owned

Results 1 - 25 of 141Sort Results By: Published Date | Title | Company Name

BYOD Policy Implementation Guide

Published By: Absolute Software     Published Date: Dec 20, 2012
Three Simple Steps to Legally Secure and Manage Employee-owned Devices Within a Corporate Environment
Tags : 
byod, policy, guide, mobile, security, cloud, apps, administration, device
    
Absolute Software

BYOD Policy Implementation Guide

Published By: Absolute Software     Published Date: May 14, 2014
Three simple steps to legally secure and manage employee-owned devices within a corporate environment
Tags : 
byod, workforce mobility, enpoint protection, mobile devices, absolute software, access control, application security, identity management, intrusion detection, application integration, mobile device management
    
Absolute Software

Forrester DMP Wave Audience Management

Published By: Adobe     Published Date: Nov 07, 2013
Today’s leading DMPs are ingesting a wide range of owned and licensed data streams for insights and segmentation and are pushing data into a growing number of external targeting platforms, helping marketers deliver more relevant and consistent marketing communications.
Tags : 
adobe, the forrester wave, forrester dmp wave, audience management, data management platforms, multi-touchpoint targeting, multi-touchpoint execution, dmp vendor offerings, seamless data ingestion, message delivery, strong vendors, product evaluations, selecting right partner, audience insights, coordinated targeting, data management, business management, customer interaction service
    
Adobe

The Social Intelligence Report

Published By: Adobe     Published Date: Jan 21, 2014
Discover this year’s biggest social marketing trends in our Social Intelligence Report. You’ll learn where the greatest opportunities are in paid, earned, and owned social—and you’ll discover new tools and strategies for building stronger engagement and better results.
Tags : 
social marketing, social technology, social listening, social reach, social relationship, social media marketing, adobe
    
Adobe

Vision from The Harbor

Published By: Adobe     Published Date: Mar 03, 2017
Like the renowned Sydney Opera House, your brand has the potential to become an icon. Read our guide, Vision from the Harbor, to find out how. You’ll discover strategies for standing together with customers. So your business can stand out from the crowd. Read our guide now to learn how you can: • Create unforgettable experiences across the entire customer journey • Test those experiences and improve them to lift conversion • Overcome organizational barriers to create a true culture of optimization
Tags : 
customer experience, optimization, branding, brand strategy
    
Adobe

Vision From the Harbor

Published By: Adobe     Published Date: Jun 22, 2017
Like the renowned Sydney Opera House, your brand has the potential to become an icon. Read our guide, Vision from the Harbor, to find out how. You’ll discover strategies for standing together with customers. So your business can stand out from the crowd. Read our guide now to learn how you can: • Create unforgettable experiences across the entire customer journey • Test those experiences and improve them to lift conversion • Overcome organizational barriers to create a true culture of optimization
Tags : 
data, marketing, customer journey, customer experience, strategy
    
Adobe

15 Ways to Weed the Regulatory Violations Out of Your Spend

Published By: AppZen     Published Date: Aug 02, 2019
Spend-related regulatory violations come in the form of different types of payments or gifts, including those to sanctioned organizations or people; debarred organizations or people; organizations or people on an export control list; foreign officials or government-owned entities; politically-exposed people; and healthcare professionals or organizations. How do you know if you have these violations hiding in your organization's expenses, contracts, or invoices? It’s not easy to weed them out, and if you don’t have an automated, systematic approach, doing so is prohibitively time consuming.
Tags : 
    
AppZen

15 Ways to Weed the Regulatory Violations Out of Your Spend

Published By: AppZen     Published Date: Sep 10, 2019
Spend-related regulatory violations come in the form of different types of payments or gifts, including those to sanctioned organizations or people; debarred organizations or people; organizations or people on an export control list; foreign officials or government-owned entities; politically-exposed people; and healthcare professionals or organizations. How do you know if you have these violations hiding in your organization's expenses, contracts, or invoices? It’s not easy to weed them out, and if you don’t have an automated, systematic approach, doing so is prohibitively time consuming.
Tags : 
    
AppZen

15 Ways to Weed the Regulatory Violations Out of Your Spend

Published By: AppZen     Published Date: Oct 21, 2019
Spend-related regulatory violations come in the form of different types of payments or gifts, including those to sanctioned organizations or people; debarred organizations or people; organizations or people on an export control list; foreign officials or government-owned entities; politically-exposed people; and healthcare professionals or organizations. How do you know if you have these violations hiding in your organization's expenses, contracts, or invoices? It’s not easy to weed them out, and if you don’t have an automated, systematic approach, doing so is prohibitively time consuming.
Tags : 
    
AppZen

American Health Network Reduces Denial Management Time by 75 Percent, Realizes ROI of 200 Percent

Published By: Availity     Published Date: Aug 08, 2013
American Health Network faced one of the most vexing problems in health care: Claim denials. Learn how this physician-owned practice realized an ROI of 200 percent and recovered $1.4 million.
Tags : 
accounts receivable, revenue cycle, revenue cycle management, billing practices, claim denial, electronic claim submission, cbo, blue cross and blue shield, realmed, availity, practice billing, health plans, eligibility and benefits, denial management, health network, clearinghouse, denials, claims, transactions, hipaa
    
Availity

How to Wrangle Data for Machine Learning on AWS

Published By: AWS     Published Date: Jun 24, 2019
Join our webinar to hear how Consensus, a Target-owned subsidiary, utilizes AWS and Trifacta to prepare data for use in fraud detection algorithms. You’ll learn how self-service automated data wrangling can save your organization time and money, and tips for getting started with Trifacta’s solution, built for AWS. Webinar attendees will learn: Why automating your data wrangling tasks can lead to greater data accuracy and more meaningful insights. How you can reduce your data preparation time by 60% and more with self-service data wrangling tools built for AWS. How easy it is to get started with machine learning solutions for data wrangling on the cloud.
Tags : 
    
AWS

Employee-owned Smartphones: Seize the Opportunity

Published By: BlackBerry     Published Date: Jul 22, 2010
As more employees desire to use their personal smartphones for work, IT managers must leverage the opportunity, or risk their organizations missing out on an emerging business trend. It's no longer feasible for an IT department, regardless of company size, to ignore the smartphone push from the majority of the employee population. IT management must attempt to channel the chaos and determine ways to embrace the personal mobility wave while maintaining effective security and management measures, especially in relation to the corporate network. This free whitepaper discusses innovative mobile strategies, new policies, and a fresh approach to allowing smartphones access to corporate resources.
Tags : 
blackberry, mobility, smartphones, rim, cell phones, mobile workforce, e-commerce, handset, touchpoint, mobile computing, mobile data systems, mobile workers, smart phones, wireless application software, wireless communications, wireless hardware, wireless infrastructure, wireless phones, wireless service providers, collaboration
    
BlackBerry

Securing the Enterprise of Things in the Public Sector

Published By: BlackBerry     Published Date: Feb 01, 2019
The Enterprise of Things (EoT) is the network of people, endpoints, and digital assets owned by and connected to the enterprise (or public sector organisation, in this context). It casts a wide net, to include content, communication, collaboration, transportation, and facilities – that is, anyone and anything connected to the internet. The EoT represents a powerful opportunity to transform existing public sector processes and create entirely new ones. Governments are moving on these initiatives because policymakers are legislating it, constituents are demanding it and because it presents an opportunity to do more with less.
Tags : 
    
BlackBerry

Securing the Enterprise of Things in the Public Sector

Published By: BlackBerry APAC     Published Date: Jan 29, 2019
The Enterprise of Things (EoT) is the network of people, endpoints, and digital assets owned by and connected to the enterprise (or public sector organisation, in this context). It casts a wide net, to include content, communication, collaboration, transportation, and facilities – that is, anyone and anything connected to the internet. The EoT represents a powerful opportunity to transform existing public sector processes and create entirely new ones. Governments are moving on these initiatives because policymakers are legislating it, constituents are demanding it and because it presents an opportunity to do more with less.
Tags : 
    
BlackBerry APAC

CA Performance Handbook Supplement for DB2 for z/OS

Published By: CA Mainframe     Published Date: Sep 12, 2008
The CA Performance Management Handbook for DB2 for z/OS by renowned tuning experts Susan Lawson and Dan Luksetich of YL&A covers information to enhance your skills and raise awareness for databases performance management issues and tuning strategies. This supplement to the CA Performance Management Handbook provides specific information on which technologies apply to which issues and how CA Database Management addresses your most pressing database performance management challenges.
Tags : 
ca mainframe, mainframe, apm, application performance management, data management, system management software
    
CA Mainframe

Are You Prepared for a Software Audit?

Published By: CDW     Published Date: Nov 05, 2013
A software audit can be either an internal process, executed by an in-house team or consultants, or it can be done externally, by the vendor. If done internally, the results are used by the organization to check what software is installed across the network, how the software is being used and how this usage compares with the entitlements owned by the organization. If you haven’t already been audited—get ready; it’s not a case of if, but when.
Tags : 
cdw solutions, software audit, software publisher, end user license agreement, eula, asset management, conduct self-audits, desktop deployment, prepare for audits, internal audits, enterprise applications, enforced vendor audit, immediate resolution, enterprise software, system management software, software testing, software development certification
    
CDW

Enabling Bring Your Own Device

Published By: Cisco     Published Date: Jan 12, 2016
The idea of bring your own device (BYOD) for connectivity has been well recognized in most networking environments. Yet some corporations are still struggling to understand its potential impacts. For them, the concept of users attaching privately owned and managed smartphones, tablets or laptops to their secure networks is a relatively new and worrisome concept. However, it is a challenge that customers in higher education have been dealing with for years as students have increasingly turned to easy-to-connect and affordable laptops as study aids.
Tags : 
cisco, byod, connectivity, education, networking environment, networking, it management, knowledge management, data management
    
Cisco

Cisco Umbrella At A Glance

Published By: Cisco     Published Date: May 24, 2019
In the past, desktops, business apps, and critical infrastructure were all located behind the firewall. Today, more and more is happening off-network. More roaming users. More corporate-owned laptops accessing the internet from other networks. More cloud apps, letting users get work done off the corporate network. And more branch offices connecting directly to the internet.
Tags : 
    
Cisco

Cisco Umbrella at a glance

Published By: Cisco EMEA     Published Date: Nov 13, 2017
In the past, desktops, business apps, and critical infrastructure were all located behind the firewall. Today, more and more is happening off-network. More roaming users. More corporate owned laptops accessing the internet from other networks. More cloud apps, mean that users don’t need to be on the corporate network to get work done. And more branch offices connecting directly to the internet.
Tags : 
visibility, protection, deployment, management, platform, integration, cloud, infrastructure
    
Cisco EMEA

From BlackBerry to BYOD

Published By: Citrix     Published Date: Jul 25, 2014
Learn how Citrix XenMobile can empower your organization to move from traditional corporate issued BlackBerry devices to any user-owned mobile device without sacrificing security and control.
Tags : 
blackberry, byod, citrix xenmobile, control, security, mobile computing, mobile workers, smart phones, wireless communications, wireless phones, wireless security, collaboration, productivity, business technology
    
Citrix

Five Steps to a Successful BYOC Program

Published By: Citrix Systems     Published Date: Jan 29, 2013
Client virtualization technologies properly matched to work styles provide an effective means of accelerating the BYOC program by allowing you to provide a standardized, well-managed desktop environment on employee-owned computers and more.
Tags : 
ipad, android, tablet, mobility, byo, smartphone, it management, knowledge management, data management, business technology, data center
    
Citrix Systems

Best practices to make BYOD simple and secure

Published By: Citrix Systems     Published Date: Oct 07, 2014
Bring-your-own-device (BYOD) programs and policies empower people to choose the best device to get their work done, including personally-owned consumer smartphones, tablets and laptops. This white paper provides guidance for introducing BYOD to help people become more mobile and productive while IT adapts to consumerization in a simple, secure and controlled manner.
Tags : 
best practices, secure, simple, consumerization, byod, program, device, smartphones, tablets, laptops, mobile, productive, it management, wireless
    
Citrix Systems

Maximize Productivity with Secure Delivery of Applications to Mobile Devices

Published By: Citrix Systems     Published Date: Jul 25, 2016
The modern enterprise workforce poses new challenges for IT. Today’s employees work in more places, on more devices— personal or company-owned—and over more networks than ever, using a diverse array of datacenter applications, mobile apps, SaaS and cloud services. As they move among apps, networks and devices, IT needs to be able to control access and ensure data and application security without impeding productivity. That means enabling users to get to work quickly and easily in any scenario without having to deal with different ways of accessing each app. Traditional VPNs and point solutions add complexity for both users and IT, increase costs and fail to enable a holistic approach to business mobility. Over the years, many IT organizations have addressed these evolving requirements through point solutions and by case-by-case configuration of access methods. The resulting fragmented experience poses a key roadblock to productivity and increases user frustration. For IT, the lack of a
Tags : 
    
Citrix Systems

Best practices to make BYOD, CYOD and COPE simple and secure

Published By: Citrix Systems, Inc.     Published Date: Jan 27, 2016
Define the right bring-your-own-device (BYOD), choose-your-own-device (CYOD) and corporate-owned, personally-enabled (COPE) policies for your organization, backed by complete technologies for enterprise mobility management (EMM).
Tags : 
citrix, byodm cyod, cope, security, security management, security policies, best practices, data protection
    
Citrix Systems, Inc.

Building Rich Internet Applications with J2EE, Open Source, and AJAX

Published By: ClearNova     Published Date: Aug 21, 2009
In the 1990s, client/server was the predominant architecture used to build business applications. The applications had rich functionality, were responsive, and satisfied users' needs. Client/server worked in a time where the only networks were the ones owned and controlled by the enterprise and the only user base was internal.
Tags : 
internet apps, web applications, web application, web application development, j2ee, open source, ajax, web architecture, clearnova, clear nova
    
ClearNova
Start   Previous   1 2 3 4 5 6    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.