ar best practices

Results 151 - 175 of 1112Sort Results By: Published Date | Title | Company Name
Published By: TriNet     Published Date: Jul 28, 2015
Identifies the foundational risks that can distract executives from focusing on and achieving their business' goals, and offers recommendations for eliminating those risks altogether.
Tags : 
foundational risks, risk elimination, selection process, compensation practices, performance management system, harassment prevention, best practices, entrepreneurship management, employee performance, infrastructure
    
TriNet
Published By: Success Factors     Published Date: Jul 27, 2012
HR leaders hear lots of talk about "getting a seat at the table" among the leadership functions of an organization. But what does "getting a seat" really mean? Simply put, CEOs are demanding a more strategic approach in managing today's workforce needs, as well as in planning for future needs. As an HR leader, how can you take ownership of the talent strategy in your organization? It's time for you to find out. Talent can move the needle in your organization. By exploring six best practices that all HR leaders should follow, this complimentary guide shows you how to earn the respect of fellow business leaders. Download it today.
Tags : 
success factors, sap, best practices, talent problems, talent strategy, talent management, business leadership, hr leaders, workforce management, hr services, talent data, hr technology, talent metrics, hr integration, global hr management
    
Success Factors
Published By: Teradata     Published Date: Jan 30, 2015
Our goal is to share best practices so you can understand how designing a data lake strategy can enhance and amplify existing investments and create new forms of business value.
Tags : 
data lake, data warehouse, enterprise data, migration, enterprise use, data lake strategy, business value, data management, data center
    
Teradata
Published By: Symantec     Published Date: Jun 27, 2013
Symantec Corporation and Ponemon Institute are pleased to present the 2013 Cost of Data Breach: Global Analysis, our eighth annual benchmark study concerning the cost of data breach incidents for companies located in nine countries. Since 2009, we have provided a consolidated report of the benchmark findings from all countries represented in the research. In this report, we present both the consolidated findings and country differences.
Tags : 
symantec, data breach, global analysis, benchmark findings, research, best practices, technology, security, knowledge management, data management, data center
    
Symantec
Published By: Genesys     Published Date: Dec 11, 2013
Read Now: The Automatic Call Distributor (ACD) is no longer a core component in the contact center and has become a costly technology that is difficult to manage in a distributed enterprise environment. If you are looking to move away from your legacy call center infrastructure — to a modern, multi-channel Contact Center this white paper gives you a blueprint to modernization and replacing your ACD. Read this insightful resource to learn how building a multi-channel contact center based on IP/SIP technology can enable you to: • Enhance Customer Experience • Virtualize your customer service environment • Reduce Total Cost of Ownership (TCO) Get this whitepaper for best practices, and integration guidelines to help you transition to a modern, SIP/IP-based contact center environment. Read Now.
Tags : 
automatic call distributor, acd, contact senter, legacy call center infrastructure, multi-channel contact center, ip/sip technology, total cost of ownership, tco, genesys, call center management, call center software, customer interaction service, customer satisfaction, customer service, it spending, contact management, customer experience management, telecom
    
Genesys
Published By: Peoplefluent     Published Date: Apr 02, 2013
As competition for talent intensifies, take advantage of social technologies for recruiting. Learn how social and collaboration tools enhance, improve and reinvent recruiting processes, and best practices for developing a social recruiting strategy.
Tags : 
recruiting, recruiting software, social recruiting, social recruiting software, social collaboration, collaboration, social hcm, hiring software, talent acquisition, talent management, social technologies, mobile technology, mobile talent management, social and mobile tools, collaboration tools, candidate experience, redefine recruiting processes, social recruiting best practices, improve recruiting, social hiring
    
Peoplefluent
Published By: SumTotal Systems     Published Date: Oct 10, 2013
What you see isn’t always what you get with HR, talent, and learning software. Did you know that, even with the rigour frequently put into selection, two-thirds of HR software projects fail to produce at least half of the expected benefits? Or how about that a recent research project from Clarkson University determined that there was no link between HR software and HR’s ability to be more strategic? Even though HR technology is often sold as “best practices in a box,” looks can be deceiving. To avoid being duped by pretty demos of software with no substance and find a partner that can meet the hidden complexities that exist in your unique processes, you need to ask the right questions.
Tags : 
sumtotal, sumtotal systems, hr technology, hr buyers, hr technology buyers, human resources, hr software, strategy, decision making process, it management
    
SumTotal Systems
Published By: BI WORLDWIDE     Published Date: Dec 22, 2014
The number of employees still engaged after their first six months on the job is roughly 40%. As the workplace continues to evolve, it’s more important than ever to develop an engagement strategy that will combat the fatigue you’ll see among the other 60% of your employees. You can’t rely on 20th-century strategies for 21st-century challenges. Download our article to learn the top 6 workplace trends you’ll experience in 2015, as well as best practices to follow to drive engagement.
Tags : 
employee engagement, employee recognition, social recognition, mobile recognition, employee awards, employer engagement, incentive programs, employee incentives, reward ideas, recognition programs, recognition gifts, employee programs, recognition ideas, employee motivation, recognition program ideas, best practices, employee performance
    
BI WORLDWIDE
Published By: BI WORLDWIDE     Published Date: Dec 22, 2014
As a manufacturer, your uncontrolled distribution channel has a lot of places to focus their attention. So how do you break through the clutter? Reward and recognition programs have long been used to engage channel partners and align their activities with manufacturers’ goals. Applying behavioral economics to your program design will drive extra focus and effort. Learn ten best practices to follow when designing your next channel reward and recognition program.
Tags : 
customer loyalty, loyalty program, customer engagement, brand loyalty, brand advocacy, channel engagement, channel incentives, channel loyalty, customer incentive programs, customer loyalty program, customer marketing, best practices, business intelligence, customer interaction service, customer relationship management, customer satisfaction, customer service
    
BI WORLDWIDE
Published By: Monetate     Published Date: Sep 30, 2014
Real-time marketing is one of those buzzwords that sounds good. But, when you ask someone what it means, you get a pretty fuzzy answer. So, we decided to clarify that answer with exclusive research, produced in association with Econsultancy, that provides a snapshot of the real-time marketing landscape in 2014. Inside this report, you’ll learn how to leverage best real-time marketing practices to drive better customer experiences and increased revenue.
Tags : 
real-time marketing, exclusive research, marketing landscape, personalized messages
    
Monetate
Published By: NetApp     Published Date: Nov 27, 2017
Join data protection experts from Forrester Research, NetApp and AWS and find out how to secure your Microsoft Office 365 business-critical data from accidental deletion, corruption, or malicious intent.
Tags : 
    
NetApp
Published By: SAP     Published Date: Jun 04, 2015
Workforce analytics solutions are the key to answering such questions and getting the metrics and insights needed to make informed HR decisions and create actionable workforce plans. This paper explores the business case for investing in workforce analytics. It focuses on how cloud-based solutions hide complexity associated with HR data, as well as deliver best practices, minimize maintenance costs, and provide quick time to value.
Tags : 
    
SAP
Published By: SAP     Published Date: Jun 12, 2015
Competition for talent is fierce, and employer branding – or communicating why your company is a great place to work – is becoming a more sophisticated and more critical part of a recruiting strategy. While you communicate an employer brand in many ways, it’s most important on the corporate career site, where you have the opportunity to convert people you’ve touched through other channels into potential future employees. A poor user experience on your career site negatively impacts your employer brand and greatly reduces the chance that people will fill out an application. Download this white paper to discover five best practices that can help make your career site your # 1 recruiting asset.
Tags : 
    
SAP
Published By: SAP     Published Date: Jun 12, 2015
Download this white paper to learn which best practices you should you follow to help strike the right balance and How other leading organizations have designed effective review forms and processes.
Tags : 
    
SAP
Published By: Mimecast     Published Date: Nov 14, 2018
What if your employees were more informed about security threats, more skeptical about what they receive in email, and less likely to click on malicious links in email without first verifying them? There are some impactful, quick wins that you and your organization can realize by implementing security awareness training. This recent in-depth survey of security professionals by Osterman Research shows that the leading security concerns across organizations are all areas in which security awareness training can yield significant benefits. Here are some suggestions on processes and practices to consider when developing a security awareness training program that will actually change behavior and make the organization less likely to fall prey to a cyberattack.
Tags : 
    
Mimecast
Published By: SuccessFactors, an SAP Company     Published Date: Jun 18, 2015
Download this white paper to learn which best practices you should you follow to help strike the right balance and How other leading organizations have designed effective review forms and processes.
Tags : 
    
SuccessFactors, an SAP Company
Published By: SuccessFactors, an SAP Company     Published Date: Jun 18, 2015
Workforce analytics solutions are the key to answering such questions and getting the metrics and insights needed to make informed HR decisions and create actionable workforce plans. This paper explores the business case for investing in workforce analytics. It focuses on how cloud-based solutions hide complexity associated with HR data, as well as deliver best practices, minimize maintenance costs, and provide quick time to value.
Tags : 
    
SuccessFactors, an SAP Company
Published By: Akamai Technologies     Published Date: Mar 10, 2016
When your Internet-facing network comes under DDoS attack, does your entire organization panic – or does everyone know exactly what to do? Read this whitepaper to learn how to protect network assets, websites, and web applications against DDoS attacks and best practices for adding DDoS mitigation to a corporate incident response plan.
Tags : 
ddos mitigation, best practices, akamai technology, cyberdefense, cyber security, anti spam, anti virus, ddos, hacker detection, internet security, intrusion detection, intrusion prevention
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Mar 15, 2016
HIMSS Analytics, in partnership with Akamai, recently conducted a survey of U.S. hospitals to understand the current state of web security in healthcare as well as what plans are in place to improve preparedness. The results raise some concerns that despite greater consciousness of the increased risk to healthcare data security, many hospitals are still vulnerable to a wide range of cyberattacks. Read this survey to learn about critical weaknesses in hospital web security.
Tags : 
web security, healthcare, network management, security, cyberattack prevention, best practices, network architecture, network performance, network performance management, network provisioning, network security, business intelligence
    
Akamai Technologies
Published By: LifeLock     Published Date: May 10, 2016
A data breach can happen at any time. Be ready to respond. Download now and learn the best practices for handling a company data breach. See how you can protect your organization!
Tags : 
    
LifeLock
Published By: Staples     Published Date: Jun 01, 2017
Watch this on-demand webinar to hear senior research director Patrick Connaughton from the Hackett Group review the latest research on supplier segmentation and stratification strategies. You’ll also get practical advice on implementing these best practices at your organization.
Tags : 
procurement, procurement strategy, purchasing, vendor selection, supply chain, supplier management, strategic sourcing, vendor management, srm, supplier relationship management
    
Staples
Published By: Evariant     Published Date: Nov 20, 2018
As the healthcare landscape continues to move toward a customer-centric approach, there’s a lot healthcare can learn from retail. More specifically, lessons from retail call centers offer the healthcare sector best practices to provide better personalization in their engagements with consumers and patients – before and after clinical encounters. This guide explores three ways retail call centers provide experiences that healthcare leaders can incorporate to provide the personalization needed to impact consumers in today’s evolving healthcare marketing landscape.
Tags : 
patient engagement, call center, healthcare crm, patient experience, patient acquisition, healthcare transformation
    
Evariant
Published By: Progress     Published Date: Oct 09, 2017
Tailoring experiences for customers is critical to make your business standout. Customization works well for organizations that want to enhance their standard customer experience but don’t have the necessary tools or strategy for in-depth personalization. Learn about the 5 best practices for customizing websites and the 5 biggest challenges marketers face while customizing their websites.
Tags : 
    
Progress
Published By: CrowdStrike     Published Date: Feb 01, 2017
Once a “consumer-only” problem, Ransomware now has an established business case for profitability, and that’s driving criminals to expand their operations and hunt for more lucrative prey. As a result, commercial enterprises and other large organizations are increasingly in the crosshairs. Consider these facts: ? Ransomware attacks doubled in 2015 ? The number of new ransomware variants increased 17% in Q1 2016 ? The FBI estimates that ransomware will net criminals $1 billion in 2016 This white paper dives into the inner workings of ransomware, its perpetrators and how they are evolving to maximize profits. You’ll also learn how companies are fighting back, and review best practices for protecting your organization from becoming another victim of electronic extortion.
Tags : 
    
CrowdStrike
Published By: CrowdStrike     Published Date: Feb 01, 2017
This year’s Cyber Intrusion Services Casebook focuses on in-depth digital forensics, incident response (IR) and remediation services performed on behalf of actual CrowdStrike clients. Real-life examples drawn from notable CrowdStrike Services IR engagements in 2016 — including the now-infamous hack of the Democratic National Committee (DNC) —are covered with an emphasis on best practices organizations can follow to identify and eject attackers before a devastating breach occurs. Download this report to learn: • How CrowdStrike’s Falcon OverWatch and professional services teams discovered and attributed the DNC intrusion to nation-state threat actors FANCY BEAR and COZY BEAR • The gaps in security processes and planning that your organization can address now to stop the next breach • The specific tactics, techniques and procedures (TTPs) a range of nation-state and eCrime adversaries used to penetrate their victims’ defenses, and how they attempted to cover their tracks
Tags : 
    
CrowdStrike
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search Resource Library      

Add Resources

Get your company's resources in the hands of targeted business professionals.