ims

Results 251 - 275 of 356Sort Results By: Published Date | Title | Company Name
Published By: Silver Peak     Published Date: Feb 12, 2013
Silver Peak Systems' new Agility technology initiative gives application owners easy control with point-and-click virtual workload acceleration thanks to tight integration with VMware vCenter and other virtual infrastructure management consoles.
Tags : 
virtualization, data center, network, study
    
Silver Peak
Published By: Kroll Advisory Solutions     Published Date: Aug 02, 2013
First launched in 2011, the Anti-Corruption Benchmarking Report aims to give compliance officers a comprehensive view of the "ABC" (anti-bribery and corruption) risks they have, the resources they have to fight them, and how those resources are implemented into compliance programs. The results give compliance officers a view into the anti-bribery and corruption threats they face and share resources for creating a risk-based compliance program. Download the report to learn more.
Tags : 
compliance, corruption, anti-bribery, risk assessment, compliance programs, compliance risk
    
Kroll Advisory Solutions
Published By: Adobe     Published Date: Apr 13, 2015
This Gigaom Research report aims to help technology decision-makers better understand: - What the modern workforce thinks it needs to succeed in this rapidly changing world of mobile-first communications and new work-collaboration technologies - How IT is supporting those needs and overall corporate objectives - If there are gaps between worker expectations and IT requirements, and how technology buyers can address them Download this Gigaom Research white paper to learn more.
Tags : 
adobe, modern workforce, platform support, platform productivity, it support, work-collaboration technologies
    
Adobe
Published By: Adobe     Published Date: Apr 13, 2015
This Gigaom Research study aims to help technology decision-makers better understand the role of IT in supporting the need for business agility and pace. In this report you will gain insight into: - How to increase business agility with the best tools for your workforce - Strategies to speed up new tool adoption so the workforce has a range of work tools that match different sorts of work activities and interactions - The shifting role of IT to create a technology landscape in which productivity and innovation flourish Download this Gigaom Research white paper to learn more.
Tags : 
adobe, it tools, modern workforce, business agility, it productivity
    
Adobe
Published By: AWS     Published Date: Jun 11, 2019
Trupanion, a Seattle-based medical insurance provider for cats and dogs, needed to find data insights quickly. With only 1% of pet owners insured, the process of evaluating a claim to approve or deny payment was manual and time-consuming. Building accurate predictive models for decision-making required manpower, time, and technology that the small company simply did not have. DataRobot Cloud, built on AWS, helped Trupanion create an automated method for building data models using machine learning that reduced the time required to process claims from minutes to seconds. Join our webinar to hear how Trupanion transformed itself into an AI-driven organization, with robust data analysis and data science project prototyping that empowered the company to make better decisions and optimize business processes in less time and at a reduced cost. Join our webinar to learn: Why you don’t need to be an expert in data science to create accurate predictive models. How you can build and deploy pr
Tags : 
    
AWS
Published By: SAP     Published Date: Apr 14, 2011
Investigate the latest thinking on how to become more agile and customer-friendly while reducing operating costs and revenue leakage. With service and payment convergence, services can be bundled at the charging layer, and prepaid, postpaid, and blended payment mechanisms can be offered for all services.
Tags : 
sap thought leadership, software solutions, customer loyalty, convergent charging, ims, sdp, sip, online balance management, api
    
SAP
Published By: SAP     Published Date: Jun 30, 2011
This paper aims to discuss the various capability acquisition and it solution deployment options and provide a perspective on how to evaluate the suitability of those options, given an enterprise's situation, and to get the best outcome.
Tags : 
sap, competitive positioning, solution landscape, risk tolerance, shared service center, bpo, bpu, application performance, scalability
    
SAP
Published By: IBM     Published Date: May 27, 2014
“Big data”– which admittedly means many things to many people – is no longer confined to the realm of technology. Today, it is a business imperative. In addition to providing solutions to insurance companies’ long-standing business challenges, big data inspires new ways to transform processes, organizations and many aspects of the insurance industry as we know it.
Tags : 
ibm, big data, insurance, insurance technology, big data solutions, business value, financial data, risk data, claims data, actuarial data
    
IBM
Published By: IBM     Published Date: May 27, 2014
Big data and analytics help insurance companies identify the next best action for customers. With the right solutions, companies can extract, integrate and analyze a large volume and variety of data, from call-center notes and voice recordings to web chats, telematics and social media
Tags : 
ibm, big data, analytics, insurance, insurance industry, big data solutions, integration, risk assessment, policy rates, customer retention, claims data, transaction data
    
IBM
Published By: IBM     Published Date: Feb 24, 2015
Big data and analytics help insurance companies identify the next best action for customers. With the right solutions, companies can extract, integrate and analyze a large volume and variety of data, from call-center notes and voice recordings to web chats, telematics and social media.
Tags : 
big data, ibm, claims operations, customer service
    
IBM
Published By: IBM Watson Health     Published Date: Feb 28, 2017
IBM Watson Health aims to transform the drug development process for life sciences – from research to commercialization. IBM Watson for Drug Discovery helps accelerate breakthroughs by enabling researchers to quickly analyze, identify, and prioritize new therapeutic targets and drug combinations for future study.
Tags : 
ibm, watson, watson health, drug discovery
    
IBM Watson Health
Published By: IBM     Published Date: Dec 15, 2016
BM Watson Health aims to transform the drug development process for life sciences – from research to commercialization. IBM Watson for Drug Discovery helps accelerate breakthroughs by enabling researchers to quickly analyze, identify, and prioritize new therapeutic targets and drug combinations for future study.
Tags : 
ibm, watson, watson health, drug discovery
    
IBM
Published By: BlackBerry Cylance     Published Date: Jul 02, 2018
The cyberattacks of 2017 proved more numerous, sophisticated, and ruthless than in years past. Threat actors, armed with knowledge stolen from the CIA and tools lifted from the NSA, demonstrated an elevated level of proficiency. WannaCry and NotPetya, two prominent threats from last year, successfully exploited these stolen assets in their assault on systems worldwide. As 2017 progressed, new opportunities developed in ransomware-as-a-service (RaaS), opening the gates of malware-for-profit to everyone. Advancements in fileless attacks provided new ways for threats to hide from once reliable detection methods. Malware features such as polymorphism continued to play a powerful role in evading traditional defenses. The victims of cybercrime ranged from private businesses to the fundamental practices of democracy. France and the United States saw significant data breaches during their recent presidential elections. Several high-profile companies lost their customers’ personally identifiable information to cyberattacks, blemishing their brands and costing them untold millions in recovery operations. This report contains an overview of the threat trends and malware families Cylance's customers faced in 2017. This information is shared with the goal of assisting security practitioners, researchers, and individuals in our collective battle against emerging and evolving cyberthreats.
Tags : 
cyber attacks, cia, nsa, wannacry, notpetya
    
BlackBerry Cylance
Published By: BlackBerry Cylance     Published Date: Jul 02, 2018
With cybercriminals threatening nations globally, cybersecurity is taking a front seat in many regions. Most notably, the European Union (EU) has adopted regulations to combat the threats. Against the backdrop of increasingly sophisticated cyberattacks, the EU has set forth rules and procedures for enhanced cybersecurity, along with penalties for noncompliance, in the form of the General Data Protection Regulation (GDPR). This new body of mandated policies and procedures aims to protect EU member personal information collected and/or stored by organizations. Read more in the GDPR business brief.
Tags : 
data, gdpr, global, nationally, cybercriminals
    
BlackBerry Cylance
Published By: BlackBerry Cylance     Published Date: Jul 02, 2018
While advanced persistent threats and malware still plague some victims, it is ransomware that is still gaining real traction in today’s cybersecurity landscape. The EternalBlue flaw that took over the news in May 2017 rose to popularity as a result of its inclusion in the data leaked by The Shadow Brokers. Utilized in multiple attacks alongside the also-released DoublePulsar exploit, including the installation of cryptocurrency miner Adylkuzz, the exploits are just the tip of the cyberwarfare tools The Shadow Brokers are claiming to have in their arsenal. The latest EternalBlue and DoublePulsar based attacks, delivering the WannaCry Ransomware, have so far been hugely damaging to healthcare organizations while also impacting over 200,000 endpoints in 150 countries. WannaCry-WanaCryptor 2.0 was coupled with the EternalBlue exploit, allowing it to automatically propagate itself to vulnerable machines across the Internet. While not technically advanced, the use of EternalBlue and DoubleP
Tags : 
ransomware, threats, cyber, security, data
    
BlackBerry Cylance
Published By: BlackBerry Cylance     Published Date: Jul 02, 2018
The 21st century marks the rise of artificial intelligence (AI) and machine learning capabilities for mass consumption. A staggering surge of machine learning has been applied for myriad of uses — from self-driving cars to curing cancer. AI and machine learning have only recently entered the world of cybersecurity, but it’s occurring just in time. According to Gartner Research, the total market for all security will surpass $100B in 2019. Companies are looking to spend on innovation to secure against cyberthreats. As a result, more tech startups today tout AI to secure funding; and more established vendors now claim to embed machine learning in their products. Yet, the hype around AI and machine learning — what they are and how they work — has created confusion in the marketplace. How do you make sense of the claims? Can you test for yourself to know the truth? Cylance leads the cybersecurity world of AI. The company spearheaded an innovation revolution by replacing legacy antivirus software with predictive, preventative solutions and services that protect the endpoint — and the organization. Cylance stops zero-day threats and the most sophisticated known and unknown attacks. Read more in this analytical white paper.
Tags : 
cylance, endpoint, protection, cyber, security
    
BlackBerry Cylance
Published By: Neolane, Inc.     Published Date: Dec 30, 2008
Accor is one of the world's largest travel, tourism and corporate services companies. With over 4,000 hotels worldwide, Accor Hotels covers all segments from economy to upscale. Sofitel, Novotel and Motel 6 are just a few of Accor's hotel brands. Accor's online relationship marketing strategy aims to convert prospects into customers and build customer value through increasing the depth of relationships and growing revenues from repeat bookings, cross-sales, up-sales and referrals.
Tags : 
neolane, accor hotels, online relationship marketing strategy, improve reactivity rates, campaign personalization, collaborative content management, crm software, custom content, deliverability, e-commerce, email marketing, emerging marketing, international marketing, lead generation, rich media
    
Neolane, Inc.
Published By: iCims     Published Date: Aug 16, 2013
In this recorded webinar, you will learn how Golder Associates, an iCIMS client, delivers their best-in-breed international recruitment strategy and how the iCIMS Talent Platform can be configured to help your organization recruit globally as well.
Tags : 
global recruitment, recruiting, international recruiting
    
iCims
Published By: iCims     Published Date: Aug 16, 2013
iCIMS Social Distribution enables organizations to source, recruit, and hire the best talent through social networks with enhanced employee referral campaigns and automated job publishing.
Tags : 
recruiting, recruitment advertising, social recruiting, social media recruiting, social recruiting software
    
iCims
Published By: iCims     Published Date: Aug 16, 2013
The iCIMS Talent Platform makes hiring millennial talent easier than ever with our social sourcing and recruiting tools.
Tags : 
recruiting, recruitment advertising, social recruiting, social media recruiting, social recruiting software, hard to fill positions, millennial, hiring
    
iCims
Published By: iCims     Published Date: Aug 16, 2013
The iCIMS Talent Platform simplifies the hiring process and can make hard-to-fill positions easier for recruiters.
Tags : 
recruiting, recruitment advertising, social recruiting, social media recruiting, social recruiting software, hard to fill positions, millennial, hiring
    
iCims
Published By: iCims     Published Date: Aug 16, 2013
The iCIMS Talent Platform helps employers create an employment brand that will help drive qualified candidates to their open jobs while helping current employees engage with the employment brand.
Tags : 
recruiting, recruitment advertising, social recruiting, social media recruiting, social recruiting software, hard to fill positions, millennial, hiring, employment brand
    
iCims
Published By: iCims     Published Date: Sep 04, 2013
Contingent workers are those who do not have an implicit or explicit contract for ongoing employment. According to the Bureau of Labor Statistics, contingent labor accounts for over 26% of the US labor force and expects continual growth beyond 2020. Contingent workers provide a variety of benefits to an organization: Easily add headcount to projects that need temporary assistance, have many workers with specific skills at your disposal.
Tags : 
best practices for hiring, onboarding, contigent workforce, icims, talent platform, capture talent, build relationships with candidates
    
iCims
Published By: iCims     Published Date: Oct 02, 2015
Did you know that 88% of all job seekers have at least one social networking profile? Because of this, 92% of companies have used or plan to use social media to recruit. If businesses aren't using social media for recruiting, they can potentially miss candidates that wouldn't be found elsewhere. Don't let your competition find these great candidates first, and even worse, your competition can find these great candidates.
Tags : 
social and mobile, social, mobile, icims, enganging candidates, reaching candidates, talent platform, social mobile recruiting, best candidates, social media recruiting platform
    
iCims
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add A White Paper

Email sales@inetinteractive.com to find out about white paper options for your company.