business strategies

Results 301 - 325 of 337Sort Results By: Published Date | Title | Company Name
Published By: TRIRIGA     Published Date: Apr 15, 2008
Workplace Performance Management: A strategic framework and system to align, measure and deliver greater shareholder value from workplace assets and operations. Corporations need to align workplace operations and assets to business strategies.  Workplace assets and operations must be measured and linked directly to stakeholder expectations to expose the true contributions of real estate to the organization.
Tags : 
workplace, performance, real estate, facility management, wpm, tririga, performance metrics, workplace strategy, tririga
    
TRIRIGA
Published By: Aconex     Published Date: Jun 18, 2008
In the construction industry, as in business generally, risk management involves identifying risks, assessing them and then developing strategies to manage them. Organizations that manage risk well enjoy financial savings, greater productivity and service quality, improved success rates of new projects and better decision making. It is clear that, in today's complex business environment, risk factors are wide reaching, and are intrinsically linked to achieving organizational objectives.
Tags : 
risk management, collaboration, web collaboration, web-based collaboration, aconex
    
Aconex
Published By: Marketo     Published Date: Jul 30, 2013
Marketing Automation is technology that allows you to nurture leads through automated campaigns. Because marketing automation uses email as one of its methods for engaging customers, we are often asked, “What is the difference between Marketing Automation and Email Marketing?” For small businesses, marketing automation is a tool to take your marketing to the next level while saving your organization’s resources in the long run. Marketing automation builds upon your email marketing strategies to produce superior results. In this paper, we’d like to show you what marketing automation can do for you and help you decide if your organization is ready to graduate to a marketing automation solution.
Tags : 
marketing, marketing automation, email marketing, lead nurturing, small business, smb, crm
    
Marketo
Published By: Network Automation     Published Date: Oct 23, 2008
In good economic times, success simply means keeping pace. After all, the market is demanding your company’s products and services, and your responsibility is simple: keep up with the demand no matter what it takes. Most managers, whether they are business managers or technology managers respond to this situation the same way. They hire more people to shoulder the increased load. Sales managers seek out more sales reps. Foremen bring more assembly workers online. Customer service beefs up the call center. And IT managers hire more administrators to maintain the constant flux of demands from users, applications, systems, and networks.
Tags : 
network automation, business, process, automation, processes, tough economy, bad economy, workflow, process improvement, streamline it, strategies, networking, network management, network performance, network performance management
    
Network Automation
Published By: Genesys     Published Date: May 07, 2009
This white paper provides insights on the key attributes of SIP for customer service; how businesses can prosper with adoption of SIP; and flexible deployment strategies for migrating from TDM to VoIP. In addition, this paper will look at the available software, including relatively new arrivals such as unified communications, which can enhance a distributed customer sales and service strategy. Learn more today!
Tags : 
genesys, virtualization, ip migration, voip, sip, session initial protocol, voice over ip, customer service, ip network, data center, unified communications, internet engineering task force’s, ietf’s, data center design and management
    
Genesys
Published By: Webfishery     Published Date: Aug 03, 2010
This white paper explains how businesses can develop effective strategies to improve efficiency and reduce networking and application costs.
Tags : 
application management, white paper, bandwidth management, ethernet networking, gigabit networking, infrastructure, internetworking hardware, local area networking, network architecture, network management, network security, data center design and management
    
Webfishery
Published By: SAS     Published Date: Aug 03, 2016
New analytics tools and services are helping organizations extract exceptional business value from the massive volumes of available data provided by various internal and external sources. Many companies are harnessing these insights to improve operational and business processes, troubleshoot problems, identify business opportunities, and generally compete and innovate better. Now the benefits of analytics in those areas are prompting companies to look to analytics to improve information security. Enterprise security organizations are under tremendous pressure to change. Traditional perimeter-focused security controls and strategies have proved inadequate against modern, highly targeted attack campaigns.
Tags : 
best practices, technology, security, enterprise, analytics
    
SAS
Published By: East Coast Catalyst     Published Date: Jan 26, 2011
A white paper to assist senior managers in planning their corporate or business unit digital strategies.
Tags : 
digital marketing strategy, web marketing strategy
    
East Coast Catalyst
Published By: Globoforce     Published Date: Aug 02, 2012
How do you pitch recognition to senior management? Download the guide now and use it to show executives what strategic recognition can do for your company's bottom line. Employee recognition works. But how do you pitch it to your senior managers? Speak their language by talking about the cold, hard numbers. Show them the link between recognition and quantifiable business records. This guide shows five ways strategic recognition impacts the bottom line - supported by industry studies and statistics.
Tags : 
globoforce, technology, business, strategic recognition, recognition, employee recognition, industry strategies, statistics, case study
    
Globoforce
Published By: Blue Coat Systems     Published Date: Oct 25, 2011
IT and business leaders must ensure they have the right security strategies to protect against the rapid evolution of social networking threats
Tags : 
blue coat, insider threats, security, social media risks, twitter risks, facebook risks, linkedin risks, secure web gateway, application performance monitoring, access control, anti spyware, anti virus, application security, authentication, disaster recovery, email security, encryption, firewalls, hacker detection, high availability
    
Blue Coat Systems
Published By: Adobe     Published Date: Aug 22, 2013
With more than 1 billion smartphones in consumers' pockets at the beginning of 2013, mobile is driving a second Internet revolution that's even more profound than the first one. Mobile creates new value for consumers and businesses, alters cost structures, and disrupts ecosystems. That's why marketers must move away from tactical mobile efforts to more transformative mobile marketing strategies in 2013. This fourth annual mobile trends report revisits our 2013 mobile trends, elaborates on how they will continue to evolve in 2013, and highlights new mobile trends that we expect to see this year. New to this year's report is a list of the over-hyped topics that we believe will fail to provide real business value in the short term.
Tags : 
mobile marketing, mobile trends, mobility
    
Adobe
Published By: Adobe     Published Date: Aug 22, 2013
Business leaders need to be intimately involved in developing "big data" strategies for their companies. In this White Paper, we investigate several business-related strategy components that are crucial to success.
Tags : 
big data, big data strategy
    
Adobe
Published By: Workday     Published Date: Jul 30, 2019
This whitepaper from Human Resource Executive® explains why businesses need to adopt robust diversity and inclusion (D&I) strategies or risk being left behind. Read now to learn how D&I initiatives enable you to strengthen your culture while boosting your bottom line.
Tags : 
    
Workday
Published By: uberVU via HootSuite     Published Date: Oct 10, 2012
Find out how to use our Facebook Timeline best practices to help your organization build an effective social media strategy, strengthen relationships with your brand's community and see your ROI on your Facebook campaign.
Tags : 
social media management, social media strategy, social media strategies, social strategy, social business, social enterprise, enterprise social networks, facebook strategies, facebook strategy, facebook best practices
    
uberVU via HootSuite
Published By: Semcasting     Published Date: Jan 02, 2013
In this white paper from Semcasting, you will learn more about the limitations of cookie-based behavioral targeting and how a new solution called IP Zones can dramatically increase both the scale and accuracy of online display campaigns.
Tags : 
digital marketing, ip address targeting, ip geo targeting, internet marketing business, ip zones, retail marketing, online retail marketing, retail trade area, retail marketing services, win rfps, new online strategies, new online marketing
    
Semcasting
Published By: Semcasting     Published Date: Aug 29, 2013
This white paper will guide you through a series of third party studies that have been completed recently on the diminishing reach and effectiveness of audience targeting with cookies. The numbers are challenging and it appears it may be time for an alternative to the cookie.
Tags : 
digital targeting, ip targeting, online business marketing, online targeting, online ad targeting, internet marketing, digital target, online marketing strategies, ip address targeting, ip geo targeting ip zones, online retail marketing, retail marketing, online privacy, third-party cookies, retargeting, retail marketing services
    
Semcasting
Published By: Juniper Networks     Published Date: Sep 10, 2014
Understand the changing threat landscape and how to secure your business against Distributed Denial of Service attacks with our Whitepaper. Read about the latest detection and mitigation strategies to ensure always-on protection.
Tags : 
security, ddos attacks, detection, prevention, mitigation strategy, always on-protection
    
Juniper Networks
Published By: IBM     Published Date: Oct 24, 2013
While a business case is all about the numbers, knowing how and when to push the proposal through the approval process requires an understanding of the psychology behind how proposals are selected and funded. Learn the tools and strategies to develop a business case and gain approval within your company.
Tags : 
business case, best practices, success tactics, leadership, persuasion, decision making, selling
    
IBM
Published By: NetApp     Published Date: Dec 08, 2014
This paper examines that there are all sorts of elements—differing applications, attitudes, budgets, outcomes for the business—that go into the decision of how much and what type of solid-state storage to use. And how this large range of use cases inherently means that users are going to need a portfolio of solid-state deployment options because no single product is going to solve everything for everyone. The paper then examines NetApp’s flash portfolio and belief that the right storage solution at all times balances performance, capacity, functionality and manageability: this means that for flash too, multiple approaches will become the standard for enterprises as they evolve their long-term IT strategies.
Tags : 
flash storage, flash solutions, it-strategies, netapp, business objectives, solid-state storage, it strategies
    
NetApp
Published By: Oracle     Published Date: Nov 01, 2013
Advances in human capital management technology mean that with the right talent management system in place, HR leaders can implement world-class strategies at their companies. Oracle Talent Cloud was developed using a holistic approach, so HR leaders can manage everything from recruiting, compensation and goal and performance management to employee learning and talent review, in a single, cohesive SaaS-based system.
Tags : 
zenithoptimedia, oracle, talent management, talent cloud, human capital management, accelerating businesses, global technology, operational complexities increase, hcm solutions, manage growth globally, range of deployment, best talent management, talent management strategies, increase engagement, speed productivity, social and mobile capabilities, achieve operational efficiencies, hr data, lower operating costs
    
Oracle
Published By: Polycom     Published Date: Jul 24, 2014
Download this survey to learn what 5,000 business professionals around the world say are their biggest collaboration challenges—and discover the strategies they deploy to overcome them. In late 2013, Polycom invited customers and partners around the world to participate in a survey that focused on collaboration challenges. More than 5,000 business professionals from all job levels, functions and vertical sectors responded, candidly sharing insights about their obstacles and the strategies they deploy to overcome them. The survey reveals that 85% of the respondents believe video conferencing helps them achieve their business goals. See how they successfully use video in their profession and how you can leverage technology to defy distance and improve remote collaboration within your organization as well.
Tags : 
polycom, collaboration video conferencing, defy distance, networking
    
Polycom
Published By: CA Technologies     Published Date: Jun 04, 2015
"To support digital transformation imperatives, organizations are increasingly exploring DevOps style approaches for the continuous delivery of high quality software. Unfortunately, however, many enterprises remain burdened with accumulated technical debt and legacy wasteful practices – waste that can quickly inhibit the flow of value to customers and the business. Lean thinking provides organizations with a framework by which to quickly identify all forms of waste impacting the flow of value, which DevOps practitioners can apply in a software development context to quickly pinpoint and eliminate 8 elements of waste across people, process and technology dimensions. This paper presents the 8 elements of waste framework, strategies needed to identify and eliminate waste, and the metrics needed to measure effectiveness.
Tags : 
    
CA Technologies
Published By: CA Technologies     Published Date: Jun 04, 2015
To support digital transformation imperatives, organizations are increasingly exploring DevOps style approaches for the continuous delivery of high quality software. Unfortunately, however, many enterprises remain burdened with accumulated technical debt and legacy wasteful practices – waste that can quickly inhibit the flow of value to customers and the business. Lean thinking provides organizations with a framework by which to quickly identify all forms of waste impacting the flow of value, which DevOps practitioners can apply in a software development context to quickly pinpoint and eliminate 8 elements of waste across people, process and technology dimensions. This paper presents the 8 elements of waste framework, strategies needed to identify and eliminate waste, and the metrics needed to measure effectiveness.
Tags : 
    
CA Technologies
Published By: Akamai Technologies     Published Date: Nov 13, 2018
The ongoing adoption of cloud computing by communications service providers (CSPs) continues to fundamentally reshape their business models and technology strategies on several levels. One such area that is garnering significant attention is the impact of the cloud on security services. This is because security services and the vital tools they encompass can be empowered through the adoption of a carrier cloud model. This, in turn, better positions CSPs to meet the demands of their customers, including those in the small to medium-size business (SMB) market segment. The timing of this migration is optimal, since many SMBs now recognize the threats they face and realize that given their limited IT budgets and lack of security expertise, CSPs are well positioned to protect them from cyberattacks. While the opportunity for CSPs is significant, many are hesitant to make a move in this area because they want to ensure they can address SMBs’ needs and maintain control of the service in a car
Tags : 
    
Akamai Technologies
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.