programs

Results 326 - 350 of 555Sort Results By: Published Date | Title | Company Name
Published By: Rosetta Stone     Published Date: Dec 07, 2017
The new federal law, Every Student Succeeds Act (ESSA), creates new opportunities to secure funding for language programming. Funding is available, but the strategies to secure the money must be carefully measured. Taking a strategic approach to this opportunity is critical. Download the whitepaper to read more about the funding sources that should play into your strategies.
Tags : 
language programs, k-12, rosetta stone, every student succeeds act (essa), federal funding strategies
    
Rosetta Stone
Published By: Rosetta Stone     Published Date: Feb 02, 2018
In this eBook, we discuss strategic approaches to help you fund your world language and ELL programs.
Tags : 
    
Rosetta Stone
Published By: VMware     Published Date: Feb 24, 2017
Today's savviest enterprises are leveraging BYOD as a tool to drive mobile accessibility, increase IT oversight, and enable employees to complete business tasks anytime, anywhere, on any device. Considering the risks, there must be a strategy for managing and securing these BYOD devices. BYOD programs provide users with a secure, IT-approved method for accessing corporate resources from their personal devices. This white paper outlines the basic measures business leaders and IT professionals are taking to turn their BYOD programs into major productivity gains.
Tags : 
    
VMware
Published By: VMware     Published Date: Feb 24, 2017
Today's savviest enterprises are leveraging BYOD as a tool to drive mobile accessibility, increase IT oversight, and enable employees to complete business tasks anytime, anywhere, on any device. Considering the risks, there must be a strategy for managing and securing these BYOD devices. BYOD programs provide users with a secure, IT-approved method for accessing corporate resources from their personal devices. This white paper outlines the basic measures business leaders and IT professionals are taking to turn their BYOD programs into major productivity gains.
Tags : 
    
VMware
Published By: Glint     Published Date: Sep 20, 2017
The employee engagement survey can be a powerful force for consistent, positive change. This guide provides a more insightful and actionable approach to employee engagement, including a framework for designing and implementing pulse programs. The ideas inside come from decades of engagement survey and organizational development (OD) experience.
Tags : 
employee engagement software, team engagement software, employee engagement initiatives, impact of employee engagement, employee engagement software, drivers of employee engagement
    
Glint
Published By: Glint     Published Date: Sep 26, 2017
This white paper explores the data-driven strategies of innovative organizations who leverage employee engagement as a strategic weapon to improve productivity, retention, and corporate performance. It looks at different ways of measuring engagement, how common challenges in building engagement programs have been overcome by well-known enterprises, and offers real-life examples from HR executives.
Tags : 
employee engagement, hr metrics, employee engagement survey, employee engagement strategies, employee engagement strategy
    
Glint
Published By: SAP     Published Date: May 05, 2009
Learn how to meet the challenges facing your agency with respect to the recent stimulus plan. Accept the government's challenge to maintain your focus on developing programs that achieve long-term results for constituents, while ensuring that these programs adhere to the complex requirements for stimulus funds.
Tags : 
sap, economic stimulus fund, stimulus plan, arra, recovery, infrastructure, enterprise resource planning, it spending
    
SAP
Published By: SAP     Published Date: Mar 24, 2011
The list of initiatives that are data-enabled-indeed, data-intensive-vary from company to company, from industry to industry. But the common denominator is an increasing awareness that these and other programs can't succeed without clean, meaningful, and available information. In this white paper, Baseline Consulting's Jill Dyché discusses how the data conversation is changing from philosophical questioning to hard-core tactics, from "What do we need?" to "Where do we start?" It covers the most common reasons for data governance failure, as well as the components of data governance that will inform the right strategy and give companies a means of determining where and how to begin their data governance journeys.
Tags : 
data governance, data governance failure, data governance initiative, governance, business intelligence, database development, data integration, data mining, data protection, data quality, database security, data warehousing
    
SAP
Published By: SAP     Published Date: Apr 13, 2011
Compliance and Traceability in Manufacturing has traditionally been viewed as "cost of business" but this perception is changing as automation and integration gains traction across industries. This report will benchmark the ways manufacturers are using compliance and traceability programs as a competitive advantage in the market place.
Tags : 
compliance, traceability, operational metrics, real-time visibility, technology integration, performance visibility, mes, qms, erp, pat, mature quality program, enterprise resource planning, manufacturing execution systems
    
SAP
Published By: Impact Radius     Published Date: Oct 08, 2014
If you are relying on affiliate networks you have no access to vital data to manage affiliate processes such as tracking, reporting, and contracting. The affiliate networks own the data and control what brands you are able to see. You receive an incomplete view of conversion and performance data, and you are unable to track the true source of every lead across multiple channels. So how could you manage your affiliate programs with the benefits of Big Data intelligence? Read this MarketingProfs whitepaper and get the Big Data intelligence you need to manage a successful affiliate program.
Tags : 
    
Impact Radius
Published By: SAS     Published Date: Mar 06, 2018
Enhanced regulatory pressure requires continuous evaluation of your bank’s risks. To meet these demands, the AML industry has turned to analytical/statistical methodologies to: • Improve monitoring programs. • Reduce false-positive alerts. • Increase monitoring coverage. • Reduce the rapidly escalating financial cost of maintaining AML programs.
Tags : 
    
SAS
Published By: Qualys     Published Date: Jan 11, 2017
Continuous monitoring (CM) begets a process of continuous improvement that works to reduce attack surface and improve security posture, according to the 2016 SANS survey on CM conducted during the months of July to September. In it, 63% of respondents said CM was improving their security posture.
Tags : 
information security, it compliance, it audit, it security, network security, web application security, application security
    
Qualys
Published By: Qualys     Published Date: Jan 08, 2015
Learn what 488 IT professionals have to say in the 2014 Application Security Programs and Practices survey. Results indicate an increase in number of organizations with a formal application security program in place. Approximately 83% of respondents (up from 66%) have an Appsec program in place, and more than 37% (up from 33%) have a program that has been operating for more than five years.
Tags : 
application security programs, it professionals, formal application, security
    
Qualys
Published By: WebEx Communications     Published Date: Dec 14, 2007
Health services organizations around the world are discovering that they can optimize business strategies while protecting patient records. These companies use WebEx online applications to reach and support a growing number of employees and customers. They also follow HIPAA mandates using WebEx secure connections that encrypt all content. This content is never uploaded to any WebEx server, ensuring the highest level of data security and confidentiality.
Tags : 
online presentations, online training, staff training, interactive selling, system management, remote support, web meetings, online meetings, webinars, hipaa compliance, ensure compliance, system rollout, community education, community programs, webex, remote access, compliance, collaboration
    
WebEx Communications
Published By: Neolane, Inc.     Published Date: Jan 08, 2010
This white paper outlines how B2B marketers can build the foundation for their own lead nurturing programs to increase campaign effectiveness, maintain the interest of prospects through the entire sales cycle, and deliver automated time- and event-triggered inbound and outbound programs.
Tags : 
neolane, b2b marketer, lead nurturing program, lead generation, campaign, marketing automation, lead management optimization, enterprise marketing software
    
Neolane, Inc.
Published By: ClickSquared     Published Date: Jul 07, 2009
With interactive relationship marketing, businesses can build relationships that captivate and motivate prospects and customers across an entire buying lifecycle, while providing measurable results. The digital platform these programs run on should support a long-term vision for the role of IRM, encompassing a complete range of services and facilities in an integrated management and communication systems. Learn more today!
Tags : 
clicksquared, digital marketing, interactive relationship marketing, irm, lifecycle, marketing intelligence, it foundation, web 2.0, api, dashboard, kpi, direct mail, sms, marketing mail, txt, real time results
    
ClickSquared
Published By: Comdata     Published Date: Nov 28, 2011
When it comes to payroll, many companies are no longer choosing paper over plastic. Today's paperless payroll programs have become a variable option for many employers. These programs complement direct deposit and reduce payroll expenses; they also offer added convenience to unbanked employees by offering them immediate access to funds on payday. Paperless payroll programs deliver value to employers and employees alike, and the key to achieving a thriving, effective program is all in how you roll it out to your employees. If your company is planning to implement a paycard program, consider the four simple steps to launch a successful program.
Tags : 
comdata, finance, paperless pay, payroll, payment, payroll program, funds, capital, benefits, technology
    
Comdata
Published By: Skillsoft     Published Date: Nov 21, 2013
Learning is critical to enabling business strategy, from onboarding new hires to developing future leaders, to educating channel partners and customers. This study, based on responses collected from 185 organizations between July and September 2013, looks at how organizations connect learning to business priorities, create development programs that impact every stage of the employee lifecycle and utilize technology to support learning initiatives. It also examines the business impact of building learning capability and running effective learning programs. Research conducted by Aberdeen Group and brought to you thanks to Skillsoft.
Tags : 
career advancement, learning, training, certification, onboarding, employee development, human capital management, learning, employee performance, enterprise software, human resources
    
Skillsoft
Published By: Optify     Published Date: Aug 03, 2012
With dozens of metrics out there, it's critical that you cut through the noise and focus on those metrics that prove your inbound programs are driving high-quality leads and growing your sales pipeline.
Tags : 
b2b marketing, seo, search engine optimization, internet marketing, inbound marketing, lead generation, increased roi
    
Optify
Published By: Cal Lutheran University     Published Date: Feb 06, 2013
Whether you are considering a career change, advancement, or even personal development, our programs will prepare you for today — and whatever comes after. It's time to take the next step.
Tags : 
education
    
Cal Lutheran University
Published By: Conductor     Published Date: Aug 20, 2013
Often times, in-house or agency SEOs come across a variety of hurdles while trying to improve SEO within the organization. Two of the most common hurdles are difficulty implementing recommendations and lack of enterprise support for the SEO programs. In this white paper, a leading SEO expert shares his tips for overcoming these major obstacles by effectively involving colleagues in the SEO process.
Tags : 
seo, search engine optimization
    
Conductor
Published By: SocialChorus     Published Date: Jun 06, 2014
Employee-shared content increases reach 10x and engagement 8x. That’s why leading brands are launching Employee Advocate Marketing programs to drive the marketing metrics they care about most, including increased awareness, social engagement and new customers. But what are the steps they took to launch and maintain a successful program? Download this guide and step-by-step checklist for everything you need to know to launch an employee Advocate Marketing program. Download the guide and checklist to learn: • The steps to launch an employee Advocate Marketing program • Proven best practices to grow your program • The recommended timeline and steps to ensure the program drives your goals
Tags : 
employee advocacy, employee advocates, employee advocate marketing, advocate marketing
    
SocialChorus
Published By: Symantec     Published Date: Sep 14, 2015
In the running battle with cyberthreats, your first line of defense is your IT staff: the system and network administrators, SOC and NOC operators, incident response and forensics analysts, and application development and QA teams. Are these IT professionals ready to take on an ever-growing army of innovative, persistent cybercriminals and hackers? Probably not, if you expect them to acquire the knowledge and skills they need through self-directed study and on-the-job training. There is too much to learn, and few members of the IT staff have the time to research every new threat. And you can’t afford to suffer through APTs, breaches and data leakages just to provide “teachable moments” for IT personnel. There is another solution. Security simulation immerses IT professionals in a realistic online environment and challenges them to fill the roles of cyberattackers and cyberdefenders. It borrows from education theory and online gaming to present knowledge in ways that motivate learning a
Tags : 
on-the-job training, it professionals, cyber security services, security programs, security
    
Symantec
Published By: Cisco     Published Date: Sep 08, 2016
This white paper shows how SAP received a 528% ROI from Cisco programs.
Tags : 
    
Cisco
Start   Previous    7 8 9 10 11 12 13 14 15 16 17 18 19 20 21    Next    End
Search Resource Library      

Add Resources

Get your company's resources in the hands of targeted business professionals.