tag once

Results 26 - 50 of 51Sort Results By: Published Date | Title | Company Name

How Soft Skills Activate Hard Skills

Published By: MeQuilibrium     Published Date: Aug 01, 2019
Skills shortages are keeping business leaders up at night. In fact, nearly half of executives say this skills gap is a major concern for the future of their organization — yet only 3% are significantly increasing training budgets. Why? Workplace learning is a difficult nut to crack. Organizations often struggle to reskill their adult workforces with hard skills because they’re taking the wrong approach. In this white paper, we take a look at why soft skills are not only integral for the future of work, but why they’re actually necessary for developing hard skills too. You’ll also learn: ? How soft skills can lead to dramatic shifts in how people think ? How soft skills improve our ability to learn ? The most important skill for the 21st century — and how it can boost learning by 30% Discover why empowering your people with soft skills is critical to unlocking the future success of your business. Download Now
Tags : 
    
MeQuilibrium

A New Mandate for IAM with Multifactor Authentication

Published By: OKTA     Published Date: Sep 26, 2017
Cyberbreaches aren’t just in the news—they are the news. Yet headlines rarely mention the No. 1 source of those breaches: weak or stolen passwords. Whether they involve malware, hacking, phishing, or social engineering, the vast majority of breaches begin with account compromise and credential theft, followed by dormant lateral network movement and data exfiltration. In fact, weak or stolen passwords account for a staggering 81% of breaches, according to the Verizon 2017 Data Breach Investigations Report. Not surprisingly, a new Okta-sponsored IDG survey finds that identity access management (IAM) is a top priority for nearly three-quarters (74%) of IT and security leaders. Yet the same survey uncovers widespread concern that their current IAM implementations are falling short. Just one worrisome example: Fewer than one-third (30%) of respondents report a good or better ability to detect a compromise of credentials. The following report explores the gap between respondents’ aspiratio
Tags : 
    
OKTA

The Future is Now: Creating an Intelligent Cloud Contact Center

Published By: Five9     Published Date: Aug 01, 2019
Today’s organizations compete on customer experience and this trend will define the shape and scope of contact centers well into the next decade. To deliver the level of seamless experiences that customers expect, contact centers will need to harness all the advantages technology can offer – specifically, the cloud – to create an “intelligent cloud contact center” that utilizes machine learning and real-time data analysis. So, step one is to move your contact center to the cloud. ASAP. Once you are operating a cloud contact center, the next step is to start leveraging everything this enables you to do. This is where the “Intelligent Cloud Contact Center” comes into play.”
Tags : 
    
Five9

What’s Next for Brands in E-Commerce

Published By: ChannelAdvisor     Published Date: Nov 29, 2017
"The percentage of consumers making purchases online has officially outpaced those who don’t. But what does this mean for brands? Once tethered largely to wholesale and resale, the door has been opened for brands to try a variety of selling options. And they are. The time is now for brands to step into the e-commerce game and figure out the best approach for them. In this white paper, we’ll dive into six critical components that all brands should be watching as the industry evolves: - Customer connections - Relationships with retailers - Quality of product content - Marketplace management - Social commerce influence - Big data for brands"
Tags : 
ecommerce, retail, advertising, selling online, online shopping, online advertising, manufacturer, marketing
    
ChannelAdvisor

How To Select A Customer Experience Platform For Maximum Impact

Published By: Intouch Insight     Published Date: Sep 10, 2018
This whitepaper will show you what it takes to be part of the 19% that succeed at CX initiatives and teach you: • What defines a strong CX platform • The components of a successful CX program; and • What software features to look for to get a dynamic, customizable platform that meets your company’s unique needs. There is no shortage of platforms out there, but the right one has to provide critical support at every stage of a simple (but not simplistic!) process that will take your CX efforts to the next level. Once we define the requirements, it will be easy to understand how a strong CX platform can help your strategy transition from inception to analysis to action - maximizing the impact of every effort along the way. WHAT
Tags : 
    
Intouch Insight

The 3 Major Qualities of a Successful Task-analysis Approach

Published By: Procore     Published Date: Jun 25, 2019
Understanding the inextricable link between safety, quality and productivity is a critical piece of knowledge for today's construction management professional. And it should be leverage at all stages of a projects, from planning to programming and through the execution of the work. A proper task analysis will: Account for all three elements: safety, quality and productivity include input from site personnel Include the information needed to make decisions on the site Be a workable plan Remember that once you accept safety, productivity and quality are inextricably linked, you begin to realise that the data you harvest from your various site reports, such as reports of near misses or the need for constant rework, may also be able to fill in the blanks and tell a story about the overall progress and productivity on a project as well.
Tags : 
    
Procore

Will data privacy make business more competitive?

Published By: McAfee EMEA     Published Date: Mar 14, 2018
As they face numerous regulations, enterprises believe data privacy can create a competitive advantage. But are they ready for the new General Data Protection Regulation (GDPR)? Here are the concerns and strategies of 800+ senior executives from industries around the world. Data in a Turbulent World Nearly half of organizations say they will migrate data as a result of regulation or changing government policies. Data Protection as a Competitive Advantage A significant majority of respondents believe proper data protection will attract new customers. Download our full report, Beyond GDPR: Data residency insights from around the world.
Tags : 
    
McAfee EMEA

Adopting Unified Communications: Key Steps To Consider

Published By: ADTRAN     Published Date: Jun 16, 2011
Small and medium enterprises are increasingly upgrading to a UC system, which can improve customer service, streamline product development and speed response to new opportunities. Learn the key steps of UC adoption.
Tags : 
adtran, telecomm, communication, uc adpotion, ivr application, response time, roi, infrastructure, competitive advantage, networking, unified messaging, voip, roncelli, productivity, operational expenses, business process, admin, uc systems, data integration
    
ADTRAN

Enterprise Strategy Group: The Next Wave of Data Deduplication

Published By: HP and Intel® Xeon® processor     Published Date: Feb 11, 2012
Leveraging deduplication in backup environments yields significant advantages. HP StoreOnce deduplication simplifies the deployment of deduplication technology across the IT infrastructure.
Tags : 
intel, storage, 2.0, infrastructure, trends, storage, flexibility, drivers, market dynamics, trends, converged, custom requirement, deduplication, tiering, protocol, foundation, virtualization, cloud computing, design and facilities
    
HP and Intel® Xeon® processor

Moneyball Method of Field Service Management

Published By: Oracle Service Cloud     Published Date: Mar 23, 2016
In the early 2000s, two vastly different businesses—baseball and field service management—began to use advanced statistical analysis to gain an advantage over their competitors. They both revolutionized their respective fields by using statistical knowledge to improve performance. The new approach replaced old models and methods and attained shockingly good results as both set new standards for their respective industries. In this white paper, you will learn the general concepts behind predictive analytics and how they can be applied to a field service organization. The paper will cover the basic metrics that should be tracked, the use of performance pattern profiles, and how these principles can predict future events.
Tags : 
oracle, service cloud, service management, customer interaction, best practices, business activity monitoring, business analytics, customer interaction service, customer relationship management
    
Oracle Service Cloud

5 Things You Need to Know About Implementing a Multi-CDN Strategy

Published By: Limelight Networks     Published Date: Mar 02, 2018
Can your business afford to lose $9,000 per minute? According to the Ponemon Institute $9,000 is the average cost of an unplanned outage. In some cases the costs are much higher. The catalogue of cloud outages over recent years is well publicized and reads like a “who’s who” of the technology industry. It seems no one is immune. But when it comes to delivering digital content, downtime isn’t the only concern. Today a poor user experience can be just as damaging as an outage. According to Limelight research, 78% of people will stop watching an online video after it buffers three times, and the majority of people will not wait more than 5 seconds for a website to load. Organizations looking to deliver great digital experiences for their customers often choose to deliver that content using Content Delivery Networks (CDNs). Using multiple CDNs to deliver these digital content experiences promises even greater levels of availability and performance. But it brings with it a host of questi
Tags : 
content delivery network, cdn, multi-cdn, multiple cdns, web performance, web acceleration, digital content delivery, mobile delivery, global content delivery, live streaming, video on demand, video delivery, ott content delivery
    
Limelight Networks

The Foundation for Mobility Success

Published By: CDW     Published Date: Jun 14, 2016
For most organizations, the question of whether to deploy mobile computing has long since given way to the question of how. And many are only in the early stages of mobility maturity. An expertly conceived strategy is necessary to achieve the innovation that mobility can provide.
Tags : 
mobile management, mobile devices, enterprise management, mobile device management, best practices, business optimization, productivity, mobile computing, wireless communications, business management, contact management, content management system
    
CDW

Faster Response with CrowdStrike and MITRE ATT&CK

Published By: CrowdStrike     Published Date: Feb 14, 2019
How adopting a framework can optimize cybersecurity Today’s threat landscape has created new challenges for security analysts and incident responders, as the number of alerts and their complexity have increased significantly. Organizations with small IT teams are overwhelmed, often lacking the time or resources to investigate every alert. Failing to do so means a high-risk threat might go unnoticed. This can result in a devastating breach, damaging an organization's finances and reputation. This white paper discusses how CrowdStrike is solving these challenges, by implementing the MITRE ATT&CK™ Framework across multiple CrowdStrike processes and product features to help improve analyst’s productivity and prevent breaches. This provides many benefits, including time savings; adding advanced context to security alerts and information; and enabling a common, shared language. However, it also provides some hidden advantages, especially concerning cybersecurity. Read this whitepaper to lear
Tags : 
    
CrowdStrike

State of Cloud Security Bulletin

Published By: Alert Logic     Published Date: Jun 12, 2014
While e-commerce remains a relatively small percentage of overall retail spending (rates vary by country, but are generally in the 5–10% range), it continues to grow. The ongoing growth of e-commerce suggests that one of the initial objections to online shopping—concerns about whether consumer personal information would be secure—has been largely overcome. Standards like PCI, and payment services like PayPal, along with a general increase in security awareness, have gone a long way to change the perception of online shopping. Learn more about Information Security in the E-commerce Sector.
Tags : 
cloud security, cloud e-commerce, cloud pci, e-commerce security, compliance, it management
    
Alert Logic

Developing a Cap-and-Grow Strategy, and 14 Best Practices for Lync Deployment

Published By: Polycom     Published Date: Sep 24, 2014
There are many ways to take advantage of the rich set of collaboration tools provided with Microsoft Lync. IT leaders should consider a cap-and-grow strategy where investment dollars in legacy systems are capped and the financial and IT resources are reallocated to grow Lync. Once the company has a cap-and-grow Lync strategy, IT leaders should consider retirement of legacy infrastructure and how Lync can be leveraged as a replacement technology. Forward-looking IT leaders will consider Lync a strategic UC platform upon which to build a companywide collaboration strategy, rather than just a replacement for a legacy phone system. Get this report to read best practices for a Lync deployment.
Tags : 
grow, strategy, cap, best practices, lync, deployment, advantage, rich, collaboration, tools, investment, dollars, legacy, system, financial, resources, strategic, infrastructure, platform, software development
    
Polycom

nGenera "Making Strategy Real" Whitepaper-lo-res for web

Published By: SAP     Published Date: Apr 07, 2011
In today's competitive global business environment virtually all firms work diligently to analyze alternatives and to create a business strategy that enables competitive advantage. Once the strategy has been defined however, nine out of ten organizations fail to implement it effectively. Don't let this happen to you.
Tags : 
bi strategy, real-time analytics, performance boost, business insight, business data insight, decentralization, business activity monitoring, business analytics
    
SAP

A Smarter Way to Integrate with SharePoint

Published By: K2     Published Date: Jan 07, 2016
We’re experiencing a data explosion. By 2020 the data we create and copy annually will reach 44 trillion gigabytes.1 As this data disseminates into the workplace, companies add hardware and software systems to store, protect and manage it all. While data can help solve business problems, data is most helpful when it reaches those who can use it. Companies need to build Microsoft SharePoint apps that integrate with other line-of-business (LOB) systems so users can take full advantage of this data explosion. But the reality of creating apps that integrate data across organizational systems presents an intimidating challenge. To integrate multiple isolated data sources into an application that transforms data into useful information requires technical expertise, coding and ongoing maintenance. Integration also raises security and governance concerns. So it’s no surprise that only 47 percent of SharePoint users have connected their SharePoint apps with other systems.2 As a result, nearly
Tags : 
microsoft sharepoint, data integration, security, sharepoint solutions, networking, it management, knowledge management
    
K2

Rackspace Private Cloud: Designed to support your enterprise production workloads

Published By: Rackspace     Published Date: Jan 19, 2016
Many companies want to take advantage of public cloud features, but aren’t willing to compromise on the performance, security and control that they require for their business applications and data. Public clouds have the potential to introduce performance issues caused by “noisy neighbors,” security concerns associated with placing sensitive data in a shared infrastructure environment, and a lack of control driven by the inability to customize and fine-tune cloud resources to meet the needs of a given application.
Tags : 
rackspace, private cloud, enterprise, application, data, software development, data management
    
Rackspace

From Social Media to Social CRM: Reinventing the Customer Relationship

Published By: IBM     Published Date: Feb 14, 2014
"Welcome to the age of Social CRM, a different way of thinking about customer relationship management that focuses on using social media to enhance customer engagement. How prepared are companies to make this shift? Despite widespread adoption of social media, for most, Social CRM is still in its early stages, execution is patchy and concerns about ROI remain. To fully exploit the power of social media to connect with customers, organizations need to move beyond isolated projects to integrated programs and, ultimately, a Social CRM strategy."
Tags : 
ibm, marketing, social media, crm, social crm, customer service, customer interaction, customer relationship, marketing management, marketing strategy
    
IBM

Compliance Analyst Report

Published By: Microsoft Office 365     Published Date: Sep 26, 2017
According to Microsoft CEO Satya Nadella, Office 365 is Microsoft’s most strategic API. But to realize the potential of this business collaboration platform, Microsoft and its partners have to convince business and IT leaders that it offers levels of security, privacy, and compliance that are equal to or higher than those of their existing on-premise solutions. Even though a high percentage of enterprises are adopting cloud storage and compute within their businesses, the adoption of cloud-based content and collaboration products is by no means universal. Concerns relating to governance, risk, and compliance with regard to cloud services are understandable, but it is not unusual to find them overstated.
Tags : 
    
Microsoft Office 365

The Ultimate Guide to Rapid Prototyping for Product Development

Published By: ASME - Formlabs     Published Date: Aug 28, 2019
Rapid prototyping helps companies turn ideas into realistic proofs of concept, advances these concepts to high-fidelity prototypes that look and work like final products, and guides products through a series of validation stages toward mass production. With rapid prototyping, designers and engineers can create prototypes directly from CAD data faster than ever before, and execute quick and frequent revisions of their designs based on real-world testing and feedback. Download this white paper to learn: How rapid prototyping fits into the product design process The applications of rapid prototyping from concept models to manufacturing An overview and comparison of 3D printing technologies for rapid prototyping: FDM vs. SLA vs. SLS
Tags : 
    
ASME - Formlabs

The Role of Access Control in the IP World

Published By: Borer Data Systems Ltd.     Published Date: Nov 07, 2007
Swiping a card to gain access to a company building is now a perfectly accepted feature of everyday corporate life. Over the years, we have all grown familiar with the routine and the advantages it brings to access control. But where cards were once used exclusively to open doors, controlling who went where and when in a building, now they can be used for a wide variety of extra functions.
Tags : 
security, security management, access control, identity management, iam, authentication, tracking, workforce, workforce management, employee management, borer, access control, ip world, borer, borer data systems, office security, building security, card technology, ip networks
    
Borer Data Systems Ltd.

Data Warehouse Modernization

Published By: SAS     Published Date: Aug 03, 2016
No matter the vintage or sophistication of your organization’s data warehouse (DW) and the environment around it, it probably needs to be modernized in one or more ways. That’s because DWs and requirements for them continue to evolve. Many users need to get caught up by realigning the DW environment with new business requirements and technology challenges. Once caught up, they need a strategy for continuous modernization.
Tags : 
best practices, technology, data, business technology, business analytics, business intelligence, business management
    
SAS

23 Reasons Why Companies Choose Integrated XBRL

Published By: IBM Business Analytics     Published Date: Jun 23, 2011
Companies globally must determine the approach to compliance with mandated use of XBRL and significantly accelerating financial reporting. Here are 23 reasons to why an integrated approach towards external reporting is required by organizations today.
Tags : 
ibm business analytics, integrated xbrl tagging, extensible business reporting language, bolt-on, tag once, taxonomy collaboration, validation, xhtml, business analytics, business intelligence, business management, business metrics, analytical applications, financial management
    
IBM Business Analytics

Arc Fault-Resistant Cabinet Solutions for Medium Voltage Drives

Published By: Siemens     Published Date: Jun 01, 2016
Researchers in the occupational electrical medical emergencies show that in a six-year period 32,840 serious but non-fatal injuries occurred, some 60% involving electric shock and 40% involving electric burns. Obviously, the electric shock injuries occurred in relation to low voltage equipment since electric shock in relation to medium voltage equipment is as a rule fatal. It is reported that in the U.S., annually about 2000 arc burn related injuries occur and require hospitalization. Thus, the impact of such injuries on workers becomes a major concern in itself, beyond the economic aspects which are not to be ignored.
Tags : 
siemens, arc defense, fault-resistant, medium voltage, electrical emergency, electronics
    
Siemens
Start   Previous    1 2 3    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.