RSS feed Get our RSS feed

News by Topic

bring

Results 801 - 825 of 1113Sort Results By: Published Date | Title | Company Name
By: Microsoft Nokia Lumia     Published Date: Jun 08, 2016
Organizations' users increasingly depend on their mobile devices, but phones and tablets bring new and unfamiliar challenges for IT departments. IT must be able to deploy and manage mobile devices and apps quickly to support the business while balancing the growing need to protect corporate data because of evolving laws, regulations, and cybercrime.
Tags : 
     Microsoft Nokia Lumia
By: Engineering360 Media Solutions     Published Date: Jul 07, 2016
Engineering360 is pleased to bring you this selection of marketing articles compiled from recent editions of the Marketing Maven, our monthly e-newsletter created exclusively for business-to-business sales and marketing professionals in the industrial sector.
Tags : marketing, engineering360, sales, b2b marketing, marketing strategy, social media
     Engineering360 Media Solutions
By: Tripwire     Published Date: Jul 05, 2007
Find out about the requirements and issues addressed in corporate governance Bill 198, Canada's version of Sarbanes-Oxley, for internal controls for technology and how IT configuration auditing brings compliance.
Tags : sox, sarbanes-oxley, bill 198, canada, canadian financial, canadian sox, financial controls, compliance
     Tripwire
By: IBM     Published Date: Oct 10, 2013
The security world is a scary place, and it’s getting scarier. Every day brings more risks, threats, customer demands, and regulations. Worse yet, it’s becoming more difficult to recruit and retain people who really get it and know how to help. It’s time for a new model. A survey conducted by Forrester Consulting and commissioned by IBM shows that security leaders are partnering with managed security services providers in increasing numbers—and the feedback is overwhelmingly positive.
Tags : security, risks, threats, security breach, customer demands, regulations, forrester consulting, ibm
     IBM
By: IBM     Published Date: Jul 31, 2014
Territory management and crediting are an integral part of every sales compensation program. Download this paper to understand how you can get clarity, transparency and consistency around territory management and sales crediting.
Tags : ibm, territory management, crediting, sales compensation, sales compensation program, sales crediting, incentive compensation management, sales process
     IBM
By: IBM     Published Date: Apr 13, 2015
To understand why customers make the purchase choices they do, it may be helpful to look rigorously at all the moments that have an influence on their final actions. This reasoning is the basis of concepts variously called “purchase funnel,” or the “path to purchase” or “moments of truth” by product marketers. It implies a rather linear progression from general awareness to preference to decision to acquisition of a specific product. The end game is customer success. It’s what we all want to happen. Along the way we’ll do our best to illuminate: • How did the customer arrive at the best possible purchase outcome? • What decision moments can the retailer influence along the way? • What tools can the retailer use exert these influences? • What actions can the retailer take to bring them there?
Tags : ibm, purchasing, purchase funnel, acquisition, customer influence, retail, internet marketing, crm & customer care
     IBM
By: IBM     Published Date: May 19, 2015
Download this report and read how organizations that implement customer analytics initiatives are, increasing customer retention by up to 9x, capturing 2x more wallet share, converting an extra 3x of inbound contacts into a cross-sell event and shifting up to an additional 4x of their sales orders to more cost-effective channels.
Tags : customer analytics, customer insights, customer retention, customer-related data, social media analytics, information responsiveness, emerging marketing, social media
     IBM
By: IBM     Published Date: Apr 14, 2016
Read this white paper to get an in-depth look at the benefits of embracing a digital business model, and find out how sports teams of all types can use cloud service providers with digital marketing and analytics tools to gain a competitive edge on the marketing playing field.
Tags : ibm, sports marketing, media, entertainment, digital business model, cloud, customer experience/engagement, market research
     IBM
By: IBM     Published Date: Jul 22, 2016
Read the IBM IBV CPO Study ebook to learn: - Four steps top procurement groups can take to realize and sustain greater savings than their peers - Three ways top-performing procurement teams achieve a more effective approach to risk mitigation - How top performers use insights from suppliers to bring innovative ideas to the business
Tags : ibm, commerce, procurement, analytics, procurement analytics, data, big data, procurement organization
     IBM
By: IBM     Published Date: Jul 29, 2016
See how you can bring the best of B2C to your B2B eCommerce site in less than 90 days.
Tags : ibm, b2b, b2b commerce, commerce, cloud, commerce on the cloud, b2c, business intelligence
     IBM
By: IBM     Published Date: Jan 05, 2017
Read the IBM IBV CPO Study ebook to learn: - Four steps top procurement groups can take to realize and sustain greater savings than their peers - Three ways top-performing procurement teams achieve a more effective approach to risk mitigation - How top performers use insights from suppliers to bring innovative ideas to the business
Tags : ibm, procurement, commerce
     IBM
By: IBM     Published Date: Sep 16, 2014
To compete in today’s rapidly changing business environment, organizations need to capture, analyze and act on information rapidly. If they can quickly identify trends, discover patterns and generate new insights, they can address a wide array of strategic and operational goals—from increasing customer loyalty and creating targeted marketing offers to enhancing operational efficiency and reducing risk. In their report, Business Value of Big Data on Power Systems, NC State University talks about unlocking the business value of big data, and how IBM Power Systems can deliver the foundation for organizations to bring insight to the point of impact faster.
Tags : big data, targeted marketing offers, ibm power systems, structured data
     IBM
By: IBM MaaS360     Published Date: Apr 15, 2015
End users are demanding their own devices in the workplace, making IT the shepherds of a potentially unruly flock.?The good news is IT can embrace BYOD with security and confidence given the right preparation and technology.??
Tags : fiberlink, mobile users, strategy, app enabled, scalability, security, device management, enterprise
     IBM MaaS360
By: IBM MaaS360     Published Date: Apr 15, 2015
Bring Your Own Device has changed the rules for corporate security on smartphones and tablets. Companies need to find the right balance in securing devices and data without sacrificing the intuitive native experience that has made business move from typing to swiping.
Tags : fiberlink, mobile users, strategy, app enabled, scalability, security, device management, enterprise
     IBM MaaS360
By: IBM MaaS360     Published Date: Apr 15, 2015
Manufacturing: The Bring Your Own Device (BYOD) policies that thrive in other industries are gaining momentum in manufacturing as well.
Tags : fiberlink, mobile users, strategy, app enabled, scalability, security, device management, enterprise
     IBM MaaS360
By: IBM MaaS360     Published Date: Jul 09, 2015
End users are demanding their own devices in the workplace, making IT the shepherds of a potentially unruly flock?The good news is IT can embrace BYOD with security and confidence given the right preparation and technology.
Tags : byod, mobile devices, smartphone, tablet
     IBM MaaS360
By: IBM MaaS360     Published Date: Jul 09, 2015
Manufacturing: The Bring Your Own Device (BYOD) policies that thrive in other industries are gaining momentum in manufacturing as well.
Tags : mobile device management, manufacturing, mobile devices, smartphone, tablet, byod, security
     IBM MaaS360
By: IBM MaaS360     Published Date: Oct 08, 2015
Bring Your Own Device has changed the rules for corporate security on smartphones and tablets. Companies need to find the right balance in securing devices and data without sacrificing the intuitive native experience that has made business move from typing to swiping.
Tags : ibm, fiberlink, maas360, mobile, data security, mobile device management, security
     IBM MaaS360
By: IBM MaaS360     Published Date: Jun 30, 2016
Learn how to protect corporate data when users use personal devices for work
Tags : ibm, bring your own device, byod, mobile, security
     IBM MaaS360
By: IBM MaaS360     Published Date: Jun 30, 2016
A humorous look at IT’s challenges in managing Bring Your Own Device (BYOD) for today’s organizations
Tags : ibm, mobile, mobile device management, mdm, security
     IBM MaaS360
By: IBM     Published Date: Feb 11, 2015
IBM® Operational Decision Manager Advanced brings together data from different sources to recognize meaningful trends and patterns. It empowers business users to define, manage and automate repeatable operational decisions. As a result, organizations can create and shape customer-centric business moments.
Tags : ibm, customer-centric business, operational manager, decision manager, business policies
     IBM
By: IBM     Published Date: Apr 09, 2015
The IBM X-Force research and development team collects, analyzes and distributes threat intelligence to IBM customers - and uses it to enrich the IBM Security portfolio - so users can leverage in-depth knowledge and understanding of threats to bring business value to their organizations.
Tags : ibm, it security, vulnerability management, virus protection, spyware protection
     IBM
By: IBM     Published Date: May 11, 2015
This paper argues that requirements management can bring significant value to agile development in regulated IT and complex product development projects, and sets out the characteristics of an effective requirements management approach in an agile environment.
Tags : ibm, agile management, requirements, costs, responsiveness, productivity, collaboration, delivery
     IBM
By: IBM     Published Date: Oct 06, 2015
The IBM X-Force research and development team collects, analyzes and distributes threat intelligence to IBM customers - and uses it to enrich the IBM Security portfolio - so users can leverage in-depth knowledge and understanding of threats to bring business value to their organizations.
Tags : ibm, ibm x force, threat intelligence, data protection, ibm security, security
     IBM
By: IBM     Published Date: Feb 04, 2016
IBM Operational Decision Manager Advanced applies insights and analytics to operational decisions by bringing together data from different sources and looking at historical trends and patterns to determine the next best action. With IBM Operational Decision Manager Advanced, you gain scope, scale, speed, and simplicity. You can now capture events, build context, and apply it to operational decisions in real-time. This helps detect situations as they occur – presenting risks or opportunities – to enable action.
Tags : analytics, ibm, operational decision manager, operations, brand, data, big data, trends
     IBM
Start   Previous    26 27 28 29 30 31 32 33 34 35 36 37 38 39 40    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics