ngo

Results 251 - 275 of 364Sort Results By: Published Date | Title | Company Name
Published By: CSB by Cornerstone on Demand     Published Date: Jun 26, 2013
Need to fix your company's performance management? Want to make woeful performance reviews a thing of the past? Collect actually useful data and actually use it? Build a robust people strategy? Ensure your company's ongoing success? Take over the world (of successful performance management)? Download this paper to learn more.
Tags : 
performance management, human resources
    
CSB by Cornerstone on Demand
Published By: Silver Peak     Published Date: Dec 31, 9999
Offsite data replication is key to ensuring ongoing business operations, but it can be complex and costly, especially when performed over long distances. Join this discussion to discover how you can apply fast, cost effective and reliable remote replication that can: • Meet Recovery Point Objectives (RPO) by reducing remote replication times by up to 20X • Reduce bandwidth costs and extend replication distances • Lower storage costs while increasing storage flexibility • Leverage emerging cloud and virtualization technologies for better offsite disaster recovery Hear from the experts and users at Dell Compellent, Silver Peak and AlaskaUSA discuss essential data replication strategies and technologies.
Tags : 
offsite data, remote replication, reliable, storage flexibility, cloud, virtualization, technology, offsite disaster recovery, security, knowledge management, storage
    
Silver Peak
Published By: Silver Peak     Published Date: Oct 28, 2013
Offsite data replication is key to ensuring ongoing business operations, but it can be complex and costly, especially when performed over long distances. Join this discussion to discover how you can apply fast, cost effective and reliable remote replication that can: • Meet Recovery Point Objectives (RPO) by reducing remote replication times by up to 20X • Reduce bandwidth costs and extend replication distances • Lower storage costs while increasing storage flexibility • Leverage emerging cloud and virtualization technologies for better offsite disaster recovery Hear from the experts and users at Dell Compellent, Silver Peak and AlaskaUSA discuss essential data replication strategies and technologies.
Tags : 
silver peak, data, data replication, remote, optimize, rpo, business operations, disaster recovery, data center design and management
    
Silver Peak
Published By: IBM     Published Date: Jun 17, 2014
Uncertain times and a volatile economic climate have contributed to an expanding focus on corporate governance, risk, and compliance (GRC) across all industries. As global mandates and compliance directives continue to snowball, organizations are faced with an imminent need to adopt a programmatic approach and tightly integrate risk management initiatives with ongoing business processes. Business intelligence and reporting also provide a powerful mechanism for gaining a deep understanding of key factors that impact corporate performance.
Tags : 
ibm, corporate governance, risk, compliance, grc, erm, risk management, business analytics, business intelligence
    
IBM
Published By: Adobe     Published Date: Mar 16, 2016
Competition is the number one pressure faced by today’s HCM teams – by a 69% margin! Of all the pressures that contemporary HR teams face, finding and keeping quality talent ranks above everything else. As a part of that, Best-in-Class organizations need to focus on optimizing the employment experience, from hiring and onboarding, to ongoing management and transition. This report from Aberdeen explores how electronic signature solutions, as well as other digital HR technologies, can improve the employment experience throughout the journey. Read this report to learn: • Why Best-in-Class HR departments are investing in employee-friendly technologies • How digital solutions can impact employee experience, and why that matters for HR • How electronic signatures complement HRIS applications and streamline many HR processes
Tags : 
hr organizations, hris, esignature, customer management, sales effectiveness, human capital management, knowledge management
    
Adobe
Published By: Aerohive Networks     Published Date: May 27, 2014
Learn how a controller-less wireless architecture will provide significant benefits over the traditional-controller-based model in terms of deployment simplicity, ongoing management, and cost..
Tags : 
aerohive, wi-fi, wlan, wireless lan, 802.11ac, gigabit speed wi-fi, cloud, byod, mobile device management, mdm, mobility, access point, aps, controllers, wireless, pos, cloud managed, guest access, it management
    
Aerohive Networks
Published By: Alert Logic     Published Date: Jun 12, 2014
New security threats are emerging all the time, from new forms of malware and web application exploits that target code vulnerabilities to attacks that rely on social engineering. Defending against these risks is an ongoing battle. Download to learn more!
Tags : 
cloud security, vulnerability management, vulnerabilities, patching, patch management, security, it management
    
Alert Logic
Published By: Alert Logic     Published Date: Jun 12, 2014
While e-commerce remains a relatively small percentage of overall retail spending (rates vary by country, but are generally in the 5–10% range), it continues to grow. The ongoing growth of e-commerce suggests that one of the initial objections to online shopping—concerns about whether consumer personal information would be secure—has been largely overcome. Standards like PCI, and payment services like PayPal, along with a general increase in security awareness, have gone a long way to change the perception of online shopping. Learn more about Information Security in the E-commerce Sector.
Tags : 
cloud security, cloud e-commerce, cloud pci, e-commerce security, compliance, it management
    
Alert Logic
Published By: Alert Logic and Rackspace     Published Date: Jun 20, 2014
Defending against application security threats is an ongoing battle. With new threats emerging every day, this whitepaper provides insight into how to leverage threat and log management technologies to protect your IT assets throughout their vulnerability life cycle.
Tags : 
alert logic, rackspace, pci, pci dss, payment security, compliance, vulnerability life cycle, security, it management
    
Alert Logic and Rackspace
Published By: Alert Logic and Sungard Availability Services     Published Date: Jun 20, 2014
Defending against application security threats is an ongoing battle. With new threats emerging every day, this whitepaper provides insight into how to leverage threat and log management technologies to protect your IT assets throughout their vulnerability life cycle.
Tags : 
alert logic, sungard, pci, pci dss, payment security, compliance, vulnerability life cycle, security, it management
    
Alert Logic and Sungard Availability Services
Published By: IBM     Published Date: Mar 28, 2016
The rise of social media, coupled with the desire to build more engaged and productive workforces, has brought “active employee listening” to the forefront of management attention. No longer is it enough to encourage employees to speak up about topics that matter to them. Organizations today need to more actively solicit, analyze and engage in ongoing conversations with past, present and even future employees. Having access to the collective “employee voice” can help leaders achieve diverse goals, including identifying innovations, preventing discord and improving productivity, as well as building a better connection to the organization and its mission. So, how can organizations establish and manage mutually beneficial listening programs? To better understand what companies are doing in the area of employee listening and the extent to which employees are willing to participate, we analyzed data from the 2015 IBM Smarter Workforce Institute WorkTrends Survey – a broad-based survey of ov
Tags : 
ibm, ibm smarter workforce, work trends, employee engagement, human resource technology
    
IBM
Published By: IBM     Published Date: Jul 20, 2016
The rise of social media, coupled with the desire to build more engaged and productive workforces, has brought “active employee listening” to the forefront of management attention. No longer is it enough to encourage employees to speak up about topics that matter to them. Organizations today need to more actively solicit, analyze and engage in ongoing conversations with past, present and even future employees. Having access to the collective “employee voice” can help leaders achieve diverse goals, including identifying innovations, preventing discord and improving productivity, as well as building a better connection to the organization and its mission. So, how can organizations establish and manage mutually beneficial listening programs?
Tags : 
ibm, ibm smarter workforce, work trends, employee engagement, human resource technology
    
IBM
Published By: AWS     Published Date: Jul 10, 2019
Being able to monitor and respond to patient inquiries quickly and effectively is critical to creating a positive clinical experience and delivering successful products. But compiling and monitoring this data to address customer concerns in a timely way is a challenge when you have disparate sources and systems, global teams, and multiple patients. Read how a top 10 global pharmaceutical company worked with Slalom and AWS to design and implement a unified and globally distributed event and inquiry data reporting system. By combining three types of requests into one solution, the company has improved the customer experience and increased call center and data input operational efficiency by 50%. Learn how to Increase access to relevant data to help inform future or ongoing clinical trials Adapt your existing system development processes to an agile approach Engage with Slalom and AWS throughout the lifecycle of a healthcare engagement
Tags : 
    
AWS
Published By: IBM     Published Date: Aug 22, 2014
The ongoing processes of managing collateral, loan covenants and monitoring borrowers' financial condition are key to ensuring that banks are in the best position to minimize loss.
Tags : 
credit risk management, managing collateral, financial monitoring, risk analytics
    
IBM
Published By: IBM MaaS360     Published Date: Feb 05, 2015
Produced in conjunction with Integrated Solutions for Retailers, this National Retail Foundation (NRF) 2014 guide explores why mobile device, app and content management are critical components of success for large scale mobile deployment and ongoing security management.
Tags : 
mobile solutions, roi, mobile deployment, mobile security management, mobile hardware, it management, knowledge management, enterprise applications
    
IBM MaaS360
Published By: BlackBerry Cylance     Published Date: Jul 02, 2018
Matthew Coy, Safelite’s Vice President of Information Technology, is responsible for overseeing all aspects of the company’s IT infrastructure, including selecting, administering, and supporting technology products. The company handles personally identifiable information, including credit card information and insurance data collected from several sources, and must comply with insurance industry regulations and the Payment Card Industry Data Security Standard. Safelite is the target of constant external attacks. The organization experienced ongoing security issues stemming from infected software, drivebys and other malicious downloads. According to Matthew, “A lot of malware and email viruses were making it through the environment, all bypassing our email security and AV.” Not only were the security controls ineffective, the previous AV platform required nearly 150 hours per week to manage. Matthew knew Safelite needed to make a change, and fast. Having worked with Cylance® at two previous companies, he was confident CylancePROTECT® could significantly improve Safelite’s endpoint security. Read the full case study to learn about the results Cylance was able to deliver.
Tags : 
safe, lite, cybersecurity, data
    
BlackBerry Cylance
Published By: SAS     Published Date: Mar 06, 2018
Despite heavy, long-term investments in data management, data problems at many organizations continue to grow. One reason is that data has traditionally been perceived as just one aspect of a technology project; it has not been treated as a corporate asset. Consequently, the belief was that traditional application and database planning efforts were sufficient to address ongoing data issues.
Tags : 
    
SAS
Published By: IBM     Published Date: Mar 04, 2014
The age of the customer. Possibly no term better illustrates the current era of business. Customers expect their experience to be flawless at every touchpoint, and with competitors only a click (or tap) away, company leaders have a strong incentive to deliver. Online retailers have set a high standard in the way that they engage customers on an ongoing basis—not just during the commercial transaction, but before, during and after each interaction with the customer. Can service providers in industries such as banking, insurance, healthcare and government meet the challenge?
Tags : 
business operations, business process management, bpm, process automation, smarter process, age of customer, business activity monitoring, business analytics, business process automation, corporate portals, document management, information management, records management, search and retrieval, search engines
    
IBM
Published By: Qualys     Published Date: Jan 08, 2015
Drivers for cloud solutions include the need to innovate, simplify and cut costs. Users say a key benefit cloud-based security is no need to deploy equipment or software. The cloud provider furnishes and hosts everything in secure data centers. This arrangement lets your business avoid capital expenses and to control ongoing costs. This paper describes how your small or medium-sized company can manage IT risks and maintain regulatory compliance with minimal staff and budget.
Tags : 
cloud solutions, security, secure data centers, it risks, compliance
    
Qualys
Published By: Information Shield     Published Date: Jan 13, 2009
Information security policy development should not be a one-time event. In order to effectively reduce risk and maintain a proper governance structure, organizations must periodically update written security policies as part of an ongoing management process.
Tags : 
information shield, legal exposure, iso/iec, security policies, security framework, hipaa, sarbanes-oxley act, iso 17799, iso 27002, security policy, sample security policy, policies and procedures, pci-dss, regulatory compliance, security, it management, security management, hipaa compliance, sarbanes oxley compliance
    
Information Shield
Published By: iCims     Published Date: Sep 04, 2013
Contingent workers are those who do not have an implicit or explicit contract for ongoing employment. According to the Bureau of Labor Statistics, contingent labor accounts for over 26% of the US labor force and expects continual growth beyond 2020. Contingent workers provide a variety of benefits to an organization: Easily add headcount to projects that need temporary assistance, have many workers with specific skills at your disposal.
Tags : 
best practices for hiring, onboarding, contigent workforce, icims, talent platform, capture talent, build relationships with candidates, human resource technology
    
iCims
Published By: K2     Published Date: Jan 07, 2016
We’re experiencing a data explosion. By 2020 the data we create and copy annually will reach 44 trillion gigabytes.1 As this data disseminates into the workplace, companies add hardware and software systems to store, protect and manage it all. While data can help solve business problems, data is most helpful when it reaches those who can use it. Companies need to build Microsoft SharePoint apps that integrate with other line-of-business (LOB) systems so users can take full advantage of this data explosion. But the reality of creating apps that integrate data across organizational systems presents an intimidating challenge. To integrate multiple isolated data sources into an application that transforms data into useful information requires technical expertise, coding and ongoing maintenance. Integration also raises security and governance concerns. So it’s no surprise that only 47 percent of SharePoint users have connected their SharePoint apps with other systems.2 As a result, nearly
Tags : 
microsoft sharepoint, data integration, security, sharepoint solutions, networking, it management, knowledge management
    
K2
Published By: Rackspace     Published Date: Jan 19, 2016
Rackspace® Private Cloud Powered by OpenStack® is backed with our results-obsessed service known as Fanatical Support.® Our exceptional customer service means we’re in it with you every step of the way. From initial design to ongoing management for your production environment, we manage your cloud so you can focus on your core business.
Tags : 
rackspace, cloud, information technology, security, data center
    
Rackspace
Published By: Tripwire     Published Date: Aug 21, 2009
This paper covers the implementation, disclosure and ongoing evaluation of internal controls for SOX compliance with a focus on the role of IT, as well as the penalties for non-compliance.
Tags : 
sarbane oxly act, sarbanes oxley, sox, sarbox, sarbanes-oxley, financial, it management, audit, compliance, auditing, enron, tripwire, data management, best practices, itil, project management, software compliance, sarbanes oxley compliance
    
Tripwire
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.