• RSS
  • Twitter
  • FaceBook

Related Topics

Add White Papers

Get your company's white papers in the hands of targeted business professionals.

abs

Results 226 - 250 of 513Sort Results By: Published Date | Title | Company Name
By: Absorb     Published Date: May 09, 2018
eLearning has become the prevailing approach to employee onboarding, compliance training, and professional development. The efficiencies that eLearning affords stem from automation, customization and self-service. These attributes allow end users (employees and others) to access just the right training at just the right time. They also provide Learning and Development administrators the peace of mind that training will be delivered as needed, in a consistent manner and that tracking the progress of individuals will also be made simpler by automation.
Tags : 
lms, employee, training, efficiencies, elearning, automation
    
Absorb
By: Absorb     Published Date: May 10, 2018
In a business environment where being able to build and maintain a solid brand reputation and lasting relationships with your customers is essential for ongoing success, effective compliance training for team members is critical. Assembling quality course content, either through purchasing off-the-shelf compliance courseware or developing training material in-house or in partnership with an external developer, and delivering that material in a consistent manner, can help protect your organization and minimize the damage from compliance transgressions.
Tags : 
elearning, training, business, brand, reputation, relationship, building
    
Absorb
By: Abacus Labs     Published Date: Jun 14, 2018
As more pressure is placed on the finance team to provide meaningful insights more frequently, it is becoming increasingly necessary to speed up business processes, as well as have immediate access to the most up-to-date information. The traditional expense reporting process is a drain from both perspectives. Using software to manage employee expenses can provide a more efficient means of managing the process, however most solutions are simply a digital version of the traditional paper process. This can limit the amount of time savings you can gain. This paper will demonstrate the time savings you can accomplish by implementing a real time expense reporting solution versus one that relies on employee generated expense reports.
Tags : 
expense, reporting, roi, calculations, digital, employee, finance
    
Abacus Labs
By: CA Technologies EMEA     Published Date: Apr 10, 2018
Ein neues Security-Modell, das Sie verstehen und nachahmen sollten. Die Security in Unternehmen ähnelte bisher einer Festungsstrategie, die Anwenderendpunkte abschottete und Mauern um das Netzwerk baute. Heutzutage kann diese Strategie die Nutzung von Mobile Devices und SaaS-Funktionen (Software-as-a-Service), die sich außerhalb der Festung befinden, nicht mehr unterstützen. Daher haben sich Chief Information Security Officers (CISOs) nach neuen Lösungen umgesehen, die diese Technologien heute sichern können und die sich einer Zeit anpassen, in der sich sowohl Bedrohungen als auch Unternehmensanforderungen verändern.
Tags : 
    
CA Technologies EMEA
By: Trend Micro     Published Date: May 03, 2018
NSS Labs performed an independent test of the Trend Micro Deep Discovery Inspector Model 4000 (Hardware model 4100) v3.8 SP5 and OfficeScan (OSCE) v12.0.1807. The product was subjected to thorough testing at the NSS facility in Austin, Texas, based on the Breach Detection Systems (BDS) Test Methodology v4.0 available at www.nsslabs.com. This test was conducted free of charge and NSS did not receive any compensation in return for Trend Micro’s participation. While the companion Comparative Reports on security, performance, and total cost of ownership (TCO) will provide information about all tested products, this Test Report provides detailed information not available elsewhere.
Tags : 
    
Trend Micro
By: Absolute Software     Published Date: Jan 29, 2008
Does your PC lifecycle management (PCLM) reflect the issues associated with mobile users? Many organizations face expensive inefficiencies by not managing mobile assets effectively. These inefficiencies include dispersed and manual data collection, and inventory tools that are dependent on a connection to the company network.
Tags : 
absolute, intel, laptop, saas, managing laptops, pclm, computrace, absolute software
    
Absolute Software
By: Absolute Software     Published Date: Jan 27, 2010
This whitepaper explains how organizations can reduce their energy bills by remotely regulating computers. Topics include typical workplace computer usage, how to calculate your potential energy savings, debunking power management myths, and how you can assign multiple power saving profiles to clients.
Tags : 
computrace, absolute software, it asset management, remote data delete, geolocation tracking, theft recovery, service guarantee, application integration
    
Absolute Software
By: Absolute Software     Published Date: Feb 23, 2010
A majority of environments today are cross-platform, combining both PCs and Macs. The result has become a common IT challenge: How can you maintain Macs in a network environment with a PC-centric infrastructure and with Windows-based network services?
Tags : 
computrace, absolute software, it asset management, remote data delete, geolocation tracking, theft recovery, service guarantee, application integration
    
Absolute Software
By: Absolute Software     Published Date: Sep 06, 2011
View this flash demo to see Absolute in action and how you can monitor installed software/hardware and track location and take action if device is lost or stolen.
Tags : 
absolute, computrace, secure, tracking, security, manage, protect, application security
    
Absolute Software
By: Absolute Software     Published Date: Sep 06, 2011
Let us walk you through Absolute Manage's capabilities in this 10-minute demo; see how Absolute Manage can help you centrally manage both Mac and PCs.
Tags : 
absolute, intel, laptop, saas, lock down, rapid recovery, stolen, data defense
    
Absolute Software
By: Absolute Software     Published Date: Sep 06, 2011
Watch this webcast as Support Manager for La Jolla Institute for Allergy & Immunology relates how he successfully frees up 30 IT support hours a week.
Tags : 
absolute, intel, laptop, saas, lock down, rapid recovery, stolen, data defense
    
Absolute Software
By: Absolute Software     Published Date: Sep 06, 2011
Vice President and Research Fellow for Aberdeen Group, shares trends, best practices and actionable insight on management of iOS mobile devices.
Tags : 
absolute, intel, laptop, saas, lock down, rapid recovery, stolen, data defense
    
Absolute Software
By: Absolute Software     Published Date: Sep 06, 2011
Forrester Research and Absolute Software discuss the importance for IT to create a "layered approach" for endpoint security and management
Tags : 
absolute, intel, laptop, saas, lock down, rapid recovery, stolen, data defense
    
Absolute Software
By: Absolute Software     Published Date: Sep 06, 2011
See how Absolute Manage Mobile Device Management allows organizations to remotely manage their Apple® iOS devices (iPhone®, iPod® Touch, iPadT).
Tags : 
absolute, intel, laptop, saas, lock down, rapid recovery, stolen, data defense
    
Absolute Software
By: Absolute Software     Published Date: Sep 09, 2011
Join Michael Scarpelli, Technical Support Manager for La Jolla Institute for Allergy & Immunology, as he shares how his team streamlines and automates computer setup and maintenance for a rapidly growing network of more than 500 machines.
Tags : 
absolute, technical support, healthcare organizations, operating environment, database development, employee performance, productivity, project management
    
Absolute Software
By: Absolute Software     Published Date: Sep 09, 2011
Only the introduction of end-point security - the ability to force mobile computers to secure themselves - offers end-users the freedom to embrace mobility and IT departments robust protection for sensitive information.
Tags : 
absolute, end-point security, data breach protection, authentication, organizational policy, encryption, asset management, computrace
    
Absolute Software
By: Absolute Software     Published Date: Sep 09, 2011
This white paper provides guidelines to help you create policies for computer energy consumption that are sensible and easy to enforce.
Tags : 
absolute, power saving policy, management, roi, energy savings, policy metrics, network management, application performance management
    
Absolute Software
By: Absolute Software     Published Date: Sep 09, 2011
Security professionals are wondering how to best deal with the oncoming tide of personal mobile devices finding their way into the workplace. Download this research report to learn some key areas of consideration before moving ahead with a mobile implementations strategy.
Tags : 
absolute, managing security, risk challenges, mobile devices, it implementation, secure processes, mobile computing, mobile data systems
    
Absolute Software
By: Motorola     Published Date: May 05, 2010
Digital radio seemed to be the best route for NASCAR to achieve the key requirements surfaced in this study, which included their need to coordinate large numbers of radios, ensure absolute audio clarity, maintain consistent, reliable communications and have a radio that was durable enough to withstand a rough environment.
Tags : 
motorola mototrbo, communication system, digital radio, two-way radio, voice clarity, audio
    
Motorola
By: Adaptive Growth     Published Date: Feb 25, 2008
In what practical ways – if any – is ERP implementation project success different from the absence of failure? Both casual and thorough analysis of ERP failure agree on several interesting points.
Tags : 
erp, adaptive growth, project management, enterprise applications, enterprise resource planning, adaptivegrowth
    
Adaptive Growth
By: NetApp Exchange Upgrade     Published Date: Dec 17, 2008
Regardless of industry or geographic location, business information is exploding on a massive scale—affecting primary, secondary, and archival storage systems. The sheer quantity of data being amassed is outpacing organizations' ability to keep tabs on it, maintain corporate compliance, meet strict government regulation, and even simply house it in a useful format that can provide invaluable history and knowledge. Learn more today.
Tags : 
netapp, microsoft exchange server 2007, netapp networked storage, storage systems, storage infrastructure, microsoft exchange deployments, server virtualization, scalability limitations
    
NetApp Exchange Upgrade
By: VMware     Published Date: Feb 26, 2009
In this brief, you'll learn how CA Recovery Management Products, like CA ARCserve Backup and CA XOsoft solutions, can be applied with VMware Infrastructure to help you effectively respond to the challenges and opportunities of business-critical computing.
Tags : 
vmware, business continuity, ca recovery management, ca arcserve, ca xosoft solutions, vmware infrastructure, business-critical computing, virtualization
    
VMware
By: Cornerstone OnDemand     Published Date: Dec 10, 2014
What do we mean by agility? It’s how powerfully your organization can react to changes in the marketplace, recognize and close employee skill gaps, and align the right people in the right places to handle any pivots in business strategy. How can you make your organization more agile? There are several critical things you must do. Learn about it all in this whitepaper.
Tags : 
cornerstone ondemand, agility, organizations, business agility, business strategy, employee skills, productivity, business intelligence
    
Cornerstone OnDemand
By: Kronos Incorporated     Published Date: Jul 27, 2011
The true cost of employee absenteeism is staggering. Average cost of employee absence: 35% of payroll. Being average isn't always a good thing. Get more surprising workforce facts Mercer uncovered in this exclusive study of nearly 300 organizations.
Tags : 
kronos, employee absenteeism, mercer absence research, financial impact, lost productivity, employee absence
    
Kronos Incorporated
By: Citrix Systems     Published Date: Feb 10, 2016
Empirical data from individual Product Analysis Reports (PARs) and Comparative Analysis Reports (CARs) is used to create the unique Security Value Map™ (SVM). The SVM illustrates the relative value of security investment options by mapping security effectiveness and value (TCO per protected - connections per second (CPS)) of tested product configurations. The SVM provides an aggregated view of the detailed findings from NSS Labs’ group tests. Individual PARs are available for every product tested. CARs provide detailed comparisons across all tested products in the areas of: ? Security ? Performance ? Total cost of ownership (TCO)
Tags : 
    
Citrix Systems
Start   Previous    3 4 5 6 7 8 9 10 11 12 13 14 15 16 17    Next    End
Search White Papers      

Community Area

Log in | Register

Solution Center

Follow TechGenix on Twitter