organization

Results 76 - 100 of 6582Sort Results By: Published Date | Title | Company Name
Published By: IBM     Published Date: Jun 25, 2018
Vast resources of data are increasingly available, but the sheer volume can overwhelm human capability. By implementing the cognitive system of IBM Watson Discovery into their infrastructure, businesses can extract deeper and more accurate insights by efficiently identifying, collecting and curating structured and unstructured data. Watson Discovery, also capable of creating content collections and custom cognitive applications, can transform organizational processes to extend proprietary content and expert knowledge faster and at greater scales. Read more to learn how Watson Discovery can keep your organization evolving ahead of the competition. Click here to find out more about how embedding IBM technologies can accelerate your solutions’ time to market.
Tags : 
    
IBM
Published By: Akamai Technologies     Published Date: Jul 02, 2018
What to expect and how to prepare your best defense DDoS attackers launch hundreds of DDoS attacks every day. When a DDoS attack strikes an organization, panic is common. No one knows why systems and applications are failing, who to call, or what questions to ask. Meanwhile, senior leaders want answers. Planning ahead and being prepared is your best defense against DDoS attacks. This white paper explores best practices for building and maintaining a DDoS protection plan. You’ll learn what to expect from a DDoS attack, how to prepare, what to put in a DDoS runbook, and how to test your plan.
Tags : 
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Jul 02, 2018
Gartner named Akamai a Leader in their 2017 Magic Quadrant for Web Application Firewalls. A web application firewall is an essential element in your defense against application-layer attacks, which pose an ever-greater threat to productivity and security. The Akamai approach to WAF combines: An anomaly detection model A repeatable testing framework to measure effectiveness Threat intelligence to identify the latest threats A cloud platform for global scale Managed security services to help organizations better protect their websites and web applications over time
Tags : 
    
Akamai Technologies
Published By: Epicor     Published Date: Jun 11, 2018
When determining which investments to make in their technology infrastructure, organizations will often choose to make no changes at all. While this decision avoids short-term costs and business disruption, it will simply delay the inevitable—even making it worse. The cost of doing nothing is expensive in the long term. This report—from the independent researchers at Aberdeen Group—outlines the reasons organizations choose not to upgrade enterprise resource planning (ERP) software and cautions against this approach, supplying detailed research that illustrates the benefits of keeping your systems current. Epicor has a history of providing software solutions tailored specifically for the manufacturing industry. Check out the report, and see how upgrading to Epicor ERP can help grow your business.
Tags : 
erp software, enterprise resource planning (erp), manufacturing, cloud erp
    
Epicor
Published By: Cherwell Software     Published Date: Jun 21, 2018
Since the term was first coined in 2009, “DevOps” has rapidly taken the world by storm. And while the DevOps movement initially took root among and the view that it will be replaced with a new trend, the last few years have seen widespread use of DevOps methodologies among more traditional enterprise organizations for whom technology is critical to maintaining competitive advantage
Tags : 
itsm, guide, devops
    
Cherwell Software
Published By: Genesys     Published Date: Jun 13, 2018
Compare leading contact center infrastructure vendors. In Gartner’s 2018 Magic Quadrant for Contact Center Infrastructure, Worldwide, Genesys has once again maintained a leadership position. Placed furthest among all vendors in completeness of vision for 10 years and counting, our position continues to validate our mission to power the world’s best customer engagement solutions for organizations of all sizes—both in the cloud and on-premises. And according to Gartner peer insights, customers agree. “Great implementation that was on-time and on-budget!” 1 — CTO in the finance industry “Solid platform with a lot of features at a reasonable cost.” 1 — IT Manager of Software Engineering in the Services Industry Get the report now to learn: • How contact center vendors compare and which quadrant they are aligned to • Analyst views on the strengths and cautions of all participating vendors • How to evaluate key criteria to guide your decision-making process
Tags : 
leadership, customer engagement, decision making
    
Genesys
Published By: Jamf     Published Date: Jun 07, 2018
The Center for Internet Security (CIS) benchmark for iOS is widely regarded as a comprehensive checklist for organizations to follow to secure iPad and iPhone devices. This white paper explains how to implement the independent organization’s recommendations and walks you through: • CIS and iOS management basics • Securing institutionally-owned devices • Securing personally-owned devices
Tags : 
    
Jamf
Published By: HireVue     Published Date: May 16, 2018
GIVE YOUR CANDIDATES A GREAT EXPERIENCE See how HireVue helps Delta, UrbanOutfitters, and hundreds of other organizations give their candidates a great experience.
Tags : 
    
HireVue
Published By: HireVue     Published Date: May 16, 2018
WHY SO MANY COMPANIES ARE RETHINKING ASSESSMENTS If you’re a member of the Talent Acquisition team, there’s a good chance you use a pre-employment assessment at some point in your hiring process. According to the Talent Board, 75% of employers are using some sort of pre-hire assessment. And the Aberdeen Group notes that of its “Best in Class” organizations, 91% use assessments to screen candidates THIS EFFECTIVE SCREENING TOOL HAS UNINTENDED CONSEQUENCES In this eBook, we’ll look at the science behind traditional assessments and why despite sound science, they don’t work for candidates today- and how they can be transformed with video and artificial intelligence.
Tags : 
    
HireVue
Published By: HireVue     Published Date: Jul 17, 2018
HOW TO OVERCOME HEALTHCARE'S BIGGEST HIRING CHALLENGES Healthcare recruiting is intensely competitive. 60% of the fastest-growing occupations in the US are in healthcare, and it takes twice as long to fill a healthcare role than the national average. In this eBook, you’ll learn three approaches to solving healthcare recruiting’s toughest challenges. EXPECT TO LEARN: The 3 biggest challenges facing healthcare recruiting in 2018 (and how to solve them) Why it takes 2x as long to fill a healthcare role How to shrink hiring time without sacrificing quality of hire 4 ways to differentiate your organization from your competition Find out what the research says about these healthcare recruiting challenges and how you can overcome them in your organization. Download the free eBook now.
Tags : 
    
HireVue
Published By: Alight Solutions     Published Date: Jul 17, 2018
As much as moving to the Cloud has been a hot trend over the past several years with Human Capital Management systems, in today’s world, financial management systems are not far behind. We’re starting to see the activity significantly ramp up within the financial management system space. So much so, that according to research done by Gartner, the Cloud is expected to become the dominant deployment model across all areas of financial management applications by 2025. Spending on cloud or SaaS-based applications will increase from 30% of the total market spend in 2015 to 47% by 2020. So which financial systems are organizations shifting to the cloud model and why is this happening—aside from following the trend in HR? Download now to learn more -
Tags : 
    
Alight Solutions
Published By: Aviatrix     Published Date: Jun 11, 2018
OpenVPN is a popular and respected solution for enabling remote access to AWS VPCs for IT personnel, cloud developers, and a wide variety of end-user roles. While OpenVPN may be all that is needed to enable cloud access for a few users, it alone cannot meet the needs of growing organizations – particularly those that have security or compliance requirements. Similarly, Bastion hosts or jump hosts are often used when AWS is primarily focused on developers, but these tools likewise have scaling and security limitations. As part of our fact-filled AWS Bootcamp series, Aviatrix CTO Sherry Wei and Neel Kamal, head of field operations at Aviatrix, review key requirements and compare the remote user VPN options available for managing and securing access to AWS VPC resources. They also demonstrate features that ensure your remote access tools and methodology are “enterprise cloud-ready.” Who Should Watch? Anyone responsible for connectivity of cloud resources, including cloud architects, cloud
Tags : 
aws, aws vpc, aws openvpn, aws bastion, aws remote access
    
Aviatrix
Published By: DocStar     Published Date: Jun 11, 2018
Accounts Payable is a fundamental activity for nearly all businesses. Pick any enterprise and you can bet there is an AP function at the heart of financial operations. The obligation to pay off short-term debt is one that every company must satisfy. But more than that, the process to do it must be efficient and productive. If you get behind on your obligations you risk missing important financial discounts, defaulting with creditors, and damaging your reputation with suppliers and stakeholders. CFOs face the challenges associated with Accounts Payable…and it’s easy to lose sleep. As other areas of business and commerce have become more and more paperless, the accounts payable process in most organizations remains mired in paper copies and manual workflow. The result is an often costly and people intensive process that leaves companies vulnerable to competitors and financial executives with a growing unease over the inherent inefficiencies.
Tags : 
    
DocStar
Published By: Workday UK     Published Date: Mar 08, 2018
Most organizations today lack access to company-wide analytics and data. And it’s a problem. To make smart and timely business decisions, it’s important that your organization can get to the real data that matters, and do it fast. Read the CIO.com report to learn: •The importance of having a single source of truth across your entire business •How a cloud-based system provides data you can trust •Why you need actionable, real-time data to drive decision-making
Tags : 
    
Workday UK
Published By: Workday UK     Published Date: Mar 15, 2018
For both finance and HR, this separation is often driven by organizational obstacles, disparate systems and data sources, regulatory uncertainty, and a lack of complete visibility into the business. As Joseph Fanutti, CFO of Bill Gosling Outsourcing, says of his own organization’s challenges, “Finance operated its own silo, HR its own, operations its own. There was a lack of consistency in terms of how we viewed the business.” He recalls, “Numbers were always challenged, no one could agree on metrics, and people couldn’t agree on what actions to take going forward.” If this situation sounds familiar, that’s because it’s commonplace across organizations the world over. Strategic uncertainty and incomplete data are symptoms of a larger problem: a lack of unification among finance, HR, and operations teams. Managers need to make financial and people decisions in tandem, yet traditional systems store this information independently. This separation creates multiple versions of the same u
Tags : 
    
Workday UK
Published By: Bell Micro     Published Date: Jun 14, 2010
In this Customer Solution Profile a Fortune five organization put the IBM XIV storage system through its paces in their Microsoft Exchange 2003 environment.
Tags : 
bell micro, microsoft exchange, ibm xiv storage system, resilience, performance, email system, network performance management
    
Bell Micro
Published By: Great Bay Software     Published Date: Jul 16, 2018
"IoT adoption is expected to generate a 21% increase in corporate profits by 2022. This business value comes from the ability to automate processes and collect and analyze massive amounts of data—so organizations can make better informed decisions and deliver powerful customer experiences. But how are organizations really putting IoT to work for their business? And how can IoT risks be mitigated so these rewards can truly be achieved? This e-book explores the potential of IoT in the enterprise, which industries are leading the way and how to secure your connected things. It also provides: • 7 best practices for data privacy and security policies • 7 items to consider for device security • 6 key considerations for network connection security"
Tags : 
    
Great Bay Software
Published By: Great Bay Software     Published Date: Jul 16, 2018
"CyberEdge Group’s fifth-annual Cyberthreat Defense Report is a comprehensive review of the perceptions of 1,200 IT security professionals representing 17 countries and 19 industries. The new 2018 report provides the most geographically comprehensive view of IT security perceptions in our industry. With a 360-degree view of organizations’ security threats, security professionals can identify issues facing the market and know how their peers are reacting. Key insights from this year’s report include: • ‘Lack of skilled personnel’ is the greatest inhibitor to IT security’s success • 77% of networks were breached last year – the first decline in five years! • 12% of a typical enterprise IT budget is spent on security • 55% of organizations were compromised by ransomware last year Download the Cyberthreat Defense Report Executive Summary today!"
Tags : 
    
Great Bay Software
Published By: Great Bay Software     Published Date: Jul 16, 2018
"Ninety percent of business executives believe the Internet of Things (IoT) is important to the future of their organization. And, as IoT is expected to generate a whopping 21% increase in corporate profits by 2022, it’s clear there’s value in adoption. However, there are still plenty of risks that require mitigation through careful planning, cross-functional teamwork and mature security measures. This white paper explores the business benefits and the security complexities IoT introduces for business organizations, and provides key considerations and recommendations for securing IoT deployments. Download the white paper today!"
Tags : 
    
Great Bay Software
Published By: Great Bay Software     Published Date: Jul 16, 2018
"Healthcare organizations have significantly more to consider than the average business when it comes to network and device security. Concern over code modification, key compromise, password-based vulnerabilities and man-in-the-middle attacks have caused hospital CIOs and CISOs to rethink their security strategies and investments. The threat to these devices has even been assigned its own term: medjacking, a shortened form of “medical device hijacking.” Download this white paper for five best practices to mitigate threat and attacks that can put lives, patient trust and the growth of the healthcare organization at risk. Access the white paper today!"
Tags : 
    
Great Bay Software
Published By: Genesys     Published Date: Jul 13, 2018
Compare leading contact center infrastructure vendors. In Gartner’s 2018 Magic Quadrant for Contact Center Infrastructure, Worldwide, Genesys has once again maintained a leadership position. Placed furthest among all vendors in completeness of vision for 10 years and counting, our position continues to validate our mission to power the world’s best customer engagement solutions for organizations of all sizes—both in the cloud and on-premises. And according to Gartner peer insights, customers agree. “Great implementation that was on-time and on-budget!” 1 — CTO in the finance industry “Solid platform with a lot of features at a reasonable cost.” 1 — IT Manager of Software Engineering in the Services Industry Get the report now to learn: • How contact center vendors compare and which quadrant they are aligned to • Analyst views on the strengths and cautions of all participating vendors • How to evaluate key criteria to guide your decision-making process 1 Gartner Peer Insights rev
Tags : 
    
Genesys
Published By: CA Technologies EMEA     Published Date: May 25, 2018
Software drives competitive advantage more than ever at an increasing velocity for releases along with higher, overwhelming levels of deployment complexity. Dramatic growth in mobile applications, analytics, systems of engagement, and cloud demands that organizations respond adaptively, even as resource constraints make it challenging to nearly impossible to do so. As a result of these combined factors, IDC sees increased interest in, demand for, and adoption of agile approaches to development and also for business initiatives driving adoption of agile approaches to overall project, program, and portfolio management.
Tags : 
idc, marketscape, agile, ppm, vendor, assessment
    
CA Technologies EMEA
Published By: CA Technologies EMEA     Published Date: May 25, 2018
The latest version of CA Project & Portfolio Management facilitates core financial activities with the ease and familiarity of a spreadsheet. Two years ago, CA began to reevaluate how organizations were leveraging their project and portfolio management solutions. Our goal was to identify ways CA Project & Portfolio Management (CA PPM) could better serve every user.CA PPM 15.3 simplifies the job of the financial manager with Microsoft Excel® -like functionality, embedded communication and collaboration features, and direct links to the industry’s most popular reporting and business intelligence tools. Today, CA PPM provides financial managers with the ability to visualize, manage and take advantage of data like never before—all from inside the solution.
Tags : 
budgets, project, cash, flows, finance, project, management
    
CA Technologies EMEA
Published By: CA Technologies EMEA     Published Date: May 25, 2018
Project portfolio management (PPM) software suites have evolved significantly in just the last few years. No longer simply straightforward task–consolidation tools, they have become powerful enterprise solutions capable of everything from investment planning and management to collaboration and workflow automation across concurrent initiatives.
Tags : 
power, data, organization, project, portfolio, management
    
CA Technologies EMEA
Published By: CA Technologies EMEA     Published Date: May 25, 2018
Many of the largest, most successful organizations in the world use CA Project & Portfolio Management (CA PPM) as the cornerstone of their business intelligence (BI) strategy. This allows CA to keep a finger directly on the pulse of the market—to see firsthand how both expectations and usage are evolving as companies adopt BI technologies.
Tags : 
business, project, portfolio, management, technology
    
CA Technologies EMEA
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.