RSS feed Get our RSS feed

News by Topic

just time

Results 26 - 50 of 259Sort Results By: Published Date | Title | Company Name
By: Entrust Datacard     Published Date: Mar 20, 2017
As digital business evolves, however, we’re finding that the best form of security and enablement will likely remove any real responsibility from users. They will not be required to carry tokens, recall passwords or execute on any security routines. Leveraging machine learning, artificial intelligence, device identity and other technologies will make security stronger, yet far more transparent. From a security standpoint, this will lead to better outcomes for enterprises in terms of breach prevention and data protection. Just as important, however, it will enable authorized users in new ways. They will be able to access the networks, data and collaboration tools they need without friction, saving time and frustration. More time drives increased employee productivity and frictionless access to critical data leads to business agility. Leveraging cloud, mobile and Internet of Things (IoT) infrastructures, enterprises will be able to transform key metrics such as productivity, profitabilit
Tags : 
     Entrust Datacard
By: Groove     Published Date: May 16, 2018
Account based sales (ABS) has generated a lot of buzz lately, but it’s more than just a passing trend. In fact, many enterprise sales teams have been doing account based sales for quite a while. Whether this is the first time you have encountered the idea of ABS or you have heard about it before, this e-book will equip you with the basics so you can decide whether ABS is right for your company, outline your own ABS strategy, and optimize for the best results possible. We’ll cover: An explanation of account based sales Key benefits of adopting an ABS strategy How to get started and implement a successful ABS strategy Best practices and KPIs to optimize and measure your strategy Additional resources to help you plan and execute your strategy
Tags : 
     Groove
By: Cisco     Published Date: Jul 08, 2016
Today’s threat landscape is nothing like that of just 10 years ago. Simple attacks that caused containable damage have given way to modern cybercrime operations that are sophisticated, well-funded, and capable of causing major disruptions to organizations and the national infrastructure. Not only are these advanced attacks difficult to detect, but they also remain in networks for long periods of time and amass network resources to launch attacks elsewhere. Traditional defenses that rely exclusively on detection and blocking for protection are no longer adequate. It’s time for a new security model that addresses the full attack continuum—before, during, and after an attack.
Tags : 
     Cisco
By: Cisco     Published Date: Feb 16, 2016
Today’s threat landscape is nothing like that of just 10 years ago. Simple attacks that caused containable damage have given way to modern cybercrime operations that are sophisticated, well-funded, and capable of causing major disruptions to organizations and the national infrastructure. Not only are these advanced attacks difficult to detect, but they also remain in networks for long periods of time and amass network resources to launch attacks elsewhere.
Tags : cisco, threat, cybercrime, infrastructure, security
     Cisco
By: Adobe     Published Date: Oct 24, 2019
Digital transformation isn’t just about speeding up manual processes. It’s about improving customer and employee experiences. Adobe Document Cloud for Office 365 that includes Adobe Acrobat DC, Adobe Sign, and PDF services, integrates seamlessly with your existing business applications such as Microsoft Office and SharePoint. With this integration, you can convert paper-based processes to compelling digital experiences that impress customers and help employees work and collaborate faster. See how Adobe can help you accomplish more in less time.
Tags : 
     Adobe
By: IBM     Published Date: May 26, 2017
Business executives and managers at business-to-business (B2B) enterprises care about time, money, competitive advantage, customer loyalty and growth. Few pay much attention to the vital IT infrastructure that supports transactions and collaboration with trading partners—though that B2B backbone directly affects performance and profitability. In fact, just 26 percent of business managers view B2B integration as a competitive differentiator, according to a study for IBM by Vanson Bourne, a research consultancy. As a result, many enterprises continue to utilize manual and error-prone emails, faxes and file transfers for B2B transactions. Reliance on complex, brittle and antiquated systems to exchange critical data impacts time to market, cost-efficiency and satisfaction across suppliers and end-customers. Modernization of B2B integration in recent years has moved forward in fits and starts, often undermined by competing priorities and misalignment between business and IT managers.
Tags : b2b integration, customer loyalty, ibm, customer growth
     IBM
By: Automation Anywhere APAC     Published Date: Aug 15, 2019
Global corporate enterprise AI practitioners are clearly still dealing with infrastructure issues related to talent and technology. End-to-end processes remain stubbornly carbon-based. Rule-based automation is truly not yet globally scaled across the majority of organizations. Double the AI And yet, the AI & Intelligent Automation Network members went from 21%, having deployed Intelligent Enterprise solutions to over 44% in just one year’s time. Over 4/5 expect to deploy AI in under two years The stated goal for deployment is just under 83% by the end of 2020. Considering the fact that they’ve essentially got two years, and those ranks have doubled in one year – doubling again in two years is achievable. Incidentally, that same number was only 67% a year ago. 50% expect to be established, globally scaling or refining AI in under two years Global corporate enterprise is in fact slowly but surely transforming into the intelligent enterprise of tomorrow. Having said that, it will be
Tags : analyst, artificial intelligence, intelligent automation, rpa
     Automation Anywhere APAC
By: HP Data Center     Published Date: Mar 25, 2009
When Alcatel bought out Lucent at the end of 2006, the two companies had already begun planning data center consolidations of their own, but the merger changed all that. As it turns out, the merged company created a plan to consolidate 25 data centers and 125 server rooms down to six data centers and just a few server rooms. This change has presented challenges, especially in terms of arranging downtime and dealing with employees' attachment to their servers and applications, but the company is on pace to meet it’s goal of reducing IT operational cost by 25% over three years.
Tags : alcatel-lucent, hp data center, it infrastructure, data center transformation, merger, downtime, server application, change management
     HP Data Center
By: Cornerstone OnDemand     Published Date: May 05, 2014
Annual performance reviews…are you just over it? Affiliates Management Company (AMC) was, too. Their traditional, once-a-year review process – managed with spreadsheets – didn’t deliver true performance insight. Knowing it was time to ditch the spreadsheets, AMC searched for a performance management system that would let them measure goals, leverage individual strengths and see the performance “big picture.”
Tags : reachmail, performance reviews, employee reviews, employee productivity, performance management systems, management tips, management style
     Cornerstone OnDemand
By: Cantaloupe     Published Date: Mar 30, 2010
The hype about video search has just begun which means lots of questions, lots of new experts, and not enough time to sort through it all. This new whitepaper "An Effective Video SEO Strategy in Three Phases" will give you the blueprint for getting started and beyond. Learn all about: the 2 things you should be doing right now to improve your video search engine optimization; widespread myths about what works and what doesn't; Advanced tips for even greater results and more!
Tags : cantaloupe, online video, social media, search, communication, facebook, twitter, seo
     Cantaloupe
By: CA Technologies     Published Date: Aug 22, 2017
While some are still adjusting to the idea, you’re well aware that we’re living in an application economy. For the uninformed, an application economy is where everything is driven by a connected, mobile, application-based world where your customers are far more likely to experience your brand and interact with your enterprise through a software application than a live person. But, beyond the benefits, each day you’re feeling the pressure it exerts on your budget, resources and network. You’ve seen this wave swell on the horizon, and now it’s arrived: executives are enthusiastic and asking about strategies, and line-of-business leaders are requesting faster dev times and more complex projects. Staking out your place as a leader in this new landscape will require you to develop and deliver high-impact applications faster than ever before.
Tags : 
     CA Technologies
By: LogRhythm     Published Date: Jun 19, 2018
Every year, organizations spend millions of frustrating hours and countless sums of money trying to reverse the damage done by malware attacks. The harm caused by malware can be astronomical, going well beyond intellectual property loss and huge fines levied for non-compliance. In 2014, the cost of malware attacks and resulting breaches was estimated at $491 billion. i And these costs include more than just the money spent trying to directly respond to security breaches. Productivity, long-term profitability, and brand reputation are often severely impacted as well. The malware threat is growing larger and becoming more challenging to respond to every year. It seems like every month there are more major breaches. Target, Neiman Marcus, and UPS have all been victims of costly breaches in the past couple years, with each event showing signs that the breaches could have been prevented. Phishing-based malware was the starting point 95 percent of the time in state-sponsored attacks, and 67
Tags : hack, malware, intellectual, property, compliance
     LogRhythm
By: DigiCert     Published Date: Jun 19, 2018
Just as automation has become mandatory for scaling cloud workflows and critical workloads up or down in today’s dynamic business environment, the same is true in today’s dynamic threat environment. The ability to automate certificate renewals with our Complete Website Security solution helps you to strengthen certificate security, while helping you save resources, time and money on certificate administration and ensuring you remain compliant with industry rules and regulations. Download this whitepaper today to find out more.
Tags : 
     DigiCert
By: Microsoft     Published Date: Jul 20, 2018
When it comes to performance, Azure SQL Database is built for you, the developer. Azure SQL Database is designed to make your work easier and let you focus on other priorities. It scales on the fly, without downtime, with capabilities that make it great for building multitenant software as a service (SaaS) apps. Plus, it learns and adapts to your database workload, whatever that may be, using built-in intelligence to continually adjust and improve over time. That said, there’s more to a successful app than impressive performance. That’s why we built Azure SQL Database to be just as intelligent in other areas, such as availability and security, so that you won’t need to worry about those essentials either. Finally, we built Azure SQL Database to let you work the way you want, using the tools and platforms you prefer. It’s why we call Azure SQL Database the intelligent database for developers. Read on to learn more, and we’re sure you’ll agree.
Tags : 
     Microsoft
By: Iovation     Published Date: Sep 25, 2009
After $20,000 in direct losses and who knows how many lost opportunities, we just couldn't stay in reaction mode. We went looking for a proactive solution and found iovation. We were drawn to the idea of sharing fraud profiles with other subscribers. Plus, the fraud checking is done in real time and it scales to volume which eased my concerns about customer impact. Implementation was straightforward. Preventing half the fraud attempts each month pays for the system; we've seen a 95% reduction in our chargeback rate in 8 months.
Tags : iovation, sharing fraud profiles, fraud protection service, on-line mmo gaming, rmt, real money trading
     Iovation
By: Dassault Systčmes     Published Date: May 09, 2018
Tight schedules, cost challenges and lack of visibility can strain relationships in the Architecture, Engineering and Construction (AEC) market. As new technologies raise owner expectations, you need to respond rapidly to customer needs with on-target solutions. You need to know how to anticipate and exceed owners’ expectations. You need to deliver on multiple fronts, including: • Be a partner not just a supplier: Owners are looking for irreplaceable partners who transparently deliver value. • Achieve more predictable outcomes: Partnerships build from developing plans, mitigating risks and delivering. • Deliver on time and on budget: Firms must meet expectations precisely and avoid costly waste and delays. • Be involved from day one: Owners now expect visibility and involvement across the project. • Deliver something unexpected: AEC firms need to deliver unique, surprising solutions. Download your targeted industry analysis to learn more.
Tags : 
     Dassault Systčmes
By: Gleanster Research     Published Date: Nov 10, 2011
This Gleansight benchmark report is based on the experiences of 229 companies and includes the following sections: Reasons to Implement, Challenges, Value Drivers, Core Technologies and Success Story. It also includes a Vendor Landscape with descriptions and analysis of 32 solution providers. Most organizations today have business intelligence (BI) tools or at least some way of churning out reports. Fewer have a true business intelligence strategy or a well-architected BI platform for generating actionable insights. Broadly considered, BI encompasses all aspects of gathering, storing, cleansing, analyzing and distributing data. This Gleansight benchmark report reveals how Top Performers are justifying their investments in next-generation BI capabilities, how they're overcoming implementation and organizational hurdles, and how, as a result of their investments, they're now able to make more timely and better informed business decisions across multiple organizational functions.
Tags : gleanster, business, benchmark, business intelligence, roi, customer experience/engagement, market research, usability
     Gleanster Research
By: HotSchedules     Published Date: Sep 11, 2018
For restaurants with hourly employees, time and attendance is a critical part of workforce management. Everybody clocks in and clocks out, but that’s just one small piece of the puzzle when it comes to juggling schedules and keeping the business running smoothly. If it’s been a while since you upgraded your time and attendance software, you may be working a lot harder than you need to be. This ebook will show you how having the right time and attendance solution can simplify your management and make all the difference in how your business operates.
Tags : 
     HotSchedules
By: Actiance, Inc.     Published Date: Jan 15, 2015
Government and public sector agencies are just beginning to realize how social networks can improve business results. With access to real-time communication, collaboration, and social networking platforms, agencies can improve internal process efficiencies that help them provide better services to their constituents. But first, these agencies have to consider regulatory requirements like the Freedom of Information Act (FOIA) which require compliant use of these networks and the content people create on them. Read this paper to gain an understanding of: What the regulatory landscape of the public sector looks like What concerns you should be aware of from a legal perspective
Tags : electronic communications, public sector, social networking platforms, compliance, real-time communication
     Actiance, Inc.
By: IBM     Published Date: Nov 07, 2016
Is your software defined infrastructure (SDI) for high performance computing (HPC) and big data analytics meeting the needs of your growing business? Would you like to know how to justify the switching cost from unsupported open source software to a commercial grade SDI that ensures your resources are more effectively used cutting down time to market? This webcast will give you an overview of the true costs of building out and managing a HPC or Big Data environment and how commercial grade SDI software from IBM can provide a significant return on investment.
Tags : ibm, platform computing, software defined infrastructure
     IBM
By: Staples     Published Date: Jan 29, 2018
As a Staples Business Advantage® customer, exclusive content is just one of the perks you can access any time. In this white paper, we’ll share five ways you can create efficiencies and cut costs in the short and long term. For instance, vendors who aren’t looking for better efficiencies aren’t looking out for you. Get your copy today.
Tags : shipping, efficiency, staples business advantage
     Staples
By: Hewlett Packard Enterprise     Published Date: Oct 24, 2017
Big Data is not just a big buzzword. Government agencies have been collecting large amounts of data for some time and analyzing the data collected to one degree or another. Big data is a term that describes high volume, variety and velocity of information that inundates an organization on a regular basis. But it’s not the amount of data that’s important. It’s what organizations do with the data that matters. Big data can be analyzed for insights that lead to better decisions and better services.
Tags : cloud optimization, cloud efficiency, cloud management, cloud assurance, cloud visibility, enterprise management, data management
     Hewlett Packard Enterprise
By: HP Data Center     Published Date: Apr 08, 2009
Unified Communications (UC) aims to unite securely and seamlessly all the different business communications channels that exist in a company. That includes voice, video, data, IM, mobility and the Web etc. This report examines in detail the key industry drivers and benefits that are inspiring large scale enterprises to adopt a Unified Communications strategy.
Tags : business communications, voice, video, data, mobility, industry drivers, unified communications strategy, just in time
     HP Data Center
By: SAS     Published Date: Mar 06, 2018
The Connected Customer is an individual who is intimately connected to the data, outcomes, decisions, and staff associated with any relationship to an organization. This intensely personal connection is not just a matter of the most recent transaction, but represents a combination of connected data, connected analytics, and collaborative decisions associated with improving the customer’s relationship with the organization over time. In this report, Blue Hill explores the key traits associated with supporting the Connected Customer through the Internet of Things, and provides guidance on why the Internet of Things will be essential across the general business landscape
Tags : 
     SAS
By: ClickExpress     Published Date: May 01, 2013
Even if you have only 15 mobile workforce employees, you can reduce costs and improve the customer’s experience using optimization software. Today, it’s easy because you don’t even have to provide dedicated mobile devices to your field employees, just an app. But how do you avoid difficult transitions for workers, long implementation times, and solutions that don’t work as you really needed? This paper walks you through the 6 steps to successful decision making.
Tags : 6 essential, mobile, workforce, management, software, customer, experience, optimization
     ClickExpress
Start   Previous    1 2 3 4 5 6 7 8 9 10 11    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics