Skip to main content
 

best practices

Results 2301 - 2325 of 2657Sort Results By: Published Date | Title | Company Name
Published By: Silkroad     Published Date: Jul 26, 2016
An employee’s first few days are critically important, not only because organizations need to get their new hire up to speed as soon as possible, but also because the initial days at a new job hold huge influence over an employee’s decision to stay with the company long term. While onboarding has typically been geared toward new hires, organizations are now also onboarding transitional workers, to better prepare those moving into managerial or executive roles. Human Capital Media — the research arm of Chief Learning Officer magazine — partnered with SilkRoad for the “2016 CLO Innovations in Onboarding Survey.” We examined best practices in onboarding to answer these common questions, and more: • How do organizations define onboarding and how it fits into their overall strategy? • Who is involved in the process and how does technology enhance onboarding efforts? • What are examples of successful onboarding outcomes? See what we learned by downloading this report today!
Tags : 
    
Silkroad
Published By: Silkroad     Published Date: Aug 01, 2017
The Sources of Hire Report is back for 2017 and is more comprehensive than ever, covering more than 14 million applications, 655,000 interviews, and 329,000 hires. The job market is back—and so is increased competition for top candidates. Get ahead by starting where the candidate journey begins. Download this report to learn data-driven insights, including: Internal vs. external sources Online vs. offline sources Top 5 branded job boards Hot issues and best practices Much more!
Tags : 
    
Silkroad
Published By: Larson Electronics     Published Date: Jun 28, 2016
Is your lighting corroding over time? The paper focuses on unique corrosion resistant materials used to manufacture such products and its long-term advantages over traditional lighting options. Businesses, operators, engineers and lighting specialists may find the information helpful in minimizing risks and injuries in the workplace. Compliance with several institutions that administer best practices and approval ratings for corrosion resistant equipment will also be covered to ensure proper usage and application.
Tags : 
    
Larson Electronics
Published By: Citrix     Published Date: Aug 11, 2015
Acclimate your new employees effortlessly and paperlessly with these helpful tips on customizing onboarding practices for your company from RightSignature.
Tags : 
    
Citrix
Published By: PeopleDoc     Published Date: Sep 14, 2015
Is your HR team currently spending way too much time managing documents? Are you struggling to comply with changing laws? What’s happening with document management in the real world? What are your competitors up to? Our survey results shed some light on this complex issue.
Tags : 
    
PeopleDoc
Published By: Haws     Published Date: Jun 13, 2016
Federal safety regulations set forth by the Occupational Safety and Health Administration (OSHA) and The American National Standards Institute (ANSI) make the importance of safety equipment in potentially dangerous working environments clear. The stringent guidelines for emergency showers and eyewashes, however, don’t extend to the inclusion of mandatory alarm and electronic monitoring systems on this equipment. Implementing best practices with the addition of both alarm and wireless monitoring systems is the best way for workplaces to exceed normal expectations by creating superior emergency response procedures. From initiating an emergency response as soon as safety equipment is engaged to maintaining detailed records of when stations are used, tested, and maintained, these wireless systems can create safer, more responsive working environments. Not only will this help ensure employee safety, it can make it easier for facilities to stay in compliance with OSHA and ANSI standards.
Tags : 
    
Haws
Published By: AirDefense     Published Date: Apr 24, 2007
This white paper will explore what security challenges wireless networks present, suggest best practices to ensure Wireless LAN security, and demonstrate how AirDefense Enterprise, a Wireless Intrusion Detection and Prevention System, can help you define, monitor and enforce your wireless security policy.
Tags : 
best practices, sox, sarbanes-oxley, sarbanes oxley, sarbox, compliance, wireless security, wlan, wlan security, ids, intrusion prevention, intrusion detection, security policy, wireless security policy, airdefense
    
AirDefense
Published By: Online Marketing Summit     Published Date: Apr 21, 2010
Register for this free virtual event on Thursday, May 27th with the best and latest online marketing educational content including best practices, case studies, research and more. You can expect: *Seven tracks covering all major domain of online marketing, including Social Media, Search Engine Marketing and Optimization, Web Analytics, Mobile, Email and Demand Generation; * Content for all skill levels from the online novice to the eMarketing expert, there are sessions that will benefit all corporate, brand and online marketers; *Online marketing education kiosks and learning centers provide you additional access to 1-on-1 consultations, whitepapers and webcasts; *Live Q&A at the end of each session. Speakers and expert practitioners further explain the tactics learned in the session, answering questions and providing live support. Virtual Peer Networking gives you the opportunity to network, collaborate and share ideas with strategic marketers from leading companies around the world, so register now!
Tags : 
oms, online marketing summit, online marketing, emarketing, strategic marketing
    
Online Marketing Summit
Published By: Hewlett Packard Enterprise     Published Date: Mar 29, 2017
Join this dynamic LinkedIn group to be part of the cyber-security education conversation to gain an understanding for the best practices to improve security. Learn why HP says 64% of IT managers believe their printers are infected with malware, but only 45% of those IT professionals consider printers to be a medium or high risk vulnerability. The first responsibility of IT professionals is to make sure their company’s information is secure and today any device can become an access point threat. Printers and MFPs can be the Achilles’ Heel of any cyber-security plan and are a goldmine for hackers looking to steal pertinent information. Join the conversation and learn what’s necessary to protect your company.
Tags : 
hewlett packard, printer security, information technology
    
Hewlett Packard Enterprise
Published By: NEC     Published Date: Aug 12, 2014
Without a doubt, performance is the database professional’s number one concern when it comes to virtualizing Microsoft SQL Server. While virtualizing SQL Server is nothing new, even today there are some people who still think that SQL Server is too resource-intensive to virtualize. That’s definitely not the case. However, there are several tips and best practices that you need to follow to achieve optimum performance and availability for your virtual SQL Server instances. In this whitepaper, you’ll learn about the best practices, techniques, and server platform for virtualizing SQL Server to obtain the maximum virtualized database performance. In this white paper, you’ll learn about the best practices, techniques, and server platform for virtualizing SQL Server to obtain the maximum virtualized database performance.
Tags : 
sql, datacenter, servers, virtualization, customer value, analytics, application owners, system integrators, big data, reliability, enterprise, availability, serviceability, processor
    
NEC
Published By: Attunity     Published Date: Feb 12, 2019
This technical whitepaper by Radiant Advisors covers key findings from their work with a network of Fortune 1000 companies and clients from various industries. It assesses the major trends and tips to gain access to and optimize data streaming for more valuable insights. Read this report to learn from real-world successes in modern data integration, and better understand how to maximize the use of streaming data. You will also learn about the value of populating a cloud data lake with streaming operational data, leveraging database replication, automation and other key modern data integration techniques. Download this whitepaper today for about the latest approaches on modern data integration and streaming data technologies.
Tags : 
streaming data, cloud data lakes, cloud data lake, data lake, cloud, data lakes, streaming data, change data capture, cloud computing, modern data integration, data integration, data analytics, cloud-based data lake, enterprise data, self-service data
    
Attunity
Published By: Attunity     Published Date: Feb 12, 2019
Read this technical whitepaper to learn how data architects and DBAs can avoid the struggle of complex scripting for Kafka in modern data environments. You’ll also gain tips on how to avoid the time-consuming hassle of manually configuring data producers and data type conversions. Specifically, this paper will guide you on how to overcome these challenges by leveraging innovative technology such as Attunity Replicate. The solution can easily integrate source metadata and schema changes for automated configuration real-time data feeds and best practices.
Tags : 
data streaming, kafka, metadata integration, metadata, data streaming, apache kafka, data integration, data analytics, database transactions, streaming environments, real-time data replication, data configuration
    
Attunity
Published By: Listrak     Published Date: May 02, 2008
Even though there are many email marketing solutions that allow marketers to create, deploy, track, and manage their email marketing campaigns easily, there is still a significant percentage of companies that outsource this business process to an outside advertising agency, search engine optimization firm, application service provider, or interactive marketer.
Tags : 
listrak, email marketing, best practices, html, html newsletter, roadmap
    
Listrak
Published By: TowerData     Published Date: Sep 18, 2008
Is the success of your email marketing program limited by the size of your subscriber list? Email append, the process of adding email addresses to a postal customer database, is a quick and affordable way to expand the size of your email list. If you haven’t considered it in the past, it’s time to take a look. Perceptions about email append and the methods for doing it have matured over the past few years, and it’s now a predictable and reliable email list growth tactic. This white paper provides guidelines and best practices for consumer email appending.
Tags : 
customer acquisition, email marketing, database, email database, leads, lead, towerdata, tower data
    
TowerData
Published By: Response Media     Published Date: Jan 23, 2007
Over the last 10 years of optimizing online media campaigns, Response Media has established some best practices for profitable, successful email address acquisition and email database growth. Download this brief now to learn their key strategies.
Tags : 
email marketing, deliverability, list buying, list rental, email addresses
    
Response Media
Published By: ForeSee Results     Published Date: Feb 05, 2007
To date it has been virtually impossible to find reliable and meaningful standard metrics for multi-channel customers that measure the influence of the online shopping experience on total revenues. Learn more about the Multi-Channel Value index (MCVI), a strategic metric developed by ForeSee Results that projects the contribution of the website to a multi-channel retailer's overall sales through a calculation based on the ACSI methodology.
Tags : 
website analytics, conversion analysis, brick-and-mortar, multi-channel, foresee, foresee results
    
ForeSee Results
Published By: Omniture     Published Date: Jun 27, 2007
In general, most organizations spend more time and money promoting their websites through acquisition channels such as search or affiliate marketing than they do optimizing existing conversion rates. Download this paper now to discover 7 steps to increase conversion engagement.
Tags : 
conversion, conversion analysis, lead generation, website analytics, web analytics, lead generation, lead optimization, omniture, website testing
    
Omniture
Published By: SitePal     Published Date: Jul 02, 2007
Discover the benefits and potential pitfalls of using speaking avatars (virtual animated characters) for your small business websites. Learn the best practices to use to increase conversions with a talking character!
Tags : 
conversion analysis, landing page, landing pages, content personalization, ecommerce, e-commerce, e-business, live support, help desk, online assistance, avatar, online help, web site, sitepal
    
SitePal
Published By: AirTight Networks     Published Date: Nov 30, 1999
Making corporate data accessible through Wi-Fi networks means intruders and other unwanted visitors can easily access such networks if proper precautions and tools aren't used to protect them. This paper will discuss best practices in all five areas to secure the enterprise network, whether wired or wireless.
Tags : 
wireless, best practices, enterprise security, wi-fi, wireless security, network security, intrusion prevention, lan, local area network, local area networking, hacker detection, airtight, airtight networks
    
AirTight Networks
Published By: Schneider Electric     Published Date: Feb 12, 2018
Use of cloud computing by enterprise companiesis growing rapidly. A greater dependence on cloud-based applications means businesses must rethink the level of redundancy of the physical infrastructure equipment (power, cooling, networking) remaining on-premise, at the “Edge”. In this paper, we describe and critique the common physical infrastructure practices seen today, propose a method of analyzing the resiliency needed, and discuss best practices that will ensure employees remain connected to their business critical applications.
Tags : 
    
Schneider Electric
Published By: Applix     Published Date: Mar 13, 2007
This whitepaper will help organizations understand how driver based planning and control activities can be transformed into the proactive management function that add greater value through faster decision making.
Tags : 
productivity, best practices, business process management, bpm, business management, erp, enterprise resource planning, applix
    
Applix
Published By: Aventail     Published Date: Aug 21, 2009
Disaster recovery is not only needed for catastrophic events like natural disasters or pandemics, but for any event, like a snow storm or power outage that keeps your workers from getting to the office and disrupts your business. This white paper by business continuity expert Tim Clark of Fact Point Group, explores best practices for disaster recovery and the key role of SSL VPNs in that process.
Tags : 
disaster plan, disaster recovery plan, disaster recovery, high availability, business continuity, best practices, ssl, vpn, ssl vpn, security management, disaster planning, aventail
    
Aventail
Published By: Bocada     Published Date: Aug 21, 2009
This white paper focuses on Sarbanes-Oxley Act (SOX) regulations relevant to data protection, and describes both best practices and automated tools used by today's leading storage managers and backup/recovery teams to meet the mandates of SOX.
Tags : 
sarbanes oxley act, sarbanes oxley, sarbox, sox, sox compliance, compliance, financial, finance, auditing, security audit, audit, sox audit, data protection, storage management, bocada, bocata
    
Bocada
Published By: Bocada     Published Date: Aug 21, 2009
This white paper shares the best practices for company data security used by some of today's most progressive IT leaders to help align their group's efforts with company goals and to make their data protection activities more successful.
Tags : 
data protection, best practices, business goals, business management, it management, change management, bocata, bocada
    
Bocada
Published By: HP     Published Date: Aug 21, 2009
When deploying Microsoft Exchange Server 2003, there are a number of factors that must be addressed to ensure a successful application deployment. Click here to receive a guide to design and configuration of the EVA8000 for Exchange Server 2003 deployments.
Tags : 
best practices, microsoft exchange, servers, network management, server deployment, application deployment.
    
HP
Start   Previous    86 87 88 89 90 91 92 93 94 95 96 97 98 99 100    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.