RecruitingBlogscom

Follow Us:

 

response

Results 176 - 200 of 623Sort Results By: Published Date | Title | Company Name
Published By: Cisco     Published Date: Jun 29, 2015
Ron the CIO is getting complaints about slow application response time during peak ordering season. Is the problem with the application or in the SDN infrastructure?
Tags : 
cisco, cisco aci, technology, security, data center, apic, security data, cio
    
Cisco
Published By: KPMG     Published Date: Jul 10, 2018
With disruptive ideas and technologies coming thick and fast, formulating a strategic response is critical to long-term survival. How can you prepare a strategy for success? Read this report to find out: • how established organisations are meeting the challenge from disruptors • what models they’re using to gain first-mover access to technology innovation • why designing an overall portfolio of disruption responses is key • how to navigate disruption successfully, with a clear four-step approach.
Tags : 
    
KPMG
Published By: KPMG     Published Date: Jul 10, 2018
With disruptive ideas and technologies coming thick and fast, formulating a strategic response is critical to long-term survival. How can you prepare a strategy for success? Read this report to find out: • how established organisations are meeting the challenge from disruptors • what models they’re using to gain first-mover access to technology innovation • why designing an overall portfolio of disruption responses is key • how to navigate disruption successfully, with a clear four-step approach.
Tags : 
    
KPMG
Published By: CA WA     Published Date: May 12, 2008
CA Workload Automation brings a central point of control and visibility to help assure efficient, reliable and secure business process management. It enables business workload design across platforms and operating systems, offering advanced monitoring and automated responses to changes and exceptions.
Tags : 
web services, bpm, business process, ca wa, workload automation
    
CA WA
Published By: CA WA     Published Date: Aug 15, 2008
Despite increasingly complex data center environments, IT is expected to provide business owners with faster service, higher reliability, and greater agility than ever before – all within a tight budget. It is impossible to meet these goals with manual IT processes. However, EMA research shows that IT Process Automation (ITPA) helps achieve these goals, delivering annual savings of $500,000 on staff costs alone, and 64 hours of additional uptime per year – plus improved resource utilization, security and compliance, problem response times, and agility.
Tags : 
workload automation, ca wa, computer associates, automation, bpm, bpa, it management
    
CA WA
Published By: PitneyBowes     Published Date: Sep 21, 2010
Mailstream Consulting can help drive revenue growth and reduce costs by improving net response and generating process improvements that help eliminate waste.
Tags : 
pitneybowes, net response, pitney bowes management services, postage, mailing services, postal
    
PitneyBowes
Published By: EMC Corporation     Published Date: May 27, 2014
ESG Whitepaper: New security risks and old security challenges often overwhelm legacy security controls and analytical tools. This ESG white paper discusses why today's approach to security management—that depends on up-to-the-minute situational awareness and real-time security intelligence—means organizations are entering the era of big data security analytics.
Tags : 
emc, security operations, security analytics, intelligence-driven security, threat detection, security monitoring, critical incident response, security
    
EMC Corporation
Published By: EMC Corporation     Published Date: May 27, 2014
The information security mission is no longer about implementing and operating controls. This report by the Security for Business Innovation Council (SBIC) describes how information security teams are transforming to include a much broader set of technical and business-centric activities, to better manage the wider risks to information assets.
Tags : 
emc, security operations, security analytics, intelligence-driven security, threat detection, security monitoring, critical incident response, security
    
EMC Corporation
Published By: EMC Corporation     Published Date: May 27, 2014
RSA Technical Brief: The openness of today's networks and the growing sophistication of advanced threats make it almost impossible to prevent cyber attacks and intrusions. This technical brief discusses why combating advanced threats depends on organizations shifting more security resources from prevention to detection and remediation, and developing intelligence-driven security programs.
Tags : 
emc, security operations, security analytics, intelligence-driven security, threat detection, security monitoring, critical incident response, security
    
EMC Corporation
Published By: EMC Corporation     Published Date: May 27, 2014
RSA Paper: In today's highly interconnected business environment, information security can no longer be an isolated endeavor: it's the responsibility of an entire business ecosystem or value-chain. This RSA Security Brief looks at the areas for improvement where investment will typically generate the greatest security benefit.
Tags : 
emc, security operations, security analytics, intelligence-driven security, threat detection, security monitoring, critical incident response, security
    
EMC Corporation
Published By: EMC Corporation     Published Date: May 27, 2014
RSA White Paper: As organizations rebalance their security defenses to combat today's sophisticated threats, they're recognizing that centralized incident response capabilities are key. This white paper discusses how organizations can assess and improve their incident response maturity. It also introduces RSA products and services, including RSA Security Analytics, that can help accelerate the maturity journey.
Tags : 
emc, security operations, security analytics, intelligence-driven security, threat detection, security monitoring, critical incident response, security
    
EMC Corporation
Published By: NetApp     Published Date: Sep 22, 2014
NetApp Flash Pool is a storage cache option within the NetApp Virtual Storage Tier product family, available for NetApp FAS storage systems. A Flash Pool configures solid state drives (SSDs) and hard disk drives (HDDs) into a single storage pool, known as an “aggregate” in NetApp parlance, with the SSDs providing a fast response time cache for volumes that are provisioned on the Flash Pool aggregate. In this lab evaluation, NetApp commissioned Demartek to evaluate the effectiveness of Flash Pool with different types and numbers of hard disk drives using an online transaction processing (OLTP) database workload, and to evaluate the performance of Flash Pool in a clustered Data ONTAP environment during a cluster storage node failover scenario. In the report, you’ll dis cover how Demartek test engineers documented a 283% gain in IOPS and a reduction in latency by a factor of 66x after incorporating NetApp Flash Pool technology.
Tags : 
flash pool, fas storage systems, ssd, online transaction processing, cluster storage
    
NetApp
Published By: HP     Published Date: Feb 02, 2015
In response to accelerating business demands and the need for internal IT to remain competitive with external sources (i.e., public clouds), business and IT managers alike realize they need to transform their IT environments. IDC is seeing enterprise IT move away from unmanageable virtualized systems, siloed servers, storage, information, and processes to embrace more integrated infrastructures that enable cloud-based technologies.
Tags : 
    
HP
Published By: AppDynamics     Published Date: Sep 21, 2017
Perhaps more than any programming language, Java continues to have a profound impact on how people navigate today’s world. Java’s functionality is responsible for setting a great deal of what users expect in terms of performance from their internet-accessible devices. The history of Java is more than two decades long and the language continues to grow and adapt in response to evolving consumer and business expectations. Throughout all of these changes, however, the performance of Java applications remains a paramount concern for developers.
Tags : 
    
AppDynamics
Published By: Jama Software     Published Date: Jul 06, 2015
What if you could get the right product to market 18 percent faster? What would that mean to your bottom line? For the average 100-person team, 18 percent translates to $1.5 million a year, and puts one to two hours back into the day of every person on product-related teams. Your product teams are constantly shifting priorities in response to change, requiring everyone involved to make hundreds of decisions that can impact the business value of your delivered product. Although you can’t eliminate change, you can help your organization be more productive in its face. You can help them be more responsive, more empowered and faster.
Tags : 
increase roi, product teams, business value, organization productivity, enterprise applications
    
Jama Software
Published By: DrFirst     Published Date: Mar 13, 2015
Secure, efficient communication between doctors and staff is key to reliable patient care. For Groves Community Hospice, every situation involving patients requires rapid response; this poses a particular challenge, as more than 80 percent of the hospice staff work in the field. With so many doctors and staff off-site or on-call, and considering the inherent urgency of hospice care, Groves needed to streamline staff communications and enable a better way for physicians and staff to connect and discuss critical patient issues within a secure environment.
Tags : 
drfirst, hospital, solutions, medical records, communication, response, streamline, akario
    
DrFirst
Published By: DrFirst     Published Date: Mar 13, 2015
Long-term care facilities are highly regulated institutions that are often reluctant to implement new health technology. Cedar Creek Nursing Center chose Akario Backline® secure chat to help improve care transition processes by minimizing phone calls and faxes.
Tags : 
drfirst, hospital, solutions, medical records, communication, response, streamline, akario
    
DrFirst
Published By: Mimecast     Published Date: Apr 13, 2018
On the 13th February 2017, the Privacy Amendment (Notifiable Data Breaches) Act was passed in the Australian Parliament, introducing a mandatory notification regime. This bill commences on the 23rd February 2018 and will require organisations to notify data subjects and regulators in the event of an “eligible” data breach. An “eligible data breach” will occur where: ? There is unauthorised access to, or unauthorised disclosure of, the information; and ? A reasonable person would conclude that the access or disclosure would be likely to result in serious harm to any of the individuals to whom the information relates The amended legislation provides greater clarity to Australian citizens about the privacy of their personal information and will affect Australian companies as well as international organisations with Australian operations. It also means that businesses must carefully think about the practical issues related to data breach responses and the disruptive consequences of any un
Tags : 
    
Mimecast
Published By: ArborNetworks     Published Date: Sep 16, 2015
This paper examines the four stages of evolution as security organizations move from reactively responding to incidents to proactively identifying and hunting for threats.
Tags : 
networking, security, it management, data management, business technology, data center
    
ArborNetworks
Published By: BAE Systems     Published Date: Jan 06, 2016
For most financial institutions, it’s no longer a question of ‘if’ but ‘when’ they’ll be attacked.. If you’re like most financial institutions, you have controls that identify breaches, but need proper procedures that’ll enable you to recover from such an event. In this presentation at the CUNA Technology Council Conference, Tom Neclerio, BAE Systems’ VP of Cyber Consulting Services, discusses the current threats across the financial marketplace and explores strategies for implementing a successful incident response program as outlined in the FFIEC’s cyber resilience guidance.
Tags : 
bae systems, applied intelligence, cyber security, cyber resilience, incident response, financial institution, data breach, cyber attack
    
BAE Systems
Published By: IBM     Published Date: Oct 28, 2016
What if an analytics system learned and continue to learn as it experienced new information, new scenarios, and new responses? This is referred to as cognitive computing and is key to providing an analytics system that is easy to use but extremely powerful. Listen to this webinar, led by Jackie Ryan, the Director of Product Management for IBM's Smarter Workforce Portfolio, and learn about: The evolution of cognitive computing How cognitive computing transforms HR How to get started with cognitive talent analytics
Tags : 
ibm, kenexa, talent insights, talent analytics, knowledge management, enterprise applications, human resource technology, business technology
    
IBM
Published By: CloudHealth by VMware     Published Date: Aug 22, 2019
Public clouds have fundamentally changed the way organizations build, operate, and manage applications. Security for applications in the cloud is composed of hundreds of configuration parameters and is vastly different from security in traditional data centers. According to Gartner, “Through 2020, at least 95% of cloud breaches will be due to customer misconfiguration, mismanaged credentials or insider theft, not cloud provider vulnerabilities”1. The uniqueness of cloud requires that security teams rethink classic security concepts and adopt approaches that address serverless, dynamic, and distributed cloud infrastructure. This includes rethinking security practices across asset management, compliance, change management, issue investigation, and incident response, as well as training and education. We interviewed several security experts and asked them how public cloud transformation has changed their cloud security and compliance responsibilities. In this e-book, we will share the top
Tags : 
    
CloudHealth by VMware
Published By: CloudHealth by VMware     Published Date: Sep 05, 2019
Public clouds have fundamentally changed the way organizations build, operate, and manage applications. Security for applications in the cloud is composed of hundreds of configuration parameters and is vastly different from security in traditional data centers. According to Gartner, “Through 2020, at least 95% of cloud breaches will be due to customer misconfiguration, mismanaged credentials or insider theft, not cloud provider vulnerabilities”1. The uniqueness of cloud requires that security teams rethink classic security concepts and adopt approaches that address serverless, dynamic, and distributed cloud infrastructure. This includes rethinking security practices across asset management, compliance, change management, issue investigation, and incident response, as well as training and education. We interviewed several security experts and asked them how public cloud transformation has changed their cloud security and compliance responsibilities. In this e-book, we will share the top
Tags : 
    
CloudHealth by VMware
Published By: IBM     Published Date: Jan 30, 2017
Analytics has permeated, virtually, every department within an organization. It’s no longer a ‘nice to have’. It’s an organizational imperative. HR, specifically, collects a wealth of data; from recruiting applications, employee surveys, performance management data and it sits in systems that remain largely untapped. This data can help drive strategic decisions about your workforce. Analytic tools have, historically, been difficult to use and required heavy IT lifting in order to get the most out of them. What if an analytics system learned and continue to learn as it experienced new information, new scenarios, and new responses. This is referred to as Cognitive Computing and is key to providing an analytics system that is easy to use but extremely powerful.
Tags : 
ibm, talent analytics, cognitive computing, analytics, engagement, human resources
    
IBM
Published By: Bright Horizons     Published Date: Dec 14, 2016
Dependent-care breakdowns are a serious risk to business continuity. With child care already a challenge for much of the workforce, and elder care responsibilities on the upswing due to the aging population, smart organizations are moving toward a response strategy.
Tags : 
business continuity, employee well-being, workforce productivity, retention, engagement, recruitment, child care, back-up child care
    
Bright Horizons
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.

© 2019  Created by RecruitingBlogs.   Powered by

Badges  |  Report an Issue  |  Terms of Service

scroll to the top