evaluate

Results 201 - 225 of 702Sort Results By: Published Date | Title | Company Name
Published By: Adecco     Published Date: Jan 11, 2018
Compensation—whether hourly wages or annual salaries—is a talent attraction magnet, a general employee motivator, a retention technique and a measure for the health of your business (and the economy as a whole). But there’s often confusion around salaries, both in what today’s accurate ranges actually are, and if every department within a company truly needs to evaluate compensation. Incorporating a strategic salary program that aligns with business goals requires a comprehensive understanding of the current labor landscape, and the role employee pay plays in every department within your company. This guide will discuss why compensation strategies should be discussed across departments, and how your company can address employee earnings today to help you maintain the right approach tomorrow. Let’s get started.
Tags : 
    
Adecco
Published By: VMware     Published Date: Jul 01, 2016
This white paper will give you perspective on how cloud computing is addressing today’s most pressing IT and business challenges. Public cloud with hybrid cloud capabilities has become the preferred cloud model and it’s important to know the types of hybrid cloud capabilities enterprises should evaluate when considering cloud computing. Through three real-world case studies you’ll also see how VMware vCloud Air specifically delivers on the promise of public cloud with hybrid cloud capabilities.
Tags : 
vmware data center, vcloud air, vsphere, hybrid cloud, public cloud, private cloud, disaster recovery, data center extension, data center replacement, date center modernization, virtual private cloud
    
VMware
Published By: CrowdStrike     Published Date: Oct 23, 2017
As damaging breaches continue to occur, more organizations are considering endpoint detection and response (EDR) solutions to address the incidents that aren't being handled adequately by their existing defenses. However, EDR solutions come in a wide variety of implementations and can vary significantly in scope and efficacy — choosing the best solution can be challenging. This white paper, “Endpoint Detection and Response: Automatic Protection Against Advanced Threats,” explains the importance of EDR, and describes how various approaches to EDR differ, providing guidance that can help you choose the product that's right for your organization. Read this white paper to learn: What makes EDR such a valuable addition to an organization's security arsenal and why finding the right approach is critical How the “EDR maturity model” can help you accurately evaluate vendor claims and choose the solution that best fits your organization’s needs How the CrowdStrike® EDR solution empowers organ
Tags : 
    
CrowdStrike
Published By: CrowdStrike     Published Date: Nov 28, 2018
As damaging breaches continue to occur, more organizations are considering endpoint detection and response (EDR) solutions to address the incidents that aren't being handled adequately by their existing defenses. However, EDR solutions come in a wide variety of implementations and can vary significantly in scope and efficacy — choosing the best solution can be challenging. This white paper, “Endpoint Detection and Response: Automatic Protection Against Advanced Threats,” explains the importance of EDR, and describes how various approaches to EDR differ, providing guidance that can help you choose the product that's right for your organization. Read this white paper to learn: • What makes EDR such a valuable addition to an organization's security arsenal and why finding the right approach is critical • How the “EDR maturity model” can help you accurately evaluate vendor claims and choose the solution that best fits your organization’s needs • How the CrowdStrike® EDR solution empowers
Tags : 
    
CrowdStrike
Published By: Mimecast     Published Date: Apr 04, 2013
Enterprise information archiving is contributing to organizational needs for e-discovery and compliance requirements, and reducing primary storage costs. Gartner evaluates vendors offering products and services that provide archiving for email, files and other content types.
Tags : 
enterprise, information archiving, email, ediscory, compliance, primary storage costs, roi, storage, archiving, data
    
Mimecast
Published By: VMware     Published Date: Jan 23, 2018
The digital workspace has arrived, and the most progressive organizations are taking action. To thrive in this digital environment, organizations need to embrace strategies that better prepare them for success in the growing digital economy. Understandably, this means working toward becoming highly mobile enterprises. Throughout this process, an organization’s technology partner choices can play a pivotal role in achieving business goals. As such, stability and scalability are taking center stage. This is why a forward-looking solution can empower an organization to move away from standalone enterprise mobility management (EMM) to the digital workspace. In this white paper, we’ll take a look at how the mobility ecosystem is evolving and how organizations can push the boundaries of enterprise mobility while making the most of their investments. For MobileIron customers making a migration decision, selecting a partner with solid leadership, stability, scalability, and steady growth wil
Tags : 
    
VMware
Published By: Oracle     Published Date: Oct 20, 2017
ESG Lab evaluated the Zero Data Loss Recovery Appliance from Oracle with a focus on its ability to deliver reliable data protection by recovering Oracle databases to any point in time with sub-second RPO in a highly scalable scale-out solution that is easy to use and manage. Year after year, ESG respondents consistently cite improving data backup and recovery among the top IT priorities in our annual spending intentions survey (including 2016’s iteration). Why? Because when unforeseen infrastructure failures or data corruptions occur, the ability to restore not only business-critical information but also application and end-user access to that information become paramount. Lost or prolonged inaccessibility to business-critical data and applications most often means lost revenue and productivity to the business, and possibly the inability to meet regulatory requirements.
Tags : 
    
Oracle
Published By: NetApp     Published Date: Sep 24, 2013
"Today, IT’s customers are more mobile and global than ever before and as such expect their applications and data to be available 24x7. Interruptions, whether planned or unplanned, can have a major impact to the bottom line of the business. ESG Lab tested the ability of clustered Data ONTAP to provide continuous application availability and evaluated performance for both SAN and NAS configurations while running an Oracle OLTP workload. Check out this report to see the results."
Tags : 
mobile, global, applications, cloud, configuration, technology
    
NetApp
Published By: HP and Intel® Xeon® processor     Published Date: Feb 10, 2012
This ESG Lab Validation Report sponsored by HP + Intel examines a number of backup and recovery solutions and evaluates their ease of implementation as well as their ability to improve reliability and reduce costs.
Tags : 
intel, storage, 2.0, infrastructure, trends, storage, flexibility, drivers, market dynamics, trends, converged, custom requirement, deduplication, tiering, protocol, foundation, supply chain, integrated strategy, archival storage
    
HP and Intel® Xeon® processor
Published By: HP     Published Date: Jul 22, 2014
In this ESG white paper, the capabilities and common characteristics of flash implementations are categorized as “bronze”-, “silver”-, and “gold”-type approaches, depending on the degree to which they enable fully featured storage systems. It evaluates how HP’s storage delivers the basics and follows with a series of flash-specific optimizations and advances that we’ll call “gold standard” flash capabilities, after which it hints at HP’s vision of the future for their flash storage architecture. Throughout the paper, the importance of both IT architecture and business implications is emphasized.
Tags : 
tier-1, storage, data, flash, storage system, data center
    
HP
Published By: HP     Published Date: Nov 05, 2014
In this ESG white paper, the capabilities and common characteristics of flash implementations are categorized as “bronze”-, “silver”-, and “gold”-type approaches, depending on the degree to which they enable fully featured storage systems. It evaluates how HP’s storage delivers the basics and follows with a series of flash-specific optimizations and advances that we’ll call “gold standard” flash capabilities, after which it hints at HP’s vision of the future for their flash storage architecture. Throughout the paper, the importance of both IT architecture and business implications is emphasized. Download this whitepaper now.
Tags : 
data center, change management, data management, storage space, storage criteria, storeserv, tier-1, market report
    
HP
Published By: Drillinginfo     Published Date: Nov 17, 2015
For this edition of the DI expert series, we’ve prepared some remarkable technical insights regarding the geology of the top plays and emerging formations in the U.S. From comparing the efficiency of Wolfcamp production intervals with the Cline Shale in West Texas, to providing spatial distribution analyses and production trends for the Canyon Granite Wash in the Anadarko, our experts evaluated the complexities of prolific oil and gas regions and outlined essential takeaways. We also examined the sweet spots of the Mississippi Lime play, and offer insights regarding optimal target of penetration for this highly porous, commercially developed region. Lastly, we explored the geology of the world-renowned Eagle Ford Shale Play in the Gulf Coast Basin and provided observations regarding the influence of stress on this prominent play.
Tags : 
geology, shale, play, technical, insight, formations, efficiency, distribution, analyses, production, trends, oil, gas, takeaways
    
Drillinginfo
Published By: Imprivata     Published Date: Aug 21, 2009
This white paper is intended to make the ESSO evaluation process simpler and faster by identifying the critical questions you need to ask ESSO vendors as you evaluate their solutions.
Tags : 
enterprise single sign on, enterprise single sign-on, single sign on, single sign-on, esso, authentication, imprivata
    
Imprivata
Published By: Symantec     Published Date: Jun 12, 2008
Looking for a network security solution? Whether you've already adopted NAC for your enterprise or are researching options, download this helpful survey presented by IDC about NAC benefits and vendor overviews.
Tags : 
network access control, network security, security, nac, symantec
    
Symantec
Published By: Nutanix, Inc.     Published Date: May 07, 2013
This report defines storage-centric virtualized infrastructure, its opportunity and use cases, and the emerging vendor landscape that IT infrastructure and operations groups should evaluate as they purse the software-defined data center.
Tags : 
converged infrastrucutres, storage, virtualization, server, storage-centric, lun, modular expansion
    
Nutanix, Inc.
Published By: Progress     Published Date: Jan 09, 2017
Did you know? • 86% of organizations say they have 2 years to make inroads with digital transformation • 55% say they have a year or less, before they begin to suffer financially or from competitive threats • 59% are worried they may be too late To help you evaluate your organizational readiness for digital transformation, we put together a package to help you measure your current capabilities—from a technology and organizational perspective—as well as some information to help you plan ahead. The Digital Transformation Kit contains: • CMS Evaluation Guide: Learn about CMS capabilities that can enhance the customer experience • Digital Marketing Maturity Guide: Rate your usage of digital marketing technology • Data-Driven Marketing e-Book: Learn how to use the power of your data to drive growth
Tags : 
    
Progress
Published By: Spredfast, Inc.     Published Date: Apr 04, 2014
Learn how to properly evaluate your Social Relationship Platform and see if there is something that you could be doing better to increase your social media presence.
Tags : 
spredfast, marketing, social strategy, media strategy, social network, consumer behaviors
    
Spredfast, Inc.
Published By: Spredfast, Inc.     Published Date: Jun 30, 2014
Learn how to properly evaluate your Social Relationship Platform and see if there is something that you could be doing better to increase your social media presence.
Tags : 
spredfast, marketing, social strategy, media strategy, social network, consumer behaviors
    
Spredfast, Inc.
Published By: Asurint     Published Date: Dec 21, 2018
Employers may ask a consumer reporting agency (CRA) to implement internal systems to evaluate background checks as part of the hiring process. An adjudication matrix (also known as a hiring matrix) is commonly used by employers to designate what types of crimes over certain time periods may make an individual ineligible for employment. An adjudication matrix will typically contain labels such as “clear” or “ineligible” that designate how the individual’s background check results lined up with the matrix.
Tags : 
    
Asurint
Published By: Dyn     Published Date: Jan 14, 2015
Take a few minutes to read this whitepaper, evaluate the potential risk and the potential cost a DDoS attack will have on your business and gain key tips on how to mitigate both.
Tags : 
ddos attack, integration, mitigation, ddos outage, business protection, business security
    
Dyn
Published By: IDFocus     Published Date: Aug 21, 2009
This whitepaper discusses the user provisioning challenges and is a tool for companies evaluating such a solution to have a clearer, more structured evaluation process. This document focuses on how to evaluate and analyze the components delivered by a user provisioning solution.
Tags : 
password management, provisioning, user provisioning, idfocus, id focus
    
IDFocus
Published By: HP and Intel® Xeon® processor     Published Date: Feb 10, 2012
This white paper sponsored by HP + Intel evaluates a solution that aims to enable the movement of data without physical limitations. Read now and see how this could enable agility and efficiency.
Tags : 
intel, storage, 2.0, infrastructure, trends, storage, flexibility, drivers, market dynamics, trends, converged, custom requirement, deduplication, tiering, protocol, foundation, supply chain, integrated strategy, archival storage
    
HP and Intel® Xeon® processor
Published By: ISYS     Published Date: Aug 21, 2009
Discover the difference between today's newer consumer desktop search products and the mature, tried-and-true business-oriented solutions. Includes a 12-step checklist to help you better evaluate desktop search for the enterprise.
Tags : 
search, desktop search, enterprise software, isys
    
ISYS
Published By: Ecessa Corporation     Published Date: Mar 11, 2009
Download this white paper to learn how to avoid network failures and evaluate the options available to ensure high-availability, network uptime and optimal network performance. It also shows you solutions that are affordable, and when deployed, are operationally cost-effective.
Tags : 
adsl load balancing, vpn load balancing and redundancy, bandwidth aggregation, qos, bandwidth control, bandwidth management, multi-homing, bgp multihoming, broadband bonding, broadband failover, disaster recovery, business continuity, wan load balancing, wan failover, dsl failover, dsl load balancing, disaster recovery solutions, dual wan router, wan failover, isp failover
    
Ecessa Corporation
Published By: FICO     Published Date: Mar 14, 2017
In this Executive Brief, we share best practices in how to evaluate and deploy layered controls that will help you develop a holistic approach to controls, investigate and control where risk is introduced, assess your risk appetite and benchmark your cybersecurity posture against others in your industry.
Tags : 
network security and data protection, advance threat defense, network visibility, security analytics, mobile security, cyber security detection software
    
FICO
Start   Previous    2 3 4 5 6 7 8 9 10 11 12 13 14 15 16    Next    End
Search Resource Library