value

Results 2826 - 2850 of 2880Sort Results By: Published Date | Title | Company Name
Published By: CDW     Published Date: Nov 05, 2013
As IT infrastructures evolve, the complexity of software assets is constantly increasing, creating headaches for IT pros whose responsibility it is to keep track of it all. In response, many are turning to software asset management (SAM) software. Chances are your organization may already have an asset management product in place that you think is adequate.
Tags : 
cdw solutions, sam provider, software asset management, sam software, it process, software tco improvement, cio pushback, telecommunications, digital assets, delivering business value, hybrid approach, software management, sam program, it management
    
CDW
Published By: Achievers     Published Date: Jan 17, 2014
Knowledge and strategic relationships fuel many organizations in today’s rapidly changing, global economy. As such, organizations need to leverage the individuals—and their networks—that possess the most relevant knowledge, whether they are current employees or are only loosely connected to the organization. To do this, organizations should create and leverage peer collaboration networks that enable them to identify and connect with individuals who have the unique skills, knowledge, and capabilities these organizations need. Bersin’s Research, Why Reputations and Networks Matter in the Open Talent Economy, indicates that this approach works in driving value—organizations that have effectively used internal reputation networks and profile databases have been able to increase key metrics such as employees’ time to productivity and innovation levels.
Tags : 
talent management, employee enagement, human resources
    
Achievers
Published By: Canon Solutions America     Published Date: May 15, 2019
State and local governments can reduce their technology costs by adopting a “best value” approach to procurement. This brief focuses on the benefits of best-value purchasing for your agency’s critical print and document management solutions.
Tags : 
    
Canon Solutions America
Published By: Wildfire Interactive     Published Date: Sep 29, 2012
While most marketing channels have standardized methods for calculating ROI or value, other channels, like social media, can be harder to quantify. We compiled this report to help you better understand how social media delivers on real business objectives, and how to get the most value, and highest ROI, from your social marketing efforts. Download to learn more.
Tags : 
wildfire, marketing, social marketing, brand marketing, emerging marketing
    
Wildfire Interactive
Published By: Hyland Software     Published Date: Jun 16, 2016
Clinicians and staff want to perform better, produce more and enjoy higher levels of satisfaction. Close the gap between a user’s experiences with technology as a consumer and her experiences with technology at work to maximize the impact on your organization’s bottom line.
Tags : 
healthcare, technology, information technology, solutions, best practices
    
Hyland Software
Published By: Red Hat     Published Date: Dec 15, 2017
Choosing how to build an open hybrid cloud is perhaps the most strategic decision IT leaders will make this decade. It’s a choice that will determine their organization's competitiveness, flexibility, and IT economics for the next ten years. That's because, if done right, a cloud delivers strategic advantages to the business by redirecting resources from lights-on to innovation. But only an open hybrid cloud delivers on the full strategic business value and promise of cloud computing.
Tags : 
    
Red Hat
Published By: Adobe     Published Date: Jun 03, 2015
Download a new report from Adobe and the Direct Marketing Association (DMA) to learn how you can free yourself from traditional email constraints to create more effective campaigns. Based on survey results from nearly 300 email marketers, the report explores today’s greatest challenges and winning strategies for email marketing — so you can drive true customer engagement, boost business revenue, and add more value to your organization.
Tags : 
adobe, email, marketing, brands, digital marketing, integrated, contextual messaging, strategies, behavior, engagement, roi
    
Adobe
Published By: Trintech EMEA ABM Pilot     Published Date: Nov 03, 2017
The primary objective of any financial transformation project is to achieve process improvements by improving the quality, effectiveness and efficiency of financial information, ultimately enhancing shareholder value. Take the example of the close process. It would be incredibly simple to shorten the process by adding more people, however, is this an efficient way to reduce the number of days to close? On the right, the Hackett Group displays that best in class companies actually can be seen closing in fewer days, with greater automation and significant lower audit fees, emphasizing the idea that you really can do more with less.
Tags : 
account reconciliation, accounting automation, finance shared services, finance transformation program, finance transformation strategy, financial close, financial close process, reconciliation software, adjusting journal entries, recuing journal entries
    
Trintech EMEA ABM Pilot
Published By: IBM     Published Date: Feb 23, 2012
Built on IBM's market-leading business rules management system and enhanced with capabilities for detecting time-based events, this offering drives more responsive actions to business opportunities or risk conditions, increasing the value of each customer, partner and internal interaction.
Tags : 
ibm, technology, information technology, it management, data management, data center
    
IBM
Published By: CA Technologies     Published Date: Feb 13, 2015
Service management platforms have a vital role to play, but in most organizations, they’re not living up to expectations—delivering far too much complexity and cost, and far too little business value and time savings. This proves true even in organizations that have migrated to new solutions in recent years. This paper outlines why legacy service desks and even newer platforms have not delivered on expectations, it describes the requirements for a service desk solution to be truly effective in today’s business environment and it details how CA Cloud Service Management delivers on these key requirements.
Tags : 
service desk, service management, service platforms, cloud service, cloud service manegement, business value
    
CA Technologies
Published By: BambooHR - HR Software     Published Date: Jan 25, 2011
Administrative demands leave HR practitioners with time for little more than keeping up with growing workloads. A voice at the strategy table requires efficient HR information systems to and create real value in the HR function.
Tags : 
bamboohr, spreadsheets, excel, administrative demands, workloads, human resources, talent management, hr software, hrms, hris, employee database
    
BambooHR - HR Software
Published By: Cisco     Published Date: Apr 07, 2014
Cisco present and build upon their extensive research into Wi-Fi usage and help answer common service provider questions on how money can be made from the explosion of Wi-Fi usage.
Tags : 
wi-fi, service providers
    
Cisco
Published By: Cisco     Published Date: Apr 07, 2014
Cisco present and build upon their extensive research into Wi-Fi usage and help answer common service provider questions on how money can be made from the explosion of Wi-Fi usage.
Tags : 
wi-fi, service providers, cisco
    
Cisco
Published By: Cisco     Published Date: Apr 07, 2014
Cisco present and build upon their extensive research into Wi-Fi usage and help answer common service provider questions on how money can be made from the explosion of Wi-Fi usage.
Tags : 
wi-fi, service providers, cisco
    
Cisco
Published By: Cisco     Published Date: Apr 07, 2014
Cisco present and build upon their extensive research into Wi-Fi usage and help answer common service provider questions on how money can be made from the explosion of Wi-Fi usage.
Tags : 
wi-fi, service providers, cisco
    
Cisco
Published By: Cisco     Published Date: Apr 07, 2014
Cisco present and build upon their extensive research into Wi-Fi usage and help answer common service provider questions on how money can be made from the explosion of Wi-Fi usage.
Tags : 
wi-fi, service providers, cisco
    
Cisco
Published By: Oracle     Published Date: Oct 20, 2017
Security has become top of mind for CIOs, and CEOs. Encryption at rest is a piece of the solution, but not a big piece. Encryption over the network is another piece, but only a small piece. These and other pieces do not fit together well; they need to unencrypt and reencrypt the data when they move through the layers, leaving clear versions that create complex operational issues to monitor and detect intrusion. Larger-scale high-value applications requiring high security often use Oracle middleware, including Java and Oracle database. Traditional security models give the data to the processors to encrypt and unencrypt, often many times. The overhead is large, and as a result encryption is used sparingly on only a few applications. The risk to enterprises is that they may have created an illusion of security, which in reality is ripe for exploitation. The modern best-practice security model is an end-to-end encryption architecture. The application deploys application-led encryption s
Tags : 
    
Oracle
Published By: Oracle CX     Published Date: Oct 20, 2017
Security has become top of mind for CIOs, and CEOs. Encryption at rest is a piece of the solution, but not a big piece. Encryption over the network is another piece, but only a small piece. These and other pieces do not fit together well; they need to unencrypt and reencrypt the data when they move through the layers, leaving clear versions that create complex operational issues to monitor and detect intrusion. Larger-scale high-value applications requiring high security often use Oracle middleware, including Java and Oracle database. Traditional security models give the data to the processors to encrypt and unencrypt, often many times. The overhead is large, and as a result encryption is used sparingly on only a few applications. The risk to enterprises is that they may have created an illusion of security, which in reality is ripe for exploitation. The modern best-practice security model is an end-to-end encryption architecture. The application deploys application-led encryption s
Tags : 
    
Oracle CX
Published By: Oracle     Published Date: Oct 20, 2017
Virtually every business-oriented conversation Wikibon has with senior IT leaders includes a discussion of digital transformation. The relevance to this research is the increasing interdependency between organizations and the data they use, create, access, share and store. Digital means data and lots of it; and this data must be protected. The data requirements facing organizations today as a direct result of digital initiatives are unprecedented and require new approaches for protecting and enabling recovery for high value data assets. Governments around the world are trying to keep pace with the digital tsunami and new/evolving regulations will further pressure data protection and recovery requirements. For example, the EU’s General Data Protection Regulation (GDPR) states that organizations must take appropriate measures to ensure the ability to restore personal data “in a timely manner in the event of a physical or technical incident.” Beginning in May of 2018, penalties for non-co
Tags : 
    
Oracle
Published By: NetApp     Published Date: Sep 19, 2013
Learn how to maximize the business value of your data by having a storage infrastructure that will easily address long-term retention policies, finds and retrieves content quickly from long-term repositories, and uses object storage efficiently.
Tags : 
wiley, object storage, business value, data, big data, enterprise data
    
NetApp
Published By: Juniper Networks     Published Date: Jun 22, 2017
This study was conducted with independent global research firm Wakefield Research between November 24 through December 14th, 2015. The data was based on an online study of 20 content questions, plus screeners and demographics of 2704 respondents, in 8 markets: US, China, Australia, Japan, India, UK, Germany, and France. All respondents were restricted to the following industries: service provider organizations, healthcare, retail, and financial services. In this case, the definition of service provider includes companies offering web content services, cable, internet service providers, or telecom. Juniper Networks challenges the status quo with products, solutions and services that transform the economics of networking. Our team co-innovates with customers and partners to deliver automated, scalable and secure networks with agility, performance and value. Visit www.juniper.net for more information.
Tags : 
security solutions, ransomware, security technologies, protection technologies, risk assessment, it security, server protection
    
Juniper Networks
Published By: Virgin Pulse     Published Date: Jul 28, 2017
This new guide, Winning Workplace Wellbeing: A Five-step Guide, provides a blueprint for workplace wellbeing success. Featuring actionable tips and expert advice from Dr. BJ Fogg, Dr. Ron Goetzel and other members of the Virgin Pulse Science Advisory Board, this guide will help you boost your wellbeing strategy. Download the Guide to learn: The five key steps to wellbeing success Tips from recognized experts Introduction to the Value on Investment (VOI) model
Tags : 
workplace success, wellbeing, value on investment, human resources
    
Virgin Pulse
Published By: Quocirca     Published Date: Oct 29, 2008
Outsourcing is a strategy increasingly being used by organizations to reduce costs and increase value. Outsourcing, however, has its risks. As organizations look to push out more of their custom software application development needs to outsourcing partners, careful planning is required in terms of building stringent software security requirements into contracts and creating a process and metrics to ensure that those requirements are met. This report examines outsourcing practices from 200 of the largest organizations in the UK and the US and provides pointers as to how the most experienced outsourcers are putting in place effective processes to drive the risk out of outsourcing.
Tags : 
quocirca, outsourcing, security, networking, software development
    
Quocirca
Published By: Esker     Published Date: Jan 08, 2019
Accounts receivable (AR) is simple in theory. Keep the bills going out and the money coming in. But controllers and finance directors know the deal: There’s a lot of “other stuff” that gets in the way. This 17-page white paper highlights how robotic process automation simplifies what really matters to the success of AR departments. Discover how it can unlock added value in your business thanks to: • Improved customer experience & staff satisfaction • Reduced DSO & improved employee productivity • Enhanced tracking & forecasting via customized KPIs
Tags : 
    
Esker
Published By: Oracle     Published Date: Apr 27, 2015
In the white paper, leading CFOs share perspectives on building and developing finance departments. Findings underscore value in the human touch and investment in new technology. The paper distills six rules for drawing talent to—and results from—finance departments in the Digital Age.
Tags : 
finance, management, retention
    
Oracle
Start   Previous    102 103 104 105 106 107 108 109 110 111 112 113 114 115 116    Next    End
Search      

Add A White Paper

Email sales@inetinteractive.com to find out about white paper options for your company.