RecruitingBlogscom

Follow Us:

 

hr technology

Results 1 - 25 of 403Sort Results By: Published Date | Title | Company Name
Published By: Proofpoint     Published Date: Aug 10, 2017
BEC attacks are a growing threat to businesses because they prey on vulnerabilities that can’t be patched: people. That’s why employee training, financial controls, and especially technology are the keys to a strong defense and timely response. You need need a solution that does not solely depend on reputation and basic email filtering. With granular controls, advanced email solutions can identify and quarantine impostor emails before they reach an employee’s inbox.
Tags : 
security awareness, social engineering, impostor emails, email flags, financial institution, bec threats, suspicious messages
    
Proofpoint
Published By: IBM APAC     Published Date: Aug 22, 2017
While working to maintain tactical control of the mobile environment, IT managers often find themselves drowning in minutiae. Overwhelmed by the number of moving parts, they’re unable to stay abreast of the latest threats, let alone extract meaning from or make decisions based on the mountains of data now being collected. With limited IT resources dedicated to mobile technology tools that facilitate reactive rather than proactive management—and limited visibility into mobile intelligence across the organization—many managers have had to choose between security and productivity as the focus of their efforts.
Tags : 
security risks, it operations, workforce, advisor, mobile security, mobile metrics, cloud based, benchmarking data
    
IBM APAC
Published By: Oracle APAC ZO OD Prime Volume SCM ABM Leads June 2017     Published Date: Jul 12, 2017
The manufacturing industry has entered a completely new technological realm that did not even exist five years ago. Three industrial revolutions forever changed manufacturing—and the world—and the fourth is now underway. Factories have had to adapt rapidly with the advent of advanced automation and robotics as well as software to manage processes and control. The onset of digital manufacturing accelerates the need for new approaches. While consumers typically embrace disruptive technology with enthusiasm, manufacturers inevitably approach new technology with caution, carefully evaluating how it can improve their businesses. Eventually, however, caution must be replaced with innovation to ensure survival. Those organizations that find themselves on the wrong side of the technology curve today will face increasing challenges to remain competitive as time marches forward.
Tags : 
supply chain management, scm, manufacturing, digital manufacturing
    
Oracle APAC ZO OD Prime Volume SCM ABM Leads June 2017
Published By: Brainshark     Published Date: Aug 02, 2017
It’s clear that sales enablement is widely recognized as a critical B2B function, with the number of dedicated sales enablement roles more than doubling over the past three years. But such an important job can become overwhelming without the right solution in place. You know technology is the key to ensuring maximum effectiveness. But how do you convince the decision maker and other key stakeholders to get on board with the investment? In this exclusive brief, you’ll learn 6 tips to help prepare and present your business case for sales enablement technology
Tags : 
b2b, sales technology, decision makers, sales
    
Brainshark
Published By: HP Inc.     Published Date: Jul 17, 2017
Three-dimensional printing of useful objects and machine parts is becoming a reality. 3D printing offers the ability to produce—both rapidly and at low cost—short runs or one-of-a-kind parts. HP’s development of HP Multi Jet Fusion technology includes new HP Jet Fusion 3D Printers and an Open Platform that will revolutionize the design, materials, manufacturing, and distribution of 3D parts to drive the digital transformation of manufacturing. This technical white paper provides details on HP Multi Jet Fusion and HP’s strategies and vision to introduce a new era of digital manufacturing.
Tags : 
print services. hp technology, 3d printing, printer, digital manufacturing, printing solution, digital materials, production software, 3d technology
    
HP Inc.
Published By: CA Technologies EMEA     Published Date: Aug 03, 2017
GDPR compliance can be achieved through a combination of people, processes and technology. This document has described solutions that can help organizations with their GDPR journey. But you can extend that protection and strengthen security controls even further via strong and risk authentication or workload automation for the processing automation of personal data helping you comply with GDPR as well as similar mandates. Regulations tend to set the minimum standards to be required, but in the application economy, open enterprises must ensure due diligence to protect one of the most important and critical assets: private customer information.
Tags : 
identity management, privileged user access, secure privileged credentials, secure hybrid it
    
CA Technologies EMEA
Published By: Concur     Published Date: Aug 15, 2017
As travel and expense (T&E) management solutions have improved, the expectations of the end user are higher than ever before. Business travellers want a seamless experience and you want better visibility, increased compliance, and reduced spend. Our research identified two types of people – Leaders and Followers. Leaders have most of their spending under management, have increased compliance to company policies and approve expense reports more quickly. Followers are lagging behind.
Tags : 
platform, travel, payment, expense management, mobile app, corporate budgets, trip cost visibility, enterprise
    
Concur
Published By: Epicor     Published Date: Aug 01, 2017
Today’s manufacturers are looking to increase productivity, assure factory uptime, and thrive despite the changing manufacturing landscape. When you combine an enterprise resource planning (ERP) system with a manufacturing execution system (MES), you’ll find these goals become more achievable because the technology is designed to simplify the modern manufacturing enterprise. You want your organization to operate more efficiently and flexibly. You want to reduce waste and become as lean and efficient as possible. Most importantly, you want to keep pace with the changing competitive environment. These solutions can help with all of that. Read the Epicor eBook, Harness the Power of MES, to learn more about how technology can help your business streamline, compete, and grow.
Tags : 
enterprise resource planning (erp), manufacturing execution system (mes), manufacturing, mattec mes
    
Epicor
Published By: Mimecast     Published Date: Apr 18, 2017
"Whaling attacks have risen in recent months and these emails are more difficult to detect because they don’t contain a malicious hyperlink or attachment, and rely solely on social-engineering to trick their targets. In order to combat these attacks, organizations must be aware of the dangers presented by whaling, or CEO fraud, and put the right safeguards in place. Mimecast conducted a whaling attack survey with 500 organizations around the globe and the results were alarming. Read this report to learn: - The five key phases of a whaling attack - How to protect your organization from a whaling attack through company exercises, education, and technology. - What Mimecast is offering to combat these attacks in its industry-leading Targeted Threat Protection service."
Tags : 
cyber security, cyber fraud, impersonation attacks, ceo fraud, whaling
    
Mimecast
Published By: Kronos     Published Date: Jul 26, 2017
The results of a 2016 study on employee burnout conducted by Kronos and Future Workplace show that 95 percent of HR leaders agree that burnout affects employee retention. Although serious, the issue of burnout isn’t insurmountable if organizations are proactive in addressing its causes. The implementation of new workforce technology with flexible scheduling capabilities and workforce analytics can help stop burnout before it starts.
Tags : 
employee satisfaction, employee retention, technology, workforce analytics, burnout
    
Kronos
Published By: SAP     Published Date: Feb 03, 2017
Companies across the globe are all facing the same economic headwinds: business change in the form of competitive threats and new opportunities is coming at an unprecedented pace. The watchword for meeting these challenges is innovation – both in terms of business processes as well as the underlying technology that enables those processes. The sum of the experiences discussed in this report showcase how SAP S/4HANA, running on-premise or in the cloud, can form the basis for a broad-based business transformation that does not require a big bang implementation to succeed.
Tags : 
    
SAP
Published By: SAP     Published Date: Mar 09, 2017
Small and midsize retailers around the world are seeing their businesses transform in a variety of ways. These firms, typically with fewer than 1,000 employees, have been transforming themselves as customers seek new types of engagement and as suppliers expect higher levels of efficiency and effectiveness. New business models and new competitors are changing the way retailers do business. Rather than simply react to new threats, successful retailers are leveraging technology in new ways to sharpen business practices, improve agility, and better serve customers while strengthening the role of retailers in the supply chain. Through digital transformation including the effective engagement of the internet of things (IoT) to track inventory, the opportunity to maintain and gain competitive advantage can be significant.
Tags : 
    
SAP
Published By: QTS     Published Date: Nov 04, 2016
At the heart of the Data Solved promise are three core attributes - People Powered, Technology Focused and Infrastructure Invested. We leverage our strong, diverse team of more than 700 employees to enable our Powered by People motto and deliver on our promise. With 24 data centers on four continents, we are poised to deliver world-class infrastructure and value added technology services to our more than 1,000 customers in North America, Europe, Asia and Australia.
Tags : 
data centers, infrastructure, value added technology services, data security, data center, colocation, cloud needs, security
    
QTS
Published By: Avaya     Published Date: Jun 15, 2016
Engage everywhere to improve everywhere Two out of three executives under the age of 35 are frustrated by technology at work, but believe they can be more productive with information sharing, and that better communications will positively impact business growth. Find out how else the digital revolution is impacting midsize businesses.
Tags : 
technology, productivity, communications, best practices, digital
    
Avaya
Published By: Hewlett Packard Enterprise     Published Date: Jul 12, 2016
Technology enables business transformation To thrive in today’s idea economy, small and midsize companies like yours are using technology to transform their business. Like your peers, you know that mobile applications, cloud-based solutions, and advanced analytics can help you increase productivity, reduce costs, and grow your business. Older servers, storage, and networking products weren’t built to handle the exploding amount of data that is being shared today. In order to take advantage of these modern applications, many companies have found that they need to close the gap between what their business demands and what their IT systems can deliver.
Tags : 
best practices, business optimization, business management, application management, enterprise application, business intelligence, transformation
    
Hewlett Packard Enterprise
Published By: HP Enterprise Business     Published Date: Jan 20, 2017
Gain complete visibility and control of your entire IT environment with 110+ tool and technology integrations for Operations Bridge. Download now to learn more.
Tags : 
    
HP Enterprise Business
Published By: Cisco     Published Date: Jul 08, 2016
What You Will Learn: Over the years we’ve all heard claims of simple, seemingly magical solutions to solve security problems, including the use of sandboxing technology alone to fight advanced malware and targeted threats. This paper explores: • Where sandboxing technology stands today • Why it fails to meet the needs of organizations • What’s needed for effective malware analysis
Tags : 
    
Cisco
Published By: Time Warner Cable Business Class     Published Date: Apr 04, 2016
This guide gives you an overview of the steps you need to build a foundation for sustainable growth—the kinds of investments, drivers and differentiators that are involved. It does so through the words and experiences of fellow decision makers who’ve overcome daunting technology challenges, and in doing so realized their greatest achievements. Use the guide to get ready for great achievements of your own.
Tags : 
time warner cable, business class, internet, voice, television, network services, cloud, data center
    
Time Warner Cable Business Class
Published By: Pentaho     Published Date: Nov 04, 2015
Although the phrase “next-generation platforms and analytics” can evoke images of machine learning, big data, Hadoop, and the Internet of things, most organizations are somewhere in between the technology vision and today’s reality of BI and dashboards. Next-generation platforms and analytics often mean simply pushing past reports and dashboards to more advanced forms of analytics, such as predictive analytics. Next-generation analytics might move your organization from visualization to big data visualization; from slicing and dicing data to predictive analytics; or to using more than just structured data for analysis.
Tags : 
pentaho, analytics, platforms, hadoop, big data, predictive analytics, networking, it management
    
Pentaho
Published By: Workday     Published Date: Mar 17, 2017
Read the whitepaper “Rochester Regional Health – Equipping HR to support the evolving demands of the health care industry” to learn how cloud-based technology helps respond to critical M&A business needs and drivers, improves operational effectiveness and efficiency, and enhances capabilities and streamline regulatory compliance.
Tags : 
workday, healthcare, m&a experience
    
Workday
Published By: Aria Systems     Published Date: Jun 15, 2016
Expanding and enriching the educational experience through a streamlined, broadened networkBYOD in the classroom and one-student-one-device trends meant Kentucky’s Bullitt County Public Schools needed an easily configurable, reliable and scalable network. Read this case study to discover the benefits of WLAN technology in the educational world >
Tags : 
    
Aria Systems
Published By: Hewlett Packard Enterprise     Published Date: Apr 13, 2016
To understand your organization’s risk profile: “You should start with a simple question: What are your digital assets and the cyber threats facing them,” says HPE Security Services CTO, Andrzej Kawalec. Watch the MIT Technology Review interview with HPE’s Kawalec and FireEye's Vitor Desouza in order to protect your organization from what has become daily, even hourly, attacks for many.
Tags : 
    
Hewlett Packard  Enterprise
Published By: CA Technologies     Published Date: Jan 09, 2015
This paper provides an overview of new APIs risks, and offers five simple solutions to counter the common threats. By adopting a secure API architecture from the beginning, organizations can pursue an API strategy more safely and securely — and reap the benefits of agile integration promised by this exciting new technology.
Tags : 
apis, risks of apis, apis can increase organization's risks, api security
    
CA Technologies
Published By: Collaborative Consulting     Published Date: Dec 20, 2013
Enabling business value through the Mobile Web requires new thinking as well as a shift in technology. Putting “mobile first” and implementing services-based architectures are among the critical steps. The options are limited only to the imaginations of the designers but must be driven by the user’s context.
Tags : 
collaborative consulting, business value, user expectations, mobile web, service architecture, technology challenges, information technology, program management
    
Collaborative Consulting
Published By: Dell     Published Date: May 04, 2015
This infographic includes results from a 2015 survey conducted exclusively for CBS Interactive and illustrates: • The top-ranked security threats of 2014 • The percentage of companies adopting mobile security technology • The most popular data protection methods • What to look for in a comprehensive data protection solution
Tags : 
security breach, data security, privacy, phishing
    
Dell
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.

© 2017  Created by RecruitingBlogs.   Powered by

Badges  |  Report an Issue  |  Terms of Service

scroll to the top