RecruitingBlogscom

Follow Us:

 

ebook

Results 251 - 275 of 1612Sort Results By: Published Date | Title | Company Name
Published By: CA Technologies     Published Date: Jun 05, 2014
An eBooklet discussing the pitfalls of DevOps, how you can avoid them, and how to get started on your DevOps journey.
Tags : 
devops, a guide to devops, integrated journey
    
CA Technologies
Published By: IBM     Published Date: Mar 13, 2014
3 factors are needed by an infrastructure to optimize cloud performance, this eBook shows how IBM System x uses all 3 to increase business agility and reduce costs.
Tags : 
ibm, server design, memory, processor, software, processing power, data, cloud performance, business agility, research
    
IBM
Published By: CA Technologies     Published Date: Jan 08, 2014
Mobile devices are ubiquitous and end users keep tend to keep them close at hand. This represents both an opportunity and a challenge with regard to security and authentication. There is an opportunity to leverage mobile devices to provide out-of-band authentication methods for access to sensitive applications and data. There is also a growing challenge to provide user convenient authentication directly from mobile devices. This eBook will discuss these use cases and how they fit into your overall mobile authentication strategy.
Tags : 
ca technologies, authentication, password management, bring your own device, byod, mobile security, security, mobile device, access control, application security, mobile authentication
    
CA Technologies
Published By: CA Technologies     Published Date: Jan 08, 2014
Cloud adoption, mobility, social media and the consumerization of IT are transforming many business activities for enterprise employees, partners and customers and eliminating the traditional network perimeter. Organizations have to change how they manage security and user identities if they want to keep their data and applications secure. Read this eBook to discover how a centralized identity and access management service can help you create a new identity perimeter.
Tags : 
ca technologies, identity, identity management, user provisioning, security, mobile, cloud computing, social media, mobility, security management, access mangement, identity perimeter
    
CA Technologies
Published By: CA Technologies     Published Date: Jan 08, 2014
Mobile devices are ubiquitous and end users keep tend to keep them close at hand. This represents both an opportunity and a challenge with regard to security and authentication. There is an opportunity to leverage mobile devices to provide out-of-band authentication methods for access to sensitive applications and data. There is also a growing challenge to provide user convenient authentication directly from mobile devices. This eBook will discuss these use cases and how they fit into your overall mobile authentication strategy.
Tags : 
ca technologies, authentication, password management, bring your own device, byod, mobile security, security, mobile device, access control, application security, mobile authentication
    
CA Technologies
Published By: CA Technologies     Published Date: Jan 08, 2014
Cloud adoption, mobility, social media and the consumerization of IT are transforming many business activities for enterprise employees, partners and customers and eliminating the traditional network perimeter. Organizations have to change how they manage security and user identities if they want to keep their data and applications secure. Read this eBook to discover how a centralized identity and access management service can help you create a new identity perimeter.
Tags : 
ca technologies, identity, identity management, user provisioning, security, mobile, cloud computing, social media, mobility, security management, access mangement, identity perimeter
    
CA Technologies
Published By: iCims     Published Date: Feb 02, 2017
That’s why in this eBook, we take a look at 17 ways companies can adapt to a changing talent acquisition landscape, to ensure they can better grow their workforce today, and in the years to come.
Tags : 
    
iCims
Published By: Blue Coat Systems UK     Published Date: Nov 03, 2011
View this paper now to explore the top 4 security risks businesses face when using social networks and ways to protect against and mitigate the risks.
Tags : 
blue coat, insider threats, security, social media risks, twitter risks, facebook risks, linkedin risks, secure web gateway, application performance monitoring
    
Blue Coat Systems UK
Published By: Blue Coat Systems UK     Published Date: Nov 03, 2011
IT and business leaders must ensure they have the right security strategies to protect against the rapid evolution of social networking threats
Tags : 
blue coat, insider threats, security, social media risks, twitter risks, facebook risks, linkedin risks, secure web gateway, application performance monitoring
    
Blue Coat Systems UK
Published By: Logicalis     Published Date: Sep 05, 2013
6 Things to Look for in Your Software as a Service partner Start
Tags : 
logicalis, ebook, saas, saas solution, software solutions, software as a service
    
Logicalis
Published By: BMC Software     Published Date: May 28, 2014
Learn how BMC Control-M for for Hadoop allows IT to extract value from big data, with clear visibility, predictability and increased productivity and efficiency.
Tags : 
it management, enterprise applications
    
BMC Software
Published By: Brainshark     Published Date: Dec 08, 2015
Download this free eBook to get smarter about sales productivity. Whether you’re just getting started with sales enablement or already have a program underway, "Sales Enablement for Dummies" can help.
Tags : 
sales enablement, what is sales enablement, sales enablement strategies, sales force enablement, sales enablement research, sales enablement solutions, emerging marketing, internet marketing, crm & customer care, sales
    
Brainshark
Published By: Brainshark     Published Date: Dec 08, 2015
Sales conversations are happening every day. Are YOUR reps ready? This exclusive eBook provides tips and ideas for improving sales readiness across your organization.
Tags : 
sales enablement, sales readiness, sales training, sales force strategies, sales best practices, sales training secrets, emerging marketing, internet marketing, crm & customer care, sales
    
Brainshark
Published By: Castlight Health     Published Date: Feb 14, 2017
Wish you could get more employees to use their benefits? (And use them wisely?) The Ultimate HR Guide to Promoting Benefits Programs, Tools, and Resources can help you get started. This handy eBook from Castlight Health and Jellyvision explains how to 1) avoid sounding like an insurance robot, 2) find incentives that work (and that don’t bust the budget) and 3) promote your benefit programs — everywhere.
Tags : 
    
Castlight Health
Published By: CA Technologies     Published Date: Jun 04, 2015
There has been growing buzz about DevOps. DevOps is a methodology that unites the often separate functions of software development (Dev) and production and operations (Ops) into a single, integrated, and continuous process. DevOps is about breaking down the barriers between Dev and Ops. It leverages people, processes, and technology to stimulate collaboration and innovation across the entire software development and release process. Dev and Ops should always be part of an integrated process, but that’s not always as easy as it sounds. You may be stuck in what we call “Dysfunction Junction.” Read this eBooklet to learn about the pitfalls of DevOps, how you can avoid them, and how to get started on your DevOps journey.
Tags : 
    
CA Technologies
Published By: NetApp     Published Date: Nov 13, 2017
This easy to read eBook examines the benefits of cloud backup solutions and features examples of companies that are using cloud storage to reduce costs and increase operational efficiency.
Tags : 
    
NetApp
Published By: NetApp     Published Date: Nov 13, 2017
This easy to read eBook provides an overview of cloud-integrated backup solutions. Discover how you can:* Modernize your backup strategy* Reduce data protection cost* Secure your backup data in a cloud
Tags : 
    
NetApp
Published By: NetApp     Published Date: Nov 13, 2017
Read the ebook and learn how to guard your MS Office 365 data against malicious or accidental data loss with NetApp Cloud Control and AWS.
Tags : 
    
NetApp
Published By: NetApp     Published Date: Nov 13, 2017
Your MS Office 365 data might not be as safe as think. Read the ebook and learn about the 4 steps to improve the security of your MS Office 365 data.
Tags : 
    
NetApp
Published By: NetApp     Published Date: Mar 05, 2018
Migrating to a flash storage solution does much more than simply save you money. Read this ebook and learn the top three things to know about modernizing your SAN. Find out how you can accelerate your most important apps by up to 20 times compared to traditional storage—while minimizing downtime.
Tags : 
netapp, database performance, flash storage, data management, cost challenges
    
NetApp
Published By: NetApp     Published Date: Mar 05, 2018
One of the most effective ways to address database performance and cost challenges is to modernize the underlying hardware infrastructure. Innovations such as flash storage, converged infrastructure architectures, and sophisticated data management platforms can have a major impact. Learn more in our free eBook: Optimizing Database Storage Performance For Dummies.
Tags : 
netapp, database performance, flash storage, data management, cost challenges
    
NetApp
Published By: SAP     Published Date: Jun 04, 2015
Read this eBook to learn how SuccessFactors offers a full suite of talent solutions to help you: • Attract, engage, select, and hire the right talent • Get your new hires up to speed in record time • Provide continuous performance management • Reward and retain your top talent • Identify and anticipate talent gaps • Provide learning anywhere, any time • Get content as a service • Harness the power of collaboration
Tags : 
    
SAP
Published By: SAP     Published Date: Jun 12, 2015
In this e-book you’ll see how solutions that span the entire employee lifecycle simplify your technologies, processes, and decision making. And you’ll learn how, combined with our global partner ecosystem and SAP’s experience and commitment, they can help you achieve your goals. With SuccessFactors you can run simple, at the right speed, and in the right direction, to win.
Tags : 
    
SAP
Published By: Mimecast     Published Date: Nov 14, 2018
Are your employees behaving badly? Quick Fact: Only 11% of organizations continuously train employees on how to spot cyberattacks. Too often time, resources and conflicting priorities push training to the bottom of the list. Check out the latest insights from the Cyber Resilience Think Tank to learn how to make security awareness a key facet of your organization’s culture. The consequences of not prioritizing security awareness training are real. Read about it.
Tags : 
    
Mimecast
Published By: SuccessFactors, an SAP Company     Published Date: Jun 18, 2015
In this e-book you’ll see how solutions that span the entire employee lifecycle simplify your technologies, processes, and decision making. And you’ll learn how, combined with our global partner ecosystem and SAP’s experience and commitment, they can help you achieve your goals. With SuccessFactors you can run simple, at the right speed, and in the right direction, to win.
Tags : 
    
SuccessFactors, an SAP Company
Start   Previous    4 5 6 7 8 9 10 11 12 13 14 15 16 17 18    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.

© 2018  Created by RecruitingBlogs.   Powered by

Badges  |  Report an Issue  |  Terms of Service

scroll to the top