sus

Results 1 - 25 of 868Sort Results By: Published Date | Title | Company Name
Published By: Dell and VMWare     Published Date: Oct 26, 2017
Une transformation fondamentale englobant le personnel, les processus et la technologie permet aux entreprises de rester compétitives dans l’économie d’aujourd’hui, basée sur l’innovation. Des initiatives telles que la sécurité avancée, les services de détection des fraudes, l’Internet des objets (IoT) avec ses consommateurs connectés, l’expérience de réalité virtuelle ou augmentée, l’apprentissage machine et approfondi et les applications cognitives optimisent les avantages pour l’entreprise comme la maintenance et le marketing prédictifs.
Tags : 
    
Dell and VMWare
Published By: CA Technologies EMEA     Published Date: Sep 13, 2018
Plus de 400 000 employés répartis dans environ 400 entreprises, dont Polycom, Qantas et Toyota, utilisent déjà CA Project & Portfolio Management SaaS (CA PPM SaaS) pour réduire les coûts, stimuler l’adoption et prendre de meilleures décisions métier. Avec l’aide de CA Services, les organisations peuvent rapidement déployer et configurer CA PPM SaaS, pour simplifier les processus d’achat, l’utilisation et la gestion de la solution.
Tags : 
    
CA Technologies EMEA
Published By: Workday France     Published Date: May 01, 2019
L’alignement de votre plan d’effectif sur les objectifs prioritaires de votre entreprise peut être difficile et laborieux surtout lorsque les fondamentaux ne sont pas bien compris. Ce livre blanc décrit les 10 étapes fondamentales pour créer un plan d'effectif stratégique efficace et explique comment la technologie peut aider à le mettre en œuvre.
Tags : 
workday, workforce technology, digital strategy
    
Workday France
Published By: Workday France     Published Date: May 17, 2019
L'alignement de votre plan d'effectif sur les objectifs majeurs de l'entreprise n'est pas forcément une entreprise laborieuse, surtout lorsque les fondamentaux sont bien compris. Ce livre blanc décrit les 10 étapes fondamentales pour créer un plan d'effectif stratégique efficace et explique comment la technologie peut aider à le mettre en œuvre.
Tags : 
    
Workday France
Published By: Viavi Solutions     Published Date: Jul 21, 2017
Rapid increases in network traffic volumes, security threats and application complexity all underscore the importance for lossless data capture, analysis and storage to provide crucial raw data for post event analysis and remediation. Viavi commissioned Tolly to evaluate the performance of its Observer GigaStor family of capture, analysis, and storage solutions. Specifically the tests that focuses on bench marking maximum sustained full packet capture/write rates and greatest burst performance with no packet loss while delivered robust encryption of stored network data.
Tags : 
ethernet, service troubleshooting, storage solutions, stored network data, network traffic, security threats, network analysis, write data
    
Viavi Solutions
Published By: CEB     Published Date: Dec 03, 2014
As deal complexity has risen, so too has customers' risk aversion and the number of stakeholders dedicated to a given purchase. The best companies build consensus among diverse groups by tapping into the right values and fostering an environment of collective learning.
Tags : 
b2b marketing insights, b2b sales insights, consensus marketing, b2b branding, b-to-b decision-makers, leading marketing and sales teams, sales executives, sales leaders
    
CEB
Published By: Service Now     Published Date: Feb 09, 2018
We’re at a tipping point for customer service operations. Customers contact enterprises at a greater rate over a greater number of channels — shifting between them seamlessly and even using channels simultaneously. Enterprises react by adding headcount — an unsustainable strategy. You must transform operations by developing strength in automation, AI, and knowledge. This report reveals the top 10 customer service trends in 2018 for application development and delivery (AD&D) pros supporting customer service.
Tags : 
    
Service Now
Published By: Carbonite     Published Date: Oct 10, 2018
Malware that encrypts a victim’s data until the extortionist’s demands are met is one of the most common forms of cybercrime. And the prevalence of ransomware attacks continues to increase. Cybercriminals are now using more than 50 different forms of ransomware to target and extort money from unsuspecting individuals and businesses
Tags : 
    
Carbonite
Published By: Entelo     Published Date: Sep 06, 2017
Engaging with candidates is a long game. To be remembered, it's crucial to take the necessary steps to develop effective relationships, grow your network, and cleverly capture candidates' attention. Join TripAdvisor's Jeff McCarthy and Lori Busch as they share how to leverage recruitment marketing and outreach platforms to improve response rates, influence long-term relationships, and stay top of mind with candidates. In this webinar, you'll learn: TripAdvisor's messaging strategies for increasing open rates by 15% How to structure a multi-touch nurturing workflow to sustain a relationship with candidates A breakdown of TripAdvisor's Attract, Engage, and Convert model Why they emphasize employee-generated content as vital to branding and candidate engagement
Tags : 
    
Entelo
Published By: Epicor Software Corporation     Published Date: Jan 09, 2019
To Keep Pace With Your Customers and Competitors, It’s Time to Leave Your Legacy Software Behind. Legacy enterprise resource planning (ERP) systems struggle to keep up with the modern pace of business, and they fail to meet the changing needs of your workforce. Can your leaders quickly find and analyze vital data? Are your employees’ tasks and processes straightforward and efficient? Does your ERP software make it easier to support growth? See how manufacturers upgrading to the latest ERP software from Epicor transform their business by delivering the visibility, efficiency, and productivity essential for sustained growth.
Tags : 
    
Epicor Software Corporation
Published By: Pardot     Published Date: Apr 29, 2009
B2B marketers have specific needs when it comes to email campaigns. Learn how implementing  an email system designed for B2B can bring together all of your lead generation efforts to create an integrated campaign with automated messaging personalized from your sales reps, CRM syncing and triggered nurturing emails.   
Tags : 
pardot, b2b specific, b2b email solution, email marketing, lead generation, integrated campaign, crm syncing, nurturing emails, personalization, scoring, lead gen, leads, sales, sales team, suspects, prospects, web marketing, micro-level, autoresponder, drip
    
Pardot
Published By: LogicNow     Published Date: Mar 10, 2016
Are you using the wrong RMM platform? How would you know? What are the signs to look for? Using the right RMM platform is critical to building a sustainable and profitable managed services practice – and we’ve got just the whitepaper to help.
Tags : 
logicnow, rmm p[atform, best practices, business technology
    
LogicNow
Published By: Sage People     Published Date: Apr 10, 2018
How to build your dream team to evaluate the right technology investment.
Tags : 
    
Sage People
Published By: Virgin Pulse     Published Date: Oct 03, 2013
This paper draws on a wealth of experience, external research, and Virgin Pulse's robust analysis of client data to outline the key factors within your organization that can drive your employees to enroll in, and stay engaged with, your workplace wellness programs.
Tags : 
employee wellness, sustained engagement, employee wellness initiatives, employee wellness programs
    
Virgin Pulse
Published By: LogMeIn     Published Date: Jul 12, 2016
Cette liste succincte met en avant les bonnes pratiques à l’attention des Agents et Administrateurs susceptibles d’aider votre entreprise à atteindre ses objectifs d’excellence.
Tags : 
live chat, customer service, customer support, live chat success, best practices for agents and admins
    
LogMeIn
Published By: SAS     Published Date: Sep 30, 2014
Former Intel CEO Andy Grove once coined the phrase, “Technology happens.” As true as Grove’s pat aphorism has become, it’s not always good news. Twenty years ago, no one ever got fired for buying IBM. In the heyday of customer relationship management (CRM), companies bought first and asked questions later. Nowadays, executives are being enlightened by the promise of big data technologies and the role data plays in the fact-based enterprise. Leaders in business and IT alike are waking up to the reality that – despite the hype around platforms and processing speeds – their companies have failed to established sustained processes and skills around data.
Tags : 
    
SAS
Published By: SAS     Published Date: Apr 16, 2015
Former Intel CEO Andy Grove once coined the phrase, “Technology happens.” As true as Grove’s pat aphorism has become, it’s not always good news. Twenty years ago, no one ever got fired for buying IBM. In the heyday of customer relationship management (CRM), companies bought first and asked questions later. Nowadays, executives are being enlightened by the promise of big data technologies and the role data plays in the fact-based enterprise. Leaders in business and IT alike are waking up to the reality that – despite the hype around platforms and processing speeds – their companies have failed to established sustained processes and skills around data.
Tags : 
    
SAS
Published By: Citrix ShareFile     Published Date: Jul 11, 2017
Accounting is full of big, busy deadlines, which means the ability to take your work home with you could be a game-changer. But can your personal devices ever be secure enough to manage your clients’ sensitive data? Surprisingly, this informative whitepaper shows that, with the right preparation, using your personal device can actually help you keep your firm more secure. Why data encryption is often easier to adopt as part of a cloud initiative What top security threat you are less susceptible to on personal devices How to manage device updates and passwords for the greatest protection
Tags : 
accounting, mobility, security, data encryption, data
    
Citrix ShareFile
Published By: Citrix ShareFile     Published Date: Jul 11, 2017
Finance moves fast, and the ability to work from anywhere on your smartphone or laptop could be a game-changer. But can your personal devices ever be secure enough to manage your clients’ sensitive financial data? Surprisingly, this informative whitepaper shows that, with the right preparation, using your personal device can actually help you keep your organization more secure. Why data encryption is often easier to adopt as part of a cloud initiative What top security threat your employees are less susceptible to on personal devices How to manage device updates and passwords for the greatest protection
Tags : 
finance, data encryption, mobility, security, data
    
Citrix ShareFile
Published By: Citrix ShareFile     Published Date: Apr 13, 2017
Patients come with lots of paperwork. The ability to securely access it on your smartphone or laptop could be a game-changer. But can your personal devices ever be secure enough to manage PHI? Surprisingly, this informative whitepaper shows that, with the right preparation, using your personal device can actually help you keep your organization more secure. • Why data encryption is often easier to adopt as part of a cloud initiative • What top security threat your employees are less susceptible to on personal devices • How to manage device updates and passwords for the greatest protection
Tags : 
data encryption, personal security, client security, cloud initiative, password protection
    
Citrix ShareFile
Published By: Citrix ShareFile     Published Date: Apr 13, 2017
Accounting is full of big, busy deadlines, which means the ability to take your work home with you could be a game-changer. But can your personal devices ever be secure enough to manage your clients’ sensitive data? Surprisingly, this informative whitepaper shows that, with the right preparation, using your personal device can actually help you keep your firm more secure. • Why data encryption is often easier to adopt as part of a cloud initiative • What top security threat you are less susceptible to on personal devices • How to manage device updates and passwords for the greatest protection
Tags : 
cloud initiative, personal security, personal device, password protection, security, data encryption
    
Citrix ShareFile
Published By: Citrix ShareFile     Published Date: Apr 13, 2017
Finance moves fast, and the ability to work from anywhere on your smartphone or laptop could be a game-changer. But can your personal devices ever be secure enough to manage your clients’ sensitive financial data? Surprisingly, this informative whitepaper shows that, with the right preparation, using your personal device can actually help you keep your organization more secure. • Why data encryption is often easier to adopt as part of a cloud initiative • What top security threat your employees are less susceptible to on personal devices • How to manage device updates and passwords for the greatest protection
Tags : 
data encryption, personal security, client security, cloud initiative, password protection
    
Citrix ShareFile
Published By: Citrix ShareFile     Published Date: Apr 13, 2017
Finance moves fast, and the ability to work from anywhere on your smartphone or laptop could be a game-changer. But can your personal devices ever be secure enough to manage your clients’ sensitive financial data? Surprisingly, this informative whitepaper shows that, with the right preparation, using your personal device can actually help you keep your organization more secure. • Why data encryption is often easier to adopt as part of a cloud initiative • What top security threat your employees are less susceptible to on personal devices • How to manage device updates and passwords for the greatest protection
Tags : 
data encryption, personal security, client security, cloud initiative, password protection
    
Citrix ShareFile
Published By: Citrix ShareFile     Published Date: Apr 13, 2017
Accounting is full of big, busy deadlines, which means the ability to take your work home with you could be a game-changer. But can your personal devices ever be secure enough to manage your clients’ sensitive data? Surprisingly, this informative whitepaper shows that, with the right preparation, using your personal device can actually help you keep your firm more secure. • Why data encryption is often easier to adopt as part of a cloud initiative • What top security threat you are less susceptible to on personal devices • How to manage device updates and passwords for the greatest protection
Tags : 
data encryption, personal security, client security, cloud initiative, password protection
    
Citrix ShareFile
Published By: Citrix ShareFile     Published Date: Mar 31, 2017
Accounting is full of big, busy deadlines, which means the ability to take your work home with you could be a game-changer. But can your personal devices ever be secure enough to manage your clients’ sensitive data? Surprisingly, this informative whitepaper shows that, with the right preparation, using your personal device can actually help you keep your firm more secure. • Why data encryption is often easier to adopt as part of a cloud initiative • What top security threat you are less susceptible to on personal devices • How to manage device updates and passwords for the greatest protection
Tags : 
account security, data security, data loss prevention, device security, cloud security, confidential data
    
Citrix ShareFile
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

“I am the Inspector Morse of IT journalism. I haven't a clue. D'oh” - Mike Magee