Cookie policy: This site uses cookies (small files stored on your computer) to simplify and improve your experience of this website. Cookies are small text files stored on the device you are using to access this website. For more information on how we use and manage cookies please take a look at our privacy and cookie policies. Some parts of the site may not work properly if you choose not to accept cookies.

sections
 

rpo

Results 1 - 25 of 2720Sort Results By: Published Date | Title | Company Name
Published By: Procore     Published Date: Jun 25, 2019
Did you know that more than 1.2 billion people use Microsoft Office? That’s one in 7 people. A huge portion of the world’s economy is managed through it: from small businesses all the way up to Fortune 500 corporations. Despite its popularity, Excel has its fair share of critics. What originated as rumblings among IT professionals and tech blogs, has quickly trickled into major business and technology publications. Some might think it harsh, but we want to show you the risks of using Excel in your business and help you understand how you can protect yourself, your company and your data from what Forbes refers to as ‘the most dangerous software on the planet’.
Tags : 
    
Procore
Published By: Silverpop     Published Date: Sep 19, 2011
The most successful marketers will be those who stand out by infusing their content with a more human feel. Here are five tips and tactics guaranteed to strengthen your messages and delight your subscribers.
Tags : 
silverpop, humanizing content, personal attention, social media
    
Silverpop
Published By: Silverpop     Published Date: Sep 19, 2011
Most marketers make some effort to take advantage of the big buying season, but have your initiatives started getting more lukewarm than a neglected cup of hot cocoa? This season, to really maximize your revenue, freshen up your campaigns by adding some new twists to your traditional holiday marketing initiatives.
Tags : 
silverpop, marketing, holiday twists, revenue
    
Silverpop
Published By: DellEMC and Intel®     Published Date: Oct 25, 2017
Now is the time to make the move to All-Flash. With the right combination of performance, price and density options, our broad portfolio puts flash within reach for any size organization, making 2016 The Year of the All-Flash Data Center. Reduce storage costs and complexity with reliable, low-latency performance — discover how Dell EMC All-Flash storage solutions powered by Intel® can modernize your data center today. Intel Inside®. Para una productividad extraordinaria. Ultrabook, Celeron, Celeron Inside, Core Inside, Intel, Intel Logo, Intel Atom, Intel Atom Inside, Intel Core, Intel Inside, Intel Inside Logo, Intel vPro, Itanium, Itanium Inside, Pentium, Pentium Inside, vPro Inside, Xeon, Xeon Phi e Xeon Inside são marcas comerciais da Intel Corporation ou de suas subsidiárias nos EUA e / ou em outros países
Tags : 
ultrabook, celeron, celeron inside, core inside, intel, intel logo, intel atom, intel atom inside
    
DellEMC and  Intel®
Published By: Workday     Published Date: Jul 05, 2019
"Upgrading your ERP system can be vital to your organisation's survival in this era of disruption. This Gartner report offers actionable advice for IT leaders looking to keep pace with innovation, such as defining your ERP strategy goals and incorporating AI that can drive business value. Read now."
Tags : 
workforce-technologie, digitale strategie
    
Workday
Published By: Silverpop     Published Date: Sep 19, 2011
To gain a better understanding of how today's marketers are using-and plan to use-various mocial mediums to communicate with customers, Silverpop polled more than 500 online marketers regarding their use of social, email, mobile and local forms of communication.
Tags : 
silverpop, marketing, customer communication, social media
    
Silverpop
Published By: IBM     Published Date: May 23, 2018
IBM Planning Analytics is the fast, flexible, planning solution that helps you align financial plans with corporate objectives linked to operational tactics and market events. In this quick, 10- minute guided demo, you’ll get hands-on experience with IBM Planning Analytics by building a book for revenue planning. You’ll play the role of a financial planner and learn how to: • Create a book for revenue planning in Planning Analytics Workspace • Adjust the plan by increasing sales through an online channel by 20% • Review the impact of your changes on net profit
Tags : 
ibm planning analytics, revenue planning, income statement
    
IBM
Published By: Sage People     Published Date: Mar 07, 2018
Sage provides an enterprise-level business management solution for services operations; these solutions assist Sage customers with core financial and supply chain management functionality. Sage commissioned Forrester Consulting to conduct a Total Economic Impact™ (TEI) study and objectively examine the potential return on investment (ROI) that services organizations may realize by deploying its Enterprise Management solution as part of Sage Business Cloud. The purpose of this study is to provide readers and prospects with a framework to evaluate the potential financial impact of the Enterprise Management solutions on their services organizations. To better understand the benefits, costs, and risks associated with this investment, Forrester conducted in-depth interviews with six Enterprise Management for Services organizations customers, each with at least two to three years of experience using Enterprise Management. For this TEI study, Forrester has created a composite Organization to
Tags : 
    
Sage People
Published By: ForeScout     Published Date: Aug 14, 2012
The What, Why and How to Employ NAC to Apply Guest Networking, BYOD (Bring Your Own Device) and Endpoint Security Policies. Many of today's endpoints are neither known nor protected. According to Gartner, enterprises are only aware of 80 percent of the devices on their network. Those 20 percent of unknown devices are inside the perimeter of the network, are unmanaged and provide users with access. They are small, varied and highly mobile, and they are loaded with their own applications, can act as WAPs, and often contain outdated firmware or are jailbroken. Even as the devices are accessing personal applications on the web, they are also accessing corporate resources such as e-mail-all from the very same unmanaged devices, which have not been vetted by the security organization. Smartphones, notebooks, netbooks, iPads, e-readers, gaming consoles and more-the list of personal devices attempting access to employer networks seems to grow every day in what's come to be known as the BYOD (Bring Your Own Device) era in networking.
Tags : 
pad, mine, enabling, secure, personal, mobile, device, use
    
ForeScout
Published By: IBM     Published Date: Apr 20, 2017
Security from design through deployment. Mobile devices are now a reality in many organizations. Building on Mobile Device Management (MDM) and Mobile Application Management (MAM), organizations are increasingly developing their own enterprise apps for specific job tasks to improve productivity, business partnerships, customer satisfaction and bottom-line performance. However, to achieve these benefits, it is imperative that mobile security best practices are incorporated throughout the lifecycle of the application.
Tags : 
    
IBM
Published By: PC Mall     Published Date: Dec 07, 2011
This white paper discusses critical best practices including approaches for both policy and technology.
Tags : 
sonicwall, mobile security, mobile phone security, mobile device security, mobile device management, mobile antivirus, data loss prevention, malware
    
PC Mall
Published By: LifeSize, a division of Logitech     Published Date: Aug 19, 2011
Incorporating video collaboration as a standard business practice can result in tighter employee and business partner relationships, increased productivity, faster decision-making and many more lucrative bene?ts.
Tags : 
lifesize, best practices, video collaboration, standard business practice, productivity, video conferencing technology, virtualization, communications objectives
    
LifeSize, a division of Logitech
Published By: CDW     Published Date: Feb 27, 2015
The real test of any SAM system goes beyond creating a one-time Effective Licensing Position (ELP) for a given software publisher. To be truly valuable, the SAM solution has to have the ability to manage change. Being able to work from a dependable list of software that has been approved by, and which also serves the business, means that finite IT & SAM resources are not wasted through the support of legacy software that might be deemed redundant, and should keep a company on track technically by not becoming dependent on aging software. This 10 –Minute Guide from SAM experts at Snow Software will show how to establish and maintain a Software Catalog for the purpose of ensuring that your software estate remains relevant and fit for its business purpose.
Tags : 
software management, sam, software security, cloud computing, enterprise content management, business intelligence, office productivity apps, network security
    
CDW
Published By: Cyveillance     Published Date: Apr 10, 2015
In today’s security landscape, more vendors than ever are offering what is purported to be “threat intelligence.” Although security experts often have different definitions for this term, one thing many of them can agree on is that an intelligence-led approach to security – that is, putting threat intelligence to real-world use – is critical to protecting organizations. If the goal of an intelligence-led security strategy is to help organizations be more proactive in finding and preparing for threats to physical and digital assets, it’s crucial to define and understand exactly what threat intelligence means, and separate fact from fiction. In this whitepaper, we dispel some common myths about threat intelligence.
Tags : 
myths, cyber, threat, intelligence, fact, fiction, big data, cloud
    
Cyveillance
Published By: Diligent     Published Date: Jul 10, 2017
The Corporate Secretaries International Association (CSIA) is a Geneva-registered global organisation whose mission is ‘‘to develop and grow the study and practice of Secretaryship, to improve professional standards, the quality of governance practice and organisational performance.’’ CSIA was established in 2010 as a not-for-profit organisation committed to improving the recognition and understanding of the practice of corporate secretaryship and the role of the corporate secretary. Its structure as an international federation of professional bodies enables it to effectively represent those practitioners who work at the frontline of governance.
Tags : 
communication, client-agency relationships, budgeting, digital marketing, personal relation improvement, resource management
    
Diligent
Published By: Diligent Corporation     Published Date: Jun 29, 2015
This white paper shows how board portals can help directors and company secretaries be more effective and secure in how they communicate.
Tags : 
board portal, advantages board portal, sharing documents, sharing information, benefits of board portals, electronic board solution, electronic board meeting, electronic board papers
    
Diligent Corporation
Published By: Bridgeline Digital     Published Date: Sep 26, 2013
iAPPS Content Manager is the premier business marketing solution to drive Digital Engagement in the CMS marketplace. iAPPS Content Manager allows businesses to personalize their online interactions with customers in an increasingly digital world. The solution combines business purpose and end-user context to attract customers, deliver compelling content, and optimize conversion rates.
Tags : 
cms, content manager, content management system, digital engagement
    
Bridgeline Digital
Published By: Bridgeline Digital     Published Date: Nov 20, 2013
iAPPS Content Manager is the premier business marketing solution to drive Digital Engagement in the CMS marketplace. iAPPS Content Manager allows businesses to personalize their online interactions with customers in an increasingly digital world. The solution combines business purpose and end-user context to attract customers, deliver compelling content, and optimize conversion rates.
Tags : 
    
Bridgeline Digital
Published By: Cielo     Published Date: Mar 04, 2016
"Outsourcing" often gets a bad name. But when it comes to your recruitment function, partmering with an outside expert can successfully transform your approach to talent acquisition and deliver measurable business results faster.
Tags : 
cielo, talent practices, talent acquisition, recruitment, recruitment process outsourcing, rpo, outsourcing, hiring
    
Cielo
Published By: Identity Engines     Published Date: Mar 24, 2008
For over a decade now, RADIUS servers have been a mainstay of dial-up and VPN access control. The rather inconspicuous RADIUS server, perhaps better known as that beige, general-purpose PC collecting dust in the corner of your data center, has proved sufficient for performing basic duties like validating passwords and granting network access.
Tags : 
radius, servers, idengines, id engines, identity engines, vpn
    
Identity Engines
Published By: Lola Travel Company     Published Date: Jan 24, 2019
A well-thought-out, easy-to-create and easy-to-enforce business travel policy will contribute to transparency, a cultural mecca in any organization. By fostering fairness, a mutually beneficial corporate travel policy provides company travelers with the freedom they desire, without sacrificing company governance and control. As an HR or Finance leader, you've answered countless repetitive questions about per diems, business class vs. economy class, and hotel restrictions. A formalized travel policy is not as hard to create as it may seem, and it will eliminate the stress for both you and your travelers. In this ebook, you will learn the 10 easy steps to take in order to create a win-win corporate travel policy that works for you and your team.
Tags : 
    
Lola Travel Company
Published By: AppDynamics     Published Date: Sep 20, 2017
DevOps has taken the IT world by storm over the last few years and continues to transform the way organizations develop, deploy, monitor, and maintain applications, as well as modifying the underlying infrastructure. DevOps has quickly evolved from a niche concept to a business imperative and companies of all sizes should be striving to incorporate DevOps tools and principles.
Tags : 
cio, delivers software, business, metrics, automation, digital transformation, appdynamics
    
AppDynamics
Published By: Silverpop     Published Date: Jun 15, 2012
Driving traffic to the company website is a primary goal for many marketers, but what do you do when visitors leave without converting? Learn how retargeting can help keep your brand top of mind, entice contacts to return and take action, and increase revenue.
Tags : 
marketing, silverpop, social media, social marketing, mobile marketing, social media campaigns, retargeting, online
    
Silverpop
Published By: Silverpop     Published Date: Sep 19, 2011
10 tips for expanding your behavioral knowledge base, shaping your content and leveraging timing so you deliver the ideal message at the perfect moment, plus real-life examples of how companies have made it happen.
Tags : 
silverpop, marketing, right message, email, social media
    
Silverpop
Published By: Silverpop     Published Date: Jun 15, 2012
If your contact base doesn't continue to grow, how can you expect your business to grow? Learn how you can help expand your company's marketing database with ideas for collecting data on-site, tapping social media, driving opt-ins via transactional emails and more.
Tags : 
marketing database, silverpop, marketing, marketing campaigns, reach, customers
    
Silverpop
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.