manager

Results 1276 - 1300 of 1306Sort Results By: Published Date | Title | Company Name
By: Anaplan     Published Date: Apr 14, 2016
Finance is constantly tested to keep pace in today’s business environment. To keep up, planning needs to become a continuous process that spans departmental boundaries and enables managers to collectively realign resources to respond to market changes. Organizations must streamline disparate sales and operational planning with traditional financial planning and analysis by using technology to connect people, data, and processes across the organization.
Tags : 
     Anaplan
By: Staples     Published Date: Jan 22, 2018
Shipping managers want suppliers they can trust. Learn how Staples Business Advantage delivers on the qualities you should care about most — including personal account management, industry expertise, quality referrals and more.
Tags : 
     Staples
By: Staples     Published Date: Jan 22, 2018
As a shipping manager, there are a lot of wrong turns you can take. Use this handy cheat sheet to make sure you avoid those mistakes and get your shipments out on time, every time.
Tags : 
     Staples
By: Staples     Published Date: Jan 22, 2018
Innovations in shipping supplies make for stronger packages — and lower costs. See the latest products and technologies every shipping manager should know about, from Dave Fromm of Staples Business Advantage’s Industrial Shipping Supplies Group.
Tags : 
     Staples
By: Staples     Published Date: Jan 22, 2018
When you’re a shipping manager, your day is always packed. Meet the partner that can help streamline and improve your shipping processes — Staples Business Advantage.
Tags : 
     Staples
By: AWS     Published Date: Jun 11, 2019
Join us to learn why Human-in-the-Loop training data should be powering your machine learning (ML) projects and how to make it happen. If you’re curious about what human-in-the-loop machine learning actually looks like, join Figure Eight CTO Robert Munro and AWS machine learning experts to learn how to effectively incorporate active learning and human-in-the-loop practices in your ML projects to achieve better results. You'll learn: When to use human-in-the-loop as an effective strategy for machine learning projects How to set up an effective interface to get the most out of human intelligence How to ensure high-quality, accurate data sets When: Available On Demand (please register to view) Who Should Attend: IT leaders and professionals, line-of-business managers, business decision makers, data scientists, developers, and other experts interested in implementing AI/ML on the cloud are encouraged to attend this webinar. AWS Speaker: Chris Burns, Solutions Architect Figure Eight Spea
Tags : 
     AWS
By: Genesys     Published Date: Jun 08, 2018
In Gartner’s 2018 Magic Quadrant for Contact Center Infrastructure, Worldwide, Genesys has once again maintained a leadership position. Placed furthest among all vendors in completeness of vision for 10 years and counting, our position continues to validate our mission to power the world’s best customer engagement solutions for organizations of all sizes—both in the cloud and on-premises. And according to Gartner peer insights, customers agree. “Great implementation that was on-time and on-budget!” — CTO in the finance industry “Solid platform with a lot of features at a reasonable cost.” — IT Manager of Software Engineering in the Services Industry Get the report now to learn: • How contact center vendors compare and which quadrant they are aligned to • Analyst views on the strengths and cautions of all participating vendors • How to evaluate key criteria to guide your decision-making process
Tags : contact center, infrastructure, customer engagement, cloud, on-premises
     Genesys
By: Hewlett Packard Enterprise     Published Date: Jul 18, 2018
Cost Savings And Business Benefits Enabled By The 3PAR StoreServ All-Flash Storage System and Recovery Manager Center (RMC)
Tags : 
     Hewlett Packard Enterprise
By: Hewlett Packard Enterprise     Published Date: Jul 18, 2018
Cost Savings And Business Benefits Enabled By The 3PAR StoreServ All-Flash Storage System and Recovery Manager Center (RMC)
Tags : 
     Hewlett Packard Enterprise
By: CA Technologies     Published Date: Jun 01, 2018
CA Privileged Access Manager (PAM) is a well-integrated suite that provides a comprehensive solution for privileged identity management in physical and virtual environments. CA PAM enables centralized control and management of privileged user access to a broad range of servers, network devices and applications.
Tags : 
     CA Technologies
By: CA Technologies     Published Date: Jun 01, 2018
Within any organization, the most dangerous users are those with privileged access to the company’s most valuable and sensitive data assets. This includes systems administrators, business managers, partners, suppliers, and service providers, and also takes into account the automated interactions between business machines, systems, and applications. Privileged access has always been a high-risk issue, but for too long, organizations have not understood or have chosen to ignore the risks, preferring instead to rely on the integrity of the individuals and systems involved. A number of high-profile security breaches over the last two years have highlighted the damage that a rogue systems administrator or stolen privileged credentials can cause. Today, fewer than half of all business organizations have deployed the type of privileged identity management (PIM) solution that could help improve the situation. This Ovum Decision Matrix (ODM) provides an in-depth view of the leading PIM solution
Tags : 
     CA Technologies
By: Determine (Selectica)     Published Date: Sep 13, 2016
The sponsor named below commissioned Ardent Partners to write this report. While the report topic In 2015, collaboration is the name of the game in procurement and frequently entails working with key internal stakeholders (like line-of-business managers and legal departments) or preferred suppliers to drive greater value through sourcing and procurement. For Chief Procurement Officers ("CPOs") and other supply management leaders, collaboration has taken on many new and innovative forms over the years, causing these executives to leverage new (and, in some cases, existing) processes, relationships, and technologies to enhance compliance, decrease risk, and increase savings. One such business process, contract management, has been reborn with digital, automated features that can shift the way procurement teams collaborate, mitigate risk, drive performance, and realize greater savings for the enterprise.
Tags : 
     Determine (Selectica)
By: IBM     Published Date: Oct 26, 2017
Identity and access management exists for one critical reason—security. Organizations need to make certain the right people have access to the right resources to do their jobs—and that people without proper authorization can’t get in. In an era the IBM X-Force security team recently described as experiencing “an ever-upward trend of more attacks, more leaked records and more varied threats,” security is a critical function for business as well as IT.
Tags : access manager, security, cloud service, microsoft office 365, it strategies
     IBM
By: Lookout     Published Date: Mar 28, 2017
In today’s Bring Your Own Device (BYOD) world more than a few IT managers have lost sleep over the thought of an employee device, loaded with sensitive company data, falling into the wrong hands. Lookout commissioned Forrester Consulting to conduct a national survey of IT managers in the Fall of 2013 that uncovered substantial security concerns related to mobile devices, especially around malware and data loss. Ultimately, the survey revealed that IT managers do not believe existing security solutions can adequately address the mobile security challenges faced by businesses today.
Tags : insights, mobile, security, byod, lookout
     Lookout
By: Lookout     Published Date: Mar 28, 2017
Enterprise mobility started with the Blackberry, a revolutionary messaging device that solved security concerns by giving IT managers the ability to set many restrictions on its functionality. In the following years, employees started using fully-functional, internet-capable smartphones in their personal lives and demanded the same capabilities at work.
Tags : enterprise, mobile, security, lookout, revolutionary
     Lookout
By: HotSchedules     Published Date: Sep 11, 2018
The cost of labor can be managed effectively when restaurateurs are equipped with the right training, tools and processes. Traditional methods for capturing critical forecasting data and formulating labor plans & budgets are incomplete and often inaccurate, rarely accounting for menu pricing changes or current economic conditions. Even when the best practices of forecasting are employed, the information isn’t always available to the store managers who are attempting to manage the cost of labor. This ebook will walk you through the ins and outs of labor forecasting and best practices to build efficiency, grow revenue, and positively impact your restaurant’s bottom line.
Tags : 
     HotSchedules
By: OnBase by Hyland     Published Date: May 16, 2017
With smartphones and tablets now standard-issue office gear,workers fully expect to have mobile access to critical data and business applications wherever and whenever the need arises.And it’s not just the average field worker or sales rep who stands to benefit from remote access. An IDG survey found that 61% of the executive managers saw value in accessing critical business data while offline via their mobile devices. This IDG whitepaper proves that offline access is the key to unlocking mobility’s promise.
Tags : hyland, offline access, mobility, remote access, mobile access, business applications
     OnBase by Hyland
By: Kronos     Published Date: Sep 20, 2018
If you’ve tried managing your retail operation’s labor performance without reliable, real-time data, you know the costly shortcomings of this approach. Tap into clear, easy-to-access workforce data — a single view of all elements of your workforce that empowers you to make effective decisions and protect your bottom line. Workforce Analytics for Retail transforms labor and sales data into meaningful business intelligence. Learn how managers can make data-driven decisions that optimize workforce utilization, control labor costs, and drive continuous improvement.
Tags : 
     Kronos
By: CA Technologies EMEA     Published Date: Sep 07, 2018
If you’re relying on manual processes for testing applications, artificial and automated intelligence (AI) and machine learning (ML) can help you build more efficient continuous frameworks for quality delivery. In this on-demand webinar, “Continuous Intelligent Testing: Applying AI and ML to Your Testing Practices,” you’ll learn how to: Use AI and ML as the new, necessary approach for testing intelligent applications. Strategically apply AI and ML to your testing practices. Identify the tangible benefits of continuous intelligent testing. Reduce risk while driving test efficiency and improvement. This webinar offers practical steps to applying AI and ML to your app testing. The speaker, Jeff Scheaffer, is senior vice president and general manager of the Continuous Delivery Business Unit at CA Technologies. His specialties include DevOps, Mobility, Software as a Service (SaaS) and Continuous Delivery (CDCI).
Tags : 
     CA Technologies EMEA
By: CA Technologies EMEA     Published Date: Sep 07, 2018
Companies struggle to find the right test data when testing applications which leads to bottlenecks, defects and constant delays. There is a better way and we want to show you how: Join us for this webcast to learn: - How Test Data Manager finds, builds, protects and delivers test data fast! - How to get your testing teams moving towards self sufficiency with test data Get your questions answered. Come away happy! Recorded Aug 20 2018 60 mins Presented by Prashant Pandey, CA Technologies
Tags : 
     CA Technologies EMEA
By: CA Technologies EMEA     Published Date: Sep 11, 2018
SDx Central host a webcast to look at troubleshooting top-down application performance in Cisco SDWAN networks as well as assessing impact to application bottoms- up in a Cisco ACI data Center. Featuring: Jeremy Rossbach, Sr. Product Marketing Manager, CA Technologies Jason Normandin, Sr Principal Manager, CA Technologies Jessica Lyons Hardcastle, Senior Editor, SDx Central
Tags : 
     CA Technologies EMEA
By: OKTA     Published Date: Oct 11, 2017
Most organizations have a dirty little secret: they are relying on user and password-based authentication to protect sensitive internal applications. With 81% of data breaches involving weak or stolen credentials1, applications that use single-factor authentication are an easy target for attack. Unfortunately, updating internal cloud applications—as well as legacy and custom applications—to support multi-factor authentication can be an IT headache for many organizations. Okta and Palo Alto Networks have collaborated to make rolling out multi-factor authentication a snap. Join Daniel Lu, Product Marketing Manager at Okta and Kasey Cross, Sr. Product Marketing Manager at Palo Alto Networks, to learn: >The latest trends in credential-based attacks >Why every sensitive cloud application needs multi-factor authentication >How to enforce network-level multi-factor authentication without touching your apps using Palo Alto Networks and Okta
Tags : 
     OKTA
By: CyberSource     Published Date: Sep 26, 2017
Our latest report examines the trends and challenges facing fraud managers today and provides the strategies to address them. Learn how your peers are faring, and see how you compare to them.
Tags : 
     CyberSource
By: IBM     Published Date: Jul 09, 2018
Data is the lifeblood of business. And in the era of digital business, the organizations that utilize data most effectively are also the most successful. Whether structured, unstructured or semi-structured, rapidly increasing data quantities must be brought into organizations, stored and put to work to enable business strategies. Data integration tools play a critical role in extracting data from a variety of sources and making it available for enterprise applications, business intelligence (BI), machine learning (ML) and other purposes. Many organization seek to enhance the value of data for line-of-business managers by enabling self-service access. This is increasingly important as large volumes of unstructured data from Internet-of-Things (IOT) devices are presenting organizations with opportunities for game-changing insights from big data analytics. A new survey of 369 IT professionals, from managers to directors and VPs of IT, by BizTechInsights on behalf of IBM reveals the challe
Tags : 
     IBM
By: Akamai Technologies Australia     Published Date: Feb 07, 2018
Bot Manager provides identification, categorization, management, and reporting of bot traffic in the cloud with the globally distributed Akamai Intelligent Platform.
Tags : 
     Akamai Technologies Australia
Start   Previous    39 40 41 42 43 44 45 46 47 48 49 50 51 52 53    Next    End
Search White Papers      

Add White Papers

Get your white papers featured in the insideHPC White Paper Library contact: Kevin@insideHPC.com