mba

Results 126 - 150 of 322Sort Results By: Published Date | Title | Company Name
Published By: Limeade     Published Date: Mar 14, 2016
Stress is one of the top issues that affect our well-being. When money gets tight or relationships get frazzled, it can lead to unhealthy and unproductive behaviors. This tip cheat has five ways to combat the most common stresses we face.
Tags : 
employee stress, unhealthy employees, employee multitasking, employee resources, human resources
    
Limeade
Published By: eFax     Published Date: Jul 05, 2012
As IT managers urgently seek to reduce the fixed costs associated with running their in-house fax servers, cloud-based faxing emerges as a highly effective tool for combating the unpredictability of fluctuating infrastructure costs.
Tags : 
fax server, outsource, outsourced applications, cloud, cloud-based, affordable faxing, it costs, it budget, it expenses, it infrastructure, digital faxing, hosted faxing, saas, scalable fax, scalable fax solutions, streamline, workflow, foip, improve productivity, secure
    
eFax
Published By: Intacct Corporation     Published Date: Jan 02, 2014
Is your accounting software holding you back? Maybe it's time to trade in your aging infrastructure and embrace a new generation of cloud-based financial systems that streamline your processes, improve productivity, and generate greater insights and visibility. As you embark on a challenging evaluation cycle, download our free and concise eBook: "Best Practices for Choosing the Right Accounting Software: Achieving Best-in-Class Financial Management."
Tags : 
accounting, accounting software, cloud-based financial systems, financial management, accounting software, automation, lower costs, technical and operational requirements
    
Intacct Corporation
Published By: GrowthIntel     Published Date: Feb 16, 2016
Business development and marketing programs have a tendency to underwhelm when it comes to actual results. As a result, we’re bombarded with SalesTech and MarTech apps endeavouring to plug the leaks. But these tools rarely tackle the core issues behind your lacklustre results. What’s needed is a fundamental change to your go-to-market approach. This ebook shows you what that change could look like, and describes how to make it happen.
Tags : 
marketing, business development, b2b, sales, business practices
    
GrowthIntel
Published By: BlackLine     Published Date: Feb 26, 2018
If you’re in the middle of a finance transformation initiative, then you’re not alone. Leaders at enterprise and mid-size finance and accounting organizations alike are reviewing their current processes, technology, and talent, to build their blueprints for change. With the rise of broader digital transformation projects, finance organizations are first looking to upgrade their own operating models. The truth is that finance transformation is a journey, not a destination. Many finance organizations have already embarked on it, driving down costs, whether through enhancing shared services centers, or applying more centralization, standardization, and automation. Yet for many, the greater opportunities lie ahead: providing better insight to the broader organization, shedding low-value workloads that hold the team back, and revamping ingrained legacy accounting tasks that create risk. Wherever you are today, there are real opportunities to move the dial away from the status quo.
Tags : 
finance, accounting, technology, digital transformation
    
BlackLine
Published By: AWS     Published Date: Nov 15, 2018
Today’s IT teams spend far too much time struggling against increasing system complexity and tools failing to make monitoring easier and more reliable. To combat these challenges, both admins and site reliability engineers need a clear view of infrastructure performance and availability. Splunk® Insights for Infrastructure (SII) is an analytics-driven monitoring solution that provides the seamless experience organizations need for infrastructure monitoring on the AWS cloud. Download this product brief and discover how SII offers: • An easy install within minutes—available as a free download • Detailed investigations through granular metrics • Seamless monitoring and troubleshooting
Tags : 
    
AWS
Published By: CA Technologies EMEA     Published Date: May 24, 2018
El auge de la interfaz de programación de aplicaciones (API por sus siglas en inglés) representa una oportunidad de negocio y supone un reto técnico. Para los líderes empresariales, las API representan una oportunidad para abrir nuevos flujos de ingresos y maximizar el valor ofrecido al cliente. Sin embargo, los arquitectos empresariales son los encargados de crear las API que posibilitan la reutilización de sistemas back-end en las nuevas aplicaciones web y móviles. Resulta esencial que todos los implicados comprendan que los objetivos de negocio y los retos técnicos de un programa de API están estrechamente relacionados. Los gestores de los programas deben responsabilizarse de comunicar con claridad los objetivos de negocio clave de una API propuesta a los arquitectos que deberán construir la interfaz.
Tags : 
    
CA Technologies EMEA
Published By: Adobe     Published Date: Nov 10, 2017
Rapidly changing customer expectations require speedy digital transformation. The newest strategy in digital engagement is to combat competitive threats in a continually changing tech landscape. Companies need to invest in a solid digital marketing foundation and shift gears quickly to meet changing customer expectations. Get the report, Digital Marketing in the High-Tech Industry.
Tags : 
    
Adobe
Published By: Tenable     Published Date: Nov 06, 2018
When it comes to IT infrastructure, it’s fair to say the perimeter has left the premises. Whether it’s discovering short-lived assets (e.g., containers), assessing cloud environments or maintaining web application security, today’s attack surface presents a growing challenge to CISOs looking to understand and reduce their cyber risk. To combat this issue, a discipline called Cyber Exposure is emerging to help organizations manage and measure this risk. This ebook provides insights on how CISOs are addressing the modern attack surface.
Tags : 
cyber exposure, iot, vulnerability management, cloud security, mobile security, container security
    
Tenable
Published By: Sprinklr     Published Date: Apr 02, 2018
Jon Lombardo, Creative Lead, LinkedIn, reveals in this presentation how B2B businesses can improve their content strategy in 2017. In particular, he points out why the “Newspaper Model” is difficult to scale and harder to monetize while a B2B “Blockbuster” approach can monetize a brand’s expertise.
Tags : 
b2b marketing, b2b marketing strategy, marketing strategy, marketing trends, brand recognition, omni-channel, employee advocacy, people first, relevant reach
    
Sprinklr
Published By: AWS - ROI DNA     Published Date: Nov 19, 2018
Today’s IT teams spend far too much time struggling against increasing system complexity and tools failing to make monitoring easier and more reliable. To combat these challenges, both admins and site reliability engineers need a clear view of infrastructure performance and availability. Splunk® Insights for Infrastructure (SII) is an analytics-driven monitoring solution that provides the seamless experience organizations need for infrastructure monitoring on the AWS cloud. Download this product brief and discover how SII offers: • An easy install within minutes—available as a free download • Detailed investigations through granular metrics • Seamless monitoring and troubleshooting
Tags : 
    
AWS - ROI DNA
Published By: CA Technologies EMEA     Published Date: Apr 10, 2018
En la actualidad, el software se encuentra en el núcleo de la metodología de las empresas para competir y funcionar de forma eficaz en el siglo XXI. Durante mucho tiempo, la tecnología ha desempeñado un papel decisivo en la estrategia empresarial. Sin embargo, la transformación digital ha ampliado las iniciativas de transformación y aceleración del ciclo de entrega de software, así como los procesos de desarrollo de aplicaciones, a un imperativo que se extiende por toda la empresa y se interseca cada vez más con la otra preocupación que acucia a los directivos: la ciberseguridad.
Tags : 
    
CA Technologies EMEA
Published By: CA Technologies EMEA     Published Date: Apr 10, 2018
El auge de la interfaz de programación de aplicaciones (API por sus siglas en inglés) representa una oportunidad de negocio y supone un reto técnico. Para los líderes empresariales, las API representan una oportunidad para abrir nuevos flujos de ingresos y maximizar el valor ofrecido al cliente. Sin embargo, los arquitectos empresariales son los encargados de crear las API que posibilitan la reutilización de sistemas back-end en las nuevas aplicaciones web y móviles. Resulta esencial que todos los implicados comprendan que los objetivos de negocio y los retos técnicos de un programa de API están estrechamente relacionados. Los gestores de los programas deben responsabilizarse de comunicar con claridad los objetivos de negocio clave de una API propuesta a los arquitectos que deberán construir la interfaz.
Tags : 
    
CA Technologies EMEA
Published By: HP     Published Date: Jul 29, 2008
This white paper looks at HP's approach to Data Center Transformation and how it can help enterprise data centers reduce costs, manage risks, and support business growth. Learn about the 4 key factors which should influence your data center transformation strategy. See first hand how HP embarked on a three-year transformation program for its own data centers. This ambitious program involved rationalizing 85 data centers into just six global ones- with tangible and measurable benefits.
Tags : 
network management, data center, datacenter, mission critical
    
HP
Published By: HP Data Center     Published Date: Feb 18, 2009
Today's data centers are embarking down a path in which "old world" business, technology, and facility metrics are being pushed aside in order to provide unparalleled service delivery capabilities, processes, and methodologies. The expectations derived from today’s high-density technology deployments are driving service delivery models to extremes with very high service delivery capabilities adopted as baseline requirements within today’s stringent business models. Part of the "revolution" that is driving today's data center modeling to unprecedented high performance and efficiency levels is the fact that computer processing advances with regard to high-performance and smaller footprints have truly countered each other.
Tags : 
hp data center, data center enfironment, high density computing, rack-mount servers, mep mechanical, electrical, and plumbing, virtualization, consolidation, it deployments, server consolidation
    
HP Data Center
Published By: BMC Control M     Published Date: Jul 22, 2009
A short time ago, Dell, like many other companies, embarked on a broad initiative to integrate and upgrade its IT services to better satisfy business needs. As part of this initiative, Dell addressed a job scheduling solution that had failed to keep pace with ITIL_ integration. In enterprises around the world, stale job scheduling software lingers for fear of the costs and risks of conversion. Learn more today!
Tags : 
bmc, ema, dell, dell smart, automation, integration, services, itil, business, software, itsm, roi, bmc control-m
    
BMC Control M
Published By: Virgin Pulse     Published Date: Aug 02, 2010
Human resource leaders and executives are under pressure to combat rising health care costs. But you are not alone. Learn from your peers and discover how to translate this data-rich survey into actionable tactics for your company's health care savings and long-term growth.
Tags : 
virginhealth miles, healthcare, employee health, costs, wellness, ppaca, legislation, participation
    
Virgin Pulse
Published By: Citrix Systems     Published Date: Nov 10, 2014
For the first time in several years, there has been a sharp increase in denial of service (DOS) attacks. In the past, these attacks have been directed at the networks of large companies. Now we are seeing the emergence of attacks targeting smaller companies and higher layers in the computing stack. Intruders are using low-bandwidth attacks disguised as legitimate transactions to bypass firewalls and basic intrusion prevention measures. Organizations need a better way to combat and prevent these attacks, and the right ADC can provide the solution. Learn how Citrix NetScaler can help protect against DOS attacks in the report, Citrix NetScaler: A Powerful Defense Against DOS Attacks (link).
Tags : 
dos, denial of service, netscaler, defense, network, low-bandwith, attacks, transactions, targeting, companies, prevention measures, firewall, intruder
    
Citrix Systems
Published By: McAfee     Published Date: Jan 23, 2013
A criminal industry develops. This paper explores bot evolution, it’s global prevalence, who’s at risk, a look forward and combating bots using Global Threat Intelligence.
Tags : 
botnets, bots, defense in depth, threat prevention, advanced attacks, malware
    
McAfee
Published By: McAfee     Published Date: Feb 06, 2013
Change control processes are often reactive and require manual responses, an ineffective approach to combating today’s threats and handling the growing number of devices in the IT infrastructure.
Tags : 
    
McAfee
Published By: McAfee     Published Date: Feb 06, 2013
There is no single anti-malware product that can block all malware infiltration and subsequent activity. The only way to combat the malware threats is through an end-to-end, integrated, real-time, context-aware, holistically-managed system.
Tags : 
threat protection, security threat landscape, malicious sites, phases of network attack, social engineering, configuration error, persistant code, rootkits, website filtering, device control, buffer overflow, physical file transfer, desktop firewall, web filtering, email filtering, web gateway, email gateway, application control, application whitelisting, host ips
    
McAfee
Published By: LogRhythm     Published Date: Aug 08, 2016
IT environments have become much more vulnerable as enterprise mobility, cloud services and “bring-your-own-everything” have broken down the defensible perimeter and added layers of complexity to securing the enterprise. At the same time, the nature of cyber threats has changed dramatically. Threat actors are well organized and well funded, and many of them are known to be supported by nation states. They have sophisticated technical skills which allow these actors to create custom malware for very specific targets, and they are relentless in pursuit of their objectives. Moreover, almost anyone with a malicious intent can purchase malware and rent botnets on the Dark Web, lowering the bar for criminal entities, nation states, and terrorists to use cyber as a weapon of choice towards their intended purpose.
Tags : 
security, technology, best practices, information technology, cyber threats, mobility
    
LogRhythm
Published By: LogRhythm     Published Date: Jun 19, 2018
As in years past, 2017 was packed with stories of cyber security failure. Between sophisticated attackers, lack of proper security monitoring and controls implementation, and devastating data breaches that may have arisen from these scenarios, it’s easy to see that we still face serious challenges in the security arena, with potentially serious consequences. Why are we continually seeing these issues? Many security professionals readily admit that we don’t have the staff, training and breadth of coverage in our security controls to adequately combat the attackers today. How is this happening when we’re spending so much money and time on cyber security?
Tags : 
logrhythm, sans, cloudai, ueba
    
LogRhythm
Published By: Symantec     Published Date: Jun 13, 2018
El Reglamento General de Protección de Datos (GDPR) entra en vigor el 25 de mayo de 2018. Si necesita procesar datos personales de la Unión Europea (UE), posiblemente el GDPR aplica para usted, a pesar de no estar en la Unión Europea. Esto se debe a que el reglamento realmente es global en su alcance y se aplica a cualquier organización que procesa datos personales de la UE, más allá de la ubicación de las compañías o del procesamiento de los datos. En su esencia, la legislación del GDPR está centrada en garantizar que se respete la privacidad como un derecho fundamental y que los datos personales sean guardados privada y seguramente. Elizabeth Denham, del Gabinete del Comisario de Información de la UE (ICO - Information Commissioner Office), dice: “Esta ley no es sobre multas. Se trata de poner en primer lugar al consumidor y al ciudadano” y “La emisión de multas siempre fue y seguirá siendo, el último recurso”. Sin embargo, es importante observar que los costos por incumplir el regla
Tags : 
    
Symantec
Published By: Infosys     Published Date: May 21, 2018
Our client was something of a niche retail brand - with an enormous heritage and reputation, yet in order to exploit the opportunities in an increasingly online world, they needed to embark on a digitization journey. The digitization program was extensive and touched many parts of the company operations. Already drawn up was a high-level list of 20 different areas that would put the brand firmly on it digital transformation journey. At the top of the list was perhaps the most business-critical project of all - updating the e-commerce platform - and that is where we began.
Tags : 
e-commerce, business, corporation, client, digitization
    
Infosys
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13    Next    End
Search Offers      
Get your company's offers in the hands of targeted business professionals.