hr trends

Results 176 - 200 of 229Sort Results By: Published Date | Title | Company Name

WP Location Based Services (Us Pilot Only)

Published By: Cisco     Published Date: Apr 10, 2015
Location-based services (LBS) show promise as a budding customer-centric mobility solution in some early adopting verticals such as retail, hospitality, and large public venues. Such services enable businesses to better understand their customer base through analytics as well as offer targeted, context-based communications including promotions and remote assistance. This IDC white paper explores the burgeoning LBS market, highlighting custom research conducted by IDC in March and April 2014; surveys were fielded to both IT and line-of-business (LOB) decision makers in select verticals and market segments. In this white paper, IDC analyzes the data and explores the attitudes surrounding LBS adoption in the context of broader technology trends.
Tags : 
cisco, lbs, it technology, wifi, analytics, wireless networks, mobile computing, wireless application software
    
Cisco

ZK (Analyst) Multigigabit Report

Published By: Cisco     Published Date: Apr 10, 2015
Location-based services (LBS) show promise as a budding customer-centric mobility solution in some early adopting verticals such as retail, hospitality, and large public venues. Such services enable businesses to better understand their customer base through analytics as well as offer targeted, context-based communications including promotions and remote assistance. This IDC white paper explores the burgeoning LBS market, highlighting custom research conducted by IDC in March and April 2014; surveys were fielded to both IT and line-of-business (LOB) decision makers in select verticals and market segments. In this white paper, IDC analyzes the data and explores the attitudes surrounding LBS adoption in the context of broader technology trends.
Tags : 
cisco, idc, lbs, wireless, wifi, mobility, it solutions, bandwidth management
    
Cisco

IDC Brief Cisco Unlock The Value of ACI

Published By: Cisco     Published Date: Apr 10, 2015
Location-based services (LBS) show promise as a budding customer-centric mobility solution in some early adopting verticals such as retail, hospitality, and large public venues. Such services enable businesses to better understand their customer base through analytics as well as offer targeted, context-based communications including promotions and remote assistance. This IDC white paper explores the burgeoning LBS market, highlighting custom research conducted by IDC in March and April 2014; surveys were fielded to both IT and line-of-business (LOB) decision makers in select verticals and market segments. In this white paper, IDC analyzes the data and explores the attitudes surrounding LBS adoption in the context of broader technology trends.
Tags : 
cisco, lbs, it technology, wifi, analytics, wireless networks, mobile computing, mobile data systems
    
Cisco

The Future of the Manufacturing Supply Chain

Published By: Epicor     Published Date: Mar 19, 2015
As we move through 2015, the subject of the future of the supply chain has come back into focus. There are three main trends and technologies that will continue to have an enormous impact on the supply chain: • Dynamic networking and connectivity • Mobility in manufacturing • Modern collaboration Explore this whitepaper to learn how manufacturers are tackling these three critical areas, and how you can prepare your organization for the future of the manufacturing supply chain.
Tags : 
manufacturing supply chain, supply chain characteristics, collaboration, mobile, it management, enterprise applications
    
Epicor

The Incredible Shrinking Office: Transforming Workspaces to Empower Collaboration

Published By: Polycom     Published Date: Aug 16, 2017
"The traditional office space is dead. Chased out by the combining forces of mobility, millennials, and modernity, the advent of collaborative technology and the always connected worker have led to a brave new world of shared, open spaces. Studies show that up to 82% of knowledge workers feel they need to collaborate with others throughout the day to get work done. Yet, according to an IBM study, 78% say they struggle to effectively connect their workplace and help people collaborate—either virtually or face-to-face1. Why? The answer is not all collaboration is alike. Download this report to get the latest trends in office space utilization and find out about the three main types of collaboration and how they need to be supported differently in the work environment. The office may be shrinking, but it’s not going away anytime soon. If anything, the rising demand for more teamwork and collaboration makes the configuration of workspaces more important than ever."
Tags : 
polycom, video conferencing technology, collaboration
    
Polycom

The Incredible Shrinking Office: Transforming Workspaces to Empower Collaboration

Published By: Polycom     Published Date: Nov 30, 2017
The traditional office space is dead. Chased out by the combining forces of mobility, millennials, and modernity, the advent of collaborative technology and the always connected worker have led to a brave new world of shared, open spaces. Studies show that up to 82% of knowledge workers feel they need to collaborate with others throughout the day to get work done. Yet, according to an IBM study, 78% say they struggle to effectively connect their workplace and help people collaborate—either virtually or face-to-face1. Why? The answer is not all collaboration is alike. Download this report to get the latest trends in office space utilization and find out about the three main types of collaboration and how they need to be supported differently in the work environment. The office may be shrinking, but it’s not going away anytime soon. If anything, the rising demand for more teamwork and collaboration makes the configuration of workspaces more important than ever.
Tags : 
shared office spaces, collaboration, polycom, realpresence centro, transforming workspaces, video conferencing, huddle rooms
    
Polycom

IDC: The Future of the Manufacturing Supply Chain - Networked, Mobile, and Collaborative

Published By: Epicor Software     Published Date: Mar 18, 2015
As we move through 2015, the subject of the future of the supply chain has come back into focus. What does the future supply chain look like, and what do we expect some of the essential characteristics to be? Although this requires a degree of speculation, there are also some trends and technologies that clearly are having, and will continue to have, an enormous impact on the supply chain.
Tags : 
manufacturing supply chain, supply chain characteristics, collaboration, mobile, it management, enterprise applications
    
Epicor Software

Cisco 2015 Midyear Security Report

Published By: Cisco     Published Date: Aug 24, 2015
The Cisco 2015 Midyear Security Report examines these intersecting challenges while also providing updates on some of the most compelling threats. Using research by our experts, it provides an overview of the major threats observed in the first half of 2015. This report also explores likely future trends and offers advice for small, midsize, and enterprise organizations that seek security solutions and services.
Tags : 
malware, network defenses, detection, security gaps, threat defenses, trends, networking, security
    
Cisco

BlackBerry Cylance 2019 Threat Report

Published By: BlackBerry Cylance     Published Date: Apr 15, 2019
The Cylance 2019 Threat Report represents the company’s piece of the overall cybersecurity puzzle. It details the trends observed and the insights gained, and the threats Cylance’s consulting team, research team, and customers encountered over the past year. Cylance shares this report in the hope that you will put it to good use in our collective fight against the rising tide of cyber attacks worldwide.
Tags : 
    
BlackBerry Cylance

BlackBerry Cylance 2019 Threat Report

Published By: BlackBerry Cylance     Published Date: Jun 24, 2019
In 2018, BlackBerry Cylance observed many trends in the threat landscape, such as a decline in overall ransomware attacks, an increase in malicious coinminers, and a marked evolution of popular threats like Emotet. Additionally, overall malware attacks rose by 10% as attackers continued to hone their tools, skills, and tactics to threaten Windows, macOS, and Internet of Things (IoT) platforms. Read the BlackBerry Cylance 2019 Threat Report to understand these trends in greater depth, and to learn our recommendations to improve your security strategies.
Tags : 
    
BlackBerry Cylance

Social Business Collaboration: Five Best Practices, Three Market Trends

Published By: IBM     Published Date: Oct 06, 2014
Using social media in enterprise settings is hardly a new concept. However, many organizations have struggled to fully take advantage of the potential offered by collaboration solutions before now.
Tags : 
social business, market trends, social media, collaboration solutions, knowledge management, best practices, business analytics, business intelligence
    
IBM

Three Trends that are Impacting the Hiring Market Right Now

Published By: Dice     Published Date: Oct 07, 2013
Three Trends that are Impacting the Hiring Market Right Now A snapshot.
Tags : 
dice, marketing, human resources, interviewing, job candidates
    
Dice

2011 Trends Report: Enterprise Resource Planning (ERP)

Published By: Focus     Published Date: Jan 19, 2011
In this guide, Focus Experts Steve Christensen, Dana Craig, Tim Hourigan, Robert Israch and Michael Krigsman share eight of their 2011 predictions for ERP, so you can plan around changing tides and trends.
Tags : 
focus erp, enterprise resource planning, 2011 trends, expert content, operations, enterprise software
    
Focus

Insider Threat Survey Report

Published By: SpectorSoft     Published Date: Apr 18, 2014
Download The SpectorSoft Insider Threat Survey Report and read about 10 alarming Insier Threat trends.
Tags : 
employee monitoring, user activity monitoring, security, insider threats, data breach, employee privacy, employee investigation, incident response
    
SpectorSoft

Symantec 2013 Internet Security Threat Report

Published By: Symantec     Published Date: Aug 09, 2013
Get an overview and analysis of the year in global threat activity with the Symantec 2013 Internet Security Threat Report. This report provides commentary on emerging trends in the dynamic threat landscape, covers the key findings and provides best practice guidelines. Learn about strategies to combat security risks that threaten your organization. Read the report now.
Tags : 
symantec, security, threat, report, key findings, best practice, strategy, technology
    
Symantec

Symantec Intelligence Report: June 2013

Published By: Symantec     Published Date: Aug 09, 2013
The monthly intelligence report, provides the latest analysis of cyber security threats, trends, and insights from the Symantec intelligence team concerning malware, spam, and other potentially harmful business risks. Learn more.
Tags : 
symantec, security, threat, report, key findings, best practice, strategy, technology
    
Symantec

Symantec Internet Security Threat Report

Published By: Symantec     Published Date: Oct 07, 2014
The Internet Security Threat Report provides an overview and analysis of the year’s global internet threat activity. The report is based on data from the Symantec™ Global Intelligence Network, which Symantec’s analysts use to identify, analyze, and provide commentary on emerging trends in the dynamic threat landscape. Highlights from the 2014 Internet Security Threat Report Key Findings • 91% increase in targeted attacks campaigns in 2013 • 62% increase in the number of breaches in 2013
Tags : 
internet security, target attacks, breaches, threat activity, emerging trends, cybercrime, security
    
Symantec

Symantec Intelligence Report: September

Published By: Symantec     Published Date: Nov 21, 2014
The monthly intelligence report, provides the latest analysis of cyber security threats, trends, and insights from the Symantec intelligence team concerning malware, spam, and other potentially harmful business risks. Key Findings • The .doc file type was the most common attachment type used in spear-phishing attacks, making up more than 52.9 percent of all attachments in September. • The largest data breach reported in September actually took place in April, and resulted in the exposure of 56 million identities. • There were 600 vulnerabilities disclosed in the month of September, the highest number so far in 2014 and second-highest in the last 12 months.
Tags : 
cyber security threats, harmful business risks, malware, spam, intelligence team, security
    
Symantec

Best Practices for Leveraging Security Threat Intelligence

Published By: AlienVault     Published Date: Oct 21, 2014
The state of threat intelligence in the information security community is still very immature. Many organizations are still combating threats in a reactive manner, only learning what they're dealing with, well...when they're dealing with it. There is a wealth of information in the community, and many organizations have been gathering data about attackers and trends for years. How can we share that information, and what kinds of intelligence are most valuable? In this presentation, we'll start with a brief overview of AlienVault's Open Threat Exchange™ (OTX), and then we'll discuss attack trends and techniques seen in enterprise networks today, with supporting data from AlienVault OTX. We'll also take a look at some new models for collaboration and improving the state of threat intelligence going forward.
Tags : 
vulnerability, management, risk, prioritize, profile, environment, data, asset value
    
AlienVault

Email Breakthrough Report Q310

Published By: StrongMail     Published Date: Sep 28, 2010
Break through consumer consciousness with lessons from the Q3 2010 Email Breakthrough Report's featured best-in-class email campaigns. Read about the top five trends to watch and read expert commentary on each featured campaign, ranging from effective application of movement in email, to leveraging subscribers' word of mouth to promote your brand.
Tags : 
strongmail, email breakthrough, report, email campaigns, emarketing
    
StrongMail

Trends, Challenges, and Success with Agile ALM

Published By: CollabNet     Published Date: Jan 07, 2011
Join Victoria Griggs, Sr. Director of Marketing, and Chris Clarke, VP of Product Management and Strategy at CollabNet, to review Agile ALM adoption trends, challenges, and real world success stories from teams who have combined Agile methods with application lifecycle management for real business results.
Tags : 
collabnet, agile alm, product management, application lifecycle management, collaboration, application integration, product lifecycle management, collaborative commerce
    
CollabNet

March 2011 Feature Article: BlackHat Japanning

Published By: ESET, LLC.     Published Date: Apr 27, 2011
Global Threat Trends is a monthly report created by ESET that includes a review of the current events in the world of information security and the top ten threats of the month.
Tags : 
eset, blackhat japanning, global threat report, david harley, urbanschrott, disaster scam, malware reporting, inf/autorun
    
ESET, LLC.

Three Trends Causing Paradigm Shifts in Online Retail

Published By: Limelight Networks     Published Date: May 03, 2011
In this whitepaper you will learn about the three major trends re-shaping the ecommerce landscape: Video as a way to enhance the shopping experience; Mobile as a channel for expanding marketing reach; and Personalization informed by advanced analytics.
Tags : 
limelight networks, rich-media strategies, ecommerce, online retail, consumer behavior, video, mobile, personalization
    
Limelight Networks

Build Your Business Case for a Rewards and Recognition Program

Published By: Achievers     Published Date: Mar 21, 2012
The key to unlocking performance and growth is aligning the actions and goals of employees with the priorities of the organization. Read Aberdeen's research on Rewards and Recognition to learn how to align employees to your organization and inspire performance.
Tags : 
employee recognition, employee engagement, employee rewards, hr trends, generation, gen x, gen y, millennials
    
Achievers

A New Generation of Employee Rewards and Recognition Solutions

Published By: Achievers     Published Date: Mar 21, 2012
Organizations spend over $48 billion per year on employee rewards and recognition programs; however there are critical limitations to the traditional approach. In this research bulletin, Bersin & Associates discusses how Rewards and Recognition has changed to cater today's workforce.
Tags : 
employee recognition, employee engagement, employee rewards, hr trends, generation, gen x, gen y, millennials
    
Achievers
Start   Previous    1 2 3 4 5 6 7 8 9 10    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.