mine

Results 276 - 300 of 1585Sort Results By: Published Date | Title | Company Name
Published By: Matillion     Published Date: May 12, 2011
This whitepaper explains the importance of Business Intelligence to midsize companies, examines the challenges found in BI projects and explains how to be successful in improving visibility in your business.
Tags : 
business intelligence, management information, dashboard, dashboards, analysis, analytics, data warehouse, reports, reporting, cloud, saas, software as a service, matillion
    
Matillion
Published By: KeyedIn Solutions     Published Date: Apr 25, 2012
In this white paper, we will examine how to define and articulate a strategy from a number of key perspectives. This white paper is essential reading for anyone interested in helping their organization achieve maximum performance.
Tags : 
it management, knowledge management, data management
    
KeyedIn Solutions
Published By: Cox Business     Published Date: Dec 19, 2016
Businesses need to plan for unforeseen events that can disrupt productivity, impair the customer experience, and possibly even threaten a business’s existence. A disruption every business needs to plan for is any event that destroys valuable data, inhibits access to data, or causes downtime of core applications. Consider the staggering amount of information your company stores electronically. What if an unforeseen event destroyed all financial records, client contacts, and application data? You wouldn’t be able to send customers accurate invoices. Your marketing efforts might be undermined. You would lack key metrics for measuring quality, profitability, and more. The losses could be staggering. In every aspect of life, it’s smart to plan for unexpected events. That’s especially true for two plans every business must have: a disaster recovery plan and a business continuity plan.
Tags : 
    
Cox Business
Published By: HP     Published Date: Sep 06, 2011
This paper examines how eight companies were able to reduce their annual IT infrastructure cost per user by almost 25% by migrating to blades.
Tags : 
x86 servers, power, cooling, bladesystems, blades
    
HP
Published By: Virgin Pulse     Published Date: Jun 05, 2017
The Employee Well-being Platforms Buyer’s Guide will take the guesswork out of your decision. Learn how to properly evaluate the options on today’s market and determine what features matter most to you.
Tags : 
employee well-being platform, well-being software, well-being solutions, wellness solutions, employee wellness solutions, wellness solutions, employee wellness solutions, well being solutions, well being software, employee well-being platform, corporate wellness companies, wellness company, corporate wellness solutions, health and wellness companies, wellness platform, best corporate wellness programs, top corporate wellness companies, employee wellness companies, corporate wellness platforms, worksite wellness companies
    
Virgin Pulse
Published By: CA Technologies EMEA     Published Date: Sep 13, 2018
En résumé La version 15.3 de CA Project & Portfolio Management (CA PPM) vous permet de personnaliser les projets pour chaque business unit par de simples opérations de glisser-déposer. Qu’il s’agisse de workflows complexes pour les ressources humaines ou de simples tâches de gestion des ventes, les projets peuvent désormais être lancés en quelques minutes, au lieu de plusieurs jours. Ajoutez à cela des possibilités de collaboration au départ de l’application proprement dite pour éliminer les réunions superflues, un format de tableau familier de type Microsoft Excel® pour gérer les budgets, de nouvelles connexions à des outils d’aide à la décision tiers pour trouver des réponses, et vous obtenez l’application de gestion de portefeuilles de projets la plus moderne du marché.
Tags : 
    
CA Technologies EMEA
Published By: Arcserve     Published Date: Jul 26, 2010
View this flash demo that shows the Assess stage of the management lifecycle and how our customers are able to discover and determine where opportunities exist for consolidation and rationalization across physical, virtual, mainframe, distributed and cloud environments.
Tags : 
ca technologies, data center, management lifecycle, consolidation, cloud environment, virtualization project, cloud computing
    
Arcserve
Published By: Cisco     Published Date: Jan 05, 2015
The four pillars of computing — cloud, mobility, social, and analytics — are driving new levels of network innovation in datacenter networks. These forces are now buffeting the datacenter along with virtualization and the Internet of Things (IoT), resulting in sweeping changes in traffic patterns that expose the limitations of traditional networks and their operational models. To become a resource rather than a bottleneck to overall datacenter performance, the network must deliver not just exceptional performance and scalability but also unprecedented automation and orchestration that can yield agility, flexibility, and service velocity. This Technology Spotlight examines these key trends and discusses the role that Cisco's Application Centric Infrastructure (ACI) plays in addressing these ongoing challenges for enterprise IT and network managers.
Tags : 
cloud computing, infrastructure, marketplace, application, hybrid, enterprise, it management, enterprise applications
    
Cisco
Published By: MineralTree     Published Date: Jan 14, 2015
Yes, your company is a ripe target for fraud - but it doesn't have to be. Cybercriminals love small to medium businesses, since they have more money in their bank accounts than individuals, but often lack the sophisticated technology and vigilant processes of larger organizations. Gartner estimates that more than 10 percent of small businesses have had funds stolen from their bank accounts.
Tags : 
mineraltree, online fraud, business, damage, technology, bank, accounts, theft, cyber, crime, protection
    
MineralTree
Published By: IBM     Published Date: Jul 15, 2016
"According to the 2016 State of Endpoint Security Survey released by the SANS™ Institute 44% of respondents report that one or more of their endpoints have been breached in the past 24 months. - Desktops, laptops and servers are the most compromised endpoints - Login and access credentials are the most commonly exfiltrated information - 55% of respondents spend 3 or more hours per compromised endpoint - Over 70% of respondents find it difficult or impossible to determine when an incident is fully remediated These statistics encompass a wide set of industries, from financial services to education. So while each network is uniquely built to support your particular business, none is immune from being breached."
Tags : 
best practices, security, technology, next gen
    
IBM
Published By: IBM     Published Date: Sep 30, 2016
"According to the 2016 State of Endpoint Security Survey released by the SANS™ Institute 44% of respondents report that one or more of their endpoints have been breached in the past 24 months. - Desktops, laptops and servers are the most compromised endpoints - Login and access credentials are the most commonly exfiltrated information - 55% of respondents spend 3 or more hours per compromised endpoint - Over 70% of respondents find it difficult or impossible to determine when an incident is fully remediated These statistics encompass a wide set of industries, from financial services to education. So while each network is uniquely built to support your particular business, none is immune from being breached."
Tags : 
ibm, security, big fix, endpoint security, sans report, network security, networking, enterprise applications
    
IBM
Published By: IBM     Published Date: Jan 09, 2017
According to the 2016 State of Endpoint Security Survey released by the SANS™ Institute 44% of respondents report that one or more of their endpoints have been breached in the past 24 months. - Desktops, laptops and servers are the most compromised endpoints - Login and access credentials are the most commonly exfiltrated information - 55% of respondents spend 3 or more hours per compromised endpoint - Over 70% of respondents find it difficult or impossible to determine when an incident is fully remediated These statistics encompass a wide set of industries, from financial services to education. So while each network is uniquely built to support your particular business, none is immune from being breached."
Tags : 
ibm, security, big fix, endpoint security, sans report, network security, enterprise applications, business technology
    
IBM
Published By: Forcepoint     Published Date: May 14, 2019
In Philip K. Dick's 1956 "The Minority Report," murder ceased to occur due to the work of the "Pre-Crime Division," that anticipated and prevented killings before they happened. Today, we are only beginning to see the impact of predictive analytics upon cybersecurity – especially for insider threat detection and prevention. Based on user interaction with data, CISOs and their teams emerge as the IT equivalent of a Pre-Crime Division, empowered to intervene before a violation is ever committed. Watch this webcast where we examine the technologies which make predictive analytics valuable, along with ethically minded guidance to strike the balance between vigilance and privacy.
Tags : 
    
Forcepoint
Published By: Sage     Published Date: Jan 30, 2015
With massive numbers of Baby Boomers starting to retire, one of the greatest challenges facing human resources managers is replacing the decades’ worth of invaluable knowledge and skills possessed by experienced Boomers. This white paper will examine the changing workforce, the skill gap crisis, the importance of managing and developing your workforce, and the most practical and effective ways to go about it.
Tags : 
sage, career development, baby boomers, changing workforce, managing workforce
    
Sage
Published By: Cymfony     Published Date: Jul 11, 2007
This new study by Harvard's Berkman Center for Internet & Society analyzed corporate attacks against leading companies like Wal-Mart, McDonald’s, AOL, Genzyme and Lufthansa. This study establishes three profiles of corporate attacks and examines the unique behavior patterns and personal motivations behind each.
Tags : 
collaboration, customer behavior, customer service, online behavior, criticism, crm, customer relationship, customer satisfaction, branding, wal-mart, mcdonalds, evil empire, cymfony
    
Cymfony
Published By: Cymfony     Published Date: Jul 11, 2007
This new study by Harvard's Berkman Center for Internet & Society analyzed corporate attacks against leading companies like Wal-Mart, McDonald’s, AOL, Genzyme and Lufthansa. This study establishes three profiles of corporate attacks and examines the unique behavior patterns and personal motivations behind each.
Tags : 
collaboration, customer behavior, customer service, online behavior, criticism, crm, customer relationship, customer satisfaction, branding, wal-mart, mcdonalds, evil empire, cymfony
    
Cymfony
Published By: IBM     Published Date: Jul 14, 2016
Workiva commissioned Forrester Consulting to conduct a Total Economic ImpactTM study and examine the potential return on investment (ROI) enterprises may realize by deploying Wdesk for Controls Management. The purpose of this study is to provide readers with a framework to evaluate the potential financial impact of Wdesk on their organizations and how it can be leveraged to optimize the processes necessary to deliver Sarbanes-Oxley (SOX) compliance. This in-depth financial summary finds a 238% three-year, risk-adjusted ROI for a large auto parts retailer. Key outcomes include reduced the effort required to formulate and update processes and controls for SOX compliance resulting in a three-year benefit of $190,568, and simplified audit efforts with improved audit trails in financial controls, delivering three-year present value benefits of $128,965.
Tags : 
cloud reporting, business management, economic impact, forrester, consulting, business technology, data center
    
IBM
Published By: Castlight Health     Published Date: Aug 02, 2016
"In this Constellation Research report, Principal Analyst Doug Henschen examines how Indiana manufacturer Steel Dynamics cut skyrocketing healthcare costs by turning their employees into informed healthcare consumers, saving millions. This inside look details how Castlight's health benefits platform provided Steel Dynamics employees with the combination of pricing information and quality measures they needed to make their own smart healthcare decisions. Download now to get the key takeaways and recommendations.
Tags : 
castlight health, healthcare cost, benefits, human resources
    
Castlight Health
Published By: Castlight Health     Published Date: Aug 02, 2016
In this Constellation Research report, Principal Analyst Doug Henschen examines how Indiana manufacturer Steel Dynamics cut skyrocketing healthcare costs by turning their employees into informed healthcare consumers, saving millions.
Tags : 
    
Castlight Health
Published By: Esker     Published Date: Jan 08, 2019
What's in the white paper? Like all areas of the finance team, the accounts payable department is tasked with working smarter and doing more with less. The challenge is that many organizations are drowning in paper invoices, spreadsheets and manual AP processes. A digital transformation can create more automated workflows, easier tracking of payments, and more overall accountability and visibility. In addition, the data collected can support a more predictable cash flow and a stronger negotiating position with vendors. This white paper will examine AP’s role in reimagining the entire finance process as part of the purchase-to-pay cycle, including: • Avoiding costs of processing paper invoices and payments • The role of the CFO in mitigating risks of manual processes • The value of AP integration with e-payable solutions
Tags : 
    
Esker
Published By: DocuSign     Published Date: Mar 23, 2016
Take a look at the research by Celent that examines the technology behind e-signature applications for life, health, and annuity insurance. This paper highlights various approaches and summarizes the market for e-signatures.
Tags : 
    
DocuSign
Published By: Appian     Published Date: Jul 02, 2010
This white paper examines the business case for a BPM CoE, the required components, and the expected value. It also includes a case study of how an investment management firm's CoE evolved from informal to strategic.
Tags : 
appian, center of excellence, bpm.business process management
    
Appian
Published By: Senn Delaney     Published Date: Sep 05, 2008
It's become a business imperative to maximize operational effectiveness, trim costs, standardize and streamline processes, achieve economies of scale and increase competitive advantage. Today's most successful leaders do this in a way that balances the greater good of the enterprise with the competing demands of their autonomous businesses that must respond to the individual needs of their markets. A more collaborative model that helps leaders of complex businesses to maximize effectiveness is gaining traction. Four prominent business leaders discuss their challenges and successes in shifting to this shared business model.
Tags : 
senn delaney, customer focused, brand management, customer-centric, employee management, employee engagement
    
Senn Delaney
Published By: Oracle     Published Date: Apr 29, 2014
This white paper examines how advanced controls can substantially improve the bottom line, the scope of the issues addressed by advanced controls, and the reasons why leading companies and experts who monitor cash leakage are increasingly looking to advanced control solutions.
Tags : 
oracle, cash leakage, cash management, improve the bottom line, vendor payments, advanced controls, knowledge management, enterprise applications
    
Oracle
Start   Previous    5 6 7 8 9 10 11 12 13 14 15 16 17 18 19    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

“I am the Inspector Morse of IT journalism. I haven't a clue. D'oh” - Mike Magee