practical

Results 326 - 350 of 510Sort Results By: Published Date | Title | Company Name
Published By: Success Factors     Published Date: Jul 10, 2014
Technology plays an integral role in enabling businesses to have access to insightful analytics. By providing metrics on core workforce facts, workforce financials, productivity and performance, talent development and succession and human capital risk, companies are able to identify those 10- 15 metrics most important to business goals. This will enable them to present the Board of Directors with a comprehensive and concise story of workforce capabilities. The best place, we suggest, is with expert, practical guidance. Download this informative resource.
Tags : 
success factors, workforce data, boardroom, metrics, workforce facts, workforce financials, hr metrics, tecnhology
    
Success Factors
Published By: Success Factors     Published Date: Aug 19, 2014
Engaged employees perform better, stay longer, keep customers happier, and boost company revenue. That’s why it’s critical to embed employee engagement deeply into your culture. What practical steps can you take in this direction? Start with expert advice from leading, respected sources. Download these engagement resources for real-world guidance on: How to measure engagement in your organization—and use the results
Tags : 
success factors, engage candidates, hiring process, candidate advocates, recruiting strategies, talent, hiring managers
    
Success Factors
Published By: Jobvite     Published Date: Mar 31, 2015
Recruiting has traditionally been considered a function of Human Resources, but with new tools on the market and new strategies in the air, some are saying it belongs with the marketing team. Others are suggesting Talent Acquisition be pulled out into it’s own unique department in larger organizations. There are innovative strategies that address the changing landscape of digital relationships and networks, and powerful new tools that can seem magical when you’re trying to find the perfect candidate for the available position. Understanding these strategies and harnessing these tools will prepare you to source, screen, interview and hire the best talent for your growing organization. Read this ebook to learn more.
Tags : 
hiring, employment, jobseekers, talent acquisition, interview, sourcing, talent pools
    
Jobvite
Published By: Lumension     Published Date: Jun 05, 2015
Microsoft's System Center Configuration Manager doesn't handle every aspect of Linux/UNIX and third-party application security. Here's how to augment and leverage SCCM to close the gaps.
Tags : 
it security, data center, patch, software, application, analytical applications, database development, database security, employee performance, productivity
    
Lumension
Published By: IBM     Published Date: Aug 20, 2015
This report provides practical guidance on the critical 10 steps for the first 100 days of setting up an analytically enabled HR function.
Tags : 
workforce analytics, data analytics, hr function, talent management, recruitment, best practices, ibm smarter workforce, talent analytics
    
IBM
Published By: Redspire     Published Date: Sep 17, 2015
This Ultimate Guide will give you practical and concrete steps you can take right now to instil a data-driven culture in your organisation.
Tags : 
redspire, crm, sales, social driven marketing, crm system, crm data
    
Redspire
Published By: Palo Alto Networks     Published Date: Apr 25, 2017
SANS conducted this survey to explore how organizations are handling prevention. Breaking down possible preventive measures into four major categories or domains (business, architectural design and development, operational, and technology), the survey sought to answer three major questions: 1. What measures have respondents implemented that they believe will prevent breaches? 2. What measures not necessarily implemented do respondents consider preventive? 3. What barriers have stopped respondents from doing what they should be doing?
Tags : 
    
Palo Alto Networks
Published By: AWS     Published Date: Jul 24, 2019
Join us to learn why Human-in-the-Loop training data should be powering your machine learning (ML) projects and how to make it happen. If you’re curious about what human-in-the-loop machine learning actually looks like, join Figure Eight CTO Robert Munro and AWS machine learning experts to learn how to effectively incorporate active learning and human-in-the-loop practices in your ML projects to achieve better results. You'll learn: When to use human-in-the-loop as an effective strategy for machine learning projects How to set up an effective interface to get the most out of human intelligence How to ensure high-quality, accurate data sets When: Available On Demand (please register to view) Who Should Attend: IT leaders and professionals, line-of-business managers, business decision makers, data scientists, developers, and other experts interested in implementing AI/ML on the cloud are encouraged to attend this webinar. AWS Speaker: Chris Burns, Solutions Architect Figure Eight Spea
Tags : 
    
AWS
Published By: Hewlett Packard Enterprise     Published Date: Jul 20, 2016
The evolution of cloud infrastructures toward hybrid cloud models is inexorable, driven both by the requirement of greater IT agility and by financial pressures. A study by 451 Research reveals that the greatest barrier to cloud migrations is the twin challenges of security and compliance in the hybrid cloud space. Organizations are struggling with practical considerations, which can prevent them from achieving some of the most important and valuable benefits of hybrid cloud deployments. This report details a number of steps that organizations can take to set themselves squarely on a path to a secure and compliant hybrid cloud.
Tags : 
security, compliance, hybrid cloud, best practices, cloud security, business technology
    
Hewlett Packard Enterprise
Published By: HPE_OMG_7.16     Published Date: Jul 22, 2016
The evolution of cloud infrastructures toward hybrid cloud models is inexorable, driven both by the requirement of greater IT agility and by financial pressures. A study by 451 Research reveals that the greatest barrier to cloud migrations is the twin challenges of security and compliance in the hybrid cloud space. Organizations are struggling with practical considerations, which can prevent them from achieving some of the most important and valuable benefits of hybrid cloud deployments. This report details a number of steps that organizations can take to set themselves squarely on a path to a secure and compliant hybrid cloud.
Tags : 
security, compliance, hybrid cloud, best practices, cloud security, business intelligence, business management, cloud computing
    
HPE_OMG_7.16
Published By: Schneider Electric     Published Date: Aug 15, 2017
In today’s world of being “on” 24/7, data centers are at the core of business and viewed as the way to create competitive differentiation. Speed, efficiency, flexibility, and scale are now critical for winning the race to meet new connectivity and processing demands caused by the Internet of Things (IoT) and Big Data.
Tags : 
planning process, reference designs, cost analysis, design, site selection, schneider, electric
    
Schneider Electric
Published By: RSA     Published Date: Sep 19, 2017
The General Data Protection Regulation (GDPR) has been approved by the European Union and demands significant data protection safeguards to be implemented by organizations around the world. Learn how you can successfully prepare for GDPR with advice from Osterman Research.
Tags : 
gdpr, data protection, rsa, rsa security, personal data, privacy
    
RSA
Published By: SAP     Published Date: Jun 23, 2009
The Economist Intelligence Unit examines the lessons learned from the current financial crisis, and proposes ten practical lessons that could help to address perceived weaknesses in risk identification, assessment and management.
Tags : 
recession, sap, economist, risk management, risk, recovery, risk identification, crisis, towers perrin, kpmg, incentive, senior executives, risk officer, cro, human judgment, value-at-risk, var, stress test, enterprise applications, platforms
    
SAP
Published By: SAP     Published Date: Jun 27, 2009
As corporations become more dependent on their ERP systems, they struggle to strike the right balance between regularly updating the software and minimizing cost and disruption to the business. This Report offers advice on how to develop and communicate a practical upgrade strategy and then build an effective process for maintaining your ERP asset.
Tags : 
sap, business intelligence, erp, sme, shipping, transportation, enterprise applications, enterprise, resources, infrastructure
    
SAP
Published By: SAP     Published Date: Sep 10, 2010
The forces of consumerization are sweeping over the mobile world, with workers bringing their personal devices into the office and increasingly asking for IT support for those devices. How you respond to this challenge will say a lot about the mobile environment of your organization as a whole, and a lot as well about just how productive these mobile users can be. This strategic PlayBook and accompanying Webcast will offer you very practical ways to grab hold of this mobile trend of consumerization and help your mobile workers to be more effective and productive.
Tags : 
sap, consumer mobile devices, iphone, adoption, mobility, wireless, smartphones
    
SAP
Published By: 123Together     Published Date: Sep 10, 2008
You understand the value Microsoft Exchange Server can bring to your company but the internal deployment delays, administrative complexity and cost of Exchange just isn't practical. Business and technical executives strive to find time to focus on running their business and avoid the distractions of managing a 24X7 application such as Exchange. The time and expense of running a Microsoft Exchange Server in-house may simply be too much for a company your size.
Tags : 
123together, it strategies, contact management, email, economy, stability, collaboration, green it, outsourcing, outsource, outsourcing, microsoft exchange, hosted exchange, mobile services
    
123Together
Published By: HP & Intel     Published Date: Feb 18, 2012
This guide provides practical information to help you prepare your data center for the cloud with Unified Networking, scaled-out storage, trusted server pools, and intelligent power management.
Tags : 
    
HP & Intel
Published By: ReadyTalk     Published Date: Sep 19, 2014
Recently, ReadyTalk, a leading provider of conferencing and webinar services, answered 20 content marketing and webinar questions. The questions came directly from webinar participants; marketers just like you who wanted practical, actionable advice.
Tags : 
webinars, qualified, leads, generation, strategy, marketing, investment, time, best practices, tools, target audience, business, sales cycle, aid, day-of, actionable, conferencing, questions, practical
    
ReadyTalk
Published By: BlackBerry Cylance     Published Date: Jul 02, 2018
The information security world is rich with information. From reviewing logs to analyzing malware, information is everywhere and in vast quantities, more than the workforce can cover. Artificial intelligence (AI) is a field of study that is adept at applying intelligence to vast amounts of data and deriving meaningful results. In this book, we will cover machine learning techniques in practical situations to improve your ability to thrive in a data driven world. With clustering, we will explore grouping items and identifying anomalies. With classification, we’ll cover how to train a model to distinguish between classes of inputs. In probability, we’ll answer the question “What are the odds?” and make use of the results. With deep learning, we’ll dive into the powerful biology inspired realms of AI that power some of the most effective methods in machine learning today. Learn more about AI in this eBook.
Tags : 
artificial, intelligence, enterprise
    
BlackBerry Cylance
Published By: BlackBerry Cylance     Published Date: Jul 02, 2018
Artificial intelligence (AI) technologies are rapidly moving beyond the realms of academia and speculative fiction to enter the commercial mainstream, with innovative products that utilize AI transforming how we access and leverage information. AI is also becoming strategically important to national defense and in securing our critical financial, energy, intelligence, and communications infrastructures against state-sponsored cyberattacks. According to an October 2016 report issued by the federal government’s National Science and Technology Council Committee on Technology (NSTCC), “AI has important applications in cybersecurity, and is expected to play an increasing role for both defensive and offensive cyber measures.” Based on this projection, the NSTCC has issued a National Artificial Intelligence Research and Development Strategic Plan to guide federally-funded research and development. The era of AI has most definitely arrived, but many still don’t understand the basics of this im
Tags : 
artificial, intelligence, cybersecurity, machine
    
BlackBerry Cylance
Published By: SAS     Published Date: Mar 06, 2018
Information on artificial intelligence (AI) is flooding the market, media and social channels. Without doubt, it’s certainly a topic worth the attention. But, it can be difficult to sift through market hype and grandiose promises to understand exactly how AI can be applied in practical and reliable solutions. Like most technological advances, incorporating new technology into business processes requires significant leadership and effective direction that all stakeholders can easily understand.
Tags : 
    
SAS
Published By: Schneider Electric     Published Date: Jun 04, 2014
While many who invest in Data Center Infrastructure Management (DCIM) software benefit greatly, some do not. Research has revealed a number of pitfalls that end users should avoid when evaluating and implementing DCIM solutions. Choosing an inappropriate solution, relying on inadequate processes, and a lack of commitment / ownership / knowledge can each undermine a chosen toolset’s ability to deliver the value it was designed to provide. This paper describes these common pitfalls and provides practical guidance on how to avoid them.
Tags : 
schneider, electric, dcim, solution, invest, infrastructure, management, software, it management, data management
    
Schneider Electric
Published By: Schneider Electric     Published Date: Jun 04, 2014
70% of data center outages are directly attributable to human error according to the Uptime Institute’s analysis of their “abnormal incident” reporting (AIR) database1. This figure highlights the critical importance of having an effective operations and maintenance (O&M) program. This paper describes unique management principles and provides a comprehensive, high-level overview of the necessary program elements for operating a mission critical facility efficiently and reliably throughout its life cycle. Practical management tips and advice are also given.
Tags : 
schneider, electric, data, center, facility, operations, maintenance, management, it management, knowledge management, business technology, data center
    
Schneider Electric
Published By: Click Forensics     Published Date: Aug 13, 2008
In this webinar presentation given by Andy Sweet, Owner, New Tune Media, and Matt Graham, Risk Analyst, Click Forensics, learn practical tips on ways to proactively reduce exposure to click fraud and poor quality traffic in search marketing campaigns.  Also includes a real advertiser’s perspective on driving better traffic quality.  Listen now!
Tags : 
click forensics
    
Click Forensics
Published By: McAfee Inc     Published Date: Aug 19, 2009
If you're in IT, you understand all too well the challenge of competing priorities. Security is important-but so are all of your other jobs. That's why McAfee offers a practical approach to managing security and lays out an approach for managing security in just 15 minutes a day. Read more.
Tags : 
mcafee, security, pci, hipaa, epolicy orchestrator, the eu directive, compliance, security tools, sans, data protection, dlp, midmarket, compliance, availability, email security
    
McAfee Inc
Start   Previous    7 8 9 10 11 12 13 14 15 16 17 18 19 20 21    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

“I am the Inspector Morse of IT journalism. I haven't a clue. D'oh” - Mike Magee