track it

Results 251 - 275 of 492Sort Results By: Published Date | Title | Company Name
Published By: YouSendIt, Inc.     Published Date: Dec 02, 2008
Discover why sending large e-mail attachments and other digital files is becoming increasingly problematic.  Download this informative data sheet now to learn how FTP flaws can result in exposure; why large email attachments aren’t getting through; risks of delivering files via CD-ROM; and how new digital delivery developments make it possible to send large files, fast and securely.
Tags : 
file transfer, content delivery, digital content delivery, attachment, email, ftp, security, confidentiality
    
YouSendIt, Inc.
Published By: ESET     Published Date: Feb 17, 2010
Analysis of ESET's ThreatSense.Net®, a sophisticated malware reporting and tracking system, shows that the highest number of detections this month, with almost 9.90%, was the Win32/Conficker class of threat.
Tags : 
eset, threats, malware reporting, tracking system, win32/conficker, threatsense.net, security
    
ESET
Published By: Cornerstone OnDemand     Published Date: Feb 12, 2015
Everyone loves a good spreadsheet. But if you have more than a few hundred employees, tracking performance, training, and succession with them is the stuff of nightmares. Spreadsheets and paper-based processes can’t give you deep, real-time insight into how your employees are performing or how to make them—and your company—more successful.
Tags : 
cornerstone ondemand, employee engagement, leadership, development strategy, employees, high performing, operational leadership, business success
    
Cornerstone OnDemand
Published By: Microsoft Dynamics CRM     Published Date: Mar 30, 2010
This report reveals how Best-in-Class firms distinguish themselves from all others by routinely benchmarking and measuring their service performance; implementing effective measuring, monitoring and tracking systems; integrating service KPIs with company-wide CRM or ERP systems, wherever possible; and establishing a formal process for automatically collecting and disseminating data.
Tags : 
microsoft dynamic crm, service benchmarking, metrics, customer satisfaction, data management, mttr, kpi, metrics measuring program
    
Microsoft Dynamics CRM
Published By: ScriptLogic     Published Date: Aug 30, 2010
Small to medium businesses experiencing network downtime can cost as much 3% of annual revenues. It is critical that you have a help desk solution that can help efficiently track, identify and resolve issues as quickly as possible. Help Desk Authority® provides best-of-breed ticket workflows, dashboards and reporting with advanced automation and self-service functions to enable IT to focus on more important issues.
Tags : 
scriptlogic, help desk authority, lifecycle, optimization, remote support, data tracking
    
ScriptLogic
Published By: ScriptLogic     Published Date: Mar 30, 2012
Help Desk Authority offers a complete help desk solution for small and medium size businesses that can help efficiently track, identify, and resolve issues as quickly as possible. Try It For Free Today!
Tags : 
scriptlogic, desktop management, desktop authority, windows, software asset management, software license, tracking, automation
    
ScriptLogic
Published By: ScriptLogic     Published Date: Mar 30, 2012
Help Desk Authority offers a complete help desk solution for small and medium size businesses that can help efficiently track, identify, and resolve issues quickly.
Tags : 
help desk, tracking, tickets, help desk management, active directory, auditing, native tools, centralized
    
ScriptLogic
Published By: Indeed.com     Published Date: Sep 04, 2009
Learn how to effectively track, measure, and maximize the return on investment (ROI) of your online recruitment budget with this white paper by Indeed.com.
Tags : 
indeed.com, recruiting, analysis, roi, recruitment, staffing, track, measure
    
Indeed.com
Published By: BHC Rhodes     Published Date: Oct 06, 2011
Engineers at BHC RHODES in Overland Park, Kan., helped the city of Kansas City create and implement an effective system for tracking assets with RFID.
Tags : 
traffic, inventory, engineering, rfid
    
BHC Rhodes
Published By: Zebra     Published Date: Jul 10, 2014
Digital voices are everywhere in a digital factory. In this brief, we’ll elaborate on the technology tools digital factories use for three common functions: asset management, production planning and materials replenishment.
Tags : 
zebra, digital factories, asset management, production planning, material replenishment, embedded sensors, software, wireless
    
Zebra
Published By: Adobe     Published Date: Aug 02, 2017
Adobe can help you seamlessly capture customer data, track offer performance and deepen customer relationships with more consistent and relevant offers across channels. See how our Adobe solutions work together to help you build your next best offer.
Tags : 
customer experience, insights, shared service value, consolidated services, global services division, organization optimization, travel management analytics, social analytics
    
Adobe
Published By: Limelight Networks     Published Date: Jul 31, 2012
In this report you will learn how today's WCM platforms are fusing the best marketing automation practices with content management, allowing marketers to leverage content in new and innovative ways. Discover 10 of the top capabilities you should be considering for your website.
Tags : 
web content management, wcm, it management, it support, cms, marketing automation, visitor profiles, market segmentation
    
Limelight Networks
Published By: PeopleMatter     Published Date: Dec 17, 2012
Download to see how the PeopleMatter Platform helped Mad Greens.
Tags : 
human resource, hr software, hire, hiring employees, applicant tracking system, learning management system, lms, scheduling software
    
PeopleMatter
Published By: McAfee     Published Date: Apr 25, 2014
While enterprises appear to be aware of advanced malware and its security challenges, the measures to defend against it need some attention and investment. This report presents survey results that gauge enterprise awareness of advanced malware and what measures are being taken to defend against it.
Tags : 
advanced malware, protection, network breaches, intrusion provention systems (ips), web and email gateway protection, tracking malware, malware analysis and detection, blocking and remediating malware
    
McAfee
Published By: Paycor     Published Date: Jun 05, 2014
Did you know the Department of Labor assessed $82 million in penalties in 2013? Misclassified employees, lack of documentation, payroll errors and employment discrimination lawsuits add up to costly mistakes for healthcare organizations every day. If you’re using spreadsheets to track employee data and relying on disconnected information systems, your organization is at risk of becoming a statistic. This whitepaper will empower you to mitigate risk and ensure your organization can continue to serve its mission.
Tags : 
healthcare, compliance, labor law, wage and hour, tax law, healthcare reform
    
Paycor
Published By: Sage     Published Date: Mar 26, 2014
Spreadsheets have become one of the most prevalent software applications used by businesses. They are used for everything from simple calculations to impromptu databases. While inherently useful, spreadsheets are frequently used for tasks in which they are ill-suited. In fact, too many companies overlook the importance of accurate fixed asset tracking and rely on spreadsheets to track value, depreciation, and tax calculations. Unwittingly, this results in the direct loss of money and time.
Tags : 
sage, fixed assets, spreadsheets, tax payments, sarbanes-oxley, depreciation, tracking, planning
    
Sage
Published By: RMG Networks     Published Date: May 08, 2014
Download to learn how large scale enterprises can improve quality, efficiency, productivity, and time from raw material to the point of purchase.
Tags : 
rmg networks, large scale enterprises, historical performance tracking, productivity data, visual communications, enterprise video, real time data
    
RMG Networks
Published By: New Relic     Published Date: Mar 17, 2015
Application performance management (APM) focuses on monitoring, maintaining, and optimizing the performance and health of business applications across development, test, datacenter, and network environments. As mission-critical enterprise application environments become more complex because of the increased use of cloud, big data, and mobility, APM is becoming a top priority for IT teams that need to quickly and cost effectively track end-to-end application performance, identify and remediate the root cause of performance problems, and maintain service levels required by end users and business stakeholders. SaaS-delivered APM solutions offer rapid time to value for IT organizations that need to implement APM quickly with minimal disruption to the business.
Tags : 
apm, application performance management, big data, application performance, mobility, data center, data management
    
New Relic
Published By: OpenText     Published Date: Aug 19, 2014
Maintaining regulatory compliance is a major business issue facing organizations around the world. The need to secure, track and store information for compliance purposes is critical. For years businesses have relied on fax communications in day-to-day operations. More pressure is now placed on the need to closely manage fax communications and document processes. It’s not surprising that organizations are turning to enterprise fax technology to meet compliance requirements. This white paper addresses the area of fax communications and the steps you can take to help keep your organization compliant.
Tags : 
opentext, security, fax, document delivery, workflow improvements, automation systems, transactional paper documents
    
OpenText
Published By: Cornerstone OnDemand     Published Date: Feb 22, 2016
Tracking employee performance reviews and training with spreadsheets is time consuming, error-prone, and can even be a compliance risk. Not only does making the smart switch to a talent system eliminate the time wasted on paper-based people management, but organisations with an integrated talent approach have 40% lower turnover in high performers. But don't just take our word for it – download 8 reasons to stop managing your people with spreadsheets and find out why organisations just like yours have made the switch from paper to performance
Tags : 
spreadsheets. compliance, risk, performance, tracking, turnover
    
Cornerstone OnDemand
Published By: ThreatTrack Security     Published Date: May 21, 2015
This white paper focuses on the security problems organizations of all sizes face in regard to email and other threat vectors, and it offers recommendations about to improving security.
Tags : 
phishing, next-generation malware, security, email
    
ThreatTrack Security
Published By: ThreatTrack Security     Published Date: May 21, 2015
This report provides a 360 degree view of organizations' security threats, response plans, processes, and investments. More than 800 security decision makers and practitioners were surveyed in December 2014 across North America and Europe.
Tags : 
cyberthreat, security, malware, defense
    
ThreatTrack Security
Published By: ThreatTrack Security     Published Date: May 21, 2015
Download this eBook to learn how ThreatSecure can detect active advanced attacks and help increase the effectiveness of security and incident response teams.
Tags : 
advanced protection, cyberthreat, security, incident response team, threatsecure
    
ThreatTrack Security
Published By: ThreatTrack Security     Published Date: May 21, 2015
Download this white paper to learn how to add value through malware analysis.
Tags : 
malware, security threat, cyberattack, cyberthreat, malware analysis
    
ThreatTrack Security
Published By: ThreatTrack Security     Published Date: May 21, 2015
In an interview recorded at RSA Conference 2015, Itkin discusses: The unique security challenges of the midmarket; Disturbing cyber-extortion trends; What larger organizations can learn from the midmarket.
Tags : 
security challenges, mid-market security, cyber-extortion, cyberthreat
    
ThreatTrack Security
Start   Previous    4 5 6 7 8 9 10 11 12 13 14 15 16 17 18    Next    End
Search      
Already a subscriber? Log in here
Please note you must now log in with your email address and password.