RSS feed Get our RSS feed

News by Topic

just time

Results 126 - 150 of 227Sort Results By: Published Date | Title | Company Name
By: IBM Software     Published Date: Nov 02, 2010
Learn how leading insurance companies are using data mining techniques to target claims with the greatest likelihood of adjustment, improving audit accuracy, and saving time and resources.
Tags : ibm cognos predictive analysis, data mining, insurance fraud detection, analytical technique, prevention
     IBM Software
By: Incapsula     Published Date: Nov 06, 2017
Does your website load in two seconds or less? If not, you could be disappointing nearly half of your customers. According to Kissmetrics, 47 percent of e-commerce users expect websites to load in less than two seconds – and nearly a quarter of them will abandon your website entirely if it takes longer than four seconds. Additionally, 50 percent of customers shop on their mobile phones. In other words, your website needs to load fast and be optimized or your customers will leave. The reality is that an e-commerce company can increase revenue by up to 7 percent just by making the load time one second faster. So, how can your company improve its site performance and make it faster? The best practices outlined in this whitepaper can reduce your site’s loading time, improve your user experience, and ultimately increase your company’s revenue.
Tags : 
     Incapsula
By: Incapsula     Published Date: Nov 06, 2017
You’ve probably heard about distributed denial of service (DDoS) attacks, or maybe you’ve even been hit by one. If you’re like most organizations, you’ve already been DDoSed. Perhaps the attack was minor, a wakeup call, but then the attack subsided without causing damage and you just left DDoS protection on your “to-do list.” If you don’t have a DDoS attack plan, it’s probably time to bump it up to the top of your list. That’s because DDoS attacks are getting bigger, persistent, and more harmful. They inflict serious cost in terms of lost revenue, damaged systems and lost consumer trust. DDoS is no longer just a web server problem; infrastructure is now a target. The attacker’s ambition is clear: Take down your online existence and harm your organization.
Tags : 
     Incapsula
By: Infor     Published Date: Feb 27, 2007
In today's global manufacturing environment where customers are requiring manufacturers to do more and more with less and less, Lean manufacturing is emerging as a mantra; something that has implications for the entire product value stream and moves well beyond the Just-In-Time (JIT) method of parts stocking.
Tags : productivity, supply chain management, scm, manufacturing, efficiency, enterprise resource planning, erp, lean methods
     Infor
By: Infosys     Published Date: May 21, 2018
Some companies dig for oil. But sometimes, its just as important to search out valuable rig data and bring it to the surface where it can be seen by the right people, at the right time. As they say, data is the new oil.
Tags : data, company, value, technology, information
     Infosys
By: Infosys     Published Date: May 21, 2018
Imagine being able to find the perfect bartender to staff a five-star resort or hire an Italian chef for a week in Switzerland - all in real time, all with zero human touch, with digital contracts and signatures, all revenue passing through the platform, all payments made within 48 hours - tax, legal and regulatory compliance included. We made it happen for our client.
Tags : recruiting, company, employee, automated
     Infosys
By: Inovis     Published Date: Aug 06, 2007
When companies adopted Just-In-Time (JIT) tactics, they did so primarily to reduce inventory costs. For the most part, this strategy worked. Reducing stocks of raw materials, parts, assemblies and finished goods reduces carrying costs, allowing companies to invest the freed-up funds in more productive assets and projects.
Tags : supply chain, scm, supply chain management, inovis, spend management, cost control, inventory, inventories
     Inovis
By: Iovation     Published Date: Sep 25, 2009
After $20,000 in direct losses and who knows how many lost opportunities, we just couldn't stay in reaction mode. We went looking for a proactive solution and found iovation. We were drawn to the idea of sharing fraud profiles with other subscribers. Plus, the fraud checking is done in real time and it scales to volume which eased my concerns about customer impact. Implementation was straightforward. Preventing half the fraud attempts each month pays for the system; we've seen a 95% reduction in our chargeback rate in 8 months.
Tags : iovation, sharing fraud profiles, fraud protection service, on-line mmo gaming, rmt, real money trading
     Iovation
By: Jive Software     Published Date: Mar 09, 2012
Social Customer Service offers a new approach that doesn't just tweak the existing trade-offs. It rewrites the entire equation, so companies can boost customer satisfaction, improve rep productivity, and reduce support costs at the same time. Download this whitepaper and learn how Jive can transform your customer service & support teams.
Tags : customer satisfaction, customer service, jive, technology, support, technical support
     Jive Software
By: Jobvite     Published Date: Mar 31, 2015
Once upon a time, finding candidates meant posting a job description…and then waiting. But today, everything’s different. • Jobs have changed • Jobseekers have changed • Technology has changed But here’s the kicker: When candidates change, and the recruiting environment changes, your job as a recruiter will change, too. Are you ready to adapt? If you aren't sure, don’t fret. A number of recruiters today are faced with the challenge of adjusting to the new climate. Now is the perfect time to analyze your behavior and rethink your perspective. Here’s a look at seven of the top “sins” recruiters commit today, along with valuable direction for correcting your bad habits.
Tags : jobseekers, job search, stem, employment, recruiting, technology, hiring, sourcing
     Jobvite
By: Kaspersky Lab     Published Date: Oct 30, 2014
Businesses today are faced with the almost insurmountable task of complying with a confusing array of laws and regulations relating to data privacy and security. These can come from a variety of sources: local, state, national, and, even, international law makers. This is not just a problem for big businesses. Even a small business with a localised geographic presence may be subject to laws from other states and, possibly, other nations by virtue of having a presence on the internet. In many instances, these laws and regulations are vague and ambiguous, with little specific guidance as to compliance. Worse yet, the laws of different jurisdictions may be, and frequently are, conflicting. One state or country may require security measures that are entirely different from those of another state or country. Reconciling all of these legal obligations can be, at best, a full time job and, at worst, the subject of fines, penalties, and lawsuits.
Tags : byod, device discovery, data privacy, data security, it security, security
     Kaspersky Lab
By: Kenandy     Published Date: Jan 28, 2015
Are you considering moving some or all of your ERP to the cloud? If so, you’re aware of the many bene?ts of cloud ERP, including quick time to value, social and mobile collaboration for your users, and the ?exibility to rapidly adapt your processes as your business changes. But, you may be asking—how should I start my journey to cloud ERP? Which is the best route for my company? In this white paper, we illuminate the high-value routes customers take to cloud ERP and drivers behind their choices. You will learn about the options to consider along the way and how to stay on track. Whatever road you choose, it’s important that you get started. Cloud ERP is not just a destination, it’s a transformation that will give your company faster time to value and the ?exibility to quickly adapt to changing business needs.
Tags : cloud erp, quick time to value, high-value routes
     Kenandy
By: Kronos     Published Date: Jul 26, 2017
When it comes to time, there never seems to be enough. Just ask any payroll professional. Time constraints are nothing new, but what is new is how payroll professionals are tackling the challenge. They are discovering how to strategically leverage today’s best-of-breed human capital management (HCM) technology to better manage the expectations and demands placed on today’s payroll teams to achieve greater business results. By investing in an HCM solution as an integral part of their workforce management strategy, businesses can align and create efficiencies within three core areas of payroll — compliance, processes, and data visibility. This will free up time for an already over-burdened payroll team that can add value, deliver on actionable real-time data, and execute on company-driven projects that can impact organizational goals and improve bottom-line results.
Tags : payroll, human capital management, workforce management, compliance, processes, data visibility
     Kronos
By: Kronos Incorporated     Published Date: Jan 23, 2013
For High-Performing Organizations, Time and Attendance Is More Than Just Tracking and Automating Timesheets
Tags : it trends, big data, workforce management, cloud, cloud computing, hrms, small business, hris
     Kronos Incorporated
By: Limelight     Published Date: Feb 16, 2018
When it comes to delivering digital content, downtime isn’t the only concern. Today a poor user experience can be just as damaging as an outage. According to Limelight research, 78% of people will stop watching an online video after it buffers three times, and the majority of people will not wait more than 5 seconds for a website to load. Organizations looking to deliver great digital experiences for their customers often choose to deliver that content using Content Delivery Networks (CDNs). Using multiple CDNs to deliver these digital content experiences promises even greater levels of availability and performance. But it brings with it a host of questions. In this paper we’ll explore the 5 things you should know about multi-CDN in order to determine if it might make sense for your business.
Tags : content delivery network, cdn, multi-cdn, multiple cdns, website performance, website acceleration, digital content delivery, mobile delivery
     Limelight
By: Limelight Networks     Published Date: Mar 02, 2018
Can your business afford to lose $9,000 per minute? According to the Ponemon Institute $9,000 is the average cost of an unplanned outage. In some cases the costs are much higher. The catalogue of cloud outages over recent years is well publicized and reads like a “who’s who” of the technology industry. It seems no one is immune. But when it comes to delivering digital content, downtime isn’t the only concern. Today a poor user experience can be just as damaging as an outage. According to Limelight research, 78% of people will stop watching an online video after it buffers three times, and the majority of people will not wait more than 5 seconds for a website to load. Organizations looking to deliver great digital experiences for their customers often choose to deliver that content using Content Delivery Networks (CDNs). Using multiple CDNs to deliver these digital content experiences promises even greater levels of availability and performance. But it brings with it a host of questi
Tags : content delivery network, cdn, multi-cdn, multiple cdns, web performance, web acceleration, digital content delivery, mobile delivery
     Limelight Networks
By: Limelight Networks     Published Date: Mar 02, 2018
Can your business afford to lose $9,000 per minute? According to the Ponemon Institute $9,000 is the average cost of an unplanned outage. In some cases the costs are much higher. The catalogue of cloud outages over recent years is well publicized and reads like a “who’s who” of the technology industry. It seems no one is immune. But when it comes to delivering digital content, downtime isn’t the only concern. Today a poor user experience can be just as damaging as an outage. According to Limelight research, 78% of people will stop watching an online video after it buffers three times, and the majority of people will not wait more than 5 seconds for a website to load. Organizations looking to deliver great digital experiences for their customers often choose to deliver that content using Content Delivery Networks (CDNs). Using multiple CDNs to deliver these digital content experiences promises even greater levels of availability and performance. But it brings with it a host of questi
Tags : content delivery network, cdn, multi-cdn, multiple cdns, web performance, web acceleration, digital content delivery, mobile delivery
     Limelight Networks
By: LogRhythm     Published Date: Jun 19, 2018
Every year, organizations spend millions of frustrating hours and countless sums of money trying to reverse the damage done by malware attacks. The harm caused by malware can be astronomical, going well beyond intellectual property loss and huge fines levied for non-compliance. In 2014, the cost of malware attacks and resulting breaches was estimated at $491 billion. i And these costs include more than just the money spent trying to directly respond to security breaches. Productivity, long-term profitability, and brand reputation are often severely impacted as well. The malware threat is growing larger and becoming more challenging to respond to every year. It seems like every month there are more major breaches. Target, Neiman Marcus, and UPS have all been victims of costly breaches in the past couple years, with each event showing signs that the breaches could have been prevented. Phishing-based malware was the starting point 95 percent of the time in state-sponsored attacks, and 67
Tags : hack, malware, intellectual, property, compliance
     LogRhythm
By: Lumension     Published Date: Oct 20, 2014
"Just over a decade ago, the outcry over Microsoft’s security problems reached such a deafening level that it finally got the attention of Bill Gates, who wrote the famous Trustworthy Computing memo. Today, many would say that Microsoft leads the industry in security and vulnerability handling. Now, it’s Java that’s causing the uproar. But has Oracle learned anything from Microsoft in handling these seemingly ceaseless problems? In this webinar, Randy Franklin Smith from Ultimate Windows Security will start by reviewing the wide-ranging Java security changes Oracle is promising to make. They sound so much like the improvements Microsoft made back with Trustworthy Computing that I’m amazed it hasn’t been done before! We’ll move on to discuss what you can do now to address Java security in your environment. One of the banes of security with Java is the presence of multiple versions of Java, often on the same computer. Sometimes you really need multiple versions of Java to support appli
Tags : java, insecurity, vulverabilities, computing, security
     Lumension
By: Marathon Technologies     Published Date: Nov 18, 2009
High availability solutions are no longer an all or nothing discussion about expensive, proprietary solutions. Today there are wide range of affordable alternatives that provide the required level of availability at a cost justified by the risks of downtime.
Tags : marathon, downtime, everrun, server, failure, outage, windows, sql
     Marathon Technologies
By: MarkLogic     Published Date: Jun 09, 2017
Your high-stakes data projects don’t have to end – as analysts predict – in failure. Don’t just rely on legacy technology and outdated thinking - the key is to start your next data project armed with the right technology and mindset to succeed. This paper will give you insights and guidelines to help you learn how to leverage all of your data to reach your data integration objectives with less time and expense than you might imagine. Change is good, and in this paper we’ll give you real-world examples of organizations that embraced change and found success.
Tags : 
     MarkLogic
By: MarkLogic     Published Date: Nov 07, 2017
Your high-stakes data projects don’t have to end – as analysts predict – in failure. Don’t just rely on legacy technology and outdated thinking - the key is to start your next data project armed with the right technology and mindset to succeed. This paper will give you insights and guidelines to help you learn how to leverage all of your data to reach your data integration objectives with less time and expense than you might imagine. Change is good, and in this paper we’ll give you real-world examples of organizations that embraced change and found success.
Tags : 
     MarkLogic
By: McAfee     Published Date: Nov 09, 2009
Medium organizations around the globe are increasingly concerned about cyberthreats, and the rising number of incidents shared publicly certainly justifies their worries. In the first half of 2009, for example, McAfee Labs saw almost as much new malware as it did in all of 2008. At the same time, most organizations have frozen or cut their IT security budgets. Threats up, budgets down. This is what we call the "security paradox."
Tags : mcafee, risk management, security, security management, security threats, vulnerability assessments, vulnerability management
     McAfee
By: McAfee Inc     Published Date: Oct 26, 2009
Medium organizations around the globe are increasingly concerned about cyberthreats, and the rising number of incidents shared publicly certainly justifies their worries. In the first half of 2009, for example, McAfee Labs saw almost as much new malware as it did in all of 2008. At the same time, most organizations have frozen or cut their IT security budgets. Threats up, budgets down. This is what we call the "security paradox."
Tags : mcafee, security, cyberattacks, midsize, cyberthreats, compliance, security tools, sans
     McAfee Inc
By: Microsoft     Published Date: Jul 20, 2018
When it comes to performance, Azure SQL Database is built for you, the developer. Azure SQL Database is designed to make your work easier and let you focus on other priorities. It scales on the fly, without downtime, with capabilities that make it great for building multitenant software as a service (SaaS) apps. Plus, it learns and adapts to your database workload, whatever that may be, using built-in intelligence to continually adjust and improve over time. That said, there’s more to a successful app than impressive performance. That’s why we built Azure SQL Database to be just as intelligent in other areas, such as availability and security, so that you won’t need to worry about those essentials either. Finally, we built Azure SQL Database to let you work the way you want, using the tools and platforms you prefer. It’s why we call Azure SQL Database the intelligent database for developers. Read on to learn more, and we’re sure you’ll agree.
Tags : 
     Microsoft
Start   Previous    1 2 3 4 5 6 7 8 9 10    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics