hr experts

Results 1 - 25 of 59Sort Results By: Published Date | Title | Company Name

Centralized support for your solution environment

Published By: Cisco     Published Date: May 24, 2019
The Cisco Solution Support is part of the high-value services offering. Whether you have an issue with a Cisco product or one from a solution partner, just call us. We centralize support through our solution experts who own your case from first call to resolution. Your complex issues are solved on average 43% faster than with product support alone.
Tags : 
    
Cisco

Doing Business in Qatar

Published By: Qatar Financial Centre     Published Date: Jun 20, 2019
Qatar offers a thriving, state-of-the-art environment for organisations looking to capitalise on all the MENA region has to offer and expand their business in Qatar and beyond. The QFC is there every step of the way, helping with easy setup, access to experts from around the world and an unmatched taxation, legal and regulatory environment. The QFC also plays a key role in attracting foreign investment by providing a first-class legal system based on English common law, and a competitive location to grow revenue with one of the most compelling tax environments in the world.
Tags : 
    
Qatar Financial Centre

The Small Business Owner's Guide to Building, Running, and Growing a Business

Published By: Comcast Business     Published Date: Feb 16, 2017
When you’re running your own business, you have to wear many hats. But it’s tough to be an expert in everything from strategy to day-to-day execution across multiple functions: finance, operations, sales and marketing, HR, and more. This comprehensive guide offers tips and advice from a wide range of experts across to help you build, run, and grow your business effectively.
Tags : 
    
Comcast Business

HOW DIGITAL TRANSFORMATION ELEVATES HUMAN CAPITAL MANAGEMENT

Published By: Adobe     Published Date: Oct 05, 2016
Forbes Insights examined the ongoing transformation of HR through in-depth interviews with a number of senior executives and experts in North America and Europe, as well as third-party research.
Tags : 
    
Adobe

Accelerate Your Sales Performance

Published By: Adobe     Published Date: Oct 05, 2016
Forbes Insights examined the advantages of e-signatures through in-depth interviews with a number of senior executives and experts in North America and Europe, as well as third-party research.
Tags : 
sales performance, sales, e-signatures, document management, security, mobility
    
Adobe

HOW DIGITAL TRANSFORMATION ELEVATES HUMAN CAPITAL MANAGEMENT

Published By: Adobe     Published Date: Mar 21, 2017
This paper examines the ongoing transformation of HR through in-depth interviews with a number of senior executives and experts in North America and Europe, as well as third-party research.
Tags : 
    
Adobe

10 best practices for reducing spend in AWS

Published By: CloudHealth by VMware     Published Date: Apr 15, 2019
While cost is often cited as the reason why people move to the cloud, it's not always that simple. Many organisations have noticed cloud bills 2-3x higher than expectations, when not managed properly. Have you achieved the savings you expected? Learn 10 ways you can reduce your spend in AWS, including: Terminate Zombie Assets Rightsize EC2 Instances & EBS Volumes Upgrade instances to the latest generation Delete Disassociated Elastic IP Addresses Check out this eBook to find out how you can better manage your costs through pro-tips from cloud experts.
Tags : 
    
CloudHealth by VMware

Red Hat Enterprise Linux - datasheet

Published By: Red Hat     Published Date: Feb 25, 2019
Business-critical applications need a platform that is proven to be stable. Red Hat®Enterprise Linux® frees you to deliver meaningful business results through technology by providing exceptional reliability and military-grade security. With a Red Hat Enterprise Linux Server subscription, you gain access to the industry's most extensive ecosystem of partners, customers, and experts that supports and accelerates your success. Read the datasheet to learn more.
Tags : 
    
Red Hat

State of the Internet/ Security Report – Q2, 2016

Published By: Akamai Technologies     Published Date: Sep 27, 2016
Learn about the origins, tactics, types, and targets of cyber- attacks and emerging threats and trends from post-attack analysis and intelligence by cybersecurity and DDoS mitigation experts. Includes quarter-over-quarter and year-over-year trends, plus spotlights on recent DDoS and web application attacks and review of the past quarter’s hot-topic issues in cybersecurity.
Tags : 
akamai, state of the internet, security, security report, cybersecurity, ddos, analytics, networking, knowledge management, enterprise applications, business technology
    
Akamai Technologies

Avoiding Time Wasters in the Workplace

Published By: Skillsoft     Published Date: Dec 07, 2016
There are many potential threats to your time and productivity in a typical workday. In this sample lesson from our new Improving Your Personal Productivity Business Skills course, learn how to eliminate the most common time wasters at work. Skillsoft's new line of business skills courses are designed for the modern learner. We’ve created fresh, new business skills videos in a variety of formats including scenario-based storytelling, animation, and panel discussions with subject matter experts. Watch a sample course, Avoiding Time Wasters in the Workplace.
Tags : 
video courses, business skills courses, knowledge management
    
Skillsoft

Modernizing Data Protection for the Digital Business

Published By: Veritas     Published Date: Jan 04, 2019
The digital business continues to evolve. Investments in data analytics projects lead the way while traditional, proprietary infrastructures are being disrupted by cloud, open source and hyperconverged paradigms. These changes are forcing IT leaders to contend with greater workload diversity in the midst of tightening budgets. And while the workload [or] IT landscape is changing, the need for reliable data protection remains as crucial as ever to protect against, data corruption, human error, and malicious threats such as ransomware. Learn how Veritas can help you navigate through these obstacles. Join us to hear experts from ESG and Veritas discuss how the right data protection solution today can prepare you for tomorrow's business demands. You will learn: The key trends that are driving change in the digital business The most common causes of data loss in tomorrow’s multi-cloud data centers How to protect an increasingly diverse environment with minimal operational overhead
Tags : 
    
Veritas

How to Thrive in the Digital Economy — Insights from API Program Experts

Published By: Google Apigee APAC     Published Date: Jun 10, 2019
How Six Companies Innovate with API Management Companies are hungry for ways to innovate in the digital age, and as enterprises have experimented with new technologies, it’s become clear that success requires expanding the reach of digital assets beyond a business’s internal talent. The connected experiences that customers demand occur across a range of channels, and the people building those experiences can be a developer building a mobile app in her garage just as easily as an IT engineer. Businesses need to make their digital assets leverageable to more developers so they can build more digital experiences across more channels, scalably and securely, to engage more customers. In this brief, we explore the diverse ways that innovation leaders have leveraged APIs to transform the way their companies do business. Download this brief to learn more about how to use the power of APIs to open new business channels for your company.
Tags : 
    
Google Apigee APAC

‘Integrated Learning' Gets Real

Published By: Workday     Published Date: Mar 02, 2018
The experts agree: Workplace learning can no longer be an "out there," disconnected processit has to be tightly and carefully woven into a worker's experience, integrated into the fabric of the modern workplace. Read the article to discover how three leading experts see the future of workplace learning unfolding today.
Tags : 
integrated learning, worker experience, modern workplace
    
Workday

'Integrated Learning' Gets Real

Published By: Workday     Published Date: Mar 19, 2018
The experts agree: Workplace learning can no longer be an "out there," disconnected processit has to be tightly and carefully woven into a worker's experience, integrated into the fabric of the modern workplace. Read the article to discover how three leading experts see the future of workplace learning unfolding today.
Tags : 
workplace learning, worker experience
    
Workday

Data Sharing and Analytics Drive Success with IoT

Published By: Teradata     Published Date: May 02, 2017
To understand the challenges and opportunities with the Internet of Things, MIT Sloan Management Review’s 2016 Global Executive Study conducted a comprehensive study with business executives, managers, and IT professionals globally. Through the survey results and interviews with subject matter and industry experts, MIT Sloan Management Review was able to reveal the business value and competitive issues from the Internet of Things (IoT). This comprehensive report dives into data sharing with competitors, analytic talent management, and the intersection with governing the data. Analytics is unsurprisingly is shown as the key to IoT success.
Tags : 
data, sharing, analytics, iot, mit
    
Teradata

10 Best Practices for Reducing Spend in AWS

Published By: CloudHealth by VMware     Published Date: Feb 13, 2019
While cost is often cited as the reason why people move to the cloud, it's not always that simple. Many organizations have noticed cloud bills 2-3x higher than expectations, when not managed properly. Have you achieved the savings you expected? Learn 10 ways you can reduce your spend in AWS, including: -Terminate Zombie Assets -Rightsize EC2 Instances & EBS Volumes -Upgrade instances to the latest generation -Delete Disassociated Elastic IP Addresses Check out this eBook to find out how you can better manage your costs through pro-tips from cloud experts.
Tags : 
cloud management, amazon web services, multicloud management, amazon ec2
    
CloudHealth by VMware

Ransomware and New Threat Vectors for ICS/SCADA Networks

Published By: CyberX     Published Date: Aug 21, 2017
Today, a range of diverse cyber-adversaries — including nation-states, cybercriminals, competitors, hacktivists, and insiders/contractors — pose financial, reputational and regulatory risk to industrial and critical infrastructure organizations. The business impact can include costly production downtime, safety failures, and environmental release of hazardous materials, as well as theft of corporate secrets such as sensitive information about formulas and proprietary manufacturing processes. The challenge is compounded as organizations adopt digitization initiatives and IT/OT convergence to support the business — removing any “air-gaps” that may have existed in the past. To help security and operations teams stay ahead of the latest ICS/SCADA threats, CyberX — the industrial cybersecurity company founded by military cyber experts with nation-state experience securing critical infrastructure — has partnered with SANS to create educational content about emerging ICS threat vectors and
Tags : 
ics, scada, cyberx, cyber security, hacking, randomware
    
CyberX

How to Make Your Software Security Program Successful

Published By: CheckMarx     Published Date: Apr 03, 2019
As new code deployments accelerate through wider adoption of DevOps methodology, maintaining software security is crucial to you and your customers. Is your software security program up to the challenge? If you’re not getting the most out of your software security program, our security experts may be able to diagnose your difficulties. We’ve created a list of specific recommendations on how to improve your program for better, faster results. We present to you “How to make your software security program successful: 10 Essential Best Practices.”
Tags : 
    
CheckMarx

GDPR compliance in a data-driven world

Published By: SAS     Published Date: May 24, 2018
Compliance doesn’t have to be a scary word, even when facing the multifaceted challenges of the European Union’s General Data Protection Regulation. In fact, following through with plans for sustainable GDPR compliance can have many long-term benefits for your organization. That's because relying on data-driven decisions across the board sets you on track to gain a competitive edge. In February 2018, SAS conducted a survey with 183 global, cross-industry businesspeople involved with GDPR at their organizations. Based on the survey results, this e-book delves into the biggest challenges and opportunities organizations have faced on the road to GDPR compliance. Read on for advice from industry experts about the best path to compliance. Learn what steps your peers across a variety of industries have already taken and discover how an integrated approach from SAS can continue to guide your journey toward GDPR compliance.
Tags : 
    
SAS

September 2012 Global Threat Report

Published By: ESET     Published Date: Sep 21, 2012
Get the most up-to-date view of the IT security threat landscape from the experts at ESET. This monthly threat report is required reading for anyone involved with IT Security.
Tags : 
security threat, eset, it security, security, business technology
    
ESET

‘Integrated Learning' Gets Real

Published By: Workday     Published Date: Oct 11, 2018
The experts agree: Workplace learning can no longer be an "out there," disconnected process- -it has to be tightly and carefully woven into a worker's experience, integrated into the fabric of the modern workplace. Read the article to discover how three leading experts see the future of workplace learning unfolding today.
Tags : 
    
Workday

ROI Videoconferencing Tips

Published By: LifeSize, a division of Logitech     Published Date: Jan 12, 2011
ROI helps facilitate project approvals internally and can be used as a catalyst for value derived through implementation of a product. Value can be derived from hard dollar savings, improving time to market for your own product or service, bring experts together in a "virtual" room, and in other ways.
Tags : 
lifesize, videoconferencing, roi, telecommunication, ip networks, ip telephony, call center management, call center software, customer interaction service, customer relationship management, customer satisfaction, customer service, video conferencing, voice recognition, voice over ip
    
LifeSize, a division of Logitech

Internet Security Threat Report

Published By: Symantec     Published Date: Nov 19, 2014
This year’s ISTR once again covers the wide-ranging threat landscape, with data collected and analyzed by Symantec’s security experts.
Tags : 
internet security, istr, cybercrime, internet security trends, anti spam, anti spyware, anti virus, application security, email security, firewalls, hacker detection, high availability, security management, security policies, business technology
    
Symantec

Is the Future of Enterprise Security in Managed Services?

Published By: F5 Networks Inc     Published Date: Jan 31, 2017
In a world where IT has become increasingly complex, cyber threats are unrelenting, and the cost to mitigate is becoming overwhelming, organizations are reconsidering the DIY approach to security and embracing the idea of outsourced security services. And while there are caveats to outsourcing security services, many organizations are reaping the OpEx and CapEx benefits while freeing themselves from becoming in-house security experts - refocusing on their core business. Read the whitepaper to learn more.
Tags : 
enterprise security, managed services, security
    
F5 Networks Inc
Start   Previous   1 2 3    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.