off a similar “gold” master.
Tags : 
     Hewlett Packard Enterprise
By: Cisco     Published Date: Nov 17, 2015
IoT describes a system where items in the physical world, and sensors within or attached to these items, are connected to the Internet via wireless and wired Internet connections. These sensors can use various types of local area connections such as RFID, NFC, Wi-Fi, Bluetooth, and Zigbee. Sensors can also have wide area connectivity such as GSM, GPRS, 3G, and LTE.
Tags : iot, internet of things, data management, business efficiency, manufacturing process, customer satisfaction, business intelligence, automation, security
     Cisco
By: SAS     Published Date: Jan 17, 2018
The Connected Customer is an individual who is intimately connected to the data, outcomes, decisions, and staff associated with any relationship to an organization. This intensely personal connection is not just a matter of the most recent transaction, but represents a combination of connected data, connected analytics, and collaborative decisions associated with improving the customer’s relationship with the organization over time. In this report, Blue Hill explores the key traits associated with supporting the Connected Customer through the Internet of Things, and provides guidance on why the Internet of Things will be essential across the general business landscape.
Tags : 
     SAS
By: Adobe     Published Date: Aug 30, 2017
According to a recent study, “76 percent of marketers said marketing had changed more in the last two years than in the previous fifty.”1 From apps like Uber and Airbnb that reengineer entire markets to mobile, omnichannel commerce, virtual reality, and the Internet of Things, marketing is being built anew.
Tags : 
     Adobe
By: Adobe     Published Date: Mar 26, 2018
According to a recent study, “76 percent of marketers said marketing had changed more in the last two years than in the previous fifty.”1 From apps like Uber and Airbnb that reengineer entire markets to mobile, omnichannel commerce, virtual reality, and the Internet of Things, marketing is being built anew.
Tags : 
     Adobe
By: SAS     Published Date: Oct 22, 2015
The Internet of Things (IoT) presents an opportunity to collect real-time information about every physical operation of a business. From the temperature of equipment to the performance of a fleet of wind turbines, IoT sensors can deliver this information in real time. There is tremendous opportunity for those businesses that can convert raw IoT data into business insights, and the key to doing so lies within effective data analytics. To research the current state of IoT analytics, Blue Hill Research conducted deep qualitative interviews with three organizations that invested significant time and resources into their own IoT analytics initiatives. By distilling key themes and lessons learned from peer organizations, Blue Hill Research offers our analysis so that business decision makers can ultimately make informed investment decisions about the future of their IoT analytics projects.
Tags : 
     SAS
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search White Papers      

Add White Papers

Get your white papers featured in the insideBIGDATA White Paper Library contact: Kevin@insideHPC.com