resources

Results 276 - 300 of 1795Sort Results By: Published Date | Title | Company Name

5 Things to look for in an administrative services partner

Published By: Excellus BlueCross BlueShield     Published Date: Nov 02, 2017
Learn how to find an administrative services partner that helps you get back to what you love about your business.
Tags : 
401k, payroll, benefits, employee benefits, human resources, administrative services, bluecross blueshield, healthcare, health plans, healthcare benefits, employee benefits management, employee benefits services
    
Excellus BlueCross BlueShield

What’s next for hyper-converged infrastructure: 5 powerful HCI use cases for 2019 and beyond

Published By: VMware     Published Date: Oct 12, 2018
Since Hyper Converged Infrastructure (HCI) emerged as a breakthrough technology, it has continued to gain taction as it has truly delivered on its promise. It has helped organizations optimize resources, reduce complexity, lower costs, increase agility and accelerate development cycles, as well as provide a seamless path to hybrid cloud. These are just a few of the key benefits causing IT leaders pay close attention to HCI and look at ways to use it to power key initiatives such as digital transformation. As IT leaders continue to embrace HCI and the market is expected to grow at a compound annual rate of 42% through 2023, the future is happening now. Submit the form to read our latest whitepaper and discover 5 powerful HCI case studies around Business critical applications, Hybrid Cloud/Multicloud, Disaster recovery, Edge computing, Container and App Development.
Tags : 
    
VMware

2017 State of Cybercrime Report

Published By: Secureworks ABM UK 2017     Published Date: Oct 23, 2017
Cybercriminals can be goal-driven and patient, and they often have a singular focus, plenty of time and access to vast, modern technical resources. Both organized and forum-based criminals are working constantly to find innovative and efficient ways to steal information and money with the lowest risk to their personal freedom. If we wish to stay “one step ahead” of the threats detailed in this report, awareness of online criminal threats, techniques and markets is our best defense.
Tags : 
cyber security, cyber security framework, data security, firewall, general data protection regulation, incident and problem management, information security, intrusion detection, intrusion prevention, log management, malware, vulnerabilities, managed security services, network security, pci compliance, penetration testing, ransomware security consulting, security management, security monitoring, vulnerability assessments
    
Secureworks ABM UK 2017

CA Technologies Introduces Robust Multicloud Infrastructure Monitoring

Published By: CA Technologies     Published Date: Aug 24, 2017
IDC's research shows that, worldwide, over 70% of enterprise cloud users currently rely on multiple clouds (public and/or private) to support a wide range of applications and workloads. Efficient management of these resources depends on IT operations and DevOps teams having access to consistent, accurate infrastructure performance monitoring data and reporting that span the full set of on-premise cloud infrastructure and public cloud IaaS services. CA Technologies recently announced new capabilities for CA Unified Infrastructure Management (CA UIM) that allow the product to more fully address the monitoring needs of complex multicloud infrastructure as part of delivering on CA's vision to fully enable the agile DevOps in the application economy.
Tags : 
    
CA Technologies

Secure Mobility: Windows Server 2012 Helps Tame the BYOD Tide

Published By: Dell & Microsoft     Published Date: Aug 14, 2013
Employees are increasingly bringing their own devices to work and accessing corporate IT resources from home. Windows Server 2012 helps mitigate potential security, use and control issues and makes implementing a BYOD strategy easier.
Tags : 
secure mobility, windows server, security
    
Dell & Microsoft

Optimizing storage for a highly efficient data center environment

Published By: IBM     Published Date: May 02, 2013
The enormous volume, velocity and variety of data flooding the enterprise, along with the push for analytics and business intelligence, is creating a massive challenge that is overwhelming traditional storage approaches. As the demand for capacity continues to escalate, companies must be able to effectively and dynamically manage the storage supply, but also the demand for storage resources. The key is to optimize the infrastructure through standardization and virtualization, and replace manual tasks with policy-based automation.
Tags : 
optimize, storage, efficient, data center, analytics, business, virtualization
    
IBM

Using modular data center design to create a highly efficient data center

Published By: IBM     Published Date: May 02, 2013
The explosion in IT demand has intensified pressure on data center resources, making it difficult to respond to business needs, especially while budgets remain flat. As capacity demands become increasingly unpredictable, calculating the future needs of the data center becomes ever more difficult. The challenge is to build a data center that will be functional, highly efficient and cost-effective to operate over its 10-to-20-year lifespan. Facilities that succeed are focusing on optimization, flexibility and planning—infusing agility through a modular data center design.
Tags : 
modular, data center, efficient, optimization, flexibility, cost-effective
    
IBM

App. Release & Deployment For Dummies

Published By: IBM     Published Date: Apr 06, 2016
" This eBook will take you through the basics of application release and deployment, and provide best practices for implementation with resources for a deeper dive. Inside you will find: • Business and technical drivers behind automated application release and deployment • Evaluation guides • Success stories that utilize application release and deployment solutions Complete the short form to the right to download the eBook."
Tags : 
ibm, application release, devops, deployment, ibm urbancode, software development, enterprise applications
    
IBM

Web Application Security for Dummies

Published By: Qualys     Published Date: Jul 20, 2012
Welcome to Web Application Security For Dummies! Web applications have become the Achilles heel of IT security. Web application vulnerabilities are now the most prevalent at more than 55 per cent of all server vulnerability disclosures. This figure doesn't include vulnerabilities in custom-developed web applications, so it may be just the tip of the iceberg. This book is all about understanding how to quickly find and fix vulnerabilities in web applications. The goal is to prevent attackers from gaining control over the application and obtaining easy access to the server, database, and other back-end IT resources.
Tags : 
technology, security, vulnerabilities, internet, virus, solutions, vulnerability management, web application, application security, internet security, security management, web service security, business technology, research
    
Qualys

Hybrid Cloud Infographic

Published By: New Relic     Published Date: Apr 07, 2015
The hybrid cloud model-combining public cloud services with private (on-premises) resources-is increasingly gaining traction in companies both big and small. But in order to reap its benefits, organizations will first have to solve the complex monitoring problem. The good news: a simple solution exists!
Tags : 
    
New Relic

Course Apps: An NMC Horizon Project Strategic Brief

Published By: Adobe     Published Date: Jun 01, 2016
This report explores the evolution of the key features of course apps mobility, interactivity, engaging design, and integrated analytics — and showcase how course apps are sparking new thinking in higher education about the next iteration of digital learning resources.
Tags : 
education, mobility, mobile applications, apps, course apps, mobile applications, interactivity, apps for education, digital learning, online learning, mobile computing, mobile data systems, mobile workers, elearning, virtualization, cloud computing
    
Adobe

Conversion best practices toolkit

Published By: Optimizely     Published Date: Apr 06, 2018
Welcome to the conversion best practices toolkit from Optimizely! You’re already one step closer to delivering meaningful digital experiences and turning prospects into customers. In an increasingly competitive landscape where customers demand more from their digital interactions with companies across a growing number of communication channels, customer acquisition can be a big challenge. In this toolkit, you’ll find a variety of resources aimed at helping you identify conversion optimization opportunities and acquire new customers with greater efficiency.
Tags : 
    
Optimizely

A Platform For Modernizing Java Applications

Published By: JBoss Developer     Published Date: Oct 21, 2016
Java applications have been a central technology for enterprises for two decades. This wealth of data, functionality, and knowledge are critical to enterprises. With Java-based applications, modern development can build on a platform that enables cloud-native architectures while simultaneously supporting existing applications. This combination of traditional enterprise-wide monoliths and cloud-based application deployment allows organizations to take advantage of existing knowledge and resources while actively moving toward newer application models.
Tags : 
middleware, java, big data, analytics, mobile development, database development, cloud computing
    
JBoss Developer

For Midsize Businesses: Now is the Time for Hyper-Converged Infrastructure

Published By: VMware     Published Date: Apr 09, 2019
Midsize businesses face the same need to modernize IT and embrace digital transformation as their larger competitors. Only, they typically have fewer resources—money and people—to throw at the problem
Tags : 
    
VMware

Top Six Performance Challenges in Managing Microservices in a Hybrid Cloud

Published By: AppDynamics     Published Date: Sep 20, 2017
A microservice architecture provides benefits in the areas of service isolation and deployment as well as independent scalability. These benefits lead to more rapid release cycles and better use of available resources. But a microservice architecture also presents a host of new challenges in both deployment as well as performance management. The benefits to microservices far outweigh their challenges and, by identifying them early, you can plan for and ensure that your adoption of a microservices architecture goes smoothly.
Tags : 
microservice, management, business transactions, hybrid cloud, docker, environment
    
AppDynamics

Tackling Increasing SMF Data Volumes and Decreasing Resources in the Mainframe Environment

Published By: CA Mainframe     Published Date: Sep 12, 2008
Increasing infrastructure complexity has led to unprecedented growth in enterprise systems management data on all systems, including the mainframe and it is becoming more complex to manage SMF data.  Download this Technology Brief to learn how to address the complexity of managing SMF data.
Tags : 
smf, service management, data management, infrastructure, systems management, ca mainframe, mainframe, system management software
    
CA Mainframe

Automized Storage for z/OS

Published By: CA Mainframe     Published Date: Sep 12, 2008
The CA Automated Storage Optimization Mainframe Suite provides a best-practices-based and intelligent approach to SRM, delivering the tools to identify and classify your storage assets. Access this Technology Brief to understand how to maximize use of existing storage resources and ensures protection of business-critical applications and information.
Tags : 
srm, storage resource management, zos, z/os, ibm, ibm server, ca mainframe, mainframe, ibm mainframe, storage optimization, mainframe storage, networking, platforms, storage, storage management
    
CA Mainframe

Better IT Decisions

Published By: HP - Enterprise     Published Date: Jun 04, 2013
Businesses are overwhelmed with data; it’s a blessing and a curse. A curse because it can overwhelm traditional approaches to storing and processing it. A blessing because the data promises business insight that never existed earlier. The industry has spawned a new term, “big data,” to describe it. Now, IT itself is overwhelmed with its own big data. In the press to roll out new services and technologies—mobility, cloud, virtualization—applications, networks, and physical and virtual servers grow in a sprawl. With them comes an unprecedented volume of data such as logs, events, and flows. It takes too much time and resources to sift through it, so most of it lies unexplored and unexploited. Yet like business data, it contains insight that can help us solve problems, make decisions, and plan for the future.
Tags : 
data research, big data, virtualization, applications, networks, productivity, project management, service management
    
HP - Enterprise

HP 2012 Cyber Risk Report Infographic - Mobile Vulnerabilities

Published By: HP - Enterprise     Published Date: Sep 16, 2013
HP Enterprise Security provides a broad view of the vulnerability landscape, ranging from industry-wide data down to a focused look at different technologies, including web and mobile. The goal of this report is to provide the kind of actionable security that intelligence organizations need to understand the vulnerability landscape as well as best deploy their resources to minimize security risk.
Tags : 
internet security, intrusion detection, intrusion detection/ forensics, intrusion prevention, mobile security, network security appliance, security, security policies, technology security, web service security, vulnerability management, networking, application security, phishing, security management, security monitoring, security solutions, network security
    
HP - Enterprise

HP 2012 Cyber Risk Report Infographic - Vulnerability Trends

Published By: HP - Enterprise     Published Date: Sep 16, 2013
HP Enterprise Security provides a broad view of the vulnerability landscape, ranging from industry-wide data down to a focused look at different technologies, including web and mobile. The goal of this report is to provide the kind of actionable security that intelligence organizations need to understand the vulnerability landscape as well as best deploy their resources to minimize security risk. Download this infographic for more info!
Tags : 
internet security, intrusion detection, intrusion detection/ forensics, intrusion prevention, mobile security, network security appliance, security, security policies, technology security, web service security, vulnerability management, networking, application security, phishing, security management, security monitoring, security solutions, network security
    
HP - Enterprise

Moving Mountains

Published By: SuccessFactors     Published Date: Jun 02, 2009
This Whitepaper shows the results of a survey conducted with over 500 SuccessFactors customers. See how they increased productivity and drove significant financial impact to their respective organizations.
Tags : 
successfactor, human resources, productivity, execution, strategy, management, project
    
SuccessFactors

Why You Should SWITCH to a New ATS

Published By: iCims     Published Date: Jan 24, 2017
The decision to keep your current applicant tracking system (ATS for short) or switch to a new ATS, is often a difficult one to make. Switching to a new applicant tracking system can be costly and a perceivable headache to implement. However, when you find an ATS that meets your company’s unique needs while providing resources to help your company both today and tomorrow; then switching could be the best decision your company makes. The right applicant tracking system should provide solutions to your most common pain points, saving you time, money, and energy.
Tags : 
    
iCims

Creating a Strong Culture: HR Partners Enable Success

Published By: TriNet     Published Date: Aug 03, 2015
Building the right culture is one of the biggest drivers for business growth and employee engagement. HR has been designated to handle that charge, but they often lack the appropriate resources and time to effectively maintain their culture. With the right support from outside parties, HR can save time and energy by outsourcing administrative tasks and build their culture and their workforce in the process.
Tags : 
trinet, employees, benefits, partners, human resource technology
    
TriNet

Creating a Strong Culture: HR Partners Enable Success

Published By: TriNet     Published Date: Sep 13, 2016
Building the right culture is one of the biggest drivers for business growth and employee engagement. HR has been designated to handle that charge, but they often lack the appropriate resources and time to effectively maintain their culture. With the right support from outside parties, HR can save time and energy by outsourcing administrative tasks and build their culture and their workforce in the process.
Tags : 
trinet, hr package, employee benefits
    
TriNet

Driving Business Execution Through Integrated Talent Management

Published By: Success Factors     Published Date: Feb 22, 2012
HR organizations have the capabilities to play a central role in driving business execution. But many fail. Download your white paper now, compliments of SuccessFactors, and learn how to use talent management to drive business execution.
Tags : 
success factors, employees, employment, talent management, human resources, hr management, business talent
    
Success Factors
Start   Previous    5 6 7 8 9 10 11 12 13 14 15 16 17 18 19    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.