dynamic it

Results 376 - 400 of 448Sort Results By: Published Date | Title | Company Name
Published By: Cornerstone OnDemand     Published Date: Jan 31, 2018
Employees at all levels expect dynamic, self-directed, continuous learning opportunities from their employers. So how can L&D experts make the shift from training an employee on job-based skills to holistically developing that employee into a productive, agile, committed worker? By evolving from managing learning to curating a continuous learning experience.
Tags : 
    
Cornerstone OnDemand
Published By: Cornerstone OnDemand     Published Date: Feb 05, 2018
58% of executives believe their current performance management approach neither drives engagement nor leads to high performance. It’s high time to make some changes and adapt performance management strategies to better reflect the changing dynamics of the modern workforce and ensure employees reach their potential. Check out “10 Counterproductive Performance Management Assumptions You're Still Making” and see how you can improve your talent development initiatives to increase the productivity and impact of your employees. In this ebook, we'll touch on: • how goals are set and achieved • flaws and biases in manager's assessments • what truly motivates employees • and more Download your copy and get started!
Tags : 
performance management, performance, performance appraisal, employee engagement, goals, reviews, learning management system, performance management software, 360 degree feedback, workforce development, talent management, performance management software
    
Cornerstone OnDemand
Published By: Cornerstone OnDemand     Published Date: Oct 02, 2018
"Today’s workforce has become more dynamic than ever. Is your performance management strategy caught up to the times? Traditional performance management strategies often alienate employees, inhibit growth, occur too infrequently, and produce a nightmare of paperwork. Check out these five simple talent management trends that can help you streamline your performance initiatives: • Reduce or eliminate documentation • Focus more on coaching and development • Move toward guidance vs. guidelines Download 5 Easily Adoptable Trends in Performance Management and learn how to enable managers to create an honest, open, and free-flowing approach to performance management. Get higher engagement and greater productivity from your employees by following these trends. "
Tags : 
    
Cornerstone OnDemand
Published By: Juniper Networks     Published Date: Feb 18, 2015
Discover how a dynamic, intelligent firewall can improve your security. This Webinar talks about the dynamic, intelligent protection and active defense and management of resources you can get from a Next-Generation Firewall solutions.
Tags : 
firewall, network, business assets, security, management
    
Juniper Networks
Published By: Juniper Networks     Published Date: Feb 18, 2015
Learn all about the new dynamically intelligent solutions that are taking security to the next level in this expert Webinar.
Tags : 
cloud, cybercrime, security intelligence, security, security tool, data center
    
Juniper Networks
Published By: Cornerstone OnDemand     Published Date: Jun 29, 2018
Employees at all levels expect dynamic, self-directed, continuous learning opportunities from their employers. So how can L&D experts make the shift from training an employee on job-based skills to holistically developing that employee into a productive, agile, committed worker? By evolving from managing learning to curating a continuous learning experience. Of course this is easier said than done. L&D experts face significant challenges in transitioning from the owners of learning to the more powerful and strategic curators of learning.
Tags : 
holistic, employee, job, experience, strategic
    
Cornerstone OnDemand
Published By: SAS     Published Date: Sep 30, 2014
How The University of Texas System is increasing transparency to the public with dynamic data visualizations.
Tags : 
sas, dynamic data visualizations, the university of texas system
    
SAS
Published By: Symantec     Published Date: Aug 09, 2013
Get an overview and analysis of the year in global threat activity with the Symantec 2013 Internet Security Threat Report. This report provides commentary on emerging trends in the dynamic threat landscape, covers the key findings and provides best practice guidelines. Learn about strategies to combat security risks that threaten your organization. Read the report now.
Tags : 
symantec, security, threat, report, key findings, best practice, strategy, technology
    
Symantec
Published By: Symantec     Published Date: Oct 07, 2014
The Internet Security Threat Report provides an overview and analysis of the year’s global internet threat activity. The report is based on data from the Symantec™ Global Intelligence Network, which Symantec’s analysts use to identify, analyze, and provide commentary on emerging trends in the dynamic threat landscape. Highlights from the 2014 Internet Security Threat Report Key Findings • 91% increase in targeted attacks campaigns in 2013 • 62% increase in the number of breaches in 2013
Tags : 
internet security, target attacks, breaches, threat activity, emerging trends, cybercrime
    
Symantec
Published By: Cisco     Published Date: Jan 05, 2015
Enterprises are rapidly adopting cloud computing solutions in order to meet dynamically changing business requirements. These solutions are typically comprised of both private and public cloud deployments, resulting in the creation of hybrid clouds that are designed to rapidly scale up and down in response to user demands, and they provide the advantages of elastic computing economics. In order to benefit from this environment, businesses need to connect with these hybrid clouds more easily from their heterogeneous bases, and balance the need for compliance and control against the need to rapidly innovate and the ability to scale as required. This presents a complex integration challenge for IT organizations. As a result, they increasingly find themselves brokering cloud services as opposed to creating an all-private cloud environment.
Tags : 
the cloud, cloud computing, transitioning
    
Cisco
Published By: Cisco     Published Date: Jan 15, 2015
In today’s dynamic network environment, point-in-time solutions lack the visibility and control you need to implement an effective security policy that will accelerate threat detection and response. And disparate solutions only add to capital and operating costs and administrative complexity.
Tags : 
operating costs, capital, threat detection, visibility, networks, computing, cloud, innovation, enterprise, datacenter, social, analytics
    
Cisco
Published By: Riverbed     Published Date: Jul 15, 2014
Application environments and the underlying IT infrastructure that supports them are becoming much more dynamic and complicated. New architectures are being deployed to help accelerate time to market, applications are distributed and modular, leveraging web-based or Service Oriented Architectures (SOA). Read this to learn the latest trends.
Tags : 
big data, integrated, end-user, experience, it infrastructure
    
Riverbed
Published By: Riverbed     Published Date: Sep 05, 2014
As enterprises have embraced IT trends like cloud computing and virtualization, their operational needs have evolved to make application performance more important than ever before. But operating applications at peak performance is challenging in the cloud. That's why many enterprise IT departments now have Applications Operations groups tasked with ensuring that applications run efficiently across these complex IT stacks. But, most tools designed to address these application performance management (APM) issues were never designed for this dynamic environment. To achieve smooth delivery of applications at all times, Applications Operations groups need APM solutions that can give them insight and analytics to manage their apps. This SlashGuide gives IT managers a scorecard to identify APM solutions that will deliver more efficient application performance.
Tags : 
apm, applications, operations, enterprise, stacks, dynamic
    
Riverbed
Published By: Viavi Solutions     Published Date: Jan 04, 2017
Growing in number and becoming increasingly more malicious, security threats and attacks pose a severe threat to the survival of a business. Security operations teams need to leverage every available tool to respond more quickly and effectively to these incidents. While network packet capture and forensic analysis has traditionally been used by network operations, such a tool can also help security teams augment existing defenses and get on top of these threats. Given the hostile IT security environment, close collaboration between these groups is crucial to overall IT organizational success. This white paper explains the importance of packet capture and forensic analysis to security operations, examines the dynamics of this growing collaboration between security and network teams, and explores a leading platform in this market from Viavi Solutions.
Tags : 
    
Viavi Solutions
Published By: Crownpeak     Published Date: Mar 05, 2015
The cloud market is moving forward as reflected in both the evolving perspectives voiced by IT decision-makers and by the business success of cloud service providers. On perspectives, Stratecast’s recurring annual surveys reveal that public cloud adoption has now reached a much-awaited tipping point with a percentage of the 2014 survey respondents stating that they currently use public cloud Infrastructure as a Service (IaaS), and another percentage stating they will too within the next months. On cloud service providers, the business results of Amazon Web Services (AWS), now in its eighth year and still rapidly growing, make a similar statement. This report describes how AWS is breaking the “cloud not secure enough” adoption barrier and, in the process, injecting innovation into the competitive dynamics of the security market.
Tags : 
cloud security, crownpeak, security market, competitive dynamics
    
Crownpeak
Published By: Hewlett Packard Enterprise     Published Date: Mar 29, 2017
Join this dynamic LinkedIn group to be part of the cyber-security education conversation to gain an understanding for the best practices to improve security. Learn why HP says 64% of IT managers believe their printers are infected with malware, but only 45% of those IT professionals consider printers to be a medium or high risk vulnerability. The first responsibility of IT professionals is to make sure their company’s information is secure and today any device can become an access point threat. Printers and MFPs can be the Achilles’ Heel of any cyber-security plan and are a goldmine for hackers looking to steal pertinent information. Join the conversation and learn what’s necessary to protect your company.
Tags : 
hewlett packard, printer security, information technology
    
Hewlett Packard Enterprise
Published By: HP     Published Date: Jul 08, 2009
Data is the backbone of every organization. No matter the business, industry, or size, reliable data access is essential to operations. Should a "worst-case scenario" occur, being prepared with an appropriate disaster recovery strategy is essential. Given the potential high cost associated with data loss, reliable data protection is no longer an option; rather, it is an obligation. This white paper discusses a data protection strategy that takes into consideration the business environment, offering sophisticated features while maintaining simplicity, affordability, and reliability.
Tags : 
storage, data protection, reliability, reliable, disaster recovery, business protection, business continuity, storageworks, rto, rpo, recovery time objective, recovery point objective, tape, lan, san, das, direct attached storage, rdx, d2d, disk to disk
    
HP
Published By: IBM     Published Date: Apr 23, 2008
This white paper explains the why's and how's of data center transformation. It reveals the breakthrough IBM approach that supports dynamic, service oriented applications and consolidates systems, servers and networks for decreased operational costs on all fronts—freeing up funds for business innovation. Download white paper on new data center.
Tags : 
it management, service management, datacenter, data center, network, networking, network management, ibm, opt it, ibm opt it
    
IBM
Published By: IBM     Published Date: Sep 18, 2008
When bound to regulation and compliance, process manufacturers find opportunities to grow through enterprise resource planning (ERP). However, 50% of process manufacturers execute non-integrated ERP strategies. This Aberdeen Group research study reveals best practices to help you adapt or select an ERP vendor that improves your business performance.
Tags : 
erp, enterprise resource planning, cindy jutras, process, process industry, chemical, food and beverage, food, beverage, pharmaceutical, pharma, best-in-class, material requirements planning, mrp, global competition, manufacturing process, microsoft dynamics, acsis, fullscope, traceability
    
IBM
Published By: ITI     Published Date: Aug 21, 2009
The dynamic interaction between these parts is simulated using ABAQUS/Explicit. With the model, it is possible to predict the kinematics of the impact mechanism, including torque spike characteristics and driving speed. Key characteristics of the model have been validated by tests.
Tags : 
abaqus, explicit, impact driver, product development, product testing, cad, computer aided design, cad, computer-aided design, cae, computer aided engineering, computer-aided engineering, product development lifecycle, iti
    
ITI
Published By: Quocirca     Published Date: Feb 23, 2009
Network Centric Operations (NCO) recognises the demand for pervasive decision-making in the modern battlespace. NCO provides the ability to leverage information networks to generate a more dynamic and agile decision-making space. An important dimension of this approach is the technological flexibility to quickly move the decision-making authority hierarchically or geographically as the situation demands. A fundamental enabler to this approach is the concept of a services orientated architecture (SOA). The use of industry-standard IT architectures provides the means of ensuring that systems can be provisioned rapidly, can be shared as appropriate, and can give the flexibility and response times required within such challenging environments.
Tags : 
quocirca, network centric operations, agile decision-making, services orientated architecture, soa, enterprise service bus, esb, non-governmental organizations, ngos, network centric warfare, ncw, standardized battlespace, common operating picture, cop, access points, networking
    
Quocirca
Published By: Blue Lane     Published Date: Nov 15, 2007
Virtualization has become all the rage for companies interested in optimizing their servers and storage systems. This shift in data center architecture allows IT organizations to reduce operational costs and increase flexibility and responsiveness to changing business demands.
Tags : 
data center security, datacenter security, data centre, network security, virtual server, virtual data center, server virtualization, blue lane
    
Blue Lane
Published By: Microsoft Dynamics     Published Date: Nov 06, 2008
Microsoft® recently researched the experience of nearly 200 companies with more than 250 PCs that have deployed one or more of the applications in the Microsoft Dynamics line of business management solutions. Among these companies, whose attitudes to technology tended to be more forward looking than usual, a common issue was rapid growth. The pain points most often cited were manual processes that cause mistakes and inefficiencies, the need for more functionality, an inability to scale to support growth, integration problems, especially with the growing number of customer and partner systems, and a lack of operational insight. This white paper explores the experience of these companies in more detail to help you understand how you can use Microsoft Dynamics to support rapid growth and drive business success.
Tags : 
microsoft dynamics, crm, compliance
    
Microsoft Dynamics
Published By: Microsoft Dynamics     Published Date: Nov 06, 2008
Microsoft® recently researched the experience of nearly 200 companies with more than 250 PCs that have deployed one or more of the applications in the Microsoft Dynamics line of business management solutions. Among these companies, whose attitudes to technology tended to be more forward looking than usual, the most common issue was the need for modern systems. The pain points most often cited were manual processes that cause mistakes and inefficiencies, integration problems with other systems (both internal and external), lack of operational insight, and legacy software support and customization issues. This white paper explores the experience of these companies in more detail to help you understand how you can use Microsoft Dynamics to modernize your business processes and drive business success.
Tags : 
microsoft dynamics, crm, compliance
    
Microsoft Dynamics
Published By: Microsoft Dynamics     Published Date: Nov 06, 2008
Microsoft® recently researched the experience of nearly 200 companies with more than 250 PCs that have deployed one or more of the applications in the Microsoft Dynamics line of business management solutions. Among these companies, whose attitudes to technology tended to be more forward looking than usual, a common issue was growth via mergers and acquisitions (M&A). The pain points most often cited were non-integrated, overlapping systems, an inability to scale to support growth, the need for more functionality, and a lack of operational insight. This white paper explores the experience of these companies in more detail to help you understand how you can use Microsoft Dynamics to support your company’s growth via M&A and drive business success.
Tags : 
microsoft dynamics, crm, compliance, global functionality
    
Microsoft Dynamics
Start   Previous    4 5 6 7 8 9 10 11 12 13 14 15 16 17 18    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.