it employees

Results 126 - 150 of 1283Sort Results By: Published Date | Title | Company Name

The Future of IT: A Customer First Approach

Published By: BMC Software     Published Date: Aug 18, 2014
IT is embracing this new world of consumerized technology with a focus on its own employees as internal customers. Explore how customer-first policies can make use of social, mobile and cloud technologies to give workers the freedom and flexibility they desire to drive company productivity.
Tags : 
customer, cloud technology, internal, productivity, networking, it management, customer relationship management, customer satisfaction, customer service
    
BMC Software

NISA Project: Employee Management Case Study

Published By: Borer Data Systems Ltd.     Published Date: Nov 07, 2007
Clear Image was awarded a contract to supply and fit CCTV and Access control to NISA, one of the largest picking warehouses in Europe. The company runs 3 shifts per day and wanted to allocate lockers to employees. The simple solution would have been to give each employee a locker, but between Borer and Clear Image, a better solution was devised. Thanks to our technology, we can create one to many relationships between our devices. 
Tags : 
security, security management, access control, identity management, iam, authentication, nisa, physical security, tracking, workforce, workforce management, employee management, borer, nisa, clear image, borer, borer data systems, access control, muster, roll call
    
Borer Data Systems Ltd.

Box Puts IT Where It Belongs: In the Driver's Seat - Get the Box IT Strategy Kit FREE Today!!

Published By: Box     Published Date: Jun 04, 2012
Enter Box. Our partner integrations and robust security suite ensure employees get any-device, on-the-go content sharing and collaboration... while IT retains control and visibility of all user accounts. Get Your FREE Box IT Strategy Kit!
Tags : 
free online storage, online storage, file sharing, online file storage, share files online, store documents online, online collaboration, collaboration tools, ftp replacement, sharepoint alternative, file storage, mobile data access, share files online, asset management, online workspace, workspace, security, enterprise applications, convergence, infrastructure
    
Box

Rosetta Stone Case Study

Published By: Box     Published Date: Jun 11, 2014
Midsize learning technology company sought to move all files to the cloud for disaster-recovery reasons and to boost employee productivity. Added Box to their existing cloud stack for all employees. Streamlined IT operations; in the process of replacing servers with Box.Technology industry, midsize company, midmarket, global, server replacement, cloud stack, NA, APAC.
Tags : 
box, rosetta stone, midmarket, midsize companies, disaster recovery, server replacement, employee productivity, it management, knowledge management
    
Box

The Essential VDI Guide

Published By: Box     Published Date: Jan 16, 2015
Desktop management at any scale is a tedious job. Imaging, reimaging, and troubleshooting desktop systems consume valuable IT resources, and keep employees from being productive. Securing the information generated on desktops, tablets, and smartphones is no simple job either. Many organizations are deploying virtual desktop infrastructures (VDI) for these reasons. But for deployment to be successful, computing and storage infrastructures must deliver high-quality, predictable, and productive user experiences. Often, the best way to accomplish this is through flash-based storage solutions due to its low latency/high IOPS nature. Unfortunately many IT professionals aren't sure what type of flash array is best for their needs or how to ensure that all elements of their VDI work seamlessly. Download now and learn how to validate a provide VDI configuration across NexGen N5 Hybrid Flash Array, VMWare Horizon View, Cisco Unified Computing System™(UCS), and Cisco Nexus Switches.
Tags : 
nexgen, hybrid, flash, qos, quality of service, it management
    
Box

Leveraging the Power of Collaboration

Published By: Box     Published Date: Nov 24, 2015
Breakthroughs in collaboration technology are helping companies of all sizes foster engagement with employees, customers, and partners. However, some organizations are still struggling to align all facets of their organization and as a result misalignment between teams is still a likely scenario. Download this whitepaper to learn how online collaboration can help push productivity in order to allow your organization a competitive edge as a result of increased productivity and a positive return-on-investment.
Tags : 
collaboration technology, customer engagement, productivity, competitive edge, return on investment, security, enterprise applications
    
Box

Gartner: Reshaping ECM: New Opportunities in the Cloud

Published By: Box     Published Date: Jun 22, 2018
more people than ever before. Whether it's your employees, partners or customers, all your people use enterprise content. And that means content management is becoming increasingly top-of-mind — but companies find it difficult to get it right. In this newsletter, Gartner shares how cloud content management helps you build your content management strategy from the bottom up, enabling you to: o Improve company-wide collaboration and become more customer-centric o Scale your business and reduce cost o Provide security and stability for your entire organization • Download the full Gartner newsletter, Reshaping ECM: New Opportunities in the Cloud. You'll learn about the emerging requirements of top ECM vendors, as well as discover real-world use cases of Cloud Content Management.
Tags : 
    
Box

Security Policy: Five Keys to User Compliance

Published By: Brainloop     Published Date: Nov 09, 2011
Business users are a key part of a company\'s security, and even the most conscientious employees can introduce serious breaches of security policy. IT can do everything in its power to secure the company\'s confidential documents--provide first-class security infrastructure, develop reasonable security policies and engage in extensive communication and training--yet still people fail to comply. The solution is to provide security that helps people do their jobs more efficiently, thereby inducing users to follow best security practices without even knowing it.
Tags : 
brainloop, technology, security, user compliance, indentity management, access control, identity management, internet security, intrusion prevention, security management, security policies
    
Brainloop

Brainshark for Financial Services: Customer Success Stories

Published By: Brainshark     Published Date: Oct 16, 2013
Banking, insurance, securities and investment firms are challenged to keep employees, broker dealers, investors and others current in a world of constant change. Enabling video and mobile communications is the most efficient way to clearly communicate and stay ahead of competitors and changing regulations. Discover how 8 out of the top 10 US financial institutions use Brainshark communications to increase compliance, decrease risks, and lower the costs of communications.
Tags : 
finance, financial services, banking, investment, insurance, broker, credit union, banks, compliance, audit, sales, training, communications, certification, powerpoint, ppt, presentation, training video, partner training, brainshark
    
Brainshark

ESG: Leading the Enterprise into Social, Mobile & Video Engagement

Published By: Brainshark     Published Date: Oct 16, 2013
Traditional ways of talking to customers, partners, and employees—memos, phone calls, newsletters—are being replaced by web-based interactive and social communication tools. Of those surveyed, 88% said that mobile access to social communication or collaboration tools was either important or very important. This whitepaper examines how companies can leverage Mobile, Social Enterprise, and video to create an enriched environment that delivers important communications and fosters active engagement.
Tags : 
video marketing, content marketing, marketing best practices, social media, viral video, inbound marketing, outbound marketing, tracking video, event promotion, creating video, youtube, video seo, mobile, webinar, webcast, podcast, slidecast, video production, online video, tablet
    
Brainshark

Day in the Life of a Mobile Learner

Published By: Brainshark     Published Date: Nov 05, 2013
Employees today are challenged to keep up with rapidly changing technologies and information. Discover the benefits of just-in-time learning and learning on-the-go in this video, and find out how your organization can help employees learn anywhere, anytime and on any device.
Tags : 
on-demand training, training, training costs, onboarding, new hires, compliance training, sales training, channel partner, reseller, product training, product demos, licensing, certification, powerpoint, presentation, training video, partner training, learning management system, lms, corporate learning
    
Brainshark

Forrester Report: Create A Learning Culture To Jumpstart Employee Development

Published By: Brainshark     Published Date: Apr 24, 2015
Too often, learning is treated as an isolated activity that occurs separately from employees’ everyday work. This is changing because of employee learning styles, the speed of our global environment, and the mobility of workers. In this report you will learn to understand why today’s learning strategies are not working, examples of successful learning culture implementations, and how to build a learning culture.
Tags : 
training, employee development, onboarding, just in time learning, jitl, continuous learning, mobile learning, elearning, e-learning, employee training, learning program, training program, learning and development, best practices, business intelligence, business management, productivity
    
Brainshark

How to Build a Dream Company

Published By: Bright Horizons     Published Date: Dec 14, 2016
New research has found that being a Dream Company – one that shows it cares about employees, provides them with learning and growth opportunities, and promotes work/life balance – drives retention, engagement, and talent attraction.
Tags : 
employee well-being, workforce productivity, retention, engagement, recruitment, child care, back-up child care, child care centers, dependent care, employee development, employee learning, work-life balance, employee performance, human resources consulting, employee benefits, employee job satisfaction, flexible workplaces, educational advising services, wellness
    
Bright Horizons

eBook: Putting the Squeeze on Productivity: The Challenges Facing the Sandwich Generation

Published By: Bright Horizons     Published Date: Jul 24, 2017
A prefect storm is brewing for employees in the “Sandwich Generation.” It’s a critical juncture: child care needs colliding with elder care demands right when employees are in key professional roles – and so exceptionally valuable to employers. Download our eBook to learn how to reduce absenteeism and improve productivity for employees managing their careers and care for both their children and aging parents.
Tags : 
elder care, child care, employee retention, dependent care, back-up care, sandwich generation, work-life, absenteeism, presenteeism
    
Bright Horizons

The Tenant Experience Gap: Building Managers and Tenants Look at the Future Through Different Eyes

Published By: Building Engines     Published Date: Mar 18, 2019
In the story of the CRE tenant experience, there are clearly some areas of alignment between building management teams and the tenants they serve. Both understand the importance of amenities, security, and communication. Both know that a building represents more than physical space – it is how companies acquire new talent and keep employees happy. However, as this research reveals, there are still major disconnects between these two parties.
Tags : 
    
Building Engines

Identity as the New Perimeter: Securely Embracing Cloud, Mobile and Social Media

Published By: CA Technologies     Published Date: Jan 08, 2014
Cloud adoption, mobility, social media and the consumerization of IT are transforming many business activities for enterprise employees, partners and customers and eliminating the traditional network perimeter. Organizations have to change how they manage security and user identities if they want to keep their data and applications secure. Read this eBook to discover how a centralized identity and access management service can help you create a new identity perimeter.
Tags : 
ca technologies, identity, identity management, user provisioning, security, mobile, cloud computing, social media, mobility, security management, access mangement, identity perimeter, network provisioning, network security, access control, authentication, internet security, web service security, mobile device management
    
CA Technologies

Identity as the New Perimeter: Securely Embracing Cloud, Mobile and Social Media

Published By: CA Technologies     Published Date: Jan 08, 2014
Cloud adoption, mobility, social media and the consumerization of IT are transforming many business activities for enterprise employees, partners and customers and eliminating the traditional network perimeter. Organizations have to change how they manage security and user identities if they want to keep their data and applications secure. Read this eBook to discover how a centralized identity and access management service can help you create a new identity perimeter.
Tags : 
ca technologies, identity, identity management, user provisioning, security, mobile, cloud computing, social media, mobility, security management, access mangement, identity perimeter, network provisioning, network security, access control, authentication, mobile device management
    
CA Technologies

Identity as the New Perimeter: Securely Embracing Cloud, Mobile and Social Media

Published By: CA Technologies     Published Date: Jan 08, 2014
Cloud adoption, mobility, social media and the consumerization of IT are transforming many business activities for enterprise employees, partners and customers and eliminating the traditional network perimeter. Organizations have to change how they manage security and user identities if they want to keep their data and applications secure. Read this eBook to discover how a centralized identity and access management service can help you create a new identity perimeter.
Tags : 
ca technologies, identity, identity management, user provisioning, security, mobile, cloud computing, social media, mobility, security management, access mangement, identity perimeter, network provisioning, network security, access control, authentication, mobile device management
    
CA Technologies

Identity as the New Perimeter: Securely Embracing Cloud, Mobile and Social Media

Published By: CA Technologies     Published Date: Jan 15, 2014
Cloud adoption, mobility, social media and the consumerization of IT are transforming many business activities for enterprise employees, partners and customers and eliminating the traditional network perimeter. Organizations have to change how they manage security and user identities if they want to keep their data and applications secure. Read this eBook to discover how a centralized identity and access management service can help you create a new identity perimeter.
Tags : 
ca technologies, identity, identity management, user provisioning, security, mobile, cloud computing, social media, mobility, security management, access mangement, identity perimeter, network provisioning, network security, access control, authentication, internet security, web service security, mobile device management
    
CA Technologies

Identity as the New Perimeter: Securely Embracing Cloud, Mobile and Social Media

Published By: CA Technologies     Published Date: Jan 15, 2014
Cloud adoption, mobility, social media and the consumerization of IT are transforming many business activities for enterprise employees, partners and customers and eliminating the traditional network perimeter. Organizations have to change how they manage security and user identities if they want to keep their data and applications secure. Read this eBook to discover how a centralized identity and access management service can help you create a new identity perimeter.
Tags : 
ca technologies, identity, identity management, user provisioning, security, mobile, cloud computing, social media, mobility, security management, access mangement, identity perimeter, network provisioning, network security, access control, authentication, internet security, web service security, mobile device management
    
CA Technologies

Benefits to Integrating Capacity Management with Application Performance Management

Published By: CA Technologies     Published Date: Aug 19, 2014
There are few concerns more critical to the success of an enterprise than the performance of its applications. Business applications are the engines that keep the business moving, representing both the touch points for customers as well as the means of interaction among employees. If the performance of critical applications is restricted in any way, the business can suffer irreparable damages.
Tags : 
ca technologies, application performance management, capacity management, business applications, business integration, network performance management, application integration, business analytics, enterprise software, productivity
    
CA Technologies

Every Business is a Mobile Business

Published By: CA Technologies     Published Date: Jan 14, 2015
Whether you were at the forefront of the mobility era or are just now catching up—or, most likely, somewhere in between—you’ve already experienced first-hand the business impact of ubiquitous smartphones and tablets. From employees to customers, mobile devices spawned an explosion in new applications, data, support needs, security concerns, and other issues. They’ve reset expectations for organizational speed and flexibility. They’ve dramatically increased the surface area for potential security attacks. All this, and the mobile era is still just in its infancy.
Tags : 
mobile busienss, smartphones, tablets, applications, data, support needs, security attacks, organizational speed, wireless
    
CA Technologies

In the application economy, DevOps ignites your digital transformation

Published By: CA Technologies     Published Date: Jun 03, 2015
"To stand out in the application economy, businesses must add digital dimensions to the experiences they provide for customers, employees and partners. Such a “digital transformation” requires new thinking around IT—specifically, its capabilities and goals, and how the various teams must collaborate to deliver on business objectives. For many organizations, the best way to navigate the digital transformation is with DevOps. In this ebook, you’ll learn more about the challenges digital transformation has created and how DevOps best practices, such as Agile Parallel Development, Continuous Delivery and Agile Operations, can be used to capitalize on opportunities and create competitive differentiation in the application economy.
Tags : 
    
CA Technologies

In the application economy, DevOps ignites your digital transformation

Published By: CA Technologies     Published Date: Jun 04, 2015
To stand out in the application economy, businesses must add digital dimensions to the experiences they provide for customers, employees and partners. Such a “digital transformation” requires new thinking around IT—specifically, its capabilities and goals, and how the various teams must collaborate to deliver on business objectives. For many organizations, the best way to navigate the digital transformation is with DevOps. In this ebook, you’ll learn more about the challenges digital transformation has created and how DevOps best practices, such as Agile Parallel Development, Continuous Delivery and Agile Operations, can be used to capitalize on opportunities and create competitive differentiation in the application economy.
Tags : 
    
CA Technologies

In the application economy, DevOps ignites your digital transformation

Published By: CA Technologies     Published Date: Jun 04, 2015
To stand out in the application economy, businesses must add digital dimensions to the experiences they provide for customers, employees and partners. Such a “digital transformation” requires new thinking around IT—specifically, its capabilities and goals, and how the various teams must collaborate to deliver on business objectives. For many organizations, the best way to navigate the digital transformation is with DevOps. In this ebook, you’ll learn more about the challenges digital transformation has created and how DevOps best practices, such as Agile Parallel Development, Continuous Delivery and Agile Operations, can be used to capitalize on opportunities and create competitive differentiation in the application economy.
Tags : 
    
CA Technologies
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.