identify

Results 351 - 375 of 764Sort Results By: Published Date | Title | Company Name
Published By: EMC Corporation     Published Date: Mar 20, 2014
Gain insight into the effects of the changing information security threat landscape. Learn RSA’s approach to identifying strategies and techniques to establish a good defense, the “kill chain” concept and how to detect and respond, and how to level the adversarial playing field
Tags : 
emc, security threats, malware threats, malware protection, kill chain, rsa, defense, security
    
EMC Corporation
Published By: Shavlik Technologies     Published Date: Dec 15, 2010
This whitepaper will provide an overview of cloud computing, identify some challenges and considerations for using the cloud, and will look at how best to manage a combination of physical and virtual systems throughout your infrastructure in order to support your business objectives.
Tags : 
shavlik, cloud computing, infrastructure, physical and virtual system, patching, os migration, migration
    
Shavlik Technologies
Published By: NetIQ     Published Date: Apr 08, 2011
This white paper discusses the importance of file integrity monitoring (FIM), which facilitates the detection of malware as well as insider threats in identifying data breaches.
Tags : 
netiq, risk breach, file integrity monitoring, pci compliance, data security, fim, data breaches, malware detection, compliance, intrusion detection
    
NetIQ
Published By: Achievers     Published Date: Jan 17, 2014
Knowledge and strategic relationships fuel many organizations in today’s rapidly changing, global economy. As such, organizations need to leverage the individuals—and their networks—that possess the most relevant knowledge, whether they are current employees or are only loosely connected to the organization. To do this, organizations should create and leverage peer collaboration networks that enable them to identify and connect with individuals who have the unique skills, knowledge, and capabilities these organizations need. Bersin’s Research, Why Reputations and Networks Matter in the Open Talent Economy, indicates that this approach works in driving value—organizations that have effectively used internal reputation networks and profile databases have been able to increase key metrics such as employees’ time to productivity and innovation levels.
Tags : 
talent management, employee enagement, human resources
    
Achievers
Published By: Achievers     Published Date: Jan 17, 2014
Knowledge and strategic relationships fuel many organizations in today’s rapidly changing, global economy. As such, organizations need to leverage the individuals—and their networks—that possess the most relevant knowledge, whether they are current employees or are only loosely connected to the organization. To do this, organizations should create and leverage peer collaboration networks that enable them to identify and connect with individuals who have the unique skills, knowledge, and capabilities these organizations need.
Tags : 
    
Achievers
Published By: Idera     Published Date: Jan 08, 2014
Free Tool identifies SQL Server database corruption
Tags : 
idera, software download, sql server, server database corruptions.
    
Idera
Published By: Success Factors     Published Date: Feb 06, 2014
Effective onboarding is the key to getting new employees up and running both quickly and smoothly. Organizations able to ramp up new employee role clarity and confidence during onboarding by specifically identifying answers to the who, what, when, and where for getting things done enjoy higher new employee performance, higher job attitudes such as satisfaction and commitment, and decreased turnover. The use of technology to accomplish these twin goals of clarity and confidence is critical in today’s competitive landscape.
Tags : 
recruiting, human resources, talent management, recruiting strategies, social media, social media recruiting, engaging talent employee performance, performance reviews, human resources, talent management strategies, candidate sourcing
    
Success Factors
Published By: Skillsoft     Published Date: Jun 25, 2015
This paper takes you step-by-step through the process of addressing your immediate problems, building alliances throughout your organization, and making a successful business case for a learning solution, including: • Analyzing your current processes and identifying your needs • Mapping out the various processes and training requirements • Calculating the financial impact of training • Making the case and managing the project
Tags : 
learning solution, business case, lms, development, learning management strategy
    
Skillsoft
Published By: CDW Symantec     Published Date: Aug 02, 2012
Read about how Symantec provides the security needed to protect valuable information without hindering productivity. This white paper documents how Symantec helps identify, authorize, inspect and protect, so companies feel comfortable with their employees working from anywhere and from any device.
Tags : 
mobile, wireless, cloud computing, virtualization, data storage, data management, symantec, smart phones, rsa, cloud applications, data loss prevention, encryption, dlp, data center
    
CDW Symantec
Published By: ITinvolve     Published Date: Apr 16, 2013
What if you could quickly and easily review the potential impacts of making a change in your environment and identify each and every stakeholder who should weigh in on the risk of the change before it is approved? With social knowledge collaboration you can. Read this use case document to explore a real-world example of how social knowledge collaboration improves the accuracy and speed of change planning.
Tags : 
knowledge collaboration, social knowledge collaboration, social knowledge, collaboration, stakeholder, itinvolve
    
ITinvolve
Published By: BMC Software     Published Date: Jan 31, 2014
Consumerization of IT forces enterprises to rethink their approach to IT service delivery. What does consumerization really mean and why does it matter? Understand the basics to accurately identify the practical implications and benefits for your organization. This guide explores the realities of IT Consumerization to define challenges and opportunities. Learn best practices and get actionable recommendations. Please download the whitepaper to learn more.
Tags : 
bmc, cosumerized technology, cloud technology, mobile technology, social technology, customer-first, modernized work processes, social-enabled enterprise applications, internal customers, gartner, itssm, saas, itrpm, it service support management tools, cloud-based, customer experience, consumerization, network management, network performance, network performance management
    
BMC Software
Published By: BMC Software     Published Date: Jan 31, 2014
“Exploring Business and IT Friction: Myths and Realities,” outlines key issues that cause friction between business users and IT, such as: • Gaps in customer satisfaction and the perceived value of services • Inadequate IT support, which decreases productivity and revenue • Lack of communication and ownership in how business users and IT work together to identify service levels and technology needs See what 900 business and IT professionals had to say and get recommendations for change.
Tags : 
bmc, cosumerized technology, cloud technology, mobile technology, social technology, customer-first, modernized work processes, social-enabled enterprise applications, internal customers, gartner, itssm, saas, itrpm, it service support management tools, cloud-based, customer experience, consumerization, network management, network performance, network performance management
    
BMC Software
Published By: IBM     Published Date: Aug 08, 2014
Big data and analytics help insurance companies identify the next best action for customers. With the right solutions, companies can extract, integrate and analyze a large volume and variety of data, from call-center notes and voice recordings to web chats, telematics and social media.
Tags : 
big data, analytics, insurance, customer service, solutions
    
IBM
Published By: IBM     Published Date: Aug 08, 2014
Big data and analytics help insurance companies identify the next best action for customers. With the right solutions, companies can extract, integrate and analyze a large volume and variety of data, from call-center notes and voice recordings to web chats, telematics and social media.
Tags : 
big data, analytics, insurance, customer service, solutions
    
IBM
Published By: Marketo     Published Date: May 18, 2017
Marketing automation is a technology solution that helps enable the seeding, creation, nurturing and acceleration of demand among prospects and customers (see the brief “Marketing Automation Platforms Defined”). Given that marketing automation platforms (MAPs) are an essential component of every b-to-b organization’s marketing infrastructure, organizations understand the need for these platforms, as well as their internal need for optimized processes and skills to leverage them. However, while most b-to-b marketers understand the value of lead nurturing, lead scoring/prioritization, program and tactic level reporting, and the SiriusDecisions Demand Waterfall®, they often struggle to operationalize these processes with MAPs, which is why selecting the right MAP is imperative. In this SiriusView, we describe MAP providers’ differences to help organizations identify which MAPs best meet their needs.
Tags : 
program automation, multi channel, sales and enablement, predictive lead scoring, visual personalization, design, live event management
    
Marketo
Published By: INetU Managed Hosting     Published Date: Oct 09, 2015
Up to 60% of all cloud deployments stall or fail during the implementation process. Don’t let your business be one of them. Read this checklist to help identify your business needs and help the cloud hosting provider identify what services are best suited for your business to avoid a failed cloud.
Tags : 
cloud, hosting, managed hosting, managed cloud, migration, managed services, security, distributed computing, cloud computing, content management
    
INetU Managed Hosting
Published By: Evident.io     Published Date: Sep 13, 2017
Defending your cloud environment from menacing threats requires conditioning and ongoing commitment. Using best practices and identifying issues before they explode into costly problems are critical to long-term cloud fitness. Automating the process of monitoring and reporting is crucial to ensuring that your cloud is in the best shape it can be. With the "AWS Security Fitness Guide," you’ll learn the 11 exercises that are critical keeping your organization’s data and systems secure in Amazon Web Services (AWS).
Tags : 
    
Evident.io
Published By: Lenovo     Published Date: Oct 14, 2016
Get the details on the top threats to IT Security. This detailed (and entertaining) eBook provides you with the key stats you need to identify and stay ahead of the top six threats to IT security today—from ransomware to phishing and spyware to DDoS attacks. Download the eBook to get all the details!
Tags : 
security, ransomware, spyware, malware, theft, it threat, anti spyware, ddos, hacker detection, internet security, security management
    
Lenovo
Published By: Oracle Service Cloud     Published Date: Mar 23, 2016
This document defines Oracle’s Customer Experience (CX) Value Equation as the strategic method to identify and measure the value of organizational CX. This model was originally documented in “CX Metrics and KPIs – September 2012.” It has received wide support, and has been the #1 searched hit and downloaded CX KPI document for 3+ years – a significant achievement in this industry – in an era where concepts are replaced daily with the latest, greatest fad. Since the original publication, I have received significant feedback that has been overwhelmingly positive, but with a request to comment on additional topics – most notably: brand impact, shared services, and Oracle’s Road to Modern. This updated paper leverages the original work, adds information around these additional topics and incorporates our continued client experience.
Tags : 
oracle, service cloud, service management, customer interaction
    
Oracle Service Cloud
Published By: Oracle Service Cloud     Published Date: Mar 23, 2016
As the undisputed leader in home robots, iRobot has pioneered a completely new market, making it even more important for the company to establish what its customers want quickly, and to deliver outstanding customer-service experiences. To maximize adoption of its new technology, including its best-selling Roomba® vacuuming robots product line, iRobot wanted to optimize its use of multiple communications channels, to listen to its customers’ needs and identify revenue opportunities, while providing exceptional levels of service consistently across Web, social, and traditional channels.
Tags : 
oracle, service cloud, irobot, customer service, customer interaction
    
Oracle Service Cloud
Published By: Staples Business Advantage     Published Date: May 02, 2017
Dealing with the office bully is not as easy as dealing with a playground bully, but here are some strategies to help navigate being pushed into doing jobs that are not your responsibility, taking on too much, or simply being treated disrespectfully. Get this article to learn: How to identify bullying in the workplace Ways to control and mitigate disrespectful interactions Learn when to document, discuss, & elevate your concerns Everyone has the right to a respectful and positive working environment. Maybe someone should tell the office bully that.
Tags : 
office bully, positive work environment, safe workspace, office conflicts, office manager, administrative assistant
    
Staples Business Advantage
Published By: Staples Business Advantage     Published Date: Jun 16, 2017
Do you spend a lot of money maintaining your restroom, but don’t get the credit you deserve? Are you tired of unnecessary waste in the restroom? Would you like your staff to be able to spend less time cleaning the restroom and more time in other areas? Join Facilities Solutions Technical Training Senior Manager, Neal Duffy of Staples Inc. and Dr. Ronnie Phillips , Director of Omnichannel & eCommerce ,GP PRO as they highlight ways to uncover unnecessary spend in your restroom. By implementing a few simple changes, you will be able to identify long term cost savings for your facility and be able to re-allocate that spend to other areas of your day-to-day business.
Tags : 
technical training, ecommerce, long term cost savings, business day to day, cost reduction, work allocation, product usage, waste optimization
    
Staples Business Advantage
Published By: UBM Technology     Published Date: Oct 19, 2017
The annual report studies the content consumption habits of technology professionals, identifying the range of content formats that inform IT buyers and measuring the actions that content inspires. Research was conducted in October 2016 by UBM; analysis and report provided by MarketingProfs. Final data is based on an online survey of 235 qualified IT and business respondents in North America from all sized companies.
Tags : 
    
UBM Technology
Published By: Mainline Information Systems     Published Date: Oct 27, 2009
Learn how to identify the business case to support consolidation with System z Linux.
Tags : 
linux, mainline information systems, system z, migration, server consolidation, total cost of ownership, toc, virtualization, ras, applications
    
Mainline Information Systems
Published By: CBRE     Published Date: Oct 11, 2016
Real estate can be a significant competitive differentiator for businesses in the race for talent. Leading commercial real estate firm, CBRE, outlines the steps organizations need to consider when identifying optimal locations to attract and retain the right talent to enhance competiveness and drive bottom line performance. Download the white paper now.
Tags : 
workplace, commercial real estate, occupier, cbre, talent
    
CBRE
Start   Previous    8 9 10 11 12 13 14 15 16 17 18 19 20 21 22    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.