change

Results 76 - 100 of 2915Sort Results By: Published Date | Title | Company Name
Published By: ADP     Published Date: May 31, 2017
When it comes to the ways we work and the dynamics of the workplace setting, one thing is certain — the times are changing. As discovered in ADP Research Institute’s® (ADP RI) 2016 Evolution of Work, changes are already affecting the way we work. In this white paper, we consider how HR is handling these changes.
Tags : 
    
ADP
Published By: ADP     Published Date: Jun 09, 2017
If you’re reading this guide and considering investing in a new payroll system – or even just thinking about thinking about a change – you’re doing it for a reason.
Tags : 
payroll, solution, guide, adp
    
ADP
Published By: ADP     Published Date: Nov 16, 2017
People are the most important part of your organization. Understanding what they do, how they do it, and even why they do it, provides invaluable insights for optimizing your processes, department, or entire organization. And as a business leader, in many ways you’ve never had it so good. There’s more people data available than ever before, and you’ve got the opportunity to put it to work through data-driven initiatives like changes to workforce demographics, employee retention, or benefits allocations. And most important, you have a chance to fuel business decision-making with smart workforce insights. Once you’ve learned how to turn your people data into real business value, you’ll create more visibility within your business, and everyone will see that the rewards of HR analytics are worth the effort. It’s time to take the opportunity to prove the value of data-driven HR. No more darkness. Otherwise, the only journey ahead is into some challenging pitfalls. We’ve identified five of t
Tags : 
    
ADP
Published By: Aflac     Published Date: Feb 15, 2013
Is your business prepared for important health care decisions in 2013? Navigate health care reform with Aflac’s Health Care Essentials.
Tags : 
health care reform, employer-sponsored health insurance, benefits, workforce, affordable care act, aca, ppaca, obama care
    
Aflac
Published By: Akamai Technologies     Published Date: Sep 12, 2017
In his time as Director of E-Commerce at Linen Chest, Riaz Faride was faced with a challenge right out of the gate. He found himself responsible for a site that had page load times ranging anywhere from 6 to 30 seconds. Linen Chest’s site was heavy, images were hosted on the origin, and code was never refactored and needed to be optimized. Riaz knew he needed to make some changes, and fast.
Tags : 
case study, linen chest, image hosting, image optimization
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Sep 12, 2017
Online images used to be simple. In the past, they weren’t the focal point of a page — there were only a handful of images on a given page and all users were viewing online images on a desktop with dial-up. That has all changed. Today’s web pages are dynamic, filled with images and viewed by end users on different devices with varying connectivity. As audience expectations for rich web experiences have grown, so has the requirement to deliver increasingly image-heavy web applications. The problem? The cost and complexity of creating, storing, and delivering web images tailored for every device poses a significant challenge for businesses, but failing to address the increasing diversity across devices and networks will lead to a poor and inconsistent user experience. Current solutions don’t solve this problem completely.
Tags : 
cloud image management, online images, web applications, devices, web experience
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Apr 13, 2018
Cyber attackers are targeting the application programming interfaces (APIs) used by businesses to share data with customers. Consumer mobile adoption, electronic goods and services, and high volumes of data have led businesses to use APIs for data exchange. Unfortunately, attackers can also use APIs to access or deny service to valuable data and systems. This white paper explores strategies for protecting APIs. You’ll learn about APIs, how and why these endpoints are targets for web application attacks, security models, and how Akamai can help.
Tags : 
api, security, interface, businesses, data, mobile, adoption
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Apr 25, 2018
Cyber attackers are targeting the application programming interfaces (APIs) used by businesses to share data with customers. Consumer mobile adoption, electronic goods and services, and high volumes of data have led businesses to use APIs for data exchange. Unfortunately, attackers can also use APIs to access or deny service to valuable data and systems. This white paper explores strategies for protecting APIs. You’ll learn about APIs, how and why these endpoints are targets for web application attacks, security models, and how Akamai can help.
Tags : 
api, security, interface, businesses, data, mobile, adoption
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Apr 25, 2018
Cyber attackers are targeting the application programming interfaces (APIs) used by businesses to share data with customers. Consumer mobile adoption, electronic goods and services, and high volumes of data have led businesses to use APIs for data exchange. Unfortunately, attackers can also use APIs to access or deny service to valuable data and systems. This white paper explores strategies for protecting APIs. You’ll learn about APIs, how and why these endpoints are targets for web application attacks, security models, and how Akamai can help.
Tags : 
api, security, interface, businesses, data, mobile, adoption
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Apr 25, 2018
Cyber attackers are targeting the application programming interfaces (APIs) used by businesses to share data with customers. Consumer mobile adoption, electronic goods and services, and high volumes of data have led businesses to use APIs for data exchange. Unfortunately, attackers can also use APIs to access or deny service to valuable data and systems. This white paper explores strategies for protecting APIs. You’ll learn about APIs, how and why these endpoints are targets for web application attacks, security models, and how Akamai can help.
Tags : 
api, security, interface, businesses, data, mobile, adoption
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Apr 25, 2018
Cyber attackers are targeting the application programming interfaces (APIs) used by businesses to share data with customers. Consumer mobile adoption, electronic goods and services, and high volumes of data have led businesses to use APIs for data exchange. Unfortunately, attackers can also use APIs to access or deny service to valuable data and systems. This white paper explores strategies for protecting APIs. You’ll learn about APIs, how and why these endpoints are targets for web application attacks, security models, and how Akamai can help.
Tags : 
api, security, interface, businesses, data, mobile, adoption
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: May 07, 2018
We are pleased to present the Cost of Web Application and Denial of Service Attacks, sponsored by Akamai Technologies. The purpose of this research is to understand changes in the cost and consequences of web application and denial of service attacks since the study was first conducted in 2015. For this study, Ponemon Institute surveyed 621 individuals in IT operations, IT security, IT compliance or data center administration.
Tags : 
web, application, attacks, security, akamai, technology
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Jun 14, 2018
IT complexity has rapidly grown with more applications, users, and infrastructure needed to service the enterprise. Traditional remote access models weren’t built for business models of today and are unable to keep up with the pace of change. Read this paper to understand how remote access can be redefined to remove the complexity, meet end-user expectation and mitigate network security risks.
Tags : 
security, multi-factor authentication, network security risks
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Jun 14, 2018
"Traditional remote access technologies—like VPNs, proxies, and remote desktops—provide access in much the same way they did 20 years ago. However, new and growing business realities—like a growing mobile and distributed workforce—are forcing enterprises to take a different approach to address the complexity and security challenges that traditional access technologies present. Read 5 Reasons Enterprises Need a New Access Model to learn about the fundamental changes enterprises need to make when providing access to their private applications."
Tags : 
vpn, proxies, security, security breach, technology
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Jun 14, 2018
"High-profile cyber attacks seem to occur almost daily in recent years. Clearly security threats are persistent and growing. While many organizations have adopted a defense-in-depth strategy — utilizing anti-virus protection, firewalls, intruder prevention systems, sandboxing, and secure web gateways — most IT departments still fail to explicitly protect the Domain Name System (DNS). This oversight leaves a massive gap in network defenses. But this infrastructure doesn’t have to be a vulnerability. Solutions that protect recursive DNS (rDNS) can serve as a simple and effective security control point for end users and devices on your network. Read this white paper to learn more about how rDNS is putting your enterprise at risk, why you need a security checkpoint at this infrastructural layer, how rDNS security solutio Read 5 Reasons Enterprises Need a New Access Model to learn about the fundamental changes enterprises need to make when providing access to their private applications.
Tags : 
rdns, dns, anti-virus, security, network defense
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Oct 02, 2018
The Summer 2018 security report is about change: what’s new and unusual in DDoS attacks, where are the surprising data patterns, and how should enterprises and security professionals prepare for the unexpected. Looking back at November 2017 to April 2018, as well as year-over-year changes, Akamai analysts identified data trends that spotlight the new and unfamiliar. The Summer 2018 State of the Internet / Security: Web Attacks report covers atypical attack methods, credential abuse attacks and law enforcement prosecution of DDoS-for-hire platforms. Guest writer Rik Ferguson also explores future threat scenarios. Finally, the Integrate SID for your records (and in case you need it) for this program is: 0E9175. Anything else you need to hit the ground running with this program?
Tags : 
internet, web, attacks, technology, ddos
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Dec 11, 2018
IT complexity has rapidly grown with more applications, users, and infrastructure needed to service the enterprise. Traditional remote access models weren’t built for business models of today and are unable to keep up with the pace of change. Read this paper to understand how remote access can be redefined to remove the complexity, meet end-user expectation and mitigate network security risks.
Tags : 
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Sep 10, 2019
Contemporary internet threats are sophisticated and adaptable, they continuously change their complexion to evade security defenses. Traditional rigid, deterministic, rule-based security research are becoming less effective. Security research approaches employing data science methods to implement anomalies-based analysis across very large volumes of anonymized data are now essential. This paper will: • Briefly cover security research challenges in today’s threat landscape • Explain why DNS resolution data is a rich resource for security research • Describe how Akamai teams use DNS data and data science to create better threat intelligence • Discuss improvements in threat coverage, accuracy, and responsiveness to today’s agile threats
Tags : 
    
Akamai Technologies
Published By: Alacritech     Published Date: Aug 21, 2009
Growth challenges in Microsoft Exchange environments can be solved with the deployment of iSCSI storage. Microsoft favors block storage such as iSCSI for Exchange deployments. Attaching iSCSI storage to a network provides the server with headroom for adding Exchange users, since the storage can grow without being restrained by the server's ability to add storage.
Tags : 
microsoft exchange, iscsi, iscsi storage, storage, windows server, windows exchange server, alacritech
    
Alacritech
Published By: Alacritech     Published Date: Aug 21, 2009
As IT costs grow, budgets shrink, and demand soars, there is an immediate need to extend and/or consolidate existing server assets. Many IT departments are currently faced with reduced capital budgets as well as decreased staffing levels for NAS Systems.
Tags : 
configuration, windows, change management, it spending, alacritech
    
Alacritech
Published By: Aldon     Published Date: Jan 13, 2009
Learn what this regulation expects of IT and how to avoid the risk of expensive fines.
Tags : 
aldon, sox, sarbanes-oxley act compliance, sox responsibilities, automated change management
    
Aldon
Published By: Aldon     Published Date: Jan 13, 2009
Cut development costs and speed time-to-market with change management.
Tags : 
aldon, software configuration management, scm, effective change management, version control
    
Aldon
Published By: ALE     Published Date: Dec 05, 2018
The Healthcare industry has undergone several changes of late. Hospitals have had to adapt their approach to how they use technology because of four key themes: 1.) IoT 2.) Mobility 3.) Digital Health 4.) Security To find out more download this infographic today!
Tags : 
    
ALE
Published By: Alere Wellbeing     Published Date: Sep 26, 2011
Offering incentives for tobacco cessation can promote positive behavior change, positively impact your bottom line, and improve employee relations, provided you implement an approach that includes a comprehensive cessation program supported by a positive environment.
Tags : 
alere wellbeing, human resources
    
Alere Wellbeing
Published By: Alere Wellbeing     Published Date: Sep 29, 2011
Offering incentives for tobacco cessation can promote positive behavior change, positively impact your bottom line, and improve employee relations, provided you implement an approach that includes a comprehensive cessation program supported by a positive environment.
Tags : 
human resources, tocacco cessation, employee relations, positive environment, alere wellbeing, roi
    
Alere Wellbeing
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      
Already a subscriber? Log in here
Please note you must now log in with your email address and password.