Whitepapers & Resources
 

Access in depth analysis and the latest research with white papers from leading construction & development companies. Click a featured white paper, search by keyword or explore a specific topic.

mapping

Results 1 - 25 of 104Sort Results By: Published Date | Title | Company Name
Published By: ServiceNow     Published Date: May 15, 2018
A comprehensive service visibility strategy with automated infrastructure discovery and service mapping gives a clear view into business-critical services. Quickly locate potential problems before downtime happens. Learn best practices to develop your service visibility framework. Read this eBook.
Tags : 
    
ServiceNow
Published By: ServiceNow     Published Date: May 15, 2018
Increase service visibility and improve your service delivery by efficiently mapping IT infrastructure to business-critical services. Shine a spotlight on IT issues that threaten your business services. Read this eBook and learn how to transform the way you solve IT service delivery issues today.
Tags : 
    
ServiceNow
Published By: Moxie     Published Date: Feb 08, 2018
[Template] Achieve your goals by successfully mapping common sources of customer struggle to the right engagement opportunities. With ever changing customer expectations and behaviors in the new Guided Economy, Crate and Barrel decided to build a competitive advantage to improve customer experience, engagement, and acquisition across mobile and desktop shoppers. By mapping struggle to engagements, digital channels are used to help shoppers select the right products, complete orders, or process payment transactions in a PCI-compliant environment.
Tags : 
customer, opportunities, engagement, planner, digital, templates
    
Moxie
Published By: Oracle Dyn     Published Date: Dec 06, 2017
Every user’s first interaction with your website begins with a series of DNS queries. The Domain Name System (DNS) is a distributed internet database that maps human-readable names to IP addresses, ensuring users reach the correct website when entering a URL. DNS mappings are maintained in special-purpose servers called DNS nameservers. When a user enters your company’s URL, a DNS query is routed to a DNS nameserver containing the address mappings for your company’s internet domain.
Tags : 
traffic, dns, internet, visibility, programming, interfaces, optimization, routing
    
Oracle Dyn
Published By: Oracle     Published Date: Nov 30, 2017
Every user’s first interaction with your website begins with a series of DNS queries. The Domain Name System (DNS) is a distributed internet database that maps human-readable names to IP addresses, ensuring users reach the correct website when entering a URL. DNS mappings are maintained in special-purpose servers called DNS nameservers. When a user enters your company’s URL, a DNS query is routed to a DNS nameserver containing the address mappings for your company’s internet domain.
Tags : 
traffic, dns, internet, visibility, programming, interfaces, optimization, routing
    
Oracle
Published By: Singularity University     Published Date: Oct 20, 2017
Technologies are accelerating at an exponential rate, yet most organizational structures and processes remain stubbornly linear. Yesterday’s best practices are no longer sufficient to succeed in today's fast-paced, tech-driven, disruptive world. Instead, new mindsets and skill sets are required for leaders to envision the future and stay ahead of competitors.
Tags : 
    
Singularity University
Published By: Oracle     Published Date: Jul 05, 2017
Every user’s first interaction with your website begins with a series of DNS queries. The Domain Name System (DNS) is a distributed internet database that maps human-readable names to IP addresses, ensuring users reach the correct website when entering a URL. DNS mappings are maintained in special-purpose servers called DNS nameservers. When a user enters your company’s URL, a DNS query is routed to a DNS nameserver containing the address mappings for your company’s internet domain.
Tags : 
advanced traffic steering, global internet visibility, open programming interfaces, risk management tools, secondary dns
    
Oracle
Published By: Staples Business Advantage     Published Date: Jun 01, 2017
Where IT departments were once considered a cost of doing business, today's data center is part of the strategic planning that drives the company forward and increases return for stakeholders. Creating a roadmap for your IT strategy and infrastructure requires careful planning, along with a thorough evaluation of your current state and a detailed view of what you wish to accomplish. Read this white paper to get the big picture of what is necessary to create the best cooperative experience for your data center, office operations, and end users.
Tags : 
staples business advantage, it strategy, it infrastructure
    
Staples Business Advantage
Published By: Puppet     Published Date: Mar 09, 2017
DevOps cuts deep and wide through industries, company sizes, and technology environments. Yet, DevOps is never done — it’s about continual learning and improvement rather than an end state. Puppet is here to help. We draw on the success stories and lessons learned at organizations that are already driving improved performance and better business outcomes with their DevOps initiatives. This handbook captures five essential phases for mapping out a DevOps journey: 1. Build the business case for DevOps. 2. Address the biggest challenges to DevOps success. 3. Develop a performance-driven team structure. 4. Choose the right Tools and processes. 5. Plan your key implementation phases.
Tags : 
    
Puppet
Published By: LeadGenius     Published Date: Dec 22, 2016
To hit your revenue goals, you need to know your lead targets. In this short whiteboard video, Anand Kulkarni, Co-Founder of LeadGenius, shows marketing and sales leaders how to maximize pipeline predictability by backing out of their revenue goals.
Tags : 
decision making panel, org chart, b2b sales, mapping accounts, target account mapping, sales strategy, buyer personas, target accounts, account based marketing, abm, account based sales development, account mapping, marketing operations, sales operations, marketing strategy
    
LeadGenius
Published By: Crownpeak     Published Date: Jul 21, 2016
This Ultimate Guide to Mapping the Buyer's Journey will show you how to: - Identify and develop customer personas specific to your business - Map your buyer's journey from consideration to purchase based on persona - Create content based on every stage of the buyer's journey - Effectively reach customers by aligning your content with their needs
Tags : 
crownpeak, marketer, buyer's journey, customer reach, marketing, consumer behavior, customer reach, content marketing, personas, customer experience, digital strategy, crm & customer care, marketing research
    
Crownpeak
Published By: Citrix Systems     Published Date: Feb 10, 2016
Empirical data from individual Product Analysis Reports (PARs) and Comparative Analysis Reports (CARs) is used to create the unique Security Value Map™ (SVM). The SVM illustrates the relative value of security investment options by mapping security effectiveness and value (TCO per protected - connections per second (CPS)) of tested product configurations. The SVM provides an aggregated view of the detailed findings from NSS Labs’ group tests. Individual PARs are available for every product tested. CARs provide detailed comparisons across all tested products in the areas of: ? Security ? Performance ? Total cost of ownership (TCO)
Tags : 
    
Citrix Systems
Published By: Citrix Systems     Published Date: Feb 10, 2016
Empirical data from our individual Product Analysis Reports (PARs) and Comparative Analysis Reports (CARs) is used to create the unique Security Value MapTM (SVM). The SVM provides a quick, clear overview of the relative value of security investment options by mapping security effectiveness and value (TCO per protected-CPS) of tested product configurations.
Tags : 
    
Citrix Systems
Published By: Citrix Systems, Inc.     Published Date: Jan 19, 2016
The SVM illustrates the relative value of security investment options by mapping security effectiveness and value of tested product configurations. The SVM provides an aggregated view of the detailed findings from NSS Labs’ group tests.
Tags : 
citrix, firewall, security, svm
    
Citrix Systems, Inc.
Published By: Citrix Systems, Inc.     Published Date: Jan 19, 2016
The SVM provides a quick, clear overview of the relative value of security investment options by mapping security effectiveness and value of tested product configurations.
Tags : 
citrix, waf, firewall, tco, security
    
Citrix Systems, Inc.
Published By: Cisco     Published Date: Jan 08, 2016
The SVM provides a quick, clear overview of the relative value of security investment options by mapping security effectiveness and value (TCO per protected Mbps) of tested product configurations.
Tags : 
cisco, ngfw, security, svm, firewall, protection, leader
    
Cisco
Published By: Meltwater     Published Date: Oct 14, 2015
What can you do to make sure your content gets noticed? While many companies are spending an inordinate amount of time and money crafting and promoting content for prospects and customers, 60% to 70% of this B2B content goes unused. It’s time to explore the nuances of customer motivation and decision-making and find those moments when we can inspire and engage our customers. Download our e-book on mapping content to complex and unpredictable customer journeys, by Douglas Karr, founder of the Marketing Technology Blog.
Tags : 
meltware, content roi, b2b, customer motivation, search marketing, email marketing, marketing research
    
Meltwater
Published By: BMC Software     Published Date: Jul 22, 2015
In this white paper by EMA, you’ll learn how application discovery and dependency mapping can help you: • Meet granular targets for availability, cost, and time-to-revenue for cloud services. • Accelerate mean time to repair (MTTR) while communicating better with stakeholders. • Manage even the most complex hybrid environments more efficiently and effectively. • Understand the impact of proposed changes and potential security risks to guide decision-making.
Tags : 
cloud, hybrid environments, application discovery mapping, application dependency mapping, security risks
    
BMC Software
Published By: Marketo     Published Date: Jul 13, 2015
This ebook goes through tried and true strategies for lean content marketing—so you can extend the value of all your thought leadership.
Tags : 
content marketing, content strategy, collaboration, content creation, content contribution incentives, content planning, content mapping, emerging marketing
    
Marketo
Published By: Skillsoft     Published Date: Jun 25, 2015
This paper takes you step-by-step through the process of addressing your immediate problems, building alliances throughout your organization, and making a successful business case for a learning solution, including: • Analyzing your current processes and identifying your needs • Mapping out the various processes and training requirements • Calculating the financial impact of training • Making the case and managing the project
Tags : 
learning solution, business case, lms, development, learning management strategy
    
Skillsoft
Published By: Nexgate     Published Date: Jun 17, 2015
This report will outline a framework for assigning roles and responsibilities to manage social media risk.
Tags : 
proofpoint, nexgate, social media risk, social media, risk management, compliance
    
Nexgate
Published By: Infomatica     Published Date: May 19, 2015
In this eBook, best-selling author Brian Underdahl explores the fundamentals of data integration and how the latest tools can simplify today’s (and tomorrow’s) data landscape. “Data Integration for Dummies” provides valuable reference if you need to explain data integration to the business, are looking for an alternative to hand-coding data mappings, or simply interested in expanding your knowledge.
Tags : 
data integration, it infrastructure, data sources, data landscape, data mappings
    
Infomatica
Published By: BMC Software     Published Date: May 01, 2015
Complex hybrid environments can make it difficult to track interdependencies, increasing the risk of disrupting critical business services. In this research paper by EMA, you’ll learn how application discovery and dependency mapping can help you: • Meet granular targets for availability, cost, and time-to-revenue for cloud services • Accelerate mean time to repair (MTTR) while communicating better with stakeholders • Manage even the most complex hybrid environments more efficiently and effectively • Understand the impact of proposed changes and potential security risks to guide decision-making
Tags : 
hybrid environments, critical business services, mean time to repair, potential security risks, decision-making, cloud optimization, visibility and performance
    
BMC Software
Published By: NACR     Published Date: Feb 09, 2015
Do you know what the compliance issues are for your organization and the technology solutions you might consider? Download this guide to learn what you need to know.
Tags : 
nacr, compliance, technology, technology solutions, regulations, software compliance – contact center, data security, customer security, hippa, biometrics, wfo, speech analytics, sarbanes-oxley, big data, telecommuting, remote agent, telemarketing, caller id, call recording, predictive dialers
    
NACR
Published By: Cisco     Published Date: Jan 15, 2015
Empirical data from our individual Product Analysis Reports (PARs) and Comparative Analysis Reports (CARs) is used to create the unique Security Value MapTM (SVM). The SVM provides a quick, clear overview of the relative value of security investment options by mapping security effectiveness and value (TCO per protected Mbps) of tested product configurations.
Tags : 
comparitive analysis, datacenter, social, analytics
    
Cisco
Start   Previous   1 2 3 4 5    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.