industries

Results 526 - 550 of 561Sort Results By: Published Date | Title | Company Name
Published By: Cornerstone OnDemand     Published Date: Feb 24, 2011
GECU has the challenge of operating within one of the nation's most highly regulated industries, and as a result, has long understood that efficient processes for employee training, development and performance management are critical pillars for supporting long-term financial growth within a strict regulatory and compliance environment. Read more to find out why GECU chose Cornerstone OnDemand.
Tags : 
cornerstone, gecu, compliance, employee development, training, web-based training
    
Cornerstone OnDemand
Published By: SAP     Published Date: Feb 14, 2011
Download a copy of the Forrester report that reviews 24 CRM suite solutions to learn what they believe are the vendors strengths and weaknesses to support four key cross-functional processes in the finance and insurance industries.
Tags : 
crm, forrester, finance, insurance, lead management, sales, marketing sap
    
SAP
Published By: Symantec.cloud     Published Date: Jan 26, 2011
This report examines the new generation of threats, vulnerabilities and attacks, and explores the role that cloud security strategies can play in managing core risks to organizations of all sizes and across all industries.
Tags : 
symantec cloud, web threats, threats, vulnerabilities, cloud security, productivity, mobile communication
    
Symantec.cloud
Published By: Astaro     Published Date: Jan 19, 2011
This white paper discusses what drives organizations in both heavily-regulated and less regulated industries to retain email and other electronic content.
Tags : 
astaro, content retention, email content, legal discovery, data mining, knowledgement management, electronic content
    
Astaro
Published By: Infor     Published Date: Jan 06, 2011
Taking full advantage of each customer interaction has become a strategic imperative. And customer-oriented companies in a wide range of industries must focus on developing a contact center that drives effective, consistent customer interactions and builds long-term customer loyalty. In this white paper, learn how leading organizations empower the contact center.
Tags : 
infor, customer interaction, contact center, customer loyalty, roi
    
Infor
Published By: Infor     Published Date: Jan 03, 2011
Taking full advantage of each customer interaction has become a strategic imperative. And customer-oriented companies in a wide range of industries must focus on developing a contact center that drives effective, consistent customer interactions and builds long-term customer loyalty. In this white paper, learn how leading organizations empower the contact center.
Tags : 
infor, customer interaction, contact center, customer loyalty, roi
    
Infor
Published By: IBM     Published Date: Dec 07, 2010
Case Management and the Implications in these Energy and Utilities Industries.
Tags : 
ibm, advanced case management podcast, energy and utilities industries, content and process management, analytics, business rules, collaboration
    
IBM
Published By: IBM     Published Date: Dec 07, 2010
Energy and utility companies need to manage incidents such as customer complaints or disputes to improve customer service while protecting the business should escalations occur. Advanced case management (ACM) provides enhanced service and risk management throughout the lifecycle of a case.
Tags : 
ibm, advanced case management podcast, acm, energy and utilities industries, customer service, risk management, business intelligence, content and process management
    
IBM
Published By: QFilter.com     Published Date: Nov 23, 2010
The dangers posed by industrial Dust Explosions can affect a wide range of different industries. This article examines the topic, and gives recommendations on how to prevents such incidents from occurring.
Tags : 
dust explosions, dust control, dust safety, dust hazards, dust collection
    
QFilter.com
Published By: Ariba     Published Date: Oct 07, 2010
Read more about why top organizations of every size, across industries and in every region around the globe use Ariba Solutions and Services to control costs and improve performance.
Tags : 
ariba commerce cloud, trading, business commerce, collaboration, supply chain cost, financial performance
    
Ariba
Published By: Konnetic     Published Date: Aug 05, 2010
This paper deals with a new architecture and technology behind the forthcoming 4G platform IMS (IP Multimedia Subsystem) which is an integral part of the telecommunication industries LTE (Long Term Evolution) blueprint.
Tags : 
ip multimedia subsystem, ims, konnetic
    
Konnetic
Published By: DoubleTake     Published Date: Jul 14, 2010
SMBs in regulated industries are also subject to the same data availability and data protection requirements as large corporations for regulations such as HIPAA, FDA Part 11, Sarbanes-Oxley and SEC Rule 17, but without the budgets necessary to meet these requirements. This whitepaper provides six tips for an SMB approach to protecting data, such as confidential employee information, so download now to learn how keep your SMB protected from this critical loss of data.
Tags : 
double-take, smbs, server, midsize, backup, vulnerability
    
DoubleTake
Published By: Akamai     Published Date: Jun 04, 2010
Predictive analytics have been used by different industries for years to solve difficult problems that range from detecting credit card fraud to determining patient risk levels for medical conditions. It combines data mining and machine-learning technologies to create statistical models based on historical data. It then uses these models to predict future events. Extracting the power from the data requires powerful algorithms behind predictive analytics.
Tags : 
akamai, predictive, online advertising, tracking pixels, online shopping, in-market, site visitors, performance marketing
    
Akamai
Published By: SAP     Published Date: Jan 04, 2010
There is growing evidence that more pervasive BI and analytics have a direct impact on competitiveness. Better decision making is more important when resources become restricted during a recession, so BI and analytics projects will still appeal to management. However, justifying large capital outlays for software will be challenging unless short-term benefits can be directly correlated with the investment.
Tags : 
sap, data mart, business intelligence, analytics, business objects, supply chain, compliance, safety
    
SAP
Published By: Guaranteed Direct     Published Date: Dec 22, 2009
How do you stand out from the rest of the pack, while trying to spend less and deliver better results? This paper examines 5 secrets to one overlooked media that is paying big dividends for organizations in a range of industries.
Tags : 
guaranteed direct, direct marketing, marketing solutions, newspapers, online, door hangers, visibility
    
Guaranteed Direct
Published By: IBM     Published Date: Oct 13, 2009
The modern data center has to keep pace with business growth, without outgrowing its physical space. It must meet customer demands, while containing operating costs. The solution lies in a scalable, modular data center-turnkey, high-density, energy-efficient and able to be deployed quickly. Discover how a number of industries have put this concept to work to provide better service and cut costs.
Tags : 
energy-efficient data centers, ibm, scalable modular data center, it infrastructure, smdc, server consolidation, computing capacity
    
IBM
Published By: Iovation     Published Date: Sep 25, 2009
Learn what new and innovative techniques and solutions can be used to combat online credit application fraud, and how you can realize a true ROI by reducing losses and increasing operational efficiency within your fraud prevention process.
Tags : 
iovation, online credit applicants, fraudulent, stolen identities, financial, banking, and credit industries, fraud prevention strategies
    
Iovation
Published By: IBM     Published Date: Jul 10, 2009
See how organizations in several different industries have put an SOA infrastructure to use and discovered untapped value within their businesses. This white paper reveals strategies learned from experience to relieve budget pressures, improve time-to-market, boost productivity and many other benefits from a reusable SOA infrastructure.
Tags : 
ibm, soa, service oriented architecture, infrastructure, time-to-market, ebf, erp, enterprise resource planning
    
IBM
Published By: PermissionTV     Published Date: May 07, 2009
B2B Marketers can use online video to enhance the two-way dialogue with customers and prospects and strengthen the social relationship with online communities. Watch this free recorded webinar where experts from both online video and social media industries discuss ways to get started, capture ROI, and engage with online B2B audiences.
Tags : 
content personalization, emerging marketing, lead generation, rich media, social networking, b2b, roi, return on investment
    
PermissionTV
Published By: Trend Micro, Inc.     Published Date: Apr 29, 2009
Information technology (IT) security is indispensable to an organization's ability to conduct business and achieve its objectives. Security requirements affect almost every business process and system, and successful security measures help protect a business’ brand value, stakeholder confidence, risk management strategies, and compliance status. Requirements vary among industries, geographies, and regions, but the need to protect privacy, retain important data, and facilitate e-discovery are common to all. This paper provides an overview of the regulatory landscape and identifies steps to take for defining a flexible compliance strategy.
Tags : 
trend micro, trend, e-discovery
    
Trend Micro, Inc.
Published By: Trend Micro, Inc.     Published Date: Apr 29, 2009
Protecting individual and financial data, retaining data, and meeting e-discovery requirements are common compliance requirements across geographies and industries. Finding accurate, usable, and cost-effective solutions for meeting these requirements can make the difference between achieving compliance goals or leaving the organization vulnerable through unsecured use of sensitive data. Trend Micro Data Protection solutions for endpoint data leak protection, email encryption, and email archiving help organizations meet their compliance requirements – easily and cost-effectively.
Tags : 
trend micro, trend, information technology, security, security requirements, compliance, e-discovery, customer churn
    
Trend Micro, Inc.
Published By: iPass     Published Date: Apr 08, 2009
Learn what Forrester has uncovered in their latest report on Enteprise Mobility trends. During the past two years, Forrester has seen the number of enterprise mobility inquiries increase nearly 55%, jumping to 550-plus inquiries in 2008. In the past year, we have seen a spike in the number of inquiries focused on mobile network architecture, new types of mobile devices, and deploying vertically focused mobile applications that address the needs of workers in certain industries (e.g., retail, transportation, and healthcare).
Tags : 
forrester, wireless, infrastructure, fmc, fixed mobile convergence, network architecture, healthcare, retail
    
iPass
Published By: Senn Delaney     Published Date: Mar 10, 2009
Senn Delaney President and CEO Jim Hart shares surprising results of a Thriving Global Leadership Study of thousands of leaders across 60 industries and 50 countries. The survey discovered a dramatic difference between those who are facing these times of crisis with what is defined as a high-thriving state of mind and those with a lower-thriving state of mind.
Tags : 
senn delaney, state of mind, high thriving, measurement, customer focused, brand management, customer-centric, employee management
    
Senn Delaney
Published By: Trend Micro SaaS     Published Date: Feb 09, 2009
Today's confidentiality and privacy requirements drive organizations of all sizes and industries to secure sensitive data in email. Often particular types of data need to be encrypted, such as credit card numbers, intellectual property, or client information. Organizations also need to protect confidential emails for particular groups, such as executive management, human resources or legal departments. Many organizations are turning to policy-based encryption to meet their encryption needs because it automatically encrypts data using content filtering rules that identify types of content or email for particular groups. Encryption is applied when the rules are triggered. With policy-based encryption, organizations avoid relying on individual users to secure important content.
Tags : 
saas, trend, trend micro, software as a service, trendlabs, email security, security, interscan messaging
    
Trend Micro SaaS
Published By: Art Technology Group, Inc     Published Date: Jan 22, 2009
Forrester examined multiple Click to Call deployments in order to quantify ROI, determine conversion rates and understand the impact on customer experience across channels.  Read the analyst perspective and see how eStara Click to Call can change your business.
Tags : 
estara, click to call, financial services, retail industries, roi, voip
    
Art Technology Group, Inc
Start   Previous    9 10 11 12 13 14 15 16 17 18 19 20 21 22 23    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

“I am the Inspector Morse of IT journalism. I haven't a clue. D'oh” - Mike Magee