"Tech Solutions - one byte at a time!"
DigiBytes.com is the digital library of solutions for business and technology professionals.

Login Register Login
For Admins

officer

Results 1 - 25 of 112Sort Results By: Published Date | Title | Company Name
Published By: Oracle Commerce Cloud     Published Date: Sep 06, 2017
"The success of your digital strategy requires bridging the gap between your core capabilities and what customers want. Watch this on demand webcast with Forrester’s Vice President and Principal Analyst, Ted Schadler, Michael Fasosin, Chief Strategy Officer, Spindrift & DigitasLBi OSG, and Oracle to learn: - Key trends in consumer online shopping behavior - How to develop a successful digital experience technology strategy and roadmap - The essential components of a modern digital experience platform - How to achieve quick-wins and long term investments simultaneously You will also see a short demonstration of how Oracle's CX Cloud solutions deliver personalized, unified experiences across channels. "
Tags : 
    
Oracle Commerce Cloud
Published By: CA Technologies     Published Date: Sep 25, 2017
This rapidly evolving digital world is also redefining the relationship between your business and your customers, who now expect a convenient, interactive experience from their preferred brands. Security is also a concern. Risk is rising, as both the enterprise and its customers exchange a growing amount of sensitive data.
Tags : 
integration, developers, open enterprise, api, business, ca technologies
    
CA Technologies
Published By: CA Technologies     Published Date: Aug 22, 2017
Enterprise security traditionally relied on a fortress strategy that locked down user endpoints and created walls around the network. Today, this strategy cannot support or secure the use of mobile devices and SaaS capabilities, which exist outside the fortress. As a result, Chief Information Security Officers (CISOs) have been looking for new solutions that can secure these technologies today, and adapt as threats and business needs change. The credit card industry’s security model is one example that provides a new way to think about risk and contain it—that is, if you can see past the occasional bad rap it’s gotten from attacks and breaches.
Tags : 
    
CA Technologies
Published By: CA Technologies     Published Date: Aug 22, 2017
Today, digital is everywhere—cloud, mobile, social and the Internet of Things are changing the way we all work and play. This rapidly evolving digital world is also redefining the relationship between your business and your customers, who now expect a convenient, interactive experience from their preferred brands. Security is also a concern. Risk is rising, as both the enterprise and its customers exchange a growing amount of sensitive data.
Tags : 
    
CA Technologies
Published By: CA Technologies     Published Date: Aug 22, 2017
Die Welt ist heute digital – Cloud, Mobilität, Social Media und das Internet of Things verändern Arbeit und Freizeit für jeden. Diese sich schnell weiterentwickelnde digitale Welt definiert auch die Beziehung zwischen Ihrem Unternehmen und Ihren Kunden neu. Die Kunden erwarten von ihren bevorzugten Marken heute eine komfortable, interaktive User Experience. Auch die Security ist ein wichtiges Anliegen. Die Risiken wachsen, da Unternehmen und Kunden immer mehr vertrauliche Daten austauschen.
Tags : 
    
CA Technologies
Published By: FinancialForce     Published Date: Dec 01, 2017
Mention artificial intelligence (AI) to a person on the street, and you'll conjure up Hollywood visions ranging from the humanity-crushing Skynet of the Terminator series to the robot love interests in Her or Ex Machina. Perspectives on the tangible impact of AI similarly range from Elon Musk's declaration of AI as "the greatest risk we face as a civilization" to IBM Chief Science Officer Dr. Guruduth Banavar's belief that "we've never known technology that can have a greater benefit to all of society than artificial intelligence". The reality, especially in the short term, likely lies somewhere between these extremes.
Tags : 
    
FinancialForce
Published By: Acxiom Corporation     Published Date: Feb 24, 2011
A Chief Marketing Officer's Roadmap. In this paper Acxiom shows how Media Mix Optimization can help overcome the complex challenges of today's marketing. Herein we not only detail both the "Journey" of MMO and its rewards but also how to avoid several key hurdles along the way.
Tags : 
acxiom, optimization, media mix, mmo, halo effects, cmo, chief marketing officer
    
Acxiom Corporation
Published By: McAfee EMEA     Published Date: Nov 15, 2017
Atrius Health Chief Information Security Officer Chris Diguette oversees security for Atrius Health, the largest physician-led healthcare provider in the northeastern US. The organization is recognized nationally for its use of health information technology. Diguette is also CIO of the VNA Care Network, a home healthcare provider and subsidiary of Atrius Health. As CISO, Diguette and his team work to implement and maintain a security infrastructure that safeguards the organization’s critical health information systems and applications, such as its Epic Systems Electronic Medical Records (EMR) system and the personal data of more than 675,000 patients at 29 facilities in eastern and central Massachusetts.
Tags : 
artius, health, chief, information, security, officer, organization
    
McAfee EMEA
Published By: IBM     Published Date: Oct 13, 2017
Integrated Threat Management For Dummies, IBM Security Limited Edition, lays the foundation for effective tools and techniques that work together to help counter today’s advanced threats. Regardless of your role in the IT security organization, threat management tools and techniques will influence your job. Your role determines the part you play to effectively manage threats, including those targeting the cloud and your company’s data. If you are a Chief Information Security Officer (CISO) or security manager, this book explains in detail the types of tools you need to effectively prevent, detect, and respond to security incidents. If you’re in general business management, you’ll better understand the risks associated with enterprise computing and the reasons why a comprehensive portfolio of security tools that work well together is so important.
Tags : 
malware prevention, network intrusion prevention, malware protection, ibm, firewall, mutating malware, cyber threats
    
IBM
Published By: QTS     Published Date: Nov 04, 2016
Watch this video to find out how the Chief Operating Officer at QTS has adapted to data center changes!
Tags : 
data center, colocation, decision making process, data management
    
QTS
Published By: Financial Force     Published Date: Dec 01, 2017
Mention artificial intelligence (AI) to a person on the street, and you'll conjure up Hollywood visions ranging from the humanity-crushing Skynet of the Terminator series to the robot love interests in Her or Ex Machina. Perspectives on the tangible impact of AI similarly range from Elon Musk's declaration of AI as "the greatest risk we face as a civilization" to IBM Chief Science Officer Dr. Guruduth Banavar's belief that "we've never known technology that can have a greater benefit to all of society than artificial intelligence". The reality, especially in the short term, likely lies somewhere between these extremes.
Tags : 
    
Financial Force
Published By: DocuSign     Published Date: Feb 13, 2017
DocuSign electronic signatures are valid and legally binding around the world. In fact, they are more enforceable than traditional handwritten signatures. Hear from DocuSign's Chief Legal Officer, Ken Moyle, and DocuSign's Founder, Tom Gonser, about how DocuSign delivers the highest levels of legal enforceability and is the only eSignature provider to warrant compliance with the Federal ESIGN Act.
Tags : 
    
DocuSign
Published By: Hewlett Packard Enterprise     Published Date: Mar 31, 2016
Cyberattacks are now a fact of life. Yet detection still lags. In 2015, the median amount of time attackers spent inside organizations before detection was 146 days. Why are we so vulnerable? MIT Technology Review asks Andrzej Kawalec, chief technology officer for HPE Security Services and Marshall Heilman, vice-president and executive director at Mandiant, a FireEye company, what we can do to make our systems more secure.
Tags : 
    
Hewlett Packard  Enterprise
Published By: CA Technologies EMEA     Published Date: Oct 20, 2017
Diese sich schnell weiterentwickelnde digitale Welt definiert auch die Beziehung zwischen Ihrem Unternehmen und Ihren Kunden neu. Die Kunden erwarten von ihren bevorzugten Marken heute eine komfortable, interaktive User Experience. Auch die Security ist ein wichtiges Anliegen. Die Risiken wachsen, da Unternehmen und Kunden immer mehr vertrauliche Daten austauschen.
Tags : 
    
CA Technologies EMEA
Published By: Adobe Systems, Inc.     Published Date: May 17, 2011
This paper highlights the advances in closed-loop marketing that enable measurement and optimization of digital marketing efforts. It also describes the challenges that CMOs face when pursuing digital marketing strategies and how next-generation WCM solutions help CMOs overcome those challenges.
Tags : 
adobe, cmo, digital marketing, organization transformation, chief marketing officer, customer experience management, wcm, multichannel pipeline growth
    
Adobe Systems, Inc.
Published By: ServiceNow     Published Date: Oct 02, 2015
From students to executives, finding solutions to improve efficiency, productivity, and communication has become vital. These end users are trying to excel in their work, and while they don't mean to cause harm, in most organizations this desire leads to the use of applications, services, and data storage and sharing beyond IT's boundaries. This practice, known as “shadow IT,” walks a line that information security officers are uncomfortable with, and it's having an obvious impact on technical support teams. The good news is, there are opportunities for all support organizations, regardless of their stance on shadow IT.
Tags : 
    
ServiceNow
Published By: FusionOps     Published Date: Jun 15, 2016
Bimodal capabilities, customer intimacy and advanced analytics can all be enabled by digital technologies, allowing supply chains to be both cost-effective and innovation-driven. This research explores the implications of these leading trends for chief supply chain officers.
Tags : 
    
FusionOps
Published By: Evariant     Published Date: Sep 07, 2016
Many hospital Chief Marketing Officers continue to debate whether their institution should transform their traditional marketing campaigns and embrace digital marketing. If you are in doubt as to whether digital marketing is important to your success and the success of your hospital, look at the countless articles, white papers, and blogs that have been published over the past several years that talk to the use of the internet and web-based services by patients and consumers. Here are a few of the latest examples from Pew Research Center’s Health Fact Sheet (
Tags : 
evariant, hospital, patient engagement, digital marketing
    
Evariant
Published By: CA Technologies     Published Date: Sep 25, 2017
Enterprise security traditionally relied on a fortress strategy tha locked down user endpoints and created walls around the network. Today, this strategy cannot support or secure the use of mobile devices and SaaS capabilities, which exist outside the fortress. As a result, Chief Information Security Officers (CISOs) have been looking for new solutions that can secure these technologies today, and adapt as threats and business needs change. The credit card industry’s security model is one example that provides a new way to think about risk and contain it—that is, if you can see past the occasional bad rap it’s gotten from attacks and breaches.
Tags : 
data protection, data security, data optimization, organization optimization, cloud management, virtualization, data center, cloud environment
    
CA Technologies
Published By: Proofpoint     Published Date: Aug 21, 2017
Bei BEC-Attacken werden häufig CFOs oder Mitarbeiter der Personal- bzw. Finanzabteilung oder der Lohnbuchhaltung gezielt angegriffen. Mit einer als „Spoofing“ bezeichneten Methode werden die Opfer getäuscht und davon überzeugt, dass die erhaltene E-Mail von ihrem Vorgesetzten, einem Kollegen, einem Lieferanten oder einem Geschäftspartner stammt. Der Betrüger fordert den Empfänger zur Tätigung einer Überweisung oder zur Weitergabe von Steuerunterlagen oder anderer vertraulicher Daten auf.
Tags : 
geschäftsführer, chief financial officer, personalabteilung, finanzabteilung, lohnbuchhaltung
    
Proofpoint
Published By: Macquarie Telecom     Published Date: Jan 11, 2011
How hosted data center services eliminate the daily pain and frustration of managing your IT infrastructure.
Tags : 
macquarie telecom, hosted data center services, it infrastructure, chief information officer, cio, oursourcing, productivity, infrastructure
    
Macquarie Telecom
Published By: Oracle Commerce Cloud     Published Date: Feb 05, 2016
Are you setting unattainable targets? It seems counter-intuitive, but 95% of Chief Sales Officers (CSOs) reported higher revenue targets and 86% are not very confident they can reach them. With over 25 years in sales – 15 of those in sales management and 3 years in executive leadership, I’ve seen my share of sales failures and successes. In that time, I’ve learned that if you want to be a sales leader who can easily adjust plans and withstand a barrage of obstacles, you’ll need the support of a knowledgeable sales team, modern best practice processes, and technology. With this holistic approach, you can design the optimal plans and effectively implement them to drive performance. This brief will act as your roadmap with tips about how best to utilize people, processes, and technology to improve your company’s sales performance.
Tags : 
    
Oracle Commerce Cloud
Published By: Oracle Marketing Cloud     Published Date: Oct 06, 2017
Today’s Chief Marketing Officer is tasked with many demands, made even more challenging with the ever-evolving digital domain. Their biggest challenge? Leveraging personalization to demonstrate and drive clear ROI to the executive team. Download this report from Argyle Executive Forum to see how leading CMOs weigh in on other challenges, including how they can skillfully decipher, understand, and leverage the abundance of available data to engage with customers.
Tags : 
    
Oracle Marketing Cloud
Published By: SAP EMEA Global     Published Date: Nov 22, 2017
Rapid innovation, disruptive competition, and intensive investments in new technologies tend to characterize the North American marketplace. Thus, it stands to reason that chief financial officers in North America are more involved in strategic decision-making than CFOs in other regions, and that they leverage technology to automate routine operations so they can focus on strategic concerns.
Tags : 
growth, regulatory, efficiency, automation, influence, finance function, core
    
SAP EMEA Global
Published By: IBM     Published Date: Apr 18, 2017
Learn from this TDWI paper how right-sized information governance can improve the success of data warehousing or big data analytics initiatives, and how a chief data officer can help organizations to appreciate the value of data and its importance to their decisions and operations.
Tags : 
system integration, data governance, data optimization, data efficiency, data currency, data lineage, data security, data integration
    
IBM
Start   Previous   1 2 3 4 5    Next    End
Search      

Special Report

In this webinar Black Duck Software (www.blackducksoftware.com), together with representatives of SAP, will review the benefits open source offers to development organizations, the management challenges it presents, and approaches for addressing those challenges.

Add Research

Get your company's research in the hands of targeted business professionals.

Modern Analyst Media Modern Analyst Media
Modern Analyst Requirements Modern Analyst Media Modern Analyst DigiBytes
Copyright 2009-2014 by Modern Analyst Media LLC Home  |  Featured Bytes  |  Popular Bytes  |  All Topics  |  Vendor Directory