RSS feed Get our RSS feed

News by Topic

asp

Results 326 - 350 of 506Sort Results By: Published Date | Title | Company Name
By: Oracle     Published Date: Jan 16, 2014
Read Social Recruiting for Dummies to get simple, practical advice on recruiting with social media, from creating and implementing a social recruitment strategy to fostering a truly aspirational employment brand.
Tags : zenithoptimedia, oracle, transformational knowledge, operational efficiency, knowledge management, business management, social recruiting, recruit talent
     Oracle
By: Oracle     Published Date: Jan 16, 2014
Read Social Recruiting for Dummies to get simple, practical advice on recruiting with social media, from creating and implementing a social recruitment strategy to fostering a truly aspirational employment brand.
Tags : zenithoptimedia, oracle, transformational knowledge, operational efficiency, knowledge management, business management, social recruiting, recruit talent
     Oracle
By: Lumension     Published Date: Jun 03, 2015
Microsoft's System Center Configuration Manager doesn't handle every aspect of Linux/UNIX and third-party application security. Here's how to augment and leverage SCCM to close the gaps.
Tags : it security, data center, patch, software, application
     Lumension
By: Oracle Primavera     Published Date: Oct 09, 2015
With budgets in the billions, timelines spanning years, and life cycles extending over decades, oil and gas projects present enormous management challenges for the organizations sponsoring them. Oracle helps oil and gas companies rise to these challenges – and reap the corresponding rewards – by providing an enterprise project portfolio management (EPPM) solution that gives them visibility into and control over every aspect of their operations.
Tags : oil, gas, oil and gas industry, eppm, oracle, operations management, project management, project portfolio
     Oracle Primavera
By: Lumension     Published Date: Jun 05, 2015
Microsoft's System Center Configuration Manager doesn't handle every aspect of Linux/UNIX and third-party application security. Here's how to augment and leverage SCCM to close the gaps.
Tags : it security, data center, patch, software, application, analytical applications, database development, database security
     Lumension
By: IBM     Published Date: Jan 07, 2016
Web content management remains a vibrant and growing market, fueled by the aspirations of digital strategists on the demand side and continuous innovation on the supply side. IT application leaders, marketers, digital experience specialists and merchandizers all now view WCM as mission-critical.
Tags : ibm, gartner, web, content management, digital strategy, wcm, website development, internet marketing
     IBM
By: IBM     Published Date: Mar 07, 2016
Predictive Maintenance for Dummies helps you grasp the concepts of predictive maintenance and put the benefits to use.
Tags : ibm, predictive maintenance, operations, data, competitive advantage
     IBM
By: IBM     Published Date: Mar 28, 2016
A successful business case is one that enables your organisation’s business leaders to make the right decision about a Talent Analytics investment. In this report we highlight the key aspects you need to think about as you create your own business case for Talent Analytics, starting with getting a clear handle on why it is a worthwhile investment for your organisation, but also addressing considerations such as budget and resourcing concerns, how you can measure the success of your initiative and demonstrate ROI, and the major risks you need to bear in mind over the lifetime of the initiative.
Tags : ibm, mwd advisors, talent analytics
     IBM
By: Fujitsu     Published Date: Oct 25, 2016
When you embark on an SAP HANA® transformation, your goals include improving efficiencies, serving external customers better and driving business continuity. All too often, the transformation doesn't go as smoothly as it should. Learn key aspects of deploying SAP HANA from your industry peers, as captured by Coleman Parkes Research.
Tags : sap hana, hana cloud platform, sap hana cloud platform, sap hana platform, sap hana analytics
     Fujitsu
By: AstuteIT_ABM_EMEA     Published Date: Feb 28, 2018
Viele Unternehmen, die einen Wechsel in die Cloud in Angriff nehmen, verlagern erst einmal sekundäre Daten vor Ort in den Cloud-Speicher. Bei Kosten von einem Bruchteil eines Cents pro Gigabyte ist der wirtschaftliche Aspekt sehr interessant – wer möchte nicht von drastisch gesenkten Speicherkosten profitieren? Die Entscheidung, Petabyte von Daten in die Cloud zu senden, sollte jedoch nicht leichtfertig getroffen werden. Wir bei Veritas wissen, dass eine solide Datenverwaltung in der Cloud vor allem globale Datentransparenz voraussetzt. Nachdem Sie Ihre Daten verstanden und visualisiert haben, können Sie: • SIE KLASSIFIZIEREN • SIE VERLAGERN • DATENANOMALIEN IDENTIFIZIEREN Im Folgenden finden Sie wichtige Tipps, mit denen sichergestellt wird, dass der Wechsel in die Cloud erhebliche Kosten einspart und gleichzeitig Datenrisiken vermeidet.
Tags : bestimmungen, cloud, astute, speicher, unternehmen
     AstuteIT_ABM_EMEA
By: Astute IT DACH     Published Date: Feb 28, 2018
Viele Unternehmen, die einen Wechsel in die Cloud in Angriff nehmen, verlagern erst einmal sekundäre Daten vor Ort in den Cloud-Speicher. Bei Kosten von einem Bruchteil eines Cents pro Gigabyte ist der wirtschaftliche Aspekt sehr interessant – wer möchte nicht von drastisch gesenkten Speicherkosten profitieren? Die Entscheidung, Petabyte von Daten in die Cloud zu senden, sollte jedoch nicht leichtfertig getroffen werden. Wir bei Veritas wissen, dass eine solide Datenverwaltung in der Cloud vor allem globale Datentransparenz voraussetzt. Nachdem Sie Ihre Daten verstanden und visualisiert haben, können Sie: • SIE KLASSIFIZIEREN • SIE VERLAGERN • DATENANOMALIEN IDENTIFIZIEREN Im Folgenden finden Sie wichtige Tipps, mit denen sichergestellt wird, dass der Wechsel in die Cloud erhebliche Kosten einspart und gleichzeitig Datenrisiken vermeidet.
Tags : bestimmungen, cloud, astute, speicher, unternehmen
     Astute IT DACH
By: IBM     Published Date: May 27, 2014
“Big data”– which admittedly means many things to many people – is no longer confined to the realm of technology. Today, it is a business imperative. In addition to providing solutions to insurance companies’ long-standing business challenges, big data inspires new ways to transform processes, organizations and many aspects of the insurance industry as we know it.
Tags : ibm, big data, insurance, insurance technology, big data solutions, business value, financial data, risk data
     IBM
By: Cylance     Published Date: Jul 02, 2018
Cylance commissioned AV-TEST to perform an advanced threat prevention test of enterprise endpoint protection software. The testing methodology was jointly developed to provide additive testing to the commodity antivirus protection tests currently produced by AV-TEST. CylancePROTECT® was tested against five competitor endpoint products from Kaspersky, McAfee, Sophos, Symantec, and Trend Micro. The tests were performed in December 2016 and January 2017. This report contains the results of four test cases. The primary goal was to show the detection and prevention capabilities of new and unknown malicious executables. Read more in the AV-TEST report.
Tags : cyber, threat, protection, av-test, cylance
     Cylance
By: Cylance     Published Date: Jul 02, 2018
Matthew Coy, Safelite’s Vice President of Information Technology, is responsible for overseeing all aspects of the company’s IT infrastructure, including selecting, administering, and supporting technology products. The company handles personally identifiable information, including credit card information and insurance data collected from several sources, and must comply with insurance industry regulations and the Payment Card Industry Data Security Standard. Safelite is the target of constant external attacks. The organization experienced ongoing security issues stemming from infected software, drivebys and other malicious downloads. According to Matthew, “A lot of malware and email viruses were making it through the environment, all bypassing our email security and AV.” Not only were the security controls ineffective, the previous AV platform required nearly 150 hours per week to manage. Matthew knew Safelite needed to make a change, and fast. Having worked with Cylance® at two previous companies, he was confident CylancePROTECT® could significantly improve Safelite’s endpoint security. Read the full case study to learn about the results Cylance was able to deliver.
Tags : safe, lite, cybersecurity, data
     Cylance
By: Lane Telecommunications     Published Date: Apr 14, 2009
The introduction of e-mail and its exponential expansion into every aspect of business life presented a significant challenge to the fax industry and for some observers it was a foregone conclusion that fax was destined for a rapid demise. It is interesting to note, therefore, that fax has actually continued on a steady growth path that is predicted to continue well into the future.
Tags : kudos, lane, fax, foip, fax over internet protocol, migration strategy, network resources, multifunctional peripherals
     Lane Telecommunications
By: SAS     Published Date: Mar 06, 2018
Despite heavy, long-term investments in data management, data problems at many organizations continue to grow. One reason is that data has traditionally been perceived as just one aspect of a technology project; it has not been treated as a corporate asset. Consequently, the belief was that traditional application and database planning efforts were sufficient to address ongoing data issues.
Tags : 
     SAS
By: SAS     Published Date: Jun 06, 2018
Some organizations focus on the scary aspects of failing to comply with the EU General Data Protection Regulation. But there are many long-term benefits of following through with plans for sustainable GDPR compliance – such as gaining a competitive edge, or developing new products or services. To learn how organizations have approached compliance efforts, SAS conducted a global survey among 183 cross-industry businesspeople involved with GDPR. Based on the results, this e-book delves into the biggest opportunities and challenges faced. Read the e-book to: • Get advice from industry experts. • Find out what steps peers have taken. • Learn how an integrated approach from SAS can continue to guide your journey.
Tags : 
     SAS
By: Gleanster Research     Published Date: Nov 10, 2011
This Gleansight benchmark report is based on the experiences of 229 companies and includes the following sections: Reasons to Implement, Challenges, Value Drivers, Core Technologies and Success Story. It also includes a Vendor Landscape with descriptions and analysis of 32 solution providers. Most organizations today have business intelligence (BI) tools or at least some way of churning out reports. Fewer have a true business intelligence strategy or a well-architected BI platform for generating actionable insights. Broadly considered, BI encompasses all aspects of gathering, storing, cleansing, analyzing and distributing data. This Gleansight benchmark report reveals how Top Performers are justifying their investments in next-generation BI capabilities, how they're overcoming implementation and organizational hurdles, and how, as a result of their investments, they're now able to make more timely and better informed business decisions across multiple organizational functions.
Tags : gleanster, business, benchmark, business intelligence, roi, customer experience/engagement, market research, usability
     Gleanster Research
By: OnForce     Published Date: Apr 22, 2007
“8 Ways Every Solution provider Can Profit from Rollouts Now” demonstrates how rollouts are creating strong sales opportunities for solution providers of all sizes. Importantly, it also addresses how solution providers have finally “cracked the code” of transforming this high-volume business, which is extremely service intensive, into a high-profit business via innovative on-site service delivery models that let them find the contract IT service professionals they need, right when they need them.
Tags : service model, roll-out, rollout, roll-outs, rollouts, customer service, var, vars
     OnForce
By: Intermec     Published Date: Aug 01, 2008
Find out how each aspect of perfect order performance (On-Time Delivery, Complete Orders, Damage-free Delivery, Accurate Invoicing and Documentation) can be improved through enhancements to data collection processes and technologies including RFID, speech, imaging technology, and GPS.
Tags : rfid, on-time delivery, complete orders, perfect order, bar code, manufacturing, metrics, speech
     Intermec
By: Taleo     Published Date: Jan 25, 2012
Each area of payback overlaps as talent mobility is not a stand-alone practice. Internal talent redeployment connects with many aspects of overall talent management, especially talent acquisition and succession management. Understanding and quantifying the returns from talent mobility should be framed in that overall context.
Tags : taleo, human resources, talent management, employee management, talent development
     Taleo
By: Intel Corp.     Published Date: Apr 26, 2012
This white paper provides best practices for integrating security planning into your cloud computing initiatives. Gain insights on key aspects of cloud security.
Tags : cloud, storage, metrics, cloud storage, intel, value, enterprise, private cloud
     Intel Corp.
By: Bit9     Published Date: Mar 07, 2013
Download this whitepaper to learn the key aspects of today’s realistic application whitelisting technologies.
Tags : whitelisting, security, application control, cyber attacks, blacklist
     Bit9
By: Switch Video     Published Date: Jun 05, 2013
When explaining your company’s value proposition, starting with why is always better than starting with how. Learn how an explainer video using emotional and aspirational messaging was able to not only increase Rypple’s online conversion rate by 20%, but also generated more qualified and engaged leads.
Tags : explainer video, animated video, whiteboard video, conversion rate, landing page conversion rate, marketing video, video marketing, online video marketing
     Switch Video
By: Datawatch     Published Date: Mar 21, 2014
Big Data is not a new problem. Companies have always stored large amounts of data—structured like databases, unstructured like documents—in multiple repositories across the enterprise. The most important aspect of big data is not how big it is, or where it should be stored, or how it should be accessed. It’s the efficacy of business intelligence tools to plumb its depths for patterns and trends, to derive insight from it that will give companies competitive advantage in an increasingly challenging business climate. Visualization allows companies to analyze big data in real-time across a variety of sources in order to make better business decisions.
Tags : visual data discovery, decision making software, data variety, business analysis, data visualization, big data, business analytics, business intelligence
     Datawatch
Start   Previous    7 8 9 10 11 12 13 14 15 16 17 18 19 20 21    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics