information work

Results 151 - 175 of 484Sort Results By: Published Date | Title | Company Name

Zendesk Integration: Streamline your contact center workflow

Published By: LogMeIn     Published Date: Feb 27, 2018
Customer engagement is seamless when agents focus exclusively on the customer and not the myriad of systems needed to access information. The simpler, the better. Our Zendesk integration simplifies the agent’s workflow by providing agents with the necessary information to effectively communicate with customers from Bold360’s easy-to-use interface. By connecting these systems together agents can find information quickly, update ticket statuses, and serve customers more effectively.
Tags : 
zendesk, integration, steamline, workflow, information
    
LogMeIn

Sales Engagement Platforms Are The New Frontier Of B2B Selling

Published By: Outreach.io     Published Date: Apr 09, 2018
Modern business-to-business (B2B) buyers have unprecedented access to information to support their buying process and, as a result, have become more self-reliant in the evaluation process. This has made B2B sellers’ jobs harder; not only do they have less control in earlier stages of the sales cycle, but they have to work harder to connect and engage with buyers, turning prospects into customers. Sales technologies have helped modernize how sellers and sales leaders manage their pipelines and execute contracts, but technology gaps around engagement persist, making it difficult for sellers to keep pace with, connect with, and support buyer engagement. The common outcome: Sellers become slaves to their CRM systems, focused more on updating reports and logging their activities than they are in driving business results.
Tags : 
    
Outreach.io

Live Video Streaming Without Straining the Corporate Network

Published By: PGi     Published Date: Jul 03, 2018
Most large companies have already made investments in tools that make video webcasting possible. Video is the most vibrant and intimate medium that executives can use to convey information to large, far-flung internal audiences. Video helps keep employees on the same page about company branding, strategic direction, and externally-facing stories and messaging. It facilitates the transparency and authenticity that today’s employees demand. CEOs of large, global corporations are frequently the catalyst for enterprise live streaming because they know they can use it to make a powerful and personal connection with tens of thousands of remote employees—efficiently and cost-effectively. They support using technology to foster communication and transparency, leading to a more engaged, productive workforce. They recognize the power of video. And they see how engaged, satisfied employees can collectively strengthen their company’s competitive advantage and enhance their bottom line. If your CEO
Tags : 
    
PGi

Blockchain & Manufacturing

Published By: TIBCO Software     Published Date: Sep 03, 2019
For years, manufacturers have been trying to streamline processes and associated supply chains by building marketplaces, standardized exchanges, and monolithic systems. In many cases, these solutions missed the mark, resulting in fragmented and brittle processes without easy data sharing. Blockchain, the underlying technology behind Bitcoin and other cryptocurrencies, can potentially solve these problems. Sharing information via a trusted distributed network with embedded business logic offers many benefits for manufacturing, especially when combined with the IoT and AI communities. Watch this webinar: Blockchain & Manufacturing: A Smarter Way to Drive Efficiency in the Semiconductor and Electronics Supply Chains, with speaker Nelson Petracek, chief technology officer, TIBCO Software.
Tags : 
    
TIBCO Software

All Data Archiving Tools are not Created Equal: The Importance of Index and Search

Published By: Rand Secure Archive     Published Date: Jun 06, 2013
Most organizations possess considerable intellectual property. Unfortunately, that information is useless unless employees know how to find it. The time that staff members spend searching for data, often fruitlessly, represents a real cost to organizations. In some instances, when employees can’t find the information they’re looking for, they end up duplicating work. Archiving tools with powerful index and search capabilities can help maximize the value of intellectual property.
Tags : 
data, archive, tools, index, search, value, intellectual property, networking
    
Rand Secure Archive

Email Security in a Zero Trust World

Published By: Mimecast     Published Date: Apr 18, 2017
"To tackle today’s cyber threats, IT security leaders must rethink traditional security strategies. Email security in particular has become a victim of its own success and requires a radical rethink, having played a key role in several high-profile security breaches. Today’s threats, like spear-phishing, are designed to bypass traditional Secure Email Gateway defenses, often taking advantage of end users who are considered the weakest link in business email security armor. A zero-trust approach to email security is needed. This white paper discusses how: - CISO’s should carefully assess email security as part of a strategic security review - IT Managers can evaluate the state of current email defenses and take tactical action to strengthen them - Security Administrators can deliver best-practice defense in depth for email - Organizations can remove a reliance on trust to more effectively protect information, their network and employees. "
Tags : 
email security, cyber threats, it security, phishing
    
Mimecast

Have you Performed a Health Check on your Organization’s Ability to Deal with Cyber-Attacks?

Published By: Intel Security     Published Date: Feb 23, 2015
This report reveals the key steps organizations can take to harden their infrastructure, improve their responsiveness, and actively disrupt targeted attacks by paying attention IoAs.
Tags : 
security information, security connected framework, big security data, big data, log management, cyber-attacks, hackers, reference archecture
    
Intel Security

Cloud and Compliance in One – Is it Possible?

Published By: Intel Security     Published Date: Feb 23, 2015
This paper reveals how cloud and compliance could be in one thanks to McAfee Enterprise Security Manager.
Tags : 
security information, security connected framework, big security data, big data, log management, siem, security event management, application security
    
Intel Security

Managing Information Risk: Why Compliance and Security Must Join Forces

Published By: Brainloop     Published Date: Nov 03, 2011
Online collaboration has allowed companies to leapfrog their competition. But how do they avoid risk? This paper explores options for high-productivity collaboration supporting security and compliance. Must reading for anyone interested in strategic IT and compliance!
Tags : 
cloud collaboration, cloud security, collaboration application, collaboration environment, data protection, data room, digital rights management, document protection
    
Brainloop

Data Is Your Story: The Language of Data Infrastructure Modernization

Published By: Hitachi Vantara     Published Date: Aug 02, 2018
In this book, we are going to look at the key trends driving the modernization of data infrastructure. We’ll see how organizations are adapting and flourishing in a data-driven world. For some time, headlines have been around the internet of things (IoT), big data and data analytics. While these developments are important, the reality is that you cannot take full advantage of them without modernization. We’re going to look at these trends and priorities in detail, then look at the three key drivers of modernization: governance, mobilization and analytics. We’ll also consider the technologies that make up modern data infrastructure including artificial intelligence (AI), flash storage, converged and hyperconverged platforms and software-defined infrastructures. By making sense of data, we make sense of the world. With more data than ever before, we have the tools to turn all that information into intelligent innovation and change the way the world works.
Tags : 
data infrastructure, big data, internet of things
    
Hitachi Vantara

Social Media as a Customer Support Channel: Best Practices

Published By: Oracle     Published Date: Apr 22, 2015
This paper provides information on how social media works as a customer support channel.
Tags : 
social media, customers experience strategy, customer satisfaction, customer engagement, branding, social media tools, enterprises, sales
    
Oracle

Social Media als Kundensupport-Kanal: Bewährte Verfahren

Published By: Oracle     Published Date: Apr 22, 2015
This paper provides information on how social media works as a customer support channel.
Tags : 
social media, customers experience strategy, customer satisfaction, customer engagement, branding, social media tools, enterprises, sales
    
Oracle

An Easy, Flexible, Alternative to LSMW for Business Users

Published By: Winshuttle     Published Date: Apr 18, 2017
Uploading bulk information to SAP doesn’t have to be time consuming and complex. Rather than rely on SAP’s Legacy System Workbench (LSMW) which was designed for IT professionals for data migration projects, business users can leverage a non-technical alternative in a few simple steps to create and update data in SAP for everyday business transactions and data projects. This white paper provides a side-by-side comparison of LSMW’s 14 step process and Winshuttle Studio’s 3 step process to upload/download data and highlights why Winshuttle’s business led, IT enabled solution provides many benefits to the organization.
Tags : 
    
Winshuttle

Passing PCI Compliance Section 6.6: Code Reviews and Application Firewalls

Published By: HP - Enterprise     Published Date: Oct 16, 2008
If your company stores or processes credit card information, you must be able to demonstrate compliance with the Payment Card Industry (PCI) Data Security Standards (DSS). These standards include requirements for security management, policies, procedures, network architecture, design, and other critical protective measures. They also include one very prescriptive requirement:  Section 6.6 mandates that organizations secure all Web applications by conducting a code review or installing an application layer firewall. Companies have had a very difficult time passing the other parts of Section 6 and they have experienced a rising number of data breaches. Unless companies take 6.6 seriously, PCI compliance failure rates, and data breaches, will continue to grow.  Read this whitepaper to gain an overview of best practices to pass Section 6.6 and an understanding of the technology available to you.
Tags : 
business risk, security, application security, audit, risk, vulnerabilities, fortify, fortify software
    
HP - Enterprise

Data Quality: A Survival Guide to Marketing.

Published By: SAP Inc.     Published Date: Jul 28, 2009
In this paper, Frank Dravis, Six Factors Consulting, discusses how even with the finest marketing organizations, the success of marketing ultimately comes down to the data.
Tags : 
single platform, data integration, data quality, quality management, soa, architecture, soa, sap businessobjects data services
    
SAP Inc.

CITO Research: Buyer's Guide to Big Data Integration

Published By: Pentaho     Published Date: Mar 08, 2016
If you’re evaluating big data integration platforms, you know that with the increasing number of tools and technologies out there, it can be difficult to separate meaningful information from the hype, and identify the right technology to solve your unique big data problem. This analyst research provides a concise overview of big data integration technologies, and reviews key things to consider when creating an integrated big data environment that blends new technologies with existing BI systems to meet your business goals. Read the Buyer’s Guide to Big Data Integration by CITO Research to learn: • What tools are most useful for working with Big Data, Hadoop, and existing transactional databases • How to create an effective “data supply chain” • How to succeed with complex data on-boarding using automation for more reliable data ingestion • The best ways to connect, transport, and transform data for data exploration, analytics and compliance
Tags : 
data, buyer guide, integration, technology, platform, research, enterprise applications
    
Pentaho

Looking Ahead: A Cloud Report from 2015

Published By: BMC     Published Date: Jan 05, 2012
Find out what the future of cloud means for IT organizations, tech businesses and for the CIOs who have to make information technology work.
Tags : 
bmc, cloud, cio, cto, hardware, operations, business operations, productivity
    
BMC

SuccessFactors Employee Central Core HR (HRIS) Quick Guide

Published By: Success Factors     Published Date: Jul 02, 2013
SuccessFactors Employee Central provides a single employee global system of record that is deployed in the cloud and brings greater workforce visibility to small and medium-size businesses. HR can quickly integrate workforce data from the SuccessFactors BizX Suite of talent management solutions – including Performance and Goals, Compensation, Learning and more, as well as from third-party systems, such as payroll, benefits, and time and attendance. Employees can use the Employee Central self-service features to update their personal information, while managers can easily change employee information such as promotions, salary changes, terminations and more with customized approval workflows. The result: An integrated 360-degree view of the workforce that HR can access through standard and ad-hoc reports to make fast, informed decisions based on consistent, up-to-date data. To learn more, download the SuccessFactors Employee Central business brief for small to medium-size businesses
Tags : 
successfactors, employee, central core, hris, hr quick guide
    
Success Factors

Citrix Xenclient Local Virtual Desktop Technology For Laptops

Published By: Intel Corp.     Published Date: Jul 09, 2012
Use local virtual desktops to secure and control information no matter where-or whether-users connect to the network.
Tags : 
intel, virtual desktop, citrix xenclient, business technology
    
Intel Corp.

Secure Configuration Management Demystified

Published By: Tripwire     Published Date: Nov 07, 2012
Properly configuring security parameters on servers, workstations and network infrastructure platforms has been a mandatory of best practices in information security. Read this white paper to learn how secure configurations can reduce overall attack.
Tags : 
secure configuration, tripwire, information security, data security, network infrastructure platforms, business technology
    
Tripwire

The New World of Collaboration

Published By: Box     Published Date: Jun 11, 2014
The old world of collaboration—desktops, wired network connections, virtual private networks, and clunky software—has given way to a new world of collaboration. Today’s generation of mobile devices, wireless technologies, and cloud capabilities has had an inexorable and fundamental impact on how people work together and share information. Collaboration is now device- and network-agnostic. It’s not just about being able to work anywhere and anytime, it’s about being able to connect to any document at any time. Read this CIO white paper to learn how to bridge the gap in the modern world.
Tags : 
box, collaboration, desktops, wired networks, virtual private networks, mobile devices, wireless technologies, it management
    
Box

Using User Identity Data to Improve Mobile Security

Published By: Okta     Published Date: Nov 09, 2015
Today, 61% of North American and European enterprise information workers are choosing their smartphones for work either on their own or from a company-approved list. According to Forrester’s Business Technographics® Global Devices And Security Workforce Survey, 2014, 53% of employees are unwilling to make any kind of sacrifice to their user experience in the interest of heightened security. Read this report to learn more about the results.
Tags : 
okta, user identity data, mobile security, forrester's business technographics, security, data management
    
Okta

Build HIPAA Eligible Solutions with AWS and APN Partners

Published By: AWS     Published Date: Aug 23, 2018
AWS supports healthcare organizations with HIPAA Eligible Services and the AWS Healthcare Compliance program. AWS products and services are being used by many customers that handle electronic patient health information (PHI) to build solutions that meet HIPAA and HITRUST regulatory requirements for cloud-based workloads. In this webinar, you’ll learn how AWS HIPAA Eligible Services can help you build secure workloads to handle PHI in compliance with HIPAA and HITRUST standards. AWS Healthcare experts will be joined in this webinar by AWS Partner Network (APN) Partners ClearDATA and Cloudticity.
Tags : 
    
AWS

Considerations for Building a Healthcare Sector Private Optical Network.

Published By: Ciena     Published Date: Nov 15, 2016
"In healthcare, as the trends supporting eHealth accelerate, the need for scalable, reliable, and secure network infrastructures will only grow. This white paper describes the key factors and technologies to consider when building a private network for healthcare sector enterprises, including: Transport Network Equipment Outside Fiber Plant Converged Platforms Reliability, Redundancy, and Protection Reconfigurable Networks Management Software Security Services, Operation, Program Management, and Maintenance Download our white paper to learn more."
Tags : 
packet networking, packet networking portfolio, packet optical hie network, packet-optical transport, patient data security, private and hybrid cloud, private optical network for healthcare, private optical network for hospitals
    
Ciena

The Top Five Advantages of Packet-Optical Networks for Healthcare.

Published By: Ciena     Published Date: Nov 15, 2016
Healthcare providers use Packet-Optical Networks to meet performance and bandwidth demands. Learn the advantages of Packet-Optical Networks.
Tags : 
packet networking, packet networking portfolio, packet optical hie network, packet-optical transport, patient data security, private and hybrid cloud, private optical network for healthcare, private optical network for hospitals
    
Ciena
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.