Business of Information Technology  >   Business Management  >   Risk Management  >   Occupational and Environmental Safety  >  

Safety-Improvement Programs

RSS Feed    Add to Google    Add to My Yahoo!
DEFINITION: Practices intended to constantly improve safety within a plant or across a company, including, but not limited to, safety teams, safety awareness programs and communications, safety "days," safety training, and setting of continuous-improvement goals targeting safety metrics, such as OSHA incidents or lost-workday rates.
Safety-Improvement ProgramsMultimedia (View All Report Types)
26 - 50 of 178 Matches Previous Page  | Next Page
Case Study: RedHat Implements Automated Payroll Services Application
sponsored by ServiceNow
WEBCAST: In this case study, discover how RedHat Software was able to implement a payroll service management solution that created an automated and scalable payroll system.
Posted: 04 Sep 2014 | Premiered: Jul 30, 2014

ServiceNow

Cloud Application Security Requires Visibility and Control
sponsored by CipherCloud
VIDEO: Tune in to this video to find out how to gain visibility and control over your cloud applications with an easy to deploy solution.
Posted: 23 Sep 2014 | Premiered: 23 Sep 2014

CipherCloud

Customer Video: Yahoo!
sponsored by Workday
VIDEO: This video details the solution Yahoo! HR chose in order to replace their legacy system, speed up data analytics and become a strategic business partner.
Posted: 14 Oct 2014 | Premiered: 04 Apr 2012

Workday

CW+: Analyst's take: Alfabet PlanningIT reaps rewards for decision makers
sponsored by ComputerWeekly.com
WEBCAST: When organizations adopt Alfabet’s planningIT, decision makers have more knowledge about their operating environments and use this information to leverage existing assets and avoid unnecessary investments in software or development.
Posted: 26 Oct 2011 | Premiered: Jan 10, 2011

ComputerWeekly.com

Data Breach Detection and Response
sponsored by Hexis Cyber Solutions Inc
WEBCAST: This informative resource explores the changes in data breaches and outlines a strategy for incident response.
Posted: 22 May 2014 | Premiered: May 22, 2014

Hexis Cyber Solutions Inc

Dedicated Transportation: Extra Care for Your Critical Data
sponsored by Iron Mountain
WEBCAST: Watch this brief demo to learn about Iron Mountain's new Dedicated Transportation service, which ensures the safe delivery of your data to its destination.
Posted: 12 May 2011 | Premiered: May 12, 2011

Iron Mountain

Demo: RSA ECAT
sponsored by RSA
VIDEO: Watch this demo to see what real-time malware analysis on the endpoint looks like with RSA ECAT.
Posted: 28 Oct 2014 | Premiered: 28 Oct 2014

RSA

Demo: RSA Security Analytics: SIEM Use Case
sponsored by RSA
VIDEO: Watch this demo to discover RSA Security Analytics 10.4 in action as it solves a complex security information and event management (SIEM) use case.
Posted: 29 Oct 2014 | Premiered: 29 Oct 2014

RSA

EDRM & IGRM: From E-Discovery to Information Governance
sponsored by SearchCompliance.com
VIRTUAL ENVIRONMENT: In this classroom, learn how to apply the Electronic Discovery Reference Model (EDRM) and the information governance reference model (IGRM) frameworks to reduce risk and cost and develop strong processes and procedures for addressing information governance in your organization.
Posted: 08 Aug 2013 | Premiered: 13 Aug 2013

SearchCompliance.com

Enable Mobile Workforce Productivity without Putting your Organization at Risk
sponsored by Code42
WEBCAST: This webcast focuses on enabling mobile workforce productivity without putting your organization at risk. Learn more about this backup solution.
Posted: 14 Oct 2014 | Premiered: Oct 14, 2014

Code42

Exclusive offer for AVG CloudCare Partners – 50% off AVG Cloud Backup
sponsored by AVG Technologies
SOFTWARE DEMO: This complimentary IT download will allow you to experience a reliable, automated, company-wide backup solution that will protect your customer's data while driving greater productivity.
Posted: 18 Dec 2014 | Premiered: 18 Dec 2014

AVG Technologies

CORE IMPACT Pro V10
sponsored by Core Security Technologies
PRODUCT DEMO: Please join Core Security for a live demonstration of CORE IMPACT Pro, the most comprehensive product for performing security assurance testing on an organization’s network systems, endpoint systems, end users and web applications.
Posted: 30 Dec 2009 | Premiered: 30 Dec 2009

Core Security Technologies

Cyber Defense Managed Service - A Force Multiplier Webinar
sponsored by Verdasys
VIRTUAL SEMINAR: Join security expert and CISO of In-Q-Tel Dan Geer and Verdasys in this upcoming webcast as they discuss a new deployment model and next-gen technology that can provide rapid deployment, immediate detection and comprehensive prevention operations for companies of any size.
Posted: 10 Jun 2013 | Premiered: 27 Jun 2013

Verdasys

Database Worst Practices: The Top 5 Mistakes Developers Make and How to Avoid Them
sponsored by EnterpriseDB Corporation
WEBCAST: Attend this Webcast to learn the top five mistakes that database developers make and how to avoid them. Listen and learn from real world experiences to ensure a successful installation.
Posted: 29 Nov 2007 | Premiered: Dec 12, 2007, 09:00 EST (14:00 GMT)

EnterpriseDB Corporation

Del Monte Foods' Cloud Imperative
sponsored by Kenandy
WEBCAST: This video case study explores Del Monte Foods' cloud strategy – including why the food production company decided to move to the cloud and how it alleviated its cloud concerns.
Posted: 06 Jan 2014 | Premiered: Dec 10, 2013

Kenandy

Directory and Resource Administrator 7.5 Trial
sponsored by SUSE
TRIAL SOFTWARE: NetIQ's Directory and Resource Administrator provides advanced delegation and robust, policy-based administration capabilities that improve the security and efficiency of your Microsoft Windows environment.
Posted: 09 Aug 2006 | Premiered: 01 Aug 2006

SUSE

Disclosures 2012 - The Vulnerability of Publicly Traded Companies
sponsored by Veracode, Inc.
WEBCAST: In a recently-released State of Software Security featured supplement, Veracode examines the software security posture of public companies and the material risks they face due to the weaknesses in their software applications. This webinar uses Veracode data to examine how public companies manage the risks inherited from software.
Posted: 24 May 2012 | Premiered: May 23, 2012

Veracode, Inc.

Don’t Fire Your Firewall
sponsored by AT&T Corp
WEBCAST: Listen to this webcast to learn how AT&T Security Device Management (SDM) can help you control complexity, cost and compliance by monitoring your on-premise security hardware and software.
Posted: 07 Jan 2011 | Premiered: Jan 4, 2011

AT&T Corp

Dynamic Business Processes Podcast Series: Tips for Thriving in Today’s Economy with BPM
sponsored by IBM
PODCAST: Today, more than ever, organizations must deliver the benefits of cost optimization and business agility. This podcast series explains how that goal can be realized through dynamic Business Processes Management. The series focuses on banking, government, healthcare, insurance, cross-industry and retail.
Posted: 15 Oct 2009 | Premiered: Oct 15, 2009

IBM

Enhance Security with Intel® vPro™ Technology
sponsored by Intel Corporation
VIDEO: Security and compliance are strong values even in a down economy. Hear from a variety of clients that have used Intel® vPro™ Technology to identify problems, disable and enable the network, enhance patch management, and enabled them to isolate threats quickly and efficiently.
Posted: 08 Sep 2009 | Premiered: 08 Sep 2009

Intel Corporation

Ensure Data Protection with Sun StorageTek T10000B Tape Drives
sponsored by Sun StorageTek
VIDEOCAST: Learn how Sun StorageTek T-series tape drives use a Crypto-Key Management System to encrypt data, and how Volsafe technology helps your business meet electronic, regulatory, and legal requirements.
Posted: 24 Oct 2008 | Premiered: Oct 23, 2008

Sun StorageTek

Ensuring VoIP Quality of Service
sponsored by SUSE
WEBCAST: Companies are managing VoIP to ensure high availability and call quality, so the ability to ensure Quality of Service (QoS) is extremely important for users.
Posted: 09 Aug 2006 | Premiered: May 24, 2006

SUSE

Enterprise Risk Management: Enabling Risk-Adjusted Management of Strategy and Performance
sponsored by SAP AG
VIDEO: Find out how SAP software allows you to identify, mitigate, and manage risk so that you can increase visibility into the impact of risks, reduce cost and risk across strategic initiatives, and increase your strategic effectiveness.
Posted: 17 Sep 2010 | Premiered: 17 Sep 2010

SAP AG

ESET: Threat Center
sponsored by ESET
PRODUCT DEMO: IT managers need new solutions to combat ever changing threats to their security. ESET’s Internet Threat Map app shows you a map of global Infection rates, based on our daily analysis of over 100,000 samples of malware of all types.
Posted: 02 Sep 2010 | Premiered: 02 Sep 2010

ESET

Focused IT Compliance at Barnabas Health
sponsored by Symantec Corporation
WEBCAST: In this webcast, Barnabas Health leaders share their experience with an always-on compliance management solution that simplified administrative, policy, and risk management.
Posted: 25 Apr 2014 | Premiered: Apr 25, 2014

Symantec Corporation
26 - 50 of 178 Matches Previous Page    1 2 3 4 5    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement