value

Results 2751 - 2775 of 3026Sort Results By: Published Date | Title | Company Name
Published By: GoToMeeting     Published Date: Apr 04, 2011
This Telework Research Network white paper examines how results-based management addresses the values and demands of today's workforce and provides companies with a multitude of cost-saving, people-retaining benefits.
Tags : 
citrix gotomeeting, results-based management, rowe, engaged consulting, trn
    
GoToMeeting
Published By: BizCarta Australia     Published Date: Nov 02, 2010
BizCarta assisted Country Energy in deploying LANDesk Management Suite to identify which Microsoft applications were running. That project identified and subsequently removed unused software valued at $1,671,000.
Tags : 
landesk, software license monitoring, software asset management, it asset management, desktop management, service desk management
    
BizCarta Australia
Published By: PolarLake USA     Published Date: Jun 09, 2008
This paper provides an overview of the benefits and challenges for firms wishing to implement XML-based systems and explores how PolarLake can be used to address these challenges.
Tags : 
polarlake, xml, reference data management, reference data distribution, xml based integration, financial integrations
    
PolarLake USA
Published By: Encore Consulting     Published Date: Dec 09, 2010
A Simple, Practical Article on How to Sell Value Over Price
Tags : 
selling skills, sales training, sales trainers, selling techniques, selling tips, sales workshops, sales seminars, brain tracy
    
Encore Consulting
Published By: Hitachi ID Systems     Published Date: Dec 20, 2010
IAM in the Cloud: an overview of technology and value
Tags : 
identity management, cloud computing, iam, security
    
Hitachi ID Systems
Published By: NetIQ     Published Date: Jan 13, 2011
This white paper discusses the value of achieving security process maturity, which requires an evolutionary shift-from simply reacting to security threats to creating mature, automated security processes.
Tags : 
netiq, automation, security processes, threats, configuration assessment, roi, compliance, automated process
    
NetIQ
Published By: DataMotion     Published Date: Jan 06, 2011
Get a better understanding of the value to your organization of securing email with encryption. Read Educating Decision Makers About the Need for Encryption, a whitepaper by Osterman Research
Tags : 
secure email, encryption, private email
    
DataMotion
Published By: Discovery Corps, Inc     Published Date: Jan 11, 2011
Article on how to handle missing values in a dataset during a data mining project
Tags : 
data mining, missing values, techniques, diagnosis, tips, missing data
    
Discovery Corps, Inc
Published By: DIR Incorporated     Published Date: Jan 13, 2011
Many companies have a goal of creating messages with "viral" appeal and content. The value of viral sharing is that a message is broadcast and passed along from one person to the next to a rapidly growing audience. This is in
Tags : 
viral marketing, social media, online marketing, interactive marketing, dir incorporated
    
DIR Incorporated
Published By: Anthem Marketing Solutions     Published Date: Jan 25, 2011
Analytic Tool Delivers Immediate Actionability, Far Beyond Traditional RFM
Tags : 
data analysis, marketing spend, rfm, customer behavior, transaction analysis, transaction reporting, customer buying behavior, value optimization
    
Anthem Marketing Solutions
Published By: BambooHR - HR Software     Published Date: Jan 25, 2011
Administrative demands leave HR practitioners with time for little more than keeping up with growing workloads. A voice at the strategy table requires efficient HR information systems to and create real value in the HR function.
Tags : 
bamboohr, spreadsheets, excel, administrative demands, workloads, human resources, talent management, hr software
    
BambooHR - HR Software
Published By: Adaptive Planning     Published Date: Apr 18, 2011
Join us for an informative webinar and learn how easy it can be to create exceptional value through FP&A in 2011.
Tags : 
adaptive planning, fp&a upgrade, manufacturers, kpi performance, unit planning, p&l, capital spending, business decisions
    
Adaptive Planning
Published By: IBM Software     Published Date: Jul 19, 2011
In this white paper, David Axson delves into what he considers to be the three key things you should do in 2011 to close that gap and deliver dramatically enhanced value and quality. Read "Time to Build the Last Mile to Full Financial Value", and set your sights on being able to guide your organization to new levels of competitive differentiation and achievement.
Tags : 
cognos, business intelligence, business intelligence software, business intelligence solution, corporate performance management, ibm
    
IBM Software
Published By: VeriSign     Published Date: Feb 10, 2011
What companies can do to maximize online sales by increasing customer trust and confidence. This report looks into the need for trust in ecommerce and the ways in which companies are building it (and, in some cases, undermining it).
Tags : 
verisign, online sales, customer trust, ecommerce, increase conversion, ssl, secure sockets layer
    
VeriSign
Published By: BrandProtect     Published Date: Feb 17, 2011
Understanding the Value of a Social Media Risk Management Program
Tags : 
social media monitoring, social media risk management, identity theft, brand and intellectual property abuses, malicious discussion
    
BrandProtect
Published By: CRG emPerform     Published Date: Mar 02, 2011
Get started automating your talent management today! Request a free trial of CRG emPerform and see how easy it can be top automate: appraisals, goal management, succession planning, compensation management, 360 multi-rater reviews, online surveys, powerful reports + more!
Tags : 
talent management, employee performance management, employee appraisals, succession planning, compensation management, 360 reviews
    
CRG emPerform
Published By: HP and IntelŽ XeonŽ processors     Published Date: Sep 06, 2011
Read this report to better understand the unique file-based storage challenges these organizations face and possible solutions for overcoming them to achieve maximum ROI.
Tags : 
hp + intel, information assets, content driven enterprise, archiving, storage solutions, large content environments
    
HP and IntelŽ XeonŽ processors
Published By: HP and IntelŽ XeonŽ processors     Published Date: Feb 10, 2012
In this paper sponsored by HP and Intel, we examine each of the major technologies in the Information Supply Chain that should be considered as part of an integrated strategy and then show how they interrelate.
Tags : 
amd, data center, tco, total cost of ownership, it organization, data center, technology decision
    
HP and IntelŽ XeonŽ processors
Published By: HP and IntelŽ XeonŽ processors     Published Date: Aug 01, 2012
It is often said that a chain is only as strong as its weakest link. The corollary is also true-adding an ostensibly strong link to a weak chain doesn't necessarily deliver much tensile value. Yet, from all the rhetoric and hype, you might be forgiven for thinking that solid-state storage will single-handedly strengthen every weak storage chain, wherever the solid-state storage is and however it is used. Specification-based strength added to a weak chain will soon be exposed in the real world, whether it's a tug-of-war team or a storage system.
Tags : 
hp 3par storage, storage value chain, solid state, optimization, ssd, enterprise storage, i/o service, adaptive optimization
    
HP and IntelŽ XeonŽ processors
Published By: HP and IntelŽ XeonŽ processors     Published Date: Oct 30, 2012
Shifting the balance of IT professional time from the tactical to the strategic has become much more attainable with the introduction of Hewlett-Packard ProLiant Gen8 servers. Learn how the ProLiant servers can ensure that IT delivers greater value.
Tags : 
it servers, proliant gen8, business value, it operations, it infrastructure
    
HP and IntelŽ XeonŽ processors
Published By: HP and IntelŽ XeonŽ processors     Published Date: Oct 30, 2012
Infrastructure optimization-that is, the ability to make the best and most efficient use of server, storage, and networking resources-is a goal of most IT organizations. Read on to learn how to expand and accelerate virtualization value.
Tags : 
virtualization, data management, it infrastructure, cloud computing
    
HP and IntelŽ XeonŽ processors
Published By: MicroStrategy     Published Date: Aug 21, 2019
Data and analytics are the key accelerants of digitalization, transformation and “ContinuousNext” efforts. As a result, data and analytics leaders will be counted upon to affect corporate strategy and value, change management, business ethics, and execution performance.
Tags : 
    
MicroStrategy
Published By: Qualys     Published Date: Apr 05, 2011
This paper discusses the management of Risk and how Vulnerability Management is one of the few counter-measures easily justified by its ability to optimize risk.
Tags : 
it security, vulnerability management, risk management, qualysguard, risk optimization, countermeasure, threat, value
    
Qualys
Published By: Facebook     Published Date: Jun 15, 2011
Nielsen and Facebook recently joined forces to develop effective, near-real time ad effectiveness solutions to determine consumer attitudes, brand perception and purchase intent from advertising, including aided awareness, ad recall, message association, brand favorability, and purchase consideration.
Tags : 
facebook, nielsen, advertising, social media impression, social networking, customer engagement, brand marketing, social advocacy
    
Facebook
Published By: AUXILIO, Inc.     Published Date: Apr 12, 2011
The white paper examines the greater value of continuous process improvement methodology and standardization of workflow for managing change in a patient care environment.
Tags : 
managed print services, healthcare, health care, mps, workflow, efficiency, improvement
    
AUXILIO, Inc.
Start   Previous    104 105 106 107 108 109 110 111 112 113 114 115 116 117 118    Next    End
Search      
Already a subscriber? Log in here
Please note you must now log in with your email address and password.