RecruitingBlogscom

Follow Us:

 

hr technology

Results 651 - 675 of 686Sort Results By: Published Date | Title | Company Name
Published By: IBM     Published Date: May 04, 2009
The latest servers from IBM have one thing in common - the new Intel Xeon 5500 series processors. This white paper will explain the benefits of the new processors, including speed and performance.
Tags : 
ibm, express seller, virtualization, intel, xeon, processor, 5500, bladecenter, system x, power, energy costs, hardware, cooling, quickpath interconnect, qpi, numa, memory standpoint, front-side bus, fsb, dimms per channel
    
IBM
Published By: IBM     Published Date: May 04, 2009
Live migration is essential for a dynamic data center environment. But until now, it's been impossible between different generations of processors. Intel IT and End User Platform Integration have done so successfully with Intel® Virtualization Technology FlexMigration. This white paper explains how.
Tags : 
ibm, express seller, virtualization intel, xeon, processor, 5500, bladecenter, system x, power, energy costs, hardware, cooling, flexmigration, processors, proof-of-concept, poc, virtual machines, vms, virtual machines, vmware esx 3.5u2
    
IBM
Published By: Trend Micro, Inc.     Published Date: Apr 29, 2009
The greatest threat to enterprise data security comes from inside threats. Securing the enterprise requires an understanding of the data leak points, environment, people, and processes for managing sensitive information. This white paper explains how network-based and endpoint-based solutions can work together to provide the broadest protection available while ensuring scalability and manageability, and that employee productivity is not impacted.
Tags : 
trend micro, datadna, data leak, threat, leak, network boundaries, vulnerability threats, data leak, laptop, environment, data loss, data protection, data management, data leak prevention, dlp, agent-based technology, remote computing, leakproof, monitoring, enforcement
    
Trend Micro, Inc.
Published By: Trend Micro, Inc.     Published Date: Apr 29, 2009
Companies rely on knowledge assets, such as product formulas and customer databases. VPNs and network monitors can protect proprietary information from outsiders; but, they won't do much to prevent access by internal users. With the popularity of wireless networks, USB drives and other portable devices, it's all too easy for insiders to leak key data. This white paper explains how Trend Micro LeakProof 3.0 protects sensitive data at rest, in use, and in motion.
Tags : 
trend micro, data breach, breaches, data breaches, data loss prevention, dlp, hackers, data leak, data protection solutions, midsize organizations, smb, physical breach, virtual breach, malicious breach, sensitive information, malicious data leaks, threats, confidential information, data loss, data protection
    
Trend Micro, Inc.
Published By: Trend Micro, Inc.     Published Date: Apr 29, 2009
Encryption will help to protect data against unauthorized access by outsiders from lost or stolen devices such as laptops, thumb drives, and other removable media. But it does not protect against the insider threat-employees and contractors with authorized access to data who mistakenly or maliciously leak your most valuable assets.
Tags : 
trend micro, encryption, laptop, ediscovery, e-discovery, data protection, threats, leaks, assets, true protection, dlp, data breach, breaches, data breaches, data loss prevention, dlp, hackers, data protection solutions, midsize organizations, smb
    
Trend Micro, Inc.
Published By: WebEx.     Published Date: Apr 03, 2009
Virtual collaboration and online meeting technologies are advancing SMBs’ reach without huge investments, thus allowing them to not only save costs and land more sales but to better educate consumers and business partners and serve a greater number of people lost by former logistical barriers. In turn, this knowledge transfer is allowing smaller companies to gain greater mindshare and reach new markets through numerous, innovative applications for traditional Web-based knowledge transfer technology.
Tags : 
webex, web collaboration, online meetings, smb, virtual collaboration, increasing sales, network renovations, sales optimization, cost reduction, business budget, budget management, human resources tools, human resources management
    
WebEx.
Published By: WebEx     Published Date: Apr 02, 2009
Virtual collaboration and online meeting technologies are advancing SMBs’ reach without huge investments, thus allowing them to not only save costs and land more sales but to better educate consumers and business partners and serve a greater number of people lost by former logistical barriers. In turn, this knowledge transfer is allowing smaller companies to gain greater mindshare and reach new markets through numerous, innovative applications for traditional Web-based knowledge transfer technology.
Tags : 
webex, web collaboration, online meetings, smb, virtual collaboration, increasing sales, network renovations, sales optimization, cost reduction, business budget, budget management, human resources tools, human resources management, human resource technology
    
WebEx
Published By: ThreatMetrix.     Published Date: Jan 30, 2009
In 2007 alone, $3.6 billion was lost to online fraud. This white paper shows how to block scam artists, reliably and affordably-while ensuring that real customers always have access.
Tags : 
threatmetrix, e-commerce fraud, revenue loss, scam artists, internet security, malwae, botnets, fraudulent proxy servers, verification technology, security
    
ThreatMetrix.
Published By: ThreatMetrix     Published Date: Jan 21, 2009
In 2007 alone, $3.6 billion was lost to online fraud. This white paper shows how to block scam artists, reliably and affordably—while ensuring that real customers always have access.
Tags : 
threatmetrix, e-commerce fraud, revenue loss, scam artists, internet security, malwae, botnets, fraudulent proxy servers, verification technology
    
ThreatMetrix
Published By: Vocus, Inc     Published Date: Jan 16, 2009
Rapid media changes make it challenging for PR professionals to keep up.  Discover methods to navigate through today’s media landscape, while you stay ahead of the changes. Uncover techniques for building strong media relationships using the latest technology, to achieve PR success.
Tags : 
vocus, media landscape, pr professionals, public relations, media relationships, pr success
    
Vocus, Inc
Published By: Network Automation     Published Date: Dec 02, 2008
Accudata Technologies, provides flexible access to data validation through innovative technology and cutting-edge data transmission. Accudata serves as an access hub for validating information associated with telephone numbers, cellular numbers and IP locations while also providing line information database storage of phone numbers and corresponding information.
Tags : 
network automation, automate, accudata technologies, networking, it management
    
Network Automation
Published By: HP - Enterprise     Published Date: Nov 19, 2008
While investments to secure the enterprise continue to rise, breaches into company systems and data are skyrocketing. These cyber crimes are consistently debilitating organizations operations, reputations and ultimately, viability. Today’s CEOs are demanding aggressive strategies to protect their business. CIOs and CSOs are working together to employ proven Business Software Assurance approaches across the enterprise to stay ahead of constant threats.
Tags : 
business risk, security, application security, audit, risk, vulnerabilities, fortify, fortify software, hackers, cyber threats, application security standards, threats, assessment, remediation, ciso, cyber crime, breaches, information technology, c-level
    
HP - Enterprise
Published By: BlackBerry     Published Date: Nov 08, 2008
This paper is the first in a four-part series examines the ways that wireless technology and mobile communications can enhance the efficiency and quality of institutional healthcare, improving the processes through which doctors, nurses, specialists and support staff members deliver medical treatment. Part One offers an overview of the current healthcare situation and suggests ways in which wireless technology solutions address healthcare challenges.
Tags : 
blackberry, healthcare, voip, it communication, microsoft exchange, mobile device management, mobile device management software, mobile workers, remote computing, wireless applications software, wireless computing
    
BlackBerry
Published By: Quocirca     Published Date: Nov 05, 2008
Unsurprisingly, research shows that the majority of organizations see their future predicated on how well they can innovate. However, just throwing IT technology at issues in the hope that innovation will happen is not viable. Ideas are ephemeral and are easily crushed within the wrong environment. Creating a suitable culture, allied with a well implemented ideas management approach combined with strong leadership, is required.
Tags : 
quocirca, networking
    
Quocirca
Published By: Dell     Published Date: Oct 20, 2008
Dell has improved PC deployment activities through patent-pending automation technology and offers an array of services from planning a Windows Vista migration to post-deployment management.
Tags : 
dell, deploying vista, dell deployment framework, dell deployment model, deployment automation toolset, optimized deployment, security, software development, platforms
    
Dell
Published By: Lumension     Published Date: Oct 17, 2008
Vulnerability management can be a powerful means toward reducing the threat surface within an enterprise IT environment. But because vulnerability management technology has been around in some form or another for so long there has been plenty of time for the din of marketing-speak from various vendors to confuse users about the true nature of vulnerability management tools and practices.
Tags : 
lumension, it environment
    
Lumension
Published By: HP - Enterprise     Published Date: Oct 16, 2008
Is open source secure? How much business risk is introduced with it?  Fortify surveyed the open source community for an answer and revealed that open source projects lack the three essential elements of security:  people, process and technology.  Read this research to discover what actions can reduce these risks within your organization.
Tags : 
fortify, open source, business risk, security, application security, audit, risk, vulnerabilities, fortify, fortify software, hackers, cyber threats, application security standards, threats, assessment, remediation
    
HP - Enterprise
Published By: Godfrey     Published Date: Oct 02, 2008
It’s not unusual for business-to-business companies to cut communications budgets when faced with uncertain times like economic downturns, mergers/acquisitions, reorganization, significant competitive threats, technology changes and the like.And yet, it is precisely these situations in which communications that support the brand are most helpful. If there’s ever a time when you need the strength, continuity, and support of a healthy brand, it’s when there’s uncertainty.
Tags : 
b-to-b branding, business-to-business branding, b-to-b branding in web 2.0, b-to-b interactive media, brand guardians, brand ambassadors, media proliferation, brand fragmentation, business-to-business marketing
    
Godfrey
Published By: Quocirca     Published Date: Sep 18, 2008
Whether we like it or not we are all IT users now. Through the ubiquity of networks of devices that we rely on for information, security and day-to-day transactions even those who eschew technology now rely on it, even if they do not acknowledge it. The failure of these networks can lead to widespread disruption, unhappy customers, unproductive employees and lost business. Ensuring their availability, security and efficiency is a job for experts who need powerful tools to carry out the task.
Tags : 
quocirca, service management, high availability, security
    
Quocirca
Published By: Integration New Media, Inc.     Published Date: Sep 18, 2008
This new white paper by Integration New Media looks at the benefits achieved through adding richness to eCommerce sites, with an emphasis on the impact that this change can have on a retailer’s bottom line. In addition, it presents samples of successful integrations and options for moving forward that leverage current technology, providing retailers with the biggest bang for the smallest investment.
Tags : 
inm, integration new media
    
Integration New Media, Inc.
Published By: Integration New Media, Inc.     Published Date: Sep 18, 2008
This new white paper by Integration New Media provides marketing agencies and multimedia developers with a strong foundation of information about Rich Internet Applications (RIAs). From basic definitions through to technology explanations, this white paper is a must-read for those looking to embrace new technologies to satisfy their clients’ growing needs.
Tags : 
multimedia, ria, rich internet applications, web development, inm, integration new media
    
Integration New Media, Inc.
Published By: HP Service Management     Published Date: Sep 03, 2008
In this first chapter of "The Shortcut Guide to IT Service Management and Automation," you will be led through a step by step analysis of your company's IT and business relationships, providing you with a basis for a strategic plan to turn service lifecycle management into a valuable business asset. Author and compliance expert Rebecca Herold demonstrates how technology acts as a strategic differentiator by enabling business growth, driving operational efficiencies to lower maintenance costs, optimizing outcomes, and reducing IT risks.
Tags : 
itil, itil v3, bsm, bsa, dca, itsm, it service management, operations, it operations, cmdb, automation, service, service management, service desk, lifecycle, life cycle, hpsm, hp sm, hp service management
    
HP Service Management
Published By: Orchid Technologies Engineering & Consulting     Published Date: Sep 03, 2008
Shrinking product development cycles coupled with demanding product requirements and increasingly complex design implementations can overwhelm a design team. The technical risk of employing new, complex, high-speed processor technology can often deter a design group from incorporating new technology in their product designs.
Tags : 
scm, supply chain, oem, manufacturing, manufacture, manufacturer, product development, chip, chips, electronics, orchid
    
Orchid Technologies Engineering & Consulting
Published By: Intermec     Published Date: Aug 01, 2008
Find out how each aspect of perfect order performance (On-Time Delivery, Complete Orders, Damage-free Delivery, Accurate Invoicing and Documentation) can be improved through enhancements to data collection processes and technologies including RFID, speech, imaging technology, and GPS.
Tags : 
rfid, on-time delivery, complete orders, perfect order, bar code, manufacturing, metrics, speech, werc, eps, roa, intermec
    
Intermec
Published By: Quocirca     Published Date: Jul 03, 2008
Technology is no longer a nice to have, or a tool for the few. With many organizations now being completely dependent on their IT systems, the need for the IT department to be seen to be responding to the organization's requirements is of critical importance.  Business Service Management, or BSM, can help in providing underpinnings to the IT function. This paper looks at how the changing processes and market conditions within an organization can be augmented through the use of a Business Service Management (BSM) approach, creating a flexible and responsive technology infrastructure aimed at supporting a rapidly changing commercial landscape and enabling greater competitiveness in the markets.
Tags : 
quocirca, business service management, bsm, service management, business management
    
Quocirca
Start   Previous    14 15 16 17 18 19 20 21 22 23 24 25 26 27 28    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.

© 2019  Created by RecruitingBlogs.   Powered by

Badges  |  Report an Issue  |  Terms of Service

scroll to the top