RecruitingBlogscom

Follow Us:

 

proactive

Results 226 - 250 of 434Sort Results By: Published Date | Title | Company Name
Published By: Drift     Published Date: Aug 05, 2019
Drift and Demandbase are joining forces to revolutionize the way businesses do accountbased marketing (ABM). Want to join us? In this guide, we explore how adopting a conversational approach to ABM can help you amplify your existing strategy and help you be more targeted, proactive, and consistent with your outreach. When you’re finished reading, you’ll come away with a step-by-step set of instructions for implementing a conversational ABM game plan for your business.
Tags : 
    
Drift
Published By: Oracle     Published Date: Aug 19, 2016
Research conducted by the Economist Intelligence Unit shows how firms can improve data security. Certain firms consistently demonstrate success in reducing breaches across all major forms of cyber-attack. 32% of companies named their top security priority as adopting a proactive data defense strategy. Discover eight steps to reduce vulnerability to cyber-attack.
Tags : 
    
Oracle
Published By: Interactive Intelligence     Published Date: Feb 14, 2012
Read what companies are doing to make PCC initiatives an integral part of their unified communications and customer retention strategies, from Mathew Erickson, senior product manager for outbound solutions at Interactive Intelligence,
Tags : 
    
Interactive Intelligence
Published By: Enterprise Management Associates     Published Date: Nov 23, 2015
Join John Myers, managing research director at leading IT analyst firm Enterprise Management Associates (EMA), and Heine Krog Iversen, CEO at TimeXtender, for a discussion on how to improve your organization’s responsiveness to business change and how to adapt to a data-driven environment. Attendees will gain insight on: How data-driven organizations are changing business and technology Which data sources are empowering data-driven organizations and challenging IT departments How IT departments and analytical teams can get ahead of data-driven change How data warehouse automation enables not only data-driven business stakeholders, but proactive IT departments
Tags : 
data warehouse, data automation, data driven organization, it departments, organization responsiveness
    
Enterprise Management Associates
Published By: IBM     Published Date: Feb 08, 2008
Unexpected disasters threaten organizations across the globe daily. Surprisingly, many businesses are not prepared for such disasters. They lack business continuity plans which can provide both proactive and reactive strategies to minimize the impact of unforeseen setbacks.
Tags : 
disaster recovery, business continuity, natural disaster, infrastructure, ibm
    
IBM
Published By: IBM     Published Date: Feb 25, 2008
Going green is becoming more than an altruistic aspiration to save the planet. A proactive corporate environmental policy is now an essential part of any company’s overall business strategy. Download this paper to find out how IBM can help you to support environmental initiatives while achieving your company's long-term business goals.
Tags : 
green, environment, environmental, compliance, cost, green strategy, ibm, it management
    
IBM
Published By: IBM     Published Date: Jul 10, 2009
Differentiate yourself from the competition with superior services and products. Business process management (BPM) powered by the IBM Smart SOA™ portfolio makes it possible by enabling you to monitor, manage and improve business operations. Constant insight fuels smarter decisions and a more proactive approach to business.
Tags : 
ibm, ebf, business process management, bpm, ibm smart soa, bep, kpi, websphere, business monitor, business events, lotus, enterprise applications
    
IBM
Published By: IBM     Published Date: Aug 30, 2010
Proactive Data Management Controls Data Growth. To take control, organizations must begin with the conscious decision not to let data growth proceed unexamined.
Tags : 
ibm, data growth, data management
    
IBM
Published By: Inovis     Published Date: Aug 06, 2007
When companies adopted Just-In-Time (JIT) tactics, they did so primarily to reduce inventory costs. For the most part, this strategy worked. Reducing stocks of raw materials, parts, assemblies and finished goods reduces carrying costs, allowing companies to invest the freed-up funds in more productive assets and projects.
Tags : 
supply chain, scm, supply chain management, inovis, spend management, cost control, inventory, inventories, supplier, application integraion, eai, plm, product lifecycle management, van, value add, value added, inventory management
    
Inovis
Published By: NexGen     Published Date: Feb 09, 2015
The nature of the financial services industry places a myriad of international compliance requirements on a company's IT team, as well as an expectation by its customers to deliver the high test levels of performance and reliability. To survive and thrive, businesses in the industry must not only keep pace with customer demand but gain competitive advantage. Those demands mean the IT team must be at the forefront of adopting emerging technologies. This is certainly true for Orangefield Columbus, who recently experienced significant growth in its multiple databases which led to the serious performance degradation of its existing storage system. By focusing on a proactive data management storage array, Orangefield was able to eliminate resource contention. Download now and examine Orangefield's journey to find a solution that would meet, and exceed, their performance and capacity requirements.
Tags : 
nexgen, vmware, citrix, flash, financial services, it management
    
NexGen
Published By: ESET     Published Date: Jan 30, 2008
Anti-virus does much more than reactively detect known viruses; it proactively scans for unknown ones too. So, how do scanners really work? The aim of this paper is to reduce some of the confusion around the workings of AV technology, and to clarify what is realistic to expect from AV protection, particularly heuristic analysis.
Tags : 
heuristics, threat analysis, how av works, av signatures, traditional antivirus, norton, symantec, trend micro, mc afee, malware, threats, email, threat summary, threat report, viruses, eset, antivirus, nod32, internet threats, web-borne threats
    
ESET
Published By: Proofpoint     Published Date: Apr 22, 2010
This whitepaper addresses the key e-discovery challenges facing legal and IT departments today, form the impact of regulations such as the Federal Rules of Civil Procedure (FRCP) to the technology required to deal with them. Finally, this paper describes how businesses can develop a proactive strategy to deal with e-discovery requests in the event of litigation, saving time and money in the process.
Tags : 
proofpoint, email archiving, e-discovery, federal rules of civil procedure, frcp, electronic data, search and retrieval of messages
    
Proofpoint
Published By: Skillsoft     Published Date: Apr 01, 2011
What does it really take to be a leader at our company? Will this program enable tomorrow's leaders to see the forest for the trees and initiate a plan to protect and grow that forest?
Tags : 
leadership development, benchmarking, talent management, talent development, leadership capacity
    
Skillsoft
Published By: IBM     Published Date: May 31, 2012
The topic of security is now unquestionably a C-suite priority. An enterprise that delegates security matters solely to the CIO is compounding its risk factors. Organizations need to move toward a more systematic and proactive approach to addressing security threats and managing compliance requirements. Download the white paper to learn more.
Tags : 
ibm, cyber terrorism, digital age, c suite, security, technology, business technology, business
    
IBM
Published By: ESET     Published Date: Feb 17, 2010
This white paper examines the looming threat horizon that is forcing companies to reexamine their endpoint security functions and discusses ESET's solution for integrated security management that is built around its advanced heuristic technology.
Tags : 
eset, endpoint security, networkwide platform, integrated security management, heuristic scanning, antimalware, enterprise security
    
ESET
Published By: Crowdcast     Published Date: Mar 09, 2010
Leverage the tacit knowledge in your organization to identify, understand, and proactively reduce risk.
Tags : 
crowdcast, collective intelligence, it project management, project management, project, business intelligence
    
Crowdcast
Published By: Crowdcast     Published Date: Mar 09, 2010
Leverage the tacit knowledge in your organization to improve decision making, increase control, and proactively reduce risk.
Tags : 
new product, crowd cast, business intelligence, silo, npi, npd, new product development
    
Crowdcast
Published By: Crowdcast     Published Date: Mar 09, 2010
Leverage the tacit knowledge in your organization to improve decision making, increase control, and proactively reduce risk.
Tags : 
crowdcast, collective intelligence, strategic planning, sap, it project management, project management, project, business intelligence
    
Crowdcast
Published By: Crowdcast     Published Date: Mar 09, 2010
Leverage the tacit knowledge in your organization to identify, understand, and proactively reduce risk.
Tags : 
crowdcast, collective intelligence, it project management, project management, project, business intelligence
    
Crowdcast
Published By: Crowdcast     Published Date: Mar 09, 2010
Leverage the tacit knowledge in your organization to improve decision making, increase control, and proactively reduce risk.
Tags : 
crowdcast, collective intelligence, strategic planning, sap, it project management, project management, project, business intelligence
    
Crowdcast
Published By: IBM Software     Published Date: Feb 03, 2012
This paper from IBM describes how to build a proactive threat and risk strategy based on predictive analytics; examples of how organizations used predictive analytics to minimize the negative impact of risk and maximize positive results; and steps to advance your organization's use of predictive analytics to combat threat and risk.
Tags : 
predictive threat, security, technology, risk management, security policy, ibm, intrustion protection
    
IBM Software
Published By: IBM Software     Published Date: Feb 03, 2012
Read this in-depth Aberdeen Group report, based on responses from 117 executives of successful companies, to find out how best-in-class businesses are proactively managing these challenges. You'll learn these techniques for optimizing maintenance and operations-and more.
Tags : 
asset management, software, ibm, technology, operations, maintenance, optimization
    
IBM Software
Published By: IBM Software     Published Date: Oct 24, 2011
This paper describes how to build a proactive threat and risk strategy based on predictive analytics and provides real life examples of the benefits.
Tags : 
ibm, predictive analytics, collaboration, insights, integration, automation, smarter, data analysis, ibm data analysis, smarter planet new intelligence, rfid, sensors and actuators, epedigree, track and trace, insurance fraud, data management, data mining, knowledge management, data storage, knowledge management software
    
IBM Software
Published By: ScriptLogic     Published Date: Mar 30, 2012
Desktop Authority reduces the cost of owning Windows desktops by enabling you to proactively configure, secure and support desktops and servers from a central location.
Tags : 
scriptlogic, desktop management, desktop authority, windows, software asset management, software license, tracking, automation, system center configuration manager, sccm, virtual application, networking, enterprise applications
    
ScriptLogic
Published By: SkillSoft MKG     Published Date: Nov 05, 2010
What does it really take to be a leader at our company? Will this program enable tomorrow's leaders to see the forest for the trees and initiate a plan to protect and grow that forest?
Tags : 
leadership development, benchmarking, talent management, talent development, leadership capacity
    
SkillSoft MKG
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.

© 2019  Created by RecruitingBlogs.   Powered by

Badges  |  Report an Issue  |  Terms of Service

scroll to the top