aps

Results 326 - 350 of 533Sort Results By: Published Date | Title | Company Name
By: Cornerstone OnDemand     Published Date: Feb 22, 2016
Almost 20% of baby boomers will retire in the next 5 years, taking essential knowledge with them and vacating a significant number of leadership roles. With the Millennial generation now making up the majority of the workforce, outnumbering Gen X-ers, they will undoubtedly have to fill the gaps left by those heading into retirement. While this might be a startling prospect for some organisations, the best approach is to embrace this shift in personnel and train your Millennials to be the managers and executives you want – and need - them to be.
Tags : millennials, leadership, generation
     Cornerstone OnDemand
By: CDW-Trend Micro     Published Date: Mar 26, 2015
As you take advantage of the operational and economic benefits of virtualization and the cloud, it’s critical to secure your virtualized data centers, cloud deployments, and hybrid environments effectively. Because if you neglect any aspect of security, you leave gaps that open the door to web threats and serious data breaches. And, to meet data privacy and compliance regulations, you will need to demonstrate that you have the appropriate security, regardless of your computing environment. Trend Micro Cloud and Data Center Security solutions protect applications and data and prevent business disruptions, while helping to ensure regulatory compliance. Whether you are focused on securing physical or virtual environments, cloud instances, or web applications, Trend Micro provides the advanced server security you need for virtual, cloud, and physical servers via the Trend Micro Deep Security platform. Download this white paper to learn more about the Trend Micro Deep Security platform.
Tags : cloud, date security, cloud security, virtualization, security, networking, it management
     CDW-Trend Micro
By: CDW-Trend Micro     Published Date: Mar 26, 2015
Traditional security solutions can’t keep up with new trends in user behavior. Turning to point products to address discrete challenges only serves to increase complexity and may inadvertently leave gaps in your security. Plus, you need to consider how you will secure users as your IT philosophy progresses from on-premise to the cloud. To effectively counter today’s evolving threat landscape, you need a tightly woven mesh of security that consolidates your view across all layers of protection and all deployment models. Read this white paper to learn how Trend Micro Smart Protection Complete can protect your users.
Tags : user protection, security, cloud, endpoint, application, network, networking, it management
     CDW-Trend Micro
By: Microsoft Azure     Published Date: Apr 10, 2018
Learn about the five gaps that could be costing you time, customers, and profit in this digital e-book. Discover how to close those gaps and transform your people, process, and technology to better serve your customer. You’ll also learn how to: Create a unified view and deliver personalized experiences to your customers across all touchpoints and channels. Provide actionable insights to your sales and marketing team so they can work together more effectively. Bring intelligence to your data and connect it with content and processes, so you can make better, faster decisions. Transform your business by connecting sales and marketing with a shared set of successful business practices.
Tags : 
     Microsoft Azure
By: HPE Intel     Published Date: Mar 09, 2016
State agency and higher education CIOs are under intense pressure to modernize their legacy IT systems. Whether that requires moving from one infrastructure to another, or moving to or from the cloud, the chief challenge remains: How to migrate data and applications without disrupting critical operations, ensure improved performance and avoid pricing and other traps that often accompany virtualizing in the cloud. Learn what’s made the difference in overcoming the impediments to workload migrations from IT leaders who’ve lived through big data and application moves. Topics include: Preparing workloads for cloud on-boarding – and off-boarding Tools for simplifying the consolidation and migration of apps and supporting services Forecasting workloads, and planning for associated testing, training, and other costs
Tags : 
     HPE Intel
By: CloudEndure     Published Date: Oct 12, 2018
Maintaining business continuity is your highest priority. In today’s commercial landscape, business continuity depends on the efficient, uninterrupted flow of data across the organization – from operations to sales to fulfillment. Even a brief lapse in workload continuity can mean thousands of lost sales opportunities, disruption to production, and compromised customer trust. The causes of those lapses can range from natural disasters to mechanical failure or human error. You need a data platform and a proactive disaster recovery (DR) strategy that will help you stay up and running in the event that your physical infrastructure is unavailable for any length of time. BUSINESS CONTINUITY Fulfilling orders, providing a high level of customer service, and keeping consumers engaged all depend on the efficient, uninterrupted flow of data throughout your organization. CUSTOMER TRUST Above all, protecting customer data—especially personally identifiable information (PII) —is critical
Tags : 
     CloudEndure
By: AWS     Published Date: Apr 27, 2018
Until recently, businesses that were seeking information about their customers, products, or applications, in real time, were challenged to do so. Streaming data, such as website clickstreams, application logs, and IoT device telemetry, could be ingested but not analyzed in real time for any kind of immediate action. For years, analytics were understood to be a snapshot of the past, but never a window into the present. Reports could show us yesterday’s sales figures, but not what customers are buying right now. Then, along came the cloud. With the emergence of cloud computing, and new technologies leveraging its inherent scalability and agility, streaming data can now be processed in memory, and more significantly, analyzed as it arrives, in real time. Millions to hundreds of millions of events (such as video streams or application alerts) can be collected and analyzed per hour to deliver insights that can be acted upon in an instant. From financial services to manufacturing, this rev
Tags : 
     AWS
By: Qlik     Published Date: Feb 15, 2016
This research snapshot shows the five critical areas for improvement to unlock further value from analytics.
Tags : qlik, data analytics, business analytics, algorithmic trading
     Qlik
By: Qlik     Published Date: Jun 24, 2016
This briefing provides a snapshot of the opportunities for financial services organizations looking to broaden and deepen the reach of analytics.
Tags : qlik, finance analytics, data, business technology
     Qlik
By: Cambium Networks     Published Date: Oct 03, 2016
What’s the catalyst behind this astonishing growth? There’s little question that one of the prime drivers — perhaps the most important of all — is the meteoric rise of reliable, high quality, cost-efficient wireless broadband video surveillance networks.
Tags : video surveillance, security, wireless broadband, safety, video camera
     Cambium Networks
By: Zebra Technologies     Published Date: Sep 24, 2018
Retailer taps mobile computing to optimize markdowns, omnichannel fulfillment, and enhance the shopper experience
Tags : 
     Zebra Technologies
By: Red Hat     Published Date: Nov 08, 2017
Industry-leading organizations are now exploiting interoperable business process management (BPM) and mobile application platforms (MAPs) so that process-oriented mobile applications can help transform the way they do business. This paper examines the phenomena driving this trend, and the common approaches to digital transformation that contribute to the enterprise in motion. Read this analyst paper from 451 Research to learn more.
Tags : business process management, mobile application platforms, digital transformation, customer experience, adaptive business operations
     Red Hat
By: Skillsoft     Published Date: Mar 03, 2015
This study looks at how organizations connect learning to business priorities, create development programs that impact every stage of the employee lifecycle, and utilize technology to support learning initiatives. It also examines the business impact of building learning capability and running effective learning programs.
Tags : business strategies, development programs, employee lifecycle, technology integration, performance management, employee performance, leadership bench strength
     Skillsoft
By: G/O Digital     Published Date: Nov 13, 2014
Every year, consumers flock to malls, department stores and retailers - big and small - to score huge savings and deals on holiday gifts. All the while, these shoppers are chained at the hip to their smartphones and tablets to stay connected to what's happening in real time. Download this research report for a snapshot of how local search and mobile marketing streamline the path to in-store sales for small businesses.
Tags : digital marketing, online marketing, internet marketing, search marketing, seo, ppc, search engine optimization, social media, email marketing, web development, web design, enterprise applications
     G/O Digital
By: Sitecore     Published Date: Jul 23, 2015
Rapid technology disruptions, high customer demands, and gaps in staff skills to address both, are some of the crucial challenges most digital marketers face today.
Tags : marketing maturity, uponor, sitecore, crm, customer experience, digital presence, sitecore
     Sitecore
By: IBM     Published Date: Sep 30, 2013
The insights provided by more than 700 Chief Human Resource Officers around the world show how workforce investment is shifting. Companies are beginning to focus more on growth, expanding into new markets and offering new products and services. But to make the most of potential growth opportunities in today’s dynamic global marketplace, organizations need to find ways to address the “borders” that are currently impeding their workforces. Based on the key capability gaps revealed in this study, we believe organizations should focus on three critical workforce imperatives: cultivating creative leaders, mobilizing for speed and flexibility and capitalizing on collective intelligence.
Tags : ibm, ibm global business services, chros, chief human resource officer study, global hr leaders, creativity, flexibility, business intelligence, knowledge management, human resource technology, business technology
     IBM
By: IBM     Published Date: Sep 30, 2013
The Smarter Workforce Accelerator uses a structured model that helps you understand your current capabilities and those that you need to develop to achieve your Smarter Workforce objectives. The assessment focuses on your current environment and capabilities such as scouting talent, recruiting talent, leadership development, and your work culture and methods. Each capability is assessed using an objective framework that defines the characteristics of an organization at each level. This approach helps you understand: • Your current and desired capability levels • Your organization’s relative maturity compared with the competition and leading practice • Business opportunities and priorities resulting from the capability gaps
Tags : ibm, ibm smarter workforce accelerator, workforce management, social business, technology, smarter workforce, recruiting, staffing, training, development, knowledge management, business technology
     IBM
By: Qualys     Published Date: Sep 29, 2016
With SAQ, an organization can quickly and precisely identify security and compliance gaps among third parties, as well as internally among its employees.
Tags : security, cloud-based, data, audit
     Qualys
By: VeriSign Authentication Services, now a part of Symantec Corp.     Published Date: Oct 13, 2011
Gaining the trust of online customers is vital for the success of any company that transfers sensitive data over the Web. When shopping online, consumers are concerned about identity theft and are therefore wary of providing untrusted sources with their personal information, especially their credit card details. Other types of online businesses require different but equally sensitive information. People are reluctant to provide their national insurance numbers, passwords, or other confidential personal information, or sometimes even just name, address, and phone number. Perhaps the information will be intercepted in transit, they fear, or perhaps the destination itself is manned by imposters with ill intent.  The result is an abandoned transaction.
Tags : security, ssl, trust, authentication, online security, online business, ssl certificates, ssl certificate, certificate authority, code signing, 128-bit, 256-bit, 128-bit encryption, 256-bit encryption, secured seal, extended validation, extended validation ssl, extended validation ssl certificates, extended validation ssl certificate, extended validation certificate
     VeriSign Authentication Services, now a part of Symantec Corp.
By: Cornerstone OnDemand     Published Date: Feb 24, 2011
Now more than ever, organizations must integrate talent issues into the strategic business planning process. With a clear understanding of the needs of the company, business leaders can use the principles of talent management to address capability gaps as part of their overall management processes. This new focus on "The Business of Talent."
Tags : cornerstone, talent management, business continuity, business performance, globalization, recession, planning, economic, staffing
     Cornerstone OnDemand
By: GoToMeeting     Published Date: Jun 09, 2010
This new Forrester white paper provides a snapshot of a typical day in the life of a U.S. information worker. It reveals how workers are employing new technologies and applications, interacting with their teams and engaging in mobile activities.
Tags : citrix gotomeeting, information worker, knowledge management, desktop computers, remote access employee
     GoToMeeting
By: SAS     Published Date: Apr 25, 2017
When was the last time you had an outstanding customer experience? Perhaps you hesitated before answering. Now, think for a minute about your customers – would they hesitate before answering the same question about your business? If you think the answer might be yes, it’s time to consider the customer journey.
Tags : 
     SAS
By: Lumension     Published Date: Jun 03, 2015
Microsoft's System Center Configuration Manager doesn't handle every aspect of Linux/UNIX and third-party application security. Here's how to augment and leverage SCCM to close the gaps.
Tags : it security, data center, patch, software, application
     Lumension
By: Adobe     Published Date: Apr 13, 2015
This Gigaom Research report aims to help technology decision-makers better understand: - What the modern workforce thinks it needs to succeed in this rapidly changing world of mobile-first communications and new work-collaboration technologies - How IT is supporting those needs and overall corporate objectives - If there are gaps between worker expectations and IT requirements, and how technology buyers can address them Download this Gigaom Research white paper to learn more.
Tags : adobe, modern workforce, platform support, platform productivity, it support, work-collaboration technologies
     Adobe
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search White Papers      

Add White Papers

Get your white papers featured in the Energy Efficiency Markets White Paper Library contact: Kevin@EnergyEfficiencyMarkets.com