RSS feed Get our RSS feed

News by Topic

hr data

Results 326 - 350 of 1253Sort Results By: Published Date | Title | Company Name
By: SAP     Published Date: Nov 17, 2016
Culture has become one of the most important business topics of 2016. CEOs and HR leaders now recognize that culture drives people's behavior, innovation, and customer service: 82 percent of survey respondents believe that "culture is a potential competitive advantage." Knowing that leadership behavior and reward systems directly impact organizational performance, customer service, employee engagement, and retention, leading companies are using data and behavioral information to manage and influence their culture.
Tags : sap, human resources, employee, deloitte, culture
     SAP
By: NetApp     Published Date: Oct 08, 2013
Learn how efficient NetApp IT empowers the Denver Broncos to invest in the future by providing asychronous disaster recovery and data protection.
Tags : data protection, security, netapp, disaster recover, technology, best practices
     NetApp
By: Infoblox     Published Date: Sep 09, 2014
An integrated DNS architecture is needed in today’s networking landscape. Designing a secure DNS architecture requires more than increased bandwidth and QPS. Learn how to build a secure and scalable DNS solution to ensure network availability.
Tags : infoblox_dns_firewall, infoblox_dns, infoblox_dns_server, infoblox_security, infoblox_dns_security, infoblox_security_device_controller, infoblox_dhcp_fingerprinting, infoblox_sdc
     Infoblox
By: Delphix EMEA     Published Date: Jan 17, 2019
“In the rush to develop apps faster and deliver more, it’s easier than ever for things to fall through the cracks, like every hasty +1’ed dev/test environment creating a potential security minefield of unmasked sensitive fields. Without the right dev processes, it’s not just security that suffers. With the typical developer spending around 12-hours a week on tasks like setting up and configuring environments or relying on worthless fake data, productivity and quality often fall victim too. Download the Developer Confessions chapter to discover the biggest frustrations we hear from developers, how to balance access to data with data security, and proven ways to speed up developer productivity.”
Tags : 
     Delphix EMEA
By: Adobe     Published Date: Mar 05, 2018
We are fully entrenched in the digital age, so much so that you're probably reading this with a smartphone or mobile device within arms length. Similarly government is also making the shift towards a digital future. But with moving away from paper-based records and towards digital data, there are new opportunities for potential security risks regarding government data and content. As cyberthreats continue to grow in number and sophistication, agencies should be looking at features to secure every level of their digital infrastructure and content. Check out this new pocket guide to learn content security best practices, why it matters, government rules and regulations related to digital data and its associated security and content challenges. You’ll also learn tips and tricks to apply at your agency to make sure your content is secure.
Tags : 
     Adobe
By: CA Technologies     Published Date: Jan 06, 2014
This report presents new research into the use and benefits of IAM and the relationship it has with these three drivers. The research is based on over three hundred interviews with senior IT managers in medium sized to large organisations in a range of business sectors across Europe. The report should be of interest to anyone wanting to better serve all types of users, whilst still keeping control over applications and data.
Tags : mediacom, digital identities, open business, business growth, access management, identity management, iam, open interaction
     CA Technologies
By: Commvault ABM Oct     Published Date: Jul 17, 2019
Enterprises are cobbling together all the pieces that make up a digital business - improved analytics, scalable architecture, automation, and more engaging customer experiences, just to name a few. At the same time, they're facing the ever-present threats of cyber attacks and data breaches.
Tags : 
     Commvault ABM Oct
By: Citrix     Published Date: Nov 14, 2016
Does your application infrastructure meet modern business user needs? Download this infograph to learn how to deliver business agility through datacenter automation with Citrix NetScaler and Cisco Application Centric Infrastructure (ACI).
Tags : cisco, citrix, citrix netscaler, cisco aci, application centric infrastructure
     Citrix
By: MobileIron     Published Date: Apr 05, 2017
Now is the time to switch from BlackBerry’s new and unproven mobile device management (MDM) offering to a modern, comprehensive EMM solution like MobileIron. In today’s highly competitive and fast-paced global economy, the last thing companies need is an MDM vendor who is always playing catch up through technology acquisitions that cost too much and offer too little. MobileIron is a recognized industry leader that has always been 100% focused on mobile security. Our unified, multi-OS EMM platform was built from the ground up to meet the needs of the modern mobile enterprise by reducing IT complexity, delivering a secure user experience, and protecting mobile apps and data on any device, in any cloud service, anywhere in the world.
Tags : mobile security, mobile device management, enterprise data, application security, information security, communication interception, business data, app security
     MobileIron
By: AWS     Published Date: Nov 07, 2018
To best support global users and customers, enterprises require seamlessly connectivity between branch office locations, applications, and workloads hosted in the cloud. Many WAN solutions are ill-equipped for this task because they are generally rigid, complex to configure, and expensive to maintain. IoT adoption, a dramatic increase of the number of network devices, and the sophistication of security threats further compounds this challenge. Geographically-distributed devices need secure cloud connectivity, limiting the ability of existing WAN solutions to fulfill the need of distributed organizations. Cisco SD-WAN on Amazon Web Services (AWS) is an overlay WAN architecture that is designed to address modern enterprise cloud applications and workloads, heterogeneous WAN connectivity, distributed global workforces, and other business needs that traditional WAN solutions cannot meet. Learn more by downloading this solution brief. Join our webinar to learn -How to migrate a data ce
Tags : 
     AWS
By: Splunk     Published Date: Nov 29, 2018
DevOps allows teams to effectively build, test, release, and respond to your software. But creating an agile, data-driven culture is easier said than done. Developer and devops teams struggle with lack of visibility into application monitoring tools and systems, accelerated time-to-market pressure, and increased complexity throughout the devops lifecycle process. As a Splunk customer, how are you using your machine data platform to adopt DevOps and optimize your application delivery pipeline? Download your copy of Driving DevOps Success With Data to learn: How machine data can optimize your application delivery The four key capabilities DevOps teams must have to optimize speed and customer satisfaction Sample metrics to measure your DevOps processes against
Tags : devops, devops tools, continuous delivery, devops methodology
     Splunk
By: Oracle     Published Date: Nov 01, 2013
Being responsible for one-third of a business’ success already puts HR in a critical role. But it’s not just about finding the best people—it’s about finding the best people, at the lowest cost, with the lowest possible attrition and the best possible performance. And it’s about guiding your executive team to the right decisions using the language they understand best: numbers. Talent management—covering everything from recruiting and compensation to ongoing education and retention—has traditionally been managed in silos, with a series of disparate systems and disconnected processes and reports. In today’s data-driven world, CEOs demand more. This new study conducted by HR.com explores what’s working for organizations today and the biggest gaps to fill.
Tags : zenithoptimedia, oracle, successful hr leadership, talent management, core business strategy, human resources, transactional to strategic, financial decisions
     Oracle
By: Oracle     Published Date: Nov 13, 2013
Being responsible for one-third of a business’ success already puts HR in a critical role. But it’s not just about finding the best people—it’s about finding the best people, at the lowest cost, with the lowest possible attrition and the best possible performance. And it’s about guiding your executive team to the right decisions using the language they understand best: numbers. Talent management—covering everything from recruiting and compensation to ongoing education and retention—has traditionally been managed in silos, with a series of disparate systems and disconnected processes and reports. In today’s data-driven world, CEOs demand more. This new study conducted by HR.com explores what’s working for organizations today and the biggest gaps to fill.
Tags : zenithoptimedia, oracle, successful hr leadership, talent management, core business strategy, human resources, transactional to strategic, financial decisions
     Oracle
By: Success Factors     Published Date: Jul 02, 2013
Convert your late-night worries into daytime business success As a small-business leader, you have many reasons for insomnia. Worrying about managing your money, execution, and people can make for restless nights. SuccessFactors is here to help you get a little shut-eye. Download “What keeps business leaders up at night? A quick guide to talent excellence for small-business leaders” for a walk-through of the pivotal areas of your talent management where you can make changes that impact your business. This e-book identifies some of the top worries that keep small-business leaders up at night. How do you sleep better? You bring an integrated approach to your talent management processes to help your people turn strategy into action and action into results. By downloading this e-book, you will learn the benefits of: • Aligning your workforce to your strategy • Helping your people grow • Hiring and retaining the right people from the start • Building a data foundation for your talent mana
Tags : e-book, business leaders, benefits, talent management
     Success Factors
By: Mimecast     Published Date: Aug 22, 2017
Navigating a turbulent cybersecurity climate can be hard – especially as threats like Petya and WannaCry continue to cripple organizations. Business disruption, downtime, technical failure and data loss are all real risk factors that can’t be ignored. The power of preparedness is in your hands. Get expert insight, tips and guidance from industry thought leaders on how to build a cyber resilience plan for email in this e-book.
Tags : cyber resilience, petya, wannacry, cybersecurity
     Mimecast
By: Mimecast     Published Date: Jan 16, 2019
Employees frequently become unwitting participants in attacks, aiding the lateral movement of threats through the distribution of malicious URLS and attachments or the exposure of sensitive data. In this E-book, we’ll take a closer look into several email-related activities that employees often engage in that contribute to the spread of these insider (“hidden”) threats and then discuss what measures your organization can take to protect itself from these “hidden” threats.
Tags : 
     Mimecast
By: Visier     Published Date: Nov 04, 2014
With workforce analytics, HR professionals can play a more pivotal role in their organizations to help direct senior management and hiring managers in connecting the dots between their company’s overall performance and their investment in their workforce. Workforce analytics empower HR professionals to shift from being an operational function to becoming more of a strategic role within their organization. Workforce analytics uncovers deep insights into workforce data by drilling down into the data and highlighting both patterns of success to be repeated and patterns of failure that could lead to risk and impact. Go from intuition- to fact-based workforce decision-making with this comprehensive guide to workforce analytics. This eBook includes advice on how to get started, tips to ensure successful implementation, and key recommendations for finding the right solution
Tags : visier, workforce analytics, hr metrics, planning
     Visier
By: Oracle     Published Date: Oct 20, 2017
This whitepaper explores the new SPARC S7 server features and then compares this offering to a similar x86 offering. The key characteristics of the SPARC S7 to be highlighted are: Designed for scale-out and cloud infrastructures SPARC S7 processor with greater core performance than the latest Intel Xeon E5 processor Software in Silicon which offers hardware-based features such as data acceleration and security The SPARC S7 is then compared to a similar x86 solution from three different perspectives, namely performance, risk and cost. Performance matters as business markets are driving IT to provide an environment that: Continuously provides real-time results. Processes more complex workload stacks. Optimizes usage of per-core software licenses Risk matters today and into the foreseeable future, as challenges to secure systems and data are becoming more frequent and invasive from within and from outside. Oracle SPARC systems approach risk management from multiple perspectiv
Tags : 
     Oracle
By: Oracle CX     Published Date: Oct 20, 2017
This whitepaper explores the new SPARC S7 server features and then compares this offering to a similar x86 offering. The key characteristics of the SPARC S7 to be highlighted are: ? Designed for scale-out and cloud infrastructures ? SPARC S7 processor with greater core performance than the latest Intel Xeon E5 processor ? Software in Silicon which offers hardware-based features such as data acceleration and security The SPARC S7 is then compared to a similar x86 solution from three different perspectives, namely performance, risk and cost. Performance matters as business markets are driving IT to provide an environment that: ? Continuously provides real-time results. ? Processes more complex workload stacks. ? Optimizes usage of per-core software licenses. Risk matters today and into the foreseeable future, as challenges to secure systems and data are becoming more frequent and invasive from within and from outside. Oracle SPARC systems approach risk management from multiple perspectiv
Tags : 
     Oracle CX
By: Riverbed     Published Date: Feb 26, 2015
To increase agility while lowering costs, IT organizations are using virtualization and cloud-based infrastructure services to consolidate and reduce the number of physical servers and data centers across the enterprise. IDC estimates that, by 2015, more than 20 percent of the information running through servers will do so on virtualized systems. This percentage increases along with the size of the company, with some larger organizations using 100 percent virtualized systems. IDC predicts that, over the next decade, the amount of information managed by enterprise data centers will grow by a factor of 50.
Tags : increase agility, virtualization, infrastructure, the cloud, cloud based, consolidation
     Riverbed
By: Dell EMC Storage     Published Date: Aug 20, 2019
The move to data-centric business models is geared to enable organizations to turn their data into data capital. Because of the more stringent performance, scalability, availability, flexibility, and management requirements of the data-centric model, these organizations must modernize their storage and data protection infrastructure through the process of IT transformation. This white paper defines data capital, describes how boosting data capital is a critical ingredient for competitive differentiation, and discusses the implications for data storage and data protection infrastructure. It then turns to an overview of the Dell EMC storage and data protection portfolio, exploring the benefits these solutions offer to organizations interested in crafting the most effective infrastructure to maximize the value of data capital.
Tags : 
     Dell EMC Storage
By: MobileIron     Published Date: Apr 11, 2018
MobileIron unified endpoint management (UEM) enables your employees to enjoy seamless access to business apps and data through secure mobile devices, desktops, and cloud services while still maintaining complete control over their privacy. Harness the power of secure modern devices, apps and cloud services to enable business innovation. With one app, enterprises can protect company data by detecting and remediating known and zero-day threats on the mobile device, and no need for users to take any action.
Tags : byod, strategy, endpoint, management, uem, business, applications, data
     MobileIron
By: Workday     Published Date: May 09, 2018
Operating finance and HR in silos leaves your organization with incomplete data, inconsistent metrics, and strategic uncertainty. Fortunately, you don’t have to settle for silos. Read this whitepaper to learn eight key benefits of bringing finance and HR together in one system.
Tags : 
     Workday
By: Hewlett Packard Enterprise     Published Date: May 11, 2018
Wie die meisten Unternehmen werden auch Sie vermutlich mit der Datenspeicherung zu kämpfen haben. In einer jährlichen Umfrage von Frost & Sullivan unter IT-Entscheidungsträgern wurde das Speicherwachstum als eine der größten Herausforderungen der letzten fünf Jahre für das Rechenzentrum genannt.2Da Unternehmen exponentiell mehr Daten als je zuvor sammeln, replizieren und speichern, ist schon der einfache Erwerb ausreichender Speicherkapazitäten ein Problem. Hinzu kommt nicht zuletzt, dass Unternehmen von ihren gespeicherten Daten mehr erwarten. Daten werden mittlerweile als kostbares Firmenkapital und Möglichkeit gesehen, sich von den Wettbewerbern zu differenzieren: Sie sollen neue Geschäftsmodelle, neue Umsatzchancen, bessere Informationen, optimierte Betriebsabläufe und niedrigere Kosten bringen. Angesagte Trends wie das Internet der Dinge und Big Data-Analysen generieren so schnell neue Marktchancen, dass IT-Organisationen kaum noch Schritt halten können.
Tags : 
     Hewlett Packard Enterprise
By: Cisco     Published Date: Aug 18, 2014
Cisco offers an approach to network security that protects against new and emerging threats while enhancing network visibility and control. Cisco’s proven email and web security products protect 50 percent of Fortune 1000 companies, more than 20 percent of the world's largest enterprises, and eight of the 10 largest Internet service providers.
Tags : email, web security, quadrant, solutions, threats, data loss, phishing attacks, protection
     Cisco
Start   Previous    7 8 9 10 11 12 13 14 15 16 17 18 19 20 21    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics