RSS feed Get our RSS feed

News by Topic

hr data

Results 1226 - 1248 of 1248Sort Results By: Published Date | Title | Company Name
By: Dell PC Lifecycle     Published Date: Mar 09, 2018
Datenbankverarbeitung ist ein wichtiges Thema – in Bezug auf Ihr Unternehmen und in Bezug auf den schieren Umfang der Vorgänge. Unsere Tests mit dem Dell EMC PowerEdge R930 Server und dem Unity 400F All-Flash-Speicherarray führten zu dem Ergebnis, dass die Leistung des Systems bei OLTP Workloads mit einem HPE ProLiant DL380 Gen9-Server mit 3PAR-Array vergleichbar ist, sich aber durch ein besseres Komprimierungsverhältnis auszeichnet (3,2:1 gegenüber 1,3:1). Ladevorgänge mit großen Datenmengen beendete das Dell EMC Unity 22 Prozent schneller als das HPE 3PAR. Dies kann weniger Aufwand für einen mit Data Marts betrauten Administrator bedeuten. Bei paralleler Ausführung von OLTP- und Data-Mart-Workloads übertraf das Unity-Array das HPE 3PAR im Hinblick auf verarbeitete Aufträge pro Minute um 29 Prozent.
Tags : 
     Dell PC Lifecycle
By: Redstor UK     Published Date: May 02, 2018
Many organisations are facing challenges relating to the unstructured data they hold. By its very nature, unstructured data is in a form that is difficult to manage, and it is growing rapidly in size. This can make it difficult to understand who owns that data, whether it is being used or even whether it is of any value. Industry forecasts indicate the volume of data generated by corporates is expected to double over the next three years and, with General Data Protection Regulation taking effect in May 2018, organisations need a more efficient way to manage and control this data. This White Paper provides an overview of the important technical considerations senior business and IT management teams need to review before choosing an archiving provider.
Tags : 
     Redstor UK
By: Dell Server     Published Date: Aug 08, 2018
PowerEdge servers protect your customers and business with integrated security Analysts say attacks on firmware are becoming a greater threat to systems, making a cyber-resilient server architecture essential to the modern data center. Dell EMC PowerEdge servers, powered by Intel® Xeon® Scalable processors, deliver comprehensive management tools and robust layers of security to protect hardware and firmware throughout the server lifecycle.
Tags : 
     Dell Server
By: IBM APAC     Published Date: Jul 15, 2019
TBC
Tags : 
     IBM APAC
By: Oracle     Published Date: Jan 09, 2019
Speed has become the necessary basis of competition. See how Oracle aims to help clients with this through their vision for autonomous database.
Tags : 
     Oracle
By: Oracle     Published Date: Jan 09, 2019
The Accenture Oracle data team has more than 20,000 professionals, who aid in delivering 50 billion transactions a day across more than three exabytes of data for clients globally. Accenture Oracle data specialists recently put the Oracle Autonomous Data Warehouse to a rigorous performance test to provide a real-life application usage experience. The data was then extrapolated and expanded to nine years’ worth of data to test the performance. Learn directly from Accenture experts about testing methodology and results that enable them to deliver more data intelligence faster to the enterprise and transform the way people live and work.
Tags : 
     Oracle
By: Carbon Black     Published Date: Apr 10, 2018
A dversaries, and cybercriminal organizations in particular, are building tools and using techniques that are becoming so difficult to detect that organizations are having a hard time knowing that intrusions are taking place. Passive techniques of watching for signs of intrusion are less and less effective. Environments are complicated, and no technology can find 100 percent of malicious activity, so humans have to “go on the hunt.” Threat hunting is the proactive technique that’s focused on the pursuit of attacks and the evidence that attackers leave behind when they’re conducting reconnaissance, attacking with malware, or exfiltrating sensitive data. Instead of just hoping that technology flags and alerts you to the suspected activity, you apply human analytical capacity and understanding about environment context to more quickly determine when unauthorized activity occurs. This process allows attacks to be discovered earlier with the goal of stopping them before intruders are able t
Tags : 
     Carbon Black
By: Bluewater Learning     Published Date: Apr 30, 2018
Addressing the frustration that people experience with their LMS or TMS does not necessarily mean going through the involved process of selecting and implementing a new system. Often, it simply requires a realignment of business drivers, supporting processes Bluewater experts will lead you through examining User Experience, Administration, Process, Content, Data, Reporting and Technology.
Tags : 
     Bluewater Learning
By: Workday Italy     Published Date: Sep 19, 2018
Providing all employees with easy, timely access to information is critical in today’s business landscape. Discover how a cloud-based system gives you a single source of truth, across the entire business, so you get data that’s trustworthy, actionable, and available in real time.
Tags : 
     Workday Italy
By: Workday Italy     Published Date: Sep 19, 2018
In this Argyle Executive Forum webinar replay, leading HR executives across industries provide expert insight and recommendations for building an analytics strategy and putting a data foundation in place.
Tags : 
     Workday Italy
By: Workday Spain     Published Date: Sep 19, 2018
Providing all employees with easy, timely access to information is critical in today’s business landscape. Discover how a cloud-based system gives you a single source of truth, across the entire business, so you get data that’s trustworthy, actionable, and available in real time.
Tags : 
     Workday Spain
By: BetterUp     Published Date: Aug 14, 2018
"As HR investments become more data-driven, coaching must deliver on its ROI evidence gap. At BetterUp, we’ve created a model that can effectively measure the impact of coaching on the bottom line. Download our paper to learn: - How coaching ROI has been measured in the past, and why these methods are flawed - Which inputs are factored into our ROI algorithm - How we map the ROI of coaching to tangible business results"
Tags : human resource technology
     BetterUp
By: Intel     Published Date: Sep 10, 2018
Today’s tech savvy consumers are continually driving organizations to deliver a modernized shopping experience. To achieve this, retailers are pushing the edge on developing non-traditional ways in delivering sales messages. One of the best ways to engage shoppers with an in-store digital presence is through modern adaptive signages. Modern signages enable two-way interaction between customers and businesses, tapping onto cutting-edge technologies such as sensors and analytics to respond to customer behavior—helping retailers customize content on the fly. Find out how Giada Technology leveraged on Intel® processors to power up their cloud terminals to pre-process signage, sensor, and mobile data to efficiently exchange information with the cloud. Retailers are better positioned to present contextual promotions to the shoppers, delivering benefits of lesser wait-time and increased customer satisfaction.
Tags : 
     Intel
By: Lenovo - APAC     Published Date: Jan 28, 2019
Asian ICT infrastructure investment is exploding as businesses review and modernise their data-centre architectures to keep up with the service demands of a growing and increasingly sophisticated population. Demand for cloud services, particularly to support big-data analytics initiatives, is driving this trend. Frost & Sullivan, for example, believes the Asia-Pacific cloud computing market will grow at 28.4 percent annually through 2022. Despite this growth, many businesses are also rapidly realising that public cloud is not the best solution for every need as they do not always offer the same level of visibility, performance, and control as on-premises infrastructure.This reality is pushing many companies towards the middle ground of hybrid IT, in which applications and infrastructure are distributed across public cloud and self-managed data centre infrastructure. Read about Medical company Mutoh and how it took advantage of the latest technology.
Tags : lenovodcg, nutanix, hyperconvergedinfrastructure, hci
     Lenovo - APAC
By: Lenovo - APAC     Published Date: Jul 02, 2019
Your guide to security Don’t lose unnecessary time coping with attacks, threats and theft. Lenovo ThinkShield is a comprehensive security portfolio that brings you end-to-end protection. In your solutions guide, you’ll find out the benefits of ThinkShield, how to ensure your data stays secure, how to keep employees stay safe online and some important statistics on the rise of cyber attacks. It’s time to act before your next attack, read the guide to find out what to do next. Read the guide>
Tags : 
     Lenovo - APAC
By: Lenovo - APAC     Published Date: Jul 02, 2019
Don’t let your guard down. 4.5 billion records were compromised in the first half of 2018 and threats are growing in numbers. But keeping your data, devices and your employees safe doesn’t have to be complicated. There’s one solution that gives you complete protection, no matter where you are. ThinkShield is Lenovo’s end-to-end protection, built-in to devices. And it’s giving organisations like yours the confidence to make fearless business decisions, without security concerns. Read the eBook to find out how your security compares to organisations like yours, and how to protect what matters.
Tags : 
     Lenovo - APAC
By: Lenovo - APAC     Published Date: Jul 08, 2019
Your guide to security. Don’t lose unnecessary time coping with attacks, threats and theft. Lenovo ThinkShield is a comprehensive security portfolio that brings you end-to-end protection. In your solutions guide, you’ll find out the benefits of ThinkShield, how to ensure your data stays secure, how to keep employees stay safe online and some important statistics on the rise of cyber attacks. It’s time to act before your next attack, read the guide to find out what to do next. Read the guide>
Tags : 
     Lenovo - APAC
By: Lenovo - APAC     Published Date: Jul 08, 2019
Don’t let your guard down. 4.5 billion records were compromised in the first half of 2018 and threats are growing in numbers. But keeping your data, devices and your employees safe doesn’t have to be complicated. There’s one solution that gives you complete protection, no matter where you are. ThinkShield is Lenovo’s end-to-end protection, built-in to devices. And it’s giving organisations like yours the confidence to make fearless business decisions, without security concerns. Read the eBook to find out how your security compares to organisations like yours, and how to protect what matters.
Tags : 
     Lenovo - APAC
By: Dell EMC Storage     Published Date: Nov 28, 2018
It is now apparent that three specific technology advancements—non-volatile memory express (NVMe), NVMe over fabrics (NVMe-oF), and storage-class memory (SCM)—are transformative and will end up guiding the future of high-end data storage. Each of those technologies reduce I/O latency significantly. However, organizations working to transform their data centers shouldn’t regard performance as the only end goal. Great performance is important because it increases an array’s ability to handle any workload intelligently, scale to meet unpredictable demand, and operate cost efficiently. The Dell EMC PowerMax powered by Intel® Xeon® processor is an impressive example of this type of modern storage architecture. It has been designed deliberately to maximize the speed of NVMe and by extension, offer transformational efficiency benefits and business value.
Tags : 
     Dell EMC Storage
By: Darktrace     Published Date: Jun 21, 2019
Cyber security is today an unavoidable concern for law firms and the legal sector at large, which oversees disproportionately large volumes of sensitive data and which is therefore an attractive target for sophisticated threat actors. From confidential information about mergers and acquisitions to disclosures made under attorney-client privilege, today’s law firms are inundated with data that would be disastrous if leaked, both for the results of individual cases and for these firm’s long-term reputations. Indeed, this reputational damage diminishes the very trust upon which the legal profession is predicated, jeopardizing client relationships and hindering customer acquisition. Legal organizations lose 5% of their clients following a data breach, while significant or high-profile breaches can even prompt a firm’s eventual collapse, as was the case for Mossack Fonseca in the infamous Panama Papers breach. In today’s increasingly digital business world, even the most private legal docum
Tags : 
     Darktrace
By: Darktrace     Published Date: Jun 21, 2019
Cyber-attacks targeting technology and telecommunications firms represent the most significant threat to their sensitive customer data and invaluable intellectual property. When successful, such attacks cost these firms dearly, not only in terms of immediate loss of revenue but also in the form of subsequent reputational damage. Technology firms that provide digital services or house vast quantities of user information are particularly at risk, as demonstrated in the Uber breach that exposed the personal information of more than 25 million users. Regulations around personal data, such as GDPR, increasingly require technology firms to adopt a robust cyber defense strategy that can detect cyber-threats at an early stage. Cyber-attacks aimed at technology firms with lucrative IP have also become a fact of life in the Information Age. Often perpetrated by nation-state actors with advanced capabilities, these attacks are now remarkably subtle and stealthy, with some of the latest examples b
Tags : 
     Darktrace
By: Expert System     Published Date: Jul 26, 2019
As companies increasingly recognize the business implications and actionable benefits of AI, the question becomes: How will you use AI for your business? Thanks to the Cogito platform based on AI algorithms, organizations can effectively support and improve unstructured information management and text analytics in order to: Leverage all information, combining internal knowledge with other information sources to extract relevant data Provide effective and real-time insight on strategic initiatives, partners and any third parties Mitigate and even completely avoid risks for operations, reputation, etc. through information analysis and monitoring Know what competitors are doing and intercept market trends Implement automation for the broader, more complex set of processes that involve data Free up teams to focus on more creative or critical activities inside the organization See the entire business through a different perspective
Tags : 
     Expert System
By: RMS     Published Date: Jul 18, 2019
When evaluating single risks, underwriters and coverholders typically have to request exposure analytics from their portfolio managers and brokers, or gather their own supplementary risk data from a range of external resources, whether it is from Catastrophe Risk Evaluation and Standardizing Target Accumulations (CRESTA) zones, through to lookups on Google Maps. But all this takes valuable time, requires multiple user licenses and can generate information that is inconsistent with the underlying modeling data at the portfolio level.
Tags : 
     RMS
Start   Previous    36 37 38 39 40 41 42 43 44 45 46 47 48 49 50     Next   End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics