HIT Consultant Insightful coverage of healthcare innovation
 

effective it

Results 1701 - 1725 of 1795Sort Results By: Published Date | Title | Company Name
Published By: Oracle     Published Date: Nov 01, 2013
The next generation of talent management practices and solutions will largely be driven by economic evolution, demographic changes, and technology advancements. These factors are dramatically influencing the way people work, the way companies are organized, and the way talent is managed. Current business and talent management processes and technology must evolve to effectively deliver business value over the next few years. This paper explores how current business and talent management processes and technology must evolve in order to effectively deliver business value in the next 5 to 10 years. The research presented in this paper is supported by interviews with thought leaders in talent management, including practitioners, academics, and technologists from around the globe.
Tags : 
zenithoptimedia, oracle, future of talent management, economic factors, the knowledge economy, globalization, structural unemployment, generational geographies, workplace diversity, technology factors, digitization, telecommunications, change management
    
Oracle
Published By: Oracle     Published Date: Nov 01, 2013
The ability to manage talent effectively can dictate the success of the entire organization. Organizations must invest in solutions that help attract, retain and develop talent while aligning to the overall goals and success of the business. This infographic provides insight why the future of human capital management depends on cloud-based talent management technology.
Tags : 
zenithoptimedia, oracle, future of hcm, cloud-based talent, talent management, oracle talent cloud, cloud integration, oracle integration architecture, cohesive saas-based system, recruiting strategies, employee lifecycle, performance management, human capital management, sourcing and recruiting, employee referrals, increase employee engagement, social sourcing, global support, administrative to strategic
    
Oracle
Published By: Symantec     Published Date: Oct 07, 2014
With the rapid rise in data breaches, advanced threats and mobility, data loss prevention (DLP) has quickly evolved from a security issue to a business imperative. This research paper examines the findings from a new study on DLP by Symantec. The goal of the study is to understand how DLP programs impact the effectiveness of security executives, while also protecting corporate data.
Tags : 
data loss prevention, data breaches, threats and mobility, security executives, corporate data
    
Symantec
Published By: IBM     Published Date: Feb 05, 2014
An effective cyber security strategy calls for the latest intelligence on the kinds of attacks that are occurring, who is committing them, and how often they are happening. A new IBM report offers expert insight into a range of security statistics, based on monitoring tens of billions of security events that occurred at 3,700 organizations around the world.
Tags : 
    
IBM
Published By: IBM     Published Date: Aug 06, 2014
The holistic, integrated fraud-prevention platform from Trusteer, an IBM company, effectively protects financial institutions against the full range of attack vectors responsible for the majority of online and cross-channel fraud, including account takeover.
Tags : 
    
IBM
Published By: Cisco     Published Date: Feb 23, 2016
Industrial enterprises around the world are retooling their factories with advanced technologies to boost manufacturing flexibility and speed, achieving new levels of overall equipment effectiveness (OEE), supply chain responsiveness, and customer satisfaction in the process. This renaissance reflects very real pressures industry players face today. For years, traditional factories have been operating at a disadvantage, impeded by production environments that are “disconnected”—at the very least strictly gated—to corporate business systems, to supply chains, and to customers and partners.
Tags : 
technology, manufacturing, management infrastructure
    
Cisco
Published By: Cisco     Published Date: Feb 23, 2016
Many manufacturers are pursuing the immense business benefits available from digitizing and connecting their factories. Major gains in overall equipment effectiveness (OEE), reduced downtime, and manufacturing flexibility can be achieved with a factory that is digitized and connected.
Tags : 
manufacturers, business practices, digital management
    
Cisco
Published By: NAVEX Global     Published Date: Jan 11, 2018
The integrated hotline and incident management components are the employee facing “front end” of any whistleblower programme. As such, their proper implementation and management will determine how the programme is perceived by potential whistleblowers and other key stakeholders. The hotline will also largely conclude how effective and efficient the programme is in meeting its overall objectives.
Tags : 
whistleblower, hotlines, case, management, solutions, practices, navex
    
NAVEX Global
Published By: FireEye     Published Date: Feb 28, 2014
If I were to boil down these survey results to a single sentence, it would be this: To keep pace with today’s advanced threats, incident response teams need tools and techniques that give them greater speed, accuracy and insight.
Tags : 
fireeye, incident response, greater speed, greater accuracy, advanced threats, response teams, detect malware, persistent threats, information security, security threats, costly breaches, ineffective defense, cyber-attacks, speed of detection, accuracy of detection, security model, shared risks
    
FireEye
Published By: GENBAND     Published Date: Apr 01, 2014
See how GENBAND offers CIOs of large multi-site enterprises effective ways to reduce telecom spend by leveraging their IP data networks for inter-site, intra-enterprise multimedia communication and consolidation of connectivity to service providers.
Tags : 
genband, enterprise, telecom, ip data networks, service provider networks
    
GENBAND
Published By: Castlight Health     Published Date: Aug 02, 2016
This short guide explores the six highly effective strategies we’ve identified to help benefits leaders lower costs, improve outcomes and increase benefit satisfaction.
Tags : 
castlight health, benefits, human resources
    
Castlight Health
Published By: Castlight Health     Published Date: Aug 02, 2016
"You’re charged with much more than “benefits management.” You deliver programs that enable both your organization and your employees to successfully navigate the healthcare experience. Not easy, right? This short guide explores the six highly effective strategies we’ve identified to help benefits leaders lower costs, improve outcomes and increase benefit satisfaction. "
Tags : 
best practices, business optimization, business management, productivity, strategy, effective, organization
    
Castlight Health
Published By: Adobe     Published Date: Apr 13, 2015
In this research study hear from more than 1,500 line-of-business leaders, IT leaders, and information workers about the effectiveness of their organization’s document-based business processes. Learn how organizations of all sizes in all industries around the world are suffering from what we call the “document disconnect.” Learn how this is causing significant delays and errors across critical business functions such as sales contracting and quoting, procurement, talent acquisition, and onboarding. Download this white paper to learn more.
Tags : 
adobe, talent acquisition, sales contracting, sales quoting, document disconnect
    
Adobe
Published By: Cyveillance     Published Date: Jun 20, 2014
Phishing is defined by the Financial Services Technology Consortium (FSTC) as a broadly launched social engineering attack in which an electronic identity is misrepresented in an attempt to trick individuals into revealing personal credentials that can be used fraudulently against them. In short, it’s online fraud to the highest degree. Although it’s been around for years, phishing is still one of the most common and effective online scams. The schemes are varied, typically involving some combination of spoofed email (spam), malicious software (malware), and fake websites to harvest personal information from unwitting consumers. The explosive rise of mobile devices, mobile applications, and social media networks has given phishers new vectors to exploit, along with access to volumes of personal data that can be used in more targeted attacks or spear phishing. The fact that phishing attacks are still so common highlights their efficacy and reinforces the need to implement comprehensive phishing and response plans to protect organizations. An effective phishing protection plan should focus on four primary areas: Prevention, Detection, Response, and Recovery. High-level recommendations for each of the four areas are outlined in this whitepaper.
Tags : 
cyveillance, phishing, security, cyberattacks, cybercriminals, threats
    
Cyveillance
Published By: GuideSpark     Published Date: Nov 19, 2018
Successful executives are increasingly recognizing that effective compensation communication is essential to strengthen the employee value proposition (EVP) and make it easier for employees to understand it. As a result, they’re creating communication strategies that connect the dots between performance and pay in ways that build trust and engagement, transform the workplace culture, and help drive productivity.
Tags : 
    
GuideSpark
Published By: McAfee     Published Date: Jan 20, 2015
Advanced persistent threats (APTs) have been central to network security discussions in the past few years, with many organizations implementing new solutions to protect themselves from this determined type of malware. Yet, cybercriminals continue to be effective in penetrating the network defenses of even the strongest security systems, including some very high-profile enterprises. One of the dirty little secret weapons hackers use to bypass security systems and penetrate even the most locked-down networks are advanced evasion techniques (AETs). While AETs are not a secret among the hacking community—where they are well known and have been in widespread use for several years—there are misunderstandings, misinterpretation, and ineffective safeguards in use by the security experts charged with blocking AETs.
Tags : 
next generation firewall, intrusion prevention systems, firewall, contextual security, advanced evasion detection, advanced evasion techniques, aet, apt, advanced persistent threats
    
McAfee
Published By: AppDynamics     Published Date: Feb 08, 2018
This white paper describes how containers and microservices work, the benefits and challenges of using them, and how a unified view of the enterprise stack and effective application performance monitoring (APM) can help to fortify their benefits and address their challenges.
Tags : 
    
AppDynamics
Published By: IBM     Published Date: Mar 04, 2015
Medical Device companies have typically shied away from design reuse because of the fear of a single point of failure. However due to market pressures, more and more medical device companies must embrace reuse to increase time to market. Unlike common perception, strategic and effective reuse can actually benefit regulated industries like medical devices by expediting compliance. This webcast will discuss the benefits of reuse as well as concepts of continuous engineering that can improve quality for medical devices.
Tags : 
design reuse, reuse, continuous engineering, medical device quality, compliance regulations
    
IBM
Published By: CA Technologies     Published Date: Feb 04, 2015
The CA Technologies Buyers Guide: Choosing the Right Enterprise Mobility Management Solution for Your Business, will help you find an effective Enterprise Mobility Management solution that integrates the management of mobile devices, apps and content that will enable you to participate in the App Economy.
Tags : 
    
CA Technologies
Published By: CA Technologies     Published Date: Jun 04, 2015
Industry leaders share insights on DevOps and big data, ITIL, testing and more. Once again, we have spent time talking to leading community figures such as Dave Farley (“Continuous Delivery” author) to discuss the major issues impacting DevOps today. This latest issue features comments from 10 experts and covers many hot topics such as: - Enterprise DevOps transformation - DevOps and big data - DevOps and ITIL - Shadow IT vs DevOps - 6 Habits of Effective DevOps Practitioners - DevOps and Testing
Tags : 
    
CA Technologies
Published By: Intel Security     Published Date: Jan 20, 2015
Advanced persistent threats (APTs) have been central to network security discussions in the past few years, with many organizations implementing new solutions to protect themselves from this determined type of malware. Yet, cybercriminals continue to be effective in penetrating the network defenses of even the strongest security systems, including some very high-profile enterprises. One of the dirty little secret weapons hackers use to bypass security systems and penetrate even the most locked-down networks are advanced evasion techniques (AETs). While AETs are not a secret among the hacking community—where they are well known and have been in widespread use for several years—there are misunderstandings, misinterpretation, and ineffective safeguards in use by the security experts charged with blocking AETs.
Tags : 
next generation firewall, intrusion prevention systems, firewall, contextual security, advanced evasion detection, advanced evasion techniques, aet, apt, advanced persistent threats
    
Intel Security
Published By: NetApp     Published Date: Mar 05, 2018
Download IDC's paper to learn how a single data management tier across on-premise and multiple clouds is critical to making hybrid cloud and multicloud environments effective. This foundation for digital transformation success helps businesses: improve time to market, cut compliance risk, and enable businesses to innovate at an accelerated pace.
Tags : 
netapp, database performance, flash storage, data management, cost challenges
    
NetApp
Published By: ServiceNow     Published Date: Jul 09, 2015
Enterprises are transforming IT by adopting service automation tools and processes, making teams more innovative and efficient. By consolidating fragmented and redundant service systems, standardizing operational processes and by creating a single system of record for IT, CIOs can shift their attention from maintenance to service, effectively changing enterprise IT.
Tags : 
    
ServiceNow
Published By: IBM     Published Date: Apr 07, 2015
IBM invites you to join us for an expert presentation and discussion of the methods and tools available to help Lean Six Sigma teams drive increased levels of efficiency, effectiveness and quality.
Tags : 
ibm, efficiencies, six sigma, quality, lean, reduce waste, variance, process improvement, customer, value
    
IBM
Published By: IBM     Published Date: Apr 16, 2015
How effective is your mobile app development process when it comes to understanding customer needs and delivering the right apps at the right time? IBM commissioned Forrester to identify the key drivers of successful mobile apps and the costs of failure -- for both customer-facing and enterprise applications. Watch the webcast to understand the key cost drivers and why it’s more important than ever to get this right due to what Forrester calls the “mobile mind shift” and the competitive reality of “mobile moments.” We also invited our customer, Bank of Montreal, to share their mobile app dev story. A good app can increase traffic, sales, productivity and brand satisfaction (see what happened for the Bank of Montreal). And a bad app will do the opposite (you could risk doubling your costs if you’re not mindful of the key cost drivers).
Tags : 
mobile app development, mobile apps, ibm, forrester, mobile mind shift, brand satisfaction, mobile
    
IBM
Start   Previous    58 59 60 61 62 63 64 65 66 67 68 69 70 71 72    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.