organization

Results 6501 - 6525 of 6938Sort Results By: Published Date | Title | Company Name
Published By: Dell Software     Published Date: Apr 17, 2013
The paper showcases how IT can proactively address problems before they result in service degradation. Foglight provides the visibility organizations need into the why of customer behavior. Line-of-business owners can identify sources of customer frustration and work with IT to eliminate issues.
Tags : 
beyond web analytics, dell, quest software, reduce customer frustration, visible organizations
    
Dell Software
Published By: Dell Software     Published Date: Apr 17, 2013
Approaches organizations take to manage application performance vary based on data collection, types of metrics captured and how these solutions are deployed and managed. TRAC Research surveyed more than 400 organizations on key areas of web and Application Performance Monitoring. See the results in this paper.
Tags : 
dell, transactin-centric, infra-centric, apm, trac research, application performance monitoring
    
Dell Software
Published By: Verint     Published Date: Apr 24, 2013
Commonwealth Bank of Australia, with over 1,000 branches and 50,000 employees was using spreadsheets to staff its branch network. When they looked to desktop process analytics from Verint they achieved major improvements in productivity and customer experience. Watch this case study to learn more about how desktop process analytics can use big data to help your organization.
Tags : 
case study, big data, organization, desktop process analytics, process management, analytics, workforce management
    
Verint
Published By: HireRight     Published Date: May 01, 2013
Volunteer organizations are in the business of helping--never harming. It is important to ensure your ambassadors are worthy of your trust, for your reputation and the safety of your communities could be at stake. Background screening is a key component in protecting your organization and community members. This industry brief outlines the risks that can result by not screening volunteers.
Tags : 
hireright, human resources, hr department, volunteers, organization
    
HireRight
Published By: HireRight     Published Date: May 01, 2013
Employee screening is a critical capability for organizations today. No longer just a part of the hiring process, employee background checks, eligibility verification and even tax credit screening are increasingly part of the ongoing talent life cycle. Aberdeen Group’s latest survey on talent acquisition strategies looked at the practices of over 480 organizations for best practices used and results delivered through the use of employee screening tools and solutions.
Tags : 
employee screening strategies, human resources, hireright
    
HireRight
Published By: Logicalis     Published Date: Aug 20, 2014
We are pleased to present the findings of The Impact of IT Transformation on Enterprise Computing sponsored by Logicalis. The objective of this research is to better understand how the different stages of IT transformation can affect an organization, the challenges of advancing through each stage, and how successful progression can improve an organization’s IT effectiveness.
Tags : 
logicalis, it transformation, it strategy, it budget, it solutions, it system, it priorities, networking, security, software development, it management, knowledge management, data management, virtualization, converged infrastructure, draas, cloud computing, automation, automation & orchestration, protection
    
Logicalis
Published By: Logicalis     Published Date: Sep 22, 2014
Video solutions eliminate geographic boundaries and allow you to sit across a conference table from fellow participants, regardless of where they are in the world. By using unified video collaboration solutions for a virtually unlimited number of applications, you can boost productivity and communication throughout your organization, even across the largest of enterprises—allowing you to become more agile and responsive to changing needs. Download this white paper to learn how.
Tags : 
logicalis, cisco, cisco systems, video communication, video solutions, enterprise video technologies, enterprise applications, employee collaboration, innovation
    
Logicalis
Published By: HP and Intel ®     Published Date: May 06, 2013
While virtualization is delivering clear benefits to multiple areas of IT, organizations need to start thinking about it holistically to serve business needs. Learn more about maximizing the value of your virtualization IT environment with this CIO.com eBook.
Tags : 
virtualization, enterprise, data center, benefits, cloud computing, infrastructure, design and facilities
    
HP and Intel ®
Published By: Viavi Solutions     Published Date: Apr 07, 2017
Growing in number and becoming increasingly more malicious, security threats and attacks pose a severe threat to the survival of a business. Security operations teams need to leverage every available tool to respond more quickly and effectively to these incidents. While network packet capture and forensic analysis has traditionally been used by network operations, such a tool can also help security teams augment existing defenses and get on top of these threats. Given the hostile IT security environment, close collaboration between these groups is crucial to overall IT organizational success. This white paper explains the importance of packet capture and forensic analysis to security operations, examines the dynamics of this growing collaboration between security and network teams, and explores a leading platform in this market from Viavi Solutions.
Tags : 
    
Viavi Solutions
Published By: Payscale, Inc     Published Date: Jun 06, 2013
Learn the five steps to creating a compensation plan in your organization. This guide includes how to perform compensation analysis, and get buy-in from company leadership.
Tags : 
compensation planning, salary range, salary benchmarking, compensation analysis
    
Payscale, Inc
Published By: Dell SecureWorks     Published Date: May 28, 2013
The Dell SecureWorks Incident Response and Digital Forensics team helps organizations of all sizes and across all industries prepare for, respond to and recover from even the most complex and large-scale security incidents.
Tags : 
incident response, security breach, security incidents, hacker detection, internet security, intrusion detection, intrusion prevention, security management, vulnerability management
    
Dell SecureWorks
Published By: Dell SecureWorks     Published Date: May 28, 2013
Advanced Persistent Threats (APT) are a serious concern in today’s threat landscape. They represent a threat to an organization’s intellectual property, financial assets and reputation. In some cases, these threats target critical infrastructure and government suppliers, thereby threatening the victim country’s national mission.
Tags : 
security
    
Dell SecureWorks
Published By: Dell SecureWorks     Published Date: May 28, 2013
The Dell SecureWorks Incident Response and Digital Forensics team helps organizations of all sizes and across all industries prepare for, respond to and recover from even the most complex and large-scale security incidents.
Tags : 
security, security breach, incident response, digital forensics, hacker detection, internet security, intrusion detection, security management
    
Dell SecureWorks
Published By: Cisco Systems     Published Date: Oct 16, 2013
Collaboration is the biggest opportunity of the next decade. In The Collaboration Imperative, learn how to unleash hidden assets in your company and build a world-class organization that can tackle market opportunities with lightning speed. Read Now
Tags : 
collaboration, cisco, best practices, technology, ebook
    
Cisco Systems
Published By: Salesforce.com     Published Date: Jun 17, 2013
Get the Nucleus Research survey of CRM decision makers, showing the the significant ROI opportunity all organizations should consider regarding mobile and social CRM adoption.
Tags : 
customer relationship management, crm, technology, value matrix, support sales, marketing, customer service, crm solutions, social drives, mobile device, social
    
Salesforce.com
Published By: IBM     Published Date: Sep 06, 2013
In this report, we look at the four things you can do now to help keep your organization safe: Prioritize your business objectives and set your risk tolerance, protect your organization with a proactive security plan, prepare your response to the inevitable: a sophisticated attack and promote and support a culture of security awareness.
Tags : 
responding to attacks, recovering from attacks, sophisticated security attacks, ibm, security risks, educated staff, it environments, attack protection, attack prevention, compliance demands, security
    
IBM
Published By: IBM     Published Date: Sep 06, 2013
An Assessment Of The Current Security Landscape And How to Overcome It -- Technical information security skills are in higher demand today than ever before. As IT environments become more complex and the threat landscape grows more malicious , organizations need skilled technical staff to meet increasing security and compliance demands. Read this white paper and learn how to survive the technical security skills crisis.
Tags : 
forrester, ibm, security risks, educated staff, it environments, attack protection, attack prevention, compliance demands, security
    
IBM
Published By: Oracle     Published Date: Sep 21, 2015
You can't build the procurement organization of the future with tools of the past. The cloud is your opportunity to transform yourself and fulfill your ambitions.
Tags : 
oracle, social, insight, procurement, automation, finance
    
Oracle
Published By: IBM     Published Date: Sep 10, 2013
There is no fail-safe in today's digital world. Incidents will occur, both unintentional and malicious. To mitigate damage and organizational impact, the agile organization will respond quickly. To mitigate risks before damage occurs, an organization can maintain a continuous high state of security, ensure that all computing endpoints are in compliance, automate actions to shorten response time and enact measures to control infections with quarantine and until remediation is complete. Read this whitepaper to learn how IBM Endpoint Manager helps organizations respond quickly to today's threats.
Tags : 
proactive response, ibm, advanced persistent threats, agile organization, compliance, computing endpoints, digital world, endpoint management, endpoint software, mitigate risks, security
    
IBM
Published By: IBM     Published Date: Sep 27, 2013
Virtualization has moved to the forefront of many organizations’ IT agendas, because it reduces both the number of physical servers required and the associated costs. This independent study by the International Technology group found IBM PowerVM more cost-competitive over time, compared to VMware, in terms of IT costs and the costs of downtime.
Tags : 
ibm, ibm powervm, ibm powervm virtualization, virtualization, virtualization technology, x86, servers
    
IBM
Published By: IBM     Published Date: Sep 27, 2013
Buy-and-hold strategies can actually add costs to the datacenter, as systems age in place. Not only do hardware maintenance and software maintenance fees rise, over time – but the aging of applications also costs the organization money. Investing in a transition from POWER5 to POWER7 resulted in a return on investment (ROI) of more than 150 percent over three years.An insightful and and compelling discussion by IDC that reviews the primary reason for maintaining current systems -- Return on Investment. IDC studied IBM Power Systems sites that remained on the POWER5 platform long after its initial introduction in 2004. When comparisons to the succeeding generation of POWER7 are made, customers have found that the increase in scalability and performance of POWER7 systems, combined with a reduction in server "footprint" size and overall electrical requirements, resulted in significant reductions in ongoing costs, or opex, per 100 end users supported.
Tags : 
    
IBM
Published By: IBM     Published Date: Sep 30, 2013
IBM conducted more than 1,700 in-depth, face-to-face interviews with CEOs, general managers and senior public sector leaders from around the globe. Our newest CEO Study, the largest of its type ever undertaken, is the latest in the IBM C-suite Study Series. It explores how CEOs are responding to the complexity of increasingly interconnected organizations, markets, societies and governments – what we call the connected economy. Three themes emerged. Today's CEOs must: - Empower employees through values - Engage customers as individuals - Amplify innovation with partnerships Register now to access the insights that can help you lead more effectively through impactful connections with your employees, customers and partners.
Tags : 
global chief executive officer, leadership, technology, connectedness, customer insights, connections, ceos, business strategy
    
IBM
Published By: IBM     Published Date: Oct 10, 2013
The growth of cloud, mobility, social business and big data mean that botnets, credit card theft, cyber criminals and other external threats pose increasing risk to business continuity, financial stability and brand reputation. Read the white paper, “Preventing security risks in real time,” to learn how this new reality is forcing the evolution of organizations’ defenses to become more intelligent—using global analytics to scale visibility across broad data sets, both diverse and complementary, in real time.
Tags : 
cloud, mobility, social business, big data, external threats, business risks, business continuity, financial stability, brand reputation, protecting reputation, prevent theft, organizational defenses, global analytics, broad data, real time data, security risks, prevent risks, security, monitoring, cloud computing
    
IBM
Published By: IBM     Published Date: Oct 24, 2013
This case study examines a European manufacturer that successfully moved from an ad-hoc workplace organization to a strategic organization over a period of five years, saving $19 million in 2009 in addition to a 400 percent return on investment over five years (from 2004 - 2009). The organization moved from a decentralized siloed group of regional facilities and real estate organizations to a fully-centralized and matrixed organization, enabling close coordination and alignment with the regional business units.
Tags : 
lifecycle management, real estate systems integration, new lease accounting standard, fasb, iasb, workplace management system, iwms, facility management, integrated workplace, infrastructure, design and facilities, power and cooling, green computing
    
IBM
Published By: NetApp     Published Date: Dec 12, 2013
Despite the hype, Big Data has introduced critical challenges for modern organizations – and unprepared organizations risk getting buried beneath an avalanche of information. In this informative webcast, join industry and business intelligence (BI) expert Wayne Eckerson as he tackles the challenges of Big Data. Uncover practical tips and tactics for driving value with your Big Data platform – watch now to learn more.
Tags : 
netapp, big data, webinar, webcast, unprepared organizations, avalanche of info, business intelligence, alcatel lucent, data center
    
NetApp
Start   Previous    254 255 256 257 258 259 260 261 262 263 264 265 266 267 268    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.