officers

Results 1 - 25 of 63Sort Results By: Published Date | Title | Company Name
Published By: VMware     Published Date: Sep 12, 2019
Over the next few years, chief information officers (CIOs) will preside over a maelstrom of change that will fundamentally alter the way their companies do business in the future.
Tags : 
    
VMware
Published By: Automation Anywhere     Published Date: Jul 16, 2019
RPA platforms represent a hyper growth market, with enterprises investing in new RPA platforms for process and task automation to achieve greater operating efficiency and agility, while allowing the human workforce to focus on more strategic and higher priority projects and tasks. Intelligent process automation (IPA) is in an early phase of its evolution and represents the next frontier for RPA vendors. This Ovum Decision Matrix (ODM) is a comprehensive evaluation to help enterprise IT and business leaders, including chief information officers (CIOs), enterprise and process architects, IT directors, line-of-business (LOB) leaders and process owners, and digital transformation leaders select an RPA platform that is well suited to their specific requirements.
Tags : 
    
Automation Anywhere
Published By: List Sotheby's International Realty, Singapore     Published Date: Jun 26, 2019
Citadel-founder Ken Griffin lit up the luxury residential sector in January 2019 when he bought a super penthouse in New York City for US$240 million. This purchase followed another acquisition he made in London in which he forked out US$122 million for a 200-year old house overlooking Londons St James Park. These ultra-high-net-worth (UHNW) buyers, local or foreign, are chief executive officers (CEOs) of tech companies or investment funds, and chairmen of major multi-national corporations (MNCs). They are also collectors of trophy assets who go for nothing less than the best-in-class attributes such as location, size, views, privacy, luxurious furnishings, and architectural merit. Trophy real estate is the ultimate collectible treasure. Like buying a prized sports car or a high-value masterpiece of art, trophy residences can ignite the desires of the UHNW individuals. As such, many developers of ultra-luxury properties have conceived collectible concepts right from the planning
Tags : 
    
List Sotheby's International Realty, Singapore
Published By: Group M_IBM Q2'19     Published Date: Apr 10, 2019
An opportunity for Chief Procurement Officers (CPOs): As business models evolve and technology advances, CPOs can elevate their value across enterprises and extended supplier networks with Cognitive Procurement capabilities that can sense and act.
Tags : 
    
Group M_IBM Q2'19
Published By: Group M_IBM Q2'19     Published Date: Apr 01, 2019
The data maturity curve As companies invest more and more in data access and organization, business leaders seek ways to extract more business value from their organizations data. 92 percent of business leaders say that to compete in the future, their organization must be able to exploit information much more quickly than it can today.1 Chief Information Officers (CIO) need solutions that will allow them to evolve their organizations approach to data and drive real value with strategic decisions. This journey can be depicted in a data maturity curve.
Tags : 
    
Group M_IBM Q2'19
Published By: Workday Netherlands     Published Date: Mar 28, 2019
Uit nieuw onderzoek van IDC en Workday blijkt dat er in veel organisaties een digitale disconnectie bestaat. De kloof tussen de agenda van de CDO en het vermogen van de belangrijkste bedrijfssystemen om het bredere digitale transformatieprogramma te ondersteunen, wordt steeds groter. Dit heeft verschillende oorzaken: 80% zegt dat ze nieuwe digitale oplossingen niet, of slechts met moeite, kunnen integreren met bestaande processen voor finance en HR 80% geeft aan dat ze niet, of slechts met moeite, kunnen beschikken over realtime forecasts en dashboards 80% vindt het moeilijk of onmogelijk om finance- en HR-processen aan te passen aan nieuwe wet- en regelgeving Download ons whitepaper en lees alles over succesvolle, schaalbare digitale transformatie en hoe u een digitale impasse voorkomt.
Tags : 
finance, workday, workforce technology, digital strategy
    
Workday Netherlands
Published By: Blue Prism     Published Date: Mar 15, 2019
RPA platforms represent a hyper growth market, with enterprises investing in new RPA platforms for process and task automation to achieve greater operating efficiency and agility, while allowing the human workforce to focus on more strategic and higher priority projects and tasks. Intelligent process automation (IPA) is in an early phase of its evolution and represents the next frontier for RPA vendors. This Ovum Decision Matrix (ODM) is a comprehensive evaluation to help enterprise IT and business leaders, including chief information officers (CIOs), enterprise and process architects, IT directors, line-of-business (LOB) leaders and process owners, and digital transformation leaders select an RPA platform that is well suited to their specific requirements.
Tags : 
    
Blue Prism
Published By: Workday Netherlands     Published Date: Feb 04, 2019
Uit nieuw onderzoek van IDC en Workday blijkt dat er in veel organisaties een digitale disconnectie bestaat. De kloof tussen de agenda van de CDO en het vermogen van de belangrijkste bedrijfssystemen om het bredere digitale transformatieprogramma te ondersteunen, wordt steeds groter. Dit heeft verschillende oorzaken: 80% zegt dat ze nieuwe digitale oplossingen niet, of slechts met moeite, kunnen integreren met bestaande processen voor finance en HR 80% geeft aan dat ze niet, of slechts met moeite, kunnen beschikken over realtime forecasts en dashboards 80% vindt het moeilijk of onmogelijk om finance- en HR-processen aan te passen aan nieuwe wet- en regelgeving Download ons whitepaper en lees alles over succesvolle, schaalbare digitale transformatie en hoe u een digitale impasse voorkomt.
Tags : 
workforce-technologie, digitale strategie
    
Workday Netherlands
Published By: Fortinet EMEA     Published Date: Nov 26, 2018
Enterprise chief information security officers (CISOs) are seeking ways to leverage existing security investments to bridge the divide between largely siloed security systems. The focus is on reducing the number of consoles needed to manage the security infrastructure. Network security vendors have a significant role to play in bridging the communication gap between these systems. The creation of a unified defense architecture enables threat data exchange between existing security systems. It helps automate the process of raising an organization's security posture when a security infrastructure component detects a threat. The following questions were posed by Fortinet to Robert Ayoub, program director in IDC's Security Products program, on behalf of Fortinet's customers.
Tags : 
    
Fortinet EMEA
Published By: Group M_IBM Q418     Published Date: Nov 20, 2018
Many retailers are investing in distributed order management systems to optimize their consumer order fulfilment performance. Chief supply chain officers can use this research to successfully implement these systems into their business application landscape.
Tags : 
    
Group M_IBM Q418
Published By: Forrester Research     Published Date: Jun 11, 2018
Theres an alarming digital divide within many companies. Marketers are developing nimble software to give customers an engaging, personalized experience, while IT departments remain focused on the legacy infrastructure. The front and back ends arent working together, resulting in appealing websites and apps that dont quite deliver. Weve arrived at this misalignment for understandable reasons. Previously, most chief information officers (CIOs) were hired to digitize and bring order to companies internal systems and processes. They saw websites as marketing channels and were happy to let chief marketing officers (CMOs) oversee that province of technology. They had, and still have, plenty to do just to keep internal operations running smoothly. Marketers soon got into the habit of developing not just content, but also software programs to better reach and transact with customers. But now that websites and apps are becoming cornerstones of the business, the stakes are too high to al
Tags : 
cio, marketers, business, digital, customers
    
Forrester Research
Published By: TIBCO Software     Published Date: May 31, 2018
Integration is the lifeblood of todays digital economy, and middleware is the software layer connecting different applications, services, devices, data sources, and business entities. This Ovum Decision Matrix (ODM) is a comprehensive evaluation to help enterprise IT leaders, including chief information officers (CIOs), enterprise/integration architects, integration competency center (ICC)/integration center of excellence (CoE) directors, and digital transformation leaders select a middleware-as-aservice (MWaaS) suite best suited to their specific hybrid integration requirements.
Tags : 
    
TIBCO Software
Published By: TIBCO Software     Published Date: May 31, 2018
Integration is the lifeblood of todays digital economy, and middleware is the software layer connecting different applications, services, devices, data sources, and business entities. This Ovum Decision Matrix (ODM) is a comprehensive evaluation to help enterprise IT leaders, including chief information officers (CIOs), enterprise/integration architects, integration competency center (ICC)/integration center of excellence (CoE) directors, and digital transformation leaders select a middleware-as-aservice (MWaaS) suite best suited to their specific hybrid integration requirements. Download this whitepaper to read further on Hybrid integration suites for cloud service, API-led, B2B, and mobile application integration.
Tags : 
    
TIBCO Software
Published By: Google Cloud     Published Date: May 09, 2018
As companies seek to innovate and engage customers through digital channels, they need superstar security leaders business executives who know how to protect, support, and drive performance. This report looks at the biggest changes in firms expectations of their chief information security officers (CISOs) and provides specific examples of how top information security professionals rise to those occasions.
Tags : 
    
Google Cloud
Published By: IBM     Published Date: Apr 25, 2018
Many retailers are investing in distributed order management systems to optimize their consumer order fulfilment performance. Chief supply chain officers can use this research to successfully implement these systems into their business application landscape.
Tags : 
b2c, ibm, order management, supply chain
    
IBM
Published By: Dome9     Published Date: Apr 25, 2018
At an unprecedented pace, cloud computing has simultaneously transformed business and government, and created new security challenges. The development of the cloud service model delivers business-supporting technology more efficiently than ever before. The shift from server to service-based thinking is transforming the way technology departments think about, design, and deliver computing technology and applications. Yet these advances have created new security vulnerabilities as well as amplify existing vulnerabilities, including security issues whose full impact are finally being understood. Among the most significant security risks associated with cloud computing is the tendency to bypass information technology (IT) departments and information officers. Although shifting to cloud technologies exclusively may provide cost and efficiency gains, doing so requires that business-level security policies, processes, and best practices are taken into account. In the absence of these standard
Tags : 
    
Dome9
Published By: CA Technologies EMEA     Published Date: Apr 10, 2018
A New Security Model Worth Understandingand Emulating Enterprise security traditionally relied on a fortress strategy that locked down user endpoints and created walls around the network. Today, this strategy cannot support or secure the use of mobile devices and SaaS capabilities, which exist outside the fortress. As a result, Chief Information Security Officers (CISOs) have been looking for new solutions that can secure these technologies today, and adapt as threats and business needs change. The credit card industrys security model is one example that provides a new way to think about risk and contain itthat is, if you can see past the occasional bad rap its gotten from attacks and breaches.
Tags : 
    
CA Technologies EMEA
Published By: CA Technologies EMEA     Published Date: Apr 10, 2018
Ein neues Security-Modell, das Sie verstehen und nachahmen sollten. Die Security in Unternehmen hnelte bisher einer Festungsstrategie, die Anwenderendpunkte abschottete und Mauern um das Netzwerk baute. Heutzutage kann diese Strategie die Nutzung von Mobile Devices und SaaS-Funktionen (Software-as-a-Service), die sich auerhalb der Festung befinden, nicht mehr untersttzen. Daher haben sich Chief Information Security Officers (CISOs) nach neuen Lsungen umgesehen, die diese Technologien heute sichern knnen und die sich einer Zeit anpassen, in der sich sowohl Bedrohungen als auch Unternehmensanforderungen verndern.
Tags : 
    
CA Technologies EMEA
Published By: Workday     Published Date: Mar 02, 2018
Higher education is in financial crisis, according to 71 percent of chief business officers (CBOs) surveyed by Inside Higher Ed. Read the 2017 report to understand how these leaders view the financial and other challenges facing higher-education institutions in the U.S.
Tags : 
higher education, financial crisis, financial challenges
    
Workday
Published By: Fujitsu     Published Date: Feb 26, 2018
Communities rely on their local policemen and policewomen to keep them safe, protect their property and preserve the peace. But few citizens really understand the dangers that officers face every day, especially patrolling and answering calls in vehicles or on foot. While their training provides them with tactics and procedures, situations and individuals are unpredictable. From accidents to health emergencies, domestic violence to theft and assaults, police must perform in high-stress, volatile environments and make the right decisions in seconds. And in todays digital world, everything they do may be recorded and posted online. Intel, the Intel logo, Intel Core, Intel vPro, Core Inside and vPro Inside are trademarks of Intel Corporation or its subsidiaries in the U.S. and/or other countries
Tags : 
public, safety, mobile, solutions, police, fujitsu
    
Fujitsu
Published By: Fujitsu     Published Date: Feb 01, 2018
Communities rely on their local policemen and policewomen to keep them safe, protect their property and preserve the peace. But few citizens really understand the dangers that officers face every day, especially patrolling and answering calls in vehicles or on foot. While their training provides them with tactics and procedures, situations and individuals are unpredictable. Devices such as computers and tablets make these tactics possible. From accidents to health emergencies, domestic violence to theft and assaults, police must perform in high-stress, volatile environments and make the right decisions in seconds. And in todays digital world, everything they do may be recorded and posted online. Intel inside, powerful productivity outside.
Tags : 
technology, mobile, safety, security, tablet, solutions, fujitsu
    
Fujitsu
Published By: NAVEX Global     Published Date: Dec 22, 2017
Ethics and compliance officers have many opportunities to leverage the data in their hotline and incident management systems to improve their compliance programmes and their organisational culture of ethics and respect. This years benchmarks point to several opportunities to increase programme effectiveness. Hotline data that is carefully tracked, reviewed, benchmarked and presented with sufficient context often provides the early warning signs needed to detect, prevent and resolve problems. We at NAVEX Global hope that this report is helpful to your organisation and we welcome any feedback on these findings.
Tags : 
whistleblowing, hotline, whistleblowing hotline, hotline best practices, hotline benchmark data, whistleblower protection, whistleblowing programe
    
NAVEX Global
Published By: SAP EMEA Global     Published Date: Nov 22, 2017
Rapid innovation, disruptive competition, and intensive investments in new technologies tend to characterize the North American marketplace. Thus, it stands to reason that chief financial officers in North America are more involved in strategic decision-making than CFOs in other regions, and that they leverage technology to automate routine operations so they can focus on strategic concerns.
Tags : 
growth, regulatory, efficiency, automation, influence, finance function, core
    
SAP EMEA Global
Published By: Amazon Web Services     Published Date: Oct 09, 2017
The following insights should be used as a resource for Chief Financial Officers (CFOs) as they lead or support their organisation through a cloud adoption journey. It is designed to provide an overview of cloud adoption drivers, costs, risks, and benefits, as well as raise important questions about staffing and technology decisions that are critical to success. It is also intended to help inform business cases, while surfacing measurements and indicators specific to cloud environments that impact the bottom line. The foundational guidance provided is a collection of insights captured and distilled from direct conversations and engagements between Amazon Web Services (AWS) and customer CFOs representing an extensive range of industries.
Tags : 
global expansion, mergers and acquisitions, business agility, real estate, tax exposure, talent acquisition, operations investment
    
Amazon Web Services
Published By: CA Technologies     Published Date: Sep 25, 2017
This rapidly evolving digital world is also redefining the relationship between your business and your customers, who now expect a convenient, interactive experience from their preferred brands. Security is also a concern. Risk is rising, as both the enterprise and its customers exchange a growing amount of sensitive data.
Tags : 
integration, developers, open enterprise, api, business, ca technologies
    
CA Technologies
Start   Previous   1 2 3    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.