employees

Results 201 - 225 of 1800Sort Results By: Published Date | Title | Company Name
Published By: Cisco     Published Date: Jan 05, 2015
Midsize organizations strive for success. Being successful means consistently making smart decisions— including smart technology purchases. Technology should enable a midsize organization to meet the needs of its employees and customers today and also allow the organization to make simple but rewarding changes in the future. Technology must support changes that occur in a business without increasing the risks associated with providing excellent customer service, engaging with suppliers, and conducting many common business processes.
Tags : 
cloud-based, collaboration, hosted, flexibility, productivity, deployment, public, private, communication, technology solutions
    
Cisco
Published By: SAS     Published Date: Jan 17, 2018
Competitive advantage from analytics is changing, and for the better. For the first time in four years, MIT Sloan Management Review found an increasing ability to strategically innovate with analytics based on interviews with more than 2,600 practitioners and scholars globally. Learn more about key findings, including: Wider use of analytics, better knowledge of its benefits and greater focus on applications have reversed a trend on the benefits of analytics. Return on investment for analytics stems from the governing and sharing of data throughout the organization. Machine learning enables organizations to discover more insight from their data, allowing employees to focus on other critical responsibilities.
Tags : 
    
SAS
Published By: IBM     Published Date: Sep 11, 2013
Learn how to compete in a consumer-empowered economy by gaining a better understanding of markets, customers, channels, products, competitors, suppliers, employees, and more
Tags : 
analytics, big data, financial services, consumer-empowered economy, markets, channels, products, competitors, suppliers, employees
    
IBM
Published By: NAVEX Global     Published Date: Dec 22, 2017
Knowing which steps to take to ensure your organisation remains vigilant against bribery and corruption is an important move. When your organisation is aligned on anti-bribery and corruption policy, training and third party risk, your employees can identify, report and ultimately stamp out—bribery and corruption. Our Solutions Experts can help you strengthen your most challenging ABC issues and better protect your organisation. Contact us to set up a consultation today at info@navexglobal.com.
Tags : 
anti-bribery programme, anti-bribery and corruption, corruption risk assessment, anti-bribery checklist, preventing anti-bribery, corruption assessment
    
NAVEX Global
Published By: Cisco EMEA     Published Date: Mar 08, 2019
And then imagine processing power strong enough to make sense of all this data in every language and in every dimension. Unless you’ve achieved that digital data nirvana (and you haven’t told the rest of us), you’re going to have some unknowns in your world. In the world of security, unknown threats exist outside the enterprise in the form of malicious actors, state-sponsored attacks and malware that moves fast and destroys everything it touches. The unknown exists inside the enterprise in the form of insider threat from rogue employees or careless contractors – which was deemed by 24% of our survey respondents to pose the most serious risk to their organizations. The unknown exists in the form of new devices, new cloud applications, and new data. The unknown is what keeps CISOs, what keeps you, up at night – and we know because we asked you.
Tags : 
    
Cisco EMEA
Published By: Cisco EMEA     Published Date: Mar 26, 2019
Imagine if you could see deep into the future. And way back into the past, both at the same time. Imagine having visibility of everything that had ever happened and everything that was ever going to happen, everywhere, all at once. And then imagine processing power strong enough to make sense of all this data in every language and in every dimension. Unless you’ve achieved that digital data nirvana (and you haven’t told the rest of us), you’re going to have some unknowns in your world. In the world of security, unknown threats exist outside the enterprise in the form of malicious actors, state-sponsored attacks and malware that moves fast and destroys everything it touches. The unknown exists inside the enterprise in the form of insider threat from rogue employees or careless contractors – which was deemed by 24% of our survey respondents to pose the most serious risk to their organizations. The unknown exists in the form of new devices, new cloud applications, and new data. The unk
Tags : 
    
Cisco EMEA
Published By: MuleSoft     Published Date: Sep 27, 2017
Key Challenges • Companies must embrace digital transformation in order to stay relevant to their customers, else risk ceding market share to competitors who are able to adapt more quickly. • At its core, digital transformation is driving companies to reframe their relationships with their customers, suppliers and employees through leveraging new technologies to engage in ways that were not possible before. • These new technologies - SaaS, mobile, and the Internet of Things (IoT) - demand a new level of connectivity that cannot be achieved with yesterday’s integration approaches.
Tags : 
    
MuleSoft
Published By: MuleSoft     Published Date: Nov 27, 2018
In the wake of recent legislative pressures and the formation of the Digital Transformation Agency, Australian state and federal government agencies face an imperative to deliver superior digital services to employees and citizens without a corresponding increase in budget. As a result, many agencies have turned to IT modernisation as a means of driving more cost-effective digital transformation. The key to successful execution of digital transformation initiatives depends on a new approach to integration and API strategy called API-led connectivity. In this whitepaper, you will learn: Why Australian government agencies must change how they deliver IT projects, and the role integration and an API strategy play in supporting the modernisation of government IT How to build out an API-led architecture within a government agency to realise 2-5x increases in IT productivity How best practice from initiatives like Service NSW provide a model for government agencies to pursue digital trans
Tags : 
    
MuleSoft
Published By: CA Technologies EMEA     Published Date: May 23, 2018
Growing your enterprise is an ongoing priority. And, as the application economy continues to expand, it’s likely that you’re looking at digital business initiatives to fuel a significant portion of that growth. Among the most promising objectives of such a strategy are: • Providing superior digital experiences for consumers though mobile • Expanding markets and revenue streams through multiple channels • Connecting employees and partners to enterprise data anywhere, anytime • Launching innovative new services for the Internet of Things (IoT) Successfully executing a digital strategy requires the ability to launch new apps and coordinate your digital presence with partners. Application Programming Interfaces (APIs) create the connectivity required to share enterprise data and digital content with those apps and partners over the Internet. APIs are a critical component of digital business—empowering developers to build apps across any channel and enabling partners to incorporate your dat
Tags : 
    
CA Technologies EMEA
Published By: Enterprise Mobile     Published Date: Dec 04, 2014
Employees today want more—and they need more—if they’re going to stay productive from anywhere, which is usually the primary goal of having mobile devices in the first place. The right apps can enhance employee productivity, reduce expenses, and increase profitability which means that the decisions you make about the apps your organization uses are among the most important decisions your organization makes. No pressure, right? Our Mobile Application Development solution brief covers: App delivery Providing support for apps Securing apps
Tags : 
managed mobility services, mobility-as-a service, enterprise mobile, mobility, enterprise mobility, mobile management, device management, mobile applications, mobile apps, application management, wireless
    
Enterprise Mobile
Published By: F5 Networks Inc     Published Date: Jan 22, 2009
F5 is a worldwide Oracle Certified Partner, a proud member of Oracle Partner Network (OPN), and works closely with Oracle on the development and refinement of their Maximum Availability Architecture (MAA). Oracle E-Business Suite is a fully integrated, comprehensive suite of business applications for the enterprise. In fact, Oracle is one of F5’s largest customers, providing application delivery networking to Oracle.com, and all of their internal and external enterprise applications for Oracle employees worldwide.
Tags : 
oracle, internet-enabled enterprise, application ready network guide, oracle e-business suite, business applications, external enterprise applications, internal enterprise applications
    
F5 Networks Inc
Published By: Datastax     Published Date: Aug 23, 2017
The world today is interacting at every level - consumers, business customers and employees - through cloud applications, and these cloud applications are transforming customer experiences. So what is a cloud application? Any application that has many geographically distributed endpoints (e.g. browsers, mobile devices or machines) should be considered a cloud application and treated accordingly.
Tags : 
datastax, technology, customer experience, cloud
    
Datastax
Published By: AppZen     Published Date: Jul 22, 2019
AI helps finance team to reduce spend, ensure compliance and streamline process: - Reimburse employees same-day - Make sure expenses and invoices comply with policy - Eliminate fraud and waste
Tags : 
    
AppZen
Published By: CBRE     Published Date: Aug 02, 2017
Watch this on-demand Ask Us Anything HIMSS webinar as we engage with a panel of experts from St. Joseph Health, Box, and MobileIron. We'll uncover St. Joseph Health’s recent deployment of Box cloud storage with MobileIron to their employees’ mobile devices, major changes we’re seeing in the healthcare industry, and so much more!
Tags : 
webinar, cloud storage, healthcare, mobile devices, mobileiron
    
CBRE
Published By: SmartBrief     Published Date: Apr 26, 2011
Find out the role that employment brands play in SmartBrief on Workforce readers' recruiting efforts, how top companies use their employment brand to attract top talent, and how recruiting strategies are changing.
Tags : 
smartbrief, recruiting report, employment brands, workforce, key talent, employment branding, recruiting climate, employment brand perception, employee reputation, recruitment strategy, staffing
    
SmartBrief
Published By: MuleSoft     Published Date: Jul 13, 2018
"In the wake of recent legislative pressures and the formation of the Digital Transformation Agency, Australian state and federal government agencies face an imperative to deliver superior digital services to employees and citizens without a corresponding increase in budget. As a result, many agencies have turned to IT modernisation as a means of driving more cost-effective digital transformation. The key to successful execution of digital transformation initiatives depends on a new approach to integration and API strategy called API-led connectivity. In this whitepaper, you will learn: -Why Australian government agencies must change how they deliver IT projects, and the role integration and an API strategy play in supporting the modernisation of government IT -How to build out an API-led architecture within a government agency to realise 2-5x increases in IT productivity -How best practice from initiatives like Service NSW provide a model for government agencies to pursue digital t
Tags : 
    
MuleSoft
Published By: Neolane, Inc.     Published Date: Dec 30, 2008
The Hager Group is a $1.5-billion electronics manufacturer. With a distributed global workforce of more than 10,000 employees, Hager has 40 sales subsidiaries and 25 industrial sites worldwide.  Today, with a centralized marketing database and software, Hager can ensure data quality and deliver personalized, targeted communications according to customer and prospect profiles and behavior.  This program allows Hager to capture 1,000 new prospects each month, and achieve a 10 percent conversion rate - resulting in an incremental revenue increase of $42 million per year.
Tags : 
neolane, the hager group, e-marketing program, centralized marketing database, central repository customer data, crm software, custom content, deliverability, e-commerce, email marketing, emerging marketing, international marketing, lead generation, rich media
    
Neolane, Inc.
Published By: Esker     Published Date: Jan 06, 2014
Business performance depends on how well a company manages its internal processes. Companies with effective business process management in place are able to analyze key performance indicators to monitor efficiency of day-to-day activities and employees against operational targets.
Tags : 
esker, automation, sales order processing, order-to-cash, erp systems, automated sales, streamlining, order processing, deliverware solution, automation solutions, sales order workflow, automation benefits, implementation, change management, integration, inbound customer orders
    
Esker
Published By: HotSchedules     Published Date: Mar 08, 2019
Employees want to pick up an extra shift? It's a snap with automatic shift pickup from HotSchedules. Here's how it works.
Tags : 
    
HotSchedules
Published By: IBM     Published Date: Jan 29, 2015
Mobility is no longer an IT trend: It is the new reality for how technology is deployed for business benefit. Research and consulting firm Forrester refers to this tidal wave of change as the “mobile mind shift” and emphasizes that it is more important than ever for enterprises to get it right the first time. But getting it right means more than just launching a customer app, implementing enterprise mobile policies, improving mobile device security or creating campus-wide hot spots. It means developing and continuously delivering mobile applications that truly make a difference for employees, business partners and customers. Increasingly, that means adopting new ways of thinking about how best to develop and manage mobile applications.
Tags : 
mobile mind shift, it trends, mobility policies, mobile device security
    
IBM
Published By: Bright Horizons     Published Date: Dec 14, 2016
Dependent-care breakdowns are a serious risk to business continuity. With child care already a challenge for much of the workforce, and elder care responsibilities on the upswing due to the aging population, smart organizations are moving toward a response strategy.
Tags : 
business continuity, employee well-being, workforce productivity, retention, engagement, recruitment, child care, back-up child care, child care centers, elder care, dependent care, employer solutions, employee benefits, family-friendly workplace, working parents, work-life balance
    
Bright Horizons
Published By: CareerBuilder     Published Date: Apr 24, 2019
In the past, employers that ordered background checks on applicants and employees (“candidates”) would receive a report that captured the candidate’s background information at the time of the report. Employers that wanted to find out whether their incumbent employees had been, for example, arrested for or convicted of a new crime had to order a new background report, which can be costly.
Tags : 
    
CareerBuilder
Published By: Ping Identity     Published Date: Jan 29, 2013
Expecting your employees to remember strong passwords for every application they use is unrealistic. Learn how identity federation provides a secure, private mechanism for businesses to share user identities, eliminating the username/passwords issue
Tags : 
passwords, password protection, unrealistic passwords, complex passwords, eliminating password confusion
    
Ping Identity
Published By: Globalscape     Published Date: Nov 14, 2016
Are you sure that employees are only using IT-sanctioned ways of transferring data? If the answer is “no,” then your sensitive data may be vulnerable. In this guide from Globalscape, you’ll learn: • What shadow IT is and the drawbacks • Signs of a shadow IT problem • How to reduce shadow IT
Tags : 
globalscape, shadow it, data transfer methods, data breach
    
Globalscape
Published By: Ping Identity     Published Date: Jan 29, 2013
Now that employees are using more SaaS applications, its time for enterprises to adjust the way they manage employee identities. This white paper from Ping Identity addresses how IT can simplify identity management and maintain enterprise security.
Tags : 
it simplification, get rid of passwords, saas, applications, ping
    
Ping Identity
Start   Previous    2 3 4 5 6 7 8 9 10 11 12 13 14 15 16    Next    End
Search      
Already a subscriber? Log in here
Please note you must now log in with your email address and password.