RecruitingBlogscom

Follow Us:

 

abs

Results 226 - 250 of 492Sort Results By: Published Date | Title | Company Name
Published By: K2     Published Date: Jun 10, 2015
Business process management (BPM) needs can vary widely, from top-down business transformation initiatives to smart process applications to enterprise resource planning, marketing, social and more. With this breadth and depth of reach, BPM – and BPA, business process automation – are more than a couple of buzzwords, they are absolutely mission critical.
Tags : 
    
K2
Published By: KACE     Published Date: Nov 14, 2006
This paper explores how Appliance-based Software Delivery (AbSD) provides a better alternative to both software and Software as a Service (SaaS).
Tags : 
appliance, network security, saas, absd, hosted model, on-demand model, software development, value-add, value-added, security appliance, kace, it management, enterprise applications, platforms
    
KACE
Published By: Kronos     Published Date: Jul 26, 2017
Learn about HCM strategies such as using mobile technology to optimize communication; offering flexible working hours for work-life balance; managing employee absences for stronger compliance, cost control, and employee well-being; and using analytics for workforce insights.
Tags : 
mobile technology, work life balance, cost control, employee satisfaction, workforce insights
    
Kronos
Published By: Kronos Incorporated     Published Date: Jul 27, 2011
The true cost of employee absenteeism is staggering. Average cost of employee absence: 35% of payroll. Being average isn't always a good thing. Get more surprising workforce facts Mercer uncovered in this exclusive study of nearly 300 organizations.
Tags : 
kronos, employee absenteeism, mercer absence research, financial impact, lost productivity, employee absence, human resources management
    
Kronos Incorporated
Published By: Lenovo - APAC     Published Date: Feb 01, 2019
Hyperconverged Infrastructure eBook Guide for the Enterprise Abstract. Business expectations and demands on the data center are increasing and the impact on today’s data centers is staggering. Organisations that can move quickly to leverage these new opportunities will find themselves in an advantageous position relative to their competitors. But time is NOT on your side! If your IT team often feel that they’re always in catch-up mode because it is difficult to quantify IT contributions, it is time to understand the benefit of hyperconverged infrastructure. What if your IT teams can take workloads off the traditional IT infrastructure and migrate it to a purpose-built solution that integrates compute, memory, storage, and virtualization? This is what Hyperconverged Infrastructure is all about. HCI appliances deliver extreme reliability, dependable security, extensive and predictable scalability, simplified management, and faster time-to-value. Download this premium guide to understand
Tags : 
lenovodcg, nutanix, hyperconvergedinfrastructure, hci
    
Lenovo - APAC
Published By: Lenovo - APAC     Published Date: Feb 01, 2019
Hyperconverged Infrastructure eBook Guide for the Enterprise Abstract. Business expectations and demands on the data center are increasing and the impact on today’s data centers is staggering. Organisations that can move quickly to leverage these new opportunities will find themselves in an advantageous position relative to their competitors. But time is NOT on your side! If your IT team often feel that they’re always in catch-up mode because it is difficult to quantify IT contributions, it is time to understand the benefit of hyperconverged infrastructure. What if your IT teams can take workloads off the traditional IT infrastructure and migrate it to a purpose-built solution that integrates compute, memory, storage, and virtualization? This is what Hyperconverged Infrastructure is all about. HCI appliances deliver extreme reliability, dependable security, extensive and predictable scalability, simplified management, and faster time-to-value. Download this premium guide to understand
Tags : 
    
Lenovo - APAC
Published By: LifeLock     Published Date: Feb 24, 2017
ID Theft impacts presenteeism, absenteeism, and productivity. Improve employee retention and engagement and help drive greater employee value through a high-touch benefit.
Tags : 
    
LifeLock
Published By: List Sotheby's International Realty, Singapore     Published Date: Dec 10, 2018
The cooling measures announced by the government on 5 July threw the residential market into a frenzy. Within a span of five hours, over 1,000 units were sold from three new projects as buyers rushed to beat the midnight deadline to avoid paying the new higher Additional Buyer’s Stamp Duty (ABSD) rates. The 1,000 units came from three projects that were launched that night: over 500 units from Riverfront Residences in Hougang, around 300 units from Park Colonial at Potong Pasir and some 200 units from Stirling Residences in Queenstown. For the rest of the quarter, response to new launches was patchy as potential home buyers weigh affordability with opportunity cost. The residential price index edged up by a mere 0.5% q-o-q, a far cry from rises of 3.4% in Q2 and 3.9% in Q1. This moderate price increase shows that the key objective of the cooling measures, which is to achieve a more gradual but sustainable price growth, has been met. Download the full report to Learn more.
Tags : 
    
List Sotheby's International Realty, Singapore
Published By: LogLogic     Published Date: Mar 15, 2012
"Big Data" is the latest buzzword, yet over 70% of companies don't know what Big Data means and how to solve the data management challenges, finds LogLogic survey.
Tags : 
log management, siem, big data, storage, sem, pci compliance, it operations, data storage, data forensics, security intelligence, splunk, rsa envision, logrhythm, arcsight, compliance, hipaa, nitro security, q1 labs, security event management, syslog
    
LogLogic
Published By: LogLogic     Published Date: Mar 15, 2012
IANS CUSTOM RESEARCH AND INFORMATION SECURITY INVESTMENT ANALYSIS (ISIA) REPORT on Log data management and compliance products
Tags : 
log management, siem, big data, storage, sem, pci compliance, it operations, data storage, data forensics, security intelligence, splunk, rsa envision, logrhythm, arcsight, compliance, hipaa, nitro security, q1 labs, security event management, syslog
    
LogLogic
Published By: LogLogic     Published Date: Mar 15, 2012
Garnering critical IT insight helps organizations and individuals make the right decisions to better serve customers, partners, regulatory bodies and internal employees and answer many important business challenges. This whitepaper describes LogLogic's philosophy and evolution of IT Data Management.
Tags : 
log management, siem, big data, storage, sem, pci compliance, it operations, data storage, data forensics, security intelligence, splunk, rsa envision, logrhythm, arcsight, compliance, hipaa, nitro security, q1 labs, security event management, syslog
    
LogLogic
Published By: LogRhythm     Published Date: Aug 08, 2016
It feels as if these folks have been around forever. They started life as a SIEM with a heavy emphasis on log management. Today they are all that plus a solid suite of next-generation attributes. They have many of the attributes of next-gen SIEMs: artificial intelligence, sophisticated log correlation, sophisticated pattern recognition and behavioral analysis. Their strength is, as it always has been, log management. But “log management” has taken on an entirely new dimension with this product. As is absolutely necessary today, it has the intelligence to analyze, correlate and make sense of huge amounts of data.
Tags : 
security, technology, best practices, information technology, business intelligence, business technology
    
LogRhythm
Published By: LogRhythm     Published Date: Apr 04, 2017
The LogRhythm Labs™ Team (Labs Team) designed this report to provide actionable intelligence regarding threat actors and the tools, techniques, and procedures (TTPs) they use. Using this information, security operations center (SOC) analysts can better detect and respond to this specific threat.
Tags : 
    
LogRhythm
Published By: Looker     Published Date: Dec 03, 2015
The focus of modern business intelligence has been self-service; pushing data into the hands of end users more quickly with more accessible user interfaces so they can get answers fast and on their own. This has helped alleviate a major BI pain point: centralized, IT-dominated solutions have been too slow and too brittle to serve the business. What has been masked is a lack of innovation in data modeling. Data modeling is a huge, valuable component of BI that has been largely neglected. In this webinar, we discuss Looker’s novel approach to data modeling and how it powers a data exploration environment with unprecedented depth and agility. Topics covered include: • A new architecture beyond direct connect • Language-based, git-integrated data modeling • Abstractions that make SQL more powerful and more efficient
Tags : 
    
Looker
Published By: Mailtrust     Published Date: Jul 07, 2008
Email is absolutely critical in making users productive: for example, a February 2008 survey conducted by Osterman Research found that 93% of email users consider email to be important or critical in helping them to get their work done. However, most decision makers are not aware of the true cost of providing email functionality to their users.
Tags : 
messaging, email, e-mail, email costs, cost of email, cost of e-mail, mailtrust, it management
    
Mailtrust
Published By: Markforged     Published Date: Sep 14, 2018
3D printed composite parts are said to be up to 23x stronger than ABS, giving you the reliability you need to keep production lines running smoothly. Request your sample part today, and test the strength yourself.
Tags : 
markforged, 3d printing, composite parts, 3d printers, manufacturing tools, business technology
    
Markforged
Published By: MarkLogic     Published Date: Jun 19, 2017
There is opportunity in the ongoing turbulence throughout the financial industry; however, regulatory and compliance challenges absorb resources and distract focus away from growth. Download white paper to learn about a smart approach to data and innovative tools that build resilience into a business looking to not just weather the storm, but seize the advantage. Overview: - Executive Summary - Challenges of Financial Markets Today - The Need for a 360-View of Data - How to Deliver: Increased Transparency Adapt to Evolving Regulations Improve Compliance and Lower Cost - Solution Architecture for Regulatory Reporting - Case Study: Adapting to Regulatory Complexity "Disparate systems led to frequent cycles spent correcting errors within the data”.
Tags : 
banking, financial services, data management, silos, data strategy, transparency, data governance, regulation, data architecture, compliance, reporting
    
MarkLogic
Published By: Maxaudience     Published Date: Oct 12, 2015
The value of hiring a full service marketing company is absolutely undeniable. Studies have shown that you can expect to see a growth revenue as high as 30% when you enlist the help of one of these companies, but that’s not true for every marketing company out there. Instead, you have to land with the right one to get results like that. Unfortunately, that’s not always as easy as it seems. Not only do you have to consider the type of ?rm you’re choosing, but the quality of the ?rm itself. Read the following for tips that can help when you are looking to change your marketing company!
Tags : 
full service marketing, growth revenue, marketing company, advertising agencies, marketing research
    
Maxaudience
Published By: McAfee     Published Date: Dec 28, 2009
McAfee Labs foresees an increase in threats related to social networking sites, banking security, and botnets, as well as attacks targeting users, businesses, and applications. However, in 2010 McAfee also expects to see an increase in the effectiveness of law enforcement to fight back against cybercrime is also anticipated. Read this report to learn more about what to expect in 2010.
Tags : 
mcafee, cybersecurity, hackers, malware, security threats, trojan horses, virus protection, vulnerability assessments, vulnerability management, web application security
    
McAfee
Published By: McAfee     Published Date: Nov 09, 2009
Medium organizations around the globe are increasingly concerned about cyberthreats, and the rising number of incidents shared publicly certainly justifies their worries. In the first half of 2009, for example, McAfee Labs saw almost as much new malware as it did in all of 2008. At the same time, most organizations have frozen or cut their IT security budgets. Threats up, budgets down. This is what we call the "security paradox."
Tags : 
mcafee, risk management, security, security management, security threats, vulnerability assessments, vulnerability management
    
McAfee
Published By: McAfee     Published Date: Jan 23, 2013
Some IT and Security teams wonder if automated vulnerability management is important given the many pressing demands. The purpose of this paper is to help these IT and Security professionals evaluate their security posture and risk.
Tags : 
mcafee vulnerability manager, vulnerability management, mcafee labs, mcafee epolicy orchestrator, mcafee epo, mcafee epolicy orchestrator, patch tuesdays, mcafee policy auditor, mcafee risk & compliance, security, it management, data management, business technology, data center
    
McAfee
Published By: McAfee     Published Date: Jan 24, 2013
This paper reports on the findings when testing McAfee's Risk Management solution from a holistic risk management and vulnerability life-cycle management perspective. Download this white paper to learn more.
Tags : 
miercom lab test report, mcafee risk management, vulnerability life cycle management, security and compliance, mcafee epolicy orchestrator, mcafee global threat intelligence, mcafee labs, malware, asset inventory, mcafee vulnerability manager, vulnerability detection, mcafee gti, security, data management, business technology, data center
    
McAfee
Published By: McAfee     Published Date: Feb 06, 2013
The move towards multi-faceted protection has been gathering pace, with more technologies coming into play to protect users from the vast and increasing number of threats.
Tags : 
anti malware performance test, security performance test, application control benchmark, anti virus benchmark, hips benchmark, windows 7 anti malware benchmark, anti malware protection comparison, west coast labs
    
McAfee
Published By: McAfee     Published Date: Jan 28, 2014
NSS Labs provides overall exploit protection rates for 11 popular enterprise Endpoint Protection Products.
Tags : 
epp, endpoint, protection, threats, malware, nss, research
    
McAfee
Start   Previous    3 4 5 6 7 8 9 10 11 12 13 14 15 16 17    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.

© 2019  Created by RecruitingBlogs.   Powered by

Badges  |  Report an Issue  |  Terms of Service

scroll to the top