hr tech

Results 151 - 175 of 1105Sort Results By: Published Date | Title | Company Name
Published By: Carbon Black     Published Date: Apr 11, 2018
Adversaries, and cybercriminal organizations in particular, are building tools and using techniques that are becoming so difficult to detect that organizations are having a hard time knowing that intrusions are taking place. Passive techniques of watching for signs of intrusion are less and less effective. Environments are complicated, and no technology can find 100 percent of malicious activity, so humans have to “go on the hunt.” Threat hunting is the proactive technique that’s focused on the pursuit of attacks and the evidence that attackers leave behind when they’re conducting reconnaissance, attacking with malware, or exfiltrating sensitive data. Instead of just hoping that technology flags and alerts you to the suspected activity, you apply human analytical capacity and understanding about environment context to more quickly determine when unauthorized activity occurs. This process allows attacks to be discovered earlier with the goal of stopping them before intruders are able t
Tags : 
    
Carbon Black
Published By: Carbon Black     Published Date: Aug 14, 2018
Threat hunting is the proactive technique that’s focused on the pursuit of attacks and the evidence that attackers leave behind when they’re conducting reconnaissance, attacking with malware, or exfiltrating sensitive data. Instead of just hoping that technology flags and alerts you to the suspected activity, you apply human analytical capacity and understanding about environment context to more quickly determine when unauthorized activity occurs. This process allows attacks to be discovered earlier with the goal of stopping them before intruders are able to carry out their attack objectives.
Tags : 
    
Carbon Black
Published By: Carbonite     Published Date: Apr 09, 2018
Global data deduplication provides important benefits over traditional deduplication processes because it removes redundant data through entire enterprises, not just single devices. Global deduplication increases the data deduplication ratio—the size of the original data measured against the size of the data store after redundancies are removed. This helps reduce the amount of storage required at a time when businesses face exponential storage growth. Chief benefits of global deduplication include: • Reductions in storage of up to 60% • The most optimal deduplication ratio • Enterprise-wide reach • Massive reductions in backup-related WAN traffic By shrinking storage capacity needs, data deduplication can cut storage costs quickly. At the same time, businesses today need to access and utilize their data in real time, making the most recent and relevant information available. By eliminating redundant data, deduplication technology makes it simpler for data to be managed across various b
Tags : 
    
Carbonite
Published By: CareCloud     Published Date: Dec 18, 2013
Find out how three physicians are using technology to effectively battle operational difficulties and declining profitability.
Tags : 
carecloud, quantiamd, ehr, practice profitability, practice profitability index, ppi, outsourced billing, practice management
    
CareCloud
Published By: CareCloud     Published Date: Jan 08, 2014
While the terms “electronic health record” (EHR) and “electronic medical record” (EMR) are often used interchangeably, only EHRs make Meaningful Use attestation easy. Get The End of EMR free whitepaper today to learn: •The difference between EMR and EHR •How to attest for Meaningful Use •Stage-1 Meaningful Use requirements •Which technologies are right for you •The benefits of EHRs and more… Download this whitepaper to learn more!
Tags : 
emr, meaningful use, electronic health records
    
CareCloud
Published By: CareCloud     Published Date: Sep 23, 2014
CareCloud developed this guide to explain how technology turned one practice's profit uncertainty into a happier ending. Find out how. In this white paper you'll learn how to: • Earn the greatest potential ROI from your EHR system • Capture more money through revenue cycle management • Track profitability easier by focusing on 5 key numbers
Tags : 
carecloud, practice profitability, boost revenue, roi, ehr, financial success, tech investment
    
CareCloud
Published By: Castlight Health     Published Date: Aug 02, 2016
"In this eBook from Castlight Health and Jellyvision, you will learn: • How to influence employee behavior through careful and personalized messaging, curated content, creative incentives, and more. • What the top U.S. organizations are doing to boost benefits engagement and guide employees along the path of health care consumerism. • How to put your organization’s technology to work toward your communication goals to meet employees on their level."
Tags : 
castlight health, human resources, benefits, jellyvision
    
Castlight Health
Published By: Castlight Health     Published Date: Aug 02, 2016
"In this eBook from Castlight Health and Jellyvision, you will learn: • How to influence employee behavior through careful and personalized messaging, curated content, creative incentives, and more. • What the top U.S. organizations are doing to boost benefits engagement and guide employees along the path of health care consumerism. • How to put your organization’s technology to work toward your communication goals to meet employees on their level."
Tags : 
    
Castlight Health
Published By: CDW     Published Date: Feb 27, 2015
The real test of any SAM system goes beyond creating a one-time Effective Licensing Position (ELP) for a given software publisher. To be truly valuable, the SAM solution has to have the ability to manage change. Being able to work from a dependable list of software that has been approved by, and which also serves the business, means that finite IT & SAM resources are not wasted through the support of legacy software that might be deemed redundant, and should keep a company on track technically by not becoming dependent on aging software. This 10 –Minute Guide from SAM experts at Snow Software will show how to establish and maintain a Software Catalog for the purpose of ensuring that your software estate remains relevant and fit for its business purpose.
Tags : 
software management, sam, software security, cloud computing, enterprise content management, business intelligence, office productivity apps, network security
    
CDW
Published By: CDW     Published Date: Mar 27, 2015
IT departments must contend with an array of devices, operating systems and cellular carriers as well as new security threats. Even if IT departments can get a handle on the complex mobility landscape, the technology is so fluid that the picture is constantly changing. That means the IT staff has to devote time to learning about, procuring, deploying and supporting an array of devices. Busy IT departments now have another option for addressing these challenges: a monthly subscription package that provides a customizable web-based portal to automate mobile device procurement, expense management and support.
Tags : 
mobile, data, communication, tablet, smartphone, device, enterprise, tools
    
CDW
Published By: CEB     Published Date: Dec 05, 2013
Improve confidence in your technology plans and break through the vendor hype with this real-world look at technologies actually being deployed by Infrastructure functions across the globe.
Tags : 
emerging technologies, managed cloud services, cloud based architectures, security technologies, industry trends, technology adoption, technology investment plan, security
    
CEB
Published By: Centrify Corporation     Published Date: Apr 13, 2018
As business models have become increasingly digital, high-profile, reputation-damaging security breaches are grabbing more news media headlines. Leading companies have ramped up their investments in cybersecurity, yet that spending is often not well aligned with actual threats. Studies have shown that server-focused solutions such as network anti-virus, malware detection and website firewalls attract the biggest investments, ignoring the fact that misuse of privileged credentials is by far the most common cause of breaches. The reasons for this disconnect are not well understood, in part because it sits at the intersection of the people and technology domains. This survey, conducted by WSJ Custom Studios with sponsorship from Centrify, seeks insights into senior-level thinking on this issue, including current cybersecurity priorities and the perceived degree of alignment between threats and solutions.
Tags : 
    
Centrify Corporation
Published By: ChannelAdvisor     Published Date: Nov 29, 2017
"More than $1 million of e-commerce revenue is generated every 30 seconds, as millions of consumers purchase billions of products online. And these days, shopping is getting social. People aren’t just engaging on social media sites, but buying through them, too. As constant changes to mobile technology and e-commerce tools continue to reshape how consumers interact with brands and retailers, social commerce is here to stay. This white paper serves to help brands and retailers understand the state of social commerce today and its implications for connecting to customers, optimizing e-commerce operations and growing sales channels."
Tags : 
ecommerce, retail, advertising, selling online, online shopping, online advertising, social commerce, social media
    
ChannelAdvisor
Published By: Cherwell Software     Published Date: Apr 24, 2019
Each year, a total of 180,000 IT service tickets are created and processed. These include requests and incidents of all kinds, such as the provision of the flight information displays, an employee request for a laptop, through to IT equipment for an airline customer. The Airport’s IT team therefore decided to undertake a complex and ambitious project, entitled “ITSM 2020,” which aimed to establish a uniform and future-oriented IT service management system that would effectively and efficiently serve all areas of Munich Airport. Munich Airport evaluated various bidders in a two stage process conducted on the basis of the European Union tendering procedures. Cherwell was able to hold its own against other ITSM solutions both technically and in terms of price.
Tags : 
    
Cherwell Software
Published By: Ciena     Published Date: Nov 15, 2016
Research and Education (R&E) networks are experiencing a surge in capacity demand as a result of the massive growth of streaming media (Netflix, Facebook, YouTube), growing utilization of public cloud services, and the continued need to support large scientific data file transfers for researchers collaborating around the globe. This increase in traffic is driving many operators to evaluate network backbone upgrades to 100G. Upgrading is necessary but costly. But what if operators could upgrade their R&E networks to 100G for 50 percent less CAPEX investment and extend the life of the existing routers, while actually simplifying the architecture to enable lower operational costs? Download our app note to learn how.
Tags : 
o-vpn, integrated access device, pinpoint, z-series, ciena 6500, ciena 5430, 6500-7, emotr
    
Ciena
Published By: Ciena     Published Date: Nov 15, 2016
"Demand for more energy continues to increase, putting a lot of pressure on utility companies to upgrade their aging supply infrastructure. This white paper addresses: >The current status of the electric grid >Explains why upgrading to a Smart Grid is necessary >Discusses the importance of the communication network’s role in this migration >Offers prescriptions for success in a smooth evolutionary path. Explore ""The Utility of the Future, Considerations for Evolving to a Smart Grid Infrastructure"" by downloading it today. "
Tags : 
sdh, sonet sdh, sonet/sdh, sdh network, synchronous digital hierarchy, what is sdh, sonet vs sdh, define sdh
    
Ciena
Published By: Ciena     Published Date: Nov 15, 2016
"Economic conditions have changed the operating landscape for government and educational organizations. Modern, converged networks utilize advanced optical and Ethernet technologies to form a highly flexible and scalable infrastructure capable of delivering many emerging applications and ready to scale far into the future. Additional benefits of building better networks for state and local governments include: >Better public service at lower taxpayer cost >Support for emerging applications in transportation, public safety, healthcare, and education >A graceful technology migration from legacy to converged network > Preparation for future, unplanned government applications Download ""Building Better Networks for State and Local Governments"" to discover more today."
Tags : 
sdh, sonet sdh, sonet/sdh, sdh network, synchronous digital hierarchy, what is sdh, sonet vs sdh, define sdh
    
Ciena
Published By: Ciena     Published Date: Nov 15, 2016
How are R&E network operators rethinking networks to accelerate scientific discovery? Discover the answer in this Ciena white paper today.
Tags : 
o-vpn, integrated access device, pinpoint, z-series, ciena 6500, ciena 5430, 6500-7, emotr
    
Ciena
Published By: Ciena     Published Date: Nov 15, 2016
Drive smart grid transformation with Ethernet-based packet-optical networks. Download the white paper to learn how.
Tags : 
sdh, sonet sdh, sonet/sdh, sdh network, synchronous digital hierarchy, what is sdh, sonet vs sdh, define sdh
    
Ciena
Published By: Ciena     Published Date: Nov 15, 2016
Discover how a converged network allows government and educational organizations to offer better service with lower taxpayer cost.
Tags : 
sdh, sonet sdh, sonet/sdh, sdh network, synchronous digital hierarchy, what is sdh, sonet vs sdh, define sdh
    
Ciena
Published By: Ciena     Published Date: Nov 15, 2016
How are R&E network operators rethinking networks to accelerate scientific discovery? Discover the answer in this Ciena white paper today.
Tags : 
o-vpn, integrated access device, pinpoint, z-series, ciena 6500, ciena 5430, 6500-7, emotr
    
Ciena
Published By: Ciena     Published Date: Nov 15, 2016
Drive smart grid transformation with Ethernet-based packet-optical networks. Download the white paper to learn how.
Tags : 
sdh, sonet sdh, sonet/sdh, sdh network, synchronous digital hierarchy, what is sdh, sonet vs sdh, define sdh
    
Ciena
Published By: Ciena     Published Date: Nov 15, 2016
Discover how a converged network allows government and educational organizations to offer better service with lower taxpayer cost.
Tags : 
sdh, sonet sdh, sonet/sdh, sdh network, synchronous digital hierarchy, what is sdh, sonet vs sdh, define sdh
    
Ciena
Published By: Ciena     Published Date: Jun 12, 2017
Explore "The Utility of the Future, Considerations for Evolving to a Smart Grid Infrastructure" by downloading it today.
Tags : 
sdh, sonet sdh, sonet/sdh, sdh network, synchronous digital hierarchy, what is sdh, sonet vs sdh, define sdh
    
Ciena
Published By: Ciena     Published Date: Jun 12, 2017
In this whitepaper, you will see the smart city models and the keys to obtaining a smart city with SDN and NFV.
Tags : 
sdh, sonet sdh, sonet/sdh, sdh network, synchronous digital hierarchy, what is sdh, sonet vs sdh, define sdh
    
Ciena
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search Resource Library      

Add Resources

Get your company's resources in the hands of targeted business professionals.