age

Results 151 - 175 of 21373Sort Results By: Published Date | Title | Company Name
By: BI WORLDWIDE     Published Date: Dec 22, 2014
Everyone likes to be noticed. Recognition and rewards help people feel good about what they are doing and things they have accomplished. Recognizing employees will keep them focused, directed and willing to repeat the behaviors they were recognized for. Learn 10 reasons why recognizing your employees really works.
Tags : employee engagement, employee recognition, social recognition, mobile recognition, employee awards, employer engagement, incentive programs, employee incentives, reward ideas, recognition programs, recognition gifts, employee programs, recognition ideas, employee motivation, recognition program ideas
     BI WORLDWIDE
By: DocuSign     Published Date: Aug 09, 2016
This white paper explains why DocuSign is the number one eSignature service.
Tags : docusign, digital, digital transaction management, papeless, paper cost
     DocuSign
By: CDW     Published Date: Dec 23, 2014
Learn the 10 reasons why the server you choose matters and how to take advantage of a decade’s worth of technology advances in order to keep up with today’s most successful businesses.
Tags : cdw, data, windows, server, infrastructure, technology, operations, compatibility, integration, security, speed, migration, decision
     CDW
By: Riverbed     Published Date: Jan 28, 2014
Riverbed Cascade provides enterprise-wide network and application visibility with a full set of application-centric, site-centric, and business-centric views. While Cascade can coexist or integrate with a variety of other IT management solutions, it will likely become your first line of defense against application performance problems.
Tags : application performance management, application performance monitoring, big data apm, network performance management, network performance monitoring, network performance troubleshooting, networking, it management, enterprise applications
     Riverbed
By: Riverbed     Published Date: Apr 03, 2014
Learn how RiverbedŽ CascadeŽ gives you actionable information for network analysis and optimization, application performance management, acceleration of IT consolidation projects, and security compliance.
Tags : riverbed, applications, apm, compliance, security compliance, network infrastructure, networking, wan optimization, cloud, cloud computing
     Riverbed
By: Aerohive Networks     Published Date: May 27, 2014
Learn about the 10 requirements needed for optimizing your network for mobility and see the potential issues IT faces in a mobile-first enterprise and the advantages of framing the problems properly for long-term success and effectiveness.
Tags : aerohive, wi-fi, wlan, wireless lan, 802.11ac, gigabit speed wi-fi, cloud, byod, mobile device management, mdm, mobility, access point, aps, controllers, wireless, pos, cloud managed, guest access, it management
     Aerohive Networks
By: Coupa Software     Published Date: Sep 19, 2012
Strengthen your business from the inside out by taking control of operational expenditures. Download this white paper now and learn the secret strategies to staying recession-proof.
Tags : spending, inventory management, financial stability, business solutions
     Coupa Software
By: StepByStepMarketing.com     Published Date: Jun 06, 2011
In 10 Secrets for Successful Customer Relationship Marketing you'll discover how can you build an emotional bond with your customers in a real, personal, and meaningful way.
Tags : client relationship management, customer relationship building, customer relationship management, relationship marketing
     StepByStepMarketing.com
By: Nuesoft     Published Date: Jan 30, 2013
Download this whitepaper to view 10 simple steps to ensure you find the perfect practice management system that's right for your office.
Tags : practice, management system, solution, priorities, integrated practice
     Nuesoft
By: Mimecast     Published Date: Nov 28, 2017
With the pending EU General Data Protection Regulation (GDPR), your organization must consider a wide variety of changes for compliance if you hold EU resident data. Your organization should look at GDPR as an opportunity to modernize storage, compliance and security needs. But what services should be considered? Download to learn more including: • How the right providers can help you build a business case for GDPR compliance • Ways providers can directly aid in the compliance process • Why the right tools can help with not just technology but process changes as well
Tags : software provider, cloud service provider, gdpr
     Mimecast
By: TrendKite     Published Date: Apr 25, 2018
This informative whitepaper that will help shape your PR decision making. Stats include: 43% of web traffic is driven by search engines 7 in 10 executives reported being more inclined to do business through organizations that are thought leaders Influencer campaigns did not exist 5 years ago...now brands swear by them Download now to learn more!
Tags : pr strategy, marketing, digital age
     TrendKite
By: Skillsoft     Published Date: Jun 25, 2015
This paper takes you step-by-step through the process of addressing your immediate problems, building alliances throughout your organization, and making a successful business case for a learning solution, including: • Analyzing your current processes and identifying your needs • Mapping out the various processes and training requirements • Calculating the financial impact of training • Making the case and managing the project
Tags : learning solution, business case, lms, development, learning management strategy
     Skillsoft
By: SumTotal, a Skillsoft Company     Published Date: Aug 24, 2015
This paper takes you step-by-step through the process of addressing your immediate problems, building alliances throughout your organization, and making a successful business case for a learning solution.
Tags : learning solution, business case, lms, development, learning management strategy
     SumTotal, a Skillsoft Company
By: Clearswift     Published Date: Jun 09, 2008
Every enterprise has to find a balance between security and the ability to carry on conducting business freely. This short guide is about finding that balance. By following some basic principles, there's no reason you can't let legitimate business email move into, out of and within your enterprise while stopping the things that cause damage: viruses, spam, spyware, trojans, phishing, Denial of Service attacks, the loss of sensitive data and the collection of illegal, immoral and just plain offensive material.
Tags : e-mail security, guide, clearswift, clearswift
     Clearswift
By: F5 Networks     Published Date: Mar 18, 2015
The growing number of sophisticated attacks and countless attack vectors are increasingly difficult to mitigate. Download our 10 Steps to Mitigate a DDoS Attack in Real Time Infographic to help you address current attacks and learn how to build a solution that will help you mitigate risk, lower management costs, and stay protected in the future.
Tags : f5 networks, ddos, ip security, real time attack, data protection, secure business
     F5 Networks
By: Idera     Published Date: Oct 18, 2012
Download this paper to learn how implementing basic performance enhancements can provide tremendous improvements to the operation and performance of SharePoint within the enterprise.
Tags : sql, servers, database traffic, data connectivity, microsoft sharepoint, data management, data center
     Idera
By: Kindred Hospital Rehabilitation Services     Published Date: Oct 02, 2019
With greater emphasis being placed on care transitions and readmission rates, inpatient rehabilitation programs have the incredible potential to become high-performing centers of excellence that optimize the performance of the entire hospital. Rehabilitation is so critical because it is key to patient recovery for medically complex patient populations that continue to grow as the population ages, and essential in reducing readmissions and associated financial penalties. However, maintaining a well-run rehab unit is complex and requires specialized expertise.
Tags : 
     Kindred Hospital Rehabilitation Services
By: Tripwire     Published Date: Nov 07, 2012
Many professionals in information security espouse the belief-and commitment to-"risk based" security management. In fact, according to the latest Ponemon Report on Risk Management, 77% of those surveyed claimed a commitment to it. Ironically, the analysis of the responses collected by the survey indicated that despite their stated intentions, most of the respondents and their organizations were not acting in ways that reflected this commitment.
Tags : security, tripwire, security management, security based management, data management, data center
     Tripwire
By: eMC     Published Date: Oct 11, 2010
Learn 10 practical tips on how to make your email messages stand out among the clutter and maximize your results with this FREE white paper!
Tags : napco, emc, email marketing, emarketing, roi, list management, newsletter design
     eMC
By: MobileIron     Published Date: Mar 02, 2015
The Android platform has quickly established itself as a dominant mobile OS for consumers. However, enterprise IT has been slower to adopt Android broadly due to lack of Enterprise Mobility Management capabilities in Android and fragmentation. But the recent release of Android Lollipop reduces fragmentation and when combined with MobileIron enterprise mobility management (EMM) solutions, gives IT the tools needed to easily manage and secure apps and content on all types of Android devices. This will accelerate adoption of Android devices within the enterprise.
Tags : android, apps, vpn, work, multiple devices, emm
     MobileIron
By: Tenable     Published Date: Feb 05, 2018
Ready, set, collaborate, automate – a mindset change for strengthening security. Industry research suggests there is significant interest in making DevOps more secure. In fact, Gartner reports "by 2021, DevSecOps practices will be embedded in 80% of rapid development teams, up from 15% in 2017." To help you effectively integrate security into your organization’s DevOps practice, Tenable encourages you to read the Gartner report, “10 Things to Get Right for Successful DevSecOps.” Loaded with specific detailed recommendations, the report covers topics including: - Integrating security and compliance testing seamlessly into DevOps processes - Scanning for known vulnerabilities and miscongurations in all open-source and third-party components - Scaling infosec into DevOps by using a security champion model
Tags : secure devops, gartner, analyst report, container security
     Tenable
By: SunGard Availability Services     Published Date: Oct 30, 2013
Learn the 10 strategies for selecting a disaster recovery service provider to ensure that your organization will be better protected should a natural disruption occur.
Tags : sungard, sungard availability services, disaster recovery, disaster recovery provider, disaster recovery service provider, dr plan, drsp, business impact analysis, service level agreement, recovery, resiliency, application management, remote access, data center, security
     SunGard Availability Services
By: Metafuse     Published Date: Aug 21, 2009
Looking for project management software can often be confusing. There are so many choices in the market, how do you narrow your search? This white paper gives you 10 tips to guide your solution search.
Tags : project management, pmp, project planning, project scheduling, scheduling, schedule, it management, pm solution, pm software, project management software, metafuse
     Metafuse
By: LockLizard     Published Date: Jun 10, 2009
Is the PDF security software you are looking to purchase really secure? If the PDF security software you are evaluating can be simply broken then you might as well save your money. What PDF security vendors are not telling you about their products and solutions, and what questions you should be asking.
Tags : pdf, pdf security, locklizard, software, cost savings, recovery, passwords, restrictions, adobe, affiliate scheme, footprint, risk management, risk, vulnerabilities, dmca, digital millennium copyright act, adobe reader, usability, encryption, security
     LockLizard
By: Palo Alto Networks     Published Date: Sep 30, 2016
Your network is more complex than ever before. Your employees are accessing any application they want, using work or personal devices. Oftentimes, these applications span both personal and work-related usage, but the business and security risks are often ignored.
Tags : palo alto, firewall, applications, ssl, ssh
     Palo Alto Networks
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search White Papers      

Add White Papers

Get your white papers featured in the insideHPC White Paper Library contact: Kevin@insideHPC.com