Cookie policy: This site uses cookies (small files stored on your computer) to simplify and improve your experience of this website. Cookies are small text files stored on the device you are using to access this website. For more information on how we use and manage cookies please take a look at our privacy and cookie policies. Some parts of the site may not work properly if you choose not to accept cookies.

sections
 

lean

Results 126 - 150 of 298Sort Results By: Published Date | Title | Company Name
Published By: Gleanster Research     Published Date: Nov 06, 2012
For major corporations, these new data management and visualization tools can supplement their core BI initiatives, providing a friendlier front end that builds on existing investments. For smaller organizations, these tools may be the only ones they need. In this 38-page benchmark report, you'll learn how Top Performers use Agile Business Intelligence.
Tags : 
gleanster, agile business, business, technology, data
    
Gleanster Research
Published By: Gleanster Research     Published Date: Dec 11, 2012
This comprehensive 30pg benchmark report from Gleanster Research outlines exactly how Top Performing companies are embracing Agile BI.
Tags : 
    
Gleanster Research
Published By: IBM     Published Date: Jul 10, 2009
There has never been a more important time to uncover process waste, reduce non-value adding activity, and increase productivity. Lean Six Sigma (LSS) produces real results, and when combined with business process management (BPM) and service oriented architecture (SOA) can position a company for growth as the economy begins to improve.
Tags : 
six sigma, lean, bpm, soa, lss, lean six sigma, service oriented architecture, business process management
    
IBM
Published By: netForensics     Published Date: Jan 04, 2008
To manage threats to the enterprise and successfully meet compliance challenges, organizations need a comprehensive security strategy that can successfully do battle with inside as well as outside threats. Today, companies are increasingly leveraging security information management (SIM) solutions to build a clean, concise, and manageable process for dealing with the tremendous volumes of raw security information from disparate devices, applications, and databases.
Tags : 
monitoring, hackers, internal threats, bad employee, identity theft, data protection, hacker, security management, sim technology, compliance, fraud, netforensics, network security
    
netForensics
Published By: Melissa Data     Published Date: Nov 18, 2008
Learn what a Web Service is and how it works, the advantages of using a Data Quality Web Service, the technology assessment for implementation, and several case studies (Saab and other real world case studies) to demonstrate real life successes.
Tags : 
melissa data, data quality, contact data verification, address verification, validate address, address verification software, address verify, address validation software, data quality tools, data quality management, data quality objects, data quality api, address quality, data cleanse, data hygiene, data quality, data quality analysis, data quality api, data quality assurance, data quality control
    
Melissa Data
Published By: Melissa Data     Published Date: Nov 18, 2008
Tom Brennan and John Nydam explain the Melissa Data and Stalworth partnership, discuss the business problems caused by bad data, and describe how DQ*Plus provides a complete data quality solution for enterprise applications and commercial databases.
Tags : 
melissa data, data quality, contact data verification, address verification, validate address, address verification software, address verify, address validation software, data quality tools, data quality management, data quality objects, data quality api, address quality, data cleanse, data hygiene, data quality, data quality analysis, data quality api, data quality assurance, data quality control
    
Melissa Data
Published By: Business-Software     Published Date: Jul 14, 2010
The 2010 Top 20 ERP Vendor Report reveals: The Top 20 ERP software providers you should consider; Highlights of each vendor's strengths in accounting, manufacturing, supply chain management, and more; Vendor background and contact information to get you started; How the right ERP software can simplify processes and reduce production costs.
Tags : 
business software, supply chain management, lean manufacturing
    
Business-Software
Published By: Business-Software     Published Date: Jul 14, 2010
Profiles of the Leading Manufacturing Software Vendors.
Tags : 
business software
    
Business-Software
Published By: ESET     Published Date: Jan 21, 2010
Bots and botnets suck, so what better teaching aid to help people understand them than a vacuum cleaner? It can be extremely challenging to attempt to explain technical concepts to non-technical people. There are two goals for this presentation. Click on this white paper to read about it.
Tags : 
eset, internet security, bots, botnets, national cybersecurity alliance, roomba, remote access tool, denial of service attack, safe computing, remote access
    
ESET
Published By: Epicor     Published Date: Feb 22, 2010
This paper outlines how the five lean principles are all supported and enhanced by comprehensive information control and the management tools that an end-to-end enterprise software suite delivers.
Tags : 
epicor, erp, enterprise resource planning, lean manufacturing, enterprise software, productivity, tco, collaboration
    
Epicor
Published By: Gleanster Research     Published Date: Nov 21, 2013
Have you considered creating an online customer community for your brand? This benchmark report from Gleanster Research explores how and why Top Performing organizations invest in Online Customer Communities.
Tags : 
    
Gleanster Research
Published By: Gleanster Research     Published Date: Nov 21, 2013
This benchmark report from Gleanster Research showcases the benefits of Online Customer Community Solutions. You'll learn what to look for, how to overcome challenges, as well as analyst commentary on the full vendor landscape.
Tags : 
    
Gleanster Research
Published By: SAP     Published Date: May 11, 2012
The objective of this paper is to provide an introduction to "location-based intelligence" as it relates to the common view of an "address," as well as provide an overview of geocoding and geographic data services.
Tags : 
location-based intelligence, geocode, geographic data services, reverse geocoding, address cleansing, enterprise applications
    
SAP
Published By: NetProspex     Published Date: May 12, 2014
NetProspex analyzed the success rate of hundreds of email open rates and thousands of phone calls. The statistics proved that trigger-based emails had significantly higher conversion rates, but email sent on optimized days also did well. Download this guide on the best days to send emails.
Tags : 
marketing data services, marketing data management, marketing data quality, installed technology list, international contact data, business contact list, marketing database cleansing, marketing database services, database cleansing, b2b data cleansing, b2b data quality, b2b contact database, business contact database, b2b technology data, global contact list, marketo data quality, eloqua data quality, marketo database cleaning, eloqua database cleaning, marketing data enrichment
    
NetProspex
Published By: NetProspex     Published Date: May 12, 2014
While collecting marketing data is easy, that data is not cast in stone. Securing a marketing data management plan that you can rely on is imperative. This guide provides actionable steps to clean up your data and increase conversions.
Tags : 
marketing data services, marketing data management, marketing data quality, installed technology list, international contact data, business contact list, marketing database cleansing, marketing database services, database cleansing, b2b data cleansing, b2b data quality, b2b contact database, business contact database, b2b technology data, global contact list, marketo data quality, eloqua data quality, marketo database cleaning, eloqua database cleaning, marketing data enrichment
    
NetProspex
Published By: NetProspex     Published Date: May 12, 2014
Only 8% of marketers classified their lead gen efforts as "very successful". Check ot the latest research on what successful lead generation will look like in 2014. See how you compare by taking the survey and then downloading the report!
Tags : 
marketing data services, marketing data management, marketing data quality, installed technology list, international contact data, business contact list, marketing database cleansing, marketing database services, database cleansing, b2b data cleansing, b2b data quality, b2b contact database, business contact database, b2b technology data, global contact list, marketo data quality, eloqua data quality, marketo database cleaning, eloqua database cleaning, marketing data enrichment
    
NetProspex
Published By: CDW-Trend Micro     Published Date: Mar 26, 2015
Organizations around the world are embracing the economic and operational benefits of cloud computing. Whether organizations are extending internal resources or fully deploying on Microsoft Azure, the ability to take advantage of the business benefits of cloud require that organizations continue to meet key security requirements. Azure delivers a trusted cloud infrastructure on which customers can design, build and manage their own cloud applications and infrastructure. While Azure provides security controls for the infrastructure and change to virtualization layers, deploying organizations are responsible for deploying and maintaining security for the guest operating systems, applications, and data in order to protect against malware attacks, zero-day vulnerabilities and data breaches. Read this white paper to lean more about Trend Micro Instant-On Cloud Security for Microsoft Azure.
Tags : 
cloud security, microsoft azure, cloud computing, cloud infrastructure, malware attacks, data breaches, trend micro, security, it management
    
CDW-Trend Micro
Published By: Cherwell Software     Published Date: Jan 28, 2019
Leading Cancer Center Implements Lean Service Desk to Provide Vital Support to Medical Staff Learn how the IT team at Seattle Cancer Care Alliance built a brand new service desk from scratch in just five months. Key improvements include significant time savings via quick and easy workflow automation; faster issue resolution and response times due to real-time dashboards; and a new culture of continuous improvement surrounding the implementation of lean methodologies and ITSM best practices.
Tags : 
    
Cherwell Software
Published By: Gleanster Research     Published Date: Dec 06, 2012
Let's face it: When it comes to business intelligence (BI), a lot of organizations today are mouse hunting with an elephant gun.
Tags : 
    
Gleanster Research
Published By: Gleanster Research     Published Date: Dec 11, 2012
Some of the largest and most preeminent BI solution providers today are creating a lot of noise about big data.
Tags : 
    
Gleanster Research
Published By: Kronos     Published Date: Apr 16, 2015
To learn more about "lean labor" and how it can benefit your organization, watch "The 7 Wastes of Lean Labor." This video provides an introduction to lean labor by describing the wastes all manufacturers face and how these same challenges apply to your workforce.
Tags : 
workforce management system, fully automated, cloud based, manufacturers, timekeeping, payroll, streamlining, manual processes
    
Kronos
Published By: Gleanster Research     Published Date: Aug 01, 2013
The new Marketing Automation Gleansight Benchmark report from Gleanster research is here! Find out how Top Performing organizations are investing in Marketing Automation. This 22 page insight packed market research report features best practices from 220 organizations.
Tags : 
    
Gleanster Research
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12    Next    End
Search      

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.