nec

Results 2826 - 2850 of 2912Sort Results By: Published Date | Title | Company Name
Published By: Oracle HCM Cloud     Published Date: Nov 30, 2016
Becoming a high-performing team or organization is more than implementing a new process or initiative. Simply launching another program without vision, purpose, connection, meaning, communication, and belief —is just another program, and people see it for just what it is—and the chances that you will be able to move the organization forward are pretty slim. As an organization, how do you make sense of technology, culture, innovation, performance, the talent marketplace, demographics, and the need to deliver results?
Tags : 
    
Oracle HCM Cloud
Published By: Oracle HCM Cloud     Published Date: Nov 30, 2016
Overhead Door Deploys Oracle HR and Payroll in the Cloud Overhead Door runs Oracle’s payroll, compensation, benefits, and core HR applications in one integrated cloud environment to close the gap on disconnected processes and overcome challenges with different pay type combinations.
Tags : 
    
Oracle HCM Cloud
Published By: Oracle HCM Cloud     Published Date: Nov 30, 2016
Discover the advantages of connecting HR and Finance. From improved productivity and reduced costs, to increased reporting efficiency, the benefits of unifying HR and financial applications are too numerous to ignore. Learn more.
Tags : 
    
Oracle HCM Cloud
Published By: Panaya     Published Date: May 17, 2017
Learn new methods you can easily apply for better control and accelerated functional testing. Learn to reduce time-to-market cycles in a competitive business environment – without compromising quality - by removing the bottlenecks caused by testing.
Tags : 
performance testing, testcenter, business process management, business process
    
Panaya
Published By: Rosetta Stone     Published Date: Nov 02, 2017
By 2030, nearly one in five members of the workforce will be an immigrant. How can we ensure that this population, so vital to maintaining a strong competitive US workforce, will gain the English-language skills necessary for job success? Adult ELL programs in high school districts and community colleges offer the most effective learning paths for non-native English speakers seeking to level the playing field.
Tags : 
    
Rosetta Stone
Published By: Adobe     Published Date: Sep 28, 2016
Customer are infinitely complex, but connecting with them doesn’t have to be. Because while your customers may be wildly different, they do all want one thing — meaningful and relevant experiences. To deliver these experiences requires a powerful web content management system. It’s the digital foundation you need to provide the personalized experiences — that build brands, customer loyalty, and ROI. To learn more about web experience management, read The New Content Frontier. ?
Tags : 
adobe, customer experience, web content management, web content management system
    
Adobe
Published By: DellEMC and Intel®     Published Date: Sep 25, 2017
Une transformation fondamentale englobant le personnel, les processus et la technologie permet aux entreprises de rester compétitives dans l’économie d’aujourd’hui, basée sur l’innovation. Des initiatives telles que la sécurité avancée, les services de détection des fraudes, l’Internet des objets (IoT) avec ses consommateurs connectés, l’expérience de réalité virtuelle ou augmentée, l’apprentissage machine et approfondi et les applications cognitives optimisent les avantages pour l’entreprise comme la maintenance et le marketing prédictifs. Processeur Intel® Xeon® Intel Inside® pour une productivité exceptionnelle. Ultrabook, Celeron, Celeron Inside, Core Inside, Intel, Intel logotyp, Intel Atom, Intel Atom Inside, Intel Core, Intel Inside, Intel Inside logotyp, Intel vPro, Itanium, Itanium Inside, Pentium, Pentium Inside, vPro Inside, Xeon, Xeon Phi och Xeon Inside är varumärken som tillhör Intel Corporation eller dess dotterbolag i USA och/eller andra länder
Tags : 
ultrabook, celeron, celeron inside, core inside, intel, le logo intel, intel atom, intel atom inside, intel core, intel inside, le logo intel inside, intel vpro, itanium, itanium inside, pentium, pentium inside, vpro inside, xeon, xeon phi
    
DellEMC and  Intel®
Published By: DellEMC and Intel®     Published Date: Sep 25, 2017
A fundamental people-process-technology transformation enables businesses to remain competitive in today’s innovation economy. Initiatives such as advanced security, fraud detection services, connected consumer Internet of Things (IoT) devices, augmented or virtual reality experience, machine and deep learning, and cognitively enabled applications drive superior business outcomes such as predictive marketing and maintenance. Procesador Intel® Xeon® Intel Inside®. Produtividade poderosa no exterior. Ultrabook, Celeron, Celeron Inside, Core Inside, Intel, Intel logotyp, Intel Atom, Intel Atom Inside, Intel Core, Intel Inside, Intel Inside logotyp, Intel vPro, Itanium, Itanium Inside, Pentium, Pentium Inside, vPro Inside, Xeon, Xeon Phi och Xeon Inside är varumärken som tillhör Intel Corporation eller dess dotterbolag i USA och/eller andra länder
Tags : 
ultrabook, celeron, celeron inside, core inside, intel, el logotipo de intel, intel atom, intel atom inside, intel core, intel inside, el logotipo de intel inside, intel vpro, itanium, itanium inside, pentium, pentium inside, vpro inside, xeon
    
DellEMC and  Intel®
Published By: DellEMC and Intel®     Published Date: Oct 18, 2017
A fundamental people-process-technology transformation enables businesses to remain competitive in today’s innovation economy. Initiatives such as advanced security, fraud detection services, connected consumer Internet of Things (IoT) devices, augmented or virtual reality experience, machine and deep learning, and cognitively enabled applications drive superior business outcomes such as predictive marketing and maintenance. Intel Inside®. New Possibilities Outside. Ultrabook, Celeron, Celeron Inside, Core Inside, Intel, Intel Logo, Intel Atom, Intel Atom Inside, Intel Core, Intel Inside, Intel Inside Logo, Intel vPro, Itanium, Itanium Inside, Pentium, Pentium Inside, vPro Inside, Xeon, Xeon Phi, and Xeon Inside are trademarks of Intel Corporation or its subsidiaries in the U.S. and/or other countries.
Tags : 
ultrabook, celeron, celeron inside, core inside, intel, intel logo, intel atom, intel atom inside, intel core, intel inside, intel inside logo, intel vpro, itanium, itanium inside, pentium, pentium inside, vpro inside, xeon, xeon phi
    
DellEMC and  Intel®
Published By: Palo Alto Networks     Published Date: Sep 30, 2016
The rapid adoption of SaaS-based applications in organizations today continues at a breakneck pace. These applications provide critical functionality and enable greater productivity, but at the same time introduce potential new security and data theft risks if not properly controlled.
Tags : 
palo alto, saas, security, shadow it, applications
    
Palo Alto Networks
Published By: LeanData     Published Date: Nov 07, 2016
In a modern B2B sales process, it’s not easy connecting a lead to the right rep. It’s no secret that the traditional way of managing leads within Salesforce is rigid and labor-intensive. This eBook dives into best practices about lead routing and converting. Learn how a well-designed, automated lead management process maximizes the impact of every lead coming into your organization.
Tags : 
    
LeanData
Published By: Sprinklr     Published Date: Jan 05, 2018
Long wait times, dropped calls, repeating a single problem dozens of times – one could write a novella about the countless pain points of customer service. To customers, these pain points are, well, painful. To companies, they’re a necessary part of doing business. When you’re a multibillion-dollar brand with hundreds of locations worldwide, scale equals survival. Call centers are the epitome of scale. Fixated on efficiency, many companies forget what it’s like to be on the other end of the line. They forget about the customer experience.
Tags : 
    
Sprinklr
Published By: IBM     Published Date: May 16, 2017
When the CMO Council recently asked more than 200 senior marketing decision makers how effectively they have aligned physical and digital experiences, half admitted that these integrated experiences were selective, at best. Yet it is alignment, consistency and connection that drive the foundational relationship between the brand and the buyer. The CMO Council, in partnership with IBM, will host a one-hour interactive webcast with industry-leading media, entertainment and telecommunications marketers to discuss how audience insights across the digital and physical experience have been turned into action, allowing these brands to personalize and enrich each engagement. Multiple case studies will also be discussed during the webcast that focus on the power of segmentation and innovations around cognitive computing.
Tags : 
technology efficiency, market dynamics, data privacy, data security, device management, platform management, enterprise management
    
IBM
Published By: IBM     Published Date: Oct 26, 2017
With the growing demand of business for tighter communication and collaboration with external parties such as business partners and customers, IT has to provide the technical foundation for such integration. Web Access Management and Identity Federation are key technologies for that evolution. They enable organizations to manage access both from and to external systems, including cloud services, in a consistent way. Organizations have to move forward towards strategic approaches to enabling that integration, in support of the Extended and Connected Enterprise.
Tags : 
access management, identity federation, it strategies, security, infrastructure
    
IBM
Published By: Cox Business     Published Date: Dec 19, 2016
Reliable and secure network connectivity is no longer optional. It supports critical priorities for healthcare providers, including enhancing patient care outcomes, improving operational efficiency and boosting financial returns. If a healthcare provider’s network infrastructure is not resilient, reliable and secure, the provider will not be able to reap the benefits of its healthcare IT investments.
Tags : 
    
Cox Business
Published By: Lookout     Published Date: Aug 28, 2017
Mobile devices have rapidly become ground zero for a wide spectrum of risk that includes malicious targeted attacks on devices and network connections, a range of malware families, non-compliant apps that leak data, and vulnerabilities in device operating systems or apps. Read the four mobile security insights CISOs must know to prepare for a strategic conversation with the CEO and board about reducing mobile risks and the business value associated with fast remediation of mobile security incidents.
Tags : 
mobile security, mobile risks, device attacks, network attacks, malware attack
    
Lookout
Published By: VMware     Published Date: Feb 24, 2017
Mobile device management (MDM) tools allow companies to connect their employees securely to basic corporate network resources. Enterprise mobility management (EMM) goes a step further by enabling secure mobile versions of business-critical applications and data loss prevention to protect corporate information. But in today's workplace, employees and businesses deal with a vast variety of devices with different operating systems and form factors, from PCs and laptops, to tablets and smartphones, and now, increasingly wearables and Internet of Things (IoT) endpoints. The solution is unified endpoint management (UEM), which enables organizations to take a consistent approach to manage and secure every endpoint, any app and content, and across deployment use cases from a single holistic platform. Read this whitepaper to uncover VMware AirWatch®'s leading UEM approach that is benefiting organizations tremendously.
Tags : 
    
VMware
Published By: Progress     Published Date: Mar 26, 2018
Sampling of Patient-Centric and Connected-Care Digital Health Experiences on Progress Health Cloud
Tags : 
    
Progress
Published By: Progress     Published Date: Mar 26, 2018
Sampling of Patient-Centric and Connected-Care Digital Health Experiences on Progress Health Cloud
Tags : 
    
Progress
Published By: Progress     Published Date: Jan 22, 2019
Tailoring experiences for customers is critical to make your business standout. Customization works well for organizations that want to enhance their standard customer experience but don’t have the necessary tools or strategy for in-depth personalization. Learn about the 5 best practices for customizing websites and the 5 biggest challenges marketers face while customizing their websites.
Tags : 
    
Progress
Published By: CrowdStrike     Published Date: Feb 01, 2017
One of the biggest challenges to effectively stopping breaches lies in sifting through vast amounts of data to find the subtle clues that indicate an attack is imminent or underway. As modern computer systems generate billions of events daily, the amount of data to analyze can reach petabytes. Compounding the problem, the data is often unstructured, discrete and disconnected. As a result, organizations struggle to determine how individual events may be connected to signal an impending attack. Download the white paper to learn: • How to detect known and unknown threats by applying high-volume graph-based technology, similar to the ones developed by Facebook and Google • How CrowdStrike solved this challenge by building its own proprietary graph data model • How CrowdStrike Threat Graph™ collects and analyzes massive volumes of security-related data to stop breaches
Tags : 
    
CrowdStrike
Published By: Carbonite     Published Date: Aug 02, 2017
The risk and downtime of server migration have locked many IT teams into platforms that are no longer ideal. Migrations are often delayed or avoided—whether it’s moving data to the cloud or back on premises, or upgrading the hardware of the database software. This results in lost opportunities, unnecessary costs, and a lack of agility that today’s IT teams can no longer afford. Carbonite Move Powered by DoubleTake quickly and easily migrates physical, virtual, and cloud workloads over any distance with minimal risk and near-zero downtime. Using efficient real-time, byte-level replication technology, Carbonite Move creates a replica of the data, application, database, or entire server being migrated and keeps it in sync with the production system. The migrated data can be validated without disrupting business operations, and downtime is limited to the seconds or minutes required for cutover to the new server.
Tags : 
carbonite, doubletake, risk mitigation
    
Carbonite
Published By: McAfee     Published Date: Mar 31, 2017
The Adwind Remote Administration Tool is a backdoor Trojan written in Java language that targets various platforms that support Java files. Adwind does not exploit any vulnerabilities. In most cases, for an infection to succeed, the user must run the malware by double-clicking the .jar file that is usually distributed as an attachment, or opening an infected Microsoft Word document. The infection spreads if the Java Runtime Environment is installed on the user's computer. After the malicious .jar file is executed on the target system, the malware installs silently and connects to a remote server via a preconfigured port to receive commands from a remote attacker and perform other illegal operations.
Tags : 
backdoor trojans, trojan protection, malware, malware protection
    
McAfee
Published By: McAfee     Published Date: Mar 31, 2017
The Adwind Remote Administration Tool is a backdoor Trojan written in Java language that targets various platforms that support Java files. Adwind does not exploit any vulnerabilities. In most cases, for an infection to succeed, the user must run the malware by double-clicking the .jar file that is usually distributed as an attachment, or opening an infected Microsoft Word document. The infection spreads if the Java Runtime Environment is installed on the user's computer. After the malicious .jar file is executed on the target system, the malware installs silently and connects to a remote server via a preconfigured port to receive commands from a remote attacker and perform other illegal operations.
Tags : 
backdoor trojans, trojan protection, malware, malware protection
    
McAfee
Published By: Datastax     Published Date: Aug 07, 2018
Today’s hyper-connected customers expect highly personalized and accurate information “Right-Now”
Tags : 
    
Datastax
Start   Previous    103 104 105 106 107 108 109 110 111 112 113 114 115 116 117    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

“I am the Inspector Morse of IT journalism. I haven't a clue. D'oh” - Mike Magee