rate

Results 11126 - 11150 of 11278Sort Results By: Published Date | Title | Company Name
Published By: Netwrix     Published Date: Apr 22, 2008
Windows’ newest technology, the User Account Control, found in the Vista operating system has been erroneously called an additional level of security by many computer security professionals. Instead, in the hope to reduce the incidence of malware, unauthorized software installation, and unintentional system changes the User Account Control separates standard user tasks from requiring administrator level password access.
Tags : 
vista, windows vista, microsoft, microsoft vista, netwrix, security breach, access control, user access control
    
Netwrix
Published By: Dell     Published Date: Oct 20, 2008
Windows Vista incorporates a number of new and enhanced security features that address spyware, security vulnerabilities and end user naiveté.
Tags : 
dell, cyber security shield, windows vista security, vista uac, dell assessment
    
Dell
Published By: Dell     Published Date: Sep 07, 2011
Take a dose of this Windows 7 desktop migration strategy. You'll have happy healthcare systems and improve patient care!
Tags : 
windows 7, microsoft deployment, desktop, inventory applications, windows xp, healthcare management, healthcare, public health
    
Dell
Published By: CA Technologies     Published Date: Mar 06, 2015
L’application mobile est devenue l’initiative stratégique phare pour toutes les organisations numériques qui cherchent à développer leur activité.
Tags : 
    
CA Technologies
Published By: CA Technologies     Published Date: Mar 10, 2015
Die mobile App ist jetzt „die“ strategische Initiative für alle digitalen Organisationen, die ihr Unternehmen voranbringen möchten.
Tags : 
    
CA Technologies
Published By: CA Technologies     Published Date: Mar 10, 2015
Vereinfachen von Security und Management von Apps und BYOD auf Unternehmensebene
Tags : 
    
CA Technologies
Published By: Workfront     Published Date: Jun 25, 2014
When you started the game of marketing, you had brilliant ideas and the work ethic of a warrior. You felt undefeatable. Now, you feel like a pawn. You are tired, frustrated, and overwhelmed. Learn six key strategies to fight marketing work chaos and gain control of the board. Get the ebook now!
Tags : 
at task, marketing, game of marketing, strategies, eliminate choas, enterprise work management
    
Workfront
Published By: SurveyMonkey     Published Date: Aug 25, 2015
SurveyMonkey Audience fielded a Direct Mail Offer Test study on four direct mail pieces to demonstrate how to successfully test marketing offers.
Tags : 
direct mail, surveymonkey, testing framework, test marketing, best practices, key performance metrics, testing surveys, crm, data insights, market research
    
SurveyMonkey
Published By: Quocirca     Published Date: Oct 29, 2008
Outsourcing is a strategy increasingly being used by organizations to reduce costs and increase value. Outsourcing, however, has its risks. As organizations look to push out more of their custom software application development needs to outsourcing partners, careful planning is required in terms of building stringent software security requirements into contracts and creating a process and metrics to ensure that those requirements are met. This report examines outsourcing practices from 200 of the largest organizations in the UK and the US and provides pointers as to how the most experienced outsourcers are putting in place effective processes to drive the risk out of outsourcing.
Tags : 
quocirca, outsourcing, security, networking, software development
    
Quocirca
Published By: IBM     Published Date: Aug 06, 2014
As the world changes around them, many insurers are struggling to be profitable. A combination of disruptive forces — some economic, some societal, some technological — is shaking up the insurance industry comfort zone. Yet some leading insurers manage to stay ahead of the pack, but how?
Tags : 
ibm, insurance, strategy, industry, technology, business technology
    
IBM
Published By: IBM     Published Date: Aug 08, 2014
As the world changes around them, many insurers are struggling to be profitable. A combination of disruptive forces — some economic, some societal, some technological — is shaking up the insurance industry comfort zone. Yet some leading insurers manage to stay ahead of the pack, but how?
Tags : 
strategies, insurers, insurance industry
    
IBM
Published By: FICO     Published Date: May 11, 2017
Today it's easy for customers to leave, and they have fewer reasons to stay. In saturated telecom markets, competitors offer similarly high levels of coverage and service. Years of price-based competition have left little room for differentiation and margins are stretched thin.
Tags : 
customer management, finance, finance management, risk
    
FICO
Published By: BlackBerry     Published Date: Aug 10, 2009
In recent years, law firms have enjoyed remarkable financial returns due to a strong global economy, free flowing capital and a high level of demand for legal services. Law firm revenues and profits continued to be strong, even during the dotcom bust, the post 9/11 slowdown and the increasing cost of associate recruitment and retention. This success could be partly explained by the growth imperative in law firms: they must continue to grow, either by acquisition, or by recruiting laterals or associates, because law firm economics correlates size with profits. And many firms grew rapidly in the past several years.
Tags : 
blackberry, altman weil, law, legal, research in motion, voip, smartphones, it communication, microsoft exchange, mobile device management, mobile device management software, mobile workers, remote computing, wireless applications software, wireless computing
    
BlackBerry
Published By: netForensics     Published Date: Jan 04, 2008
To manage threats to the enterprise and successfully meet compliance challenges, organizations need a comprehensive security strategy that can successfully do battle with inside as well as outside threats. Today, companies are increasingly leveraging security information management (SIM) solutions to build a clean, concise, and manageable process for dealing with the tremendous volumes of raw security information from disparate devices, applications, and databases.
Tags : 
monitoring, hackers, internal threats, bad employee, identity theft, data protection, hacker, security management, sim technology, compliance, fraud, netforensics
    
netForensics
Published By: WNS     Published Date: Jun 21, 2017
Making key decisions that improve business performance requires more than simple insights. It takes deep data discovery and a keen problem solving approach to think beyond the obvious. As a business leader, you ought to have access to information most relevant to you that helps you anticipate potential business headwinds and craft strategies which can turn challenges into opportunities finally leading to favorable business outcomes. WNS DecisionPoint , a one-of-its kind thought leadership platform tracks industry segments served by WNS and presents thought-provoking original perspectives based on rigorous data analysis and custom research studies. Coupling empirical data analysis with practical ideas around the application of analytics, disruptive technologies, next-gen customer experience, process transformation and business model innovation; we aim to arm you with decision support frameworks based on points of fact.
Tags : 
cost of goods solid, warehousing and logistics, advertising and promotion, rent, electricity and utilities, floor staff, depreciation, system costs
    
WNS
Published By: IBM     Published Date: Aug 06, 2014
The holistic, integrated fraud-prevention platform from Trusteer, an IBM company, effectively protects financial institutions against the full range of attack vectors responsible for the majority of online and cross-channel fraud, including account takeover.
Tags : 
    
IBM
Published By: IBM     Published Date: Aug 08, 2014
The holistic, integrated fraud-prevention platform from Trusteer, an IBM company, effectively protects financial institutions against the full range of attack vectors responsible for the majority of online and cross-channel fraud, including account takeover.
Tags : 
fraud detection, finance, account takeover, cybercrime, fraud prevention
    
IBM
Published By: Success Factors     Published Date: Feb 16, 2012
Attracting the best talent is a never-ending challenge. Learn five strategies for getting ahead, even in the worst business environments. Get your report now, compliments of SuccessFactors.
Tags : 
employee performance, high performance culture, high performing workforce, smart goals, performance reviews, goal setting, performance management, business strategy, business execution, strategy execution, business strategy software, business results, talent management, learning management, recruiting management, workforce planning, workforce analytics, succession planning, compensation, core competencies
    
Success Factors
Published By: SuccessFactors     Published Date: Jun 25, 2012
Managing in this uncertain economy can be incredibly challenging. If your business is experiencing decreasing revenues, shrinking budgets and increasing uncertainty. you cannot afford to focus on talent. Right? Actually, wrong.
Tags : 
successfactors, talent management, performance, talent
    
SuccessFactors
Published By: Aberdeen Group     Published Date: Nov 13, 2015
This report examines the pressing need to break down data silos due to the damage they cause to analytical initiatives and user engagement. Read this report to find out more.
Tags : 
customer acquisition, marketing leads, marketing challenges, marketing messages, contact management, data science, demand generation, email marketing, inbound marketing, lead generation, lead intelligence, market research, integrated marketing, lead nurturing, marketing analytics
    
Aberdeen Group
Published By: Aberdeen Group     Published Date: Nov 23, 2015
This report examines the pressing need to break down data silos due to the damage they cause to analytical initiatives and user engagement. Read this report to find out more.
Tags : 
customer acquisition, marketing leads, marketing challenges, marketing messages, contact management, data science, demand generation, email marketing, inbound marketing, lead generation, lead intelligence, market research, integrated marketing, lead nurturing, marketing analytics
    
Aberdeen Group
Published By: Dun & Bradstreet     Published Date: Oct 21, 2016
Companies are looking to their CFOs for strong leadership in developing corporate strategies and achieving growth. CFOs can meet these rising expectations by leveraging their knowledge of corporate data to extract valuable insights about customers, suppliers, partners and other stakeholders. Supported by analytics, CFOs can help their companies create a global, unified and clear view of their many relationships with customers and others to guide intelligent risk-taking and thoughtful investment—both necessary catalysts for growth. This capability will also enable the company, particularly its sales and marketing functions, to move faster and adapt more quickly to changing conditions. The 21st-century CFO is not only concerned with controlling costs and minimizing risk, but also with maximizing opportunities and generating growth. The right foundational technologies and organizational processes for data-driven decision making can help them achieve all of these strategic goals.
Tags : 
    
Dun & Bradstreet
Published By: Xerox     Published Date: Dec 02, 2009
This paper presents the importance of a Print Management Strategy. Current economic, environmental, productivity and IT department impacts are explored. Benefits of implementing a print management strategy are itemized.
Tags : 
xerox, print, print management, white paper, efficiency, cut expenses
    
Xerox
Published By: Polycom     Published Date: Jul 24, 2014
Manufacturing companies have always prioritized nearness to supply and demand when developing their siting strategies. Now new imperatives such as proximity to emerging market demand, innovation, and talent development are rising to the fore. As a consequence, companies are moving past labor-cost arbitrage and operational efficiency to reinvent the manufacturing ecosystem. The name of this new approach? Next-shoring.
Tags : 
polycom, next-shoring, manufacturing, strategy, proximity, market, business technology
    
Polycom
Published By: Adobe     Published Date: May 13, 2015
The survey offers a big picture view of the investments in mobile by leading marketers—and what it will take to stay on top.
Tags : 
investing in mobile marketing, mobile engagement strategies, mobile marketers, mobile investmentments
    
Adobe
Start   Previous    438 439 440 441 442 443 444 445 446 447 448 449 450 451 452    Next    End
Search      

Add A White Paper

Email sales@inetinteractive.com to find out about white paper options for your company.