RSS feed Get our RSS feed

News by Topic

concerns

Results 176 - 200 of 323Sort Results By: Published Date | Title | Company Name
By: NETIQ     Published Date: Jun 20, 2014
On the one hand, you have the increased productivity that goes along with BYOD. On the other hand, you have all the security risks and users’ concerns about giving IT visibility or control of a personal device. Learn how to solve this puzzle.
Tags : netiq, byod, mobile access, autonomy, privacy, security
     NETIQ
By: Payscale, Inc     Published Date: Jun 15, 2018
A total rewards program is made up of several elements — WorldatWork lists them as compensation, benefits, worklife effectiveness, recognition, performance management and talent development — so it’s no wonder that putting together successful packages is a complicated, sometimes stressful, endeavor. There’s so much to consider and evaluate, and if you’re like most of your HR and compensation colleagues, you have a lot of questions. Well hey — that’s what this ebook is here for. Rusty Lindquist, VP of Thought Leadership at BambooHR; Dave Smith, Chief Product Officer at PayScale and Jill Christensen, Founder of Jill Christensen Intl., recently hosted a panel discussion in which they offered insights and tips on the biggest, most frequent concerns around total rewards. What follows is a distillation of their very helpful advice on the most common
Tags : 
     Payscale, Inc
By: Corvisa LLC     Published Date: Feb 13, 2015
Growing numbers of businesses are moving their contact center operations to the cloud. What do they know that you don’t? This whitepaper provides a practical guide to assist in the decision-making process. It offers a comparison of traditional on-premise systems versus current cloud-based solutions, responds to common cloud concerns and discusses the steps needed to begin your due diligence process.
Tags : cloud monitoring, cloud metrics, business analytics, performance monitoring, data, cloud data, metrics
     Corvisa LLC
By: Staples     Published Date: May 02, 2017
Dealing with the office bully is not as easy as dealing with a playground bully, but here are some strategies to help navigate being pushed into doing jobs that are not your responsibility, taking on too much, or simply being treated disrespectfully. Get this article to learn: How to identify bullying in the workplace Ways to control and mitigate disrespectful interactions Learn when to document, discuss, & elevate your concerns Everyone has the right to a respectful and positive working environment. Maybe someone should tell the office bully that.
Tags : office bully, positive work environment, safe workspace, office conflicts, office manager, administrative assistant
     Staples
By: LeadGenius     Published Date: Dec 22, 2016
Effective Account Based Marketing (ABM) requires messaging to a decision making panel -- meeting the needs and concerns of different players at your target accounts. In this whiteboard video, Ryan Williams, VP of Sales at LeadGenius, illustrated hows marketing and sales leaders can build a foundation for highly-personalized account-based messaging at scale.
Tags : b2b sales, b2b marketing, sales leads, lead targets, lead generation, online marketing, sales pipeline, goal setting
     LeadGenius
By: 8x8 Inc.     Published Date: Feb 13, 2017
The migration of contact centers from on-premises to the cloud is well underway and dramatically changing how companies deliver customer experience. That’s the conclusion of this 2016 survey by 8x8 and the Contact Center Network Group (CCNG) of 154 contact center professionals in the U.S. and UK. The November 2016 survey results uncover a range of trends and opportunities that highlight the importance of analytics, the increase in remote working, and the integration of more non-voice channels into the contact center. Download this complimentary report to learn: Major business drivers that are leading contact centers to cloud Surprising top method for measuring and improving agent performance Concerns and obstacles around moving to the cloud Increased prevalence of remote working and key challenges reported The most popular non-voice channels contact center managers would like to incorporate
Tags : cloud contact center, ccng, analytics. remote working, non-voice channels
     8x8 Inc.
By: Oracle PaaS/IaaS/Hardware     Published Date: Jan 12, 2017
Recently, cloud-native has been touted as the panacea to all the development concerns. In this webcast, James Governor, a Redmonk analyst and founder, will share what cloud-native really is and how it helps your business. He will highlight organizations that lead the new era of development innovation with agile and continuous methodologies and follow cloud-native development practices. Aaron De Los Reyes, Sr. Director of Oracle Technology at Cognizant, will then share how they and their clients are approaching the shift to cloud-native development and migration strategies for their legacy deployments.
Tags : 
     Oracle PaaS/IaaS/Hardware
By: Stratus Technologies     Published Date: Sep 11, 2009
New concerns arise as IT executives look at the next wave of applications in the queue for virtualization. If you or your business is among those evaluating ROI and the risks associated with virtualizing your production applications, this five-chapter ebook offers some practical advice.
Tags : stratus, virtualization, server virtualization, x86, roi, power, cooling, high availability
     Stratus Technologies
By: Sophos     Published Date: Jul 01, 2013
The BYOD paradigm has rapidly moved from novelty to near inevitability. Even IT organizations with deep concerns about manageability and security are increasingly accommodating user-owned devices. BYOD is here to stay, and tomorrow’s BYOD will involve even greater diversity in devices, form factors and platforms. Learn about where BYOD stands, where it’s headed, core challenges and how to build a BYOD action plan.
Tags : mobile, byod
     Sophos
By: ESET     Published Date: Jan 30, 2008
Steganography is the science of hiding data inside of items, such as sound and picture files.  Listen to this podcast to learn more about steganography and the potential IT security concerns it poses.
Tags : embedded files, steganography, hiding data, secret files, coding, av signatures, traditional antivirus, norton
     ESET
By: IBM Unica     Published Date: Sep 08, 2011
The survey found continued interest in many of the same issues, plus a more urgent need to turn data into action, increasing recognition of mobile's marketing power, and a desire for more integrated technology solutions.
Tags : ibm, unica, marketing, data-into-action, contact management, technology infractructure, roi, interactive marketing
     IBM Unica
By: IBM     Published Date: Nov 09, 2012
Applications represent three of the top four software concerns of IT executives. Organizations should consider the varying nature of their application workloads in order to make smarter choices. This Forrester paper looks into the impact of System Z.
Tags : ibm, system z, total economic impact, roi, benefits, agility
     IBM
By: CDW     Published Date: Feb 27, 2015
CDW’s Technology Insights guides provide a high-level, informative take on today’s most pressing IT solution areas and related issues. Speaking to the interests and concerns of IT managers and their staff, as well as their enterprise counterparts, the guides provide up-to-date summaries, strategic guidance and best practice tips on the technologies driving IT operations forward.
Tags : software management, sam, software security, cloud computing, enterprise content management, business intelligence, office productivity apps, network security
     CDW
By: CDW     Published Date: Aug 28, 2015
The virtualization of Tier 1 mission critical applications has long lagged the virtualization of Tier 2 and Tier 3 apps in large part due to concerns about performance availability and management. The availability of Priority Optimization on HP 3PAR StoreServ Storage eases these concerns while giving organizations the confidence to accelerate their virtualization of Tier 1 apps.
Tags : storage, servers, cloud computing, architecture
     CDW
By: McAfee     Published Date: Apr 25, 2014
You spoke and we listened. Today’s advanced malware threats have you spending a lot of resources fighting an uphill battle. The answer is McAfee Advanced Threat Defense—so you can find, freeze, and fix threats.
Tags : advanced malware, maware threats, malware problems, malware attacks - rootkits, phishing, zero-access, trojans, apts
     McAfee
By: Dell SecureWorks     Published Date: Sep 09, 2013
The Dell SecureWorks Security and Risk Consulting practice delivers the independent expertise, experience and perspective you need to address your security, risk and compliance concerns.
Tags : dell, dell secureworks, risk consulting, cyber security, security
     Dell SecureWorks
By: Tripp Lite     Published Date: Sep 11, 2014
Cooling tends to take a back seat to other concerns when server rooms and small to mid-size data centers are first built. As computing needs grow, increased heat production can compromise equipment performance and cause shutdowns. Haphazard data center expansion creates cooling inefficiencies that magnify these heat-related problems. Users may assume that they need to increase cooling capacity, but this is expensive and often unnecessary. In most cases, low-cost rack cooling best practices will solve heat-related problems. Best practices optimize airflow, increase efficiency, prevent downtime and reduce costs.
Tags : cooling, efficiency, heat-related, server rooms, data center, computing, equipment, performance
     Tripp Lite
By: RingCentral     Published Date: Mar 21, 2014
How RingCentral addresses common concerns about transitioning to a new phone system to deliver an easy setup without hiccups.
Tags : ringcentral, phone system, business phone, mobile phone, business transition, phone provider, cloud based phone, changing attitudes
     RingCentral
By: GuideSpark     Published Date: Nov 19, 2018
Employees like the concept but have concerns about how it’s implemented. A well-thought-out employee communication initiative can help close the gap and make a culture of continuous feedback a reality.
Tags : 
     GuideSpark
By: Singlehop     Published Date: Oct 01, 2014
As cloud adoption grows, Alert Logic has observed a shift in security concerns. While cloud security remains a major concern, the business benefits of moving applications to the cloud are too compelling to resist. Now, having largely committed to a cloud strategy, IT professionals are redirecting their focus to finding the best ways to secure their cloud-based applications and data. Download the Cloud Security Report today to gain insight on how Alert Logic continues its practice of uncovering trends that threaten both cloud and on-premises environments.
Tags : cloud security, infrastructure threats, security data, chp infrastructure, security
     Singlehop
By: ADP     Published Date: Oct 14, 2014
In July and August 2014, the ADP Research Institute®, a specialized group within ADP®, conducted an online survey of more than 750 owners and executives at companies with 50-999 employees. The Midsized Business Owners Study is now in its third year. Midsize businesses often struggle between operating like a smaller business but having to abide by the same regulations as larger corporations. Download this case study to learn how midsize business are dealing with their three greatest concerns right now: healthcare benefit costs, the Affordable Care Act, and the level of government regulations.
Tags : adp, midsize business, healthcare benefit costs, affordable care act, government regulations, adp research institute, midsized business owners study
     ADP
By: Tyco Integrated Security     Published Date: Mar 09, 2016
Security concerns differ from industry to industry. So why do many businesses settle for one-size-fits-all security systems? Discover the potential threats to businesses such as car dealerships, restaurants and retailers, and the ways you can better protect against them.
Tags : tyco, security, data threat
     Tyco Integrated Security
By: Mimecast     Published Date: Dec 20, 2018
According to Gartner, E-discovery readiness is an initiative that spans legal, IT and business stakeholder concerns and can also unify and align with archiving and data management strategies. To reduce risk and exposure, an E-discovery plan should be proactive and holistic instead of reactive and time pressured. This newsletter, “Strengthen E-Discovery Readiness to Reduce Cost and Risk” features Gartner research and offers guidance on the considerations for and E-discovery action plan, such as retention schedules, access rights, privacy concerns and security controls.
Tags : 
     Mimecast
By: Duo Security - Nethawk     Published Date: Jul 01, 2015
Modern two-factor solutions have evolved to support new, complex technology models that change how we use data, including cloud computing and BYOD (Bring Your Own Device).
Tags : two-factor authentication, integration issues, security concerns, it security decision-makers, security
     Duo Security - Nethawk
By: Duo Security - Nethawk     Published Date: Jul 01, 2015
Discover key areas of difference between two-factor authentication solutions and gain insight on concrete criteria for evaluating technologies and vendors with Duo Security’s free two-factor evaluation guide.
Tags : two-factor authentication, integration issues, security concerns, it security decision-makers, security
     Duo Security - Nethawk
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics