RSS feed Get our RSS feed

News by Topic

dco

Results 1 - 25 of 51Sort Results By: Published Date | Title | Company Name
By: BetterUp     Published Date: Aug 14, 2018
Michelle has been with Twilio for nearly four years, supporting “Twilions” — as employees are affectionately known inside the company — through tremendous growth in both revenue and headcount. “We’re looking at creating a great employee experience at Twilio. We want to provide Twilions with the tools, resources, and experiences they need to innovate, scale, and grow.” BetterUp’s whole person approach was a key part of Michelle’s evaluation process. Most leadership development approaches focus on teaching people what to do. But what they miss is an equal focus on how to be. In contrast, BetterUp’s approach addresses the psychological resources that allow leaders to manage themselves so they have the capacity to manage others. This includes the ability to remain resilient, have a growth mindset, maintain a sense of control, and take risks. Evidence shows that these resources need to be in place for sustainable leadership habits to take root.
Tags : 
     BetterUp
By: Akamai Technologies     Published Date: Dec 11, 2018
A zero trust security and access model is the solution: Every machine, user, and server should be untrusted until proven otherwise. But how do you achieve zero trust? Read this white paper authored by Akamai’s CTO, Charlie Gero, to learn how to transition to a perimeter-less world in an incredibly easy way, with steps including: • The zero trust method of proof • The vision behind Google BeyondCorpTM • Analysis of application access vs. network access • How to deploy user grouping methodology • Guidance for application rollout stages 1-8
Tags : 
     Akamai Technologies
By: Akamai Technologies     Published Date: Jun 14, 2018
"A zero trust security and access model is the solution: Every machine, user, and server should be untrusted until proven otherwise. But how do you achieve zero trust? Read this white paper authored by Akamai’s CTO, Charlie Gero, to learn how to transition to a perimeter-less world in an incredibly easy way, with steps including: • The zero trust method of proof • The vision behind Google BeyondCorpTM • Analysis of application access vs. network access • How to deploy user grouping methodology • Guidance for application rollout stages 1-8"
Tags : security, perimeter security, zero trust, cloud, enterprise security
     Akamai Technologies
By: Rohde & Schwarz Cybersecurity     Published Date: Nov 28, 2017
According to many market research analysts, the global wireless access point (WAP) market is anticipated to continue its upward trajectory and to grow at an impressive compound annual growth rate (CAGR) of approximately 8% through 2020. Many enterprises are utilizing cloudcomputing technology for cost-cutting purposes, eliminating investments required for storage hardware and other physical infrastructures. With significant growth expected in Internet usage, particularly bandwidth consuming video traffic, WAP vendors need to enable their customers to monitor and improve device performance, improve end user experience, and enhance security. These customers include general enterprises that offer Internet access to patrons like airports, hotels, retail / shopping centers and so on. These external Internet access providers can differentiate themselves by offering optimum service through advanced network analytics, traffic shaping, application control, security capabilities and more.
Tags : utilization, challenges, dpi, benefits, airport, public, wifi, qoe
     Rohde & Schwarz Cybersecurity
By: Q2 eBanking     Published Date: Jul 30, 2017
Banks and credit unions face multiple challenges to operational efficiency: tightening budgets, limited headcount, a challenging regulatory climate, ongoing security concerns and others. Efficiency and process enhancements can limit the impact these challenges could have on your institution. The following five questions—and your responses—may help your financial institution (FI) as you look to drive operational efficiencies, improve compliance and security, keep account holders happy and attract new ones.
Tags : 
     Q2 eBanking
By: Brother     Published Date: Mar 08, 2018
Documents are an integral component to the successful operation of an organization. Whether in hardcopy or digital form, they enable the communication, transaction, and recording of business-critical information. To ensure documents are used effectively, organizations are encouraged to continually evaluate and improve surrounding workflows. This may involve automating elements of document creation, securing the transfer and storage of information, and/or simplifying the retrieval of records and the data contained within. These types of enhancements can save time, money, and frustration. This white paper will discuss top trends and requirements in the optimization of document-related business processes as well as general technology infrastructures for document management. It will also address how some office technology vendors have reacted to these trends to guide their design and development of products, solutions, and services.
Tags : documents, workflows, business process, document management
     Brother
By: SAP     Published Date: Oct 14, 2015
This Economist Intelligence Unit report discusses how highgrowth small and mid-sized enterprises (SMEs) are scaling their organisations to provide resources for growth whilst ensuring flexibility to respond quickly to changes in market conditions; the role of technology in scaling SMEs; and success factors in scaling headcount.
Tags : operational strategy of scaling, sme, scale, business intelligence, technology
     SAP
By: KPMG     Published Date: Jul 18, 2018
The 2018 Harvey Nash/KPMG CIO Survey – the largest IT leadership survey in the world – shows how CIOs are benefiting from bigger budgets and headcount growth, following years of focus on cutting costs. Read this report to find out: • what’s driving the growth in IT budgets • why CIOS must adapt the way they control technology in the business • where CIOs are focusing digital strategies to gain competitive advantage • what new technologies organisations are prioritising for investment • how smart CIO are managing their resources to get the skills they need. Download the report now:
Tags : 
     KPMG
By: Dell & Microsoft     Published Date: Jul 23, 2013
As small businesses grow, many reach a point when their computing systems falter. A company with only a handful of employees can usually get by with disconnected computers and software packages. But as you add desktops, laptops and other devices to support an increasing headcount, the system can become so cumbersome that productivity and customer service start to suffer.
Tags : benefits, server, small business
     Dell & Microsoft
By: Care360 by Quest Diagnostics     Published Date: Apr 29, 2015
Download to learn how to concentrate on seven strategies, and you’ll be in position to optimize your practice’s revenue cycle.
Tags : care360, medical practice, revenue cycle, monitoring payments, managing denials, optimize revenue cycle
     Care360 by Quest Diagnostics
By: FICO     Published Date: Sep 02, 2016
Download this case study to learn how the Collections Treatment Optimization program powered by FICO® Xpress Optimization Suite and FICO® Model Builder helped more than 6,000 customers avoid repossession and stay in their cars, and prevented 50,000 customers from reaching a stage of delinquency that would affect their credit. The program also helped grow the lending portfolio by 9% without adding collections headcount.
Tags : toyota financial services, fico, collections treatment optimization, cto, collections, auto loans
     FICO
By: Thomson Reuters     Published Date: Jul 30, 2018
How confident is your law firm in its document review process? Learn more about cost-effective and defensible document review and the benefits of partnering with a managed review provider instead of contract attorneys. According to a recent study of Alternative Legal Service Providers (ALSPs), the use of ALSPs such as managed review providers for doc review is expected to grow by more than 50% in the next five years. The top reasons cited for using such providers aligned with the benefits listed here: to control costs and meet peak demand without increasing permanent headcount.
Tags : document, review, law, thomson, reuters
     Thomson Reuters
By: LogMeIn     Published Date: Feb 27, 2018
Customer service organizations are struggling to react to the pace of innovation and the explosion of channels and devices. To get ahead of these challenges, AD&D pros must deeply invest in automation — automated answers, automated conversations, automated agent guidance, and automated end-to-end processes. They must also invest in intelligence to ensure automated technologies evolve and learn from prior interactions over time. Automation and intelligence quell the headcount increases. They will free agents from working on low-value or repetitive tasks, as they will only have to address highly complex customer scenarios or exceptions to standard operations. This also enables them to focus on building connections with customers to garner their satisfaction and loyalty.
Tags : customer, service, operations, optimization
     LogMeIn
By: Service Now     Published Date: Feb 09, 2018
We’re at a tipping point for customer service operations. Customers contact enterprises at a greater rate over a greater number of channels — shifting between them seamlessly and even using channels simultaneously. Enterprises react by adding headcount — an unsustainable strategy. You must transform operations by developing strength in automation, AI, and knowledge. This report reveals the top 10 customer service trends in 2018 for application development and delivery (AD&D) pros supporting customer service.
Tags : 
     Service Now
By: Solidcore     Published Date: Aug 21, 2007
Learn how change control technology helps organizations comply with PCI DSS by tracking changes to critical files, determining if changes are authorized, and selectively preventing unauthorized change.  Read this white paper on how you can relieve the burden of out-of-process and other unauthorized changes by using real-time monitoring and selective enforcement software. 
Tags : pci data, credit card, payment card, pci, compliance, privacy, customer information, data security
     Solidcore
By: Solidcore     Published Date: Jan 07, 2008
New report issued by Fortrex, Emagined Security and Solidcore reveals the cost of PCI compliance is justified. Fortrex, in conjunction with Solidcore and Emagined Security have compiled a PCI compliance report that reveals the cost of a breach can easily be 20 times the cost of PCI compliance, more than justifying the up-front investment.
Tags : pci, pci dss, pci compliance, compliance, payment card, credit card, data protection, data security
     Solidcore
By: Solidcore     Published Date: Jan 07, 2008
This IT audit checklist guide includes advice on assessing the effectiveness of change management in a variety of areas.   As companies grow more dependent on interdependent IT systems, the risks associated with untested changes in development and production environments have increased proportionately.
Tags : audit, auditing, security audit, vulnerabilities, vulnerability, vulnerability management, security management, auditor
     Solidcore
By: Solidcore     Published Date: Jan 07, 2008
It is widely acknowledged that unauthorized changes made to an IT Infrastructure cause up to 80% of system unavailability.  Learn how adding change control to your existing or planned change management infrastructure can help improve IT service availability, lower compliance costs, and accelerate your ITIL implementations.
Tags : control change, change management, high availability, change control, sla, service level, solidcore, infrastructure
     Solidcore
By: Solidcore     Published Date: Jan 07, 2008
Identifying critical change control failure points in your infrastructure can help reduce the threat of costly downtime, potential security breaches, and compliance weaknesses. Read this paper for guidelines on how to identify and categorize systems that have characteristics which heighten risk.
Tags : audit, auditing, security audit, vulnerabilities, vulnerability, vulnerability management, security management, change management
     Solidcore
By: Solidcore     Published Date: Jan 07, 2008
Demonstrating ROI for service management investments can be difficult, especially with multi-phase deployments like ITIL that can require significant up-front investment in exchange for returns produced in the future.  Learn how setting milestones and measuring the value of each phase of an ITIL implementation can help prove the project’s value and shape its focus.
Tags : itil, roi, service, service management, solidcore, return on investment, cmdb, change management
     Solidcore
By: Solidcore     Published Date: Jan 07, 2008
This paper lays out the challenges with complying with SOX and suggests a radical solution: build a self-service, automated IT control framework in which all the information required to verify compliance is available in a single reporting system.
Tags : compliance, sox, sox compliance, sarbox, sarbox compliance, audit, self audit, self auditing
     Solidcore
By: Solidcore     Published Date: Jan 15, 2008
New report issued by Fortrex, Emagined Security and Solidcore reveals the cost of PCI compliance is justified. These PCI requirements exist to protect sensitive data - yet, research indicates that these are among the least satisfied requirements across Level 1 merchants, with almost 40% non-compliance. 
Tags : security
     Solidcore
By: Solidcore     Published Date: Jan 15, 2008
Assure SOX compliance and address key questions asked by SOX auditors with simple change management enhancement.
Tags : 
     Solidcore
By: Success Factors     Published Date: Aug 10, 2012
When ICRW was forced to reduce its HR headcount, the center began looking for ways to automate performance management. With the help of SuccessFactors Professional Edition Performance Management, ICRW's HR staff was able to provide better service without adding headcount.
Tags : successfactors, sap, customer testimonial, case study, icrw, performance management, sherian roggeband
     Success Factors
By: OKTA     Published Date: Sep 26, 2017
Traditional web applications pre-date modern standards like SAML and OpenIDConnect, so they often use legacy authentication methods to grant end users access. Historically, providing Single Sign-On and centralized access management for end users across these legacy applications required a Web Access Management, or WAM, product. These on-premises software tools could be expensive to maintain and complex to deploy. Now, modern identity providers like Okta in conjunction with best-of-breed network management technologies offer a better way. This white paper describes how web applications that lack modern standard support can be integrated into a cloud-based Identity-as-a-service architecture.
Tags : 
     OKTA
Start   Previous   1 2 3    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics