ngo

Results 226 - 250 of 342Sort Results By: Published Date | Title | Company Name
Published By: IBM     Published Date: Feb 18, 2009
This white paper explains how the seven basic principles for managing enterprise application data can help your organization: Establish effective policies for full-lifecycle enterprise data management to control data growth and lower storage costs; Meet service level goals to achieve the timely completion of key business processes for mission-critical applications; Support data retention compliance initiatives and mitigate risk for audits and e-discovery requests; Implement scalable archiving strategies that easily adapt to your ongoing business requirements.
Tags : 
ibm integrated data management, jd edwards, business-critical erp applications, archiving project, service level goals, data retention compliance, archiving strategies, ibm optim data growth solution, rapid data growth, data classification
    
IBM
Published By: Skillsoft     Published Date: Oct 13, 2011
Christiana Care saw the need to provide consistent and ongoing leadership skills education to all of its managers. Existing leadership programs focused on newly hired or newly promoted managers, and consisted entirely of classroom training.
Tags : 
skillsoft, christiana care, health system, health care, leadership excellence, leadership programs, human resources
    
Skillsoft
Published By: Concentric     Published Date: Mar 27, 2009
Email, calendaring, collaboration, and mobility solutions are moving from corporate data centers to service provider networks. Service providers can realize far greater economies of scale than most businesses and deliver higher levels of service to more users at a lower cost; in fact, the fewer the users, the higher cost for each. Concentric Hosted Exchange is a fast, reliable and affordable solution for email, calendaring, collaboration, and mobility based on Microsoft® Exchange Server 2007 Service Pack 1 (SP1) and Microsoft Outlook® 2007. Concentric Hosted Exchange provides all of the benefits of Microsoft Exchange and Outlook 2007 without the up-front infrastructure costs or ongoing overhead.
Tags : 
concentric, hosted exchanged, email, calendaring, collaboration, mobility, corporate data centers, service provider networks, service providers, microsoft® exchange server 2007, sp1, microsoft outlook® 2007, total cost of ownership, tco, concentric hosted exchange, cli, command line interface, lower bandwidth cost, hmc, global address list
    
Concentric
Published By: MoreVisibility     Published Date: Dec 19, 2017
The Internet has vastly changed the B2B sales process. Whereas potential buyers used to reach out to businesses early on in the process, many now come to a buying decision on their own – aided by the plethora of free content available online. Businesses that succeed in this new world will have a hand in creating the content that helps buyers make decisions. This requires strategy, resources and an ongoing commitment toward creating the content that anticipates and answers your buyers’ questions. Do that, and you have a greater chance of influencing their decisions, and inspiring their loyalty. In this report, we outline the steps for creating a holistic B2B web content strategy, from performing research to creating content that drives traffic and cultivates leads.
Tags : 
    
MoreVisibility
Published By: Silver-Peak     Published Date: Mar 21, 2012
This whitepaper shows how you can finally meet your recovery objectives, provide seamless failover between multiple sites, improve remote application performance, and lower your ongoing bandwidth costs.
Tags : 
wan, optimization, technology, network management, bandwith
    
Silver-Peak
Published By: CSB by Cornerstone on Demand     Published Date: Jun 26, 2013
Need to fix your company's performance management? Want to make woeful performance reviews a thing of the past? Collect actually useful data and actually use it? Build a robust people strategy? Ensure your company's ongoing success? Take over the world (of successful performance management)? Download this paper to learn more.
Tags : 
performance management, human resources
    
CSB by Cornerstone on Demand
Published By: Silver Peak     Published Date: Dec 31, 9999
Offsite data replication is key to ensuring ongoing business operations, but it can be complex and costly, especially when performed over long distances. Join this discussion to discover how you can apply fast, cost effective and reliable remote replication that can: • Meet Recovery Point Objectives (RPO) by reducing remote replication times by up to 20X • Reduce bandwidth costs and extend replication distances • Lower storage costs while increasing storage flexibility • Leverage emerging cloud and virtualization technologies for better offsite disaster recovery Hear from the experts and users at Dell Compellent, Silver Peak and AlaskaUSA discuss essential data replication strategies and technologies.
Tags : 
offsite data, remote replication, reliable, storage flexibility, cloud, virtualization, technology, offsite disaster recovery
    
Silver Peak
Published By: Silver Peak     Published Date: Oct 28, 2013
Offsite data replication is key to ensuring ongoing business operations, but it can be complex and costly, especially when performed over long distances. Join this discussion to discover how you can apply fast, cost effective and reliable remote replication that can: • Meet Recovery Point Objectives (RPO) by reducing remote replication times by up to 20X • Reduce bandwidth costs and extend replication distances • Lower storage costs while increasing storage flexibility • Leverage emerging cloud and virtualization technologies for better offsite disaster recovery Hear from the experts and users at Dell Compellent, Silver Peak and AlaskaUSA discuss essential data replication strategies and technologies.
Tags : 
silver peak, data, data replication, remote, optimize, rpo, business operations
    
Silver Peak
Published By: IBM     Published Date: Jun 17, 2014
Uncertain times and a volatile economic climate have contributed to an expanding focus on corporate governance, risk, and compliance (GRC) across all industries. As global mandates and compliance directives continue to snowball, organizations are faced with an imminent need to adopt a programmatic approach and tightly integrate risk management initiatives with ongoing business processes. Business intelligence and reporting also provide a powerful mechanism for gaining a deep understanding of key factors that impact corporate performance.
Tags : 
ibm, corporate governance, risk, compliance, grc, erm, risk management, business analytics, business intelligence
    
IBM
Published By: Adobe     Published Date: Mar 16, 2016
Competition is the number one pressure faced by today’s HCM teams – by a 69% margin! Of all the pressures that contemporary HR teams face, finding and keeping quality talent ranks above everything else. As a part of that, Best-in-Class organizations need to focus on optimizing the employment experience, from hiring and onboarding, to ongoing management and transition. This report from Aberdeen explores how electronic signature solutions, as well as other digital HR technologies, can improve the employment experience throughout the journey. Read this report to learn: • Why Best-in-Class HR departments are investing in employee-friendly technologies • How digital solutions can impact employee experience, and why that matters for HR • How electronic signatures complement HRIS applications and streamline many HR processes
Tags : 
hr organizations, hris, esignature, customer management, sales effectiveness, human capital management
    
Adobe
Published By: Aerohive Networks     Published Date: May 27, 2014
Learn how a controller-less wireless architecture will provide significant benefits over the traditional-controller-based model in terms of deployment simplicity, ongoing management, and cost..
Tags : 
aerohive, wi-fi, wlan, wireless lan, 802.11ac, gigabit speed wi-fi, cloud, byod, mobile device management, mdm, mobility, access point, aps, controllers, wireless, pos, cloud managed, guest access
    
Aerohive Networks
Published By: Alert Logic     Published Date: Jun 12, 2014
New security threats are emerging all the time, from new forms of malware and web application exploits that target code vulnerabilities to attacks that rely on social engineering. Defending against these risks is an ongoing battle. Download to learn more!
Tags : 
cloud security, vulnerability management, vulnerabilities, patching, patch management
    
Alert Logic
Published By: Alert Logic     Published Date: Jun 12, 2014
While e-commerce remains a relatively small percentage of overall retail spending (rates vary by country, but are generally in the 5–10% range), it continues to grow. The ongoing growth of e-commerce suggests that one of the initial objections to online shopping—concerns about whether consumer personal information would be secure—has been largely overcome. Standards like PCI, and payment services like PayPal, along with a general increase in security awareness, have gone a long way to change the perception of online shopping. Learn more about Information Security in the E-commerce Sector.
Tags : 
cloud security, cloud e-commerce, cloud pci, e-commerce security, compliance
    
Alert Logic
Published By: Alert Logic and Rackspace     Published Date: Jun 20, 2014
Defending against application security threats is an ongoing battle. With new threats emerging every day, this whitepaper provides insight into how to leverage threat and log management technologies to protect your IT assets throughout their vulnerability life cycle.
Tags : 
alert logic, rackspace, pci, pci dss, payment security, compliance, vulnerability life cycle
    
Alert Logic and Rackspace
Published By: Alert Logic and Sungard Availability Services     Published Date: Jun 20, 2014
Defending against application security threats is an ongoing battle. With new threats emerging every day, this whitepaper provides insight into how to leverage threat and log management technologies to protect your IT assets throughout their vulnerability life cycle.
Tags : 
alert logic, sungard, pci, pci dss, payment security, compliance, vulnerability life cycle
    
Alert Logic and Sungard Availability Services
Published By: IBM     Published Date: Mar 28, 2016
The rise of social media, coupled with the desire to build more engaged and productive workforces, has brought “active employee listening” to the forefront of management attention. No longer is it enough to encourage employees to speak up about topics that matter to them. Organizations today need to more actively solicit, analyze and engage in ongoing conversations with past, present and even future employees. Having access to the collective “employee voice” can help leaders achieve diverse goals, including identifying innovations, preventing discord and improving productivity, as well as building a better connection to the organization and its mission. So, how can organizations establish and manage mutually beneficial listening programs? To better understand what companies are doing in the area of employee listening and the extent to which employees are willing to participate, we analyzed data from the 2015 IBM Smarter Workforce Institute WorkTrends Survey – a broad-based survey of ov
Tags : 
ibm, ibm smarter workforce, work trends, employee engagement
    
IBM
Published By: IBM     Published Date: Jul 20, 2016
The rise of social media, coupled with the desire to build more engaged and productive workforces, has brought “active employee listening” to the forefront of management attention. No longer is it enough to encourage employees to speak up about topics that matter to them. Organizations today need to more actively solicit, analyze and engage in ongoing conversations with past, present and even future employees. Having access to the collective “employee voice” can help leaders achieve diverse goals, including identifying innovations, preventing discord and improving productivity, as well as building a better connection to the organization and its mission. So, how can organizations establish and manage mutually beneficial listening programs?
Tags : 
ibm, ibm smarter workforce, work trends, employee engagement
    
IBM
Published By: IBM     Published Date: Aug 22, 2014
The ongoing processes of managing collateral, loan covenants and monitoring borrowers' financial condition are key to ensuring that banks are in the best position to minimize loss.
Tags : 
credit risk management, managing collateral, financial monitoring, risk analytics
    
IBM
Published By: IBM MaaS360     Published Date: Feb 05, 2015
Produced in conjunction with Integrated Solutions for Retailers, this National Retail Foundation (NRF) 2014 guide explores why mobile device, app and content management are critical components of success for large scale mobile deployment and ongoing security management.
Tags : 
mobile solutions, roi, mobile deployment, mobile security management, mobile hardware
    
IBM MaaS360
Published By: BlackBerry Cylance     Published Date: Jul 02, 2018
Matthew Coy, Safelite’s Vice President of Information Technology, is responsible for overseeing all aspects of the company’s IT infrastructure, including selecting, administering, and supporting technology products. The company handles personally identifiable information, including credit card information and insurance data collected from several sources, and must comply with insurance industry regulations and the Payment Card Industry Data Security Standard. Safelite is the target of constant external attacks. The organization experienced ongoing security issues stemming from infected software, drivebys and other malicious downloads. According to Matthew, “A lot of malware and email viruses were making it through the environment, all bypassing our email security and AV.” Not only were the security controls ineffective, the previous AV platform required nearly 150 hours per week to manage. Matthew knew Safelite needed to make a change, and fast. Having worked with Cylance® at two previous companies, he was confident CylancePROTECT® could significantly improve Safelite’s endpoint security. Read the full case study to learn about the results Cylance was able to deliver.
Tags : 
safe, lite, cybersecurity, data
    
BlackBerry Cylance
Published By: SAS     Published Date: Mar 06, 2018
Despite heavy, long-term investments in data management, data problems at many organizations continue to grow. One reason is that data has traditionally been perceived as just one aspect of a technology project; it has not been treated as a corporate asset. Consequently, the belief was that traditional application and database planning efforts were sufficient to address ongoing data issues.
Tags : 
    
SAS
Published By: IBM     Published Date: Mar 04, 2014
The age of the customer. Possibly no term better illustrates the current era of business. Customers expect their experience to be flawless at every touchpoint, and with competitors only a click (or tap) away, company leaders have a strong incentive to deliver. Online retailers have set a high standard in the way that they engage customers on an ongoing basis—not just during the commercial transaction, but before, during and after each interaction with the customer. Can service providers in industries such as banking, insurance, healthcare and government meet the challenge?
Tags : 
business operations, business process management, bpm, process automation, smarter process, age of customer
    
IBM
Published By: Qualys     Published Date: Jan 08, 2015
Drivers for cloud solutions include the need to innovate, simplify and cut costs. Users say a key benefit cloud-based security is no need to deploy equipment or software. The cloud provider furnishes and hosts everything in secure data centers. This arrangement lets your business avoid capital expenses and to control ongoing costs. This paper describes how your small or medium-sized company can manage IT risks and maintain regulatory compliance with minimal staff and budget.
Tags : 
cloud solutions, security, secure data centers, it risks, compliance
    
Qualys
Published By: Information Shield     Published Date: Jan 13, 2009
Information security policy development should not be a one-time event. In order to effectively reduce risk and maintain a proper governance structure, organizations must periodically update written security policies as part of an ongoing management process.
Tags : 
information shield, legal exposure, iso/iec, security policies, security framework, hipaa, sarbanes-oxley act, iso 17799, iso 27002, security policy, sample security policy, policies and procedures, pci-dss, regulatory compliance
    
Information Shield
Published By: Iovation     Published Date: Sep 25, 2009
One of the leading and fastest growing suppliers of systems for online betting, casino, poker and bingo uses iovation to combat online fraud and abuse.
Tags : 
online betting, casino, poker and bingo, combat online fraud and abuse, fraud solution, false positives, iovation reputationmanager, device reputation, tool evaluation, integration testing, integration testing, bonus fraud, risk assessment
    
Iovation
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.