keys

Results 126 - 150 of 206Sort Results By: Published Date | Title | Company Name
Published By: Hyland Software     Published Date: Dec 17, 2013
Businesses are discovering how to create efficiencies and meet constantly evolving business needs with an enterprise content management (ECM) solution. Make ECM work for your organization by researching best practices and knowing your options.
Tags : 
emc, enterprise content management, emc solution, automated processing, workflow, integration, emc strategy, onbase, hyland software, knowledge management, enterprise applications, data management
    
Hyland Software
Published By: VMware, Inc     Published Date: Dec 05, 2013
IT as a service (ITaaS) provides a unique opportunity for IT and line-of-business leaders to realign to transform business. Over the past decade, IT organizations have worked hard to reduce delivery time and costs through automation and commoditization. At the same time, line-of-business owners have demanded more and unique offerings to drive agility and competitive advantage. More recently, the result has been business owners working outside of IT to meet their needs. Now, enabled by cloud computing, ITaaS is catalyzing profound change in IT organizations and the processes companies follow to achieve business goals. Please download the white paper to learn more.
Tags : 
itaas, delivery time, it automation, it commoditization, vmware, networking, it management, knowledge management, enterprise applications, data management, business technology
    
VMware, Inc
Published By: Work4™     Published Date: Nov 18, 2013
Download this whitepaper to learn the 3 Keys to sourcing the best candidates through Graph Search and for tips on how your organization can experience the joy of Facebook recruiting.
Tags : 
facebook, facebook recruiting, recruiting, human resources, graph search, organic search, facebook company page, social network recruiting
    
Work4™
Published By: NAVEX Global     Published Date: Nov 18, 2013
Download this paper to explore the 4 areas that are key to managing social media use by employees in your organization.
Tags : 
social media policy, risk management, best practices, policy management, social media training, social media laws, national labor relations act, nlra, retaliation, harassment, mobile training, risk assessment, data, culture assessment, program assessment
    
NAVEX Global
Published By: IBM     Published Date: Oct 15, 2013
Discover the four key dimensions to personalized web marketing, and learn from the real life successes of enterprises that have made the personalized web a core part of their growth strategies.As you can see, web marketing can achieve comparable success when you make the four personalization steps your own.
Tags : 
ibm unica, click-throughs, personalizing web experience, customer needs, data sources, specific site analyses, across channels, sales and marketing opportunities, online and offline, customer interests, website traffic, referring sites, referring keywords, ibm smarter commerce
    
IBM
Published By: IBM     Published Date: Oct 10, 2013
"The implications from the 2013 IBM Global Reputational Risk and IT Study are clear. The question is no longer whether IT risks can damage your corporate reputation, but what you can do to effectively prevent and mitigate these risks. Find out what you can do to protect your reputation from IT risks. Read “Six keys to effective reputational and IT risk management” to learn about: · Practical advice and recommendations to help prevent and mitigate the IT risks that most affect reputation · The emerging role of the Chief Digital Officer · How to use social media as a tool for minimizing reputational damage · How your supply chain can put you at increased reputational risk"
Tags : 
reputational management, risk management, it risk management, ibm, ibm global, it risks, protection, branding, social media, supply chain, supply chain management, chief digital officer, mitigation, corporate reputation, security, it management, business technology
    
IBM
Published By: Kaseya     Published Date: Oct 03, 2013
Eight Keys to Cloud Friendly System Management
Tags : 
kaseya, cloud, cloud computing, system management, cloud migrations, lan, public cloud, private cloud, hybrid cloud, byod, software development, it management
    
Kaseya
Published By: PulseLearning     Published Date: Sep 26, 2013
We reveal Four Keys to Success for Channel Enablement. What are the risks? Where does it go wrong?
Tags : 
    
PulseLearning
Published By: Introhive     Published Date: Sep 24, 2013
Connections exist throughout your entire organization. These connections can be leveraged with warm introductions to eliminate the need for cold calling into those key prospects and accounts. Download this white paper to discover how your relationship capital can increase ROI.
Tags : 
relationship capital, increasing roi, closing deals, sales
    
Introhive
Published By: GoodData     Published Date: Sep 17, 2013
BI requirements are oft en out of date even before the fi rst set of specifi cations has been collected and documented. Agility is the last frontier in the battle for BI success, and it is the keystone to Forrester’s Agile BI triad: Agile BI soft ware development, Agile BI organizations, and Agile BI technologies.
Tags : 
gooddata, business intelligence, data. better data, bigger ideas, agile bi organization, bi success, bi technologies, software development, it management
    
GoodData
Published By: NAVEX Global     Published Date: Sep 05, 2013
Explore four important facets of managing social media use by employees in your organization. Craft a best practice social media policy and navigate the legal landscape, train employees, address retaliation, and take a comprehensive approach. View examples of organizations that have successfully and creatively implemented social media guidelines.
Tags : 
social media policy, risk management, best practices, policy management, social media training, social media laws, national labor relations act, nlra, retaliation, harassment, mobile training, risk assessment, data, culture assessment, program assessment
    
NAVEX Global
Published By: Canon Business Process Services     Published Date: Aug 27, 2013
Managed print services have been proven to drive cost savings as much as 10-30 percent over traditional approaches as well as increase efficiency, security and sustainability across your business.
Tags : 
print management, business process outsourcing, business performance management, managed print services, business imaging, document and print management, business management, knowledge management, enterprise applications
    
Canon Business Process Services
Published By: IBM     Published Date: Aug 20, 2013
In many ways, today’s web marketers are like blindfolded shopkeepers. They might have a general understanding of their customers’ needs, based on site analytics and other data sources, but they do not see what their actual customers are doing across channels. Hence, they miss numerous sales and marketing opportunities—online and off. Whether your shop is real, virtual, or a combination of the two, the more complete your customer vision, the greater the value you can provide to them and the greater value they will deliver to your bottom line.
Tags : 
personalization, real time personalization, web personalization, marketing, web experience, data, analytics, site analytics, data sources, marketing opportunity, business technology
    
IBM
Published By: IBM     Published Date: Aug 20, 2013
In many ways, today’s web marketers are like blindfolded shop-keepers. They might have a general understanding of their customers’ needs, based on site analytics and other data sources, but they do not see what their actual customers are doing across channels. Hence, they miss numerous sales and marketing opportunities—online and off. Whether your shop is real, virtual, or a combination of the two, the more complete your customer vision, the greater the value you can provide to them and the greater value they will deliver to your bottom line.
Tags : 
personalization, real time personalization, web personalization, marketing, web experience, data, analytics, site analytics, data sources, business technology
    
IBM
Published By: IBM     Published Date: Jun 26, 2013
How to manage reputational and IT risk to protect and enhance brand value and competitive standing.
Tags : 
risk management, protect, enhance, brand value, effective
    
IBM
Published By: CareCloud     Published Date: Jun 24, 2013
This report shows you why Meaningful Use attestation is only one of the steps involved in seeing a return on your EHR investment.
Tags : 
roi, ehr, success, investment, protect, cms
    
CareCloud
Published By: HP - Enterprise     Published Date: Jun 05, 2013
In today’s mobile world, the user is at the center of the application experience. This is true whether the user is a customer, a partner, or an employee. Yet meeting the needs for the enterprise user poses particular challenges. Apps must work seamlessly across devices and screen sizes, enabling real-time collaboration, without sacrificing data security. This balance requires a mobile app development platform built for the unique demands of the enterprise.
Tags : 
applications, apps, mobile applications, mobile, user-driven, data security
    
HP - Enterprise
Published By: CheckPoint HR     Published Date: May 16, 2013
At CheckPoint HR, we've worked with hundreds of small to medium-sized companies. By finding and eliminating unneeded expenses, HR can return money to the business. This white paper identifies the keys for doing so.
Tags : 
checkpoint hr, hr spend, hr expenses, human resources, hr costs, hr spend optimization
    
CheckPoint HR
Published By: Symantec     Published Date: Apr 04, 2013
Stuxnet, a high-profile cyber-attack, used malware signed with legitimate code signing certificates. What went wrong and how can you protect your own assets?
Tags : 
code signing, cyber attack, anti-virus, intrusion prevention, private keys, asset protection, security
    
Symantec
Published By: RelayHealth     Published Date: Apr 01, 2013
Statements can be a great opportunity to improve the patient experience and expedite collections, or they can lead to frustrated patients, lower self-pay revenue and increased bad debt. As pioneers of the healthcare industry’s patient-friendly initiative nearly 10 years ago, RelayHealth continues to research and innovate. Its most recent patient focus group provided input on how statement design impacts their satisfaction with the hospital, post-discharge experience and willingness to pay. Learn the critical components to creating patient statements that get results and help compel patients to pay: Download the 10 Keys to Creating Engaging Patient Statements today.
Tags : 
statements, patient statements, healthcare, collection, patient experience
    
RelayHealth
Published By: Turn     Published Date: Mar 13, 2013
3 Keys to Look-Alike Modeling
Tags : 
look-alike modeling, targeting, predictive modeling, predictive models, advertising strategy
    
Turn
Published By: Datto Inc.     Published Date: Mar 07, 2013
Why deliver just backup, when data recovery and business continuity are the real keys? Learn how one Datto partner delivers business continuity to their clients.
Tags : 
ibc, bdr, intelligent business continuity, backup and recovery, diaster recovery
    
Datto Inc.
Published By: Achievers     Published Date: Dec 11, 2012
The key to business success is through employees that display the right behaviors to drive results, which are amplified by recognition. Read this white paper to learn the seven keys to creating a successful employee recognition program.
Tags : 
employee recognition, employee rewards, online recognition program, trends
    
Achievers
Published By: Brightpearl     Published Date: Nov 19, 2012
Smart, dynamic and ambitious retailers like you know that good systems and processes are key to growing a business. Learn about commerce acceleration and the keys to it's framework.
Tags : 
brightpearl, commerce acceleration 101, retailers, profit, automation, customers, suppliers, data management, business technology
    
Brightpearl
Start   Previous    1 2 3 4 5 6 7 8 9    Next    End
Search      

Related Topics

Add Your White Papers

Get your white papers featured in the Data Center Frontier Paper Library contact:
Kevin@DataCenterFrontier.com