hr organization

Results 801 - 825 of 1029Sort Results By: Published Date | Title | Company Name
Published By: IBM     Published Date: May 01, 2017
Today's mobile landscape is very much a moving target. IT managers must keep track of all types of devices and platforms, hundreds if not thousands of applications and a threat landscape that changes by the minute. In this ever-changing environment, IT staff often find themselves drowning in mobile minutiae, overwhelmed by mountains of endpoint data but unable to extract meaning from it or make business decisions based on it. The tactical challenge of keeping infrastructure and business data secure while keeping workers productive each day takes precedence. And even then, IT managers can find themselves choosing between security and productivity as they decide how best to spend limited time and resources. This whitepaper will guide you how to get deep visibility into relevant endpoint data within the platform, granting actionable intelligence that can have a measurable impact on your organization.
Tags : 
it staff, applications, business data, data security, it managers, endpoint data, device, platforms
    
IBM
Published By: IBM     Published Date: Jun 22, 2017
Security threats are very real, and the stakes are higher than ever. Each day, tens of thousands of malware variants are created, with new classes of threats continually added and improved upon. Savvy attackers use polymorphic programs to alter malware into new form factors after each delivery. And all of this is exacerbated by the proliferation of mobile devices, cloud computing and social media—in fact, the intersection of these technologies provides fertile new ground for threats and malware. Today’s attacks are often not random, but targeted for maximum financial gain and impact. Rogue individuals and groups are constantly innovating new ways to attack organizations’ most valuable assets. As a result, traditional methods of dealing with threats are no longer enough. Organizations need more threat intelligence than ever before in order to effectively protect themselves.
Tags : 
cyber security, global threat intelligence, malware prevention, cyber threat, protection
    
IBM
Published By: IBM     Published Date: Oct 19, 2017
In the digital economy, big IT budgets, lots of brick sand mortar and an established market presence are no longer at the foundation of a competitive advantage. What matters now is the agility and speed to ensure that customer centricity is supported as an overriding priority of business operations and decision making. Game-changing ideas are developing and competitive threats are emerging at a rapid and unpredictable pace. The resulting digital disruption is not just occurring at the margins or within isolated pockets of industry and commerce. It’s the new normal and its consequences are far reaching. The essential question for every organization in every sector is simply: Will we be the disruptor or will we allow ourselves to be the disrupted? Staying ahead requires adopting a combination of technology solutions. Key among them is a smart process and decision management system that infuses every process with intelligence in order to continuously raise the bar for customer centricity,
Tags : 
    
IBM
Published By: IBM     Published Date: Oct 19, 2017
In the digital economy, big IT budgets, lots of brick sand mortar and an established market presence are no longer at the foundation of a competitive advantage. What matters now is the agility and speed to ensure that customer centricity is supported as an overriding priority of business operations and decision making. Game-changing ideas are developing and competitive threats are emerging at a rapid and unpredictable pace. The resulting digital disruption is not just occurring at the margins or within isolated pockets of industry and commerce. It’s the new normal and its consequences are far reaching. The essential question for every organization in every sector is simply: Will we be the disruptor or will we allow ourselves to be the disrupted? Staying ahead requires adopting a combination of technology solutions. Key among them is a smart process and decision management system that infuses every process with intelligence in order to continuously raise the bar for customer centrici
Tags : 
    
IBM
Published By: IBM     Published Date: Oct 13, 2017
Integrated Threat Management For Dummies, IBM Security Limited Edition, lays the foundation for effective tools and techniques that work together to help counter today’s advanced threats. Regardless of your role in the IT security organization, threat management tools and techniques will influence your job. Your role determines the part you play to effectively manage threats, including those targeting the cloud and your company’s data. If you are a Chief Information Security Officer (CISO) or security manager, this book explains in detail the types of tools you need to effectively prevent, detect, and respond to security incidents. If you’re in general business management, you’ll better understand the risks associated with enterprise computing and the reasons why a comprehensive portfolio of security tools that work well together is so important.
Tags : 
malware prevention, network intrusion prevention, malware protection, ibm, firewall, mutating malware, cyber threats
    
IBM
Published By: HP Virtualization     Published Date: Mar 22, 2010
This white paper describes how HP LeftHand SANs can help you deploy VMware Infrastructure 3 (VI3) software more effectively through volume snapshots, SmartClone volumes, volume migration, and high-availability features. With HP LeftHand SAN and VI3, organizations can reclaim valuable data center space and reduce their power and cooling requirements.
Tags : 
san, storage area networks, vmware, software, migration
    
HP Virtualization
Published By: SAS     Published Date: Aug 28, 2018
Some organizations focus on the scary aspects of failing to comply with the EU General Data Protection Regulation. But there are many long-term benefits of following through with plans for sustainable GDPR compliance – such as gaining a competitive edge, or developing new products or services. To learn how organizations have approached compliance efforts, SAS conducted a global survey among 183 cross-industry businesspeople involved with GDPR. Based on the results, this e-book delves into the biggest opportunities and challenges faced. Read the e-book to: • Get advice from industry experts. • Find out what steps peers have taken. • Learn how an integrated approach from SAS can continue to guide your journey.
Tags : 
    
SAS
Published By: SAS     Published Date: Oct 03, 2018
Because terrorists and other criminals are already using technology to carry out their missions, intelligence professionals need to access all available, appropriate information, to extract important elements and process, analyze and disseminate it quickly to keep ahead of potential threats. The scale, complexity and changing nature of intelligence data can make it impossible to stay in front without the aid of technology to collect, process and analyze big data. This paper describes a solution for how this information can be quickly and safely shared with access based on a user's organizational responsibilities and need to know.
Tags : 
    
SAS
Published By: SAS     Published Date: Mar 20, 2019
One of the best ways to learn is from your peers. How do they drive innovation? What are their challenges and business problems? And what technology and processes are they using to solve them? We’re all partners in this analytics journey. Sharing our experiences is how we learn, grow and find a better way. In this ebook, you’ll meet fellow CIOs and technology innovators. Through their stories, you’ll see how organizations of all sizes, all over the globe, encounter many of the same daily challenges. Most importantly, you’ll learn how they’re successfully overcoming them.
Tags : 
    
SAS
Published By: SAS     Published Date: Mar 20, 2019
In today’s crowded analytics marketplace, who can you trust? What’s needed to deliver on the promise of transforming data into real value? And what do CIOs need to cost-effectively and successfully lead their organizations through changing technologies? For an organization to experiment with (and ultimately deploy) analytics, the responsibility falls squarely on the shoulders of IT. IT must provide secure access to lots of high-quality data, a friendly environment for experimentation and discovery, and a method for rapidly deploying and governing models. SAS can support an organization's journey toward becoming a data- and analytics-driven organization. We can help unlock the value by enabling with choices that make sense. Plus, we can show organizations how to get the most out of technology investments.
Tags : 
    
SAS
Published By: IBM     Published Date: Apr 17, 2013
Microsoft Exchange Server 2010 provides a powerful environment for users to conduct business through scheduling their time (calendar), managing their relationships (contacts), and communicating inside and outside their organization (e-mail). The IBM Storwize V7000 Unified storage system, combined with powerful management software from IBM Tivoli, provides an ideal complement to Exchange 2010 deployments by providing a highly virtualized storage infrastructure designed to meet the specific needs of Exchange 2010 environments.
Tags : 
ibm, microsoft exchange server, powerful, environment, storage, virtualized, infrastructure, organization
    
IBM
Published By: Esker     Published Date: Dec 19, 2016
In today’s highly competitive business environment, many organizations are expanding through mergers and acquisitions (M&As). Unfortunately, success comes at a cost. Growth via M&A activity often involves absorbing disparate ERP applications, which, over time, can create significant inefficiencies — particularly in the accounts payable (AP) department. The good news is, AP automation is emerging as an end-to-end solution that forward-thinking organizations can use to eliminate AP-related silos and maximize their market potential. Businesses with a complex ERP environment have several choices when it comes to AP automation solutions. This white paper is intended to assist AP and finance leaders, along with ERP system administrators, in evaluating their options, simplifying the decision-making process, and getting the absolute most out of their AP automation investment.
Tags : 
    
Esker
Published By: BlackBerry     Published Date: Mar 12, 2013
Leverage your investment in BlackBerry® solutions. Through to December 31, 2013, organizations purchasing BlackBerry® 10 smartphones can trade up their existing BlackBerry Enterprise Server licenses one-for-one – free.
Tags : 
blackberry enterprise, server license trade up program, license, trade up, smartphones
    
BlackBerry
Published By: IBM     Published Date: Oct 10, 2013
Will your disaster recovery plan work when the time comes? It's a hard determination for any organization to make. But in IBM's experience, the answer is often "no." Disaster recovery plans often fail because organization have based their recovery strategies on outdated assumptions. Read this white paper to learn seven common misconceptions about disaster recovery. You'll also discover how new technologies can help modernize disaster recovery efforts.
Tags : 
avoid pitfalls, business pitfalls, disaster recovery, recovery plans, business recovery, evolving business, business expectations, business threats
    
IBM
Published By: Oracle     Published Date: Nov 13, 2013
Two dominant trends are potentially reshaping the role of the HR function in the corporate world. The first relates to the rapid growth of the knowledge economy. In this environment, a committed, appropriately skilled and prudently deployed workforce is critical in order to develop new products and outstrip the competition. Second, many administrative functions that were formerly handled by HR departments, such as payroll and pensions, have now been farmed out to third parties. Indeed, research reveals that more than two-thirds of companies outsource a portion of their HR functions. This report by the Economist Intelligence Unit investigates whether the HR function is forging a close and robust relationship with the CEO. It also explores the nature of these working relationships, how they have been affected by the economic downturn and how they vary across industries and regions.
Tags : 
zenithoptimedia, oracle, ceo perspectives, hr department drives growth, economist intelligence unit, ibm, hr and organizational strategy, strategic influence of hr
    
Oracle
Published By: Oracle     Published Date: Nov 13, 2013
Being responsible for one-third of a business’ success already puts HR in a critical role. But it’s not just about finding the best people—it’s about finding the best people, at the lowest cost, with the lowest possible attrition and the best possible performance. And it’s about guiding your executive team to the right decisions using the language they understand best: numbers. Talent management—covering everything from recruiting and compensation to ongoing education and retention—has traditionally been managed in silos, with a series of disparate systems and disconnected processes and reports. In today’s data-driven world, CEOs demand more. This new study conducted by HR.com explores what’s working for organizations today and the biggest gaps to fill.
Tags : 
zenithoptimedia, oracle, successful hr leadership, talent management, core business strategy, human resources, transactional to strategic, financial decisions
    
Oracle
Published By: IBM     Published Date: Feb 05, 2014
This Analyst Insight will look at how leading organizations are influencing average order value, customer conversion, and customer satisfaction through the integration of site search with precision marketing and product content management. Besides examining the key drivers and pain points organizations are facing in relation to their search strategy, this report will look at the key differentiating strategies, capabilities, and technologies that are driving success in the digital era.
Tags : 
ibm, aberdeen group, merchandising, ecommerce, content management, marketing, order value, customer conversion
    
IBM
Published By: Cisco     Published Date: Jul 09, 2015
You have three choices for using Cisco® Unified Communications and Collaboration applications: on-premises, in the cloud, or a hybrid of the two. The option that is best for your company depends on your IT skills, budget priorities, growth plans, and customization requirements. This guide, intended for organizations with 100 to 1000 employees, will help you compare the options.
Tags : 
cloud computing, communications, productivity, applications, efficiency
    
Cisco
Published By: Cisco     Published Date: Jul 10, 2015
Today’s multivector and persistent threats, fluid IT environments, and increasing user mobility are prompting more organizations to seek NGFW capability that provides affordable and effective layered threat protection.
Tags : 
security, ngfw, firewall, threat detection, technology, smd, midisized
    
Cisco
Published By: Cisco     Published Date: Dec 21, 2016
You have three choices for using Cisco® Unified Communications and Collaboration applications: on-premises, in the cloud, or a hybrid of the two. The option that is best for your company depends on your IT skills, budget priorities, growth plans, and customization requirements. This guide, intended for organizations with 100 to 1000 employees, will help you compare the options
Tags : 
    
Cisco
Published By: Cisco     Published Date: Dec 21, 2016
Nemertes Business Value Analysis independently evaluates technology products and services to identify the value to enterprise organizations. Through detailed interviews with technology professionals who use the products or services, Nemertes analyzes and quantifies the real-world benefits and improvements to the efficiency of their organizations.
Tags : 
    
Cisco
Published By: Cisco     Published Date: Dec 21, 2016
What are the key elements of a collaboration framework that can help IT decision makers (ITDMs) and business decision makers (BDMs) come to a mutual understanding of how, where and why to use videoenabled collaboration solutions, in particular, F2F video? To answer this question, Techaisle conducted a survey of 1,269 ITDMs and BDMs with SMBs and midmarket businesses, across the US, Latin America, Europe, and Asia Pacific. The survey was commissioned by Cisco. The survey findings provide guidance to SMBs and midmarket decision makers on how the nature of the collaboration discussion is changing, drive acceptance and use of F2F video throughout their organization to maximize business payback, and align objectives with the outcomes that shape the activities of highgrowth innovative firms who are the most successful users of advanced collaboration technology.
Tags : 
    
Cisco
Published By: Cisco     Published Date: Dec 21, 2016
Cisco commissioned Forrester Consulting to conduct a Total Economic Impact™ (TEI) study and examine the potential return on investment (ROI) enterprises may realize by deploying the Cisco Data Virtualization solution. The purpose of this study is to provide readers with a framework to evaluate the potential financial impact of investing in the Cisco Data Virtualization solution for their organizations. To better understand the benefits, costs, and risks associated with Cisco Data Virtualization, Forrester gathered data through interviews with customers who had multiple years’ experience using the solution. All organizations used Cisco Data Virtualization as a single data virtualization integration platform to query and access data across their network. This includes accessing data that resides on the cloud and on-premises across various sources and systems.
Tags : 
    
Cisco
Published By: HP Enterprise Services     Published Date: Mar 20, 2014
Learn the three basic elements for risk assessment and see how an understanding of these elements will allow you to better understand risk in your organization.
Tags : 
data breaches, protection, prevent data breaches, avoid costs, risk prevention, risk
    
HP Enterprise Services
Published By: Epicor     Published Date: Mar 19, 2015
As we move through 2015, the subject of the future of the supply chain has come back into focus. There are three main trends and technologies that will continue to have an enormous impact on the supply chain: • Dynamic networking and connectivity • Mobility in manufacturing • Modern collaboration Explore this whitepaper to learn how manufacturers are tackling these three critical areas, and how you can prepare your organization for the future of the manufacturing supply chain.
Tags : 
manufacturing supply chain, supply chain characteristics, collaboration, mobile, it management, enterprise applications
    
Epicor
Start   Previous    26 27 28 29 30 31 32 33 34 35 36 37 38 39 40    Next    End
Search      
Already a subscriber? Log in here
Please note you must now log in with your email address and password.