Cookie policy: This site uses cookies (small files stored on your computer) to simplify and improve your experience of this website. Cookies are small text files stored on the device you are using to access this website. For more information on how we use and manage cookies please take a look at our privacy and cookie policies. Some parts of the site may not work properly if you choose not to accept cookies.

sections
 

operation

Results 326 - 350 of 2950Sort Results By: Published Date | Title | Company Name
Published By: Oracle     Published Date: Aug 15, 2013
Hear how a leading construction company headquartered in Canada with operations in North America and Australia, plans to enable mobile HR transactions with Oracle Fusion Human Capital Management.
Tags : 
pcl constructors inc, mobile, oracle, fusion, human capital management, hcm, enterprise applications, human resource technology
    
Oracle
Published By: Oracle     Published Date: Aug 15, 2013
United Rentals Director of HR Operations Linda Luman discusses how her organization invests in people to drive efficiency.
Tags : 
united rentals, optimize, workforce, oracle hcm, enterprise applications, human resource technology
    
Oracle
Published By: Oracle     Published Date: Aug 15, 2013
Paul Stephen, Sr. Program Manager of IT Operations at Zillow, and John Doel, Principal at KPMG, share lessons learned from Zillow’s Oracle Fusion HCM and Talent Management implementation.
Tags : 
fusion, hcm, customer, oracle, enterprise applications, human resource technology
    
Oracle
Published By: Lumeris     Published Date: Aug 04, 2014
For health plans, health systems and delegated payer operations, or health systems wanting to become their own payer, Lumeris’ turnkey outsourcing offers expert support to design, build, operate, measure, and optimize value-based health plan operations that can drive clinical and financial excellence. This can be evidenced by our ability to help clients achieve higher revenue, lower costs, higher market share, and meeting mandates for medical cost ratio contained in the Patient Protection and Affordable Care Act.
Tags : 
lumeris, health plan delivery, health plan operations, population health services, value based health plan operations, health plan outsourcing, operating a health plan
    
Lumeris
Published By: Oracle     Published Date: Oct 29, 2015
Business buyers are more demanding than ever. They expect organizations to meet their precise needs through the life-cycle of interactions with B2B brands. This means providing today’s business buyers with consumer like-experiences that allow them to do their job better and easier, and making the complex simple. Download this white paper from Aberdeen Group to learn the five best practices to get B2B e-commerce right and how to achieve best-in-class performance in customer retention, revenue growth, and operational efficiency.
Tags : 
oracle, aberdeen group, b2b brands, customer retention, revenue growth, operational efficiency, enterprise applications, platforms
    
Oracle
Published By: Box     Published Date: Nov 24, 2015
With the cloud being an essential part of so many IT organizations, best practices have emerged to help IT evaluate the right vendors’ ability to meet mission critical security needs. Download this whitepaper to learn the best practices for determining file sharing provider’s capabilities and see how it will allow you to select the right vendor to meet mission critical operational and security needs.
Tags : 
file sharing, file sharing providers, secure files, security needs, security, enterprise applications
    
Box
Published By: Comcast Business     Published Date: Feb 16, 2017
When you’re running your own business, you have to wear many hats. But it’s tough to be an expert in everything from strategy to day-to-day execution across multiple functions: finance, operations, sales and marketing, HR, and more. This comprehensive guide offers tips and advice from a wide range of experts across to help you build, run, and grow your business effectively.
Tags : 
    
Comcast Business
Published By: Hewlett Packard Enterprise     Published Date: Jul 12, 2018
"Delivering business transformation is an incredibly complex task for IT. Keeping the lights on while supporting digital transformation initiatives requires a new era of hybrid IT so IT teams can address the needs of not just IT operations staff, but also application developers and LOB executives. Through in-depth interviews of IT operations and LOB staff, IDC shares how enterprises are handling the challenges and opportunities presented by hybrid IT. Find out how you can create value and competitive advantage through digital transformation."
Tags : 
    
Hewlett Packard Enterprise
Published By: Hewlett Packard Enterprise     Published Date: Jul 12, 2018
"This blueprint, based on HPE Pointnext experts’ real-world experience, is a “How To” guide that captures the business and technology challenges driving software defined infrastructure (SDI) and provides actionable steps for overcoming them. Gain tips to transition to hybrid IT and take advantage of software-defined architectures for agile development and self-serve IT.
Tags : 
    
Hewlett Packard Enterprise
Published By: Hewlett Packard Enterprise     Published Date: Jul 12, 2018
Learn why many organizations are leveraging forward-looking best practices from the experts at HPE Pointnext to help them transition to an ITaaS structure. This guide examines the critical business and technology practices enabling ITaaS, from using flexible IT partner resources, ITIL features, operations service practices, to funding infrastructure as a service.
Tags : 
    
Hewlett Packard Enterprise
Published By: Hewlett Packard Enterprise     Published Date: Jul 12, 2018
This workshop explains and demonstrates how to secure your infrastructure, protect your digital assets, and automate threat detection and incident correction—providing complete visibility into your data center security operations.
Tags : 
    
Hewlett Packard Enterprise
Published By: Secureworks     Published Date: Nov 11, 2016
This paper explores why the older “all or nothing” kind of relationship between business organisations and information security services providers (ISSPs) is giving way to a hybrid model that security professionals can leverage to augment their operations and effectiveness.
Tags : 
managed security services, cybersecurity, issps, security, threat and vulnerability management
    
Secureworks
Published By: Secureworks     Published Date: Dec 09, 2016
The included Framework for Inquiry is a non-prescriptive exercise that can help boards and management craft a replicable reporting template for reviewing risk levels, measuring operational effectiveness, and prioritizing initiatives over time.
Tags : 
cybersecurity, managed security services, security, threat and vulnerability management, risk management
    
Secureworks
Published By: Cloud Blue     Published Date: Jul 20, 2018
Digital-native enterprises are first to accelerate cloud commerce business. IDC explains how cloud platforms like CloudBlue are key to evolving business models and architecture to scale operations and innovate faster than traditional businesses in preparation for the Future of Commerce.
Tags : 
    
Cloud Blue
Published By: Oracle Linux     Published Date: Oct 29, 2018
Learn how customers are improving security, reducing downtime, simplifying operations, and saving money by switching to Oracle Linux support.
Tags : 
    
Oracle Linux
Published By: Alibaba Cloud SEA     Published Date: Mar 11, 2019
This whitepaper provides an overview of how Craigs International leveraged Alibaba Cloud’s technology solutions, including Cloud Enterprise Network (CEN), Virtual Private Network (VPN) Gateway, and Smart Access Gateway (SAG), to build a global enterprise network. Alibaba Cloud’s solutions helped them improve business operations, increase efficiency, maximize profitability, and reduce OPEX and CAPEX costs. Craigs International wants to move to the cloud to build a global hybrid enterprise network by partnering with a technology player that has such solid experience within Mainland China.
Tags : 
data center, cloud computing, networking, security, china, global expansion
    
Alibaba Cloud SEA
Published By: CA Technologies     Published Date: Apr 06, 2017
Privileged credentials have served as a major attack vector in the successful execution of many breaches. Protecting privileged access is an imperative to successfully defend an organization from a breach and is a core requirement of multiple compliance regimes. CA Privileged Access Management helps drive IT security and compliance risk reduction and improves operational efficiency by enabling privileged access defense in depth—providing broad and consistent protection of sensitive administrative credentials, management of privileged identity access and control of administrator activity.
Tags : 
it security, security breach, it infrastructure, cyber crime, risk management, password management, incident response, audits, user authentication
    
CA Technologies
Published By: CA Technologies     Published Date: Apr 06, 2017
Managing and protecting privileged credentials is essential to reducing risk and addressing compliance requirements. Organizations need to evaluate privileged password management solutions for the depth of controls, scope of coverage and degree of cloud alignment they provide. CA Privileged Access Manager delivers against all three of these dimensions, providing a next-generation solution for privileged credential management that drives IT risk reduction, improves operational efficiency and protects an organization’s investment by supporting traditional, virtualized and hybrid-cloud infrastructure alike.
Tags : 
cloud security, cloud management, it protection, api integration, credential verification, security efficiency
    
CA Technologies
Published By: Larsen & Toubro Infotech(LTI)     Published Date: Apr 22, 2019
A global media conglomerate was facing issues with their existing operating model -stagnant quality of support, lack of innovation and inferior/deteriorating end user experience. LTI’s Amplified Outcomes Model - Mosaic helped deliver TCO reduction, coupled with enhanced user experience.
Tags : 
    
Larsen & Toubro Infotech(LTI)
Published By: MalwareBytes EMEA     Published Date: May 10, 2019
Ransomware has taken the world by storm. CryptoWall extorted an estimated $18 million, and WannaCry locked up more than 230,000 computers across the globe in 2017. Companies of all sizes are sitting up and taking notice. Even brands with a strong security investment have fallen victim. We’ve seen ransomware cripple businesses: nearly 19% of businesses stop operations immediately after discovering a ransomware attack.1 Hospital emergency rooms forced to turn people away; global shipping logistics experience massive disruption; and even a summer blockbuster movie held up for ransom. The FBI estimates ransomware is now a billion-dollar business. Ransomware has been around for a while, and it has spiked in recent years. It secured 5th place as the most common variety of malware in 2017, up from 22nd place in 2014.2 Originally ransomware targeted individuals and was considered a consumer nuisance. It has now become a business menace.
Tags : 
    
MalwareBytes EMEA
Published By: IBM     Published Date: Feb 23, 2012
Built on IBM's market-leading business rules management system and enhanced with capabilities for detecting time-based events, this offering drives more responsive actions to business opportunities or risk conditions, increasing the value of each customer, partner and internal interaction.
Tags : 
ibm, technology, information technology, it management, data management, data center
    
IBM
Published By: Adobe     Published Date: Feb 20, 2014
The City of Almere in the Netherlands uses Adobe® Acrobat® Pro to enhance collaboration among officials and improve the delivery of government services to citizens.
Tags : 
adobe, adobe acrobat pro, software, collaboration, streamlining, productivity, file management, document management, cost of operations, delivery, distribution, pdf files, electronic documentation, document management system, software development, it management
    
Adobe
Published By: Adobe     Published Date: Aug 05, 2014
In 2014, there will be more than 2 billion smartphones global. Mobile is becoming not on the new digital hub but also the bridge to the physical world. That's why mobile will affect more than just your digital operations- it will transform your entire business. 2014 will be the year that companies increase investments to transform their business with mobile as a focal point. This fifth annual mobile trends report highlights new mobile trends that we expect to see this year as well as some over hyped topics that we believe will fail to provide real business value in the short term.
Tags : 
forrester, mobile trends, mobile, digital operations, business value, smartphones, enterprise applications
    
Adobe
Published By: Adobe     Published Date: Aug 05, 2014
En 2014, il y aura plus de 2 milliards de smartphones dans le monde. Le mobile est non seulement le nouveau hub digital, mais il fait aussi le lien avec le monde physique. C’est pour cette raison que le mobile affectera bien plus que vos opérations digitales : il va transformer votre activité toute entière. En 2014, les entreprises vont développer leurs investissements pour centrer leurs activités autour du mobile. Ce cinquième rapport annuel sur les tendances du mobile met en avant les grandes lignes de ce que nous réserve cette année ainsi que les thèmes ultra-médiatisés dont nous pensons qu’ils ne constituent pas une valeur commerciale réelle à court terme.
Tags : 
forrester, mobile trends, mobile, digital operations, business value, smartphones, enterprise applications
    
Adobe
Published By: Adobe     Published Date: Aug 05, 2014
2014 werden weltweit mehr als zwei Milliarden Smartphones im Einsatz sein. Mobile wird nicht nur Dreh- und Angelpunkt der neuen digitalen Welt, sondern auch die Verbindung zurphysischen Welt. Der Mobile-Trend betrifft daher nicht nur Ihre Aktivitäten im Bereich digitaler Medien. Er wird einen Wandel für Ihr gesamtes Geschäft bewirken. 2014 werden Unternehmen verstärkt investieren, um diesen Trend aufzugreifen und ihr Geschäft mit dem Schwerpunkt Mobile neu auszurichten. Dieser jährliche Bericht zu den Trends im Mobilbereich untersucht neue mobile Trends, die wir für dieses Jahr erwarten, sowie einige überbewertete Themen, dieunserer Meinung nach kurzfristig keinen echten Geschäftswert bieten werden.
Tags : 
forrester, mobile trends, mobile, digital operations, business value, smartphones, enterprise applications
    
Adobe
Start   Previous    7 8 9 10 11 12 13 14 15 16 17 18 19 20 21    Next    End
Search      

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.