fte

Results 226 - 250 of 1900Sort Results By: Published Date | Title | Company Name
Published By: Box     Published Date: Jan 16, 2015
Desktop management at any scale is a tedious job. Imaging, reimaging, and troubleshooting desktop systems consume valuable IT resources, and keep employees from being productive. Securing the information generated on desktops, tablets, and smartphones is no simple job either. Many organizations are deploying virtual desktop infrastructures (VDI) for these reasons. But for deployment to be successful, computing and storage infrastructures must deliver high-quality, predictable, and productive user experiences. Often, the best way to accomplish this is through flash-based storage solutions due to its low latency/high IOPS nature. Unfortunately many IT professionals aren't sure what type of flash array is best for their needs or how to ensure that all elements of their VDI work seamlessly. Download now and learn how to validate a provide VDI configuration across NexGen N5 Hybrid Flash Array, VMWare Horizon View, Cisco Unified Computing System™(UCS), and Cisco Nexus Switches.
Tags : 
nexgen, hybrid, flash, qos, quality of service
    
Box
Published By: Brainshark     Published Date: Apr 24, 2015
Too often, learning is treated as an isolated activity that occurs separately from employees’ everyday work. This is changing because of employee learning styles, the speed of our global environment, and the mobility of workers. In this report you will learn to understand why today’s learning strategies are not working, examples of successful learning culture implementations, and how to build a learning culture.
Tags : 
training, employee development, onboarding, just in time learning, jitl, continuous learning, mobile learning, elearning, e-learning, employee training, learning program, training program, learning and development
    
Brainshark
Published By: Brainshark     Published Date: Aug 23, 2016
B2B organizations often struggle to prepare new first line sales managers for their role, especially when promoting from the ranks of field sales reps.
Tags : 
brainshark, sales, sales coaching, field sales coach, b2b, b2b organizations, field sales reps
    
Brainshark
Published By: Brainshark     Published Date: Aug 02, 2017
Onboarding – every company does it, but a shockingly few do it really well. In fact, The Sales Management Association found that after sales onboarding is complete, 1/3 of reps still lack proficiency in up to a dozen key selling skills. That’s a LOT of training that goes in one ear and out the other. At best, this leads to slow ramp times for new reps that take far too long to start closing deals. At worst? Your turnover rates skyrocket, forcing you to start all over with a new batch of hires. So the question is – how do you break the cycle and onboard salespeople in a way that actually works? This exclusive eBook provides 6 steps to better sales onboarding
Tags : 
sales, sales onboarding, sales blueprint, sales people
    
Brainshark
Published By: Broadcast Beat Magazine     Published Date: Oct 30, 2019
After examining the TCO of object storage vs. LTO tape, and seeing the benefits achieved in a real-world case study, it’s easy to understand why object storage is quickly becoming the standard for data storage, backup, archive, and recovery. It’s clear that when all costs associated with data storage are tracked, object storage beats tape storage hands down. And even with costs aside, on-premises object storage with Cloudian provides businesses with the flexibility they need to respond to changing technology environments, storage requirements, data monetization opportunities, and more.
Tags : 
    
Broadcast Beat Magazine
Published By: Broadcast Beat Magazine     Published Date: Nov 11, 2019
So, it comes as little surprise that educators are taking advantage of this shift and beginning to incorporate video into the curriculum. You don’t need to be a video expert to see the possibilities it represents for education. Even if you don’t know your DVI from your HDMI, chances are you’re eager to engage and inspire your students in creative and productive ways. With the accessibility and affordability of video today, it no longer matters how experienced with A/V technology you are. Around the world, educators and academic institutions are using video to open new channels of communication, connect with their communities, and give students new and engaging ways to learn.
Tags : 
    
Broadcast Beat Magazine
Published By: Bronto     Published Date: Jan 04, 2012
Like all Internet retailers, Dungarees often experienced lost revenue from abandoned carts, when customers load items into their virtual carts but fail to complete the checkout process to purchase their goods. Dungarees searched for a solution that would enable them to customize a compelling response for each of these customers to entice them back to the site to complete their purchases.
Tags : 
bronto, dungarees, shopping carts, online purchases, online marketing, internet marketing, revenue
    
Bronto
Published By: Bronto     Published Date: Jul 19, 2017
With the exponential growth of internet marketing and online advertising, the customer's journey to making a purchase has grown longer, often including a mrylad of touch points along the way. Whether they begin with a direct search or visit a website via a paid advertisement, the modern shopper takes far more time to explore their options and do their research before buying. Lets take a closer look at three common stages of today's buying journey and solutions for effectively managing each one.
Tags : 
online advertising, internet marketing, online shopping, mobile shopping, customer loyalty, brand loyalty, loyalty program, shopping incentive, consumer behavior, retail
    
Bronto
Published By: Brooks Digital Marketing     Published Date: Sep 22, 2010
This white paper brings to light the critical but often hidden issues involved with creating a website that many web designers are not aware of themselves.
Tags : 
website design
    
Brooks Digital Marketing
Published By: Bulldog Solutions     Published Date: May 20, 2013
The key to a balanced budget is finding the right mix of growth and efficiency. The challenge is that often this budget is spent on activities that are skewed toward the top of the funnel or that are not necessarily aligned to revenue. So how can they possibly balance this budget and prove it is aligned to their assigned revenue contribution? The key is finding the right mix of "muscle" (volume) and "brains" (improved conversion).
Tags : 
marketing budget, balanced budget, improving revenue, revenue goals, revenue impact, campaign, campaign effectiveness
    
Bulldog Solutions
Published By: Burton Group     Published Date: Apr 08, 2008
In this Methodologies and Best Practices document, Burton Group Research Director Daniel Blum recounts customer perspectives on the anti-malware battlefield playing out at the enterprise level. The document explores lessons learned, and what keeps customers awake at night even after good defensive strategies are in place. The Reference RFI alone is valuable for those switching anti-malware products, or seeking new ones.
Tags : 
burton group, best practices, malware, security, email security, network security, content filtering
    
Burton Group
Published By: Burton Group     Published Date: Jul 07, 2008
While many enterprise architecture (EA) programs may be less than effective or threatened by extinction, the EA discipline is still an important set of skills and processes that improve IT decision-making and CIO effectiveness. Yet, after decades of architecting systems, the advent of several EA frameworks, and the many definitions available for the term EA, we still strive to understand what EA is, what it does, and what it looks like when it is successful.
Tags : 
architecture, architect, network architecture, it management, network design, network management, burton group, enterprise architecture
    
Burton Group
Published By: Business Assyst     Published Date: Mar 26, 2007
Interest in customer loyalty programs has never been more avid. After a number of years when such programs always seemed to be on the brink of taking off - but never quite managed to reach expectations - recent years have seen a real and dramatic increase in their uptake. This paper explores the issues which need to be addressed in order to cost justify the implementation of a customer loyalty system.
Tags : 
crm, customer relationship management, customer experience management, loyalty, retention, business metrics, affinity, business assyst
    
Business Assyst
Published By: Business Software     Published Date: Apr 04, 2013
Today, there is unprecedented pressure on companies in all industry sectors to keep their supply chains running smoothly. This often means that these businesses with their ever-changing distribution channels and production centers feeding those supply chains, need to efficiently manage their warehouses. In this whitepaper, Business-software.com profiles the leading warehouse management software vendors.
Tags : 
top 10 warehouse management software, vendors, revealed, unprecedented pressure, companies, industry, sectors, supply chains, business-software.com
    
Business Software
Published By: Business Software     Published Date: Apr 04, 2013
As today’s global marketplace becomes more sophisticated, the number and complexity of mission-critical financial transactions that companies conduct on a day-to-day basis continues to grow exponentially. Even small and mid-sized businesses are plagued by a rapidly increasing volume of financial processes that are highly intricate and multi-faceted. These activities, while important, are administrative in nature and often distract staff from more strategic planning initiatives that directly impact company prosperity and growth. Additionally, as legislative pressures continue to grow, and the rules imposed by Sarbanes Oxley, BASEL II, and other regulations become more stringent, businesses need to find better ways to ensure compliance by effectively logging, tracking, auditing, and reporting their financial data.
Tags : 
various types of business transactions, cost effectiveness, business-software.com, revealed, finance
    
Business Software
Published By: Business Software     Published Date: May 28, 2013
Job shops often specialize in a particular metal fabrication, or a specialization around certain types of products, like fasteners or machined bar stock. They provide unique services for larger manufacturing operations such as working with unique materials, incredibly tight tolerances, the ability to generate quickly manufactured prototypes, design and CAD assistance, reverse engineering, quick-turn parts, in-house tooling, amongst other services. Some typical job shop operations include: • Machine Builders • Tool and Mold Shops • Plastic Processors • Stamping Houses • Contract Cutters and Engravers • Vehicle and Boat Converters • Niche Product Manufacturers • Furniture, Cabinet, and Display Makers
Tags : 
top 10 job shop vendors, metal fabrication, fasteners, machine builders, stamping houses, business software
    
Business Software
Published By: C2C Systems     Published Date: Apr 24, 2013
IT departments often struggle to create a realistic budget for a PST elimination project – and then must justify the project among many others that may be considered higher priority by other stakeholders. This white paper is designed to give you a few logical steps to follow to create a compelling budget, to demonstrate a manageable project and ultimately, to prioritize the project.
Tags : 
pst, budget, elimination, logical, project, prioritize
    
C2C Systems
Published By: CA SM     Published Date: Jun 02, 2008
IT Asset Management (ITAM) is a cornerstone of IT Service Management (ITSM) yet is often omitted from existing ITSM implementations or initiatives. Version 3 of the Information Technology Infrastructure Library (ITIL) expands the processes, functions and roles in the service life cycle. However, it still does not provide enough details on key process and functional integration points for ITAM.
Tags : 
ca service management, service management, asset management, it asset management, itil
    
CA SM
Published By: CA Technologies     Published Date: Feb 13, 2015
You’re facing increasing global competition. And changing business models, such as lower-cost cloud options, enable more competitors to join the fray faster than ever. Your response? Consistently select the right projects and bring in-demand products and services to market quickly. But the evidence often tells a different story.
Tags : 
strategic planning, cloud options, global competition, in-demand products, in-demand products
    
CA Technologies
Published By: CA Technologies     Published Date: Jun 04, 2015
There has been growing buzz about DevOps. DevOps is a methodology that unites the often separate functions of software development (Dev) and production and operations (Ops) into a single, integrated, and continuous process. DevOps is about breaking down the barriers between Dev and Ops. It leverages people, processes, and technology to stimulate collaboration and innovation across the entire software development and release process. Dev and Ops should always be part of an integrated process, but that’s not always as easy as it sounds. You may be stuck in what we call “Dysfunction Junction.” Read this eBooklet to learn about the pitfalls of DevOps, how you can avoid them, and how to get started on your DevOps journey.
Tags : 
    
CA Technologies
Published By: CA Technologies     Published Date: Jul 13, 2015
The explosive growth of eCommerce has focused attention on security concerns associated with online payment transactions. Cardholders worry about the safety of online transactions while card issuers are concerned about balancing the risks and costs of payment fraud with a loss of revenue caused by transaction abandonment. The 3-D Secure protocol allows payment card issuers to reduce fraud in payment transactions by verifying cardholder identity during Card Not Present (CNP) transactions. Before a transaction is authorized, a cardholder can be challenged to enter a password, answer a question, or use some other form of authentication credential. This interruption in the transaction often causes legitimate customers to abandon the purchase resulting in loss of revenue for the issuer. The challenge is how to reduce fraud without impacting the user purchase experience.
Tags : 
ca technologies, cnp, emv, otp, 3dsecure
    
CA Technologies
Published By: CA Technologies     Published Date: Nov 02, 2016
The Travis Perkins Group is a leading supplier of building materials to the UK’s building and construction industry. For more than 200 years, the company has grown to deliver more than 100,000 products through 2,000 branch and store locations nationwide. Changing market demands, shareholder expectations and competition demand that the company continually enhance its performance. Yet, changing more than 200 years of tradition can be complicated. Traditional planning practices had led the company down the road to a bureaucratic project management office (PMO), and with the introduction of agile and CA Technologies, the once controlling environment has shifted into a service-oriented centre.
Tags : 
    
CA Technologies
Published By: CA Technologies     Published Date: Nov 02, 2016
In today’s competitive world, agile methodologies promise faster delivery, higher quality, increased productivity and better alignment with your company strategy. But while many companies introduce agile approaches at the team level, they often fail when scaling agile to the program and portfolio level. CA Agile Ready > Sync > Go provides a complete solution for building and launching successful, enterprise-scale agile programs. Integrating the industry leading expertise of CA Agile Transformation Consulting with the CA Agile Central enterprise-class planning and tracking platform, Ready > Sync > Go can help you build and launch a high-performing agile program in as little as three months.
Tags : 
    
CA Technologies
Published By: CA Technologies     Published Date: Jun 26, 2017
Privileged user accounts—whether usurped, abused or simply misused—are at the heart of most data breaches. Security teams are increasingly evaluating comprehensive privileged access management (PAM) solutions to avoid the damage that could be caused by a rogue user with elevated privileges, or a privileged user who is tired, stressed or simply makes a mistake. Pressure from executives and audit teams to reduce business exposure reinforces their effort, but comprehensive PAM solutions can incur hidden costs, depending on the implementation strategy adopted. With multiple capabilities including password vaults, session management and monitoring, and often user behavior analytics and threat intelligence, the way a PAM solution is implemented can have a major impact on the cost and the benefits. This report provides a blueprint for determining the direct, indirect and hidden costs of a PAM deployment over time.
Tags : 
    
CA Technologies
Published By: CA Technologies     Published Date: Aug 21, 2017
Agile may be simple, but it still takes work. Often, organizations fail to adopt agile methods for similar reasons, and many of these reasons are cultural. From checkbook commitment and lack of executive support to ineffective retrospectives and bad product ownership, this e-book describes the 12 agile failure modes to avoid so you can succeed with your own agile transformation.
Tags : 
    
CA Technologies
Start   Previous    3 4 5 6 7 8 9 10 11 12 13 14 15 16 17    Next    End
Search Resource Library