RecruitingBlogscom

Follow Us:

 

transforming

Results 351 - 375 of 485Sort Results By: Published Date | Title | Company Name
Published By: IBM     Published Date: Mar 30, 2016
This white paper discusses how enterprise analytics systems can assist provider organizations in building sustainable healthcare systems and achieving their vision for accountable care—from near-term demands for regulatory and quality reporting to transforming care delivery.
Tags : 
ibm, healthcare analytics, healthcare, big data, enterprise analytics systems, information technology
    
IBM
Published By: BlackBerry Cylance     Published Date: Jul 02, 2018
Artificial intelligence (AI) technologies are rapidly moving beyond the realms of academia and speculative fiction to enter the commercial mainstream, with innovative products that utilize AI transforming how we access and leverage information. AI is also becoming strategically important to national defense and in securing our critical financial, energy, intelligence, and communications infrastructures against state-sponsored cyberattacks. According to an October 2016 report issued by the federal government’s National Science and Technology Council Committee on Technology (NSTCC), “AI has important applications in cybersecurity, and is expected to play an increasing role for both defensive and offensive cyber measures.” Based on this projection, the NSTCC has issued a National Artificial Intelligence Research and Development Strategic Plan to guide federally-funded research and development. The era of AI has most definitely arrived, but many still don’t understand the basics of this im
Tags : 
artificial, intelligence, cybersecurity, machine
    
BlackBerry Cylance
Published By: OnForce     Published Date: Apr 22, 2007
“8 Ways Every Solution provider Can Profit from Rollouts Now” demonstrates how rollouts are creating strong sales opportunities for solution providers of all sizes. Importantly, it also addresses how solution providers have finally “cracked the code” of transforming this high-volume business, which is extremely service intensive, into a high-profit business via innovative on-site service delivery models that let them find the contract IT service professionals they need, right when they need them.
Tags : 
service model, roll-out, rollout, roll-outs, rollouts, customer service, var, vars, value-add, reseller, lead generation, marketplace, on force, onforce, roll out, roll outs, on-site, asp, service provider, software development
    
OnForce
Published By: IBM     Published Date: Apr 23, 2013
When an unpredictable economy brings sudden shifts in revenues, costs, and profits, Software solutions can give Finance the ability to anticipate and adapt. But Finance needs the help of IT. Specifically, Finance needs the help of inspiring IT Managers who can lay out the roadmap that will take Finance from the automation of discrete processes to the broader task of transforming the business to compete successfully in a challenging global economy.
Tags : 
finance, operations, change management, enterprise
    
IBM
Published By: IBM     Published Date: Jul 12, 2012
Today's technology landscape is transforming the concepts of business IT prevalent only just a few short years ago. With this transformation, however, has also come an equivalent transformation of risks.
Tags : 
enterprise security, ema, ibm, security, intelligence, enterprise applications, business technology
    
IBM
Published By: IBM     Published Date: Jul 12, 2012
Join EMA Managing Research Director Scott Crawford and IBM Director of Identity & Access Management Ravi Srinivasan for a discussion of the ways that a more expansive concept of identity intelligence is transforming the nature of information security
Tags : 
information security, ema, ibm, business technology
    
IBM
Published By: IBM     Published Date: Sep 03, 2013
This paper describes how workgroups and midsize companies can transform their spreadsheet-only process to create flexible and timely plans, budgets and forecasts. It outlines recommendations for implementing a complete performance management system, using IBM Cognos Express, an integrated reporting, analysis and planning solution purpose-built for workgroups and midsize companies.
Tags : 
transforming spreadsheets, planning, budgeting, forecasting, midsize companies, cognos express, management system, ibm, knowledge management, enterprise applications, business technology
    
IBM
Published By: Cisco     Published Date: Sep 08, 2016
This white paper shows how you can transform your enterprise with Cisco's secure mobility.
Tags : 
    
Cisco
Published By: Adobe     Published Date: Aug 14, 2014
Download the Forrester 2014 Mobile Trends report to discover the trends that are transforming business as we know it—and the strategies you need to gain a competitive edge. You’ll learn about the mobile innovations that will shape 2014, and the overhyped fads that are likely to fizzle. Get the report now to uncover crucial mobile insights for the coming year and learn how to: Use mobile analytics to meet customer needs in real time Make a business case for mobile marketing Improve customer and employee processes with mobile strategies
Tags : 
mobile trends, mobile analytics, mobile marketing, mobile strategies, mobile innovations
    
Adobe
Published By: Adobe     Published Date: Jan 12, 2015
Download our Field guide to marketing analytics to identify the defining characteristics of mature marketing analytics practices and to learn how your program can join their ranks. You’ll discover four steps to analytics maturity, from benchmarking your current performance to creating a long-term competitive advantage. And you’ll learn how the right marketing analytics can transform your business results.
Tags : 
adobe, digital, marketing, analytics, benchmarks, competitive, advantage, personalize, experience, customer, channel, mobile, social, search, brand, experience, resources, technology, goals, playbook
    
Adobe
Published By: Intel Security     Published Date: Apr 06, 2016
This solution brief outlines how security operations must evolve to a continuous operation focused on assessing readiness, acquiring and integrating threat intelligence, and increasing the speed of threat response capability
Tags : 
advanced malware, targeted malware, layered malware defense, targeted attacks, critical infrastructure threats, forensic analysis, static detection, dynamic detection, forensic analysis, application control, vulnerability scanning, real-time kernel protection, change management monitoring, database activity monitoring, siem, network ips, global intelligence, advanced threat defense
    
Intel Security
Published By: IBM     Published Date: Nov 12, 2013
Customers are more demanding, the competitive landscape is more dynamic, and the very structure of companies is evolving rapidly. What can executives and business leaders do to stay ahead of the curve? Read this eBook to find out how software as a service (SaaS) can transform your business into a more competitive, customer-centric organization.
Tags : 
software as a service, saas, executive, saas solutions, business process innovation, analytics, knowledge management, enterprise applications
    
IBM
Published By: IBM     Published Date: May 12, 2015
In this guide, we explore the technological trends that are transforming the retail industry, across the areas of Big Data and Analytics, Cloud Computing, Mobile and Social Engagement, and Security
Tags : 
retail industry, big data, analytics, cloud computing, mobile engagement, security, emerging marketing, crm & customer care, e-commerce
    
IBM
Published By: IBM     Published Date: Aug 09, 2016
This brochure displays how Watson Engagement Advisor is transforming the way people and organizations interact with the latest evolution of self-service.
Tags : 
ibm, watson, customer engagement, customer experience, cognitive computing, watson engagement advisor, knowledge management, enterprise applications, business technology
    
IBM
Published By: IBM     Published Date: Feb 11, 2015
Who can you trust? Learn from the IBM X-Force team in this new quarterly report how the Internet of Things and IP reputation tracking are transforming the security landscape.
Tags : 
ibm, ibm x-force, ip reputation tracking, iot, security landscape, security, knowledge management
    
IBM
Published By: IBM     Published Date: Jul 15, 2015
This paper talks about the state of today’s cyber threat landscape, current platforms for fraud management fall short, hurting customers in the process, and Trusteer's Cybercrime Prevention Architecture.
Tags : 
cybercrime, malware prevention management, malware fraud, financial fraud, security solutions, vulnerability management, malware attacks, data security
    
IBM
Published By: IBM     Published Date: Oct 13, 2015
IBM offers insights to CIOs regarding transforming the security organization into five core functional areas. This paper focuses on how to respond to the inevitable incident.
Tags : 
ibm, cio, security, data, cybercriminal, malware protection, it management, knowledge management
    
IBM
Published By: IBM     Published Date: Oct 14, 2015
Modern organizations often have huge stores of data, which can make it difficult for employees to find the information they need when they need it. In response, innovative enterprises are creating unified information applications based on cognitive computing technology in order to put invaluable information at workers' fingertips.
Tags : 
ibm, information application, enterprise, application, search tool, networking, software development, enterprise applications, data management
    
IBM
Published By: IBM     Published Date: Nov 03, 2015
In order to meet the changing demands of their customers, organizations need the right solution that can help them harness the vast amounts of customer data in ways that yield personalized, seamless customer experiences. That solution is IBM Watson Engagement Advisor.
Tags : 
ibm, watson, application, powerful information, networking, software development, it management, enterprise applications, data management, knowledge management, storage, it career advancement, business technology, data center, research
    
IBM
Published By: IBM     Published Date: Nov 03, 2015
Read this whitepaper to see how cogntive technologies are transforming the wealth management landscape.
Tags : 
ibm, watson, application, powerful information, networking, software development, it management, enterprise applications, data management, knowledge management, it career advancement, business technology
    
IBM
Published By: IBM     Published Date: Oct 07, 2016
The world of IT is rapidly transforming — from back office process automation to front line engagement. Put another way, IT no longer supports the business, it *is* the business. The challenge is, the application architectures and processes of existing applications are inadequate to support the requirements of tomorrow’s IT. This presentation will discuss the changing nature of business and customer engagement and discuss what capabilities IT must put in place to deliver the next generation of enterprise applications.
Tags : 
ibm, cloud, middleware, infrastructure, enterprise applications, application performance management, apm, networking, knowledge management, business technology
    
IBM
Published By: InMage     Published Date: Feb 18, 2009
The concept of Continuous Data Technologies (CDT) emerged on the scene two years ago, and is now transforming the data storage industry. Nearly every major storage vendor has one or more CDT products in their offering roadmap, in addition to a vital community of emerging vendors who are the true innovators in this space.
Tags : 
inmage, taneja group, continuous data technologies, cdt, dr scout, continuous data protection, cdp, continuous data imaging, cdi, apit data capture, any-point-in-time, data management
    
InMage
Published By: Zycus     Published Date: Sep 30, 2009
In today's highly-competitive markets, more and more procurement and sourcing professionals are looking to streamline processes and drive superior performance. In the quest for higher savings, more spend under management and increased compliance, sourcing executives must turn to their own repository of spend data to effectively identify opportunities for savings and gain a deeper understanding of their corporate spend.
Tags : 
zycus, spend analysis, spend data, sourcing companies, sourcing services, sourcing, reverse auction, e sourcing, eprocurement, strategic planning, procurement and outsourcing, [sourcing companies], [sourcing services], procurement strategy, procurement services, reverse auctioning, procurement management, electronic procurement, strategic procurement, e procurementsourcing strategies
    
Zycus
Published By: GoToMeeting     Published Date: Apr 05, 2011
This Wainhouse Research brief explores how web conferencing is transforming the way teams get work done.
Tags : 
web conferencing, online meetings, web meetings, travel, collaboration software, smtp, pstn, post, forrester, telecommuting
    
GoToMeeting
Published By: GoToMeeting     Published Date: Apr 08, 2011
This Wainhouse Research brief explores how web conferencing is transforming the way teams get work done.
Tags : 
online meeting, web conferencing, citrix, virtual team meeting, web meeting, gotomeeting
    
GoToMeeting
Start   Previous    6 7 8 9 10 11 12 13 14 15 16 17 18 19 20    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.

© 2019  Created by RecruitingBlogs.   Powered by

Badges  |  Report an Issue  |  Terms of Service

scroll to the top