groups

Results 76 - 100 of 175Sort Results By: Published Date | Title | Company Name
Published By: gyro     Published Date: Sep 10, 2015
The digital age has driven a rapid transformation of the IT role. No longer an order-taker, IT must now become a game-changer for the organization, according to new research gyro conducted addressing the perceptions, expectations and future priorities of IT. For IT to become a true change agent and business consultant, it must embrace its “human side” and show its relevance to business operations’ and leaders’ success. For many IT groups, this requires a change in culture and an updated mindset about the department’s ultimate purpose and focus, along with improvements in interdepartmental communication.
Tags : 
line of business, lob, future of it
    
gyro
Published By: Here Technologies     Published Date: Jul 26, 2019
Driver recruitment and retention are proving to be major problems for the trucking industry. The truck driver shortage is worse than ever, and driver turnover is at an all-time high. This leaves fleet owners and trucking companies trapped in constant recruitment mode costing them valuable time and resources. HERE Technologies explores three ways fleet owners can avert the driver staffing crisis and improve recruitment and retention leading to better, stronger fleets. With this eBook, discover: • Effective ways to offer benefits, incentives and competitive pay • Strategies to increase truck driver safety with technology • How to attract two of the largest groups in the US labor force
Tags : 
here technologies, transport and logistics
    
Here Technologies
Published By: HireRight     Published Date: Jul 31, 2013
In reading this story, it is easy to understand why the cleaning company willingly settled this case. Companies who send their employees into customers’ homes or whose employees are responsible for vulnerable groups, including minors, the disabled, and the elderly, should conduct background checks.
Tags : 
hireright, human resources, criminal background check, employee criminal record
    
HireRight
Published By: HireVue     Published Date: May 01, 2019
MOST HIRING IN THE 21ST CENTURY IS JUST A DIGITALIZATION OF HOW I T ’ S A LWAYS BEEN DONE With new technology, you can fundamentally reengineer it to be faster, more accurate, and more inclusive of underrepresented groups. This white paper will show you how world-class recruiting departments are seeing drastic improvement in time to hire, better quality hires, and increases in new hire diversity. They’re reimagining hiring so the interview is at the beginning of the hiring process.
Tags : 
    
HireVue
Published By: IBM     Published Date: Nov 11, 2008
IBM commissioned Forrester Consulting to survey 300 business and IT leaders from US and UK to determine the level of common understanding and alignment between business and IT groups on key issues related to impact of their existing processes on operational efficiency and business innovation and how BPM and SOA could improve the overall value their business processes deliver.
Tags : 
ibm, ebf, bpm, soa, enterprise applications, data management, business process management, service oriented architecture
    
IBM
Published By: IBM     Published Date: Mar 22, 2013
This whitepaper discovers how by implementing cloud computing across 6 fundamental workloads can transfer the way whole groups employees do their jobs, enabling them to speed new development and uncover new sources of revenue.
Tags : 
ibm, cloud computing, erp, bi tools, workload selection, analytics, lower cost of ownership, workforce
    
IBM
Published By: IBM     Published Date: Sep 03, 2013
This paper describes how workgroups and midsize companies can transform their spreadsheet-only process to create flexible and timely plans, budgets and forecasts. It outlines recommendations for implementing a complete performance management system, using IBM Cognos Express, an integrated reporting, analysis and planning solution purpose-built for workgroups and midsize companies.
Tags : 
transforming spreadsheets, planning, budgeting, forecasting, midsize companies, cognos express, management system, ibm
    
IBM
Published By: IBM     Published Date: Nov 11, 2014
Is email still the “killer app” it used to be? Social technologies and mobile capabilities are changing the way people communicate in the workplace. Many organizations are employing BYOD strategies and embracing social business tools like file sharing, chat, wikis and communities. In the past, email was used for storing and sharing documents and having conversations with groups. Tasks which are much better suited for today's social cloud collaboration tools. Email usage may be evolving, but email is not dead. In fact, everyone in the organization from executives to factory workers needs email to stay connected. And many organizations are moving their messaging to cloud to take advantage of the flexibility and cost savings a cloud environment provides.
Tags : 
social technologies, mobile capabilities, byod strategies, email usage, it management, knowledge management, enterprise applications, data management
    
IBM
Published By: IBM     Published Date: Jan 06, 2015
Is email still the “killer app” it used to be? Social technologies and mobile capabilities are changing the way people communicate in the workplace. Many organizations are employing BYOD strategies and embracing social business tools like file sharing, chat, wikis and communities. In the past, email was used for storing and sharing documents and having conversations with groups. Tasks which are much better suited for today's social cloud collaboration tools. Email usage may be evolving, but email is not dead. In fact, everyone in the organization from executives to factory workers needs email to stay connected. And many organizations are moving their messaging to cloud to take advantage of the flexibility and cost savings a cloud environment provides.
Tags : 
social workplace, social technologies, mobile capabilities, social business tools, it management, wireless, knowledge management, enterprise applications
    
IBM
Published By: IBM     Published Date: Feb 11, 2015
IBM Security Identity Governance and Administration provides an integrated, business-centric approach to help organizations improve security and reduce costs for managing accounts, groups, policies, credentials and access rights throughout the user lifecycle.
Tags : 
ibm security, business-centric strategies, security solutions, it policies, security, it management, business intelligence, business management
    
IBM
Published By: IBM     Published Date: Apr 01, 2015
Is email still the “killer app” it used to be? Social technologies and mobile capabilities are changing the way people communicate in the workplace. Many organizations are employing BYOD strategies and embracing social business tools like file sharing, chat, wikis and communities. In the past, email was used for storing and sharing documents and having conversations with groups. Tasks which are much better suited for today's social cloud collaboration tools. Email usage may be evolving, but email is not dead. In fact, everyone in the organization from executives to factory workers needs email to stay connected. And many organizations are moving their messaging to cloud to take advantage of the flexibility and cost savings a cloud environment provides. In this webcast, you will learn: • How the nature of email has changed and why everyone in your organization needs it. • Why the cloud makes sense for messaging for everyone from executives, to sales, to boundary workers, either as hybrid solution or for the entire workforce. • How email complements social business technologies and how you can start using your email more efficiently in the workplace. • How moving messaging to the cloud can help reduce IT cost and complexity.
Tags : 
email, social technologies, byod, file sharing, chat, cloud, ibm, networking
    
IBM
Published By: IBM     Published Date: Mar 29, 2017
To learn more about how SaaS is helping companies gain competitive advantage as opposed to simply reducing costs, we segmented survey respondents into three groups: • Pacesetters, who have the highest level of SaaS adoption and are gaining competitive advantage through their broad efforts • Challengers, who have adopted SaaS more narrowly but are gaining competitive advantage through the SaaS deployments they do have • Chasers, who have been slower to adopt SaaS and gain competitive advantage through its use Download now to learn more!
Tags : 
ibm, software, competitive advantage, cloud, saas, pacesetters, chasers
    
IBM
Published By: IBM     Published Date: Jul 22, 2016
Read the IBM IBV CPO Study ebook to learn: - Four steps top procurement groups can take to realize and sustain greater savings than their peers - Three ways top-performing procurement teams achieve a more effective approach to risk mitigation - How top performers use insights from suppliers to bring innovative ideas to the business
Tags : 
ibm, commerce, procurement, analytics, procurement analytics, data, big data, procurement organization
    
IBM
Published By: IBM     Published Date: Jan 05, 2017
Read the IBM IBV CPO Study ebook to learn: - Four steps top procurement groups can take to realize and sustain greater savings than their peers - Three ways top-performing procurement teams achieve a more effective approach to risk mitigation - How top performers use insights from suppliers to bring innovative ideas to the business
Tags : 
ibm, procurement, commerce, enterprise applications
    
IBM
Published By: IBM     Published Date: Mar 30, 2017
To learn more about how SaaS is helping companies gain competitive advantage as opposed to simply reducing costs, we segmented survey respondents into three groups: • Pacesetters, who have the highest level of SaaS adoption and are gaining competitive advantage through their broad efforts • Challengers, who have adopted SaaS more narrowly but are gaining competitive advantage through the SaaS deployments they do have • Chasers, who have been slower to adopt SaaS and gain competitive advantage through its use Download now to learn more!
Tags : 
ibm, software, competitive advantage, cloud, saas, pacesetters, chasers
    
IBM
Published By: IBM     Published Date: May 31, 2017
What defines cognitive manufacturing maturity? Our study found three stages of cognitive manufacturing maturity. We call those organizations in the earliest stage Observers, followed by Starters and Actives, respectively. These groups differ on two key characteristics: the presence of an overall strategy for cognitive manufacturing, and degree of strategic execution of multiple projects that enable higher project success and significantly fewer failed projects. Strategy is the crucial enabler of higher maturity. How do manufacturers get beyond the obstacles and barriers to increase cognitive manufacturing maturity? The obstacles encountered by our respondents are tied to organizational maturity. Overcoming them is fundamental to increase cognitive manufacturing success. In this report, we’ll first describe cognitive computing and how it gives rise to cognitive manufacturing. Then, we’ll review specific study findings and recommend actions for electronics executives.
Tags : 
cognitive manufacturing, cognitive computing, organizational maturity, electronics, ibv
    
IBM
Published By: IBM     Published Date: Jun 22, 2017
Security threats are very real, and the stakes are higher than ever. Each day, tens of thousands of malware variants are created, with new classes of threats continually added and improved upon. Savvy attackers use polymorphic programs to alter malware into new form factors after each delivery. And all of this is exacerbated by the proliferation of mobile devices, cloud computing and social media—in fact, the intersection of these technologies provides fertile new ground for threats and malware. Today’s attacks are often not random, but targeted for maximum financial gain and impact. Rogue individuals and groups are constantly innovating new ways to attack organizations’ most valuable assets. As a result, traditional methods of dealing with threats are no longer enough. Organizations need more threat intelligence than ever before in order to effectively protect themselves.
Tags : 
cyber security, global threat intelligence, malware prevention, cyber threat, protection
    
IBM
Published By: IBM APAC     Published Date: May 12, 2017
With these facts in mind, the need to help different age groups work well together is clear. Younger generations have fundamentally different views about work and the world in general, which can be problematic when they’re expected to work alongside older workers. You must find ways to bridge the gaps between generations, while empowering individual generations to work in the manner that best suits them. Read on to learn more.
Tags : 
workplace, mobile workplace, mobile environment, remote working, workplace environment, digital transformation
    
IBM APAC
Published By: IBM Watson Health     Published Date: Jul 06, 2018
The need Carson Tahoe Health needed insights to convince its board that an outpatient palliative care program could help address its higher-thanaverage mortality rates and help decrease the risk of future financial impact from those rates The solution The healthcare system used IBM® CareDiscovery to track and analyze end-stage patient mortality and related length of stay, readmissions, utilization and costs in key disease groups—by comparing those who participated in trial inpatient palliative care and those who did not The benefit The analysis was used to demonstrate to the system’s board that an outpatient palliative care service line was viable in terms of both cost savings and quality-of-care improvement
Tags : 
    
IBM Watson Health
Published By: Juniper Networks     Published Date: Oct 02, 2018
As customers demand and expect more of a digitized experience, the scale and volume of secure data that’s being transmitted across the network is increasing exponentially. At the same time, across the APAC region high digital connectivity, contrasted with low cybersecurity awareness, growing cross-border data transfers and weak regulations have made this data a global target. The growth in the “as-a-service” nature of the cybercrime marketplace is also fueling an increase in the number of traditional crime groups and individuals drawn into cyber offending. New sources of vulnerability from mobile, BYOD, CYOD, web-services and IoT devices are further broadening the cyber threat landscape with ever-more sophisticated forms of malware and DDoS attacks. Download the IDC Report to get some tips on how to stay protected against cybercrime.
Tags : 
    
Juniper Networks
Published By: Larsen & Toubro Infotech(LTI)     Published Date: Sep 17, 2019
Nordics based financial company had challenges in migrating the old legacy network design to Cisco ACI for a new Datacentre. Also it did not had service overview and CMDB to support 150 business services transition. LTI leveraged and implemented several ServiceNow modules, customised 100 odd patterns for 150 business services and executed extensive integration of 25 legacy systems. These transactions and implementation helped in easy cost computation for new business expansions ii. Benefits 1. 25% reduction in DC migration time by creating business service oriented move groups 2. Accurate costing of each business service for replication in new regions/geographies
Tags : 
application management, artificial intelligence, b2b technology, cloud applications, cloud architect
    
Larsen & Toubro Infotech(LTI)
Published By: LifeLock     Published Date: Mar 02, 2015
Every interaction, every communication, every touch point creates a digital breadcrumb — a piece of data that can put people at greater risk of identity theft. This paper from Forrester Research compares various segments and demographics to understand which groups are at the greatest risk of identity theft.
Tags : 
    
LifeLock
Published By: LifeLock     Published Date: May 10, 2016
Affinity groups, human resources organizations, and customer-facing companies search regularly for new ways to engage their targets. But how does that human resources organization, affinity group, or customer-facing company settle on that perfect “something extra”? Download now and find out how an out of the box idea can help maintain customer loyalty and protect your brand.
Tags : 
    
LifeLock
Published By: LogMeIn     Published Date: Jan 15, 2014
The following industry forecasts and findings highlight mobile’s growth potential and each on their own should merit merchants’ attention. Learn more about the potential of mobile growth through this whitepaper.
Tags : 
logmein, merchants and consumer, mobility, mobile mastery, industry insights, smartphones, research findings, e-tailing groups
    
LogMeIn
Published By: LogMeIn     Published Date: Mar 19, 2015
Support organizations are implementing new technologies and processes to better connect customers with technical support teams, and customer satisfaction is paramount. However, most organizations admit they're not proactively aligning their priorities with their customers’ expectations. Are the needs of the support team different from what customers want and expect? Recent research by HDI delves into the two groups’ expectations and priorities— according to support professionals—and explores how closely they're aligned. Download this white paper to learn more.
Tags : 
customer support, customer expectations, support technology, technical support
    
LogMeIn
Start   Previous    1 2 3 4 5 6 7    Next    End
Search Resource Library      

Add Resources

Get your company's resources in the hands of targeted business professionals.