RSS feed Get our RSS feed

News by Topic

hr issues

Results 76 - 100 of 106Sort Results By: Published Date | Title | Company Name
By: WebEx.     Published Date: Apr 03, 2009
This report represents the summary findings of our thirteenth annual survey of challenges impacting sales performance today. We identify and analyze these challenges, and examine how organizations are leveraging people, processes, technology, and knowledge to address these issues successfully. In addition, beginning in the Executive Summary and continuing throughout the report, we raise questions about troubling trends and offer a new model for overcoming the problematic issues related to the field of sales.
Tags : webex, sales performance optimization, crm, sales force demographics, sell cycle analysis, detailed performance assessment, change analysis, sales knowledge management
     WebEx.
By: iCIMS     Published Date: Jan 17, 2014
This webinar from iCIMS will show you how to equip your talent team with the proper screening technology, stay in compliance with HR regulations, and best practices for pre and post hire candidate screening.
Tags : icims, talent management, new hires, hiring, finding new employees, screening, new candidates, hr issues
     iCIMS
By: SAP     Published Date: Feb 21, 2008
Many significant business initiatives and large IT projects depend upon a successful data migration. Your goal is to minimize as much risk as possible through effective planning and scoping. This paper will provide insight into what issues are unique to data migration projects and offer advice on how to best approach them.
Tags : sap, data architect, data migration, business objects, information management software, bloor, sap r/3, application
     SAP
By: BlackBerry Cylance     Published Date: Mar 12, 2019
A Pathfinder paper navigates decision-makers through the issues surrounding a specific technology or business case, explores the business value of adoption, and recommends the range of considerations and concrete next steps in the decision-making process.
Tags : 
     BlackBerry Cylance
By: WebEx Communications     Published Date: Dec 14, 2007
Through remote desktop sharing WebEx Support Center enables companies to manage and resolve remote support issues — whether they be external customer-driven or internal user-driven. Support personnel can initiate a session with a remote user by sending them an e-mail or providing a URL.Download this Paper to Learn More About a Support Center.
Tags : customer support, helpdesk, help desk, technical support, remote access, roi, spend management, cut costs
     WebEx Communications
By: BlackBerry     Published Date: May 22, 2008
Over the past decade, wireless technology has made huge strides in security, reliability and throughput. Companies that are moving forward with business mobility initiatives must plan for wireless security and mobile device management from the start. Learn about many of the notable trends and key issues associated with Business Mobility and where to find additional resources for consideration.
Tags : blackberry, mobile applications, cio, pim, voip, smartphones, it communication, microsoft exchange
     BlackBerry
By: Tripp Lite     Published Date: Mar 02, 2015
VoIP is rapidly becoming the standard for voice communications in business, government, education, government and healthcare. It offers capabilities that far exceed traditional phone systems, with unified communication platforms promising to integrate messaging, mobility, collaboration, relationship management, teleconferencing and other advanced features. The transition to VoIP presents a number of challenges like the need to install new equipment in the MDF and the IDFs dispersed throughout your organization's network/telecom wiring closets. Typical closet designs can't handle the increased wattage and heat output of the PoE switches used to power IP phones. In this white paper you'll learn: • The basics of VoIP migration and implementation • What issues to consider when upgrading network/telecom wiring closets for VoIP • What cost-effective solutions are available to power and protect a VoIP network wiring closet
Tags : voice traffic, teleconferencing, messaging, mobility, network, platforms, communication, voip
     Tripp Lite
By: Citrix Online     Published Date: Aug 09, 2010
This series takes you through the many issues that plague the modern help desk, and states the case for implementing user-centric remote support.
Tags : citrix, gotoassist, remote support, help desk, configuration, service delivery, return on investment, roi
     Citrix Online
By: IBM     Published Date: Jul 07, 2016
Join IBM Mobile Analytics expert, Michael Darden, to see how the analytics capabilities of IBM MobileFirst Platform can enable you to answer three critical questions about your apps and then take immediate action to correct any value-draining issues … faster than your clients can take matters into their own hands.
Tags : ibm, mobile, mobile applications, app development
     IBM
By: IBM     Published Date: Jul 17, 2018
Ensuring your data is compliant can be a fairly straightforward task. Your IT team works their way through the checklist, and stays out of trouble with lawyers and regulatory agencies. There’s value to that. But true data protection is more than regulatory compliance. In fact, even if you’re compliant, your organization could still be at risk unless you strategically identify and protect your most valuable data. Traditionally, you’ve been presented with IT security metrics—sometimes reassuring, other times alarming. But simply reviewing IT security metrics is not meaningful in and of itself. As an executive, you don’t evaluate issues in siloes. Instead, you excel at assessing issues in the broader context of your organizational operations. In other words, technical security data and metrics lack value unless viewed through the lens of business risk. When you’re presented with IT security metrics, your question is: What does this mean for my business? And ultimately, what data should I
Tags : 
     IBM
By: Group M_IBM Q119     Published Date: Feb 22, 2019
In September 2012, the New York City Board of Health approved a measure to ban the sale of large sodas and other sugary drinks in restaurants, movie theaters, sports arenas and street carts in a first of its kind restriction in the US. At the forefront of this measure was Mayor Michael Bloomberg. The mayor noted that 6,000 New Yorkers die every year from obesity-related illness. Some ethnic groups in the city have rates of overweight and obesity approaching 70 percent of adults. African-American New Yorkers are three times as likely, and Hispanic New Yorkers twice as likely, as white New Yorkers to die from diabetes.1 Is this social policy run amuck? Is it, as some have suggested, an infringement on individual rights? Or is it simply recognition that health issues cannot be treated in isolation from the many other factors that affect an individual’s or a community’s health?
Tags : 
     Group M_IBM Q119
By: IBM     Published Date: May 01, 2017
If you function like most IT organizations, you've spent the past few years relying on mobile device management (MDM), enterprise mobility management (EMM) and client management tools to get the most out of your enterprise endpoints while limiting the onset of threats you may encounter. In peeling back the onion, you'll find little difference between these conventional tools and strategies in comparison to those that Chief Information Officers (CIOs) and Chief Information Security Officers (CISOs) have employed since the dawn of the modern computing era. Their use has simply become more: Time consuming, with IT trudging through mountains of endpoint data; Inefficient, with limited resources and limitless issues to sort through for opportunities and threats; and Costly, with point solution investments required to address gaps in OS support across available tools. Download this whitepaper to learn how to take advantage of the insights afforded by big data and analytics thereby usher i
Tags : ibm, endpoint management, mobile device management, enterprise mobility, os support, it organizations
     IBM
By: IBM     Published Date: Oct 01, 2013
Clabby white paper that highlights the benefits and advantages that IBM brings to the market with its breakthrough technology and products, providing the right solution and value for customers' issues compared to Cisco UCS.
Tags : ibm, ibm’s bladecenter, x86 servers, it solutions, servers, san, chassis, applications
     IBM
By: AVI-SPL     Published Date: Sep 01, 2016
There are a few factors that are influencing the complexity of enterprise collaboration. In this tech brief, we’ll examine three issues that often surface when we work with IT teams on a Collaboration Program Assessment.
Tags : collaboration, enterprise collaboration, video conferencing, video meetings, video
     AVI-SPL
By: IBM     Published Date: Jul 09, 2014
As new threats emerge every day, the need for qualified security staff is growing. But there aren’t enough people with technical security skills to go around. That gap is leaving organizations exposed. In fact, in a recent survey conducted by Forrester Consulting and commissioned by IBM, 92% of security leaders said that staffing issues contribute to heightened levels of risk.
Tags : ibm, security, technical security, forrester report, it security, security staffing
     IBM
By: Cisco     Published Date: Aug 18, 2014
Start planning your deployment of the Cisco Unified Computing System (Cisco UCS), powered by the Intel® Xeon® processor, with this useful, step-by-step design guide. The Cisco UCS Technology Design Guide simplifies the steps to a successful deployment. Four modules guide you through a Cisco engineer-tested framework that addresses typical data center and server issues.
Tags : design guide, deployment, computing, servers, data, innovative, data center, architecture
     Cisco
By: HP     Published Date: Aug 11, 2014
A few years ago, two technologies emerged to dramatically improve the industry’s ability to protect data. The cost of disk drives came down, and deduplication technology was introduced. This breakthrough is sometimes referred to as Deduplication 1.0. Like any technology, you’d expect it to evolve over time. HP launched the HP StoreOnce deduplication technology roadmap in 2010 to do just that. The result? Deduplication 2.0 or what HP calls “Federated Deduplication”. This next generation deduplication addresses some of the issues inherent in existing deduplication solutions: performance, flexibility, and data management and not only that, when moving from your legacy storage backup systems, you can reduce the amount of your stored backup data by 95 percent or we’ll make up the difference with free disk capacity and support.
Tags : deduplication, storage, it benefits, backup systems, challenges, challenges, technologies
     HP
By: AdRoll     Published Date: Jul 11, 2017
The sums spent on digital advertising are so vast; any inefficiencies become costly disadvantages. Attribution models identify such waste, but too many marketers struggle to understand the opportunities of attribution. And even if marketers want better attribution, getting budget support and C-suite approval can prove daunting. This guide addresses three issues to help marketers implement better attribution: ? What attribution models are available and which is the right one for my brand? ? Whom will I need to work with and how can I get buy-in? ? How do I build a business case for attribution?
Tags : attribution, digital advertising, marketing, advertising efficiency
     AdRoll
By: Aladdin     Published Date: Aug 21, 2009
In this Aladdin white paper you will discover an overview of spyware, security threats seen with spyware, the technical underpinnings to spyware, the technology challenges inherent in trying to block spyware, and spyware's legal issues.
Tags : spyware, malware, antispyware, anti-spyware, anti spyware, email security, aladdin, security
     Aladdin
By: Reactivity     Published Date: Aug 21, 2009
This white paper discusses the three critical Web services deployment issues-security, provisioning connections, and operations. As each is owned by different factions within an enterprise, each can become a 'show stopper' to Web services deployment initially, and every time a change must be made.
Tags : web service security, secure web services, web service, internet security, web applications, file sharing, network security, reactivity
     Reactivity
By: Quocirca     Published Date: Nov 05, 2008
Unsurprisingly, research shows that the majority of organizations see their future predicated on how well they can innovate. However, just throwing IT technology at issues in the hope that innovation will happen is not viable. Ideas are ephemeral and are easily crushed within the wrong environment. Creating a suitable culture, allied with a well implemented ideas management approach combined with strong leadership, is required.
Tags : quocirca
     Quocirca
By: Clarus Systems     Published Date: Mar 18, 2008
Accessible through a web-based, interactive dashboard, the latest version of the ClarusIPC Plus+ solution integrates performance management capabilities that create real-world "What-if" scenarios to predict capacity issues before they have a chance to impact end users. By monitoring KPI's such as server health, gateway capacity, media resources and device registration, you consistently maintain the ability to estimate future bandwidth needs.
Tags : itil, clarus systems, ipt, ip telephony, unified communications, cisco, callmanager, best practices
     Clarus Systems
By: EMC Corporation     Published Date: May 27, 2011
This ESG paper describes how through consistent individual product innovation and integration EMC backup and recovery solutions tackle the issues that prevent customers from transforming data protection.
Tags : esg analyst report, emc, data protection, backup, brian babineau, david a. chapa, data growth, infrastructure
     EMC Corporation
By: Workforce Software     Published Date: Nov 23, 2015
In order to see the most benefit, organizations must lead with workforce management and they must do so with an eye toward three key issues: Ease-of-use and user adoption Specialization versus standardization Business alignment This paper will explore all three of these areas, and how organizations are leveraging the deep capabilities of modern workforce management technology as the first step of their HCM transformation.
Tags : workforce management technology, business alignment, workforce management software
     Workforce Software
By: FICO     Published Date: Sep 02, 2016
Download this white paper to learn more about these three keys to successful deposit pricing management: Reacting quickly in a dynamic rate environment Being prepared for new regulatory issues Achieving a pricing process
Tags : 
     FICO
Start   Previous    1 2 3 4 5    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics