rate program

Results 51 - 75 of 252Sort Results By: Published Date | Title | Company Name
Published By: MuleSoft     Published Date: Apr 13, 2016
Today everything truly is connected to everything, and APIs are the connection mechanisms. Many companies are finding that their use of APIs has accelerated over the past 12 months, and that it will continue to accelerate during the next 12 months. APIs aren't really a new technology; they've actually been around for a long time. What is new is that they are in far broader usage today than they have been in the past. As of late 2015, the ProgrammableWeb API directory listed more than 14,000 APIs. When thinking about designing and managing APIs, a number of important questions arise. Why are APIs so well used and what effect would they have on your business? What is the impact of the expanding API economy on both providers and consumers? What are API tools and how can an investment in tools be an extremely cost efficient foundation for production grade API use cases?
Tags : 
best practices, business optimization, business management, application management, enterprise application, business intelligence, api management
    
MuleSoft
Published By: BAE Systems     Published Date: Jan 06, 2016
For most financial institutions, it’s no longer a question of ‘if’ but ‘when’ they’ll be attacked.. If you’re like most financial institutions, you have controls that identify breaches, but need proper procedures that’ll enable you to recover from such an event. In this presentation at the CUNA Technology Council Conference, Tom Neclerio, BAE Systems’ VP of Cyber Consulting Services, discusses the current threats across the financial marketplace and explores strategies for implementing a successful incident response program as outlined in the FFIEC’s cyber resilience guidance.
Tags : 
bae systems, applied intelligence, cyber security, cyber resilience, incident response, financial institution, data breach, cyber attack, ffiec, compliance, regulations, security challenges, regulatory compliance, cyber professional services, risk assessment, vulnerability, penetration testing, crimeware, phishing, critical infrastructure
    
BAE Systems
Published By: HotSchedules     Published Date: Feb 06, 2018
What could you be saving by implementing a learning management system? This guide will show you the provable return on investment in an eLearning strategy; how an LMS can help your business lower print costs, reduce employee turnover, positively impact sales, and much more. Whether you’re exploring the marketplace or building out your business case for online learning, this guide has the information you want. As you prepare to move to a new LMS consider Clarifi Talent Development, the learning and performance management system designed for today’s workforce. It is the choice for leading brands like Brinker, Newk’s and Subway. Unfortunately, many business owners either fail to see the value in ongoing training or don’t have the budget for it. Competition is fierce, margins are tight and learning programs can fall by the wayside. Sometimes the tried and true methods still get the job done. But all too often, on-the-job training is unengaging, expensive and inefficient.
Tags : 
market, training, onboarding, restaurants, employee
    
HotSchedules
Published By: HotSchedules     Published Date: Apr 17, 2019
It’s harder than ever for restaurants to retain employees. Hourly workers have more job opportunities, especially with the rise of on-demand work in the gig economy. Now, restaurateurs don’t just have to worry about employees leaving to work at other restaurants — they need to worry about them leaving the industry altogether. In order to fight this turnover, restaurants need to provide employees with clear development opportunities in the workplace. In this ebook, we’ll explore: • How restaurants can invest in their people through innovative training programs • The core aspects of developing an engaging development program in your business • Success stories from three industry leaders in the field of talent development
Tags : 
    
HotSchedules
Published By: Comdata     Published Date: Jul 05, 2017
The CEO’s signature is on the dotted line and you’ve convinced your executive team to implement a virtual credit card program, also known as ePayables. That is something to celebrate! After all, you have taken the first step in automating your AP processes, improving your profit margin and reducing paper checks. But don’t celebrate for too long; it’s time to get started on implementing your program so you can start reaping the rewards.
Tags : 
    
Comdata
Published By: Fiserv     Published Date: Mar 02, 2018
Corporate governance. Capital Requirements. Information Security. Identifying and measuring potential risks help you connect the dots to create a sound ERM program for your organization. In today’s environment of security regulations and requirements, organizations must take a comprehensive approach to ERM to identify and mitigate potential threats. Risk is cumulative, and unidentified weaknesses can quickly spiral out of control, resulting in costly solutions that can lead to reputational damage. The first step in designing a sound ERM program is to understand which components are needed and how to implement them. Ten Steps to Enterprise Risk Management: A Comprehensive Approach Reveals the Big Picture, provides a straight-forward approach to creating a reliable, yet flexible program to address existing threats with the ability to adapt to emerging ones. In the end risk management is everybody’s job – do you have a plan in place to help your employees manage unpredictable threats and
Tags : 
corporate governance, capital requirements, information security, erm program, enterprise risk management
    
Fiserv
Published By: Red Hat     Published Date: Jan 02, 2018
Organizations are at a strategic crossroads. According to IDC analysts,1 two-thirds of CEOs will center their corporate strategies around digital transformation initiatives. The goal of digital transformation is only partly to make existing functions more effective. The greater goal is to be able to do new things and use existing data in new, better ways. Yet, 72% of current IT spending2—and the focus of IT resources—is on maintaining existing systems. This creates tension between what needs to be done today and what should be done for the future. Middle-tier applications, according to IDC,3 are the core of a digital transformation strategy because they provide data integration, messaging, and application programming interface (API) management. Middle-tier applications also provide a platform for application development and management that can handle traditional enterprise applications and cloud-native, distributed applications. Specifically, a Java™ EE-based application platform can
Tags : 
    
Red Hat
Published By: IBM     Published Date: Jul 09, 2018
If your organisation carries out business in the European Union, then you may be aware that your life is about to become a lot more complicated starting in May 2018. That’s when the new EU General Data Protection Regulation (GDPR) will take effect. IBM is positioned to help you develop strategies to address the challenges of the GDPR. Our Pathways for GDPR readiness are phased programme engagement points and cognitive capabilities which can accelerate your journey. This new, stronger regulation will aim to harmonise data protection across all 28 EU Member States. In some cases, it will merely strengthen or enhance specific rights which are already in place under many local data privacy laws, whilst other rights and obligations will be introduced for the first time.
Tags : 
    
IBM
Published By: CheckMarx     Published Date: Apr 03, 2019
As new code deployments accelerate through wider adoption of DevOps methodology, maintaining software security is crucial to you and your customers. Is your software security program up to the challenge? If you’re not getting the most out of your software security program, our security experts may be able to diagnose your difficulties. We’ve created a list of specific recommendations on how to improve your program for better, faster results. We present to you “How to make your software security program successful: 10 Essential Best Practices.”
Tags : 
    
CheckMarx
Published By: Group M_IBM Q2'19     Published Date: Apr 08, 2019
Empowering the Automotive Industry through Intelligent Orchestration With the increasing complexity and volume of cyberattacks, organizations must have the capacity to adapt quickly and confidently under changing conditions. Accelerating incident response times to safeguard the organization's infrastructure and data is paramount. Achieving this requires a thoughtful plan- one that addresses the security ecosystem, incorporates security orchestration and automation, and provides adaptive workflows to empower the security analysts. In the white paper "Six Steps for Building a Robust Incident Response Function" IBM Resilient provides a framework for security teams to build a strong incident response program and deliver organization-wide coordination and optimizations to accomplish these goals.
Tags : 
    
Group M_IBM Q2'19
Published By: Group M_IBM Q2'19     Published Date: May 28, 2019
Liberty Mutual Insurance offers personal and commercial insurance to policyholders around the world. With more than 50,000 employees located in more than 60 countries, managing the corporate benefits program is a tremendous task. Matthew Vlieger, Manager of Finance and Analytics in the company’s Corporate Benefits Division, is responsible for analyzing member engagement within the various health plan offerings. He also provides insights to the strategy directors to help them identify areas for improvement.
Tags : 
    
Group M_IBM Q2'19
Published By: Group M_IBM Q4'19     Published Date: Sep 17, 2019
With the increasing complexity and volume of cyberattacks, organizations must have the capacity to adapt quickly and confidently under changing conditions. Accelerating incident response times to safeguard the organization's infrastructure and data is paramount. Achieving this requires a thoughtful plan- one that addresses the security ecosystem, incorporates security orchestration and automation, and provides adaptive workflows to empower the security analysts. In the white paper ""Six Steps for Building a Robust Incident Response Function"" IBM Resilient provides a framework for security teams to build a strong incident response program and deliver organization-wide coordination and optimizations to accomplish these goals.
Tags : 
    
Group M_IBM Q4'19
Published By: Amazon Web Services     Published Date: Jan 23, 2018
Although no enterprise will be forced to migrate its core enterprise applications to the cloud, enterprises are on the cusp of facing the fork in the road that leads to the cloud. The release of a jointly developed cloud-migration test program from SAP and AWS (Amazon Web Services) will help enterprises address the uncertainty that they will face in estimating the actual time and cost of a migration of HANA to the AWS cloud. Provided by: AWS & Intel
Tags : 
sap, aws, program, hana, cloud, migrations, ovum
    
Amazon Web Services
Published By: Cranfield University     Published Date: Jan 28, 2015
Learn how to become a successful strategist and improve your business performance.
Tags : 
how to become a successful strategist, improve your business performance, execute sustained business change, business programmes, becoming a strategist
    
Cranfield University
Published By: Oracle     Published Date: Apr 30, 2018
In today’s booming world of dining the competition for loyalty is fierce. In just one city block you might find half a dozen artisan coffee shops, independent diners and high-end restaurants all jostling for customers. Consequently it’s no surprise to find that customer loyalty programs sit at the heart of so many eateries’ business strategies. For cafés, diners and restaurants, repeat business is an imperative. One-off bookings are great, but it’s the regulars who sustain business. Frequent visitor stamps, booking priority, a free glass of wine, invites to one-off events – all these strategies keep customers coming back for more. But how hard are these programs really working for businesses?
Tags : 
restaurants, hospitality, business, customers, strategy
    
Oracle
Published By: Oracle OMC     Published Date: Nov 30, 2017
Innovative delivery and content is THE currency in advertising and only programmatic platforms can deliver the value to the advertiser to ensure the return on these immersive media formats. That movement happened quickly and brands had to still find a way to connect and with the accountability being included, could finally measure success based on more than recall or click through rate (CTR). Programmatic advertising provides for repeatable, automated advertising that allows for exponential success and accountability, which is precisely what advertisers historically were missing and continually seek.
Tags : 
    
Oracle OMC
Published By: Alere Wellbeing     Published Date: Sep 26, 2011
Alere Wellbeing evaluation and client feedback have shown that incentives are a successful part of a comprehensive tobacco control strategy. This brief defines what premium differentials and surcharges are and provides best practices from our clients.
Tags : 
alere, tobacco control strategy, free & clear evaluation, premium differential, surcharge, tobacco cessation program, quit for life program®, productivity, roi
    
Alere Wellbeing
Published By: Alere Wellbeing     Published Date: Oct 16, 2012
This white paper, based on a webinar presented by Dr. Robert F. Kushner, provides an overview of DASH, compares it to other top ranked diets, and offer insights into the evidence behind their design.
Tags : 
worksite wellness, weight loss programs, corporate weight loss programs, diabetes, alere, human resources, hr management
    
Alere Wellbeing
Published By: CEB     Published Date: Nov 21, 2013
How do you know if your organization has the talent it needs to execute on its strategy? Is your organization’s talent ready to perform in the new work environment? Are your talent development programs focused on the right people?
Tags : 
ceb, big data, big data intent, global workforce, organisational talent, business objectives, productivity, innovation, talent management, workforce skills, data-based analysis, future leaders, organisational risk, global skills, landscape of diversity, global availability
    
CEB
Published By: Epicor     Published Date: Jun 28, 2017
If you’ve started to think your lumber and building materials (LBM) business could be getting more from your software, it might be time for a change. Now is a great time to assess your current software, as recent technological innovations have offered up some very compelling reasons to take a look at the market. Epicor gives LBM businesses the tools they need to make the most informed software choices. This white paper provides 10 signs you’ve outgrown your current software, including: • You lack the resources and information to build strategic programs based on best practices • You have insufficient visibility and insight to tap into new opportunities • You spend a lot of time and money performing what should be routine tasks If any of these statements apply to your business, it’s probably time to make a switch. Read the white paper to see the other signs, and don’t let your software systems hold you back from taking your LBM business where you want it to go.
Tags : 
lumber, building materials, lbm, erp, bistrack, building materials distributors, lumber distributors, lumber manufacturers
    
Epicor
Published By: STANLEY Healthcare     Published Date: Mar 24, 2015
Patient falls were the largest category of adverse events reported at Barnes- Jewish Hospital. Progress in meeting targets for reducing falls and fall injury rates had been static despite multiple efforts. One component of the hospital’s Fall Reduction Program was a portable bed exit alarm system—a Bed-Check Classic-Check® control unit (CU) with Sensormat® pressure sensitive mat— widely used throughout the hospital. Due to high demand by staff, the CU was often not available, resulting in delayed care delivery and staff dissatisfaction. Loss or damage due to handoff between staff and the central service department resulted in additional resources and costs. Read this case study to learn how Barnes-Jewish Hospital implemented Bed-Check® Fall Management Solution as a part of their Fall Reduction Program, resulting in decreased fall injury rates and improved staff satisfaction.
Tags : 
patient falls, fall reduction, fall injury, healthcare, hospital, information technology, practice management
    
STANLEY Healthcare
Published By: MobileIron     Published Date: Feb 14, 2019
What if you could protect your company from data loss before a mobile attack occurs? The reality is that mobile threats are everywhere and the risks are escalating. But in the world of modern work, how can IT protect mobile devices while allowing users easy access to corporate data on a device of their choice anytime, anywhere? Watch this webinar on demand to learn how mobile threat defense is reducing risks amongst some of the largest mobility programs in the world. We will reveal: -How mobile attacks are targeting corporate data, bypassing traditional IT defenses -Why threat detection and remediation protects your data, without disrupting user productivity -Why mobile threat detection is an essential component of a layered defense architecture With one app, MobileIron Threat Defense delivers unparalleled mobile threat detection and remediation on-device without network connectivity required, and no need for users to take any action.
Tags : 
    
MobileIron
Published By: VMware     Published Date: May 10, 2017
The next era of BYOD has arrived and IT departments are now thinking about BYOD as a strategic value-add rather than a threat that needs to be controlled. Today’s savviest enterprises are leveraging BYOD as a tool to drive mobile accessibility, increase IT oversight and enable employees to complete a business task at a moment’s notice, on any device. Download this eBook to reveal the five best practices business leaders and IT professionals are taking to turn their BYOD programs into major productivity gains.
Tags : 
    
VMware
Published By: IBM Watson Health     Published Date: Nov 20, 2017
Strong patient engagement leads to improved population health, a better experience of care, and lower healthcare costs. Even so, few healthcare organizations have a well-defined patient engagement strategy, according to research by IBM Watson Health. Read this whitepaper and learn why healthcare organizations should create a comprehensive patient engagement strategy, what each component of such a strategy entails and how to take the steps required to build an effective patient engagement program. From patient portals, telemedicine, and mobile health, to data sharing, automation tools and cognitive computing, you’ll gain the ability to leverage valuable tools for increasing patients’ involvement in their own health outcomes.
Tags : 
patient outreach, patient relationship management, patient experience, population health management, cognitive computing, data, data sharing, healthcare costs, care, patient engagement, patient engagement strategy, patient portals, mobile health, telemedicine, automation tools, health outcomes
    
IBM Watson Health
Published By: Reputation.com     Published Date: Feb 26, 2018
There’s no getting around it: Managing your online reputation is critical to a successful marketing strategy, as well as to the health and continued growth of your business. According to recent research, 87 percent of Americans say they trust online reviews to help them choose which local businesses or services will receive their hard-earned dollars. What’s more, eCommerce agency Corra found 88 percent of consumers have avoided a company because of a bad review. As consumers increasingly rely on online reviews, businesses that leave their online reputation to chance are at a severe disadvantage versus those with solid Online Reputation Management (ORM) programs in place. But where do you start?
Tags : 
    
Reputation.com
Start   Previous    1 2 3 4 5 6 7 8 9 10 11    Next    End
Search      
Already a subscriber? Log in here
Please note you must now log in with your email address and password.