RSS feed Get our RSS feed

News by Topic

strategies

Results 1651 - 1675 of 1691Sort Results By: Published Date | Title | Company Name
By: IBM     Published Date: Jul 14, 2016
A basic business component, GRC strategy is implemented by all companies in some way shape or form, but it is not done well for many. Strategies need to be strong, structured, and integrated. Download the findings of the 2016 OCEG's GRC Technology Strategy Survey report to see how your GRC system stacks up against your peers. You'll learn how organizations currently and plan to use GRC technology and what strategies for GRC technology use are being employed by industry leaders.
Tags : technology, best practices, productivity, data, competitive advantage
     IBM
By: IBM     Published Date: Jul 20, 2016
Unlock the people equation: Using workforce analytics to drive business results
Tags : ibm, human resources, hr analyrics, workforce analytics, workforce strategies
     IBM
By: IBM     Published Date: Jul 20, 2016
Big data. We've heard the phrase for quite some time, but how can human resource leaders get into the action? One way is through the development and implementation of talent analytics strategies. Talent analytics is fundamentally changing the way organizations and practitioners are thinking about the role of HR and organizations uncovering never before seen insights.
Tags : ibm, talent acquisition, talent acquisition technology, human resources, recruiting
     IBM
By: IBM     Published Date: Jul 22, 2016
In this webcast you will learn about: - The new dynamic and market landscape for talent - New imperatives and talent strategies for organizations - Lessons from best practice organizations
Tags : ibm, talent acquisition, talent acquisition technology, human resources, recruiting
     IBM
By: Hewlett Packard Enterprise     Published Date: Jul 18, 2018
"This 56 page guide explores the foundational components of Hybrid IT, strategies to help CIOs partner with the business, and “key plays” that, if executed successfully, enable successful and sustainable digital transformation. Learn how transitioning to a Hybrid IT model can help you make the most of limited resources and free your team to spend less time keeping the lights on, and more time contributing to revenue growth as active participants in business innovation. "
Tags : 
     Hewlett Packard Enterprise
By: Hewlett Packard Enterprise     Published Date: Jul 18, 2018
How hyperconverged infrastructure can reduce costs and help align enterprise IT with business needs. Includes chapters on hyperconvergence and cloud, datacenter consolidation, ROBO deployment, test and development environments, and disaster recovery.
Tags : 
     Hewlett Packard Enterprise
By: Adobe     Published Date: Sep 28, 2016
Marketers shouldn’t work in the dark. The science of online testing shines a light on your marketing, showing you what to optimize throughout the entire customer journey. The new Adobe guide, Finding Eureka, shows you how. Read the guide to learn: - Strategies and best practice approaches to online testing - Incremental steps to improving your online testing - The benefits of different test types including A/B, A/Bn, multivariate, and multichannel
Tags : adobe, marketing, marketers, market research, emerging marketing, marketing research, traditional marketing
     Adobe
By: Juniper Networks     Published Date: Aug 03, 2017
Agility creates more opportunities for new business and stronger bottom lines. Research from more than a half-dozen experts supports it all. What makes Uber’s and Airbnb’s network infrastructures unique The top factor shaping network strategies today Research from industry experts including Gartner and McKinsey
Tags : business agility, data usage, network infrastructure, information technology
     Juniper Networks
By: IBM     Published Date: Apr 18, 2017
Master data management (MDM) programs provide ways to ensure that data is consistent in different systems throughout an organization, but poorly managed initiatives are large and complicated affairs. This handbook will provides practical advice on how to develop and implement successful MDM programs that can pay big business dividends. Discover expert advice on: - Strategies and tactics for effective MDM processes - The technology considerations that should be factored into project plans - The ramifications of incorporating pools of “big data” into MDM efforts - And more
Tags : data management, data system, business development, software integration, resource planning, enterprise management, data collection
     IBM
By: IBM     Published Date: Oct 26, 2017
With the growing demand of business for tighter communication and collaboration with external parties such as business partners and customers, IT has to provide the technical foundation for such integration. Web Access Management and Identity Federation are key technologies for that evolution. They enable organizations to manage access both from and to external systems, including cloud services, in a consistent way. Organizations have to move forward towards strategic approaches to enabling that integration, in support of the Extended and Connected Enterprise.
Tags : access management, identity federation, it strategies, security, infrastructure
     IBM
By: IBM     Published Date: Oct 26, 2017
Identity and access management exists for one critical reason—security. Organizations need to make certain the right people have access to the right resources to do their jobs—and that people without proper authorization can’t get in. In an era the IBM X-Force security team recently described as experiencing “an ever-upward trend of more attacks, more leaked records and more varied threats,” security is a critical function for business as well as IT.
Tags : access manager, security, cloud service, microsoft office 365, it strategies
     IBM
By: IBM     Published Date: Oct 26, 2017
Authentication is the beating heart of security. The most fundamental action in all of IT is to identify “who you are”—and authentication is the building block that answers that question. Now more than ever, IT teams must do everything they can to ensure that users are who they say they are, and that their credentials have not been stolen. IT is in state of crisis, with hundreds of millions of identities stolen annually. For system administrators, it’s crucial to know which users have the right to access a given resource, and whether unauthorized users have tried to get in.
Tags : user authentication, mobile multi factor authentication, data flows, security, it strategies
     IBM
By: Progress     Published Date: Mar 06, 2017
Download this guide to get a step ahead of the competition, armed with strategies for an optimized, ever-improving plan to drive bottom-line impact using personalization.
Tags : 
     Progress
By: FICO     Published Date: Mar 22, 2018
Predictive analytics provide the foresight to understand cybersecurity risk exposure. Cybersecurity strategies often consist of “whack-a-mole” exercises focused on the perpetual detection and mitigation of vulnerabilities. As a result, organizations must re-think the ever-escalating costs associated with vulnerability management. After all, the daily flow of cybersecurity incidents and publicized data breaches, across all industries, calls into question the feasibility of achieving and maintaining a fully effective defense. The time is right to review the risk management and risk quantifcation methods applied in other disciplines to determine their applicability to cybersecurity. Security scoring is a hot topic, and rightfully so. When evaluating ways to integrate these scores into your cybersecurity strategy, be sure to look for an empirical approach to model development. The FICO Enterprise Security Score is the most accurate, predictive security score on the market.
Tags : 
     FICO
By: Spectrum Enterprise     Published Date: May 15, 2017
Check out this easy-to-absorb infographic, based on Forrester survey data, to learn how your peers view the importance and structure of BCDR strategies.
Tags : 
     Spectrum Enterprise
By: Druva     Published Date: May 22, 2017
Enterprise data is growing at an exponential rate. Download now to learn more!
Tags : 
     Druva
By: Optimizely     Published Date: Jun 02, 2017
How can your brand turn the challenges facing retailers into competitive advantages? Download the guide, Thriving in the Era of Personalization: 5 Challenges for Retailers to Overcome.
Tags : optimizely, success strategies, personalization, retailers, retail, cross-channel experiments, optimize user experience
     Optimizely
By: Juniper Networks     Published Date: Jun 22, 2017
The digital financial services world has created an amplified set of challenges for the data center and network. Its role in enabling the success of the wider institution has become even more critical, but to deliver this it needs to provide a higher level of performance with increased agility, while maintaining high levels of efficiency and security. This is forcing institutions to transform their underlying IT capabilities, with the need to simplify the network, obtain more flexible connectivity, automate IT operations, and enable centralized control and administration being core strategies in this respect. As shown in Figure 8, this is driving a number of requirements for the future network. Key considerations for financial institutions in architecture design and vendor selection should be around moving toward a software-defined, intelligent, cloud-ready, and open network that enables the institution to meet its ICT imperatives and achieve these key ICT strategies.
Tags : account security, data management, network protection, secure systems, application security, network performance, network diagnostics
     Juniper Networks
By: Dassault Systèmes     Published Date: Jun 19, 2018
This white paper outlines a framework that emphasizes digitization and business transformation and the new opportunities pull processes bring. The mechanism of “Pull” processes—those triggered by an actual event instead of a forecast—is nothing new. It is at the heart of many successful manufacturing strategies. Recent technological advances in digitization, including the harnessing of Big Data analytics, the use of the cloud, Business Process Management (BPM), social media, IIoT, and mobility, have extended the power of Pull beyond Lean manufacturing. In the wake of the current technological innovation wave, it is not uncommon for manufacturers to not know what next step to take. In light of these new developments, this white paper will focus on the mechanism of business transformation enabled by these technologies, which can be attributed to two major forces: the power of Pull and digitization. Nine practical applications are detailed, showing how innovative manufacturers can better
Tags : 
     Dassault Systèmes
By: Valerie Schlitt Associates     Published Date: Aug 01, 2017
This Executive Summary is the second part of a two-content piece series to help B2B marketing and sales executives understand and optimize the telemarketing landscape as it exists today. We've heard that cold calling is dead, but is it really? Read Part Two and learn how the experts overcome appointment-setting challenges; read your peers' take on what's working in B2B engagement strategies, and get our handy checklist that can help you evaluate B2B lead generation experts for appointment setting, yours included.
Tags : 
     Valerie Schlitt Associates
By: Google     Published Date: Mar 05, 2018
Content collaboration platforms are the evolution of the EFSS destination products and address digital workplace enablement strategies. Application leaders can choose among a range of options to transform individual productivity, team collaboration and business workflow automation.
Tags : 
     Google
By: CA Technologies EMEA     Published Date: May 25, 2018
CA Project & Portfolio Management is a comprehensive solution for ensuring your business strategy is on target through planning, execution, and insights. CA PPM enables your organization to plan and prioritize investments in alignment with business strategies, track project execution, and shift funding and resources to ensure success and meet changing priorities.
Tags : project, portfolio, management, calculator, execution
     CA Technologies EMEA
By: Fiserv     Published Date: Nov 08, 2017
"Learn how you can reduce loan defects, improve data quality and simplify compliance in the mortgage lending process. Co-presented with Craig Focardi, mortgage industry executive and technology advisor, this webinar provides insights into mortgage lending process challenges and how they impact experiences for lenders and borrowers, as well as the overall performance of the loan. The webinar also provides suggestions for reducing loan defects and strategies to correct them."
Tags : 
     Fiserv
By: CyberSource     Published Date: Sep 26, 2017
Our latest report examines the trends and challenges facing fraud managers today and provides the strategies to address them. Learn how your peers are faring, and see how you compare to them.
Tags : 
     CyberSource
By: Reputation.com     Published Date: Oct 02, 2017
The new year is underway, but your organization’s online reputation precedes you. It’s time to take a look at what’s influencing public perception to prepare for the year ahead. In this report, we examine four key trends guiding the direction of Online Reputation Management strategies in 2017, and provide recommendations for capitalizing on those trends moving forward.
Tags : 
     Reputation.com
Start   Previous    54 55 56 57 58 59 60 61 62 63 64 65 66 67 68    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics