mmo

Results 76 - 100 of 1205Sort Results By: Published Date | Title | Company Name
Published By: Adobe     Published Date: Feb 09, 2015
This short illustrated guide highlights the six most common myths relating to Creative Cloud for enterprise, and seeks to dispel those myths in a clear and creative way.
Tags : 
creative cloud for enterprise, a guide to creative cloud, adobe creative cloud for enterprise, adobes creative apps, custom deployments, website development, emerging marketing, advertising agencies, marketing software
    
Adobe
Published By: Microsoft Office 365     Published Date: Sep 26, 2017
A great team is what makes a company successful. The maxim’s stayed true for decades, but what’s changed is the technology available to find, train, and retain that talent. Now, you have the ability to spread your talent pool across oceans. Each worker can have a specialized skill set to meet a range of needs within your company, and oftentimes the work will require some degree of a remote lifestyle. These needs can range from permanent remote workers to employees who travel regularly for client meetings. In fact, a 2015 Gallup poll reported that 37% of all United States workers said they have telecommuted. Being able to accommodate both workers who are out of range and those who are always on the go will help improve your company’s overall productivity and quality of work.
Tags : 
    
Microsoft Office 365
Published By: AtTask EMEA     Published Date: Mar 11, 2014
An in depth look at the 6 common marketing problems and the tricks to beat them.
Tags : 
marketing, marketing management, problems, tips, tricks, strategies, business intelligence, other
    
AtTask EMEA
Published By: Niara     Published Date: Jan 27, 2016
Download this whitepaper to learn some common myths to consider when deploying security analytics solutions.
Tags : 
security analytics, security analytics solutions, analysts, attack detection, security, incident response, security monitoring, behavioral analytics, machine learning, user behavior analytics, user and entitiy behavior analytics
    
Niara
Published By: Druva     Published Date: Aug 05, 2016
Ransomware attacks have become commonplace and affect all kinds of organizations and industries nationwide. Learn why ransomware is on the rise and actionable steps to reduce the impact of ransomware and other malware attacks on your organization.
Tags : 
cloud backup, enterprise, cloud computing, best practices, storage
    
Druva
Published By: Fujitsu     Published Date: Feb 06, 2017
When you embark on an SAP HANA transformation, your goals should include simplifying operations and empowering your business to compete and win in the digital economy. But big transformation projects like this are extremely complex. Learn key insights into common speed bumps and roadblocks that may slow you down, as well as valuable tips to help you along your transformation journey.
Tags : 
sap hana, hana cloud platform, sap hana cloud platform, sap hana platform, sap hana analytics
    
Fujitsu
Published By: Oracle     Published Date: Feb 27, 2017
It is a common refrain that is getting increasingly louder: We want more control. And guests want it during every phase of the travel lifecycle. That growing desire became evident in our research as guests expressed their interest in various ways.
Tags : 
    
Oracle
Published By: Salesforce Pardot     Published Date: Sep 09, 2014
It’s a common misconception that marketing automation is only for marketers, and that sales will be left with yet another system to learn how to use. This couldn't be further from the truth — in fact, it only takes a few hours for sales reps to learn everything they need to know to get the most out of an automation system.
Tags : 
marketing automation, sales teams, lead qualification, lead nurturing, tracking, cold calls, crm & customer care, lead generation & automation, sales
    
Salesforce Pardot
Published By: Commvault     Published Date: Jul 06, 2016
Think of a wildfire that quickly spreads as it increases in speed and power. That is what is happening today as data growth increases the volume and management complexity of storage, backup and recovery. Now think of trying to stop that fire with a garden hose. Your traditional backup and recovery process is equally under-equipped to manage and facilitate operations that need more speed, efficiency, scalability and reliability to handle today’s 24/7, always-on environment. Here we examine the benefits of moving from a solution comprised of multiple point products to a holistic data protection platform designed to serve today’s enterprise.
Tags : 
commvault, data protection, storage, backup, recovery, holistic data protection, singe pane of glass, common code base, analytics, reporting
    
Commvault
Published By: Akamai Technologies     Published Date: Aug 17, 2017
The cloud is a network of servers housing data, software, and services. Cloud services are commonly accessed via the Internet, instead of locally in a data center. Businesses are increasingly relying on the cloud for cybersecurity for two key reasons: 1. Due to a changing threat landscape, there’s a need for more scale, accuracy, experience, and collective intelligence. These resources are out of reach internally for most organizations. 2. There are fundamental limits with on-premises hardware mitigation appliances and enterprise data centers for Distributed Denial of Service (DDoS) and web attack protection.
Tags : 
cloud security, scale, data center, ddos
    
Akamai Technologies
Published By: Cherwell Software     Published Date: Jun 21, 2018
Some would have you believe that ITIL® is on its way out. That it’s no longer relevant in today’s fast-paced digital environment. But ITIL still holds many timeless truths. As a set of best practice recommendations, ITIL provides a solid foundation and a common language for IT service management (ITSM) in these rapidly changing times. The problems arise when ITIL is seen as dogma. If you apply it too literally—as rules to follow, instead of recommendations to consider—ITIL will slow you down. You’re left struggling to keep up with ever-increasing user demands, not to mention your enterprise’s need to modernize and digitally transform. If you suspect ITIL is slowing you down, read on to uncover the seven ways ITIL has commonly been misapplied—and gain guidance on how you can go faster, while still upholding ITIL principles.
Tags : 
itil, implementation, digital
    
Cherwell Software
Published By: Bronto     Published Date: Sep 26, 2011
Regardless of what the email metrics say, there is always room for improvement. In any competitive environment, you never want to settle for good enough. Here we cover seven areas most commonly in need of a refresh.
Tags : 
whitepaper, seven, white paper, email marketing, list growth, basics, opt-in, social, automation, bronto software, bronto, bronto marketing platform, customer experience/engagement, business intelligence, market research, email marketing services/software
    
Bronto
Published By: Bronto     Published Date: Jul 16, 2012
Regardless of what the email metrics say, there is always room for improvement. In any competitive environment, you never want to settle for good enough. Here we cover seven areas most commonly in need of a refresh.
Tags : 
bronto, marketing, email marketing, marketing campaigns, social media, customer, customer experience/engagement, email marketing services/software, list management
    
Bronto
Published By: XpertHR     Published Date: Nov 13, 2018
As 2018 comes to a close, it is critical to ensure that your organization—and more specifically, your employee handbook—is compliant with the latest legal developments on the federal, state and local levels. Whether it’s a new state law or an amendment to an existing local law, as an employer, you must determine whether a new or amended law affects your handbook and workplace policies and what revisions are necessary. For example, does a new statewide lactation accommodation law prompt the addition of a new policy to the employee handbook? Here are some of the top issues you should be aware of for 2019 when updating your handbook: 1. Equal Employment Opportunity (EEO) 2. Leaves of Absence and Time Off 3. Equal Pay and Wage Discrimination And more… {Get the guide}
Tags : 
handbooks, employee handbooks, compliance, policies, work rules, 2019 trends, eeo, leave management, paid sick, reasonable accommodations, equal pay, wage discrimination, time-off, pto, e-cigarettes, safe driving laws, workplace violence
    
XpertHR
Published By: Trustpilot     Published Date: Nov 13, 2014
Concerns about online reviews are invariably based on misconceptions that don't hold up when faced with reason. This whitepaper lists some of the most common myths holding businesses back from embracing the true power of online reviews.
Tags : 
trustpilot, online reviews, customer feedback, customer service, reviews, sales, social media, customer experience/engagement, reputation monitoring, market research, trust and security
    
Trustpilot
Published By: Tenable     Published Date: Mar 08, 2018
Which questions have you overlooked and why do the answers matter? According to Gartner, “OT SRM (security and risk management) leaders must ask the right questions during the technology procurement process to achieve long-term success in their security investments.” Further, Gartner states, “Translating IT security practices and copying IT security technology will not result in a secure operational technology (OT) environment.” By reading “7 Questions SRM Leaders Aren't Asking OT Security Providers,” you’ll learn which questions to ask, why they matter, and be armed with follow-up guidance to make smarter decisions. Questions covered include: - Does the Solution Provide Asset Discovery to Enable Operational Continuity and System Integrity? - Does the Solution Detect and Alert on Known Common Vulnerabilities and Exposures? - Does Your Solution Provide IT Support in Addition to OT? - Does Your Solution Support Secure IT/OT Alignment? Threats and vulnerabilities originally targeti
Tags : 
    
Tenable
Published By: Anaplan     Published Date: Jan 08, 2016
Read this white paper to discover seven common reasons companies are replacing their spreadsheets with a true enterprise planning platform.
Tags : 
anaplan, spreadsheets, finance planning, budget, accounting, data management, agile, web analytics, market research, e-commerce solutions, other
    
Anaplan
Published By: Birst     Published Date: Jul 16, 2013
Discover seven indications that you need advanced analytics for your CRM application and why they matter. Learn about common CRM data analysis pain points and how advanced CRM analytics can solve them.
Tags : 
business intelligence, agile bi, self service bi, bi in the cloud, unified bi, mobile bi, embedded analytics, business analytics, sales analytics, hr analytics, marketing analytics, financial analytics, supply chain analytics, automated data management, dashboards, infrastructure
    
Birst
Published By: Plex Systems     Published Date: Feb 21, 2014
Automotive OEMS and parts manufacturers share one common goal –streamlined, efficient operations that maximize profitability. Plex cloud ERP brings the automotive manufacturer the features they need to produce the highest quality products, operate efficiently and maximize profitability.
Tags : 
cloud, plex, erp, cloud computing, manufacturing, management, best practices, productivity, high level production
    
Plex Systems
Published By: Plex Systems     Published Date: Jun 06, 2014
Automotive OEMS and parts manufacturers share one common goal –streamlined, efficient operations that maximize profitability. Plex cloud ERP brings the automotive manufacturer the features they need to produce the highest quality products, operate efficiently and maximize profitability.
Tags : 
plex systems, faster usability, operations, erp, cloud, production, manufacturing
    
Plex Systems
Published By: athenahealth     Published Date: Apr 07, 2012
The right electronic health records can dramatically improve patient care, profit, and practice workflow. Learn how to manage the electronic health records selection process to achieve your desired results and avoid several common pitfalls.
Tags : 
ehr, electronic health record, electronic health records, emr, electronic medical record, electronic medical records, electronic medical records software, athena emr, athena ehr, athenahealth emr, athenahealth ehr, athenaclinicals, athenahealth, athena health
    
athenahealth
Published By: ClickExpress     Published Date: May 01, 2013
Download this white paper to gain insight from the research firm IDC which predicts that some 1.2 billion workers will be using mobile enterprise tools by 2011, representing roughly a third of the total global workforce (February 2010). Some of these people are almost exclusively mobile, whereas some will only occasionally use mobile enterprise tools. Whatever the case, there are very few who would argue against the fact that investing in mobility has the potential to raise productivity, accessibility and visibility.
Tags : 
mobile, solution, deploy, enterprise, global workforce, scalability, integration, device selection, wireless communication
    
ClickExpress
Published By: Ruckus Wireless     Published Date: May 05, 2016
Wi-Fi has perpetually been touted as a rapidly expanding technology. But its growth on educational campuses has been limited. Here are have 9 common myths about wi-fi deployment that we have debunked in this whitepaper.
Tags : 
ruckus wireless, wi fi, higher ed, myths, education, wi fi deployment, network
    
Ruckus Wireless
Published By: IBM     Published Date: May 22, 2013
SOA appliances have matured considerably over the last few years. As they have established themselves more firmly in the SOA landscape, vendors have developed a better understanding of requirements, resulting in a level of commonality in some of the key underlying functions such as providing a secure gateway for accessing SOA services.
Tags : 
soa, ibm, soa appliances, software, requirements
    
IBM
Published By: McAfee     Published Date: Mar 08, 2013
McAfee® Vulnerability Manager for Databases automatically discovers networked databases; determines if the latest patches have been applied; and tests for common weaknesses, making it easier to demonstrate compliance and better protect critical data.
Tags : 
database security, database vulnerability manager, database compliance, mysql security, database password security, sql injection, buffer overflow, insecure sql code
    
McAfee
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.