scribe

Results 226 - 250 of 861Sort Results By: Published Date | Title | Company Name

The Impact of Excellent Employee Wellbeing

Published By: OC Tanner     Published Date: Nov 16, 2016
The concept of wellness in the workplace is relatively new and many companies are actively creating wellness programs to improve the lives of their employees. However, the exact definition of wellness remains unclear and inconsistent across organizations. Global research conducted by The O.C. Tanner Institute helps establish a definition of employee wellbeing. This paper explains the large benefits in store for companies that are able to improve their employees’ wellbeing and explores why this trend is relevant in the workplace today. It describes, in detail, what companies can do to improve the large portion of life spent at work and, more specifically, investigates how the benefits and perks currently offered at work impact wellbeing and where they fall short.
Tags : 
rewards and recogntion, employee engagement, employee recognition, oc tanner, global engagement, global recognition
    
OC Tanner

Drax; how Darktrace has helped them stay ahead of emerging threats

Published By: Darktrace     Published Date: Aug 30, 2019
The Industrial Immune System is a fundamental AI platform for OT cyber defense. The self-learning technology passively learns what ‘normal’ looks like across OT, IT and industrial IoT, allowing it to detect even the subtlest signals of emerging cyber threats in real time. Martin Sloan, Group Head of Security, Drax: “I often describe Darktrace as life insurance. It catches anomalous behavior and deals with the incident immediately.” Find out how AI is being using to defend Drax power station, the largest coal-powered plant in the UK. Read this case study to find out how Darktrace’s Industrial Immune System can protect your entire digital infrastructure.
Tags : 
    
Darktrace

Zen of a Connected Business eBook

Published By: Sage     Published Date: Mar 07, 2018
There comes a time in a company’s growth when applications that used to work well can no longer keep up with complexities of scale. This white paper describes 3 warning signs that indicate your disconnected financial applications are holding you back. Also, learn how migrating to a unified cloud solution can improve financial forecasts, enable you to act on more accurate information, increase productivity, and more. Don’t make this mistake. In this eBook, we explain the three warning signs you must watch out for if you want to know when it’s time to move your important customer and financial information to the cloud. Then we’ll show you exactly what managing your most important information with a cloud-based accounting solution means for you and your business. Download it today.
Tags : 
    
Sage

Addressing Cyber Security Concerns of Data Center Remote Monitoring Platforms

Published By: Schneider Electric     Published Date: Feb 17, 2017
This paper describes key security aspects of developing and operating digital, cloud-based remote monitoring platforms that keep data private and infrastructure systems secure from attackers. This knowledge of how these platforms should be developed and deployed is helpful when evaluating the merits of remote monitoring vendors and their solutions.
Tags : 
cyber security, energy efficiency, power and cooling systems, mean time to recovery, mttr, data privacy, cloud-based platforms, digital remote monitoring, data center
    
Schneider Electric

Why Cloud Computing is Requiring us to Rethink Resiliency at the Edge

Published By: Schneider Electric     Published Date: Feb 17, 2017
In this paper, we describe and critique the common physical infrastructure practices seen today, propose a method of analyzing the resiliency needed, and discuss best practices that will ensure employees remain connected to their business critical applications.
Tags : 
best practices, business applications
    
Schneider Electric

Transforming Digital Experience for Australia's Public Sector

Published By: Riverbed ANZ DWA IT Leads GTM     Published Date: Nov 22, 2017
In this report 1,500 Australians describe how they currently use and rate digital public sector services across all levels of government, and what they expect from them today and into the future. The survey shows that Australians regularly engage with government through digital services, with half of respondents saying they do so on a quarterly basis, and 30 per cent accessing them fortnightly; but that the quality of the digital experience is paramount.
Tags : 
digital, experience, australia, public, sector, transition, hardware, software
    
Riverbed ANZ DWA IT Leads GTM

Survey: Transforming Digital Experience for Australia's Public Sector

Published By: Riverbed ANZ DWA IT Leads GTM     Published Date: Nov 22, 2017
What do Australians think? 1,500 Australians described how they use and rate digital public sector services across all levels of government and outlined current and future expectations for the platforms.
Tags : 
australians, confidence, experiences, public sector, improvement, government, digital
    
Riverbed ANZ DWA IT Leads GTM

Strategies To Run a Lean Supply Chain

Published By: Epicor     Published Date: May 28, 2008
This paper from Ventana Research describes lean manufacturing and how it can be applied to supply chain management.
Tags : 
lean, lean methods, bpm, business process management, erp, enterprise resource planning, scm, supply chain, epicor, supply chain management
    
Epicor

Tuning ERP and the Supply Chain for Profitable Growth

Published By: Epicor     Published Date: May 28, 2008
This white paper describes lean manufacturing and how it can be applied to supply chain management.
Tags : 
erp, supply chain management, scm, epicor, enterprise resource planning, visibility, globalizing, ventana research, lean
    
Epicor

Narrowing the Security Gap with Automated Configuration Assessment

Published By: Qualys     Published Date: Jun 02, 2015
In this guide, Qualys describes internal risks to IT security and three best practices to control incorrect configurations. Critical components to this include automation of assessments and prioritization of risks. By using the automation technology in Qualys Policy Compliance, organizations can ensure the safety of sensitive data and IT while meeting mandates for compliance.
Tags : 
security gap, automated configuration assessment, it security, compliance, security
    
Qualys

Continuous Monitoring: A New Blueprint for Achieving Continuous Security & Compliance

Published By: Qualys     Published Date: Jun 02, 2015
This guide describes the need for continuous monitoring and offers a blueprint for creating a continuous security practice. As a result, continuous monitoring will give your organization the most comprehensive view of its global perimeter, and empower you to proactively identify and address potential threats enabled by vulnerabilities in software or weak system configurations.
Tags : 
continuous monitoring, continuous security, potential threat identification, system configurations, security
    
Qualys

Rescue Your Revenue With Browse and Cart Recovery

Published By: Bronto     Published Date: May 31, 2018
We subscribed to the email lists of 50 brands in the Internet Retailer Top 1000 to see what type of personalization and triggered messages they use to entice customers back to their websites. What you'll learn: • How effectively brands are using customer data to nudge them back onto the purchase path. • How triggered messages can better engage customers and keep them coming back. • How browse and cart recovery can rescue revenue that would otherwise be lost.
Tags : 
revenue, email, internet, retailer, website
    
Bronto

Seven Requirements for Balancing Control & Agility in the Virtual Environment

Published By: BMC ESM     Published Date: Aug 19, 2009
The paper discusses the agility enabled by virtualization, the resulting control challenges, and a way to meet those challenges. It describes seven major requirements for success and reviews how the BMC/VMware approach helps IT ensure control over the virtualized data center and maintain compliance with corporate policies and government regulations.
Tags : 
bmc software, virtualization, vmware, virtualized data center, networking, storage, governance, infrastructure, network architecture, network management, storage virtualization
    
BMC ESM

Strategies for Modernizing IT, Reducing Costs, and Improving Operational Efficiency

Published By: BMC ESM     Published Date: Nov 05, 2009
This paper discusses the pressing need for IT modernization. It describes how a strong service assurance capability enabled by available BSM solutions can help you meet this need and deliver compelling business benefits. These benefits include greater IT staff efficiency, improved service delivery to the business, less risk, and lower costs.
Tags : 
bmc esm, it modernization, business service management, consolidation, automation, configuration management database, business process automation, business process management, it spending, server virtualization, configuration management, database development, productivity
    
BMC ESM

The Architecture and Security of SAS® Marketing Operations Management

Published By: SAS     Published Date: Apr 21, 2015
This white paper describes the architecture of SAS Marketing Operations Management and various aspects of its deployment and security.
Tags : 
    
SAS

7 Ways Dell Compellent Optimizes VMware Server Virtualization

Published By: Dell Storage     Published Date: Apr 21, 2011
This white paper describes how Fluid Data storage reduces the capacity required to support VMware, maximizes system performance and efficiency, accelerates storage provisioning, simplifies resource management and streamlines disaster recovery.
Tags : 
dell compellent, vmware server virtualization, compellent san, virtualized storage platform, fluid data storage, system performance, resource management, disaster recovery, storage area networks, storage management, storage virtualization, application performance management, server virtualization
    
Dell Storage

Ten Tips for Establishing a Secure Foundation for BYOD

Published By: WatchGuard     Published Date: Jan 28, 2013
This white paper describes the market drivers behind the BYOD phenomenon, the challenges presented to an organization, a strategic outline to manage BYOD, and how WatchGuard helps to create a secure BYOD ecosystem.
Tags : 
byod, bring your own device, it security, business technology, mobile device management
    
WatchGuard

Day in the Life of a Sales Rep

Published By: Brainshark     Published Date: Nov 05, 2013
Enabling sales mobility is key to gaining a competitive advantage. Help your sales team follow through at critical moments, and don't let opportunities go cold. In this video, a sales rep describes how his iPad and Brainshark helped him prepare, train, and engage his audience to advance an opportunity to close.
Tags : 
sales enablement, sales training, sales productivity, sales effectiveness, sales revenue, sales costs, product marketing, content marketing, onboarding sales, sales new hires, mobile sales, sales mobility, powerpoint, ppt, presentation, video, video training, ipad, iphone, video marketing
    
Brainshark

Bringing I.T. Closer to Business

Published By: dynatrace     Published Date: Feb 01, 2013
This paper describes how Compuware dynaTrace, part of the Compuware APM solution, bridges the gap between business and IT by bringing together Business Transaction Management (BTM) and Application Performance Management (APM) in a single system.
Tags : 
application integration, application performance management, best practices, business activity monitoring, business management, customer interaction service, return on investment
    
dynatrace

Integrating NetApp Storage with SAP NetWeaver Landscape Virtualization Management

Published By: Netapp     Published Date: Apr 02, 2013
This document describes a solution on a NetApp® shared storage infrastructure that provides system administrators with the ability to quickly copy, clone, and manage SAP® systems.
Tags : 
sap, netapp, shared storage, storage, virtualization, landscape, virtualization management, backup and recovery, storage area networks, storage management, storage virtualization, database security
    
Netapp

Why the Cloud for Collaboration?

Published By: Cisco     Published Date: Jan 14, 2014
This IDC white paper discusses some of the strategic benefits and advantages associated with a migration to a cloud-based collaboration offering as well as the challenges that CIOs and decision makers face when making such a move. It describes key decision criteria and the thought process behind a move to the cloud for collaboration and provides an example of Cisco Hosted Collaboration Solution (HCS) as a market-leading solution.
Tags : 
cisco, cloud, cloud collaboration, cloud-based collaboration, cisco hosted collaboration solution, hsc, it management
    
Cisco

The Top 10 Mistakes Incident Responders Make Combatting Advanced Threats

Published By: FireEye     Published Date: Mar 05, 2014
Whether they work for an up-and-coming startup or an industry giant, security response teams are under siege as never before. Today's cyber attacks are sophisticated, relentless, and devastating, costing U.S. businesses $8.9 million a year each on average. Attacking in multiple stages across multiple vectors, advanced persistent threats (APTs) and other sophisticated attacks easily evade signature-based detection and other traditional defenses. Thiswhite paper describes: The 10 most common mistakes, strategic and technical, that incident response teams make; The effect of these mistakes and how to avoid them with a well-defined incident response plan.
Tags : 
fireeye, persistent threats, advanced attacks, multi-vector, multi-stage nature, combatting advanced attacks, cohesive threat vectors, correlated threat vectors, real-time security, malicious code installs, block callbacks, threat intelligence, malware forensics, cyber warfare, security
    
FireEye

How Data Centers are Becoming Unwitting Accomplices in Advanced Cyber Attacks

Published By: FireEye     Published Date: Mar 05, 2014
If information is the lifeblood of today's digital economy, data centers are the heart. These mini-metropolises of silicon, metal, and cable are as essential to modern business as steel, motors, and coal were to the last great industrial revolution. In addition to their vital role in most business processes, data centers are the building blocks of emerging trends such as Big Data, global collaboration, and even bring-your-own-device (BYOD). The white paper describes: The widening gap between the offensive capabilities of today's cyber attackers and the weak traditional defenses deployed in most data centers; How organizations can better protect data centers.
Tags : 
fireeye, persistent threats, advanced attacks, multi-vector, multi-stage nature, combatting advanced attacks, cohesive threat vectors, correlated threat vectors, real-time security, malicious code installs, block callbacks, threat intelligence, malware forensics, cyber warfare, security
    
FireEye

Cloud Powers The New Connected Economy

Published By: Epicor     Published Date: Feb 20, 2018
Cloud is no longer a tactical solution but rather a strategic enabler of connected economies. Technology leaders will orchestrate cloud ecosystems that connect employees, customers, partners, vendors, and devices to serve rising customer expectations. Firms will shift from being mere cloud adopters to becoming cloud companies themselves—stewards of their own ecosystems. This Forrester report—presented by Epicor—highlights the transformation taking place as we move to a world of connected cloud ecosystems, and it describes how: • The cloud economy disrupts business models • Rightsourcing is a key challenge to cloud success • You will orchestrate the cloud, and it will orchestrate you Download the report to learn more and discover why you should change the way you think about cloud.
Tags : 
cloud, erp
    
Epicor
Start   Previous    3 4 5 6 7 8 9 10 11 12 13 14 15 16 17    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.