Cookie policy: This site uses cookies (small files stored on your computer) to simplify and improve your experience of this website. Cookies are small text files stored on the device you are using to access this website. For more information on how we use and manage cookies please take a look at our privacy and cookie policies. Some parts of the site may not work properly if you choose not to accept cookies.

sections
 

business tools

Results 126 - 150 of 476Sort Results By: Published Date | Title | Company Name
Published By: ServiceNow     Published Date: Mar 24, 2015
Your enterprise needs the ability to identify all duplicative or outmoded IT and business applications, services and other resources, and then to consolidate those worth keeping, migrate those worth updating, and retiring the rest. And that consolidation delivers multiple business benefits. Key among these: a single interface to multiple tools and resources, and more agile global operations. With the right practices, policies and technology platform, your enterprise can accomplish these goals in ways that accelerate growth, cut costs and complexities, and enhance competitiveness.
Tags : 
consolidation, business transformation, single interface, business applications, business benefits, it management, enterprise applications
    
ServiceNow
Published By: MobileIron     Published Date: May 07, 2018
Ready or not, the global mobility trend is forcing enterprises to enable a modern, mobile workforce with business productivity tools on any device, regardless of the underlying operating system. As enterprise users increasingly demand the ability to use their own mobile devices and desktops for modern work, IT is quickly impacted by end-user technology decisions. Enterprises can no longer ignore this reality, especially given the explosive global demand for mobile devices. Considering that smartphone adoption is expected to grow from 1.47 billion devices in 2016 to more than 1.7 billion in 2021, it’s clear that organizations need a comprehensive way to quickly onboard and secure a vast range of employee devices coming into the enterprise.
Tags : 
endpoint, management, business, workforce, desktop, device, mobile
    
MobileIron
Published By: K2     Published Date: Aug 24, 2015
This complementary template focuses on the eight key areas for business process automation success to help you evaluate the quality of the platforms you are considering – and to ensure that the system you choose is agile and flexible enough to meet your business needs. WORKFLOW TOOLS AND FEATURES FORMS INTEGRATION AND DATA SECURITY MOBILE USER AND RUN-TIME EXPERIENCE REPORTING, ANALYTICS AND MONITORING MAINTENANCE/SUPPORT/HELP DOCUMENTATION
Tags : 
    
K2
Published By: Waterline Data & Research Partners     Published Date: Nov 07, 2016
Today, businesses pour Big Data into data lakes to help them answer the big questions: Which product to take to market? How to reduce fraud? How to retain more customers? People need to get these answers faster than ever before to reduce “time to answer” from months to minutes. The data is coming in fast and the answers must come just as fast. The answer is self-service data preparation and analytics tools, but with that comes an expectation that the right data is going to be there. Only by using a data catalog can you find the right data quickly to get the expected insight and business value. Download this white paper to learn more!
Tags : 
    
Waterline Data & Research Partners
Published By: VMware AirWatch     Published Date: Feb 27, 2018
TAKE YOUR MOBILITY STRATEGY TO THE NEXT LEVEL WITH UEM MDM and EMM were only the beginning of the modern workspace evolution. Now, more people than ever before are working remotely—introducing a proliferation of assorted devices and platforms that need to be managed and secured in the enterprise, and consequently creating unprecedented challenges for IT and business leaders. The solution? Unified endpoint management (UEM). In this eBook, you'll learn the key business risks you could face without a comprehensive UEM solution: • Traditional management tools unable to support remote workforces • Siloed management tools leading to higher IT costs • Lack of visibility across endpoints increasing security risks • Disengaged employees driven by a poor user experience
Tags : 
endpoint, management, enterprise, mobility, business
    
VMware AirWatch
Published By: Mitel     Published Date: Apr 07, 2017
A critical component to the bottom line of any business is its employees. With the right tools, any workforce can achieve more: the whole is greater than the sum of employees.
Tags : 
    
Mitel
Published By: MuleSoft     Published Date: Apr 13, 2016
Today everything truly is connected to everything, and APIs are the connection mechanisms. Many companies are finding that their use of APIs has accelerated over the past 12 months, and that it will continue to accelerate during the next 12 months. APIs aren't really a new technology; they've actually been around for a long time. What is new is that they are in far broader usage today than they have been in the past. As of late 2015, the ProgrammableWeb API directory listed more than 14,000 APIs. When thinking about designing and managing APIs, a number of important questions arise. Why are APIs so well used and what effect would they have on your business? What is the impact of the expanding API economy on both providers and consumers? What are API tools and how can an investment in tools be an extremely cost efficient foundation for production grade API use cases?
Tags : 
best practices, business optimization, business management, application management, enterprise application, business intelligence, api management
    
MuleSoft
Published By: IBM Watson Health     Published Date: Jun 14, 2017
Learn how IBM Watson Health clinical application advisors helped Floyd Health Care System take full advantage of the platform’s many benefits. Business Challenge As part of its journey toward population health management, Floyd wanted to optimize the way it used the IBM® Phytel® solution from IBM Watson Health™ and take advantage of its analytical tools. Transformation With help from an IBM Watson Health clinical application advisor, Floyd expanded its IBM solutions and used their unique capabilities to progress toward a more robust population healthcare model by adding care coordination activities and improving key process measures.
Tags : 
floyd health care system, ibm, ibm watson health, analytics, healthcare
    
IBM Watson Health
Published By: SAP     Published Date: Jul 18, 2016
Traditional business intelligence tools provide limited explanations of why something happened, because most BI solutions are geared more for reporting and dashboarding workflows.
Tags : 
    
SAP
Published By: IBM     Published Date: Oct 21, 2016
Between the Internet of Things, customer experience and loyalty programs, social network monitoring, connected enterprise systems and other information sources, today's organizations have access to more data than they ever had before-and frankly, more than they may know what to do with. The challenge is to not just understand that data, but actualize it and use it to recognize real business value. This ebook will walk you through a sample scenario with Albert, a data scientist who wants to put text analytics to work by using the Word2vec algorithm and other data science tools.
Tags : 
ibm, analytics, aps, aps data, open data science, data science, word2vec, enterprise applications, data center
    
IBM
Published By: Veritas     Published Date: May 12, 2016
Read this solution brief to explore: 1. Five key questions to ensure your data protection infrastructure is able to deliver data anytime and anywhere 2. Four guiding principles required for your data protection strategy to enable your digital business 3. Key tools to enable your digital enterprise
Tags : 
    
Veritas
Published By: Determine (Selectica)     Published Date: Jun 29, 2017
Cloud-based solutions are revolutionizing the way that enterprises conduct business. These web-based versions of common business tools, like analytics or document management tools, retain most or all of the functionality of their desktop versions and provide significant access, customization, and utility to end users. More organizations are ditching on-premises solutions and adopting cloud-based tools, also known as Software-as-a-Service (SaaS), "hosted," or "on-demand" solutions. The are becoming invaluable assets in today's agile and mobile workforce.
Tags : 
    
Determine (Selectica)
Published By: Juniper Networks     Published Date: Nov 01, 2016
In this white paper we offer a six-step guide to getting started with network automation. We outline the processes involved in planning for automation and define areas of the business that can benefit, while also discussing how to overcome cultural challenges and ensure that you choose the right tools and partners.
Tags : 
    
Juniper Networks
Published By: IBM     Published Date: Oct 17, 2017
The data quality tools market continues to show strong revenue growth, driven by cost, process optimization and digital business initiatives. Applying data quality tools to existing and emerging business scenarios will enable data and analytics leaders to deliver greater business value.
Tags : 
    
IBM
Published By: Alteryx, Inc.     Published Date: Apr 21, 2017
Data Analytics has become critical for many business decision makers. However, many of these managers and data analysts still rely on spreadsheets and other legacy-era tools that fall far short of current needs. As a result, they also rely heavily on a virtual army of data specialists and scientists, working under the auspices of a centralized analytics group, to prepare, blend, analyze, and even report on the critical data they need for decision making. Download this new paper to get the details behind self-service data analytics, and how it lets business analysts: Take charge of the entire analytical process, instead of relying on other departments Overcome limitations of legacy tools to save time and prevent errors Make more comprehensive and insightful business decisions at speed
Tags : 
    
Alteryx, Inc.
Published By: Fiserv     Published Date: Mar 02, 2018
According to the report, Benchmarking the Accounting Function 2015, only 56% of companies currently use automation to reconcile accounts. While many finance leaders want to change the process of reconciliation, the task can seem overwhelming. However, developing a plan does not have to be complicated or time-consuming – and the benefits far outweigh the risks. A smooth, stress-free financial close adds qualitative value to the company by freeing employees to focus on strategic initiatives and ways to grow business. A CFO’s Guide to Transforming the Financial Close shares how to build a center of excellence to streamline reconciliation so you can align objectives to overall business goals. Leading-edge automation tools can stop the madness of shuffling papers, sorting emails and searching spreadsheets, turning the reconciliation process from a cost center to a value-add for the company.
Tags : 
automating financial close, streamlining reconciliation, data integrity, single version of truth, reconciliation process
    
Fiserv
Published By: IBM     Published Date: Jul 05, 2018
Data is the lifeblood of business. And in the era of digital business, the organizations that utilize data most effectively are also the most successful. Whether structured, unstructured or semi-structured, rapidly increasing data quantities must be brought into organizations, stored and put to work to enable business strategies. Data integration tools play a critical role in extracting data from a variety of sources and making it available for enterprise applications, business intelligence (BI), machine learning (ML) and other purposes. Many organization seek to enhance the value of data for line-of-business managers by enabling self-service access. This is increasingly important as large volumes of unstructured data from Internet-of-Things (IOT) devices are presenting organizations with opportunities for game-changing insights from big data analytics. A new survey of 369 IT professionals, from managers to directors and VPs of IT, by BizTechInsights on behalf of IBM reveals the challe
Tags : 
    
IBM
Published By: OracleSMB     Published Date: Jan 04, 2018
Finance has grown beyond recording and reporting. Leaders in fast-growing companies need not only the raw financial data, but the sophisticated analysis to make sense of it all. In today’s digital world, Finance must move out of the back-office and help drive the direction of the business, as well as improve the bottom line through more efficient processes and increased responsiveness. With the right tools, your finance team can simplify processes and fulfill its goal of adding value.
Tags : 
    
OracleSMB
Published By: Pindrop Security     Published Date: Mar 21, 2018
As fraudsters grow in sophistication and experience, they often aren’t acting alone. Syndicated crime rings are big business around the world. In the fraud economy, different fraudsters specialize in different aspects of the attack, from gathering data and creating profiles of targeted victims, to socially engineering call center agents, to creating tools like robotic dialers. These fraudsters might work alone, selling their skills on the black market. In other cases, fraudsters are running entire call centers overseas dedicated to executing attacks.
Tags : 
    
Pindrop Security
Published By: SpyCloud     Published Date: Mar 30, 2018
Because of widespread password reuse, Account Takeover (ATO) attacks have become an extremely lucrative business for cybercriminals. Organized crime rings are performing ATO attacks at a massive scale by leveraging botnet-infected armies to attempt credential-stuffing attacks against various web and mobile applications. Cyber criminals exploit compromised accounts for financial gain by pilfering financial or personally identifiable information (PII) directly or by selling access to these accounts on underground markets. Download our report to understand: The Underground economy driving these attacks The tools criminals are using to automate ATO Remediation Strategies to prevent ATO in your organization
Tags : 
    
SpyCloud
Published By: Monetate     Published Date: Jun 15, 2018
Personalisation for retail customers has advanced well beyond segmentation to include real one-to-one connections made in real-time. not only are consumers expecting hyper-personalized experiences across all touches, but companies who are able to implement them are seeing unprecedented growth and a new level of customer loyalty. This essential guide walks you through personalisation from the nuts and bolts of what it can do, through 5 levels of implementation that businesses can use to benchmark their path to increased revenue. In the guide you’ll learn: • The latest advancements in personalisation technology and what companies can expect to gain with implementation. • Four myths about personalisation that may be holding your company back. • Tips for getting started and 5 benchmarking levels to help you create a personalisation roadmap for your company. • Eight questions to ask when shopping for a personalisation partner that will help you ensure you are getting the right tools a
Tags : 
    
Monetate
Published By: Centrica Business Solutions     Published Date: Aug 14, 2018
The energy landscape has become increasingly complex. Globally, we’re relying less on centralized, steady power sources – such as gas-fired and coal-fired power stations – and more on mixed, locally-distributed renewable energy supplies including solar, wind, tidal and battery. While this is positive for the environment and carbon emissions, it makes balancing power grids a much more complex task. Power quality and reliability becomes more variable in output, while demand for power continues to increase steadily. But when it comes to energy resilience, many organizations simply don’t know where to start. What solutions are available? Which are the best ones for their specific situation and physical premises? What will be their return on investment? Is it simply the cost of doing business, or is there actually a business case? The guide will give you the tools and data to build your understanding and quantify the benefit for your organization.
Tags : 
energy, resilience, building, business, energy
    
Centrica Business Solutions
Published By: Iterable     Published Date: Sep 07, 2018
Whether they want tickets for the next Lady Gaga concert, the World Series, the Indianapolis 500, or Hamilton, people are quickly discovering that SeatGeekis the place to find the best selection and great bargains. This relative newcomer to the online ticket business has quickly grown to offer the largest inventory of live event tickets on the web, in addition offering differentiating services like best-bargain ratings and notifications when a fan’s favorite team or entertainer will be performing nearby. Email and push have been the primary channels for interacting with customers. However, according to Ben Clark, Vice President of Customer Retention, the marketing team previously struggled to deliver consistent, relevant messaging across channels because their email and push tools ran on separate platforms. The old tools were also cumbersome to use and offered limited functionality. Worse yet, they didn’t support the team’s AI driven, omni-channel marketing strategy, which includes rea
Tags : 
    
Iterable
Published By: K2     Published Date: Apr 01, 2016
This white paper reveals how K2 blackpearl can help make the challenge of rebuilding your business applications more manageable. Its visual, easy-to-use tools help ensure that you are not dependent on consultants or even your IT department to build apps.
Tags : 
ibm lotus, ibm lotus domino, microsoft sharepoint, it management
    
K2
Published By: Proofpoint     Published Date: May 30, 2018
Email fraud is rife – business email compromise (BEC) is costing companies billions, and consumer phishing is at an all-time high. The majority of these email attacks are also preventable. Utilising the power of email authentication, Email Fraud Defence protects your organisation from all phishing attacks that spoof trusted domains. Visibility of who is sending email across your email ecosystem allows you to authorise all legitimate senders and block fraudulent emails before they reach your employees, customers and business partners. Protect your email ecosystem from today’s advanced email threats including business email compromise (BEC) and consumer phishing. Proofpoint Email Fraud Defence gives you the visibility, toolset and services needed to authorise legitimate email senders and block fraudulent messages before they reach the inbox.
Tags : 
    
Proofpoint
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.