small business

Results 51 - 75 of 687Sort Results By: Published Date | Title | Company Name
By: BlackBerry Cylance     Published Date: Apr 15, 2019
Artificial intelligence (AI) leads the charge in the current wave of digital transformation underway at many global companies. Organizations large and small are actively expanding their AI footprints as executives try to comprehend more fully what AI is and how they can use it to capitalize on business opportunities by gaining insight to the data they collect that enables them to engage with customers and hone a competitive edge. But, while AI may indeed be the frontier of enterprise technology, there remain many misconceptions about it. Part of the confusion stems from the fact that AI is an umbrella term that covers a range of technologies — including machine learning, computer vision, natural language processing, deep learning, and more — that are in various stages of development and deployment. The use of AI for dynamic pricing and targeted marketing has been in use for a while, but actual AI computing where machines think like humans is still many years from becoming mainstream. T
Tags : 
    
BlackBerry Cylance
By: BlackBerry Cylance     Published Date: Sep 18, 2019
“More than 70 percent of cyber attacks target small businesses," according to National Cyber Security Alliance estimates. That’s not surprising when you consider how many small and medium-sized businesses (SMBs) still rely on legacy AV tools despite their repeated failures to stop modern malware, ransomware, and zero-day attacks. Legacy AV is a lose-lose-lose proposition for SMBs. Attacks get through and cause damage. IT staff struggle to keep up with endless signature file updates from their AV vendors. End-users complain about sluggish system performance during scans and signature file updates. Fortunately, next-generation solutions are now available that protect endpoints with artificial intelligence (AI) rather than signatures. Ready to learn more? Then read the new eSecurity Planet executive brief sponsored by BlackBerry Cylance.
Tags : 
    
BlackBerry Cylance
By: BlackBerry Cylance     Published Date: Sep 18, 2019
“More than 70 percent of cyber attacks target small businesses," according to a National Cyber Security Alliance estimate. Yet 68 percent of small business owners in a recent survey seemed oblivious to the threat. Why the disconnect? What should they be doing to protect their business-critical systems and data? How can small businesses wring maximum value from their cybersecurity investments? Where do AI-based endpoint protection, detection, and response platforms fit into the mix? Read this BlackBerry Cylance sponsored white paper, Small Organizations Still Need Big Security, to find out.
Tags : 
    
BlackBerry Cylance
By: Bluewater Learning     Published Date: Jul 31, 2018
We get it — you are incredibly excited about the potential of your SumTotal solution. And why wouldn’t you be? SumTotal has been around since 1985, longer than almost all the other vendors in the space, and we’ve been building best practices and unique skills that benefit our customers every day. SumTotal customers include a range of Fortune 500 companies, and smaller, high-growth companies spanning nearly 160 ountries. Surveys show that customers like you are mostly happy with SumTotal. But imagine taking SumTotal further. With a little bit of assistance, your SumTotal Learning Management System (LMS) can help you accomplish so much more. As powerful and far-reaching as SumTotal is, anyone could use a little help using it to solve more of their daily learning and talent management challenges. You’re not alone in thinking your SumTotal solution should help you do just that. With the right partner, you can achieve greater business results with SumTotal, removing headaches and hurdles th
Tags : 
    
Bluewater Learning
By: BMC Software     Published Date: Aug 12, 2013
While many companies have begun using external cloud infrastructure services, and a smaller number have embarked on internal “cloud-like” initiatives, others are just starting out and trying to determine how to best use cloud computing. This paper written by BMC’s Deputy CTO Herb VanHook, provides an overview of the major models of cloud infrastructure services (IaaS) and the business benefits and best uses of each model.
Tags : 
cloud, bmc, cloud infrastructure
    
BMC Software
By: Breece Hill, LLC     Published Date: Mar 15, 2007
Once a business clears the financial hurdle and begins to plan their data protection strategy the choices can appear daunting. Do they select tape or disk? Apply differential or incremental backups? How much will a new system cost and how much time will it take to implement? What data should be included in the backup? This article attempts to address these concerns.
Tags : 
smb, storage, archiving, backup, hardware, small business networks, storage, backup and recovery
    
Breece Hill, LLC
By: Brightpearl     Published Date: Nov 19, 2012
If you're a small business selling inventory then you are sure to have come across some of the pitfalls it entails, but getting it right could be more important than you think. Read on to learn the 10 reasons why accurate inventory is important.
Tags : 
brightpearl, accurate inventory, sales stock, low inventory, economic order quantity, eoq
    
Brightpearl
By: Broadcast Beat Magazine     Published Date: Oct 21, 2019
FTP was developed in 1971, and a lot has changed in the decades since it was first created. Though the protocol has seen improvement over the years, there are some fundamental drawbacks to relying on this old technology for transferring today’s large media files. FTP can no longer keep up with the modern global media supply chain. Whether you are a top tier company or a small startup, being in the media business today requires next-generation acceleration software. Read this whitepaper to find out more.
Tags : 
    
Broadcast Beat Magazine
By: Brother     Published Date: Jul 31, 2015
Read this white paper to learn more about key printing trends like device underuse and unbalanced fleets and their SMB impact.
Tags : 
printing trends, brother, multifunction printers, document management systems, productivity, cost savings, small business, medium-sized business
    
Brother
By: Business Advisory Board     Published Date: Jun 12, 2014
Download your FREE Small Business Project Management Software Buying Guide from Business Advisory Board and learn about the different types of project management software out there and how to choose the right product for your business.
Tags : 
business advisory board, business advice, buyer recommendation, project management, project management software, software vendors, software recommendation, it spending
    
Business Advisory Board
By: Business Software     Published Date: Apr 04, 2013
As today’s global marketplace becomes more sophisticated, the number and complexity of mission-critical financial transactions that companies conduct on a day-to-day basis continues to grow exponentially. Even small and mid-sized businesses are plagued by a rapidly increasing volume of financial processes that are highly intricate and multi-faceted. These activities, while important, are administrative in nature and often distract staff from more strategic planning initiatives that directly impact company prosperity and growth. Additionally, as legislative pressures continue to grow, and the rules imposed by Sarbanes Oxley, BASEL II, and other regulations become more stringent, businesses need to find better ways to ensure compliance by effectively logging, tracking, auditing, and reporting their financial data.
Tags : 
various types of business transactions, cost effectiveness, business-software.com, revealed
    
Business Software
By: BuyDomains     Published Date: Nov 27, 2007
Defining an effective Internet and domain name strategy is vital to any business — especially small- or medium-sized businesses which have limited development and promotional budgets. From defining this strategy, to understanding the keys to Web promotion, here is vital information that every entrepreneur should know.
Tags : 
web development, web site, web marketing, buy domains, buydomains
    
BuyDomains
By: CA Technologies EMEA     Published Date: Aug 03, 2017
Today’s DevOps and agile–loving enterprises are striving for fast changes and quick deployments. To these companies, the microservices architecture is a boon, but not a silver bullet. Organizations can enable smaller development teams with more autonomy and agility, and as a result, the business will notice IT being more in tune with their changing demands.
Tags : 
api, application programming interface, psd2, open banking, json, github
    
CA Technologies EMEA
By: Carbonite     Published Date: Jan 04, 2018
Malware that encrypts a victim’s data until the extortionist’s demands are met is one of the most common forms of cybercrime. And the prevalence of ransomware attacks continues to increase. Cybercriminals are now using more than 50 different forms of ransomware to target and extort money from unsuspecting individuals and businesses. Ransomware attacks are pervasive. More than 4,000 ransomware attacks happen every day, and the volume of attacks is increasing at a rate of 300 percent annually. According to an IDT911 study, 84 percent of small and midsize businesses will not meet or report ransomware demands. No one is safe from ransomware, as it attacks enterprises and SMBs, government agencies, and individuals indiscriminately. While ransomware demands more than doubled in 2016 to $679 from $294 in 2015, the cost of remediating the damage and lost productivity is many multiples higher.
Tags : 
    
Carbonite
By: Carbonite     Published Date: Jan 04, 2018
It’s the moment every IT department dreads: A data loss event takes your business offline and the countdown clock begins. Despite spending countless hours safeguarding against and preparing for this moment, the impact of downtime is immediate and all-consuming. While IT pros can’t always avoid data loss events, they can prepare for them to ensure minimal downtime. To better understand the IT experience during a data disaster, EVault commissioned Spiceworks Voice of IT to survey IT pros regarding disaster recovery practices and perceptions. All survey respondents were based in the U.S. and have influence over backup/disaster recovery purchase decisions. This e-book will explore the impact of downtime and data loss on IT departments for small and midsize businesses.
Tags : 
    
Carbonite
By: Carbonite     Published Date: Apr 09, 2018
Malware that encrypts a victim’s data until the extortionist’s demands are met is one of the most common forms of cybercrime. And the prevalence of ransomware attacks continues to increase. Cybercriminals are now using more than 50 different forms of ransomware to target and extort money from unsuspecting individuals and businesses. Ransomware attacks are pervasive. More than 4,000 ransomware attacks happen every day, and the volume of attacks is increasing at a rate of 300 percent annually.1 According to an IDT911 study, 84 percent of small and midsize businesses will not meet or report ransomware demands.2 No one is safe from ransomware, as it attacks enterprises and SMBs, government agencies, and individuals indiscriminately. While ransomware demands more than doubled in 2016 to $679 from $294 in 2015, the cost of remediating the damage and lost productivity is many multiples higher.3 Ransomware is the equivalent of catastrophic data loss, except
Tags : 
    
Carbonite
By: Cartera Commerce     Published Date: Feb 15, 2012
Want to boost sales with offers linked to shoppers' debit, credit and loyalty cards? This primer highlights the card-linked offer-how it works, projections for market growth and a merchant case study with real results.
Tags : 
cartera commerce, mall networks, cartera, catera, vesdia, vesdia, mallnetworks, merchant-funded
    
Cartera Commerce
By: Cartera Commerce     Published Date: Mar 07, 2012
As a local merchant, do you want to understand the exploding deal landscape--coupons, daily deals, check-in deals, gamification, card-linked offers and more? Download Deals Deconstructed: The Definitive Merchant Guide to Deals, Discounts and Offers today.
Tags : 
cartera commerce, mall networks, cartera, vesdia, merchant-funded, loyalty, customer loyalty, merchant network
    
Cartera Commerce
By: Cartera Commerce     Published Date: Mar 21, 2012
For many local merchants, offers linked to consumer credit/debit cards let you optimize your overall marketing program. Download the eBook and understand the new way for local business to attract new customers-and keep them.
Tags : 
cartera commerce, mall networks, cartera, vesdia, merchant-funded, loyalty, customer loyalty, merchant network
    
Cartera Commerce
By: Cartera Commerce     Published Date: Jul 16, 2012
Want to attract new, valuable customers and keep them coming back? This demo shows how card-linked offers from OfferLink let you reward customers in the currencies they crave; no changes to POS, no vouchers, no coupons.
Tags : 
cartera commerce, mall networks, cartera, catera, vesdia, vesdia, mallnetworks, merchant-funded
    
Cartera Commerce
By: Castelle     Published Date: Nov 01, 2006
Castelle’s integration provides seamless fax integration with native Notes services like logging and reporting, and lets faxes be managed just like other Notes email, with all of Domino’s native security, administration, and customization capabilities.
Tags : 
ip networks, ip telephony, network management, servers, small business networks, tcp/ip protocol, contact management, messaging
    
Castelle
By: CDW     Published Date: Nov 12, 2012
You've dipped your toe into the virtualization waters, and now you'd like to learn how you can dive in and fully reap the money-saving and business-building advantages.
Tags : 
server virtualization, it infrastructure, virtualization solutions, data center
    
CDW
By: CDW     Published Date: Nov 12, 2012
By migrating to VCE Vblock, ATS Cloud can scale up enterprise IT services to small and medium-sized businesses in real time.
Tags : 
case study, converged infrastructure, data centers, cloud computing
    
CDW
By: CDW     Published Date: Nov 13, 2012
With the right SaaS security solutions, small businesses can gain enterprise-class safeguards at an affordable price.
Tags : 
cdw, cloud, cloud computing, cloud based security, cybertheft, data breaches
    
CDW
By: CDW     Published Date: Sep 15, 2014
Learn how one unified storage system can meet all the needs of your small business while it continues to grow and see how a better storage system will help your organization expand as you collect more data.
Tags : 
affordable, solution-focused, unified, storage, platform, smaller businesses, software, application
    
CDW
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search Research Gateway      

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.