Cookie policy: This site uses cookies (small files stored on your computer) to simplify and improve your experience of this website. Cookies are small text files stored on the device you are using to access this website. For more information on how we use and manage cookies please take a look at our privacy and cookie policies. Some parts of the site may not work properly if you choose not to accept cookies.

sections
 

gen

Results 201 - 225 of 7047Sort Results By: Published Date | Title | Company Name
Published By: Intapp     Published Date: May 10, 2019
How many hours did your professionals spend on this client, on that project, on those tasks? Those are the cornerstone metrics of Old Time. They answered the question, “how much should we bill?” This is still a valuable query, but in this new world in which data is pored over and mined for every bit of its value, it is only one of many questions that firms must ask of its time data. Are our professionals working efficiently? Are we pricing future contracts competitively? Are our projects on budget? Did we miss billable hours? Are our professionals spending too many hours tracking their time? Intapp Time provides the superior business intelligence with which to answer these questions and change your firm’s fundamental relationship with Time.
Tags : 
    
Intapp
Published By: Intapp     Published Date: May 10, 2019
The Cornerstone of Financial Control Time equals money. Time plus data equals control. All professionals, whether in management, consulting, engineering, or accounting, must be confident that their value is reflected in their bottom line. One of the primary factors driving that compensation is the amount of time spent on a particular subject or client. But too often front line earners at those firms don’t provide the clean, data-rich timesheets needed to accurately gauge the effort required by each project.
Tags : 
business, business intelligence, time, tax, time for tax, intapp, applications, time data, automation, reporting, timekeeping, audit, accounting, consulting, professional services, active time capture, passive time capture, time tracking
    
Intapp
Published By: MalwareBytes EMEA     Published Date: May 10, 2019
Enterprises, beware. Threat actors are continuing to eye businesses for high returns on investment in Q1 2019, breaching infrastructure, exfiltrating or holding data hostage, and abusing weak credentials for continued, targeted monitoring. From a steadfast increase of pervasive Trojans, such as Emotet, to a resurgence of ransomware lodged against corporate targets, cybercriminals are going after organizations with a vengeance. Yet every cloud has a silver lining, and for all the additional effort thrown at businesses, consumer threats are now on the decline. Ransomware against consumers has slowed down to a trickle and cryptomining, at a fever pitch against consumers this time last year, has all but died. Interestingly, this has resulted in an overall decline in the volume of malware detections from Q4 2018 to Q1 2019. While threat actors made themselves busy with challenging new victims, they ensnared targets in the old ways, using tried-and-true malspam and social engineering tactic
Tags : 
    
MalwareBytes EMEA
Published By: MalwareBytes EMEA     Published Date: May 10, 2019
Ransomware has taken the world by storm. CryptoWall extorted an estimated $18 million, and WannaCry locked up more than 230,000 computers across the globe in 2017. Companies of all sizes are sitting up and taking notice. Even brands with a strong security investment have fallen victim. We’ve seen ransomware cripple businesses: nearly 19% of businesses stop operations immediately after discovering a ransomware attack.1 Hospital emergency rooms forced to turn people away; global shipping logistics experience massive disruption; and even a summer blockbuster movie held up for ransom. The FBI estimates ransomware is now a billion-dollar business. Ransomware has been around for a while, and it has spiked in recent years. It secured 5th place as the most common variety of malware in 2017, up from 22nd place in 2014.2 Originally ransomware targeted individuals and was considered a consumer nuisance. It has now become a business menace.
Tags : 
    
MalwareBytes EMEA
Published By: MalwareBytes EMEA     Published Date: May 10, 2019
INDUSTRY Technology BUSINESS CHALLENGE Reduce the impact of malware on enterprise resources IT ENVIRONMENT Symantec antivirus, layered enterprise security SOLUTION Malwarebytes Incident Response RESULTS Saved hours per week by eliminating manual threat remediation Detected and remediated threats that otherwise would not have been found Eliminated downtime for end users with thorough scans and fast remediation Easily generated reports that keep upper management informed
Tags : 
    
MalwareBytes EMEA
Published By: Dell EMC     Published Date: May 09, 2019
Traditional methods for provisioning and deploying end-user devices can present real headaches to IT staff and business in general. In comparison, Dell Provisioning for Vmware Workspace ONE® saves time for small and large-scale deployments. This service enables a company to pre-configure devices before they leave the factory, with no ongoing IT involvement. Download this white paper from Dell and Intel® to learn how to; eliminate on-site adminstrative deployment time, deploy large quanitites of fully provisioned devices with a single one-time configuration, and, expedite getting fully configured systems to end-users.
Tags : 
    
Dell EMC
Published By: Dell EMC     Published Date: May 09, 2019
Choosing the right priorities optimizes transformation journeys for the year ahead. Embrace IT and business innovation despite finite resources, enabling new opportunities for revenue generation while continuing to drive new efficiencies. Access this brief to learn more.
Tags : 
    
Dell EMC
Published By: Dell EMC     Published Date: May 08, 2019
ESG recently conducted a quantitative research study to assess companies’ IT Transformation maturity. ESG found that operating a modern server environment, defined as an environment in which operations tasks are more automated than manual, led to a perception of cost parity with the public cloud. Nearly half felt their cost of compute was highly competitive with CSPs and another 48% felt it was generally comparable. This compares favorably to the 19% and 47% respectively among organizations running a legacy server environment. Download this solution brief from Dell EMC and Intel® to learn more.
Tags : 
    
Dell EMC
Published By: Dell EMC EMEA     Published Date: May 08, 2019
Im Dezember 2017 beauftragte Dell Forrester Consulting mit der Durchführung einer Fortsetzungsstudie, in der ermittelt werdensollte, wie die IT-Abteilungen von Unternehmen strukturiert sind. In der Studie wurden zwei Arten von IT-Konzepten untersucht: Digital Controller und Digital Transformer. Außerdem beleuchtete die Studie Trends und Herausforderungen, die die Vertreter beider Konzepte bei der PC-Bereitstellung sehen. Mit Digital Controllern assoziiert man häufig einen Top-down-Ansatz und eine lineare Struktur. Sie messen Sicherheit und Genauigkeit hohe Bedeutung bei. Digital Transformer hingegen legen den Schwerpunkt auf Innovationen sowie Mitarbeiter-und Kundenorientierung; für sie stehen Geschwindigkeit und Flexibilität an erster Stelle. Wenn Unternehmen mehr Verständnis für die Vertreter beider Ansätze entwickeln, können sie mit Problemen im Zusammenhang mit dem PC-Lifecycle-Management besser umgehen. Durch Investitionen in bestehende PC-Management-Tools und die Zusammenarbeit m
Tags : 
    
Dell EMC EMEA
Published By: Sierra Wireless     Published Date: May 08, 2019
With Octave TM, Sierra Wireless went a step further and takes care of the secure device to cloud infrastructure OEM need, so that washing machine manufacturers can focus on what really matters for their business: acting on their equipment data to create new services. Octave is an all-in-one D2C platform optimized for cellular IoT, including intelligent edge, wireless network connectivity, and unique data orchestration and device management capabilities. To find out more download today!
Tags : 
    
Sierra Wireless
Published By: Oracle     Published Date: May 08, 2019
Oracle DBAs Share Insights about the Future of Cloud, Security, Artificial Intelligence, and Autonomous Computing. This year, in addition to canvasing analysts, pundits, and executives for their strategic insights, Oracle is interested in the tactical views, predictions, and opinions of master DBAs, database product experts, and Oracle ACE Directors. We gathered insights about database management, security, artificial intelligence, autonomous computing, and many other topics and cover how future trends will impact DBA careers during 2019, and beyond. The Intelligent Enterprise Era. Download predictions.
Tags : 
    
Oracle
Published By: Oracle     Published Date: May 08, 2019
What if your database could install, manage, secure, and upgrade itself—with little or no manual administration required? Now it’s possible, thanks to machine learning, artificial intelligence and the power of the cloud. Discover how the Oracle Autonomous Database is: • Self-driving: Tell it the service level you want to achieve, and it does the rest. • Self-securing: It installs patches automatically and uses AI to counter threats. • Self-repairing: It patches, scales, and tunes itself while your operations are running, to deliver 99.995% uptime. Discover the power of autonomous data management. Download now.
Tags : 
    
Oracle
Published By: Veeam '18     Published Date: May 07, 2019
Le rôle des sauvegardes est en train d’évoluer. Face à des attaques qui gagnent en intelligence et en précision, les responsables IT doivent également évoluer avec leur temps. En effet, les cybercriminels étant plus habiles à pénétrer les réseaux, il devient nécessaire de prévoir des sauvegardes plus sophistiquées couvrant une multitude de situations et de types de menace. Nous sommes en train de changer notre manière de travailler, consommer des données, concevoir nos systèmes informatiques professionnels et dépendre de systèmes en ligne plus complexes et cela doit s’accompagner d’une nouvelle façon d’effectuer nos sauvegardes.
Tags : 
    
Veeam '18
Published By: Veeam '18     Published Date: May 07, 2019
Près de 50 000 PC, c’est le parc que représentent les 114 lycées de la Région des Pays de la Loire. Depuis ces ordinateurs, enseignants et lycéens produisent et partagent un grand volume de données dans les formats les plus variés, des fichiers bureautiques aux fichiers issus de logiciels spécialisés, à l’image des enseignements délivrés. Un patrimoine informationnel géré à travers une infrastructure dont la loi dite Peillon de 2013 a confié, pour les lycées, la responsabilité aux régions. Un choc pour de nombreuses régions qui ont vu du jour au lendemain la taille de leur parc informatique parfois multipliée par… 40!
Tags : 
    
Veeam '18
Published By: Veeam '18     Published Date: May 07, 2019
Ransomware war 2016 eine der größten Sicherheitsbedrohungen für Unternehmen. Da Daten immer wertvoller werden – und neue Technologien verfügbar sind – zielen die sprichwörtlichen Bösewichte auf schwache Systeme und kritische Datenrepositories ab.
Tags : 
    
Veeam '18
Published By: Veeam '18     Published Date: May 07, 2019
Die mechanische Art der Produktion ist eine Illusion. Die Produkte von heute sind sehr stark auf die Datenverfügbarkeit angewiesen, wobei die Produktionslinie im Zentrum eines expandierenden digitalen Netzwerkes befindet, das Lieferanten, Vertriebshändler, Partner und Kunden miteinander verbindet. Kundenanpassung, Just-in-Time-Bestandsführung, Rechte des geistigen Eigentums und Wettbewerb sind in einem modernen Produktionsunternehmen miteinander verflochten.
Tags : 
    
Veeam '18
Published By: Veeam '18     Published Date: May 07, 2019
In diesem fünfminütigen, leicht lesbaren Dokument wird erläutert, warum Unternehmen Office 365-Daten schützen müssen. Dieser Bericht zeigt Ihnen: • Das große Missverständnis zwischen der Verantwortung von Microsoft und den IT-Organisationen • 6 Gründe, warum die Sicherung von Office 365 von entscheidender Bedeutung ist • Wer kontrolliert Office 365-Daten?
Tags : 
    
Veeam '18
Published By: Veeam '18     Published Date: May 07, 2019
Wie wir inzwischen alle wissen, müssen unsere Abwehrmechanismen nur bei einer einzigen Phishing-E-Mail versagen, und schon ist unser Tag ruiniert. Nur ein Klick und der Angreifer ist in Ihrem Netzwerk, kann auf Endgeräte zugreifen und diese mit Malware infizieren, kann kritische Server unter seine Kontrolle bringen, Daten stehlen, unsere Bankkonten leerräumen oder dem Unternehmen anderweitig schaden.
Tags : 
    
Veeam '18
Published By: Bluecore     Published Date: May 07, 2019
If the very purpose of technology is to make our lives easier and allow us to work smarter, why do most retail marketers use email technologies that do the exact opposite? It’s time to break out of the Email Death Spiral and advance your retail marketing program with the next generation of email marketing technology. This guide explores how to identify when it's time for a change, exactly what your team needs to know to prepare for a successful change and how to best evaluate modern email marketing technology for retail.
Tags : 
    
Bluecore
Published By: PGi     Published Date: May 03, 2019
AI, mobile, live streaming and other visionary technologies help elevate communication, making digital interactions more intelligent, seamless ... and even more human.
Tags : 
    
PGi
Published By: PGi     Published Date: May 03, 2019
It’s true that webinars and webcasts are a great way to generate leads, launch products and interact with prospects. Yet, when it comes to attendance, less than half of those who register join the online events. Meaning, regardless of how great the content is in your webinar or webcast, it doesn’t have much meaning if no one’s attending! There are plenty of effective ways to promote your online event and up your attendance rate. Some traditional ideas include creating landing pages, promoting the event on your company’s home page and sharing across social media channels. Here are a few additional out-of-the-box ideas from Team GlobalMeet that are simple and surprisingly effective ways to make sure you not only drive awareness for your event but can also get people excited to attend!
Tags : 
    
PGi
Published By: Motorola Solutions     Published Date: May 02, 2019
FORECASTER GUIDE | MANUFACTURING SOLUTIONS 2 What does it look like when all workers at your manufacturing facility can communicate and coordinate seamlessly from any location, device or network? The time is NOW to imagine a world where devices, networks, and locations don’t matter. A world where workers from production lines, to plant managers, engineers, security and beyond can communicate effortlessly and instantly, both on and offsite. A Unified Team Communications solution from Motorola Solutions is what’s NEXT for your facility to make this all possible. This guide was created to help you experience how each and every staff member can work smarter, safer, and minimize unwanted downtime when equipped with intelligence driven communications solutions. See how Unified Team Communications powers the collaboration between all these workers to create the next-generation in smart connected manufacturing:
Tags : 
    
Motorola Solutions
Published By: Vonage Business     Published Date: May 01, 2019
Who among us has not recoiled before the horror of a terrible Interactive Voice Response (IVR) experience? IVR technology was created to save businesses money, but it has mutated into a timesucking, customer experience-crushing monster! If connecting with a customer in this day of customer experience is the goal, there’s a better way! Contain the IVR before it kills another customer relationship. Can we bring the technology to heel and bend it to our will? And can we stop its rampage before artificial intelligence makes it too powerful to be stopped?
Tags : 
    
Vonage Business
Published By: Workday DACH     Published Date: May 01, 2019
In dieser Expertenanalyse der SMB Group erfahren Sie, wie die Nutzung einer einzigen Lösung für Finanzen, HR und Vergütung für den Erfolg Ihres Unternehmens entscheidend sein kann. Außerdem erhalten Sie Unterstützung bei der Auswahl der für Ihr Unternehmen am besten geeigneten Lösung. Studie in englischer Sprache.
Tags : 
belegschafts technologie, digitale strategie
    
Workday DACH
Published By: Workday DACH     Published Date: May 01, 2019
Als Finanzführungskraft möchten Sie sich auch speziell in Ihrer Funktion mit der Digitalisierung auseinandersetzen? Anhand der Einblicke von über 650 weltweit tätigen Finanzführungskräften werden in dieser Studie die obersten Prioritäten für die Finanztransformation evaluiert. Daraus entstanden ist ein wertvoller Fahrplan für die erfolgreiche Neudefinition des Finanzwesens. Studie jetzt herunterladen.
Tags : 
financiën, workforce-technologie, digitale strategie
    
Workday DACH
Start   Previous    2 3 4 5 6 7 8 9 10 11 12 13 14 15 16    Next    End
Search      

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.