business events

Results 26 - 50 of 56Sort Results By: Published Date | Title | Company Name
Published By: Dell Software     Published Date: Jul 24, 2012
Quest Workspacetm Help Desk is a robust help desk solution for small to medium-sized businesses with complex network environments. It provides a powerful combination of management features integrated with a best-of-breed IT help desk platform. Use the help desk software to manage the ticket system workflows, dashboards, reporting and end-user self-service portals. Use the embedded management features within the help desk platform to proactively manage network events, desktops, servers and applications as well as resolve issues faster and more effectively.
Tags : 
help desk, active directory, resolve issues, reports, windows, iphone, priorituze requests, auto escalation, organizational data, customize reports, cuztomize dashboards, data fields, scriptlogic, quest software, itil, service levels, proactive event management, data management, infrastructure, internetworking hardware
    
Dell Software
Published By: Supply Chain Connect     Published Date: Jan 24, 2008
Supply chain-centric organizations face unique challenges in today’s rapidly-changing marketplace. A variety of macro-industry factors, combined with the dynamic nature of their business, have made operations increasingly complex. As a result, there is an urgent need for tools that enable complete visibility into and enhanced management of inventory and related events and activities.
Tags : 
inventory, inventory control, scm, supply chain, supply chain connect, vendor managed inventory, collaboration, collaborating, erp, business management, business process management, enterprise resource planning, collaborative commerce, productivity
    
Supply Chain Connect
Published By: Marketo     Published Date: Mar 18, 2019
The role of marketing is constantly evolving. More than ever, marketing has to prove its impact on the success of the business. Outside executives often believe that marketing exists solely to support sales, or as an arts function that hosts company events and puts logos on t-shirts. With the pressure increasing, the growing imperative for marketers to prove their worth has arrived. It’s time for marketers to take control over the revenue process, earn the respect of their organizational peers, and earn a seat at the table. What must marketers do to be seen as an integral part of the machine that drives revenue and growth? Download The Definitive Guide to Marketing Metrics and Analytics to learn about: Establishing a culture of accountability Planning programs with ROI in mind Creating a framework for measurement Embracing revenue performance management Mastering the art of forecasting Building dashboards to inform complex decisions Implementation across teams, tactics, and technolog
Tags : 
    
Marketo
Published By: NCM Fathom     Published Date: Dec 09, 2011
A brilliant campfire story inspires action in its listeners. Here is an infographic from NCM Fathom Business Events about the importance of storytelling in organizations.
Tags : 
fathom, marketing, content creation
    
NCM Fathom
Published By: NCM Fathom     Published Date: Dec 09, 2011
Content is king online and on screen, right? Then the same must be true for in-person gatherings. Attendance is the key element to a successful event. Read this great guide to getting people to your event.
Tags : 
ncm fathom, business events, attendance, events
    
NCM Fathom
Published By: Oracle Service Cloud     Published Date: Mar 23, 2016
In the early 2000s, two vastly different businesses—baseball and field service management—began to use advanced statistical analysis to gain an advantage over their competitors. They both revolutionized their respective fields by using statistical knowledge to improve performance. The new approach replaced old models and methods and attained shockingly good results as both set new standards for their respective industries. In this white paper, you will learn the general concepts behind predictive analytics and how they can be applied to a field service organization. The paper will cover the basic metrics that should be tracked, the use of performance pattern profiles, and how these principles can predict future events.
Tags : 
oracle, service cloud, service management, customer interaction, best practices, business activity monitoring, business analytics, customer interaction service, customer relationship management
    
Oracle Service Cloud
Published By: IBM     Published Date: Jul 10, 2009
Differentiate yourself from the competition with superior services and products. Business process management (BPM) powered by the IBM Smart SOA™ portfolio makes it possible by enabling you to monitor, manage and improve business operations. Constant insight fuels smarter decisions and a more proactive approach to business.
Tags : 
ibm, ebf, business process management, bpm, ibm smart soa, bep, kpi, websphere, business monitor, business events, lotus, enterprise applications, business process automation
    
IBM
Published By: Aveksa     Published Date: Feb 04, 2008
User access-related business risk comprises a broad array of potentially damaging events that may be caused or made possible by inadequate governance of access to an enterprise’s information assets. Such events range from relatively minor policy and compliance violations to disastrous business losses.  The stakes involved in access-related risk have risen dramatically in recent years as organizations have become thoroughly operationalized by technology.
Tags : 
access control, user access, access, permissions, risk, risk management, compliance, governance, aveksa, corporate governance
    
Aveksa
Published By: Zebra     Published Date: Jul 10, 2014
In this paper, Zebra shows how to accelerate the path to IoT through the Visible Value Chain (VVC). It enables organizations to gain real-time visibility into their operations allowing them to be more nimble, agile, and make better-informed business decisions. Once organizations have seamlessly enabled device connection to the data center, they can see events occurring throughout their value chain in real time—and act upon them. Doing so creates new value and intelligence from both legacy and new devices, while mining the vast riches of Big Data.
Tags : 
zebra, internet, visible value chain, vvc, big data, data center, device connection, iot, it management, enterprise applications
    
Zebra
Published By: CenturyLink     Published Date: Nov 18, 2011
Only companies with a disaster-ready infrastructure and solid business continuity plan can come through such events with minimal downtime and cost.
Tags : 
centurylink, qwest, high speed internet, phone, mobile, tv services, offers, bundles, infrastructure, business continuity, disaster-ready, disaster recovery, intrusion detection, patch management, security management, configuration management, vulnerability management, design and facilities
    
CenturyLink
Published By: IBM     Published Date: Nov 09, 2012
Many of the latest initiatives in the IT world are focused around aligning IT resources more closely with business users and solution needs. In this white paper, learn to make better business decisions with flexible, automated business rules.
Tags : 
operations decision management, it infrastructure, data management, automated business rules, automated business events, it management
    
IBM
Published By: SAP     Published Date: May 11, 2012
SMEs need confidence to act boldly on business intelligence and take advantage of business opportunities. The key is to better understand all facets of all the business and to enable data-driven decision making as events unfold.
Tags : 
sme, small and medium enterprises, business intelligence, real time business intelligence, sap, data management
    
SAP
Published By: Microsoft Azure     Published Date: Apr 11, 2018
Distributed systems enable different areas of a business to build specific applications to support their needs and drive insight and innovation. While great for the business, this new normal can result in development inefficiencies when the same systems are reimplemented multiple times. This free e-book provides repeatable, generic patterns, and reusable components to make developing reliable systems easier and more efficient—so you can free your time to focus on core development of your app. In this 160–page e-book, you’ll find: An introduction to distributed system concepts. Reusable patterns and practices for building distributed systems. Exploration of a platform for integrating applications, data sources, business partners, clients, mobile apps, social networks, and Internet of Things devices. Event-driven architectures for processing and reacting to events in real time. Additional resources for learning more about containers and container orchestration systems. “There are more
Tags : 
    
Microsoft Azure
Published By: AWS     Published Date: Apr 27, 2018
Until recently, businesses that were seeking information about their customers, products, or applications, in real time, were challenged to do so. Streaming data, such as website clickstreams, application logs, and IoT device telemetry, could be ingested but not analyzed in real time for any kind of immediate action. For years, analytics were understood to be a snapshot of the past, but never a window into the present. Reports could show us yesterday’s sales figures, but not what customers are buying right now. Then, along came the cloud. With the emergence of cloud computing, and new technologies leveraging its inherent scalability and agility, streaming data can now be processed in memory, and more significantly, analyzed as it arrives, in real time. Millions to hundreds of millions of events (such as video streams or application alerts) can be collected and analyzed per hour to deliver insights that can be acted upon in an instant. From financial services to manufacturing, this rev
Tags : 
    
AWS
Published By: AWS     Published Date: Oct 12, 2018
Safeguarding your data is more important than ever. In today’s data-driven business landscape, companies are using their data to innovate, inform product improvements, and personalize services for their customers. The sheer volume of data collected for these purposes keeps growing, but the solutions available to organizations for processing and analyzing it become more efficient and intuitive every day. Reaching the right customers at the right time with the right offers has never been easier. With this newfound agility, however, comes new opportunities for vulnerability. With so much riding on the integrity of your data and the services that make it secure and available, it’s crucial to have a plan in place for unexpected events that can wipe out your physical IT environment or otherwise compromise data access. The potential for natural disasters, malicious software attacks, and other unforeseen events necessitates that companies implement a robust disaster recovery (DR) strategy to
Tags : 
    
AWS
Published By: HP     Published Date: Mar 31, 2015
No business is immune to the threat of IT downtime caused by natural and manmade disasters. Natural disasters—such as earthquakes, tsunamis, hurricanes, fires, and floods—can happen with little to no advanced warning. But the bigger risk is often human-induced events—from simple IT configuration errors to significant data center problems. If you lack a rock-solid disaster recovery (DR) plan, any of these unpredictable events—natural or manmade—could bring your business and its revenue streams to a halt. Yet many organizations are not well prepared for the unknown. The randomness of such events lulls people into a sense of false security—“That’s not likely to happen here.” While you can hope to avoid events that threaten the continuity of your business, the reality remains unchanged: Disasters happen—so you need to prepare for them. Are you prepared? Please download this eBook to find out!
Tags : 
disaster recovery, natural disasters, data center, hackers, hardware failure, software failure, planning, disaster readiness, security, it management, data management
    
HP
Published By: Oracle Primavera     Published Date: Oct 09, 2015
This solution brief explores how companies can transform the efficiency of their STO and solve business challenges in six key areas with Oracle’s Primavera Shutdown, Turnaround and Outage Solution. Understanding STO events are a core part of business. Oracle’s Primavera Shutdown, Turnaround and Outage Solution has been developed to support the transformation of your customers/prospects STO business by providing a predictable solution that supports scope, cost, schedule, risk and change throughout the STO event lifecycle.
Tags : 
oracle, sto, sto business, sto event cycle, shutdown turnaround outage, sto solution, project management, portfolio management
    
Oracle Primavera
Published By: IBM     Published Date: Apr 20, 2016
Weather Means Business: Enabling transformative decision-making with precise weather data for energy and utilities, insurance, retailing and the public sector Weather has a profound and widespread influence on business. We are all vulnerable to unforeseen weather events, and the inability to manage weather-related risk can limit business success, thwart economic development and threaten public safety. This whitepaper discusses the uses cases for weather data for various industries, including government, insurance, retail and energy and utilities.
Tags : 
ibm, ibm analytics, insurance, weather, weather data
    
IBM
Published By: Polycom     Published Date: Jun 08, 2016
In the past, business meetings were treated like formal events. They were scheduled days or weeks in advance, often on a recurring basis (e.g. every second Tuesday), and had a defined start time and end time. Typically, these meetings had a named meeting host who managed the session and guided the team through a pre-published agenda.
Tags : 
best practices, business optimization, business management, application management, enterprise application, business intelligence, productivity
    
Polycom
Published By: IBM     Published Date: Oct 13, 2017
IBM Security offers one of the most advanced and integrated portfolios of enterprise security products and services. The portfolio, supported by world-renowned X-Force research, provides security intelligence to help organizations holistically protect their infrastructures, data and applications, offering solutions for identity and access management, database security, application development, risk management, endpoint management, network security and more. These solutions enable organizations to effectively manage risk and implement integrated security for mobile, cloud, social media and other enterprise business architectures. IBM operates one of the world’s broadest security research, development and delivery organizations, monitors 15 billion security events per day in more than 130 countries, and holds more than 3,000 security patents.
Tags : 
it security, malware, malware protection, virus prevention, ibm, threat intelligence
    
IBM
Published By: BlackBerry Cylance     Published Date: Sep 18, 2019
There will be a ransomware attack on businesses every 14 seconds by the end of 2019 . Every 40 seconds, one of those attacks will prove successful , with devastating effects ranging from permanent loss of irreplaceable data to life-threatening interruptions to patient care. In years past, expert malware authors packaged up their know-how into costly exploit kits sold on the underground market. Cyber criminals had to recover high upfront costs before launching a campaign and realizing a profit. Today, ransomware-as a-service groups like Satan make it easier than ever before for would-be cyber criminals with minimal technical skills to launch attacks, offering free ransomware toolkits and hands-on help to manage campaigns and extort payments. Read our white paper to learn how CylancePROTECT® prevents Petya, Goldeneye, WannaCry, Satan, and many more from executing, with machine learning models dating back to September 2015, long before the ransomware first appeared in the wild.
Tags : 
    
BlackBerry Cylance
Published By: IBM     Published Date: Mar 18, 2015
More and more companies are moving to the cloud for B2B services, and for good reason. There’s a huge potential for increased visibility and analytics-driven insights to be gained from B2B transactions that can give businesses unprecedented levels of information. But many organizations continue to struggle when it comes to going beyond basic transactional data and historical performance metrics. What does it take to not only report on past activity, but to get real-time alerts, predict future events, manage exceptions, and proactively leverage this wealth of data in order to put it to work? Read this IBM white paper to find out how B2B Services Reporting and Analytics provide new insights into your trading partner relationships and to drive better, more profitable business decisions.
Tags : 
b2b services, ibm, b2b analytics, b2b reporting, transactional data, trading partner relationships, it management, enterprise applications, data management
    
IBM
Published By: Seamless     Published Date: Jun 18, 2013
Michael Farino is the Hospitality Manager for the New York office of DLA Piper (DLA), one of the world’s largest business law firms.Michael and his team oversee the firm’s meal program and all caterin gand special events. With 500 employees in the office and dozens of client meetings and special events each month, this is no small task. DLA worked with Seamless to create a set of rules that would govern when and how employees could order food. Each and every one of DLA’s 500 NYC-based employees was given a username and password. Everyone was free to log-in and order their own meals. Everyone was also assigned to a specific budget group. These budget groups are based each person’s role at the Firm and can accommodate different spending limits and permission levels. As Michael notes, “right away, Seamless gave us the power to enforce our rules,but still be flexible so people get what they need. It’s a win-win.”
Tags : 
    
Seamless
Published By: Preventsys     Published Date: Aug 21, 2009
This paper is a synopsis of the presentations given at the Preventsys "CISO Breakfast Series," a succession of seminars given across North America in January and February 2005. The speakers for each breakfast consisted of security professionals and executives who provided their views on how to more effectively align information security with business initiatives.
Tags : 
network security, intrusion prevention, security management, business management, information management, data security, preventsys, security, authentication
    
Preventsys
Published By: Preventsys     Published Date: Aug 21, 2009
Security professionals are constantly being asked to justify every security project. Security risks can often be difficult to measure and even more difficult to understand by people outside the department. The key to demonstrating improvement is to translate security information into business terms.
Tags : 
security, metrics, business metrics, security management, information management, aligning, alignment, business integration, preventsys
    
Preventsys
Start   Previous    1 2 3    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.