it analytics

Results 276 - 300 of 1726Sort Results By: Published Date | Title | Company Name
Published By: Success Factors     Published Date: Feb 16, 2012
Attracting the best talent is a never-ending challenge. Learn five strategies for getting ahead, even in the worst business environments. Get your report now, compliments of SuccessFactors.
Tags : 
employee performance, high performance culture, high performing workforce, smart goals, performance reviews, goal setting, performance management, business strategy, business execution, strategy execution, business strategy software, business results, talent management, learning management, recruiting management, workforce planning, workforce analytics, succession planning, compensation, core competencies
    
Success Factors
Published By: Success Factors     Published Date: Feb 16, 2012
With today's shortage of critical talent, strategic workforce planning is one of HR's most important responsibilities. Discover the common pitfalls that trap many companies-and how to avoid them. Get your compliments report from SuccessFactors now.
Tags : 
employee performance, high performance culture, high performing workforce, smart goals, performance reviews, goal setting, performance management, business strategy, business execution, strategy execution, business strategy software, business results, talent management, learning management, recruiting management, workforce planning, workforce analytics, succession planning, compensation, core competencies
    
Success Factors
Published By: Success Factors     Published Date: Feb 16, 2012
These days, a company success depends on whether it hired the right people to effectively execute its strategies. Download this paper, compliments of SuccessFactors, and learn the critical questions you should ask before interviewing talent.
Tags : 
employee performance, high performance culture, high performing workforce, smart goals, performance reviews, goal setting, performance management, business strategy, business execution, strategy execution, business strategy software, business results, talent management, learning management, recruiting management, workforce planning, workforce analytics, succession planning, compensation, core competencies
    
Success Factors
Published By: Teradata     Published Date: Jan 28, 2015
Althrough Hadoop and related technologies have been with us for several years, most business intelligence (BI) professionals and their business counterparts still harbor a few misconceptions that need to be corrected about Hadoop and related technologies such as MapReduce. This webcast presents the 10 most common myths about Hadoop, then corrects them. The goal is to clarify what Hadoop is and does relative to BI, as well as in which business and technology situations Hadoop-based BI, data warehousing and analytics can be useful.
Tags : 
teradata, business, intelligence, hadoop, data, integration, analytics, mapreduce, warehouse
    
Teradata
Published By: Teradata     Published Date: Jan 30, 2015
This TDWI Checklist Report discusses adjustments to DW architectures that real-world organizations are making today, so that Hadoop can help the DW environment satisfy new business requirements for big data management and big data analytics.
Tags : 
data, data warehouse, hadoop, hadoop ecosystem, data architectures, data archiving, advanced analytics, data management, data center
    
Teradata
Published By: Teradata     Published Date: Jan 30, 2015
Hadoop is the rising star of the business technology agenda for a simple reason — it disrupts the economics of data, analytics, and someday soon, all enterprise applications; it is secretly becoming an application platform too. Application development and delivery (AD&D) professionals should be aware of and take action on these eight predictions, including the disruptive power of “Hadooponomics,” Hadoop’s current killer app, the closing data management gap, and the emergence of brand new distros.
Tags : 
hadoop, hadoop adoption, cornerstone, business technology, hadooponomics, enterprise adoption, applications, data management
    
Teradata
Published By: Teradata     Published Date: Jan 30, 2015
Enterprise Hadoop Implementation with Teradata and Hortonworks
Tags : 
ncr, big data, data warehouse, enterprise hadoop, hadoop implementation, teradata, hortonworks, performance data, data management
    
Teradata
Published By: Genesys     Published Date: Dec 11, 2013
Gartner recently released its Magic Quadrant for Contact Center Workforce Optimization, the annual report analyzing the workforce optimization industry. Gartner positions vendors based on Completeness of Vision and Ability to Execute. Genesys improved its 2013 position moving from Niche Player to the Challengers Quadrant. This report provides you with insights you need to determine the Workforce Optimization Solution that is right for your organization. Read Now.
Tags : 
wfo, strategic planning, recruitment, workforce management, wfm, call recording and quality management, performance management, surveying, interaction analytics, magic quadrant, workforce optimization, genesys, networking, knowledge management, business technology
    
Genesys
Published By: CEB     Published Date: May 09, 2013
What will differentiate the best HR leaders? Learn the three key trends you need to address over the next year that will unlock the potential for deeper contribution to your business.
Tags : 
talent assessment, workforce planning, succession management, human capital analytics, hr metrics, network performance
    
CEB
Published By: CEB     Published Date: Jun 19, 2013
What will differentiate the best HR leaders? Learn the three key trends you need to address over the next year that will unlock the potential for deeper contribution to your business.
Tags : 
talent assessment, workforce planning, succession management, human capital analytics, hr metrics, network performance
    
CEB
Published By: Arbor Networks     Published Date: Mar 13, 2015
The ground has shifted under most enterprise IT security staff. Breaches are now capturing prime-time air across mainstream media outlets. As the world becomes more connected, it is no longer enough for enterprises to react once an alert indicates an attacker is inside the network. Instead, with continuous packet capture and threat feeds followed by analysis, it is now possible to hunt the attackers and locate them versus waiting for an alert. Experienced security leaders are forming internal teams directed to stop waiting for alerts to indicate there’s a problem and to go hunt for the attacker. Read this white paper to learn: • Why waiting for an alert, signaling an attack may be underway, is no longer a good option • Why using security analytics technology will help you make faster and more accurate decisions across complex networks • How Pravail Security Analytics simplifies analysts’ workload via real-time and historical deep inspection to uncover possible pre-existing compromise
Tags : 
security, enterprise, attacks
    
Arbor Networks
Published By: NetApp     Published Date: Mar 05, 2018
Read this vendor assessment from IDC and find out about the suitability of 10 vendors' AFA platforms for dense mixed enterprise workload consolidation. Discover the areas where the most differentiation between vendors was noted, including their strategies around NVMe and cloud-based predictive analytics.
Tags : 
netapp, database performance, flash storage, data management, cost challenges
    
NetApp
Published By: Aternity     Published Date: May 18, 2015
This whitepaper provides an overview of Aternity Virtual Desktop Monitoring and how it monitors end user experience in a VDI environment. Aternity goes well beyond traditional Virtual Desktop Infrastructure assessment tools that are primarily focused on planning and testing virtual deployments. Aternity provides in-depth monitoring of end user experience in a production environment spanning tens of thousands of business users.
Tags : 
enterprise mobility, enterprise mobility management, application performance analytics, application performance monitoring, desktop management, desktop monitoring, end user experience, end user experience monitoring, end user experience management, infrastructure monitoring, it performance analytics, it service management, it service optimization, mobile application management, mobile end user experience, mobile user experience, sla management, mobile app monitoring, virtual desktop monitoring, vdi
    
Aternity
Published By: Aternity     Published Date: May 19, 2015
Read this whitepaper to navigate through the End User Experience Monitoring (EUEM) landscape. Learn how traditional APM and device monitoring products provide some aspects of End User Experience Monitoring, but can often leave enterprise IT Ops teams blind to what their workforce users are actually experiencing.
Tags : 
enterprise mobility, enterprise mobility management, application performance analytics, application performance monitoring, desktop management, desktop monitoring, end user experience, end user experience monitoring, end user experience management, infrastructure monitoring, it performance analytics, it service management, it service optimization, mobile application management, mobile end user experience, mobile user experience, sla management, mobile app monitoring, virtual desktop monitoring, vdi
    
Aternity
Published By: Aternity     Published Date: May 22, 2015
“ This 30-minute webinar that will help you navigate the EUEM landscape and learn how traditional APM and device monitoring products provide some aspects of End User Experience Monitoring, but can often leave enterprise IT Ops teams blind to what their users are actually experiencing.
Tags : 
enterprise mobility, enterprise mobility management, application performance analytics, application performance monitoring, desktop management, desktop monitoring, end user experience, end user experience monitoring, end user experience management, infrastructure monitoring, it performance analytics, it service management, it service optimization, mobile application management, mobile end user experience, mobile user experience, sla management, mobile app monitoring, virtual desktop monitoring, vdi
    
Aternity
Published By: Pegasystems     Published Date: May 02, 2016
This report, sponsored by Accenture and Pegasystems, explores how companies are managing their digital transformation initiatives, their goals, drivers and challenges, and how they are boosting their digital capabilities.
Tags : 
pegasystems, digital transformation, analytics, mobile marketing, social media, digitisation, business technology
    
Pegasystems
Published By: AWS     Published Date: Jun 15, 2016
Netflix, one of the world’s leading Internet television networks, is using AWS to deliver billions of hours of content monthly, and run its analytics platform for optimum performance of its global service.
Tags : 
    
AWS
Published By: CA Technologies     Published Date: Jun 26, 2017
Privileged user accounts—whether usurped, abused or simply misused—are at the heart of most data breaches. Security teams are increasingly evaluating comprehensive privileged access management (PAM) solutions to avoid the damage that could be caused by a rogue user with elevated privileges, or a privileged user who is tired, stressed or simply makes a mistake. Pressure from executives and audit teams to reduce business exposure reinforces their effort, but comprehensive PAM solutions can incur hidden costs, depending on the implementation strategy adopted. With multiple capabilities including password vaults, session management and monitoring, and often user behavior analytics and threat intelligence, the way a PAM solution is implemented can have a major impact on the cost and the benefits. This report provides a blueprint for determining the direct, indirect and hidden costs of a PAM deployment over time.
Tags : 
    
CA Technologies
Published By: CA Technologies     Published Date: Jul 20, 2017
Mainframes continue to provide high business value by combining efficient transaction processing with high-volume access to critical enterprise data. Business organizations are linking mobile devices to mainframe processing and data to support digital applications and drive business transformation. In this rapidly growing scenario, the importance of providing excellent end-user experience becomes critical for business success.This analyst announcement note covers how CA Technologies is addressing the need for providing high availability and a fast response time by optimizing mainframe performance with new machine learning and analytics capabilities.
Tags : 
    
CA Technologies
Published By: CA Technologies     Published Date: Jun 01, 2018
Privileged user accounts—whether usurped, abused or simply misused—are at the heart of most data breaches. Security teams are increasingly evaluating comprehensive privileged access management (PAM) solutions to avoid the damage that could be caused by a rogue user with elevated privileges, or a privileged user who is tired, stressed or simply makes a mistake. Pressure from executives and audit teams to reduce business exposure reinforces their effort, but comprehensive PAM solutions can incur hidden costs, depending on the implementation strategy adopted. With multiple capabilities including password vaults, session management and monitoring, and often user behavior analytics and threat intelligence, the way a PAM solution is implemented can have a major impact on the cost and the benefits. This report provides a blueprint for determining the direct, indirect and hidden costs of a PAM deployment over time.
Tags : 
    
CA Technologies
Published By: GE Power     Published Date: Sep 16, 2016
In this eBook learn how power leaders are leveraging Asset Performance Management (APM) to drive less unplanned downtime, safer operations and a competitive edge with data and predictive analytics.
Tags : 
general electric, apm, asset performance management, performance management, operations, data analytics
    
GE Power
Published By: Veritas     Published Date: Jan 04, 2019
The digital business continues to evolve. Investments in data analytics projects lead the way while traditional, proprietary infrastructures are being disrupted by cloud, open source and hyperconverged paradigms. These changes are forcing IT leaders to contend with greater workload diversity in the midst of tightening budgets. And while the workload [or] IT landscape is changing, the need for reliable data protection remains as crucial as ever to protect against, data corruption, human error, and malicious threats such as ransomware. Learn how Veritas can help you navigate through these obstacles. Join us to hear experts from ESG and Veritas discuss how the right data protection solution today can prepare you for tomorrow's business demands. You will learn: The key trends that are driving change in the digital business The most common causes of data loss in tomorrow’s multi-cloud data centers How to protect an increasingly diverse environment with minimal operational overhead
Tags : 
    
Veritas
Start   Previous    5 6 7 8 9 10 11 12 13 14 15 16 17 18 19    Next    End
Search      

Add A White Paper

Email sales@inetinteractive.com to find out about white paper options for your company.