> Research Library > Technology > Enterprise Applications
 

Enterprise Applications

Enterprise Application software performs business functions such as accounting, production scheduling, customer information tracking, bank account maintenance, and the like. It is almost always hosted on servers, and is used by multiple employees of the same organization. Major subcategories include ERP, CRM, and SCM.
Results 151 - 175 of 2738Sort Results By:Published Date | Title | Company Name
White Paper Published By: Xactly Corp     Published Date: Oct 31, 2016
In the eBook, you will learn: - How best of breed and suite differ in capabilities and service - Why Xactly is important to all departments of your organization - Common myths associate with best of breed applications - Xactly’s best of breed partners
Tags : 
xactly, best of breed, software vendors, best of breed partners, knowledge management
    
Xactly Corp
White Paper Published By: Xactly Corp     Published Date: Oct 31, 2016
In this report, you will discover: - Why spreadsheets are working against you and de-motivating your team - A spreadsheet “health diagnosis” checklist - How incentive plans can drive behavior with better accuracy and objectivity
Tags : 
actly, strategy, spreadsheets, incentive spans, enterprise applications
    
Xactly Corp
White Paper Published By: Adobe     Published Date: Oct 31, 2016
Invest in the future of every student. For a secure future, your students need to not only speak the language of digital, but they have to be well versed in it. Read Growing Digital and learn how you can give your students the skills to create opportunities that will pay dividends long after graduation.
Tags : 
adobe, education, digital, enterprise applications
    
Adobe
White Paper Published By: Veracode     Published Date: Oct 28, 2016
The Ultimate Guide to Getting Started with Application Security Application-layer attacks are growing much more rapidly than infrastructure attacks. Yet many organizations remain hesitant to create an application security program, believing it will require excessive time and resources. The reality is that any organization, of any size, can and should develop an applications security program. Download the Ultimate Guide to Getting Started With Application Security now for details!
Tags : 
veracode, security, devops, appsec, application security
    
Veracode
White Paper Published By: Veracode     Published Date: Oct 28, 2016
Trends and Tactics: How IT Professionals are Approaching AppSec Today
Tags : 
veracode, security, devops, appsec, enterprise applications
    
Veracode
White Paper Published By: Veracode     Published Date: Oct 28, 2016
Web application attacks are the most frequent pattern in confirmed breaches. But many security budgets don’t line up with this risk. Getting the budget for AppSec won’t be easy, but now is the time to make the case. Download this e-book to find out the reasons why AppSec is the most productive security spend.
Tags : 
veracode, security, devops, appsec, enterprise applications
    
Veracode
White Paper Published By: Veracode     Published Date: Oct 28, 2016
DevOps practices, while relatively new, are spreading rapidly. And there are sound business reasons for executives to embrace these changes. This e-book from Veracode provides background into the evolution of DevOps and proposes five principles that must be addressed for those seeking to integrate AppSec into DevOps.
Tags : 
veracode, security, devops, appsec, enterprise applications
    
Veracode
White Paper Published By: IBM     Published Date: Oct 28, 2016
Interest in analytics and storytelling through data in HR is booming. But, much of HR is just beginning its journey to create an effective analytics function.
Tags : 
ibm, kenexa, talent insights, talent analytics, workforce analytics
    
IBM
Webinar Published By: IBM     Published Date: Oct 28, 2016
Watch this complimentary, on-demand 30 minute demo to see how you can: - Use HR analytics to redefine the way you manage your talent and help drive better business results. - Gain deep insights from your talent data without having to dig through mountains of reports. - Know exactly what data to explore to get the very best answers to your talent questions. - Answer your CEO's questions about the workforce in minutes, not months.
Tags : 
ibm, kenexa, talent insights, talent analytics, knowledge management
    
IBM
Webinar Published By: IBM     Published Date: Oct 28, 2016
What if an analytics system learned and continue to learn as it experienced new information, new scenarios, and new responses? This is referred to as cognitive computing and is key to providing an analytics system that is easy to use but extremely powerful. Listen to this webinar, led by Jackie Ryan, the Director of Product Management for IBM's Smarter Workforce Portfolio, and learn about: The evolution of cognitive computing How cognitive computing transforms HR How to get started with cognitive talent analytics
Tags : 
ibm, kenexa, talent insights, talent analytics, knowledge management
    
IBM
White Paper Published By: IBM     Published Date: Oct 28, 2016
Every job opening brings an opportunity for your business to build its brand. Giving job candidates great experiences could motivate them to become your brand ambassadors—regardless of whether you make an offer.
Tags : 
ibm, kenexa, talent acquisition, candidates, hiring
    
IBM
White Paper Published By: IBM     Published Date: Oct 28, 2016
A retail perspective to raise rehire rates The IBM Smarter Workforce Institute has undertaken analyses of rehire rates as well as the use of hiring metrics to help HR professionals and hiring managers in the retail industry improve their recruitment performance. Read this paper and discover: - Which metrics impact rehire rates - Which hiring effectiveness metrics are being used in retail - How retail could increase rehire rates
Tags : 
ibm, kenexa, talent acquisition, retail, hiring
    
IBM
White Paper Published By: IBM     Published Date: Oct 28, 2016
Recruiters have to think like marketers. Just as a marketer needs to attract customers, a recruiter needs to attract the skilled employees the company needs. To do this, recruiters must become marketers. Marketers and recruiters must: - Research the market - Establish and nurture relationships - Build and promote the company's brand Read this for seven tips to help you think like a marketer.
Tags : 
ibm, kenexa, talent acquisition, marketer's playbook, recruiters
    
IBM
White Paper Published By: IBM     Published Date: Oct 28, 2016
Download the report and learn: - What is driving interest in employee listening - How to build a program that employees will want to participate in - How organizations can build their listening capabilities - Recommendations for building an employee listening program
Tags : 
ibm, engagement social, employee engagement, kenexa, employee voice
    
IBM
White Paper Published By: IBM     Published Date: Oct 28, 2016
This white paper highlights factors that have a decisive influence on the design and effectiveness of employee engagement programs.
Tags : 
ibm, engagement social, employee engagement, kenexa, engagement program
    
IBM
Webinar Published By: IBM     Published Date: Oct 28, 2016
In this webinar, you will learn: - How to create a safe environment for honest feedback so it’s an invitation, not an imposition - Best practices for collecting feedback, from unstructured conversations to regular pulse surveys - What to do with the data you’ve collected, and how to use insights to create action plans that result in happier employees and better business performance
Tags : 
ibm, engagement social, employee engagement, kenexa, knowledge management
    
IBM
White Paper Published By: Veracode     Published Date: Oct 27, 2016
Veracode’s State of Software Security report provides security practitioners with tangible Application Security benchmarks with which to measure their own programs against. The metrics presented here are based on real application risk postures, drawn from code-level analysis of billions of lines of code across 300,000 assessments performed over the last 18 months. Download the report now!
Tags : 
veracode, security, software security, application security, security benchmark
    
Veracode
White Paper Published By: IBM     Published Date: Oct 27, 2016
A unique point-of-view prepared by IBM Digital Foundation services on how we can help improve application and system performance while reducing costs
Tags : 
ibm, leadership, ibm digital foundation, innovation, system performance
    
IBM
White Paper Published By: IBM     Published Date: Oct 27, 2016
Learn How IBM helped a leading bank's IT organization focus on innovation and strategic projects while massively reducing costs and streamlining operations
Tags : 
ibm, leadership, innovation, strategic planning, streamlining operations
    
IBM
White Paper Published By: IBM     Published Date: Oct 27, 2016
The benefits of modernization are compelling, but more than half of these projects fail. Most businesses lack the expertise, time and resource to undertake successful modernization efforts. How can you ensure you avoid these common mistakes? Find out the 4 top reasons why modernization fails in our Slideshare.
Tags : 
ibm, leadership, innovation, modernization, knowledge management
    
IBM
White Paper Published By: IBM     Published Date: Oct 27, 2016
IBM Analytics for Apache Spark for Bluemix is an open-source cluster computing framework with in-memory processing to speed analytic applications up to 100 times faster compared to other technologies on the market today. Optimized for extremely fast and large scale data processing-you can easily perform big data analysis from one application.
Tags : 
ibm, apache spark, bluemix, analytics, enterprise applications
    
IBM
White Paper Published By: Veracode     Published Date: Oct 26, 2016
As software applications are increasingly distributed through cloud and mobile platforms, the risk of vulnerabilities affecting enterprises rises. This whitepaper provides advice for secure development and delivery of applications throughout the software development lifecycle.
Tags : 
veracode, security, application security, software applications, software development lifecycle
    
Veracode
White Paper Published By: Veracode     Published Date: Oct 26, 2016
Can DevOps be one of the most disruptive trends ever to hit application security, or even software development? DevOps enables developers to integrate security testing, validation and monitoring into both application development and deployment. Download this free whitepaper now to review the components of the current DevOps framework and how to put security into the processes of DevOps.
Tags : 
veracode, security, devops, application security, enterprise applications
    
Veracode
White Paper Published By: Veracode     Published Date: Oct 26, 2016
Web and mobile applications are now top attack vectors for cyber attackers, accounting for more than a third of data breaches. As a result, securing the application layer has now become a high priority for enterprises. Enterprise application security testing solutions for Web, native, cloud and mobile applications are key to this strategy. In the latest Gartner 2015 Magic Quadrant for Application Security Testing, Veracode has been positioned as a Leader for the third year in a row based on our completeness of vision and ability to execute in the AST market. Download the report for more on why Veracode's automated cloud-based service is in Gartner's “Leaders” quadrant.
Tags : 
veracode, gartner, magic quadrant, application security testing, security
    
Veracode
White Paper Published By: Veracode     Published Date: Oct 26, 2016
When a high-profile, or simply branded, vulnerability is disclosed, security teams are expected to abandon their planned activities and react. But, these responses can be time-consuming and costly. Even if the vulnerability is achieving mainstream awareness, enterprises need to balance responses against risk. Download this handy report for guidance on preparing for a high-profile vulnerability disclosure so risk-management or security teams can respond with the appropriate level of urgency.
Tags : 
veracode, security, vulnerability, high-profile vulnerability disclosure, vulnerability disclosure
    
Veracode
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

“I am the Inspector Morse of IT journalism. I haven't a clue. D'oh” - Mike Magee