manager

Results 1301 - 1325 of 1333Sort Results By: Published Date | Title | Company Name
Published By: Staples     Published Date: Jan 22, 2018
Shipping managers want suppliers they can trust. Learn how Staples Business Advantage delivers on the qualities you should care about most including personal account management, industry expertise, quality referrals and more.
Tags : 
    
Staples
Published By: Staples     Published Date: Jan 22, 2018
As a shipping manager, there are a lot of wrong turns you can take. Use this handy cheat sheet to make sure you avoid those mistakes and get your shipments out on time, every time.
Tags : 
    
Staples
Published By: Staples     Published Date: Jan 22, 2018
Innovations in shipping supplies make for stronger packages and lower costs. See the latest products and technologies every shipping manager should know about, from Dave Fromm of Staples Business Advantages Industrial Shipping Supplies Group.
Tags : 
    
Staples
Published By: Staples     Published Date: Jan 22, 2018
When youre a shipping manager, your day is always packed. Meet the partner that can help streamline and improve your shipping processes Staples Business Advantage.
Tags : 
    
Staples
Published By: AWS     Published Date: Jun 11, 2019
Join us to learn why Human-in-the-Loop training data should be powering your machine learning (ML) projects and how to make it happen. If youre curious about what human-in-the-loop machine learning actually looks like, join Figure Eight CTO Robert Munro and AWS machine learning experts to learn how to effectively incorporate active learning and human-in-the-loop practices in your ML projects to achieve better results. You'll learn: When to use human-in-the-loop as an effective strategy for machine learning projects How to set up an effective interface to get the most out of human intelligence How to ensure high-quality, accurate data sets When: Available On Demand (please register to view) Who Should Attend: IT leaders and professionals, line-of-business managers, business decision makers, data scientists, developers, and other experts interested in implementing AI/ML on the cloud are encouraged to attend this webinar. AWS Speaker: Chris Burns, Solutions Architect Figure Eight Spea
Tags : 
    
AWS
Published By: Genesys     Published Date: Jun 08, 2018
In Gartners 2018 Magic Quadrant for Contact Center Infrastructure, Worldwide, Genesys has once again maintained a leadership position. Placed furthest among all vendors in completeness of vision for 10 years and counting, our position continues to validate our mission to power the worlds best customer engagement solutions for organizations of all sizesboth in the cloud and on-premises. And according to Gartner peer insights, customers agree. Great implementation that was on-time and on-budget! CTO in the finance industry Solid platform with a lot of features at a reasonable cost. IT Manager of Software Engineering in the Services Industry Get the report now to learn: How contact center vendors compare and which quadrant they are aligned to Analyst views on the strengths and cautions of all participating vendors How to evaluate key criteria to guide your decision-making process
Tags : 
contact center, infrastructure, customer engagement, cloud, on-premises
    
Genesys
Published By: Hewlett Packard Enterprise     Published Date: Jul 18, 2018
Cost Savings And Business Benefits Enabled By The 3PAR StoreServ All-Flash Storage System and Recovery Manager Center (RMC)
Tags : 
    
Hewlett Packard Enterprise
Published By: Hewlett Packard Enterprise     Published Date: Jul 18, 2018
Cost Savings And Business Benefits Enabled By The 3PAR StoreServ All-Flash Storage System and Recovery Manager Center (RMC)
Tags : 
    
Hewlett Packard Enterprise
Published By: CA Technologies     Published Date: Jun 01, 2018
CA Privileged Access Manager (PAM) is a well-integrated suite that provides a comprehensive solution for privileged identity management in physical and virtual environments. CA PAM enables centralized control and management of privileged user access to a broad range of servers, network devices and applications.
Tags : 
    
CA Technologies
Published By: CA Technologies     Published Date: Jun 01, 2018
Within any organization, the most dangerous users are those with privileged access to the companys most valuable and sensitive data assets. This includes systems administrators, business managers, partners, suppliers, and service providers, and also takes into account the automated interactions between business machines, systems, and applications. Privileged access has always been a high-risk issue, but for too long, organizations have not understood or have chosen to ignore the risks, preferring instead to rely on the integrity of the individuals and systems involved. A number of high-profile security breaches over the last two years have highlighted the damage that a rogue systems administrator or stolen privileged credentials can cause. Today, fewer than half of all business organizations have deployed the type of privileged identity management (PIM) solution that could help improve the situation. This Ovum Decision Matrix (ODM) provides an in-depth view of the leading PIM solution
Tags : 
    
CA Technologies
Published By: Determine (Selectica)     Published Date: Sep 13, 2016
The sponsor named below commissioned Ardent Partners to write this report. While the report topic In 2015, collaboration is the name of the game in procurement and frequently entails working with key internal stakeholders (like line-of-business managers and legal departments) or preferred suppliers to drive greater value through sourcing and procurement. For Chief Procurement Officers ("CPOs") and other supply management leaders, collaboration has taken on many new and innovative forms over the years, causing these executives to leverage new (and, in some cases, existing) processes, relationships, and technologies to enhance compliance, decrease risk, and increase savings. One such business process, contract management, has been reborn with digital, automated features that can shift the way procurement teams collaborate, mitigate risk, drive performance, and realize greater savings for the enterprise.
Tags : 
    
Determine (Selectica)
Published By: IBM     Published Date: Oct 26, 2017
Identity and access management exists for one critical reasonsecurity. Organizations need to make certain the right people have access to the right resources to do their jobsand that people without proper authorization cant get in. In an era the IBM X-Force security team recently described as experiencing an ever-upward trend of more attacks, more leaked records and more varied threats, security is a critical function for business as well as IT.
Tags : 
access manager, security, cloud service, microsoft office 365, it strategies
    
IBM
Published By: Lookout     Published Date: Mar 28, 2017
In todays Bring Your Own Device (BYOD) world more than a few IT managers have lost sleep over the thought of an employee device, loaded with sensitive company data, falling into the wrong hands. Lookout commissioned Forrester Consulting to conduct a national survey of IT managers in the Fall of 2013 that uncovered substantial security concerns related to mobile devices, especially around malware and data loss. Ultimately, the survey revealed that IT managers do not believe existing security solutions can adequately address the mobile security challenges faced by businesses today.
Tags : 
insights, mobile, security, byod, lookout
    
Lookout
Published By: Lookout     Published Date: Mar 28, 2017
Enterprise mobility started with the Blackberry, a revolutionary messaging device that solved security concerns by giving IT managers the ability to set many restrictions on its functionality. In the following years, employees started using fully-functional, internet-capable smartphones in their personal lives and demanded the same capabilities at work.
Tags : 
enterprise, mobile, security, lookout, revolutionary
    
Lookout
Published By: HotSchedules     Published Date: Sep 11, 2018
The cost of labor can be managed effectively when restaurateurs are equipped with the right training, tools and processes. Traditional methods for capturing critical forecasting data and formulating labor plans & budgets are incomplete and often inaccurate, rarely accounting for menu pricing changes or current economic conditions. Even when the best practices of forecasting are employed, the information isnt always available to the store managers who are attempting to manage the cost of labor. This ebook will walk you through the ins and outs of labor forecasting and best practices to build efficiency, grow revenue, and positively impact your restaurants bottom line.
Tags : 
    
HotSchedules
Published By: OnBase by Hyland     Published Date: May 16, 2017
With smartphones and tablets now standard-issue office gear,workers fully expect to have mobile access to critical data and business applications wherever and whenever the need arises.And its not just the average field worker or sales rep who stands to benefit from remote access. An IDG survey found that 61% of the executive managers saw value in accessing critical business data while offline via their mobile devices. This IDG whitepaper proves that offline access is the key to unlocking mobilitys promise.
Tags : 
hyland, offline access, mobility, remote access, mobile access, business applications
    
OnBase by Hyland
Published By: Kronos     Published Date: Sep 20, 2018
If youve tried managing your retail operations labor performance without reliable, real-time data, you know the costly shortcomings of this approach. Tap into clear, easy-to-access workforce data a single view of all elements of your workforce that empowers you to make effective decisions and protect your bottom line. Workforce Analytics for Retail transforms labor and sales data into meaningful business intelligence. Learn how managers can make data-driven decisions that optimize workforce utilization, control labor costs, and drive continuous improvement.
Tags : 
    
Kronos
Published By: CA Technologies EMEA     Published Date: Sep 07, 2018
If youre relying on manual processes for testing applications, artificial and automated intelligence (AI) and machine learning (ML) can help you build more efficient continuous frameworks for quality delivery. In this on-demand webinar, Continuous Intelligent Testing: Applying AI and ML to Your Testing Practices, youll learn how to: Use AI and ML as the new, necessary approach for testing intelligent applications. Strategically apply AI and ML to your testing practices. Identify the tangible benefits of continuous intelligent testing. Reduce risk while driving test efficiency and improvement. This webinar offers practical steps to applying AI and ML to your app testing. The speaker, Jeff Scheaffer, is senior vice president and general manager of the Continuous Delivery Business Unit at CA Technologies. His specialties include DevOps, Mobility, Software as a Service (SaaS) and Continuous Delivery (CDCI).
Tags : 
    
CA Technologies EMEA
Published By: CA Technologies EMEA     Published Date: Sep 07, 2018
Companies struggle to find the right test data when testing applications which leads to bottlenecks, defects and constant delays. There is a better way and we want to show you how: Join us for this webcast to learn: - How Test Data Manager finds, builds, protects and delivers test data fast! - How to get your testing teams moving towards self sufficiency with test data Get your questions answered. Come away happy! Recorded Aug 20 2018 60 mins Presented by Prashant Pandey, CA Technologies
Tags : 
    
CA Technologies EMEA
Published By: CA Technologies EMEA     Published Date: Sep 11, 2018
SDx Central host a webcast to look at troubleshooting top-down application performance in Cisco SDWAN networks as well as assessing impact to application bottoms- up in a Cisco ACI data Center. Featuring: Jeremy Rossbach, Sr. Product Marketing Manager, CA Technologies Jason Normandin, Sr Principal Manager, CA Technologies Jessica Lyons Hardcastle, Senior Editor, SDx Central
Tags : 
    
CA Technologies EMEA
Published By: OKTA     Published Date: Oct 11, 2017
Most organizations have a dirty little secret: they are relying on user and password-based authentication to protect sensitive internal applications. With 81% of data breaches involving weak or stolen credentials1, applications that use single-factor authentication are an easy target for attack. Unfortunately, updating internal cloud applicationsas well as legacy and custom applicationsto support multi-factor authentication can be an IT headache for many organizations. Okta and Palo Alto Networks have collaborated to make rolling out multi-factor authentication a snap. Join Daniel Lu, Product Marketing Manager at Okta and Kasey Cross, Sr. Product Marketing Manager at Palo Alto Networks, to learn: >The latest trends in credential-based attacks >Why every sensitive cloud application needs multi-factor authentication >How to enforce network-level multi-factor authentication without touching your apps using Palo Alto Networks and Okta
Tags : 
    
OKTA
Published By: CyberSource     Published Date: Sep 26, 2017
Our latest report examines the trends and challenges facing fraud managers today and provides the strategies to address them. Learn how your peers are faring, and see how you compare to them.
Tags : 
    
CyberSource
Published By: IBM     Published Date: Jul 09, 2018
Data is the lifeblood of business. And in the era of digital business, the organizations that utilize data most effectively are also the most successful. Whether structured, unstructured or semi-structured, rapidly increasing data quantities must be brought into organizations, stored and put to work to enable business strategies. Data integration tools play a critical role in extracting data from a variety of sources and making it available for enterprise applications, business intelligence (BI), machine learning (ML) and other purposes. Many organization seek to enhance the value of data for line-of-business managers by enabling self-service access. This is increasingly important as large volumes of unstructured data from Internet-of-Things (IOT) devices are presenting organizations with opportunities for game-changing insights from big data analytics. A new survey of 369 IT professionals, from managers to directors and VPs of IT, by BizTechInsights on behalf of IBM reveals the challe
Tags : 
    
IBM
Published By: Akamai Technologies Australia     Published Date: Feb 07, 2018
Bot Manager provides identification, categorization, management, and reporting of bot traffic in the cloud with the globally distributed Akamai Intelligent Platform.
Tags : 
    
Akamai Technologies Australia
Published By: BigCommerce     Published Date: May 30, 2018
To find the right ecommerce platform, Freund Containers spent years of research and hours evaluating a wide variety of qualifiers on different platforms. To solve their problems, they created an on-premise-like customizations for their B2B business saving money and time. The open API and the use of custom fields makes BigCommerce extremely flexible and the platform can do virtually anything you want it to do. Chris Hiller, General Manager, Freund Container Read their story.
Tags : 
    
BigCommerce
Start   Previous    40 41 42 43 44 45 46 47 48 49 50 51 52 53 54    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.