training

Results 1 - 25 of 350Sort Results By: Published Date | Title | Company Name
By: HPE     Published Date: Jul 21, 2016
Deep learning is a method of creating artificial intelligence systems that combine computer-based multi-layer neural networks with intensive training techniques and large data sets to enable analysis and predictive decision making. A fundamental aspect of deep learning environments is that they transcend finite programmable constraints to the realm of extensible and trainable systems. Recent developments in technology and algorithms have enabled deep learning systems to not only equal but to exceed human capabilities in the pace of processing vast amounts of information
Tags : 
     HPE
By: Proofpoint     Published Date: Aug 10, 2017
BEC attacks are a growing threat to businesses because they prey on vulnerabilities that can’t be patched: people. That’s why employee training, financial controls, and especially technology are the keys to a strong defense and timely response. You need need a solution that does not solely depend on reputation and basic email filtering. With granular controls, advanced email solutions can identify and quarantine impostor emails before they reach an employee’s inbox.
Tags : security awareness, social engineering, impostor emails, email flags, financial institution, bec threats, suspicious messages
     Proofpoint
By: Oracle APAC ZO OD Prime Volume CX ABM Leads June 2017     Published Date: Jul 11, 2017
Despite the rise in chat adoption, many organizations are still not providing the service their customers expect. That’s why it’s essential to follow proven best practices, including defining goals, identifying key metrics, and appropriately hiring and training staff. With these foundations in place, organizations can establish routing and queuing practices, before customizing the solution to meet their specific needs, and fine-tuning analytics to further improve performance. To learn more about how Oracle Chat Cloud Service can improve CSAT, customer loyalty, and revenue for your organization, visit oracle.com/goto/chatbestpractices
Tags : home page support, faq escalation, points of right-channeling, frustration points, page headers and footers, business driver, chat channel, customer satisfaction
     Oracle APAC ZO OD Prime Volume CX ABM Leads June 2017
By: Brainshark     Published Date: Aug 02, 2017
As buyers have become increasingly more savvy and better-educated, B2B sales organizations have changed their strategies. But that can’t happen in a vacuum – sales training must change as well. This brief provides specific ways to improve both the training content delivered to sales reps and the all-important methods for delivering that content. With this actionable information, managers and trainers can begin enacting real change that gets reps more conversation-ready than ever before. Get your copy of this latest brief today. And ready your sales force for better opportunities and more wins.
Tags : sales mastery, b2b, b2b sales, salespeople, better selling, sales training
     Brainshark
By: Brainshark     Published Date: Aug 02, 2017
Onboarding – every company does it, but a shockingly few do it really well. In fact, The Sales Management Association found that after sales onboarding is complete, 1/3 of reps still lack proficiency in up to a dozen key selling skills. That’s a LOT of training that goes in one ear and out the other. At best, this leads to slow ramp times for new reps that take far too long to start closing deals. At worst? Your turnover rates skyrocket, forcing you to start all over with a new batch of hires. So the question is – how do you break the cycle and onboard salespeople in a way that actually works? This exclusive eBook provides 6 steps to better sales onboarding
Tags : sales, sales onboarding, sales blueprint, sales people
     Brainshark
By: Brainshark     Published Date: Aug 02, 2017
Coaching is a top priority for sales organizations – but most managers tasked with coaching admit they’re not sure how to develop or maintain an effective coaching program. Whether you’re starting a coaching initiative or making modifications to one, you won’t get far without the right buy-in, processes and resources. This exclusive eBook offers 11 must-haves for effective sales coaching. Inside you’ll find: • How to develop a comprehensive coaching plan • The difference between coaching and training (and why you need both) • Tips to make your current coaching program more effective Ready to see better coaching results? Download your free copy today. Download your free copy and start enabling your sales managers to reach their maximum coaching potential.
Tags : sales, sales coaching, coaching initiative, sales sucess
     Brainshark
By: NAVEX Global     Published Date: Jul 17, 2017
Screening your third party vendors and business partners for risk can be a challenging process. With so many different factors to consider, where do you even begin? We've developed our Anti-Bribery and Corruption Risk Assessment Checklist so you can streamline your compliance risk assessment processes and ensure each potential risk is addressed. Keep up with changing European laws and regulations with this checklist.
Tags : training, communication, culture, controls, oversight, policies, risk assessment
     NAVEX Global
By: Rosetta Stone     Published Date: Jul 05, 2017
Virtually all growth in the U.S. Labor force in the next four decades is expected to come from immigrants and their children. With this growth comes the need for manufacturers to enable their workforce to communicate more effectively. In order to increase productivity and reduce safety incidents, manufacturers are implementing English language learning programs.
Tags : 
     Rosetta Stone
By: CareerBuilder     Published Date: Sep 07, 2010
Whether you've had an employee referral program for years, are only in the initial stages of building one, or have never had one at all, this e-book is full of tips and advice on making your program the best it can be.
Tags : careerbuilder, employee referral, recruiting, qualified, ebook, social networking, roi, training
     CareerBuilder
By: IBM     Published Date: Jun 08, 2017
The healthcare payer ecosystem in the United States has changed dramatically over the last decade and is expected to evolve at an even faster pace over the next few years. Many world-class companies involved in healthcare payment processing are finding themselves constrained by their existing information technology infrastructure. The silos that they built around business-to-business (B2B) processing are constraining them, making it difficult to achieve governmental mandates and (more importantly) increase processing efficiency and competitive advantage. Gone are the days of a small set of data following static and simple standards traded between a limited set of organizations. Gone are the days where the rules for when data is valid versus invalid can expressed in a paragraph or two. Gone are the days when information about a healthcare payment was almost entirely about the "who," "when," and "how much."
Tags : hipaa, healthcare, b2b, organizational strategy, affordable care
     IBM
By: SuccessFactors     Published Date: Jun 25, 2012
The importance of nurturing a talented workforce cannot be understated. It enables your organization to perform effectively today, while also preparing you for future growth. But in reality, how many are companies actually nurturing their employees?
Tags : competency, training, recruiting, performance
     SuccessFactors
By: SAP     Published Date: May 03, 2016
Find out how cloud-based SAP SuccessFactors talent management solutions can help you with all of your HR needs, from recruiting and onboarding to training and promoting your staff.
Tags : sap, employee, hire, retain, retention, workforce, enterprise applications
     SAP
By: Entrust Datacard     Published Date: Feb 05, 2016
Given the finite lifespan of SSL certificates and their widespread use throughout an organization, there are numerous reasons to take a lifecycle management approach. It’s critical to maintain an accurate accounting of SSL certificates that doesn’t rely on manual processes and tools. This guide — intended for IT and security professionals — outlines the key elements of a certificate lifecycle management process and how to provide adequate tools and training to implement this process.
Tags : 
     Entrust Datacard
By: CA Technologies     Published Date: Aug 14, 2014
IT luminaries discuss the major issues impacting DevOps today
Tags : devops, software, training, project management, data center
     CA Technologies
By: Dell     Published Date: Feb 02, 2015
While Windows 7 and Windows XP continue to dominate the market, Windows 8 adoption has been fairly slow, especially in the enterprise. The end of support for Windows XP now creates a season of needed change. Prepare now to address both the challenges and opportunities of this wave of OS migrations by downloading this IT handbook. Read it for insights into planning and preparation, hardware and software compatibility considerations, as well as end user training and implementation.
Tags : dell, windows, productivity, security, apps, integration, platforms, microsoft
     Dell
By: Dell     Published Date: Feb 02, 2015
Many enterprises, educational institutions, and government agencies find themselves still managing both legacy end-user hardware and an antiquated OS. The time has come to move to modern Windows options and given the gamut of robust computing hardware, upgrading both at once simply makes good sense. Download this paper to discover how your organization can benefit from the combination of reduced staff costs, fewer operational problems, lower operational costs and improved productivity, the organization realizes significant cost savings.
Tags : dell, windows, productivity, security, apps, integration, platforms, microsoft
     Dell
By: HPE     Published Date: Mar 23, 2015
If you’ve noticed more employees accessing the corporate network using their personally owned mobile devices, you’re not alone. Many employees are boosting their productivity by using their smartphones and tablets at work. Gone are the days of corporate IT departments dictating the types of mobile devices that could access the network. Bring your own device (BYOD) policies, while increasing employee satisfaction and productivity, are straining corporate networks. This white paper describes the limitations of legacy networks, especially for supporting BYOD. Understanding these limitations can pave the way for a successful BYOD management policy for campus and branch networks.
Tags : corporate network, personal devices, smartphone, tablet, legacy networks, byod
     HPE
By: Akamai Technologies     Published Date: May 08, 2017
We are coming to expect quality video in all our digital experiences – from online shopping to on the job training. However, as video technology has become more ubiquitous, it has also become more complex. To deliver a quality experience to users, regardless of their device and connectivity, you need a holistic video strategy. We’ve tapped into our experience to present the top issues you must address to ensure a successful online video strategy. Download now to learn more!
Tags : device management, data solutions, system solutions, data breach, mobile management
     Akamai Technologies
By: Quantum     Published Date: Jan 24, 2017
Is your organization ready to take the plunge into in-house video production? The benefits can be substantial, but making the move requires some preparation. The IT infrastructure you use for enterprise applications might not be able to meet the rigorous requirements of video production. And you might not want video production teams to use resources from your existing infrastructure, since doing so could affect the performance of other applications. Whether you’re just getting started with in-house video or ramping up production, consider these five best practices for building an IT environment optimized for video work. The right approach to IT is essential for developing efficient collaborative workflows and maximizing the value of your video content.
Tags : corporate video, corporate communications, video storage, enterprise video, enterprise storage, media production, video production, video marketing
     Quantum
By: Entrust Datacard     Published Date: Nov 29, 2016
This guide outlines the key elements of a certificate lifecycle management process and how to provide adequate tools and training to implement this process.
Tags : ssl, ssl certificate, lifecycle management process, ssl digital certificate
     Entrust Datacard
By: Entrust Datacard     Published Date: Jun 14, 2017
This guide — intended for IT and security professionals — outlines the key elements of a certificate lifecycle management process and how to provide adequate tools and training to implement this process.
Tags : 
     Entrust Datacard
By: Jonckers Translation & Engineering     Published Date: May 27, 2011
Following are best practices amassed through working with leading global companies on learning initiatives.
Tags : jonckers, multilingual elearning, successful knowledge, training
     Jonckers Translation & Engineering
By: Cornerstone OnDemand     Published Date: Jul 28, 2015
Download this white paper to learn the true cost of not having a talent management onboarding strategy.
Tags : human resources, talent management, onboarding strategy, training, recruiting, productivity, employee training, retention
     Cornerstone OnDemand
By: Cornerstone OnDemand     Published Date: Jul 28, 2015
Are you managing people with spreadsheets and paper because you think it saves you time and money? The reality is it's probably costing you a lot more than you think. Read this white paper to see how.
Tags : talent management strategy, recruiting, hiring, training, onboarding, learning, succession
     Cornerstone OnDemand
By: Blue Coat Systems     Published Date: Jul 18, 2013
For decades, fear has dominated the discussion of cyber security. Every magazine article, presentation or blog about the topic seems to start the same way: trying to scare the living daylights out of you with horror stories, alarming statistics, and doomsday scenarios. The result is that most IT shops and security vendors think security is only about what you prevent. They think it’s about blocking, prohibiting, controlling, constraining, excluding, outlawing, and forbidding. Hence IT’s reputation as the “Department of No.”
Tags : security, business, cyber security
     Blue Coat Systems
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14    Next    End
Search White Papers      

Add White Papers

Get your white papers featured in the insideHPC White Paper Library contact: Kevin@insideHPC.com