ccr

Results 1 - 24 of 24Sort Results By: Published Date | Title | Company Name
Published By: CA Technologies EMEA     Published Date: May 23, 2018
Nell'economia digitale, le API (Application Programming Interfaces) sono essenziali per concretizzare rapidamente le idee e approfittare delle nuove opportunità di business. Rappresentano la chiave per la digital transformation, consentendo alle aziende di offrire una customer experience eccezionale, creare nuovi flussi di ricavi e permettere a dipendenti, partner, app e device di accedere ai dati ovunque e in qualsiasi momento.Le API non sono necessariamente una nuova tecnologia, ma nel mondo digitale di oggi hanno assunto una particolare rilevanza in ogni aspetto del business. Questo ha accresciuto l'esigenza di implementare una soluzione di API Management realmente efficace. Ma quali sono le caratteristiche di una soluzione efficace?
Tags : 
    
CA Technologies EMEA
Published By: DocuSign     Published Date: Apr 24, 2018
"With every eSignature vendor claiming they are “eiDAS compliant”, you should equip yourself with the right level of knowledge to filter through what is right for your business. Download the whitepaper to learn why it is important choose an eSignature service provider that: • Delivers all the various e-signature types defined by eIDAS: Simple, Advanced and Qualified • Is independently accredited against European Commission-recommended technical standards • Offers international reach and experience to accommodate your business"
Tags : 
    
DocuSign
Published By: CA Technologies     Published Date: Nov 07, 2014
Les activités IT et métier sont concernées par de nombreuses tendances : l’adoption du Cloud, l’accroissement de la mobilité, l’essor des médias sociaux et l’augmentation des flux d’informations circulant au sein de toute l’entreprise. Le concept de périmètre réseau n’a plus de sens. En effet, l’IT doit aujourd’hui composer avec des identités hautement distribuées sur l’ensemble de l’environnement métier et provenant de nombreuses sources, telles que des applications, des systèmes, des médias sociaux, etc. Les employés et les clients mobiles sont, par ailleurs, en train de changer profondément l’activité et de redéfinir le défi consistant à fournir rapidement des applications sécurisées à une population d’utilisateurs en constante évolution. À chaque défi son opportunité. L’identité remplace désormais le périmètre réseau, et seules les entreprises qui ont compris cette évolution sont en mesure de dynamiser et de protéger leur activité.
Tags : 
business trends, cloud adoption, sociial media, social mobility, security in the cloud, business security, wireless, business technology, cloud computing, research
    
CA Technologies
Published By: CA Technologies EMEA     Published Date: Oct 18, 2017
Au cours de ces dernières années, la gestion des accès à forts privilèges, un processus englobant différentes fonctionnalités de contrôle, de supervision et d’audit visant à réduire les risques associés aux utilisateurs, aux comptes et aux identifiants à forts privilèges, est devenue une priorité majeure pour les entreprises et organisations de tous secteurs. Cet intérêt accru est motivé par différents facteurs.
Tags : 
identification à forts privilèges, activités à forts privilèges, sécurité, entreprise, violations de données, menaces internes, infrastructure de l’entreprise, privileged user access, privileged access management, security, privileged credentials, secure it
    
CA Technologies EMEA
Published By: LogMeIn     Published Date: Mar 12, 2018
La prolifération de nouveaux appareils, la montée des préoccupations de sécurité en raison de l’augmentation de la cybercriminalité, ainsi que le nombre d’utilisateurs avertis qui veulent un service clientèle accessible en permanence sont des phénomènes qui contribuent tous à accroître la complexité du paysage des services informatiques. Heureusement, il existe une solution pour dénouer le problème. Selon une nouvelle étude menée par IDG Research et sponsorisée par LogMeIn auprès de professionnels de l’informatique en Europe, les outils d’assistance informatique à distance constituent la solution idéale pour soulager les services d’assistance informatique sous-dimensionnés en personnel.
Tags : 
complexite, croissante, l'informatique, l'assistance, indispensable, europe
    
LogMeIn
Published By: LogMeIn EMEA     Published Date: Mar 22, 2018
La prolifération de nouveaux appareils, la montée des préoccupations de sécurité en raison de l’augmentation de la cybercriminalité, ainsi que le nombre d’utilisateurs avertis qui veulent un service clientèle accessible en permanence sont des phénomènes qui contribuent tous à accroître la complexité du paysage des services informatiques. Heureusement, il existe une solution pour dénouer le problème. Selon une nouvelle étude menée par IDG Research et sponsorisée par LogMeIn auprès de professionnels de l’informatique en Europe, les outils d’assistance informatique à distance constituent la solution idéale pour soulager les services d’assistance informatique sous-dimensionnés en personnel.
Tags : 
    
LogMeIn EMEA
Published By: Infor     Published Date: Mar 07, 2017
La période actuelle est à la fois extrêmement complexe et source d’opportunité pour les directeurs financiers dans les moyennes et grandes entreprises. Face à une demande accrue d’informations, les directions financières jouent un rôle de plus en plus stratégique dans les choix commerciaux, ce qui stimule et épuise en même temps les directeurs financiers, les contrôleurs et leurs équipes.
Tags : 
    
Infor
Published By: G Suite     Published Date: Jun 06, 2016
Download this white paper to learn how Dan McCrae, director of IT service delivery division, National Oceanic and Atmospheric Administration (NOAA), used Google Apps to keep his project on track and to collaborate with his teammates.
Tags : 
    
G Suite
Published By: IBM Business Analytics     Published Date: Jun 03, 2011
With this book, you find out how a unified CCR process gives leaders timely and accurate insights to make smarter decisions. You also discover features of the ideal CCR solution and learn what to look for in the selection process. And, you come to understand the close/consolidate/report process and how integrated CCR solutions enhance internal controls and provide better insight into business performance. Find out how a unified CCR process gives leaders timely and accurate insights to make smarter decisions. Download this book to discover features of ideal CCR solution and learn what to consider in the selection process.
Tags : 
ccr, business insight, business performance, business decison making, ccr, dummies book
    
IBM Business Analytics
Published By: IBM     Published Date: Feb 21, 2013
With this book, you find out how a unified CCR process gives leaders timely and accurate insights to make smarter decisions. You also discover features of the ideal CCR solution and learn what to look for in the selection process.
Tags : 
close, consolidate, report, ibm, ccr, business performance, finance, xbrl, regulatory reports, statutory, corporate governance
    
IBM
Published By: Citrix Online     Published Date: Apr 28, 2009
COCC, a leading provider of technology services for community banks and credit unions, needed a way to reach distant customers without increasing travel costs. That's when COCC decided to try online meeting technology.
Tags : 
collaboration, mobile workforce, mobile workers, expense, travel, citrix online, citrix, collaborative, gotomeeting, cocc, online meeting, webcast, productivity
    
Citrix Online
Published By: nettime solutions     Published Date: Mar 04, 2014
This whitepaper covers the best practices, methods and standards for time off accruals that are affecting PTO policies and will explain how a customizable, automated time and attendance platform can provide workforce analytics and labor management solutions.
Tags : 
nettime solutions, accruals, improving time, time off accruals, enhance pto policies, pto policies, automated time, attendance platform, stratustime, workforce analytics, labor management, management solutions, pto banks, flexibility, privacy, traditional pto, bank-type pto
    
nettime solutions
Published By: nettime solutions     Published Date: Mar 04, 2014
This webinar covers the best practices, methods and standards for time off accruals that are enhancing PTO policies nationwide, while showing you how a customizable automated time and attendance platform can provide workforce analytics and labor management solutions — all from your web-browser.
Tags : 
nettime solutions, accruals, improving time, time off accruals, enhance pto policies, pto policies, automated time, attendance platform, stratustime, workforce analytics, labor management, management solutions, pto banks, flexibility, privacy, traditional pto, bank-type pto
    
nettime solutions
Published By: Workday     Published Date: Nov 03, 2017
The CIPD is the professional body for HR and people development. The not-for-profit organisation champions better work and working lives and has been setting the benchmark for excellence in people and organisation development for more than 100 years. It has more than 140,000 members across the world, provides thought leadership through independent research on the world of work, and offers professional training and accreditation for those working in HR and learning and development.
Tags : 
    
Workday
Published By: IBM     Published Date: Feb 12, 2014
Use this book to understand why integrating and unifying your closing, consolidating, and reporting process is critical. Learn about re-engineering your point solution approach to these activities by investing in integrated solutions. Achieve automation and enhance your ability to manage internal controls, reduce risks, and efficiently create consolidated financial statements and regulatory reports (including XBRL).
Tags : 
ibm, closing, consolidation, reporting, ccr, close management, financial results, disclosure management, integration, ccr solution, business analytics, data integrity, finance
    
IBM
Published By: HP Virtualization     Published Date: Mar 22, 2010
This IDC White Paper presents a detailed analysis of the value proposition associated with moving across different virtualization adoption maturity levels. The following figures and tables compare business value accruing from the move from an unvirtualized environment to a virtualized environment or from a basic virtualization scenario to an advanced virtualization scenario.
Tags : 
virtualization, integrated solutions, data integration
    
HP Virtualization
Published By: Cisco     Published Date: Dec 21, 2016
This study showed that as companies adopt cloud strategies for sourcing and building IT services, they are both expecting and achieving significant gains in business key performance indicators (KPIs) including revenue growth, strategic IT budget allocation, IT costs, quicker time to provision, and increased ability to meet SLAs. Further, our study showed that as businesses increased their orientation to cloud, these KPI benefits accelerated. IDC has identified five stages of cloud maturity: ad hoc, opportunistic, repeatable, managed, and optimized (in increasing maturity), and while there are immediate benefits from moving even from ad hoc to opportunistic, the benefits accrue and grow as you move up the adoption curve. Organizations studied are realizing $1.6 million in additional revenue and $1.2 million in reduced costs per cloud application.
Tags : 
    
Cisco
Published By: SugarCRM     Published Date: Apr 08, 2014
CRM has long been seen as a must-have sales tool. However, much of the value of traditional CRM accrues to managers, not the reps that use them daily. Learn how CRM designed for the individual benefits the entire sales organization from increased data quality to more predictable revenue pipelines.
Tags : 
crm best practices, crm software, customer data management, customer experience & engagement, customer relationship management (crm), lead generation, lead management, lead nurturing, lead quality, lead scoring, sales automation, sales channels, sales force automation, sales management
    
SugarCRM
Published By: netVigilance     Published Date: May 30, 2007
Bonded Sender, the world’s leading email accreditation program, increases inbox delivery at more that 35,000 domains, averaging a 21 percent improvement across accepting ISPs according to a recent Return Path study. For marketers, email deliverability translates directly to the bottom line.
Tags : 
deliverability, deliverable, undeliverable, spam filter, filter, blocking, filtering, email marketing, email content, inbox, return path, returnpath, whitelist, whitelisting, white list, sender reputation, sender score, senderscore
    
netVigilance
Published By: LANDesk     Published Date: Feb 12, 2007
This white paper examines some of the business benefits and potential cost savings that can accrue to an organization that implements a BPM solution.
Tags : 
it management, productivity, business process management, bpm, return on investment, roi, bpa, business process automation, it spending, cost control, landesk, enterprise applications
    
LANDesk
Published By: ProofSpace     Published Date: Jul 31, 2007
This paper details the processes by which ProofMark tags electronic records with a self-validating cryptographic seal that acts as a "tamper indicator" based on a true and provable time-reference datum.  With this it is able to provide instantaneous and irrefutable proof of authenticity, no matter where the data resides or who has controlled it.
Tags : 
proofspace, proofmark, proofspace, proofmark, signing key vulnerability, trustworthy time, authenticated time stamps, time existence of data, electronic postmark, asymmetric key cryptography, public key cryptography, time stamp, timestamp, time and data stamping, file authentication, x9.95, accredited standards committee x9, x9.95-compliant, transient key technology, timestamp
    
ProofSpace
Published By: ProofSpace     Published Date: Sep 10, 2007
Read this paper and learn the principles that are prerequisites to enforceable electronic agreements as required by existing legal standards and electronic signature legislation.  This paper will also specify sixteen measurement criteria that can be used as metrics to assess whether the architecture of an electronic transaction will meet the requirements of admissibility.
Tags : 
proofspace, proofmark, signing key vulnerability, trustworthy time, authenticated time stamps, time existence of data, electronic postmark, asymmetric key cryptography, public key cryptography, time stamp, timestamp, time and data stamping, file authentication, x9.95, accredited standards committee x9, x9.95-compliant, transient key technology, electronic signatures, fda 21 cfr part 11, u.s. e-sign act
    
ProofSpace
Published By: Real Time Logic     Published Date: Jul 29, 2011
This paper discusses the Information Assurance and why it is important for operators of IT systems and networks.
Tags : 
information assurance, ditscap, diacap, computer security, cissp, poa&m, certification and accreditation, 8500, dod 8500
    
Real Time Logic
Search      

Add Research

Get your company's research in the hands of targeted business professionals.