RSS feed Get our RSS feed

News by Topic

it tasks

Results 201 - 225 of 273Sort Results By: Published Date | Title | Company Name
By: Workfront     Published Date: Jan 22, 2015
Does your team have enough time in the day? Is productivity difficult to define? Download this ebook to learn how to be more efficient as a team. In today’s fast-paced marketing environment, you are constantly being asked to increase productivity, report on what you’re working on, when it’ll be done and what’s next. At the same time there are frequent interruptions and new work requests while you’re juggling multiple tasks for multiple campaigns in various stages of completion. Sound familiar? Check out this ebook to learn about the top 10 productivity problems marketing teams face and strategies for how to solve them. Learn how to: • Manage interruptions effectively • Streamline approval processes • Efficiently juggle multiple work requests • Know resource availability to plan future work without overcommitting • Provide work measurement and accountability without breaking a sweat Get the ebook today!
Tags : productivity issues, marketing environment, increase productivity, team efficiency
     Workfront
By: Lumension     Published Date: Feb 07, 2014
In this best practice guide, we are going to take a deep dive into a best practice process for patch and vulnerability management, developed by Lumension over thousands of customer engagements.
Tags : lumension, agent maintenance, value and risk, patch management, microsoft’s patch tuesday, it tasks, remediation process, endpoint management and security suite
     Lumension
By: AtTask     Published Date: Jul 17, 2014
When it comes to project management, we tend to talk about the tactical—the assignments, the tasks, the approvals, and so on. But business is evolving, and many project teams are now being asked to lead change, instead of just timelines and milestones. This evolution is accelerating and is driven by fresh thinking and business necessity supported by advanced technologies that are highly accessible to a much broader range of contributors. Effectively managing work is no longer just the role of a few specialists. In this Whitepaper you will learn lessons from 40 PPM experts on making the transition from project management to project leadership.
Tags : at task, it organizations, work requests, technology changes, project updates, status reports, project management
     AtTask
By: BenefitMall     Published Date: Sep 23, 2015
Download this whitepaper to learn why many small and mid-sized firms are choosing a more robust outsourced solution that combines HR tasks, like time and attendance management and workforce administration, with traditional payroll processing to improve data accuracy, ensure regulatory compliance, and deliver greater economies of scale.
Tags : small business, small business owners, payroll, outsourcing payroll, third-party payroll service, attendance management, workforce administration, compliance
     BenefitMall
By: AWS     Published Date: Jul 24, 2019
With more data to analyze than ever before, companies are finding new ways to quickly find meaning in their data with artificial intelligence (AI). Natural Language Generation (NLG) technologies deployed on Amazon Web Services (AWS) can enable organizations to free their employees from manual data analysis and interpretation tasks. NLG transforms data into easy-to-understand, data-driven narratives with context and relevance.
Tags : 
     AWS
By: AWS     Published Date: Jul 24, 2019
Common daily media broadcaster tasks such as ad verification are slow and costly. Done manually, they may also introduce inefficiencies that can interfere with transparency and payment accountability—and impact your bottom line. Meanwhile, recent and archived media lies idle when you could repurpose it to increase brand exposure and generate revenue. Learn how Veritone, Inc. used its aiWARE Operating System, building on Amazon Web Services (AWS), to help Westwood One, Inc., a large audio broadcasting network in the United States, develop Artificial Intelligence (AI) and Machine Learning (ML) solutions designed for ad verification and monetizing archived media. Download our webinar to learn how you can Automate ad verification and reporting tasks. Enhance archive content to make media searchable and reusable. Use AI and ML in the cloud for near real-time media intelligence. Start applying machine learning tools.
Tags : 
     AWS
By: AWS     Published Date: Jun 24, 2019
Join our webinar to hear how Consensus, a Target-owned subsidiary, utilizes AWS and Trifacta to prepare data for use in fraud detection algorithms. You’ll learn how self-service automated data wrangling can save your organization time and money, and tips for getting started with Trifacta’s solution, built for AWS. Webinar attendees will learn: Why automating your data wrangling tasks can lead to greater data accuracy and more meaningful insights. How you can reduce your data preparation time by 60% and more with self-service data wrangling tools built for AWS. How easy it is to get started with machine learning solutions for data wrangling on the cloud.
Tags : 
     AWS
By: VMware     Published Date: Feb 24, 2017
Today's savviest enterprises are leveraging BYOD as a tool to drive mobile accessibility, increase IT oversight, and enable employees to complete business tasks anytime, anywhere, on any device. Considering the risks, there must be a strategy for managing and securing these BYOD devices. BYOD programs provide users with a secure, IT-approved method for accessing corporate resources from their personal devices. This white paper outlines the basic measures business leaders and IT professionals are taking to turn their BYOD programs into major productivity gains.
Tags : 
     VMware
By: VMware     Published Date: Feb 24, 2017
Today's savviest enterprises are leveraging BYOD as a tool to drive mobile accessibility, increase IT oversight, and enable employees to complete business tasks anytime, anywhere, on any device. Considering the risks, there must be a strategy for managing and securing these BYOD devices. BYOD programs provide users with a secure, IT-approved method for accessing corporate resources from their personal devices. This white paper outlines the basic measures business leaders and IT professionals are taking to turn their BYOD programs into major productivity gains.
Tags : 
     VMware
By: ReadyTalk     Published Date: Sep 19, 2014
In today's marketplace, there are so many lead generation tactics available that it is imperative we employ the tools and practices that lead to the highest return in the shortest amount of time. Software integration is important. Combining as many task and activities into one tool is crucial. And saving time is the biggest priority so we can complete the other hundred tasks we have to do on a daily basis.
Tags : webinars, qualified, leads, generation, strategy, marketing, investment, time
     ReadyTalk
By: SAS     Published Date: Mar 06, 2018
These emerging technologies and solutions certainly are not unique to financial services. But Stewart, a business director of security intelligence solutions within the SAS Security Intelligence Practice, sees particular interest and application in AML circles. "There remain a good number of manual processes within financial crimes departments in financial institutions, and AI can help automate some of those rote tasks such as document review or alert triage," he says. "Due to investments in technology, there is a lower barrier of entry for midsized institutions. "And finally, there's this anxiety over the unknown - those risks they are not able to detect, that may be hidden using traditional techniques - so they're hoping that more advanced, unsupervised learning techniques can be used to identify those edge cases or behaviors that are out of norm." In an interview about analytics and the AML paradigm shift, Stewart discusses: • The new industry intrigue with artificial intelligence a
Tags : 
     SAS
By: Dell Software     Published Date: May 10, 2013
Have you ever had problems replicating Active Directory or recovering AD objects? In this Dell technical brief, learn about three critical tasks administrators often overlook – and why doing them helps automate AD maintenance.
Tags : dell quest, maintaining ad, ad objects, dell technical brief, ad maintenance
     Dell Software
By: Dell Software     Published Date: May 10, 2013
Have you ever had problems securing Active Directory? In this Dell technical brief, learn about three critical tasks administrators often overlook – and why doing them helps maximize AD security.
Tags : dell software, active directory, ad security, dell technical brief
     Dell Software
By: Sunbelt Software     Published Date: Aug 04, 2008
Security is the most single critical task for any email administrator. Starting with a foundation of anti-spam and anti-virus capabilities, organizations should focus on other capabilities, as well, including policy management and a variety of other tasks designed to protect the network and the company from external and internal threats.
Tags : email security, secure messaging, secure im, exchange, exchange server, microsoft exchange, ms exchange, sunbelt
     Sunbelt Software
By: BlackBerry     Published Date: Apr 20, 2009
Ricoh Americas Corporation (Ricoh) is a provider of document solutions, including digital imaging systems, fax machines, printers, scanners and data storage. Ricoh wanted a solution to automate service calls handled by field service technicians. They decided to create an application for the BlackBerry solution that would improve call efficiency and give technicians more control over the tasks performed during their day.
Tags : blackberry, ricoh, microsoft exchange, mobile device management, mobile device management software, mobile workers, remote computing, wireless applications software
     BlackBerry
By: BlackBerry     Published Date: Oct 12, 2008
The healthcare industry has lagged behind other industry sectors in adopting wireless technologies. Is the problem one of functionality, reliability or suitability to the required tasks? Or, is it simply the conservative nature of healthcare, where a solution must be of proven value and unassail-able virtue before investments are made and policies are changed. This paper examines the characteristics of wireless mobility solutions and considers how effectively these solutions meet healthcare industry requirements.
Tags : blackberry, healthcare, voip, smartphones, it communication, microsoft exchange, mobile device management, mobile device management software
     BlackBerry
By: Esker     Published Date: Jun 29, 2015
Read the white paper‚ Building a Business Case for AP Automation: How to Propel Your Project to the Top of the List‚ to discover how AP automation creates benefits for the entire business such as: • Cost savings due to fewer manual processing tasks and less IT requirements • Complete visibility and control thanks to customizable dashboards and metrics • Faster payment cycles with the ability to capture more early payment discounts • Improved employee productivity and supplier satisfaction
Tags : accounts payable, finance management, ap automation, infrastructure, employee productivity, supplier satisfaction, payment cycles, payment discounts
     Esker
By: Conductor     Published Date: Apr 09, 2013
Due to the technical nature of the SEO industry and its relative immaturity compared to other technologically advanced marketing disciplines, many SEOs still spend a significant percentage of their time on manual tasks. Conductor analyzed the day-to-day life of an SEO professional, determined the tasks that could be automated, and quantified the resulting increase in productivity by using SEO technology. Download this research paper to learn how new technology can tremendously increase an SEO marketer’s output.
Tags : seo, seo technology, budget, roi, search engine optimization, digital marketing, online marketing, interactive marketing
     Conductor
By: AuditBoard     Published Date: Nov 26, 2018
AuditBoard’s OpsAudit platform is the only-purpose built audit technology, built for auditors, by auditors. Whereas other solutions in the GRC market are a “mile wide and an inch deep,” AuditBoard’s OpsAudit encompasses and streamlines all of the nuances associated with carrying out a world-class internal audit department. AuditBoard’s ease of use allows for auditors to spend all of their time with their audit customers and on their audit work, without suffering through administrative tasks or technology problems.
Tags : 
     AuditBoard
By: IBM     Published Date: Oct 10, 2013
Today, your company's digital presence is your reputation and your brand. But websites and other IT assets are vulnerable to security breaches, downtime and data loss—all of which can negatively affect your reputation and competitive position. Read this paper, commissioned by IBM with leading analyst Forrester to learn how IT security decision makers across the globe are doing more with less by outsourcing key security tasks.
Tags : reputational risk, it outsourcing, it security, security, risk, security breach, digital presence, it assets
     IBM
By: IBM     Published Date: Apr 09, 2015
Integrated security intelligence solutions help organizations use labor-saving automation to proactively identify security weaknesses, prioritize remediation tasks and take quick corrective action to minimize potential risks across a dynamic infrastructure.
Tags : ibm, integrated security, security weakness, risk management, infrastructure security
     IBM
By: IBM     Published Date: Aug 01, 2018
Your customers aren't the only ones who can benefit from advancing artificial intelligence (AI) support — your employees can, too. Chatbots help employees who service customers, and you can build them with mature AI components. But success requires a focus on tasks rather than job replacement as well as a cyborg-like division between human and machine tasks. This report helps infrastructure and operations (I&O) pros determine which tasks are best executed by people and which are best left to machines, with use cases describing how that looks.
Tags : 
     IBM
By: Group M_IBM Q119     Published Date: Mar 05, 2019
For years, executives have been automating for efficiency, freeing workers from repetitive tasks, streamlining the back office and looking for cost savings. Now, they are exploring intelligent automation to establish thinking processes—processes that communicate realtime insights to employees, customers and partners across an expanding ecosystem. The ability to add intelligence to automation opens a new universe of possibilities that will have a profound impact on the way organizations operate and the way work gets done. More than anything else, intelligent automation will be a defining factor for the future workforce.
Tags : 
     Group M_IBM Q119
By: IBM     Published Date: Apr 20, 2017
The growth of virtualization has fundamentally changed the data center and raised numerous questions about data security and privacy. In fact, security concerns are the largest barrier to cloud adoption. Read this e-Book and learn how to protect sensitive data and demonstrate compliance. Virtualization is the creation of a logical rather than an actual physical version of something. such as a storage device, hardware platform, operating system, database or network resource. The usual goal of virtualization is to centralize administrative tasks while improving resilience, scalability and performance and lowering costs. Virtualization is part of an overall trend in enterprise IT towards autonomic computing, a scenario in which the IT environment will be able to manage itself based on an activity or set of activities. This means organizations use or pay for computing resources only as they need them.
Tags : data protection, data security, data optimization, organization optimization, cloud management, virtualization, data center, cloud environment
     IBM
By: BlackBerry     Published Date: Jan 06, 2011
With consumer use of smartphones growing by the day, it's no surprise that users are taking them into the workplace as well. Thousands of people already use their personal smartphones for work-related tasks like checking email and calendars when they're away from their desks. And many wish they could do more with their smartphones, given their myriad functions and applications.
Tags : blackberry, enterprise server, desktop manager, communications software, rim, microsoft exchange, mobile device management, mobile device management software
     BlackBerry
Start   Previous    1 2 3 4 5 6 7 8 9 10 11    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics