mba

Results 151 - 175 of 324Sort Results By: Published Date | Title | Company Name
Published By: Infosys     Published Date: May 21, 2018
Our client was something of a niche retail brand - with an enormous heritage and reputation, yet in order to exploit the opportunities in an increasingly online world, they needed to embark on a digitization journey. The digitization program was extensive and touched many parts of the company operations. Already drawn up was a high-level list of 20 different areas that would put the brand firmly on it digital transformation journey. At the top of the list was perhaps the most business-critical project of all - updating the e-commerce platform - and that is where we began.
Tags : 
e-commerce, business, corporation, client, digitization
    
Infosys
Published By: SafeNet     Published Date: Sep 08, 2010
Find out about the most effective defense against MitB attacks.
Tags : 
safenet financial services, secure browser authentication, man-in-the threats, mitb, man-in-the-middle, mitm, security
    
SafeNet
Published By: SafeNet     Published Date: Sep 08, 2010
Combat Man-in-the-Browser (MiTB) Attacks with an Integrated Solution that Combines Strong Certificate-Based Authentication from SafeNet with an On-board Portable Browser.
Tags : 
safenet financial services, online banking, security, identity protection, etoken ng-flash, password, man-in-the-browser attacks, mitb
    
SafeNet
Published By: Cisco     Published Date: Jun 16, 2016
Attackers are commandeering legitimate infrastructure and reaping millions in profit. Defenders are struggling to detect and combat threats, and confidence is falling.
Tags : 
security, application security, access control, security policies
    
Cisco
Published By: McAfee EMEA     Published Date: Nov 15, 2017
Atrius Health Chief Information Security Officer Chris Diguette oversees security for Atrius Health, the largest physician-led healthcare provider in the northeastern US. The organization is recognized nationally for its use of health information technology. Diguette is also CIO of the VNA Care Network, a home healthcare provider and subsidiary of Atrius Health. As CISO, Diguette and his team work to implement and maintain a security infrastructure that safeguards the organization’s critical health information systems and applications, such as its Epic Systems Electronic Medical Records (EMR) system and the personal data of more than 675,000 patients at 29 facilities in eastern and central Massachusetts.
Tags : 
artius, health, chief, information, security, officer, organization
    
McAfee EMEA
Published By: MuleSoft     Published Date: Nov 27, 2018
Today, government IT teams are expected to deliver more services with fewer resources. Consequently, many agencies have prioritized legacy modernization, interoperability and shared service models as a means towards increasing IT delivery capacity. But those approaches are easier talked about than executed. As agencies embark on legacy modernization, it becomes imperative to open up the existing technology so that new innovations can be delivered as needed in a secure way. In this guide, produced in partnership with Govloop, we will discuss A five-play roadmap to help those in government get a better sense of where to start on modernization projects. An overview of the Information Technology Modernization Fund (ITMF). Featured government success stories highlighting their modernization projects. The IT Modernization Lifecycle, based on the recent report by the American Council for Technology-Industry Advisory Council.
Tags : 
    
MuleSoft
Published By: Smarp     Published Date: Feb 22, 2019
By definition employee advocacy is the promotion of a company’s messages by its employees. Today, employee advocacy happens increasingly online, social media being the main medium for brand ambassadors. Employees have extensive networks of friends, followers, and connections on social media, and nowadays they can be reached and influenced with a click of a button. When empowered to act as brand ambassadors on social media, employees can share valuable content to their networks and build their professional brand all while increasing the company’s reach and credibility by generating meaningful conversations about the business.
Tags : 
    
Smarp
Published By: HP     Published Date: Jul 25, 2008
This paper discusses how HP's PolyServe Software for Microsoft SQL Server combats SQL Server sprawl and compares HP PolyServe to alternative approaches. Download the complete document here.
Tags : 
sql, sql server, migration, infrastructure, server migration, polyserve
    
HP
Published By: Panda Security     Published Date: Jan 16, 2008
A new white paper from Panda Security discusses the new breed of silent online threats that can bypass traditional antivirus programs and penetrate even the most highly 'protected' networks.  Additionally, the sheer volume of malware has overwhelmed the antivirus industry as a whole. Collective Intelligence is a new global security model specifically designed to combat the next evolution of malicious code.
Tags : 
malware, virus, anti-virus, spyware, anti-spyware, anti-malware, bot, botnet, trojan, dos, denial of service, hacker, phish, phishing, panda, panda security
    
Panda Security
Published By: Tidal Software     Published Date: Sep 03, 2008
Staples’ information systems play a critical role in delivering on their brand promise 'that was easy.' As part of a recent strategic imperative, Staples recently embarked on a major modernization of its systems architecture and supporting processes. The goal was to ensure IT’s systems could scale with the company’s continued global expansion without sacrificing the quality of the brand experience. One critical target for modernization was Staples’ enterprise job scheduling processes and systems. After researching the top software providers in this space, Staples selected Tidal Software to support its efforts to centralize and streamline automated batch processing.
Tags : 
job scheduling roi, tidal scheduler, enterprise scheduling roi, systems management tools, batch processing, systems architecture, tidal, tidal software
    
Tidal Software
Published By: Webroot UK     Published Date: Jan 30, 2014
In 2014, hackers and cyber thieves will continue to change their tactics, using new exploits to infect systems and steal data. This Executive Brief discusses the top five malware trends to keep an eye out for in 2014 and how Webroot SecureAnywhere can provide the endpoint protection that companies will need to be safe in 2014.
Tags : 
webroot, security, esecurity, cyber threat, malware, malware trends, breaches, safeguard, data protection, ddos attacks, web gateway security, online threats, virus, spyware protection, anti-phishing protection
    
Webroot UK
Published By: Kronos Incorporated     Published Date: Jan 23, 2013
Join Mollie Lombardi, Vice President of Aberdeen Group's Human Capital Management practice as she shares the latest research findings on how workforce management solutions can help the SMB improve productivity and business results.
Tags : 
it trends, big data, workforce management, cloud, cloud computing, hrms, small business, hris, smb, time & attendance, timekeeping, scheduling, automation, best-in-class, timekeepers, human resources
    
Kronos Incorporated
Published By: MuleSoft     Published Date: Oct 13, 2015
It’s in a retail business’ best interest to develop an omnichannel strategy; customers who engage in multiple channels spend up to 30% more than single channel customers and tend to be powerful advocates for the business. Building these strategies is a process that businesses embark upon, and that process can be made easier through MuleSoft's approach to enterprise integration, API-led connectivity. In this whitepaper, we’ll discuss the omnichannel journey and how integrating and exposing valuable data can put retailers in a competitive position to win over the tech savvy customer.
Tags : 
retail business, omnichannel retailing, multiple channels, connectivity, integration, single channel customers
    
MuleSoft
Published By: Oracle Service Cloud     Published Date: Mar 23, 2016
As the undisputed leader in home robots, iRobot has pioneered a completely new market, making it even more important for the company to establish what its customers want quickly, and to deliver outstanding customer-service experiences. To maximize adoption of its new technology, including its best-selling Roomba® vacuuming robots product line, iRobot wanted to optimize its use of multiple communications channels, to listen to its customers’ needs and identify revenue opportunities, while providing exceptional levels of service consistently across Web, social, and traditional channels.
Tags : 
oracle, service cloud, irobot, customer service, customer interaction
    
Oracle Service Cloud
Published By: EADA Business School     Published Date: Apr 10, 2016
In this summary, we set forth a brief introduction to the NeuroTrainingLab methodology and the impact observed on the MILCO and MARD programmes, comparing it to the Executive MBA, measured with the NeuroTrainingLab.
Tags : 
neurotraininglab, higher education, emba, mard, leadership training, talent management, eada
    
EADA Business School
Published By: Samuel Curtis Johnson Graduate School of Management     Published Date: Dec 19, 2017
In today’s society, it can be easy to overlook the benefits of earning an MBA. But research shows the benefits of going back to school far outweigh the costs for many individuals.
Tags : 
cornell university, johnson cornell, mba, masters degree, business degree, continuing education, business learning, benefits, finance
    
Samuel Curtis Johnson Graduate School of Management
Published By: Prof. Allan Eberhart, Director of the Georgetown University MSF Program     Published Date: Jan 14, 2018
If you have a passion for business and finance and want to invest in your future career success, many prospective students weigh whether to earn an MBA with a finance concentration from another top university or pursue the Georgetown MSF. At first glance, they may seem like equal substitutions, however there are differences.
Tags : 
georgetown university, mcdonough school of business, master of science in finance, msf, mba, masters in business administration
    
Prof. Allan Eberhart, Director of the Georgetown University MSF Program
Published By: Tenable     Published Date: Apr 30, 2018
When it comes to IT infrastructure, it’s fair to say the perimeter has left the premises. Whether it’s discovering short-lived assets (e.g., containers), assessing cloud environments or maintaining web application security, today’s attack surface presents a growing challenge to CISOs looking to understand and reduce their cyber risk. To combat this issue, a discipline called Cyber Exposure is emerging to help organizations manage and measure this risk. This ebook provides insights on how CISOs are addressing the modern attack surface.
Tags : 
cyber exposure, iot, vulnerability management, cloud security, mobile security, container security
    
Tenable
Published By: Cherwell Software     Published Date: Sep 14, 2016
In this Playbook, we will explore a variety of organizations that have embarked on new ways of using IT Service Management technology to support and accelerate growth. Leaders from top worldwide organizations share how they have extended Cherwell Service Management to manage processes, build inviting customer experiences and accelerate success quickly and efficiently.
Tags : 
    
Cherwell Software
Published By: Stratus Technologies     Published Date: Mar 10, 2009
Terry Bass, V Series and OpenVOS Product Manager, discusses the arsenal of industry standard and open source applications available today on OpenVOS that make UNIX and Linux programmers immediately productive on the world’s most reliable operating system. VOS is now OPEN.
Tags : 
stratus, openvos, open source applications, unix, linux, gnu tools, debugging tools, industry standard, ipsec, ntp, openssh, radius, samba
    
Stratus Technologies
Published By: IDology     Published Date: Feb 11, 2008
There is a new automated technology available now that is helping businesses combat identity theft and prevent fraud. It is called identity proofing and it is specifically designed to verify consumer identities online. With all the fraud prevention solutions available in the market today you are probably wondering, does my company really need to use an identity proofing solution?
Tags : 
identity management, iam, access management, iam, risk management, identity theft, hackers, fraud, identity, idology
    
IDology
Published By: LANDesk     Published Date: Jun 07, 2010
Windows 7 adoption is one of IT's top priorities for 2010. A solid adoption strategy requires 12 to 18 months for thorough planning and testing before actual Windows 7 deployment can begin. But nearly two-thirds of companies don't yet have a Windows 7 adoption plan in place. In this White Paper LANDesk have identified seven pitfalls that IT organizations must avoid as they embark on Windows 7 adoption.
Tags : 
avocent, landesk, windows 7, microsoft, windows, vista, support, sp2, sp3, support
    
LANDesk
Published By: ESET     Published Date: Jan 21, 2010
Bots and botnets suck, so what better teaching aid to help people understand them than a vacuum cleaner? It can be extremely challenging to attempt to explain technical concepts to non-technical people. There are two goals for this presentation. Click on this white paper to read about it.
Tags : 
eset, internet security, bots, botnets, national cybersecurity alliance, roomba, remote access tool, denial of service attack, safe computing
    
ESET
Published By: Microsoft Dynamics CRM     Published Date: Mar 30, 2010
As global employment prospects lag behind a slow economic recovery, customers in many parts of the world are more cautious and better informed than ever. They have access to a wealth of information about the products and services they seek, much of it obtained from trusted sources almost immediately. Yet businesses have moved slowly to exploit emerging technologies and information sources like Twitter, Facebook and YouTube. As a result, customers often seem better informed about the products and services they buy than companies are about their customers. This imbalance presents a big challenge to companies struggling to avoid commoditisation and it could grow into a competitive disadvantage as customers demand more personalized service.
Tags : 
microsoft dynamic crm, productivity enhancement, customer service productivity
    
Microsoft Dynamics CRM
Published By: IBM Software     Published Date: Feb 03, 2012
This paper from IBM describes how to build a proactive threat and risk strategy based on predictive analytics; examples of how organizations used predictive analytics to minimize the negative impact of risk and maximize positive results; and steps to advance your organization's use of predictive analytics to combat threat and risk.
Tags : 
predictive threat, security, technology, risk management, security policy, ibm, intrustion protection
    
IBM Software
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13    Next    End
Search Offers      
Get your company's offers in the hands of targeted business professionals.