cornerstone

Results 1 - 25 of 255Sort Results By: Published Date | Title | Company Name
Published By: OneUpWeb     Published Date: Jul 27, 2010
Separate fact from fiction with Oneupweb's new white paper on social media. By now you've heard the buzz about social media, and it's true, it is a cornerstone for branding, sales growth and PR.
Tags : 
oneupweb, usability, driving sales, e-commerce, ecommerce, task, clickability, demographics, design, website design, social media, marketing plans, growth
    
OneUpWeb
Published By: SAP     Published Date: Aug 14, 2018
Today, ERP is a cornerstone of many organisations’ tech infrastructure. Yet many of the solutions in play are legacy products, decades old and designed for an entirely different business landscape. With industry leaders expressing concern that out-of-date ERP solutions have now become an impediment to competitive business, IDC set out to uncover what exactly modern companies need from their ERP systems, and why SAP S/4Hana seems so well placed to deliver.
Tags : 
    
SAP
Published By: Pega     Published Date: May 25, 2016
Customer service is the cornerstone of a great customer experience. However, in today’s digital consumer age, organizations no longer decide how customer-centric their companies are, the customers do. According to the “The Forrester Wave™: Customer Service Solutions For Enterprise, Q4 2015” report, customer service technology investments are one of the top five most focused on investments that companies made in 2015. Why? Because good customer service boosts long-term loyalty. This report identifies the 11 most significant customer service solutions with Pegasystems ranking as a leader. Download this Forrester Wave report and get detailed findings on how well each vendor fulfills Forrester’s criteria and where they stand in relation to other vendor solutions in order to help customer service professionals select the right partner for their customer service initiatives.
Tags : 
best practices, customer service, forrester, wave report, technology
    
Pega
Published By: Pega     Published Date: May 25, 2016
CRM Provides The Cornerstone Of A Great Customer Experience
Tags : 
best practices, competitive advantage, pegasystems, business practices
    
Pega
Published By: Carbonite     Published Date: Apr 09, 2018
Malware that encrypts a victim’s data until the extortionist’s demands are met is one of the most common forms of cybercrime. And the prevalence of ransomware attacks continues to increase. Cybercriminals are now using more than 50 different forms of ransomware to target and extort money from unsuspecting individuals and businesses. Ransomware attacks are pervasive. More than 4,000 ransomware attacks happen every day, and the volume of attacks is increasing at a rate of 300 percent annually.1 According to an IDT911 study, 84 percent of small and midsize businesses will not meet or report ransomware demands.2 No one is safe from ransomware, as it attacks enterprises and SMBs, government agencies, and individuals indiscriminately. While ransomware demands more than doubled in 2016 to $679 from $294 in 2015, the cost of remediating the damage and lost productivity is many multiples higher.3 Ransomware is the equivalent of catastrophic data loss, except
Tags : 
    
Carbonite
Published By: IBM     Published Date: Mar 28, 2018
The global electronics industry is the cornerstone of the digital economy and the Internet of Things (IoT). Electronic devices act as conduits for users’ digital experiences, which are now seamlessly enabled and updated in the cloud. The industry’s digital device success has also introduced its latest challenge: going beyond the device. Leveraging data to drive insights is key to delivering greater value. Doing so requires electronics firms to flawlessly integrate hardware, software, services and data while learning from and adapting to users. Through Digital ReinventionTM, they can combine digital approaches and data by design to drive new capabilities, changing business from the ground up
Tags : 
    
IBM
Published By: Pega     Published Date: Dec 16, 2015
Customer service is the cornerstone of a great customer experience. However, in today’s digital consumer age, organizations no longer decide how customer-centric their companies are, the customers do. According to the “The Forrester Wave™: Customer Service Solutions For Enterprise, Q4 2015” report, customer service technology investments are one of the top five most focused on investments that companies made in 2015. Why? Because good customer service boosts long-term loyalty. This report identifies the 11 most significant customer service solutions with Pegasystems ranking as a leader.
Tags : 
    
Pega
Published By: Cornerstone OnDemand     Published Date: Jul 28, 2015
Download this white paper to learn the true cost of not having a talent management onboarding strategy.
Tags : 
human resources, talent management, onboarding strategy, training, recruiting, productivity, employee training, retention, employee engagement
    
Cornerstone OnDemand
Published By: Cornerstone OnDemand     Published Date: Jul 28, 2015
Download this white paper to learn more about the importance of a talent management succession strategy.
Tags : 
talent management strategy, succession, productivity, managers, c-suite, executive level, vacancies, talent pool
    
Cornerstone OnDemand
Published By: Cornerstone OnDemand     Published Date: Jul 28, 2015
Download this white paper to learn the importance of a talent management performance strategy.
Tags : 
talent management strategy, performance management, learning, succession, recruiting, employee engagement, retention
    
Cornerstone OnDemand
Published By: Cornerstone OnDemand     Published Date: Jul 28, 2015
Are you managing people with spreadsheets and paper because you think it saves you time and money? The reality is it's probably costing you a lot more than you think. Read this white paper to see how.
Tags : 
talent management strategy, recruiting, hiring, training, onboarding, learning, succession
    
Cornerstone OnDemand
Published By: Red Hat     Published Date: Jul 01, 2013
OpenStack is poised to become a cornerstone of the emerging cloud system software market, but “generic” OpenStack can be challenging. Drawing on its experience with enterprise Linux, Red Hat is delivering a commercially supported and tested version of OpenStack that’s “enterprise-ready.”
Tags : 
red hat, idc, virtualization, cloud system software, infrastructure-as-a-service, cloud providers, hypervisor is commoditizing, enterprise linux, virtualization market, integration, infrastructure
    
Red Hat
Published By: Allscripts     Published Date: Oct 20, 2014
Download this case study to learn how Allscripts Professional solutions have helped Cornerstone Medical Care in Brandon, Florida negotiate value-based contracts, accounting for a seven-figure increase in revenue.
Tags : 
allscripts, health information technology, reduce paperwork, technology core, value based care, value based contracts, risk based contracts
    
Allscripts
Published By: Allscripts     Published Date: Oct 24, 2014
Cornerstone Medical Care, a 10-provider practice in Brandon, Florida is currently using Allscripts EHR solutions to shift from fee for service to value based care. Today, their risk-based contracts have accounted for a seven-figure increase in revenue. Download the webinar now to learn how!
Tags : 
allscripts, ambulatory practice, value based care, ehr replacement, ehr solution, risk based contracts, actionable data
    
Allscripts
Published By: Symantec     Published Date: Jul 09, 2017
This paper provides a brief recap of the functionality provided by web proxies, why proxy architecture is still a vital building block for a comprehensive web defense, and how web proxies can work with other solutions such as next-gen firewall (NGFW) to deepen the organization’s defenses against advanced web-based threats.
Tags : 
cybercrime, swg, secure web gateway, firewall, security., threat and vulnerability management
    
Symantec
Published By: Oracle     Published Date: Jan 11, 2017
Cloud, mobile, social media, and big data were once considered intimidating new technologies by CFOs; today they are the cornerstone of any successful financial department. That’s the evolution of digitization. The role of the CFO is evolving to become more strategic and CFOs of established firms are taking notice that going digital creates value.
Tags : 
    
Oracle
Published By: Dell & Microsoft     Published Date: Aug 14, 2013
Laying the Cornerstone of the Next Generation of Computing
Tags : 
microsoft windows server, 2013, next generation computing, dell poweredge, storage, networking, systems management
    
Dell & Microsoft
Published By: Teradata     Published Date: Jan 30, 2015
Hadoop is the rising star of the business technology agenda for a simple reason — it disrupts the economics of data, analytics, and someday soon, all enterprise applications; it is secretly becoming an application platform too. Application development and delivery (AD&D) professionals should be aware of and take action on these eight predictions, including the disruptive power of “Hadooponomics,” Hadoop’s current killer app, the closing data management gap, and the emergence of brand new distros.
Tags : 
hadoop, hadoop adoption, cornerstone, business technology, hadooponomics, enterprise adoption, applications
    
Teradata
Published By: Carbonite     Published Date: Oct 12, 2017
Malware that encrypts a victim’s data until the extortionist’s demands are met is one of the most common forms of cybercrime. And the prevalence of ransomware attacks continues to increase. Cybercriminals are now using more than 50 different forms of ransomware to target and extort money from unsuspecting individuals and businesses.
Tags : 
ransomware, malware, cybercrime, lockscreen, encryption
    
Carbonite
Published By: INT_AstuteIT_ABM_DoubleTouch_BENELUX     Published Date: Feb 23, 2018
Technology offers the opportunity for brands to compete - and win - on a rising standard of customer service delivery. Changing cornerstones of engagement: consumers may seem like they stick with their service providers no matter what, but marketers can’t be complacent. To stop their valued customers adding services elsewhere, organizations need to fulfill a new set of standards.
Tags : 
management, call center, website, mobile, app
    
INT_AstuteIT_ABM_DoubleTouch_BENELUX
Published By: Group M_IBM Q1'18     Published Date: Jan 17, 2018
IBM Security Guardium tools can be the cornerstone of an enterprise’s compliance initiative for GDPR personal data protection requirements.
Tags : 
gdpr, compliance, data protection, personal data
    
Group M_IBM Q1'18
Published By: Dell Software     Published Date: Oct 03, 2013
To see how UEM has turned into “the most effective transformer for better IT business alignment,” download User Experience Management and Business Impact – A Cornerstone for IT Transformation today.
Tags : 
web analytics, foglight, dell, user experience management, customer behavior tracking, customers, best practices, increase customer conversion
    
Dell Software
Published By: Uberflip     Published Date: Mar 16, 2018
When it comes to content production, marketers across the globe can let out a collective “we’ve got this.” Content marketing is now the cornerstone of most organizations’ marketing strategies. In fact, 91 percent of all B2B companies use content marketing. And 38 percent of North American marketers say they expect their content marketing budget to increase in the next 12 months. We’ve invested heavily in it because it works.
Tags : 
    
Uberflip
Published By: Carbonite     Published Date: Jan 04, 2018
Malware that encrypts a victim’s data until the extortionist’s demands are met is one of the most common forms of cybercrime. And the prevalence of ransomware attacks continues to increase. Cybercriminals are now using more than 50 different forms of ransomware to target and extort money from unsuspecting individuals and businesses. Ransomware attacks are pervasive. More than 4,000 ransomware attacks happen every day, and the volume of attacks is increasing at a rate of 300 percent annually. According to an IDT911 study, 84 percent of small and midsize businesses will not meet or report ransomware demands. No one is safe from ransomware, as it attacks enterprises and SMBs, government agencies, and individuals indiscriminately. While ransomware demands more than doubled in 2016 to $679 from $294 in 2015, the cost of remediating the damage and lost productivity is many multiples higher.
Tags : 
    
Carbonite
Published By: Carbonite     Published Date: Oct 10, 2018
Malware that encrypts a victim’s data until the extortionist’s demands are met is one of the most common forms of cybercrime. And the prevalence of ransomware attacks continues to increase. Cybercriminals are now using more than 50 different forms of ransomware to target and extort money from unsuspecting individuals and businesses
Tags : 
    
Carbonite
Start   Previous   1 2 3 4 5 6 7 8 9 10 11    Next    End
Search Resource Library