best practices

Results 426 - 450 of 2614Sort Results By: Published Date | Title | Company Name
Published By: SuccessFactors, an SAP Company     Published Date: Jun 18, 2015
Download this white paper to learn which best practices you should you follow to help strike the right balance and How other leading organizations have designed effective review forms and processes.
Tags : 
    
SuccessFactors, an SAP Company
Published By: SuccessFactors, an SAP Company     Published Date: Jun 18, 2015
In this white paper you will find: • Five ways to create a high-performing global culture • Six ways to dial in your talent strategy • Five tactics for compensation managers to shift the business • Six moves for recruiting mangers to build a talent powerhouse • Five ways learning managers can make a strategic contribution
Tags : 
    
SuccessFactors, an SAP Company
Published By: SuccessFactors, an SAP Company     Published Date: Jun 18, 2015
Read this white paper for five tips that will make the most of your social recruiting efforts and get better results.
Tags : 
    
SuccessFactors, an SAP Company
Published By: SuccessFactors, an SAP Company     Published Date: Jun 18, 2015
Workforce analytics solutions are the key to answering such questions and getting the metrics and insights needed to make informed HR decisions and create actionable workforce plans. This paper explores the business case for investing in workforce analytics. It focuses on how cloud-based solutions hide complexity associated with HR data, as well as deliver best practices, minimize maintenance costs, and provide quick time to value.
Tags : 
    
SuccessFactors, an SAP Company
Published By: Dynatrace     Published Date: May 20, 2016
How to Modernize Your eCommerce Analytics and Improve Customer Experience: 6 best practices of digital performance masters If you are responsible for digital performance, this eBook is your guide for: - Maximizing revenue and brand loyalty - Launching new initiatives wtih confidence - Building engaging digital experiences faster
Tags : 
dynatrace, ecommerce, ecommerce analytics, digital performance, customer experience, digital, software development, knowledge management, enterprise applications
    
Dynatrace
Published By: Dynatrace     Published Date: May 24, 2016
This guide, compiled from numerous client interviews, best practices and real-life project experiences, will: - Walk you through tools like the Gartner Magic Quadrant - Provide organized criteria to evaluate vendor capabilities in detail - Define why these criteria matter - Give you an example of the typical evaluation process and timeline for an Application Performance Management buyer
Tags : 
dynatrace, vendor selection, gartner magic quadrant, application performance management, enterprise applications, business technology
    
Dynatrace
Published By: Oracle Commerce Cloud     Published Date: Feb 05, 2016
This best practice is enabled by analytical insights, social collaboration, and real-time access to information on any device, so you can better manage sales performance, motivate sales people and mentor best practices, while ensuring that incentive compensation plans supports your strategy.
Tags : 
    
Oracle Commerce Cloud
Published By: Akamai Technologies     Published Date: Mar 10, 2016
When your Internet-facing network comes under DDoS attack, does your entire organization panic – or does everyone know exactly what to do? Read this whitepaper to learn how to protect network assets, websites, and web applications against DDoS attacks and best practices for adding DDoS mitigation to a corporate incident response plan.
Tags : 
ddos mitigation, best practices, akamai technology, cyberdefense, cyber security
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Mar 10, 2016
The web application firewall (WAF) is among the most complex security technologies on the market today. The complexity of managing a WAF includes a pre-defined list of rules to identify thousands of potential exploits, intelligence about new attack vectors, and identifying malicious HTTP requests from legitimate HTTP traffic. Read this white paper to learn how to combine attack detection with threat intelligence using our cloud platform and managed security services to better protect your web applications.
Tags : 
akamai technology, web application security, http, best practices, security
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Mar 10, 2016
This quick read highlights the top five realities and challenges faced by global manufacturers.
Tags : 
manufacturing, akamai technology, collaboration, best practices, electronics, business technology
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Mar 10, 2016
Read this paper to learn how to overcome common challenges seen in web-based application delivery.
Tags : 
internet, digital manufacturer, akamai technology, best practices, tips
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Mar 15, 2016
Many industry experts advise automotive companies to embrace digital transformation. At the heart of that mandate is the need to satisfy rising customer expectations for fast, secure, always-on services delivered seamlessly across all channels and devices. Read the seven top considerations as you embrace digital transformation.
Tags : 
automotive, digital transformation, customer relations, best practices, industry optimization
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Mar 15, 2016
Cybercriminals continue to evolve their tactics with ever-growing cyberattack sizes and new attack methods, which has spiked a demand for DDoS mitigation services. However, it is often difficult for companies to assess, evaluate, and differentiate DDoS mitigation service providers from one another. Read the four critical criteria you should use to evaluate providers before selecting one.
Tags : 
web security, best practices, mitigation services, network management, automotive, security
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Mar 15, 2016
HIMSS Analytics, in partnership with Akamai, recently conducted a survey of U.S. hospitals to understand the current state of web security in healthcare as well as what plans are in place to improve preparedness. The results raise some concerns that despite greater consciousness of the increased risk to healthcare data security, many hospitals are still vulnerable to a wide range of cyberattacks. Read this survey to learn about critical weaknesses in hospital web security.
Tags : 
web security, healthcare, network management, security, cyberattack prevention, best practices
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Mar 15, 2016
The globalization of the medical device industry has delivered substantial business benefits, but it has also presented certain problems that can make the realization of those opportunities challenging. Learn about a comprehensive global collaboration solution that addresses and overcomes these obstacles.
Tags : 
medical device industry, global network, employee management, best practices, internet performance, internet security
    
Akamai Technologies
Published By: LifeLock     Published Date: May 10, 2016
A data breach can happen at any time. Be ready to respond. Download now and learn the best practices for handling a company data breach. See how you can protect your organization!
Tags : 
    
LifeLock
Published By: Staples Business Advantage     Published Date: Jun 01, 2017
Watch this on-demand webinar to hear senior research director Patrick Connaughton from the Hackett Group review the latest research on supplier segmentation and stratification strategies. You’ll also get practical advice on implementing these best practices at your organization.
Tags : 
procurement, procurement strategy, purchasing, vendor selection, supply chain, supplier management, strategic sourcing, vendor management, srm, supplier relationship management, business technology
    
Staples Business Advantage
Published By: Genesys     Published Date: May 10, 2016
Integrating Phone Self-Service Into the Omnichannel Customer Experience
Tags : 
genesys, ovum, ivr, modern, predictive, self service, customer experience, omnichannel, enterprise applications, business technology
    
Genesys
Published By: Genesys     Published Date: Aug 09, 2016
This paper will help you get a high-level view of the modern contact center, including: • The rapidly changing needs and expectations of customers today • Details of the benefits of integrating CRM and cloud contact center systems • Best practices when integrating with a cloud contact center
Tags : 
crm, contact center, customer experience, genesys, customer expectations, cloud contact center
    
Genesys
Published By: Hewlett Packard Enterprise     Published Date: Oct 11, 2017
Is it time to replace aging servers or bolster your existing infrastructure? There’s a lot to consider, but industry best practices can guide your research and help you select the right servers to run your small or midsize business.
Tags : 
    
Hewlett Packard Enterprise
Published By: Evariant     Published Date: Nov 20, 2018
As the healthcare landscape continues to move toward a customer-centric approach, there’s a lot healthcare can learn from retail. More specifically, lessons from retail call centers offer the healthcare sector best practices to provide better personalization in their engagements with consumers and patients – before and after clinical encounters. This guide explores three ways retail call centers provide experiences that healthcare leaders can incorporate to provide the personalization needed to impact consumers in today’s evolving healthcare marketing landscape.
Tags : 
patient engagement, call center, healthcare crm, patient experience, patient acquisition, healthcare transformation
    
Evariant
Published By: Progress     Published Date: Oct 09, 2017
Tailoring experiences for customers is critical to make your business standout. Customization works well for organizations that want to enhance their standard customer experience but don’t have the necessary tools or strategy for in-depth personalization. Learn about the 5 best practices for customizing websites and the 5 biggest challenges marketers face while customizing their websites.
Tags : 
    
Progress
Published By: Progress     Published Date: Oct 09, 2017
"The customer experience is incredibly important to business success and is often tied to customer engagement, retention rates, revenue, purchase frequency and overall loyalty. Today, the customer journey is incredibly complex, with everything from geographic location to data quality influencing the customer experience. As a result, brands may not be making the most of their customer experiences. However, with a mix of new technology combined with best practices, companies can regain control of the customer journey and create memorable experiences for their customers. "
Tags : 
    
Progress
Published By: CrowdStrike     Published Date: Feb 01, 2017
Once a “consumer-only” problem, Ransomware now has an established business case for profitability, and that’s driving criminals to expand their operations and hunt for more lucrative prey. As a result, commercial enterprises and other large organizations are increasingly in the crosshairs. Consider these facts: ? Ransomware attacks doubled in 2015 ? The number of new ransomware variants increased 17% in Q1 2016 ? The FBI estimates that ransomware will net criminals $1 billion in 2016 This white paper dives into the inner workings of ransomware, its perpetrators and how they are evolving to maximize profits. You’ll also learn how companies are fighting back, and review best practices for protecting your organization from becoming another victim of electronic extortion.
Tags : 
    
CrowdStrike
Published By: CrowdStrike     Published Date: Feb 01, 2017
This year’s Cyber Intrusion Services Casebook focuses on in-depth digital forensics, incident response (IR) and remediation services performed on behalf of actual CrowdStrike clients. Real-life examples drawn from notable CrowdStrike Services IR engagements in 2016 — including the now-infamous hack of the Democratic National Committee (DNC) —are covered with an emphasis on best practices organizations can follow to identify and eject attackers before a devastating breach occurs. Download this report to learn: • How CrowdStrike’s Falcon OverWatch and professional services teams discovered and attributed the DNC intrusion to nation-state threat actors FANCY BEAR and COZY BEAR • The gaps in security processes and planning that your organization can address now to stop the next breach • The specific tactics, techniques and procedures (TTPs) a range of nation-state and eCrime adversaries used to penetrate their victims’ defenses, and how they attempted to cover their tracks
Tags : 
    
CrowdStrike
Start   Previous    11 12 13 14 15 16 17 18 19 20 21 22 23 24 25    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.

We use technologies such as cookies to understand how you use our site and to provide a better user experience. This includes personalizing content, using analytics and improving site operations. We may share your information about your use of our site with third parties in accordance with our Privacy Policy. You can change your cookie settings as described here at any time, but parts of our site may not function correctly without them. By continuing to use our site, you agree that we can save cookies on your device, unless you have disabled cookies.
I Accept