RSS feed Get our RSS feed

News by Topic

asp

Results 251 - 275 of 510Sort Results By: Published Date | Title | Company Name
By: IBM Unica     Published Date: Apr 16, 2012
With end-to-end enterprise marketing management solutions from IBM, you can transform all aspects of marketing to engage customers in highly relevant, interactive dialogues across digital, social, mobile and traditional marketing channels. Read to find out more.
Tags : ibm, enterprise marketing management, enterprise, end-to-end, it solutions, it management, marketing software, web analytics
     IBM Unica
By: iCims     Published Date: Mar 06, 2014
In this whitepaper, explore how cutting-edge video technology can be leveraged to optimize all aspects of the recruitment process: • Video as a Candidate Engagement Tool • Video as a Screening Tool • Video as an Interviewing Tool • Video as an Onboarding Tool Now is the perfect time to dive deeper into modern video technology to see what video can do to support your recruiting staff, your candidate engagement, and your bottom line.
Tags : video recruiting, candidate engagement tool, human resources, hr technology, icims
     iCims
By: ICMDocs     Published Date: Mar 21, 2011
With the significant improvements in scanning technology today and the increased importance of all aspects of security, it is a good time to take another look at and update the factors that are important in selecting a scanni
Tags : scanning companies, scanning vendors
     ICMDocs
By: illusive networks     Published Date: May 18, 2016
The only way to stop cyber attackers in their tracks is to learn to think like an attacker. To give you better insight into what tools attackers are using, we've compiled a list of 15 "must-have" tools for aspiring attackers. Download this guide and learn about Open source tool cyber attackers use, such as Kali Linux and Wireshark, Password cracking tools that automatically test all possible combinations , and Tools such as Nmap, which lets users "map" a target network and its ports.
Tags : 
     illusive networks
By: INetU Managed Hosting     Published Date: Oct 09, 2015
We have created the Ultimate Guide to Understanding the Cloud to help you better decipher the many aspects of cloud computing. Download the eBook and understand what the cloud is and the various service and deployment models available to you.
Tags : cloud, hosting, managed hosting, disaster recovery, saas, iaas, paas, private cloud
     INetU Managed Hosting
By: Infosys     Published Date: May 21, 2018
In HR, working purely on instinct is dangerous. HR Professionals are highly skilled, and their experienced opinion is extremely valuable when it comes to selecting candidates, assessing performance, and all the other important aspects of this function. But can you rely on their instinct alone? This was the big question that our client, a large CPG company was facing. When we realized this was the problem, the solution was obvious. Not necessarily easy, but obvious. There was plenty of data, but it wasn't being used to improve HR decision making. We designed an analytics solution that would improve HR Decision making. We designed an analytics solution that would improve the efficiency of data gathering, to make the HR function more effective. We then proposed an additional layer, which would use artificial intelligence (AI) to improve HR Decision-making further.
Tags : company, employee
     Infosys
By: Infosys     Published Date: Feb 12, 2019
DevOps is fast assuming greater importance in deciding the agility of an enterprise. A robust DevOps setup is crucial for successful agile delivery and minimal risks. It greatly optimizes release management costs and team productivity, resulting in reduced time to market. At the same time, DevOps enables organizations to make rapid product releases with increased quality and manage customers' expectations. In this paper we explore various aspects of DevOps. We look at key success attributes, main processes, tools, and frameworks that play an elementary role in DevOps.
Tags : 
     Infosys
By: Inspirus     Published Date: Oct 04, 2017
To reflect the needs of a diverse global market, companies need to encourage diversity and inclusion within their own organizations. Along with creating a more representative workforce, diversity also helps to build a more successful company. A two-year research study by Deloitte shows that companies who embrace diversity and inclusion in all aspects of their business statistically outperform their peers. Deloitte’s findings are in line with research carried out by Sodexo that highlighted the business benefits of gender equality. Workplaces that are gender-balanced show a higher employee engagement (+4 points), a stronger brand image (+5 points), increased gross profit (23%) and consistently higher organic growth (13%). Read this whitepaper to learn more about the ancillary benefits of adopting diversity programs for your workplace!
Tags : 
     Inspirus
By: Intel     Published Date: Apr 09, 2019
Retailers, along with many other vertical industries, seek to take advantage of the benefits of the Internet of Things (IoT) to improve customer experience management. However, quickly analyzing relevant data to inform decision-making and respond e?ectively to rapidly changing customer behaviors is challenging. The CEMOSoft* platform is designed to create opportunities, while addressing shifting demographics and an evolving IoT landscape. It o?ers a mobile customer engagement experience that can be dynamically modified on the ?y, along with the increased security and intelligence of an Intel® architecture based IoT gateway and Windows® 10 IoT Core. The result is an a?ordable, ?exible, scalable platform that brings ongoing customer insight to many aspects of daily operations
Tags : 
     Intel
By: Intel Corp.     Published Date: Apr 26, 2012
This white paper provides best practices for integrating security planning into your cloud computing initiatives. Gain insights on key aspects of cloud security.
Tags : cloud, storage, metrics, cloud storage, intel, value, enterprise, private cloud
     Intel Corp.
By: Interactive Intelligence     Published Date: Feb 28, 2013
In this white paper series, on TCPA, from ARM.com, Latitude Software, and Interactive Intelligence, we asked collection industry attorneys David Kaminski and Anita Tolani to weight in on different aspects of technology for TCPA compliance.
Tags : tcpa compliance, telephone consumer protection act, compliance, interactive intelligence
     Interactive Intelligence
By: Intermec     Published Date: Aug 01, 2008
Find out how each aspect of perfect order performance (On-Time Delivery, Complete Orders, Damage-free Delivery, Accurate Invoicing and Documentation) can be improved through enhancements to data collection processes and technologies including RFID, speech, imaging technology, and GPS.
Tags : rfid, on-time delivery, complete orders, perfect order, bar code, manufacturing, metrics, speech
     Intermec
By: Intralinks     Published Date: Jan 16, 2015
The increased mobility of the workforce is changing the way we work. Business users want the flexibility to share and collaborate on content that drives their business while IT needs to ensure the security of that data, no matter where it goes. An effective enterprise collaboration solution must consider people, processes and technologies to be effective, but where to begin? This comprehensive Buyer’s Guide offers guidance on how to develop your organization’s requirements with regard to: Risk management – avoiding data breaches and loss of information that can result in non-compliance Business productivity - allowing for secure collaboration while enabling teams to work anywhere on any device IT efficiency - supporting the full breadth of external business content requirements while integrating with existing applications and protocols This Buyer’s Guide offers a holistic approach for your evaluation process by examining the granular aspects of enterprise file sharing, as well as i
Tags : collaboration solutions, risk management, business productivity, it efficiency, business users
     Intralinks
By: Intralinks     Published Date: Nov 23, 2015
This Buyer’s Guide offers a holistic approach for your evaluation process by examining the granular aspects of enterprise file sharing, as well as infrastructure and extended collaboration, including Information Rights Management (IRM).
Tags : intralinks, infrastructure, information rights management
     Intralinks
By: JasperLabs     Published Date: Apr 07, 2011
Dynamic display advertising and creative optimization (DCO) technologies are changing the way advertisers' approach online advertising.
Tags : dynamic ads, dynamic creative optimization, dco, interactive ads, dynamic display advertising, interactive marketing, marketing software, web analytics
     JasperLabs
By: Juniper Networks     Published Date: Aug 08, 2017
As the business turns to IT to enhance operational efficiency across the enterprise network—spanning the campus, data center, and branch—no organization can afford for its network to serve as the weak link. This IP Networking Comparison Guide examines four key aspects of the comprehensive enterprise network and looks at key factors within each area. This document will give you a clear perspective on how the various options stack up on the most important features and capabilities necessary to empower innovation.
Tags : 
     Juniper Networks
By: Kaspersky     Published Date: May 20, 2014
Virtualization promises to boost efficiency and cut costs. Whether you’re running applications on physical or virtual machines, you still need to stay vigilant to guard against the constant and growing hazard of malware and other cyberthreats that can put your business at risk. This guide will show you how.
Tags : virtualization, kaspersky, virtualization security, cyberthreat, hackers, phishing, security breach, intrusion prevention
     Kaspersky
By: Kaspersky     Published Date: Jan 07, 2015
Do you know the most common risk factor for corporate cybercrime? Employees. Download Kaspersky Lab’s Top 10 Tips for Educating Employees about Cybersecurity.
Tags : kaspersky, cyberthreats, cyberattacks, hackers, cyber security, identity management, education, breach
     Kaspersky
By: Kaspersky     Published Date: Nov 12, 2014
Download Kaspersky Lab’s latest eBook, Rethinking Security: Fighting Known, Unknown, and Advanced Threats, to learn more about the evolution of cyberthreats that put your business at risk.
Tags : kaspersky, cybersecurity, cyberattack, hackers, it security, data protection
     Kaspersky
By: Kaspersky     Published Date: Jun 15, 2015
Download Kaspersky Lab’s Unlock the Key to Repel Ransomware to learn common ransomware scenarios and delivery mechanisms.
Tags : kaspersky, ransomware, cybercrime, cyberattack, hackers, data leakage, spam, malware
     Kaspersky
By: Kaspersky     Published Date: Aug 27, 2015
Download Debunking the Top 5 Security Implementation Myths to learn why staying with your current, inferior technology costs your business more money in the long run.
Tags : kaspersky, attacks, cyberattacks, business process, security costs, it budget
     Kaspersky
By: Kaspersky     Published Date: Jan 22, 2016
Hardly a day goes by without the discovery of a new cyber threat somewhere in the world! But how do you keep up with new malware and evolving cybercriminal tricks?
Tags : kaspersky, cybercrime, hackers, malware, threat protection
     Kaspersky
By: Kaspersky     Published Date: May 11, 2016
You don't have to be a victim of ransomware. Get the facts you need to protect your company.
Tags : kaspersky, ransomware, encyyption, data access, email security, company security
     Kaspersky
By: Kaspersky     Published Date: May 11, 2016
As a leader in cybercrime analysis, Kaspersky Lab’s GReAT (Global Research and Analysis) team has the answers to your questions in our new eBook, Cybercriminals: Unmasking the Villain, where you can find out such fascinating facts about the cybercrime world.
Tags : kaspersky, cybercrime, cyber attack, ddos, hackers, roi, security breach, firewall
     Kaspersky
By: Kaspersky     Published Date: May 11, 2016
This whitepaper describes the different virtualization security solution options—conventional agent-based; agentless; and Light Agent— as well as possible scenarios for aligning the right security approach to your organization’s virtual environment.
Tags : kaspersky, virtualization security, security management, light agent
     Kaspersky
Start   Previous    4 5 6 7 8 9 10 11 12 13 14 15 16 17 18    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics