RSS feed Get our RSS feed

News by Topic

person

Results 426 - 450 of 1818Sort Results By: Published Date | Title | Company Name
By: Fujitsu     Published Date: Feb 26, 2018
The hallmark of the digital age is change – constant, rapid, and often disruptive. The computer itself has changed from mainframe to minicomputers, personal desktops to laptops, handheld devices to mobile computers. We now have tiny embedded computers in cars, in washing machines and even in cats and dogs. How we live our lives has changed. Virtually every activity humans engage in, is impacted by computers and that’s constantly changing too. No surprise then, that K-12 education was also impacted by the constant transformation of computers. Intel, the Intel logo, Intel Core, Intel vPro, Core Inside and vPro Inside are trademarks of Intel Corporation or its subsidiaries in the U.S. and/or other countries
Tags : learning, digital, lessons, education, solutions, fujitsu
     Fujitsu
By: HERE Technologies     Published Date: Jul 19, 2018
Advertisers have made great strides in understanding consumers’ digital journeys. But in order to truly map the steps of the consumer – including bridging the journeys between digital and physical worlds – you need advanced location-enabled intelligence. Find out how precise real-world geometry gives you the context you require to create personalized consumer experiences with the HERE and Location-Based Marketing Association (LBMA) white paper. HERE Technologies gives you the location context you need to make sense of your dynamic user data. Mapping consumer movements to real-world elements such as points of interest, retailers and their building shapes allows you to observe consumer journeys to within meters, and deliver more timely, accurate campaign messages.
Tags : location data, ad tech, location targeting
     HERE Technologies
By: HERE Technologies     Published Date: Jul 19, 2018
A growing urban population is putting increasing pressure on infrastructures – and creating a bigger challenge for governments to meet their safety, road performance and cost saving targets. Modern location mapping platforms are growing in accuracy and capabilities – giving governments a way to provide real-time, personalized and integrated mobility services to citizens. In Ovum’s Location Platform Index, 2H17, HERE has been ranked a leader based on overall reach and completeness – and the leader for platform completeness. In this report, you can see exactly how we measure up in the market against some of the leading competition.
Tags : 
     HERE Technologies
By: Mimecast     Published Date: Aug 22, 2017
Email security is essential in preparing for the GDPR deadline. The GDPR emphasizes the principle of accountability and the need for organizations to demonstrate they have taken reasonable measures to protect personal data. This white paper explores how to improve email and cloud security to meet strict compliance regulations. Uncover: • GDPR challenges for email • How to mitigate risks and ensuring email resiliency • An effective email and cloud security platform
Tags : gdpr, risk mitigation, email resiliency, personal data protection
     Mimecast
By: Mimecast     Published Date: Dec 20, 2018
Relying on outdated solutions like Symantec Email Security (formerly MessageLabs) to defend your organization from email-borne attacks may be risky. Others in this position have suffered from spear-phishing, ransomware and even impersonation attacks. To effectively defend against these advanced threats you need the latest protection techniques – something Mimecast delivers to tens of thousands of organizations already. Join us for this 30 min webinar to learn: • The damaging effects of ransomware, spear-phishing and impersonation attacks • What defensive strategies and technologies you should employ • Why your current Symantec Email Security solution may not be up to the task • How to enhance your email security and overall cyber resilience
Tags : email security, ransomware, spear-phishing, cyber resilience, symantec
     Mimecast
By: Mimecast     Published Date: Aug 16, 2018
Email. You use it constantly. And it’s the number-one application to keep your organization functioning, lines of communication flowing, and productivity seamless. Organizations need email to stay up-and running all the time. After all, it’s supposed to just work, right? This is where trouble often sets in. Cybercriminals use email constantly, too. It’s the number-one vector used to initiate attacks like malware delivery (think ransomware), impersonations and phishing attacks. In fact, almost 90% of organizations* have seen the volume of phishing attacks either rise or stay the same over the past 12 months. Internal threats have also been on the rise: Most organizations have encountered internal threats driven by careless employees (88%), compromised accounts (80%) or malicious insiders (70%) over the last year.
Tags : 
     Mimecast
By: Mimecast     Published Date: Jan 16, 2019
Employees frequently become unwitting participants in attacks, aiding the lateral movement of threats through the distribution of malicious URLS and attachments or the exposure of sensitive data. In this E-book, we’ll take a closer look into several email-related activities that employees often engage in that contribute to the spread of these insider (“hidden”) threats and then discuss what measures your organization can take to protect itself from these “hidden” threats.
Tags : 
     Mimecast
By: Cisco Umbrella EMEA     Published Date: Dec 03, 2018
Your users, especially when working outside of the office, no longer need to always connect to the corporate network to get work done. They often connect directly to SaaS apps. And, let’s face it, employees also don’t turn on the VPN if they’re using their work laptop for personal use — which means they’re left with very little security protection. Plus, many organizations are now using direct internet connections at branch offices, which means employees and guest users don’t get the protection of your traditional security stack. Not only are more offices connecting directly to the internet — it’s estimated that 70% of branch offices already have some direct internet access — but attackers recognize these weak points in their targets and have started exploiting them more. To solve these new challenges, security controls must also shift to the cloud. This in-depth white paper describes how security must evolve to protect users anywhere they access the internet.
Tags : 
     Cisco Umbrella EMEA
By: Workday Netherlands     Published Date: Jul 05, 2019
"In zes stappen, omschreven in dit eBook, verbetert u uw people analytics skills en helpt u uw organisatie vooruit. • Haal de beste inzichten uit uw personeelsdata • Bied de juiste informatie aan de juiste stakeholders op het juiste moment • Stel HR in staat om zakelijke doelen strategisch te ondersteunen Lees het eBook nu."
Tags : workday, workforce technology, digital strategy
     Workday Netherlands
By: CA Technologies EMEA     Published Date: Oct 23, 2017
Depuis plus de vingt ans, les entreprises doivent se conformer à différentes directives et réglementations en matière de protection des données. Le Règlement général sur la protection des données (RGPD ou GDPR en anglais), qui reprend l’ensemble des législations existantes de la Commission européenne en matière de protection des données, a toutefois pour but de renforcer et d’harmoniser ces différentes réglementations pour les citoyens européens. Les principaux objectifs du RGPD sont de redonner aux citoyens un contrôle sur leurs données personnelles et de simplifier le cadre réglementaire pour les entreprises internationales. Pour les organisations déjà conformes à la Directive 95/46/CE, quels sont les critères technologiques à remplir pour garantir la conformité au RGPD ?
Tags : rgpd, gdpr, conformité, compliance, data testing, test data management, ca test data manager
     CA Technologies EMEA
By: Cranfield University     Published Date: Jan 16, 2015
This programme presents an outstanding management development opportunity for senior leaders. It offers the maximum personal and business benefit from a minimum investment of time at a management school renowned for its practical approach.
Tags : directors programme, management development, improve contribution as a director, senior leaders opportunities
     Cranfield University
By: Lumesse     Published Date: Feb 13, 2015
This white paper aims to provide an overview of the peculiarities in recruitment and talent management that exist in China, based on best practice and real life case studies.
Tags : hr in china, talent management in china, recruitment and talent management, recruitment in china
     Lumesse
By: Oracle     Published Date: Jun 19, 2015
I responsabili del servizio clienti ricoprono un ruolo fondamentale nella definizione del marchio. Tuttavia, per essere in linea perfetta con il ruolo, queste persone devono essere consapevoli dell'importanza della creatività in ciò che fanno: il servizio clienti richiede progettazione.
Tags : customer loyalty, achieve customer loyalty, customer service, loyalty, influence consumer behavior, persuade customers, crm solutions/software, customer experience/engagement
     Oracle
By: IBM     Published Date: Feb 22, 2016
This ebook explores how an enhanced 360-degree view of the customer optimizes and facilitates more personalized customer interactions.
Tags : ibm, data, customer, mdm, customer interactions, personalization
     IBM
By: IBM     Published Date: Jul 19, 2016
This video demonstrates how IBM’s Behavior Based Customer Insight for Banking leverages predictive analytics to help you personalize customer engagement and deliver customized actions. The solution leverages advanced predictive models to analyze customer transactions and spending behavior to more deeply understand customer needs and propensities, anticipate life events, and help provide a unique customer experience.
Tags : ibm, banking, finance, consumer insights, business intelligence, business anlytics
     IBM
By: IBM     Published Date: Jul 21, 2016
This e-book explores the many uses of client insights for banking and wealth management. By using sophisticated analytics and cognitive capabilities, your organization can gain deep understanding of what matters most to your clients. Knowing them well helps to provide targeted, personalized service that they value and increases their loyalty. It’s a smart pathway for reducing churn and generating new revenue models through meaningful cross-selling opportunities in today’s customer-centric world.
Tags : ibm, banking, client insight, financial services, engagement, client insights
     IBM
By: IBM     Published Date: Apr 24, 2017
IBM QRadar and BigFix solutions empower IT security teams to view, prioritize and respond to endpoint intelligence in near real time. How can an organization stay ahead of these advanced security threats? Maintaining a high level of baseline security by consistently enforcing security policies and patch levels on endpoints and servers is definitely required and important. But when networks can have multiple vulnerabilities per IP address at scan time, the slow process of mitigating and patching these weaknesses can result in dangerous security gaps. Today’s IT personnel have to make difficult, risk-based decisions on where to focus their efforts—often without having a complete picture of the security environment. This is even more critical when the number of vulnerabilities across the organization is increasing while the organization has limited resources and skills to fix the vulnerabilities.
Tags : risk management, vulnerability management, asset security, database accuracy, enterprise security, security solutions
     IBM
By: IBM     Published Date: Oct 26, 2017
There’s no getting around it. Passed in May 2016, the European Union (EU) General Data Protection Regulation (GDPR) replaces the minimum standards of the Data Protection Directive, a 21-year-old system that allowed the 28 EU member states to set their own data privacy and security rules relating to the information of EU subjects. Under the earlier directive, the force and power of the laws varied across the continent. Not so starting May 25, 2018.
Tags : gdpr, data protection, right to access, data breach, personal data
     IBM
By: Group M_IBM Q1'18     Published Date: Jan 17, 2018
IBM Security Guardium tools can be the cornerstone of an enterprise’s compliance initiative for GDPR personal data protection requirements.
Tags : gdpr, compliance, data protection, personal data
     Group M_IBM Q1'18
By: IBM     Published Date: Sep 06, 2018
General Data Protection Regulation (GDPR) represents a paradigm shift in the way companies across the globe must approach protecting personal data. As of May 2018, EU data subjects now have greater autonomy than ever before over how their personal information is collected, stored and shared – and the repercussions for companies that fail to comply will be significant. At the heart of the matter lies Data Security and Protection. Protect the personal data, and you are well on your way to tackling many of the challenges the GDPR presents. But this is no easy task – before you protect your data, you must understand it, and even once you’ve achieved these goals, continually re-evaluate your data privacy and protection posture to adapt to changes in this dynamic environment.
Tags : 
     IBM
By: iPass     Published Date: Sep 16, 2009
Thanks to new mobile technologies, work happens everywhere today. It might be responding to email on the morning train or uploading a customer contract during a cross-town cab ride. Your workers need this level of connectivity to compete. At the same time, you likely face unprecedented budgetary challenges.
Tags : wireless, wifi, smartphones, pda, security, smartphone, personal devices, nokia
     iPass
By: Bazaarvoice     Published Date: Oct 15, 2012
Our survey of 100 members of The CMO Club reveals most CMOs gather insights from first-person, always-on online consumer conversations, and share them across their organizations, to power more than just marketing.
Tags : bazaar voice, social marketing, social data, research, social data, marketing data, consumer awareness, marketing research
     Bazaarvoice
By: Adaptive Planning     Published Date: Dec 05, 2011
Join us for an informative webinar and learn how easy it can be to create exceptional value through FP&A. You will hear case studies describing how leading nonprofits worldwide have been able to move beyond Excel and save time, enhance collaboration, and improve decisions - ultimately resulting in better managed, more successful organizations.
Tags : finance, fund reporting, cip reporting, business, personnel reporting, adaptive planning
     Adaptive Planning
By: Adobe     Published Date: Nov 06, 2012
Adobe has released the 2012 Digital Marketing Optimisation Survey Results, which focuses on the key areas where digital marketers need to excel in order to ensure success: personalisation, social media, mobile, and customer experience.
Tags : adobe, digital marketing, optimization, optimisation, web content management, customer experience, website development, emerging marketing
     Adobe
By: Neustar     Published Date: Aug 20, 2012
Viewers will learn how to utilize customer data combined with next generation marketing analytics to create granular consumer segmentation that can be put to action in real-time on their Websites.
Tags : web analytics, site optimization, segmentation, customize messaging, custom offers, marketing strategy, personalized website, custom landing page
     Neustar
Start   Previous    11 12 13 14 15 16 17 18 19 20 21 22 23 24 25    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics