HR Hero Your Employment Law Resource
 

lob

Results 326 - 350 of 2385Sort Results By: Published Date | Title | Company Name
Published By: QAD     Published Date: Jan 19, 2018
Desde ferramentas de automatização para oficinas até soluções empresariais globais, a QAD se converteu num sócio tecnológico de confiança, ajudando a reduzir as ineficiências e a incrementar a produtividade das empresas de manufatura em todo o mundo. Isto se deve às aplicações empresariais QAD estarem focadas e otimizadas especificamente para as seis indústrias altamente competitivas onde temos: automotivo, produtos de consumo, alimentos e bebidas, produtos industriais, eletrônica e farmaceutico.
Tags : 
    
QAD
Published By: PGi     Published Date: Nov 07, 2018
Pour résumer plus simplement, l’UX est ce qu’un individu ressent lorsqu’il interagit avec une solution, une plate-forme ou un appareil. L’interface utilisateur (UI) englobe quant à elle tous les éléments visuels que vous utilisez pour interagir avec une solution, une plate-forme ou un appareil. Cela inclut tous les éléments (écrans, pages, etc.), y compris les icônes et les boutons sur lesquels vous cliquez.
Tags : 
    
PGi
Published By: Alibaba Cloud SEA     Published Date: Mar 11, 2019
Customers have grown accustomed to high speeds and reliable connectivity. One second of network delay when accessing website, mobile app, or application service can increase your bounce rate and even decrease your customer’s trust in your brand. The typical business pain points per the above scenario are always like: Latency – While, latency problems caused by geographic distance are impossible to solve on the public Internet; Availability – Packet loss and complaints from customers can prevent you from increasing your user base; Cost - The growth of your user base and your business needs both outpace your IT budget. Security - Connections over the public Internet are vulnerable to DDoS attacks and other threats. This whitepaper describes: • Challenges that Magic Video faced before implementing Alibaba Cloud’s solutions • How Alibaba Cloud’s solutions help Magic Video build a global hybrid enterprise network, accelerate content delivery of the application, and maximize bandwidth?
Tags : 
data center, cloud computing, networking, security, china, global expansion
    
Alibaba Cloud SEA
Published By: Alibaba Cloud SEA     Published Date: Mar 11, 2019
Many businesses are adopting a multi-cloud infrastructure. However, managing data and communication between multiple cloud environments is often challenging and complex. Therefore, companies often try to find a technical partner that can help them. Companies with on-premise data centers need some type of interconnect to access their products and services hosted on the cloud. The traditional Virtual Private Network (VPN) connection method usually can’t meet enterprise speed,stability, security, and compliance requirements.This whitepaper describes the challenges that companies face when building dedicated connections between different cloud environments and how Alibaba Cloud’s Express Connect is the perfect solution for them
Tags : 
data center, cloud computing, networking, security, china, global expansion
    
Alibaba Cloud SEA
Published By: Alibaba Cloud SEA     Published Date: Mar 11, 2019
This whitepaper provides an overview of how Craigs International leveraged Alibaba Cloud’s technology solutions, including Cloud Enterprise Network (CEN), Virtual Private Network (VPN) Gateway, and Smart Access Gateway (SAG), to build a global enterprise network. Alibaba Cloud’s solutions helped them improve business operations, increase efficiency, maximize profitability, and reduce OPEX and CAPEX costs. Craigs International wants to move to the cloud to build a global hybrid enterprise network by partnering with a technology player that has such solid experience within Mainland China.
Tags : 
data center, cloud computing, networking, security, china, global expansion
    
Alibaba Cloud SEA
Published By: HP Inc.     Published Date: May 29, 2019
Drawing on industry research, we’ve put together this easy-to-read report on the top seven trends driving the printing industry.
Tags : 
    
HP Inc.
Published By: Rohde & Schwarz Cybersecurity     Published Date: Nov 28, 2017
According to many market research analysts, the global wireless access point (WAP) market is anticipated to continue its upward trajectory and to grow at an impressive compound annual growth rate (CAGR) of approximately 8% through 2020. Many enterprises are utilizing cloudcomputing technology for cost-cutting purposes, eliminating investments required for storage hardware and other physical infrastructures. With significant growth expected in Internet usage, particularly bandwidth consuming video traffic, WAP vendors need to enable their customers to monitor and improve device performance, improve end user experience, and enhance security. These customers include general enterprises that offer Internet access to patrons like airports, hotels, retail / shopping centers and so on. These external Internet access providers can differentiate themselves by offering optimum service through advanced network analytics, traffic shaping, application control, security capabilities and more.
Tags : 
utilization, challenges, dpi, benefits, airport, public, wifi, qoe
    
Rohde & Schwarz Cybersecurity
Published By: Larsen & Toubro Infotech(LTI)     Published Date: Apr 22, 2019
A global media conglomerate was facing issues with their existing operating model -stagnant quality of support, lack of innovation and inferior/deteriorating end user experience. LTI’s Amplified Outcomes Model - Mosaic helped deliver TCO reduction, coupled with enhanced user experience.
Tags : 
    
Larsen & Toubro Infotech(LTI)
Published By: Larsen & Toubro Infotech(LTI)     Published Date: Apr 29, 2019
LTI’s REDaxis Solution has helped a Global CPG Major attain Improved Cash Collection and Accounts Receivable Productivity by Identifying opportunity areas and enabled workflow-driven approach. It also helped in DSO reduction, reduced TCO and more than 40% productivity improvement.
Tags : 
    
Larsen & Toubro Infotech(LTI)
Published By: MalwareBytes EMEA     Published Date: May 10, 2019
Ransomware has taken the world by storm. CryptoWall extorted an estimated $18 million, and WannaCry locked up more than 230,000 computers across the globe in 2017. Companies of all sizes are sitting up and taking notice. Even brands with a strong security investment have fallen victim. We’ve seen ransomware cripple businesses: nearly 19% of businesses stop operations immediately after discovering a ransomware attack.1 Hospital emergency rooms forced to turn people away; global shipping logistics experience massive disruption; and even a summer blockbuster movie held up for ransom. The FBI estimates ransomware is now a billion-dollar business. Ransomware has been around for a while, and it has spiked in recent years. It secured 5th place as the most common variety of malware in 2017, up from 22nd place in 2014.2 Originally ransomware targeted individuals and was considered a consumer nuisance. It has now become a business menace.
Tags : 
    
MalwareBytes EMEA
Published By: Silver Peak     Published Date: Apr 12, 2016
This white paper illustrates how the integration of zero touch provisioning with EdgeConnect profiles, and the further integration of local profiles into the global business intent of Silver Peak’s virtual overlays, fulfills the promise of SD-WAN with virtualised wide area networking.
Tags : 
security, integration, wan, software defined wan, edgeconnect, virtualisation, networking
    
Silver Peak
Published By: Skillsoft     Published Date: Apr 27, 2015
To compete in today’s global marketplace, employees at every level of your organisation need to understand the risks associated with a broad spectrum of compliance issues and feel empowered to make the right decisions - even when no one is watching.
Tags : 
skillsoft, conduct programme, compliance training programme, workplace, risk, compliance issues, culture of workplace, elearning
    
Skillsoft
Published By: Skillsoft     Published Date: May 19, 2015
This paper shows how companies may be overlooking is how quickly the landscape is changing—and how this dynamic shift can affect corporate compliance initiatives.
Tags : 
business corruption, complaince training, skillsoft, anti-corruption training, employee corruption training, changing landscape of corruption
    
Skillsoft
Published By: Juniper Networks     Published Date: Oct 25, 2017
My name is Jonathan McCaffrey and I work on the infrastructure team here at Riot. This is the first post in a series where we’ll go deep on how we deploy and operate backend features around the globe. Before we dive into the technical details, it’s important to understand how Rioters think about feature development. Player value is paramount at Riot, and development teams often work directly with the player community to inform features and improvements. In order to provide the best possible player experience, we need to move fast and maintain the ability to rapidly change plans based upon feedback. The infrastructure team’s mission is to pave the way for our developers to do just that - the more we empower Riot teams, the faster features can be shipped to players to enjoy.
Tags : 
technology efficiency, market dynamics, data privacy, data security, device management, platform management, enterprise management
    
Juniper Networks
Published By: Absolute Software     Published Date: May 31, 2016
The US healthcare industry has historically lagged behind others in the maturity of security capabilities, only recently catching up on data security and privacy in response to HIPAA. But there is a wide range of other mounting risks unique to healthcare that S&R pros in healthcare can’t ignore — greater regulatory pressure, increasing targeted attacks, the frightening uncertainty of IoT security, and global economic pressures. This report outlines the most important security capabilities for security leaders in this sector to implement in the face of these challenges.
Tags : 
healthcare, security capabilities, data security, best practices, security
    
Absolute Software
Published By: IBM UK - ISM&S Storage     Published Date: Nov 15, 2011
To maintain its position at the forefront of international research, the Institute for Computational Cosmology at Durham University wanted to develop a new high-performance computing cluster - find out how they did it.
Tags : 
super comupter, computations, cosmology, delivery, infrastructure, energy, green computing, performance
    
IBM UK - ISM&S Storage
Published By: Adobe     Published Date: Jul 09, 2014
The 2014 Digital Trends report from Econsultancy and Adobe is based on a global survey of more than 2,500 marketers and internet professionals carried out at the end of 2013.
Tags : 
digital trends 2014, digital trends report, adobe digital trends
    
Adobe
Published By: Adobe     Published Date: Aug 05, 2014
In 2014, there will be more than 2 billion smartphones global. Mobile is becoming not on the new digital hub but also the bridge to the physical world. That's why mobile will affect more than just your digital operations- it will transform your entire business. 2014 will be the year that companies increase investments to transform their business with mobile as a focal point. This fifth annual mobile trends report highlights new mobile trends that we expect to see this year as well as some over hyped topics that we believe will fail to provide real business value in the short term.
Tags : 
forrester, mobile trends, mobile, digital operations, business value, smartphones
    
Adobe
Published By: Adobe     Published Date: Feb 03, 2015
This Benchmark report evaluates digital advertising activity, predicts trends of Social Media and Online Advertising.
Tags : 
digital advertising report, search marketing
    
Adobe
Published By: Adobe     Published Date: Feb 03, 2015
This Benchmark report evaluates digital advertising activity, predicts trends of Social Media and Online Advertising.
Tags : 
digital advertising report, search marketing
    
Adobe
Published By: Pinstripe     Published Date: Aug 21, 2012
The current economic climate makes now the ideal time to consider the financial and operational benefits of an external recruitment provider.
Tags : 
custom recruitment, employee recruitment, employee retention, executive recruiters, global recruiting, global talent acquisition, hr outsourcing, hr recruiting
    
Pinstripe
Published By: Mimecast     Published Date: Oct 17, 2013
Mimecast commissioned Forrester Consulting to examine the total economic impact and potential return on investment (ROI) global enterprises may realize by using Mimecast’s Unified Email Management (UEM) solution. The purpose of this study is to provide readers with a framework to evaluate the potential financial impact of the full Mimecast UEM service on their organizations. Mimecast UEM is a suite of email security, archiving, and continuity services, which can also be purchased separately if required.
Tags : 
mimecast, forrester research, unified email management, uem, economic impact, return on investment, roi, evaluate financial impact
    
Mimecast
Published By: Prophix     Published Date: May 31, 2016
For over 25 years, Prophix has served as a valuable partner to professionals in corporate Finance departments around the globe. In so doing, Prophix has continuously developed, tested, and refined technology solutions that help companies become more profitable, more efficient, and more future-ready.
Tags : 
prophix, finance, technology solution, profitable, productivity, software development
    
Prophix
Published By: NAVEX Global     Published Date: Aug 18, 2016
In 2015, NAVEX Global partnered with an independent research agency to survey ethics and compliance professionals with responsibility for administering training across their organizations. The goal was to determine their top priorities and challenges. The findings represent responses from 677 individuals responsible for ethics and compliance programs.
Tags : 
compliance programmes, compliance, ethics, compliance programme, risks, ethics and compliance programme, risk areas
    
NAVEX Global
Published By: NAVEX Global     Published Date: Aug 18, 2016
This Cyber Security Awareness Kit illustrates how to make your organisation more secure by neutralizing the leading cause of cyber security risk: your employees.
Tags : 
cyber attack, risk, cyber security, cyber criminals, cyber risks, security, security application, cyber security awareness kit
    
NAVEX Global
Start   Previous    7 8 9 10 11 12 13 14 15 16 17 18 19 20 21    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Social Networks:
Employers Forum
facebook
Twitter
YouTube
© 2019 BLR®—Business & Legal Resources. All rights reserved. 800-274-6774


Infinite Menus, Copyright 2006, OpenCube Inc. All Rights Reserved.