eap

Results 51 - 75 of 322Sort Results By: Published Date | Title | Company Name

Maximizing Audience Engagement: How online video performance impacts viewer behavior

Published By: Akamai     Published Date: Mar 08, 2017
In this whitepaper, we present data from the first ever large-scale scientific study that shows how video performance quality affects viewer behavior. The results help to shed light on important considerations that can help businesses craft a successful online video strategy – boosting their business bottom line and ultimately reaping the rewards of online video’s vast potential.
Tags : 
data, customer engagement, video, online video, online video strategy, viewer behaviour
    
Akamai

Harnessing the Power of Metadata

Published By: Gigamon     Published Date: Feb 20, 2019
Read the Gigamon paper, “Harnessing the Power of Metadata for Security,” to see why metadata is the new security super power. Metadata is data about data. It is a summary or high-level view of data. Providing security tools with a summary of the packet data traversing networks, metadata becomes a powerful weapon for enterprises looking to separate signals from noise, reduce time to threat detection and improve overall security efficacy. Read now.
Tags : 
    
Gigamon

Cloud Control: Moving to the Comfort Zone

Published By: NetApp     Published Date: Sep 29, 2014
As cloud deployments accelerate, there's no question that Federal agencies are reaping the benefits – improved agility, less IT complexity, and greater collaboration through shared services. But, while the benefits are clear, concerns around data stewardship and management can stop migrations in their tracks. So how are Federal agencies dealing with the control challenge? To find out, MeriTalk surveyed 153 Federal IT professionals closely involved in their agency's cloud implementations.
Tags : 
cloud control, it complexity, collaboration, data management, cloud implementations, it management
    
NetApp

Property and Casualty’s Secret Weapon: Mobile Workforce Management

Published By: ClickSoftware     Published Date: Jun 30, 2014
Automating mobile workforce management can allow insurers to increase efficiency and improve service levels. When business is tough, that’s a great advantage
Tags : 
clicksoftware, mobile, mobile workforce, automation, casualty
    
ClickSoftware

Middle Managers: Your Secret Weapon for Engaging Employees

Published By: BI WORLDWIDE     Published Date: Dec 22, 2014
Many people view middle managers as having the ultimate “cushy” job. In reality, middle managers are the key to turning top-line strategy into day-to-day action. Successful middle managers keep their teams motivated by using recognition that is timely, specific, sincere and positive. Learn how to harness the power of your middle managers to develop a culture of recognition in your organization.
Tags : 
employee engagement, employee recognition, social recognition, mobile recognition, employee awards, employer engagement, incentive programs, employee incentives, reward ideas, recognition programs, recognition gifts, employee programs, recognition ideas, employee motivation, recognition program ideas, best practices, business intelligence, business management, employee performance, productivity
    
BI WORLDWIDE

7 Powerful Ways Windows 10 Changes the Enterprise

Published By: VMware AirWatch     Published Date: Jul 19, 2017
Windows 10 has the potential to be a quantum leap in IT and end-user productivity. But first, IT needs to educate its teams and end users on how to use, manage and employ Windows 10 to unlock those powerful benefits. Read this new flipbook to unlock insights into the seven game-changing features that make Windows 10 “ready for today’s mobile-cloud era” —and how IT can deliver a cloud-first unified approach to modern OS management and security.
Tags : 
    
VMware AirWatch

Doing Business The Customer Service Way

Published By: Oracle APAC ZO OD Prime Volume CX ABM Leads June 2017     Published Date: Jul 18, 2017
That’s why we’ve taken some of the old business preconceptions – whether service specific or not - ripped them up and rewritten five new business rules, designed to debunk some time-honoured myths and help you and your organisation take a leap towards that much-feted goal of customer centricity. Read on for the new rules we recommend, maybe take those and mix them with your own, why not share them @OracleCX? At a minimum we hope these new ways of looking at business will help provoke the questions you, and others, need to ask of your organisation – in fact, we’ve included key questions that will help provoke some conversations, so you can start to build a picture of what’s going well and where there may be room for more discussion and investigation.
Tags : 
customer service, customer behavior, sla, service metrics, business outcomes, vision for delivery, digital customer
    
Oracle APAC ZO OD Prime Volume CX ABM Leads June 2017

Agility Through Analytics: Transforming the Role of Modern HR

Published By: Oracle APAC ZO OD Prime Volume HCM ABM Leads June 2017     Published Date: Jul 12, 2017
Deep-dive analytics tools have completely transformed the way many organizations do business—helping remove the guesswork from major areas of operations, and provide everybody with the clear, actionable answers they need to make informed business decisions. The benefits of sophisticated analytics are being reaped across the business. But according to Deloitte, HR is lagging behind— with only 14 percent of companies using analytics in HR, compared to 77 percent using these tools in Operations1.
Tags : 
human resources, employee engagement, talent management
    
Oracle APAC ZO OD Prime Volume HCM ABM Leads June 2017

The growth strategy your budding business has been waiting for.

Published By: ADP     Published Date: Nov 20, 2017
Ready to take the big leap? Here are the key tactics your business needs to create a successful and safe growth strategy.
Tags : 
    
ADP

Design for Manufacturing: Solving Tomorrow's Problems Today

Published By: Sparton Corporation     Published Date: Oct 31, 2017
When it comes to Design for Manufacturing (DFM), it’s never too early to start. Planning ahead and thinking through the entire product lifecycle is the best way to reap all the benefits that come from excellent design — including better part selection, improved product quality, streamlined approvals and cost savings. Start by identifying an experienced Countract Manufacturer (CM) that understands the importance of good DFM and who will work with the product developer at every step.
Tags : 
product, market, design, intellectual property, sparton, manufacturing
    
Sparton Corporation

Harnessing the Power of Metadata

Published By: Gigamon     Published Date: Dec 13, 2018
Read the Gigamon paper, “Harnessing the Power of Metadata for Security,” to see why metadata is the new security super power. Metadata is data about data. It is a summary or high-level view of data. Providing security tools with a summary of the packet data traversing networks, metadata becomes a powerful weapon for enterprises looking to separate signals from noise, reduce time to threat detection and improve overall security efficacy. Read now.
Tags : 
    
Gigamon

Harnessing the Power of Metadata

Published By: Gigamon     Published Date: Mar 26, 2019
Read the Gigamon paper, “Harnessing the Power of Metadata for Security,” to see why metadata is the new security super power. Metadata is data about data. It is a summary or high-level view of data. Providing security tools with a summary of the packet data traversing networks, metadata becomes a powerful weapon for enterprises looking to separate signals from noise, reduce time to threat detection and improve overall security efficacy. Read now.
Tags : 
    
Gigamon

Harnessing the Power of Metadata

Published By: Gigamon     Published Date: Jun 10, 2019
Read the Gigamon paper, “Harnessing the Power of Metadata for Security,” to see why metadata is the new security super power. Metadata is data about data. It is a summary or high-level view of data. Providing security tools with a summary of the packet data traversing networks, metadata becomes a powerful weapon for enterprises looking to separate signals from noise, reduce time to threat detection and improve overall security efficacy. Read now. 
Tags : 
    
Gigamon

WP – Harnessing the Power of Metadata for Security

Published By: Gigamon     Published Date: Jun 21, 2019
Read the Gigamon paper, “Harnessing the Power of Metadata for Security,” to see why metadata is the new security super power. Metadata is data about data. It is a summary or high-level view of data. Providing security tools with a summary of the packet data traversing networks, metadata becomes a powerful weapon for enterprises looking to separate signals from noise, reduce time to threat detection and improve overall security efficacy. Read now.
Tags : 
    
Gigamon

Cisco Intelligent WAN Is the Foundation for the SoftwareDefined WAN

Published By: Cisco     Published Date: Dec 27, 2017
Digital transformation is reshaping the business landscape faster than at any time in history. It used to take decades to disrupt a market, but natively digital companies such as Uber and Airbnb have disrupted their industries in just half a decade. Digitization is creating new winners and losers at an unprecedented rate. Organizations that adopt a digital strategy will leapfrog the competition, while those that do not will risk becoming irrelevant within five years. One important step in becoming a digital enterprise is becoming an agile organization—that is, having the ability to take advantage of market opportunities faster than the competition. This shift to being an agile business has now become a top initiative for IT and business leaders. However, business agility cannot be achieved without having an agile IT infrastructure to enable it. This is why businesses spent more than $12 billion on technology to make IT more agile in 2014, according to ZK Research.
Tags : 
    
Cisco

5 Steps to Success with Stage 2 Meaningful Use

Published By: athenahealth     Published Date: Feb 27, 2014
For providers, Stage 2 Meaningful Use raises the bar across the board on what it means to “meaningfully use” an EHR: there are more core measures, new menu measures, and higher reporting thresholds. Reap the rewards by following these five steps to help your practice successfully achieve Stage 2 Meaningful Use.
Tags : 
athena, healthcare, healthcare technology, meaningful use, stage 2 meaningful use, ehr, ehr vendors, core measures, menu measures, reporting, care coordination, patient engagement
    
athenahealth

IT Transformation Trends: Flash Storage as a Strategic IT Asset

Published By: Pure Storage     Published Date: Oct 09, 2017
There’s no question about it: purpose-built all-flash storage is an exceptional catalyst for improving data center operations and supporting the transition to the cloud operating model. AFAs’ highly strategic role in both IT and business underscores the need to move storage purchase discussions and decisions beyond the storage team. IT leaders who want to see their organizations reap AFAs’ benefits—performance improvement, productivity gains, and cost savings, among others—should actively define their AFA strategies and oversee storage-related decision making, thus treating storage like the newly strategic asset it has become. To learn more, visit purestorage.com/cloud.
Tags : 
it infrastructure, operations professionals, digital experience, time to resolution, cloud, pure storage
    
Pure Storage

IBM Doubles Down on Hybrid Cloud at IBM InterConnect 2015

Published By: IBM     Published Date: Jan 06, 2016
PureApplication Enterprise Grade System, Service, and Software Options
Tags : 
hybrid cloud, ibm, software options, cloud strategy, enterprise, best practices, business intelligence, business management, productivity, cloud computing
    
IBM

Hoe betere HR uw bedrijf op weg naar succes helpt

Published By: Workday Netherlands     Published Date: Jul 05, 2019
Een sterke HR-basis helpt uw organisatie haar doelen te realiseren. Dit playbook van Jason Averbrook van Leapgen biedt actiegerichte inzichten voor het opbouwen van een stevige en schaalbare HR-basis die uw bedrijf vooruit helpt. Lees nu en ontdek: • Manieren om de datakwaliteit te verbeteren • Hoe u boeiende employee experiences creëert • Waarom één HR-systeem voor flexibiliteit zorgt
Tags : 
finance, workday, workforce technology, digital strategy
    
Workday Netherlands

Deploy Enterprise Apps in Minutes on Hybrid Cloud with PureApplication Service

Published By: IBM     Published Date: Jan 06, 2016
With IBM PureApplication Service, IT teams are no longer challenged to re-architect existing applications to make them cloud ready.
Tags : 
ibm, enterprise, hybrid cloud, pureapplication, best practices, business intelligence, business management, productivity
    
IBM

The Total Economic Impact of IBM PureApplication System

Published By: IBM     Published Date: May 25, 2016
In June 2014, IBM commissioned Forrester Consulting to conduct a Total Economic Impact™ (TEI) study and examine the potential return on investment (ROI) enterprises may realize by deploying the IBM PureApplication System. The purpose of this study is to provide readers with a framework to evaluate the potential financial impact of the IBM PureApplication System on their organizations.
Tags : 
ibm, middleware, ibm pureapplication, total economic impact, forrester, cloud, enterprise applications, cloud computing, business technology
    
IBM

Accelerate and simplify application delivery with enterprise-strength hybrid cloud

Published By: IBM     Published Date: May 25, 2016
IBM PureApplication is the fastest and simplest way to cloud-enable, deploy, manage, and move applications and middleware across your hybrid cloud
Tags : 
ibm, middleware, ibm pureapplication, hybrid cloud, application delivery, cloud, enterprise applications, cloud computing, business technology
    
IBM

Easily deploy and move enterprise applications in the cloud

Published By: IBM     Published Date: May 25, 2016
IBM PureApplication solutions offer a simple way to implement a dynamic hybrid cloud environment
Tags : 
ibm, middleware, ibm pureapplication, enterprise applications, cloud, cloud computing, business technology
    
IBM

Intelligence-Led Security

Published By: IBM     Published Date: May 26, 2017
A significant challenge for many organizations has been enabling their analysts to find the "unknown unknown." Whether that unknown is malware lurking within the enterprise or within slight variations in fraudulent transactions, the result has been the same: enterprises continue to fall victim to cybercrime. IBM is addressing this challenge with IBM i2 Enterprise Insight Analysis. By pairing multi-dimensional visual analysis capabilities with powerful analytics tools, IBM is giving the analyst team an effective early-detection, cyberintelligence weapon for its arsenal.
Tags : 
security. ibm, ibm i2, cyber-intelligence, fraud, malware
    
IBM

Expert Guide to Application Security - Real-time Hybrid Analysis: Find More, Fix Faster

Published By: HP - Enterprise     Published Date: Aug 25, 2011
This white paper details how hybrid app security enables organizations to resolve critical security issues faster and cheaper than any other technology
Tags : 
"application security", cyber-attacks, software security assurance, dast, sast, security breach, data breach, owasp, software vulnerabilities, critical application vulnerability, hp fortify, aberdeen, sdlc, mobile security, on-demand solutions, software-as-a-service, saas, it security, alm, "application lifecycle management"
    
HP - Enterprise
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.