sign step

Results 51 - 75 of 87Sort Results By: Published Date | Title | Company Name
Published By: Comdata     Published Date: Jul 05, 2017
The CEO’s signature is on the dotted line and you’ve convinced your executive team to implement a virtual credit card program, also known as ePayables. That is something to celebrate! After all, you have taken the first step in automating your AP processes, improving your profit margin and reducing paper checks. But don’t celebrate for too long; it’s time to get started on implementing your program so you can start reaping the rewards.
Tags : 
    
Comdata
Published By: InfoPro Learning     Published Date: Jun 01, 2017
As the benefits of investment in Learning and Development continue to be signaled to the market, Chief Learning Officers and leaders of learning organizations will be taking center-stage in the transformation of their organization. In addition, companies spent just over $180 billion on corporate training last year, putting immense pressure on training leaders to show return on investment. With the spotlight on, these CLOs and other leaders of learning organizations will be measured across three core levers; transforming the business performance of learners, creating learning experiences that engage learners, and improving the operational efficiency of the organization. Download The Three Levers of a Successful CLO to learn the first step in aligning yourself with the three levers that business find most important.
Tags : 
l&d outsourcing, training outsourcing, business transformation, learning experience, learning strategy, learning measurement, managed learning services, lbpo, learning business process outsourcing, learning and development
    
InfoPro Learning
Published By: Winshuttle     Published Date: Apr 18, 2017
Uploading bulk information to SAP doesn’t have to be time consuming and complex. Rather than rely on SAP’s Legacy System Workbench (LSMW) which was designed for IT professionals for data migration projects, business users can leverage a non-technical alternative in a few simple steps to create and update data in SAP for everyday business transactions and data projects. This white paper provides a side-by-side comparison of LSMW’s 14 step process and Winshuttle Studio’s 3 step process to upload/download data and highlights why Winshuttle’s business led, IT enabled solution provides many benefits to the organization.
Tags : 
    
Winshuttle
Published By: Cornerstone OnDemand     Published Date: Mar 27, 2017
Do you believe that your organisation could use a talent management initiative? Need help making the case to a business leader? This asset will help you prepare by giving you tips on topics such as: • Thinking like an executive • Identifying talent-related challenges • Assigning metrics to ensure accountability Interested in learning more about building your business case? Download 6 Steps to Making the Case for Talent Management.
Tags : 
    
Cornerstone OnDemand
Published By: DocuSign     Published Date: Feb 13, 2017
"As HP digitized its contracting process with DocuSign, it went from 23 steps down to 7. Contracts are signed in 4 days down from 23 days—a 93% improvement in turnaround time. ""Our workforce is mobile; our salesforce is mobile. People want to do things on their laptops, tablets and smartphones. DocuSign enables us to do that. It is a digital enterprise solution."" -- Nick Gunn, SVP of Global Corporate Services at Hewlett-Packard. See more of their story.
Tags : 
    
DocuSign
Published By: CBRE     Published Date: Oct 11, 2016
Real estate can be a significant competitive differentiator for businesses in the race for talent. Leading commercial real estate firm, CBRE, outlines the steps organizations need to consider when identifying optimal locations to attract and retain the right talent to enhance competiveness and drive bottom line performance. Download the white paper now.
Tags : 
workplace, commercial real estate, occupier, cbre, talent
    
CBRE
Published By: Adobe     Published Date: Sep 20, 2016
Read our new white paper, Experience Design Optimization: Where Personalization Goes to Grow Up, and learn: - The experience design optimization process - How top brands are using data to design experiences that drive conversion - The four steps toward differentiating your brand with personalized experiences
Tags : 
adobe, customer experience, deisgn, experience deign optimization, enterprise applications
    
Adobe
Published By: Adobe     Published Date: Sep 20, 2016
Marketers use A/B testing to deliver the most optimized and targeted experiences for their customers. Sometimes marketers encounter pitfalls that produce misleading findings, which lead to less efficient offers and lower conversion rates. Read Nine Common A/B Testing Pitfalls and How to Avoid Them to: Recognize the nine most significant A/B testing pitfalls Discover the five steps to gain better testing results Gain a deeper understanding of test results
Tags : 
adobe, ab testing, marketing, marketer, targeted marketing
    
Adobe
Published By: Cornerstone OnDemand     Published Date: Sep 12, 2016
Do you believe that your organization could use a talent management initiative? Need help making the case to a business leader? This asset will help you prepare by giving you tips on topics such as: • Thinking like an executive • Identifying talent-related challenges • Assigning metric to ensure accountability. Interested in learning more about building your business case? Download 6 Steps to Making the Case for Talent Management.
Tags : 
    
Cornerstone OnDemand
Published By: IBM     Published Date: Jul 14, 2016
Fraud can happen in any organization—big or small— even in yours. Read this e-book to learn how to identify risks in your organization. It details how and why fraud happens in many organizations, four steps to prevent and detect fraud through internal controls, and why properly designing controls is a crucial step.
Tags : 
best practices, detect fraud, business management, internal control, security, business intelligence
    
IBM
Published By: Adobe     Published Date: Jul 08, 2015
Marketers use A/B testing to deliver the most optimized and targeted experiences for their customers. Sometimes marketers encounter pitfalls that produce misleading findings, which lead to less efficient offers and lower conversion rates. Read Nine Common A/B Testing Pitfalls and How to Avoid Them to: -Recognize the nine most significant A/B testing pitfalls -Discover the five steps to gain better testing results -Gain a deeper understanding of test results
Tags : 
test, target, business objectives, segmentation, pitfalls
    
Adobe
Published By: VSS Monitoring     Published Date: Apr 01, 2015
In May 2014 VSS Monitoring announced a significant expansion of its solution portfolio for providing packet visibility into high-speed 40G and 100G enterprise and service provider networks. With the release of the vBroker 6000 and vBroker 520, the company took aggressive and definitive steps to deliver high-performing solutions for high-density carrier and cloud infrastructure deployments and 100G transitions, allowing IT organizations to maintain operations monitoring and security integrity throughout upgrades to and new deployments of extreme high-speed networks.
Tags : 
ema, vss, 100g, visibility solutions, nvc, npb, it management
    
VSS Monitoring
Published By: Juniper Networks     Published Date: Feb 18, 2015
The 5 Steps to Firewall Planning and Design Guide provides a step-by-step summary for planning your network firewall. It also contains links to the more detailed list of useful sites and publications on the subject. If you’re designing your company’s firewall architecture, read this first.
Tags : 
firewall planning, network firewall, security policy, http, terminal server, network, email security, firewalls, data protection
    
Juniper Networks
Published By: Jive     Published Date: Feb 12, 2015
Remember getting your first box of LEGOS as a kid? How fun it was putting the pieces together, collaborating with your friends to create something new? Now, as an IT professional, assembling and maintaining a Lego-like collaboration infrastructure isn’t what you signed up for. Piecing together disparate systems of record for email, web meetings and other applications is about as painful as stepping on a pile of Legos. Download the e-book to learn how implementing a collaboration system connects systems of record the easy way.
Tags : 
enterprise, transition, interaction, digital business, social networks, vendor evaluations, vision, communication, collaboration, market assessment
    
Jive
Published By: Symantec     Published Date: Dec 04, 2014
SSL/TLS has been & will be a core enabling technology critical for securing communications. The most significant challenge facing the SSL ecosystem is its implementation. Researchers have recently published reports indicating widespread errors & shortcomings in the implementation of SSL/TLS in mobile applications. These issues often result from flawed use of SDKs or APIs used by developers. This paper lists necessary steps to take to create a stronger, more trustworthy SSL implementation. All SSL client non-browser applications should follow all these practices to ensure strong authentication, confidentiality & integrity.
Tags : 
ssl/tls, sdks, apis, quick guide, apps, ssl ecosystem, security
    
Symantec
Published By: Cisco     Published Date: Aug 18, 2014
Start planning your deployment of the Cisco Unified Computing System (Cisco UCS), powered by the Intel® Xeon® processor, with this useful, step-by-step design guide. The Cisco UCS Technology Design Guide simplifies the steps to a successful deployment. Four modules guide you through a Cisco engineer-tested framework that addresses typical data center and server issues.
Tags : 
design guide, deployment, computing, servers, data, innovative, data center, architecture, performance, processors, blade, equipment, utility computing, cloud computing
    
Cisco
Published By: Workfront     Published Date: Jul 10, 2014
There’s a long list of clichés often used in the marketing creative services and graphic design environments. Among those is a group of phrases we’ve deemed harmless because we hear them so often. Phrases that, like an optical illusion, seem like one thing when you’re up close, but when you look at the whole picture, turn out to be something else entirely. This ebook takes a step back and exposes five common sayings among creative services teams that sound innocent, but actually signify some serious underlying productivity problems.
Tags : 
marketing, productivity, creative services, productivity problems, solution
    
Workfront
Published By: Symantec Corporation     Published Date: Jun 24, 2014
For years, developers have known that one of the best ways to reassure users is by signing code using a digital signature accessed via a private key issued by a respected certificate authority. But signed code is not invulnerable. Due to lax key security and vetting processes, malware has managed to infiltrate applications with signed code. Read the white paper, Protect Your Applications—and Reputation—with Symantec EV Code Signing, to learn: • Key background on the latest malware threats • How you can provide users with reassurance that your application is safe to download • Why EV Code Signing Certificates represent the next step in advanced website security and their effectiveness • How you can help provide a frictionless experience when users attempt to download your application
Tags : 
security, applications, symantec, code signing, malware, software development
    
Symantec Corporation
Published By: CEB     Published Date: May 19, 2014
Establishing compliance training requirements has always been difficult, but given recent changes to the regulatory and corporate work environments, the costs of failure are now more significant. To help companies get their training curricula right, CEB created a step-by-step guide to building a truly effective compliance training curriculum: one that reduces risk.
Tags : 
ceb, risk based compliance, training, reduce risk, regulatory changes, corporate work environments, human resources
    
CEB
Published By: Symantec Corporation     Published Date: Feb 25, 2014
"For years, developers have known that one of the best ways to reassure users is by signing code using a digital signature accessed via a private key issued by a respected certificate authority. But signed code is not invulnerable. Due to lax key security and vetting processes, malware has managed to infiltrate applications with signed code. Extended Validation (EV) Code Signing Certificates help to halt malware infiltration by requiring a rigorous vetting process and helping ensure that private key security cannot be compromised. EV certificates require a hard token and associated PIN in order to sign code, introducing a more secure physical factor of authentication to the signing process. The EV Code Signing process provides browsers, operating systems, and security software an additional source of confidence in applications signed with an EV certificate. Read the white paper, Protect Your Applications—and Reputation—with Symantec EV Code Signing, to learn: • Key background on the latest malware threats • How you can provide users with reassurance that your application is safe to download • Why EV Code Signing Certificates represent the next step in advanced website security and their effectiveness • How you can help provide a frictionless experience when users attempt to download your application "
Tags : 
symantec, malware, applications, security, code signing, application security, security policies
    
Symantec Corporation
Published By: LifeSize, a division of Logitech     Published Date: Feb 20, 2014
This document is designed to help you understand the things you should consider before making an investment in video conferencing. It will help you think of how video conferencing could affect your business processes, why compatibility matters, the steps you should take to ensure its adoption and more.
Tags : 
lifesize, video conferencing, communication, hd video functionality, telecom
    
LifeSize, a division of Logitech
Published By: E-SignLive by Silanis     Published Date: Oct 23, 2013
What is the best or ideal type of electronic signature? There is no one-size-fits-all answer. It all depends on the process being automated. In this 7-page article, we start out by defining the steps in a typical e-signature process and identify what options there are for each step. Download your complimentary copy now.
Tags : 
enterprise applications
    
E-SignLive by Silanis
Published By: EMC Corporation     Published Date: Oct 16, 2013
Organizations that transform backup environments report significant business benefits. In fact, they directly link backup transformation to faster product development cycles, accelerated global expansion efforts, improvements in customer profiling, and more. But how do you go about making changes to your backup environment that will improve your business? You’ve got to have a game plan. This eBook is designed to help you understand the impact of backup transformation, what the key steps are that all organizations should consider before and during the journey, and why EMC is uniquely qualified to guide you.
Tags : 
backup environment, emc. transformation, customer profiling, best practices, technology, storage
    
EMC Corporation
Published By: IBM     Published Date: Oct 10, 2013
We all know how major security incidents can affect a company’s data, networks and corporate brand. We also know that sophisticated attacks, designed to gain continuous access to critical information or to cause damage in critical infrastructure, are becoming more severe, more frequent and more costly. But what can you do about it? The IBM white paper “Responding to—and recovering from—sophisticated security attacks” details four proactive steps that you can—and should—take now to help keep your organization safe: prioritize your business objectives and set your risk tolerance; protect your organization with a proactive security plan; prepare your response to the inevitable sophisticated attack and promote and support a culture of security awareness. Read the white paper to learn how to help keep your organization safe from sophisticated security attacks and find out how IBM can help.
Tags : 
security, data security, networks, branding, attacks, security, security breach, safeguarding, infastructure, risk, risk tolerance, security attacks, it management, data management
    
IBM
Published By: Adaptive Planning     Published Date: Sep 16, 2013
Learn how to design a stress and conflict free budget with a five-step process on restructuring budgeting for the future.
Tags : 
budgeting, technology, best practices, typical pitfalls, create budget, forecasting, small business, finance
    
Adaptive Planning
Start   Previous    1 2 3 4    Next    End
Search Resource Library      

Add Resources

Get your company's resources in the hands of targeted business professionals.