officer

Results 1 - 25 of 176Sort Results By: Published Date | Title | Company Name
Published By: Vmware     Published Date: Oct 17, 2019
Over the next five years, chief information officers (CIOs) in Europe will lead their companies toward fundamentally new ways of doing business.
Tags : 
    
Vmware
Published By: Vmware     Published Date: Nov 01, 2019
Nei prossimi cinque anni, i Chief Information Officer (CIO) in Europa condurranno le loro aziende verso modi fondamentalmente nuovi di fare business.
Tags : 
    
Vmware
Published By: Vmware     Published Date: Nov 01, 2019
In den nächsten fünf Jahren werden Chief Information Officers (CIOs) in Europa ganz neue Geschäftsmethoden für ihre Unternehmen einsetzen.
Tags : 
    
Vmware
Published By: Intapp     Published Date: Nov 01, 2019
Chief Marketing Officers who modernize business development strategies can accelerate revenue and market share growth with both new and existing clients. This requires unifying data across the entire client lifecycle, making that data transparent, and developing insights that drive better decision making across the board. How much of an impact can this modern approach make? According to a recent study conducted by ALM Legal Intelligence and Calibrate Legal, the investment pays off with Am Law 200 firms seeing an average return of $47 million on $1 million of marketing and business development spending. Download this point of view to learn what it takes to transform today’s law firm marketing from reactive to predictive. Topics include: Winning business with data-driven insights CMOs as change agents The data divide Smart collaboration in action: Key-client planning The pivot: From reactive to predictive
Tags : 
    
Intapp
Published By: TIBCO Software     Published Date: Jul 22, 2019
AA Ireland specializes in home, motor, and travel insurance and provides emergency rescue for people in their homes and on the road, attending to over 140,000 car break downs every year, 80% of which are fixed on-the-spot. “In each of the last five years, the industry lost a quarter billion in motor insurance," says Colm Carey, chief analytics officer. "So, there's a huge push for new data, models, ways to segment and pick profitable customer types—and get a lot more sophisticated. Our goal is to optimize pricing, understand the types of customers we're bringing, and the types we're trying to attract. We would like to tie that across the business. Marketing will run a campaign, trying to attract a lot of customers, but maybe they're not the right type. "We wanted to step away from industry standard software and go with something that was powerful and future-proof. In 2016, we had an opportunity to analyze all software. We chose the TIBCO® System of Insight with TIBCO BusinessWorks™ i
Tags : 
    
TIBCO Software
Published By: Workday     Published Date: Jul 30, 2019
Does digital disruption foreshadow the end for the CIO? With the role of chief digital officer gaining momentum, today’s CIOs are being forced to consider their place in the enterprise. Read this paper to see how CIOs are redefining their value, focusing on innovation, transformation, and enterprise leadership.
Tags : 
    
Workday
Published By: Panasonic     Published Date: Oct 01, 2019
For manufacturers, the transition to Industry 4.0 has meant the accumulation of data, massive data. Indeed, the accumulation, distribution and evaluation of data are driving virtually every decision on the manufacturing plant floor and supply chains shaping those decisions. Given the striking fact that ninety percent of the data in the world has been created over the last two years, it isn’t surprising that more than 60 percent of large companies report having a Chief Data Officer. But what has opened the floodgates to this deluge of information in manufacturing? Ordinary sensors have been transformed into smart sensors with the advent of IoT technologies and are being deployed by manufacturers along every step of the supply chain. Sensors are now detecting everything from when a piece of equipment will need maintenance to controlling energy costs inside factories.
Tags : 
    
Panasonic
Published By: Acxiom Corporation     Published Date: Feb 24, 2011
A Chief Marketing Officer's Roadmap. In this paper Acxiom shows how Media Mix Optimization can help overcome the complex challenges of today's marketing. Herein we not only detail both the "Journey" of MMO and its rewards but also how to avoid several key hurdles along the way.
Tags : 
acxiom, optimization, media mix, mmo, halo effects, cmo, chief marketing officer
    
Acxiom Corporation
Published By: Cisco EMEA     Published Date: Mar 08, 2019
And then imagine processing power strong enough to make sense of all this data in every language and in every dimension. Unless you’ve achieved that digital data nirvana (and you haven’t told the rest of us), you’re going to have some unknowns in your world. In the world of security, unknown threats exist outside the enterprise in the form of malicious actors, state-sponsored attacks and malware that moves fast and destroys everything it touches. The unknown exists inside the enterprise in the form of insider threat from rogue employees or careless contractors – which was deemed by 24% of our survey respondents to pose the most serious risk to their organizations. The unknown exists in the form of new devices, new cloud applications, and new data. The unknown is what keeps CISOs, what keeps you, up at night – and we know because we asked you.
Tags : 
    
Cisco EMEA
Published By: QTS     Published Date: Nov 04, 2016
Watch this video to find out how the Chief Operating Officer at QTS has adapted to data center changes!
Tags : 
data center, colocation, decision making process
    
QTS
Published By: Cisco EMEA     Published Date: Mar 26, 2019
Imagine if you could see deep into the future. And way back into the past, both at the same time. Imagine having visibility of everything that had ever happened and everything that was ever going to happen, everywhere, all at once. And then imagine processing power strong enough to make sense of all this data in every language and in every dimension. Unless you’ve achieved that digital data nirvana (and you haven’t told the rest of us), you’re going to have some unknowns in your world. In the world of security, unknown threats exist outside the enterprise in the form of malicious actors, state-sponsored attacks and malware that moves fast and destroys everything it touches. The unknown exists inside the enterprise in the form of insider threat from rogue employees or careless contractors – which was deemed by 24% of our survey respondents to pose the most serious risk to their organizations. The unknown exists in the form of new devices, new cloud applications, and new data. The unk
Tags : 
    
Cisco EMEA
Published By: Financial Force     Published Date: Dec 01, 2017
Mention artificial intelligence (AI) to a person on the street, and you'll conjure up Hollywood visions ranging from the humanity-crushing Skynet of the Terminator series to the robot love interests in Her or Ex Machina. Perspectives on the tangible impact of AI similarly range from Elon Musk's declaration of AI as "the greatest risk we face as a civilization" to IBM Chief Science Officer Dr. Guruduth Banavar's belief that "we've never known technology that can have a greater benefit to all of society than artificial intelligence". The reality, especially in the short term, likely lies somewhere between these extremes.
Tags : 
    
Financial Force
Published By: DocuSign     Published Date: Feb 13, 2017
DocuSign electronic signatures are valid and legally binding around the world. In fact, they are more enforceable than traditional handwritten signatures. Hear from DocuSign's Chief Legal Officer, Ken Moyle, and DocuSign's Founder, Tom Gonser, about how DocuSign delivers the highest levels of legal enforceability and is the only eSignature provider to warrant compliance with the Federal ESIGN Act.
Tags : 
    
DocuSign
Published By: Hewlett Packard Enterprise     Published Date: Mar 31, 2016
Cyberattacks are now a fact of life. Yet detection still lags. In 2015, the median amount of time attackers spent inside organizations before detection was 146 days. Why are we so vulnerable? MIT Technology Review asks Andrzej Kawalec, chief technology officer for HPE Security Services and Marshall Heilman, vice-president and executive director at Mandiant, a FireEye company, what we can do to make our systems more secure.
Tags : 
    
Hewlett Packard  Enterprise
Published By: Dome9     Published Date: Apr 25, 2018
At an unprecedented pace, cloud computing has simultaneously transformed business and government, and created new security challenges. The development of the cloud service model delivers business-supporting technology more efficiently than ever before. The shift from server to service-based thinking is transforming the way technology departments think about, design, and deliver computing technology and applications. Yet these advances have created new security vulnerabilities as well as amplify existing vulnerabilities, including security issues whose full impact are finally being understood. Among the most significant security risks associated with cloud computing is the tendency to bypass information technology (IT) departments and information officers. Although shifting to cloud technologies exclusively may provide cost and efficiency gains, doing so requires that business-level security policies, processes, and best practices are taken into account. In the absence of these standard
Tags : 
    
Dome9
Published By: Fortinet EMEA     Published Date: Nov 26, 2018
Enterprise chief information security officers (CISOs) are seeking ways to leverage existing security investments to bridge the divide between largely siloed security systems. The focus is on reducing the number of consoles needed to manage the security infrastructure. Network security vendors have a significant role to play in bridging the communication gap between these systems. The creation of a unified defense architecture enables threat data exchange between existing security systems. It helps automate the process of raising an organization's security posture when a security infrastructure component detects a threat. The following questions were posed by Fortinet to Robert Ayoub, program director in IDC's Security Products program, on behalf of Fortinet's customers.
Tags : 
    
Fortinet EMEA
Published By: Adobe Systems, Inc.     Published Date: May 17, 2011
This paper highlights the advances in closed-loop marketing that enable measurement and optimization of digital marketing efforts. It also describes the challenges that CMOs face when pursuing digital marketing strategies and how next-generation WCM solutions help CMOs overcome those challenges.
Tags : 
adobe, cmo, digital marketing, organization transformation, chief marketing officer, customer experience management, wcm, multichannel pipeline growth, cmis
    
Adobe Systems, Inc.
Published By: Automation Anywhere     Published Date: Jul 16, 2019
RPA platforms represent a hyper growth market, with enterprises investing in new RPA platforms for process and task automation to achieve greater operating efficiency and agility, while allowing the human workforce to focus on more strategic and higher priority projects and tasks. Intelligent process automation (IPA) is in an early phase of its evolution and represents the next frontier for RPA vendors. This Ovum Decision Matrix (ODM) is a comprehensive evaluation to help enterprise IT and business leaders, including chief information officers (CIOs), enterprise and process architects, IT directors, line-of-business (LOB) leaders and process owners, and digital transformation leaders select an RPA platform that is well suited to their specific requirements.
Tags : 
    
Automation Anywhere
Published By: ServiceNow     Published Date: Oct 02, 2015
From students to executives, finding solutions to improve efficiency, productivity, and communication has become vital. These end users are trying to excel in their work, and while they don't mean to cause harm, in most organizations this desire leads to the use of applications, services, and data storage and sharing beyond IT's boundaries. This practice, known as “shadow IT,” walks a line that information security officers are uncomfortable with, and it's having an obvious impact on technical support teams. The good news is, there are opportunities for all support organizations, regardless of their stance on shadow IT.
Tags : 
    
ServiceNow
Published By: VMware     Published Date: Sep 12, 2019
Over the next few years, chief information officers (CIOs) will preside over a maelstrom of change that will fundamentally alter the way their companies do business in the future.
Tags : 
    
VMware
Published By: FusionOps     Published Date: Jun 15, 2016
Bimodal capabilities, customer intimacy and advanced analytics can all be enabled by digital technologies, allowing supply chains to be both cost-effective and innovation-driven. This research explores the implications of these leading trends for chief supply chain officers.
Tags : 
    
FusionOps
Published By: Emarsys     Published Date: Dec 20, 2018
As a modern marketer, you’re always looking for ways to improve your efficiency at work, especially in the form of software that makes some part of your job easier. You’ve likely heard a lot lately about AI in marketing and how it promises to do just that – and more, of course. In fact, it’s pretty hard to avoid the topic of AI and all the ways it is destined to change marketing as we know it. You may already know that companies who have adopted AI boast about the results: increased conversions, engagement, and a host of other metrics. With such decisive evidence, everybody must be aware of AI and clearly sees its business potential, right? Then you go to your Chief Marketing Officer to strike up an informal conversation where you can strategically recommend the technology, and it starts off great — your CMO is well aware of AI and what it could do for the business. You’re thinking, “What luck! I might not have to put up much of an argument.” Then your CMO says, “But you’re not a data
Tags : 
    
Emarsys
Published By: Oracle Commerce Cloud     Published Date: Sep 06, 2017
"The success of your digital strategy requires bridging the gap between your core capabilities and what customers want. Watch this on demand webcast with Forrester’s Vice President and Principal Analyst, Ted Schadler, Michael Fasosin, Chief Strategy Officer, Spindrift & DigitasLBi OSG, and Oracle to learn: - Key trends in consumer online shopping behavior - How to develop a successful digital experience technology strategy and roadmap - The essential components of a modern digital experience platform - How to achieve quick-wins and long term investments simultaneously You will also see a short demonstration of how Oracle's CX Cloud solutions deliver personalized, unified experiences across channels. "
Tags : 
    
Oracle Commerce Cloud
Published By: Evariant     Published Date: Sep 07, 2016
Many hospital Chief Marketing Officers continue to debate whether their institution should transform their traditional marketing campaigns and embrace digital marketing. If you are in doubt as to whether digital marketing is important to your success and the success of your hospital, look at the countless articles, white papers, and blogs that have been published over the past several years that talk to the use of the internet and web-based services by patients and consumers. Here are a few of the latest examples from Pew Research Center’s Health Fact Sheet (
Tags : 
evariant, hospital, patient engagement, digital marketing
    
Evariant
Published By: CA Technologies     Published Date: Sep 25, 2017
This rapidly evolving digital world is also redefining the relationship between your business and your customers, who now expect a convenient, interactive experience from their preferred brands. Security is also a concern. Risk is rising, as both the enterprise and its customers exchange a growing amount of sensitive data.
Tags : 
integration, developers, open enterprise, api, business, ca technologies
    
CA Technologies
Start   Previous   1 2 3 4 5 6 7 8    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.


Featured FREE Resource: