Share us:
 

hr systems

Results 151 - 175 of 310Sort Results By: Published Date | Title | Company Name
Published By: Oracle     Published Date: Aug 31, 2016
What happened to Moore’s Law? Why is Oracle releasing a new SPARC processor with fewer cores and threads? The SPARC S7’s core processors are 50 percent to 100 percent more efficient than x86 processors. SPARC S7 delivers up to 10 times more-efficient data analytics and machine learning than x86-based systems. The new SPARC S7 is available in servers, an engineered system, and a cloud service at the same price as the Oracle Cloud x86 Compute service. The SPARC S7 processor makes it possible to build powerful, scalable, and cost-effective systems be it for application scale-out, on premise or public cloud.
Tags : 
    
Oracle
Published By: Vendor Guru     Published Date: Dec 21, 2007
Customer relationship management (CRM) systems are being implemented by a variety of companies looking for a competitive advantage in the global marketplace. Without customer loyalty, many companies won’t be able to thrive and grow. Today’s consumers are more demanding because they have a greater variety of choices, including doing business on the Internet and via automated phone systems. Many expect access to customer service 24 hours a day.
Tags : 
vendor guru custom question campaign, vendor guru, vendorguru, quinstreet, crm, crm tool, crm solution, customer service, customer relationship, data integration, marketing automation, sales management, analytics, business analytics, customer relationship management, sales & marketing software, analytical applications
    
Vendor Guru
Published By: Burton Group     Published Date: Jul 07, 2008
While many enterprise architecture (EA) programs may be less than effective or threatened by extinction, the EA discipline is still an important set of skills and processes that improve IT decision-making and CIO effectiveness. Yet, after decades of architecting systems, the advent of several EA frameworks, and the many definitions available for the term EA, we still strive to understand what EA is, what it does, and what it looks like when it is successful.
Tags : 
architecture, architect, network architecture, it management, network design, network management, burton group, enterprise architecture, networking
    
Burton Group
Published By: HP Data Center     Published Date: Feb 18, 2009
Data centers are large, important investments that, when properly designed, built, and operated, are an integral part of the business strategy driving the success of any enterprise. Yet the central focus of organizations is often the acquisition and deployment of the IT architecture equipment and systems with little thought given to the structure and space in which it is to be housed, serviced, and maintained. This invariably leads to facility infrastructure problems such as thermal “hot spots”, lack of UPS (uninterruptible power supply) rack power, lack of redundancy, system overloading and other issues that threaten or prevent the realization of the return on the investment in the IT systems.
Tags : 
hp data center, data center, business strategy, it architecture, ups, uninterruptible power supply, rack power, lack of redundancy, system overloading, return on investment, roi, virtualization, going green, return on investment, scopes of work, sow, itsm assessments, energy assessments, it security and risk assessments, performance analysis for hp-unix
    
HP Data Center
Published By: HP Data Center     Published Date: Mar 25, 2009
Data centers are large, important investments that when properly designed, built and operated, are an integral part of the business strategy driving the success of any enterprise, yet the central focus of organizations is often the acquisition and deployment of the IT architecture equipment and systems, with little thought given to the structure and space in which it is to be housed, serviced and maintained. This invariably leads to facility infrastructure problems, such as thermal hot spots, lack of UPS, rack power, lack of redundancy, system overloading and other issues that threaten or prevent the realization of the return on the investment in the IT systems.
Tags : 
hp data center, data center, business strategy, it architecture, ups, uninterruptible power supply, rack power, lack of redundancy, system overloading, return on investment, roi, virtualization, going green, return on investment, scopes of work, sow, itsm assessments, energy assessments, it security and risk assessments, performance analysis for hp-unix
    
HP Data Center
Published By: Symantec.cloud     Published Date: Sep 12, 2012
Download this whitepaper to learn three useful steps to protect your virtual systems. There's no better time than the present to give your virtual systems top-of-the-line backup and restore protection.
Tags : 
virtual systems. virtualization, backup and recovery, backup automation, symantec, security, data management, data center
    
Symantec.cloud
Published By: EMC Corporation     Published Date: Aug 05, 2014
To develop the visibility, agility and speed to deal with advanced threats, traditional security strategies for monitoring, often based around security information and event management (SIEM) systems need to evolve into a central nervous system for large-scale security analytics. In particular, four fundamental capabilites are required: 1. Pervasive visibility 2. Deeper analytics 3. Massive scalability 4. Unified view Download here to learn more!
Tags : 
big data, data management, security threats, advanced analytics, security management, predictive analytics, compliance, security
    
EMC Corporation
Published By: Epicor HCM     Published Date: Sep 26, 2012
In this white paper you will learn how to make the business case for a new HRIS to senior executives.
Tags : 
hris upgrade, hris implementation, human resources, hr systems, human resources information systems
    
Epicor HCM
Published By: Workforce Software     Published Date: Apr 03, 2012
We will go over a brief introduction of what workforce analytics is, and take a look at why it is sometimes so difficult to get the information we need out of our HR or Business Intelligence systems. We will also dive into the important metrics we should consider as HR professionals and what metrics will ultimately drive your business forward.
Tags : 
human resources, hr management, workforce software, workforce analytics, employees, business analytics, business issues and trends, global hr management, human resources management, management fundamentals
    
Workforce Software
Published By: McAfee     Published Date: Jan 23, 2013
Threats and vulnerabilities are a way of life for IT admins. This paper focuses on how McAfee's Vulnerability Manager and McAfee e Policy Orchestrator provide IT Admins with powerful and effective tool for identifying and re-mediating systems.
Tags : 
mcafee vulnerability manager, s3kur3, tom bradley, mcafee epolicy orchestrator, mcafee vulnerability scanner, mcafee epolicy orchestrator, mcafee global threat intelligence, vulnerability scan, mcafee risk advisor, patch tuesday, security, it management, data center
    
McAfee
Published By: Compass Datacenters     Published Date: Jul 07, 2015
A high percentage of today’s data centers use water-based cooling methods. Although evaporative cooling, whether through traditional towers or “advanced” adiabatic cooling systems (aka swamp coolers), remain highly effective cooling methods, when you’re planning a new data center you may want to consider the impact of the weather and water availability on your decision.
Tags : 
echnology, water, evaporative cooling, swamp coolers, data center maintenance, it management, disaster recovery
    
Compass Datacenters
Published By: Xangati     Published Date: Sep 01, 2015
If you are a healthcare professional, then you and your organization are caught between the horns of compliance and improving the patient experience. With the Health Information Technology for Economic and Clinical Health Act (HITECH) now in full effect, the days of lax enforcement are over. First-time penalties or violations can reach up to $250,000. The transition to EMR/EHR use, along with all of the systems and equipment upgrading that entails, will be done and done well – or else. Penalties can also extend to your organization’s business associates.
Tags : 
performance management, information technology, cloud and systems virtualization, application performance management
    
Xangati
Published By: LogRhythm     Published Date: Jun 19, 2018
In today’s fast-paced threat environment, speed to detect and respond is critical. Yet, according to multiple SANS surveys,1 analysts are finding it difficult to keep up with the speed in which hackers attack their systems.
Tags : 
logrhythm, scalability, hackers, systems, scripts
    
LogRhythm
Published By: Ciena     Published Date: Jun 12, 2017
Explore "The Utility of the Future, Considerations for Evolving to a Smart Grid Infrastructure" by downloading it today.
Tags : 
sdh, sonet sdh, sonet/sdh, sdh network, synchronous digital hierarchy, what is sdh, sonet vs sdh, define sdh, sonet, sonet definition, what is sonet, sonet ring, sonnet def, sonet network, synchronous optical network, define sonet, g.707, sonet frame structure, sonet technology, sts 12
    
Ciena
Published By: Kronos     Published Date: Jul 26, 2017
With the pace of human resources technology solution development progressing quickly, HR leaders need to gain a solid understanding of the HR system options available. This tool is designed to help HR leaders build a business case for investing in next-generation HR systems to meet the growing HR demands of your organization. Demands include interfacing or integrating data, incorporating social and mobile technologies, and providing an employee experience that grows from the experience given to candidates.
Tags : 
interfacing data, integrating data, mobile technologies, social technologies, employee experience
    
Kronos
Published By: Infosys     Published Date: Jun 12, 2018
In the wake of data hacks and privacy concerns, enterprises are working extra hard to make sure they secure customer data from external threats. But what about securing data internally? Organizations unknowingly leave a big security hole in their own systems when they fail to have structured internal processes to handle access requests for employees, which could have disastrous implications for data security. A leading US bank sought to move its internal applications to a secure system for a standard and consistent access rights experience. See how Infosys helped and the five key takeaways from the project.
Tags : 
internal, applications, data, hacks, privacy, enterprises
    
Infosys
Published By: Infosys     Published Date: Jun 12, 2018
The digital world has made it possible for enterprises to reach, and deliver services to customers near and far through mobile applications. However, regular and rapid rollout of features and new versions across geographies and different operating systems call for flawless applications and mobile app testing capabilities. A chemical giant wanted to deliver agriculture data and services to their farmer clients across geographies through their mobile applications. See how Infosys helped and the five key takeaways from the project.
Tags : 
mobile, digital, customer, applications
    
Infosys
Published By: BetterUp     Published Date: Mar 06, 2019
Research suggests that up to half of the investment your organization is making in Learning & Development (L&D) is being wasted. Employees unfortunately lose up to 75% of the information they receive through traditional L&D approaches (including learning management systems, episodic trainings, and workshops) — an effect known as the training transfer problem. In this report, discover the five critical requirements for effective behavior change and leadership development.
Tags : 
    
BetterUp
Published By: Oracle HCM Cloud     Published Date: May 25, 2017
Health reforms and increased consumer focus on value are pushing health care organizations to deliver improved outcomes and enhanced patient experiences at reduced cost. Leading organizations are reassessing their ERP financial and HR systems to define where investments are required to tackle these challenges and provide scalability for growth. Read more.
Tags : 
    
Oracle HCM Cloud
Published By: Oracle HCM Cloud     Published Date: May 25, 2017
The changing healthcare environment means that both payers and providers must use all of their available data to ensure that employee productivity goals are met, members and patients receive high-quality service, and compliance is maintained. Unfortunately, many organizations face challenges with disparate systems providing inconsistent data. Find out how leading healthcare organizations are integrating HR and finance systems for one source of truth, and in turn enabling better decisions.
Tags : 
    
Oracle HCM Cloud
Published By: Singapore Economic Development Board     Published Date: Nov 14, 2018
Asia is well positioned to continue its role as an innovation incubator and an important market for new products and services. Harvard Business Review articulates how the three key factors of People, Policies and Resources contribute to Asia’s innovation ecosystems, and shares how companies like Intel, Micron, Medtronic have been innovating for Asia from Singapore.
Tags : 
    
Singapore Economic Development Board
Published By: Oracle     Published Date: Apr 05, 2016
While the cloud can be a disruptive force, this global survey, conducted by Harvard Business Review and sponsored by Oracle, shows it is no longer a divisive one. The cloud is emerging as a unifying force that’s forging tighter collaboration between business and IT managers to drive innovation. The survey debunks three myths around implementing a public and/or private cloud strategy, including whether corporate systems need public cloud app data and how aligned IT and business are when it comes to the cloud.
Tags : 
cloud services, cloud management, best practices, information technology, business strategy, application performance management, information management, cloud computing
    
Oracle
Published By: Webroot UK     Published Date: Sep 25, 2013
Managing web security in an increasingly challenging threat landscape. Cybercriminals have increasingly turned their attention to the web, which has become by farther predominant area of attack. Small wonder. Those who would do harm to our computer systems for profit or malice always manage to focus their efforts on our most vulnerable weak spots. Today, that is the web, for a wide number of reasons.
Tags : 
web security, webroot, web attack, ddos, web, internet security, malware, networking, security, enterprise applications
    
Webroot UK
Published By: McAfee EMEA     Published Date: Nov 15, 2017
Machine learning offers the depth, creative problem-solving capabilities, and automation to help security organizations gain significant ground against attackers. It’s a powerful tool for processing massive amounts of data for the purpose of malware classification and analysis, especially for unknown threats. Through supervised learning, human researchers can continually develop new training models that expand the understanding and competency of machine learning systems.
Tags : 
analytics, security, problem solving, creative, data, researching, malware
    
McAfee EMEA
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

© 2019  Created by Boris Agranovich.

Badges  |  Report an Issue  |  Terms of Service