Skip to main content
 

hr software

Results 201 - 225 of 333Sort Results By: Published Date | Title | Company Name
Published By: EMC Corporation     Published Date: Dec 01, 2014
The Solution Guide provides an introduction to data protection through continuous availability. The guide enables you to begin the planning and design of continuous availability for a Federation Software-Defined Center solution.
Tags : 
software-defined data center, data protection, planning and design, continuous availability
    
EMC Corporation
Published By: Secunia     Published Date: Oct 12, 2011
This report investigates year-to-year trends since June 2011, including the evolving threat of software portfolios and global vulnerability data.
Tags : 
    
Secunia
Published By: Symplfiied     Published Date: Nov 07, 2011
Symplified's innovative On Demand Identity leverages the software-as-a-service subscription business model to deliver breakthrough identity services with disruptive pricing. This White Paper explains how identity services eliminates all capital outlays for hardware, software and infrastructure, expenses for support and staffing. You also can reduce the costs of training and integration to reduce identity lifecycle costs by more than 80% from enterprise identity software.
Tags : 
symplified, technology, security, identity management, white paper, cloud computing
    
Symplfiied
Published By: Skillsoft     Published Date: Oct 20, 2015
Before you buy HR software, you should understand that your organization isn’t like everyone else’s. It’s doubtful that a general one-size-fits-all solution or what you might see in a brief demo will actually fit your needs. Besides, how can you develop a competitive advantage if you’re using the software the same way as everyone else?
Tags : 
skillsoft, hr software, tech buyers, software hr solutions
    
Skillsoft
Published By: Jive Software     Published Date: Feb 24, 2014
How can human resources partner with IT to drive communication and knowledge-sharing while supporting business objectives? In today’s distributed workforce HR can embrace social business, taking the lead in defining new HR practices to support the changing workplace landscape and foster innovation and integrated employee networks.
Tags : 
jive, gigaom research, human resources, human resource technology, distributed workforce, social business, workforce management, workplace management
    
Jive Software
Published By: SumTotal, a Skillsoft Company     Published Date: Aug 24, 2015
Read this report to know the questions to ask to avoid being duped by pretty demos of software with no substance and find a partner that can meet the hidden complexities that exist in your unique processes.
Tags : 
hr technology, software demos, efficiency, learning software, benefits, hr solutions
    
SumTotal, a Skillsoft Company
Published By: Oracle Service Cloud     Published Date: Mar 24, 2016
Despite the array of new technologies enabling customer contact across web and mobile channels, most serious interactions still have to pass through an agent in order to be resolved. Enterprises can push customers toward self-service, but in the end, people often still need to talk to other people. This means that, even in the best of circumstances, the customer experience is highly dependent on the capabilities of the agent manning the phones. That person needs more than skills and a beneficial temperament; they require a software environment that provides maximum space for flexibility, problem solving, and intuitive task switching.
Tags : 
oracle, service cloud, customer interaction, customer support
    
Oracle Service Cloud
Published By: Microsoft     Published Date: Jul 20, 2018
This guide presents a structured approach for designing cloud applications that are scalable, resilient, and highly available. The guidance in this ebook is intended to help your architectural decisions regardless of your cloud platform, though we will be using Azure so we can share the best practices that we have learned from many years of customer engagements. In the following chapters, we will guide you through a selection of important considerations and resources to help determine the best approach for your cloud application: 1. Choosing the right architecture style for your application based on the kind of solution you are building. 2. Choosing the most appropriate compute and data store technologies. 3. Incorporating the ten high-level design principles to ensure your application is scalable, resilient, and manageable. 4. Utilizing the five pillars of software quality to build a successful cloud application. 5. Applying design patterns specific to the problem you are trying to
Tags : 
    
Microsoft
Published By: Beqom     Published Date: Dec 05, 2018
In this guide, we’ll walk you through a few examples that illustrate the value of drilling down into data for better people decisions
Tags : 
compensation analysis, compensation analytics, compensation compliance, compensation management, compensation management employees, compensation management sales teams, compensation saas, compensation software
    
Beqom
Published By: Webroot UK     Published Date: Sep 05, 2013
Webroot SecureAnywhere Business - Endpoint Protection offers a revolutionary approach to malware protection. It brings together Webroot's innovative file pattern and predictive behavior recognition technology, with the almost limitless power of cloud computing, to stop known threats and prevent unknown zero-day attacks more effectively than anything else. Read this white paper to learn about ultimate performance and minimal management security software from Webroot.
Tags : 
webroot, secureanywhere, business, software, security software, revolutionary software, predictive behavior, known threats
    
Webroot UK
Published By: IBM     Published Date: Sep 10, 2009
Read this Trend and Risk report from IBM® ISS X-Force® to learn statistical information about all aspects of threats that affect Internet security, including software vulnerabilities and public exploitation, malware, spam, phishing, web-based threats, and more!
Tags : 
ibm iss x-force threat and risk report, ibm, web-related security threats, spam and phishing, malware, cvss, top vendor list, web application vulnerabilities
    
IBM
Published By: IBM     Published Date: Sep 11, 2009
Discover the hidden dangers posed by privileged users and the damages they have caused. This webcast features two senior analysts from Burton Group Identity and Privacy Strategies, as well as IBM identity and access management solutions address this security and compliance challenge.
Tags : 
ibm, access management solutions, christopher bauseman, ibm tivoli software, lori rowland, senior analyst, mark diodati
    
IBM
Published By: ESET     Published Date: Jan 30, 2008
As another year draws to a close, few can have failed to notice the plagues of malicious software, floods of fraudulent emails and the generally increased pestilence of our online world, marking out 2007 as one of the most remarkable in the history of malware.  This report covers the top malware threats in 2007 and provides monthly summaries.
Tags : 
malware, global threats, 2007, threats, email, threat summary, threat report, viruses
    
ESET
Published By: ESET     Published Date: Jan 30, 2008
Spam looks like a simple enough issue until you have to try to define it: after all, we all think we know it when we see it. Most people have a working definition along the lines of “email I don’t want.” While that’s perfectly understandable, it is difficult to implement technical solutions based on such a subjective definition. Read this paper to learn why SPAM is more than just unwanted email.
Tags : 
malware, threats, email, threat summary, viruses, eset, antivirus, nod32
    
ESET
Published By: ESET     Published Date: Jan 30, 2008
Anti-virus does much more than reactively detect known viruses; it proactively scans for unknown ones too. So, how do scanners really work? The aim of this paper is to reduce some of the confusion around the workings of AV technology, and to clarify what is realistic to expect from AV protection, particularly heuristic analysis.
Tags : 
heuristics, threat analysis, how av works, av signatures, traditional antivirus, norton, symantec, trend micro
    
ESET
Published By: ESET     Published Date: Jan 30, 2008
Steganography is the science of hiding data inside of items, such as sound and picture files.  Listen to this podcast to learn more about steganography and the potential IT security concerns it poses.
Tags : 
embedded files, steganography, hiding data, secret files, coding, av signatures, traditional antivirus, norton
    
ESET
Published By: NetIQ     Published Date: Jan 12, 2011
Addressing the potential for insider threats is an often overlooked security imperative for virtually all organizations worldwide.
Tags : 
netiq, insider threat, security, audits, access control, enterprise software
    
NetIQ
Published By: SugarCRM     Published Date: Apr 08, 2014
Immer mehr Organisationen nutzen Software-as-a-Service- (SaaS) Lösungen wenn es um ihr Kundenbeziehungs-Management geht. dennoch gibt es Risiken, die man beachten
Tags : 
crm best practices, crm software, customer data management, customer experience & engagement, customer relationship management (crm), lead generation, lead management, lead nurturing
    
SugarCRM
Published By: IBM     Published Date: Jul 19, 2012
Cyber criminals constantly look for ways to attack systems through flaws in browsers, operating systems, and other software. Software vendors patch flaws as quickly as they can. If you don't apply their patches, you're asking for trouble. Watch htis video to learn more.
Tags : 
technology, ibm, software, subscription, renew
    
IBM
Published By: IBM     Published Date: Jul 19, 2012
You do so much more than just build, deliver, and manage. You innovate. And since software is the invisible thread that speeds innovation and helps us design and build the smarter products and services we need to build a smarter planet, then you deserve a revamped, upgraded, 2.0 conference. One that sparks and celebrates innovation. Get ready for. IBM Innovate 2010. The premier software systems and services event. Rational Subscription & Support with Harish Grama
Tags : 
ibm, technology, support, subscription, harish grama
    
IBM
Published By: IBM     Published Date: Jul 25, 2012
SVC and Real-time Compression reduces costs, improves IT Optimization and provides a outstanding savings for virtualized third party arrays through a software upgrade.
Tags : 
infrastructure, technology, cloud, storage, virtualization, data management, optimization, svc
    
IBM
Published By: IBM     Published Date: Aug 08, 2012
With tight budgets, it isn't easy to create the operational dexterity needed to thrive in a competitive marketplace. View this demo to find out how IBM® SPSS® solutions for predictive operational analytics help manage physical and virtual assets, maintain infrastructure and capital equipment, and improve the efficiency of people and processes. By using your existing business information, IBM SPSS software can help you: predict and prevent equipment failures that can lead to disruptive, costly downtime; quickly identify and resolve product quality issues to mitigate risks and reduce warranty costs; optimize product assortment planning to increase revenue, reduce working capital requirements and improve the return on inventory investments; and act to retain your best employees by developing predictive attrition models to identify the workers at greatest risk of leaving the organization.
Tags : 
ibm, technology, predictive operational analytics, spss
    
IBM
Published By: IBM     Published Date: Nov 09, 2012
Applications represent three of the top four software concerns of IT executives. Organizations should consider the varying nature of their application workloads in order to make smarter choices. This Forrester paper looks into the impact of System Z.
Tags : 
ibm, system z, total economic impact, roi, benefits, agility
    
IBM
Published By: SAP     Published Date: Jul 17, 2012
Relational database management systems (RDBMSs) are systems of software that manage databases as structured sets of tables containing rows and columns with references to one another through key values. They include the ability to optimize storage, process transactions, perform queries, and preserve the integrity of data structures. When used with applications, they provide the beating heart of the collection of business functions supported by those applications. They vary considerably in terms of the factors that impact the total cost of running a database application, yet users seldom perform a disciplined procedure to calculate such costs. Most users choose instead to remain with a single vendor's RDBMS and never visit the question of ongoing hardware, software, and staffing fees.
Tags : 
sap, infrastructure, database, data management, white paper, management, storage, business functions
    
SAP
Published By: CDW     Published Date: Feb 24, 2015
The fundamentals of security and management of software have not changed. But the new computing environment – mobile devices, cloud computing and virtualization – requires new approaches to familiar challenges. What’s more, software publishers are bringing a new energy to their own vigilance. A capricious economy has many of them stepping up the number of customer audits. As organizations deal with these software licensing challenges, they also face increasingly sophisticated security threats that continuously morph, just a step ahead of remedies to stop them. Organizations need a comprehensive approach to security and software asset management. This white paper will examine the interconnection between SAM and security, offering practical advice on how enterprises can protect themselves and where to go for support.
Tags : 
software asset management, it enterprise, software licensing, mobility, cloud computing, data protection
    
CDW
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.