RSS feed Get our RSS feed

News by Topic

act

Results 13676 - 13700 of 14573Sort Results By: Published Date | Title | Company Name
By: Coupa Software Inc.     Published Date: Jul 10, 2017
Many companies think of their accounts payable (AP) department as a transactional function—it’s essential to your operation, but too often it’s weighed down with people-heavy paper processes. If your AP department is focused on data entry and resolving escalations, you’re missing a valuable business opportunity.
Tags : coupa, accounts payable, capital management, finance, eprocurement, suppliers
     Coupa Software Inc.
By: Aon Hewitt     Published Date: May 25, 2016
Today in the United States, employer-sponsored health benefits are the source of coverage for more than 149 million individuals.1 Fueled by many factors, including rising costs, legislative changes, new provider models, and evolving market forces, the health care industry is undergoing a transformation. And as health care evolves, so must the employer’s role in it. What has not changed, however, is employers’ belief that health benefits are a key differentiator for talent. In fact, most large employers plan to continue offering coverage in spite of the uncertainties in the health care market. To keep pace with the changing environment, employers must rethink their role in health coverage: how they sponsor, structure, and deliver health benefits, and how they manage costs while keeping employees healthy, productive, and satisfied.
Tags : health care, employer-sponsored benefits, healthy benefits, manage costs
     Aon Hewitt
By: AVI-SPL     Published Date: Sep 01, 2016
There are a few factors that are influencing the complexity of enterprise collaboration. In this tech brief, we’ll examine three issues that often surface when we work with IT teams on a Collaboration Program Assessment.
Tags : collaboration, enterprise collaboration, video conferencing, video meetings, video
     AVI-SPL
By: Tripwire     Published Date: Jun 30, 2009
Learn about the financial institution safeguards included in the Gramm-Leach-Bliley Act (GLBA) and how your organization can institute an orderly set of compliance steps using an automated configuration audit and control solution.
Tags : tripwire, glba, compliance, managers, officers, directors, financial, institutions
     Tripwire
By: Telstra     Published Date: Jan 27, 2016
This white paper reveals how Telstra helps a range of customers across multiple industries transform their businesses through digital technology.
Tags : digital technology, digital business, digital transformation, telstra, customer interaction, on-demand content, share content, data
     Telstra
By: CSB by Cornerstone on Demand     Published Date: Jun 26, 2013
Need to fix your company's performance management? Want to make woeful performance reviews a thing of the past? Collect actually useful data and actually use it? Build a robust people strategy? Ensure your company's ongoing success? Take over the world (of successful performance management)? Download this paper to learn more.
Tags : performance management, human resources
     CSB by Cornerstone on Demand
By: Adobe     Published Date: Jul 04, 2016
More and more interactions are shifting from the desktop to smartphones and tablets, so the value of that screen and the massive potential it represents grows daily. As do the opportunitie —and potential pitfalls—for marketers.
Tags : mobile, mobility, customer interaction, mobile devices, crm solutions/software, customer experience/engagement, mobile marketing
     Adobe
By: Constant Contact     Published Date: Mar 10, 2016
The average consumer goes through 6 channels before they make a purchase decision. You and your small business clients know that a multi-channel approach is a must to reach them, but how do you make your campaign work smarter and harder? Find out!
Tags : marketing, digital agency, campaigns, multi-channel approach, constant contact, internet marketing
     Constant Contact
By: Adobe     Published Date: Mar 21, 2017
Mobile apps are becoming core to almost everything we do by making us more efficient and better connected to the world around us. Those benefits are now making a big impact on business by improving worker efficiency, engaging customers, and building brand loyalty.
Tags : 
     Adobe
By: athenahealth     Published Date: Sep 26, 2019
Telehealth lets practices quickly provide consultations, assessments, and test results, while saving patients a trip to the office. Now, the Centers for Medicare and Medicaid Services (CMS) plan to significantly expand reimbursement rules for telemedicine. Find out which additional reimbursements have been proposed, and see what healthcare professionals say about the changes, in this in-depth article from athenaInsight.
Tags : 
     athenahealth
By: IBM     Published Date: Nov 09, 2012
The objective of this book is to help customers plan their migration strategy effectively and efficiently by providing the right information, facts and guidance. It will ensure you that you will reap the cost savings and benefits of DB2 10.
Tags : db2 10, z/os, ibm, cost savings, business benefits, simplified database management
     IBM
By: Dell     Published Date: Aug 17, 2016
Make your employees happier, increase their performance and reduce IT support costs by upgrading to a Latitude 5470. Dell partnered with Principled Technologies to create three productivity-based workflows to see how quickly the new Dell Latitude E5470 laptop powered by the latest 6th generation Intel Core i5-6300U processor performed compared to previous generations.
Tags : technology, best practices, productivity, data, competitive advantage
     Dell
By: IBM     Published Date: Oct 26, 2017
Authentication is the beating heart of security. The most fundamental action in all of IT is to identify “who you are”—and authentication is the building block that answers that question. Now more than ever, IT teams must do everything they can to ensure that users are who they say they are, and that their credentials have not been stolen. IT is in state of crisis, with hundreds of millions of identities stolen annually. For system administrators, it’s crucial to know which users have the right to access a given resource, and whether unauthorized users have tried to get in.
Tags : user authentication, mobile multi factor authentication, data flows, security, it strategies
     IBM
By: Epicor     Published Date: Aug 18, 2017
Changing your business processes can often be a daunting task. If what you’ve done in the past has always worked, why won’t it continue to work? This can be a dangerous line of thinking, as emerging technologies are constantly providing new ways for you to operate and grow your business. Digital transformation is the process of integrating these new technologies to maximize productivity, efficiency, and value. This white paper and webcast from IDC—made available by Epicor—explores why more and more manufacturers are upgrading their enterprise resource planning (ERP) software and utilizing digital technologies in their products and processes. Download the white paper and webcast to learn more about how digital transformation can benefit your organization.
Tags : erp software, enterprise resource planning software, epicor erp
     Epicor
By: Winshuttle     Published Date: Dec 04, 2006
This paper describes 7 best practices that many companies have adopted in automating the upload of Excel data into SAP. Adopting these best practices will alleviate many of the pains that business users and IT analysts face in uploading Excel data to SAP.
Tags : excel, sap, spreadsheet, spreadsheets, best practice, best practices, sap data, data entry
     Winshuttle
By: Infomatica     Published Date: Jul 15, 2015
UPMC is a cutting edge leader in harnessing the power of technology and accelerating innovation. This case study explores how UPMC was able to integrate clinical, financial, administrative, genomic and other information and use this data to: • Improve research outcomes in search of cures and other diseases • Determine the true cost of providing care with longitudinal patient records • Examine clinical practice variations to benchmark and improve future procedures • Strengthen information security, privacy and compliance capabilities
Tags : 
     Infomatica
By: UPS     Published Date: Jun 15, 2017
The largest percentage of those surveyed purchase for general manufacturing (27%), followed by commercial construction (12%), contractor/service provider (12%) and residential construction (10%). A smaller percentage of participants purchase for the automotive, aerospace, machine shop, energy and hospitality industries, among others.
Tags : ups, industrial buying dynamics, industrial distribution, industrial products, industrial products wholesale
     UPS
By: Upshot     Published Date: Jan 05, 2011
Chicago-based marketing agency, Upshot, has identified the most relevant and actionable consumer and marketing trends for 2011.
Tags : marketing trends, consumer trends, retail trends, traditional agencies, interactive marketing, customer experience/engagement, market research, branding
     Upshot
By: Urban Airship     Published Date: Jul 15, 2012
An analysis of the impact push notifications have on mobile application users. Based on real-time data collected from top push notification senders, the Index presents a snapshot on the impact of push messaging around the globe.
Tags : marketing, push marketing, publishers, consumers, marketing campaigns, interactive marketing, crm solutions/software, customer experience/engagement
     Urban Airship
By: Urban Airship     Published Date: Oct 08, 2013
Want to see our best customer success stories (and maybe gather a few ideas from other brands’ best practices)? Our newest pocket-sized offering highlights customers from various industries, their objectives, and spectacular results in engagement, revenue and loyalty.
Tags : mobile marketing strategy, mobile relationship management, mobile marketing, push messaging, mobile engagement
     Urban Airship
By: Neustar     Published Date: Mar 29, 2010
How SMS can help government agencies reach the public in 160 characters or less.
Tags : neustar, sms, mobile networks, text message, call to action, mobile marketing, government
     Neustar
By: Dropbox for Business     Published Date: May 07, 2015
It's all about Usability. Help educate your prospects about the shifting role of IT and share best practices for evaluating technology in a BYOD world.
Tags : usability, employee performance, consumerization, application adoption, best practices, byod, data management, ofs
     Dropbox for Business
By: Sage People     Published Date: Jan 26, 2018
Your essential guide to making a great user experience. Create more love for your business with our 12 top tips. A good experience means more sales. A bad experience will not only stop you converting customers, but will effect your reputation as a brand. Many websites offer the same or similar products and services—if your shopper can’t find what they’re looking for easily, they’ll simply move on to the next site. Alongside our partner and e-commerce expert INVIQA, we’ve compiled our 12 top tips to help refresh your website’s usability. These little changes are easy to implement and could make a big impact to your conversion rates.
Tags : 
     Sage People
By: Symantec     Published Date: Jun 18, 2015
Learn how to use actionable threat intelligence to protect your digital business and see how aligning your threat intel efforts with the goals and success factors of your digital business will greatly improve your company’s organizational goals.
Tags : actionable threat intelligence, digital business, information security, targeted cyber-attacks, security
     Symantec
By: Illusive Networks     Published Date: Apr 10, 2019
Attack Surface Manager (ASM) gives security teams unprecedented power to easily implement a cyber hygiene program to harden their networks against malicious lateral movement of cyberattackers. This paper provides an overview of common ways that Illusive's customers are using Attack Surface Manager, including fortifying PAM/PIM solutions, detecting insider threats and malicious insider activity, and providing powerful, automated Red Team functions.
Tags : attack surface, cyber hygiene, vulnerability management, vulnerabilities, network vulnerability, threat management, vulnerability assessment, network security
     Illusive Networks
Start   Previous    541 542 543 544 545 546 547 548 549 550 551 552 553 554 555    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics