hr systems

Results 251 - 275 of 331Sort Results By: Published Date | Title | Company Name

IBM PureFlex System Configurations

Published By: IBM     Published Date: Apr 04, 2013
IBM PureFlex Systems combine advanced IBM hardware and software with “patterns of expertise” and integrate them into three optimized configurations that are simple to acquire and deploy. Read the data sheet to learn more about configurations optimized for small businesses, application servers, and transactional and database systems.
Tags : 
ibm pureflex, system configurations, database configurations, patterns of expertise, integrate
    
IBM

8 Elements of Complete Vulnerability Management

Published By: SilverSky     Published Date: Apr 16, 2013
Threats to the security of your network will never completely go away, but the ability to prepare for, recognize and quickly remediate these threats should be a part of day-to-day company operations. This white paper gives you eight essentials for managing vulnerabilities in a network including internal and external assessments, how frequently you should run scans for threats and the importance of broadening testing beyond basic network services and operating systems.
Tags : 
vulnerability management, security, threat management, security, assessment, anti spam, anti spyware, anti virus, auditing, compliance, email security, encryption, hacker detection, high availability, identity management, intrusion detection, intrusion prevention, security management, data loss prevention
    
SilverSky

IBM PureFlex System Configurations

Published By: IBM     Published Date: Sep 27, 2013
IBM PureFlex Systems combine advanced IBM hardware and software with “patterns of expertise” and integrate them into three optimized configurations that are simple to acquire and deploy. Read the data sheet to learn more about configurations optimized for small businesses, application servers, and transactional and database systems.
Tags : 
ibm, ibm pureflex system, pureflex system configurations, pureflex system express, compute, storage, networking, enterprise applications, business technology
    
IBM

HRG Assessment: Comparing IBM PureSystems and Cisco UCS

Published By: IBM     Published Date: Sep 27, 2013
Customers require flexible, agile and easy to consume IT solutions to succeed in business. With those requirements in mind, IBM recently announced PureSystems. Harvard Research Group (HRG) has taken a closer look at PureSystems and and how it compares to Cisco UCS.
Tags : 
hrg, harvard research group, ibm, ibm pureflex system, ibm flex system, applications, application delpoyment, application integration, integration, integrated system, it resources, computing, storage, networking, virtualization, enterprise applications, data management, business technology
    
IBM

Go from Analysis to Action: IBM Cognos Insight Guides Business Analysts to Faster, Better Outcomes

Published By: IBM     Published Date: Sep 27, 2013
Business users need a simple but powerful way to navigate through data and find the insights to make timely, critical business decisions. Unfortunately, many users have become frustrated at their inability to quickly access and analyze the information they require. This data typically includes a combination of personal and corporate data locked in various enterprise systems. It exists in different formats and can be hard to analyze, change or share — making it difficult for people to get fast answers to business questions.
Tags : 
ibm, ibm business analytics, business analytics solutions, ibm cognos insight, analytics, data analysis, visualization, it management, enterprise applications, data management, business technology
    
IBM

Driving Successful HR Leadership: Talent Management’s Role in Core Business Strategy

Published By: Oracle     Published Date: Nov 13, 2013
Being responsible for one-third of a business’ success already puts HR in a critical role. But it’s not just about finding the best people—it’s about finding the best people, at the lowest cost, with the lowest possible attrition and the best possible performance. And it’s about guiding your executive team to the right decisions using the language they understand best: numbers. Talent management—covering everything from recruiting and compensation to ongoing education and retention—has traditionally been managed in silos, with a series of disparate systems and disconnected processes and reports. In today’s data-driven world, CEOs demand more. This new study conducted by HR.com explores what’s working for organizations today and the biggest gaps to fill.
Tags : 
zenithoptimedia, oracle, successful hr leadership, talent management, core business strategy, human resources, transactional to strategic, financial decisions, smart recruiting, talent scarcity and recruitment, technology advances, competitive compensation, quality of hire, hire smartly, business management, employee performance, productivity
    
Oracle

Cloud Without Compromise

Published By: Oracle     Published Date: Mar 10, 2014
A look at the shortcomings of many HR systems and how Oracle Fusion HCM can help realise the promise of the cloud
Tags : 
cloud, hcm, saas, hr systems, integrated cloud, workforce management software, employee monitoring software, employee performance management
    
Oracle

Go from analysis to action on your desktop: IBM Cognos Insight Guide

Published By: IBM     Published Date: Jan 02, 2014
Business users need a simple but powerful way to navigate through data and find the insights to make timely, critical business decisions. Unfortunately, many users have become frustrated at their inability to quickly access and analyze the information they require. This data typically includes a combination of personal and corporate data locked in various enterprise systems. It exists in different formats and can be hard to analyze, change or share — making it difficult for people to get fast answers to business questions.
Tags : 
ibm, cognos insight guide, navigating data, interactivity, analytic functionality, enterprise analytics, personal analytics, customer service, business users, analytic solution, share data, performance management, supply chain management, customer relationship, cognos insight, business continuity, internet security, business activity monitoring, business analytics
    
IBM

IDC: Server Transition Alternatives: A Business Value View Focusing on Operating Costs, Oct 2012

Published By: IBM     Published Date: Jan 02, 2014
Buy-and-hold strategies can actually add costs to the datacenter, as systems age in place. Not only do hardware maintenance and software maintenance fees rise, over time – but the aging of applications also costs the organization money. Investing in a transition from POWER5 to POWER7 resulted in a return on investment (ROI) of more than 150 percent over three years.An insightful and and compelling discussion by IDC that reviews the primary reason for maintaining current systems -- Return on Investment. IDC studied IBM Power Systems sites that remained on the POWER5 platform long after its initial introduction in 2004. When comparisons to the succeeding generation of POWER7 are made, customers have found that the increase in scalability and performance of POWER7 systems, combined with a reduction in server "footprint" size and overall electrical requirements, resulted in significant reductions in ongoing costs, or opex, per 100 end users supported.
Tags : 
ibm, idc, server transition, server alternatives, business value, operating costs, hardware platforms, server life cycles, hardware maintenance, software maintenance, application costs, modernization, business continuity, power5, power7, leveraging technology, it managers, it infrastructure, technology replacement cycle, data center
    
IBM

The Total Economic Impact™ Of Cisco Data Virtualization

Published By: Cisco     Published Date: Dec 21, 2016
Cisco commissioned Forrester Consulting to conduct a Total Economic Impact™ (TEI) study and examine the potential return on investment (ROI) enterprises may realize by deploying the Cisco Data Virtualization solution. The purpose of this study is to provide readers with a framework to evaluate the potential financial impact of investing in the Cisco Data Virtualization solution for their organizations. To better understand the benefits, costs, and risks associated with Cisco Data Virtualization, Forrester gathered data through interviews with customers who had multiple years’ experience using the solution. All organizations used Cisco Data Virtualization as a single data virtualization integration platform to query and access data across their network. This includes accessing data that resides on the cloud and on-premises across various sources and systems.
Tags : 
    
Cisco

Prestigious Hospital, Outdated Network

Published By: Cisco     Published Date: Dec 21, 2016
It’s possible to lead the world in an industry—medicine in this case—and to simultaneously lag behind when it comes to network security. One large national hospital system faced serious IT challenges. Network investment had been put off to the point of opening critical security vulnerabilities. A massive attack surface and limited visibility meant a threat could penetrate the network and remain hidden for months. It put critical systems, employees, patients, and the hospital’s reputation at risk.
Tags : 
    
Cisco

Understanding ERP Deployment Choices

Published By: Epicor     Published Date: Sep 25, 2014
Companies now need to evolve quickly, which means being able to move some or all business operations to an existing or new ERP instance quickly and inexpensively, anywhere in the world. Small companies are increasingly likely to become multi-national as emerging markets take on larger roles in revenue growth. Larger companies continue to optimize and innovate through organic development, as well as through mergers and acquisitions. In this increasingly competitive environment, the ERP deployment choice is a signi?cant advantage for companies seeking an agile response to constantly changing and often-volatile market conditions. In particular, cloud-based ERP systems are increasingly seen as an effective means for companies to economically deploy new ERP or expand IT operations as their commercial reach broadens globally.
Tags : 
business operations, erp, emerging markets, optimization, innovation, organic development, it operations, it management, data management
    
Epicor

Improve Scheduling, Production, and Quality Using Cloud ERP

Published By: Epicor     Published Date: Sep 25, 2014
The software as a service (SaaS) model of application delivery, more commonly known as ‘cloud deployment’, in which software features are accessed through a Web browser, is an excellent way for manufacturing companies to get the bene?ts of enterprise resource planning (ERP) systems without the need to build additional IT infrastructure. ERP functionality delivered “from the cloud” avoids the complexity and costs that often accompany on premisess ERP implementations, and typically provides a much more favorable total cost of ownership, compared to legacy on premisess deployment. Companies subscribe to the software features that they need and can add new ones as business requirements change, without buying additional servers or storage to support new functionality. The ERP features are the same as for an on premises ERP system, except that it is hosted and maintained on the Cloud provider’s infrastructure.
Tags : 
saas, cloud deployment, cloud erp, it infrastructure, software features, application delivery, it management, data management
    
Epicor

Pressure Barrier Replacement of Circulating Water Piping Discharge Headers in Nuclear Power Plants

Published By: FIBRWRAP     Published Date: Jan 08, 2016
Decades of continuous service of large diameter pressure pipelines leads to deterioration that threatens the structural integrity of piping systems. This white paper highlights the project background for repairing cement mortar lined steel piping discharge headers.
Tags : 
fibrwrap, cfrp, cement damage, repairs, engineering, construction, water pipes, fibre channel, infrastructure, internetworking hardware, performance testing, product lifecycle management, project management, power and cooling, business technology
    
FIBRWRAP

HR’s Guide to Digital Agreements

Published By: DocuSign     Published Date: Jul 12, 2019
As you know, HR plays a critical role in recruiting, hiring, training, and retaining the lifeblood of your business: people. But despite HR’s strategic role, it has traditionally lagged behind other departments in terms of adopting user-friendly, employee-focused technology investments. Legacy tools and reams of paper are still often used to prepare, sign, act upon, and manage the overwhelming document load, from recruitment and onboarding to performance management and off-boarding.1 The combination of outdated processes and additional paperwork limits HR staff’s ability to do their most important job: hire and support employees. That’s changing as HR turns to the cloud to digitize the agreement process. According to a 2018 PwC survey of HR executives, 75 percent of respondents said that they’ve moved at least one HR process to the cloud, while 40 percent have core systems (talent and acquisition management and HR information systems, for example) in the cloud.2 And those efforts are
Tags : 
    
DocuSign

Cylance® vs. Traditional Security Approaches

Published By: BlackBerry Cylance     Published Date: Mar 12, 2019
Today’s advanced cyber threats target every computer and mobile device, including enterprise endpoints, especially those that make up critical infrastructure like industrial control systems and embedded devices that control much of our physical world. The modern computing landscape consists of a complex array of physical, mobile, cloud, and virtual computing, creating a vast attack surface. Meanwhile, the cybersecurity industry is prolific with defense-in-depth security technologies, despite a threat landscape that remains highly dynamic, sophisticated, and automated. Cylance, however, takes a unique and innovative approach of using real-time, mathematical, and machine learning threat analysis to solve this problem at the endpoint for organizations, governments, and end-users worldwide.
Tags : 
    
BlackBerry Cylance

Small Organizations Still Need Big Security: A CISO Guide to Making Smart Cybersecurity Investments

Published By: BlackBerry Cylance     Published Date: Sep 18, 2019
“More than 70 percent of cyber attacks target small businesses," according to a National Cyber Security Alliance estimate. Yet 68 percent of small business owners in a recent survey seemed oblivious to the threat. Why the disconnect? What should they be doing to protect their business-critical systems and data? How can small businesses wring maximum value from their cybersecurity investments? Where do AI-based endpoint protection, detection, and response platforms fit into the mix? Read this BlackBerry Cylance sponsored white paper, Small Organizations Still Need Big Security, to find out.
Tags : 
    
BlackBerry Cylance

Managed Security Services: Helping to strengthen your defenses through service delivery

Published By: IBM     Published Date: Oct 14, 2014
Enterprises of all sizes must defend against online attackers. While security threats continue to evolve, organizations often lack the personnel and financial resources required to protect online systems. Read this service profile to learn how IBM Managed Security Services can help you protect your security investment while reducing the cost and complexity of your security operations. Find out how IBM combines industry-leading tools, technology and expertise with flexible, scalable packaging to meet a broad range of security solution requirements.
Tags : 
security operations, deployment, service delivery, problem management, security, it management, best practices, business activity monitoring
    
IBM

Top 10 ERP Financial Management Software Vendors Revealed

Published By: Business Software     Published Date: May 28, 2013
What is Financial Management Software? Financial management software solutions allow organizations to more effectively and accurately control and manage financial operations throughout the entire business – including across multiple companies, subsidiaries, divisions, countries, and sites. With powerful features and functionality, financial management systems dramatically streamline and enhance the way vital financial data is collected, processed, stored, accessed, and presented to users within, and beyond, the enterprise.
Tags : 
business software, divisions, financial management
    
Business Software

Driving Successful HR Leadership: Talent Management’s Role in Core Business Strategy

Published By: Oracle     Published Date: Nov 01, 2013
Being responsible for one-third of a business’ success already puts HR in a critical role. But it’s not just about finding the best people—it’s about finding the best people, at the lowest cost, with the lowest possible attrition and the best possible performance. And it’s about guiding your executive team to the right decisions using the language they understand best: numbers. Talent management—covering everything from recruiting and compensation to ongoing education and retention—has traditionally been managed in silos, with a series of disparate systems and disconnected processes and reports. In today’s data-driven world, CEOs demand more. This new study conducted by HR.com explores what’s working for organizations today and the biggest gaps to fill.
Tags : 
zenithoptimedia, oracle, successful hr leadership, talent management, core business strategy, human resources, transactional to strategic, financial decisions, smart recruiting, talent scarcity and recruitment, technology advances, competitive compensation, quality of hire, hire smartly, business management, employee performance, productivity
    
Oracle

SANS Report Breaches Happen: Be Prepared

Published By: Symantec     Published Date: Nov 21, 2014
Computer viruses are yesterday’s news; automated attacks that morph rapidly, concealing themselves through encryption and deceptive packaging, are the new hotness. This paper describes how to start with improved malware reporting and gateway monitoring and how to combine this output with security intelligence from both internal and external resources. Forward thinking organizations use these and other techniques promoted by frameworks such as the Critical Security Controls. The key is to—as quickly as possible—detect hostile activity, identify and locate affected systems and devices, and respond appropriately.
Tags : 
computer viruses, automated attacks, encryption, deceptive packaging, security controls, security
    
Symantec

The ROI of Marketing Automation

Published By: Marketo     Published Date: May 08, 2012
Today’s fastest growing companies are using repeatable marketing and sales 2.0 techniques to grow revenue predictably and reliably. Through real-world statistics and case studies, this paper outlines how the tools unique to marketing automation systems can be implemented to reap significant increases in the bottom line.
Tags : 
marketing roi, marketo, marketing solutions, marketing automation, marketing revenue, roi of marketing, marketing profits, return on investment, sales & marketing software, sales automation
    
Marketo

Powerful Data Protection with Deduplication 2.0

Published By: HP     Published Date: Aug 11, 2014
A few years ago, two technologies emerged to dramatically improve the industry’s ability to protect data. The cost of disk drives came down, and deduplication technology was introduced. This breakthrough is sometimes referred to as Deduplication 1.0. Like any technology, you’d expect it to evolve over time. HP launched the HP StoreOnce deduplication technology roadmap in 2010 to do just that. The result? Deduplication 2.0 or what HP calls “Federated Deduplication”. This next generation deduplication addresses some of the issues inherent in existing deduplication solutions: performance, flexibility, and data management and not only that, when moving from your legacy storage backup systems, you can reduce the amount of your stored backup data by 95 percent or we’ll make up the difference with free disk capacity and support.
Tags : 
deduplication, storage, it benefits, backup systems, challenges, challenges, technologies, data management, productivity
    
HP

How to Detect System Compromise and Data Exfiltration

Published By: AlienVault     Published Date: Oct 21, 2014
Have you ever wondered how the bad guys actually get control of a system? And, how they convert that system into a data-syphoning droid? Join AlienVault security engineer, Tom D'Aquino as he walks you through the steps of a system compromise and how detect these nefarious activities at every stage. You'll learn: • How attackers exploit vulnerabilities to take control of systems • What they do next to find & exfiltrate valuable data • How to catch them before the damage is done with AlienVault USM Using a real-world example of a common vulnerability, Tom will show you how AlienVault USM gives you the evidence you need to stop an attack in its tracks.
Tags : 
vulnerability, management, risk, prioritize, profile, environment, data, asset value, network, authenticated, unauthenticated, remediation, best practices, intelligence, scores, attacks, policy violations, compromise, ex filtration, exploit
    
AlienVault

Integrated Computing Platforms: Freeing IT from Complexity (ESG)

Published By: HP     Published Date: Oct 15, 2014
Just “keeping the lights on” in the server room is highly complex and largely inefficient. Maintaining IT infrastructure, system interdependencies, and application interoperability tie up valuable personnel and resources. The old way of simply throwing more hardware capacity at a problem can only serve to increase the complexity and further dampen productivity. In a perfect world, the infrastructure—hardware and software—would have been built as an integrated but scalable unit from the ground up. In our world, though, the best new systems combine independent pieces of IT infrastructure to form simplified computing platforms, freeing up IT to focus on business innovation rather than infrastructure management. Welcome to the new world of IT.
Tags : 
virtualization, data center, cloud, infrastructure, red hat, integrated, optimization, solution, public, private, business, storage, data management
    
HP
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.