leave

Results 1 - 25 of 205Sort Results By: Published Date | Title | Company Name
Published By: Octopai     Published Date: Sep 01, 2018
For many BI professionals, every task can feel like MISSION IMPOSSIBLE. All the manual mapping required to sort out inconsistencies in data and the lack of tools to simplify and shorten the process of finding and understanding data leaves BI groups frustrated and slows down the business. This whitepaper examines the revolutionary impact of automation on the cumbersome manual processes that have been dragging BI down for so long. • Data correction vs process correction • Root-cause analysis with data lineage: reverse-tracing the data flow • Data quality rules and data controls • Automated data lineage mapping
Tags : 
    
Octopai
Published By: Dell EMC EMEA     Published Date: Mar 05, 2019
Hardware technology doesn’t last forever. It has a lifecycle, a measurable beginning and end to its productivity and value. IT is tasked with optimizing the PC lifecycle while driving strategic breakthroughs for their organization. However, the high cost and complexity of PC management leaves IT little time for innovation. We offer flexible financing options that help assure IT will always have everything they need, when they need it, to keep end users engaged and productive. Learn more about Dell solutions powered by Intel®.
Tags : 
    
Dell EMC EMEA
Published By: Trustpilot     Published Date: Oct 26, 2018
If you’ve ever ordered your morning coffee and felt uninspired by the request to participate in an online survey or leave a social review regarding your experience, you probably didn’t have a particularly noteworthy experience. If you’re willing to take time out of your day to leave online feedback, it’s usually because you want to warn people about a bad encounter, or to help them make a better buying decision. Think the online review phenomena might sometimes have ulterior motives? Read on to see what we uncovered.
Tags : 
    
Trustpilot
Published By: Epicor Software Corporation     Published Date: Jan 09, 2019
To Keep Pace With Your Customers and Competitors, It’s Time to Leave Your Legacy Software Behind. Legacy enterprise resource planning (ERP) systems struggle to keep up with the modern pace of business, and they fail to meet the changing needs of your workforce. Can your leaders quickly find and analyze vital data? Are your employees’ tasks and processes straightforward and efficient? Does your ERP software make it easier to support growth? See how manufacturers upgrading to the latest ERP software from Epicor transform their business by delivering the visibility, efficiency, and productivity essential for sustained growth.
Tags : 
    
Epicor Software Corporation
Published By: Uberall     Published Date: Jan 24, 2019
Your clients look to you to be the expert, to help them drive more foot traffic to their businesses. This isn’t always the easiest path to navigate. The sheer number of location marketing options out there can leave you and your clients tangled in a hopeless maze of features, bells and whistles. Many companies will try to bombard you with features, metrics, and by listing in every obscure channel and app—to the point where you feel may feel overwhelmed. It’s difficult to know what to recommend.
Tags : 
    
Uberall
Published By: Coyote Point Systems     Published Date: Aug 25, 2010
Application Delivery Controllers understand applications and optimize server performance - offloading compute-intensive tasks that prevent servers from quickly delivering applications. Learn how ADCs have taken over where load balancers left off.
Tags : 
coyote point, systems, slbs, server load balancers, adc, adcs, ssl, load balancing, load balancer, application delivery, application delivery controller, application delivery network, ssl acceleration, ssl offloading, server offload, server offloading, server acceleration, content switch, content switching.
    
Coyote Point Systems
Published By: Canon Solutions America     Published Date: Feb 28, 2019
Limiting access to confidential client files is vital. But choosing the wrong document security solution can overwhelm your staff (and your IT department) and leave your data vulnerable. Learn five important features a security solution should offer.
Tags : 
legal document management, best legal document management systems, law firm data breach, law firm security breach, law firm data security, legal document automation software
    
Canon Solutions America
Published By: Advertise.com     Published Date: Nov 15, 2010
According to The Fireclick Index, a comprehensive web analytics solution, over 96% of the people who visit a website leave without completing any action, like a purchase.
Tags : 
advertise.com, sales, boost, remarketing, analytics, web analytics, abandonment
    
Advertise.com
Published By: StoryDesk     Published Date: Aug 17, 2011
Take advantage of the iPad's interactivity and mobility to wow your clients and leave an impression that sets you apart from the competition.
Tags : 
ipad, sales tool, apple ipad, ipads, presentation, presentation tools
    
StoryDesk
Published By: Freshdesk     Published Date: Aug 15, 2016
While email is perfect for one-to-one communication, it doesn't work half as well for managing many-to-many conversations like a helpdesk would. When businesses use email to support customers, they leave room for conversations to get lost, ignored or forgotten. Not to mention, the lack of accountability and metrics to gauge the process and figure out what's working and what's not working. In this whitepaper, we discuss, for those businesses, the advantages a helpdesk has over email and lay out just how easy it can be to win customer love.
Tags : 
    
Freshdesk
Published By: OpenText     Published Date: Mar 02, 2017
Leave it to the experts to manage your EDI for you, so you can focus on your business. Read about the benefits of B2B managed services in this white paper.
Tags : 
b2b integration, document exchange, edi, erp, b2b managed services
    
OpenText
Published By: Rosetta Stone     Published Date: Jan 24, 2018
In the world of product development, we spend months – sometimes years – designing, developing, and testing new products. We spend thousands of hours preparing for their launch. We leave no stone unturned as we get the product ready to survive – and thrive – in the hands of customers. In many ways, it feels like we are a massive group of expectant parents getting ready for the birth of what will become our own child.
Tags : 
    
Rosetta Stone
Published By: HotSchedules     Published Date: Jul 28, 2017
If you work in the service or hospitality industry, you know the business impacts of new legislation are a constant concern. Laws regulating wages, overtime and paid sick leave can affect the bottom line if your business doesn’t comply, and now a new beast is rearing its head. The Fight for Fifteen movement is gaining momentum, pushing for a $15 minimum wage and inspiring lawmakers to explore new legislation designed to improve labor scheduling in restaurants, and in turn, the lives of employees. What does that mean for your business? This eBook will break down what you need to know, from the impacts on owner-operators to ways you can get in front of the issue.
Tags : 
predictive scheduling, regulation, minimum wage, employee satisfaction
    
HotSchedules
Published By: FICO     Published Date: May 11, 2017
Today it's easy for customers to leave, and they have fewer reasons to stay. In saturated telecom markets, competitors offer similarly high levels of coverage and service. Years of price-based competition have left little room for differentiation and margins are stretched thin.
Tags : 
customer management, finance, finance management, risk, infrastructure
    
FICO
Published By: Infosys     Published Date: May 30, 2018
In the wake of data hacks and privacy concerns, enterprises are working extra hard to make sure they secure customer data from external threats. But what about securing data internally? Organizations unknowingly leave a big security hole in their own systems when they fail to have structured internal processes to handle access requests for employees, which could have disastrous implications for data security. A leading US bank sought to move its internal applications to a secure system for a standard and consistent access rights experience. See how Infosys helped and the five key takeaways from the project.
Tags : 
internal, applications, data, hacks, privacy, enterprises
    
Infosys
Published By: Oracle     Published Date: Aug 02, 2018
Backup is one thing, recovery is everything. You no doubt appreciate how mission-critical your Oracle database is to your organization's success. But what if you experience an outage or cyberattack? Can you be confident you can quickly recover all of your data? Traditional backup solutions leave data exposed to loss and your business at risk. Oracle’s Zero Data Loss Recovery Appliance eliminates exposure and saves you time, effort, and the stress of retrieving data. Discover how our customers are recovering their data without the drama.
Tags : 
    
Oracle
Published By: Dell EMC EMEA     Published Date: Nov 22, 2018
Hardware technology doesn’t last forever. It has a lifecycle, a measurable beginning and end to its productivity and value. IT is tasked with optimizing the PC lifecycle while driving strategic breakthroughs for their organization. However, the high cost and complexity of PC management leaves IT little time for innovation. We offer flexible financing options that help assure IT will always have everything they need, when they need it, to keep end users engaged and productive. Learn more about Dell solutions powered by Intel®.
Tags : 
    
Dell EMC EMEA
Published By: Dell EMC EMEA     Published Date: Nov 22, 2018
Hardware technology doesn’t last forever. It has a lifecycle, a measurable beginning and end to its productivity and value. IT is tasked with optimizing the PC lifecycle while driving strategic breakthroughs for their organization. However, the high cost and complexity of PC management leaves IT little time for innovation. We offer flexible financing options that help assure IT will always have everything they need, when they need it, to keep end users engaged and productive. Learn more about Dell solutions powered by Intel®.
Tags : 
    
Dell EMC EMEA
Published By: Dell EMC EMEA     Published Date: Nov 22, 2018
Hardware technology doesn’t last forever. It has a lifecycle, a measurable beginning and end to its productivity and value. IT is tasked with optimizing the PC lifecycle while driving strategic breakthroughs for their organization. However, the high cost and complexity of PC management leaves IT little time for innovation. We offer flexible financing options that help assure IT will always have everything they need, when they need it, to keep end users engaged and productive. Learn more about Dell solutions powered by Intel®.
Tags : 
    
Dell EMC EMEA
Published By: Dell EMC EMEA     Published Date: Nov 22, 2018
Hardware technology doesn’t last forever. It has a lifecycle, a measurable beginning and end to its productivity and value. IT is tasked with optimizing the PC lifecycle while driving strategic breakthroughs for their organization. However, the high cost and complexity of PC management leaves IT little time for innovation. We offer flexible financing options that help assure IT will always have everything they need, when they need it, to keep end users engaged and productive. Learn more about Dell solutions powered by Intel®.
Tags : 
    
Dell EMC EMEA
Published By: Akamai Technologies     Published Date: Jun 14, 2018
"High-profile cyber attacks seem to occur almost daily in recent years. Clearly security threats are persistent and growing. While many organizations have adopted a defense-in-depth strategy — utilizing anti-virus protection, firewalls, intruder prevention systems, sandboxing, and secure web gateways — most IT departments still fail to explicitly protect the Domain Name System (DNS). This oversight leaves a massive gap in network defenses. But this infrastructure doesn’t have to be a vulnerability. Solutions that protect recursive DNS (rDNS) can serve as a simple and effective security control point for end users and devices on your network. Read this white paper to learn more about how rDNS is putting your enterprise at risk, why you need a security checkpoint at this infrastructural layer, how rDNS security solutio Read 5 Reasons Enterprises Need a New Access Model to learn about the fundamental changes enterprises need to make when providing access to their private applications.
Tags : 
rdns, dns, anti-virus, security, network defense
    
Akamai Technologies
Published By: Zendesk Ltd     Published Date: Sep 11, 2018
Customers have caught on that support interactions are getting better. When they reach out, they’ve come to expect an instant response that says “we’re here for you”. When they want information, it’s expected to be accurate, up-to-date, and easily accessible. Essentially, they come to expect efficiency during support interactions. As a result, businesses are becoming more cognizant of their self- service offerings. Customers want to be left feeling empowered; it’s even better when they can do so on their own. Self-service saves time for agents, cuts down on organizational costs, and leaves the customer with a positive outlook of a brand. This eBook delves into how AI can enhance your customer self-service offerings with automatically-generated knowledge bases, content cues for your service agents, and chatbots.
Tags : 
customer service, customer experience, artificial intelligence, chatbots, self-service
    
Zendesk Ltd
Published By: Venafi     Published Date: Aug 07, 2015
It was recently found that most Global 2000 organisations have failed to completely remediate Heartbleed. This leaves these organisations vulnerable to cyberattacks, future brand damage, and intellectual property loss.
Tags : 
cyberattacks, security, cybercriminals, security application
    
Venafi
Published By: Adobe     Published Date: Nov 07, 2013
Worldwide social network ad spending is expected to reach nearly $9 billion in 2013, a 33% increase over 2012. While Facebook will maintain a significant share of the 2013 total ($5.48 billion), that leaves $3.5 billion to be spent on fast-rising Twitter, Chinese social networks, social games, LinkedIn and other sites.
Tags : 
adobe, emarketer, worldwide social network ad spending, advertising spending, ad spending, incorporated ad spending, social networks, ad revenues, ad targeting, target audiences, social media audience, spend forecast, it management
    
Adobe
Published By: LifeWorks     Published Date: Dec 04, 2018
For many years, an organization’s approach to employee mental well- being was simply “leave your problems at the door”. But those days are gone. Not only are mental and emotional health issues losing their stigma, but businesses are realizing that failure to understand and fulfill employees’ total well-being requirements, such a physical and financial well-being, ultimately leads to reduced productivity and output.
Tags : 
    
LifeWorks
Start   Previous   1 2 3 4 5 6 7 8 9    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.

We use technologies such as cookies to understand how you use our site and to provide a better user experience. This includes personalizing content, using analytics and improving site operations. We may share your information about your use of our site with third parties in accordance with our Privacy Policy. You can change your cookie settings as described here at any time, but parts of our site may not function correctly without them. By continuing to use our site, you agree that we can save cookies on your device, unless you have disabled cookies.
I Accept