Business Management

Business Management characterises the process of leading and directing all or part of an organisation (often a business) through the deployment and manipulation of resources (human, financial, material, intellectual or intangible).
Results 76 - 100 of 1295Sort Results By: Published Date | Title | Company Name
By: Microsoft Office 365     Published Date: Sep 08, 2016
Data breaches are more than a security problem. A significant attack can shake your customer base, partner relations, executive staff, profits, and revenue. Historic data breaches have cost executives their jobs, resulted in major revenue losses and damaged brand reputations.
Tags : business intelligence, business management
     Microsoft Office 365
By: Microsoft Office 365     Published Date: Sep 08, 2016
In conjunction with Forrester Consulting, Microsoft commissioned a Total Economic Impact study to examine the potential return on investment businesses can receive through the deployment of Office 365. To better understand the benefits, costs, and risks associated with an Office 365 implementation, we interviewed four existing customers and surveyed 72 midsized organizations about the use of Microsoft business products the SaaS platform, including Office Professional Plus, Exchange, Skype for Business, SharePoint, Yammer, and OneDrive.
Tags : microsoft, technology, communication, return on investment, forrester consulting, business intelligence, business management
     Microsoft Office 365
By: Microsoft Office 365     Published Date: Sep 08, 2016
According to Microsoft CEO Satya Nadella, Office 365 is Microsoft’s most strategic API. But to realize the potential of this business collaboration platform, Microsoft and its partners have to convince business and IT leaders that it offers levels of security, privacy, and compliance that are equal to or higher than those of their existing on premise solutions.
Tags : business intelligence, business management
     Microsoft Office 365
By: Polycom     Published Date: Sep 07, 2016
"Seeing is believing. How we connect and collaborate is changing. It’s no longer about reviewing a PowerPoint deck or a document sent out in advance in the meeting invite over a voice bridge. It’s now about collaborating and working in real time with voice, video and content sharing—as a team. Together, Microsoft and Polycom make it simple. Watch now an interactive session covering the following hot topics: How the new Office 365 Services and Skype for Business Online change the collaboration experience and reduce conferencing/communications costs. How you can turn your conference rooms and huddles spaces into productive, collaborative workspaces. Polycom RealPresence Trio and how it accommodates our 3 collaboration needs: Voice, Content and Video. How easy it is to set up and how easy it is for users to connect. How flexible your workspace transition plan can be. Don’t miss this session featuring Polycom and Skype for Business solutions experts, Peter Huboi and Jovito Salonga, for a d
Tags : business optimization, business strategy, network management, business applications, best practices, business process management, collaboration, productivity, business management
     Polycom
By: Polycom     Published Date: Sep 07, 2016
"“Work” doesn’t have to be a place your employees go, it’s something they do, irrespective of time, location, and the devices used. Today, video-enabled devices allow people to work and communicate from virtually anywhere. In “Best Practices in Creating Collaborative Workspaces” on-demand webinar, we’ll show you how you can enable users to communicate in open spaces while focusing on greater productivity and stronger team cohesion and collaboration. Join Polycom leaders Amy Barzdukas and Chris Thorson as they share best practices on workplace collaboration and flexible work environments. "
Tags : best practices, business optimization, business management, application management, enterprise application, business intelligence, productivity, business integration
     Polycom
By: Panasonic Business Mobility Solutions     Published Date: Sep 06, 2016
A surprising 80% of the 30 million1 warehouse workers worldwide, in the field of transportation and logistics, are still using pen and paper in a physically-intensive environment that increasingly demands accuracy and real time feedback. With warehouse efficiency, so closely tied to customer satisfaction in areas like ecommerce, the low penetration of digital solutions—20% as recent as 2014, is surprising. Unless an organization has a fully automated warehouse, the job is heavily labor-intensive. VDC research reveals that as long as human labor plays a dominant role in warehousing, any technology that optimizes workflows and improves accuracy will add tremendous value
Tags : mobile workforce, laptops, tablet, mobile computing, productivity, rugged, mobile handheld, mobile scanner, business management
     Panasonic Business Mobility Solutions
By: Oblong     Published Date: Sep 06, 2016
Featuring Gartner Research Gartner recently conducted research to evaluate innovative products and services to comprise its report: “Cool Vendors in Human-Machine Interface, 2016.” Explore the organizations that are transforming how we interact with our devices in the workplace. Receive special insights into a paradigm shift in the way we work known as Infopresence, which is enabled by the Oblong technology spotlighted in the report.
Tags : oblong, immersive environment, digital workplace, workplace engagement, telepresence, business management
     Oblong
By: IBM     Published Date: Aug 25, 2016
Today’s leading enterprises are undergoing a digital transformation. They are diving into the API economy, in which businesses provide services—and the services of partners—when and where customers want them.
Tags : ibm, api, microservices, information management, saas, customer service, application integration, business activity monitoring, business management, customer interaction service, customer experience management, project management, service management, data warehousing
     IBM
By: Collective Health     Published Date: Aug 24, 2016
o This actionable resource guide covers 7 ways you can think like a marketer to create a compelling Open Enrollment communications campaign. Use it to create an engaging and understandable experience for your people. The guide includes: ? Tips for developing communications your people will actually open, read, and understand ? Borrowing cardinal rules from consumer marketers and making them work for you ? Setting goals, strategy, and measuring ROI for this year's Open Enrollment
Tags : best practices, communications, business management, business analytics
     Collective Health
By: Collective Health     Published Date: Aug 24, 2016
o This guide gives you the practical, actionable steps your team needs to simplify and improve your company's health plan designs so they make sense for your business and your people. It walks through: ? How plan designs get lost in translation ? Plan design: myths vs. reality ? Strategic questions for your team ? Tips to improve and simplify your plan designs
Tags : best practices, business management, health plan
     Collective Health
By: LifeLock     Published Date: Aug 23, 2016
Employers search regularly for new ways to engage their employees. But how do organizations settle on that perfect “something extra”? Download now and find out how an out of the box idea can help maintain employee loyalty and protect your brand.
Tags : best practices, employee benefits, business management, business analytics
     LifeLock
By: LifeLock     Published Date: Aug 23, 2016
The impact of data breaches and identity theft on a business cannot be overstated. Offering identity theft protection is one solution. Discover how to help protect your business and your employees if they have a non-employer related fraud attack.
Tags : best practices, identity theft, security, protection, application integration, business analytics, business management
     LifeLock
By: EMC Converged Platforms     Published Date: Aug 19, 2016
VCE VxRail Appliances enable organizations to create IT certainty by eliminating complexity and collapsing cost structures while leveraging their existing VMware investments. Based on VMware’s VMware's market-leading Hyper-Converged Software, VxRail delivers a known and proven building block for the software defined data center. It provides IT organizations with a full range of options to create a flexible, optimized infrastructure that dramatically simplifies their IT operations while reducing costs.
Tags : software, network management, network solutions, best practices, business intelligence, productivity, business optimization, security, software development, application integration, business management
     EMC Converged Platforms
By: Dell     Published Date: Aug 17, 2016
This paper details the benefits of switching to Windows 10 and the best new features of the new OS for business. Explore the benefits of moving to modern operating systems and get a quick list of actions you can take to ease the way.
Tags : windows 10, best practices, technology, data, business management, business analytics
     Dell
By: Dell     Published Date: Aug 17, 2016
Make your employees happier, increase their performance and reduce IT support costs by upgrading to a Latitude 5470. Dell partnered with Principled Technologies to create three productivity-based workflows to see how quickly the new Dell Latitude E5470 laptop powered by the latest 6th generation Intel Core i5-6300U processor performed compared to previous generations.
Tags : technology, best practices, productivity, data, competitive advantage, business analytics, business management
     Dell
By: Coupa     Published Date: Aug 10, 2016
Less can really mean more. Less paper pushing and less human touch mean more visibility, more compliance and more savings across the organization. Download your guide to touchless e-Invoicing to learn why.
Tags : business management, automation, best practices, business analytics, business integration, business intelligence
     Coupa
By: Coupa     Published Date: Aug 10, 2016
Manual work in accounts payable is a large source of costs that can be cut relatively quickly through automation. With AP automation it's possible to reduce the cost of processing a single invoice by as much as $10. Learn how you unlock the strategic value of accounts payable with the Coupa AP Automation Success Kit. Discover how to transform your AP invoicing processes to realize significant savings that directly impact the bottom line while improving governance and compliance.
Tags : business management, finance, accounts payable, best practices, governance and compliance, business analytics, business intelligence
     Coupa
By: Oracle_Hospitality F&B     Published Date: Aug 08, 2016
In our new report, Cost Control in Food & Beverage: How Technology Can Help Maximize Profits, we surveyed more than 200 independent operators and chains to understand how they are managing labor, inventory, and loss prevention costs.
Tags : cost control, best practices, technology, maximize profit, operators, business analytics, business management
     Oracle_Hospitality F&B
By: Oracle_Hospitality F&B     Published Date: Aug 08, 2016
The millennial generation is larger than baby boomers or Gen X. 77% visit a restaurant once a week, and they are expected to spend an average of $3,900 on travel this year alone. Our research report discusses how you can win the business of this unique group of individuals.
Tags : hospitality, best practices, millennial, customer service, business analytics, business management
     Oracle_Hospitality F&B
By: LogRhythm     Published Date: Aug 08, 2016
The need for early detection of targeted attacks and data breaches is driving the expansion of new and existing SIEM deployments. Advanced users are looking to augment SIEM with advanced profiling and analytics.
Tags : cyber threat, cyber risk, technology, best practices, business management, business analytics, security
     LogRhythm
By: LogRhythm     Published Date: Aug 08, 2016
Security threats continue to be more sophisticated and advanced with each day, with the majority often going completely undetected. • Organizations are usually scrambling to keep up and implement new security controls to protect themselves, which adds a new layer of complexity. • With the rise of Advanced Persistent Threats (APTs) and insider attacks, it becomes extremely difficult for security staff to detect all the risks. • Many IT and IT Security staff are already stretched thin by keeping track of many different security technologies that already exist.
Tags : security, technology, best practices, information technology, business analytics, business management
     LogRhythm
By: LogRhythm     Published Date: Aug 08, 2016
IT environments have become much more vulnerable as enterprise mobility, cloud services and “bring-your-own-everything” have broken down the defensible perimeter and added layers of complexity to securing the enterprise. At the same time, the nature of cyber threats has changed dramatically. Threat actors are well organized and well funded, and many of them are known to be supported by nation states. They have sophisticated technical skills which allow these actors to create custom malware for very specific targets, and they are relentless in pursuit of their objectives. Moreover, almost anyone with a malicious intent can purchase malware and rent botnets on the Dark Web, lowering the bar for criminal entities, nation states, and terrorists to use cyber as a weapon of choice towards their intended purpose.
Tags : security, technology, best practices, information technology, cyber threats, mobility, business analytics, business management
     LogRhythm
By: LogRhythm     Published Date: Aug 08, 2016
Among the countless changes in Windows 10 Microsoft has provided IT organizations more visibility into auditable actions on Windows 10 machines and the resulting events in the Security Log. Understanding these enhancements is important because we need every edge we can get to detect endpoint intrusions. Threat actors use a sophisticated mix of phishing, social engineering, and malware to attempt to compromise any user within an organization. A seemingly benign order request sent to a salesperson or a benefits summary to someone in HR can contain attachments infected with malware. Once such payloads are in, the goal is to determine how to leverage current users and other accounts on the compromised machine to access valuable and sensitive data, as well as how to spread out within the organization and repeat the process.
Tags : microsoft, security, best practices, data, business analytics, business management
     LogRhythm
By: LogRhythm     Published Date: Aug 08, 2016
Over the past three years, ransomware has jumped into the spotlight of the cyber threat landscape. Kaspersky Lab reports that in 2015, its solutions detected ransomware on more than 50,000 computers in corporate networks—double the figure for 2014. Even at this rate of detection, Kaspersky admits that the real number of incidents is several times higher than what has been detected and reported.1 In just the first quarter of 2016, $209 million was paid out to cyber criminals using ransomware. The FBI estimates that losses to be incurred in 2016 due to ransomware will top $1 billion.2 Once again, this is just the tip of the iceberg.
Tags : security, technology, best practices, information technology, business analytics, business management
     LogRhythm
By: LogRhythm     Published Date: Aug 08, 2016
It feels as if these folks have been around forever. They started life as a SIEM with a heavy emphasis on log management. Today they are all that plus a solid suite of next-generation attributes. They have many of the attributes of next-gen SIEMs: artificial intelligence, sophisticated log correlation, sophisticated pattern recognition and behavioral analysis. Their strength is, as it always has been, log management. But “log management” has taken on an entirely new dimension with this product. As is absolutely necessary today, it has the intelligence to analyze, correlate and make sense of huge amounts of data.
Tags : security, technology, best practices, information technology, business intelligence, business analytics, business management
     LogRhythm
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search White Papers