Cookie policy: This site uses cookies (small files stored on your computer) to simplify and improve your experience of this website. Cookies are small text files stored on the device you are using to access this website. For more information on how we use and manage cookies please take a look at our privacy and cookie policies. Some parts of the site may not work properly if you choose not to accept cookies.

sections
 

sign act

Results 226 - 250 of 929Sort Results By: Published Date | Title | Company Name
Published By: DocuSign UK     Published Date: Aug 10, 2018
"Every organisation already has a system of agreement. It's how written agreements get prepared, signed, enacted, and managed. But typically, it involves a messy, improvised mix of printing, signing, scanning, faxing, and overnighting paper agreements. These needlessly slow legacy processes add costs to agreements due to wasted productivity and materials. It's time for a change. The DocuSign System of Agreement Platform connects the world's No. 1 eSignature technology to every other aspect of the agreement process. Read this white paper to learn how to modernise your System of Agreement, including how to: - Prepare agreements with a high degree of automation - Sign agreements quickly and securely - Act on agreement terms after signing - Manage agreements with flexible options"
Tags : 
    
DocuSign UK
Published By: DocuSign UK     Published Date: Aug 08, 2018
Procurement’s Pesky Paper Problem We know time is precious, so we’ll get right to the point: Paper-based processes are tarnishing your procurement department’s reputation for driving cost savings, improving service, and expediting execution. First, there’s the printing, scanning, faxing, and mailing of documents. Then comes the constant tracking down of physical signatures for everything from statements of work to supplier contracts. Add in the manual filing, searching, and retrieving of hard copies, and it’s no wonder that inefficiency abounds.
Tags : 
    
DocuSign UK
Published By: DocuSign UK     Published Date: Aug 08, 2018
HR is all about serving your people, whether they are shiny new recruits or lifetime employees. But all too often, outdated and cumbersome paper-based processes get in the way of those goals. Discover how HR departments are using electronic signatures to streamline the on-boarding experience, increase employee satisfaction, and focus staff away from mundane tasks. Watch this webinar and discover how eSignatures can help you: - Simplify the new hire process: NDAs, offer letters, background checks and on-boarding - Streamline compensation and benefits: comp plans, stock option grants, and benefit plan notices - Reduce admin overheads: holiday requests, contractor agreements, and internal approvals - Ensure compliance: ISO compliance, new hire check-offs and audit support
Tags : 
    
DocuSign UK
Published By: DocuSign UK     Published Date: Aug 08, 2018
"Many financial services firms have automated the vast majority of key processes and customer experiences. However, the “last mile” of most transactions – completing the agreement– far too often relies on the same inefficient pen-and-paper processes of yesteryear. Digitising agreements using DocuSign lets you keep processes digital from end to end. Completing transactions no longer requires documents to be printed and shipped, and re-keyed on the back end. Read the whitepaper to learn how leading financial services organisations use straight-through processing by automating the last mile of business transactions to: - Speed processes by 80% or more, often going from days or weeks to just minutes - Reduce NIGO by anywhere from 55% to 93% - Achieve a 300% average ROI "
Tags : 
    
DocuSign UK
Published By: DocuSign UK     Published Date: Aug 08, 2018
Download this eBook to learn how eSignature technology and the processes associated with it not only optimise workflows but also can help make company activities more secure and compliant.
Tags : 
    
DocuSign UK
Published By: NAVEX Global     Published Date: Jul 31, 2018
The Definitive Guide to Compliance Programme Assessment is a comprehensive resource full of advice and best practices. It is designed to help organisations evaluate and improve their ethics and compliance programmes through industry evidence and insights. Each programme is unique, with disparate risks and various levels of maturity, so not everything in this guide will apply to every programme. It is designed to help you perform a robust gap analysis of your unique programme and guide you through best practices to achieve the next level of programme sophistication right for your organisation. What you'll learn: How internal and external parties define programme effectiveness The eight essential components of an effective ethics and compliance programme How to share your assessment in a meaningful way
Tags : 
    
NAVEX Global
Published By: Microsoft     Published Date: Jul 20, 2018
This guide presents a structured approach for designing cloud applications that are scalable, resilient, and highly available. The guidance in this ebook is intended to help your architectural decisions regardless of your cloud platform, though we will be using Azure so we can share the best practices that we have learned from many years of customer engagements. In the following chapters, we will guide you through a selection of important considerations and resources to help determine the best approach for your cloud application: 1. Choosing the right architecture style for your application based on the kind of solution you are building. 2. Choosing the most appropriate compute and data store technologies. 3. Incorporating the ten high-level design principles to ensure your application is scalable, resilient, and manageable. 4. Utilizing the five pillars of software quality to build a successful cloud application. 5. Applying design patterns specific to the problem you are trying to
Tags : 
    
Microsoft
Published By: Microsoft     Published Date: Jul 20, 2018
Each organization has a unique journey to the cloud based on its own starting point, its history, its culture, and its goals. This document is designed to meet you wherever you are on that journey and help you build or reinforce a solid foundation around cloud application development and operations, service management, and governance. At Microsoft, we have been on our own journey for the past decade, and over the past years we have learned important lessons by developing our own internal and customer-facing systems. At the same time, we've been fortunate to share the experiences of thousands of customers on their own journeys. This document is designed to share those experiences and distill them into proactive guidance. You do not need to follow these recommendations to the letter, but you ignore them at your peril. Our experience has shown that a careful approach to these topics will speed you along on your organization’s journey and avoid well understood pitfalls. For the past severa
Tags : 
    
Microsoft
Published By: Microsoft     Published Date: Jul 20, 2018
In the two years since we first began working on Enterprise Cloud Strategy, much has changed. Cloud technology has evolved from being an “if” to a “when,” and across almost all enterprises, the cloud has now become an integral part of IT strategy. Further, there is now a growing realization that cloud computing not only represents a set of technical opportunities for efficiencies and cost savings, but also provides the potential to significantly transform the scope of enterprise computing. In fact, many enterprises are finding that cloud computing offers entirely new business models, revenue streams, and vehicles for customer intimacy. Few technological changes have the potential to so dramatically change to the way we do business. The last time we experienced such a tectonic shift was the with arrival of the Internet itself. Yet, as we noted in the first edition of this book, when briefing CIOs and senior IT executives at Microsoft, we are often told that migrating IT workloads to the
Tags : 
    
Microsoft
Published By: Hewlett Packard Enterprise     Published Date: Jul 18, 2018
Most companies would love to move enterprise applications to the public cloud and cut the costs, complexities, and limitations of current infrastructure. Major public cloud providers, such as Amazon Web Services (AWS), Microsoft Azure, and Google Cloud have done well in enabling web, mobile, and content applications in the cloud. These are cloud-native applications designed to use cloud “object” storage, and object storage is very popular for use cases such as backup and disaster recovery. However, enterprise applications typically require “block” storage. Although native cloud block storage exists, it has several shortcomings, particularly around reliability, durability, and lack of data mobility. So, enterprise applications have largely stayed on-premises or in private clouds. Now there’s an innovative new way to move enterprise applications to the public cloud while actually reducing risks and tradeoffs. It’s called multicloud storage, and it’s an insanely simple, reliable, secure w
Tags : 
    
Hewlett Packard Enterprise
Published By: KPMG     Published Date: Jul 18, 2018
Cloud services bring new and significant cybersecurity threats. The cloud can be secured—but not by the vendor alone. Are you clear about the risks and your responsibilities as an IT leader? Read this report to understand: • how cloud adoption is reshaping the threat landscape • why identity and access management must be a priority • what are cybersecurity best practices in a modern IT environment • which emerging technologies offer hope for improving cybersecurity outcomes. Download the report now:
Tags : 
    
KPMG
Published By: Great Bay Software     Published Date: Jul 16, 2018
"Healthcare organizations have significantly more to consider than the average business when it comes to network and device security. Concern over code modification, key compromise, password-based vulnerabilities and man-in-the-middle attacks have caused hospital CIOs and CISOs to rethink their security strategies and investments. The threat to these devices has even been assigned its own term: medjacking, a shortened form of “medical device hijacking.” Download this white paper for five best practices to mitigate threat and attacks that can put lives, patient trust and the growth of the healthcare organization at risk. Access the white paper today!"
Tags : 
    
Great Bay Software
Published By: KPMG     Published Date: Jul 12, 2018
Cloud services bring new and significant cybersecurity threats. The cloud can be secured—but not by the vendor alone. Are you clear about the risks and your responsibilities as an IT leader? Read this report to understand: • how cloud adoption is reshaping the threat landscape • why identity and access management must be a priority • what are cybersecurity best practices in a modern IT environment • which emerging technologies offer hope for improving cybersecurity outcomes. Download the report now
Tags : 
    
KPMG
Published By: Dassault Systemes SolidWorks Corp.     Published Date: Jul 11, 2018
How do you design and manufacture products suited for the Fourth Industrial Revolution — the Internet of Things (IoT) and artificial intelligence (AI)? Hint: You can’t do it with single-point 3D modeling and 2D drawing solutions. Learn how upgrading to an integrated 3D product development solution can help boost productivity, reduce costs, improve quality, foster collaboration and increase innovation.
Tags : 
designing, fourth, industrial, revolution
    
Dassault Systemes SolidWorks Corp.
Published By: KPMG     Published Date: Jul 10, 2018
Businesses are deploying innovative technologies at speed to secure competitive advantage. How can you manage risk effectively in the rush to the future? Read this guide to find out: • what internal and external risks emerging technologies present • which technologies present the biggest risks and the biggest opportunities • how to design a framework for emerging tech governance • what actions to take to put a new governance framework in place.
Tags : 
    
KPMG
Published By: BlackBerry Cylance     Published Date: Jul 02, 2018
The cyberattacks of 2017 proved more numerous, sophisticated, and ruthless than in years past. Threat actors, armed with knowledge stolen from the CIA and tools lifted from the NSA, demonstrated an elevated level of proficiency. WannaCry and NotPetya, two prominent threats from last year, successfully exploited these stolen assets in their assault on systems worldwide. As 2017 progressed, new opportunities developed in ransomware-as-a-service (RaaS), opening the gates of malware-for-profit to everyone. Advancements in fileless attacks provided new ways for threats to hide from once reliable detection methods. Malware features such as polymorphism continued to play a powerful role in evading traditional defenses. The victims of cybercrime ranged from private businesses to the fundamental practices of democracy. France and the United States saw significant data breaches during their recent presidential elections. Several high-profile companies lost their customers’ personally identifiable information to cyberattacks, blemishing their brands and costing them untold millions in recovery operations. This report contains an overview of the threat trends and malware families Cylance's customers faced in 2017. This information is shared with the goal of assisting security practitioners, researchers, and individuals in our collective battle against emerging and evolving cyberthreats.
Tags : 
cyber attacks, cia, nsa, wannacry, notpetya
    
BlackBerry Cylance
Published By: BlackBerry Cylance     Published Date: Jul 02, 2018
SE Labs tested CylancePROTECT® in an offline environment against major threats that subsequently appeared in the wild. The test explores the product’s ability to prevent new threats from attacking endpoint systems successfully. CylancePROTECT contains technology designed to identify and block malware using what it claims to be an “artificial intelligence” (AI) model. This model can be updated over time. However, in this test we used the model created in May 2015 and did not permit further updates so that the software was unable to receive new models or edit the existing one. The test exposed systems protected by this older version of CylancePROTECT to very impactful threats discovered and reported widely after May 2015. In this way, the test shows to what extent the product was able to predict how future threats would appear. This “Predictive Advantage” (PA), the advantage that users of the product have against future adversaries, is presented in this report.
Tags : 
malware, predictive, test, response
    
BlackBerry Cylance
Published By: Reputation.com     Published Date: Jun 29, 2018
HCAHPS is the barometer for understanding a patient’s hospital experience. But can you predict the outcome of your patient satisfaction surveys by reading online reviews from past and present patients? And more importantly, does improving your hospital’s online reputation improve HCAHPS scores? Yes. Reputation.com’s Data Science team, led by Brad Null, Ph.D, analyzed two years of HCAHPS hospital survey data from The Centers for Medicare and Medicaid Services, across more than 4,800 hospitals. The team reviewed the data alongside online reviews, ratings and rankings for those same hospitals, and made some significant discoveries: • Online reviews provide early warning of issues that may impact patient experience, giving hospitals the opportunity to identify and address those issues before patient satisfaction scores suffer. • By continually monitoring, managing, requesting and responding to patient reviews, a healthcare organization can address negative feedback that impacts HCAHPS resu
Tags : 
    
Reputation.com
Published By: IBM     Published Date: Jun 29, 2018
IBM LinuxONE™ is an enterprise Linux server engineered to deliver cloud services that are secure, fast and instantly scalable. The newest member of the family, IBM LinuxONE Emperor™ II, is designed for businesses where the following may be required: • protecting sensitive transactions and minimizing business risk • accelerating the movement of data, even with the largest databases • growing users and transactions instantly while maintaining operational excellence • accessing an open platform that speeds innovation
Tags : 
    
IBM
Published By: Epson     Published Date: Jun 22, 2018
The U.S. workplace is undergoing one of its largest transformations in the past 40 years. Although the magnitude of this evolution is difficult to notice when viewed in short time frames, by 2020, the percentage of employees in the workplace from the Baby Boom and Millennial generations will have completely reversed from the composition in 2010, with Millennials increasing to 50% of the U.S. workforce and Boomers decreasing to 25%. Because of their size, these generations already exercise significant influence on the workplace and will undoubtedly impact the nature of work well into the future.
Tags : 
    
Epson
Published By: Epson     Published Date: Jun 21, 2018
Solvent printing is the perfect solution for signs, vehicle wraps, and many other print applications. Solvent inks produce top-quality graphics, enabling printing service providers (PSPs) to maintain high-volume output and lower production costs while providing their customers superior color gamut and accuracy. Although solvent inks provide great performance and have many additional bene ts, they come with one frustrating work ow drawback: the delays PSPs experience by having to wait for solvent ink to dry, particularly when the application requires lamination. A new breakthrough solvent ink technology solves this problem by reducing print curing time by at least 75% of the 24 hour waiting period normally recognized by media manufacturers and industry specialists. These new solvent inks make it possible for PSPs to laminate solvent prints on the same day they are printed. PSPs can achieve high image quality without sacri cing valuable time, plus they can avoid clutter and reduce spa
Tags : 
    
Epson
Published By: AWS     Published Date: Jun 20, 2018
Data and analytics have become an indispensable part of gaining and keeping a competitive edge. But many legacy data warehouses introduce a new challenge for organizations trying to manage large data sets: only a fraction of their data is ever made available for analysis. We call this the “dark data” problem: companies know there is value in the data they collected, but their existing data warehouse is too complex, too slow, and just too expensive to use. A modern data warehouse is designed to support rapid data growth and interactive analytics over a variety of relational, non-relational, and streaming data types leveraging a single, easy-to-use interface. It provides a common architectural platform for leveraging new big data technologies to existing data warehouse methods, thereby enabling organizations to derive deeper business insights. Key elements of a modern data warehouse: • Data ingestion: take advantage of relational, non-relational, and streaming data sources • Federated q
Tags : 
    
AWS
Published By: Dassault Systèmes     Published Date: Jun 19, 2018
A&D manufacturers and their suppliers now depend more than ever on global supply chains. As they reach across time zones, languages and cultures, supply chains have to work around challenges that build up costs and drag down production schedules. Communication between distributed engineering and production centers can be labored and error-prone. These problems are often compounded by repetitive programming, incomplete simulations, time-intensive production methods, and concern that the shop floor may not be working with current data. Ideally, global companies should be able to design products at any location and produce them at selected sites, with all stakeholders from design to the shop floor working concurrently from a single unique global data source. Understand how manufacturing companies can deliver machined parts faster and increase revenue by reducing costs – despite operating globally across time zones and cultures.
Tags : 
    
Dassault Systèmes
Published By: Dassault Systèmes     Published Date: Jun 19, 2018
As more companies compete for business, Original Equipment Manufacturers (OEMs) increasingly demand higher production rates and greater production flexibility from suppliers. If smaller-sized companies want to compete, they need the right tools and latest technology. NC Machining manufactures should ask three primary questions when considering the tools to improve competitiveness and implement Lean practices: • Do the tools provide the means for improved collaboration between engineering and manufacturing, and incorporate manufacturing best practices? • Can all data and program information reside in one database or platform that is accessible concurrently by all enterprise stakeholders—from design engineering to the shop floor? • Is it possible to perform real-time multi-disciplinary simulations to improve performance and manufacturing targets? Discover how to optimize your NC Machine Shop Production, minim
Tags : 
    
Dassault Systèmes
Published By: Dassault Systèmes     Published Date: Jun 19, 2018
Robot programmers frequently find it challenging to deliver material handling, arc welding, spot welding, or drill and riveting programs that work with certainty on the first run. Because robot programming is not part of the design phase, they are forced to implement fixes and workarounds on the shop floor. Costs escalate as production cycles expand and changes are made without knowledge of the shop floor impacts. DELMIA Robotics on the Dassault Systèmes 3DEXPERIENCE platform delivers high quality, collision-free programs in the native robot language with no need for intervention on the shop floor. In the virtual world, programmers and designers work in concert to create the most productive tooling operations and robot cycle times. Programming can move ahead independently without interrupting production, and robot programs perform predictably the first time. Costs of programming and production are significantly reduced, and products move to market more quickly. Learn how offline robot
Tags : 
    
Dassault Systèmes
Start   Previous    3 4 5 6 7 8 9 10 11 12 13 14 15 16 17    Next    End
Search      

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.