RSS feed Get our RSS feed

News by Topic

hr issues

Results 51 - 75 of 111Sort Results By: Published Date | Title | Company Name
By: ADP     Published Date: Aug 28, 2017
If you spend a lot of time on administrative tasks, compliance and HR issues, you may benefit from a Professional Employer Organization.
Tags : 
     ADP
By: AdRoll     Published Date: Jul 11, 2017
The sums spent on digital advertising are so vast; any inefficiencies become costly disadvantages. Attribution models identify such waste, but too many marketers struggle to understand the opportunities of attribution. And even if marketers want better attribution, getting budget support and C-suite approval can prove daunting. This guide addresses three issues to help marketers implement better attribution: ? What attribution models are available and which is the right one for my brand? ? Whom will I need to work with and how can I get buy-in? ? How do I build a business case for attribution?
Tags : attribution, digital advertising, marketing, advertising efficiency
     AdRoll
By: Teradata     Published Date: May 02, 2017
To understand the challenges and opportunities with the Internet of Things, MIT Sloan Management Review’s 2016 Global Executive Study conducted a comprehensive study with business executives, managers, and IT professionals globally. Through the survey results and interviews with subject matter and industry experts, MIT Sloan Management Review was able to reveal the business value and competitive issues from the Internet of Things (IoT). This comprehensive report dives into data sharing with competitors, analytic talent management, and the intersection with governing the data. Analytics is unsurprisingly is shown as the key to IoT success.
Tags : data, sharing, analytics, iot, mit
     Teradata
By: IBM     Published Date: May 01, 2017
If you function like most IT organizations, you've spent the past few years relying on mobile device management (MDM), enterprise mobility management (EMM) and client management tools to get the most out of your enterprise endpoints while limiting the onset of threats you may encounter. In peeling back the onion, you'll find little difference between these conventional tools and strategies in comparison to those that Chief Information Officers (CIOs) and Chief Information Security Officers (CISOs) have employed since the dawn of the modern computing era. Their use has simply become more: Time consuming, with IT trudging through mountains of endpoint data; Inefficient, with limited resources and limitless issues to sort through for opportunities and threats; and Costly, with point solution investments required to address gaps in OS support across available tools. Download this whitepaper to learn how to take advantage of the insights afforded by big data and analytics thereby usher i
Tags : ibm, endpoint management, mobile device management, enterprise mobility, os support, it organizations
     IBM
By: Dell EMC     Published Date: Apr 18, 2017
A Pathfinder paper navigates decision-makers through the issues surrounding a specific technology or business case, explores the business value of adoption, and recommends the range of considerations and concrete next steps in the decision-making process.
Tags : hci, hyperconverged infrastructure, storage, hybrid
     Dell EMC
By: Lookout     Published Date: Mar 29, 2017
When it comes to enterprise mobility, both iOS and Android suffer from major security vulnerabilities and are at risk of malicious threats and malware attacks. Read the Lookout’s review of today’s most prevalent issues, including OS, app, and jailbreak threats.
Tags : risks, mobile technology, enterprise, ios, android, lookout
     Lookout
By: Extreme Networks     Published Date: Feb 23, 2017
ABI Research’s Securing Medical Devices Technology Analysis Report analyzes the current risks posed by medical devices, noting various security issues, potential vulnerabilities, and the threat landscape. It reviews implementation mechanisms and efforts in medical device cybersecurity and safety. The final section looks at how the healthcare ecosystem is responding to the issues and the vendors driving change.
Tags : abi. healthcare, cybersecurity, medical
     Extreme Networks
By: Microsoft     Published Date: Oct 07, 2016
Security was once largely limited to the confines of an on-premises world, but now it must extend to the cloud, as well as a myriad of mobile devices. Employees and companies now expect increasingly complex interactions with devices, apps, data, and even other users. As many companies struggle to keep up with traditional single-point solutions, and limited budgets, this pressure is creating security blind spots for IT. In a world of evolving threats, it is becoming increasingly impossible to address all of these issues with an on-premises solution.
Tags : technology, best practices, data, enterprise, business analytics, business intelligence, business management
     Microsoft
By: Microsoft     Published Date: Oct 04, 2016
Security was once largely limited to the confines of an on-premises world, but now it must extend to the cloud, as well as a myriad of mobile devices. Employees and companies now expect increasingly complex interactions with devices, apps, data, and even other users. As many companies struggle to keep up with traditional single-point solutions, and limited budgets, this pressure is creating security blind spots for IT. In a world of evolving threats, it is becoming increasingly impossible to address all of these issues with an on-premises solution. What is needed is a holistic approach to identity-driven security—one that leverages a cloud-scale intelligent security graph to help you protect your business. In this vision whitepaper, we look into some of the challenges facing IT in the modern world and examine the possible solutions.
Tags : 
     Microsoft
By: Akamai Technologies     Published Date: Sep 27, 2016
Learn about the origins, tactics, types, and targets of cyber- attacks and emerging threats and trends from post-attack analysis and intelligence by cybersecurity and DDoS mitigation experts. Includes quarter-over-quarter and year-over-year trends, plus spotlights on recent DDoS and web application attacks and review of the past quarter’s hot-topic issues in cybersecurity.
Tags : akamai, state of the internet, security, security report, cybersecurity, ddos, analytics
     Akamai Technologies
By: FICO     Published Date: Sep 02, 2016
Download this white paper to learn more about these three keys to successful deposit pricing management: Reacting quickly in a dynamic rate environment Being prepared for new regulatory issues Achieving a pricing process
Tags : 
     FICO
By: AVI-SPL     Published Date: Sep 01, 2016
There are a few factors that are influencing the complexity of enterprise collaboration. In this tech brief, we’ll examine three issues that often surface when we work with IT teams on a Collaboration Program Assessment.
Tags : collaboration, enterprise collaboration, video conferencing, video meetings, video
     AVI-SPL
By: IBM     Published Date: Jul 07, 2016
Join IBM Mobile Analytics expert, Michael Darden, to see how the analytics capabilities of IBM MobileFirst Platform can enable you to answer three critical questions about your apps and then take immediate action to correct any value-draining issues … faster than your clients can take matters into their own hands.
Tags : ibm, mobile, mobile applications, app development
     IBM
By: Microsoft     Published Date: Jul 07, 2016
Enable, protect, and manage mobile productivity Protecting email and other corporate data on mobile devices—without bogging down workers—is one of today’s biggest challenges faced by IT pros today. With the massive, global proliferation of mobile devices, it can be a struggle to manage and secure these devices and your data, both on approved enterprise applications and shadow IT. Download this free e-book to learn how to control the uncontrollable and create a solution that: • Enables continuous management, so your employees are more productive. • Offers threat protection, so you can detect abnormal user behavior, suspicious activities, known malicious attacks, and security issues right away. • Guards against data leakage. • Provides security after loss or theft of mobile devices. • Helps protect your Microsoft Office email, files, and apps.
Tags : mobile devices, enterprise, best practices, management
     Microsoft
By: Oracle Service Cloud     Published Date: Mar 23, 2016
In 2015, mobile devices are becoming ubiquitous with daily life. This connection has made its way from the consumer world to the B2B world. But this is not only the case for that outside sales person or the execuitve who is on the plane next to you speaking with investors. Three-fourths of organizations in Aberdeen reseach have a mobile initiative in place specific to field service, with nearly two-thirs having that program in place for more than two years. But what does a mobile initiative mean? Is it enough to roll out the latest mobile devices for the field team? Is there a difference between a device with some bells and whistles, or toll that empowers the field with access to the insights needed to solve customer issues in real time?
Tags : aberdeen, oracle, service cloud, mobile
     Oracle Service Cloud
By: ArborNetworks     Published Date: Feb 12, 2016
Ask any cybersecurity professional and she’ll tell you that her job is getting increasingly difficult. Why? Most will point to a combination of the dangerous threat landscape, IT complexity, and their overwhelming workload. These issues are driving a major transition in enterprise security. Large organizations must move beyond a threat prevention mentality to become proactive cyber-¬-attack “hunters” that constantly monitor their networks for signs of trouble. This shift to proactive hunting will require new technologies that collect, process, and analyze massive amounts of security data, offer intelligent security analytics for real-¬-time incident detection, integrate threat intelligence to align suspicious internal activities with external threats, and provide analysts with the right data analytics features to query and manipulate data for historical investigations.
Tags : arbor networks, enterprise, cyber attack, network, data, security
     ArborNetworks
By: Intacct Corporation     Published Date: Jan 26, 2016
Download the white paper, “Developing P&L Reports to Improve Visibility” and learn how to improve: • Insight into organizational performance through a reliable and actionable P&L statement • Visibility into operational, competitive or strategic issues • Data integrity with a single source of truth for profit and loss information
Tags : 
     Intacct Corporation
By: HPE     Published Date: Dec 23, 2015
Small and midsized businesses (SMBs) face many challenges as they adapt to today’s new style of doing business. Shifting government regulations, threats to network security, requirements for 24x7 application availability and the demands for new methods to work with customers, suppliers and employees require ongoing investments in IT. These issues impact SMBs even harder because of budget constraints and limited IT resources. SMB’s who learn how to efficiently utilize IT assets and increase IT productivity will be successful.
Tags : 
     HPE
By: Workforce Software     Published Date: Nov 23, 2015
In order to see the most benefit, organizations must lead with workforce management and they must do so with an eye toward three key issues: Ease-of-use and user adoption Specialization versus standardization Business alignment This paper will explore all three of these areas, and how organizations are leveraging the deep capabilities of modern workforce management technology as the first step of their HCM transformation.
Tags : workforce management technology, business alignment, workforce management software
     Workforce Software
By: athenahealth     Published Date: Jun 08, 2015
No matter how these issues are resolved, the new health care reality demands that providers deliver quality care while controlling costs. Use these six steps to bring success to your organization in the new reimbursement landscape: 1. Understand Your Costs 2. Reduce Out-Migration from Your Network 3. Maximize Pay-for-Performance Reimbursement 4. Identify Early Opportunities for Utilization Reductions 5. Support Chronic Care and Disease Management 6. Predict Who Will Develop Issues
Tags : aco, accountable care organization, out-migration, pay-for-performance reimbursement
     athenahealth
By: Workforce Software     Published Date: May 26, 2015
Inform your HR and labor practices with this list of issues to watch, compiled and analyzed by WorkForce Software’s Director of Compliance. Honing in on U.S. wage, hour, and absence regulations, this paper runs the gamut of compliance factors, including: • Legislative developments • Key court decisions • Enforcement actions • Common employer mistakes • Emerging trends
Tags : labor practices, hr practices, compliance, compliance update
     Workforce Software
By: Tripp Lite     Published Date: Mar 02, 2015
VoIP is rapidly becoming the standard for voice communications in business, government, education, government and healthcare. It offers capabilities that far exceed traditional phone systems, with unified communication platforms promising to integrate messaging, mobility, collaboration, relationship management, teleconferencing and other advanced features. The transition to VoIP presents a number of challenges like the need to install new equipment in the MDF and the IDFs dispersed throughout your organization's network/telecom wiring closets. Typical closet designs can't handle the increased wattage and heat output of the PoE switches used to power IP phones. In this white paper you'll learn: • The basics of VoIP migration and implementation • What issues to consider when upgrading network/telecom wiring closets for VoIP • What cost-effective solutions are available to power and protect a VoIP network wiring closet
Tags : voice traffic, teleconferencing, messaging, mobility, network, platforms, communication, voip
     Tripp Lite
By: Box     Published Date: Feb 13, 2015
Many CISOs admit to trepidation about the state of cybersecurity within their organizations. Why? Aside from the increasingly dangerous threat landscape, many large organizations face other security challenges, including personnel shortages, an overwhelming number of manual processes, and technology complexity. Beyond these issues however, CISOs also face the progressively difficult responsibility of securing the distributed enterprise. Aside from PCs, departmental file servers, and remote office equipment, the distributed enterprise now includes recent IT additions like mobile computing, SaaS applications, and hybrid cloud infrastructure. In aggregate, this increasingly distributed infrastructure makes information security more cumbersome.
Tags : ciso, cybersecurity, esg, it/security, it architecture
     Box
By: McAfee     Published Date: Dec 04, 2014
The attacks continue. The breaches occur. Penalties are assessed. While most universities manage to keep pace with the latest digital trends, they have been far less timely when it comes defending their networks and sensitive data against the latest targeted attacks and threats. This lack of protection is evident as recent headlines expose costly data breaches of student records and research, state and federal compliance violations, and a raft of other privacy and security issues that put students, alumni, staff, and the institutions themselves at considerable risk.
Tags : mcafee, security crisis, higher education, breaches, digital trend, privacy, security issues, sensitive data
     McAfee
By: McAfee     Published Date: Oct 28, 2014
For SIEM to help usher in more effective security and risk management strategies—particularly related to threat mitigation, embracing trends, and aligning with business priorities—these five business issues must be addressed. McAfee spoke with SIEM users and this brief lists those top issues along with corresponding customer case studies and use cases.
Tags : big security data, situational awareness, real-time context, management ease, integrated security, siem, mcafee, risk management strategies
     McAfee
Start   Previous    1 2 3 4 5    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics