Cookie policy: This site uses cookies (small files stored on your computer) to simplify and improve your experience of this website. Cookies are small text files stored on the device you are using to access this website. For more information on how we use and manage cookies please take a look at our privacy and cookie policies. Some parts of the site may not work properly if you choose not to accept cookies.

sections
 

hr systems

Results 51 - 75 of 336Sort Results By: Published Date | Title | Company Name
Published By: Oracle     Published Date: Nov 27, 2017
The need for closer collaboration between finance and HR has never been more important. Finance has become the co-pilot to the business, providing the forward-looking guidance management needs to capitalize on the next market opportunity. HR plays an essential role in ensuring that the business has the talent it needs to execute on digital strategies, and create a change-ready culture. Oracle commissioned new research by MIT Technology Review Custom, called Finance and HR: the Cloud’s New Power Partnership, to understand how closer collaboration between Finance and HR could support digital transformation and unlock new benefits.
Tags : 
it cooperation, cloud, provider, finance, partnership, collaboration, internal team, integration specialist, digital, communication, systems
    
Oracle
Published By: Oracle     Published Date: Aug 08, 2013
As social media use has grown, an urgent need has emerged to correlate the information generated through social data with existing consumer information, and integrate it with sophisticated data management systems. This white paper describes how organizations can blend social insights with more-traditional data in an integrated customer data hub to optimize social strategies and create outreach efforts, new products, and campaigns grounded in real-time, repeatable, automated, and scalable analysis.
Tags : 
social media, business intelligence, customer hub, crm, oracle
    
Oracle
Published By: Oracle     Published Date: Aug 09, 2013
Talent management has moved to the top of the CEO’s agenda. In a 2012 global survey of CEOs and CFOs by the Economist Intelligence Unit, 53 percent of these leaders said that insufficient talent within their organization could harm them financially over the next 12 months. The number expressing financial concerns rose to 67 percent at organizations with more than 1,500 employees. Moreover, a full 83 percent of HR and business executives believe that talent programs need to be improved, according to Deloitte’s 2012 report Talent Edge 2020. With statistics like these, it’s no wonder there’s more pressure than ever on HR leaders to make the right talent decisions for their organizations and to source the right talent management systems to maximize the value of their workforce.
Tags : 
oracle, talent cloud, cloud, talent management
    
Oracle
Published By: Oracle     Published Date: Aug 15, 2013
Talent management has moved to the top of the CEO’s agenda. In a 2012 global survey of CEOs and CFOs by the Economist Intelligence Unit, 53 percent of these leaders said that insufficient talent within their organization could harm them financially over the next 12 months. The number expressing financial concerns rose to 67 percent at organizations with more than 1,500 employees. Moreover, a full 83 percent of HR and business executives believe that talent programs need to be improved, according to Deloitte’s 2012 report Talent Edge 2020. With statistics like these, it’s no wonder there’s more pressure than ever on HR leaders to make the right talent decisions for their organizations and to source the right talent management systems to maximize the value of their workforce.
Tags : 
oracle, talent cloud, cloud, talent management, enterprise applications, human resource technology
    
Oracle
Published By: Venafi     Published Date: Mar 26, 2015
Advanced Persistent Threat (APT) operators have proven they can breach enterprises like yours by undermining your critical security controls when you fail to protect digital certificates and cryptographic keys. Not securing all of your keys and certificates enables cybercriminals to bypass controls like threat detection, data protection, firewalls, VPNs, DLP, privileged access, and authentication systems that you expect will mitigate threats.
Tags : 
keys, certificates, security controls, apt, advances persistent threat, cryptographic keys, cybercriminals, cyber attacks, cyber defense, vpn, dlp, privileged access, authentication systems
    
Venafi
Published By: Panasonic Business Mobility Solutions     Published Date: Nov 15, 2016
As the food industry races to comply with the FDA Food Safety Modernization Act (FSMA), manufacturers are working to adopt more robust track and trace processes. A critical component to achieving compliance is the integration of automated data capture solutions throughout all stages of food production—from farm to table. This whitepaper examines technology considerations food manufacturers should weigh when implementing these systems, along with how to tackle the subsequent challenges that are sure to arise. Once the U.S. food industry understands how mobile solutions can enable track & traceability, manufacturers will be equipped with an efficient solution that not only helps to achieve regulatory compliance, but also improves overall business efficiencies.
Tags : 
    
Panasonic Business Mobility Solutions
Published By: Rohde & Schwarz Cybersecurity     Published Date: Nov 28, 2017
DPI software is made to inspect packets at high wire speeds and a critical factor is the throughput and resources required. Keeping the amount of resources that integrated DPI and application classification technology requires low is critical. The fewer cores (on a multi-core processor) and the less on-board memory an engine needs, the better. Multi-threading provides almost linear scalability on multi-core systems. In addition, highly-optimized flow tracking is required for handling millions of concurrent subscribers.
Tags : 
detection, rate, performance, efficiency, accuracy, encrypted apps, integration, metadata, updates
    
Rohde & Schwarz Cybersecurity
Published By: MalwareBytes EMEA     Published Date: May 10, 2019
INDUSTRY Education BUSINESS CHALLENGE Protect student data from threats posed by malware on teachers’ MacBook laptops IT ENVIRONMENT Avast antivirus, enterprise network security layers SOLUTION Malwarebytes Incident Response RESULTS Removed PUPs and malware from hundreds of Mac systems in just minutes Delivered instant visibility into connected systems and quarantined malware Reduced risk with ability to proactively detect and remediate threats
Tags : 
    
MalwareBytes EMEA
Published By: Entrust Datacard     Published Date: Jul 23, 2019
In years past, device functionality was enough to sell most embedded products without much concern for cybersecurity. Of course there were exceptions, such as in critical infrastructure, aviation, and military, for which security was always of importance. But today’s environment has evolved on several fronts. First, organizations across nearly all markets are demanding Internet connectivity to monitor and control devices as well as to aggregate and analyze data. Second, the magnitude of security threats has exploded, driven by highly sophisticated hackers including organized criminal gangs seeking financial returns, creating a constantly evolving threat landscape. Third, the increasingly complex nature of connected systems makes them ever more challenging to protect. The more complex a system, the more potential vulnerabilities it may contain. And fourth, the data generated by connected devices represent an asset that is becoming increasingly valuable for organizations to derive insigh
Tags : 
    
Entrust Datacard
Published By: CA Technologies     Published Date: Sep 25, 2017
Reports of cyberattacks now dominate the headlines. And while most high-profile attacks—including the major breaches at JP Morgan, Anthem and Slack—originated outside of the victimized organizations, theft and misuse of data by privileged users is on the rise. In fact, 69% of enterprise security professionals said they have experienced the theft or corruption of company information at the hands of trusted insiders. There are also cases where a company’s third-party contractors, vendors or partners have been responsible for network breaches, either through malicious or inadvertent behavior.
Tags : 
threat analytic systems, siems, firewalls, entity optimization, fraud prevention, ca technologies
    
CA Technologies
Published By: CA Technologies     Published Date: Sep 25, 2017
Protecting privileged access and preventing breaches remains an urgent concern for companies of all sizes. Attackers are using a wider range of more sophisticated methods to infiltrate vulnerable systems. And although news of external breaches often dominates headlines, organizations must also be able to defend against insider threats.
Tags : 
threat analytic systems, siems, firewalls, entity optimization, fraud prevention, ca technologies
    
CA Technologies
Published By: Quantum Corporation     Published Date: Aug 28, 2018
Die einzigartigen mehrstufigen Speicherlösungen von Quantum gewährleisten maximale Verfügbarkeit und Performance Ihres Produktionssystems und tragen gleichzeitig zum Abbau von Speicherkosten bei. Das Kernstück unserer Lösung bildet die DXi-Deduplizierungs-Appliance. Die DXi ist als physische oder virtuelle Appliance erhältlich und sorgt dank patentierter Deduplizierungstechnologie mit Datenblöcken variabler Länge für höchste Datenreduktion und Einsparungen der Netzwerkbandbreite ohne Leistungseinbußen bei Backups und Restores.
Tags : 
    
Quantum Corporation
Published By: Workday Nordics     Published Date: Feb 01, 2019
"Read the whitepaper from Human Resource Executive® to learn how data-driven technology can help you: ? Save time by cutting down on paper-pushing tasks ? Renew focus on important HR strategies ? Use the same HR systems as Fortune 500 companies without breaking the bank"
Tags : 
workday, workforce technology, digital strategy
    
Workday Nordics
Published By: NetApp     Published Date: Jun 03, 2016
Enterprise applications are the lifeblood of IT. We rely on them for everything from optimizing manufacturing to tracking customer satisfaction. This paper examines the criteria for selecting flash storage in support of enterprise applications and makes recommendations based on the strengths of each flash system. Explore how to align enterprise application performance, management, and growth with business priorities through the use of connected flash storage systems.
Tags : 
    
NetApp
Published By: MobileIron     Published Date: Feb 05, 2016
Mobile platforms have leapfrogged PC security for years, but as mobile device adoption explodes worldwide, these platforms face more security threats than ever before. While mobile devices are still safer than PCs, hackers are relentlessly searching for new ways to exploit these operating systems and gain access to their valuable data. Four major threats are currently targeting iOS and Android devices using very clever tactics. In fact, users may not know their devices have been compromised until after their data has been hacked.
Tags : 
mobile malware, activesync, mobile platforms, hackers, data threat, android, ios
    
MobileIron
Published By: MobileIron     Published Date: Apr 28, 2016
Die Freigabe von Windows 10 bietet mehr als nur neue Unternehmensfunktionen – es ist eine umfangreiche Überarbeitung des Betriebssystems, die die Verwandlung von Windows von einer PC-zentrierten zu einer modernen Unternehmensarchitektur beschleunigt. Mit Windows 10 kann die Unternehmens-IT sich von einer sicherheitsorientierten, eigenständigen Infrastruktur zugunsten einer modernen Unternehmensarchitektur mit hoher Produktivität, Sicherheit und einheitlicher Benutzererfahrung auf mehreren Geräten verabschieden.
Tags : 
mobile apps, best practices, mobileiron, phones
    
MobileIron
Published By: MobileIron     Published Date: Aug 04, 2016
Mobile platforms have leapfrogged PC security for years, but as mobile device adoption explodes worldwide, these platforms face more security threats than ever before. While mobile devices are still safer than PCs, hackers are relentlessly searching for new ways to exploit these operating systems and gain access to their valuable data. Four major threats are currently targeting iOS and Android devices using very clever tactics. In fact, users may not know their devices have been compromised until after their data has been hacked.
Tags : 
mobile malware, activesync, mobile platforms, hackers, data threat, android, ios
    
MobileIron
Published By: Makino     Published Date: Jun 23, 2017
With rising demands for shorter lead-times, faster throughput, improved quality and lower costs, automated manufacturing systems have become essential to the success of U.S. manufacturing. Their benefits stretch across numerous industries and production methods; however, their complexity can oftentimes be intimidating to first-time investors. Within this white paper, manufacturers can uncover the information necessary to properly plan and specify the integration of a new automated manufacturing system.
Tags : 
automation, automated manufacturing, automated machining, automation systems, flexible manufacturing systems, machine tool automation
    
Makino
Published By: Google     Published Date: Apr 26, 2018
No one in today’s highly connected world is exempt from security threats like phishing, ransomware, or denial-of-service (DoS) attacks. Certainly not Google. Google operates seven services with more than one billion active users each (including Google Search, YouTube, Maps, and Gmail). We see every type of attack, bad software, and bad actors—multiple times a day—and we’re proud of what our people, processes, and technology do to stop them. Google has published more than 160 academic research papers on computer security, privacy, and abuse prevention and has privately warned other software companies of weaknesses discovered in their systems. Within Google, we enforce a zero-trust security model, which monitors every device on the internal network.
Tags : 
    
Google
Published By: VMware     Published Date: Dec 10, 2018
Healthcare IT is in the midst of a revolution. Far from its leaky-ceiling basement beginnings, healthcare information technology (HIT) is now a strategic business differentiator with a key to the executive washroom. Challenged to innovate new patient and provider application services while maintaining traditional client-server applications, HIT teams are seeking ways to ensure investments in the management and maintenance of traditional systems don’t prevent the delivery of new digital experiences now and into the future. To find out more download this eBook today.
Tags : 
    
VMware
Published By: Sage Software (APAC)     Published Date: May 02, 2018
Baiada, an Australia company which provides premium quality poultry products throughout the country, deploys Sage Business Cloud Enterprise Management to help its business streamline three business software systems into one, delivering improved flexibility and functionality, and enabling Baiada to provide a better overall product in the marketplace.
Tags : 
    
Sage Software (APAC)
Published By: CA Technologies     Published Date: Jun 09, 2015
In today’s application economy, everyone is in the software business. Auto makers are putting Wi-Fi hotspots in their cars. Watches are trading gears for motherboards. Even soda fountains have evolved from dumb machines into instrumented devices with touch-screen user interfaces. This digital transformation is changing the way applications are developed, tested, moved through environments and released into production—and it’s putting new demands on IT teams with which they’re struggling to keep up. At a high level, this is because the application delivery systems and processes at many enterprises were put in place when IT only had to push out an annual or semi-annual release. But as market pressures and executive mandates have forced teams to deliver innovations faster and more frequently, a new set of development, testing, automation and customer challenges have appeared—acting as obstacles that stand between you and your digital transformation goals.
Tags : 
    
CA Technologies
Published By: Workday UK     Published Date: Jan 31, 2019
"Read the whitepaper from Human Resource Executive® to learn how data-driven technology can help you: ? Save time by cutting down on paper-pushing tasks ? Renew focus on important HR strategies ? Use the same HR systems as Fortune 500 companies without breaking the bank"
Tags : 
workday, workforce technology, digital strategy
    
Workday UK
Published By: IBM     Published Date: Jul 26, 2017
Every day, torrents of data inundate IT organizations and overwhelm the business managers who must sift through it all to glean insights that help them grow revenues and optimize profits. Yet, after investing hundreds of millions of dollars into new enterprise resource planning (ERP), customer relationship management (CRM), master data management systems (MDM), business intelligence (BI) data warehousing systems or big data environments, many companies are still plagued with disconnected, “dysfunctional” data—a massive, expensive sprawl of disparate silos and unconnected, redundant systems that fail to deliver the desired single view of the business. To meet the business imperative for enterprise integration and stay competitive, companies must manage the increasing variety, volume and velocity of new data pouring into their systems from an ever-expanding number of sources. They need to bring all their corporate data together, deliver it to end users as quickly as possible to maximize
Tags : 
scalability, data warehousing, resource planning
    
IBM
Published By: ipoque     Published Date: Feb 14, 2019
Virtualized Evolved Packet Core (vEPC) is a major breakthrough in network function virtualization (NFV). When asked where they have deployed NFV in production networks, communication service providers (CSPs) consistently name vEPC as one of the top answers. Why is that? In order to maximize their processing capacity, CSPs virtualize a subset of their network applications, including mobile edge computing (MEC), base stations (small/macro cells) and the mobile core, because these systems use a large bandwidth. The mobile packet core builds the foundation of the core network on which mobile CSPs offer IP-based services to their customers. Implementing vEPC solutions can help CSPs obtain the scale necessary to accommodate growing numbers of subscribers and large amounts of traffic or connections while controlling costs and improving on quality of experience (QoE). In the past, evolved packet core (EPC) solutions were deployed on purpose-built hardware. NFV enables operators to deploy EPC c
Tags : 
dpi, deep packet inspection, vepc, sdn, nfv, network analytics, virtual network
    
ipoque
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14    Next    End
Search      

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.