hi def

Results 26 - 50 of 1110Sort Results By: Published Date | Title | Company Name

3 Steps To Making Internal Talent Mobility Work

Published By: RolePoint     Published Date: Apr 26, 2016
Given that internal mobility is recognized as the number one source of hire in virtually every survey, it is surprising how few companies have a clear strategy, supporting technology, dedicated career site and a defined process for encouraging this.
Tags : 
rolepoint, internal talent mobility, recruiting, hiring, internal mobility
    
RolePoint

3 Things Small Businesses Really Need: Re-Defining the Digital Marketing Product Set

Published By: Marchex     Published Date: Oct 25, 2010
This whitepaper is about taking the small business digital marketing products back to the drawing board to deliver a product set that help small businesses easily, cost-effectively, and efficiently address three fundamental needs: 1. lead generation; 2. online presence and reputation management, and; 3. relationship management.
Tags : 
marchex, digital marketing, smb, small business, relationship management, lead generation, reputation, lead gen, online presence
    
Marchex

30 Minutes to a more secure enterprise

Published By: Cisco Umbrella EMEA     Published Date: Dec 03, 2018
Why Cisco Umbrella is the simplest decision you can make to improve your company’s security. You have to make some serious security decisions when you’re an IT leader. That’s because both the volume and sophistication of attacks are intensifying relentlessly — and it’s clear that conventional defenses alone are no longer adequate. More efective blocking of attackers is particularly important because under-the-radar attacks are wreaking havoc on enterprises that rely on antivirus products, frewalls, and sandboxing alone. A mere 30 minutes from now, any business can be more secure than it was before. That’s the simple reality of DNS-layer security.
Tags : 
    
Cisco Umbrella EMEA

4 Key Qualities of Effective Host-Based Intrusion Prevention (HIP) Systems

Published By: Third Brigade     Published Date: Aug 21, 2009
Organizations that need to protect business critical applications, and sensitive data and hosts recognize that traditional network defenses can be readily bypassed by attackers. This white paper defines four key qualities of an effective host-based IPS.
Tags : 
intrusion prevention, network security, data protection, hacker detection, intrusion detection, ips, intrusion prevention systems, host-based ips, security strategy, third brigade, security, security management, secure content management
    
Third Brigade

4 Ways to Deliver Excellent Customer Experiences

Published By: DocuSign UK     Published Date: Nov 06, 2018
"In this eBook, you’ll find four best practices that reflect recent thinking about Customer Experience (CX). As you consider these best practices, we urge you to broaden your definition of customers beyond buyers to include employees, suppliers, and vendors. All have opinions about their experiences with your company, and many will share them via word of mouth or online. For better or worse. According to the experts, CX is your key to competitive advantage and growth. Read on to find out what you can do to deliver stellar CX."
Tags : 
    
DocuSign UK

5 Best Practices for Defending the Enterprise

Published By: Entrust Datacard     Published Date: Jan 16, 2015
With every new data breach revealed or costly identity-theft case reported, confidence in data security and the protection of private identity information transactions — and overall trust — erodes. This loss of confidence in online services and reputation can have a direct impact on trust from end-users, customers, employees, partners, vendors and more. With significant advances in criminal threats — both in sophistication and sheer frequency — all enterprises are urged to bolster defenses, authenticate digital identities and safeguard sensitive information. Entrust offers five specific best practices — with emphasis on strong authentication, identity assurance, mobile enablement and general layered security — that can help protect against targeted attacks now and over the long term.
Tags : 
entrust, server, risk, assessment, authentication, standards, layered, authentication, education, malware, threats, mobile, data, security, integration, deployment, certificates, identity, network security, wireless security
    
Entrust Datacard

5 Elements of a Successful Patient Engagement Strategy

Published By: athenahealth     Published Date: Jun 08, 2015
This white paper will tell you how to implement a successful patient engagement strategy using these 5 elements: 1) Define your organization’s vision for patient engagement. 2) Create a culture of engagement. 3) Employ the right technology and services. 4) Empower patients to become collaborators in their care. 5) Chart progress and be ready to change and adapt.
Tags : 
patient engagement strategy, engagement culture, patient care, population health
    
athenahealth

5 Keys to Redefining Hotel Leadership

Published By: Oracle_Hospitality Hotels     Published Date: Feb 22, 2017
Innovative thinking, combined with the power of cloud technologies, can tackle the seemingly impossible. Learn how with the 5 Keys to Redefining Hotel Leadership.
Tags : 
    
Oracle_Hospitality Hotels

5 Myths About Enterprise SD-WAN

Published By: Forcepoint     Published Date: Jun 06, 2019
Five false assumptions about SD-WAN By now, almost everyone knows something about software-defined-wide-area networking (SD-WAN). SD-WAN is getting a lot of buzz over its MPLS counterpart, but every innovation in tech comes with certain misconceptions—it’s just part of the territory. Can SD-WAN take the place of internet? SD-WAN doesn’t require on-premises hardware, right? Outside of cost, is it really better than MPLS? Read “Secure Enterprise SD-WAN Myths” for answers to these questions and more, clarity around SD-WAN’s advantages and limitations, and how Forcepoint can help you implement secure SD-WAN for your distributed enterprise. And yes—SD-WAN really is better than MPLS.
Tags : 
    
Forcepoint

5 Myths of Cloud Computing

Published By: HP     Published Date: Oct 01, 2014
Cloud computing is a model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications, and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction. At the time this definition was published, “cloud” was already part of industry parlance, and was beginning to take root in the general lexicon. Additionally, global business spending for infrastructure and services related to the cloud had topped $78 billion. This year, enterprise spending on the cloud will reach an estimated $174 billion, and is expected to climb to $235 billion by 2017.2 Inevitably, as both business IT and consumer mindsets evolve toward the cloud in coming years, we will continue to witness dramatic growth in IT products in some areas, and significant reductions in other areas—resulting in a reshaping of the industry as a whole.
Tags : 
cloud, computing, on-demand, management, interaction, network, access, configurable, applications, servers, storage, model, it management, cloud computing
    
HP

5 OAuth Essentials for API Access Control

Published By: CA Technologies     Published Date: Mar 06, 2015
OAuth offre all'utente il pieno controllo sulla delega dell'accesso a un'API. Questo consente l'integrazione tra servizi per conto di tale utente. Gli stessi fornitori web social che hanno reso popolare il modello costituito dall'esposizione di un'API per consentire agli sviluppatori di terze parti di arricchire le loro piattaforme, sono stati i primi ad applicare questi meccanismi di autorizzazione delegati. OAuth è stata definito nel 2006, per standardizzare i meccanismi di questo tipo.
Tags : 
    
CA Technologies

5 OAuth Essentials for API Access Control

Published By: CA Technologies     Published Date: Aug 22, 2017
OAuth puts the user in control of delegating access to an API. This allows one service to integrate with another service on behalf of that user. The same social Web providers who popularized the pattern of exposing an API to enable third-party developers to enrich their platforms were the first ones to apply such delegated authorization mechanisms. OAuth was defined in 2006, to standardize mechanisms of this kind.
Tags : 
    
CA Technologies

5 Reasons the SaaS Revolution Needs a Unified Content Strategy

Published By: Box     Published Date: Jun 22, 2018
• As the needs of organizations grow more complex, delivering enterprise content that addresses the shift to mobility, usability and flexibility are key. Enterprise SaaS applications are creating demand for a new "inside-out" view of content management, extending capabilities to organizations and users who never had access. Until now. • Download the latest AIIM Tip Sheet, 5 Reasons Why the SaaS Revolution Needs a Unified Content Strategy to learn: o Why you should reexamine traditional ECM-defined processes o How to optimize your SaaS processes o Why SaaS should be part of your content management strategy
Tags : 
    
Box

5 Steps to Help Defend Your Network

Published By: Cisco     Published Date: Oct 08, 2015
This paper outlines and explains the 5 steps to help defend your network from infection, hacking and hard to detect threats.
Tags : 
network defense, hacking, detecting threats, security, network security
    
Cisco

5 things to Know About the Service-Defined Enterprise

Published By: Logicalis     Published Date: Jun 20, 2014
Transitioning your organization to a service-defined model will help your IT department deliver critical applications and capabilities that your lines of business need to stay competitive, at the pace your line of business managers need them. This brief discusses five considerations that will help you understand the benefits of the service-defined enterprise and help make the transition from technology-defined to service-defined a smooth one.
Tags : 
service-defined enterprise, it agility, it responsiveness, it transformation, shadow it, it as a service, itsm, service-based it, service-centric it, technology expectations, cio expectations, cio review, it results, it expectations, soap, service oriented architecture, business technology
    
Logicalis

5 Trend Tecnologici Che Ridefiniscono la Customer Experience

Published By: Genesys     Published Date: Feb 12, 2019
Abbiamo chiesto a una serie di analisti e figure di riferimento del settore di indicarci quali saranno secondo loro le tendenze chiave relative all’engagement del cliente a partire dal 2017. Da tecnologie all’avanguardia come l’IoT e i Bot fino a nuove interpretazioni di idee del passato, i temi caldi indicati hanno fatto emergere cinque trend fondamentali destinati a ridefinire il futuro della Customer Experience. In questo ebook, scoprirai: I cinque trend che avranno il maggiore impatto sulla Customer Experience Come usare il machine learning per identificare tendenze e modelli utili a offrire un’eccezionale Customer Experience di nuova generazione Come avere un contact center all’avanguardia e adattarlo alle esigenze in rapida evoluzione dei clienti
Tags : 
    
Genesys

5 Ways to Reduce Your Franchise’s Risk of Non-Compliance

Published By: Paycor     Published Date: Jun 05, 2014
Did you know that a study shows that almost 39 percent of franchise businesses fail after four years? Or that defaults on loans in the early 2000s were higher for franchised businesses than for independents? Is your business at risk of becoming such a statistic? Staying on top of changes to tax laws and health care reform can be overwhelming. This whitepaper will empower you to mitigate risk and ensure your franchise’s profitability.
Tags : 
franchise, compliance, labor law, wage and hour, tax law, healthcare reform, enterprise applications
    
Paycor

6 Ways SD-WAN Redefines Branch Office Networking

Published By: VMware SD-WAN by VeloCloud     Published Date: Aug 01, 2019
SD-WAN is designed for modern business. With it, you can apply software-defined principles to automate, optimize, and accelerate application performance over the WAN to meet business outcomes. Quite simply, SD-WAN is one of the smartest ways to modernize connectivity to the branch office and bring end-to-end simplicity across the network. Read this e-book now to discover 6 ways SD-WAN redefines branch office networking.
Tags : 
    
VMware SD-WAN by VeloCloud

7 Benefits of Using Presenter Video in Webinars

Published By: GoToWebinar     Published Date: Oct 08, 2013
What’s the one thing that could make webinars even better? Presenting in high-definition video. The benefits of using video in a webinar are numerous, some of which may even surprise you. This 1080 Group brief shares 7 ways presenter video can help you improve your webinars and impress your audience.
Tags : 
1080 group, webinar, communication, tips, presenting, business presentation, demand content, webinar tips, presenter, interactions, online, gotowebinar, employee performance, productivity, elearning, business technology
    
GoToWebinar

7 Qualities of a True Shipping Partner

Published By: Staples     Published Date: Jan 29, 2018
As a Staples Business Advantage® customer, exclusive content is just one of the perks you can access any time. In this infographic, we break down the seven essential qualities that define a shipping products partner, from selection to customer service and thousands of satisfied customers. See if you need to make a switch.
Tags : 
shipping, shipping partner, staples business advantage
    
Staples

7 Steps for a Holistic Innovation Management Process

Published By: Oracle     Published Date: Feb 10, 2016
In every company, today's ideas determine tomorrow's market profile. With rising competition, success can be achieved through a well-defined innovation process--one that connects upstream idea valuation to downstream production and release-to-market. To accomplish this, companies need to take a holistic approach to innovation management, connecting the process throughout all phases of the innovation lifecycle.
Tags : 
oracle, innovation management, best practices, holistic process, innovation process, innovation lifecycle, it management, wireless, data management
    
Oracle

7 Steps to Building Your API Blueprint

Published By: MuleSoft     Published Date: Apr 13, 2016
APIs are the key to creating new digital channels. They facilitate internal and external data sharing, enable mobile applications, and create new monetization opportunities. APIs are the key to creating new digital channels. They facilitate internal and external data sharing, enable mobile applications, and create new monetization opportunities. Read this eBook to learn: -how to define the business objectives that APIs will help achieve -best practices to design, manage, and deploy APIs -monitor and measure the impact of your APIs
Tags : 
digital infrastructure, data, data sharing, best practices, data management, application management, enterprise applications, network management, content management system, infrastructure, infrastructure management
    
MuleSoft

7 Steps to Defining and Designing an Effective Service Catalogue

Published By: Cherwell Software     Published Date: Jun 29, 2015
This guide provides: Key insight into how to create a service catalog, clear guidance on defining a service catalog, and an easy to use service catalog template to help you start realizing business and customer benefits.
Tags : 
service catalogue, service level agreement, service catalog template, operational service agreements, continual service improvement, best practices, information management, itil, productivity, project management, service management
    
Cherwell Software

7 Steps to Developing a Cloud Security Plan

Published By: Navisite- A Time Warner Cable Company     Published Date: Aug 07, 2013
Designing and implementing an enterprise security plan can be a daunting task for any business. To help facilitate this endeavor NaviSite has developed a manageable process and checklist that can be used by enterprise security, compliance, and IT professionals as a framework for crafting a successful cloud computing security plan. It defines seven steps—sequentially—that have been tested and refined through NaviSite’s experiences helping hundreds of companies secure enterprise resources according to best practices. This plan enables organizations to gain the economic advantages of secure and compliant managed cloud services.
Tags : 
cloud, security, cloud computing, security plan, enterprise security, business technology
    
Navisite- A Time Warner Cable Company

7 Steps to Developing a Cloud Security Plan

Published By: NaviSite     Published Date: Sep 02, 2014
This paper defines seven steps - sequentially - that have been tested and refined, to help you develop a cloud security plan.
Tags : 
cloud security, developing a cloud security plan, cloud security steps, managed cloud services, application security, disaster recovery, high availability, internet security, cloud computing, virtualization, infrastructure, mobile device management
    
NaviSite
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.