role management

Results 51 - 75 of 140Sort Results By: Published Date | Title | Company Name
Published By: ClickSquared     Published Date: Jul 07, 2009
With interactive relationship marketing, businesses can build relationships that captivate and motivate prospects and customers across an entire buying lifecycle, while providing measurable results. The digital platform these programs run on should support a long-term vision for the role of IRM, encompassing a complete range of services and facilities in an integrated management and communication systems. Learn more today!
Tags : 
clicksquared, digital marketing, interactive relationship marketing, irm, lifecycle, marketing intelligence, it foundation, web 2.0, api, dashboard, kpi, direct mail, sms, marketing mail, txt, real time results, marketing software
    
ClickSquared
Published By: CA Mainframe     Published Date: Sep 12, 2008
Data Professionals are now being asked to perform higher-level tasks and interact with businesses as “data stewards”.  In this survey, you will learn the challenges as outlined by over 850 data professionals. Get this CA-sponsored survey of the International DB2 Users Group (IDUG) conducted by Unisphere Research. The closer link between corporate performance and database performance is increasing pressure on data professionals to provide higher-level services to enterprise business customers.
Tags : 
database administrator, dba, database, data management, ca mainframe, mainframe
    
CA Mainframe
Published By: CyberSource EMEA     Published Date: May 04, 2018
Digital technology is creating change at a pace never seen before. Customers now expect speed, ease, choice and a personalised service. It makes customer experience key to success. And it sets merchants a challenge. To survive, and thrive, businesses need to stay agile in everything they do –including how they manage fraud. As the people who set the strategy that determines if an order is accepted or not, fraud teams have a pivotal role to play in improving customer experience and reducing risk. This makes fraud management more than a back-office utility. It’s a way to differentiate your business and achieve a competitive advantage. This is the question we put to three specialists from CyberSource – as well as Chris Monk from digital literacy agency Decoded. This report reflects their expert opinion, and explores: • The changing landscape for businesses. • The key challenges for fraud teams. • How to develop an agile fraud solution
Tags : 
    
CyberSource EMEA
Published By: IBM     Published Date: Oct 12, 2015
This IBM-commissioned profile of government information management professionals examines the challenges of dealing with the increase in digital and unstructured content as well as the roles that shared capture service and improved case management.
Tags : 
ibm, forrester, digital, engagement, forrester technology, information management
    
IBM
Published By: IBM     Published Date: Apr 09, 2015
IBM Security, in partnership with the Center for Applied Insights, has launched the 2014 IBM CISO Assessment. Driven by the specter of external attacks and the needs of their own organizations, CISO's are continuing the shift toward a business leadership role that focuses on risk management and taking a more integrated and systemic approach.
Tags : 
ibm, risk management, security risk, security officer, data security
    
IBM
Published By: Prophix     Published Date: May 31, 2016
To have the greatest impact within your company, you need to contribute to strategy rather than focusing on tactical issues. But, to accomplish this means that you have to tap into your company's financial performance and unearth insights that will help senior leaders make better decisions. This “From Tactics to Strategy” webinar focuses on helping you play a more critical role in your organization’s success. The fast-paced session reveals how you can capture and leverage the data gathered from across your financial systems to help senior management make better and faster strategic decisions.
Tags : 
best practices, financial performance, productivity, system management
    
Prophix
Published By: Looker EMEA     Published Date: Sep 27, 2017
Deploy Business Intelligence in Days, Not Months. Fastest Implementation Time -Up and running in 24 days compared to 78 on average (300% faster). ? Ease of Use - Top to bottom, Looker is easier ? User Adoption - More data lovers switch to Looker Deploying a new BI platform doesn’t have to be a long, painful process anymore. See how 21 leading BI vendors compare in terms of overall user satisfaction for implementation -Download the Report >>
Tags : 
business resources, enterprise headcounts, individual roles, organizational charts, corporate initiatives, management principles, department optimization
    
Looker EMEA
Published By: Group M_IBM Q119     Published Date: Jan 08, 2019
The discipline of data quality assurance ensures that data is "fit for purpose" in the context of existing business operations, analytics and emerging digital business scenarios. It covers much more than just technology. It includes program management, roles, organizational structures, use cases and processes (such as those for monitoring, reporting and remediating data quality issues). It is also linked to broader initiatives in the field of enterprise information management (EIM), including information governance and master data management (MDM)
Tags : 
    
Group M_IBM Q119
Published By: Veeam '18     Published Date: Dec 04, 2018
"The new EU General Data Protection Regulation (GDPR) is the most important change in data privacy regulation in 22 years and it will have a profound impact on every organization that relies on the storage and processing of personal data of EU citizens. Starting May 25, 2018, the penalties begin for noncompliance, with GDPR fines of up to 4% of annual global revenue or 20 million euros - whichever is greater. As this new regulation also impacts Veeam®, we wanted to share our insights on our road to compliancy. In a new executive brief, GDPR: 5 Lessons Learned, Veeam Compliance Experience Shared, we walk through these lessons and share how our software played a critical role within data management and protection strategies to ensure we remain compliant while delivering Availability for the Always On Enterprise™."
Tags : 
    
Veeam '18
Published By: Taleo     Published Date: Feb 01, 2012
This paper is the second in a five part series that explores the role of business leaders in driving talent management functions and the specific tools and approaches that will make them successful.
Tags : 
    
Taleo
Published By: Nimble Storage     Published Date: Oct 28, 2013
Storage plays a critical role in the datacenter. To keep up with the performance, capacity, availability, and efficiency needs of today’s enterprise, storage is undergoing a transformation by leveraging flash, high-capacity disks, and integrated data management. This paper discusses how Nimble Storage’s flash-optimized architecture is engineered to accelerate applications, scale performance and capacity, protect data, and make IT more productive and empowered.
Tags : 
nimble storage, data storage, backup, disaster recovery, flash memory, data protection, ssd, hybrid storage, high-performance storage, storage efficiency, storage management, storage for vdi, storage for virtualized servers, storage for private cloud, storage for vmware, storage for oracle, storage for microsoft, storage for exchange, storage for sharepoint
    
Nimble Storage
Published By: Platform Computing     Published Date: Jul 16, 2008
This white paper primarily focuses on the expanding role of HPC management software in the HPC marketplace. The paper emphasizes its historical development and considers its business case and future prospects while dispensing with more elaborate technical analysis and product comparisons.
Tags : 
middleware, platform computing, platform
    
Platform Computing
Published By: DocuSign     Published Date: Jul 12, 2019
As you know, HR plays a critical role in recruiting, hiring, training, and retaining the lifeblood of your business: people. But despite HR’s strategic role, it has traditionally lagged behind other departments in terms of adopting user-friendly, employee-focused technology investments. Legacy tools and reams of paper are still often used to prepare, sign, act upon, and manage the overwhelming document load, from recruitment and onboarding to performance management and off-boarding.1 The combination of outdated processes and additional paperwork limits HR staff’s ability to do their most important job: hire and support employees. That’s changing as HR turns to the cloud to digitize the agreement process. According to a 2018 PwC survey of HR executives, 75 percent of respondents said that they’ve moved at least one HR process to the cloud, while 40 percent have core systems (talent and acquisition management and HR information systems, for example) in the cloud.2 And those efforts are
Tags : 
    
DocuSign
Published By: Dell Windows Server     Published Date: Jan 16, 2009
Windows Server 2008 includes the Hyper-V role, which is a hypervisor that enables server virtualization. This new virtualization hypervisor enables a Windows Server 2008 system to host many VMs or child partitions that run directly on the hypervisor layer. Hyper-V servers and VMs can be centrally managed by System Center Virtual Machine Manager (SCVMM) to enable centralized management and advanced features. This demo video shows Hyper-V and System Center Virtual Machine Manager (SCVMM).
Tags : 
dell, hyper-v, scvmm cloning, windows server 2008, virtualization hypervisor, system center virtual machine manager
    
Dell Windows Server
Published By: IBM     Published Date: Oct 13, 2017
Integrated Threat Management For Dummies, IBM Security Limited Edition, lays the foundation for effective tools and techniques that work together to help counter today’s advanced threats. Regardless of your role in the IT security organization, threat management tools and techniques will influence your job. Your role determines the part you play to effectively manage threats, including those targeting the cloud and your company’s data. If you are a Chief Information Security Officer (CISO) or security manager, this book explains in detail the types of tools you need to effectively prevent, detect, and respond to security incidents. If you’re in general business management, you’ll better understand the risks associated with enterprise computing and the reasons why a comprehensive portfolio of security tools that work well together is so important.
Tags : 
malware prevention, network intrusion prevention, malware protection, ibm, firewall, mutating malware, cyber threats
    
IBM
Published By: IBM Smart Business     Published Date: May 29, 2009
This demo shows how Intuit Quickbooks Enterprise Solutions enabled by IBM Smart Business offers a smarter way to acquire, use and support business applications. Find out how you can use this software solution for your business to simplify inventory, purchasing, sales, and payroll, enabling you to cut costs and complexity. 
Tags : 
ibm, smart business, intuit, quickbooks, enterprise solutions, cost-cutting, purchasing, sales, payroll, dashboard, enterprise, business software solutions, smart market, smart cube, smart desk, smart support, finance, accounting, erp, smb
    
IBM Smart Business
Published By: Microsoft     Published Date: Oct 24, 2016
This Technology Spotlight examines the important role played by enterprise mobility management (EMM) technology in managing the security challenge posed by the combination of mobile devices and cloud-based software-as-a-service (SaaS) apps. It also explores the role of Microsoft's Enterprise Mobility Suite (EMS) in the strategically important EMM market.
Tags : 
mobility, enterprise mobility management, software as a service, cloud, mobile security
    
Microsoft
Published By: HP     Published Date: Apr 13, 2014
The purpose of this IDC White Paper is to lay out the role that performance testing can play in the context of overall application lifecycle management (ALM), security, resource, and demand management. As part of that objective, the document defines an application performance testing framework and discusses a performance test evolution path and the relationship between a successful approach to performance testing and related IT elements such as monitoring, security, ALM, and project and portfolio management (PPM).
Tags : 
agile performance testing, continuous performance test, load testing, loadrunner, mobile performance testing, mobile testing, performance center, performance testing, idc
    
HP
Published By: HP     Published Date: Jul 28, 2014
The purpose of this IDC White Paper is to lay out the role that performance testing can play in the context of overall application lifecycle management (ALM), security, resource, and demand management. As part of that objective, the document defines an application performance testing framework and discusses a performance test evolution path and the relationship between a successful approach to performance testing and related IT elements such as monitoring, security, ALM, and project and portfolio management (PPM).
Tags : 
agile performance testing, continuous performance test, load testing, loadrunner, mobile performance testing, mobile testing, performance center, performance testing, idc
    
HP
Published By: Cisco     Published Date: Sep 16, 2015
. This Technology Spotlight examines the critical role unified infrastructure and cloud management will play in the transformation of today's datacenter operations environments.
Tags : 
ucs, unified computing system, infrastructure, enterprise, it barriers
    
Cisco
Published By: OpenText GXS     Published Date: Apr 21, 2014
This white paper explains the role local tax compliance plays in successful supply chain management and e-business initiatives more broadly and how leading global brands and governments are addressing this need.
Tags : 
gxs, opentext, e-invoicing, invoicing, electronic invoicing, e-signatures, accounts payable, paper invoices
    
OpenText GXS
Published By: Esker     Published Date: Jun 29, 2017
Efficient O2C processes play a large role in the customer experience and company success — unfortunately, they can be a challenge to attain when you have different teams working towards different goals. In this eBook, you’ll explore how O2C automation not only improves efficiency, but the entire customer experience, by uniting your five most strategic teams: 1. Order Management 2. E-Commerce 3. Logistics & Distribution 4. Account Receivable 5. Sales Start creating a positive customer experience with a proactive solution. Download your copy of the eBook now!
Tags : 
order-to-cash, customer experience, machine learning, order management, collections management
    
Esker
Published By: Nemx Software Corporation     Published Date: Feb 22, 2007
For most  organizations email compliance management is synonymous with outbound email control. This white paper describes how internal email control is crucial to an organization's compliance mandate and the underlying technical architecture required to do it effectively.
Tags : 
corporate governance, hipaa compliance, sarbanes oxley compliance, software compliance, content management system, messaging, document management, secure content management, compliance, email security, encryption, policy based management, security management, email control, email policy, compliance management, nemx, nemx software
    
Nemx Software Corporation
Published By: ADP     Published Date: Aug 28, 2017
Many small businesses rely on owners and other employees to take on HR responsibilities in addition to their “day jobs,” a role we call the ad hoc HR manager (aHRM). Although a common practice, using an aHRM can present unforeseen risks. Read the complete guide to risky ad hoc HR management to find out more.
Tags : 
    
ADP
Published By: Host Analytics     Published Date: Mar 01, 2018
While Oracle Hyperion remains a market leader in EPM software, that role comes with a hefty price tag and poses some hidden risks that have companies that use it re-evaluating their planning, budgeting, and consolidation needs. Whether used individually or together as an EPM suite, Hyperion Financial Management (HFM) and Hyperion Planning burden finance departments with a high cost of ownership, from server costs and consultants to dealing with the complex integration between products and the different interfaces. As Oracle Hyperion users start to evaluate the cloud, they need to be aware of how benefits of the cloud-based EPM solution compare to on-premises software. We’ve compiled this information to a) help you better understand the full costs and potential risks associated with Oracle Hyperion and b) offer guidance as you evaluate cloud-based options.
Tags : 
    
Host Analytics
Start   Previous    1 2 3 4 5 6    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.