inform

Results 1 - 25 of 4515Sort Results By: Published Date | Title | Company Name
Published By: TCR Agenda     Published Date: Nov 03, 2016
TransCityRail North once again brings together the leaders responsible for delivering the Northern Powerhouse Rail for a lively and engaging conference and networking dinner which focuses on ‘Supply Chain Engagement’. The event has been developed in partnership with Network Rail and Transport for the North (TfN) to engage with suppliers early on about the significant contracts which will become available for the region. During the daytime conference TfN will outline its rail transport strategy for the North of England, and senior managers from Network Rail will be presenting their strategy for procurement and supply chain engagement. Network Rail’s National Supply Chain are using this conference to explain to suppliers how contracts with the infrastructure owner are going to become more accessible, and what’s expected in a post-Brexit world. For more information on the conference download the agenda here or contact the team 0161 833 6320.
Tags : 
    
TCR Agenda
Published By: TCR Agenda     Published Date: Mar 08, 2017
TransCityRail North explains how you can engage with major contractors and the wider supply chain whilst gaining clear, concise and business-critical information on how organisations can do business with the region’s stakeholders and Network Rail.
Tags : 
    
TCR Agenda
Published By: Veeam APAC     Published Date: Apr 26, 2020
Takeaways from downloading the executive brief:Broaden the conversations with cross-section stakeholders to address business impactLeverage operational metrics and translate technologies/issues into dollarsUnderstand data and downtime loss to determine the best strategy and solution choiceDefine a strategy to ensure data protection and AvailabilityWhy wait until something fails, breaks, is overwritten or corrupted accidentally/on purpose? Help your teams learn to quantify the full business impact of downtime and data loss, so that an informed decision is made for your data protection.
Tags : 
    
Veeam APAC
Published By: F5 Networks Singapore Pte Ltd     Published Date: Mar 04, 2020
In today’s information-flooded business world, access to sufficient data isn’t a problem. But we often struggle with a different challenge—inefficient data. Data and analytics are increasingly important tools that help us decide where to invest and develop. They are a critical means of measuring the success of current strategies, justifying decisions, and building confidence in plans for growth. Engagement with customers is what matters, and that engagement is often measured in clicks. We track where site visitors are coming from, how many pages they visit, whether they click on ads and banners, and how long they ultimately choose to interact with our site or service. Without this information, we’d be making decisions in the dark. The hidden ROI of an advanced WAF solution: - Advanced security solutions can help you manage the explosion of bot traffic, while cutting costs and improving overall business outcomes – finding ROI in the automation age. - Eliminating bot traffic results i
Tags : 
    
F5 Networks Singapore Pte Ltd
Published By: F5 Networks Singapore Pte Ltd     Published Date: May 19, 2020
A global chain of department stores has a robust brand that stands for luxury, legacy, and customer satisfaction. The retailer’s bedrock belief is in innovating to improve customer experience, both in-store and online. They strive to provide a friction-free shopping experience with secure login, hassle-free gift cards, and stored payment information. However, the retailer’s dedication to a friction-free shopping experience opened the doors to predatory automation attackers, resulting in five pain points for the company’s IT and loss departments. Download the case study to find out more.
Tags : 
    
F5 Networks Singapore Pte Ltd
Published By: CheckMarx     Published Date: Mar 09, 2020
Finanzdienstleister unterliegen strengen regulatorischen Vorgaben – und das zu Recht: Die Assets und Informationen, die von ihnen verarbeitet werden, sind wertvoll und sensible und stehen täglich im Visier von Angreifern. Die von Fintech- Unternehmen verarbeiteten personenbezogenen Daten (PII) unterliegen daher strengen Compliance-Bestimmungen wie dem Gramm-Leach-Bliley Act (GLBA), den Payment Card Industry Data Security Standards (PCI DSS) und dem Sarbanes-Oxley Act. Von zentraler Bedeutung ist auch die Datenschutzgrundverordnung (DSGVO), die den Umgang mit personenbezogenen Daten von EU-Bürgern regelt. Finanzdienstleister, die für US-amerikanische Bankkunden tätig sind, müssen darüber hinaus die Einhaltung von Absatz 5 (Unfair or Deceptive Acts or Practices) des Federal Trade Commission Acts und weiterer Verbraucherschutzvorgaben auf US-bundesstaatlicher Ebene im Blick behalten.
Tags : 
    
CheckMarx
Published By: Healthgrades     Published Date: May 12, 2020
Consumers depend on their local health system to keep them updated. With normal hours disrupted and entire service lines procedures suspended, reaching out to patients with the latest updates is now mission critical. While it may be tempting to just post basic information for each provider, converting profile visits into booked appointments requires carefully curating each profile. Download this guide to know what information matters most to healthcare consumers and tap into six best practices for building a high-converting provider profile.
Tags : 
    
Healthgrades
Published By: Cisco     Published Date: May 13, 2020
ZeroTrust is an information security framework which states that organisations should not trust any entity inside or outside of their perimeter at any time. The ZeroTrust - 'never trust, always verify'. Cisco would like to invite you to the Cisco ZeroTrust security webinar. What is ZeroTrust according to the market? Why should you be interested in ZeroTrust? What is Cisco’s approach to Zero Trust? During the Webinar we will answer all your questions and look at the practical steps to implement solutions to reduce risk and provide better security. At the end of the webinar we offer you a maturity assessment on your ZeroTrust journey. The webinar will run over two days, the options are: Option 1: June 3rd-4th Option 2: June 9th-10th Agenda : Day one 9:30 11:00 What is ZeroTrust? How does the market look at ZeroTrust, and what are the different definitions to it. What are the benefits of ZeroTrust? Day two 9:30 11:00 What is Cisco’s approach to ZeroTrust? During this session we will go into more details on Workforce, Workplace and Workload protection and explain how this will strengthen your security posture.
Tags : 
    
Cisco
Published By: Just Media, Inc. - San Francisco     Published Date: Apr 17, 2020
Communication during uncertain times is quite challenging for most organisation. While the crisis must resolve within the foreseeable future, we as businesses should inform and protect employees every day. BlackBerry® AtHoc® team offers seven different customizable templates that your organisation can adapt to global or regional situations during the current pandemic. The messaging templates provide a quick means of communicating critical information to staff and partners in light of the current COVID-19 situation, to maintain safety and business continuity. With AtHoc solution from BlackBerry, you can seamlessly automate tracking of replies speeding up your ability to respond to those who need help and reducing administration. Your business continuity teams can stay apprised of employee status and take necessary steps to prevent the spread of illness and avoid loss of productivity. Download the messaging templates and enable your teams to readjust the business continuity plans to avoid business disruption today.
Tags : 
    
Just Media, Inc. - San Francisco
Published By: Just Media, Inc. - San Francisco     Published Date: Apr 17, 2020
Organizations have a firm handle on traditional workplace emergency use cases and natural disasters. However, in current uncertain times, organizations should learn how to respond to a pandemic, manage personnel safety on-site, coordinate workforce scheduling, and handle industrial accidents. As the use cases for emergency mass notification solutions (EMNS) grow, the functionality of EMNS solutions needs to expand with an evolving crisis at hand. When it comes to a national disaster or uncertain times, your EMN solution should: • Enable mass notification across multiple modes • Allow organizations to account for personnel • Improve situational awareness and seamlessly communicate with stakeholders Read this analyst newsletter to explore business continuity best practices and learn how to keep your operations running and employees safe & informed
Tags : 
    
Just Media, Inc. - San Francisco
Published By: M-Files     Published Date: Apr 16, 2020
Alors que les sociétés comptables répondent aux pressions de leurs clients en matière de nouvelles technologies et de nouveaux modèles de fonctionnement, leur rôle de conseiller n'a sans doute jamais été aussi vital - ou apprécié. Elles sont néanmoins confrontées à des défis urgents. Lisez ce bref eBook et découvrez trois façons dont les cabinets comptables gagnent et conservent leurs clients, améliorent l'expérience client et protègent leur réputation grâce à une meilleure stratégie de gestion de l'information.
Tags : 
    
M-Files
Published By: M-Files     Published Date: Apr 16, 2020
Au cours de la dernière décennie, alors que nos habitudes ont été complètement bouleversées par des technologies plus récentes et plus abordables et que notre façon d'aborder le travail a évolué suite à de grands changements sociétaux, de nombreux cabinets comptables ont vu leurs fondamentaux ébranlés. Dans ce eBook, nous abordons les quatre défis suivants (et mettons en évidence les solutions !): • Comment assurer la sécurité de ses informations clients • Améliorer l'expérience client • Pression sur les prix dans un marché d'acheteurs • S'adapter à une main-d'œuvre en mutation
Tags : 
    
M-Files
Published By: M-Files     Published Date: Apr 16, 2020
Les attentes des clients, qui sont passées d'exigences strictes en matière de sécurité à une expérience client moderne, ont considérablement évolué ces dernières années. Comment votre organisation fait-elle face à une concurrence accrue et aux mutations du secteur ? Dans ce bref eBook, découvrez quatre façons dont la technologie de gestion de l'information peut aider à préparer les cabinets comptables à un avenir plus rapide et plus technologique.
Tags : 
    
M-Files
Published By: M-Files     Published Date: Apr 16, 2020
La gestion du personnel, la planification des successions, la réforme fiscale, la cybersécurité, la manie des fusions, la marchandisation des services de base, la demande d'un plus grand nombre d'experts-comptables et la recherche de la pertinence - tous ces éléments ont été cités comme des préoccupations essentielles des dirigeants de cabinets comptables. Mais quelles sont les préoccupations et les questions qui touchent ce secteur qui arrivent en tête ? Jetez un coup d'œil à cette infographie et voyez si vous pouvez comprendre ces deux défis clés du secteur, ainsi que quelques statistiques incroyables sur la manière dont les cabinets comptables sont affectés par les risques de sécurité, la concurrence féroce et les attentes changeantes des clients.
Tags : 
    
M-Files
Published By: Workday     Published Date: Apr 24, 2020
When it’s time to upgrade your student information system, what works for some institutions may not work for yours. Read this Ovum Market Radar report to learn the key considerations to make when selecting a new SIS, including your specific administrative needs and student expectations. Also featured is an in-depth examination of how cloud-based Workday Student can engage and empower staff and students alike.
Tags : 
    
Workday
Published By: Workday     Published Date: Sep 05, 2020
Machine learning allows Workday customers to supercharge predictive capabilities with data-informed decisions that power better business outcomes. Whether you’re looking to gain a better understanding of the skills of your workforce, analyze strengths and gaps, or connect the right person with the right job, Workday makes it easy. Learn more.
Tags : 
    
Workday
Published By: Coyote Point Systems     Published Date: Sep 02, 2010
At a projected market of over $4B by 2010 (Goldman Sachs), virtualizationhas firmly established itself as one of the most importanttrends in Information Technology. Virtualization is expectedto have a broad influence on the way IT manages infrastructure.Major areas of impact include capital expenditure and ongoingcosts, application deployment, green computing, and storage.
Tags : 
coyote point, adc, buyer's guide, web applications, server load, server hardware, networking, virtualized network
    
Coyote Point Systems
Published By: TIBCO Software     Published Date: May 06, 2020
This infographic describes the growing financial crime problem from several perspectives and sets out reasons why now is the time to move to self-learning analytics and other technologies available on the TIBCO platform for: Monitoring transactions as they occur Easily generating contextual views using accurate, real-time information Expediting the investigation process Evaluating potentially risky transactions Making the right decisions quickly
Tags : 
    
TIBCO Software
Published By: Velaro     Published Date: Jul 09, 2014
Application downtime impacts everyone. This paper provides best practices for communicating application downtime to end-users in a manner that maintains - or can even improve- your organization's credibility and brand image. Learn what to do and what not to do in this informative white paper.
Tags : 
    
Velaro
Published By: Ounce Labs, an IBM Company     Published Date: Dec 15, 2009
Today, when you make decisions about information technology (IT) security priorities, you must often strike a careful balance between business risk, impact, and likelihood of incidents, and the costs of prevention or cleanup. Historically, the most well-understood variable in this equation was the methods that hackers used to disrupt or invade the system.
Tags : 
ounce labs, it securitym it risk, software applications, pci dss, hipaa, glba, data security, source code vulnerabilities
    
Ounce Labs, an IBM Company
Published By: Ounce Labs, an IBM Company     Published Date: Jul 08, 2009
The Business Case for Data Protection, conducted by Ponemon Institute and sponsored by Ounce Labs, is the first study to determine what senior executives think about the value proposition of corporate data protection efforts within their organizations. In times of shrinking budgets, it is important for those individuals charged with managing a data protection program to understand how key decision makers in organizations perceive the importance of safeguarding sensitive and confidential information.
Tags : 
ounce labs, it securitym it risk, software applications, ciso, pci dss, hipaa, glba, data security
    
Ounce Labs, an IBM Company
Published By: Attivio     Published Date: Aug 20, 2010
With the explosion of unstructured content, the data warehouse is under siege. In this paper, Dr. Barry Devlin discusses data and content as two ends of a continuum, and explores the depth of integration required for meaningful business value.
Tags : 
attivio, data warehouse, unified information, data, content, unstructured content, integration, clob
    
Attivio
Published By: Attivio     Published Date: Aug 20, 2010
Current methods for accessing complex, distributed information delay decisions and, even worse, provide incomplete insight. This paper details the impact of Unified Information Access (UIA) in improving the agility of information-driven business processes by bridging information silos to unite content and data in one index to power solutions and applications that offer more complete insight.
Tags : 
attivio, data warehouse, unified information, data, content, unstructured content, integration, clob
    
Attivio
Published By: SAP     Published Date: Feb 05, 2011
Learn how best-in-class companies access information faster to improve key business performance metrics.
Tags : 
business performance, sap, real time analytics, business intelligence, analytics
    
SAP
Published By: ASG Software Solutions     Published Date: Nov 03, 2008
The Information Technology Infrastructure Library (ITIL) provides guidance for the management of IT, and has quickly become the worldwide standard for IT Service Management (ITSM).
Tags : 
asg, sla, cmdb, bsm, metadata, itsm, metacmdb, lob
    
ASG Software Solutions
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.