• RSS
  • Twitter
  • FaceBook

Related Topics

Add White Papers

Get your company's white papers in the hands of targeted business professionals.

technology management

Results 326 - 350 of 789Sort Results By: Published Date | Title | Company Name
By: Adobe     Published Date: Oct 10, 2019
In this white paper we discuss the opportunities and challenges associated with customer experience management and highlight three key areas of future focus for successful European marketing leaders: customer consent management in marketing in the light of GDPR; the future of AI-driven customer engagement in marketing; and customer journey management as the new mantra and operating model for marketing operations management. Our observations and conclusions are backed by rigorous research results based on a representative sample of telephone interviews with marketing leaders across Europe. We hope you enjoy this paper and would be interested to hear your feedback. We believe the paper provides the benchmarks and insights to guide the next generation of marketing domain digital technology deployments and beyond into enterprisewide customer experience management.
Tags : 
    
Adobe
By: NuView     Published Date: Jun 07, 2011
This whitepaper brings the concept of "finding the right balance" to the forefront when discussing or considering the best approach to deploying HRIS / HRMS solutions. Download to learn the 5 Guidelines to finding the right balance in the HR Technology Challenge.
Tags : 
nuview, hr technology, hris solution, hrms solution, hcm, human capital management, steven goldberg, finding the right balance
    
NuView
By: Brainloop     Published Date: Nov 09, 2011
Business users are a key part of a company\'s security, and even the most conscientious employees can introduce serious breaches of security policy. IT can do everything in its power to secure the company\'s confidential documents--provide first-class security infrastructure, develop reasonable security policies and engage in extensive communication and training--yet still people fail to comply. The solution is to provide security that helps people do their jobs more efficiently, thereby inducing users to follow best security practices without even knowing it.
Tags : 
brainloop, technology, security, user compliance, indentity management, access control, identity management, internet security, intrusion prevention, security management, security policies
    
Brainloop
By: CCMI     Published Date: Sep 19, 2012
In this whitepaper, you'll discover the five essential elements to consider when evaluating tools for telecom management.
Tags : 
information technology, telecommunications, telecom, telecom management
    
CCMI
By: IBM APAC     Published Date: Jul 16, 2018
Elinar Oy Ltd Jumps to the front of the pack with disruptive innovation powered by AI technology Artificial intelligence (AI) solutions can—and will—transform processes across every industry. Long-time innovator Elinar saw an opportunity to take its content management solutions to new levels with AI technology. By choosing IBM infrastructure, the company enabled faster, easier development, exceptional performance and shorter time-to-market.
Tags : 
    
IBM APAC
By: KPMG     Published Date: Jun 06, 2019
Traditional IT finance funding processes can no longer keep pace with fast-changing customer demands. Discover a more dynamic approach to funding technology and innovation – one that enables investing almost anytime and anywhere. Read this briefing to find out: • why funding must be uncoupled from the annual budgeting process • how the decentralisation of IT is shaping investment strategies • what a new approach to evaluating success should look like • how Technology Business Management can help.
Tags : 
    
KPMG
By: SAP Inc.     Published Date: Jun 16, 2009
Gain insight into how you can meet organizational readiness challenges facing your company as you adopt new technology. Take the right steps and implement change management strategies to ensure that your organization adapts effectively to change and ultimately becomes a best-run business.
Tags : 
sap, organizational readiness, organizational change management, ocm, change management, enterprise applications, total cost of ownership, international computing
    
SAP Inc.
By: Cornerstone OnDemand     Published Date: Feb 05, 2018
We have a world of technology at our fingertips, but is it actually leading to stronger, more agile organisations? How do these new tools serve as the catalysts for more productivity and greater executions of companies’ larger marketplace ambitions? In the brief "4 Trends Redefining Performance Management,” we cover: 1. Embracing the Digital Transformation 2. Rethinking Performance Management 3. Rising Employee Engagement 4. Business Insights Download the brief to learn how you can expand HR's role in boosting company success.
Tags : 
    
Cornerstone OnDemand
By: TriNet     Published Date: Nov 08, 2017
This eGuide contains guidelines for entrepreneurs looking to build a scalable infrastructure, including robust HR technology, to help save time and effort so that management can focus on company growth.
Tags : 
    
TriNet
By: apperian     Published Date: Apr 13, 2012
Uncover the benefits of BYOD and learn how the proper technology combined with effective policies can enable employees to increase productivity while protecting your company assets at the same time.
Tags : 
apperian, mobile device, technology, it management, technology device, business technology, mobile computing, smart phones, wireless communications, project management
    
apperian
By: apperian     Published Date: Apr 13, 2012
This executive insight examines the needs for organizations to deploy a holistic enterprise mobility management solution that goes well beyond mobile device management.
Tags : 
apperian, technology, enterprise applications, mobile device, wireless communication, mobile management, mobile data systems, wireless communications, wireless messaging, wireless phones, application integration
    
apperian
By: apperian     Published Date: Apr 13, 2012
With more mobile workers using personal smartphones and tablets to conduct business, 2011 is being heralded as the year of mobile apps in the enterprise. The benefits of mobile apps initiatives will far outweigh the challenges of getting them into the enterprise, in the form of increased work productivity and customer response, analysts say.
Tags : 
apperian, technology, enterprise applications, mobile device, wireless communication, mobile management, mobile data systems, wireless communications, wireless messaging, wireless phones, application integration
    
apperian
By: apperian     Published Date: Apr 13, 2012
This case study focuses on the retail industry and how one of the world's most visible global brands employed a self-service application, powered by Apperian's EASE platform - on Apple iPads in their retail outlets. Learn how Apperian's EASE helps this company deploy and manage their applications for a global user base, in an easy-to-use and easy-to-update manner.
Tags : 
apperian, technology, enterprise applications, mobile device, wireless communication, mobile management, mobile data systems, wireless application software, wireless communications, application integration
    
apperian
By: apperian     Published Date: Apr 13, 2012
The BYOD demand was initially created by the popularity of the iPhone and the iPad from Apple. Relying on the closed iOS operating environment, these devices presented a fairly straightforward challenge for businesses that wanted to allow access to corporate apps without compromising the security of company data. Read to find out more.
Tags : 
apperian, technology, enterprise applications, mobile device, wireless communication, mobile management, wireless application software, wireless communications, wireless messaging, application integration, application performance management
    
apperian
By: Riverbed     Published Date: Apr 26, 2012
Download this case study to learn how Constangy, Brooks & Smith, a labor and employment law firm, improved the efficiency of their IT infrastructure. With the help of solutions from Riverbed Technology, the firm consolidated and virtualized many different servers, and eliminated the expense and difficulty of remotely managing hardware and software. Learn how you can too.
Tags : 
riverbed, technology, infrastructure, it management, technology software, business technology, application integration, business activity monitoring, business analytics
    
Riverbed
By: Riverbed     Published Date: Apr 26, 2012
This CIO article discusses how WAN optimization solutions, like those Riverbed Technology offers, can accelerate private cloud implementations and enable users to be productive, while helping to deliver the cost and management efficiencies businesses require. Read the informational story now and learn why companies like MasterBrand Cabinets chose Steelhead WAN optimization appliances for superior performance.
Tags : 
riverbed, wan, cloud, private cloud, business technology, wan optimization, wide area networks, application integration, application performance management
    
Riverbed
By: ServiceSource     Published Date: Nov 01, 2013
In this book we describe best practices honed through 13 years of experience and partnership with some of the leading technology companies in the world. These best practices will give you insight into three key areas: • Data management & renewal opportunity generation • Sales strategy & execution • Continuing the renewal cycle We hope you enjoy this book!
Tags : 
reducing customer churn, servicesource, recurring revenue, higher profit margins, drive innovation, drive performance, saas companies, competitive markets, less loyal customers, the cloud, profitable revenue stream, unique business process, technology platform, deliver real-time, fact-based plan, renewal ready data, accelerate analytics, channel partners, science of renewals, application performance management
    
ServiceSource
By: Webroot Inc     Published Date: Jan 15, 2015
The problem with the vast majority of network and endpoint security solutions is that they operate on the premise of static whitelists and blacklists. These lists do not account for the changing nature of URLs, IPs, files and applications, nor for the volume of unknown threats permeating the web, meaning they cannot be used to provide adequate protection. Compounding this problem is that commercial network security technology, such as NGFWs and unified threat management systems, can easily flood the organization’s network security teams with too many alerts and false positives, making it impossible to understand and respond to new threats. As a result, not only do these threats evade the security technology and land with the victim’s infrastructure, but they also have plenty of time to steal sensitive data and inflict damage to the victim’s business. The final characteristic of the latest attacks is how quickly they compromise and exfiltrate data from the organization, compared to the
Tags : 
firewall, network security, urls, ips, adequate protection, security
    
Webroot Inc
By: Adobe     Published Date: Apr 17, 2017
The ideal customer experience is everything today, and it starts with a modern digital foundation. You can’t give customers the timely and relevant experiences they expect with outdated solutions that are cobbled together. Read The Blueprint Redefined to see how a modern digital foundation can get you there. You’ll learn: How a unified platform lets you easily manage and refine customer experiences Three steps to deliver great digital experiences on all devices The roles of personalization, analytics, and asset management
Tags : 
customer experience, modern solutions, modern digital foundation, streamlined technology, user friendly interface, personalization, asset management
    
Adobe
By: Landis + Gyr     Published Date: May 30, 2017
Learn how five asset management strategies have evolved to unlock real-time data. Today, many utilities are developing transformative, data-driven asset management strategies that build on their advanced metering infrastructure (AMI) investments. The results? Improved reliability, customer satisfaction, efficiency, and long-term planning. In this white paper, we examine the relationship between asset management and technology: • How technology advances have driven the evolution of asset management • 5 asset management strategies built on real-time data • How you can prepare for a distribution-centric world
Tags : 
asset management, analytics, data, ami, landis
    
Landis + Gyr
By: CA Technologies EMEA     Published Date: May 23, 2018
In the digital economy, application programming interfaces (APIs) are essential for executing ideas quickly and seizing new business opportunities. They are the building blocks of digital transformation, enabling organizations to deliver exceptional customer experiences, create new revenue streams and connect employees, partners, apps and devices to data—anytime, anywhere. APIs are not necessarily a new technology, but in today’s digital world, they have risen in prominence and become important to every facet of the enterprise. This in turn has increased the demand for effective API management. But what does an effective solution look like? The API Management Playbook will help you understand: • Why digital transformation is crucial in the application economy • How APIs are the building blocks of digital transformation • Which key stakeholders in your organization are impacted by APIs • What the API lifecycle is and how it relates to API management
Tags : 
    
CA Technologies EMEA
By: CyberSource     Published Date: Sep 26, 2017
With today’s customers demanding fast and seamless experiences, it’s critical that merchants’ payment technology evolve just as quickly. Read this guide to discover why payment is strategic to business operations today and how to master payment management to drive business success.
Tags : 
    
CyberSource
By: Forcepoint     Published Date: Jun 06, 2019
Unlike traditional network architectures, software-defined wide-area networking (SD-WAN) makes it possible to harness existing network technology to better align operations and business policies. While many companies identify a need to evolve to SD-WAN, they are not always convinced SD-WAN can deliver the necessary enterprise capabilities. Join us for a webinar with Link-Connect to learn how they use Forcepoint NGFWs to deliver enterprise-class SD-WAN to manage more than 400 sites from a single management console. In this webcast, learn how Forcepoint NGFW: Simplifies operations. Management is easier with central management, visibility and hierarchical policies. Saves investment dollars. Smarter use of capacity and the ability to visualize and prioritize traffic reduces connectivity costs. Boosts business outcomes. Optimized capacity, increased security and ensured high availability
Tags : 
    
Forcepoint
By: Tenable     Published Date: Feb 05, 2018
"This IDC Technology Spotlight examines the evolution of vulnerability management. By leveraging the cloud and new technologies that deliver greater visibility, organizations can gain an accurate picture of their assets and overall risk posture. This is a critical step toward addressing the current landscape where attackers are using a wide variety of vectors such as mobile, social, and cloud-based attacks to infiltrate organizations and steal data. By reading this report you will get an overview of: - Benefits of cloud-based security and vulnerability management - Challenges of adopting cloud-based vulnerability management - IDC assessment of Tenable.io cloud vulnerability management"
Tags : 
vulnerability management, analyst report, idc
    
Tenable
By: Tenable     Published Date: Jan 25, 2019
"This whitepaper from the SANS Institute focuses on the growing use and benefits derived from information technology (IT) and operational technology (OT) convergence which includes more effective management and operation of contemporary control systems. IT/OT convergence carries unique challenges that make managing and securing an industrial control system (ICS) more difficult. This is due to greater technical complexity, expanded risks and new threats to more than just business operations. This paper explores the issues that arise with the blending of IT and OT into combined cyber-physical systems where risks must be identifed and managed. Download this report to get answers to these questions: -Why are digital asset inventories critical for IT/OT security risk management? -How does knowledge about risks and vulnerabilities to IT/OT systems lead to better risk management? -Can applying even a few of Center for Internet Security (CIS) Controls make a marked difference in the securit
Tags : 
    
Tenable
Start   Previous    7 8 9 10 11 12 13 14 15 16 17 18 19 20 21    Next    End
Search White Papers      

Community Area

Log in | Register

Solution Center

Follow TechGenix on Twitter