RecruitingBlogscom

Follow Us:

 

rules

Results 76 - 100 of 279Sort Results By: Published Date | Title | Company Name
Published By: Adaptive Planning     Published Date: Apr 25, 2012
In describing what forecasters are trying to achieve, Saffo outlines six simple, commonsense rules that smart managers should observe as they embark on a voyage of discovery with professional forecasters: Map a cone of uncertainty, look for the S curve, embrace the things that don't fit, hold strong opinions weakly, look back twice as far as you look forward, and know when not to make a forecast.
Tags : 
adaptive, business, finance, forecasting, business planning, budget
    
Adaptive Planning
Published By: IBM     Published Date: Apr 11, 2016
In this IBM limited-edition Dummies book, you’ll learn what operational decision management (ODM) is and how it can benefit your organization by helping to: *Enable faster and more agile change so your business can react more quickly to opportunities and threats *Automatically capture knowledge so it can be reused to make better business decisions *Manage compliance better by providing a clear record of the rules that govern business operations *Make operational decisions more predictable and repeatable while also allowing you to model, measure, collaborate on and refine these decisions as your business needs change *Improve customer service with more consistent and accurate rules-based decisions, as well as by personalizing the user experience
Tags : 
ibm, odm, operational decision management, odm, business operations, knowledge management, enterprise applications, business technology
    
IBM
Published By: Trend Micro     Published Date: Feb 01, 2013
Despite increased awareness and focus on defending against targeted attacks from both business and security leaders, organizations continue to be breached and suffer the consequences. Many of today’s security investments are simply not aligned to defend against these targeted threat vectors. Advanced threat detection and response should not be a point solution but rather a combination of technologies and core competencies. Detecting and responding to advanced threats should involve tight integration of multiple security technologies, network analysis and visibility (NAV) tools, the ability to automatically generate content such as security rules and signatures, context on attacker history, and overall customization and flexibility to ensure that the solution is fine-tuned for your specific IT environment.
Tags : 
security, advance threat detection, nav
    
Trend Micro
Published By: KPMG     Published Date: Jul 11, 2018
The business is increasingly side-stepping the IT function to procure new technologies. Do you have the right governance in place to encourage innovation and ensure investment is directed for maximum impact? Read this report to find out: • how to balance the opportunities and risks from emerging technology • how to ensure funding for innovation is available and prioritised • where to direct funds for innovation • why ‘guardrails’ work better than rules in the current environment. Download the report now
Tags : 
    
KPMG
Published By: CA WA     Published Date: May 12, 2008
Although typically thought of as an artifact of legacy computing, batch processes remain vital to today’s real-time enterprises. Behind the real time systems that power the real time enterprise, such as customer order fulfillment, account management, supply chain scheduling and optimization, or financial trading systems, are regularly-updated back office business systems. Over the years, batch technology has evolved from script-based automation to rules or policy-driven workload automation.
Tags : 
bpa, business process automation, soa, service oriented, workload automation, ca wa
    
CA WA
Published By: Progress Software Corporation CEP     Published Date: Mar 26, 2008
We all have an intuitive idea of what an event is. However, when it comes to the use of the term "event" within a business context then it is easy to get confused. This papers seeks to explain what events are, whey they are important to your business, and what the options are for processing and managing these events (depending on their type and volume).
Tags : 
bloor, progressive, software, complex event processing, cep, mission critical, rules-and-model, event pattern, detection, bpm, business process management, latency, soa, smartblocks, apama, correlator, event processing technical society, epts, rfid, scada
    
Progress Software Corporation CEP
Published By: Oracle     Published Date: Apr 27, 2015
In the white paper, leading CFOs share perspectives on building and developing finance departments. Findings underscore value in the human touch and investment in new technology. The paper distills six rules for drawing talent to—and results from—finance departments in the Digital Age.
Tags : 
finance, management, retention
    
Oracle
Published By: Smarsh     Published Date: Dec 07, 2016
To meet the requirements of FINRA & SEC, you must first understand what they require of investment firms and organizations. Better yet, you must understand what is classified as a violation of those rules, then put practices in play that mitigate the risk and position you as an active advocate for compliance— not a violator or passive enabler for non-compliant activity.
Tags : 
    
Smarsh
Published By: Netsuite DWASF Leads Display Q1 2015     Published Date: Oct 06, 2015
Read this report to understand how the age of the customer requires tech management to transform into a customer-facing function in speci?c ways. Business technology (BT) brings together technology and traditionally customer-facing roles like marketing, sales, service, brand/product management, and ful?llment for the purpose of deploying systems of engagement that provide di?erential customer experience. Firms must build these systems of engagement from the outside in, according to how customers move in market spaces. The rules for planning, building, and running systems of engagement are not the same as for previous generations of tech management because customers are not employees. The increasingly crucial role that digital technologies play in customer engagement elevates the CIO role in business — if CIOs can move beyond the traditional IT focus on technology assets and adopt an expanded view that centers on customer experience and choice
Tags : 
business technology, customer engagement, customer experience, cios, enterprise applications
    
Netsuite DWASF Leads Display Q1 2015
Published By: Mimecast     Published Date: Dec 20, 2018
Over the last few years government agencies have been concerned with protection of personal data and consequences of data breaches on business and citizens. That’s driven businesses to look how rules and regulations can help guide organizations to build systems and processes that protect peoples data. Watch now to learn more.
Tags : 
    
Mimecast
Published By: Mimecast     Published Date: Oct 11, 2018
Information management is getting harder. Organizations face increasing data volumes, more stringent legal and regulatory record-keeping requirements, stricter privacy rules, increasing threat of breaches and decreasing employee productivity. Companies are also finding that their old-fashioned, legacy archive strategies are increasingly ineffective. This is driving many organizations to rethink their approach, developing more modern Information Governance strategies.
Tags : 
    
Mimecast
Published By: Okta     Published Date: Jul 25, 2016
Current Identity Governance and Administration (IGA) solutions have optimized heavily for complete customization, leaving customers with full flexibility in designing rules and workflows. The problem is that it takes these solutions too long to deploy, at too high a cost, and rarely do they deliver on the ROI that was originally anticipated. Okta believes there is a better way, and a way to reach a much broader set of organizations, by building a cloud-based IGA product that is optimized for out-of-the-box capability and is easily configurable.
Tags : 
okta, best practices, technology, optimization, identity governance, cloud computing, business technology
    
Okta
Published By: SAP     Published Date: Jul 18, 2016
How to survive and thrive in a world where technology is rewriting the rules of retail
Tags : 
    
SAP
Published By: NetSuite     Published Date: Feb 17, 2016
NetSuite and the National Online Retailers Association (NORA) recently gathered some of Australia’s leading retail leaders to examine the strategies that enable retailers to deliver a seamless brand experience across all channels and boost their bottom line. Download this report to learn more.
Tags : 
customer experience, netsuite, nora retailers, national online retailers association, australia, brand experience, small business, finance
    
NetSuite
Published By: Druva     Published Date: Nov 09, 2018
The all-encompassing data center is a thing of the past. Modern data environments are distributed and include remote and branch offices, mobile devices, and the Internet of Things (IoT) as well as cloud solutions such as infrastructure as a service (IaaS), platform as a service (PaaS), and software as a service (SaaS). There’s more critical data to back up than ever before. Plus, data silos and fragmented management mean poor visibility, which can make it difficult to comply with regional data residency and security rules as well as service-level agreements (SLAs). On-premises data protection has not kept pace. According to a survey by Fujitsu, 45% of IT managers said they had lost data or productivity related to data protection inefficiency within the last year.1 Often, this is because on-premises backups are cumbersome and do not always happen on time.
Tags : 
    
Druva
Published By: IBM     Published Date: Jun 04, 2018
"What would you do if you didn’t have to rely on disparate analytics solutions to meet the needs of business users while following the rules of IT? View this 'Charting Your Analytical Future' webinar to learn about a world of innovation and independence for users that does not limit the confidence and controls of IT. With the cognitive-guided self-service features available in IBM business analytics solutions, more users than ever before can get the answers they need. Next-generation business analytics capabilities make it possible to access relevant data, prepare it for analysis and understand performance. But it doesn’t stop there. Users can package the results in a visually-appealing format and share them throughout the organization. Don’t miss this opportunity to hear how you can: * Benefit from advanced analytics without the complexity * Operationalize insights and dashboards from a collection of trusted data sources * Tell your story with rich visualizations and geospati
Tags : 
business analytics, analytics solutions
    
IBM
Published By: Group M_IBM Q418     Published Date: Oct 23, 2018
The EU General Data Protection Regulation (GDPR) has arrived. Every company doing business with European customers — regardless of location — must make considerable governance, people, process, and technology changes to comply with the new rules. While companies have made progress, more work remains. To succeed, they must tackle key challenges, including data identification, mapping, and access management. Despite the work ahead, forward-looking businesses understand GDPR is an opportunity. This is a transformation for a data-savvy world, with the potential to yield enhanced customer and business benefits. Investment in solutions with data privacy, security, and compliance offerings that can protect data no matter where it’s stored — on-premises and in the cloud — can ease companies along their readiness journeys and help them achieve and sustain compliance from May 25, 2018, and onward
Tags : 
    
Group M_IBM Q418
Published By: First Advantage     Published Date: Apr 30, 2018
Understanding the sources, access and rules around the use of criminal record histories in employment-related background checks assists employers in their hiring process. This guide is a resource for any organization wanting concise information on key criminal records screening components and considerations.
Tags : 
    
First Advantage
Published By: SEMrush     Published Date: Nov 30, 2018
No matter how many “common rules” and “universal laws” of SEO have been invented over the years, certain tasks require a unique approach. At SEMrush, we use your feedback as the main source of insights and ideas for our future tools. We thoroughly analyse our customers’ workflow so that the tools we build are of maximum value to their users.
Tags : 
seo, semrush, e-commerce, market analysis, strategy
    
SEMrush
Published By: Group M_IBM Q2'19     Published Date: Apr 04, 2019
As more companies transform their infrastructures with hybrid cloud services, they require environments that protect the safety of their intellectual property, such as data and business rules. In addition, businesses need a set of hybrid cloud services that provides the best of both worlds: the elasticity and automatic provisioning of the public cloud with the economic viability of the private cloud. Welcome to IBM LinuxONE.
Tags : 
    
Group M_IBM Q2'19
Published By: MessageLabs     Published Date: Oct 15, 2008
Failure to strategically manage email can be costly for any businesses. Learn about the risks of poor email management, and how to implement a comprehensive, best practices-based email retention policy.  Enforce your policy by implementing MessageLabs Managed Email Archiving Service to minimize email risks and maximize compliance with organizational, legal, and regulatory rules.  
Tags : 
messagelabs, email retention, archiving, risk, compliance, knowledge management, data management
    
MessageLabs
Published By: Skillsoft     Published Date: Mar 13, 2015
Most companies are well aware of the risks bribery and corruption pose when operating in the global marketplace. However, what companies may be overlooking is how quickly the landscape is changing—and how this dynamic shift can affect corporate compliance initiatives. With the recent up-tick in enforcement of the Foreign Corrupt Practices Act (FCPA) and the tightening of anti-corruption legislation in other areas of the globe, including upcoming legislation in Ireland, knowledge of bribery rules and regulations has never been more critical.
Tags : 
skillsoft, corruption, bribery, foreign corrupt practices act, fcpa, compliance, compliance initiatives, human resources
    
Skillsoft
Published By: Wildfire Interactive     Published Date: Jun 14, 2012
Launching a social advertising campaign may be easy. However, creating a great social advertising campaign that actually pays off can be a real challenge. Plus, the rules for success change from Facebook to Twitter to LinkedIn.
Tags : 
facebook, twitter, social media, advertising, marketing, emerging marketing, ads, social advertising campaigns
    
Wildfire Interactive
Published By: Workday     Published Date: Oct 11, 2018
Get insight from 12 successful CEOs of midsize companies as they reveal best practices on how to recruit the right employees and cultivate a happy, productive workforce. Also included is an interview with Workday Chief People Officer Ashley Goldsmith on how to ensure top talent finds their way to your organization, and what you can do to keep them there.
Tags : 
    
Workday
Published By: uberVU via HootSuite     Published Date: Jan 17, 2014
Customers now expect the same level of service on social media from financial firms, insurance providers, and other regulated enterprises as they receive from technology and retail companies. But without the right compliance controls in place, your organization could violate customer privacy rules and other regulatory guidelines. Are you taking the right steps to ensure compliance?
Tags : 
compliance, social media, social media management, enterprise, hootsuite
    
uberVU via HootSuite
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.

© 2019  Created by RecruitingBlogs.   Powered by

Badges  |  Report an Issue  |  Terms of Service

scroll to the top