bea

Results 76 - 100 of 268Sort Results By: Published Date | Title | Company Name
Published By: DocuSign     Published Date: Apr 24, 2018
Staffing companies play a critical role in recruiting and onboarding talent to ensure that operations don’t skip a beat. In today’s competitive recruiting market, staffing companies need to be nimble and efficient. They need to invest in digital tools to hire and onboard the best professionals. Many organizations still use manual or paper-based processes, which are slow, expensive, and error-prone, resulting in inefficient operations and compliance risks. Investing in digital operations reduces search time and costs while delighting candidates and improving security and compliance.
Tags : 
    
DocuSign
Published By: Dotmailer     Published Date: Nov 06, 2018
The current digital marketing environment is being steered, not by the brand, but by the hyper-consumer. In today’s fast-paced, ‘always-on’ world, companies must challenge their status quo to remain competitive. To keep up with on-the-go consumers, marketers need to utilize powerful technology and leverage the right data to compose brilliant, meaningful messages that compel customers to act fast. But as this study reveals, a surprising number of brands are failing to captivate audiences and adopt practices that are proven to beat the clutter of the inbox.
Tags : 
    
Dotmailer
Published By: Drillinginfo     Published Date: Nov 18, 2015
The Bakken is a very large hydrocarbon-bearing subsurface rock formation underneath a large portion of the Williston Basin in North Dakota, Montana, Saskatchewan and Winnepeg. The Bakken has been the scene of many advancements in drilling technology – horizontal drilling, pad drilling and downspacing, to name a few. This first Edition of the DI Expert eBook by Drillinginfo, the premier provider of data and insights for oil and gas exploration decisions, is a collection of articles posted by our staff of engineers, analysts and geologists about the Bakken over the past year.
Tags : 
geologists, downspacing, innovations, oil, gas exploration, drilling
    
Drillinginfo
Published By: dynatrace     Published Date: Mar 04, 2015
Recent advances in online retail now let consumers shop anytime, anywhere. This access is unprecedented and as a result, e-Commerce has transformed the business model. Featured speakers from ULTA Beauty, the largest beauty retailer that provides one-stop shopping for prestige, mass and salon products and salon services in the U.S., discuss the retailer’s e-Commerce evolution that led to understanding and optimizing their customers’ online experience. Discover how ULTA Beauty: Gains full end-to-end visibility into user experience Captures the business impact of user experience and application performance Accelerates time to market for new functionalities and services
Tags : 
beauty, e-commerce, user-oriented, retail, business, application performance, consumer
    
dynatrace
Published By: E.ON     Published Date: Nov 21, 2018
There are many ways to beat the energy price rises, but hospitality operators need a way of doing it that also offers a business benefit. In this whitepaper we look at green energy, solar panels and why electric car chargers could offer your next return on investment. Download this whitepaper today to find out more about how E.ON can help your business!
Tags : 
    
E.ON
Published By: Electric Cloud     Published Date: Oct 13, 2009
In this whitepaper I argue that the person most affected by the introduction of agile or extreme programming techniques is not the software or quality assurance engineer, but the build manager. And the build manager can no longer make do with home grown tools; software production automation tools are required to make agile development a build reality.
Tags : 
electric cloud, agile development, coding, testing, code, software development, build, automation, automate
    
Electric Cloud
Published By: Emarsys     Published Date: Mar 14, 2018
Gibt es immer noch eine Lücke zwischen den Möglichkeiten von AI Marketing-Lösungen für erfolgreiche B2C-Marketingkampagnen und der Bereitschaft von Marketern und Entscheidungsträgern, diese Technologien auch zu nutzen? Emarsys hat das Marktforschungsinstitut Forrester mit einer Studie zum Thema AI-Marketing im Retail und E-Commerce beauftragt. Die Studie steht zum kostenlosen Download für Sie bereit. Ergebnisse der Studie: Nur 52% aller Unternehmen glauben, dass Sie Echtzeit-Kundeninteraktionen umsetzen können. 86% der Befragten sind davon überzeugt, dass sie mit Hilfe von AI ihr Marketing effizienter und effektiver gestalten können. 78% geben an, innerhalb der nächsten 12 Monate ihr Budget für AI Marketing Technologien um mind. 5% erhöhen zu wollen. Untersuchte Länder: USA (42%), UK (15%), Deutschland (14%), Frankreich (14%), Australien (15%)
Tags : 
    
Emarsys
Published By: Enterprise Management Associates     Published Date: Aug 25, 2015
This webinar talks about various issues organization's deal with on a daily basis and how Hadoop can offer solutions.
Tags : 
ema, hadoop, big data analytics, predictive insights, data lake architecture, hadoop adoption, enterprise management, business intelligence, data warehousing, data integration, data visualization, data analyst
    
Enterprise Management Associates
Published By: Epicor     Published Date: Apr 01, 2009
This white paper presents a low risk, high impact approach to gaining control of regulatory compliance. The procedures, tasks, and behaviors that bear upon compliance can be overwhelming.
Tags : 
epicor, grc, governance risk and compliance, supply chain visibility, erp solutions, expense management, data auditing
    
Epicor
Published By: Epicor     Published Date: Jan 09, 2019
On the following pages, you’ll discover eight considerations to bear in mind when you’re looking to install or upgrade your ERP system . Some relate to the ERP vendor you’ll partner with; others are about the ERP system itself . We think you’ll need to take all of them into account to ensure the ERP system you choose is the right one for you . If you want to learn more about these considerations, we’ve suggested some further reading, too .
Tags : 
    
Epicor
Published By: Exabeam     Published Date: Sep 25, 2017
Most enterprises and government organizations that experience data breaches have traditional security point solutions, log management, and security information and event management (SIEM) solutions in place. However, SIEM is not a comprehensive solution on its own. There has been a great deal of focus on the attack-chain – or kill-chain – of steps in the process leading to these breaches.
Tags : 
    
Exabeam
Published By: Exabeam     Published Date: Sep 25, 2017
This solution brief will describe how Exabeam can help organizations implement effective security controls and best practices to achieve alignment with GDPR.
Tags : 
    
Exabeam
Published By: Exabeam     Published Date: Sep 25, 2017
The Exabeam Security Intelligence Platform addresses every key weakness of existing SIEM solutions: Cost, Intelligence, and Productivity. This paper describes the challenges of security intelligence and how Exabeam specifically overcomes them.
Tags : 
    
Exabeam
Published By: Exabeam     Published Date: Sep 25, 2017
In evaluating UEBA solutions’ ability to detect, prioritize, and respond, it is important to understand the full potential of data sciencedriven analytics. Organizations should ask their vendors if they can support the following Top 12 UEBA use cases, and most importantly, demand that the vendor demonstrate this support within the POC or pilot.
Tags : 
    
Exabeam
Published By: F5 Networks Inc     Published Date: Jan 22, 2009
F5 and both Oracle and BEA have collaborated on delivering market-leading Application Delivery Networking solutions. For BEA WebLogic Server 10, F5 has designed an integrated and adaptable network platform for delivering WebLogic applications across the LAN and WAN. The result is an intelligent and powerful solution that secures and speeds your WebLogic deployment today, while providing an optimized architecture for the future.
Tags : 
oracle, bea, weblogic applications, weblogic deployments, optimized architecture
    
F5 Networks Inc
Published By: FICO EMEA     Published Date: May 21, 2019
Fintechs and challenger banks have put a dent in the financial services universe. By developing compelling new products, services and experiences, these companies have set a new standard and raised customers’ expectations. While traditional banks work to meet these raised expectations, the challenge for new market entrants is turning their beachheads into sustainable, profitable businesses. FICO facilitates this transformation with our industry-leading analytics capabilities.
Tags : 
fitech, analytics, analytic decisioning, challenger banks, banking, financial services
    
FICO EMEA
Published By: FICO EMEA     Published Date: May 21, 2019
Fintechs and challenger banks have put a dent in the financial services universe. By developing compelling new products, services and experiences, these companies have set a new standard and raised customers expectations. While traditional banks work to meet these raised expectations, the challenge for new market entrants is turning their beachheads into sustainable, profitable businesses. FICO facilitates this transformation with a set of industry-leading fraud management capabilities.
Tags : 
fitech, fraud, compliance, challenger banks, banking, financial services
    
FICO EMEA
Published By: FICO EMEA     Published Date: May 21, 2019
Fintechs and challenger banks have put a dent in the financial services universe. By developing compelling new products, services and experiences, these companies have set a new standard and raised customers expectations. While traditional banks work to meet these raised expectations, the challenge for new market entrants is turning their beachheads into sustainable, profitable businesses. FICO facilitates this transformation with its industry-leading risk decisioning capabilities.
Tags : 
fitech, risk decisioning, challenger bank, banking
    
FICO EMEA
Published By: Forcepoint     Published Date: May 16, 2016
Die finanziellen und rechtlichen Konsequenzen der während des vergangenen Jahres verzeichneten öffentlichkeitswirksamen Cyber-Angriffe enthalten eine unmissverständliche Botschaft: Datenraub kann so gravierend sein, dass die Unternehmensleitung es sich nicht leisten kann, das Thema zu ignorieren. Der Bericht "Cybersicherheit und Schutz vor Datendiebstahl" bietet einen Überblick über das Thema, der ohne technisches Fachjargon auskommt. Er liefert Anhaltspunkte die jedes Mitglied eines Vorstands, Aufsichtsrats oder Direktoriums nutzen kann, um die Sicherheitsposition der eigenen Organisation auf den Prüfstand zu stellen.
Tags : 
cyber security, security, cybersecurity, security application, data theft prevention, data security, cyberttacks
    
Forcepoint
Published By: Genesys     Published Date: Feb 08, 2019
Ausgereifte Cloud-Plattformen unterstützen die reibungslose Migration unternehmenskritischer Systeme in die Cloud. Dadurch wird deren Flexibilität und Skalierbarkeit gesteigert und es winken deutliche Kosteneinsparungen. Wie kann sich Ihr Unternehmen diese Vorteile sichern? Welche Schritte sind nötig, um den unvermeidbaren Umstieg auf ein cloudbasiertes Contact Center einzuleiten? Durch die Wahl des richtigen Contact-Center-Partners können Sie die Umstellung auf cloudbasierte Customer Journeys erfolgreich gestalten.Wissen Sie, wie Sie den richtigen Partner für die Migration finden können? Dieses E-Book nennt zehn Kriterien, die bei der Wahl eines Partners für den Wechsel zu einem cloudbasierten Contact Center zu beachten sind. Wenn Sie sich ein genaues Bild von den Anforderungen Ihres Unternehmens, den Fähigkeiten Ihres potenziellen Partners und der Übereinstimmung zwischen dessen Vision und ihren Unternehmenszielen machen, wird Ihnen dies bei der langfristigen Sicherung Ihres geschä
Tags : 
    
Genesys
Published By: GFI     Published Date: Jun 12, 2007
Virus-writers are using increasingly complex and sophisticated techniques in their bid to circumvent anti-virus software and disseminate their viruses. Anti-virus software, though essential, cannot combat such threats alone; an email exploit detection tool is also necessary.
Tags : 
email security, trojan, trojans, anti-virus, anti virus, virus, network security, gfi, email exploit, nimda, yaha, bugbear, exploit software, exploit engine, mailsecurity
    
GFI
Published By: GFI     Published Date: Jul 24, 2007
This white paper explains what makes spam such an unbearable problem and how spamming tactics are evolving daily to beat anti-spam software. The latest tactic is to use the common PDF file format to send image spam. By using PDF attachments to send images instead of embedding them in the body of the email message, spammers have taken the cat-and-mouse game with anti-spam software developers to a new level.
Tags : 
adobe, adobe acrobat, acrobat, gfi, spam, image spam, pdf spam, anti-spam, anti spam, email security, zombie, zombies, botnet, botnets, hacker, vulnerability, filtering, blocking, mailessentials, mail essentials
    
GFI
Published By: GFI     Published Date: Mar 25, 2008
This white paper explains what makes spam such an unbearable problem and how spamming tactics are evolving daily to beat anti-spam software. In the space of two months, spammers have switched from image spam to using PDF, Excel and ZIP file attachments. By using these attachments to send images instead of embedding them in the body of the email message, spammers have taken the cat-and-mouse game with anti-spam software developers to a new level.
Tags : 
attachment spam, filter attachment spam, image spam, pdf spam, excel spam, xls spam, stock spam, gfi
    
GFI
Published By: Godfrey     Published Date: Oct 02, 2008
One of the most important questions a company can ask itself is “what is our differentiation?” The reason is simple: it’s how you define yourself in the minds of your customers and beat the competition. Beyond that, it’s what guides business strategy as you face decisions and choices on a daily basis. A company that knows who it is and how it adds value for customers and prospects has a solid foundation for making those decisions. One that has an unclear position or, worse yet, constantly shifts position, has a difficult path in a challenging market. That’s why branding discussions need to go well beyond graphics and touch on the values and identity that are at the core of any successful company.
Tags : 
godfrey, b-to-b, business-to-business, web 2.0, branding, b-to-b branding, b-to-b differentiation, brand differentiation, branding differentiation, b-to-b brand, b-to-b brand positioning, brand positioning, brand affinity, brand advertising, brand communications, branding research, b-to-b marketer, b-to-b buying process, b-to-b branding program, integration
    
Godfrey
Published By: Google     Published Date: Jan 08, 2018
Today’s smart computers can beat board game champions, master video games, and learn to recognize cats. No wonder artificial intelligence has captured the imaginations of business and IT leaders. And indeed, AI is starting to transform processes in established industries, from retail to financial services to manufacturing. Read this guide from Google Cloud and learn how you can unlock the transformational power of information and get useful insights from a vast and complex landscape of data.
Tags : 
data analytics, machine learning, big data, artificial intelligence
    
Google
Start   Previous    1 2 3 4 5 6 7 8 9 10 11    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.