business strategies

Results 126 - 150 of 349Sort Results By: Published Date | Title | Company Name
Published By: MeQuilibrium     Published Date: Aug 01, 2019
No matter how you slice it, the most important thing businesses can do in turbulent times is increase their ability to adapt to change. Experts call this agility. What many experts leave out, however, is that agility alone is not enough. Employees need resilience too. Our research shows six personas hidden in almost every workforce — based on an employee’s levels of agility and resilience — and how to help each one manage stress amid change. In this e-book, you’ll discover that one persona in particular has a higher risk of burnout than all the others and for one reason: These employees are high in agility but low in resilience. In this e-book, we’ll take a look at these personas to help you see who’s who in your organization and: • Better understand your workforce • See how many of your people are affected by change • Provide strategies for those who are stressed and burned out Help your people with what’s affecting their work and personal lives by analyzing these six workplac
Tags : 
    
MeQuilibrium
Published By: Adobe     Published Date: Jul 15, 2019
With an ever-growing array of customer interactions, especially digital, businesses are rapidly looking to gain competitive advantage by using data and insights at scale to create and activate 360-degree profiles of their customers to deliver a better experience. In a rush to accelerate digital growth and improve their business strategies, many global enterprises have built soiled, redundant technology environments, resulting in inaccurate, or worse, conflicting views of their customer's brand interactions. For example, Forrester's research reveals that 90% of enterprises use multiple analytics tools.
Tags : 
    
Adobe
Published By: VMware AirWatch     Published Date: Nov 12, 2015
VMware continues to raise the bar in business mobility. It offers the most streamlined process for deployment and management of business mobility solutions through its EUC products, and has given IT administrators the perfect set of options to efficiently manage the challenges of business mobility. The company continues to grow by bringing complete solutions that go beyond simply providing basic client or desktop monitoring services. Frost & Sullivan believes that VMware is in an ideal position to help its customers execute on their next-generation business mobility strategies; based on this analysis Frost & Sullivan recognizes VMware with the 2015 Visionary Innovation Leadership Award.
Tags : 
vmware, business mobility, euc products, end user computing
    
VMware AirWatch
Published By: Epicor     Published Date: Sep 06, 2009
The technology world around us is changing rapidly. Keeping up has become tougher for managers and supervisors. Today's economy has focused limited information technology resources on immediate results, not research or long term strategy.
Tags : 
soa, epicor, business intelligence, it success, key strategies, erp, enterprise resource planning, availability, sso, mobile data, single sign on
    
Epicor
Published By: Adobe     Published Date: Mar 03, 2017
Today, staying competitive requires mobile maturity—a maturity that transforms businesses from simply creating products to delivering amazing digital experiences. And mobile is at the center. We’ve analyzed the latest trends from mobile decision makers in the 2017 Adobe Mobile Maturity Study and share the findings in our report, Touching the Infinite. Read the report to: o Get the latest pulse of mobile marketing and relevant benchmarks for your mobile marketing investment o See how the latest trends and best practices help you acquire and engage your mobile customers o Learn how to transform your strategies around the latest mobile trends and tactics Today, staying competitive requires mobile maturity—a maturity that transforms businesses from simply creating products to delivering amazing digital experiences. And mobile is at the center. We’ve analyzed the latest trends from mobile decision makers in the 2017 Adobe Mobile Maturity Study and share the findings in our report, Touching the Infinite. Read the report to: o Get the latest pulse of mobile marketing and relevant benchmarks for your mobile marketing investment o See how the latest trends and best practices help you acquire and engage your mobile customers o Learn how to transform your strategies around the latest mobile trends and tactics
Tags : 
mobile maturity, digital experience, mobile marketing investment, mobile strategy
    
Adobe
Published By: CA Technologies     Published Date: Jun 03, 2015
"To support digital transformation imperatives, organizations are increasingly exploring DevOps style approaches for the continuous delivery of high quality software. Unfortunately, however, many enterprises remain burdened with accumulated technical debt and legacy wasteful practices – waste that can quickly inhibit the flow of value to customers and the business. Lean thinking provides organizations with a framework by which to quickly identify all forms of waste impacting the flow of value, which DevOps practitioners can apply in a software development context to quickly pinpoint and eliminate 8 elements of waste across people, process and technology dimensions. This paper presents the 8 elements of waste framework, strategies needed to identify and eliminate waste, and the metrics needed to measure effectiveness.
Tags : 
    
CA Technologies
Published By: Great Bay Software     Published Date: Jul 16, 2018
"Healthcare organizations have significantly more to consider than the average business when it comes to network and device security. Concern over code modification, key compromise, password-based vulnerabilities and man-in-the-middle attacks have caused hospital CIOs and CISOs to rethink their security strategies and investments. The threat to these devices has even been assigned its own term: medjacking, a shortened form of “medical device hijacking.” Download this white paper for five best practices to mitigate threat and attacks that can put lives, patient trust and the growth of the healthcare organization at risk. Access the white paper today!"
Tags : 
    
Great Bay Software
Published By: Great Bay Software     Published Date: Jan 09, 2019
"Healthcare organizations have significantly more to consider than the average business when it comes to network and device security. Concern over code modification, key compromise, password-based vulnerabilities and man-in-the-middle attacks have caused hospital CIOs and CISOs to rethink their security strategies and investments. The threat to these devices has even been assigned its own term: medjacking, a shortened form of “medical device hijacking.” Download this white paper for five best practices to mitigate threat and attacks that can put lives, patient trust and the growth of the healthcare organization at risk. Access the white paper today!"
Tags : 
    
Great Bay Software
Published By: U.S. Cellular     Published Date: Jun 13, 2016
Take your operations to the next level. Learn how fleet management solutions can help your business save time and money with features such as: • Real-time, location monitoring • Automated alerts for proactive vehicle maintenance • Route optimization See examples from different industries, ideas for overcoming common implementation challenges and strategies for adopting your own fleet management program. Download now.
Tags : 
us cellular, business solutions, fleet management, best practices, fleet management programs, location monitoring, route optimization, vehicle maintenance
    
U.S. Cellular
Published By: FICO     Published Date: Jun 06, 2017
Want to solve rapid application development platform for building solutions across the entire lifecycle of manufacturing and supply chain business challenges? Optimizing supply chain strategies helps businesses readily account for massive amounts of data as well the myriad constraints and conflicting objectives within your business. This easy-to-modify solution incorporates strong and proven optimization engines, flexible workflow and usability at every level to drive consistent, transparent and profitable decisions, which ultimately drive the best action(s) for your business.
Tags : 
manufacturing, manufacturing optimization, manufacturing solutions
    
FICO
Published By: CA Technologies EMEA     Published Date: May 23, 2018
Today, digital is everywhere—cloud, mobile, social and the Internet of Things are changing the way we all work and play. This rapidly evolving digital world is also redefining the relationship between your business and your customers, who now expect a convenient, interactive experience from their preferred brands. Security is also a concern. Risk is rising, as both the enterprise and its customers exchange a growing amount of sensitive data. This transformation is also amplifying competition. As analyst Mark Raskino notes, “As a consequence, all players rebuilt their strategies around the same time, and all have awakened to the power of digital business at the same time. Contention is therefore inevitable.” To find out more download this whitepaper today!
Tags : 
    
CA Technologies EMEA
Published By: Google Cloud     Published Date: Aug 17, 2017
"A recent survey conducted by MIT Technology Review Custom and Google Cloud reveals that while the majority of businesses are struggling to apply machine learning, others are hard at work developing strategies for the technology — and are already realizing genuine ROI."
Tags : 
    
Google Cloud
Published By: Adobe     Published Date: Feb 13, 2018
Chart your course with the latest trends. Today, staying competitive requires mobile maturity—a maturity that transforms businesses from simply creating products to delivering amazing digital experiences. And mobile is at the center. We’ve analyzed the latest trends from mobile decision makers in the 2017 Adobe Mobile Maturity Study and share the findings in our report, Touching the Infinite. Read the report to: Get the latest pulse of mobile marketing and relevant benchmarks for your mobile marketing investment See how the latest trends and best practices help you acquire and engage your mobile customers Learn how to transform your strategies around the latest mobile trends and tactics Simply fill out the form to download the report.
Tags : 
    
Adobe
Published By: Incapsula     Published Date: Nov 06, 2017
Distributed denial of service (DDoS) attacks have become a fact of life for any business with a web presence. Whether you’re an enterprise, e-commerce business, local organization, or government offce—it’s merely a matter of time before you’re going to have to deal with the inevitable DDoS attack. The question is what can you do before an attack so you can have adequate defenses already in place. This handbook is a practical guide for planning and executing a DDoS response plan. It outlines pragmatic steps and best practices for choosing and setting up the right mitigation solution for your organization, how to authoritatively respond to an attack, and conduct a thorough post-attack analysis for developing follow-up defense strategies.
Tags : 
    
Incapsula
Published By: Red Hat     Published Date: Jan 07, 2019
Agile integration — combining integration technologies, Agile delivery techniques, and cloud-native platforms to improve speed and security of software delivery — is a critical foundation for successful digital transformation. The pace of digital innovation and disruption continues to accelerate, driving the need for faster change to business models, processes, and applications. Firms that can quickly reconfigure and reconnect old and new applications have the advantage, and those with slow integration processes are at serious risk of losing customers. An Agile combination of integration and custom development is needed to meet the customer’s expectations and avoid losing market share to competitors that do put the customer first.1 For this study, we assessed the differences between successful and less successful Agile integration and app delivery strategies, why some firms can change their business faster, and what makes one integration strategy better than another.
Tags : 
    
Red Hat
Published By: Red Hat     Published Date: Jun 19, 2019
Agile integration — combining integration technologies, Agile delivery techniques, and cloud-native platforms to improve speed and security of software delivery — is a critical foundation for successful digital transformation. The pace of digital innovation and disruption continues to accelerate, driving the need for faster change to business models, processes, and applications. Firms that can quickly reconfigure and reconnect old and new applications have the advantage, and those with slow integration processes are at serious risk of losing customers. An Agile combination of integration and custom development is needed to meet the customer’s expectations and avoid losing market share to competitors that do put the customer first.1 For this study, we assessed the differences between successful and less successful Agile integration and app delivery strategies, why some firms can change their business faster, and what makes one integration strategy better than another. In March 2018, Re
Tags : 
    
Red Hat
Published By: Veeam '18     Published Date: May 01, 2019
This 5-minute, easy-to-read document explains why organizations need to protect Office 365 data. This report will teach you: • The big misunderstanding between Microsoft's responsibility and the IT organizations • 6 reasons why backing up Office 365 is critical • Who is in control of Office 365 data
Tags : 
    
Veeam '18
Published By: ttec     Published Date: Sep 06, 2019
Companies that achieve hypergrowth don’t get there by accident. It’s the result of being laser-focused on bringing an innovative idea to life and expanding the business exponentially. It’s about changing the game. But regardless of industry or company size, every business faces a similar challenge: maintaining customer growth and transforming those early customer relationships into true loyalty. Here, we’ll discuss strategies for accelerating the customer experience and finding more ways to deepen the relationship.
Tags : 
    
ttec
Published By: Riverbed     Published Date: Apr 24, 2015
To better serve business demands for information everywhere, enterprises must develop new strategies for optimizing multiple kinds of networks. Read this white paper to learn more about accelerating delivery of data, increasing employee productivity, and creating optimal user experiences by powering the hybrid enterprise.
Tags : 
data delivery, employee productivity, user experience, hybrid enterprise, networking
    
Riverbed
Published By: Concur     Published Date: Nov 27, 2012
Aberdeen research has found that over 9% of the average UK-based company's overall budget is tied to travel and entertainment (T&E) expenses, a factor which is actively forcing UK businesses to re-evaluate their current travel and expense management processes and implement the necessary strategies and solutions to drive ultimate value. Download the report to learn more.
Tags : 
travel management, expense management, business, finance, medium busines, small business, aberdeen research
    
Concur
Published By: Cisco     Published Date: Apr 08, 2014
In order to help businesses assess their collaboration strategies, Cisco recently commissioned a worldwide study to explore the business value of in-person communication in distributed organizations with respect to their interactions with partners and customers.
Tags : 
cisco, collaboration strategies, in-person, network management
    
Cisco
Published By: Entrust Datacard     Published Date: Jan 16, 2015
Small- or medium-sized businesses run on hard work, dedication and loyal customers. But size shouldn’t exclude SMBs from using the proper security technology to protect online customer identities. That’s why Entrust offers nine simple tips to improve security for SMBs and end-customers alike. From basic techniques like updating software to more advanced authentication strategies, this guide ensure your business is establishing the proper security foundation in today’s hyper-connected world.
Tags : 
entrust, security, certificate, b2b, application, browser, applications, saas, hack, web, website, migration, implementation, ssl, spam, passwords, malware, virus, systems, smb
    
Entrust Datacard
Published By: CREDANT Technologies     Published Date: Feb 10, 2011
This two-part whitepaper will address some of the best practice approaches that you may wish to evaluate and potentially adopt in order to reduce the risk of USB devices becoming the source of a significant leak or virus infection.
Tags : 
credant technologies, removable media, best practices, security, usb device, corporate governance, virus infection, anti spam, anti spyware, anti virus, security management
    
CREDANT Technologies
Published By: IBM US Smarter Buildings     Published Date: Jan 10, 2012
While a business case is all about the numbers, knowing how and when to push the proposal through the approval process requires an understanding of the psychology behind how proposals are selected and funded. Learn the tools and strategies to develop a business case and gain approval.
Tags : 
ibm, smarter buildings, iwm, business, approval process, softwar
    
IBM US Smarter Buildings
Published By: IBM - Tririga     Published Date: Dec 21, 2011
While a business case is all about the numbers, knowing how and when to push the proposal through the approval process requires an understanding of the psychology behind how proposals are selected and funded. Learn the tools and strategies to develop a business case and gain approval.
Tags : 
ibm, software, business, iwms, workplace management, finance
    
IBM - Tririga
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.