aps

Results 351 - 375 of 513Sort Results By: Published Date | Title | Company Name
By: MoreVisibility     Published Date: Jan 11, 2010
This recorded webinar is ideal for marketers who want to boost their natural ranking on Google, and covers: Google Webmaster Tools, Google Site Map / External Site Maps, Content / Keyword Targeting, Leveraging Additional Google Channels, Tracking Results / Analytics and many more!
Tags : google, webmaster, keyword targeting, webinar, morevisibility, seo, targeting, rankings
     MoreVisibility
By: SAS     Published Date: Mar 14, 2014
Jill Dyche and SpectraDynamo explains the importance of understanding how to manage data and issues regarding data categorization, retrieval and quality.
Tags : sas, data categorization, retrieval and quality, spectradynamo, telemetry data, data governance program, data management, data quality, business objectives, quality data, accuracy, lineage, structural consistency, relevant metrics, business relevance, measured value, emergent patterns, quality metrics
     SAS
By: Taleo     Published Date: Jan 25, 2012
Each area of payback overlaps as talent mobility is not a stand-alone practice. Internal talent redeployment connects with many aspects of overall talent management, especially talent acquisition and succession management. Understanding and quantifying the returns from talent mobility should be framed in that overall context.
Tags : taleo, human resources, talent management, employee management, talent development
     Taleo
By: Taleo     Published Date: Mar 30, 2012
This document outlines two ways that changes in business can impact succession planning and why integrating talent management processes can fill all your talent gaps.
Tags : employee wellness, corporate wellness, human capital management, wellness strategy, employee engagement, human resources, human resource management, talent management
     Taleo
By: IBM     Published Date: Apr 23, 2013
The current business environment is still characterized by skittishness, tenuous demand and sporadic growth. It’s no surprise then, that 60% of CFOs plan to make major changes to critical finance practices and processes, according to the 2010 IBM Global CFO Study. In fact, 70% of CFOs claim to be taking a more prominent role in enterprise decision making beyond the traditional role of finance. Yet many CFOs admit to significant gaps in their ability to deliver on this expanded agenda, particularly in their ability to measure and monitor business performance. The IBM study found that those companies that invest in capabilities to expand their business insight are better able to anticipate and react to the unpredictable external forces affecting the economy.
Tags : dynamic planning, forecasting, financial forecasting, finance, cfo, enterprise
     IBM
By: Skillsoft     Published Date: Oct 29, 2013
With a constantly evolving business climate, encountering change is the new normal. Organizations that embrace and practice agility are proven to be more effective in dealing with change. Key to fostering agility is continuous learning and development. Learning is not an event-based occurrence where one-time training can satisfy skill gaps; learning opportunities need to be accessible, targeted, and continuous. With a strong learning culture that aligns with business objectives, companies are better able to embrace an agile mindset, and with increased agility, performance will improve and the overall business impact will increase.
Tags : learning, training, certification, workforce agility, elearning, content delivery, career advancement
     Skillsoft
By: Skillsoft     Published Date: Nov 21, 2013
Learning is critical to enabling business strategy, from onboarding new hires to developing future leaders, to educating channel partners and customers. This study, based on responses collected from 185 organizations between July and September 2013, looks at how organizations connect learning to business priorities, create development programs that impact every stage of the employee lifecycle and utilize technology to support learning initiatives. It also examines the business impact of building learning capability and running effective learning programs. Research conducted by Aberdeen Group and brought to you thanks to Skillsoft.
Tags : career advancement, learning, training, certification, onboarding, employee development, human capital management, learning, employee performance
     Skillsoft
By: Esker     Published Date: Jun 29, 2015
Read the new independent research report from Ardent Partners, ePayables 2015: State of the Market Report. Drawing on the feedback of hundreds of AP and finance professionals, this unique report offers a comprehensive snapshot into what’s happening in AP, including insights on: • How the role of AP is continuously evolving • Key drivers that shape AP leaders’ plans and priorities • How automation technology is impacting AP • Operational benchmark statistics and recommended strategies
Tags : epayables, accounts payable, exception-handling, root cause analysis, ap operations, ap strategy
     Esker
By: Dextra Technologies     Published Date: Aug 30, 2013
It’s no longer sufficient talk about the importance of mobility for IT-enabled operations. Instead, think about the concept of pervasive mobility, where the current generation of traditional devices like notebooks are augmented, and perhaps eventually replaced, by a new armada of consumer-class devices at the edge of the network. In fact, the bulk of information now being created and stored on corporate networks comes from notebooks, tablets and smartphones.
Tags : best practices, pervasive mobility, information technology, mobile, network, gadgets, consumer class devices, smartphones, dextra
     Dextra Technologies
By: IBM     Published Date: Oct 24, 2013
Read about a four-step program for incorporating risk into your business forecasting and learn to spot traps that can snare the unwary.
Tags : ibm, mastering risk, business forecasting, business analytics, ibm software, variation, predictable risk, discontinuities, unpredictable risk, active risk management, passive risk management, error analysis, long-term forecast error
     IBM
By: IBM     Published Date: Feb 12, 2014
Read about a four-step program for incorporating risk into your business forecasting and learn to spot traps that can snare the unwary.
Tags : ibm, business analytics, finance, forecasting, risk management, business forecasting, predictive analysis, forecasting lexicon
     IBM
By: Oracle Social Cloud     Published Date: Jan 14, 2015
When it comes to social media marketing, there is perhaps no other topic that is discussed more than determining and reporting return on investment, or ROI. This white paper sets out to make the case that ROI determination can be approached in a unified, structured and straightforward way. It also lays out a framework for expanding the definition of ROI and increasing organizational maturity for measurement and monetization. Finally, it dispels some of the myths around ROI and seeks to show the relationship between social KPIs organizations may be collecting today and how to align them with broader organizational and business-oriented goals and objectives.
Tags : social roi, facebook, social listening, social marketing, customer experience, digital, cmo, social business, socially enabled enterprise, marketing cloud, crm, data
     Oracle Social Cloud
By: Incapsula     Published Date: Jul 11, 2014
Given today's threat landscape and the availability of inexpensive "Do it yourself DDoS attack kits,” commercial websites of all sizes have become targets of DDoS attacks. This guide offers online businesses practical guidelines and evaluation criteria for choosing their DDoS mitigation solution.
Tags : ddos, mitigation service, cloud-based, delivery, security, speed, availability, websites, e-commerce
     Incapsula
By: Incapsula     Published Date: Jul 11, 2014
DDDoS attacks are bigger, smarter and more dangerous than ever. Incapsula's research shows that almost 33% of Network (Layer 3&4) DDoS attacks exceeded 20 Gbps. At the same time, DDoS botnets used to wage Application (Layer 7) attacks are up by 240% compared to 2013. This report details our findings and insights into the latest DDoS attack trends.
Tags : threat, landscape, report, intelligent traffic, filtering, solutions, technology, ddos bots, security
     Incapsula
By: Polycom     Published Date: Jun 08, 2016
"Over the years, the features, functions, and capabilities offered by group video conferencing systems have expanded and evolved. And the requirements and expectations of collaboration users have changed along with them. This 2016 Buyers Guide helps end users understand the features and functions needed to collaboration-enable five of the most common spaces found in enterprises of all sizes; - small (huddle) rooms - teaming spaces - standard meeting rooms - executive boardrooms - reconfigurable (and perhaps divisible) spaces Download the ""2016 Buyers Guide: Making Smart Group Video Collaboration Decisions"" by Wainhouse Research that will help you make informed decisions regarding your video collaboration strategy."
Tags : best practices, budget, business optimization, business management, collaboration
     Polycom
By: JumpCloud     Published Date: Sep 29, 2014
Using Gmail? Still have Active Directory? Learn how to move your user directory to the cloud.
Tags : ldap, active directory, user management, idaas, iam, ssh access, linux, hosted ldap, gaps, gads, gmail, sso, configure ldap
     JumpCloud
By: Campaigner     Published Date: May 01, 2015
You worked hard creating great products, at least as hard growing a viable business to support them- and perhaps even harder building the interest and trust of all the subscribers who now welcome your marketing emails. With this white paper learn about the importance of A/B testing, which features to look for, how to get started, and how to increase your success rates.
Tags : content marketing, email marketing, smart content, data analytics, crm, customer engagement, email campaigns, a b testing, success rates
     Campaigner
By: Oracle     Published Date: Feb 14, 2013
HR is critical to a business' success. It's about find the best people at the lowest cost possible and the best possible performance. This new study conducted by HR.com explores what's working for organizations today and the biggest gaps to fill.
Tags : hr leadership, talent management role, core business strategy, filling in gaps, performance, cost, lowest cost
     Oracle
By: IBM     Published Date: Apr 04, 2016
Enterprises are trending toward hybrid IT operations, turning to the cloud and managed service providers to fill the gaps in complex IT environments. This demands a new generation of MSS, enabling on-premise and managed functions to be viewed and controlled as part of a common platform.
Tags : ibm, managed security services, hybrid it operations, security
     IBM
By: IBM     Published Date: Jul 20, 2016
This report maps out the vendor landscape for social collaboration technologies, to help you understand where you need to start, and what you should be looking for in a vendor to maximize success with your initiative.
Tags : ibm, enterprise social solutions, enterprise solutions, mwd advisors, social collaboration, vendors, vendor offerings, social collaboration technology
     IBM
By: IBM     Published Date: Sep 30, 2016
Address budget shortages and skills gaps with cloud-based Security Intelligence & Analytics. Use a Software-as-a-Service solution to replace aging security technologies and deploy a market leading solution in only weeks. Read how you can focus on monitoring the environment rather than updating software, and replace up-front capital costs with a monthly operational fee.
Tags : security
     IBM
By: Group M_IBM Q418     Published Date: Oct 02, 2018
Organizations are faced with providing secure authentication, authorization, and Single Sign On (SSO) access to thousands of users accessing hundreds of disparate applications. Ensuring that each user has only the necessary and authorized permissions, managing the user’s identity throughout its life cycle, and maintaining regulatory compliance and auditing further adds to the complexity. These daunting challenges are solved by Identity and Access Management (IAM) software. Traditional IAM supports on-premises applications, but its ability to support Software-as-a-Service (SaaS)-based applications, mobile computing, and new technologies such as Big Data, analytics, and the Internet of Things (IoT) is limited. Supporting on-premises IAM is expensive, complex, and time-consuming, and frequently incurs security gaps. Identity as a Service (IDaaS) is an SaaS-based IAM solution deployed from the cloud. By providing seamless SSO integration to legacy on-premises applications and modern cloud-
Tags : 
     Group M_IBM Q418
By: Hewlett-Packard     Published Date: Aug 02, 2013
If your organization is deploying a new server farm or cluster for any reason — a newly virtualized application or a growing business initiative, perhaps — this is the time to consider blade servers as a cost-effective alternative to traditional rack servers. In most use cases, you will find blade servers to be less expensive than rack servers for both the initial purchase as well as for long-term total cost of ownership (TCO). In addition, blades enable improvements in manageability, agility, scalability and power consumption.
Tags : blades, it costs, cost of ownership
     Hewlett-Packard
By: IBM     Published Date: Apr 20, 2017
IBM QRadar and BigFix solutions empower IT security teams to view, prioritize and respond to endpoint intelligence in near real time. How can an organization stay ahead of these advanced security threats? Maintaining a high level of baseline security by consistently enforcing security policies and patch levels on endpoints and servers is definitely required and important. But when networks can have multiple vulnerabilities per IP address at scan time, the slow process of mitigating and patching these weaknesses can result in dangerous security gaps. Today’s IT personnel have to make difficult, risk-based decisions on where to focus their efforts—often without having a complete picture of the security environment. This is even more critical when the number of vulnerabilities across the organization is increasing while the organization has limited resources and skills to fix the vulnerabilities.
Tags : risk management, vulnerability management, asset security, database accuracy, enterprise security, security solutions
     IBM
By: IBM     Published Date: May 01, 2017
If you function like most IT organizations, you've spent the past few years relying on mobile device management (MDM), enterprise mobility management (EMM) and client management tools to get the most out of your enterprise endpoints while limiting the onset of threats you may encounter. In peeling back the onion, you'll find little difference between these conventional tools and strategies in comparison to those that Chief Information Officers (CIOs) and Chief Information Security Officers (CISOs) have employed since the dawn of the modern computing era. Their use has simply become more: Time consuming, with IT trudging through mountains of endpoint data; Inefficient, with limited resources and limitless issues to sort through for opportunities and threats; and Costly, with point solution investments required to address gaps in OS support across available tools. Download this whitepaper to learn how to take advantage of the insights afforded by big data and analytics thereby usher i
Tags : ibm, endpoint management, mobile device management, enterprise mobility, os support, it organizations
     IBM
Start   Previous    7 8 9 10 11 12 13 14 15 16 17 18 19 20 21    Next    End
Search White Papers      

Add White Papers

Get your white papers featured in the insideBIGDATA White Paper Library contact: Kevin@insideHPC.com