hr tech

Results 1051 - 1075 of 1080Sort Results By: Published Date | Title | Company Name
Published By: BlackBerry Cylance     Published Date: Jul 02, 2018
SE Labs tested CylancePROTECT® in an offline environment against major threats that subsequently appeared in the wild. The test explores the product’s ability to prevent new threats from attacking endpoint systems successfully. CylancePROTECT contains technology designed to identify and block malware using what it claims to be an “artificial intelligence” (AI) model. This model can be updated over time. However, in this test we used the model created in May 2015 and did not permit further updates so that the software was unable to receive new models or edit the existing one. The test exposed systems protected by this older version of CylancePROTECT to very impactful threats discovered and reported widely after May 2015. In this way, the test shows to what extent the product was able to predict how future threats would appear. This “Predictive Advantage” (PA), the advantage that users of the product have against future adversaries, is presented in this report.
Tags : 
malware, predictive, test, response
    
BlackBerry Cylance
Published By: UBM Technology     Published Date: Sep 05, 2017
IT leaders need a full stack of skills to survive and thrive in today's technologically driven world, and striking a balance between cost control and innovation is crucial.
Tags : 
    
UBM Technology
Published By: Rohde & Schwarz Cybersecurity     Published Date: Nov 28, 2017
Advanced persistent threats (APTs) are stealthier and more spiteful than ever. Sophisticated techniques are used to quietly breach organizations and deploy customized malware, which potentially remains undetected for months. Such attacks are caused by cybercriminals who target individual users with highly evasive tools. Legacy security approaches are bypassed to steal sensitive data from credit card details to intellectual property or government secrets. Traditional cybersecurity solutions, such as email spam filters, anti-virus software or firewalls are ineffective against advanced persistent threats. APTs can bypass such solutions and gain hold within a network to make organizations vulnerable to data breaches.
Tags : 
it security, vendor, malware, analysis, service, malicious attacks, network, traffic
    
Rohde & Schwarz Cybersecurity
Published By: RSM US     Published Date: Dec 18, 2017
Middle market companies are becoming more comfortable with outsourcing solutions, driving increased utilization of finance and accounting outsourcing (FAO). The evolution of FAO enables companies to focus on their core business, while leveraging external resources to increase finance and accounting productivity. What makes RSM’s FAO platform different is specific industry knowledge, and unique business processes, workflows and structures that have been developed through years of successful engagements. We implement proven strategies from a people, process and technology perspective that are customized for each client and can’t be found in an out-of-the-box technology solution.
Tags : 
    
RSM US
Published By: RSM US     Published Date: Dec 20, 2017
There is an increasing demand for finance and accounting outsourcing (FAO) among middle market companies, as organizations become more comfortable with the solution. FAO helps companies enhance the efficiency and effectiveness of the finance and accounting function through process and technology improvements, enabling internal employees to focus on the core business. RSM US LLP’s FAO platform goes beyond out-of-the-box functionality within technology solutions, integrating additional intellectual property, including workflows, business processes and organizational frameworks. By leveraging this comprehensive platform, our FAO team can help middle market companies overcome a myriad of finance and accounting challenges. These include hiring, training and developing staff, and most importantly producing actionable finance and accounting information in a timely manner to make critical business decisions.
Tags : 
    
RSM US
Published By: Tenable     Published Date: Mar 07, 2018
"Answers to five questions that are top-of-mind for infosec leaders today. The challenge of secure DevOps is top of mind for many infosec and IT leaders. To help you understand the latest trends, Tenable reached out to Christina Richmond, Program Director for IDC’s Security Services Research Group, for her answers to the following five questions: 1. How do organizations ensure that the security team adapts seamlessly to development processes and tools to create a cohesive program? 2. What are some common mistakes you see companies make when attempting to integrate their DevOps and security processes? 3. How can security leaders assist organizations with making the transition to secure DevOps? 4. In the world of agile methodologies and DevOps, how do security teams need to evolve to be more effective in managing cyber risk? 5. What are some examples of secure DevOps principles among cloud native technologies? Written for infosec leaders responsible for integrating security int
Tags : 
secure devops, idc, analyst report, container security
    
Tenable
Published By: Dell PC Lifecycle     Published Date: Mar 13, 2018
Das Royal Victoria Regional Health Centre (RVH), ein Krankenhaus etwa 100 km nördlich von Toronto in zentraler Lage von Ontario in Kanada, bietet eine schnelle Gesundheitsversorgung für mehr als 450.000 Bewohner in einem großen Gebiet. Das RVH-Team besteht aus mehr als 380 Ärzten, 2.500 Mitarbeitern und 850 ehrenamtlichen Helfern und bietet ein außergewöhnliches Gesundheitsangebot und spezielle Dienstleistungen. Dazu zählen Krebsbehandlung, Behandlung von Schlaganfällen, Orthopädie, Intensivmedizin, psychiatrische Versorgung und interventionelle Radiologie. Neben der Akutversorgungseinrichtung in Barrie mit 319 Betten stellt das RVH auch die MEDITECH EHR-Plattform (Electronic Health Records) für mehrere andere Krankenhäuser in Midland, Orangeville und Collingwood bereit.
Tags : 
    
Dell PC Lifecycle
Published By: Emarsys     Published Date: Feb 15, 2018
Erwartungen hinsichtlich deutlich verbesserter Kundenerfahrungen (Customer Experience, oder: CX) treiben im Einzelhandel Investitionen in OmnichannelTechnologien voran, die eine Wettbewerbsdifferenzierung über Kernprodukte und Dienstleistungen hinaus ermöglichen. Gleichzeitig sind Einzelhandelsunternehmen auf der Suche nach neuen und umfangreicheren Funktionen. Derartige innovative Möglichkeiten eröffnen sich für Marketer im Einzelhandel mit AI-Technologien. Es ist daher entscheidend, dass Entscheidungsträger im Einzelhandel erkennen, ob ihre Unternehmen bereit dafür sind, AITechnologien zu nutzen und so die eigene Entwicklung zu Branchenführern effektiv zu unterstützen.
Tags : 
vertrauen, selbstbewusstsein, aufbauen, marketing, emarsys
    
Emarsys
Published By: Redstor UK     Published Date: May 02, 2018
Many organisations are facing challenges relating to the unstructured data they hold. By its very nature, unstructured data is in a form that is difficult to manage, and it is growing rapidly in size. This can make it difficult to understand who owns that data, whether it is being used or even whether it is of any value. Industry forecasts indicate the volume of data generated by corporates is expected to double over the next three years and, with General Data Protection Regulation taking effect in May 2018, organisations need a more efficient way to manage and control this data. This White Paper provides an overview of the important technical considerations senior business and IT management teams need to review before choosing an archiving provider.
Tags : 
    
Redstor UK
Published By: Carbon Black     Published Date: Apr 10, 2018
A dversaries, and cybercriminal organizations in particular, are building tools and using techniques that are becoming so difficult to detect that organizations are having a hard time knowing that intrusions are taking place. Passive techniques of watching for signs of intrusion are less and less effective. Environments are complicated, and no technology can find 100 percent of malicious activity, so humans have to “go on the hunt.” Threat hunting is the proactive technique that’s focused on the pursuit of attacks and the evidence that attackers leave behind when they’re conducting reconnaissance, attacking with malware, or exfiltrating sensitive data. Instead of just hoping that technology flags and alerts you to the suspected activity, you apply human analytical capacity and understanding about environment context to more quickly determine when unauthorized activity occurs. This process allows attacks to be discovered earlier with the goal of stopping them before intruders are able t
Tags : 
    
Carbon Black
Published By: Bluewater Learning     Published Date: Apr 30, 2018
Addressing the frustration that people experience with their LMS or TMS does not necessarily mean going through the involved process of selecting and implementing a new system. Often, it simply requires a realignment of business drivers, supporting processes Bluewater experts will lead you through examining User Experience, Administration, Process, Content, Data, Reporting and Technology.
Tags : 
    
Bluewater Learning
Published By: Bluewater Learning     Published Date: Aug 29, 2018
The focus on employee engagement as a driver of better business results has gotten so much traction it’s spawned an entire category of solutions within the HCM universe. But if you’re a SumTotal client, you already own a tool that has incredible — but often-overlooked — potential for creating an environment in which engagement can not only flourish, but actually be sustained. It’s all about having content that strategically positions your company, is easy to find, and truly engages your employees to seek opportunities to make a difference and to grow professionally. To really shape your SumTotal LMS into the effective piece of technology you know it can be — to see it achieve the results you and your leadership team expect it to deliver — you need to be a content architect and have a great content strategy. Now you can learn the process Bluewater has developed through years of experience helping clients worldwide maximize their SumTotal LMS to drive higher engagement and better business results: • Mapping out a plan for engagement success • Understanding the negative effects when you don’t have a content strategy that makes strategic sense for your organization — on employees, leaders, LMS owners, and learning practitioners • Architecting content for engagement today — and for the road ahead • Building the framework for a rich content ecosystem where learners feel at home • Focusing on people, processes, and technology: an approach to content strategy that supports a culture of engagement It’s all about being ridiculously happy with your SumTotal LMS.
Tags : 
    
Bluewater Learning
Published By: Cohesity     Published Date: Mar 19, 2019
As an enterprise admin for over 20 years now, I have seen many technology successes, challenges, and even failures throughout my career. For all enterprise admins, learning is a critical element of job success, but so is sharing what you have learned with others. Today I am embarking on a series of posts where I will be sharing many technology challenges that could have been avoided with a proper backup strategy. From there we will touch on how a modern backup solution can protect your organization from the preventable issues I’ll be writing about.
Tags : 
    
Cohesity
Published By: Sauce Labs     Published Date: Jun 04, 2018
Recruiting great engineering talent is hard. The recruiting process for developers can feel like an impossible task because evaluating technical talent continues to evolve. The typical flow can be broken down into three basic steps: source, screen, and interview. Only recruiters truly understand the real challenges in finding qualified candidates but the pain doesn’t stop there. Learn more on tech recruiting by downloading this ebook by Glider
Tags : 
    
Sauce Labs
Published By: KPMG     Published Date: Sep 13, 2018
Create a transformation vision and an integrated technology roadmap to get started towards your goals. As digital complexity increases, you’ve probably spent a lot of time making sure your customer-facing strategies and technologies are ready to meet the next challenge. And rightly so. But what about your internal functions? Are your ERP, finance, HR, procurement and supply chain strategies ready? You may be asking some hard questions: • How do I manage a large-scale transformation of my back office underpinned with the right technologies? • Is my technology strategy truly aligned to meet my business goals? • What are other organizations doing to make the transition? KPMG Technology Strategy and Selection gives you the tools to frame such decisions by working with you to develop a transformation strategy that’s based on your organization’s overarching business needs. One that will diminish some of the noise of disruption by helping you see what’s coming--while focusing on an integr
Tags : 
kpmg, business transformation
    
KPMG
Published By: DigiCert     Published Date: Jun 19, 2018
Protect your business, brand and customers in a constantly evolving threat landscape. As market and business needs evolve, and the technological arms race between cybercriminals and the security industry continues, the boundaries of website and web security are shifting. This paper explores the opportunities, risks and challenges, associated with this rapidly evolving landscape both from a business and technical standpoint, and lays out key guidelines for building an effective security strategy for the future.
Tags : 
    
DigiCert
Published By: DigiCert     Published Date: Jun 19, 2018
Your website is your most important digital asset and so protecting it is as important as ensuring positive cash flow, paying staff salaries and keeping the lights on in the head office. Despite the threats and the importance of website security, IT department organization, goals and technology – their ‘website security architecture’ – is often unfit for the purpose. With correct planning and strong execution, CIOs and CISOs can create a problem-solving, self-aware, agile organization that is better protected against fast-changing threats. This white paper explores the challenges they face and suggests a roadmap for change.
Tags : 
    
DigiCert
Published By: KPMG     Published Date: Jun 25, 2019
Business growth. Everyone wants it, but only a few achieve it on a sustainable basis in today’s uncertain climate. This expert guide explores the key pathways that are essential junctures in any business’s growth journey, and shines light on the personal stories and key decisions from the CEOs who have been there and done it. The report offers practical guidance to private businesses from multi-generational family and Private-Equity backed businesses through to owner-managed and fast-growing scale-ups. Read this report to understand: •Going Global: how to navigate and launch an international business •Acquisition: how to identify the right target, assess its value and oversee a successful integration •Innovation and technology: how to enable innovation to flourish and how to harness the power of technology to accelerate your business •Team: how to ensure you have the right people and skills to take your business to the next stage •Investment: how to secure the right type of fundin
Tags : 
    
KPMG
Published By: Workday Italy     Published Date: Aug 07, 2018
The role of the CIO is currently experiencing vast change and increased attention from the executive team as a leader who can guide a strategic path for how technology can improve business growth. The CIO’s responsibilities once focused almost entirely on selecting and managing technology solutions, but over the past several years the role of IT has shifted to broadly supporting enterprise strategy through technology, including the creation of new digital businesses. CIOs must now be immersed in both business and technology, and ensure that the organisation overall has the right platforms in place to thrive and grow
Tags : 
    
Workday Italy
Published By: TradeGecko     Published Date: Aug 15, 2018
2018 is going to a big year for wholesale distribution. Thanks to constant advancements in B2B technologies and capabilities, wholesale is fast catching up with retail, through omnichannel selling, digitalization and global online marketplaces, amongst others. So, what do these predictions mean for the APAC wholesale market? As buyers come to expect instant, sophisticated and customised service as standard, wholesale businesses will need to embrace technologies that allow them to provide a customer experience on par with B2C. Download this eBook to understand the most important trends in wholesale distribution in APAC.
Tags : 
    
TradeGecko
Published By: Intel     Published Date: Sep 10, 2018
Today’s tech savvy consumers are continually driving organizations to deliver a modernized shopping experience. To achieve this, retailers are pushing the edge on developing non-traditional ways in delivering sales messages. One of the best ways to engage shoppers with an in-store digital presence is through modern adaptive signages. Modern signages enable two-way interaction between customers and businesses, tapping onto cutting-edge technologies such as sensors and analytics to respond to customer behavior—helping retailers customize content on the fly. Find out how Giada Technology leveraged on Intel® processors to power up their cloud terminals to pre-process signage, sensor, and mobile data to efficiently exchange information with the cloud. Retailers are better positioned to present contextual promotions to the shoppers, delivering benefits of lesser wait-time and increased customer satisfaction.
Tags : 
    
Intel
Published By: VMware     Published Date: Jun 21, 2019
Hyperconverged infrastructure (HCI) has emerged as a breakthrough IT technology over the past several years. With the right HCI solution, IT teams can lower costs, increase agility, and reduce complexity— leveraging a modern software-defined IT platform that provides a seamless path to hybrid cloud. IT continues to embrace HCI in great numbers, with the market expected to grow at a compound annual rate of 42 percent through 2023.1
Tags : 
    
VMware
Published By: Lenovo - APAC     Published Date: Jan 28, 2019
Asian ICT infrastructure investment is exploding as businesses review and modernise their data-centre architectures to keep up with the service demands of a growing and increasingly sophisticated population. Demand for cloud services, particularly to support big-data analytics initiatives, is driving this trend. Frost & Sullivan, for example, believes the Asia-Pacific cloud computing market will grow at 28.4 percent annually through 2022. Despite this growth, many businesses are also rapidly realising that public cloud is not the best solution for every need as they do not always offer the same level of visibility, performance, and control as on-premises infrastructure.This reality is pushing many companies towards the middle ground of hybrid IT, in which applications and infrastructure are distributed across public cloud and self-managed data centre infrastructure. Read about Medical company Mutoh and how it took advantage of the latest technology.
Tags : 
lenovodcg, nutanix, hyperconvergedinfrastructure, hci
    
Lenovo - APAC
Published By: Dell EMC Storage     Published Date: Nov 28, 2018
It is now apparent that three specific technology advancements—non-volatile memory express (NVMe), NVMe over fabrics (NVMe-oF), and storage-class memory (SCM)—are transformative and will end up guiding the future of high-end data storage. Each of those technologies reduce I/O latency significantly. However, organizations working to transform their data centers shouldn’t regard performance as the only end goal. Great performance is important because it increases an array’s ability to handle any workload intelligently, scale to meet unpredictable demand, and operate cost efficiently. The Dell EMC PowerMax powered by Intel® Xeon® processor is an impressive example of this type of modern storage architecture. It has been designed deliberately to maximize the speed of NVMe and by extension, offer transformational efficiency benefits and business value.
Tags : 
    
Dell EMC Storage
Published By: Workday APAC     Published Date: Dec 11, 2018
Hear from some of our HR leaders about how cloud technology makes their days easier.
Tags : 
    
Workday APAC
Start   Previous    30 31 32 33 34 35 36 37 38 39 40 41 42 43 44    Next    End
Search Resource Library      

Add Resources

Get your company's resources in the hands of targeted business professionals.