meeting

Results 126 - 150 of 720Sort Results By: Published Date | Title | Company Name
Published By: VMware     Published Date: Apr 09, 2019
It’s no secret financial services organizations own and operate legacy solutions. Some of these core processes are front and center, meeting customer needs; others are in the middle, supporting account handling operations; and still many more are in the back-office, handling data and managing analytics. The challenge for financial leaders is to ensure these traditional systems don’t prevent the delivery of great digital experiences now and into the future.
Tags : 
    
VMware
Published By: HERE Technologies     Published Date: Sep 26, 2019
A utomobile manufacturers find meeting the requirements of a just - in - time supply chain one of their biggest challenges , but with advances in location technology manufacturers can meet even the strictest shipping deadlines . With better visibility across the supply chain auto manufacturers can drive down costs, improve efficiency and support proactive decision making. By reading this eBook, you’ll discover how to p repar e your supply chain for the future wit h the application of location intelligence to: ? Gain location - based insights to help optimize processes and inform decision making ? Set accurate ETAs with reliable real - time information ? Use real - time visibility to proactively solve problems ( like bottlenecks ) as they occur ? Gain comprehensive coverage of assets and trace them across factories, warehouses, showrooms and in transit
Tags : 
    
HERE Technologies
Published By: HERE Technologies     Published Date: Jan 09, 2020
Automobile manufacturers find meeting the requirements of a just-in-time supply chain one of their biggest challenges, but with advances in location technology manufacturers can meet even the strictest shipping deadlines. With better visibility across the supply chain auto manufacturers can drive down costs, improve efficiency and support proactive decision making. By reading this eBook, you’ll discover how to prepare your supply chain for the future with the application of location intelligence to: • Gain location-based insights to help optimize processes and inform decision making • Set accurate ETAs with reliable real-time information • Use real-time visibility to proactively solve problems (like bottlenecks)as they occur • Gain comprehensive coverage of assets and trace them across factories, warehouses, showrooms and in transit
Tags : 
    
HERE Technologies
Published By: Dassault Systèmes     Published Date: Sep 22, 2017
The view ahead for the aerospace and defense industry shows us growth and change. Air traffic has been following a pattern of steady increase that calls for larger aircraft fleets. At the same time, OEMs and suppliers are under mounting pressure to simplify processes, reduce costs and move products to market more quickly – while remaining in compliance with changing environmental regulations. Download this white paper to find out how the unique capabilities of DELMIA make it possible to manage change along the value stream, from engineering design to shop-floor work instructions.
Tags : 
aerospace, aviation, manufacturing, product development, plm, product lifecycle management, automation, data
    
Dassault Systèmes
Published By: Oracle     Published Date: Sep 06, 2016
With order channels multiplying, supply, chains growing more complex, and customer expectations increasing, fulfilling orders consistently and efficiently - while meeting customer demands - is harder than ever.
Tags : 
oracle scm cloud, supply chain, security
    
Oracle
Published By: IBM     Published Date: Jan 27, 2016
This paper describes how predictive analytics can play a critical role in your threat and risk strategy.
Tags : 
ibm, threat, risk, management, security, analytics, fraud, enterprise applications, business technology
    
IBM
Published By: IBM     Published Date: Jul 26, 2017
Fear of data misuse has led to both general and industry-specific data-privacy regulations worldwide that many organizations now must meet, and it’s important to embrace their requirements. The role of data-holding organizations has increasingly shifted to being stewards of information, in particular in the United States and the European Union (EU). And failure to comply with regulations can mean not only reputational damage, but substantial fines and even jail time. Just meeting compliance mandates, though, may not help you actively spot and stop a data breach.
Tags : 
data misuse, security, privacy regulations, data breach, compliance mandates
    
IBM
Published By: Concur     Published Date: May 07, 2012
Complete the form to download our Insight into Compliance white paper and learn how you can establish a fit-for-purpose process that supports your business in meeting its internal and external regulatory obligations. Read to find out how Concur can save you time and money with our integrated travel and expense management solution.
Tags : 
concur, finance, business, travel and expense management, budget
    
Concur
Published By: Concur     Published Date: May 07, 2012
Complete the form to download our Insight into Compliance white paper and learn how you can establish a fit-for-purpose process that supports your business in meeting its internal and external regulatory obligations.
Tags : 
concur, finance, business, travel and expense management, budget
    
Concur
Published By: NetApp     Published Date: Feb 22, 2010
Meeting growing storage needs and improving data resilience, without adding complexity to the IT environment.
Tags : 
netapp, law enforcement, storage, data resilience, business continuity, application performance, data management
    
NetApp
Published By: Workday     Published Date: Mar 02, 2018
The new revenue recognition standard is going to shake things up in your business beyond just accounting. This new eBook from CFO, an Argyle company and sponsored by Workday—an early adopter—offers insight into preparing and planning for the new standard, along with strategies for meeting the new demands.
Tags : 
revenue, accounting, cfo
    
Workday
Published By: Salesforce.com     Published Date: Sep 20, 2013
In 2013 Salesforce.com partnered with Fifth Quadrant to conduct quantitative and qualitative research into the customer service space in Australia and New Zealand. The research was designed to specifically examine new channels for service delivery such as Mobile Devices, Social Media to name a few and the maturity level of Australian organisations in regards to Customer Experience Strategy.
Tags : 
salesforce, crm, crm solutions, research, best practices, ces, technology, knowledge management, data management, business technology
    
Salesforce.com
Published By: Salesforce.com     Published Date: Oct 28, 2013
The way salespeople qualify prospects has changed. According to sales experts, rather than chase prospects away with an endless string of qualifying questions, you need to learn about them, while they learn about you and your company. Read How To: Informally Qualify Prospects Research before a Meeting Interact with Buyers Spot Bad Leads Download this ebook, loaded with practical advice from noted sales leaders, so you can qualify the right prospects and rock your sales goals.
Tags : 
customer experience strategy, crm, best practices, australia, salesforce, research, business performance, business technology
    
Salesforce.com
Published By: Polycom     Published Date: Oct 17, 2016
With its CX5100 and CX5500 products, Polycom (the sponsor of this study) has taken an innovative approach to resolving this situation. The CX5100 and CX5500 are 360 degree camera systems that sit in the middle of the conference room table, providing remote Skype for Business/Lync users with a better “connection” to the meeting room. And unlike traditional video conferencing systems, the “camera in the middle of the table” approach is flexible enough to support both standard / formal meetings and teaming sessions.
Tags : 
    
Polycom
Published By: Kaseya     Published Date: May 13, 2015
This white paper describes the key characteristics of the changing environment and it identifies a new choice that IT managers have for meeting the growing set of management challenges.
Tags : 
kaseya, hybrid, cloud, management, msp, mobile, big data
    
Kaseya
Published By: Zoom     Published Date: Mar 29, 2016
Web conferencing can be used in many meeting scenarios, from internal collaboration to presentations, training and large events. IT leaders must examine the use cases that will drive their requirements for a portfolio of online meeting technologies.
Tags : 
zoom, gartner report, web conferencing, office collaboration, video conferencing, learning management systems, collaboration tools, webinars, networking, it management, wireless, business technology
    
Zoom
Published By: Zoom     Published Date: Mar 29, 2016
Trend Micro resolved the following issues by purchasing Zoom: • Overly complex or difficult communications platforms • Expensive hardware or software systems • Unreliable or poor service quality • Using too many different solutions • Difficulties connecting remote teams or sites • The need for a more efficient/effective way to reach customers and other external parties Read more to learn about the benefits of using Zoom and which features are used more frequently by Trend Micro.
Tags : 
zoom, trend micro, screen sharing, mobile meetings, group messaging, video webinar, networking, it management, wireless, business technology
    
Zoom
Published By: Citrix ShareFile     Published Date: Jul 11, 2017
Do you know why data encryption is important for your accountancy firm? Read this eBook to learn how using advanced encryption allows you to: Protect your data and reputation while meeting clients’ cybersecurity expectations Eliminate paperwork and other bothersome or time-consuming processes associated with data storage and sharing Comply with regulations and ethics codes
Tags : 
accounting, risk reduction, encryption, compliance, data security
    
Citrix ShareFile
Published By: Citrix ShareFile     Published Date: Jul 11, 2017
Do you know why data encryption is important for your firm? Read this eBook to learn how using advanced encryption allows you to: Avoid costly security missteps, leaks, and hacks. Protect your firm's reputation while meeting clients' cyber security expectations. Eliminate paperwork and other time-consuming processes associated with data storage and sharing.
Tags : 
finance, data encryption, cyber security, data efficiency, client expectations
    
Citrix ShareFile
Published By: Citrix ShareFile     Published Date: Jul 11, 2017
54% of UK office workers spend some of their time working away from the office, but how do you make sure they’re able to interact with clients and each other? You can’t afford to miss a beat. Download this e-Book for 5 tips to collaborate with your clients from anywhere, including how to: Use the cloud without compromising security Make client meetings feel more personal Customize your mobile alerts to ensure they’re helpful
Tags : 
remote work, client interaction, collaboration, cloud security, personalization
    
Citrix ShareFile
Published By: Citrix ShareFile     Published Date: Jul 11, 2017
Do you know why data encryption is important for your firm? Read this eBook to learn how using advanced encryption allows you to: Avoid costly security missteps, leaks, and hacks. Protect your firm's reputation while meeting clients' cyber security expectations. Eliminate paperwork and other time-consuming processes associated with data storage and sharing.
Tags : 
data security, encryption, efficiency, compliance
    
Citrix ShareFile
Published By: Lookout     Published Date: Dec 07, 2017
How to think about the risk to data from the mobile ecosystem Mobile devices, even those that are corporate owned, are personal. Your CEO uses the same smartphone to send confidential emails, snap family photos, inspect customer records, get directions to meetings, and scrutinize financial reports. Every employee in your organization does the same thing. Your organization's critical data is constantly being accessed by mobile devices, and once it leaves the network you have no visibility into where it goes, and little or no ability to enforce your security policy to protect it. Your organization’s sensitive data has made the mobile ecosystem the new frontier for a wide spectrum of risk that every CISO must now understand. Take a deep dive into all twelve elements of the Mobile Risk Matrix in the interactive table below.
Tags : 
    
Lookout
Published By: Stratasys EMEA     Published Date: Feb 21, 2019
Ask anyone in business, higher education or the medical community what their top objectives are and they’ll probably say it’s to achieve more, to solve more problems, faster than what’s possible now, while saving money in the process. Ask what’s holding them back and you’ll probably find a diverse variety of obstacles in their day-to-day work processes that hinder them in meeting those goals. Having the right tools to do the job is one crucial element in solving problems and becoming more efficient and productive. Additive manufacturing, widely known as 3D printing, is one of those tools that has helped businesses, educators, health care providers and researchers improve how they design, manufacture and perform research. While no tool is an all-in-one solution, 3D printing is a strong step in that direction, particularly in its most sophisticated forms. 3D printing makes it possible to manufacture things that aren’t feasible with traditional processes like machining or injection moldi
Tags : 
    
Stratasys EMEA
Published By: Juniper Networks     Published Date: Oct 02, 2018
Without specific and explicit design decisions about not only the network architecture but also network operations,enterprises risk drifting toward a future of many clouds, each with their own operational nuances. Those who are not mindful about managing new additions increase the complexity of their network with each variation. This white paper discusses how to approach the design of the network and operations in the move from cloud to multicloud. The focus is on meeting the business needs of today and tomorrow, battling complexity, preserving the possibilities for options, and supporting IT’s role as the steward of technology decisions for the business.
Tags : 
    
Juniper Networks
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.