Cookie policy: This site uses cookies (small files stored on your computer) to simplify and improve your experience of this website. Cookies are small text files stored on the device you are using to access this website. For more information on how we use and manage cookies please take a look at our privacy and cookie policies. Some parts of the site may not work properly if you choose not to accept cookies.

sections
 

system

Results 5976 - 6000 of 6059Sort Results By: Published Date | Title | Company Name
Published By: HotSchedules     Published Date: Feb 06, 2018
What could you be saving by implementing a learning management system? This guide will show you the provable return on investment in an eLearning strategy; how an LMS can help your business lower print costs, reduce employee turnover, positively impact sales, and much more. Whether you’re exploring the marketplace or building out your business case for online learning, this guide has the information you want. As you prepare to move to a new LMS consider Clarifi Talent Development, the learning and performance management system designed for today’s workforce. It is the choice for leading brands like Brinker, Newk’s and Subway. Unfortunately, many business owners either fail to see the value in ongoing training or don’t have the budget for it. Competition is fierce, margins are tight and learning programs can fall by the wayside. Sometimes the tried and true methods still get the job done. But all too often, on-the-job training is unengaging, expensive and inefficient.
Tags : 
market, training, onboarding, restaurants, employee
    
HotSchedules
Published By: HotSchedules     Published Date: Feb 06, 2018
Moving from doing all your training on paper and in person to an online learning management system can be a daunting task. And switching from one LMS to another is a great time to reevaluate your program. But where to start? This ebook breaks it down in to six steps you can take internally to help you prepare to make the jump and launch a successful elearning program. As you prepare to move to a new LMS consider Clarifi Talent Development, the learning and performance management system designed for today’s workforce. It is the choice for leading brands like Brinker, Newk’s and Subway.
Tags : 
online, training, onboarding, employee, management, lms
    
HotSchedules
Published By: Sitecore     Published Date: Jun 14, 2017
The Gartner Magic Quadrant for WCM assesses leading solutions and delivers valuable insights for those looking to optimize digital marketing platforms for a better customer experience. The 2015 report evaluates 19 vendors for their Ability to Execute as well as their Completeness of Vision. This year, Sitecore® leapt vertically to the top position for its Ability to Execute among the vendors evaluated and has been in the Leaders quadrant for six consecutive years. Learn more by downloading your copy of the 2015 Gartner Magic Quadrant for WCM now.
Tags : 
profiling, flexible deployment, marketing systems, commerce, email marketing, testing, analytics, omnichannel experience marketing, personalization, cms, wcm
    
Sitecore
Published By: McAfee     Published Date: Mar 31, 2017
Behind the vast majority of legitimate alerts sent to the IT security team is an attacker who exploits multiple attack techniques to infiltrate your infrastructure and compromise your critical data and systems. Targeted multi-phased attacks include a series of cyber attack chain steps: recognition, vulnerability analysis, operation and, finally, exfiltration of critical business data.
Tags : 
cyber threats, threat intelligence, cyber attack, cyber attack prevention
    
McAfee
Published By: McAfee     Published Date: Mar 31, 2017
The Adwind Remote Administration Tool is a backdoor Trojan written in Java language that targets various platforms that support Java files. Adwind does not exploit any vulnerabilities. In most cases, for an infection to succeed, the user must run the malware by double-clicking the .jar file that is usually distributed as an attachment, or opening an infected Microsoft Word document. The infection spreads if the Java Runtime Environment is installed on the user's computer. After the malicious .jar file is executed on the target system, the malware installs silently and connects to a remote server via a preconfigured port to receive commands from a remote attacker and perform other illegal operations.
Tags : 
backdoor trojans, trojan protection, malware, malware protection
    
McAfee
Published By: McAfee     Published Date: Mar 31, 2017
The Adwind Remote Administration Tool is a backdoor Trojan written in Java language that targets various platforms that support Java files. Adwind does not exploit any vulnerabilities. In most cases, for an infection to succeed, the user must run the malware by double-clicking the .jar file that is usually distributed as an attachment, or opening an infected Microsoft Word document. The infection spreads if the Java Runtime Environment is installed on the user's computer. After the malicious .jar file is executed on the target system, the malware installs silently and connects to a remote server via a preconfigured port to receive commands from a remote attacker and perform other illegal operations.
Tags : 
backdoor trojans, trojan protection, malware, malware protection
    
McAfee
Published By: OnBase by Hyland     Published Date: May 16, 2017
The role of enterprise content management (ECM) as a centralized document repository is well established. However, the value of ECM increases exponentially when it is leveraged as an information hub between line-of-business (LOB) systems to facilitate key processes, keep data in sync and maximize investments in existing applications.
Tags : 
hyland, ecm, document repository, enterprise information hub, automated business processes
    
OnBase by Hyland
Published By: OnBase by Hyland     Published Date: Jun 26, 2017
An integral part of your information management technology strategy is how you actually get the needed information into your business systems. Do you have staff devoting time to manually entering data in those systems? Data capture solutions automatically extract data from incoming documents and make data validation simple. Download this AIIM article to explore the history of data capture, its evolution into truly intelligent solutions and how you can benefit from these capabilities today.
Tags : 
information, management, technology, intelligent, data, capture, strategy, capabilities, solution, content, systems, onbase, hyland, validation
    
OnBase by Hyland
Published By: RedHat     Published Date: May 10, 2017
Part 1 of the core system administration tasks needed for Red Hat Enterprise Linux
Tags : 
red hat, linux, enterprise linux, survival skills, admin, administration
    
RedHat
Published By: Amazon Web Services     Published Date: Jul 25, 2018
Organisationen müssen heute mit immer größeren Datenmengen zurechtkommen, die aus mehr Datenquellen stammen und mehr Datentypen enthalten als jemals zuvor. Angesichts massiver, heterogener Datenmengen stellen viele Organisationen fest, dass sie eine Datenspeicher- und Analyselösung benötigen, die höhere Geschwindigkeit und mehr Flexibilität als ältere Systeme bietet, um rechtzeitig geschäftliche Erkenntnisse liefern zu können. Ein Data Lake ist eine neue und zunehmend populäre Möglichkeit zur Speicherung und Analyse von Daten, die viele dieser Herausforderungen meistert, indem sie es einer Organisation ermöglicht, alle Daten in einem zentralen Repository zu speichern. Da Daten in ihrem ursprünglichen Format gespeichert werden können, besteht kein Bedarf, sie vor der Übernahme in ein vordefiniertes Schema zu konvertieren, wodurch Sie die Möglichkeit erhalten, all Ihre Daten, sowohl strukturiert als auch unstrukturiert, mit minimaler Vorlaufzeit zu speichern.
Tags : 
    
Amazon Web Services
Published By: Host Analytics     Published Date: Aug 01, 2017
The Nucleus 2017 CPM Value Matrix analyzed the market for CPM products, evaluated companies and ranked vendors based on what they believe are the most important attributes in allowing customers to gain maximum value from the solution: usability and functionality, Usability because Business users in the finance department need minimal involvement from IT, and are reticent to learn a drastically new system. Download the 2017 Nucleus Research to learn more.
Tags : 
    
Host Analytics
Published By: Host Analytics     Published Date: Aug 02, 2017
"The Nucleus 2017 CPM Value Matrix analyzed the market for CPM products, evaluated companies and ranked vendors based on what they believe are the most important attributes in allowing customers to gain maximum value from the solution: usability and functionality, Usability because Business users in the finance department need minimal involvement from IT, and are reticent to learn a drastically new system. Download the 2017 Nucleus Research to learn more. "
Tags : 
    
Host Analytics
Published By: Juniper Networks     Published Date: Jun 22, 2017
In today’s technology-driven world, a financial services organization’s ability to evolve the business quickly depends on the network. MetaFabric architecture, which is the foundation of Juniper’s unique end-to-end data center networking solution, helps financial services firms respond confidently to whatever happens in the market. With an open, simple, and smart network in place, organizations can adapt quickly and seamlessly to changing requirements while eliminating the disruptions of forced upgrades and unnecessary purchases that come with vendor lock-in. Most importantly, the MetaFabric architecture helps companies stay at the forefront of innovation, keeping them one step ahead of the competition.
Tags : 
data management, data system, business development, software integration, resource planning, enterprise management, data collection
    
Juniper Networks
Published By: Juniper Networks     Published Date: Jun 22, 2017
The digital financial services world has created an amplified set of challenges for the data center and network. Its role in enabling the success of the wider institution has become even more critical, but to deliver this it needs to provide a higher level of performance with increased agility, while maintaining high levels of efficiency and security. This is forcing institutions to transform their underlying IT capabilities, with the need to simplify the network, obtain more flexible connectivity, automate IT operations, and enable centralized control and administration being core strategies in this respect. As shown in Figure 8, this is driving a number of requirements for the future network. Key considerations for financial institutions in architecture design and vendor selection should be around moving toward a software-defined, intelligent, cloud-ready, and open network that enables the institution to meet its ICT imperatives and achieve these key ICT strategies.
Tags : 
account security, data management, network protection, secure systems, application security, network performance, network diagnostics
    
Juniper Networks
Published By: Juniper Networks     Published Date: Jun 22, 2017
Businesses increasingly recognize that their customers and workers are engaging in ways that were inconceivable when their essential applications were first architected, according to Chris Rechtsteiner, vice president of marketing for ServerCentral. “A group in one country has to have the exact same service levels as a location in another country, and half the people are internal end users, while the other half are external customers,” he says. As their businesses have globalized, their most strategic applications have struggled to keep pace. “Companies are coming to us, asking ‘How do we do this? How do we solve this problem?’ That’s really what it comes down to.”
Tags : 
data management, data system, business development, software integration, resource planning, enterprise management, data collection
    
Juniper Networks
Published By: Juniper Networks     Published Date: Jun 22, 2017
This document is targeted at networking and virtualization architects interested in deploying VMware NSX network virtualization in a multi-hypervisor environment based on the integrated solution from VMware and Juniper. VMware’s Software Defined Data Center (SDDC) vision leverages core data center virtualization technologies to transform data center economics and business agility through automation and non disruptive deployment that embraces and extends existing compute, network and storage infrastructure investments. NSX is the component providing the networking virtualization pillar of this vision. As a platform, NSX provides partners the capability of integrating their solution and build on the top of the existing functionalities. NSX enables an agile overlay infrastructure for public and private cloud environments leveraging Juniper’s robust and resilient underlay infrastructure that also helps bridge the physical and virtual worlds using the L2 gateway functionality.
Tags : 
network security, account security, data management, network security, secure systems, application security, network performance, network diagnostics
    
Juniper Networks
Published By: Juniper Networks     Published Date: Aug 10, 2017
Facing the future requires enterprises to embark on a digital transformation, employing new technologies such as AI, big data, IoT, and the cloud. Enterprises need a long-term, trusted partner who will support them on their journey and understand their vision. Switch to Juniper Networks and align your enterprise with an innovation leader that places scalable solutions, high availability, productivity, security, and R&D at the forefront, all while keeping simplicity and savings in mind.
Tags : 
security, switching, routing, operating system, secure network, sdsn, solutions
    
Juniper Networks
Published By: Juniper Networks     Published Date: Aug 10, 2017
As networks scale, they become difficult to manage. A different command line interface (CLI) or operating system (OS) is required for every device type in your network, such as routers, switches, and firewalls. Learning a new OS for every device is a complex task for your operations team and can slow them down—not a very efficient way to run a network.
Tags : 
r&d, drive innovation, automation delivery, critical networks, solutions, lifetime warranty, juniper networks
    
Juniper Networks
Published By: HP Inc.     Published Date: Aug 30, 2018
At HP, we know that in retail and hospitality environments, customers expect a fast and simple way to find information or to complete a transaction. The physical point-of-sale experience must rise to meet the demands of retailers through high aesthetic value and peak performance. From an elegant hotel to a small boutique, a quick-service restaurant to an outdoor garden center—all of these locations require a point-of-sale device that meets specific needs while appealing to any user. My team at HP sought to elevate this experience by redefining the customer experience through a versatile, reliable, and beautiful point-of-sale system. For the new HP ElitePOS, we gained insights from everywhere—designers, technologists, retailers, and consumers—to create a product that is beautifully simple. It started as a sketch on a napkin, and is now part of an iconic portfolio that dissolves barriers during point-of-sale customer interactions.
Tags : 
    
HP Inc.
Published By: Dassault Systèmes     Published Date: Jun 19, 2018
Dassault Systèmes' has been named by Gartner, Inc. as a “Leader” in its 2017 Magic Quadrant for Manufacturing Execution Systems. 2017 is the first year for the Gartner Magic Quadrant for MES, which specifically covered the MES market, including MOM applications. Because of our position as a Leader in the Gartner Magic Quadrant we believe it confirms the positive response we are receiving on our vision and ability to execute the transformation of manufacturing. We also believe we are being recognized for our unique and holistic approach to MOM / MES and the greater transformative value that digital continuity with DELMIA has across manufacturing engineering, manufacturing operations and the supply chain. DELMIA® Manufacturing Operations Management solutions transform global production operations to achieve and sustain operational excellence. This is accomplished through digital continuity, a shared digital landscape connecting all stakeholders to improve visibility into, control over a
Tags : 
    
Dassault Systèmes
Published By: Pure Storage     Published Date: Apr 18, 2018
Massive amounts of data are being created driven by billions of sensors all around us such as cameras, smart phones, cars as well as the large amounts of data across enterprises, education systems and organizations. In the age of big data, artificial intelligence (AI), machine learning and deep learning deliver unprecedented insights in the massive amounts of data. Amazon CEO Jeff Bezos spoke about the potential of artificial intelligence and machine learning at the 2017 Internet Association‘s annual gala in Washington, D.C., “It is a renaissance, it is a golden age,” Bezos said. “We are solving problems with machine learning and artificial intelligence that were in the realm of science fiction for the last several decades. Natural language understanding, machine vision problems, it really is an amazing renaissance.” Machine learning and AI is a horizontal enabling layer. It will empower and improve every business, every government organization, every philanthropy
Tags : 
    
Pure Storage
Published By: Skytap     Published Date: Aug 23, 2017
Cloud migration has exploded in popularity since General Electric’s (GE’s) flashy keynote at Amazon Web Service’s (AWS’s) re:Invent in September 2015. GE claims to be migrating all workloads not containing secret information. Enterprises are revisiting public cloud and exploring whether existing or systems-of-record applications have a place in that world. Infrastructure and operations (I&O) professionals on this path should avoid a one-size-fits-all approach to outsourcing and migration plans, opting instead for an app-by-app assessment.
Tags : 
    
Skytap
Published By: Cylance     Published Date: Jul 02, 2018
SE Labs tested CylancePROTECT® in an offline environment against major threats that subsequently appeared in the wild. The test explores the product’s ability to prevent new threats from attacking endpoint systems successfully. CylancePROTECT contains technology designed to identify and block malware using what it claims to be an “artificial intelligence” (AI) model. This model can be updated over time. However, in this test we used the model created in May 2015 and did not permit further updates so that the software was unable to receive new models or edit the existing one. The test exposed systems protected by this older version of CylancePROTECT to very impactful threats discovered and reported widely after May 2015. In this way, the test shows to what extent the product was able to predict how future threats would appear. This “Predictive Advantage” (PA), the advantage that users of the product have against future adversaries, is presented in this report.
Tags : 
malware, predictive, test, response
    
Cylance
Published By: Fiserv     Published Date: Jul 09, 2018
Even with the rise of digital payments, cash is still a popular form of payment. According to the Federal Reserve, consumers use cash to pay for nearly one-third of all retail transactions. For many retailers, a completely "cashless society" is nowhere in sight. Cash management remains one of the most important aspects of managing a retail operation, particularly at quick service restaurants (QSRs) and convenience stores, where transactions are smaller and cash is a preferred method of payment. This white paper, Boost Profitability by Automating Cash, sponsored by Fiserv and Fast Casual, details the steps to manage cash properly and boost profit for your business. Uncover the top reasons and flexible options to automate your cash management. • Time savings • Theft deterrence • Higher accuracy • Better customer service • Real-time data
Tags : 
cash automation, smart safe, cash loss, cash handling, automated cash handling, cash management, cash reconciliation, manual cash reconciliation, automated cash reconciliation, automated vault, cash counting, cash automation system, cash deposits, cash recycler, cash dispensers, cash drawer, point of sale
    
Fiserv
Published By: IBM Watson Health     Published Date: Jul 06, 2018
The need Carson Tahoe Health needed insights to convince its board that an outpatient palliative care program could help address its higher-thanaverage mortality rates and help decrease the risk of future financial impact from those rates The solution The healthcare system used IBM® CareDiscovery to track and analyze end-stage patient mortality and related length of stay, readmissions, utilization and costs in key disease groups—by comparing those who participated in trial inpatient palliative care and those who did not The benefit The analysis was used to demonstrate to the system’s board that an outpatient palliative care service line was viable in terms of both cost savings and quality-of-care improvement
Tags : 
    
IBM Watson Health
Start   Previous    229 230 231 232 233 234 235 236 237 238 239 240 241 242 243    Next    End
Search      

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.