RSS feed Get our RSS feed

News by Topic

range

Results 1 - 25 of 653Sort Results By: Published Date | Title | Company Name
By: Dell     Published Date: Aug 24, 2015
This business-oriented white paper summarizes the wide-ranging benefits of the Hadoop platform, highlights common data processing use cases and explores examples of specific use cases in vertical industries.
Tags : dell, big data, hadoop, cloud, data center, cloudera, data warehousing
     Dell
By: Google Apigee     Published Date: Feb 01, 2019
We all use APIs every day. The demands of digital transformation, and the related need for platforms and ecosystems, make it essential to manage APIs throughout their life cycle. We identify the pros and cons of a wide range of API management vendors and offerings, to help you make the right choice.
Tags : 
     Google Apigee
By: Quest     Published Date: Jul 07, 2012
When disaster strikes, don't waste hours and dollars recovering critical data. vRanger delivers blazing-fast speed and granular recovery for your VMware applications and data. Get your free trial today.
Tags : applications, data, delivers, protection, disaster, security, recovery, backup
     Quest
By: Workday     Published Date: Aug 07, 2018
This e-book features 10 must-read articles on the rapidly evolving world of supply chain published by Becker’s Hospital Review. Articles cover a range of topics, from new entrants pushing into healthcare to how new business collaboratives are shaking up conventional distribution models.
Tags : 
     Workday
By: Workday     Published Date: Sep 14, 2018
This e-book features 10 must-read articles on the rapidly evolving world of supply chain published by Becker’s Hospital Review. Articles cover a range of topics, from new entrants pushing into healthcare to how new business collaboratives are shaking up conventional distribution models.
Tags : 
     Workday
By: Workday APAC     Published Date: Jul 30, 2019
This e-book features 10 must-read articles on the rapidly evolving world of supply chain published by Becker’s Hospital Review. Articles cover a range of topics, from new entrants pushing into healthcare to how new business collaboratives are shaking up conventional distribution models.
Tags : 
     Workday APAC
By: 15five     Published Date: Jul 17, 2019
The best practices for managing employees evolves at a break-neck pace. In 2019, the key distinction for performance management strategies is to focus on the whole employee. This ranges from physical, emotional, and mental well-being to facilitating their personal and professional development. To help you gain a deeper understanding of new trends, we assembled this list of top trends to help you create or refine your employee performance management strategy this year, including: • Developing trust with your employees • The value of people analytics • Individualized support • Learning & development • Diversity & inclusion
Tags : 
     15five
By: IBM     Published Date: Nov 14, 2017
Data is the hottest topic in business today. In discussions that range from understanding performance to predicting future outcomes, data is at the core. However, data has a bad reputation. Because businesses have been collecting data for decades, the amount that we must analyze can seem insurmountable. Simply saying “data” is enough to conjure images of someone poring over a thick stack of spreadsheets, manually going through row after row to identify performance, trends and figure out what to do with them. This intimidating view is all too common.
Tags : data, ibm, data insight, data analytics
     IBM
By: Focus VoIP     Published Date: Jan 19, 2011
NEWLY UPDATED: Save time researching business phones with our free Midrange IP Phone Comparison Guide.
Tags : altigen communications, nortel networks, ip phone, cisco systems, shoretel, polycom, avaya, phone system
     Focus VoIP
By: SAP     Published Date: May 18, 2014
This paper explores the results of a survey, fielded in April 2013, of 304 data managers and professionals, conducted by Unisphere Research, a division of Information Today Inc. It revealed a range of practical approaches that organizations of all types and sizes are adopting to manage and capitalize on the big data flowing through their enterprises.
Tags : sap, big data, real time data, in memory technology, data warehousing, analytics, big data analytics, data management
     SAP
By: Cisco     Published Date: Dec 04, 2015
Group video systems primarily serve the need for high-quality video interaction across a range of meeting room sizes.
Tags : video, system, high quality interaction, sip
     Cisco
By: CrowdStrike     Published Date: Feb 01, 2017
This year’s Cyber Intrusion Services Casebook focuses on in-depth digital forensics, incident response (IR) and remediation services performed on behalf of actual CrowdStrike clients. Real-life examples drawn from notable CrowdStrike Services IR engagements in 2016 — including the now-infamous hack of the Democratic National Committee (DNC) —are covered with an emphasis on best practices organizations can follow to identify and eject attackers before a devastating breach occurs. Download this report to learn: • How CrowdStrike’s Falcon OverWatch and professional services teams discovered and attributed the DNC intrusion to nation-state threat actors FANCY BEAR and COZY BEAR • The gaps in security processes and planning that your organization can address now to stop the next breach • The specific tactics, techniques and procedures (TTPs) a range of nation-state and eCrime adversaries used to penetrate their victims’ defenses, and how they attempted to cover their tracks
Tags : 
     CrowdStrike
By: NAVEX Global     Published Date: Oct 18, 2016
In 2016 NAVEX Global partnered with an independent research firm to survey ethics and compliance (E&C) professionals from a wide range of industries about their approach to E&C training.
Tags : 
     NAVEX Global
By: Group M_IBM Q1'18     Published Date: Feb 09, 2018
Organizations are looking to use DXPs as they move from web-centric to more pervasive, multichannel digital experiences. This Magic Quadrant will help those responsible for a range of customer-, employee- and partner-facing initiatives find the most suitable vendor for their needs.
Tags : gartner magic quadrant, gartner, digital experience, dxp, multichannel
     Group M_IBM Q1'18
By: Lookout     Published Date: Mar 28, 2018
Mobile devices have rapidly become ground zero for a wide spectrum of risk that includes malicious targeted attacks on devices and network connections, a range of malware families, non-compliant apps that leak data, and vulnerabilities in device operating systems or apps. Read the four mobile security insights CISOs must know to prepare for a strategic conversation with the CEO and board about reducing mobile risks and the business value associated with fast remediation of mobile security incidents.
Tags : 
     Lookout
By: Oracle     Published Date: Sep 05, 2019
In this guidebook, learn how modern retailers are using integrated hardware and software POS solutions to expand the range of their customer interactions. One thing is certain, hardware and software must work together to readily accommodate new consumer demands.
Tags : 
     Oracle
By: Citrix ShareFile     Published Date: Jul 11, 2017
In recent years, ransomware such as Locky and KeRanger have emerged as a top threat, not just to consumers, but to businesses with high-value data. Read this whitepaper for four best practices to protect yourself from this costly threat, including: Evaluating web browser configuration and virtualization options Protecting mobile devices against attack through containerization Reducing the risks of collaboration through secure EFSS solutions
Tags : ransomware, security, risk reduction, containerization, data security
     Citrix ShareFile
By: Citrix ShareFile     Published Date: Jul 11, 2017
In recent years, ransomware such as Locky and KeRanger have emerged as a top threat, not just to consumers, but to businesses with high-value data. Read this whitepaper for four best practices to protect yourself from this costly threat, including: Evaluating web browser configuration and virtualization options Protecting mobile devices against attack through containerization Reducing the risks of collaboration through secure EFSS solutions
Tags : ransomware, risk reduction, data security, collaboration, containerization
     Citrix ShareFile
By: Oracle     Published Date: Jan 21, 2014
The rise of big data provides Modern Marketers with an unprecedented level of insights. But too often, it's easy to get buried by the data. We put together 40 Must-See Charts for Modern Marketers, offering analysis and intelligence today's marketers need to know across a range of disciplines from email marketing and lead management to social media and events.
Tags : modern marketers, modern marketing, tenants, customer journey, segmentation, lead generation, eloqua, oracle
     Oracle
By: BlackBerry Cylance     Published Date: Mar 12, 2019
A Pathfinder paper navigates decision-makers through the issues surrounding a specific technology or business case, explores the business value of adoption, and recommends the range of considerations and concrete next steps in the decision-making process.
Tags : 
     BlackBerry Cylance
By: Oracle     Published Date: Feb 22, 2019
A Pathfinder paper navigates decision-makers through the issues surrounding a specific technology or business case, explores the business value of adoption, and recommends the range of considerations and concrete next steps in the decision-making process.
Tags : 
     Oracle
By: Mimecast     Published Date: Aug 22, 2017
Regulatory fines for violations of HIPAA in the US, DPA in the UK and GDPR can cost organizations millions of dollars. And providers can’t afford the costs of cyber security incidents which can range from prolonged downtime, not being able to care for patients, to paying a ransom to unencrypt important data. Learn the biggest threats to your organization and how to improve protection against: • Ransomware such as WannaCry and Petya • Malicious URLs that entice users to click • Bad Attachments that can infect your network • Business email compromise that siphons information or cash from your organization • Internal employees and the potential for malicious intent or careless mistakes
Tags : cyberthreat, healthcare, gdpr, ransomware
     Mimecast
By: Payscale, Inc     Published Date: Jun 06, 2013
Learn the five steps to creating a compensation plan in your organization. This guide includes how to perform compensation analysis, and get buy-in from company leadership.
Tags : compensation planning, salary range, salary benchmarking, compensation analysis
     Payscale, Inc
By: Payscale, Inc     Published Date: Jan 16, 2014
Learn the five steps to creating a compensation plan in your organization. This guide includes how to perform compensation analysis, and get buy-in from company leadership.
Tags : compensation planning, salary range, salary benchmarking, compensation analysis
     Payscale, Inc
By: Total Merchant Services     Published Date: Jul 02, 2009
Accepting credit cards at your business, whether online or at your physical location, can be a challenging task.  The Credit Card Processing Industry is highly fragmented, with many companies offering conflicting or a confusing range of services.  This fact filled paper will provide you with a framework to make an informed decision for your payment system including; Equipment Costs, Rates, Types of Processing and Terms of the Agreement.
Tags : total merchant services, payment processing provider, credit cards, payment processing
     Total Merchant Services
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics