organization management

Results 301 - 325 of 998Sort Results By: Published Date | Title | Company Name
Published By: MarkLogic     Published Date: Jun 21, 2017
Global financial organizations are facing increasing demands from the business for more granularity, transparency, reporting and security. If you’re on the IT side, you know this adds a different set of ‘mores’ to the equation: More duplication, delays, and people. What’s the net-net? More cost and more risk. You can balance the scales to satisfy those demands. And it starts with thinking differently about data management. Our financial services technology experts will explore the implications of governance, risk and compliance (GRC) imperatives. You’ll learn: • Why data is at the heart of an effective and dynamic GRC strategy • Why technological capabilities used to enable standard GRC programs can reduce transparency and prevent you from gaining a holistic view of your data • A new approach to data can provide the business with complete transparency • Review a sample regulatory reporting architecture Stop burning time on tooling — and start building a dynamic GRC strategy that can
Tags : 
banking, financial services, data management, silos, data strategy, transparency, data governance, regulation
    
MarkLogic
Published By: Harvard Business School     Published Date: Mar 05, 2015
Capital abundance, low interest rates, and high volatility are creating new challenges and opportunities in equity markets. To succeed in this crowded and complex global landscape, you must take your investment expertise to a new level. The Private Equity and Venture Capital program at Harvard Business School explores cutting-edge industry models and related issues—from venture capital, growth equity, and buyouts to industry infrastructure, portfolio strategies, and decision-making processes.
Tags : 
private equity, venture capital, investment expertise, growth equity, buyouts, negotiation, organizational structure, portfolio management
    
Harvard Business School
Published By: Harvard Business School Executive Education     Published Date: Mar 09, 2015
For decades, large companies have been wary of corporate venturing. So why are more and more smart companies going VC to find their next breakthroughs? With corporate R&D units under pressure to focus on a narrow range of projects, companies often lack a good way to sniff out competitive threats beyond their main areas of expertise. A corporate venture capital fund for investing in outside startups can help a company see, understand, and respond rapidly to changes in the business landscape. But the parent company’s processes tend to bog down these funds.
Tags : 
private equity, venture capital, investment expertise, growth equity, buyouts, negotiation, organizational structure, portfolio management
    
Harvard Business School Executive Education
Published By: Harvard Business School Executive Education     Published Date: Mar 09, 2015
Capital abundance, low interest rates, and high volatility are creating new challenges and opportunities in equity markets. To succeed in this crowded and complex global landscape, you must take your investment expertise to a new level. The Private Equity and Venture Capital program at Harvard Business School explores cutting-edge industry models and related issues—from venture capital, growth equity, and buyouts to industry infrastructure, portfolio strategies, and decision-making processes.
Tags : 
private equity, venture capital, investment expertise, growth equity, buyouts, negotiation, organizational structure, portfolio management
    
Harvard Business School Executive Education
Published By: ServiceNow     Published Date: Mar 24, 2015
Decision makers at many organizations question the investments made in IT. This is often because they don’t fully understand the value delivered by IT service management (ITSM) or by compliance with recommended best practices such as those defined by the IT Infrastructure Library or ITIL®. This often pressures CIOs to demonstrate the value of IT to the business. Learn how creating a great service catalog can help alleviate these pressures and why many consider it to be fundamental to any IT improvement initiative. An effective service catalog enables IT to deliver business services that are more customer and service focused, which results in higher customer satisfaction, provides standardization and consistency and increases IT visibility across the organization.
Tags : 
it visibility, it service management, compliance, it infrastructure, business services, it visibility
    
ServiceNow
Published By: MobileIron     Published Date: Mar 21, 2017
As organizations increasingly use Office 365 and other cloud services on mobile devices, they need a secure mobile and cloud architecture to protect all of these apps and data on the device and in transit. It requires a comprehensive, unified approach to enterprise mobility management (EMM) that includes defense-grade security, massive scalability, a broad ecosystem of technology partners, enhanced Office 365 security, and integrated Windows 10 desktop and mobile management. And it has to provide all of this without locking customers into a proprietary technology stack.
Tags : 
    
MobileIron
Published By: MobileIron     Published Date: Apr 11, 2018
The enterprise landscape has changed dramatically with the influx of millennials — and their preferred devices — into the workforce. As a result, Macs that were once limited to mostly niche usage are now rapidly expanding their enterprise footprint. These devices require the same level of security and oversight that organizations apply to all of their other devices. Otherwise, the risk of leaving Macs either unmanaged or secured by point products creates security gaps that can leave the enterprise open to cyberattacks and compliance violations. The good news is, MobileIron makes it easy to secure Macs the same way all other devices in the enterprise are managed. No integrations, additional training, or learning curves are involved. The time has come for a modern approach to Mac management that is seamless for end users, improves operational efficiency, and simplifies IT operations across the entire device lifecycle. MobileIron makes it all possible.
Tags : 
macos, modern, work, era, devices, workforce, organizations
    
MobileIron
Published By: athenahealth     Published Date: Jun 08, 2015
No matter how these issues are resolved, the new health care reality demands that providers deliver quality care while controlling costs. Use these six steps to bring success to your organization in the new reimbursement landscape: 1. Understand Your Costs 2. Reduce Out-Migration from Your Network 3. Maximize Pay-for-Performance Reimbursement 4. Identify Early Opportunities for Utilization Reductions 5. Support Chronic Care and Disease Management 6. Predict Who Will Develop Issues
Tags : 
aco, accountable care organization, out-migration, pay-for-performance reimbursement
    
athenahealth
Published By: athenahealth     Published Date: Oct 07, 2015
This whitepaper is a step-by-step “playbook” based on athenahealth's work with clients who have seen success and shared in savings through the Medicare Shared Savings Program (MSSP).
Tags : 
medicare shared savings, mssp, medicare, accountable care organizations, healthcare expenditures, population health management
    
athenahealth
Published By: MuleSoft     Published Date: Apr 13, 2016
New Enterprise challenge has emerged. With the number of APIs growing rapidly, managing them one-off or via Excel or corporate wiki is no longer feasible. The smartest organizations have discovered a set of best practices to design powerful APIs that leverage existing services, to effectively manage those APIs throughout their lifecycle and to scale their deployment across consumers and devices. This eBook examines the relationship between APIs and services and presents the key elements of a successful API strategy in the form of 7 habits. In this eBook you will learn: - How to leverage existing services in the API economy - Where to get started with your API strategy - Key criteria for selecting an API Management solution - Strategies to overcome API security and identity challenges - How and why to apply the fundamentals of API First Design
Tags : 
service management, enterprise applications, best practices, business management, business strategy
    
MuleSoft
Published By: Okta     Published Date: Jul 25, 2016
Within 6 months of starting to use Okta, customers on average will connect more than 10 applications for single sign-on. Once single-sign-on is tackled, cloud-first IT organizations can start to tackle the next set of problems. These next challenges are all about how you manage identities across all connected systems, how to determine who has access to what, and how you maintain control over user access. Some of the largest organizations in the world spend millions of dollars building out complex workflow systems to manage these processes. Even then, they depend heavily on manual work to actually get the job done. With Okta, there is a better way to do this, and it’s accessible to organizations of all sizes. Okta Provisioning gives you a foundation for cloud-first IT that brings sanity to your IT processes and enables you to encourage business groups to keep adopting more applications and users to bring the devices of their choice to work. App management, mobility management, and authe
Tags : 
identity, idaas, iam, identity lifecycle management, mobile, provisioning, active directory, security
    
Okta
Published By: SAP     Published Date: Jul 18, 2016
Organizations are investing in new analytics technologies to improve agility and performance. The technology and data must come together to serve the business users under the guidance and management of IT. Read the white paper to learn key findings in the analytics market and learn how to deliver analytics capabilities suitable for a wide range of use cases.
Tags : 
    
SAP
Published By: IBM     Published Date: Nov 10, 2016
Are you aware of the ongoing dialog about your products and services? Are you participating? Recent surveys show that organizations that deliver good customer experiences are reaping greater revenues than those that don’t. Yet companies are struggling to pivot towards the customer, because it often requires a complete overhaul of management, culture and technologies. This session will show how to defeat content chaos, streamline and accelerate onboarding and service processes, minimize friction with customers, use analytics to anticipate and prepare for customer needs, and give your front-line people the tools they need to offer a superior experience that will grow your revenues and generate great word of mouth.
Tags : 
ibm, analytics, ecm, engagement, customer
    
IBM
Published By: Veritas     Published Date: May 12, 2016
The Data Genomics Index is a first-of-its-kind benchmark analysis of data stored within a typical enterprise environment. This report reveals insights into data growth, data age, and data type thereby providing organizations with the comparison standard for beginning to take action on their data. In addition to the Index, Veritas has founded the Data Genomics Project. This community of likeminded data scientists, industry experts and thought leaders will come together to surface the true nature of enterprise environments, build the data-genome that matters for information management, and share the discussion with a world struggling to solve tremendous data growth challenges.
Tags : 
    
Veritas
Published By: IBM     Published Date: Jan 30, 2017
Analytics has permeated, virtually, every department within an organization. It’s no longer a ‘nice to have’. It’s an organizational imperative. HR, specifically, collects a wealth of data; from recruiting applications, employee surveys, performance management data and it sits in systems that remain largely untapped. This data can help drive strategic decisions about your workforce. Analytic tools have, historically, been difficult to use and required heavy IT lifting in order to get the most out of them. What if an analytics system learned and continue to learn as it experienced new information, new scenarios, and new responses. This is referred to as Cognitive Computing and is key to providing an analytics system that is easy to use but extremely powerful.
Tags : 
ibm, talent analytics, cognitive computing, analytics, engagement, human resources
    
IBM
Published By: IBM     Published Date: May 09, 2017
This eBook takes you on a journey to outthink content chaos and discover how your industry can gain real value from your business content. Read how industry leaders are reflecting on the important challenges they face, and how they are finding innovative ways to collaborate and extract value from all forms of content to outpace those obstacles. Learn how cognitive and cloud-based Enterprise Content Management, or ECM, can help you protect your content while gaining a competitive advantage from it, improving business performance and ROI.
Tags : 
enterprise management, organization optimization, security management, malware protection, data protection, bug prevention, information management
    
IBM
Published By: IBM     Published Date: Oct 17, 2017
Every day, torrents of data inundate IT organizations and overwhelm the business managers who must sift through it all to glean insights that help them grow revenues and optimize profits. Yet, after investing hundreds of millions of dollars into new enterprise resource planning (ERP), customer relationship management (CRM), master data management systems (MDM), business intelligence (BI) data warehousing systems or big data environments, many companies are still plagued with disconnected, “dysfunctional” data—a massive, expensive sprawl of disparate silos and unconnected, redundant systems that fail to deliver the desired single view of the business. To meet the business imperative for enterprise integration and stay competitive, companies must manage the increasing variety, volume and velocity of new data pouring into their systems from an ever-expanding number of sources. They need to bring all their corporate data together, deliver it to end users as quickly as possible to maximize
Tags : 
    
IBM
Published By: Oracle     Published Date: Feb 20, 2019
Supply Chain Cloud: 4 Success Stories From improved scalability to cost savings, organizations are realizing the advantages of cloud-based supply chain management (SCM). Learn how innovative brands like Panduit have boosted supply chain performance with Oracle SCM Cloud.
Tags : 
    
Oracle
Published By: Oracle     Published Date: Feb 22, 2019
Successful digital business depends on fast, reliable,and secure applications. Threats of service disruptions from performance slow downs, availability outages, or security incidents are driving IT organizations and service providers to double down on comprehensive system management solutions across infrastructure, applications, and end-user devices.
Tags : 
    
Oracle
Published By: Datastax     Published Date: Apr 08, 2019
For decades, organizations relied on traditional relational database management systems (RDBMS) to organize, store, and analyze their data. But then Facebook came along, and an RDBMS was suddenly not quite enough. The social giant needed a powerful database solution for its Inbox Search feature, and Apache Cassandra—a distributed NoSQL database—was born. Released as an open source project in July 2008, Cassandra—named after the mythological prophet who famously put a curse on an oracle—became an Apache Incubator project in March 2009. It graduated to a top-level project in February 2010
Tags : 
    
Datastax
Published By: OnBase by Hyland     Published Date: May 17, 2017
Sprawl isn’t just a problem for cities. IT sprawl can hurt organizations, too. If left unchecked, multiple systems and platforms can cause inefficiency to rise and customer satisfaction to fall. Instead, think like an urban planner and manage growth with a master plan. In this white paper, see how you can put IT sprawl in its place with a single, scalable information management platform.
Tags : 
sprawl, applications, content, information, management, systems, cio, hyland
    
OnBase by Hyland
Published By: Host Analytics     Published Date: Jun 05, 2017
Best-in-class firms have realized that budgeting, planning and reporting can't ALL be done with Excel. And running a successful business starts with effective planning and performance management, and the data you generate during these critical processes is among the most important and sensitive in your organization. A miscalculation, oversight, or a security breach could be financially devastating. By recognizing the 5 signs of Excel abuse, and making the necessary changes, best-in-class organizations can: -streamline planning and performance management -keep sensitive data secure -significantly reduce the potential for human error
Tags : 
    
Host Analytics
Published By: Fiserv     Published Date: Mar 02, 2018
Corporate governance. Capital Requirements. Information Security. Identifying and measuring potential risks help you connect the dots to create a sound ERM program for your organization. In today’s environment of security regulations and requirements, organizations must take a comprehensive approach to ERM to identify and mitigate potential threats. Risk is cumulative, and unidentified weaknesses can quickly spiral out of control, resulting in costly solutions that can lead to reputational damage. The first step in designing a sound ERM program is to understand which components are needed and how to implement them. Ten Steps to Enterprise Risk Management: A Comprehensive Approach Reveals the Big Picture, provides a straight-forward approach to creating a reliable, yet flexible program to address existing threats with the ability to adapt to emerging ones. In the end risk management is everybody’s job – do you have a plan in place to help your employees manage unpredictable threats and
Tags : 
corporate governance, capital requirements, information security, erm program, enterprise risk management
    
Fiserv
Published By: Fiserv     Published Date: Mar 02, 2018
Uncover Exceptions Easily and Certify Financial Statements with Confidence. With increasing regulatory requirements for insurance organizations and the need for executive management to sign off on financial statements, it is critical to ensure that there is detailed visibility into the underlying financial data. Ongoing emphasis on having a strong internal control structure for insurers brings into light reconciliation and certification as being the critical components to making it happen. When done properly, they assure accuracy of information flowing into the financial close process, with minimal risk of misstatement, and a full audit trail. The white paper, Certify with Confidence: How Automated Reconciliation Lets You Sign With Certainty, explains how a comprehensive reconciliation solution should work In today's regulatory climate, and why a comprehensive, end-to-end, automated reconciliation system is essential to protecting yourself and your company.
Tags : 
automated reconciliation for insurers, automated reconciliation, automated certification for insurers, internal control structure, financial close, comprehensive reconciliation system, comprehensive reconciliation solution
    
Fiserv
Published By: OneLogin     Published Date: Oct 24, 2017
From the information provided in the interviews, Forrester has constructed a Total Economic Impact (TEI) framework for those organizations considering investing in OneLogin. The objective of the framework is to identify the benefits, costs, flexibility, and risk factors that affect the investment decision. Forrester employed four fundamental elements of TEI in modeling OneLogin: benefits, costs, flexibility options, and risks. Forrester took a multistep approach to evaluate the impact that OneLogin can have on the Organization (see Figure 2). Specifically, we: › Interviewed OneLogin marketing, sales, and product management personnel, along with Forrester analysts, to better understand the value proposition for OneLogin. › Conducted an in-depth interview with the Organization’s senior application engineer and its supervisor of IT security to obtain data with respect to costs, benefits, and risks. › Constructed a financial model representative of the interviews using the TEI metho
Tags : 
    
OneLogin
Start   Previous    6 7 8 9 10 11 12 13 14 15 16 17 18 19 20    Next    End
Search Resource Library