hr tech

Results 376 - 400 of 1105Sort Results By: Published Date | Title | Company Name
Published By: Oracle     Published Date: Oct 26, 2018
A guide for financial services providers to building enduring customer relationships through technology
Tags : 
    
Oracle
Published By: Here Technologies     Published Date: Jul 26, 2019
Driver recruitment and retention are proving to be major problems for the trucking industry. The truck driver shortage is worse than ever, and driver turnover is at an all-time high. This leaves fleet owners and trucking companies trapped in constant recruitment mode costing them valuable time and resources. HERE Technologies explores three ways fleet owners can avert the driver staffing crisis and improve recruitment and retention leading to better, stronger fleets. With this eBook, discover: • Effective ways to offer benefits, incentives and competitive pay • Strategies to increase truck driver safety with technology • How to attract two of the largest groups in the US labor force
Tags : 
here technologies, transport and logistics
    
Here Technologies
Published By: Telstra     Published Date: Jan 27, 2016
This white paper reveals how Telstra helps a range of customers across multiple industries transform their businesses through digital technology.
Tags : 
digital technology, digital business, digital transformation, telstra, customer interaction, on-demand content, share content, data, business management, customer interaction service, customer relationship management, customer satisfaction, data protection, content delivery
    
Telstra
Published By: Infor     Published Date: Mar 07, 2017
Die Fabrik der Zukunft ist im Anmarsch. Ihr Grundgerüst besteht aus Technologie, Innovation und erweiterten Fertigungskapazitäten.
Tags : 
    
Infor
Published By: Sophos     Published Date: Mar 30, 2017
Many papers on the topic of advanced persistent threats (APTs) begin with ominous references to the changing threat landscape and stories of how highly sophisticated cyber attacks are becoming more prevalent. That can be misleading. The majority of attacks today still use many techniques that have been around for years—social engineering, phishing emails, backdoor exploits and drive-by downloads, to name the biggest ones. Such attacks are neither advanced nor particularly sophisticated when broken down into their individual components and often rely on the weakest link in any organization—the user. However, the way in which hackers use combinations of techniques and the persistent behavior of the attackers is something that does set APTs apart from other attempts to compromise security. This paper is designed to give you an overview of the common characteristics of APTs, how they typically work, and what kind of protection is available to help reduce the risk of an attack.
Tags : 
network security, firewall, data security, antivirus protection, email protection, virtual security, web protection, wireless protection, it security
    
Sophos
Published By: Concur ENT     Published Date: Nov 07, 2017
T&E solutions need to drive measurable improvements to the bottom line. With the right tools, anyone can become a T&E leader with increased visibility, compliance, and cost savings. An integrated, end-to-end T&E solution, which eliminates disparate systems, offers significant benefits for businesses and their travellers. Aberdeen recommends following the Leaders in their adoption of T&E technologies.
Tags : 
enterprise, compliance, corporate travel policies, trip cost, corporate budgets, concur
    
Concur ENT
Published By: Forcepoint     Published Date: May 16, 2016
Die finanziellen und rechtlichen Konsequenzen der während des vergangenen Jahres verzeichneten öffentlichkeitswirksamen Cyber-Angriffe enthalten eine unmissverständliche Botschaft: Datenraub kann so gravierend sein, dass die Unternehmensleitung es sich nicht leisten kann, das Thema zu ignorieren. Der Bericht "Cybersicherheit und Schutz vor Datendiebstahl" bietet einen Überblick über das Thema, der ohne technisches Fachjargon auskommt. Er liefert Anhaltspunkte die jedes Mitglied eines Vorstands, Aufsichtsrats oder Direktoriums nutzen kann, um die Sicherheitsposition der eigenen Organisation auf den Prüfstand zu stellen.
Tags : 
cyber security, security, cybersecurity, security application, data theft prevention, data security, cyberttacks, access control, anti spam, anti spyware, anti virus, application security, internet security, intrusion detection, intrusion prevention, security management
    
Forcepoint
Published By: NetApp     Published Date: Feb 19, 2015
The NetApp EF550 all-flash array provides a robust platform for delivering exceptional performance to mission-critical applications. The EF550 flash array leverages the latest in solid-state disk technologies along with a strong heritage of handling diverse workloads and providing superior business value through the acceleration of latency-sensitive and high-I/O applications. This technical report provides an overview of workload characterizations performed on NetApp EF-series all-flash arrays across a wide variety of I/O types - with best practices and observations based on extensive test data. Characterizations include IOPS, throughput, and latency under varying block loads and RAID levels, SSD rebuild times, EF540 and EF550 performance comparison, and usable capacity sizing guidelines for various protection levels. If you are considering deploying an EF-series flash storage array in your environment, this is an essential technical resource to insure proper configuration and maxim
Tags : 
    
NetApp
Published By: Google Apigee     Published Date: Jun 12, 2018
How to move fast, delight customers, and continually innovate to thrive in today’s economy. APIs are much more than system integration technology. They are strategic assets that give companies the ability to adapt to changing customer needs and build breakthrough digital experiences. Google’s new eBook, The API Product Mindset, explains why leading companies now manage APIs as full-cycle products rather than one-time IT projects. Learn how to build a customer obsessed API team that delivers world-class developer experiences and ensures your APIs have enduring business value. Read case studies about how AccuWeather and Pitney Bowes have transformed their businesses with an API product mindset and learn from technology leaders at Magazine Luiza, Telestra and West Corp. What's Inside? ? Learn why APIs are how business gets done in today’s economy ? Get tips to build APIs that developers will love ? Discover why a product mindset is critical to business acceleration CTA: Download eBook
Tags : 
    
Google Apigee
Published By: Redstor UK     Published Date: Mar 12, 2018
The General Data Protection Regulation is set to shake up modern data protection laws. With large-scale data breaches making news headlines on a weekly basis throughout 2017, data regulation authorities across Europe will be hoping this can help resolve the challenges of data protection. However, with so many questions around how to comply it is still unclear how far this regulation spreads. Technologists are now looking for answers, wanting to know how the GDPR will affect backup and nonprimary data sets and what needs to be done to be compliant. This white paper will explore and understand aspects of the regulation to help answer questions and give clarity over what data is covered by the GDPR and what organisations need to do to be compliant. Redstor have specialised in assisting organisations with data protection and management for almost two decades. Providing compliant services around the areas of Data Backup, Disaster Recovery and Archiving.
Tags : 
    
Redstor UK
Published By: IBM     Published Date: Apr 18, 2017
Apache Hadoop technology is transforming the economics and dynamics of big data initiatives by supporting new processes and architectures that can help cut costs, increase revenue and create competitive advantage. An effective big data integration solution delivers simplicity, speed, scalability, functionality and governance to produce consumable data. To cut through this misinformation and develop an adoption plan for your Hadoop big data project, you must follow a best practices approach that takes into account emerging technologies, scalability requirements, and current resources and skill levels.
Tags : 
data integration, data security, data optimization, data virtualization, database security, data migration, data assets, data delivery
    
IBM
Published By: Concur     Published Date: Aug 15, 2017
As travel and expense (T&E) management solutions have improved, the expectations of the end user are higher than ever before. Business travellers want a seamless experience and you want better visibility, increased compliance, and reduced spend. Our research identified two types of people – Leaders and Followers. Leaders have most of their spending under management, have increased compliance to company policies and approve expense reports more quickly. Followers are lagging behind.
Tags : 
platform, travel, payment, expense management, mobile app, corporate budgets, trip cost visibility, enterprise
    
Concur
Published By: Oracle     Published Date: Mar 04, 2019
n this webinar, Andy Baxendale and Euan Semplediscuss the future role of blockchain and how it could be specifically applied to human capital management systems. They look at:• Why HR has one of the best use-cases for blockchain technology• What aspects of HR would benefit most from blockchain technology • The potential overlaps between artificial intelligence and blockchain technology
Tags : 
    
Oracle
Published By: Oracle     Published Date: Mar 01, 2019
Join Oracle’s Director CX Strategy EMEA Director, Harald Behnke and Daryn Mason, Independent Customer Experience Leader, as they list their top three hyped technologies, and discuss innovations such as conversational Interface, AI and IoT.In particular, customer experience is all about personalised intelligence at scale, and IoT connects product to Front Office with convenient new options. Find out what’s happening in customer experience across the globe, and get inspired by the smart revolution.
Tags : 
    
Oracle
Published By: Trend Micro     Published Date: Feb 01, 2013
Despite increased awareness and focus on defending against targeted attacks from both business and security leaders, organizations continue to be breached and suffer the consequences. Many of today’s security investments are simply not aligned to defend against these targeted threat vectors. Advanced threat detection and response should not be a point solution but rather a combination of technologies and core competencies. Detecting and responding to advanced threats should involve tight integration of multiple security technologies, network analysis and visibility (NAV) tools, the ability to automatically generate content such as security rules and signatures, context on attacker history, and overall customization and flexibility to ensure that the solution is fine-tuned for your specific IT environment.
Tags : 
security, advance threat detection, nav
    
Trend Micro
Published By: KPMG     Published Date: Jul 10, 2018
The Oracle and KPMG cloud threat report 2018 provides an up-to-date review of the cybersecurity implications and challenges of rapid cloud adoption. Is your organisation prepared? Read this report to find out: • how cloud adoption is reshaping the threat landscape • why identity and access management must be a priority • what are cybersecurity best practices in a modern IT environment • which emerging technologies offer hope for improving cybersecurity outcomes.
Tags : 
    
KPMG
Published By: KPMG     Published Date: Jul 18, 2018
Cloud services bring new and significant cybersecurity threats. The cloud can be secured—but not by the vendor alone. Are you clear about the risks and your responsibilities as an IT leader? Read this report to understand: • how cloud adoption is reshaping the threat landscape • why identity and access management must be a priority • what are cybersecurity best practices in a modern IT environment • which emerging technologies offer hope for improving cybersecurity outcomes. Download the report now:
Tags : 
    
KPMG
Published By: Salesforce     Published Date: Oct 17, 2019
At a time when IT leaders should have one major goal— achieving a seamless digital workplace—the same Salesforce technology platform that empowers sales and service teams is poised to drive productivity for every enterprise employee. Frost & Sullivan’s survey offers evidence that many enterprises are responding to the challenge of technological disruption through investments in technology: approximately 69% of respondents plan to increase their general IT budgets with an average increase in investment of 28%.
Tags : 
    
Salesforce
Published By: BMC Control M     Published Date: Jul 16, 2009
Enterprise job scheduling is a mature and mission-critical IT capability that supports some of the most important business processes throughout a modern enterprise. Areas like accounting, ordering, inventory, and procurement are all likely to rely on job scheduling technology. Most common job scheduling architectures involve deploying agent software on every system in the enterprise. However, depending on the parameters of the situation, these agents may be more expensive to install and maintain. Learn more today!
Tags : 
bmc, ema, tco, security, job, scheduling, agent, faster, cheaper, safer, technology, software, bmc contol-m, enterprise, management, international computing
    
BMC Control M
Published By: EMC Corporation     Published Date: May 27, 2014
RSA Technical Brief: The openness of today's networks and the growing sophistication of advanced threats make it almost impossible to prevent cyber attacks and intrusions. This technical brief discusses why combating advanced threats depends on organizations shifting more security resources from prevention to detection and remediation, and developing intelligence-driven security programs.
Tags : 
emc, security operations, security analytics, intelligence-driven security, threat detection, security monitoring, critical incident response, security, data center
    
EMC Corporation
Published By: FireEye     Published Date: Mar 20, 2013
In the last few years, the scale and sophistication of IT security threats have grown at an explosive rate.
Tags : 
fireeye, security gaps, threats, complex threats, fireeye technology, anti spam, anti spyware, anti virus
    
FireEye
Published By: CareCloud     Published Date: Sep 23, 2014
CareCloud developed this guide to explain how technology turned one practice's profit uncertainty into a happier ending. Find out how. In this white paper you'll learn how to: • Earn the greatest potential ROI from your EHR system • Capture more money through revenue cycle management • Track profitability easier by focusing on 5 key numbers
Tags : 
carecloud, practice profitability, boost revenue, roi, ehr, financial success, tech investment
    
CareCloud
Published By: Oracle     Published Date: Jul 31, 2017
Migrating finance and HR systems to the cloud improves collaboration and saves more than expected. A recent global survey conducted by MIT Technology Review Custom—in partnership with Oracle—explores the motivations, benefits, and rewards that result from deploying finance and HR systems in the cloud.
Tags : 
    
Oracle
Published By: Red Hat     Published Date: Sep 25, 2014
When a company sells services to a consumer audience primarily through a Web user interface (UI), that Web UI had better be online and available, all the time, especially if you are an airline. Such is the real-world scenario that faces Chris Skretowski, Linux Specialist at Devon, United Kingdom-based Flybe, Europe's largest regional airline. Despite being a relatively small IT function, it powers a regional airline with over 1,700 employees and 55 aircraft, and the company has big ambitions, driven top down by a new CEO who believes that technology adoption and use can make a real difference in the company's bottom line. Having a board that is supportive of IT as a strategic business driver means there is lots of open air ahead for Skretowski, who is responsible for all the Linux infrastructure that front ends the company's missioncritical Web presence. Flybe was one of the 21 companies that were interviewed for quantitative results on their operations as part of an IDC ROI analys
Tags : 
web user interface, it function, it infrastructure, roi analysis, it management, data management
    
Red Hat
Published By: Delphix     Published Date: May 28, 2015
A new generation of tools is bringing agility to components of IT operations . Learn how recent advancements in agile data management, data virtualization, and data masking are combining to help companies achieve previously unachievable breakthroughs in IT security and risk management. Starting with a technical dive into data masking and the key concepts surrounding “virtual data”, this eBook also leverages exhaustive industry research and company surveys to translate the business value associated with these solutions.
Tags : 
    
Delphix
Start   Previous    9 10 11 12 13 14 15 16 17 18 19 20 21 22 23    Next    End
Search Resource Library      

Add Resources

Get your company's resources in the hands of targeted business professionals.