RSS feed Get our RSS feed

News by Topic

infor

Results 3976 - 4000 of 4325Sort Results By: Published Date | Title | Company Name
By: Epicor HCM     Published Date: Jun 07, 2012
Effectively justifying a new HR system or upgrading an existing one has always been something HR executives have had to contend with. In this white paper you will learn how to make the business case for a new HRIS to senior executives.
Tags : epicor, human resources, hris, hr system, software
     Epicor HCM
By: nick.morgan     Published Date: Apr 13, 2011
Reducing the security risks organisations are facing by shifting IT operation to the cloud.
Tags : cloud environments, virtual environments, security implications, business benefits, virtual machines, organisations, information, data loss
     nick.morgan
By: dvsAnalytics     Published Date: Apr 20, 2011
Due to increasingly strict federal, state, and industry regulations aimed at protecting health & financial information, an understanding of the required rules and standards and how they relate to call recording is critical
Tags : hipaa, pci dss, nacha, audit logs, call recording, data encryption, user access controls, ephi
     dvsAnalytics
By: Limelight Networks     Published Date: May 03, 2011
In this whitepaper you will learn about the three major trends re-shaping the ecommerce landscape: Video as a way to enhance the shopping experience; Mobile as a channel for expanding marketing reach; and Personalization informed by advanced analytics.
Tags : limelight networks, rich-media strategies, ecommerce, online retail, consumer behavior, video, mobile, personalization
     Limelight Networks
By: Achievers     Published Date: Jun 05, 2012
The research in this report reveals that progressive organizations look at recognition differently. Most importantly, they have a strategy for recognition that ensures alignment with business goals, organizational culture and other talent management processes. These organizations design their programs to consistently reinforce key behaviors and outcomes necessary to drive business success.
Tags : achievers, human resources, employee recognition, employee development, hr management, employee performance
     Achievers
By: Matillion     Published Date: May 12, 2011
This whitepaper explains the importance of Business Intelligence to midsize companies, examines the challenges found in BI projects and explains how to be successful in improving visibility in your business.
Tags : business intelligence, management information, dashboard, dashboards, analysis, analytics, data warehouse, reports
     Matillion
By: Trillium Software     Published Date: Jun 06, 2011
The fourth Web seminar in the series is titled "Tips, Tools & Best Practices" which shows how you can learn to deliver high performance data quality in real-time.
Tags : trillium software, operational data quality, odq, performance management, real-time transactions, high performance data quality, business processes optimization, information integrity
     Trillium Software
By: IBM Corporation     Published Date: Jun 01, 2011
Gartner has identified five key failures in crucial interactions between security and risk professionals and their client.
Tags : ibm, gartner, communication, security message, enterprise risk management, jeffrey wheatman, chief information security officer, ciso
     IBM Corporation
By: Liaison Technologies     Published Date: Aug 15, 2011
This Case Study provides useful lessons for combining e-commerce with cloud computing. See what Liaison Technologies can do for your business...
Tags : gartner, liaison, cloud, cloud computing, fine appers, csb, brokerage, technology
     Liaison Technologies
By: Liaison Technologies     Published Date: Aug 22, 2011
This Case Study provides useful lessons for combining e-commerce with cloud computing. See what Liaison Technologies can do for your business...
Tags : gartner, liaison, cloud, cloud computing, fine appers, csb, brokerage, technology
     Liaison Technologies
By: Liaison Technologies     Published Date: Jan 30, 2013
In today’s fast-paced marketplace, efficient and accurate exchange of information with vendors, customers and other business partners.
Tags : liaison, data integration, new data integration solution, fast-paced marketplace, integration approach
     Liaison Technologies
By: ESET     Published Date: Jun 20, 2011
Trusted experts in endpoint security solutions. Learn more today!
Tags : cloud computing, endpoint security, evolution, google, hype, information technology, microsoft, windows
     ESET
By: Idera     Published Date: Jan 22, 2013
While most information can (at least in theory) be kept on paper, virtually all organizations now keep personnel, customer, financial, transactional and other records in digital format.
Tags : idera, compliance, backup strategy, industry regulations, six sigma, itil, disaster recovery plan
     Idera
By: Kaon     Published Date: Jul 07, 2011
In this white paper, learn why the marketer's primary mission is to clarify that differentiation and how to find successful marketing tools and techniques to do just that.
Tags : kaon interactive, differentiation, competitive advantage, marketing challenge, perception, key product information, interactivity, interactive marketing
     Kaon
By: Webroot     Published Date: Jul 08, 2011
This paper reviews the business value of IT security, illustrates the business case for SaaS over "do it yourself" premise-based solutions, and outlines what to look for in SaaS solutions you can adopt with confidence and count on as you grow.
Tags : webroot, saas, security as a service, computer security software, antispyware software, home internet security, enterprise internet security, solution center
     Webroot
By: KeyedIn Solutions     Published Date: May 08, 2012
The aim of this white paper is to discuss the importance and benefits of a PPM approach within one of our most vital industries.
Tags : project management, keyedin, success, ppm, benefits, pharmaceutical, research and development, r&d
     KeyedIn Solutions
By: Real Time Logic     Published Date: Jul 29, 2011
This paper discusses the Information Assurance and why it is important for operators of IT systems and networks.
Tags : information assurance, ditscap, diacap, computer security, cissp, poa&m, certification and accreditation, 8500
     Real Time Logic
By: Spredfast, Inc.     Published Date: Mar 04, 2014
What have savvy brand marketers and social media strategists learned recently? Here’s a quick wrap-up of significant network trends, consumer behaviors, and brand results.
Tags : spredfast, marketing, social strategy, media strategy, social network, consumer behaviors, search marketing
     Spredfast, Inc.
By: Apple Corporation     Published Date: Dec 01, 2011
In this seminar, you'll learn how you can use the iPad to create and deliver stunning sales and marketing presentations, make business meetings even more productive and take advantage of business "dashboards" to stay better informed no matter where you're working from.
Tags : ipad, ipod, apple, ipad2, tablet, ipad tablet, apple iphone, itunes
     Apple Corporation
By: Adaptive Planning     Published Date: Oct 19, 2011
Despite a number of compelling reasons to move away from annual plans and budgets, many CFOs are reluctant to make the change. They fail to recognize that there are alternative (and less dysfunctional) ways of driving performance improvement and making managers accountable for performance. CFOs need to implement systems that provide managers at every level with the capability to make fast, well-informed decisions. They need to replace annual planning cycles with more regular business reviews that enable managers to see trends, patterns, and "breaks in the curve" long before the competition.
Tags : adaptive, marketry, cfo, business, finance, decision making
     Adaptive Planning
By: Dell Storage     Published Date: Aug 14, 2012
The importance of healthcare providers to assure their patients the utmost security, confidentiality and integrity of their sensitive information cannot be understated. This means being HIPAA compliant within every aspect of their practice, with a particular emphasis on the components of their healthcare IT infrastructure This white paper described elements and best practices of a HIPAA compliant data center. This comprehensive guide spans the administrative, physical, and technical safeguards of the HIPAA Security rule from the physical security and environmental controls necessary of the facility itself, to the requirements needed between a Covered Entity (CE) and the data center provider when outsourcing. Detailing both the benefits and risks of a third-party partnership, this white paper provides answers to key questions such as what exactly makes a data center HIPAA compliant, what to look for when choosing a service provider to work with, and why a Business Associate Agreement (BAA) is important for establishing accountability with these partners.
Tags : hipaa, compliant, data, center, centers, healthcare, providers, assure
     Dell Storage
By: Dell Storage     Published Date: Aug 14, 2012
Engagement with customers online has evolved from novelty to necessity, with an estimated $202 billion spent in 2011 and projected 10% growth to $327 billion in 2016, according to Forrester Research. Businesses are maneuvering to connect with the growing pool of online customers, but the move to eCommerce brings new security risks with the exchange of sensitive consumer information, including cardholder data and personally identifiable information that can enable identity theft. At stake is reputation of brand, ongoing access to merchant credit lines, and substantial penalties and remediation in the event of a breach. This white paper elucidates the aspects of PCI DSS (Payment Card Industry Data Security Standards) compliance that must be considered when choosing a secure environment for servers involved in eCommerce. Whether deciding to outsource or keep data hosting in-house, any company collecting, storing or transmitting customer cardholder data needs to be compliant, and this document helps pinpoint the specific concerns and standards a company should be aware of when choosing how to keep their data secure. Understanding requirements and best practices for security policies and procedures, physical safeguards, and security technologies is essential to establishing cardholder data security and meeting QSA and SAQ audit requirements.
Tags : pci, compliant, data, centers, engagement, connect, ecommerce, compliance
     Dell Storage
By: Oracle     Published Date: Feb 28, 2012
In 7 simple steps, eBusiness professionals can boost sales and customer satisfaction while reducing customer service costs by delivering the right information and service to the right customer at the right time. Find out how!
Tags : on demand, oracle on demand, instant gratification, crm, customer relationship management, deployment, saas, software-as-service
     Oracle
By: Success Factors     Published Date: Feb 16, 2012
Over a three-year timeframe, a broad sampling of SuccessFactors customers outperformed the NASDAQ and S&P 500 by a wide margin. Get this informative study and learn how Business Execution Software helped them achieve such great results.
Tags : employee performance, high performance culture, high performing workforce, smart goals, performance reviews, goal setting, performance management, business strategy
     Success Factors
By: LogMeIn     Published Date: Mar 01, 2012
As you will see, live chat excels at both problem solving and providing product information, the bane of most shoppers' existence. Shoppers rely on it for everything from questions prior to purchase, errors in the checkout process, and post-order follow-up.
Tags : logmein, online sales, live chat, customer satisfaction, product information, cutomer support
     LogMeIn
Start   Previous    153 154 155 156 157 158 159 160 161 162 163 164 165 166 167    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics