Cookie policy: This site uses cookies (small files stored on your computer) to simplify and improve your experience of this website. Cookies are small text files stored on the device you are using to access this website. For more information on how we use and manage cookies please take a look at our privacy and cookie policies. Some parts of the site may not work properly if you choose not to accept cookies.

sections
 

critical

Results 451 - 475 of 2642Sort Results By: Published Date | Title | Company Name
Published By: Taleo     Published Date: Jan 25, 2012
This paper outlines a 12 step methodology for building critical talent pipelines and provides insights into strategy and initiatives. It also describes the process and technology support that delivers Talent Intelligence information from defining roles to refining execution.
Tags : 
taleo, human resources, talent, employee, talent management, hr management
    
Taleo
Published By: Taleo     Published Date: Feb 01, 2012
This paper outlines a 12 step methodology for building critical talent pipelines and provides insights into strategy and initiatives.
Tags : 
recruitment, recruitment software, talent management, talent management software, taleo
    
Taleo
Published By: Oracle     Published Date: Sep 24, 2012
Organizations need to define, attract, and develop the right mix of critical talent to support and grow their businesses. To ensure a flow of the right talent for these roles over time, a general best practice is to build critical-talent pipelines.
Tags : 
hiring, onboarding, recruiting, human resources, critical-talent pipelines, talent inventory, retaining talent, human resource technology
    
Oracle
Published By: Oracle     Published Date: Jan 28, 2013
This whitepaper provides solutions to the challenges companies have in all industries: jobs that must be performed—and performed well—for the companies to succeed.
Tags : 
hiring, onboarding, recruiting, human resources, critical-talent pipelines, talent inventory, retaining talent
    
Oracle
Published By: HP     Published Date: Sep 01, 2011
Read this whitepaper to learn how your organization can overcome the challenges associated with legacy networks to the mission-critical data center.
Tags : 
data center, converged infrastructure, business continuity, flexfabric, energy efficiency, infrastructure, power and cooling, data center design and management
    
HP
Published By: Intel Security     Published Date: Apr 06, 2016
This solution brief outlines how security operations must evolve to a continuous operation focused on assessing readiness, acquiring and integrating threat intelligence, and increasing the speed of threat response capability
Tags : 
advanced malware, targeted malware, layered malware defense, targeted attacks, critical infrastructure threats, forensic analysis, static detection, dynamic detection
    
Intel Security
Published By: Workday     Published Date: Aug 18, 2015
Building the argument for an HR technology shift to the cloud.To meet today's new business challenges, you need to move HR to the cloud. But first, you have to convince the key stakeholders that shifting to the cloud is critical to the future of your organisation.
Tags : 
hr technology, human resources, cloud, cloud for hr, cloud computing
    
Workday
Published By: HP     Published Date: Oct 09, 2008
In an effort to stay ahead of the competition, companies have poured capital resources into information technology. In many cases, this has been done on a group-by-group basis, with each line of business creating its own infrastructure silo. Each silo had its own systems, servers, storage, licenses, and support teams—and each shouldered the total cost of owning and operating a standalone infrastructure.Learn more by downloading this paper.
Tags : 
mission critical, it virtualization
    
HP
Published By: Emarsys     Published Date: Feb 14, 2018
Expectations for dramatically improved customer experiences (CX) are driving retail investments in omnichannel technologies that provide competitive differentiation beyond core products and services. As retailers pursue more advanced capabilities, artificial intelligence (AI) technologies provide innovative opportunities for retail marketers. It is, therefore, mission-critical for retail decision-makers to understand how ready their organizations are to embrace AI technologies with the potential to propel them forward as industry leaders.
Tags : 
marketing, retail, ecommerce, customer experiences
    
Emarsys
Published By: McAfee     Published Date: Mar 31, 2017
As the cloud continues to be adopted for a wide range of applications and data, it is critical to mitigate risks, increase visibility and implement control over all cloud offerings through an integrated security solution. To learn more, download this infographic.
Tags : 
cloud report, cloud research, cloud usage, public cloud, cloud adoption, hybrid cloud, private cloud, cloud security
    
McAfee
Published By: XOsoft     Published Date: Aug 21, 2009
The primary IT concern today is to ensure that the applications and information that drive critical business processes are available when they are needed, whenever they are needed. We present a description of the required architecture and operation for an automatic failover solution, demonstrating how a solution should be carefully engineered for ease of operation and management.
Tags : 
high availability, business process management, network architecture, failover, redundant, infrastructure, xosoft
    
XOsoft
Published By: SAP     Published Date: Mar 24, 2011
This Aberdeen Research brief hones in on the critical time element of a Best-in-Class BI strategy. The research shows that these top performers are leveraging real-time or near real-time analytics in order to proactively manage their business and drive substantial performance improvements.
Tags : 
bi strategy, real-time analytics, performance boost, business insight
    
SAP
Published By: VMware     Published Date: Feb 26, 2009
In this brief, you'll learn how CA Recovery Management Products, like CA ARCserve Backup and CA XOsoft solutions, can be applied with VMware Infrastructure to help you effectively respond to the challenges and opportunities of business-critical computing.
Tags : 
vmware, business continuity, ca recovery management, ca arcserve, ca xosoft solutions, vmware infrastructure, business-critical computing, virtualization
    
VMware
Published By: Coyote Point Systems     Published Date: Sep 07, 2010
If your organization's servers run applications that are critical to your business, chances are that you'd benefit from an application delivery solution. Today's Web applications can be delivered to users anywhere in the world and the devices used to access Web applications have become quite diverse.
Tags : 
coyote point, adc, buyer's guide, web applications, server load, server hardware, networking, load balancing
    
Coyote Point Systems
Published By: Dell     Published Date: Feb 02, 2018
VxRail appliances, now leveraging industry leading Dell PowerEdge servers, support business critical applications and workloads in many configurations providing required reliability, availability, flexibility and performance. Every organization has its own set of business critical applications. For instance: - Database applications such as Microsoft SQL server and Oracle - Customer Relationship Management (CRM) applications such as SAP - E-mail applications such as Microsoft Exchange -Collaboration applications, such as Microsoft SharePoint Intel Inside®. Powerful Productivity Outside. Intel logo are trademarks of Intel Corporation or its subsidiaries in the U.S. and/or other countries.
Tags : 
    
Dell
Published By: Dell EMC     Published Date: Feb 07, 2018
VxRail appliances, now leveraging industry leading Dell PowerEdge servers, support business critical applications and workloads in many configurations providing required reliability, availability, flexibility and performance. Every organization has its own set of business critical applications. For instance: - Database applications such as Microsoft SQL server and Oracle - Customer Relationship Management (CRM) applications such as SAP - E-mail applications such as Microsoft Exchange -Collaboration applications, such as Microsoft SharePoint Intel Inside®. Powerful Productivity Outside. Intel logo are trademarks of Intel Corporation or its subsidiaries in the U.S. and/or other countries.
Tags : 
    
Dell EMC
Published By: Dell EMC     Published Date: May 16, 2018
IT organizations are increasingly turning toward hyper-converged infrastructure (HCI) solutions to simplify and speed up infrastructure deployments, ease day-to-day operational management, reduce costs, and increase IT speed and agility. Many use cases such as VDI, Test/Dev, IT Operations, Disaster Recovery, ROBO, Private Cloud etc…are already running on VxRail appliances and business critical applications are no exception. VxRail, powered by VMware vSAN, provides the high availability, resiliency, predictable performance, and enterprise ready storage data services that business critical applications require. Intel Inside®. Powerful Productivity Outside. Intel® Xeon® processor Intel, the Intel logo, Xeon and Xeon Inside are the trademarks of Intel Corporation or its subsidiaries in the U.S. and/or other countries.
Tags : 
    
Dell EMC
Published By: Red Hat     Published Date: Jan 01, 2013
Linux has already established a solid position in the industry and can be expected to expand its footprint within all workload types, according to IDC. Furthermore, the analyst firm says customers that are using Linux today should be looking at the potential for new deployment scenarios.
Tags : 
linux, enterprise, deployment, red hat, business
    
Red Hat
Published By: Veeam '18     Published Date: May 01, 2019
This 5-minute, easy-to-read document explains why organizations need to protect Office 365 data. This report will teach you: • The big misunderstanding between Microsoft's responsibility and the IT organizations • 6 reasons why backing up Office 365 is critical • Who is in control of Office 365 data
Tags : 
    
Veeam '18
Published By: Xactis     Published Date: Feb 02, 2007
Learn the 'bottom-up' approach to start Business Rules Extracting, Migrating and Auto Re-architecting your current mission-critical legacy system and their data, into an SOA.  This is a "how-to" presentation addressing how to get started and eventually establish an internal L2S Center of Excellence.
Tags : 
soa, service oriented architecture, service-oriented architecture, business rules extracting, legacy system, erp, enterprise resource planning, mainframe
    
Xactis
Published By: IBM     Published Date: Oct 10, 2013
As the primary focus of IT moves from increasing IT productivity through virtualization and cloud computing to enhancing business productivity, the biggest challenge that businesses face in executing corporate strategy is focusing the right people and resources on strategic initiatives. A key element in enhancing business productivity is driving down costs, which can help free up the funds needed to make strategic investments. Businesses also need a means to more effectively orchestrate how IT interacts with business processes and critical application environments. The solution lies in using managed services. Read here to find out more on how companies gained significant and quantifiable benefits from using managed services.
Tags : 
business value, it productivity, virtualization, cloud computing, enhancing productivity, business productivity, executing corporate strategy, strategic initiatives
    
IBM
Published By: ASG Software Solutions     Published Date: Nov 05, 2009
Effective workload automation that provides complete management level visibility into real-time events impacting the delivery of IT services is needed by the data center more than ever before. The traditional job scheduling approach, with an uncoordinated set of tools that often requires reactive manual intervention to minimize service disruptions, is failing more than ever due to todays complex world of IT with its multiple platforms, applications and virtualized resources.
Tags : 
asg, cmdb, bsm, itil, bsm, metacmdb, workload automation, wla
    
ASG Software Solutions
Published By: Intel Security     Published Date: Oct 20, 2015
Explore and Understand the Seven Common Misconceptions Regarding Advanced Malware
Tags : 
advanced malware, targeted malware, layered malware defense, targeted attacks, critical infrastructure threats, forensic analysis, static detection, dynamic detection
    
Intel Security
Published By: Intel Security     Published Date: Apr 06, 2016
This guide examines seven common advanced malware misconceptions and distinguishes between myth and reality.
Tags : 
advanced malware, targeted malware, layered malware defense, targeted attacks, critical infrastructure threats, forensic analysis, static detection, dynamic detection
    
Intel Security
Published By: HPE Intel     Published Date: Jan 11, 2016
A famous architect once said that the origin of architecture was defined by the first time “two bricks were put together well.” And the more bricks you have, the more important putting them together well becomes. The same holds true in our data centers. The architecture of our compute, storage and network devices has always been important, but as the demands on our IT infrastructures grow, and we add more “bricks,” the architecture becomes more critical.
Tags : 
    
HPE Intel
Start   Previous    12 13 14 15 16 17 18 19 20 21 22 23 24 25 26    Next    End
Search      

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.