RecruitingBlogscom

Follow Us:

 

developing

Results 276 - 300 of 433Sort Results By: Published Date | Title | Company Name
Published By: IBM     Published Date: Feb 18, 2009
This white paper explains the steps you need to consider when developing your privacy strategy and implementing your first data privacy project. Find out how you can help your organization implement best practices in privacy protection and make your privacy project successful from start to finish.
Tags : 
ibm integrated data management, data privacy, data security, ibm optim data privacy solution, hackers, security breach, best practices for data security, data inventory, security, data management
    
IBM
Published By: IBM     Published Date: Jul 09, 2009
Value-driven product management is a repeatable process based on industry best practices that uses subjective and objective criteria to deliver successful products. This paper explains how assessment, alignment, achievability, accessibility, agility and accountability, the six key concepts of value-driven product management, can be applied to create a repeatable process for developing successful products.
Tags : 
ibm, telelogic, product success, value-driven, product management, assessment, alignment, achievability, accessibility, agility, accountability, enterprise applications
    
IBM
Published By: VeriSign Authentication Services, now a part of Symantec Corp.     Published Date: Oct 15, 2011
"The Shortcut Guide to Business Security Measures Using SSL" examines current information security threats to business and describes techniques for developing a security management strategy that leverages established best practices.
Tags : 
extended validation, measures, green bar, online security, optimize, sgc, server gated cryptography, verisign, trust marks, security, ssl technology, malware, it infrastructure, operating systems, hacking, phishing, dos, cybercrime, bot herders, cloud computing
    
VeriSign Authentication Services, now a part of Symantec Corp.
Published By: GoToMeeting     Published Date: Jun 09, 2010
This new Forrester white paper explores the evolution of project management and outlines steps for defining, hiring and developing your next-generation project managers.
Tags : 
citrix gotomeeting, project management, collaboration, software delivery, remote access
    
GoToMeeting
Published By: Silverpop     Published Date: Feb 04, 2013
A scoring model that helps both quickly identify who is ready to buy and when can make all the difference when it comes to nurture campaigns and ultimately, ROI.
Tags : 
data, scoring, leads, prospects, sales, customers, sales process, email marketing
    
Silverpop
Published By: Intralinks     Published Date: Jan 16, 2015
As the tide of data continues to rise, the burden of protecting sensitive data and preventing security breaches can be crushing. This Forrester TechRadar ™: Data Security report provides a framework for developing a long-term approach to keeping your organization’s information secure. This TechRadar evaluates 20 of the key traditional and emerging data security technologies that can be used to support the key recommendations and best practices of Forrester’s Data Security and Control framework. Key Contents: - Why the Future of Data Security Matters - Why Do These 20 Technologies Appear in the TechRadar?- Most Tech is Still in the Early Stages
Tags : 
data security, sensitive data, secure information, control framework, security
    
Intralinks
Published By: Oracle     Published Date: Nov 27, 2013
Global business has affected no group more than Human Resources (HR). Recruiting, hiring, developing, and retaining global workers is more complicated in a global economy adding another layer complexity, and without doing those things effectively, companies simply can’t grow. Therefore there’s more pressure than ever on HR leaders to develop and execute new workforce and talent strategies. Unfortunately, many HR organizations are simultaneously juggling these demands with a set of legacy technologies that are not up to the task because they don’t address the increasingly complex nature of HR’s role in the business.
Tags : 
human capital, human resources, recruiting, hiring, development, global, technology, business, best practicies, knowledge management
    
Oracle
Published By: Jobvite     Published Date: Sep 24, 2013
Learn how social recruiting will help benefit your recruiting and hiring strategy with this comprehensive workbook from Jobvite.
Tags : 
social recruiting, recruiting, jobvite, employee recruiting, employees, new employees, talent pool
    
Jobvite
Published By: Oracle     Published Date: Jan 16, 2014
Global business has affected no group more than Human Resources. Recruiting, hiring, developing, and retaining global workers have become more complicated in a global economy. In this whitepaper, learn the five key capabilities HR needs to play a strategic role in today’s global economy.
Tags : 
human capital, human resources, recruiting, hiring, development, global, technology, business, best practicies, knowledge management, human resources management
    
Oracle
Published By: Oracle     Published Date: Jan 16, 2014
Global business has affected no group more than Human Resources. Recruiting, hiring, developing, and retaining global workers have become more complicated in a global economy. In this whitepaper, learn the five key capabilities HR needs to play a strategic role in today’s global economy.
Tags : 
human capital, human resources, recruiting, hiring, development, global, technology, business, best practicies, knowledge management, human resources management
    
Oracle
Published By: Oracle     Published Date: Jan 16, 2014
Global business has affected no group more than Human Resources. Recruiting, hiring, developing, and retaining global workers have become more complicated in a global economy. In this whitepaper, learn the five key capabilities HR needs to play a strategic role in today’s global economy.
Tags : 
human capital, human resources, recruiting, hiring, development, global, technology, business, best practicies, knowledge management
    
Oracle
Published By: Mobify     Published Date: Feb 20, 2015
Mobify’s Mobile Strategy Development Guide is aimed at retailers in the process of developing a mobile strategy or invested in upgrading their current strategy to meet customer expectations and incorporate emerging mobile technology. In our new guide, you’ll discover: - How to build a solid business case to win senior management buy-in - How to effectively assign responsibilities in the strategy development process - How to analyze your competitors’ mobile initiatives for best practices and lessons learned - How to identify the right metrics to measure strategy success
Tags : 
mobile strategy, mobile development, mobile technology, customer engagement, emerging marketing
    
Mobify
Published By: Polycom     Published Date: Sep 24, 2014
There are many ways to take advantage of the rich set of collaboration tools provided with Microsoft Lync. IT leaders should consider a cap-and-grow strategy where investment dollars in legacy systems are capped and the financial and IT resources are reallocated to grow Lync. Once the company has a cap-and-grow Lync strategy, IT leaders should consider retirement of legacy infrastructure and how Lync can be leveraged as a replacement technology. Forward-looking IT leaders will consider Lync a strategic UC platform upon which to build a companywide collaboration strategy, rather than just a replacement for a legacy phone system. Get this report to read best practices for a Lync deployment.
Tags : 
grow, strategy, cap, best practices, lync, deployment, advantage, rich, collaboration, tools, investment, dollars, legacy, system, financial, resources, strategic, infrastructure, platform, software development
    
Polycom
Published By: Aasonn     Published Date: Oct 07, 2014
Despite the availability of a large potential workforce, finding, developing and retaining the right talent can be time consuming, frustrating, and sometimes an exercise in futility. Organizations that combine technology with enhanced employee value propositions are finding some answers to these challenges. Three things can help overcome these very real obstacles: a clear value proposition, empowered employees, and a forecast of future needs. Download our new White Paper on Turning Potential Workforce into the Right Talent Strategy to learn how you can conquer these hurdles and help your business thrive.
Tags : 
aasonn, workforce, talent, value proposition, empowered employees, talent strategy, human resources
    
Aasonn
Published By: Yesler     Published Date: Oct 29, 2014
Everything you need to know now to be successful in today’s buyer-driven market - from selecting the right marketing automation platform and developing customer-centric content, to identifying and reporting on the right metrics to demonstrate and predict marketing’s impact on sales and revenue.
Tags : 
b2b marketing, buyer-driven market, marketing automation platform, customer-centric content, content marketing, customer engagement, sales enablement, lead generation, marketing research, sales
    
Yesler
Published By: VMware AirWatch     Published Date: Mar 02, 2017
Countless organizations are deploying digital workspace solutions to meet the demands of today’s mobile end users and the IT administrators that support them. The goal is to empower users to work from anywhere, on any device—mobile or laptop—at any time. However, architecting a secure, seamless, scalable digital workspace solution is not necessarily easy, which is where this paper helps. When developing your digital workspace, it is important to keep five key considerations in mind, both on the front end and the back end of your environment: Seamless, secure end-user access to applications and files Easy-to-use enterprise app store Management security Fully integrated infrastructure stack Agnostic platform with a broad ecosystem Download this white paper to see how to approach these major considerations, with detailed strategies, and provide recommendations for effectively addressing each one.
Tags : 
    
VMware AirWatch
Published By: VMware AirWatch     Published Date: Mar 02, 2017
Countless organizations are deploying digital workspace solutions to meet the demands of today’s mobile end users and the IT administrators that support them. The goal is to empower users to work from anywhere, on any device—mobile or laptop—at any time. However, architecting a secure, seamless, scalable digital workspace solution is not necessarily easy, which is where this paper helps. When developing your digital workspace, it is important to keep five key considerations in mind, both on the front end and the back end of your environment: Seamless, secure end-user access to applications and files Easy-to-use enterprise app store Management security Fully integrated infrastructure stack Agnostic platform with a broad ecosystem Download this white paper to see how to approach these major considerations, with detailed strategies, and provide recommendations for effectively addressing each one.
Tags : 
    
VMware AirWatch
Published By: VMware AirWatch     Published Date: Mar 02, 2017
Countless organizations are deploying digital workspace solutions to meet the demands of today’s mobile end users and the IT administrators that support them. The goal is to empower users to work from anywhere, on any device—mobile or laptop—at any time. However, architecting a secure, seamless, scalable digital workspace solution is not necessarily easy, which is where this paper helps. When developing your digital workspace, it is important to keep five key considerations in mind, both on the front end and the back end of your environment: Seamless, secure end-user access to applications and files Easy-to-use enterprise app store Management security Fully integrated infrastructure stack Agnostic platform with a broad ecosystem Download this white paper to see how to approach these major considerations, with detailed strategies, and provide recommendations for effectively addressing each one.
Tags : 
    
VMware AirWatch
Published By: VMware AirWatch     Published Date: Mar 02, 2017
Countless organizations are deploying digital workspace solutions to meet the demands of today’s mobile end users and the IT administrators that support them. The goal is to empower users to work from anywhere, on any device—mobile or laptop—at any time. However, architecting a secure, seamless, scalable digital workspace solution is not necessarily easy, which is where this paper helps. When developing your digital workspace, it is important to keep five key considerations in mind, both on the front end and the back end of your environment: Seamless, secure end-user access to applications and files Easy-to-use enterprise app store Management security Fully integrated infrastructure stack Agnostic platform with a broad ecosystem Download this white paper to see how to approach these major considerations, with detailed strategies, and provide recommendations for effectively addressing each one.
Tags : 
    
VMware AirWatch
Published By: VMware AirWatch     Published Date: Mar 02, 2017
Countless organizations are deploying digital workspace solutions to meet the demands of today’s mobile end users and the IT administrators that support them. The goal is to empower users to work from anywhere, on any device—mobile or laptop—at any time. However, architecting a secure, seamless, scalable digital workspace solution is not necessarily easy, which is where this paper helps. When developing your digital workspace, it is important to keep five key considerations in mind, both on the front end and the back end of your environment: Seamless, secure end-user access to applications and files Easy-to-use enterprise app store Management security Fully integrated infrastructure stack Agnostic platform with a broad ecosystem Download this white paper to see how to approach these major considerations, with detailed strategies, and provide recommendations for effectively addressing each one.
Tags : 
    
VMware AirWatch
Published By: Palo Alto Networks     Published Date: Apr 25, 2017
Security practitioners and threat actors are constantly developing new techniques to gain advantages over the other. In recent years, security teams have stepped up their approaches to protecting their infrastructure by fortifying their network perimeter defenses, building up protections against advanced malware, upgrading vulnerable operating systems, automating the delivery of patches to stop exploits, and developing counter-measures to spot intruders. The threat actors looking to circumvent these measures are shifting their attention toward the next weakest link in the security chain – the user.
Tags : 
    
Palo Alto Networks
Published By: IBM     Published Date: Jun 13, 2016
Great leaders are hiding in every corner of your organization. Great leaders are the backbone of successful organizations but not everyone should be a leader. The challenge is identifying them and developing the qualities that your organization values. IBM Kenexa has the largest assessment library in the market from tests that measure skills, culture, fit, motivation and personality. And with 36 million people assessed annually, we know what great leaders look like! Watch this webinar and learn how you can: Hire for leadership behaviors Identify high potential leaders in your organization Develop your leadership pipeline
Tags : 
leadership, ibm, ibm kenexa, leadership behavior
    
IBM
Published By: SAP     Published Date: May 05, 2009
Learn how to meet the challenges facing your agency with respect to the recent stimulus plan. Accept the government's challenge to maintain your focus on developing programs that achieve long-term results for constituents, while ensuring that these programs adhere to the complex requirements for stimulus funds.
Tags : 
sap, economic stimulus fund, stimulus plan, arra, recovery, infrastructure
    
SAP
Published By: SAP     Published Date: Feb 10, 2011
Tap directly into the findings of an exclusive survey by IDG Research and Sybase with this new white paper that define the current state of mobility. More importantly it underscores specific ways IT can and should behave to proactively deal with the fast-developing world of enterprise mobility. Download it now to learn more about how the "Consumerization of IT" presents a wealth of business opportunities for IT management.
Tags : 
sap, mobility, competitive edge, greenfield, enterprise mobility, mobile, applications, iphone, crm, erp
    
SAP
Start   Previous    4 5 6 7 8 9 10 11 12 13 14 15 16 17 18    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.

© 2019  Created by RecruitingBlogs.   Powered by

Badges  |  Report an Issue  |  Terms of Service

scroll to the top