mba

Results 176 - 200 of 337Sort Results By: Published Date | Title | Company Name
Published By: Oracle Service Cloud     Published Date: Mar 23, 2016
As the undisputed leader in home robots, iRobot has pioneered a completely new market, making it even more important for the company to establish what its customers want quickly, and to deliver outstanding customer-service experiences. To maximize adoption of its new technology, including its best-selling Roomba® vacuuming robots product line, iRobot wanted to optimize its use of multiple communications channels, to listen to its customers’ needs and identify revenue opportunities, while providing exceptional levels of service consistently across Web, social, and traditional channels.
Tags : 
oracle, service cloud, irobot, customer service, customer interaction
    
Oracle Service Cloud
Published By: EADA Business School     Published Date: Apr 10, 2016
In this summary, we set forth a brief introduction to the NeuroTrainingLab methodology and the impact observed on the MILCO and MARD programmes, comparing it to the Executive MBA, measured with the NeuroTrainingLab.
Tags : 
neurotraininglab, higher education, emba, mard, leadership training, talent management, eada
    
EADA Business School
Published By: Samuel Curtis Johnson Graduate School of Management     Published Date: Dec 19, 2017
In today’s society, it can be easy to overlook the benefits of earning an MBA. But research shows the benefits of going back to school far outweigh the costs for many individuals.
Tags : 
cornell university, johnson cornell, mba, masters degree, business degree, continuing education, business learning, benefits, finance
    
Samuel Curtis Johnson Graduate School of Management
Published By: Prof. Allan Eberhart, Director of the Georgetown University MSF Program     Published Date: Jan 14, 2018
If you have a passion for business and finance and want to invest in your future career success, many prospective students weigh whether to earn an MBA with a finance concentration from another top university or pursue the Georgetown MSF. At first glance, they may seem like equal substitutions, however there are differences.
Tags : 
georgetown university, mcdonough school of business, master of science in finance, msf, mba, masters in business administration
    
Prof. Allan Eberhart, Director of the Georgetown University MSF Program
Published By: Tenable     Published Date: Apr 30, 2018
When it comes to IT infrastructure, it’s fair to say the perimeter has left the premises. Whether it’s discovering short-lived assets (e.g., containers), assessing cloud environments or maintaining web application security, today’s attack surface presents a growing challenge to CISOs looking to understand and reduce their cyber risk. To combat this issue, a discipline called Cyber Exposure is emerging to help organizations manage and measure this risk. This ebook provides insights on how CISOs are addressing the modern attack surface.
Tags : 
cyber exposure, iot, vulnerability management, cloud security, mobile security, container security
    
Tenable
Published By: Cherwell Software     Published Date: Sep 14, 2016
In this Playbook, we will explore a variety of organizations that have embarked on new ways of using IT Service Management technology to support and accelerate growth. Leaders from top worldwide organizations share how they have extended Cherwell Service Management to manage processes, build inviting customer experiences and accelerate success quickly and efficiently.
Tags : 
    
Cherwell Software
Published By: Stratus Technologies     Published Date: Mar 10, 2009
Terry Bass, V Series and OpenVOS Product Manager, discusses the arsenal of industry standard and open source applications available today on OpenVOS that make UNIX and Linux programmers immediately productive on the world’s most reliable operating system. VOS is now OPEN.
Tags : 
stratus, openvos, open source applications, unix, linux, gnu tools, debugging tools, industry standard, ipsec, ntp, openssh, radius, samba
    
Stratus Technologies
Published By: IDology     Published Date: Feb 11, 2008
There is a new automated technology available now that is helping businesses combat identity theft and prevent fraud. It is called identity proofing and it is specifically designed to verify consumer identities online. With all the fraud prevention solutions available in the market today you are probably wondering, does my company really need to use an identity proofing solution?
Tags : 
identity management, iam, access management, iam, risk management, identity theft, hackers, fraud, identity, idology
    
IDology
Published By: LANDesk     Published Date: Jun 07, 2010
Windows 7 adoption is one of IT's top priorities for 2010. A solid adoption strategy requires 12 to 18 months for thorough planning and testing before actual Windows 7 deployment can begin. But nearly two-thirds of companies don't yet have a Windows 7 adoption plan in place. In this White Paper LANDesk have identified seven pitfalls that IT organizations must avoid as they embark on Windows 7 adoption.
Tags : 
avocent, landesk, windows 7, microsoft, windows, vista, support, sp2, sp3, support
    
LANDesk
Published By: ESET     Published Date: Jan 21, 2010
Bots and botnets suck, so what better teaching aid to help people understand them than a vacuum cleaner? It can be extremely challenging to attempt to explain technical concepts to non-technical people. There are two goals for this presentation. Click on this white paper to read about it.
Tags : 
eset, internet security, bots, botnets, national cybersecurity alliance, roomba, remote access tool, denial of service attack, safe computing
    
ESET
Published By: Microsoft Dynamics CRM     Published Date: Mar 30, 2010
As global employment prospects lag behind a slow economic recovery, customers in many parts of the world are more cautious and better informed than ever. They have access to a wealth of information about the products and services they seek, much of it obtained from trusted sources almost immediately. Yet businesses have moved slowly to exploit emerging technologies and information sources like Twitter, Facebook and YouTube. As a result, customers often seem better informed about the products and services they buy than companies are about their customers. This imbalance presents a big challenge to companies struggling to avoid commoditisation and it could grow into a competitive disadvantage as customers demand more personalized service.
Tags : 
microsoft dynamic crm, productivity enhancement, customer service productivity
    
Microsoft Dynamics CRM
Published By: IBM Software     Published Date: Feb 03, 2012
This paper from IBM describes how to build a proactive threat and risk strategy based on predictive analytics; examples of how organizations used predictive analytics to minimize the negative impact of risk and maximize positive results; and steps to advance your organization's use of predictive analytics to combat threat and risk.
Tags : 
predictive threat, security, technology, risk management, security policy, ibm, intrustion protection
    
IBM Software
Published By: SAS     Published Date: Apr 25, 2017
Physicians and their patients, medical policy makers and licensing boards, pharmaceutical companies and pharmacies all must work together to stem the opioid epidemic and achieve the fundamental objectives of reducing addiction and deaths. With so many players and data sources, today’s information is partial, fragmented, and often not actionable. We don’t have the data to understand what’s happening, to adjust policy, and to motivate physicians and patients to change their behaviors. Better data and analytics can help develop better treatment protocols, both for pain in the first place and for remediation when patients are becoming dependent on the drugs.
Tags : 
    
SAS
Published By: Lumension     Published Date: Jan 18, 2013
In this webcast learn why Randy Franklin Smith from Ultimate Windows Security stands up for group policy as the "right" way to configure the bulk of workstation security settings.
Tags : 
compliance, security, policy, group policy
    
Lumension
Published By: IBM     Published Date: Aug 07, 2012
Leading companies applying? Predictive intelligence? To proactively mitigate and manage complexity-fraught risks, while bringing value to their bottom line and their brand.
Tags : 
combating, combat, risk, predictive, intelligence, companies, applying, proactively, mitigate, manage, complexity, value, personal finance, investing, small business, finance
    
IBM
Published By: VASCO     Published Date: Jul 12, 2012
In recognizing the evolution of the authentication market and the demand for more convenient, portable, and cost-effective methods of adding security to all online applications, VASCO has embarked on a mission to add authentication on any platform, at any time, for any application. Read more to find out how to transform multi-factor authentication from "something you have" to "something you already have."
Tags : 
vasco, cloud computing, technology, saas applications, authentication, security
    
VASCO
Published By: SafeNet     Published Date: Jun 04, 2013
To learn more about the current state of the data breach epidemic and how to implement a strategy to prevent it, read SafeNet's Secure Breach Manifesto.
Tags : 
data breach, data security, it security
    
SafeNet
Published By: VMTurbo     Published Date: Oct 25, 2013
Your business is complex. And although Big data promises to manage this complexity, the technology services that run your business are also complex. It is possible to combat this complexity with IT analytics. Read this report to learn how IT analytics that turns big data efforts inward can effectively manage the technology services that run your business.
Tags : 
forrester, vmturbo, big data, analytics, it analytics, it infrastructure, operations, technology services, it management
    
VMTurbo
Published By: NAVEX Global     Published Date: Nov 18, 2013
This checklist will enable you to target the features and functionality you really need before embarking on the path to securing your third party relationships.
Tags : 
compliance, benchmark, compliance programs, case management, hotline data benchmarking, ethics and compliance
    
NAVEX Global
Published By: AWS     Published Date: Jun 20, 2018
The notion of digitizing your business has become a matter of “when,” rather than “if.” For many, migrating critical workloads to the cloud is a key part of this transformation. When deciding on a cloud provider, however, IT executives are under pressure to find a solution that enables reduced costs, greater agility, and above all, the ability to innovate core business processes. At the heart of many businesses embarking on this journey is their SAP environment. But since SAP workloads represent some of the most critical and deeply integrated business applications, IT executives are required to look for ways to execute this migration in the most timely and reliable manner. Organizations migrating to the cloud cannot risk application downtime or productivity loss
Tags : 
    
AWS
Published By: Cyphort     Published Date: Jun 28, 2016
Thanks to its convenience, online shopping has become a major trend over the last few years and lets face it, it’s here to stay. With the rise of online shopping, marketing experts capitalized on this new avenue to advertise their products. Now your friends nudge you on Facebook to buy a product they love and Google suggests a friendly place across the street where you can get your car fixed. It’s become hard to browse even a few pages without running into an ad and because of this increases, malware experts also saw a new avenue of attack - Malvertising.
Tags : 
downloads, best practices, network management, solutions, technology, advertising
    
Cyphort
Published By: Canon Solutions America     Published Date: Oct 17, 2017
Transforming government processes starts with laying the right foundation for your organization’s workflow. Many government agencies have embarked on transformation initiatives; however, there is still room for improvement to build a more stable transformation foundation.
Tags : 
pii security, pii breach, pii compliance checklist, how to protect pii, pii information security, pii data compliance, pii data protection, pii data breach, pii encryption, pii encryption best practices, public sector printing, secure public sector printing, security breach in public sector
    
Canon Solutions America
Published By: Kellogg School of Management     Published Date: Jan 08, 2018
Kellogg Executive Education offers custom and open-enrollment courses to improve leadership, strategic and tactical skills and develop cross-functional understanding of their organizations.
Tags : 
kellogg school of business, mba, master of business administration, business degree, continuing education, business leaders, finance
    
Kellogg School of Management
Published By: Coverity, Inc.     Published Date: Nov 01, 2010
This report is the result of the largest public-private sector research project focused on open source software integrity, originally initiated between Coverity and the U.S. Department of Homeland Security in 2006. The results from the 2010 edition of the Coverity Scan Open Source Integrity Report detail the findings of analyzing more than 61 million lines of open source code from 291 popular and widely-used open source projects such as Android, Linux, Apache, Samba and PHP, among others.
Tags : 
coverity, static analysis, dynamic analysis, software analysis, software defects, software bugs, product safety, software safety, software integrity, mission, critical software, software bug detection, software efficiency, software security, c/c++ defects, detecting c code bugs, detecting software defects, detecting c software bugs, java defects, developer productivity
    
Coverity, Inc.
Published By: Sponsored by HP and Intel®     Published Date: May 13, 2013
It is becoming increasingly difficult for IT professionals to manage the substantial amount of information their enterprises are generating today. This white paper discusses how to combat this challenge with a converged infrastructure. Discover a system that can help you leverage this strategy and review the benefits it offers.
Tags : 
    
Sponsored by HP and Intel®
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14    Next    End
Search Offers      
Get your company's offers in the hands of targeted business professionals.