ebook

Results 251 - 275 of 2065Sort Results By: Published Date | Title | Company Name
Published By: CA Technologies_Business_Automation     Published Date: Jun 29, 2018
Technology is in a constant state of evolution, and the world of automation is no exception. In this eBook, we’ll consider how you can stay ahead of the competition—because in the application economy, it’s vital to ensure the tools your organization uses are capable of positioning you at the forefront of industry—not just today, but tomorrow as well. We are heading toward a scenario where workload automation tools are capable of thinking for themselves and making decisions based on policy; this is what we at CA Technologies are calling intelligent automation. At the same time, however, more and more challenges are being presented as the increasingly fragmented places our workloads run begin to impact our analytics, reporting and processes. The task is to navigate these hurdles while at the same time allowing our enterprises to harness the power of new technology.
Tags : 
    
CA Technologies_Business_Automation
Published By: CA Technologies_Business_Automation     Published Date: Jun 29, 2018
It doesn’t matter whether you’re new to Oracle Retail, have an active implementation project that is running or have an existing deployment in production. The same issue applies: You are making a significant investment in the technology and need to develop a reliable and efficient batch schedule. If you’re new to Oracle Retail, you are no doubt embarking on a major project to improve your competitive position in the retail market. With that in mind, your goals will be to shrink the time-to-market for your retail implementation, lower the reliability risks associated with in-house developed solutions and improve the visibility and control of retail business processes. In this eBook you will discover a series of recommendations for operating a fail-safe and efficient Oracle Retail operational environment. You will also understand how automation enables you to streamline the execution of your Oracle Retail batch operations and increase the day-to-day efficiency of your operations teams.
Tags : 
    
CA Technologies_Business_Automation
Published By: Canon Solutions America     Published Date: May 24, 2019
Tired of posting to Facebook and getting no business in return? Learn what you’re doing wrong—and what to do instead—in this 4-part guide by John Foley, Jr., ranked 15th most influential Chief Marketing Officer on social media by Forbes magazine
Tags : 
    
Canon Solutions America
Published By: Canon Solutions America     Published Date: Jul 15, 2019
Student portals, mobile printing, Chromebooks…Technology has changed the way students learn and interact with your school. But it’s also made you more vulnerable to cyberthreats. This brief will bring you up to date on the new rules of data security.
Tags : 
    
Canon Solutions America
Published By: Cantaloupe     Published Date: Mar 30, 2010
Social media is all around us and has fundamentally changed the way many of us communicate--both personally and professionally. Video can make your social media better, and ultimately get more leads to your website. But how best to post, measure, and use to drive traffic to your website?
Tags : 
cantaloupe, online video, social media, communication, facebook, twitter, seo, engagement
    
Cantaloupe
Published By: Cantaloupe     Published Date: Mar 30, 2010
The hype about video search has just begun which means lots of questions, lots of new experts, and not enough time to sort through it all. This new whitepaper "An Effective Video SEO Strategy in Three Phases" will give you the blueprint for getting started and beyond. Learn all about: the 2 things you should be doing right now to improve your video search engine optimization; widespread myths about what works and what doesn't; Advanced tips for even greater results and more!
Tags : 
cantaloupe, online video, social media, search, communication, facebook, twitter, seo
    
Cantaloupe
Published By: Capita     Published Date: Jun 25, 2019
Introducing ECG: Enterprise Connectivity Grading. The key metrics of organisational well-being have changed. While indicators like strategy, sales, margins, and profitability remain crucial, these now hinge on other vital factors. The organisation’s ability to leverage key assets like its people and data. Its agility, mobility, and adaptability. Its capacity to transform, evolve, and grow over time. And these factors in turn are now fundamentally contingent on something else. Connectivity. Download the eBook and learn more>>
Tags : 
    
Capita
Published By: CarbonBlack     Published Date: Mar 16, 2016
It is now widely recognized that antivirus software is insufficient to protect organizations, large or small, from advanced threats and targeted attacks. In response, organizations are increasingly looking to adopt proactive approaches to security, such as application control, to ensure the fidelity and security of intellectual property.
Tags : 
application control, advanced threats, security, proactivity approaches, security
    
CarbonBlack
Published By: CarbonBlack     Published Date: Mar 16, 2016
Today’s cyber-attacks have changed in sophistication, in focus, and in their potential impact on your business. This eBook will outline the tactics today’s advanced attackers are using to break into your organization and why you require a defense-in-depth cyber security program that incorporates automatic detection and incident response.
Tags : 
carbon black, cyber attacks, cyber security, attacks, security, advanced attacks, detection
    
CarbonBlack
Published By: Carbonite     Published Date: Oct 10, 2018
Global data deduplication provides important benefits over traditional deduplication processes because it removes redundant data through entire enterprises, not just single devices. Global deduplication increases the data deduplication ratio—the size of the original data measured against the size of the data store after redundancies are removed.
Tags : 
    
Carbonite
Published By: Carbonite     Published Date: Oct 10, 2018
In the last few years, businesses have changed the way they protect data. Studies show they’re abandoning traditional backup and recovery in favor of disaster recovery as a service (DRaaS).1 With DRaaS, businesses enjoy the luxury of keeping a replica of their data hosted at a remote site that they can fail over to in an emergency—without bearing any of the infrastructure costs or maintenance responsibilities. All infrastructure and maintenance is the responsibility of the provider. Gartner predicts that global DRaaS revenue will reach $3.4 billion by 2019. The firm cited several reasons for the shift:
Tags : 
    
Carbonite
Published By: Carbonite     Published Date: Oct 10, 2018
Data protection is a balancing act between the need to protect data and the need to protect access to data. The trick lies with deploying the right protection across the different systems and types of data, since they each require different forms of protection.
Tags : 
    
Carbonite
Published By: Carbonite     Published Date: Oct 10, 2018
With more and more employees spread around the globe, IT teams face a conundrum: how to secure an increasing amount of data traveling outside the network while preserving workforce productivity in an increasingly interconnected and global market. It’s up to IT decision-makers to protect and secure company data in a way that promotes user access without imposing overly restrictive or cumbersome device policies. When it comes to protecting data on laptops and mobile devices, several key factors are essential for today’s businesses:
Tags : 
    
Carbonite
Published By: CareerBuilder     Published Date: Sep 07, 2010
Whether you've had an employee referral program for years, are only in the initial stages of building one, or have never had one at all, this e-book is full of tips and advice on making your program the best it can be.
Tags : 
careerbuilder, employee referral, recruiting, qualified, ebook, social networking, roi, training
    
CareerBuilder
Published By: CareerBuilder     Published Date: Apr 20, 2010
Recruitment doesn't end with a job offer. It begins from the moment your business defines its candidate audience, and continues long after an employee leaves your company. CareerBuilder's Ultimate Recruitment Guide e-Book is a definitive how-to-hire guide compiled by our team of business experts.
Tags : 
recruitment, careerbuilder, ebook, branding, awareness, engaging
    
CareerBuilder
Published By: CareerBuilder     Published Date: Jun 07, 2019
Do you ever wonder how companies like Google, Hilton, Facebook and Southwest consistently rank on “Best Places to Work” lists? It’s more than fancy perks — like free gourmet meals and snacks, pet-friendly offices and nap pods — that make employees clamor to work at these companies.
Tags : 
    
CareerBuilder
Published By: Cartera Commerce     Published Date: Mar 21, 2012
For many local merchants, offers linked to consumer credit/debit cards let you optimize your overall marketing program. Download the eBook and understand the new way for local business to attract new customers-and keep them.
Tags : 
cartera commerce, mall networks, cartera, vesdia, merchant-funded, loyalty, customer loyalty, merchant network
    
Cartera Commerce
Published By: Castlight Health     Published Date: Aug 02, 2016
"In this eBook from Castlight Health and Jellyvision, you will learn: • How to influence employee behavior through careful and personalized messaging, curated content, creative incentives, and more. • What the top U.S. organizations are doing to boost benefits engagement and guide employees along the path of health care consumerism. • How to put your organization’s technology to work toward your communication goals to meet employees on their level."
Tags : 
castlight health, human resources, benefits, jellyvision
    
Castlight Health
Published By: Castlight Health     Published Date: Aug 02, 2016
"In this eBook from Castlight Health and Jellyvision, you will learn: • How to influence employee behavior through careful and personalized messaging, curated content, creative incentives, and more. • What the top U.S. organizations are doing to boost benefits engagement and guide employees along the path of health care consumerism. • How to put your organization’s technology to work toward your communication goals to meet employees on their level."
Tags : 
    
Castlight Health
Published By: Castlight Health     Published Date: Feb 14, 2017
Wish you could get more employees to use their benefits? (And use them wisely?) The Ultimate HR Guide to Promoting Benefits Programs, Tools, and Resources can help you get started. This handy eBook from Castlight Health and Jellyvision explains how to 1) avoid sounding like an insurance robot, 2) find incentives that work (and that don’t bust the budget) and 3) promote your benefit programs — everywhere.
Tags : 
    
Castlight Health
Published By: CDW     Published Date: Nov 12, 2012
As mobility becomes commonplace, strategies for wireless and wired security must be woven together.
Tags : 
cdw, wireless, wired, security, wlans, endpoints, notebook computers, tablets
    
CDW
Published By: CDW     Published Date: Jun 18, 2013
A mix of well-thought-out policies and up-to-date technologies are needed to protect critical data.
Tags : 
cdw, mobile security, protecting data, critical data. notebooks, smartphones, tablets
    
CDW
Published By: CDW     Published Date: Jul 30, 2013
As video technology becomes more accessible, more people will use it to make video calls. A confluence of camera-enabled notebooks, smartphones and tablets combined with better wireless network capabilities has created a base of users that are willing to fire up the camera when they want to talk.
Tags : 
cdw, unified communications, camera-enabled notebooks, smartphones, tablets, wireless network capabilities
    
CDW
Published By: CDW     Published Date: Jul 08, 2015
It’s official — BYOD is here, and there’s no turning back. Mobile Device Management (MDM) gives employees the freedom to connect whenever, wherever for increased productivity and a better work-life balance. But every smartphone, tablet and notebook is a potential gateway for unauthorized applications, malware and other security threats.
Tags : 
security, vulnerability management, analytics, mobile security, byod, mdm
    
CDW
Published By: CDW     Published Date: Mar 18, 2016
The number of mobile devices managed by enterprises increased 72 percent from 2014 to 2015. This onslaught of technology such as notebooks, smartphones, tablets, watches and gadgets has transformed the way users work. These devices provide users in just about every sector with access to the information and tools they need to do their jobs, wherever and whenever they need them. They’re free to work at their desks, in conference rooms, while visiting clients on the road or during a child’s baseball practice. They can input data directly into a medical chart, an order form or an inspection report, rather than doubling their work by transcribing handwritten notes later in the day.
Tags : 
    
CDW
Start   Previous    4 5 6 7 8 9 10 11 12 13 14 15 16 17 18    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.