resources

Results 176 - 200 of 1752Sort Results By: Published Date | Title | Company Name

Accelerate and Complete your HR Transformation

Published By: Oracle Corp     Published Date: Oct 02, 2012
Accelerate and Complete your HR Transformation
Tags : 
oracle, human resources, transformation
    
Oracle Corp

Requirements for a Successful Cloud: a Checklist for your Journey

Published By: BMC Software     Published Date: Aug 12, 2013
For many organizations, moving to the cloud to meet the needs for business services represents a tremendous investment of both time and financial resources, without clear instructions for reaching their goals. This road map takes into consideration the ultimate needs of the business, the efficiency and effectiveness of IT, best practices, and future needs. Make sure your cloud meets the needs of the business — both today and tomorrow. Get BMC’s checklist to clear your path to success.
Tags : 
cloud, business services, best practices, business intelligence, cloud computing, infrastructure
    
BMC Software

National Instruments Use Oracle Fusion HCM to Align Business

Published By: Oracle     Published Date: Aug 09, 2013
National Instruments designs and manufactures hardware and software. Melissa Fuller, IT Human Resources, at National Instruments discusses Oracle Fusion HCM and how they are using it to align to their changing business processes.
Tags : 
national instruments, oracle, fusion, hcm
    
Oracle

National Instruments Use Oracle Fusion HCM to Align Business

Published By: Oracle     Published Date: Aug 15, 2013
National Instruments designs and manufactures hardware and software. Melissa Fuller, IT Human Resources, at National Instruments discusses Oracle Fusion HCM and how they are using it to align to their changing business processes.
Tags : 
national instruments, oracle, fusion, hcm, enterprise applications, human resource technology, business technology
    
Oracle

Consume and Operate IT as a Service (ITaaS)

Published By: Hewlett Packard Enterprise     Published Date: Jul 12, 2018
Learn why many organizations are leveraging forward-looking best practices from the experts at HPE Pointnext to help them transition to an ITaaS structure. This guide examines the critical business and technology practices enabling ITaaS, from using flexible IT partner resources, ITIL features, operations service practices, to funding infrastructure as a service.
Tags : 
    
Hewlett Packard Enterprise

Leveraging finance and accounting outsourcing to implement a digital finance function

Published By: RSM US     Published Date: Feb 08, 2019
The term outsourcing can have a negative connotation, conjuring images of layoffs and relocating jobs to third parties in remote locations. However, outsourcing can take many forms, and finance and accounting outsourcing (FAO) does not always mean the displacing of the finance back office. Specifically, FAO leverages digital technology to complement and support the back office, streamlining processes while providing enhanced transaction processing, reporting and analytics capabilities. It also allows key resources to focus on strategy, analysis and decision-making.
Tags : 
    
RSM US

How Companies Fail at Using Their EAPs

Published By: LifeWorks     Published Date: Dec 04, 2018
Employee assistance programs (EAPs) are moving beyond the traditional idea of being a work-based intervention program solely aimed at resolving employees’ personal problems. Nowadays, EAPs are preventative by nature. They provide important work life resources like counselling, coaching, guidance, and financial and legal support for employees and family members. The focus has expanded from personal problems to overall well-being.
Tags : 
    
LifeWorks

Top 10 Checklist for Sourcing DPI.

Published By: Rohde & Schwarz Cybersecurity     Published Date: Nov 28, 2017
DPI software is made to inspect packets at high wire speeds and a critical factor is the throughput and resources required. Keeping the amount of resources that integrated DPI and application classification technology requires low is critical. The fewer cores (on a multi-core processor) and the less on-board memory an engine needs, the better. Multi-threading provides almost linear scalability on multi-core systems. In addition, highly-optimized flow tracking is required for handling millions of concurrent subscribers.
Tags : 
detection, rate, performance, efficiency, accuracy, encrypted apps, integration, metadata
    
Rohde & Schwarz Cybersecurity

Foundation for Open Cloud Infrastructure

Published By: Oracle APAC     Published Date: May 24, 2018
Enterprises are rapidly embracing cloud services to speed innovation and drive cost savings. The most innovative IT organizations in these enterprises are shifting to software-defined “virtual data centers” that connect, aggregate, and configure public and private computing resources in unprecedented ways. These IT organizations use open private cloud infrastructure within a corporate data center or at a hosting site (managed cloud services) in conjunction with public cloud services to meet all their business requirements.
Tags : 
    
Oracle APAC

Privileged Access Management: The Key To Protecting Your Business Amid Cybercrime’s Current Boom

Published By: CA Technologies     Published Date: Apr 06, 2017
Available as a rack-mounted, hardened hardware appliance, an Open Virtualization Format (OVF) Virtual Appliance or an Amazon Machine Instance (AMI), CA Privileged Access Manager enhances security by protecting sensitive administrative credentials, such as root and administrator passwords, controlling privileged user access and proactively enforcing policies and monitoring and recording privileged user activity across all IT resources.
Tags : 
cyber attacks, data protection, it security, security solutions, system protector, web security, analytics
    
CA Technologies

Entrust Datacard Scores Win Against Disruptive Malware

Published By: MalwareBytes EMEA     Published Date: May 10, 2019
INDUSTRY Technology BUSINESS CHALLENGE Reduce the impact of malware on enterprise resources IT ENVIRONMENT Symantec antivirus, layered enterprise security SOLUTION Malwarebytes Incident Response RESULTS Saved hours per week by eliminating manual threat remediation Detected and remediated threats that otherwise would not have been found Eliminated downtime for end users with thorough scans and fast remediation Easily generated reports that keep upper management informed
Tags : 
    
MalwareBytes EMEA

RUNNING ONLINE SERVICES AT RIOT: PART III

Published By: Juniper Networks     Published Date: Oct 25, 2017
Hey all, this is David Press and Doug Lardo, two engineers working on improving the data center networking that enables online services at Riot. This article is the third part in a series on exactly that topic, which begins with an overview from Jonathan of a platform we called rCluster. This time we’ll be discussing our approach to Software Defined Networking (SDN), how we integrate SDN with Docker, and the new infrastructure paradigms that this combination has unlocked for us. If you’re curious about how SDN can transform infrastructure, how to empower developers to obtain and secure networking resources via an API, or how to get out of purchasing larger and larger specialized networking appliances, this article is for you.
Tags : 
technology efficiency, market dynamics, data privacy, data security, device management, platform management, enterprise management
    
Juniper Networks

E-signatures and HR: How IT can help the business hire talent faster

Published By: Adobe     Published Date: Aug 04, 2015
Learn how technologies like e-signatures and document management are drastically improving HR processes.
Tags : 
e-signatures, electronic signatures, digital signatures, document management, improving hr with digital signatures, human resources
    
Adobe

Best Practices for Selecting an Enterprise Time and Attendance System

Published By: Workforce Software     Published Date: Dec 02, 2015
This paper provides a guide to large employers to help you identify and describe product capabilities—and corresponding process improvements—that separate a basic timekeeping system from an enterprise-grade time and attendance solution. In addition, the paper will equip you with questions to ask potential providers to uncover whether they have the resources, expertise, and products capable of optimising your time and attendance processes.
Tags : 
time and attendance system, automation, pay rate, absence, understaffing, worker performance, payroll, timekeeping
    
Workforce Software

Best Practices for Selecting an Enterprise Time and Attendance System

Published By: WFS Australia     Published Date: Dec 02, 2015
This paper provides a guide to large employers to help you identify and describe product capabilities—and corresponding process improvements—that separate a basic timekeeping system from an enterprise-grade time and attendance solution. In addition, the paper will equip you with questions to ask potential providers to uncover whether they have the resources, expertise, and products capable of optimising your time and attendance processes.
Tags : 
time and attendance system, automation, pay rate, absence, understaffing, worker performance, payroll, timekeeping
    
WFS Australia

The Executive’s Handbook to Modern Digital Commerce

Published By: Oracle Commerce Cloud     Published Date: Sep 06, 2017
"Ecommerce industry leaders reveal how to provide a superior shopping experience, win over customers, and maximize ROI. Digital commerce is getting harder. As the pace of change grows faster, the divide between commerce leaders and the competition grows wider. Staying ahead requires resources like The Executive's Handbook to Modern Digital Commerce that contains expertise from the industry's top players You will: - Unleash digital commerce innovation - Learn trends in mobile and consumer shopping - See what's possible with modern digital commerce technology - Hear from top industry voices about what’s next in commerce "
Tags : 
    
Oracle Commerce Cloud

Geek Guide: Cloud Scale Automation

Published By: Puppet     Published Date: Mar 13, 2017
Have you started moving to the cloud? Nearly 70 percent of organizations have at least one application living in the cloud already, and cloud adoption is growing fast. That's because organizations recognize the cloud is a great way to make IT more agile and helpful to the business. Download Cloud-Scale Automation with Puppet, and learn how you can ease the transition to cloud, gaining the agility your organization needs without adding hours of management time or unnecessary risk. You really can use cloud infrastructure as easily as you use on-prem, and keep it as secure as on-prem, too. You’ll learn how to: • Automate your cloud resources and manage infrastructure at scale. • Get started with Puppet on both Linux and Windows machines. • Make Puppet the foundation of your DevOps efforts, regardless of where you choose to deploy.
Tags : 
    
Puppet

Enabling Enterprise Digitalization through ERP Agility

Published By: Panaya     Published Date: Aug 04, 2016
This Panaya whitepaper explores methodologies and best practices for achieving IT agility for critical enterprise applications (ERP) in the era of digital transformation. It provides a unique perspective about how to increase IT velocity while minimizing IT risk and ensuring quality in a traditional IT environment.
Tags : 
panaya, erp, enterprise resources, digital transformation, digitalization, enterprise planning, erp software, knowledge management
    
Panaya

Return on Marketing Investment for Healthcare Providers

Published By: Evariant     Published Date: Sep 07, 2016
Marketers face a unique challenge to allocate resources across a variety of tactics to target key audiences that need their product or service – with limited information on what combination of products or services will have the optimum impact, which target audience members are ideal fits, and what allocations will provide the best return on investment to the organization. Healthcare has its own myriad of challenges, including many local, regional, and national options for consumers, service line variations, and disparate demographics. The good news is that there is an emerging understanding of digital and multichannel marketing, and ample opportunity to define best practices, systematically calculate marketing effectiveness and return on marketing investment (ROMI), and use technology and data to create great business outcomes.
Tags : 
evariant, multi-channel marketing, hospital, patient engagement, digital marketing
    
Evariant

Modernize or Outsource: Evaluating your Data Center Options

Published By: Schneider Electric     Published Date: Oct 31, 2017
In considering the four principal options of data center modernization, keep in mind that each option need not be treated as a separate and distinct approach. Data center stakeholders may want to combine options in order to better accommodate a particular migration timeline. Or cautious executives may want to simply dabble with the outsourcing option by piloting only a few select applications while still maintaining a core corporate data center. The key critical success factor is the recognition that data center modernization is not a one-time fi x, but rather a critical piece of an ongoing strategy to better service customers.
Tags : 
modernization, data center, investment, cost effectiveness, business sense, outsourced model, resources
    
Schneider Electric

Unlocking the Hidden Value of Hotel Function Space with Next-Generation Sales and Catering

Published By: Oracle     Published Date: Mar 28, 2017
Hotels and resorts with function space may well have an opportunity to boost their overall property revenue, given the escalating demand for function space and the fact that many of them have already maximized the value of their guest rooms through sophisticated revenue management capabilities. Success generally starts with a next-generation technology solution that can empower sales and catering personnel. Success also requires having in place the right organizational resources, business processes and performance metrics.
Tags : 
hotels, resorts, function, space, oracle, metrics
    
Oracle

The future starts now

Published By: Workday     Published Date: Oct 13, 2017
SaaS solutions are fast becoming the default deployment option for enterprise applications from Customer Relationship Management (CRM) and Human Resources (HR) to expenses. With growing momentum and interest in SaaS solutions, we explore a market leading SaaS provider, Workday, and understand how it’s finance solution can enable the transformation of the finance role; what it can deliver and why it is different.
Tags : 
    
Workday

Privileged Access Management: The Key To Protecting Your Business Amid Cybercrime's Current Boom

Published By: CA Technologies     Published Date: Sep 25, 2017
Available as a rack-mounted, hardened hardware appliance, an Open Virtualization Format (OVF) Virtual Appliance or an Amazon Machine Instance (AMI), CA Privileged Access Manager enhances security by protecting sensitive administrative credentials, such as root and administrator passwords, controlling privileged user access and proactively enforcing policies and monitoring and recording privileged user activity across all IT resources.
Tags : 
cloud applications, infrastructure, optimization, automation tools, administrative power, ca technologies
    
CA Technologies

When Your People Are Engaged, Your Projects Really Move

Published By: CA Technologies     Published Date: Sep 25, 2017
In a fast-changing app economy, agility and alignment are king. Without these attributes, it’s difficult to address top priorities around growth, customers and workforce. Organizations need to know that they’re developing and delivering the solutions that customers want when they want them. That means aligning the right resources to best-bet projects in order to roll out new offerings on time and within budget—and ultimately deliver value to the business.
Tags : 
management, engagement, employee, workflow, productivity, ca technologies
    
CA Technologies

Predictive Prioritization: Data Science Lets You Focus on the 3% of Vulnerabilities Lik

Published By: Tenable     Published Date: Feb 27, 2019
"Overwhelmed by the number of vulnerabilities your team faces? Uncertain which cyber threats pose the greatest risk to your business? You’re not alone. Cybersecurity leaders have been grappling with these challenges for years – and the problem keeps getting worse. On average, enterprises find 870 vulnerabilities per day across 960 IT assets. There just isn’t enough time or resources to fix them all. More than ever, it’s essential to know where to prioritize based on risk. Download the new whitepaper “Predictive Prioritization: How to Focus on the Vulnerabilities That Matter Most” to: -Learn how to focus on the 3% of vulnerabilities that have been – or will likely be – exploited -Uncover why CVSS is an insufficient metric for prioritization – and the key criteria you need to consider -Understand the Predictive Prioritization process, which uses machine learning to help you differentiate between real and theoretical risks Ensure you’re prioritizing the right vulnerabilities for your t
Tags : 
    
Tenable
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.