Skip to main content
 

chief

Results 151 - 175 of 208Sort Results By: Published Date | Title | Company Name
Published By: IBM     Published Date: Apr 22, 2014
CMOs and their marketing teams are squarely in the spotlight as organizations look to them to chart a course across today’s turbulent landscape. The pressure is intense, the scope of the challenge unprecedented.
Tags : 
ibm, marketing, marketing strategy, marketing performance, digital marketing, smarter commerce, profitability, customer, customer engagement, emerging marketing, e-commerce
    
IBM
Published By: Oracle Social Cloud     Published Date: Jan 14, 2015
Social media allows consumers to be empowered in a brand new way, forcing organizations to change the way they traditionally do business. With unprecedented access to unstructured and structured data, companies have more information about the customer’s entire lifecycle than ever before.
Tags : 
customer experience, chief digital officer, digital, social marketing, social intelligence, cmo, oracle, research, cio, marketing and it collaboration, crm, social business, socially enabled enterprise, cpg, travel, healthcare, financial services, marketing cloud, social media, internet marketing
    
Oracle Social Cloud
Published By: IBM     Published Date: Jul 22, 2016
This research report examines the key issues, and provides recommendations for leveraging data and analytics to help procurement drive greater enterprise value. Based on in-depth interviews with two dozen leading Chief Procurement Officers (CPOs), the report outlines pragmatic steps that every procurement organization can take to leverage analytics and improve engagement with suppliers and key business stakeholders across the enterprise.
Tags : 
ibm, commerce, procurement, analytics, procurement analytics, data, big data, procurement organization
    
IBM
Published By: IBM     Published Date: Jan 05, 2017
This research report examines the key issues, and provides recommendations for leveraging data and analytics to help procurement drive greater enterprise value. Based on in-depth interviews with two dozen leading Chief Procurement Officers (CPOs), the report outlines pragmatic steps that every procurement organization can take to leverage analytics and improve engagement with suppliers and key business stakeholders across the enterprise.
Tags : 
ibm, procurement, commerce, procurement analytics
    
IBM
Published By: IBM     Published Date: Aug 06, 2014
As executives witness data’s proven impact on performance and innovation and recognize its strategic significance, they also realize the growing need for a leader whose primary role is to understand and advocate on behalf of data: The Chief Data Officer.
Tags : 
ibm, retail, data, big data, analytics, chief data officer
    
IBM
Published By: IBM     Published Date: Aug 06, 2014
As a precursor to the IBM Global Chief Marketing Officer (CMO) Study to be published later in 2011, the Economist Intelligence Unit, in cooperation with the IBM Institute for Business Value, conducted an online survey of nearly 300 executives to assess which trends are impacting CMOs and how CMOs are responding to today's complex business environment.
Tags : 
ibm, retail, cmo, trends, business environment, innovate
    
IBM
Published By: SyberWorks     Published Date: Oct 21, 2008
Jean Ann Larson, Chief Learning Officer (CLO), and Tawanna Foggs, Educational Systems Coordinator, of William Beaumont Hospitals, talk about their use of the SyberWorks Learning Management System to train and certify hospital employees.
Tags : 
syberworks, learning management system, learning management systems, learning management system, e-learning, elearning, web based training, training management systems, training management system, online training software, web based training software, e-learning, sop automation, seminar logistics, classroom management, online survey tool, competency management, schedule simulation, fda 21 cfr part 11, compliance management
    
SyberWorks
Published By: Symantec     Published Date: Jul 11, 2017
The technology pendulum is always swinging. And chief information security officers must be prepared to swing with it—or get clocked. A look at recent history illustrates the oscillating nature of technology. In the 1980s, IBM mainframes dominated the landscape. In the ’90s, client-server computing came on the scene and data was distributed on personal computers. When the Web assumed predominance, the pendulum started to swing back to a centralized server. Then, just as quickly, mobile took the lead, with apps downloaded to workers’ devices—the new client server. Now, as mobile devices continue to populate the enterprise at a rapid rate, the IT model is changing again—to the provisioning of information on a just-what’s-needed, just-in-time basis from centralized servers consolidated in the cloud. The pendulum continues to swing and IT workloads are moving to the cloud en masse.
Tags : 
cloud, security, data protection, data loss, information security
    
Symantec
Published By: IBM     Published Date: Apr 09, 2015
IBM Security, in partnership with the Center for Applied Insights, has launched the 2014 IBM CISO Assessment. Driven by the specter of external attacks and the needs of their own organizations, CISO's are continuing the shift toward a business leadership role that focuses on risk management and taking a more integrated and systemic approach.
Tags : 
ibm, risk management, security risk, security officer, data security
    
IBM
Published By: IBM     Published Date: Apr 04, 2016
The 2015 C-Suite Cybersecurity Study "Securing the C-Suite - Cybersecurity Perspectives from the Boardroom and C-Suite". IBM conducted a survey of over 700 C-Suite executives - excluding the CISO - from 28 countries, across 18 industries - to understand any patterns, as well as any differing or aligning attitudes on cybersecurity. 60 percent of respondents are located in mature markets and 40 percent from emerging markets. Participants spanned traditional C-Suite roles, from CEOs and Board members to CFOs, Chief Risk Officers, CMOs, COOs, CHROs, Chief Compliance Officers and Legal Counsel. This report will cover: C-Suite views of the risks and actors - Is the C-Suite view versus reality aligned? IT and business alignment and collaboration - Who's engaged and who's not? The tone from the top on external collaboration and sharing of incident information. Characteristics of more "Cyber-Secure" companies based on C-Suite responses to what their organization has accomplished
Tags : 
ibm, c-suite study, cybersecurity
    
IBM
Published By: IBM     Published Date: Sep 30, 2016
The 2015 C-Suite Cybersecurity Study "Securing the C-Suite - Cybersecurity Perspectives from the Boardroom and C-Suite". IBM conducted a survey of over 700 C-Suite executives - excluding the CISO - from 28 countries, across 18 industries - to understand any patterns, as well as any differing or aligning attitudes on cybersecurity. 60 percent of respondents are located in mature markets and 40 percent from emerging markets. Participants spanned traditional C-Suite roles, from CEOs and Board members to CFOs, Chief Risk Officers, CMOs, COOs, CHROs, Chief Compliance Officers and Legal Counsel. This report will cover: C-Suite views of the risks and actors - Is the C-Suite view versus reality aligned? IT and business alignment and collaboration - Who's engaged and who's not? The tone from the top on external collaboration and sharing of incident information. Characteristics of more "Cyber-Secure" companies based on C-Suite responses to what their organization has accomplished
Tags : 
ibm, security, maturity, c suite, cybersecurity
    
IBM
Published By: IBM     Published Date: Jun 05, 2018
Keeping up with ever changing contract management work is challenging. Governing legal and procurement content is written by thousands of people and applied to hundreds of situations. To stay compliant, organizations employ knowledgeable professionals to analyze every sentence to determine the changes that need to be made to company contracts. The manual process of sifting through these dense, complicated documents is inefficient and prone to error. Watson Compare and Comply is trained on contract specific knowledge and classifications and can streamline contract workflows through semantic understanding. Join Director of Watson Offering Management, Adam Orentrichler, and Chief Data Scientist of SAP Ariba, David Herman, as they discuss how Watson can transform the way your company manages contract governance.
Tags : 
    
IBM
Published By: IBM     Published Date: May 01, 2017
If you function like most IT organizations, you've spent the past few years relying on mobile device management (MDM), enterprise mobility management (EMM) and client management tools to get the most out of your enterprise endpoints while limiting the onset of threats you may encounter. In peeling back the onion, you'll find little difference between these conventional tools and strategies in comparison to those that Chief Information Officers (CIOs) and Chief Information Security Officers (CISOs) have employed since the dawn of the modern computing era. Their use has simply become more: Time consuming, with IT trudging through mountains of endpoint data; Inefficient, with limited resources and limitless issues to sort through for opportunities and threats; and Costly, with point solution investments required to address gaps in OS support across available tools. Download this whitepaper to learn how to take advantage of the insights afforded by big data and analytics thereby usher i
Tags : 
ibm, endpoint management, mobile device management, enterprise mobility, os support, it organizations
    
IBM
Published By: IBM     Published Date: Oct 13, 2017
Integrated Threat Management For Dummies, IBM Security Limited Edition, lays the foundation for effective tools and techniques that work together to help counter today’s advanced threats. Regardless of your role in the IT security organization, threat management tools and techniques will influence your job. Your role determines the part you play to effectively manage threats, including those targeting the cloud and your company’s data. If you are a Chief Information Security Officer (CISO) or security manager, this book explains in detail the types of tools you need to effectively prevent, detect, and respond to security incidents. If you’re in general business management, you’ll better understand the risks associated with enterprise computing and the reasons why a comprehensive portfolio of security tools that work well together is so important.
Tags : 
malware prevention, network intrusion prevention, malware protection, ibm, firewall, mutating malware, cyber threats
    
IBM
Published By: Zycus     Published Date: Nov 30, 2009
If the go-go 1990s, with its fast money and flush credit seeking rapid and steep returns, created the demand for "renaissance" Chief Financial Officers ("CFO"), who could manage (and market) both the strategic and financial operations of the enterprise, the more sobering decade that followed led directly to the creation and subsequent rise of the Chief Procurement Officer ("CPO"), who could reduce costs, build internal relationships, and develop strategic suppliers efficiently and effectively.
Tags : 
zycus, cfo, chief financial officer, procurement, chief procurement officer, sourcing companies, sourcing services, sourcing, reverse auction, e sourcing, eprocurement, strategic planning, procurement and outsourcing, [sourcing companies], [sourcing services], procurement strategy, procurement services, reverse auctioning, procurement management, electronic procurement
    
Zycus
Published By: Zycus     Published Date: May 01, 2009
The global recession is taking no prisoners. Neither industry, nor region, nor company-size has provided shelter from its impact. Within the enterprise, few business functions have been unaffected. Yet, as this business downturn continues, the Chief Procurement Officer's ("CPO") agenda and the CEO's agenda have started to converge.
Tags : 
zycus, recession, downturn, procurement, sourcing companies, sourcing services, sourcing, reverse auction, e sourcing, eprocurement, strategic planning, procurement and outsourcing, [sourcing companies], [sourcing services], procurement strategy, procurement services, reverse auctioning, procurement management, electronic procurement, strategic procurement
    
Zycus
Published By: SAS     Published Date: Aug 28, 2018
Machine learning systems don’t just extract insights from the data they are fed, as traditional analytics do. They actually change the underlying algorithm based on what they learn from the data. So the “garbage in, garbage out” truism that applies to all analytic pursuits is truer than ever. Few companies are already using AI, but 72 percent of business leaders responding to a PWC survey say it will be fundamental in the future. Now is the time for executives, particularly the chief data officer, to decide on data management strategy, technology and best practices that will be essential for continued success.
Tags : 
    
SAS
Published By: SAS     Published Date: Jan 30, 2019
Machine learning systems don’t just extract insights from the data they are fed, as traditional analytics do. They actually change the underlying algorithm based on what they learn from the data. So the “garbage in, garbage out” truism that applies to all analytic pursuits is truer than ever. Few companies are already using AI, but 72 percent of business leaders responding to a PWC survey say it will be fundamental in the future. Now is the time for executives, particularly the chief data officer, to decide on data management strategy, technology and best practices that will be essential for continued success.
Tags : 
    
SAS
Published By: SAS     Published Date: Mar 20, 2019
What’s on the chief data and analytics officer’s agenda? Defining and driving the data and analytics strategy for the entire organization. Ensuring information reliability. Empowering data-driven decisions across all lines of business. Wringing every last bit of value out of the data. And that’s just Monday. The challenges are many, but so are the opportunities. This e-book is full of resources to help you launch successful data analytics projects, improve data prep and go beyond conventional data governance. Read on to help your organization become truly data-driven with best practices from TDWI, see what an open approach to analytics did for Cox Automotive and Cleveland Clinic, and find out how the latest advances in AI are revolutionizing operations at Volvo Trucks and Mack Trucks.
Tags : 
    
SAS
Published By: SilverSky     Published Date: Apr 16, 2013
A SilverSky study of 200 U.S. chief information officers and senior level security decision-makers were found that nearly all (97 percent) of respondents indicate their confidence level in the cloud has either increased or stayed the same in the past 12 months. The Silver Lining report provides insights into cloud behavior. Download the report now and see how your peers are feeling about moving to the cloud.
Tags : 
study, cloud, adoption, cloud security, cio, it security, virtualization
    
SilverSky
Published By: IBM     Published Date: Oct 10, 2013
"The implications from the 2013 IBM Global Reputational Risk and IT Study are clear. The question is no longer whether IT risks can damage your corporate reputation, but what you can do to effectively prevent and mitigate these risks. Find out what you can do to protect your reputation from IT risks. Read “Six keys to effective reputational and IT risk management” to learn about: · Practical advice and recommendations to help prevent and mitigate the IT risks that most affect reputation · The emerging role of the Chief Digital Officer · How to use social media as a tool for minimizing reputational damage · How your supply chain can put you at increased reputational risk"
Tags : 
reputational management, risk management, it risk management, ibm, ibm global, it risks, protection, branding, social media, supply chain, supply chain management, chief digital officer, mitigation, corporate reputation
    
IBM
Published By: IBM     Published Date: Feb 18, 2014
In the digital age, customers sit in the driver’s seat. The most successful retailers have responded by putting shoppers at the heart of the merchandising process. We’ve identified a small group of firms that outperform their peers, thanks in part to three traits: they have merchandising functions that are customer-oriented, collaborate across internal and external boundaries and use analytics to make smarter business decisions.
Tags : 
ibm, smarter commerce, demandtec, retail, ecommerce, applied insights, customer demand, merchandising, e-commerce
    
IBM
Published By: IBM     Published Date: Mar 04, 2014
Download this Whitepaper by Jerry Cuomo, Vice President and Chief Technology Officer, IBM WebSphere, to understand more about how you can leverage JavaScript pervasiveness to simplify radically the life cycle of applications that are interactive, web facing and transactional.
Tags : 
ibm, mobility, mobile applications, mobile app, mobile app development, javascript, apis, app servers
    
IBM
Published By: IBM     Published Date: May 09, 2014
Agile methods have become increasingly popular because they empower organizations to more quickly address emerging opportunities, to better ensure accurate fulfillment of functional requirements and to significantly enhance team productivity. Many organizations, however, are hesitant to employ agile methods for their safety-critical systems—since they have serious concerns about compromising those systems and thereby exposing themselves to completely unacceptable consequences.IBM Rational Chief Evangelist Bruce Powel Douglass explains how best practices for project management can assist organizations in experiencing all the benefits of agile development while continuing to maintain rigorous standards essential for successful delivery of safety-critical systems.
Tags : 
ibm, agile development, product development, agile methods, safety critical systems development, project management, productivity
    
IBM
Published By: IBM     Published Date: May 09, 2014
Agile methods have a reputation for being fast and adaptive and can enhance both quality and team productivity. For these reasons they are attractive to software teams in many different domains - including safety-critical systems development. But how can agile methods be adapted to meet the needs of such a challenging domain? In the fourth episode of the series, IBM Rational Chief Evangelist, Bruce Powel Douglass discusses how agile practices can be adapted to meet the evidence needs of safety-critical projects.
Tags : 
ibm, agile development, agile methods, safety critical systems development, project management, product development, productivity, qa quality assurance, testing, evidence oriented practices, software development
    
IBM
Start   Previous    1 2 3 4 5 6 7 8 9    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.