Cookie policy: This site uses cookies (small files stored on your computer) to simplify and improve your experience of this website. Cookies are small text files stored on the device you are using to access this website. For more information on how we use and manage cookies please take a look at our privacy and cookie policies. Some parts of the site may not work properly if you choose not to accept cookies.

sections
 

high value

Results 76 - 100 of 279Sort Results By: Published Date | Title | Company Name
Published By: Adaptive Planning     Published Date: Dec 05, 2011
Join us for an informative webinar and learn how easy it can be to create exceptional value through FP&A. You will hear case studies describing how leading software companies worldwide have been able to move beyond spreadsheets and save time, enhance companywide collaboration, and improve business decisions - ultimately resulting in higher revenues and profits. And you'll also see a demo of how Adaptive Planning's award-winning software creates value for software companies.
Tags : 
finance, budget, reporting, software, adaptive planning, revenue, profit, management solutions
    
Adaptive Planning
Published By: Adaptive Planning     Published Date: Dec 05, 2011
Join us for an informative webinar and learn how easy it can be to create exceptional value through FP&A. You will hear case studies describing how leading insurance companies worldwide have been able to move beyond Excel and save time, enhance companywide collaboration, and improve business decisions - ultimately resulting in higher revenues and profits. And you'll also see a demo of how Adaptive Planning's award-winning software creates value for insurance companies.
Tags : 
finance, business, budget, insurance firms, fp&a, adaptive planning, revenue, profit, expenses
    
Adaptive Planning
Published By: Rosetta Stone     Published Date: May 31, 2012
What's the biggest difference between mediocre and exceptional companies? Employees. People are ultimately responsible for the vision, ideas, products and day-to-day work that make a company great. These high-performing organisations continue to extract more value from their people because they think of them as long-term, strategic resources with the capacity to improve and adapt to the changing needs of the business.
Tags : 
training, employees, business, rosetta stone, training programs, employee programs
    
Rosetta Stone
Published By: Workday     Published Date: Mar 09, 2018
Workday has been recognized by global market intelligence firm, IDC, as a Leader in the IDC MarketScape for Midmarket ERP applications. This report is a guide highlighting the most important criteria for midsize companies to considers when selecting a system. Being named a Leader also underscores the value that Workday brings customers ranging from mid-sized business to the world’s largest enterprises.
Tags : 
market intelligence, midsize companies, global intelligence
    
Workday
Published By: RSA Security     Published Date: Nov 06, 2013
This paper discusses the value of operational technologies while acknlowledging there is a "value ceiling" for some niche tools, highlighting the opportunity to seek broader value as part of the GRC program maturity process.
Tags : 
grc, risk, compliance, technology, best practices, archer, rsa, security, it management
    
RSA Security
Published By: Vectra Networks     Published Date: Aug 03, 2015
The Dyre family of banking malware is back in the news after researchers recently observed that the malware incorporated tricks to avoid detection in malware sandboxes. Previously, Dyre was most notable for targeting high value bank accounts, including business accounts, and incorporating sophisticated social engineering components to overcome the 2-factor authentication used by most banks.
Tags : 
malware, data, malware, banking, malware sandbox, authentication, two-factor authentication
    
Vectra Networks
Published By: Citrix ShareFile     Published Date: Jul 11, 2017
In recent years, ransomware such as Locky and KeRanger have emerged as a top threat, not just to consumers, but to businesses with high-value data. Read this whitepaper for four best practices to protect yourself from this costly threat, including: Evaluating web browser configuration and virtualization options Protecting mobile devices against attack through containerization Reducing the risks of collaboration through secure EFSS solutions
Tags : 
ransomware, security, risk reduction, containerization, data security
    
Citrix ShareFile
Published By: Citrix ShareFile     Published Date: Jul 11, 2017
In recent years, ransomware such as Locky and KeRanger have emerged as a top threat, not just to consumers, but to businesses with high-value data. Read this whitepaper for four best practices to protect yourself from this costly threat, including: Evaluating web browser configuration and virtualization options Protecting mobile devices against attack through containerization Reducing the risks of collaboration through secure EFSS solutions
Tags : 
ransomware, risk reduction, data security, collaboration, containerization
    
Citrix ShareFile
Published By: Google     Published Date: Aug 09, 2017
Get the low-down on the highlights from Google's marquee cloud conference in San Francisco. From unparalleled infrastructure to customer value and product innovation, Google Cloud Next ’17 showcased insights and solutions from across the industry. Whether you’re an enterprise or a startup, Google Cloud is here to help you build what’s next.
Tags : 
customer experience, customer analytics, customer experience management, cloud
    
Google
Published By: CA Technologies EMEA     Published Date: Aug 03, 2017
For organizations with additional security requirements for high value servers hosting business-critical assets, CA Privileged Access Manager Server Control provides localized, fine-grained access control and protection over operating system-level access and application-level access. Agent-based, kernel-level protection is available for individual files, folders and specific commands based on policy and/or finedgrained controls on specific hosts.
Tags : 
identity management, privileged user access, secure privileged credentials, secure hybrid it
    
CA Technologies EMEA
Published By: Teradata     Published Date: Jan 16, 2015
Teradata® Analytics for SAP® Solutions performs high-value business analytics on integrated data.
Tags : 
data analytics, high-value, integrated data, intelligence
    
Teradata
Published By: Dassault Systèmes     Published Date: Jul 21, 2017
Product Lifecycle Management (PLM) software can help your company keep up with the increasing complexity of developing today’s high-tech products. While smaller companies may use relatively simple Product Data Management (PDM) tools, larger companies rely on full-featured PLM systems that help automate processes and share data across global supply chains. Mid-size companies can feel stuck because PDM is too basic, but PLM feels out of reach. This resource will help you: • Recognize why “simple” solutions fall short and do not support your capabilities • Better connect to customers and the supply chain • Drive higher product development speed • Get started with the right PLM solution Midsize manufacturers need a system that quickly delivers the core capabilities they need to streamline product development but also gives them room to grow value over time. So, what’s the right size PLM to fit a midsized high-tech company? Download this resource and take a look.
Tags : 
product solutions, lifecycle management, tech products, data management tools, pdm, plm, process automation, product development speed, manufactures
    
Dassault Systèmes
Published By: Dassault Systèmes     Published Date: Jul 21, 2017
There is a significant gap between how manufacturing companies value specific aspects of their project execution and how they judge their performance. Better education in project management methodologies and standalone software tools alone will limit a company’s ability to perform at its highest level. A study by Engineering.com found that a web-based Product Lifecycle Management (PLM) solution is the best way for a company to fully achieve its best practices. This white paper shares how a PLM solution with embedded project management can uniquely provide: • Full alignment between projects and the product portfolio • Coordination of a project’s schedule, resources and scope • Automatic real-time status updates of project tasks • Mitigation of project risks based upon real-time assessment of product development Benefit from the unique value provided by PLM systems with embedded project management.
Tags : 
manufacturing, project execution, product management education, software tools, web based, product lifecycle management, product portfolio, project schedule, status updates, project risks
    
Dassault Systèmes
Published By: Here Technologies     Published Date: Mar 29, 2019
Today’s assets, including equipment, vehicles, and shipping containers, move via multiple transportation modes at varying speeds across a range of distances and geographies. The journeys of these assets are fraught with problems, including lost and stolen goods, delayed shipments, and damage from incorrect environmental conditions. HERE is looking to solve the problems of keeping track of things, both outdoors and indoors. IoT deployments rely on location tracking to function effectively. With the significant cost of delayed, lost and stolen goods – location tracking offers a huge market opportunity. ISG Research had an extensive briefing with to analyze the company’s ambitions to reach deeper into the IoT and Asset Tracking market. Download to learn more about active tracking of high value products and how to enhance your tracking solutions.
Tags : 
here technologies, transport and logistics
    
Here Technologies
Published By: IBM     Published Date: Jul 06, 2016
Five high-value uses for big data: IBM has conducted surveys, studied analysts’ findings, talked with more than 300 customers and prospects and implemented hundreds of big data solutions. As a result, it has identified five high-value use cases that enable organizations to gain new value from big data.
Tags : 
ibm, mdm, big data, trusted data, data solutions, data center
    
IBM
Published By: IBM     Published Date: Jan 27, 2017
High-priority big data and analytics projects often target customer-centric outcomes such as improving customer loyalty or improving up-selling. In fact, an IBM Institute for Business Value study found that nearly half of all organizations with active big data pilots or implementations identified customer-c entric outcomes as a top objective (see Figure 1).1 However, big data and analytics can also help companies understand how changes to products or services will impact customers, as well as address aspects of security and intelligence, risk and financial management, and operational optimization.
Tags : 
    
IBM
Published By: Dassault Systèmes     Published Date: Jun 19, 2018
This spotlight report examines: • How Manufacturing Operations Management (MOM) or Manufacturing Execution Systems (MES) are key enablers of data management and Digital Transformation. Companies can combine many other opportunities with manufacturing operations in a digital journey. • Product lifecycle management (PLM) as a high-value discipline to pair with MOM in discrete manufacturing, and the value of digital continuity across engineering, manufacturing operations, and supply chain. • A robust integration of MOM and PLM technologies and the advent of the Digital Twin (a virtual copy of the product and how it's made) to demonstrate maturity in Smart Manufacturing and the ability to make smart products in smart factories. The IIoT has opened up a world of opportunity for manufacturers. Take advantage of it.
Tags : 
    
Dassault Systèmes
Published By: CA Technologies     Published Date: Jan 06, 2014
Why should organizations take insider threats seriously? Because the stakes have never been higher, especially given the value enterprises place on intellectual capital and trade secrets.
Tags : 
mediacom, insider threats, substantial threats, bladley manning, edward snowden, malicious insiders, exploited insiders, sensitive information, steal information, secure data, secure passwords, security breaches, broken privacy, reputational damage, cyber-security, business closures, business security, insider rights, threat environment, security
    
CA Technologies
Published By: PitneyBowes     Published Date: Sep 22, 2010
Focus on your most critical, high-value mail while streamlining the delivery of lower-value mail. As a result, your mail management volumes stay more in line with your budget.
Tags : 
pitney bowes precision mail services, simplified delivery, mailing services, postage, mail management
    
PitneyBowes
Published By: EMC Corporation     Published Date: May 27, 2014
RSA Paper: In today's highly interconnected business environment, information security can no longer be an isolated endeavor: it's the responsibility of an entire business ecosystem or value-chain. This RSA Security Brief looks at the areas for improvement where investment will typically generate the greatest security benefit.
Tags : 
emc, security operations, security analytics, intelligence-driven security, threat detection, security monitoring, critical incident response, security, data center
    
EMC Corporation
Published By: Red Hat     Published Date: Sep 25, 2014
As a strategic partner in your business, you face increasing demands from your line-of-business leaders for new functionality and advanced capabilities, which you must deliver with a constrained IT budget. What could you do to meet these expectations and add value to the business if you could contain costs, increase operational efficiency, and do more with less? You need to overcome several challenges. The cost of software licensing management is rising as a result of maintaining proprietary platforms or legacy technology, making it difficult to modernize your datacenter and migrate to more cost-effective solutions. You’re likely burdened by regulatory compliance mandates, which create enforcement, reporting, and auditing expenses. And, like 67% of IT organizations, your budget is probably shrinking. Red Hat can help. Red Hat® Enterprise Linux® gives you the high-value subscription model, built-in governance processes, and simplified migration path you need to aggressively lower your
Tags : 
increased demands, functionality, software licensing management, proprietary platforms, legacy technology, datacenter, it organization, it management, enterprise applications
    
Red Hat
Published By: Datastax     Published Date: Apr 04, 2017
Netflix, Intuit and Clear Capital. These 3 innovative companies have one thing in common. They are altering their business landscape and transforming the way people live and work through highly personalized applications. And they're doing this with Apache Cassandra™ and DataStax. Download this white paper and learn why relational technologies failed to meet the demands of Netflix, Mint Bills and Clear Capital and how these enterprises modernize their Web and Mobile applications with DataStax to drive customer engagement, loyalty and lifetime value.
Tags : 
datastax, netflix, mint bills, digital, personalization
    
Datastax
Published By: Datastax     Published Date: Aug 23, 2017
Kenzan, a software engineering firm that specializes in building scalable, data-driven solutions, often leverages DataStax Enterprise (DSE) for customers that have high expectations for both performance and value. That means making careful, informed choices when designing the cloud infrastructure that applications run on. Controlling costs is always a priority for businesses that rely on AWS for running DSE. With AWS, it can be tempting to solve performance issues simply by adding more resources until the problem goes away. However, this “solution” results in increased costs which quickly add up over time. In this white paper, Kenzan and DataStax identify some of the key factors to consider when building out infrastructure on AWS, outlining practical steps you can take to optimize performance with DSE on AWS while keeping costs in check.
Tags : 
enterprise, benchmarking, data
    
Datastax
Published By: Datastax     Published Date: May 14, 2018
" For any business that wants to successfully compete in today’s digital economy, it is not a question of if but rather how much of their business will be done with cloud applications. A cloud application is one with many endpoints including browsers, mobile devices, and/or machines that are geographically distributed. The application is intensely transactional (high velocity reads and/or writes), always available, and instantaneously responsive no matter the number of users or machines using the application. Download this free white paper and explore how DataStax customers are delivering real-time value at epic scale with their cloud applications. Explore the core database requirements that make businesses successful with cloud applications, which include continuous availability, linear scale, and geographic distribution."
Tags : 
    
Datastax
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12    Next    End
Search      

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.