trust

Results 1 - 25 of 1001Sort Results By: Published Date | Title | Company Name

10 Unexpected Employee Performance Management Trends To Watch For In 2019

Published By: 15five     Published Date: Jul 17, 2019
The best practices for managing employees evolves at a break-neck pace. In 2019, the key distinction for performance management strategies is to focus on the whole employee. This ranges from physical, emotional, and mental well-being to facilitating their personal and professional development. To help you gain a deeper understanding of new trends, we assembled this list of top trends to help you create or refine your employee performance management strategy this year, including: • Developing trust with your employees • The value of people analytics • Individualized support • Learning & development • Diversity & inclusion
Tags : 
    
15five

eBook: Is 3D Scanning Right for Your Inspection Needs?

Published By: 3D Systems     Published Date: Feb 28, 2019
Combining the right people, hardware, and software to ensure quality everywhere Quality and reliability matter more than ever. In today’s hypercompetitive environment, companies can’t afford to lag behind when it comes to the quality of their products. And management can’t lag behind when it comes to adopting new tools and technologies to ensure quality everywhere. Over the past two decades, 3D scanning has become a crucial tool in many manufacturers’ measurement and inspection arsenals. It’s an effective metrology technique that is trusted for its accuracy, reliability, speed, and ease of use. Its noncontact nature and exceptional flexibility make it ideal for measuring a wide range of parts in a wide range of places. An effective approach to 3D scanning requires matching the right people with the right hardware and the right software to best meet your company’s measurement needs. This eBook will help you determine if 3D scanning is right for your inspection needs, and if it is, how b
Tags : 
    
3D Systems

Intelligent Client-Side Defense for Stolen Laptops

Published By: Absolute Software     Published Date: May 08, 2009
Keeping data secure in a mobile environment is not just a daunting challenge, but a critical requirement. Loss and theft of computers leaves sensitive data vulnerable, creating serious financial and legal risks.
Tags : 
absolute, intel, laptop, saas, lock down, rapid recovery, stolen, data defense, theft deterrence, pc protection, tpm, trusted platform module, anti theft, data breach, password protection, password, encryption, security, hacker detection, identity management
    
Absolute Software

The Human Factor in Laptop Encryption

Published By: Absolute Software     Published Date: May 08, 2009
In this whitepaper, the Ponemon Institute shares its findings on the use of encryption on laptops by corporate employees. It shows that many employees may not be taking the most basic precautions to secure their company laptop.
Tags : 
absolute, laptop, saas, lock down, rapid recovery, stolen, data defense, theft deterrence, pc protection, tpm, trusted platform module, anti theft, data breach, password protection, password, endpoint security, portable computer, end user, data regulation, encryption
    
Absolute Software

So, You're Responsible for Managing Laptops

Published By: Absolute Software     Published Date: Jan 29, 2008
Does your PC lifecycle management (PCLM) reflect the issues associated with mobile users? Many organizations face expensive inefficiencies by not managing mobile assets effectively. These inefficiencies include dispersed and manual data collection, and inventory tools that are dependent on a connection to the company network.
Tags : 
absolute, intel, laptop, saas, managing laptops, pclm, computrace, absolute software, it asset management, remote data delete, geolocation tracking, theft recovery, service guarantee, lock down, rapid recovery, stolen, data defense, theft deterrence, pc protection, tpm
    
Absolute Software

Technology Brief: Absolute Software Expands Lifecycle Management

Published By: Absolute Software     Published Date: Feb 04, 2010
Absolute Software has announced it has completed its acquisition of the LANrev systems management platform. Absolute plans to integrate LANrev's popular Mac and PC lifecycle configuration management technology with its flagship security and asset management suite, Computrace.
Tags : 
absolute, laptop, saas, lifecycle management, enterprise management, lock down, rapid recovery, stolen, data defense, theft deterrence, pc protection, tpm, trusted platform module, anti theft, data breach, password protection, password, endpoint security, portable computer, end user
    
Absolute Software

Demo: Absolute Manage

Published By: Absolute Software     Published Date: Sep 06, 2011
Let us walk you through Absolute Manage's capabilities in this 10-minute demo; see how Absolute Manage can help you centrally manage both Mac and PCs.
Tags : 
absolute, intel, laptop, saas, lock down, rapid recovery, stolen, data defense, theft deterrence, pc protection, tpm, trusted platform module, anti theft, data breach, password protection, password, encryption, security, application security, disaster recovery
    
Absolute Software

Grappling Growth: How IT Can Thrive in a Fast-Growing Organization

Published By: Absolute Software     Published Date: Sep 06, 2011
Watch this webcast as Support Manager for La Jolla Institute for Allergy & Immunology relates how he successfully frees up 30 IT support hours a week.
Tags : 
absolute, intel, laptop, saas, lock down, rapid recovery, stolen, data defense, theft deterrence, pc protection, tpm, trusted platform module, anti theft, data breach, password protection, password, encryption, security, access control, application security
    
Absolute Software

Webcast: iPads and iPhones Go to Work: The Essential Guide for IT Support

Published By: Absolute Software     Published Date: Sep 06, 2011
Vice President and Research Fellow for Aberdeen Group, shares trends, best practices and actionable insight on management of iOS mobile devices.
Tags : 
absolute, intel, laptop, saas, lock down, rapid recovery, stolen, data defense, theft deterrence, pc protection, tpm, trusted platform module, anti theft, data breach, password protection, password, encryption, security, access control, application security
    
Absolute Software

Webcast: The Growing Threat Landscape: Why your IT Security Strategy Needs to Evolve

Published By: Absolute Software     Published Date: Sep 06, 2011
Forrester Research and Absolute Software discuss the importance for IT to create a "layered approach" for endpoint security and management
Tags : 
absolute, intel, laptop, saas, lock down, rapid recovery, stolen, data defense, theft deterrence, pc protection, tpm, trusted platform module, anti theft, data breach, password protection, password, encryption, security, access control, application security
    
Absolute Software

Demo: Absolute Manage Mobile Device Management

Published By: Absolute Software     Published Date: Sep 06, 2011
See how Absolute Manage Mobile Device Management allows organizations to remotely manage their Apple® iOS devices (iPhone®, iPod® Touch, iPadT).
Tags : 
absolute, intel, laptop, saas, lock down, rapid recovery, stolen, data defense, theft deterrence, pc protection, tpm, trusted platform module, anti theft, data breach, password protection, password, encryption, security, access control, application security
    
Absolute Software

Empowerment and Trust: The Keys to Employee Engagement

Published By: Achievers     Published Date: Aug 16, 2019
Understanding HR and Engagement Leaders’ Challenges and Opportunities How can organizations understand the gaps in employee expectations, anticipate the most pressing issues, and adopt the processes and technology that make it scalable? Achievers surveyed HR and engagement leaders’ on the front lines of engagement who understand the challenges and opportunities facing the workplace today. In this report, discover how you can address: • The most pressing engagement challenges for organizations today • The role of employee empowerment and trust in engagement success. • Technology and culture changes that can ensure success
Tags : 
    
Achievers

On Demand Webinar: The Personalization Privacy Paradox — How to Meet Customers in the Middle

Published By: Acxiom Corporation     Published Date: Jun 20, 2014
Consumers demand – no, expect – marketers to deliver highly relevant communications. Yet, daily headlines about security and privacy keep them on guard about use of their personal information. How do you reconcile the personalization privacy paradox? Guest speaker, Forrester Research, Inc.’s Fatemeh Khatibloo and Bryan Throckmorton of Acxiom will offer fresh findings on customer expectations regarding privacy and examples of how companies are building transparency and trust – and differentiating themselves – with preference centers that put more control in the hands of customers.
Tags : 
acxiom, forrester research, privacy, personalization, personal information, marketing, personalization privacy, identity management, business technology
    
Acxiom Corporation

The CFO as Analyst and Advisor

Published By: Adaptive Planning     Published Date: Oct 19, 2011
Surveys show that most CFOs want to upgrade their role from accounting specialists to strategic or business partners. But few CFOs have actually made the change, primarily because they have neither the time nor the necessary capabilities within the current finance team. But for those who do make the change, the rewards are tangible. This chapter lays out a number of important steps that the CFO and the finance team need to take to position themselves as trusted and valued business partners within the organization.
Tags : 
harvard, adaptive, marketry, cfo, analyst, financial managers, financial planning, budget, business, finance
    
Adaptive Planning

E-signatures and procurement: How IT can help the business streamline vendor and supplier

Published By: Adobe     Published Date: Aug 04, 2015
This white paper shows how IT departments can help the business implement a solution that integrates with existing business applications and transforms procurement into a fast, agile process—all in a trusted environment.
Tags : 
e-signatures, digital signatures, electronic signatures, e-signatures solution, e-signatures and procurement, authentication, identity management, content management system, document management, secure content management
    
Adobe

Circles of trust: Use mobile to engage better

Published By: Adobe     Published Date: Feb 08, 2016
Read Circles of Trust: Use Mobile to Engage Better, to understand how you can leverage trust to deliver a better customer experience
Tags : 
adobe, mobile, engagement, customer experience, trust, enterprise applications, business technology
    
Adobe

Circles of Trust: Use Mobile to Engage Better

Published By: Adobe     Published Date: Sep 20, 2016
With a world of information and accessibility in their pockets, customers can engage with a brand whenever and wherever they want. This flexibility has made mobile technology an essential part of the way both customers and businesses interact. And to deliver experiences that feel personal and intimate, your plan needs to account for a critical building block to any relationship: trust. Read Circles of Trust: Use Mobile to Engage Better, to understand how you can leverage trust to deliver a better customer experience. Read the white paper to learn: • The four major circles of trust as a fresh approach to successful customer experience • The seven steps to effective optimization • The 3 C’s of mobile marketing • The steps for developing a mobile optimization plan across your organization
Tags : 
adobe, mobile, data driven marketing, marketing, marketer
    
Adobe

Circles of Trust: Use Mobile to Engage Better

Published By: Adobe     Published Date: Sep 20, 2016
Read Circles of Trust: Use Mobile to Engage Better, to understand how you can leverage trust to deliver a better customer experience.
Tags : 
    
Adobe

Money Matters

Published By: Adobe     Published Date: Mar 03, 2017
To make a great first impression, take a good look at your digital enrollment process. Because it’s more than forms. It’s the start of your customer journey. A streamlined onboarding process saves customers time and hassle. It also increases conversions, improves experiences, and reduces costs. In this report, we discuss best practices for updating your digital enrollment, including: • How leaders in finance do it right • Increasing engagement with mobile-optimized forms and signatures • Ensuring enrollment is compliant and builds trust
Tags : 
digital enrollment, onboarding, customer service, customer experience, cost reduction, mobile-optimization
    
Adobe

Circles of Trust: Use Mobile to Engage Better

Published By: Adobe     Published Date: Mar 03, 2017
With a world of information and accessibility in their pockets, customers can engage with a brand whenever and wherever they want. This flexibility has made mobile technology an essential part of the way both customers and businesses interact. And to deliver experiences that feel personal and intimate, your plan needs to account for a critical building block to any relationship: trust. Read Circles of Trust: Use Mobile to Engage Better, to understand how you can leverage trust to deliver a better customer experience. Read the white paper to learn: • The four major circles of trust as a fresh approach to successful customer experience • The seven steps to effective optimization • The 3 C’s of mobile marketing • The steps for developing a mobile optimization plan across your organization
Tags : 
mobile engagement, branding, mobile marketing, mobile optimization
    
Adobe

Your Most Crucial Conversation

Published By: Adobe     Published Date: Jun 22, 2017
Download our new guide, Your Most Crucial Conversation, to learn how you can use personalized, real-time offers to give your customers what they need, right when they need it—so you can earn their trust and keep them coming back for more. Read the guide to discover how to: • Break down internal silos and speak consistently to customers • Deliver contextually relevant experiences for upsell, cross-sell, loyalty and retention • Make the transition to real-time personalization
Tags : 
personalization, retention, conversation, cross-sell, customer loyalty
    
Adobe

Your most crucial conversation

Published By: Adobe     Published Date: Sep 28, 2016
Download our new guide, Your Most Crucial Conversation, to learn how you can use personalized, real-time offers to give your customers what they need, right when they need it—so you can earn their trust and keep them coming back for more. Read the guide to discover how to: - Break down internal silos and speak consistently to customers - Deliver contextually relevant experiences for upsell, cross-sell, loyalty and retention - Make the transition to real-time personalization?
Tags : 
adobe, marketing, marketers, customers, customer engagement, customer loyalty, customer retention
    
Adobe

Running on Experience: 2017 Digital Marketing Study

Published By: Adobe     Published Date: Nov 09, 2017
To make a great first impression, take a good look at your digital enrollment process. Because it’s more than forms. It’s the start of your customer journey. A streamlined onboarding process saves customers time and hassle. It also increases conversions, improves experiences, and reduces costs. In this report, we discuss best practices for updating your digital enrollment, including: How leaders in finance do it right Increasing engagement with mobile-optimized forms and signatures Ensuring enrollment is compliant and builds trust
Tags : 
    
Adobe

Money Matters: The Digital Enrollment Imperative

Published By: Adobe     Published Date: Nov 09, 2017
To make a great first impression, take a good look at your digital enrollment process. Because it’s more than forms. It’s the start of your customer journey. A streamlined onboarding process saves customers time and hassle. It also increases conversions, improves experiences, and reduces costs. In this report, we discuss best practices for updating your digital enrollment, including: How leaders in finance do it right Increasing engagement with mobile-optimized forms and signatures Ensuring enrollment is compliant and builds trust
Tags : 
    
Adobe

From 0 to Know: Real-Time Analytics With SAP HANA

Published By: Advizex     Published Date: Sep 25, 2013
The challenge of Big Data is more than a question of size; it’s about time to insight and action. With the exponential growth of unstructured data such as social media, video and the raw data generated by smartphones and other “intelligent” machines, businesses are buried under an avalanche of data that renders even best-effort analytics slow and sometimes unreliable. As many businesses are learning in this age of Big Data, it’s not just what you know, but when you know it and how much you trust it. Download this white paper and learn that with SAP HANA, companies can react intelligently at the speed of thought to capture new opportunities.
Tags : 
sap hana, sap, real time analytics, raw data, generation, analytics, big data, business intelligence, trusting big data, insight, action, knowledge management, enterprise applications, data management
    
Advizex
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.