• RSS
  • Twitter
  • FaceBook

Related Topics

Add White Papers

Get your company's white papers in the hands of targeted business professionals.

investments

Results 101 - 125 of 451Sort Results By: Published Date | Title | Company Name
By: Payscale, Inc     Published Date: Jun 15, 2018
Leading a successful business means knowing the market, understanding product trends, hiring the right people, enabling those people, staying on top of expenses, making the right investments and countless other responsibilities. One area you may or may not have on your mind is compensation. In today’s tight talent market and ever-increasing competition spurred by technology, the web and globalization, getting compensation right is more important than ever. It impacts recruiting and retention, sure, but it also affects company culture and even your bottom line. It has legal implications, too. With the changing demographics (and expectations) of the current workforce, plus automation opportunities today’s software provides, it’s time to modernize your organization’s compensation. In this guide, we’ll share in detail the reasons you should make modernizing your comp a priority, the value and ROI of implementing modern compensation software and specifically how PayScale’s modern comp solut
Tags : 
    
Payscale, Inc
By: Citrix     Published Date: Jun 15, 2018
It used to be that you would build out your datacenter with all the right considerations in place, purchasing equipment that was sized to meet the needs of your organization for today and the near term future. Change used to be merely planning for capacity upgrades or network expansion, or migrating to the latest application version—or more simply put: things we could measure, control and manage. With the advent of the cloud, the rise in cyber-based threats, and the need to do more, faster, we’re witnessing a perfect storm that is making it more and more difficult for the enterprise to plan for change, and to maximize the investments that they make in their IT infrastructure today. This eBook will focus on considerations that you should make when deciding on an ADC solution that can not only survive these changes, but help create opportunities for innovation as the enterprise strives towards digital transformation. This guide will help you understand the changes that are currently unde
Tags : 
    
Citrix
By: iShares by BlackRock     Published Date: Jun 15, 2018
While the accumulated knowledge of a portfolio manager should not be undervalued, a move toward more systematic instrument selection could ultimately enhance fund returns. This material is provided for educational purposes only and is not intended to constitute investment advice or an investment recommendation within the meaning of federal, state, or local law. Investing involves risk, including possible loss of principal. This study was sponsored by BlackRock. BlackRock is not affiliated with Greenwich Associates, LLC, or any of their affiliates. iSHARES and BLACKROCK are registered trademarks of BlackRock, Inc., or its subsidiaries. All other marks are the property of their respective owners. Prepared by BlackRock Investments, LLC, member FINRA. BlackRock, Inc. is not affiliated with The Economist. 530180
Tags : 
best practices, business management, return on investment
    
iShares by BlackRock
By: Genesys     Published Date: Jun 13, 2018
Ease, effectiveness and emotion drive great customer service, but top-line growth requires that application development and delivery (AD&D) professionals keep an eye on trends. Forrester Research has identified 10 customer service trends in 2018 for AD&D and others who support customer service. Before you strategize on improving your quality of service, read this Forrester Report by Vice President and Principal Analyst Kate Leggett. You’ll learn which investments are critical and the advantages of: • Focusing on context and inquiry type to deliver the best customer experience • Using automation and AI to uncover new revenue streams and transform operations • Exploring new labor models to maximize human connections in a digital world
Tags : 
customer service, ease, effectiveness, automation
    
Genesys
By: Epicor     Published Date: Jun 11, 2018
When determining which investments to make in their technology infrastructure, organizations will often choose to make no changes at all. While this decision avoids short-term costs and business disruption, it will simply delay the inevitable—even making it worse. The cost of doing nothing is expensive in the long term. This report—from the independent researchers at Aberdeen Group—outlines the reasons organizations choose not to upgrade enterprise resource planning (ERP) software and cautions against this approach, supplying detailed research that illustrates the benefits of keeping your systems current. Epicor has a history of providing software solutions tailored specifically for the manufacturing industry. Check out the report, and see how upgrading to Epicor ERP can help grow your business.
Tags : 
erp software, enterprise resource planning (erp), manufacturing, cloud erp
    
Epicor
By: NetApp     Published Date: May 29, 2018
This white paper discusses AI infrastructure challenges and how NetApp can help you build a data pipeline for your deep learning workflows today, while future-proofing investments in your AI infrastructure. Careful infrastructure planning can smooth the flow of data through your deep learning pipeline, lead to faster time to deployment, and maximize competitive differentiation.
Tags : 
    
NetApp
By: CA Technologies EMEA     Published Date: May 25, 2018
CA Project & Portfolio Management is a comprehensive solution for ensuring your business strategy is on target through planning, execution, and insights. CA PPM enables your organization to plan and prioritize investments in alignment with business strategies, track project execution, and shift funding and resources to ensure success and meet changing priorities.
Tags : 
project, portfolio, management, calculator, execution
    
CA Technologies EMEA
By: iShares by BlackRock     Published Date: May 21, 2018
Visit www.iShares.com to view a prospectus, which includes investment objectives, risks, fees, expenses and other information that you should read and consider carefully before investing. Investing involves risk, including possible loss of principal.Visit www.iShares.com to view a prospectus, which includes investment objectives, risks, fees, expenses and other information that you should read and consider carefully before investing. Investing involves risk, including possible loss of principal. The iShares Funds are distributed by BlackRock Investments, LLC (together with its affiliates, “BlackRock”).This study was sponsored by BlackRock. BlackRock is not affiliated with Greenwich Associates, LLC, or any of their affiliates. iSHARES and BLACKROCK are registered trademarks of BlackRock, Inc., or its subsidiaries. All other marks are the property of their respective owners. BlackRock, Inc. is not affiliated with The Economist. 503791
Tags : 
business management, financial management
    
iShares by BlackRock
By: HireVue     Published Date: May 18, 2018
Recruiting and selecting talented people has become a top HR priority. To support this priority, many organizations are leveraging assessment tools and processes to find, hire, and select the best candidates. To better understand both the use and value of modern assessments, HR.com and its partner, HireVue, launched The State of Assessments survey. The investigation covered the following topics: • The biggest challenges to hiring the best talent • Primary benefits and uses of assessments • Features that HR professionals want most from assessment tools • Most commonly used components of assessments • Time-to-completion and completion rates associated with assessments • The role of video interviewing in the assessment process • Future investments in pre-hiring assessments • And, finally, the ways that high-performing organizations tend to differ from other organizations in terms of how they use these tools
Tags : 
    
HireVue
By: Dell PC Lifecycle     Published Date: May 18, 2018
Enterprise PC Buying Patterns Are Changing As Buyers Look To Improve Both Security And The Employee Experience At Once As employee mobility increases globally and enterprise investments shift to tablets and laptops, organizations are assessing their ongoing investment in traditional PCs. One thing that remains clear is that enterprise PC buyers still value the security and performance offered by fixed computing solutions. They also say that new form factors like the micro PC help them deliver a better experience to employees, which they value at least as much as security.
Tags : 
    
Dell PC Lifecycle
By: Hewlett Packard Enterprise     Published Date: May 11, 2018
The tipping point has arrived. Large enterprises are planning their next-generation datacenters around flash-based storage, and for good reason. Flash arrays provide read and write performance that is orders of magnitude faster than spinning media at a total cost of ownership that is on par with disk and will soon be lower. The benefits not only include improved application performance, but more consistent performance, lower latency, reduced storage footprint, streamlined storage administration, and lower operating costs. These advantages are too beneficial to your business to ignore. That’s why flash is becoming the standard for new storage investments.
Tags : 
    
Hewlett Packard Enterprise
By: Jamf     Published Date: May 01, 2018
According to a recent survey, more than half of enterprise organizations now offer their employees the ability to choose what type of computer they use at work. Of those organizations offering choice, 72% employees choose Mac and 28% choose PC.** As Apple device numbers rise in business and education environments around the globe, it’s imperative that technology investments are maximized so that organizations can leverage Mac, iPad, iPhone and Apple TV to their full potential. This can put a heavy burden on IT staff that are now tasked with managing this influx of new devices – especially those in established Windows environments.
Tags : 
    
Jamf
By: iShares by BlackRock     Published Date: Apr 19, 2018
We update our three 2018 investment themes against a backdrop of synchronized global growth, rising inflation and interest rates, higher equity market volatility and more economic uncertainty. By submitting this form you agree to share your contact information with BlackRock and to follow-up communication. Investing involves risk, including possible loss of principal. Prepared by BlackRock Investments, LLC. iSHARES and BLACKROCK are registered trademarks of BlackRock, Inc., or its subsidiaries. All other marks are the property of their respective owners. BlackRock, Inc. is not affiliated with The Economist. 483635
Tags : 
ishares, institutional investors, global growth, trade wars, business management, business metrics
    
iShares by BlackRock
By: iShares by BlackRock     Published Date: Apr 19, 2018
In this paper, we examine the evolution of the bond market through three interconnected lenses: the liquidity environment, market structure and product preferences. By submitting this form you agree to share your contact information with BlackRock and to follow-up communication. Investing involves risk, including possible loss of principal. Prepared by BlackRock Investments, LLC. iSHARES and BLACKROCK are registered trademarks of BlackRock, Inc., or its subsidiaries. All other marks are the property of their respective owners. BlackRock, Inc. is not affiliated with The Economist. 483635
Tags : 
ishares, bonds, bond market, liquids, risk management
    
iShares by BlackRock
By: Centrify Corporation     Published Date: Apr 13, 2018
As business models have become increasingly digital, high-profile, reputation-damaging security breaches are grabbing more news media headlines. Leading companies have ramped up their investments in cybersecurity, yet that spending is often not well aligned with actual threats. Studies have shown that server-focused solutions such as network anti-virus, malware detection and website firewalls attract the biggest investments, ignoring the fact that misuse of privileged credentials is by far the most common cause of breaches. The reasons for this disconnect are not well understood, in part because it sits at the intersection of the people and technology domains. This survey, conducted by WSJ Custom Studios with sponsorship from Centrify, seeks insights into senior-level thinking on this issue, including current cybersecurity priorities and the perceived degree of alignment between threats and solutions.
Tags : 
    
Centrify Corporation
By: Great Bay Software     Published Date: Apr 12, 2018
"Healthcare organizations have significantly more to consider than the average business when it comes to network and device security. Concern over code modification, key compromise, password-based vulnerabilities and man-in-the-middle attacks have caused hospital CIOs and CISOs to rethink their security strategies and investments. The threat to these devices has even been assigned its own term: medjacking, a shortened form of “medical device hijacking.” Download this white paper for five best practices to mitigate threat and attacks that can put lives, patient trust and the growth of the healthcare organization at risk. Access the white paper today!"
Tags : 
    
Great Bay Software
By: Optimizely     Published Date: Apr 06, 2018
The Need When building websites and applications, too many companies make decisions- on everything from new product features, to look and feel, to marketing campaigns- using subjective opinions rather than hard data. The Solution Companies should conduct online controlled experiments to evaluate their ideas. Potential improvements should be rigorously tested, because large investments can fail to deliver, and some tiny changes can be surprisingly detrimental while have big payoffs.
Tags : 
    
Optimizely
By: OKTA     Published Date: Mar 30, 2018
"The enterprise cloud revolution is here. IT organizations everywhere, from small and mid-sized to Fortune 500 companies, are moving from on-premises software to on-demand, cloud-based services. As enterprise IT makes this transition to a new hybrid on-demand/on-premises configuration, controlling access to applications becomes increasingly important. CIOs and their teams have a whole new set of identity management challenges; their role is also fundamentally changing. As the steward of these new services, IT must provide insight and advice about Software-as-a-Service (SaaS) products to ensure the company gets the highest business value of their investments. Read this eBook to learn eight main identity and access management (IAM) challenges of adopting and deploying cloud applications. And, most importantly, best practices for addressing each of them."
Tags : 
    
OKTA
By: Anaplan     Published Date: Mar 29, 2018
In recent months, leaders at some of the world’s largest consumer packaged goods (CPG) companies have spoken publicly about how ZBB is helping them save on overhead costs, which can then be used to reinvest in growth through innovation or bolster their margins. As consumers increasingly have more choices, these companies are finding their margins squeezed, and with direct expenses already trimmed back to the bare minimum, the only place to look is sales, general and administration (SG&A), and other overhead expenses.
Tags : 
zero, based, budgeting, investments, consumers, margins
    
Anaplan
By: Mercer     Published Date: Mar 28, 2018
It’s a pivotal moment for both CHROs and CFOs to take leadership roles in building a stronger foundation for accelerating business growth. This investment guide will show you how!
Tags : 
mercer, workforce management, tax reform, employee investment, human resources, incentive compensation, workforce management software, financial management
    
Mercer
By: Hitachi Vantara     Published Date: Mar 21, 2018
Digital transformation is top of mind for CIOs and business leaders for clear and practical reasons. It offers an opportunity to create new revenue streams and meet changing customer demands, as well as a way to address the rise of digital insurgents trying to hijack core markets. What’s needed is a common resource that both IT and business managers intrinsically value, one that can guide decisions about new business initiatives and related technology investments. That rallying point is enterprise data. Because incumbents possess richer reserves of business information, they wield a competitive advantage that even the most disruptive insurgents can’t claim. The key is for established companies to unlock the full potential of this important resource to fuel business transformation and help to maintain their leadership positions in volatile and quickly evolving markets.
Tags : 
    
Hitachi Vantara
By: IBM APAC     Published Date: Mar 19, 2018
We know that flash storage can provide significant benefits and deliver needed agility for large businesses, but what about medium-sized businesses (MMB = 500 to 999 employees)? IBM asked Forrester Consulting to look into adoption and use of flash storage technologies by mid-market organizations. A snapshot survey of 106 IT professionals found the following: › MMBs are actively adopting flash storage › Flash is exceeding expectations regarding cloud management, flexibility and security › A majority of respondents expect to continue their investments, with almost half aspiring to an all-flash storage environment. To learn more download this report.
Tags : 
    
IBM APAC
By: Tenable     Published Date: Mar 08, 2018
Which questions have you overlooked and why do the answers matter? According to Gartner, “OT SRM (security and risk management) leaders must ask the right questions during the technology procurement process to achieve long-term success in their security investments.” Further, Gartner states, “Translating IT security practices and copying IT security technology will not result in a secure operational technology (OT) environment.” By reading “7 Questions SRM Leaders Aren't Asking OT Security Providers,” you’ll learn which questions to ask, why they matter, and be armed with follow-up guidance to make smarter decisions. Questions covered include: - Does the Solution Provide Asset Discovery to Enable Operational Continuity and System Integrity? - Does the Solution Detect and Alert on Known Common Vulnerabilities and Exposures? - Does Your Solution Provide IT Support in Addition to OT? - Does Your Solution Support Secure IT/OT Alignment? Threats and vulnerabilities originally targeti
Tags : 
    
Tenable
By: SAS     Published Date: Mar 06, 2018
Despite heavy, long-term investments in data management, data problems at many organizations continue to grow. One reason is that data has traditionally been perceived as just one aspect of a technology project; it has not been treated as a corporate asset. Consequently, the belief was that traditional application and database planning efforts were sufficient to address ongoing data issues.
Tags : 
    
SAS
By: SAS     Published Date: Mar 06, 2018
These emerging technologies and solutions certainly are not unique to financial services. But Stewart, a business director of security intelligence solutions within the SAS Security Intelligence Practice, sees particular interest and application in AML circles. "There remain a good number of manual processes within financial crimes departments in financial institutions, and AI can help automate some of those rote tasks such as document review or alert triage," he says. "Due to investments in technology, there is a lower barrier of entry for midsized institutions. "And finally, there's this anxiety over the unknown - those risks they are not able to detect, that may be hidden using traditional techniques - so they're hoping that more advanced, unsupervised learning techniques can be used to identify those edge cases or behaviors that are out of norm." In an interview about analytics and the AML paradigm shift, Stewart discusses: • The new industry intrigue with artificial intelligence a
Tags : 
    
SAS
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search White Papers      

Community Area

Log in | Register

Solution Center

Follow TechGenix on Twitter