hr tech

Results 526 - 550 of 1105Sort Results By: Published Date | Title | Company Name
Published By: Workday     Published Date: Jul 05, 2019
"Putting people analytics into practice can be difficult, but this eBook outlines six key steps that can guide you through the journey. Learn how to demystify the tools and processes that help you derive insights from your people data. Read now."
Tags : 
workday, workforce technology, digital strategy
    
Workday
Published By: Workday Spain     Published Date: Aug 07, 2018
The role of the CIO is currently experiencing vast change and increased attention from the executive team as a leader who can guide a strategic path for how technology can improve business growth. The CIO’s responsibilities once focused almost entirely on selecting and managing technology solutions, but over the past several years the role of IT has shifted to broadly supporting enterprise strategy through technology, including the creation of new digital businesses. CIOs must now be immersed in both business and technology, and ensure that the organisation overall has the right platforms in place to thrive and grow.
Tags : 
    
Workday Spain
Published By: Workday UK     Published Date: Apr 25, 2019
HR can do more for your organization than just day-to-day tasks. In fact, many of your peers are using it to help achieve growth goals and other business objectives. This eBook explores how technology can transform HR into a more strategic partner for the whole organization. Read now.
Tags : 
    
Workday UK
Published By: Workday Netherlands     Published Date: May 21, 2019
HR kan meer voor uw organisatie doen dan het afhandelen van dagelijkse taken. Zo maken veel van uw peers gebruik van HR om hun zakelijke doelstellingen, zoals groei, te realiseren. In dit eBook leest u hoe technologie HR kan transformeren naar een strategischere partner voor de hele organisatie. Nu lezen.
Tags : 
finance, workday, workforce technology, digital strategy
    
Workday Netherlands
Published By: Workday     Published Date: May 21, 2019
HR can do more for your organisation than just day-to-day tasks. In fact, many of your peers are using it to help achieve growth goals and other business objectives. This eBook explores how technology can transform HR into a more strategic partner for the whole organisation. Read now.
Tags : 
    
Workday
Published By: Hitachi Vantara     Published Date: Aug 02, 2018
In this book, we are going to look at the key trends driving the modernization of data infrastructure. We’ll see how organizations are adapting and flourishing in a data-driven world. For some time, headlines have been around the internet of things (IoT), big data and data analytics. While these developments are important, the reality is that you cannot take full advantage of them without modernization. We’re going to look at these trends and priorities in detail, then look at the three key drivers of modernization: governance, mobilization and analytics. We’ll also consider the technologies that make up modern data infrastructure including artificial intelligence (AI), flash storage, converged and hyperconverged platforms and software-defined infrastructures. By making sense of data, we make sense of the world. With more data than ever before, we have the tools to turn all that information into intelligent innovation and change the way the world works.
Tags : 
data infrastructure, big data, internet of things
    
Hitachi Vantara
Published By: KPMG     Published Date: Jul 31, 2019
Banks need to be agile to respond to threats and embrace new approaches and technologies to predict and prevent fraud. Read our global perspective of how banks are tackling internal and external fraud threats. Read this report to discover: • how banks are deploying resources to optimise their fraud risk management efforts • trends in fraud typologies from investigations and group security professionals • challenges banks are facing in mitigating internal and external threats
Tags : 
    
KPMG
Published By: Schneider Electric     Published Date: Jan 27, 2017
The innovative 2SIS technology in Premset MV switchgear is ideal for harsh environments and drastically reduces the probability of an internal arc by fully enclosing all current carrying portions of the switchgear in high dielectric insulating epoxy. Complete the form to download the whitepaper and learn more about the advantages of 2SIS technology!
Tags : 
schneider electric, mv switchgear, shielded solid insulation system, 2sis
    
Schneider Electric
Published By: VMware Dell     Published Date: Jun 05, 2008
The First American Corporation is America’s largest provider of business information. Their numerous acquisitions and diverse lines of business meant that First American had multiple datacenters dispersed throughout the country. They turned to VMware virtualization technology to consolidate facilities. They standardized on VMware technology and avoided purchasing 700 physical machines.
Tags : 
server consolidation, server containment, desktop manageability, vmware infrastructure, vmware, green it, green, servers
    
VMware Dell
Published By: HP - Enterprise     Published Date: Oct 16, 2008
Is open source secure? How much business risk is introduced with it?  Fortify surveyed the open source community for an answer and revealed that open source projects lack the three essential elements of security:  people, process and technology.  Read this research to discover what actions can reduce these risks within your organization.
Tags : 
fortify, open source, business risk, security, application security, audit, risk, vulnerabilities
    
HP - Enterprise
Published By: HP - Enterprise     Published Date: Nov 19, 2008
While investments to secure the enterprise continue to rise, breaches into company systems and data are skyrocketing. These cyber crimes are consistently debilitating organizations operations, reputations and ultimately, viability. Today’s CEOs are demanding aggressive strategies to protect their business. CIOs and CSOs are working together to employ proven Business Software Assurance approaches across the enterprise to stay ahead of constant threats.
Tags : 
business risk, security, application security, audit, risk, vulnerabilities, fortify, fortify software
    
HP - Enterprise
Published By: Intacct Corporation     Published Date: Oct 02, 2015
Like it or not, the accounting function is in the news distribution business. The demand for financial performance information is high and the pressure for more timely information is even higher. A fast close improves the timeliness of information, aids decision making and is a value-enhancing proposition for the business. To continue adding value, the CFO and controller must find ways to speed up their financial close processes and report financial results before they become old news. Download this white paper and learn the "7 Steps to a Faster, Better Close" including how to: • Identify the hidden traps and pitfalls bogging down your accounting processes • Drive process improvement and collaboration within your organization • Gain visibility and timely access to critical financial and operational information through application integration • Utilize modern accounting technology to accelerate your close with automation
Tags : 
finance
    
Intacct Corporation
Published By: Riverbed Technology, Inc.     Published Date: Apr 22, 2014
Riverbed SteelFusion, as the first converged infrastructure solution purpose-built for the branch, promises to transform branch IT through the stateless “projection” of data, applications, and VMs actually stored in the datacenter. In this Taneja Group Technology Validation we found that SteelFusion truly can transform branch IT by reducing complexity, injecting powerful capabilities and making the branch resilient, protected, and recoverable.
Tags : 
riverbed, branch office recovery, branch office, data loss, risk aversion, backup recovery, virtual servers, branch operations
    
Riverbed Technology, Inc.
Published By: Pentaho     Published Date: Apr 28, 2016
Although the phrase “next-generation platforms and analytics” can evoke images of machine learning, big data, Hadoop, and the Internet of things, most organizations are somewhere in between the technology vision and today’s reality of BI and dashboards. Next-generation platforms and analytics often mean simply pushing past reports and dashboards to more advanced forms of analytics, such as predictive analytics. Next-generation analytics might move your organization from visualization to big data visualization; from slicing and dicing data to predictive analytics; or to using more than just structured data for analysis.
Tags : 
pentaho, best practices, hadoop, next generation analytics, platforms, infrastructure, data, analytics in organizations
    
Pentaho
Published By: TriNet     Published Date: Nov 08, 2017
This eGuide contains guidelines for entrepreneurs looking to build a scalable infrastructure, including robust HR technology, to help save time and effort so that management can focus on company growth.
Tags : 
    
TriNet
Published By: Success Factors     Published Date: Jul 30, 2012
As an HR leader or someone who works in a talent management, recruiting, compensation, workforce planning, learning or technology role, the challenges you face are many. Filling positions faster at the lowest cost. Connecting your people to company strategy. Motivating and rewarding people to improve engagement and productivity. Developing skills. Reducing turnover. And beginning to build your future workforce today. This E-book shows you how SuccessFactors BizX solutions can release the full potential of your workforce. More than automation and efficiency, it's about improving the ways you execute day-to-day work and getting real results.
Tags : 
workforce, workforce potential, company strategy, see your people, successfactors e-book, motivating people, rewarding people, improve engagement
    
Success Factors
Published By: Oracle     Published Date: Apr 03, 2012
Although more than two-thirds of confidential information is regulated through database management systems, no computer security program offers adequate protection for the databases against the main threats affecting them today. Oracle, the leader in databases technologies, offers security solutions for the protection of all layers of the database.
Tags : 
grid computing, oracle, database applications, enterprise applications, java, application integration, configuration management, virtualization
    
Oracle
Published By: Allscripts     Published Date: May 01, 2014
Meaningful Use Stage 2 increases many of the thresholds that were in Stage 1, but the main focus of Stage 2 is on exchanging structured information among providers and patients. With less than 7% of EHR vendors certified, are your systems and providers ready?
Tags : 
allscripts, ehr certification, portal challenges, cpoe adoption, direct messaging, technology upgrade, replacements, cloud reporting
    
Allscripts
Published By: ForeScout     Published Date: Feb 18, 2014
Know your enemy! Establishing an effective defensive strategy is crucial with today's rapidly evolving cyberthreats. Understanding the cybercriminals' techniques used to perpetrate successful attacks is essential. The Cyberthreat Defense Report is based on a rigorous survey of IT security decision makers and practitioners across North America and Europe. It reveals the current and planned deployment of technological countermeasures. Read this new report from CyberEdge and stay one step ahead of your enemy.
Tags : 
forescout, cyberedge, cyberthreat, it security, security, it management
    
ForeScout
Published By: Tripwire     Published Date: Feb 08, 2013
Cyberwar fundamentally changes how government must handle security. Firewalls, intrusion detection systems and other security devices can stop the average hacker, but new threats use stealth techniques that these defenses cannot detect on their own.
Tags : 
cyberwar, hacker detection, defense, security, government, firewall, cyber attacks, cyber threats
    
Tripwire
Published By: CareCloud     Published Date: Dec 18, 2013
Find out how three physicians are using technology to effectively battle operational difficulties and declining profitability.
Tags : 
carecloud, quantiamd, ehr, practice profitability, practice profitability index, ppi, outsourced billing, practice management
    
CareCloud
Published By: CareCloud     Published Date: Jan 08, 2014
While the terms “electronic health record” (EHR) and “electronic medical record” (EMR) are often used interchangeably, only EHRs make Meaningful Use attestation easy. Get The End of EMR free whitepaper today to learn: •The difference between EMR and EHR •How to attest for Meaningful Use •Stage-1 Meaningful Use requirements •Which technologies are right for you •The benefits of EHRs and more… Download this whitepaper to learn more!
Tags : 
emr, meaningful use, electronic health records
    
CareCloud
Published By: ServiceSource     Published Date: Nov 01, 2013
In this book we describe best practices honed through 13 years of experience and partnership with some of the leading technology companies in the world. These best practices will give you insight into three key areas: • Data management & renewal opportunity generation • Sales strategy & execution • Continuing the renewal cycle We hope you enjoy this book!
Tags : 
reducing customer churn, servicesource, recurring revenue, higher profit margins, drive innovation, drive performance, saas companies, competitive markets
    
ServiceSource
Published By: Webroot Inc     Published Date: Jan 15, 2015
The problem with the vast majority of network and endpoint security solutions is that they operate on the premise of static whitelists and blacklists. These lists do not account for the changing nature of URLs, IPs, files and applications, nor for the volume of unknown threats permeating the web, meaning they cannot be used to provide adequate protection. Compounding this problem is that commercial network security technology, such as NGFWs and unified threat management systems, can easily flood the organization’s network security teams with too many alerts and false positives, making it impossible to understand and respond to new threats. As a result, not only do these threats evade the security technology and land with the victim’s infrastructure, but they also have plenty of time to steal sensitive data and inflict damage to the victim’s business. The final characteristic of the latest attacks is how quickly they compromise and exfiltrate data from the organization, compared to the
Tags : 
firewall, network security, urls, ips, adequate protection, security
    
Webroot Inc
Published By: CA Technologies     Published Date: Jun 03, 2015
"Three key market dynamics are currently driving the need for transformation in almost every industry: 1) The need to leverage digital technologies to drive the core business 2) Next generation online consumers and socially networked buyers 3) The financial crisis Companies are under tremendous pressure to bring digital technologies at the center of their business to remain competitive, innovate, create new revenue streams, and drive greater customer intimacy. As a result the need to leverage technology to significantly reduce the cost of going to market while driving growth has led to increasing interest in software-based business models. "
Tags : 
    
CA Technologies
Start   Previous    15 16 17 18 19 20 21 22 23 24 25 26 27 28 29    Next    End
Search Resource Library      

Add Resources

Get your company's resources in the hands of targeted business professionals.