hr tech

Results 326 - 350 of 1080Sort Results By: Published Date | Title | Company Name
Published By: Lumesse     Published Date: May 28, 2015
This report shows how building talent, leadership and agility advantages are the top three HR imperatives for businesses to create a sustained competitive edge.
Tags : 
hr trends, talent, leadership, agility, hr functions, digital, digital hr, lumesse, technology, hr technology, hr professionals, hr decision-makers, business issues and trends, global hr management, human resources management, management fundamentals
    
Lumesse
Published By: Aerohive     Published Date: Oct 27, 2015
Das Webinar richtet sich an IT-Spezialisten, die mehr über die Möglichkeiten im Bereich WLAN erfahren möchten bzw. an Organisationen, die planen, WLAN einzusetzen oder ihre bestehende WLAN-Infrastruktur zu erneuern.
Tags : 
wlan, wi-fi, wireless networks, wireless architectures, networking, wifi, wireless hardware, wireless infrastructure, wireless security
    
Aerohive
Published By: Kaspersky Lab     Published Date: Oct 30, 2014
You’re aware of the threats of malware to your business but what about the ever-changing ground rules? Cybercriminals today are launching attacks against businesses by copying sophisticated malware and techniques used to target governments and high-profile organizations.
Tags : 
malware threats, cyberespionage, security technologies, security, it management, knowledge management, data management, business intelligence
    
Kaspersky Lab
Published By: SumTotal     Published Date: Feb 01, 2013
Most HR professionals are ready for a completely different approach to HR technology. This engaging paper from SumTotal explains why that is — and how one system is revolutionizing the industry in response.
Tags : 
sumtotal, sumtotal systems, elixhr, talent expansion, integrated hr solutions, human resources, hr technology, hr solutions, hr systems, enterprise resource planning, erp, human capital management, hcm, virtual system of record, talent management solutions, nurturing talent, integrate hr systems, traditional hr technology, business technology
    
SumTotal
Published By: athenahealth     Published Date: Apr 09, 2012
Are you wondering why there's so much buzz around cloud computing? Discover how cloud-based services offer a solution that's more flexible, scalable, and available.
Tags : 
cloud based practice management, cloud based medical billing, cloud based emr, cloud based ehr, cloud based health care, cloud computing, cloud health care, cloud technology, hit, health information technoloy, cloud technology, athenahealth, athena health
    
athenahealth
Published By: Allscripts     Published Date: Jun 05, 2013
This paper examines these technologies in the context of a four step process that many successful practices are using to optimize their revenue cycles. The “Four Steps to Transformation” methodology represents the distillation of best practices from thousands of medical groups across the United States who leverage technology to improve their bottom lines.
Tags : 
physician, revenue cycle, technology, physician compensation, billing, reimbursement
    
Allscripts
Published By: Workday     Published Date: Jan 10, 2019
Wellesley College has a lot of success stories to share following its strategic deployment of Workday. Increased internal adoption and collaboration between finance and HR are just the start of a long list of benefits the college now enjoys. Watch the webinar replay with Wellesley’s Ravi Ravishanker, CIO and associate provost; Nephellie Dobie, director of Project Management and Business Analysis; and Veronica Brandstrader, associate CIO, to learn about its: • Evaluation and deployment • Technology transformation • Benefits realized • Lessons learned
Tags : 
    
Workday
Published By: Medsphere     Published Date: Jun 26, 2013
Learn how a single comprehensive tool can be leveraged across the continuum of acute, ambulatory, and long-term care environments as well as in multi-facility, multi-specialty healthcare organizations.
Tags : 
medsphere, openvista, electronic health record, ehr, electronic medical record, emr, health information technology, health it, computerized provider order entry, cpoe
    
Medsphere
Published By: Medsphere     Published Date: Aug 21, 2013
Learn why the three major barriers to healthcare technology has slowed its adoption and see how to solve these issues to maximize the benefits from your Electronic Health Records.
Tags : 
medsphere, healthcare, health it adoption, health information technology, ehr, efficiency
    
Medsphere
Published By: Dell     Published Date: Sep 18, 2017
The workplace is changing and the one-size-fits-all approach to technology is changing along with it. As a result, your organization may need to rethink how to keep productivity high, promote collaboration, delight employees with the latest devices all while keeping IT within budget. This interactive eGuide will be your one-stop resource to understand all the new innovation available in Dell’s latest notebooks, desktops, 2-in-1s and ecosystem that can keep your organization future-ready. Access the eGuide from Dell and you will learn: • How the workplace and workforce is changing • What tools and solutions help IT go from maintenance to innovation • How innovation is changing notebooks, 2-in-1s, desktops and workstations • The latest Windows 10 features employees will be talking about • What you need to keep endpoints and data secure
Tags : 
    
Dell
Published By: MobileIron     Published Date: Aug 27, 2015
This is a case study about the Varian Medical system's focus on energy and saving lives through advanced technology.
Tags : 
mobileiron, medical devices, medical software, security
    
MobileIron
Published By: MobileIron     Published Date: Apr 05, 2017
Now is the time to switch from BlackBerry’s new and unproven mobile device management (MDM) offering to a modern, comprehensive EMM solution like MobileIron. In today’s highly competitive and fast-paced global economy, the last thing companies need is an MDM vendor who is always playing catch up through technology acquisitions that cost too much and offer too little. MobileIron is a recognized industry leader that has always been 100% focused on mobile security. Our unified, multi-OS EMM platform was built from the ground up to meet the needs of the modern mobile enterprise by reducing IT complexity, delivering a secure user experience, and protecting mobile apps and data on any device, in any cloud service, anywhere in the world.
Tags : 
mobile security, mobile device management, enterprise data, application security, information security, communication interception, business data, app security
    
MobileIron
Published By: Intralinks     Published Date: Apr 13, 2015
They say content is king. But if your content isn’t protected, it’s a king with no clothes. The proliferation of mobile devices in the workplace, and the availability of cloud services designed for consumers, can lead to improper sharing of corporate data. Information that leaves your firewalls can live forever, and without adequate protection, can end up in the wrong hands. This report by Ovum takes a look at the challenges of information security and explores how a new generation of Information Rights Management (IRM) technology directly addresses the most critical concerns. Key topics include: • The threat posed by Dropbox and other consumer-grade FSS providers • The need for lifetime control of information and content • The ability to perform audits, and locate files, anywhere, and who accessed them • How next-generation IRM technology is available to add a new layer of security to every file
Tags : 
    
Intralinks
Published By: Mitel     Published Date: Jun 27, 2016
Join Mitel and industry experts on this webcast and learn how Mitel is helping SMBs deliver a seamless experience for their mobile customers through cloud. Topics to be covered in this event: • Why today’s technology fails to deliver the experience you want for your customers • What you should expect and receive from your cloud communication provider now and in the future • The impact of the mobile consumer on small and medium business customer engagement strategies • How consumer expectations have changed the workforce Moderator: Elliot Markowitz, Director, Content Marketing Services, Madison Logic
Tags : 
cloud, telephony, mobile consumer, customization, smbs, seamless experience, enterprise applications
    
Mitel
Published By: Mitel     Published Date: Apr 07, 2017
Für intelligentere Geschäfte Die heutige Geschäftswelt wird zunehmend schnelllebiger, wettbewerbsorientierter und globaler, außerdem nimmt der Einfluss von Technologie immer mehr zu. Kulturelle, technologische und physische Elemente greifen ineinander und treiben den Wandel voran wie nie zuvor. Gefordert wird eine freiere Arbeitsgestaltung, der Trend zur „BYOD“-Praxis (bring your own device) setzt sich immer weiter durch, echnologieinnovationen und neue Geräte, Plattformen und Anwendungen halten immer weiter Einzug und internationale und regionale Grenzen werden überwunden.
Tags : 
    
Mitel
Published By: Mitel     Published Date: Apr 07, 2017
Mitel Mobilität Das Ausmaß und die Geschwindigkeit der Veränderungen, die Ihr Unternehmen erfährt, kann von zahlreichen Faktoren beeinflusst werden: Der wirtschaftlichen Lage, durch Wachstum des Unternehmens, Technologiesprünge, die Dynamik eines bestimmten Markts oder einer bestimmten Region. Zusammen tragen sie oft zu turbulenten Zeiten bei. Wenn Ihr Unternehmen wettbewerbsfähig bleiben und neue Chancen nutzen soll, ist die Fähigkeit, den Wandel vorherzusehen und schnell darauf zu reagieren, von erheblicher Bedeutung. Im Folgenden beschreiben wir fünf Möglichkeiten, wie Sie die geschäftliche Agilität in Ihrem Unternehmen steigern können.
Tags : 
    
Mitel
Published By: Akamai Technologies     Published Date: Aug 22, 2018
Malicious botnets present multiple challenges to enterprises — some threaten security, and others merely impact performance or web analytics. A growing concern in the bot environment is the practice of credential stuffing, which capitalizes on both a bot’s ability to automate repeat attempts and the growing number of online accounts held by a single user. As bot technologies have evolved, so have their methods of evading detection. This report explains how the credential stuffing exploit challenges typical bot management strategies, and calls for a more comprehensive approach.
Tags : 
management, bot, security, credential, akamai
    
Akamai Technologies
Published By: Oracle HCM Cloud     Published Date: Jun 07, 2016
HR organizations at colleges and universities are increasingly viewed as agents of change. A modern HR organization strategically aligns the right technology with needs of faculty and staff to deliver great student and employee experiences. Find out how.
Tags : 
    
Oracle HCM Cloud
Published By: Oracle HCM Cloud     Published Date: Aug 02, 2016
What HCM Cloud capabilities should you look for to transform your HR organization? Don't settle for legacy HR systems stitched together from acquired technologies and packaged as "cloud" solutions. Go with the most complete cloud suite - Oracle HCM Cloud. Find out more.
Tags : 
    
Oracle HCM Cloud
Published By: Brainshark     Published Date: Aug 02, 2017
It’s clear that sales enablement is widely recognized as a critical B2B function, with the number of dedicated sales enablement roles more than doubling over the past three years. But such an important job can become overwhelming without the right solution in place. You know technology is the key to ensuring maximum effectiveness. But how do you convince the decision maker and other key stakeholders to get on board with the investment? In this exclusive brief, you’ll learn 6 tips to help prepare and present your business case for sales enablement technology
Tags : 
b2b, sales technology, decision makers, sales
    
Brainshark
Published By: Determine (Selectica)     Published Date: Sep 13, 2016
The sponsor named below commissioned Ardent Partners to write this report. While the report topic In 2015, collaboration is the name of the game in procurement and frequently entails working with key internal stakeholders (like line-of-business managers and legal departments) or preferred suppliers to drive greater value through sourcing and procurement. For Chief Procurement Officers ("CPOs") and other supply management leaders, collaboration has taken on many new and innovative forms over the years, causing these executives to leverage new (and, in some cases, existing) processes, relationships, and technologies to enhance compliance, decrease risk, and increase savings. One such business process, contract management, has been reborn with digital, automated features that can shift the way procurement teams collaborate, mitigate risk, drive performance, and realize greater savings for the enterprise.
Tags : 
    
Determine (Selectica)
Published By: Lookout     Published Date: Mar 29, 2017
As the mobile workforce continues to expand, so do risks to enterprise security. Read the Lookout whitepaper for an overview of the current state of mobile security, including market analysis, current threats, and gaps in existing technology.
Tags : 
idg, mobile workforce, analysis, technology, lookout
    
Lookout
Published By: Lookout     Published Date: Dec 11, 2018
There are three key statements enterprises must hear in order to move forward in protecting corporate resources from leakage and attack: The perimeter has disappeared. Legacy security technologies do not work. Devices cannot be trusted. A new security architecture is needed to protect data as employees and devices connect to corporate resources in the cloud, all over the world. That architecture is post-perimeter security. Read this whitepaper to: Learn why perimeter security is not longer viable Understand the new, necessary security architecture: post-perimeter security Learn how phishing attacks are thwarting traditional firewalls Find out how Lookout enables enterprises to embrace post-perimeter security in their own environments
Tags : 
    
Lookout
Published By: HP Inc.     Published Date: Jul 17, 2017
Three-dimensional printing of useful objects and machine parts is becoming a reality. 3D printing offers the ability to produce—both rapidly and at low cost—short runs or one-of-a-kind parts. HP’s development of HP Multi Jet Fusion technology includes new HP Jet Fusion 3D Printers and an Open Platform that will revolutionize the design, materials, manufacturing, and distribution of 3D parts to drive the digital transformation of manufacturing. This technical white paper provides details on HP Multi Jet Fusion and HP’s strategies and vision to introduce a new era of digital manufacturing.
Tags : 
print services. hp technology, 3d printing, printer, digital manufacturing, printing solution, digital materials, production software, 3d technology
    
HP Inc.
Published By: Fiserv     Published Date: Nov 09, 2017
Financial institutions seeking to attract new customers and revenue channels are expanding into digital services, real-time payments and global transactions. However, with every new service, criminals are developing innovative ways to infiltrate financial systems, and older technologies that mitigate fraud no longer work as effectively. So how can financial institutions respond to this growing threat? Fortunately, more advanced technologies hold great potential for real-time financial crime mitigation. Learn about five current and emerging technologies that could impact money laundering and fraud mitigation, including artificial intelligence/machine learning, blockchain, biometrics, predictive analytics (hybrid model) and APIs. Read the latest Fiserv white paper: Five Tech Trends That Can Transform How Financial Institutions Detect and Prevent Financial Crime.
Tags : 
kyc, know your customer, beneficial ownership, financial crime, financial crimes, compliance, enhanced due diligence, suspicious activity report, currency transaction report, aml directive, anti-money laundering laws
    
Fiserv
Start   Previous    7 8 9 10 11 12 13 14 15 16 17 18 19 20 21    Next    End
Search Resource Library      

Add Resources

Get your company's resources in the hands of targeted business professionals.