RecruitingBlogscom

Follow Us:

 

hr technology

Results 351 - 375 of 626Sort Results By: Published Date | Title | Company Name
Published By: Procore     Published Date: Jun 25, 2019
Did you know that more than 1.2 billion people use Microsoft Office? That’s one in 7 people. A huge portion of the world’s economy is managed through it: from small businesses all the way up to Fortune 500 corporations. Despite its popularity, Excel has its fair share of critics. What originated as rumblings among IT professionals and tech blogs, has quickly trickled into major business and technology publications. Some might think it harsh, but we want to show you the risks of using Excel in your business and help you understand how you can protect yourself, your company and your data from what Forbes refers to as ‘the most dangerous software on the planet’.
Tags : 
    
Procore
Published By: Oracle HCM Cloud     Published Date: May 25, 2017
The journey to digital healthcare begins with simply moving HR and other healthcare information to a digital format. An important next step is moving back-office operations to the cloud. Use the checklists of industry, technology and internal challenges facing healthcare organizations contained within this white paper to determine where you are on the cloud readiness spectrum, and begin creating a digital healthcare transformation plan for your organization.
Tags : 
    
Oracle HCM Cloud
Published By: Genesys     Published Date: Dec 20, 2018
Successfully implementing and managing a comprehensive suite of customer experience technologies is essential for global businesses seeking to sustain high levels of customer experience and brand value. However, knowing how to temper the instinct to throw technology solutions at efficiency problems is what distinguishes global customer experience leaders from the rest. New technologies must be balanced with appropriate investment in human resources. This is the central finding of a global survey of over 550 senior executives conducted by MIT Technology Review to examine the pressures that shape their customer experience processes and the tools and strategies they employ to mitigate those challenges and continuously improve customer engagement. Read the report to get a detailed look at: • The strategies that differentiates an Iconic firm from other businesses • How strategies vary across regions based on maturity and customer expectations • Future innovation management and technology
Tags : 
    
Genesys
Published By: McAfee EMEA     Published Date: Nov 15, 2017
As we have said through this paper, it is no longer an either/or choice between security analytics and SIEM. Or even between insourcing and outsourcing security monitoring. You need to establish a team with complimentary capabilities, skills, and resources; then leverage each part for what it does best. It is frustrating to use a technology for something it’s not built to do, and just as frustrating to expect a service provider to do things beyond their capability — regardless of their claims during the sales cycle. So don’t do that — build your security monitoring program to give all parties the best chance of success.
Tags : 
security, analytics, siem, monitoring, skills, capabilities, outsourcing
    
McAfee EMEA
Published By: McAfee EMEA     Published Date: Nov 15, 2017
Atrius Health Chief Information Security Officer Chris Diguette oversees security for Atrius Health, the largest physician-led healthcare provider in the northeastern US. The organization is recognized nationally for its use of health information technology. Diguette is also CIO of the VNA Care Network, a home healthcare provider and subsidiary of Atrius Health. As CISO, Diguette and his team work to implement and maintain a security infrastructure that safeguards the organization’s critical health information systems and applications, such as its Epic Systems Electronic Medical Records (EMR) system and the personal data of more than 675,000 patients at 29 facilities in eastern and central Massachusetts.
Tags : 
artius, health, chief, information, security, officer, organization
    
McAfee EMEA
Published By: MuleSoft     Published Date: Nov 27, 2018
In today’s digitally disrupted economy, organizations across industries face competition at unparalleled heights. As a result, differentiation through business automation has become synonymous with convenience and speed. However, since the technology landscape is changing at an increasing pace, business automation shouldn’t be thought of as a one-time, centralized effort in a discrete process. Rather, organizations should view business automation as a way to decentralize access to systems and enable the broader organization. Download this whitepaper to learn: The value of business automation Why traditional approaches to business automation – such as custom code, implementing standalone solutions, or using point-to-point connections – do not suffice. The benefits of an API-led approach to business automation. How organizations like Wells Fargo, the State of Colorado, Tic:Toc, and Addison Lee achieved business automation success using APIs.
Tags : 
    
MuleSoft
Published By: EMC Corporation     Published Date: Mar 20, 2014
Learn about the tools, technologies and techniques required for comprehensive detection and remediation of advanced malware threats and why traditional signature-based approaches fall short of protecting your organization.
Tags : 
emc, software, malware detection, malware threats, tools, technology, security
    
EMC Corporation
Published By: Jive Software     Published Date: Feb 24, 2014
The workforce is as dispersed as ever – companies are looking to social collaboration to facilitate the engagement once fostered around the water cooler. By understanding the power of social collaboration tools, HR can lead an organization to where the talent is while enabling business success through the success of its people.
Tags : 
jive, aberdeen group, hr management, hr technology, talent management, recruiting, social business, enterprise social collaboration, esc, recruiting, retention, content sharing, collaboration, it management, social media
    
Jive Software
Published By: Jive Software     Published Date: Feb 24, 2014
How can human resources partner with IT to drive communication and knowledge-sharing while supporting business objectives? In today’s distributed workforce HR can embrace social business, taking the lead in defining new HR practices to support the changing workplace landscape and foster innovation and integrated employee networks.
Tags : 
jive, gigaom research, human resources, human resource technology, distributed workforce, social business, workforce management, workplace management, productivity, social software solutions, it management, social media
    
Jive Software
Published By: Comcast Business     Published Date: Mar 24, 2015
The digitization of data has empowered both healthcare providers and patients to improve how, when and where healthcare is administered, giving patients greater control over their personal health and well-being. The key to success lies in the ability to get the right information to the right people at the right time. And a crucial enabler of improved communications is the ability to transfer data across like and disparate systems through mobile technology. This was the topic at a recent focus group Comcast Business held at HIMSS14 that included healthcare IT professionals from six leading healthcare providers. The participants shared the following insights on how advancements in data mobility can engage the entire healthcare ecosystem and help improve patient outcomes. Download this white paper to learn more.
Tags : 
healthcare, patient care, communication, electronic health records, remote diagnostics, mobile technology, networking, security, it management, wireless
    
Comcast Business
Published By: Palo Alto Networks     Published Date: Dec 11, 2013
Legacy firewalls aren't designed to address today's complex network traffic consisting of applications, users, and threats. They rely on outdated technology. Read how a new modern security platform safely enables any technology and application. - Learn why yesterday's methods can't handle today's cyberthreats - Find out if your firewall has the ability to see and control traffic, and prevent APTs - Discover how you can deliver modern security without compromising performance - Read why bolt-on security is a costly approach to security
Tags : 
cybersecurity, firewalls, palo alto, technology, application, network traffic security, prevent atps
    
Palo Alto Networks
Published By: Cornerstone OnDemand     Published Date: May 11, 2015
Paper-based performance reviews are not the way to go. Here are a few reasons why.
Tags : 
reviews, management, technology, human resources management
    
Cornerstone OnDemand
Published By: ThreatTrack Security     Published Date: Jan 22, 2015
According to the report ‘Trail Blazers’ “hold the power to dethrone the current market leaders…[and] often shape the future of technology with their innovations and new product designs.” VIPRE was evaluated alongside nearly a dozen endpoint security products and was called a “highly capable solution for small and midsize enterprises with advanced needs that are looking for a solution that is easy to manage and deploy.”
Tags : 
threattrack, security, threat, track, information, admins, best, practices, training, defense, tips, web, email, smartphones, education, data, breach, prevention, vipre, mcafee
    
ThreatTrack Security
Published By: Netsuite DWASF Leads Display Q1 2015     Published Date: Nov 19, 2015
Download this white paper on how cloud ERP can help IT meet rapidly evolving business needs. As an IT leader, a lot is being asked of you: drive transformational change, get the most out of your current IT investments with even higher performance, and be the strategic advisor to your business partners. What if you could transform your company's future by increasing the flexibility and agility of your IT infrastructure to support the rapidly evolving needs of your business? Read this paper to discover how modern enterprises like Williams-Sonoma and Knowledge Universe have adopted new ERP strategies to support their growth. In this paper you will learn: The challenges facing IT and how to evolve your IT architecture to support the modern business. A new strategy for the enterprise involving ERP that increases the flexibility and agility required to add new business models, integrate acquisitions and support innovation. Answers to frequently asked questions when modernizing IT.
Tags : 
innovation through new products, information technology, customer-enabling, supply chain capabilities, enterprise applications
    
Netsuite DWASF Leads Display Q1 2015
Published By: SumTotal, a Skillsoft Company     Published Date: Aug 24, 2015
Read this report to know the questions to ask to avoid being duped by pretty demos of software with no substance and find a partner that can meet the hidden complexities that exist in your unique processes.
Tags : 
hr technology, software demos, efficiency, learning software, benefits, hr solutions, human resources
    
SumTotal, a Skillsoft Company
Published By: 8x8 Inc.     Published Date: Feb 13, 2017
The right contact center solution should integrate tightly with your CRM solution and add value to it. Your contact center software should be able to capture all email, chat and standard telephone interactions and link them to the customer records database. Not only does this ensure continuity in all your customer communications, it gives the CRM database more information to use in constructing a better picture of your customers’ behavior. So how do you choose the right contact center for your organization? Following are three examples of forward-thinking businesses that found the right answer with cloud communication technology.
Tags : 
contact center, crm, telephone interactions, communications
    
8x8 Inc.
Published By: Frontier Communications     Published Date: Dec 29, 2017
We’ve all heard the phrase “you have to spend money to make money,” and while it may be accurate to some extent, businesses also have to keep a close eye on their budgets. As you establish your technology allowance and evaluate tools to help grow your business, consider these five items as absolute essentials.
Tags : 
    
Frontier Communications
Published By: Kaspersky Lab     Published Date: Feb 20, 2014
Don’t get caught in the crossfire. Read our special report "Who's spying on you?" to find out more about the threats of malware to your business.
Tags : 
kaspersky, malware threats, cyberespionage, internet perpetrators, security technology, internet safety, business protection, cybercriminals, cybersecurity, defend your network, defend your data, data management, innovative protection, sophisticated threats, essential data, confidential information, security, it management
    
Kaspersky Lab
Published By: Panasonic     Published Date: Mar 18, 2019
In a world of content overload, executives at Entertainment & Media companies know they need to find new ways to engage, enlighten and inspire audiences through cutting-edge spaces that overlay digital information onto the physical world. That’s what Panasonic, a leading innovator in 10 top disruptive technologies, found in its recent study. They asked senior technology decision makers across 13 industries how they are investing in new technologies, which they have already adopted and which they intend to implement. The report is available now to our readers. Get the report today for an inside look at how competitive companies are adopting disruptive technologies, innovating and planning for the future.
Tags : 
    
Panasonic
Published By: Balihoo     Published Date: May 28, 2010
One of the major challenges facing manufacturers' marketing teams in their efforts to make reseller co-op marketing more effective is at the very heart of what defines the century-old co-op marketing concept -- the coordination and execution of programs and financial transactions across two separate organizations. Today, when the manufacturer is working with hundreds if not thousands of different resellers, the scale and breadth of the effort can be overwhelming. However breakthroughs are not only possible today,but quite achievable by applying specialized and fully integrated technology solutions, bringing co-op marketing management into the modern age.
Tags : 
co-op marketing, co-op advertising, reseller marketing
    
Balihoo
Published By: IBM     Published Date: May 04, 2009
The latest servers from IBM have one thing in common - the new Intel Xeon 5500 series processors. This white paper will explain the benefits of the new processors, including speed and performance.
Tags : 
ibm, express seller, virtualization, intel, xeon, processor, 5500, bladecenter, system x, power, energy costs, hardware, cooling, quickpath interconnect, qpi, numa, memory standpoint, front-side bus, fsb, dimms per channel
    
IBM
Published By: IBM     Published Date: May 04, 2009
Live migration is essential for a dynamic data center environment. But until now, it's been impossible between different generations of processors. Intel IT and End User Platform Integration have done so successfully with Intel® Virtualization Technology FlexMigration. This white paper explains how.
Tags : 
ibm, express seller, virtualization intel, xeon, processor, 5500, bladecenter, system x, power, energy costs, hardware, cooling, flexmigration, processors, proof-of-concept, poc, virtual machines, vms, virtual machines, vmware esx 3.5u2
    
IBM
Published By: Stratus Technologies     Published Date: Jan 07, 2008
CIOs today are being called upon to interpret business strategy and priorities, then add value through information technology initiatives. At a time when "critical to the business" translates to "mission-critical IT", how do you ensure end-to-end availability and reliability of the IT resources that enable your company’s essential business processes.
Tags : 
business success, productivity, compliance, cost control, decrease spending, spend management, data integrity, meeting sla, meeting slas, service management, stratus, stratus technologies
    
Stratus Technologies
Published By: netForensics     Published Date: Jan 04, 2008
To manage threats to the enterprise and successfully meet compliance challenges, organizations need a comprehensive security strategy that can successfully do battle with inside as well as outside threats. Today, companies are increasingly leveraging security information management (SIM) solutions to build a clean, concise, and manageable process for dealing with the tremendous volumes of raw security information from disparate devices, applications, and databases.
Tags : 
monitoring, hackers, internal threats, bad employee, identity theft, data protection, hacker, security management, sim technology, compliance, fraud, netforensics
    
netForensics
Published By: HP Service Management     Published Date: Sep 03, 2008
In this first chapter of "The Shortcut Guide to IT Service Management and Automation," you will be led through a step by step analysis of your company's IT and business relationships, providing you with a basis for a strategic plan to turn service lifecycle management into a valuable business asset. Author and compliance expert Rebecca Herold demonstrates how technology acts as a strategic differentiator by enabling business growth, driving operational efficiencies to lower maintenance costs, optimizing outcomes, and reducing IT risks.
Tags : 
itil, itil v3, bsm, bsa, dca, itsm, it service management, operations, it operations, cmdb, automation, service, service management, service desk, lifecycle, life cycle, hpsm, hp sm, hp service management
    
HP Service Management
Start   Previous    8 9 10 11 12 13 14 15 16 17 18 19 20 21 22    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.

© 2019  Created by RecruitingBlogs.   Powered by

Badges  |  Report an Issue  |  Terms of Service

scroll to the top