RSS feed Get our RSS feed

News by Topic

teams

Results 876 - 900 of 1194Sort Results By: Published Date | Title | Company Name
By: Microsoft Office 365     Published Date: Jan 05, 2018
Discover how Microsoft Teams is transforming collaboration through unified and intelligent communications experiences to a diverse workforce. Plus, see a hands-on demo of the new meetings experiences within Microsoft Teams, including recording meetings, transcription, immersive HD, and more.
Tags : 
     Microsoft Office 365
By: IBM     Published Date: Jun 13, 2016
A recent Human Capital Institute report found that 69% of respondents are having difficulty filling critical positions and only 20% agree that they have a strong talent pipeline for critical roles. Competition is fierce and the power has clearly shifted from employers to the candidate. Today’s job candidates expect to be treated like consumers, and the most successful marketing teams know that consumers are increasingly suspicious of brands. These marketing teams implement strategies to foster trust and loyalty among their target audience. Just like marketers, recruiters must have the ability to not only attract but engage candidates as well, and they are tasked with fostering that same trust and loyalty among the candidates they hire as well as the ones they don’t. It’s not enough to just leverage the latest tools and implement trend-setting processes in the recruiting department. Recruiters must also live the employer brand every day. Living the brand encompasses demonstrating the EV
Tags : ibm, ibm smarter workforce, work trends, employee acquisition, recruiting, recruiters
     IBM
By: AWS     Published Date: Jun 03, 2019
Background Businesses are often challenged with the complexities of protecting their physical, virtual, and cloud workloads while also meeting their part of the Amazon Web Services (AWS) Shared Responsibility Model. IT security leaders are inundated with too many security tools that aren’t built for their specific environments. Additionally, these responsibilities often entail large amounts of manual processes and people to administer them. As such, there is a need for a solution that provides a secure environment for you to transact your business without slowing you down. Trend Micro™ Deep Security™ is optimized to support the broadest set of platforms and environments (on-premises, virtual, on AWS, or containers) while delivering multiple threat defense techniques to help DevOps teams rapidly detect security incidents, fulfill compliance requirements, and securely deploy containers.
Tags : 
     AWS
By: AWS     Published Date: Jun 03, 2019
Background As your business grows, so do your infrastructure needs. With their growing AWS infrastructure, it was important that Informatica simplify security, increase agility, and adopt a more DevOps-centric development model. Join our upcoming webinar to learn how Informatica leveraged RedLock, Palo Alto Networks’ security and compliance solution, to help build security earlier in the development process so vulnerabilities could be remediated faster. You will also learn how other businesses, like yours, can manage the security in your environment with greater ease and control.
Tags : 
     AWS
By: AWS     Published Date: Jun 03, 2019
Background How do you maintain secure systems and operations across an elastic, complex AWS environment? As SailPoint transformed from a startup to a publicly traded company, their AWS infrastructure grew as well. With this growth, SailPoint needed to be able to identify and respond to anomalous behavior quickly, while simultaneously trying to align their organization into a cohesive DevSecOps organization. Join this webinar to learn how SailPoint gained a holistic view into their cloud infrastructure, plus how you can enable your Security and DevOps teams with in-depth insights into AWS infrastructure to make actionable, data-driven decisions to reduce risk.
Tags : 
     AWS
By: AWS     Published Date: Jun 03, 2019
cBackground Fulfilling the security and compliance obligations within the AWS Shared Responsibility Model is critical as organizations shift more of their infrastructure to the cloud. Most infrastructure and application monitoring solutions haven’t caught up to meet these new requirements, forcing IT and security teams to resort to traditional monitoring strategies that don’t allow for innovation and growth. Join us for this webinar to learn how Splunk and AWS give you end-to-end visibility across your applications and help quickly detect potential security threats. Find out how Experian leveraged Splunk Cloud to deliver log data in near real-time to their operations teams for analysis and monitoring, roll out new features/updates faster, create reusable features to deploy in multiple customer environments to scale with their business, and ensure adherence to security and compliance standards.
Tags : 
     AWS
By: AWS     Published Date: Jun 04, 2019
Description Organizations are shifting to containers for its many benefits, including increased developer productivity and an improved, modernized environment for customized applications. While Kubernetes helps organizations get the most out of those benefits, it is complex by nature and can be difficult to manage on your own. Developers need a solution that drives productivity without needing to worry about managing infrastructure. SUSE Cloud Application Platform on Amazon Web Services (AWS) provides a lean and fast platform to accelerate containerized application delivery. By leveraging a managed Kubernetes environment, SUSE makes it easier for DevOps teams to deliver applications, accelerate innovation, and improve IT responsiveness.
Tags : 
     AWS
By: AWS     Published Date: Jul 10, 2019
Being able to monitor and respond to patient inquiries quickly and effectively is critical to creating a positive clinical experience and delivering successful products. But compiling and monitoring this data to address customer concerns in a timely way is a challenge when you have disparate sources and systems, global teams, and multiple patients. Read how a top 10 global pharmaceutical company worked with Slalom and AWS to design and implement a unified and globally distributed event and inquiry data reporting system. By combining three types of requests into one solution, the company has improved the customer experience and increased call center and data input operational efficiency by 50%. Learn how to Increase access to relevant data to help inform future or ongoing clinical trials Adapt your existing system development processes to an agile approach Engage with Slalom and AWS throughout the lifecycle of a healthcare engagement
Tags : 
     AWS
By: SnowFlake     Published Date: Jul 08, 2016
This EMA case study profiles the implementation of the Snowflake Elastic Data Warehouse, a new generation of cloud-based data warehouses, by Accordant Media. This document details significant tangible and intangible improvements and opportunities the Snowflake solution created for the Accordant Media infrastructure and analytical teams.
Tags : snowflake, media, data, technology, cloud-based data, best practices
     SnowFlake
By: AstuteIT_ABM_EMEA     Published Date: Feb 28, 2018
In modernen Unternehmen ist es üblich, dass Unternehmen über 80 % ihrer Workloads in einer virtuellen Infrastruktur bereitstellen, die Hunderte bis Hunderttausende virtuelle Maschinen umfassen kann. Während IT-Unternehmen und Produktionsteams beträchtliche Vorteile durch die Virtualisierung erzielt haben, bringt diese jedoch auch erhebliche Komplexität und Unsicherheit bei der Sicherung wichtiger Daten mit sich. Die Bereitstellung mehrerer Einzelprodukte zur Datensicherung verursacht Probleme bei der Interoperabilität, was zu Lücken bei der Datensicherung, Nichteinhaltung von Recovery Time Objectives und Recovery Point Objectives sowie zusätzlichen Gemeinkosten für Support und Wartung führen kann.
Tags : netbackup, microsoft, herausholen, plattform, astute
     AstuteIT_ABM_EMEA
By: Astute IT DACH     Published Date: Feb 28, 2018
In modernen Unternehmen ist es üblich, dass Unternehmen über 80 % ihrer Workloads in einer virtuellen Infrastruktur bereitstellen, die Hunderte bis Hunderttausende virtuelle Maschinen umfassen kann. Während IT-Unternehmen und Produktionsteams beträchtliche Vorteile durch die Virtualisierung erzielt haben, bringt diese jedoch auch erhebliche Komplexität und Unsicherheit bei der Sicherung wichtiger Daten mit sich. Die Bereitstellung mehrerer Einzelprodukte zur Datensicherung verursacht Probleme bei der Interoperabilität, was zu Lücken bei der Datensicherung, Nichteinhaltung von Recovery Time Objectives und Recovery Point Objectives sowie zusätzlichen Gemeinkosten für Support und Wartung führen kann.
Tags : netbackup, microsoft, herausholen, plattform, astute
     Astute IT DACH
By: Centrify Corporation     Published Date: Dec 04, 2014
The number of identities that an organization must control and secure is exploding as companies support the evolution of business. Traditional users, customers and partners, outsourced or offshore IT, support and development teams, and new users from mergers and acquisitions are working from increasingly distributed locations and devices and to be efficient they need the right set of privileges across a diverse set of servers and applications. So, how can an organization successfully control privilege for all of these identities to mitigate identity-related risk without slowing down the business? From this webinar you will learn: • Forrester’s predictions for next generation privileged identity management. • How best-in-class organizations are successfully controlling privilege and mitigating risks
Tags : identity management, it support, security, identity management, controlling privilege
     Centrify Corporation
By: ReadyTalk     Published Date: Sep 19, 2014
Marketing teams are now expected to churn out a nonstop stream of qualified leads for their sales departments. Webinars should be a tactic every marketer uses. This paper will help you establish best practices during webinar production, promotion, delivery and follow up as you identify and qualify sales leads. The included tips assume a business-to-business.
Tags : webinars, qualified, leads, generation, strategy, marketing, investment, time
     ReadyTalk
By: OKTA     Published Date: Mar 30, 2018
"The enterprise cloud revolution is here. IT organizations everywhere, from small and mid-sized to Fortune 500 companies, are moving from on-premises software to on-demand, cloud-based services. As enterprise IT makes this transition to a new hybrid on-demand/on-premises configuration, controlling access to applications becomes increasingly important. CIOs and their teams have a whole new set of identity management challenges; their role is also fundamentally changing. As the steward of these new services, IT must provide insight and advice about Software-as-a-Service (SaaS) products to ensure the company gets the highest business value of their investments. Read this eBook to learn eight main identity and access management (IAM) challenges of adopting and deploying cloud applications. And, most importantly, best practices for addressing each of them."
Tags : 
     OKTA
By: SAS     Published Date: Mar 06, 2018
The most recent decade has seen rapid advances in connectivity, mobility, analytics, scalability, and data, spawning what has been called the fourth industrial revolution, or Industry 4.0. This fourth industrial revolution has digitalized operations and resulted in transformations in manufacturing efficiency, supply chain performance, product innovation, and in some cases enabled entirely new business models. This transformation should be top of mind for quality leaders, as quality improvement and monitoring are among the top use cases for Industry 4.0. Quality 4.0 is closely aligning quality management with Industry 4.0 to enable enterprise efficiencies, performance, innovation and business models. However, much of the market isn’t focusing on Quality 4.0, since many quality teams are still trying to solve yesterday’s problems: inefficiency caused by fragmented systems, manual metrics calculations, quality teams independently performing quality work with minimal cross-functional own
Tags : 
     SAS
By: SAS     Published Date: Jun 06, 2018
The Internet of Things (IoT) is rapidly emerging as a core transformational technology of the digital era. The ability to gather data from sensors embedded throughout an enterprise can drive insights and operational efficiencies from the supply chain to the customer. But IoT and Industrial IoT (IIoT) implementations require high degrees of IT/OT convergence - collaboration and integration between information technology and operational technology groups - to succeed. These two groups, however, often have different goals, performance metrics, and perspectives on both the collaboration and the outcome. This SAS/HPE-sponsored paper helps readers get a better understanding of the relationship, either real or perceived, between these two groups. Futurum Research surveyed the state of the relationship between IT and OT teams as it pertains to the design, implementation, and creation of value through IoT technologies.
Tags : 
     SAS
By: Qualys     Published Date: Jan 11, 2017
One of the biggest challenges faced by information security teams today is how to e?ectively prioritize their vulnerability remediation work.Burdened with this overload of vulnerability disclosures, infosec teams often get overwhelmed by the task at hand and throw up their hands in frustration. After all, no IT department has enough sta? and resources to promptly patch every single vulnerability within their environment.
Tags : information security, it compliance, it audit, it security, network security, web application security, application security
     Qualys
By: Intermedia     Published Date: Nov 10, 2008
For companies with strapped and/or non-existent IT teams, outsourcing Microsoft Exchange can be an extremely smart, cost-effective option. While the hosted email market is indeed growing fast, a few stubborn myths continue to hold back many businesses from embracing it as a viable option to an in-house solution. In this article we will debunk those falsehoods one by one to show why a hosted Exchange model is the best choice for smaller organizations.
Tags : intermedia, exchange solution, exchange model, in-house exchange solution, hosted exchange solution, security
     Intermedia
By: Neolane, Inc.     Published Date: Dec 30, 2008
The late 1990s marked AXA Bank’s foray into email marketing. For the first phase of this project, AXA Bank management decided to use a bulk email tool to push Web content to customers. However, this tool rapidly showed its limitations in terms of scalability and functionality. No personalization, tracking or reporting functionality was available, and many operations (such as list management) had to be performed outside the tool, by hand. Marketing teams also required constant IT support, especially as email volumes increased.  By 2002, ready for a more sophisticated approach, the bank sought to personalize and expand its online marketing to improve effectiveness.
Tags : email marketing, neolane, axa bank, personalizing online marketing, list management, crm software, custom content, deliverability
     Neolane, Inc.
By: Neolane, Inc.     Published Date: Mar 12, 2009
Enterprise marketing software is widely recognized as a key enabler for improving effectiveness and efficiency of marketing teams. However, for marketers who are already facing intense scrutiny over budgets and campaign effectiveness, few are willing to stick their necks out to recommend implementing a marketing automation system.
Tags : cmo, neolane, enterprise marketing software, return on investment, roi, customer experience, right deployment, on premise software solutions
     Neolane, Inc.
By: SERENA Software, Inc     Published Date: Jun 23, 2009
Learn what you can do to unify development processes, drive down development costs and improve productivity and coordination across distributed teams. Leverage existing investments in tools, systems and methodologies to increase visibility, control and effectiveness with your application development processes.
Tags : process management, visibility, control, application development, unified development, serena software, best practices, serena
     SERENA Software, Inc
By: Electric Cloud     Published Date: Nov 04, 2009
ElectricAccelerator improves the software development process by reducing build times, so development teams can reduce costs, shorten time-to-market, and improve quality and customer satisfaction.
Tags : electric cloud, electricaccelerator, software development, dependency management, software build accelerator, visualization, cluster manager, open source
     Electric Cloud
By: Salesforce.com     Published Date: Mar 11, 2008
This 34 page guide readies you for a Salesforce Mobile rollout. Salesforce Mobile helps your mobile teams succeed by keeping them in touch with the latest data, whenever and wherever they need it, directly from mobile devices. With Salesforce Mobile, field professionals are prompted to log information directly in Salesforce or AppExchange apps immediately after important customer calls, emails, and appointments, so critical information is logged in near real time.
Tags : salesforce, crm, customer relationship management, sales tools, collaboration, smart phones, blackberry, appexchange
     Salesforce.com
By: GoToTraining     Published Date: Jul 08, 2011
This new SandHill Group white paper explores the powerful advantages of SaaS technologies in addressing the challenges of a global market, virtual teams and an ever-changing business climate.
Tags : citrix gototraining, business collaboration, cloud computing, saas technologies, business climate, productivity, competitive edge, geographic reach
     GoToTraining
By: CollabNet     Published Date: Mar 30, 2012
Strategies on how to build and maintain a good product backlog. She describes the overall concepts and techniques for backlog management and how each of the project contributors can contribute to its overall effectiveness.
Tags : agile, scrum, teams, software dev, swdev, product backlog, backlog, success
     CollabNet
Start   Previous    29 30 31 32 33 34 35 36 37 38 39 40 41 42 43    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics