dam

Results 626 - 650 of 884Sort Results By: Published Date | Title | Company Name
By: WebEx.     Published Date: Apr 03, 2009
In today's business environment, equipping information workers with the right tools to do their jobs is a fundamental element for maintaining competitive advantage. Organizations are striving to achieve global connectivity in a dynamic environment where travel is becoming more difficult and expensive, employees are more dispersed, and business boundaries are constantly being extended.  Web collaboration is becoming imperative in reaching this fundamental goal by offering "anytime anywhere" communications that impacts the bottom line and improves profitability.
Tags : webex, web collaboration, information workers, competitive advantage, on-demand web collaboration, roi, global connectivity, decision cycles
     WebEx.
By: Cornerstone OnDemand     Published Date: Sep 12, 2016
It’s a fact: when companies employ newer talent management tools, they see reduced hiring times and higher retention rates. But what features, tool, and apps should you look for when shopping for a next-gen talent management system? Download “How to Conquer Your First Talent Management Purchase” and learn: • The fundamentals of talent management software (and why you need it!) • How to make the talent management business case to key business units • What to look for in a talent management software provider • Why a "unified" system drives tangible workforce growth Check out this brief on how to conquer your first talent management purchase today!
Tags : 
     Cornerstone OnDemand
By: Webtrends     Published Date: Jan 21, 2010
This is a must-see webinar if you want to understand the fundamentals of multivariate testing (MVT), segmentation, and content targeting. Join Bob Garcia, Director of Product Marketing Optimize and Frans Keylard, Director of Optimization as they use real-life examples to explain multivariate testing and teach you where and how to start optimizing.
Tags : webtrends, mobile strategy, app downloads, apps, performance indicators, mvt, segmentation, optimization
     Webtrends
By: Webroot     Published Date: Sep 18, 2013
This whitepaper deals with the rise of mobility, BYOD and social networking, and how these trends have led cybercriminals to exploit vulnerabilities in browsers and mobile apps. For example, more than 30,000 mostly legitimate websites become infected with malware every day. From drive-by downloads to spearfishing to XML injection, web-borne threats represent a significant new risk for businesses. The report describes how to stay on top of this changing threat landscape and prevent damaging attacks with: • 100% protection against known viruses • Industry-leading URL filtering and IP protection via the world’s largest threat database • Extended protection for smartphones and tablets • Simplified web-based management
Tags : web security, cybercriminals, web threats, web gateway, security
     Webroot
By: CSB by Cornerstone on Demand     Published Date: Jun 26, 2013
Managing people is really very simple: hire people who can do the job, and let them do it. If they do something good, tell them they did done good; if they mess up, sort it out pronto. This e-book covers off a bunch of that stuff. It shouldn't contain anything new or groundbreaking, but it does feature zombies, impractical footwear, terrible ideas for thank you cards and one really creepy monkey. And it's anice reminder that keeping things simple is usually the best way to start.
Tags : management fundamentals, hiring best practices
     CSB by Cornerstone on Demand
By: McAfee     Published Date: Nov 14, 2012
Why is database security so important? For a company that has suffered a serious data breach, it boils down to monetary damage in its many forms: business disruption, bad publicity, stiff fines for noncompliance, and undermined customer confidence.
Tags : database, security, mcafee, data breach
     McAfee
By: Silver Peak     Published Date: Oct 28, 2013
Enterprises have long been battling the inherent performance limitations of Wide Area Networks (WANs) when delivering applications to remote offices. Caching emerged in the 1990’s as a potential way of addressing this problem, accelerating the performance of specific applications, such as web services, while reducing overall WAN traffic. While caching achieved reasonable success for a few short years, the market for these point products ultimately subsided as a result of several operational and functional limitations. Enterprises require an application acceleration solution that spans all types of traffic, one that is easy to manage, and 100% data coherency when supporting business-critical applications. This white paper will address these issues and offer a solution that addresses these enterprise requirements. The result is a complete solution for improved application delivery across a distributed enterprise environment.
Tags : silver peak, network memory, application caching, wan, caching, networking
     Silver Peak
By: TIBCO     Published Date: May 15, 2013
This paper will discuss the new IT landscape as it relates to the new integration, and argue that the need for a comprehensive integration strategy has never been more urgent. This strategy must not only take new data types into account, but also address the more fundamental issue of agility – because whatever the integration needs of an enterprise may be at the moment, they are certain to change rapidly.
Tags : application integration, mobile, social, cloud, agility, integration strategy
     TIBCO
By: Intralinks     Published Date: Mar 12, 2014
The implications of data loss are significant. Organizations that ignore the law affecting collaboration and information sharing are at serious risk of litigation, fines and brand damage. The paradigm shift from organizationally-defined to user-defined information governance is making it that much more difficult to maintain control of business activity and data. This informative white paper by legal firm Field Fisher Waterhouse evaluates the legal risks of uncontrolled collaboration and information sharing and what to do about them, while providing in-depth insights into: • Landmark incidents that have influenced data protection laws • How to navigate different jurisdictional privacy frameworks • Top 4 types of legal risk to protect against • Top 5 recommendations for implementing good governance
Tags : data security, compliance, technology, network security, regulatory compliance, security, enterprise applications, data management
     Intralinks
By: Dyn     Published Date: Jul 29, 2015
This whitepaper reviews three fundamental reasons to add IPM services to your performance management arsenal including: • Performance management considerations for websites and cloud-based services • The role APM and NPM solutions can play in optimizing code and enterprise IT infrastructure • How complementary IPM services can help you make educated cloud and network service provider partnering decisions to improve user experiences, customer interactions, and business outcomes
Tags : apm, npm, internet performance management, application performance management, network performance management, enterprise it infrastructure, user experience, customer interactions
     Dyn
By: Nutanix     Published Date: Oct 01, 2014
This webinar will help enterprises understand the fundamentals of web-scale IT and how other companies are using web-scale principles to build private cloud-like environments.
Tags : nutanix, cloud, convergence, hyperconvergence, virtualization, web scale, it scale
     Nutanix
By: HP Software     Published Date: Jul 13, 2015
The early days of enterprise mobile app development focused on creating a functional experience and getting it out the door quickly, leaving “quality” as a problem for another day. As organizations mature their development and delivery of mobile applications, traditional software quality fundamentals settle back into the life cycle, with some key changes to testing processes and team structure. App performance is an example of how mobile changes quality assurance. Performance is a key pillar of quality that mobile shops often overlook in their race to market. This report dives into the problem areas that impede mobile performance, and provides guidance on this not-so-black-and-white area of quality.
Tags : mobile, mobile experience, mobile app development, mobile performance
     HP Software
By: Mitel     Published Date: Jun 29, 2016
The cloud – and more specifically, cloud communications – is the source of the transformation, which has fundamentally changed the IT landscape. Some IT pros have embraced it. Some are working on migrating to the cloud over time. And others, through choice or necessity, are sticking with a premises-based approach. Read on to find out why some IT pros are shopping for game tables to go in empty server rooms while others are untangling wires and watching blinking lights—and which cases make the most sense for each approach.
Tags : cloud management, cloud services, cloud management, best practices, communications
     Mitel
By: IBM     Published Date: Mar 28, 2016
Big data. We've heard the phrase for quite some time, but how can human resource leaders get into the action? One way is through the development and implementation of talent analytics strategies. Talent analytics is fundamentally changing the way organizations and practitioners are thinking about the role of HR and organizations uncovering never before seen insights.
Tags : ibm, smarter workforce, talent management, talent analytics
     IBM
By: IBM     Published Date: Mar 28, 2016
Workforce analytics is a very significant development in human resources. It promises the potential for deeper understanding of the ways workers contribute to organizational performance. However, workforce analytics is not just about analyzing data to reveal exciting insights; it also requires the active involvement of a firm’s workers if the potential of analytics is to be fully realized. Without active employee participation, workforce analytics efforts face at best, restricted data sources and data sets that are incomplete and at worst, the risk of damaging employee relations and, ultimately, productivity. This white paper summarizes recommendations that will encourage enthusiasm for workforce analytics and active employee participation, using the FORT (Feedback, Opt-in, Reciprocal, Transparent) framework. The FORT criteria could prove particularly useful in European countries. This is because the 1995 European Union Data Protection Directive, along with certain local legislative pr
Tags : ibm, ibm smarter workforce institute, work trends, employee engagement
     IBM
By: IBM     Published Date: Jun 13, 2016
Big data. We've heard the phrase for quite some time, but how can human resource leaders get into the action? One way is through the development and implementation of talent analytics strategies. Talent analytics is fundamentally changing the way organizations and practitioners are thinking about the role of HR and organizations uncovering never before seen insights.
Tags : ibm, talent acquisition, talent acquisition technology, human resources, recruiting
     IBM
By: Sparxoo     Published Date: Dec 21, 2016
With a new year upon us, it's time to put out Nostradamus hat on and give our best predictions for 2017. It's time for a fresh perspective as you look at your marketing plans and /make sure your initiatives are aligned for success. Our digital marketing gurus have pulled insights and trends together to give you insider secrets on digital marketing and how can you get a leg up on your competition. Why? Because we dig digital, and want to spread the love.
Tags : sparxoo, digital marketing, trend, marketing, forecast, insights, analytics
     Sparxoo
By: Workday     Published Date: Nov 03, 2017
The world is quickly changing, but a number of forces – the evolving nature of work, the threat of disruptive innovation from competitors that don’t exist yet, and the need to fundamentally rethink the structure and makeup of organisations – are putting the CHRO in a unique position to support the CEO growth objective.
Tags : 
     Workday
By: Mintigo     Published Date: Nov 20, 2017
Predictive Marketing is a fundamental shift in the way B2B companies engage buyers. In the first book of its kind, Mintigo CEO Jacob Shama explores how data science and AI enable marketers and sales reps to target, engage, and convert the most likely prospects with unparalleled precision. This ebook will guide you through the science, applications, and results of this new technology, and show you how to use it to empower your organization. Download now.
Tags : 
     Mintigo
By: AstuteIT_ABM_EMEA     Published Date: Feb 28, 2018
Die digitale Transformation wird IT- und Geschäftsabläufe fundamental ändern. Sie erfordert eine einheitliche Datensicherungslösung, die in der Cloud ebenso zuverlässig funktioniert wie in virtuellen und physischen Umgebungen. Aber das ist noch nicht alles – Unternehmen brauchen eine Datenverwaltungslösung, die jederzeit für Datenübersicht und Verfügbarkeit sorgt. Durch die Cloud sowie physische und virtuelle Umgebungen werden Daten viel stärker fragmentiert. Nur eine Software definierte, technologisch unabhängige Methode sorgt für umfassende Schutz- und Verwaltungsoptionen für die Daten, unabhängig von deren Standort. Lassen Sie sich nicht von Ihrer Hardware einschränken!
Tags : datenmanagement, backup, software, konzentration, datenspeicherung, skalierbare
     AstuteIT_ABM_EMEA
By: Astute IT DACH     Published Date: Feb 28, 2018
Die digitale Transformation wird IT- und Geschäftsabläufe fundamental ändern. Sie erfordert eine einheitliche Datensicherungslösung, die in der Cloud ebenso zuverlässig funktioniert wie in virtuellen und physischen Umgebungen. Aber das ist noch nicht alles – Unternehmen brauchen eine Datenverwaltungslösung, die jederzeit für Datenübersicht und Verfügbarkeit sorgt. Durch die Cloud sowie physische und virtuelle Umgebungen werden Daten viel stärker fragmentiert. Nur eine Software definierte, technologisch unabhängige Methode sorgt für umfassende Schutz- und Verwaltungsoptionen für die Daten, unabhängig von deren Standort. Lassen Sie sich nicht von Ihrer Hardware einschränken!
Tags : datenmanagement, backup, software, konzentration, datenspeicherung, skalierbare
     Astute IT DACH
By: SAP     Published Date: Jun 04, 2010
Small and medium-sized businesses (SMBs) around the world are facing a competitive environment more intense than ever. Changes in the economic environment that began in 2008 (and earlier in some places) have altered business fundamentals forever. Larger competitors are increasingly interested in capturing the customers that SMBs previously were able to claim uncontested. Download now to learn more.
Tags : sap, smb, economic environment, lean, revenue
     SAP
By: IBM     Published Date: May 31, 2017
What defines cognitive manufacturing maturity? Our study found three stages of cognitive manufacturing maturity. We call those organizations in the earliest stage Observers, followed by Starters and Actives, respectively. These groups differ on two key characteristics: the presence of an overall strategy for cognitive manufacturing, and degree of strategic execution of multiple projects that enable higher project success and significantly fewer failed projects. Strategy is the crucial enabler of higher maturity. How do manufacturers get beyond the obstacles and barriers to increase cognitive manufacturing maturity? The obstacles encountered by our respondents are tied to organizational maturity. Overcoming them is fundamental to increase cognitive manufacturing success. In this report, we’ll first describe cognitive computing and how it gives rise to cognitive manufacturing. Then, we’ll review specific study findings and recommend actions for electronics executives.
Tags : cognitive manufacturing, cognitive computing, organizational maturity, electronics, ibv
     IBM
By: IBM     Published Date: Oct 18, 2017
How do manufacturers get beyond the obstacles and barriers to increase cognitive manufacturing maturity? The obstacles encountered by our respondents are tied to organizational maturity. Overcoming them is fundamental to increase cognitive manufacturing success. In this report, we’ll first describe cognitive computing and how it gives rise to cognitive manufacturing. Then, we’ll review specific study findings and recommend actions for electronics executives.
Tags : cognitive manufacturing, ibm, electronics, organizational maturity
     IBM
By: BlackBerry Cylance     Published Date: Jul 02, 2018
The cyberattacks of 2017 proved more numerous, sophisticated, and ruthless than in years past. Threat actors, armed with knowledge stolen from the CIA and tools lifted from the NSA, demonstrated an elevated level of proficiency. WannaCry and NotPetya, two prominent threats from last year, successfully exploited these stolen assets in their assault on systems worldwide. As 2017 progressed, new opportunities developed in ransomware-as-a-service (RaaS), opening the gates of malware-for-profit to everyone. Advancements in fileless attacks provided new ways for threats to hide from once reliable detection methods. Malware features such as polymorphism continued to play a powerful role in evading traditional defenses. The victims of cybercrime ranged from private businesses to the fundamental practices of democracy. France and the United States saw significant data breaches during their recent presidential elections. Several high-profile companies lost their customers’ personally identifiable information to cyberattacks, blemishing their brands and costing them untold millions in recovery operations. This report contains an overview of the threat trends and malware families Cylance's customers faced in 2017. This information is shared with the goal of assisting security practitioners, researchers, and individuals in our collective battle against emerging and evolving cyberthreats.
Tags : cyber attacks, cia, nsa, wannacry, notpetya
     BlackBerry Cylance
Start   Previous    19 20 21 22 23 24 25 26 27 28 29 30 31 32 33    Next    End
Search White Papers      

Add White Papers

Get your white papers featured in the insideHPC White Paper Library contact: Kevin@insideHPC.com