Find White Papers
Home
About Us
List Your Papers
    

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.

hr data

Results 276 - 300 of 1236Sort Results By: Published Date | Title | Company Name
Published By: Lenovo - APAC     Published Date: Jul 08, 2019
Don’t lose unnecessary time coping with attacks, threats and theft. Lenovo ThinkShield is a comprehensive security portfolio that brings you end-to-end protection. In your solutions guide, you’ll find out the benefits of ThinkShield, how to ensure your data stays secure, how to keep employees stay safe online and some important statistics on the rise of cyber attacks. It’s time to act before your next attack, read the guide to find out what to do next. Read the guide
Tags : 
    
Lenovo - APAC
Published By: Trifacta     Published Date: Oct 25, 2018
The rise of the self-service analytics era has called for a more flexible, iterative approach to data preparation. But as you and your team look to invest in modern data preparation solutions, understanding how to best evaluate these technologies can be difficult. In Ovum’s first Decision Matrix report on self-service data preparation, analyst Paige Bartley takes a comprehensive look at the eight major data preparation vendors by assessing each company’s technology and execution. Download this report to learn: Which vendors Ovum ranks as leaders in self-service data prep The strengths, weaknesses, opportunities and threats of all 8 data prep vendors A detailed overview of the criteria Ovum utilized in their evaluation
Tags : 
    
Trifacta
Published By: Gigamon     Published Date: Dec 13, 2018
Read "Understanding the State of Network Security Today" to learn why ESG recommends consolidating security tools through a structured, platform-based approach. Data, analytics and reports from multiple tools can be aggregated and consumed in one control panel, reducing network vulnerabilities. Learn more about challenges, changes and best practices for today’s network security operations and tools. Read now.
Tags : 
    
Gigamon
Published By: Cloudreach     Published Date: Apr 02, 2019
Why data analytics initiatives are worth the investment
Tags : 
    
Cloudreach
Published By: Intel     Published Date: Dec 13, 2018
In today’s world, advanced vision technologies is shaping the next era of Internet of Things. However, gathering streaming video data is insufficient. It needs to be timely and accessible in near-real time, analyzed, indexed, classified and searchable to inform strategy—while remaining cost-effective. Smart cities and manufacturing are prime examples where complexities and opportunities have been enabled by vision, IoT and AI solutions through automatic meter reading (AMR), image classification and segmentation, automated optical inspection (AOI), defect classification, traffic management solution—just to name a few. Together, ADLINK, Touch Cloud, and Intel provide a turnkey AI engine to assist in data analytics, detection, classification, and prediction for a wide range of use cases across a broad spectrum of sectors. Learn more about how the Touch Cloud AI brings cost savings, operational efficiency and a more reliable, actionable intelligence at the edge with transformative insi
Tags : 
    
Intel
Published By: Intel     Published Date: Dec 13, 2018
Technology plays a key role in online shopping, where online retailers gain a greater understanding of their customers through data from their browsing and purchasing habits. Today, when consumers shop in brick-and-mortar stores, they expect the same personalized and responsive service. To help retailers achieve this level of service, a combination of hardware and software—Intel® Vision Accelerator Design products, cameras, AI deep learning video analysis technology— do the work for you. Uncover how Advantech system uses the Intel Vision Accelerator Design with Intel Movidius VPU to drive • Overall store performance such as the number of visitors and transactions, point-of-sale data, sales per shopper and the store’s ranking, and can distinguish traffic patterns by weather and time of day • Traffic and sales analysis for better staff allocation and marketing-event planning • Store heatmap analysis for more precise merchandise placement and product promotion
Tags : 
    
Intel
Published By: IBM APAC     Published Date: Mar 06, 2019
The 2019 IBM X-Force Threat Intelligence Index looks back at the threats, tactics, and trends that emerged in 2018 based on insights from IBM X-Force Security Research Team. Deriving data and insights from security clients, incident response services and penetration testing engagements, the IBM X-Force Threat Intelligence Index 2019 report outlines the most prominent threats and provides key insights into various industries, attack tactics, and major vulnerabilities that emerged during the year.
Tags : 
    
IBM APAC
Published By: IBM APAC     Published Date: Mar 06, 2019
A cyber resilient enterprise is one that can prevent, detect, contain and recover from a myriad of serious threats against data, applications and IT infrastructure. The Ponemon Institute and IBM surveyed more than 2,848 IT and IT security professionals from around the world and released the findings of the third annual study on the importance of cyber resilience for a strong security posture.
Tags : 
    
IBM APAC
Published By: Oracle Security Solutions     Published Date: Oct 20, 2017
Organizations face onboarding risks of BYOS (Bring Your Own Service) as they hire new employees that bring their own cloud services into the work environment. Risks facing IT and security teams include protecting corporate data and defending against modern threats. While IT and Security teams want to adopt modern cloud applications and increase business agility, they also want to implement visibility and monitoring to protect corporate data and comply to security policies. This session will highlight how new methodologies available today enable organizations to discover sanctioned and un-sanctioned cloud services that are being used within their organization, and how they can apply consistent security policies across the public and private cloud to protect corporate data and conform to compliance policies.
Tags : 
    
Oracle Security Solutions
Published By: Dell & Microsoft     Published Date: Feb 01, 2013
In this Technology Adoption Profile we explore the current state of replication in SMB IT departments and in particular the use of SAN-based replication. We find strong demand for both synchronous and asynchronous SAN-based replication, as well as the need to replicate data within the SMB’s own data center facilities, either to a colocated secondary array or to one within 5 km [approximately 3 miles](a campus or metro-style deployment). We also find that in order for SMBs to protect more data using replication, they need replication solutions that are non-disruptive, easy to use, and inexpensive.
Tags : 
data, san-based replication, synchronous, asynchronous
    
Dell & Microsoft
Published By: HERE Technologies     Published Date: Nov 07, 2018
The United Nations predicts that by 2050 an additional 2.5 billion people will live in towns and cities, with 90% of this increase happening in African and Asia. With congestion already a challenge on many city roads how will we keep our megacities moving and quality of life high for their populations? As one of the world’s leading location platform in 2018, HERE shares location data, insights, tools and services to keep people and traffic flowing through cities and countries around the world. This eBook explains how accurate traffic data can help megacities of today and the future.
Tags : 
public sector, urbanization, traffic management
    
HERE Technologies
Published By: athenahealth     Published Date: Apr 30, 2013
With the right EHR in place, participation in health care quality management programs not only helps you provide great care to your patients, but can also help increase your bottom line. However, the rewards are only worth seeking if the cost—in time and money—of collecting and reporting data to these quality programs doesn't outrun the potential gain. This is where your EHR and the services provided by your EHR vendor can make a significant difference.
Tags : 
quality management, ehr, collection, patient care, quality of care, data, monitoring, analytics
    
athenahealth
Published By: athenahealth     Published Date: Apr 30, 2013
Traditional EMRs consistently fail to help physicians make more money, do less work, and deliver better care. High up-front fees with traditional EMRs are one factor, but the greatest problem with traditional EMRs is that they are designed without an understanding of the fundamental economics of a patient encounter.
Tags : 
patient workflow, ehr, physician, meaningful use, analytics, data
    
athenahealth
Published By: athenahealth     Published Date: Apr 30, 2013
In 2009, athenahealth undertook a lean mapping study of 25 providers at twelve diverse practices. This whitepaper leverages that study and best practices to provide the following five tips for establishing a clinical workflow that takes full advantage of the EHR and boosts productivity.
Tags : 
ehr, electronic health record, analytics, data, best practices, clinical workflow
    
athenahealth
Published By: athenahealth     Published Date: Apr 30, 2013
Struggling to keep its independence, Wilson Stream Family Practice needed to improve financial efficiency and data management. With athenahealth's medical billing and EHR services, the practice was able to organize clinical data, make patient visits more efficient, and improve overall quality of care.
Tags : 
ehr, electronic health record, analytics, data, best practices, clinical workflow
    
athenahealth
Published By: HERE Technologies     Published Date: Mar 22, 2019
Supply chain managers are increasingly leveraging location intelligence and location data to raise visibility throughout their whole logistics process and to optimize their delivery routes. Leveraging this data requires an ever-more-robust technology stack. Marketplace pressure and consumer demands for one-day shipping and tracking capabilities make implementing the right technology even more critical. As supply chain technology stacks become more complex, diverse and defined by legacy system integrations, Application Program Interfaces (APIs) are becoming essential to making stacks scale, allowing supply chain managers to better meet the demands of the new generation of consumers. Innovative location APIs that provide supply chain stacks and applications with greater agility, contextual intelligence, real-time data implementation, speed and scale are turning the process of moving goods from A to B into a well-orchestrated exercise in precision. Introducing new technology into an organization can sometimes be daunting. As one of the world’s leading location platforms, HERE shares insights and tips to streamline the supply chain technology integration across the whole organization.
Tags : 
auto, mapping, location data
    
HERE Technologies
Published By: HERE Technologies     Published Date: Mar 25, 2019
In the future, people won’t necessarily want to own cars, but they’ll need personal mobility. The mobility ecosystem can support a range of different services, but in the near-term, many of these nascent businesses face a range of operational challenges as they bid to grow and become profitable. This ebook explores the fundamental needs of new mobility providers as they target business improvements, looks at their considerations as they forge key technology partnerships, and shows how HERE's Auto Mobility Operations solution can help mobility services meet those requirements. This ebook will help you understand how Auto Mobility Operations helps: • Enable the creation and integration of key location features as applications for mobile operating systems through use of the HERE Mobile SDK • Manage and efficiently operate fleet assets with HERE Location Services, providing fresh, high-quality and global location-based data • Create a frictionless and compelling UX - with APIs, mapping
Tags : 
auto, mapping, location data
    
HERE Technologies
Published By: HERE Technologies     Published Date: Jul 11, 2019
Supply chain managers are increasingly leveraging location intelligence and location data to raise visibility throughout their whole logistics process and to optimize their delivery routes. Leveraging this data requires an ever-more-robust technology stack. Marketplace pressure and consumer demands for one-day shipping and tracking capabilities make implementing the right technology even more critical. As supply chain technology stacks become more complex, diverse and defined by legacy system integrations, Application Program Interfaces (APIs) are becoming essential to making stacks scale, allowing supply chain managers to better meet the demands of the new generation of consumers. Innovative location APIs that provide supply chain stacks and applications with greater agility, contextual intelligence, real-time data implementation, speed and scale are turning the process of moving goods from A to B into a well-orchestrated exercise in precision. Introducing new technology into an org
Tags : 
here technologies, supply chain, mapping
    
HERE Technologies
Published By: Hitachi Vantara     Published Date: Aug 14, 2018
In this book, we are going to look at the key trends driving the modernization of data infrastructure. We’ll see how organizations are adapting and flourishing in a data-driven world. For some time, headlines have been around the internet of things (IoT), big data and data analytics. While these developments are important, the reality is that you cannot take full advantage of them without modernization. We’re going to look at these trends and priorities in detail, then look at the three key drivers of modernization: governance, mobilization and analytics. We’ll also consider the technologies that make up modern data infrastructure including artificial intelligence (AI), flash storage, converged and hyperconverged platforms and software-defined infrastructures. By making sense of data, we make sense of the world. With more data than ever before, we have the tools to turn all that information into intelligent innovation and change the way the world works.
Tags : 
data infrastructure, big data, internet of things
    
Hitachi Vantara
Published By: Cisco     Published Date: Nov 18, 2015
According to the United Nations, on average, more than 200 million people were affected and more than 70,000 were killed by natural disasters annually. Given the fact that one of the primary responsibilities of government is to protect the public and minimize the effects of such calamities, citizens now demand that public-sector safety organizations be proactive, and respond promptly and effectively to all types of crisis situations, including catastrophes, terror events, and threats to critical infrastructure. To effectively respond to these challenges, public safety agencies must be able to rely on secure networks with integrated voice, video, and data capabilities. With these networks and their associated assets, agencies can obtain more timely and accurate information, enhancing situational awareness and improving response times.
Tags : 
cisco, public safety, disaster response, networking, security
    
Cisco
Published By: Mimecast     Published Date: Jan 16, 2019
Employees frequently become unwitting participants in attacks, aiding the lateral movement of threats through the distribution of malicious URLS and attachments or the exposure of sensitive data. In this E-book, we’ll take a closer look into several email-related activities that employees often engage in that contribute to the spread of these insider (“hidden”) threats and then discuss what measures your organization can take to protect itself from these “hidden” threats.
Tags : 
    
Mimecast
Published By: Cisco Umbrella EMEA     Published Date: Oct 22, 2018
Can your organization afford to wait until after an attack happens to protect your users and your data? Perimeter security provides visibility and control for employee activity only when employees remain on a corporate network. What about roaming users who bypass the VPN? Or employees working in cloud applications? Web gateways only protect employees from threats over web ports 80 and 443. Today’s security must provide comprehensive protection across all ports and protocols to fill the gaps in the security stack. Hear from Eric Ahlm, Research Director at Gartner and Meg Diaz, Head of Product Marketing for Cisco Umbrella. Eric and Meg will address the challenges companies face as they compare modern convenience with the known risks of relinquishing visibility and control, especially as more sensitive data moves to the cloud. Join us for the guidance you need to stay ahead of the curve in 2018. We’ll discuss the right answer for protecting data in the digital age.
Tags : 
    
Cisco Umbrella EMEA
Published By: Cisco Umbrella EMEA     Published Date: Dec 03, 2018
Case study Objective: Enhance the customer experience by building automation into the security practice. Impact: • Decreased incident response time from days to minutes through automation, enabled by the Investigate API • Reduction in network security incidents and infected endpoints • Increased protection against malware, ransomware, and other threats on and off the network • Enriched security event data and threat intelligence with Investigate Download this case study today to find out the impact Cisco Umrella could have on your business.
Tags : 
    
Cisco Umbrella EMEA
Published By: KPMG     Published Date: Jun 06, 2019
HR’s most confident leaders are using data, predictive insights and AI to transform HR into a new value driver. Discover what it takes to become an HR transformation trailblazer. Read this report to discover: • how trailblazers are exploiting uncertainty to drive new competitive advantage • which technologies HR leaders are investing in • what it means to integrate human and digital labour in a collaborative workplace • six priorities for forward-looking HR leaders.
Tags : 
    
KPMG
Published By: IBM     Published Date: Jul 26, 2017
Business leaders are eager to harness the power of big data. However, as the opportunity increases, ensuring that source information is trustworthy and protected becomes exponentially more difficult. If not addressed directly, end users may lose confidence in the insights generated from their data—which can result in a failure to act on opportunities or against threats. Information integration and governance must be implemented within big data applications, providing appropriate governance and rapid integration from the start. By automating information integration and governance and employing it at the point of data creation, organizations can boost confidence in big data. A solid information integration and governance program must become a natural part of big data projects, supporting automated discovery, profiling and understanding of diverse data sets to provide context and enable employees to make informed decisions. It must be agile to accommodate a wide variety of data and seamle
Tags : 
mdm, big data, automation, organization
    
IBM
Start   Previous    5 6 7 8 9 10 11 12 13 14 15 16 17 18 19    Next    End
Search