Cookie policy: This site uses cookies (small files stored on your computer) to simplify and improve your experience of this website. Cookies are small text files stored on the device you are using to access this website. For more information on how we use and manage cookies please take a look at our privacy and cookie policies. Some parts of the site may not work properly if you choose not to accept cookies.

sections
 

attention

Results 251 - 275 of 278Sort Results By: Published Date | Title | Company Name
Published By: CA Technologies EMEA     Published Date: May 24, 2018
Aujourd’hui, le numérique est omniprésent : Cloud, appareils mobiles, réseaux sociaux et Internet des objets modifient notre manière de travailler et de nous divertir. Ce monde numérique en évolution rapide redéfinit également la relation entre l’entreprise et ses clients, ces derniers exigeant désormais de leurs marques préférées toute la commodité d’une expérience interactive. La sécurité est également au cœur des préoccupations. Les risques croissent à mesure qu’augmente le volume de données sensibles échangées entre les entreprises et leurs clients.Cette transformation a aussi pour effet d’amplifier la concurrence. Comme le remarque l’analyste Mark Raskino, « L’une des conséquences est que tous les acteurs se mettent à réévaluer leurs stratégies à peu près au même moment ; tous réalisent en même temps la formidable puissance du numérique. La concurrence est donc inévitable. »
Tags : 
    
CA Technologies EMEA
Published By: CA Technologies EMEA     Published Date: Oct 19, 2017
Aujourd’hui, le numérique est omniprésent : Cloud, appareils mobiles, réseaux sociaux et Internet des objets modifient notre manière de travailler et de nous divertir.
Tags : 
api, application programming interface, psd2, open banking, json, github, api gateway, apim, api management, full api lifecycle, restful web services, api portal, gestion des api, portail api, oauth, openid connect, rest json, soap xml, api analytics, orchestration transformation
    
CA Technologies EMEA
Published By: Engage2Excel     Published Date: Feb 11, 2019
The war for talent is a term that was coined by Steven Hankin of McKinsey & Company in 1997 to refer to an increasingly competitive landscape for recruiting and retaining talent. Today, this “war” has escalated to new heights, commanding the attention of CEOs across all industries. According to research recently published by McKinsey, more than three-quarters of Fortune 500 CEOs do not believe their companies are effective at attracting highly talented people. Of those CEOs who do consider their companies successful at attracting top talent, only 7% believe they are effective in retaining them. In today’s hyperconnected labor market, recruitment and retention are not separate problems; they are two sides of the same coin. Companies that have adopted integrated strategies for recruitment and retention have a significant competitive advantage. But according to McKinsey’s data, this group represents only a small fraction of the Fortune 500. The rest of the HR universe is under tremendous
Tags : 
    
Engage2Excel
Published By: Oracle     Published Date: Apr 28, 2014
Is innovation getting the right attention at your company?
Tags : 
oracle, innovation, innovation management
    
Oracle
Published By: VMware AirWatch     Published Date: May 19, 2016
We work at home. We take conference calls in the backseat of a taxi. We even tap out emails from 30,000 feet. Mobility is radically redefining the way we work, because it’s redefining where and when we can work. It’s why Keith Perske, executive managing director of workplace innovation for Collier’s, thinks it’s time to adopt a new description of the workplace: “Today’s workplace is an integrated set of locations, technology, programs and work practices that connect people and enable employees to contribute and be productive. That’s the new workplace definition.” And with the emergence of this modern workplace, users are expecting a mobile experience that’s simple, convenient, and a boon to their productivity. In order to deliver on these expectations, IT organizations are making business mobility a priority in their investment decisions. Which is why we’ve identified five potent mobility trends that warrant attention and also present opportunities to transform the enterprise
Tags : 
technology, innovation, work practices, best practices, mobility, trends
    
VMware AirWatch
Published By: Trend Micro     Published Date: Oct 12, 2012
The consumerization and mobilization of enterprise IT is a real, irreversible, and unstoppable movement that needs immediate attention and innovative solutions.
Tags : 
information technology, security, trend micro
    
Trend Micro
Published By: Selligent Marketing Cloud     Published Date: Mar 07, 2018
The General Data Protection Regulation – or GDPR – is a European Union (EU) law that protects the rights of individuals with respect to their data. Adopted as an EU law in April 2016, organizations that hold data about any resident of the EU must be compliant by May 2018. With attention-grabbing fines of €20 million or 4% of global annual turnover, GDPR commands attention at the highest levels. And despite the “legalese” that compliance suggests brands utilize, the brands that balance legal compliance with a human approach will turn GDPR to their advantage. This white paper provides a series of actions you can take to make the most of GDPR to both enhance your customer relationships and mitigate risk.
Tags : 
data driven marketing, gdpr, compliancy, data privacy, customer data, omnichannel, multichannel, automation, loyalty, crm, marketing, personlisation, campaign management, customer marketing, retention marketing, marketing cloud, marketing solution, marketing platform, artificial intelligence, prediction learning
    
Selligent Marketing Cloud
Published By: Palo Alto Networks     Published Date: Apr 25, 2017
Security practitioners and threat actors are constantly developing new techniques to gain advantages over the other. In recent years, security teams have stepped up their approaches to protecting their infrastructure by fortifying their network perimeter defenses, building up protections against advanced malware, upgrading vulnerable operating systems, automating the delivery of patches to stop exploits, and developing counter-measures to spot intruders. The threat actors looking to circumvent these measures are shifting their attention toward the next weakest link in the security chain – the user.
Tags : 
    
Palo Alto Networks
Published By: Tableau Software     Published Date: Dec 12, 2014
Congratulations: you are part of a small but growing group that’s taking advantage of the power of visualization. However, bringing your visualizations from “good” to “great” takes time, patience, attention to detail, and some basic knowledge of visual analysis best practices.
Tags : 
tableau, visual analysis, visualization, best practices, data management
    
Tableau Software
Published By: Waymedia     Published Date: Oct 23, 2008
Millions of  handsets are sold around the world daily. Handsets are by far the preferred platform of communication there is.  People spend more time using their mobile phones than any other device or gadget, and they pay special attention to everything stored in those handsets. In a few words:  If brands want to have a presence in their consumers’ environment, and if they want their message to be heard and seen, then they imperatively need to put some value content on users mobile phones. Mobile marketing is typically understood as SMS Marketing, which is managed from a distant point and it impacts the user at random times.
Tags : 
waymedia, mobile marketing, sms
    
Waymedia
Published By: McAfee     Published Date: Feb 25, 2015
This report summarizes key steps organizations can take to harden their infrastructure, improve their responsiveness, and actively disrupt targeted attacks by paying attention IoAs
Tags : 
siem, real-time siem, attacks, real-time security, mcafee, attack prevention, targeted attacks, siem solution, siem security, security, security intelligence solution
    
McAfee
Published By: Oracle APAC ZO OD Prime Volume HCM ABM Leads June 2017     Published Date: Jul 12, 2017
As we turn our attention to 2017, HR leaders have their destinies and those of the modern workforce firmly in their hands. Businesses have never faced such extreme levels of uncertainty. On a macroeconomic level, they are still unclear on how and when the UK’s “Brexit” from Europe will proceed while trying to predict how a political outsider in the White House will affect global markets. Meanwhile, they are seeing their success threatened by disruptive upstarts and their operating models challenged by employees’ cry for new ways of working.
Tags : 
human resources, employee engagement, talent management
    
Oracle APAC ZO OD Prime Volume HCM ABM Leads June 2017
Published By: VMware     Published Date: Oct 12, 2018
Since Hyper Converged Infrastructure (HCI) emerged as a breakthrough technology, it has continued to gain taction as it has truly delivered on its promise. It has helped organizations optimize resources, reduce complexity, lower costs, increase agility and accelerate development cycles, as well as provide a seamless path to hybrid cloud. These are just a few of the key benefits causing IT leaders pay close attention to HCI and look at ways to use it to power key initiatives such as digital transformation. As IT leaders continue to embrace HCI and the market is expected to grow at a compound annual rate of 42% through 2023, the future is happening now. Submit the form to read our latest whitepaper and discover 5 powerful HCI case studies around Business critical applications, Hybrid Cloud/Multicloud, Disaster recovery, Edge computing, Container and App Development.
Tags : 
    
VMware
Published By: McAfee     Published Date: Feb 25, 2015
This report summarizes key steps organizations can take to harden their infrastructure, improve their responsiveness, and actively disrupt targeted attacks by paying attention IoAs.
Tags : 
siem, real-time siem, attacks, real-time security, mcafee, attack prevention, targeted attacks, siem solution, siem security, security, security intelligence solution
    
McAfee
Published By: McAfee     Published Date: Feb 25, 2015
This report aggregates front-line experience to present the key steps organizations can take to harden their infrastructure, improve their responsiveness, and actively disrupt targeted attacks by paying attention IoAs.
Tags : 
siem, real-time siem, attacks, real-time security, mcafee, attack prevention, targeted attacks, siem solution, siem security, security, security intelligence solution
    
McAfee
Published By: PGi     Published Date: Oct 01, 2018
Large companies have made considerable investments in video webcasting to their external audiences. Now they need to turn their attention toward internal communications—for reasons that can enhance their competitiveness and bottom line. As companies undergo a digital transformation, the playing field becomes increasingly technology-democratized and fierce. In this climate, an organization’s employees are one of its most, if not the most, valuable competitive differentiators. And the same energy and focus that companies put toward reaching their external audiences needs to go toward reaching and engaging their employees. Here’s where strong internal communications can pay big dividends. High-performing companies recognize the significant impact effective internal communication has on their business. Chief among the gains are: • Increased productivity. • Improved brand trust and company loyalty among employees. • Increased company alignment within and between departments and remote loc
Tags : 
    
PGi
Published By: Perimeter     Published Date: Jul 17, 2007
Click here and get a head start on these Hackers by learning how they are turning their attention to new ways to deliver viruses, crash unsuspecting users’ computers, and steal social security numbers, passwords, bank account numbers, etc.
Tags : 
vulnerability, hacker, hacker detection, hacker prevention, ips, intrusion prevention, intrusion detection, ids, spam, spam filtering, security policies, gateway av, risk management, perimeter, perimeter esecurity
    
Perimeter
Published By: Cohesity     Published Date: Nov 20, 2018
Today, hybrid cloud is increasingly the norm, and enterprises are challenged with ways to have visibility, manage and make use of all this data – both on-premises and in the cloud. While much attention has been given to primary data affecting mission-critical workloads, data for secondary workloads – backup, test/dev, disaster recovery, and archiving to name a few – have become siloed the same way application data has, leading to multiple point solutions to manage an increasing amount of data. This white paper looks at the evolution of these challenges and offers practical advice on ways to store, manage and move secondary data in hybrid cloud architectures while extracting the hidden value it can provide. Download to learn more.
Tags : 
    
Cohesity
Published By: Quocirca     Published Date: Apr 09, 2008
Today, many organizations are increasingly reliant on software application development to deliver them competitive edge. Simultaneously, they are progressively opening up their computer networks to business partners, customers and suppliers and making use of next-generation programming languages and computing techniques to provide a richer experience for these users. However, hackers are refocusing their attention on the vulnerabilities and flaws contained in those applications.
Tags : 
quocirca, application security, security
    
Quocirca
Published By: Citrix Systems     Published Date: Feb 10, 2016
An ADC is one of the most critical elements of an organization’s datacenter and cloud architecture. As you evaluate ADC solutions, it’s essential to pay close attention to their ability to address the most important challenges in your environment. This paper highlights nine key datacenter and cloud architecture challenges that NetScaler helps solve more effectively than F5 to help you.
Tags : 
    
Citrix Systems
Published By: eDataSource     Published Date: Jun 15, 2015
Among the many useful elements of eDataSource’s visibility into the email activity of 50,000 brands is what we can see of how each subscriber in an email marketer’s audience is being mailed by specific other brands. This view provides a picture of which other brands are competing against yours for attention in your audience’s inboxes.
Tags : 
    
eDataSource
Published By: Inspirus     Published Date: Oct 04, 2017
Learning and development plays a critical role in any organization. Although learning has been unequivocally linked to high-performing organizations, we believe there hasn’t been enough attention paid to the lasting effects learning plays in engaging your workforce.
Tags : 
    
Inspirus
Published By: StoryDesk     Published Date: Jan 04, 2013
What makes for a winning iPad presentation app for sales teams? How can interactivity keep prospects' attention focused? How can you use technology to make your message more memorable? Learn the answers to these questions and more.
Tags : 
    
StoryDesk
Published By: Workday Nordics     Published Date: Sep 19, 2018
Auditing shouldn’t take your attention away from driving strategy and profitability. With a single cloud-based system for finance, you get compliance, controls, and audit capabilities all in one place. This streamlines the auditing processes and ensures security. Focus on business and let Workday do the rest.
Tags : 
workday, workday technology, digital strategy, financial auditing
    
Workday Nordics
Published By: HP Software     Published Date: Dec 16, 2015
Each year we explore the major trends and issues that consume IT and QA leaders' attention and then share the results to help you put the changes into context and plan how to respond.
Tags : 
testing, quality assurance, devops, qa transformation, enterprise applications
    
HP Software
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12    Next    End
Search      

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.