quest

Results 301 - 325 of 1585Sort Results By: Published Date | Title | Company Name

Get the Right People: 9 Questions for Securing Top Hires

Published By: Success Factors     Published Date: Feb 16, 2012
These days, a company success depends on whether it hired the right people to effectively execute its strategies. Download this paper, compliments of SuccessFactors, and learn the critical questions you should ask before interviewing talent.
Tags : 
employee performance, high performance culture, high performing workforce, smart goals, performance reviews, goal setting, performance management, business strategy
    
Success Factors

Cloud Q&A: What it means to have a cloud-based solution for mobile workforce optimization

Published By: ClickExpress     Published Date: May 01, 2013
Businesses with between 15-250 mobile workforce employees are looking for optimization software. At the same time, they don’t want a complex enterprise solution with long integration times and complex IT requirements. Many vendors are offering cloud-based solutions. But what does that mean? Is it secure? In this Q&A, we answer the most common questions about cloud-based software solutions for field service management.
Tags : 
cloud-based, solution, mobile, workforce, optimization, employees, software, enterprise
    
ClickExpress

The Tenth Annual State of the Network Study

Published By: Viavi Solutions     Published Date: Jul 21, 2017
The Tenth Annual State of the Network Global Study focuses on a lens on the network team's role in security investigations. When it comes to technology adoption, both cloud and 100 GbE deployment continue to grow aggressively. VoIP adoption is closing in on 60% and software-defined networking is projected to cross the halfway mark, indicating compounding network complexity amidst the ongoing struggle to ID security threats. Study questions were designed based on interviews with network professionals and IT analysts. Results were compiled from the insights of 1,035 respondents, including network engineers, IT directors and CIOs around the world.
Tags : 
security investigation, security, sdn, cloud, data initiative, technology adoption, security trends, network performance monitoring
    
Viavi Solutions

Cloud Control: Moving to the Comfort Zone

Published By: NetApp     Published Date: Sep 29, 2014
As cloud deployments accelerate, there's no question that Federal agencies are reaping the benefits – improved agility, less IT complexity, and greater collaboration through shared services. But, while the benefits are clear, concerns around data stewardship and management can stop migrations in their tracks. So how are Federal agencies dealing with the control challenge? To find out, MeriTalk surveyed 153 Federal IT professionals closely involved in their agency's cloud implementations.
Tags : 
cloud control, it complexity, collaboration, data management, cloud implementations, it management
    
NetApp

One Size Doesn’t Fit All: 4 Questions HR Technology Buyers Should Ask Before Making Buying Decisions

Published By: SumTotal Systems     Published Date: Oct 10, 2013
What you see isn’t always what you get with HR, talent, and learning software. Did you know that, even with the rigour frequently put into selection, two-thirds of HR software projects fail to produce at least half of the expected benefits? Or how about that a recent research project from Clarkson University determined that there was no link between HR software and HR’s ability to be more strategic? Even though HR technology is often sold as “best practices in a box,” looks can be deceiving. To avoid being duped by pretty demos of software with no substance and find a partner that can meet the hidden complexities that exist in your unique processes, you need to ask the right questions.
Tags : 
sumtotal, sumtotal systems, hr technology, hr buyers, hr technology buyers, human resources, hr software, strategy
    
SumTotal Systems

Five Questions for Paul Hamerman on Financial and Workforce Planning

Published By: Oracle     Published Date: Mar 06, 2018
Paul Hamerman is vice president, principal analyst at Forrester, where he focuses on human resources management and financial applications, as well as trends and directions in the overall market for enterprise applications. Hamerman answers five key questions that we believe organisations should consider when exploring workforce and financial planning approaches in today’s business world.
Tags : 
    
Oracle

FICO Wins Customers with Red Hat OpenStack Cloud

Published By: Red Hat     Published Date: Nov 30, 2015
FICO, a financial services provider, wanted to address small-to-medium business (SMB) and midmarket customer requests for solutions without on-premise installation. To transition from an on-premise model to a cloud- and services-based infrastructure, FICO chose to build an OpenStack® cloud using Red Hat® solutions, including OpenShift by Red Hat and Red Hat Enterprise Linux® OpenStack Platform. As a result, FICO generated US$10 million in sales to new customers, reduced solution time to market by 50%, and lowered storage and overall infrastructure costs.
Tags : 
fico, smb, customer requests, enterprise applications
    
Red Hat

5 Secrets of Amazon’s Online Retail Domination & How You Can Use Them to Grow Your Business

Published By: Monetate     Published Date: Sep 30, 2014
One company dominates all the rest in the quest for consumer budgets—Amazon. The secret to this success is laser-focused on one objective: delivering a customer experience that converts. But how do they do it? This white paper examines five features and sales tactics that Amazon uses to convert shoppers (and five tactics it doesn’t use) to show you how you can achieve equal?or even higher?growth rates than Amazon.
Tags : 
online retail, amazon, customer experience, sales tactics
    
Monetate

Building a Network that Enables a 21st Century Healthcare Experience

Published By: Extreme Networks     Published Date: Feb 23, 2017
The network has never been as critical to the healthcare sector as it is today. Electronic health records, Wi-Fi-connected medical devices, and clinician smart phones are among a plethora of healthcare technologies that depend on a stable network. The consistent development of this infrastructure is key for the healthcare sector to continue its successes in creating new possibilities for management, patient and family experience, and patient outcomes. Extreme Networks posed key questions to Nolan Greene, a senior research analyst with IDC’s Network Infrastructure group, who highlights the critical issues healthcare IT professionals must consider when building a network that maintains industry needs. Download this report to learn about: • Why having a modern healthcare infrastructure is so important • The major challenges IoT brings to healthcare networks • How IEC 80001 is impacting compliance • Trends that confront a network IT professional in healthcare • Risks Healthcare IT must eli
Tags : 
healthcare, iot, iec 800001, extreme networks, healthcare it
    
Extreme Networks

End-To-End Server Security: The IT Leader's Guide

Published By: Dell     Published Date: Feb 02, 2018
This paper is organized into sections describing the importance of IT infrastructure security and presents essential criteria IT leaders should use to identify end-to-end server security. 1. Trust and the Modern IT Infrastructure Why you should be concerned about server security (or the lack thereof). 2. End-to-end Server Security How Dell EMC defines end-to-end server security. In this section, we also provide crucial characteristics business and IT leaders can use to classify prospective server vendors. 3. Key Security Criteria for the Modern IT Infrastructure The security questions every IT leader should ask of their server vendor before embarking on an IT transformation. 4. Conclusion & Additional Resources The objective of this paper is to highlight the Dell EMC comprehensive approach to server security. PowerEdge servers come with security built-in, not bolted-on. Using a Cyber Resilient Architecture, Dell EMC commits to end-to-end server security on all PowerEdge servers.
Tags : 
    
Dell

5 OAuth Essentials for API Access Control

Published By: CA Technologies     Published Date: Mar 06, 2015
OAuth offre all'utente il pieno controllo sulla delega dell'accesso a un'API. Questo consente l'integrazione tra servizi per conto di tale utente. Gli stessi fornitori web social che hanno reso popolare il modello costituito dall'esposizione di un'API per consentire agli sviluppatori di terze parti di arricchire le loro piattaforme, sono stati i primi ad applicare questi meccanismi di autorizzazione delegati. OAuth è stata definito nel 2006, per standardizzare i meccanismi di questo tipo.
Tags : 
    
CA Technologies

5 Pillars of API Management

Published By: CA Technologies     Published Date: Mar 06, 2015
Le API (Application Programming Interface) costituiscono le fondamenta di questa nuova azienda "aperta", consentendo alle società di riutilizzare le risorse informative esistenti al di là dei confini dell'organizzazione.
Tags : 
    
CA Technologies

How Do I Balance Robust Security with a Frictionless Online Experience for Cardholders

Published By: CA Technologies     Published Date: Jul 13, 2015
The explosive growth of eCommerce has focused attention on security concerns associated with online payment transactions. Cardholders worry about the safety of online transactions while card issuers are concerned about balancing the risks and costs of payment fraud with a loss of revenue caused by transaction abandonment. The 3-D Secure protocol allows payment card issuers to reduce fraud in payment transactions by verifying cardholder identity during Card Not Present (CNP) transactions. Before a transaction is authorized, a cardholder can be challenged to enter a password, answer a question, or use some other form of authentication credential. This interruption in the transaction often causes legitimate customers to abandon the purchase resulting in loss of revenue for the issuer. The challenge is how to reduce fraud without impacting the user purchase experience.
Tags : 
ca technologies, cnp, emv, otp, 3dsecure, data management
    
CA Technologies

Workforce Analytics in the Cloud: Why Now—and How You Can Make a Business Case for Investment

Published By: SAP     Published Date: Jun 04, 2015
Workforce analytics solutions are the key to answering such questions and getting the metrics and insights needed to make informed HR decisions and create actionable workforce plans. This paper explores the business case for investing in workforce analytics. It focuses on how cloud-based solutions hide complexity associated with HR data, as well as deliver best practices, minimize maintenance costs, and provide quick time to value.
Tags : 
    
SAP

Workforce Analytics in the Cloud: Why Now—and How You Can Make a Business Case for Investment

Published By: SuccessFactors, an SAP Company     Published Date: Jun 18, 2015
Workforce analytics solutions are the key to answering such questions and getting the metrics and insights needed to make informed HR decisions and create actionable workforce plans. This paper explores the business case for investing in workforce analytics. It focuses on how cloud-based solutions hide complexity associated with HR data, as well as deliver best practices, minimize maintenance costs, and provide quick time to value.
Tags : 
    
SuccessFactors, an SAP Company

Goodbye War Room, Hello DevOps 2.0

Published By: Dynatrace     Published Date: May 20, 2016
Goodbye War Room, Hello DevOps 2.0: 6 ways to increase quality and speed in application deployment In this eBook, we'll focus on what you need to do to continue to transform: - Ask the right questions and get the right answers to act efficiently when there is a problem - Level-up development, test, and operations capabilities to build in quality right from the start - Identify the priorities for your business so you can give teams laser-like focus on what matters most - Define a common set of metrics based upon shared goals to do what good agile teams do well — collaborate
Tags : 
dynatrace, devops, software development, speed, application development, it management, knowledge management, enterprise applications
    
Dynatrace

Improving Web Application Security: The Akamai Approach to WAF

Published By: Akamai Technologies     Published Date: Mar 10, 2016
The web application firewall (WAF) is among the most complex security technologies on the market today. The complexity of managing a WAF includes a pre-defined list of rules to identify thousands of potential exploits, intelligence about new attack vectors, and identifying malicious HTTP requests from legitimate HTTP traffic. Read this white paper to learn how to combine attack detection with threat intelligence using our cloud platform and managed security services to better protect your web applications.
Tags : 
akamai technology, web application security, http, best practices, security, risk management
    
Akamai Technologies

6 Surefire Ways to Ruin an Admin’s Day

Published By: Staples     Published Date: Oct 13, 2016
Do you have days when you think everyone in the office is trying to drive you nuts? Last-minute requests piling up? Well, hang this list on the refrigerator in the breakroom. They’ll get the point.
Tags : 
office, breakroom, management, teamwork, etiquette
    
Staples

How to Create a Smarter, Faster Lending Process

Published By: Mirador     Published Date: Jul 18, 2016
Over the last several years, marketplace lenders have popped up to fill this significant gap between small business borrowers and access to credit. They typically offer fast approval turn-around – delivering requested funds in hours or days vs. weeks.
Tags : 
    
Mirador

GDPR is a state of mind, not just a technology solution (Computing Research)

Published By: CA Technologies     Published Date: Sep 13, 2017
"As the EU General Data Protection Regulation (GDPR) looms overhead, finding specific answers to these obvious questions, How do I best want to secure my data, and which kind of data? Which milestones along the development journey are most at risk?, you might also begin to ask the right questions about how to solve them, and with that, begin ticking the GDPR box for each and every task at hand. View this Computing Research report to understand why GDPR is a state of mind, not just a technology solution."
Tags : 
    
CA Technologies

Three Essential Elements of Next-Gen Endpoint Protection

Published By: CrowdStrike     Published Date: Feb 01, 2017
A large and growing number of security solutions are being touted as the ""next generation"" in cyber defense, and endpoint protection products are no exception. This has led to widespread confusion about which solutions have truly incorporated next-generation technologies and approaches, and which ones are making empty claims or half-hearted attempts. CrowdStrike developed this white paper to help you sift through the hype and uncover the critical elements that a true next-generation endpoint security solution must include. Download this white paper to explore: ? An explanation of the essential elements of Next-Generation Endpoint Protection ? An evaluation matrix for comparing the potential impact of different solutions ? A list of the top questions to ask potential vendors ? Tools to help you measure and compare different solutions
Tags : 
    
CrowdStrike

Flashblade Leveraging All Flash Storage

Published By: Pure Storage     Published Date: Nov 02, 2017
FlashBlade fabric modules implement a unified network that connects all blades to each other and to the data center network. With full connectivity, all blades can serve as client connection endpoints, as authorities that process client requests, and as storage managers that transfer data to and from flash and NVRAM.
Tags : 
storage systems, network, hardware components, architectural, storage software, integrated software
    
Pure Storage

Hybrid Cloud Buyer's Guide

Published By: Pure Storage     Published Date: Sep 13, 2019
"By asking the right questions as you design your hybrid cloud, you maximize your chances for success. What do you want to achieve? Identifying your goals will help you zero in on the biggest pain points and attack those first. Description Learn how to increase the effectiveness of your hybrid cloud with a focus on data strategies for running hybrid applications. Use this guide to: Discover key Differences between enterprise IT environments and the public cloud. Learn if you can support enterprise applications in the public cloud. See if you can support cloud-native applications on-premises. Understand if you can protect data cross your hybrid cloud."
Tags : 
    
Pure Storage

Hybrid Cloud Buyer's Guide (Chinese)

Published By: Pure Storage     Published Date: Sep 13, 2019
"By asking the right questions as you design your hybrid cloud, you maximize your chances for success. What do you want to achieve? Identifying your goals will help you zero in on the biggest pain points and attack those first. Description Learn how to increase the effectiveness of your hybrid cloud with a focus on data strategies for running hybrid applications. Use this guide to: Discover key Differences between enterprise IT environments and the public cloud. Learn if you can support enterprise applications in the public cloud. See if you can support cloud-native applications on-premises. Understand if you can protect data cross your hybrid cloud."
Tags : 
    
Pure Storage

Buyer’s Guide to Well-Being Platforms – Key Categories to Compare and Questions to Ask

Published By: Virgin Pulse     Published Date: Jun 05, 2017
The Employee Well-being Platforms Buyer’s Guide will take the guesswork out of your decision. Learn how to properly evaluate the options on today’s market and determine what features matter most to you.
Tags : 
employee well-being platform, well-being software, well-being solutions, wellness solutions, employee wellness solutions, wellness solutions, employee wellness solutions, well being solutions
    
Virgin Pulse
Start   Previous    6 7 8 9 10 11 12 13 14 15 16 17 18 19 20    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.