HIT Consultant Insightful coverage of healthcare innovation
 

hr software

Results 126 - 150 of 321Sort Results By: Published Date | Title | Company Name
Published By: Tricentis     Published Date: Mar 13, 2018
In a case of “if you can’t measure it, you can’t manage it,” some software project failures occur because of a lack of traceability — that is, an incomplete record of documentation around software quality assurance efforts. The lack of traceability has a significant impact on QA testing effectiveness and meeting strategic goals. However, with optimal traceability, testing becomes more efficient and enables collaboration throughout the software development lifecycle, as well as between product owners and organization leaders.
Tags : 
    
Tricentis
Published By: Symantec.cloud     Published Date: Aug 03, 2011
This whitepaper will provide you with a better understanding of why more users are working outside of the traditional offices, why that is a challenge for it departments and why cloud-based management is ideal for mobile workers.
Tags : 
symantec.cloud, symantec, symanteccloud.com, messagelabs, messagelabs.com, cta, converged threat analysis, email security
    
Symantec.cloud
Published By: Schneider Electric     Published Date: Feb 17, 2017
This paper demonstrates, through a series of examples, how data center infrastructure management (DCIM) software tools can simplify operational processes, cut costs, and speed up information delivery.
Tags : 
dcim, costs, operational processes, data centers
    
Schneider Electric
Published By: Informatica     Published Date: Nov 21, 2011
This demo showcases the ease-of-use to replicate data sets, the process of connecting to a data source, defining a mapping, initial synchronization, extraction and finally applying to a destination.
Tags : 
demo, data sets, data replication, replication, mapping, synchronication, reporting, loading
    
Informatica
Published By: Qualys     Published Date: Jun 02, 2015
This guide describes the need for continuous monitoring and offers a blueprint for creating a continuous security practice. As a result, continuous monitoring will give your organization the most comprehensive view of its global perimeter, and empower you to proactively identify and address potential threats enabled by vulnerabilities in software or weak system configurations.
Tags : 
continuous monitoring, continuous security, potential threat identification, system configurations
    
Qualys
Published By: BlueArc Corporation     Published Date: Apr 24, 2008
BlueArc’s Titan Architecture creates a revolutionary step in file servers by creating a hardware-based file system that can scale throughput, IOPS and capacity well beyond conventional software-based file servers. With its ability to virtualize a massive storage pool of up to 4 petabytes of usable, tiered storage, Titan can scale with growing data requirements and provide a competitive advantage for business processes by consolidating applications while ensuring optimal performance.
Tags : 
bluearc, storage, titan
    
BlueArc Corporation
Published By: Infoblox     Published Date: Sep 04, 2013
Press headlines are filled by reports of malware attacks. Malware attacks, once the reserve of amateurs largely for amusement, are now launched by a number of entities. Today, a malware attack can literally come from anywhere in the world and can impact even the largest organization.
Tags : 
infoblox_dns_firewall, infoblox_dns, infoblox_dns_server, infoblox_security, infoblox_dns_security, infoblox_security_device_controller, infoblox_dhcp_fingerprinting, infoblox_sdc
    
Infoblox
Published By: Infoblox     Published Date: Sep 04, 2013
Security challenges, costs & solutions for IT practitioners
Tags : 
infoblox_dns_firewall, infoblox_dns, infoblox_dns_server, infoblox_security, infoblox_dns_security, infoblox_security_device_controller, infoblox_dhcp_fingerprinting, infoblox_sdc
    
Infoblox
Published By: Infoblox     Published Date: Nov 07, 2013
According to the Ponemon Institute, the annual cost of malware breaches averaged $8.4 million. Read this white paper to gain insights into critical information to safeguard against DNS security threats and disrupt malware communications to your DNS servers.
Tags : 
infoblox_dns_firewall, infoblox_dns, infoblox_dns_server, infoblox_security, infoblox_dns_security, infoblox_security_device_controller, infoblox_dhcp_fingerprinting, infoblox_sdc
    
Infoblox
Published By: CEB     Published Date: May 19, 2014
Twelve Key Trends in Contract Management CEB Legal’s contract management survey results allow general counsel to evaluate their current contract review and monitoring processes against hundreds of their peers at midsized companies. Your peers are using our 12 Key Trends in Contracts Management to: o Gain in-depth insight into the challenges and viable solutions presented by the current contracts management landscape. o Determine the scope of their contract review policies. o Identify opportunities to accelerate their approach across the contract life cycle -- from drafting through negotiation, review, and monitoring. o Improve efficiency using contract management software, including a review of key features and associated costs
Tags : 
ceb, legal, contract management, contract review process, contract management software, contract life cycle
    
CEB
Published By: Epicor     Published Date: Jun 26, 2017
Retail is changing. Now, competitors across the globe can lure your customers as easily as those across town. Location isn’t everything anymore. Thankfully, smaller retailers are more nimble than bigger ones—you just need the right tools to compete and thrive. Epicor Eagle software is built for retailers who want to: • Improve customer service at the point of sale • Offer simple payment processing • Identify and reward loyal shoppers • Gain anywhere, anytime access to their retail software Explore our virtual tour to see how retailers can compete and grow with help from Epicor.
Tags : 
retail store software, retail sales software, retail saas, business retail software, tour of epicor eagle, benefits of epicor eagle, benefits of retail pos, advantages of retail saas
    
Epicor
Published By: Epicor     Published Date: Jun 11, 2018
Focus on your best customers and minimize time wasted on unprofitable partnerships to maximize LBM business growth through the benefits of the trending practice of customer stratification. Epicor BisTrack Software, an LBM-specific business software, provides all the tools and information you need to implement customer stratification and reap the benefits of knowing your customer’s buying habits and successes. Download the e-book from Epicor to: 1. Understand the Benefits of Stratification 2. Explore The Four Customer Types 3. Ask Yourself These Important Questions 4. Apply Strategies to Maximize Results 5. Sustain Success With a Focus on Customers
Tags : 
lumber, building materials, lbm, erp, bistrack, lumber distributors, customer stratification, customer experience
    
Epicor
Published By: Epicor     Published Date: Jun 11, 2018
Successful enterprise resource planning (ERP) software implementation depends on having a well-planned strategy that addresses each of these eight issues. If you haven’t been through the ERP selection process before, it can be daunting to compare features and functionality from a variety of vendors to determine which one best fits your needs. Epicor prepared this “8 Considerations When Choosing Your ERP System” eBook to help businesses identify the key criteria to consider when evaluating ERP software so you can find a system that solves problems instead of creating them.
Tags : 
erp software, enterprise resource planning software, erp selection, manufacturing
    
Epicor
Published By: Infoblox     Published Date: Sep 09, 2014
Stories about devastating cyberattacks are plaguing the news. Why? The DNS protocol is easy to exploit. See your network the way hackers do—as an easy target. Learn how you can effectively secure your DNS infrastructure today.
Tags : 
infoblox_dns_firewall, infoblox_dns, infoblox_dns_server, infoblox_security, infoblox_dns_security, infoblox_security_device_controller, infoblox_dhcp_fingerprinting, infoblox_sdc
    
Infoblox
Published By: Infoblox     Published Date: Sep 09, 2014
DNS is a key part of enterprise networks but increasingly targeted by hackers. Traditional security measures such as next-generation firewalls or secure web gateways won’t shield your infrastructure from attacks. Learn how to protect your DNS today.
Tags : 
infoblox_dns_firewall, infoblox_dns, infoblox_dns_server, infoblox_security, infoblox_dns_security, infoblox_security_device_controller, infoblox_dhcp_fingerprinting, infoblox_sdc
    
Infoblox
Published By: Infoblox     Published Date: Sep 09, 2014
An integrated DNS architecture is needed in today’s networking landscape. Designing a secure DNS architecture requires more than increased bandwidth and QPS. Learn how to build a secure and scalable DNS solution to ensure network availability.
Tags : 
infoblox_dns_firewall, infoblox_dns, infoblox_dns_server, infoblox_security, infoblox_dns_security, infoblox_security_device_controller, infoblox_dhcp_fingerprinting, infoblox_sdc
    
Infoblox
Published By: FICO     Published Date: Mar 14, 2017
In this Executive Brief, we share best practices in how to evaluate and deploy layered controls that will help you develop a holistic approach to controls, investigate and control where risk is introduced, assess your risk appetite and benchmark your cybersecurity posture against others in your industry.
Tags : 
network security and data protection, advance threat defense, network visibility, security analytics, mobile security, cyber security detection software
    
FICO
Published By: FICO     Published Date: Mar 14, 2017
Learn how technologies such as AI, self-calibrating models and self-learning analytics are being used to detect cyber attacks before they happen. Download now!
Tags : 
network security and data protection, advance threat defense, network visibility, security analytics, mobile security, cyber security detection software
    
FICO
Published By: FICO     Published Date: Mar 14, 2017
Are you ready for a new year of killer devices, hacked fingerprints, crooked migration and more? Download now.
Tags : 
network security and data protection, advance threat defense, network visibility, security analytics, mobile security, cyber security detection software
    
FICO
Published By: Viventium     Published Date: Jul 06, 2017
Payroll, HR, Talent Acquisition – there is so much life in HCM. From employee self-service experiences to technology that works seamlessly across desktop and mobile devices, your HCM software should empower your business.
Tags : 
    
Viventium
Published By: Viventium     Published Date: Jul 06, 2017
Take a look through time at the history of the workforce in this compelling infographic from Viventium Software Inc.
Tags : 
    
Viventium
Published By: Dassault Systèmes     Published Date: May 09, 2018
Today’s thriving High-Tech sector is driven by shrinking product lifecycles, rapid innovation, distributed engineering/manufacturing—and highly demanding customer expectations. The industry needs to deliver on multiple fronts, including: • Embed customer-centric innovation throughout the lifecycle: Only with customer experience at the core can companies stay ahead. • Tame ideas into executable products: Detecting early trends and using customer feedback is vital. • Manage complexity better: Increasing visibility of all product data helps build and manage digital models to use in every business function from R&D to field service. • Create relevant connected systems: High-Tech innovators use IoT for an ongoing dialogue of customers, devices and manufacturers. • Provide agility to compete on software, hardware and service: Customers want value from every interaction. Download your targeted industry analysis to learn more.
Tags : 
    
Dassault Systèmes
Published By: TIBCO Software     Published Date: Feb 27, 2019
Blockchain in Financial Services is receiving a lot of attention, especially for synchronizing financial agreements between institutions. But how can blockchain be used outside of this context? Can it apply to use cases such as identity, fraud, and AML? Watch this short webinar to hear how blockchain can be used to solve other key issues facing the industry, about research into consensus algorithms beyond proof of work, and about myths and truths that must be considered for a successful enterprise blockchain implementation. Speaker: Nelson Petracek, CTO, TIBCO Software
Tags : 
blockchain, financial services, fraud, aml
    
TIBCO Software
Published By: Epicor     Published Date: Jan 09, 2019
The plan is to move what you currently have onto a platform that gives you new capabilities to better support your transformation goals. Aberdeen Group has found that those who stay up to date with their ERP are, for example, almost three times as likely to have mobile ERP functionality, twice as likely to have integrated ERP and eCommerce, and five times more likely to have social business capabilities.1 Is it time for you to take the next step on your journey by moving to the Epicor ERP system? Consider these questions: XX How much time and money could your business save by eliminating inefficient processes, increasing worker productivity, and improving customer service? XX What goals can you achieve when your core software is integrated with Industry 4 .0 technologies to support the factory of the future? XX What would your business look like if you had real-time information to make informed business decisions that drive growth and profitability?
Tags : 
    
Epicor
Published By: MasterControl     Published Date: Oct 08, 2019
Leveraging today’s revolutionary technology initiatives like Industry 4.0, digital thread, robotic process automation and countless more means staying ahead of the competition, but it requires the right manufacturing software – and going fully paperless. This white paper is your guide to the past, present and future of manufacturing software solutions. Key Takeaways: • Overview of the Top Manufacturing Software Systems • Understanding of Functional Overlaps, Gaps and Selection Considerations • How to Go Paperless With Digital Production Records
Tags : 
    
MasterControl
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.