RecruitingBlogscom

Follow Us:

 

adaptive

Results 51 - 75 of 168Sort Results By: Published Date | Title | Company Name
Published By: Adaptive Planning     Published Date: Apr 25, 2012
In describing what forecasters are trying to achieve, Saffo outlines six simple, commonsense rules that smart managers should observe as they embark on a voyage of discovery with professional forecasters: Map a cone of uncertainty, look for the S curve, embrace the things that don't fit, hold strong opinions weakly, look back twice as far as you look forward, and know when not to make a forecast.
Tags : 
adaptive, business, finance, forecasting, business planning, budget
    
Adaptive Planning
Published By: Adaptive Planning     Published Date: Apr 25, 2012
In 2006 the world economy was booming, partly on the back of triple-A investment innovations. Then, suddenly, the boom ended. What fascinates the authors is the fact that almost no one saw the 2008 economic crisis coming. In this article, the authors come to terms with the reality that, in economics and business, accurate forecasts aren't possible. Therefore, they say, managers need to develop a different attitude about the future.
Tags : 
adaptive, business, finance, forecasting, business planning, budget
    
Adaptive Planning
Published By: IBM     Published Date: Jul 08, 2016
In our 21-criteria evaluation of the dynamic case management (DCM) market, we identified the 14 most significant software vendors — Appian, bpm’online, Column Technologies, DST Systems, Eccentex, IBM, Isis Papyrus, Lexmark Enterprise Software, MicroPact, Newgen Software, OnBase by Hyland, OpenText, Pegasystems, and TIBCO Software — and researched, analyzed, and scored them. The evaluation focused on providers’ adaptive, analytics, and mobile features, all critical to helping enterprises tackle increasing volumes of varied and unstructured work. This report helps enterprise architecture (EA) professionals select the best providers to meet their unique needs.
Tags : 
ibm, forrester, forrester wave, dynamic case management, dcm, networking, software development, enterprise applications
    
IBM
Published By: CA WA 2     Published Date: Oct 01, 2008
Data Center Automation enables you to manage change processes, ensure configuration compliance and dynamically provision servers and applications based on business need. By controlling complexity and automating processes in the data center, your data center becomes more adaptive and agile. Effective Data Center Automation lets you leverage virtualization, manage capacity, and reduce costs and also helps reduce energy usage and waste.
Tags : 
it automation, ca wa 2, ca wa, data center automation, datacenter automation, configuration
    
CA WA 2
Published By: MobileIron     Published Date: May 07, 2018
The types of threats targeting enterprises are vastly different than they were just a couple of decades ago. Today, successful enterprise attacks are rarely executed by the “lone wolf” hacker and instead come from highly sophisticated and professional cybercriminal networks. These networks are driven by the profitability of ransomware and the sale of confidential consumer data, intellectual property, government intelligence, and other valuable data. While traditional PC-based antivirus solutions can offer some protection against these attacks, organizations need highly adaptive and much faster mobile threat defense (MTD) for enterprise devices.
Tags : 
mobile, threat, detection, machine, ransomware, confidential, networks
    
MobileIron
Published By: MobileIron     Published Date: Aug 20, 2018
The types of threats targeting enterprises are vastly different than they were just a couple of decades ago. Today, successful enterprise attacks are rarely executed by the “lone wolf” hacker and instead come from highly sophisticated and professional cybercriminal networks. These networks are driven by the profitability of ransomware and the sale of confidential consumer data, intellectual property, government intelligence, and other valuable data. While traditional PC-based antivirus solutions can offer some protection against these attacks, organizations need highly adaptive and much faster mobile threat defense (MTD) for enterprise devices.
Tags : 
mobile, threat, detection, machine, learning
    
MobileIron
Published By: MobileIron     Published Date: Aug 20, 2018
In the PC era, employees operated from within a well defined enterprise IT perimeter and passwords were sufficient to establish user trust. However, in today’s mobile-cloud environment, the enterprise perimeter has dissolved and business information is available to users on a variety of endpoints, apps, services, networks, locations. In this dynamic access environment, organizations need a different approach to security that is able to: • Establish user trust using multiple factor authentication • Correlate user trust with other factors such as endpoint, app, network, and more • Apply adaptive, risk-based policies that match the user’s environment
Tags : 
security, enterprise, cloud
    
MobileIron
Published By: MuleSoft     Published Date: Apr 13, 2016
Every corner of an enterprise needs technology to build new applications for their specific function or customer. IT needs to transform from its traditional function as the sole technology provider to become an adaptive, responsive and nimble organization that can keep up with the pace of the digital era as well as embrace the opportunities provided by a change-driven environment. This transformation can occur only if IT transforms itself into a strategic business enabler rather than a centralized technology function. Being an enabler means that IT has to decentralize and democratize application development and data access to the different Lines of Business (LoBs) and functional business partners. This way, IT can concentrate on a partnership with the business - i.e. providing a set of strategic and consistent assets and technology.
Tags : 
technology, enterprise applications, best practices, business optimization, technology architecture, application management
    
MuleSoft
Published By: Group M_IBM Q418     Published Date: Oct 16, 2018
Access management products and services have matured in single sign-on protocols and user authentication, and technical differentiators include adaptive access capabilities, as well as ease and breadth of target system enablement. Among new purchases, demand for IAM as a service continues to grow.
Tags : 
    
Group M_IBM Q418
Published By: Oracle     Published Date: Sep 21, 2018
Agility and speed are required in the cloud economy. Modernize data warehouses with built-in adaptive machine learning to eliminate manual labor for administrative tasks. With Oracle, businesses can now build data warehouses or data marts in minutes.
Tags : 
    
Oracle
Published By: Adaptive Planning     Published Date: Jul 01, 2011
Learn how you can significantly extend the capabilities of your existing Salesforce.com, NetSuite, or other CRM application with an affordable, easy-to-use, and quick-to-deploy solution that automates sales forecasting, improves pipeline visibility, and enables what-if scenario planning.
Tags : 
adaptive planning, salesforce.com, netsuite, crm application, sales forecasting, pipeline, revenue predictability, crm data augmentation, rob hull, greg schneider, sales analysis
    
Adaptive Planning
Published By: Symantec     Published Date: Oct 25, 2012
Enterprise Information Security executives and teams can use this document to understand a new behavior-based security technology that automatically identifies and blocks even highly obfuscated malicious code with no user intervention and more.
Tags : 
symantec, security, threat detection, fud, malware, business technology
    
Symantec
Published By: Okta     Published Date: Feb 22, 2017
This white paper offers an overview of Okta’s solutions. Read it now and take one step closer to true enterprise security.
Tags : 
    
Okta
Published By: BlackLine     Published Date: Aug 06, 2018
The capacity to be anticipatory (aware, predictive and adaptive) of emerging technology and trends in business, demographics, and the social environment impacting your organization and industry. It is crucial to be #FutureReady
Tags : 
    
BlackLine
Published By: VMware     Published Date: May 10, 2017
VMware Identity Manager provides single sign-on (SSO) to a broad range of SaaS applications, as well as legacy applications published via virtual desktop platforms from VMware and Citrix, and browser-based and native mobile apps. VMware Identity Manager also provides application provision¬ing and conditional (adaptive, or risk-based) access controls, and can be deployed either on-premises or in the cloud. In this report, 451 Research analyzes VMware’s strategic effort to bridge the legacy on-premises world (which still represents most of its business) with the more highly distributed and heterogeneous worlds of mobile and cloud computing. 451 also examines VMware’s re-entry into the IDaaS market is to extend their market reach beyond what VDI and EMM might accomplish individually.
Tags : 
    
VMware
Published By: LogMeIn     Published Date: Feb 27, 2018
The North Face rigorously tested several providers and quickly realized that Bold360 hit all the marks. After the initial implementation, The North Face entered into a 3-month professional services engagement to take their chat strategy to the next level. The Bold360 professional services team helped The North Face implement strategic new chat features and tactics, including adaptive canned messages, proactive chat, dual monitors and layered chat, and provided additional development support as needed. To maximize the impact of its chat strategy, The North Face also created an 11-person core chat team, with reps chosen for their skills and product knowledge. Empowered with the capabilities of Bold360, these dedicated agents can now provide truly in-depth product support.
Tags : 
north face, online, customer, products, engagement, professional
    
LogMeIn
Published By: MeQuilibrium     Published Date: Jul 25, 2018
Resilience is more than just mindfulness and positivity. It is a set of skills that can be learned, and it helps people adapt and thrive in the midst of change. With meQuilibrium, you can equip each of your employees with the tools to master the skills to overcome any obstacle, increase agility, and gain adaptive capacity, while reducing stress, burnout, and absenteeism. meQ Engage is the engagement and performance solution that harnesses behavioral psychology and neuroscience to create personalized training at scale—at both the individual and team, and enterprise level—transforming your organization.
Tags : 
    
MeQuilibrium
Published By: Adaptive Planning     Published Date: Sep 16, 2013
Learn how to design a stress and conflict free budget with a five-step process on restructuring budgeting for the future.
Tags : 
budgeting, technology, best practices, typical pitfalls, create budget, forecasting, small business, finance
    
Adaptive Planning
Published By: Adaptive Planning     Published Date: Sep 16, 2013
Learn the benefits of dynamic forecasting in order to move Beyond Budgeting in order to keep pace with the fast-changing times
Tags : 
forecasting resource demands, activity based budgeting, productivity, technology, customer relationship, small business, finance
    
Adaptive Planning
Published By: Adaptive Planning     Published Date: Sep 16, 2013
Learn how to take meaningful action in the present by effectively following six successful rules for effective forecasting.
Tags : 
forecasting resource demands, activity based budgeting, productivity, technology, customer relationship, small business, finance
    
Adaptive Planning
Published By: Adaptive Planning     Published Date: Sep 16, 2013
Learn 6 simple steps for successful what-if or activity-based budgeting and how an effective ABC model will allow your managers to have much greater spending control over their cost structure.
Tags : 
forecasting resource demands, activity based budgeting, productivity, technology, customer relationship, small business, finance
    
Adaptive Planning
Published By: Adaptive Planning     Published Date: Sep 16, 2013
Learn how to improve your total cost of ownership by implementing SaaS-Based Budgeting and how it will eliminate the need for your organization to purchase, deploy, and maintain IT infrastructure or application software.
Tags : 
software delivery, saas, software applications, it infrastructure, applications, solutions, technlogy, small business, finance
    
Adaptive Planning
Published By: Adaptive Planning     Published Date: Sep 16, 2013
Learn how Corporate Performance Management (CPM) has evolved in the past few years and how it has significantly changed the Return on Investment associated with CPM solutions. Furthermore, see what the leaders in the CPM market are doing and how they are achieving their success.
Tags : 
corporate performance management, roi, technology, best practices, solution, value matrix, small business, finance
    
Adaptive Planning
Published By: CA Technologies EMEA     Published Date: May 25, 2018
Software drives competitive advantage more than ever at an increasing velocity for releases along with higher, overwhelming levels of deployment complexity. Dramatic growth in mobile applications, analytics, systems of engagement, and cloud demands that organizations respond adaptively, even as resource constraints make it challenging to nearly impossible to do so. As a result of these combined factors, IDC sees increased interest in, demand for, and adoption of agile approaches to development and also for business initiatives driving adoption of agile approaches to overall project, program, and portfolio management.
Tags : 
idc, marketscape, agile, ppm, vendor, assessment
    
CA Technologies EMEA
Published By: OKTA     Published Date: Oct 23, 2017
As organizations and workplaces evolve, less control is exercised over devices, services, and people, leading to a gap with traditional security tools. Identity not only becomes the critical control point, but the information stemmed from it can be leveraged to strengthen existing processes as well as integrate with other security investments. Join this webinar to learn why identity isn’t simply just a "first step" but also the foundation modern security should be built on. Then explore what characteristics a strong authentication solution should include as we demo Okta’s Adaptive MFA solution.
Tags : 
    
OKTA
Start   Previous    1 2 3 4 5 6 7    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.

© 2019  Created by RecruitingBlogs.   Powered by

Badges  |  Report an Issue  |  Terms of Service

scroll to the top