Skip to main content
 

sim

Results 51 - 75 of 2970Sort Results By: Published Date | Title | Company Name
Published By: U.S. Cellular     Published Date: Aug 12, 2019
Are you ready to implement field service solutions, but don’t know where to begin? Getting started is actually very easy. All you need to do is choose the solutions that work best for your business. In this easy-to-read white paper, you’ll learn about three simple ways you can build the best possible field service solution for your business. Whether you’re planning to dive in headfirst, or dip your toes in the water, you can find optimal solutions for your current and future needs. Check out the white paper and discover how you can use field service management solutions to your advantage!
Tags : 
    
U.S. Cellular
Published By: Simba by Magnitude     Published Date: Jul 12, 2019
Today’s C-level executives expect data and analytics to provide them with speed and agility to deliver competitive advantage and to disrupt new markets. But, in today’s complex data environment exists a near paradox between these expectations, that companies will be able to rapidly deliver value using data and analytics--and the complexities of the data landscape, making it more difficult to find, govern, connect to and access the data needed to deliver that value. Once thing is clear: if management expectation is to be met, simplifying connectivity is a must.In this white paper, veteran analyst Mike Ferguson, Managing Director of Intelligent Business Strategies explores how simplifying data access –connectivity –aligns expectations with data realities thus decreasing time to value.
Tags : 
    
Simba by Magnitude
Published By: Simba by Magnitude     Published Date: Sep 20, 2019
In this Q&Asession, data industry veteran Tony Fisher shares his insights on how –and why –connectivity unleashes an enterprise’s greatest asset -its data.Learn:?What macro trends are driving how companies think about data today??Why has data connectivity shifted from being just a tactical tool to becoming a strategic business priority??Where are businesses falling short in their ability to access and connect to their data?
Tags : 
    
Simba by Magnitude
Published By: ASG Software Solutions     Published Date: Dec 09, 2008
Generally, CMDBs populated by discovery tools alone simply aren't usable. They fail because they contain massive amounts of irrelevant information. You avoid this pitfall by correctly populating your CMDB in four simple steps.
Tags : 
asg, cmdb, bsm, itil, configuration management, metadata, metacmdb, lob
    
ASG Software Solutions
Published By: ASG Software Solutions     Published Date: Feb 24, 2010
A recent survey of CIOs found that over 75% want to develop an overall information strategy in the next three years, yet over 85% are not close to implementing an enterprise-wide content management strategy. Meanwhile, data runs rampant, slows systems, and impacts performance. Hard-copy documents multiply, become damaged, or simply disappear.
Tags : 
asg, cmdb, bsm, itil, bsm, metacmdb, archiving, sap
    
ASG Software Solutions
Published By: Marketo     Published Date: Sep 03, 2019
Your website is the hub of interaction between your company and your customers, and in an increasingly competitive digital landscape, today's buyers aren't simply looking for a one-size-fits-all customer experience. Web personalization empowers you to provide more relevant experiences to online visitors and speak to them with personalized messages at scale. It enables you to communicate across all marketing channels with a consistent voice and user experience that builds trust, engagement, revenue, and loyalty. In this ebook, discover how to: Integrate web personalization into your marketing strategy Incorporate cross-channel marketing in your web personalization strategy Create content to maximize the impact of personalization Leverage AI and machine learning to provide personalized web content Measure impact and success Choose the right web personalization tool for you Build a website that accelerates engagement, conversion, and retention by downloading the Introductory Guide to
Tags : 
    
Marketo
Published By: Upsite Technologies     Published Date: Sep 18, 2013
The average computer room today has cooling capacity that is nearly four times the IT heat load. Using data from 45 sites reviewed by Upsite Technologies, this white paper will show how you can calculate, benchmark, interpret, and benefit from a simple and practical metric called the Cooling Capacity Factor (CCF). Calculating the CCF is the quickest and easiest way to determine cooling infrastructure utilization and potential gains to be realized by AFM improvements.
Tags : 
ccf, upsite technologies, cooling capacity factor, energy costs, cooling, metrics, practical, benchmark
    
Upsite Technologies
Published By: Cornerstone OnDemand     Published Date: Nov 11, 2014
Is your recruiting process working for you? Do candidates refer others to your company, or are you scraping to fill your vacant positions? Fill out the form for your copy of Give Your Candidates What They Want and check out our top 5 simple ways to attract the BEST candidates:
Tags : 
    
Cornerstone OnDemand
Published By: Cornerstone OnDemand     Published Date: Jan 08, 2015
Download The 3 A's of Onboarding and see how Accommodating, Assimilating and Accelerating will make your onboarding programs work better for your new hires – and for your business.
Tags : 
    
Cornerstone OnDemand
Published By: Gigaom     Published Date: Oct 22, 2019
Nearly all cyberattacks must cross the network, but security analysts often struggle to make quick sense of traffic at scale for hunting and incident response, trapped between data-starved logs (e.g. Netflow) and too much data (full packets) to analyze in time. What if instead there was a “Goldilocks’ for network data? This free 1-hour webinar from GigaOm Research brings together experts in network traffic analysis, featuring GigaOm analyst Simon Gibson and a special guest from Corelight, Steve Smoot. They’ll discuss the evolution of network analysis and explain how open-source Zeek (formerly Bro) came to be the network traffic analysis tool of choice for security analysts to make fast sense of their traffic. We’ll dive into Zeek’s creation at Livermore Labs and discusses some of the challenges that come with using it in large, fast network environments and explain how Corelight enables organizations to quickly take advantage of the power of Zeek at scale. In this 1-hour webinar, you
Tags : 
    
Gigaom
Published By: Gigaom     Published Date: Oct 24, 2019
A huge array of BI, analytics, data prep and machine learning platforms exist in the market, and each of those may have a variety of connectors to different databases, file systems and applications, both on-premises and in the cloud. But in today’s world of myriad data sources, simple connectivity is just table stakes. What’s essential is a data access strategy that accounts for the variety of data sources out there, including relational and NoSQL databases, file formats across storage systems — even enterprise SaaS applications — and can make them all consumable by tools and applications built for tabular data. In today’s data-driven business environment, fitting omni-structured data and disparate applications into a consistent data API makes comprehensive integration, and insights, achievable. Want to learn more and map out your data access strategy? Join us for this free 1-hour webinar from GigaOm Research. The webinar features GigaOm analyst Andrew Brust and special guests, Eric
Tags : 
    
Gigaom
Published By: AWS     Published Date: Oct 09, 2019
When determining the best way to protect their applications and data on Amazon Web Services (AWS), organizations are often challenged by the high total cost of ownership and threat dwell times found in other security solutions. Armor can help your organization overcome these barriers and increase awareness of what is being deployed, and where, so you can better control your security policies. Attend our upcoming webinar to see how Armor helps customers reduce their time to market, accelerate development timeline, and gain quick, secure application access.
Tags : 
    
AWS
Published By: AWS     Published Date: Oct 09, 2019
How do you maintain secure systems and operations across an elastic, complex AWS environment? As SailPoint transformed from a startup to a publicly traded company, their AWS infrastructure grew as well. With this growth, SailPoint needed to be able to identify and respond to anomalous behavior quickly, while simultaneously trying to align their organization into a cohesive DevSecOps organization. Join this webinar to learn how SailPoint gained a holistic view into their cloud infrastructure, plus how you can enable your Security and DevOps teams with in-depth insights into AWS infrastructure to make actionable, data-driven decisions to reduce risk.
Tags : 
    
AWS
Published By: AWS     Published Date: Oct 09, 2019
As your business grows, so do your infrastructure needs. With their growing AWS infrastructure, it was important that Informatica simplify security, increase agility, and adopt a more DevOps-centric development model. Join our upcoming webinar to learn how Informatica leveraged RedLock, Palo Alto Networks’ security and compliance solution, to help build security earlier in the development process so vulnerabilities could be remediated faster. You will also learn how other businesses, like yours, can manage the security in your environment with greater ease and control.
Tags : 
    
AWS
Published By: AWS     Published Date: Oct 09, 2019
While digital transformation helps create many business opportunities, it can also expose your organization to new vulnerabilities and regulations which require new security solutions. Qualys Cloud Platform is intentionally built to give businesses comprehensive visibility and security of Amazon Web Services (AWS) workloads and hybrid environments while avoiding the cost and complexities that come with managing multiple security vendors. Qualys' offerings simplify security on AWS by integrating into workflows for streamlined deployment and use, while providing a complete view of the security and compliance posture of all your AWS assets across multiple accounts and regions from a centralized UI. Attend this upcoming webinar to learn more about the Qualys consolidated stack of security and compliance applications. Also learn how Ancestry.com, the largest for-profit genealogy company in the world, uses Qualys Cloud Platform on AWS to continuously assess their development and production e
Tags : 
    
AWS
Published By: Karya Technologies     Published Date: Nov 25, 2011
Access corporate desktop data at ease, even during commute. Remote access to desktop documents anytime, anywhere. Mobilize your enterprise file server
Tags : 
    
Karya Technologies
Published By: Neolane, Inc.     Published Date: Nov 17, 2010
Marketing is evolving and B2B Marketers that fail to embrace this change will become irrelevant. While shocking to some, this perspective is not new; it's simply becoming increasingly apparent to the B2B marketing community.
Tags : 
neolane, b2b, marketing, sirius, analytics, sales 2.1, tlbm, respondents
    
Neolane, Inc.
Published By: WhatCounts     Published Date: Apr 30, 2010
There's no reason overseeing and managing a million-plus subscriber email database should be a discombobulated and overbearing task. Start being an effective email marketer by creating a plan, brushing up on your skills, and cleaning house. Implementing these six simple tweaks will go a long way towards maximizing the return, response, and revenue from your email program.
Tags : 
whatcounts, email marketing, subscriber lists, email database, databasing
    
WhatCounts
Published By: Asure HR     Published Date: Nov 18, 2013
This paper will offer you clear insight into ways of determining how much money your organization is losing through inefficient payroll processes. More importantly, it will provide you with clear, simple directions for correcting the problem immediately with little risk to the organization’s cash flow.
Tags : 
    
Asure HR
Published By: Asure HR     Published Date: Nov 18, 2013
Employee scheduling can be an incredibly complex task. This guide will explain how employee scheduling provided by Asure Software will reduce human error and improve workforce productivity.
Tags : 
    
Asure HR
Published By: SuccessFactors     Published Date: Jun 25, 2012
In this paper, we analyze the implications and costs of purchasing and implementing cloud-based software (SaaS) vs. traditional on-premise software. Get your copy now, compliments of SuccessFactors.
Tags : 
successfactors, saas, on-premise software
    
SuccessFactors
Published By: Astaro     Published Date: Jan 19, 2011
Botnets are based on similar principles as legitimate clouds, but serve malicious business interests. Find out more about how botnets work and the right steps after having detected infected machines within your own network.
Tags : 
astaro, cloud computing, botnets, network, security
    
Astaro
Published By: Campaigner     Published Date: May 26, 2010
Email marketing is one of the best performing marketing channels online. According to the DMA, for every dollar spent on email marketing, you can expect a return on investment of $43. But it's not as simple as sending an email to a list to get this sort of result.
Tags : 
campaigner, opt-in, email marketing, emarketing, roi, email, newsletter
    
Campaigner
Published By: Dice     Published Date: Jan 28, 2015
Put up a job listing and you’ll get a number of resumes. Is that success? Quantity is never the goal. Quality is. So, what does it take to attract the best talent? If it were as simple as free meals, this article would be very short.
Tags : 
    
Dice
Published By: Dice     Published Date: Jan 28, 2015
Millennials (a.k.a. Generation Y), defined as people born anywhere from 1980 to 1999, have access to technology, communications, and publishing that simply wasn’t available decades ago. As a result, they have demands for career and lifestyle that are often different than older generations. To find out what it takes to draw in this highly sought-after community, we asked recruiters and anyone hiring young talent what they believe are the “must-adopt” recruiting techniques for hiring Millennials.
Tags : 
    
Dice
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.