degree

Results 126 - 143 of 143Sort Results By: Published Date | Title | Company Name
Published By: Cornerstone OnDemand     Published Date: Feb 05, 2018
We have a world of technology at our fingertips, but is it actually leading to stronger, more agile organizations? How do these new tools serve as the catalysts for more productivity and greater executions of companies’ larger marketplace ambitions? In the brief "4 Trends Redefining Performance Management,” we cover: 1. Embracing the Digital Transformation 2. Rethinking Performance Management 3. Rising Employee Engagement 4. Business Insights Download the brief to learn how you can expand HR's role in boosting company success.
Tags : 
performance management, performance, performance appraisal, employee engagement, goals, reviews, learning management system, performance management software
    
Cornerstone OnDemand
Published By: Heiler     Published Date: Feb 22, 2012
Today, many companies do not have a consistent and transparent process established in their Product Information Supply Chain. In this white paper you will find out just what exactly PIM 360° means and how it relates to your business.
Tags : 
heiler, software, mdm of product data, 360-degree, pim/product information management, multichannel commerce, print-catalog, e-catalog
    
Heiler
Published By: HP     Published Date: Aug 08, 2014
In any storage system it is essential to ensure that the integrity of the data stored is maintained so data can be recovered exactly as it was written. HP StoreOnce appliances have been designed with the necessary technology that delivers this essential high degree of data protection. HP has unique technology that protects data throughout its lifecycle when stored on the HP StoreOnce appliance. This paper will discuss the methods used at various stages to provide this high degree of data integrity.
Tags : 
storeonce, deduplication, storage, it benefits, backup systems, challenges, challenges, technologies
    
HP
Published By: Riverbed     Published Date: Sep 05, 2014
As organizations rely on IT to support critical business processes to an ever-greater degree, the importance of application performance management (APM) is growing. Gone are the days when systems monitoring and management could focus on components in isolation; instead, organizations must ensure that applications are operating at top e?ciency from end to end to support critical business processes. This requires a holistic focus on the end user’s application experience.
Tags : 
business, value, roi, application, performance, management, efficiency, application performance management
    
Riverbed
Published By: Blue Jeans Network     Published Date: Oct 29, 2013
Scalability and affordability have extended video beyond the boardroom to meet the demands of a growing mobile workforce. Cloud-based video conferencing has enabled companies to realize the full benefits of video: fact-to-face contact, efficient knowledge transfers and a degree of personal interaction that's proven critical for businesses hoping to gain a competitive advantage.
Tags : 
video conferencing, collaboration, cloud based video, mobile video conferencing, corporate agility, cloud, human resources, global hr management
    
Blue Jeans Network
Published By: Schneider Electric     Published Date: Jun 07, 2019
New digital technology now makes it feasible to integrate process control and SIF within a common automation infrastructure. While this can provide productivity and asset management benefits, if not done correctly, it can also compromise the safety and security of an industrial operation. Cybersecurity and sabotage vulnerability further accentuate the need for securing the safety instrumented system (SIS). Certainly, a common platform approach using similar hardware and software dedicated for control and safety functions, respectively, can provide the potential for cost savings. However, it is widely acknowledged that utilizing separate, independent, and diverse hardware/software for safety and control is the optimal way to protect against potentially catastrophic common cause and systematic design and application errors. Different vendors offer varied degrees of integration and solutions. The question is: how to provide an integrated control and safety solution with advanced functionality and productivity without compromising safety and security? And, where do users draw the line? A third-party (e.g., TÜV) certification of the hardware/software systems to IEC 61508 specifications carries significant advantages, but should this be the only criterion? How does a third-party certificate extend to the plant’s overall assignment of risk reduction credits for all independent protection layers (IPL)? Control system embedded safety logic solvers may actually increase the SIL requirements of the SIF if no credit is allowed for the distributed control system (DCS) as an IPL. Download the white paper to learn more.
Tags : 
smart control, empowered operators, optimized assets, future of automation, reliability, safety, cybersecurity, operational profitability
    
Schneider Electric
Published By: Infor     Published Date: Feb 27, 2007
With leading brands including Landliebe and Mona, Campina supplies milk, cheese, butter, desserts, yogurt and all kinds of dairy drinks in over 130 countries. Historically, each of these production and sales centers operated on an independent basis. While this allowed for a degree of localized efficiency, it presented a range of issues and potential fault lines which became exacerbated as the company, and the demands of its consumer grew.
Tags : 
productivity, supply chain management, erp, scm, enterprise resource planning, food, dairy, infor
    
Infor
Published By: Neolane, Inc.     Published Date: Sep 23, 2010
In the first instalment of this series, "Fight Marketing Fatigue Now," we discussed the challenge of improving relevancy and the varying degrees of personalization that exist within marketing organizations today. We made the case for a new approach, interactive one-to-one personalization. In this paper, we discuss how to achieve the related benefits including improved customer engagement, increased ROMI and measurable business value.
Tags : 
neolane, segmentation, romi, emarketing, branding, personalization, sms
    
Neolane, Inc.
Published By: Pentaho     Published Date: Jan 16, 2015
If you’re considering a big data project, this whitepaper provides an overview of current common use cases for big data, from entry-level to more complex. You’ll get an in-depth look at some of the most common, including data warehouse optimization, streamlined data refinery, monetizing your data, and getting a 360 degree view of your customer. For each, you’ll discover why companies are investing in them, what the projects look like, and key project considerations, including tools and platforms.
Tags : 
big data, nosql, hadoop, data integration, data delivery, data management, data center
    
Pentaho
Published By: Adobe     Published Date: Mar 06, 2015
Connect the left and right brains of marketing to deliver the most compelling content to the right person at the right time. Read the Adobe Campaign Guide to Touchpoint Marketing to learn new marketing models that will help you reimagine personalization and get a holistic, 360-degree view of your customers.
Tags : 
marketing guide, adobe, marketing models, marketing trends, customer lifecycle
    
Adobe
Published By: Cyveillance     Published Date: Jun 20, 2014
Phishing is defined by the Financial Services Technology Consortium (FSTC) as a broadly launched social engineering attack in which an electronic identity is misrepresented in an attempt to trick individuals into revealing personal credentials that can be used fraudulently against them. In short, it’s online fraud to the highest degree. Although it’s been around for years, phishing is still one of the most common and effective online scams. The schemes are varied, typically involving some combination of spoofed email (spam), malicious software (malware), and fake websites to harvest personal information from unwitting consumers. The explosive rise of mobile devices, mobile applications, and social media networks has given phishers new vectors to exploit, along with access to volumes of personal data that can be used in more targeted attacks or spear phishing. The fact that phishing attacks are still so common highlights their efficacy and reinforces the need to implement comprehensive phishing and response plans to protect organizations. An effective phishing protection plan should focus on four primary areas: Prevention, Detection, Response, and Recovery. High-level recommendations for each of the four areas are outlined in this whitepaper.
Tags : 
cyveillance, phishing, security, cyberattacks, cybercriminals, threats
    
Cyveillance
Published By: Polycom     Published Date: Oct 17, 2016
With its CX5100 and CX5500 products, Polycom (the sponsor of this study) has taken an innovative approach to resolving this situation. The CX5100 and CX5500 are 360 degree camera systems that sit in the middle of the conference room table, providing remote Skype for Business / Lync users with a better “connection” to the meeting room. And unlike traditional video conferencing systems, the “camera in the middle of the table” approach is flexible enough to support both standard / formal meetings and teaming sessions. Download this case study to learn more!
Tags : 
    
Polycom
Published By: CA Technologies     Published Date: Jun 04, 2015
Current approaches for predicting with a high degree of confidence the application performance prior to implementation into production can be antiquated, expensive and time consuming. This document outlines a next-generation performance management approach using Service Virtualization and Application Performance Management being adopted by progressive organizations around the world. Adopting a next-generation performance management approach can offer a range of benefits including efficiency gains in delivering applications, cost savings, improved agility and better performing applications. For organizations that increasingly rely on technology to provide value to stakeholders improving application delivery capability is critical to remaining competitive and relevant.
Tags : 
    
CA Technologies
Published By: IBM     Published Date: Jul 08, 2015
Salesforce.com is an industry leading cloud CRM solution which helps organizations streamline and effectively manage sales processes, customers and opportunities. The effectiveness of these initiatives can be improved dramatically by providing Salesforce with a 3600 view of the Customer to overcome the limitation of fragmented data that Salesforce currently relies on. This paper discusses how InfoSphere capabilities can be used to create comprehensive and accurate 3600 views of your customers from internal and external sources. This data is integrated seamlessly within Salesforce.com to help your sales teams get a complete view of the customer to help find the right contacts, allocate resources efficiently and identify new opportunities. This helps your sales teams be more efficient, effective and ultimately improve your win rate and drive more revenue.
Tags : 
ibm, salesforce, crm solutions, sales processes, infosphere, sales opportunities, knowledge management, enterprise applications
    
IBM
Published By: IBM     Published Date: Jul 08, 2015
For years, organizations have recognized that a better understanding of customers can translate to more sales, increased customer satisfaction and reduced customer churn. Initiatives focused on a 360-degree view of the customer have gone a long way toward providing those benefits by synthesizing customer profiles, sales history and other structured data from multiple sources across the enterprise. But today, customer-centric organizations are discovering that there is more opportunity for growth when they enhance that 360-degree view with information from more sources, both within and beyond the enterprise (see Figure 1). Information in email messages, unstructured documents and social media sentiments—previously beyond reach—is now extending the 360-degree view.
Tags : 
ibm, e360, customer satisfaction, customer retention, sales history, big data, it management, knowledge management
    
IBM
Published By: Lenovo - APAC     Published Date: Jan 28, 2019
Australian businesses have long been recognised as leaders in the adoption of cloud services and the migration of core infrastructure to cloud platforms. Yet as ambitious ‘cloud-first’ programs are executed, performance and complexity issues have led many organisations to embrace the middle ground – a hybrid IT solution combining public cloud and on-premises infrastructure. Fast-growing hyperconverged infrastructure (HCI) platforms are increasingly being recognised as an ideal enabler for this strategy, with a software-based design that combines robust computing infrastructure with a high degree of centralisation, integration, flexibility, and analytics-based monitoring and manageability. Read how companies such as Beam Suntory have redefined enterprise architecture and learn more about the way an integrated hyperconverged infrastructure can help you build the right infrastructure for the future.
Tags : 
lenovodcg, nutanix, hyperconvergedinfrastructure, hci
    
Lenovo - APAC
Published By: Cisco Umbrella EMEA     Published Date: Feb 06, 2019
A number of obstacles stand between you and a safe network. Your security solution shouldn't be one of them. Avoid these six common security pitfalls that put your users, their devices, and your data at risk.
Tags : 
    
Cisco Umbrella EMEA
Published By: Cisco Umbrella EMEA     Published Date: Feb 08, 2019
A number of obstacles stand between you and a safe network. Your security solution shouldn't be one of them. Avoid these six common security pitfalls that put your users, their devices, and your data at risk.
Tags : 
    
Cisco Umbrella EMEA
Start   Previous    1 2 3 4 5 6     Next   End
Search Resource Library      

Add Resources

Get your company's resources in the hands of targeted business professionals.