productivity management

Results 1 - 25 of 375Sort Results By: Published Date | Title | Company Name
Published By: Citrix     Published Date: Oct 09, 2019
An alarming 2019 study suggested that workplaces in the region have exhausted staff morale with negative impacts on productivity. In this report, top technology leaders in Australia address some of the "employee experience" challenges they the face and how they aim to tailor systems around ways of working to drive better engagement and productivity. The EIU's own survey results show that while leadership and management still set the tone for workers in the region, they value flexible-working policies and technology available to employees more than global peers.
Tags : 
    
Citrix
Published By: BehavioSec     Published Date: Oct 04, 2019
In this case study, a large enterprise with an increasing amount of off-site work from both work-related travel and a fast-growing remote workforce, is faced with a unique challenge to ensure their data security is scalable and impenetrable. Their data access policies rely on physical access management provided at the company offices and do not always provide off-site employees with the ability to complete work-critical tasks. Legacy security solutions only add burden to productivity, sometimes causing employees to ignore security protocols in order to simply complete their work. Upon evaluating security vendors for a frictionless solution, they selected BehavioSec for its enterprise-grade capabilities with on-premise deployment and integration with existing legacy risk management systems.
Tags : 
    
BehavioSec
Published By: BehavioSec     Published Date: Sep 30, 2019
In this case study, a large enterprise with an increasing amount of off-site work from both work-related travel and a fast-growing remote workforce, is faced with a unique challenge to ensure their data security is scalable and impenetrable. Their data access policies rely on physical access management provided at the company offices and do not always provide off-site employees with the ability to complete work-critical tasks. Legacy security solutions only add burden to productivity, sometimes causing employees to ignore security protocols in order to simply complete their work. Upon evaluating security vendors for a frictionless solution, they selected BehavioSec for its enterprise-grade capabilities with on-premise deployment and integration with existing legacy risk management systems.
Tags : 
    
BehavioSec
Published By: Avetta     Published Date: Sep 17, 2019
A new NPR/Marist poll reveals that one in five jobs in the U.S. is held by a worker under contract. In fact, independent contractors could make up half of the entire workforce in the U.S. within the next decade. More and more organizations have begun to see contractors and suppliers as valuable business partners intrinsic to driving service and product innovation. For many companies, especially those operating in highly regulated industries, managing compliance in-house for all of these suppliers can be burdensome. But the cost of non-compliance — in the form of penalties, fines, productivity losses, settlement costs, and inefficiencies — is ruinous. This white paper will discuss: • The hidden costs of ignoring contractor management • Best practices towards holistic compliance and governance • The cost of different contractor management systems • How to get the highest ROI in your supply chain
Tags : 
    
Avetta
Published By: VMware     Published Date: Aug 16, 2019
It can be stressful to be at the heart of your organization's digital transformation initiatives. You're the IT pro everyone is trusting to balance two top business priorities: maximizing end-user productivity and minimizing threats. Modern management ensures you can do both. Download this customer experience to learn how two IT leaders describe how they are improving employee productivity and addressing complex management issues head-on with a modern approach to management.
Tags : 
    
VMware
Published By: Expert System     Published Date: Jul 18, 2019
Robotic Process Automation (RPA) is helping companies reduce costs and improve on quality and productivity by automating some of their most time consuming, rule-based and replicable business processes. RPA is especially effective in the banking and insurance sector where it brings speed and efficiency to customer service and compliance. Based on artificial intelligence algorithms, Expert System’s Cogito cognitive technology enables an automatic, human-like understanding of the content of text documents. Applied to RPA, Cogito adds greater business value and ROI for both repetitive and complex information-intensive processes. Using Cogito, companies can expect up to 53% savings on activities such as FTEs and warranty management, and cost reductions of 30 to 60% for email management and quote processing, etc.
Tags : 
    
Expert System
Published By: Procore     Published Date: Jun 25, 2019
Understanding the inextricable link between safety, quality and productivity is a critical piece of knowledge for today's construction management professional. And it should be leverage at all stages of a projects, from planning to programming and through the execution of the work. A proper task analysis will: Account for all three elements: safety, quality and productivity include input from site personnel Include the information needed to make decisions on the site Be a workable plan Remember that once you accept safety, productivity and quality are inextricably linked, you begin to realise that the data you harvest from your various site reports, such as reports of near misses or the need for constant rework, may also be able to fill in the blanks and tell a story about the overall progress and productivity on a project as well.
Tags : 
    
Procore
Published By: Cisco and NVIDIA Corporation     Published Date: Jun 19, 2019
WE LIVE IN A WORLD WHERE WORK IS NO LONGER A PLACE WHERE YOU GO. It’s what you do — a dynamic activity that people expect to accomplish anywhere, anytime, on any device. Supporting today’s workforce requires a digital platform that empowers productivity and ensures security and management at scale everywhere: on site, on the road, or in the cloud. According to IDC, by 2020, mobile workers will account for 72 percent of the U.S. workforce. And they won’t be just checking email. These workers want to be productive 24/7. That means access to data, documents, and corporate apps anywhere, anytime, on any device. Enterprises, however, are struggling to allow more workers to use additional devices from a multitude of locations.
Tags : 
    
Cisco and NVIDIA Corporation
Published By: Schneider Electric     Published Date: Jun 07, 2019
New digital technology now makes it feasible to integrate process control and SIF within a common automation infrastructure. While this can provide productivity and asset management benefits, if not done correctly, it can also compromise the safety and security of an industrial operation. Cybersecurity and sabotage vulnerability further accentuate the need for securing the safety instrumented system (SIS). Certainly, a common platform approach using similar hardware and software dedicated for control and safety functions, respectively, can provide the potential for cost savings. However, it is widely acknowledged that utilizing separate, independent, and diverse hardware/software for safety and control is the optimal way to protect against potentially catastrophic common cause and systematic design and application errors. Different vendors offer varied degrees of integration and solutions. The question is: how to provide an integrated control and safety solution with advanced functionality and productivity without compromising safety and security? And, where do users draw the line? A third-party (e.g., TÜV) certification of the hardware/software systems to IEC 61508 specifications carries significant advantages, but should this be the only criterion? How does a third-party certificate extend to the plant’s overall assignment of risk reduction credits for all independent protection layers (IPL)? Control system embedded safety logic solvers may actually increase the SIL requirements of the SIF if no credit is allowed for the distributed control system (DCS) as an IPL. Download the white paper to learn more.
Tags : 
smart control, empowered operators, optimized assets, future of automation, reliability, safety, cybersecurity, operational profitability, ecostruxure plant, process automation, profitable safety, defence in depth, industrial automation, process control, process systems
    
Schneider Electric
Published By: Procore     Published Date: May 28, 2019
The successful construction companies of tomorrow will be those that have critically reviewed how they manage their business and how they run their projects, making changes to their systems and processes to become more efficient at delivering client value. Download this eBook to learn exactly how construction technology can help your business remain competitive by: ? Increasing efficiency and productivity ? Reducing delays and costs ? Enabling better communication and collaboration ? Improving customer satisfaction ? Engaging an ever-evolving, tech savvy workforce Procore is a construction management platform that improves efficiency and reduces risk by giving contractors complete control and visibility of their business. Project Management, Quality & Safety, Construction Financials, and Field Productivity tools give office and site-based users access to the information and functionality they need, on any mobile device. As a platform, Procore’s ability to integrate with other leading
Tags : 
    
Procore
Published By: Seismic     Published Date: May 24, 2019
Implementing a sales enablement strategy is one of the most effective ways you can transform your sales and marketing teams. Organizations that have undertaken a sales enablement initiative have seen a 350% increase in content usage, 275% boost in conversions, and 65% more revenue generated by new reps. In this webinar, we’ll share the 3 biggest mistakes companies make when implementing a sales enablement strategy to ensure you don’t fall victim to these pitfalls. You'll walk away with the framework for implementing a sales enablement strategy that will enable you to: ? Increase Sales Productivity ? Improve Sales and Marketing Alignment ? Increase Efficiency of Content Management ? Unlock Deep Content Insights and Analytics
Tags : 
    
Seismic
Published By: Zscaler     Published Date: May 15, 2019
Cloud computing is rapidly changing enterprise IT with applications like Salesforce and Office 365, which are improving productivity, reducing costs, and simplifying management. Now, organizations are discovering that those same advantages can be achieved by migrating security to the cloud. In fact, in its 2016 Magic Quadrant report on Secure Web Gateways, Gartner reported, “Cloud services have experienced a 35% five-year compound annual growth rate, while on-premises appliances have only grown by 6% during the same period.”
Tags : 
    
Zscaler
Published By: Forcepoint     Published Date: May 14, 2019
IDC Infobrief: How Security Solutions Enable Cloud Success Cloud applications have transformed how organizations conduct business, increasing productivity and reducing costs. However, moving to the cloud means critical data now flows outside the organization’s traditional security boundaries. Unsurprisingly, security concerns still rank as the number one reason for not using cloud services*. This IDC InfoBrief, sponsored by Forcepoint, outlines five key security considerations and best practices for safe cloud adoption, including: Multi-cloud adoption: exposing challenges for security architectures Cloud-first and GDPR implications Cloud application visibility and control Data management and DLP in the cloud Leveraging User and Entity Behavior Analytics (UEBA) for protection Read the eBook to find out the five information security lessons learned from transitioning to the cloud. *IDC’s 2017 CloudView Survey; IDC’s 2017 CloudImpact Survey
Tags : 
    
Forcepoint
Published By: Forcepoint     Published Date: May 14, 2019
IDC Infobrief: How Security Solutions Enable Cloud Success Cloud applications have transformed how organizations conduct business, increasing productivity and reducing costs. However, moving to the cloud means critical data now flows outside the organization’s traditional security boundaries. Unsurprisingly, security concerns still rank as the number one reason for not using cloud services*. This IDC InfoBrief, sponsored by Forcepoint, outlines five key security considerations and best practices for safe cloud adoption, including: Multi-cloud adoption: exposing challenges for security architectures Cloud-first and GDPR implications Cloud application visibility and control Data management and DLP in the cloud Leveraging User and Entity Behavior Analytics (UEBA) for protection Read the eBook to find out the five information security lessons learned from transitioning to the cloud. *IDC’s 2017 CloudView Survey; IDC’s 2017 CloudImpact Survey
Tags : 
    
Forcepoint
Published By: Forcepoint     Published Date: May 14, 2019
IDC Infobrief: How Security Solutions Enable Cloud Success Cloud applications have transformed how organizations conduct business, increasing productivity and reducing costs. However, moving to the cloud means critical data now flows outside the organization’s traditional security boundaries. Unsurprisingly, security concerns still rank as the number one reason for not using cloud services*. This IDC InfoBrief, sponsored by Forcepoint, outlines five key security considerations and best practices for safe cloud adoption, including: Multi-cloud adoption: exposing challenges for security architectures Cloud-first and GDPR implications Cloud application visibility and control Data management and DLP in the cloud Leveraging User and Entity Behavior Analytics (UEBA) for protection Read the eBook to find out the five information security lessons learned from transitioning to the cloud. *IDC’s 2017 CloudView Survey; IDC’s 2017 CloudImpact Survey
Tags : 
    
Forcepoint
Published By: Sage     Published Date: Apr 19, 2019
The way we work has completely transformed. New technology is changing how, where and when we work. In this new landscape, businesses are facing challenges specific to growth, talent acquisition and productivity. Employers need to embrace new technology to get ahead in this new world of work, and put people at the heart of their strategy. However, HR and People leaders are in fierce competition for the all-important slice of budget, which makes it vital to build the strongest business case for technology investment. This guide is intended to help HR and People leaders like you get the financial support you need. You’ll get practical, effective tips on: • Understanding and explaining the true benefits of investing in a new HR system and the likely return on investment. • Positioning HR as a driver of change throughout your business. • Ensuring your HR vision aligns with the business strategy. • Getting management and key stakeholders to buy in. • Building the strongest business case pos
Tags : 
    
Sage
Published By: HotSchedules     Published Date: Mar 11, 2019
The restaurant industry is buzzing about automation. With labor costs expected to double and consumer demand for a seamless checkout experience, many restaurants are looking at technologies that can automate tasks in the front-of-house. But there are back-of-house processes that have yet to be fully automated. While auto-counting your inventory may be a thing someday, it’s not here yet. So if you can’t automate the inventory management process, you can at least use tools that automate its more cumbersome aspects. Maximum labor output, higher levels of accuracy, and better accountability are possible with a system that automates certain tasks and enable manager productivity for on-the-job success. After reading this eBook, you’ll know: • The many inefficiencies generated by manual, spreadsheet-based counting methods. • The innovations being made to inventory management technology. • How modern, mobile inventory management tools will help your managers reduce costs and increase product
Tags : 
    
HotSchedules
Published By: Dell EMC EMEA     Published Date: Mar 05, 2019
Hardware technology doesn’t last forever. It has a lifecycle, a measurable beginning and end to its productivity and value. IT is tasked with optimizing the PC lifecycle while driving strategic breakthroughs for their organization. However, the high cost and complexity of PC management leaves IT little time for innovation. We offer flexible financing options that help assure IT will always have everything they need, when they need it, to keep end users engaged and productive. Learn more about Dell solutions powered by Intel®.
Tags : 
    
Dell EMC EMEA
Published By: Kaseya     Published Date: Mar 01, 2019
The increasing number of endpoints and the growing complexity of IT landscape brings in the need of having a unified method of managing IT. Unified Endpoint Management (UEM) gives organizations a simple, flexible way to manage and secure endpoints from an all-in-one single platform. With capabilities such as centralized discovery and management, automation and remote control, UEM equips enterprises to address complex problems encountered by IT in the current landscape. Download this ebook to learn how to enable your IT teams to eliminate roadblocks and increase productivity and move forward on their way to the digital transformation of the enterprise. Few salient points: -The challenges faced by modern IT teams -How Unified Endpoint Management helps address these challenges -Benefits of Unified Endpoint Management in the enterprise -Kaseya’s approach to UEM
Tags : 
    
Kaseya
Published By: Dell EMC EMEA     Published Date: Feb 28, 2019
As diverse organizations seek to implement data-driven strategies, the personal computer in all its varieties remains the key workforce productivity tool. IT leaders must guide PC management across the entire PC lifecycle to enable users to work most effectively. Today, IT leaders address the PC lifecycle across a continuum from control to transformation. Control is geared to optimization, while transformation focuses on the business impact of technology. Download this white paper to learn more about Dell solutions powered by Intel®.
Tags : 
    
Dell EMC EMEA
Published By: Gameffective     Published Date: Feb 26, 2019
Comdata Group is one of the world's largest business process outsourcing (BPO) providers. It operates hundreds of call-centers around the globe, with tens of thousands of employees offering, a variety of services, including sales and customer service. In a competitive BPO market, Comdata was looking for ways to increase the productivity and efficiency of its agents. It looked for a unified solution that would successfully engage employees, drive higher accountability and better focus them on their performance. Using Gameffective's platform, Comdata deployed gamified, real-time performance management. This process provides employees with the ability and motivation to self-track their performance against goals and benchmarks, and offers just-in-time coaching based on their needs. The results were impressive: 12% increase in sales per hour, and significant reductions in both new-hire learning curves and in ongoing training time. Read the case study to learn how Comdata: Increased emp
Tags : 
    
Gameffective
Published By: Unit4     Published Date: Feb 18, 2019
When the need for non-profit organizations to maximize impact, efficiency, and accountability is greater than ever, a modern Enterprise Resource Planning solution (ERP) can deliver an array of tangible benefits. Learn how next generation ERP can help improve efficiency, add value to projects, and improve budget forecasting.
Tags : 
nonprofit, ngo, erp, productivity, grant management, reporting, digital assistants
    
Unit4
Published By: Citrix Systems     Published Date: Feb 14, 2019
"Read this white paper to learn how a secure digital workspace can help you put people at the center of IT. Create a happier, more engaged workforce - Deliver the tools that fuel productivity - Remove the temptation for shadow IT - Boost security and simplify management"
Tags : 
    
Citrix Systems
Published By: Sage People     Published Date: Jan 31, 2019
The way we work has completely transformed. New technology is changing how, where and when we work. In this new landscape, businesses face challenges around growth, talent acquisition and productivity. Employers need to embrace new technology to get ahead in this new world of work, and put people at the heart of their strategy. However, HR and People leaders are in fierce competition for that all-important slice of budget and that makes building the strongest business case for technology investment vital. This guide is designed to help HR and People leaders like you get the financial support you need. You’ll get practical, effective tips on: • Understanding and explaining the true benefits of investing in a new HR system and likely return on investment • Positioning HR as a leader of change throughout your business • Ensuring your HR vision fits in with the business strategy • Getting management and key stakeholder buy-in • Building the strongest business case and the most powerful el
Tags : 
    
Sage People
Published By: Lookout     Published Date: Dec 13, 2018
The world has changed. Yesterday everyone had a managed PC for work and all enterprise data was behind a firewall. Today, mobile devices are the control panel for our personal and professional lives. This change has contributed to the single largest technology-driven lifestyle change of the last 10 years. As productivity tools, mobile devices now access significantly more data than in years past. This has made mobile the new frontier for a wide spectrum of risk that includes cyber attacks, a range of malware families, non-compliant apps that leak data, and vulnerabilities in device operating systems or apps. A secure digital business ecosystem demands technologies that enable organizations to continuously monitor for threats and provide enterprise-wide visibility into threat intelligence. Watch the webinar to learn more about: What makes up the full spectrum of mobile risks Lookout's Mobile Risk Matrix covering the key components of risk How to evolve beyond mobile device management
Tags : 
    
Lookout
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.