critical it

Results 1 - 25 of 1937Sort Results By: Published Date | Title | Company Name
By: SAS     Published Date: May 24, 2018
For 20 years running, SAS has landed a coveted spot on Fortune’s 100 Best Companies to Work For list. Our HR department plays a critical role in keeping current employees engaged and productive as well as anticipating and preparing for future workforce needs. How? One reason is our use of data and analytics to drive HR decision making. It would be easy to assume other companies see the value of analytics; however, a Deloitte survey found 75 percent of HR leaders rate analytics as a priority, yet only 8 percent say their HR organization has a strong analytics capability. I had the pleasure of meeting David Harcourt, Associate Manager of Employee Insights at Yum! Brands when he spoke at the Analytics Experience 2016 conference in Las Vegas. His session, “HR Analytics from Scratch: 8 Lessons Learned in the First Year,” provided valuable insight into what it takes to build HR analytic competency from scratch. His mission is to share with others what he wishes he’d known when he started bui
Tags : 
     SAS
By: KPMG     Published Date: Jul 12, 2018
With disruptive ideas and technologies coming thick and fast, formulating a strategic response is critical to long-term survival. How can you prepare a strategy for success? Read this report to find out: • how established organisations are meeting the challenge from disruptors • what models they’re using to gain first-mover access to technology innovation • why designing an overall portfolio of disruption responses is key • how to navigate disruption successfully, with a clear four-step approach. Download the report now
Tags : 
     KPMG
By: CheckMarx     Published Date: Jun 07, 2019
Data breaches continuing to make the headlines and enterprises are no longer questioning "if" a breach will occur, but "when." With the organization's data assets and reputation at stake, having a breach response plan in place is becoming increasingly important. Join security thought leaders and experts for an interactive Q&A to learn more about: - Today’s cybersecurity threat landscape - The true costs of a breach - Preventing breaches: Key factors to consider - Why early breach detection is critical - How to develop an effective incident response plan and get C-Suite buy-in - How to keep your company secure in 2019"
Tags : 
     CheckMarx
By: TIBCO Software     Published Date: Jul 22, 2019
TIBCO® Connected Intelligence for Smart Factory Insights By processing real-time data from machine sensors using artificial intelligence and machine learning, it's possible to predict critical events and take preventive action to avoid problems. TIBCO helps manufacturers around the world predict issues with greater accuracy, reduce downtime, increase quality, and improve yield.
Tags : 
     TIBCO Software
By: Mimecast     Published Date: Aug 22, 2017
Healthcare organizations are a favorite target for determined attackers. Any disruption to critical services provides a strong incentive to pay a ransom and patient medical data is highly lucrative for the information it contains. Research finds that providers have traditionally under invested in IT security, which further compounds the problem. Read the report to learn: • Important cyber security risks • The impact of a data breach to your organization • Key regulations around the globe
Tags : healthcare, data protection, patient medical data
     Mimecast
By: Tenable     Published Date: Feb 07, 2018
"This IDC Technology Spotlight examines the evolution of vulnerability management. By leveraging the cloud and new technologies that deliver greater visibility, organizations can gain an accurate picture of their assets and overall risk posture. This is a critical step toward addressing the current landscape where attackers are using a wide variety of vectors such as mobile, social, and cloud-based attacks to infiltrate organizations and steal data. By reading this report you will get an overview of: - Benefits of cloud-based security and vulnerability management - Challenges of adopting cloud-based vulnerability management - IDC assessment of Tenable.io cloud vulnerability management"
Tags : 
     Tenable
By: Menlo Security     Published Date: Jun 05, 2018
"2017 was marked by a significant number of high-profile cyber breaches. Web malware and phishing played a critical role in the vast majority of these attacks. Watch this webinar to learn from two of the industry’s leading experts – Gartner Research Analyst Peter Firstbrook and Menlo Security CTO Kowsik Guruswamy: *Why web malware and phishing are so pervasive in today's cyber attacks *What the shortcomings of today’s reactive security philosophy are *Why the web continues to present a risk to businesses *How organizations rethink their security strategy moving forward"
Tags : 
     Menlo Security
By: IBM     Published Date: Jan 09, 2014
As vendors abandon the UNIX market, IBM continues its commitment to AIX and POWER7 components on Power Systems. And with its recent architectural upgrades, it’s even redefining performance. Read the Clipper Group white paper and see how POWER7’s faster processors accelerate the delivery of applications and services, and improve the utilization of resources.
Tags : power7 system, ibm, power7 servers, mission-critical, data center, it infrastructure, architecture, bladecenter
     IBM
By: Lumesse     Published Date: May 15, 2015
This paper explores how critical it is to have an agile talent management strategy in place. Being mobile and social are key to attracting, developing and retaining the cream of Gen Z.
Tags : gen z, employees, retain talent, talent management, strategy, generation z, workplace, hr trends
     Lumesse
By: NuView     Published Date: Sep 23, 2011
This whitepaper examines 10 critical business imperatives when deploying a global HRMS, from the vantage point of a global HRMS vendor CEO and a long time HR Technology practitioner.
Tags : global hrms, global hris, global hr management, global hr software, global hr system, global human resource management, workforce management, global challenges
     NuView
By: KPMG     Published Date: Sep 04, 2019
Operational resilience is high on the regulatory agenda in the UK. A joint discussion paper in 2018 took a broader view of operational resilience to cover all risks to the provision of critical business services with a greater emphasis on recovery and response when incidents occur. Regulators now place the same importance on operational resilience as on financial resilience. This represents a fundamental shift that companies are at different stages of addressing. Based on discussions with clients and regulators here are ten conversations to help guide you through this new landscape.
Tags : 
     KPMG
By: Birst     Published Date: Jul 16, 2013
Birst’s Salesforce Reporting and Analytics helps sales managers analyze all of the critical salesforce.com data to uncover insightful pipeline information. Combining sales data with marketing, financial and operational data to obtain a comprehensive view of the pipeline is where Birst excels.
Tags : business intelligence, agile bi, self service bi, bi in the cloud, unified bi, mobile bi, embedded analytics, business analytics
     Birst
By: Wheelhouse Enterprises     Published Date: Jul 02, 2010
Phone systems are a critical part of any business infrastructure. While phone system buyers read the buyers guides, research the different brands, and create elaborate RFPs, there is no substitute for learning from other phone system buyers' mistakes. Here is a list of 10 regrettable mistakes businesses have made when buying a phone systems.
Tags : wheelhouse, voip, business phone, sip, ecommerce, business infrastructure, communication, telephony
     Wheelhouse Enterprises
By: Cyveillance     Published Date: Apr 10, 2015
In today’s security landscape, more vendors than ever are offering what is purported to be “threat intelligence.” Although security experts often have different definitions for this term, one thing many of them can agree on is that an intelligence-led approach to security – that is, putting threat intelligence to real-world use – is critical to protecting organizations. If the goal of an intelligence-led security strategy is to help organizations be more proactive in finding and preparing for threats to physical and digital assets, it’s crucial to define and understand exactly what threat intelligence means, and separate fact from fiction. In this whitepaper, we dispel some common myths about threat intelligence.
Tags : myths, cyber, threat, intelligence, fact, fiction, big data, cloud
     Cyveillance
By: WatchGuard Technologies     Published Date: Apr 21, 2010
With these ten critical questions as your guide, you can cut through the marketing hype and zero in on the key features and benefits that should guide your decision.
Tags : watchguard technologies, anti spam, security, tco, xcs, anti-phishing, data loss prevention, encryption
     WatchGuard Technologies
By: Metalogix     Published Date: Jan 10, 2014
Microsoft SharePoint is the fastest growing product in Microsoft history. Its adoption rate has been exponential with millions of documents being stored daily. With its growth, critical documents and procedures are now being stored in SharePoint. It is fundamental that SharePoint maintains its healthy status, and application performance is a key component for a successful deployment, adoption and monitoring of SharePoint.
Tags : sharepoint, sharepoint performance, sharepoint adoption, optimize sharepoint, sharepoint diagnostics, sharepoint tuning, sharepoint performancetuning, sharepoint performance monitoring
     Metalogix
By: Kindred Hospital Rehabilitation Services     Published Date: Oct 02, 2019
With greater emphasis being placed on care transitions and readmission rates, inpatient rehabilitation programs have the incredible potential to become high-performing centers of excellence that optimize the performance of the entire hospital. Rehabilitation is so critical because it is key to patient recovery for medically complex patient populations that continue to grow as the population ages, and essential in reducing readmissions and associated financial penalties. However, maintaining a well-run rehab unit is complex and requires specialized expertise.
Tags : 
     Kindred Hospital Rehabilitation Services
By: Uberall     Published Date: Oct 08, 2018
Your store locator is a critical component on your website; it’s the moment of truth when an online shopper becomes and offline customer. And while it may seem like a simple tool, there are several key factors that will transform the user experience from functional to best-in-class. See how you can optimize this key aspect of your customer journey.
Tags : store, locator, experience, optimize, local marketing, customer journey
     Uberall
By: Uberall     Published Date: Apr 12, 2019
Your store locator is a critical component on your website; it’s the moment of truth when an online shopper becomes an offline customer. And while it may seem like a simple tool, there are several key factors that will transform the user experience from functional to best-in-class. See how you can optimize this key aspect of your customer journey.
Tags : locator, uberall, store locator, location marketing, local listings
     Uberall
By: Lumesse     Published Date: May 15, 2015
This paper explores how critical it is to have an agile talent management strategy in place. Being mobile and social are key to attracting, developing and retaining the cream of Gen Z.
Tags : gen z, employees, retain talent, talent management, strategy, generation z, workplace, hr trends
     Lumesse
By: eFax     Published Date: May 15, 2007
If faxing is a critical component to your business, you want to be sure you make a wise decision on how to do it. This paper offers 10 tips to help you sort through the myriad of choices in order to get the best combination of features and flexibility.
Tags : fax, faxing, ip faxing, ip telephony, fax over ip, efax, infrastructure, ip networking
     eFax
By: Cleo     Published Date: Jan 03, 2017
Modern MFT is designed to connect all of your information sources and consumers in a way that drives business agility with a simple user experience to manage data movement across your organization and beyond. With legacy and outsourced MFT technologies, companies are at a disadvantage when it comes to managing business-critical file transfers. Read this white paper to learn 10 considerations when evaluating the capabilities of your existing MFT solution or a replacement to help your business better meet existing and future use-case requirement.
Tags : cleo, mft, mft technology, file transfer, b2b integration, enterprise applications
     Cleo
By: Mimecast     Published Date: Nov 28, 2017
With the healthcare industry as the #1 target for ransomware attacks, it’s critical to ensure steps are taken to prevent, detect and respond to these attacks without downtime – and without loss of patient data. A multi-layered approach to protective controls – including a Secure Email Gateway (SEG) with advanced threat protection capabilities – will start your healthcare organization on the right path to ransomware resilience. Download and use this top 10 list of how to protect your organization now. Use it as a reference tool for frequent health checks of your own ransomware resilience program.
Tags : healthcare, ransomware, ransomware attack, seg, secure email gateway
     Mimecast
By: Skillsoft     Published Date: Apr 01, 2011
Equipping the workforce with the critical perspectives and peripheral vision it needs to be business effective has become one of the single most vexing challenges facing organizations today. SkillSoft's 10x10x10 framework can help.
Tags : skillsoft, 10x10x10 framework
     Skillsoft
By: SkillSoft MKG     Published Date: Oct 09, 2010
Equipping the workforce with the critical perspectives and peripheral vision it needs to be business effective has become one of the single most vexing challenges facing organizations today. SkillSoft's 10x10x10 framework can help.
Tags : skillsoft, 10x10x10 framework, global workforce, framework
     SkillSoft MKG
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search White Papers      

Add White Papers

Get your white papers featured in the insideHPC White Paper Library contact: Kevin@insideHPC.com