Skip to main content
 

hr processes

Results 176 - 200 of 302Sort Results By: Published Date | Title | Company Name
Published By: SuccessFactors     Published Date: Sep 18, 2013
Core HR is at the heart of organizational alignment, collaboration, compliance, and results. HR data is at the center of all HR processes. Any organization that wants to improve productivity, visibility, and efficiency must ensure its employee data is properly managed and integrated.
Tags : 
    
SuccessFactors
Published By: SuccessFactors     Published Date: Sep 18, 2013
SuccessFactors Employee Central is the premier core HR solution in the cloud for small and medium businesses. Benefit from a single, unified system of record so all your decision data is in one place. Take advantage of self-service HR for all your employees and managers, not just for your HR staff. Get all the reporting you need, when you need it, for deeper insight into your people and processes. Plus there’s IT-free operation and management for fewer upgrade hassles – and lower costs.
Tags : 
    
SuccessFactors
Published By: SuccessFactors     Published Date: Sep 23, 2013
Core HR is at the heart of organizational alignment, collaboration, compliance, and results. HR data is at the center of all HR processes. Any organization that wants to improve productivity, visibility, and efficiency must ensure its employee data is properly managed and integrated.
Tags : 
    
SuccessFactors
Published By: SuccessFactors     Published Date: Sep 23, 2013
SuccessFactors Employee Central is the premier core HR solution in the cloud for small and medium businesses. Benefit from a single, unified system of record so all your decision data is in one place. Take advantage of self-service HR for all your employees and managers, not just for your HR staff. Get all the reporting you need, when you need it, for deeper insight into your people and processes. Plus there’s IT-free operation and management for fewer upgrade hassles – and lower costs.
Tags : 
    
SuccessFactors
Published By: Marketo     Published Date: May 18, 2017
While ABM is not a new way to strategically market to target accounts, now it is a scalable, achievable strategy that organizations of all sizes can implement to focus on whole lifecycle marketing for key accounts. Marketing, selling to, and supporting your customers at an account-level is not only critical to your success, it’s what your customers expect. Competitive organizations that are focused on engaging their customers across the entire lifecycle, and throughout their buyer journey, need to sell at an account level, understand the influence of the different contacts and speak directly to them. The ABM we practice today is entirely different than the manual processes of days past. Implementing an ABM strategy no longer means an astronomical investment but it does mean increased revenue, focus, and partnership within your organization.
Tags : 
organization management, target accounts, engaging content, channel optimization, analytics, technology management, abm strategy, communication management
    
Marketo
Published By: Coupa Software     Published Date: Nov 04, 2014
Modern eProcurement solutions promise greater efficiency through improved AP integration, tighter controls, standardized processes, and supplier connectivity. This Paystream Advisors survey report focuses on current attitudes toward eProcurement solutions, how they're being used, and why (and how) that usage is changing. The report also includes an overview of eProcurement capabilities, best practices, and selection criteria.
Tags : 
eprocurement solutions, efficiency, integration, tighter controls, standardized process, best practices, procurement, p2p
    
Coupa Software
Published By: Vertica     Published Date: Aug 15, 2010
If you are responsible for BI (Business Intelligence) in your organization, there are three questions you should ask yourself: - Are there applications in my organization for combining operational processes with analytical insight that we can't deploy because of performance and capacity constraints with our existing BI environment?
Tags : 
business intelligence, vertica, aggregated data, olap, rolap, sql, query, data warehouse
    
Vertica
Published By: Qwest Business.     Published Date: Jan 27, 2010
This in-depth report explores the key considerations, including solution portfolio, partnerships and processes.
Tags : 
qwest business, managed network services provider, portfolio, partnership, it resource, roi, spend management, request for information
    
Qwest Business.
Published By: IBM     Published Date: Jun 16, 2009
As products go to market quicker, employees, customers, and business partners need the ability to collaborate and access business data—when, where, and how ever they choose. Watch this illustrated demo to see how IBM offers a smarter, business-driven approach to Identity and Access Management. And how IBM’s extensive integration capabilities can enhance productivity without compromising security.
Tags : 
identity, access management, secure, ibm, mmdg, enterprise single sign on, user data, security
    
IBM
Published By: IBM     Published Date: Oct 09, 2009
Today, more than ever, organizations must deliver the benefits of cost optimization and business agility. This Podcast series explains how that goal can be realized through dynamic Business Processes Management. The series focuses on banking, government, healthcare, insurance, cross-industry and retail.
Tags : 
ibm industry podcast, cost optimization, business agility, business processes management, banking, government, healthcare, insurance
    
IBM
Published By: Stratus Technologies     Published Date: Jan 07, 2008
CIOs today are being called upon to interpret business strategy and priorities, then add value through information technology initiatives. At a time when "critical to the business" translates to "mission-critical IT", how do you ensure end-to-end availability and reliability of the IT resources that enable your company’s essential business processes.
Tags : 
business success, productivity, compliance, cost control, decrease spending, spend management, data integrity, meeting sla
    
Stratus Technologies
Published By: SAS     Published Date: Jun 05, 2017
"The connected customer is an individual who is intimately connected to the data, outcomes, decisions and staff associated with any relationship to an organization.  To create personalized experiences, companies across all industries must pursue a more connected relationship with their customers through technology and processes focused on delivering relevant personalized experiences whenever possible. In this report, Blue Hill explores the key traits associated with supporting the connected customer through the internet of things, and provides guidance on why the internet of things will be essential across the general business landscape. "
Tags : 
    
SAS
Published By: IBM Software     Published Date: Jul 19, 2011
In this white paper, you'll read why traditional planning and forecasting processes are not enough in today's environment. And, you'll learn about the three capabilities that form the foundation of modern, dynamic planning and forecasting processes. If you want to move beyond the traditional finance role and play a more visible, pro-active role in supporting business decision making, read this white paper today.
Tags : 
cognos, business intelligence, business intelligence software, business intelligence solution, corporate performance management, ibm
    
IBM Software
Published By: IBM Cloud Business     Published Date: Jul 12, 2011
If you're leading or working on a SaaS or PaaS project, interoperability and performance challenges through application migration processes are givens. Avoid common frantic missteps that will add time to your production cycles. This technical note offers specific proactive steps you can take to ensure to the successful migration of your enterprise apps.
Tags : 
app behavior, application migration, application migration process, cloud computing, emerging technologies
    
IBM Cloud Business
Published By: IBM     Published Date: Aug 08, 2012
With tight budgets, it isn't easy to create the operational dexterity needed to thrive in a competitive marketplace. View this demo to find out how IBM® SPSS® solutions for predictive operational analytics help manage physical and virtual assets, maintain infrastructure and capital equipment, and improve the efficiency of people and processes. By using your existing business information, IBM SPSS software can help you: predict and prevent equipment failures that can lead to disruptive, costly downtime; quickly identify and resolve product quality issues to mitigate risks and reduce warranty costs; optimize product assortment planning to increase revenue, reduce working capital requirements and improve the return on inventory investments; and act to retain your best employees by developing predictive attrition models to identify the workers at greatest risk of leaving the organization.
Tags : 
ibm, technology, predictive operational analytics, spss
    
IBM
Published By: SAP     Published Date: Jul 17, 2012
Striving for employees to be able to collect, update, and access data anytime anywhere, organizations are leveraging smartphones and tablets to extend HR data and processes, creating new thresholds of efficiency, decision-making, and competitive advantage. Read this research report for new insights and examples on how mobility is impacting enterprise applications, data and processes, with a particular focus on HR applications.
Tags : 
technology, white paper, employees, smartphones, tablets
    
SAP
Published By: Sage     Published Date: Jan 30, 2015
An appropriate time and attendance system that meets your organization’s needs can help to eliminate and even prevent many, if not most, of the negative aspects of inaccurate and unreliable timekeeping. Maintaining accurate and reliable time and attendance information makes it easier to keep a handle on labor costs, increases the accuracy of payroll, and reduces administration in the human resources (HR) department, thus saving time. This white paper outlines the top benefits of a time and attendance system and the positive effect automating your time and attendance process can have on your organization.
Tags : 
sage, payroll, labor costs, employee, attendance processes
    
Sage
Published By: Percussion     Published Date: Jun 11, 2013
Building a business case for investing in your web content strategy, whether through technology, additional people, or new processes will require that you justify to your senior executives that the investment will pay dividends. Use the folloing paper, and the four models that are presented here, as a framework to help guide your own investment justification process.
Tags : 
cms, cms best practices, cms software, content marketing, content marketing platform, digital content management, content marketing platform, wcms
    
Percussion
Published By: Box     Published Date: Feb 13, 2015
Many CISOs admit to trepidation about the state of cybersecurity within their organizations. Why? Aside from the increasingly dangerous threat landscape, many large organizations face other security challenges, including personnel shortages, an overwhelming number of manual processes, and technology complexity. Beyond these issues however, CISOs also face the progressively difficult responsibility of securing the distributed enterprise. Aside from PCs, departmental file servers, and remote office equipment, the distributed enterprise now includes recent IT additions like mobile computing, SaaS applications, and hybrid cloud infrastructure. In aggregate, this increasingly distributed infrastructure makes information security more cumbersome.
Tags : 
ciso, cybersecurity, esg, it/security, it architecture
    
Box
Published By: GuideSpark     Published Date: Aug 01, 2018
IDG surveyed 1,500 HR decision makers, managers, and employees, and this is what they found: 88 percent of employees at firms with informal processes say they’re more satisfied with their jobs. Discover more of the latest trends in our white paper.
Tags : 
employee communication, employee engagement, employee experience, performance management, performance reviews, continuous performance management, informal conversations, informal performance management
    
GuideSpark
Published By: ThreatTrack Security     Published Date: May 21, 2015
This report provides a 360 degree view of organizations' security threats, response plans, processes, and investments. More than 800 security decision makers and practitioners were surveyed in December 2014 across North America and Europe.
Tags : 
cyberthreat, security, malware, defense
    
ThreatTrack Security
Published By: AWS     Published Date: Jul 16, 2018
The Internet of Things (IoT) is composed of sensor-embedded devices and machines that exchange data with each other and the cloud through a secure network. Often referred to as “things” or “edge devices”, these intelligent machines connect to the internet either directly or through an IoT gateway, enabling them to send data to the cloud. Analyzing this data can reveal valuable insights about these objects and the business processes they’re part of, helping enterprises optimize their operations. Devices in IoT deployments can span nearly any industry or use case. Each one is equipped with sensors, processing power, connectivity, and software, enabling asset control and other remote interactions over the internet. Unlike traditional IT assets, these edge devices are resource-constrained (either by bandwidth, storage, or processing power) and are typically found outside of a data center, creating unique security and management considerations.
Tags : 
    
AWS
Published By: CrowdStrike     Published Date: Feb 14, 2019
How adopting a framework can optimize cybersecurity Today’s threat landscape has created new challenges for security analysts and incident responders, as the number of alerts and their complexity have increased significantly. Organizations with small IT teams are overwhelmed, often lacking the time or resources to investigate every alert. Failing to do so means a high-risk threat might go unnoticed. This can result in a devastating breach, damaging an organization's finances and reputation. This white paper discusses how CrowdStrike is solving these challenges, by implementing the MITRE ATT&CK™ Framework across multiple CrowdStrike processes and product features to help improve analyst’s productivity and prevent breaches. This provides many benefits, including time savings; adding advanced context to security alerts and information; and enabling a common, shared language. However, it also provides some hidden advantages, especially concerning cybersecurity. Read this whitepaper to lear
Tags : 
    
CrowdStrike
Published By: Qualys     Published Date: Nov 05, 2013
A zero-day threat is a vulnerability that becomes known to the vendor on the same day it becomes known to the public, meaning IT assets targeted by a zero-day threat won't have a patch available when it's needed. However, zero-day attacks operate in a realm of the probable - they work only because there are exploitable vulnerabilities within IT systems. Many of these can, and should be prevented. This guide describes why organizations are vulnerable to zero-day attacks, and what you can do to add a zero-day offense to your existing vulnerability management processes to protect your organization's assets and data.
Tags : 
qualys, qualys zero-day risk analyzer, zero-day, zero-day offense, vulnerability, vulnerability management, zero-day threat, patch availablity
    
Qualys
Published By: Mimecast     Published Date: Oct 22, 2018
What if your employees were more informed about security threats, more skeptical about what they receive in email, and less likely to click on malicious links in email without first verifying them? There are some impactful, quick wins that you and your organization can realize by implementing security awareness training. This recent in-depth survey of security professionals by Osterman Research shows that the leading security concerns across organizations are all areas in which security awareness training can yield significant benefits. Here are some suggestions on processes and practices to consider when developing a security awareness training program that will actually change behavior and make the organization less likely to fall prey to a cyberattack.
Tags : 
    
Mimecast
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.