person

Results 301 - 325 of 1838Sort Results By: Published Date | Title | Company Name
Published By: Microsoft     Published Date: Jul 07, 2016
Every organization and every industry is being transformed by the trend towards cloud and mobility. There is no shortage of narrow point solutions that can provide bits and pieces of the overarching solution you need – but modern IT departments face enough day-to-day challenges without having to constantly fine tune and integrate a bunch of different products. We’ve assembled a step-by-step guide to help you address the challenges you face as you work to go mobile, stay mobile, and protect your data with an end-to-end solution. Download this free e-book to learn: • How application policy relates to providing secure e-mail • How to set up policy for MAM without enrollment apps via application managed policy • How to create device configuration policies for both corporate-owned and personally owned devices • How to authenticate and authorize access to your company resources • How to get end-to-end protection for mobile e-mail up and running in your own environment.
Tags : 
technology, best practices, data, enterprise
    
Microsoft
Published By: CA Technologies     Published Date: Aug 22, 2017
While some are still adjusting to the idea, you’re well aware that we’re living in an application economy. For the uninformed, an application economy is where everything is driven by a connected, mobile, application-based world where your customers are far more likely to experience your brand and interact with your enterprise through a software application than a live person. But, beyond the benefits, each day you’re feeling the pressure it exerts on your budget, resources and network. You’ve seen this wave swell on the horizon, and now it’s arrived: executives are enthusiastic and asking about strategies, and line-of-business leaders are requesting faster dev times and more complex projects. Staking out your place as a leader in this new landscape will require you to develop and deliver high-impact applications faster than ever before.
Tags : 
    
CA Technologies
Published By: CA Technologies     Published Date: Aug 24, 2017
In recent years, the concept of “Anywhere, Anytime Computing” has become the common denominator in driving personal electronic device sales, as users are adopting to new categories of devices such as smartphones, tablets, and smartTVs. These devices enable consumers and employees to access information and services from almost any device at any time. Gartner studies show that the estimated mobile phone market is to reach 1.8 billion devices in 2013.
Tags : 
    
CA Technologies
Published By: CA Technologies     Published Date: Aug 24, 2017
Target, Home Depot, eBay, le Bureau de gestion du personnel des États-Unis... Les incidents de sécurité majeurs subis par ces organisations (et d’autres) récemment sont survenus suite au vol ou à la compromission des informations d’identification d’un utilisateur à forts privilèges qui disposait d’un accès étendu à des systèmes sensibles. Dans près de deux tiers des cas, la violation initiale a été facilitée par la faiblesse des pratiques de sécurité mises en place par un tiers, fournisseur ou partenaire commercial, qui avait accès à un réseau interne. C’est en volant les informations d’identification de ce tiers que les attaquants ont été en mesure d’exploiter les infrastructures informatiques des entreprises visées, pour y localiser des comptes à forts privilèges qu’ils ont ensuite utilisés pour accéder à des systèmes critiques et leur porter atteinte.
Tags : 
    
CA Technologies
Published By: Deluxe     Published Date: Mar 15, 2017
The financial services industry has been significantly impacted by the increasing use of technology from smartphones to wearables. This transformation in methods of transacting has enabled more personalized engagement, allowing customers to use multiple channels simultaneously to engage in seamless, multi-dimensional banking. This has also increased both the potential and complexity of creating a positive customer experience.
Tags : 
    
Deluxe
Published By: Makino     Published Date: Jun 23, 2017
Aaron Woller, president of Woller Precision Machine, discusses how his company enhanced its productivity and profitability by transitioning from conventional vertical machining centers to an automated horizontal machining cell. Beyond simply improving capacity and workflow, this investment in automation has enabled Woller to maximize the value of skilled labor, redeploying personnel into new business development roles. In doing so, the company experienced a 21 percent increase in sales with only a 6 percent increase in labor requirements.
Tags : 
horizontal machining centers, horizontal milling machines, pallet handling system, hmc, pallet transfer system, automation, automated machining
    
Makino
Published By: CA Technologies EMEA     Published Date: Sep 11, 2018
Hard- und Softwaresysteme werden immer effizienter, ausgereifter und nutzbringender, nehmen tendenziell allerdings auch an Komplexität zu. Als z. B. virtuelle Maschinen die Bare-Metal-Softwareumgebungen ablösten, entstand durch die Virtualisierung eine neue Ebene der Komplexität, die die IT-Teams mit einplanen und managen mussten. Auch der in den letzten Jahren zunehmende Einsatz von Microservices und Containern hat dazu geführt, dass immer mehr Komponenten in eine einzige Anwendung integriert und somit auch orchestriert werden müssen. In der Regel sind die für den IT-Betrieb zuständigen Teams jedoch in ihrer Fähigkeit begrenzt, dieser wachsenden Komplexität Herr zu werden. Naheliegend wäre sicher, mehr Personal einzustellen, dies ist allerdings keine sehr wirtschaftliche Lösung, die zudem keine guten Skalierungsmöglichkeiten bietet.
Tags : 
    
CA Technologies EMEA
Published By: CA Technologies EMEA     Published Date: Sep 11, 2018
At a Glance Today’s workforce has grown accustomed to using personal technologies that make communication easy and simplify their lives. But many enterprise tools haven’t kept pace. Most current project and portfolio management solutions fail to provide simple ways of performing everyday tasks. They don’t facilitate contextual communication that would help to solve problems, and they lack key functionality: the ability to narrow the focus to relevant data, to drill down for additional information and to efficiently forecast financials and model outcomes. Download this whitepaper now to see how CA PPM brings more value to your business by providing 15 key features that remain unaddressed by other products on the market today.
Tags : 
    
CA Technologies EMEA
Published By: CA Technologies EMEA     Published Date: Sep 13, 2018
Auf einen Blick Mit dem neuen CA Project & Portfolio Management (CA PPM) 15.3 können Sie Projekte für beliebige Geschäftsbereiche ganz einfach per Drag-and-drop maßschneidern. Ob komplexe Workflows für die Personalabteilung oder einfaches Aufgabenmanagement für den Vertrieb – Projekte sind nun statt erst nach Tagen innerhalb weniger Minuten eingerichtet. Mit der In-App-Kooperation eliminieren Sie überflüssige Meetings, Budgets verwalten Sie mit einem vertrauten Raster ähnlich wie in Microsoft Excel®, und dank der neuen Verknüpfung mit Business Intelligence (BI) Tools von Drittanbietern lassen sich versteckte Antworten aufspüren. Sie verfügen damit über die modernste Projektportfoliomanagement-App, die derzeit am Markt verfügbar ist.
Tags : 
    
CA Technologies EMEA
Published By: CA Technologies EMEA     Published Date: Sep 13, 2018
Introduzione La forza lavoro di oggi è abituata a utilizzare tecnologie personali che semplificano le comunicazioni e la vita quotidiana. Molti strumenti aziendali, tuttavia, non sono riusciti a rimanere al passo. La maggior parte delle attuali soluzioni di project and portfolio management non è in grado di fornire modi semplici per svolgere le attività quotidiane. Non facilitano le comunicazioni contestuali che agevolerebbero la risoluzione dei problemi e non dispongono di funzionalità chiave: capacità di restringere il focus ai dati pertinenti, di eseguire il drill-down per accedere a ulteriori informazioni e di prevedere in modo efficiente le necessità finanziarie e modellare i risultati.
Tags : 
    
CA Technologies EMEA
Published By: CA Technologies EMEA     Published Date: Sep 13, 2018
Introduzione CA Project & Portfolio Management (CA PPM) 15.3 consente di personalizzare i progetti per qualsiasi business unit, con la semplicità del drag-and-drop. Dal complicato workflow per HR o alla semplice gestione delle attività per le vendite, oggi i lavoratori riescono ad avviare i progetti in pochi minuti, anziché in giorni. È possibile integrare la collaborazione all'interno dell'applicazione per eliminare riunioni ridondanti, una familiare griglia di tipo Microsoft Excel® per la gestione dei budget, una nuova connessione per strumenti di Business Intelligence (BI) di terze parti che consentono di trovare risposte, e si ottiene la più moderna app di Project Portfolio Management attualmente sul mercato.
Tags : 
    
CA Technologies EMEA
Published By: CA Technologies EMEA     Published Date: Sep 13, 2018
De un solo vistazo Los trabajadores de hoy en día están acostumbrados a usar tecnologías personales que facilitan la comunicación y que simplifican sus vidas. Sin embargo, muchas herramientas empresariales no han podido seguir el ritmo. La mayoría de soluciones de gestión de carteras y productos actuales no logran proporcionar formas sencillas de realizar las tareas diarias. No facilitan una comunicación en contexto que ayude a solucionar los problemas y no cuentan con funcionalidades básicas, como la capacidad de estrechar el foco sobre los datos relevantes, de clasificar información adicional, de realizar previsiones financieras eficaces y de modelar los resultados.
Tags : 
    
CA Technologies EMEA
Published By: CA Technologies EMEA     Published Date: Sep 13, 2018
En résumé L’emploi de technologies personnelles qui facilitent les communications et simplifient la vie est désormais ancré dans les habitudes des employés. Toutefois, de nombreux outils professionnels sont restés à la traîne. La plupart des solutions de gestion de portefeuilles de projets peinent à fournir des moyens simples pour l’exécution des tâches quotidiennes. Elles ne facilitent pas la communication contextuelle qui aiderait pourtant à résoudre les problèmes, et elles manquent de fonctionnalités clés, comme la capacité de se focaliser uniquement sur les données pertinentes, d’accéder à des informations complémentaires et de correctement anticiper les résultats financiers et de modèles.
Tags : 
    
CA Technologies EMEA
Published By: CA Technologies EMEA     Published Date: Sep 13, 2018
En résumé La version 15.3 de CA Project & Portfolio Management (CA PPM) vous permet de personnaliser les projets pour chaque business unit par de simples opérations de glisser-déposer. Qu’il s’agisse de workflows complexes pour les ressources humaines ou de simples tâches de gestion des ventes, les projets peuvent désormais être lancés en quelques minutes, au lieu de plusieurs jours. Ajoutez à cela des possibilités de collaboration au départ de l’application proprement dite pour éliminer les réunions superflues, un format de tableau familier de type Microsoft Excel® pour gérer les budgets, de nouvelles connexions à des outils d’aide à la décision tiers pour trouver des réponses, et vous obtenez l’application de gestion de portefeuilles de projets la plus moderne du marché.
Tags : 
    
CA Technologies EMEA
Published By: Limelight Networks     Published Date: Feb 22, 2018
In the increasingly competitive OTT market, competition for viewers is high. Providers must find ways to not just deliver compelling content, but to deliver compelling viewing experiences. In this whitepaper, you’ll learn about the critical challenges facing OTT providers today and how they can be overcome to provide the broadcast quality experiences viewers expect, regardless of the device in use or the viewers location in the world. Are you ready to keep your subscribers happy and away from your competition? Download this free white paper OTT 3.0: How to Build a Better Mousetrap and learn: Why personalized content discovery is so important to viewers – and to the success of your business How to avoid internet congestion by leveraging technologies like a CDN The importance of global network scale to meet spikes in consumer traffic The impact of advertising on viewer abandonment
Tags : 
    
Limelight Networks
Published By: Cognizant     Published Date: Oct 23, 2018
In the last few years, a wave of digital technologies changed the banking landscape - social/ mobile altered the way banks engage with customers, analytics enabled hyper personalized offerings by making sense of large datasets, Cloud technologies shifted the computing paradigm from CapEx to OpEx, enabling delivery of business processes as services from third-party platforms. Now, a second wave of disruption is set to drive even more profound changes - including robotic process automation (RPA), AI, IOT instrumentation, blockchain distributed ledger and shared infrastructure, and open banking platforms controlled by application programming interfaces (API). As these technologies become commercialized, and demand increases for digitally-enabled services, we will see unprecedented disruption, as non-traditional banks and fintechs rush into all segments of the banking space. This whitepaper examines key considerations for banks as they explore value in the emerging Digital 2.0 world.
Tags : 
cognizant, banking, digital
    
Cognizant
Published By: Cognizant     Published Date: Oct 23, 2018
There’s plenty of room in the digital economy for traditional retailers, as long as they shift focus from the products they offer to the experiences they provide, blending the physical and digital worlds to offer distinct and personalized shopping experiences and unleashing the untapped power of emerging new ecosystems. At the heart of retail’s ongoing transformation is a shift in focus from the point of sale to the point of experience. Retailers that will thrive and prosper in the digital economy will be those that think beyond the products they sell to providing hyper-personalized shopping experiences that surprise and delight the consumer at each interaction, regardless of channel or touchpoint. This white paper illuminates these strategic imperatives and delivers actionable recommendations to established retailers seeking to convert challenge into opportunity amid growing concern that they should merely concede victory to digitally-native companies.
Tags : 
cognizant, digital economy, retail
    
Cognizant
Published By: Intel     Published Date: Apr 11, 2019
The Internet of Things (IoT) unleashes valuable business insights through data that’s gathered at every level of a retail organization. With IoT and data analytics, retailers now have the capability to gather insight into customer behavior, offer more personalized experiences, achieve better inventory accuracy, create greater supply chain efficiencies, and so much more. But with data comes great risk. A recent report by security firm Thales and 451 Research found that 43 percent of retailers have experienced a data breach in the past year, with a third reporting more than one breach.1 Intel® technology-based gateways and Asavie, a provider of next-gen enterprise mobility management and IoT connectivity solutions, offer a security connectivity solution that minimizes the effort and cost to businesses to ensure safety from cybersecurity attacks. In addition, the Intel/Asavie IoT solution provides retailers with a solid basis to build their smart, connected projects:
Tags : 
    
Intel
Published By: Experian     Published Date: Aug 29, 2019
As organizations and consumers increasingly interact over digital channels, both parties must find ways to establish mutual trust. Experian’s Global Identity and Fraud Report Asia-Pacific (APAC) edition highlights that trusted online relationships are based on businesses providing both a secure environment and seamless consumer experiences. With insights from almost 6,000 APAC consumers, the report found that majority (71%) value ‘security’ as the most important element of an online experience, followed by ‘convenience’ (20%) and ‘personalisation’ (9%). Download the complete 2019 Asia-Pacific Identity and Fraud Report for more details.
Tags : 
    
Experian
Published By: Secureworks ABM UK 2017     Published Date: Oct 23, 2017
Cybercriminals can be goal-driven and patient, and they often have a singular focus, plenty of time and access to vast, modern technical resources. Both organized and forum-based criminals are working constantly to find innovative and efficient ways to steal information and money with the lowest risk to their personal freedom. If we wish to stay “one step ahead” of the threats detailed in this report, awareness of online criminal threats, techniques and markets is our best defense.
Tags : 
cyber security, cyber security framework, data security, firewall, general data protection regulation, incident and problem management, information security, intrusion detection, intrusion prevention, log management, malware, vulnerabilities, managed security services, network security, pci compliance, penetration testing, ransomware security consulting, security management, security monitoring, vulnerability assessments
    
Secureworks ABM UK 2017
Published By: Secureworks ABM UK 2017     Published Date: Oct 23, 2017
GDPR will pose different challenges to each organisation. Understanding and acting on the implications for your own organisation is vital. That means taking a risk-based approach to ensure that you are doing what you need to do to manage your own specific risks to personal information. While virtually all organisations will have to implement changes to become GDPR compliant, some will be able to take partial advantage of existing compliance to other security mandates and frameworks, such as ISO 27001 and PCI by extending those measures to protection of personal data. Even so, further work will be required to comply with GDPR, both with regards to security and its other aspects.
Tags : 
cyber security, cyber security framework, data security, firewall, general data protection regulation, incident and problem management, information security, intrusion detection, intrusion prevention, log management, malware, vulnerabilities, managed security services, network security, pci compliance, penetration testing, ransomware security consulting, security management, security monitoring, vulnerability assessments
    
Secureworks ABM UK 2017
Published By: LogMeIn     Published Date: May 31, 2016
LivePerson’s forced migration to the LiveEngage platform has businesses like yours re-examining their live chat options. Given the painful relationship they’ve endured for years with LivePerson, many customers are wary, and they want to make sure that they make the right move. BoldChat is working with a number of former LivePerson customers who came to us looking for a true partner – one that not only wants to earn their business, but to continue earning it every day. What they’re getting in return is much more.
Tags : 
boldchat, logmein, liveperson, chat, customer service, customer experience
    
LogMeIn
Published By: Workday UK     Published Date: Jan 31, 2019
Read now to learn about three key steps drawn from the “2018 Deloitte Global Human Capital Trends” report that emerging organisations can take to attract and retain top talent, including: Redefining careers Creating more personalised performance enablement to boost employee engagement Using data-driven technology and analytics to enhance business value
Tags : 
workday, workforce technology, digital strategy
    
Workday UK
Published By: IBM     Published Date: Oct 20, 2015
This paper introduces the IBM Predictive Customer Intelligence solution, which is designed to help your company create personalized, relevant experiences for individual customers with a focus on driving new revenue.
Tags : 
ibm, customer, predictive, intelligence, revenue
    
IBM
Published By: IBM     Published Date: Apr 14, 2016
Read this Stratecast white paper from Frost & Sullivan to learn about the challenges over-the-top (OTT) competitors such as Google, Hulu, Netflix, and Facebook are causing communications service providers (CSPs). Learn how CSPs can use customer behavior data to deliver personalized experiences and offers, and discover the solutions that can turn data into a competitive advantage.
Tags : 
ibm, behavior data, social media, csp, telecom, ott
    
IBM
Start   Previous    6 7 8 9 10 11 12 13 14 15 16 17 18 19 20    Next    End
Search      
Already a subscriber? Log in here
Please note you must now log in with your email address and password.