identifying

Results 126 - 150 of 230Sort Results By: Published Date | Title | Company Name
By: Cornerstone OnDemand     Published Date: Apr 16, 2018
Do you believe that your company could use a talent management initiative? Need help making the case to a business leader? This asset will help you prepare by giving you tips on topics such as: • Thinking like an executive • Identifying talent-related challenges • Assigning metrics to ensure accountability Interested in learning more about building your business case? Download “6 Steps to Making the Case for Talent Management.”
Tags : 
     Cornerstone OnDemand
By: Citrix Systems     Published Date: Feb 27, 2014
The ability to take Windows applications and desktops mobile has many advantages, but the variation in mobile device types, including form factor and platform, makes the process of identifying a single solution to address all the employees’ requirements complex. This paper discusses how Citrix can help take Windows mobile on any device.
Tags : citrix, windows, mobile, windows applications, it management, data center
     Citrix Systems
By: Citrix Systems     Published Date: Apr 15, 2016
Taking Windows applications and desktops mobile has many advantages, but the process of identifying a single solution is complex. Learn how Citrix XenApp solves this complex problem.
Tags : best practices, business optimization, business management, mobile
     Citrix Systems
By: Concur     Published Date: Feb 04, 2013
Expense fraud costs a median loss of $33,000 in each instance, according to Association of Certified Fraud Examiners (ACFE). Despite the nonchalant attitude of many employees, expense fraud is a crime that affects organizations large and small.
Tags : fraud, expense fraud, corporate expense policy, preventing fraud, identifying fraud
     Concur
By: McAfee     Published Date: Jan 23, 2013
Threats and vulnerabilities are a way of life for IT admins. This paper focuses on how McAfee's Vulnerability Manager and McAfee e Policy Orchestrator provide IT Admins with powerful and effective tool for identifying and re-mediating systems.
Tags : mcafee vulnerability manager, s3kur3, tom bradley, mcafee epolicy orchestrator, mcafee vulnerability scanner, mcafee epolicy orchestrator, mcafee global threat intelligence, vulnerability scan, mcafee risk advisor, patch tuesday, security, it management, data center
     McAfee
By: 8x8 Inc.     Published Date: Jun 16, 2017
Some companies opt to deploy UC solutions on-premises, but the cloudbased model is gaining popularity. Cloud-based UC solutions are ideal for businesses that have limited IT staff, a distributed workforce and/or a desire for pay-as-you-go flexibility. By enabling diverse communication media to be carried over a common IP network, UC solutions make it possible to manage a full suite of capabilities from a single point—and use them with common devices. But what’s the best way to maximize UC capabilities for your specific workplace? Spiceworks surveyed IT decision makers to get their insights on identifying and deploying collaboration and communication solutions across their organizations. This white paper explores the survey results, including key concerns, pain points, and roadmaps around driving UC strategies.
Tags : technology solutions, mobile workforce, interface optimization, 8x8, desk phones, internal collaboration, remote employees, cost reduction
     8x8 Inc.
By: Oracle Hospitality - S&E     Published Date: May 09, 2017
More than 40% of sports fans worldwide abandoned concession lines in the past 12 months – without making a purchase – because of excessive waiting, according to Oracle Hospitality Sports and Entertainment’s research report The Fan Experience: Changing the Game with Food and Beverage. The global study surveyed more than 3,500 sports fans in eight countries – Australia, Brazil, China, France, Germany, Japan, United Kingdom and United States – and focused on uncovering their top priorities. Most importantly, the survey aids venue operators by identifying “pain points” and solutions designed to trigger greater attendance and spark sales.
Tags : 
     Oracle Hospitality - S&E
By: Kaspersky     Published Date: Apr 24, 2014
This paper aims to provide guidance on identifying the right security approach for your virtual environment, achieved through the correct balance between security and performance.
Tags : security, virtualization, security approaches, kaspersky
     Kaspersky
By: Riverbed     Published Date: Nov 02, 2016
When apps run efficiently, employees are more likely to use them. The promise of unified communications (UC) is that it is supposed to increase efficiencies and make internal operations more seamless. But that only happens when it’s working properly. According to Robin Gareiss, president and founder of Nemertes Research, “Companies devote 33% more IT staff to managing IP telephony and 31% more to UC when they don’t use monitoring tools. The tools are instrumental to identifying, isolating, and resolving performance issues—and preventing them from happening again. When apps run efficiently, employees are more likely to use them.” That’s one reason 36% more people actually use UC in large companies that use monitoring tools. Join Robin Gareiss, president and founder, Nemertes Research and David Roberts, director of product management, Riverbed, as they explore the different approaches to monitoring UC—network probes vs endpoint telemetry—and why taking a combined approach hel
Tags : 
     Riverbed
By: Genesys     Published Date: Jun 19, 2019
Contact center technology plays a major role in the success of your customer experiences and business operations. Having the optimal solutions, infrastructure and provider in place are fundamental to meeting current and future goals and expectations. If you’re struggling with outdated contact center systems that limit channels and customer information, the best path forward is to migrate to a solution that lets you overcome those technology limitations. And the first step is to download this comprehensive checklist to evaluate key solutions and vendor considerations. You’ll learn how to: Identify business goals and outcomes that are most important for your organization Evaluate deployment options based on necessary flexibility and capabilities Understand your technology needs and priorities Assess vendor viability
Tags : 
     Genesys
By: Genesys     Published Date: Jun 27, 2019
Key considerations for navigating a successful migration journey
Tags : 
     Genesys
By: MX Logic     Published Date: May 21, 2008
Rootkits, Trojans, ransomware, Denial-of-Service and much more – this newly released white paper from MX Logic covers the everchanging security threat landscape. Learn what malicious intrusions are out there, how to identify them and how to keep your network safe.
Tags : botnets, dha, dos, denial of service, queen bot, malware, drive by, storm worm, blended threats, rootkits, trojans, spyware, viruses, virus, worm, worms, polymorphism, push propagation, pull propagation, zero day
     MX Logic
By: Dell Software     Published Date: Jul 24, 2012
With Quest Workspacetm Asset Manager, you can easily find data on hardware and software inventory and compare it to records on what's been purchased as well as what's actually in use. Centrally track and manage the IT contracts and licenses then generate usage reports automatically that you easily correlate to actual purchase costs and legal responsibilities. For managing software licenses, Quest Workspacetm Asset Manager goes beyond simply scanning and identifying software. It traces software usage through metering and quickly identifies if it's being underutilized, sitting idle or if the appropriate number of licenses have been purchased. From one solution, you can implement IT asset management best practices that eliminate overspending and ensure license compliance.
Tags : software data recognition, software management, software metering, multiple platform coverage, windows, mac os, software inventory, vmware, citrix, technology integration, data integration, data management, data center
     Dell Software
By: iKnowtion     Published Date: Nov 17, 2011
This highly successful dot-com brand leveraged its customer information assets to understand the broad range of customers attracted to its product offering, as well as how to evaluate each customer's future value potential.
Tags : customer intelligence, crm solutions, customer analytics, value estimation, customer potential, data modeling, marketing analytics, iknowtion
     iKnowtion
By: EMC Corporation     Published Date: Mar 20, 2014
Gain insight into the effects of the changing information security threat landscape. Learn RSA’s approach to identifying strategies and techniques to establish a good defense, the “kill chain” concept and how to detect and respond, and how to level the adversarial playing field
Tags : emc, security threats, malware threats, malware protection, kill chain, rsa, defense, security
     EMC Corporation
By: NetIQ     Published Date: Apr 08, 2011
This white paper discusses the importance of file integrity monitoring (FIM), which facilitates the detection of malware as well as insider threats in identifying data breaches.
Tags : netiq, risk breach, file integrity monitoring, pci compliance, data security, fim, data breaches, malware detection
     NetIQ
By: Success Factors     Published Date: Feb 06, 2014
Effective onboarding is the key to getting new employees up and running both quickly and smoothly. Organizations able to ramp up new employee role clarity and confidence during onboarding by specifically identifying answers to the who, what, when, and where for getting things done enjoy higher new employee performance, higher job attitudes such as satisfaction and commitment, and decreased turnover. The use of technology to accomplish these twin goals of clarity and confidence is critical in today’s competitive landscape.
Tags : recruiting, human resources, talent management, recruiting strategies, social media, social media recruiting, engaging talent employee performance, performance reviews, human resources, talent management strategies, candidate sourcing
     Success Factors
By: Skillsoft     Published Date: Jun 25, 2015
This paper takes you step-by-step through the process of addressing your immediate problems, building alliances throughout your organization, and making a successful business case for a learning solution, including: • Analyzing your current processes and identifying your needs • Mapping out the various processes and training requirements • Calculating the financial impact of training • Making the case and managing the project
Tags : learning solution, business case, lms, development, learning management strategy
     Skillsoft
By: Evident.io     Published Date: Sep 13, 2017
Defending your cloud environment from menacing threats requires conditioning and ongoing commitment. Using best practices and identifying issues before they explode into costly problems are critical to long-term cloud fitness. Automating the process of monitoring and reporting is crucial to ensuring that your cloud is in the best shape it can be. With the "AWS Security Fitness Guide," you’ll learn the 11 exercises that are critical keeping your organization’s data and systems secure in Amazon Web Services (AWS).
Tags : 
     Evident.io
By: UBM Technology     Published Date: Oct 19, 2017
The annual report studies the content consumption habits of technology professionals, identifying the range of content formats that inform IT buyers and measuring the actions that content inspires. Research was conducted in October 2016 by UBM; analysis and report provided by MarketingProfs. Final data is based on an online survey of 235 qualified IT and business respondents in North America from all sized companies.
Tags : 
     UBM Technology
By: Tenable     Published Date: Sep 14, 2018
"Insights and ideas to help you evaluate vendors and improve your security program. Organizations seeking to evaluate vulnerability assessment solutions turn to the “Gartner Market Guide for Vulnerability Assessment” for expert help in navigating the market. Tenable is pleased to provide a complimentary copy of the report. According to Gartner, “the vulnerability assessment (VA) market is mature, but is being challenged by the need to cover changing device demographics and emerging technologies and better represent true risk.” Gartner addresses these considerations and others in the 2018 Market Guide for Vulnerability Assessment, providing insights that will help you evaluate vendors and improve your security program. Topics covered: The scope of the market for vulnerability assessment solutions, common use cases and challenges Recommendations for identifying requirements and vendor selection criteria Changing device demographics and other trends impacting the market and effective v
Tags : 
     Tenable
By: CBRE     Published Date: Oct 11, 2016
Real estate can be a significant competitive differentiator for businesses in the race for talent. Leading commercial real estate firm, CBRE, outlines the steps organizations need to consider when identifying optimal locations to attract and retain the right talent to enhance competiveness and drive bottom line performance. Download the white paper now.
Tags : workplace, commercial real estate, occupier, cbre, talent
     CBRE
By: IBM Software     Published Date: Nov 04, 2010
Read this Harvard Business Review article to learn how smart organizations are improving decision-making by identifying and prioritizing decisions; examining factors involved in each decision; designing roles, processes, systems and behaviors to improve decisions; and institutionalizing the new approach through training, refined data analysis, and outcome assessment.
Tags : ibm cognos, harvard business review, data analysis, decision management
     IBM Software
By: SAS     Published Date: Jun 27, 2019
Study use cases from companies who have used advanced analytics to improve quality, patient satisfaction and efficiency.
Tags : 
     SAS
By: Skillsoft     Published Date: Mar 27, 2015
Leadership development is a journey, not a destination Fueled by the relentless evolution of technology and global competition, the business environment is changing more rapidly than ever before. To tackle upcoming crises, rebuild organizations and create new business models, multiple skill and character sets will be required. And because new circumstances will continue to arise, leadership development is never finished. The need for the right leader at the right time remains constant. Read peer insight by CEOs from Avaya, Kaon Interactive, OtterBox, Jupiter Medical Center and Wayfair to help you on your leadership development journey.
Tags : leadership, leadership development, succession planning, skills gap, talent gap, leaders, managers
     Skillsoft
Start   Previous    1 2 3 4 5 6 7 8 9 10    Next    End
Search White Papers      

Add White Papers

Get your white papers featured in the insideHPC White Paper Library contact: Kevin@insideHPC.com