five step

Results 76 - 100 of 166Sort Results By: Published Date | Title | Company Name
Published By: IBM     Published Date: Jan 06, 2016
In Aberdeen's recent "An Asset for HR in the Age of the Candidate," we learned that there isn't a one-size-fits-all, pre-hire assessment approach to fit in with every company's talent acquisition process. However, there are universal steps that can be taken to optimize its usage to be as fruitful as possible.
Tags : 
ibm, optimization, pre-hire, talent acquistion, recruitment, business intelligence, productivity
    
IBM
Published By: Thawte     Published Date: Dec 29, 2015
This guide provides five simple steps for IT professionals to take control of SSL certificates across the enterprise, and recommendations for a management platform for full visibility and single-point of control for these certificates throughout their lifecycle.
Tags : 
best practices, business intelligence, business management
    
Thawte
Published By: IBM     Published Date: Dec 29, 2015
Application development teams are striving to be leaner by eliminating tasks that do not add value and by preserving existing IT investments.
Tags : 
ibm, software delivery, application development, it management
    
IBM
Published By: IBM     Published Date: Nov 10, 2015
In Aberdeen’s recent Pre-Hire Assessments: An Asset for HR in the Age of the Candidate, we learned that there isn’t a one-size-fits-all, pre-hire assessment approach to fit in with every company’s talent acquisition process.
Tags : 
pre-hire, hiring, talent, ibm, smarter workforce, human resources
    
IBM
Published By: SumTotal, a Skillsoft Company     Published Date: Aug 24, 2015
This guide explores five critical steps to ensure that you get the most out of your performance solutions investment.
Tags : 
performance management, performance solutions, optimization, performance processes, employee development, performance solutions investment, human resources
    
SumTotal, a Skillsoft Company
Published By: Cisco     Published Date: Aug 24, 2015
Download this white paper to see why securing the data center requires a solution that can: -Provide visibility and control over custom data center applications -Handle asymmetric traffic flows and application transactions between devices and data centers -Adapt as data centers evolve: to virtualization, software-defined networking (SDN), network functions virtualization (NFV), Cisco -Application-Centric Infrastructures (ACIs) and beyond -Address the entire attack continuum: before, during, and after an attack -Integrate with security deployed across the entire network -Support geograpically dispersed inter-DC traffic and deployments, including private, public and cloud environments
Tags : 
data center security, traditional security, functionality, virtualization, visibility, sdn, nfv, acis, networking, security, it management
    
Cisco
Published By: InsideView     Published Date: Aug 17, 2015
A hands-on guide to understanding social selling and explaining how it helps you make more money, with five detailed steps for getting started in under a week.
Tags : 
    
InsideView
Published By: SugarCRM     Published Date: Jul 29, 2015
Today’s customer is more educated and connected than ever before. With seemingly endless choices, and unfettered access to information from peers and other sources – standing out in the market is harder than ever. And lowering prices is not always a winning strategy. So, how can you attract and retain more customers in this new world of business? By focusing on creating extraordinary customer experiences. Learn more in this informative eBook.
Tags : 
b2b success, customer retention, customer experience, information access, enterprise applications
    
SugarCRM
Published By: IBM     Published Date: Jul 09, 2015
Steps for successful software delivery.
Tags : 
software, delivery, applications, network, network management, business intelligence, productivity, software compliance, infrastructure
    
IBM
Published By: Adobe     Published Date: Jul 08, 2015
Marketers use A/B testing to deliver the most optimized and targeted experiences for their customers. Sometimes marketers encounter pitfalls that produce misleading findings, which lead to less efficient offers and lower conversion rates. Read Nine Common A/B Testing Pitfalls and How to Avoid Them to: -Recognize the nine most significant A/B testing pitfalls -Discover the five steps to gain better testing results -Gain a deeper understanding of test results
Tags : 
test, target, business objectives, segmentation, pitfalls
    
Adobe
Published By: Skillsoft     Published Date: Jun 25, 2015
This field guide explores five critical steps to ensure that you get the most out of your performance solutions investment.
Tags : 
performance management, performance solutions investment, automation, optimization, employee development, communication, human resources
    
Skillsoft
Published By: athenahealth     Published Date: Jun 08, 2015
This white paper instructs you how to ensure the viability of your community hospital well into the future with these five steps: 1. Get control over your financials. 2. Build patient loyalty. 3. Prioritize high-return projects. 4. Improve provider loyalty and alignment. 5. Adjust to changing reimbursement models.
Tags : 
consolidation, community hospital, financials, patient loyalty
    
athenahealth
Published By: Cisco     Published Date: May 14, 2015
Data center administrators face a significant challenge: They need to secure the data center without compromising the performance and functionality that new data center environments enable. Many are looking to secure the data center using solutions designed for the Internet edge, but these solutions are not enough. The data center has unique requirements around provisioning, performance, virtualization, applications, and traffic that Internet-edge security devices are simply not designed to address.
Tags : 
hacker detection, intrusion detection, security management, security policies, web service security, vulnerability management
    
Cisco
Published By: Kaseya     Published Date: May 13, 2015
Turn management data into actionable business information that helps create operational efficiencies and demonstrate value.
Tags : 
kaseya, hybrid, cloud, management, msp, mobile, big data
    
Kaseya
Published By: Cisco     Published Date: Apr 10, 2015
Data center administrators face a significant challenge: They need to secure the data center without compromising the performance and functionality that new data center environments enable. Many are looking to secure the data center using solutions designed for the Internet edge, but these solutions are not enough. The data center has unique requirements around provisioning, performance, virtualization, applications, and traffic that Internet-edge security devices are simply not designed to address.
Tags : 
security, data center, performance, virtualization, application, internet, functionality, it management
    
Cisco
Published By: Lumesse     Published Date: Mar 13, 2015
This white paper will help you find out: the drivers behind mobile talent management, the benefits of mobile Talent Management for you and your workforce and the five key steps on your journey to mobile talent management.
Tags : 
mobile talent management, benefits of mobile talent management, mobility, mobile workers, mobile, mobility trends, hr technology, go mobile, smart phones, benefits, business issues and trends, global hr management, human resources management, staffing, technology
    
Lumesse
Published By: Kaseya     Published Date: Mar 12, 2015
Turn management data into actionable business information that helps create operational efficiencies and demonstrate value.
Tags : 
data management, business information, audits, inventory information, it policies, automation management systems, it assets, it solutions, business management, software compliance, service management, infrastructure
    
Kaseya
Published By: Lumesse     Published Date: Mar 12, 2015
This white paper will help you find out: the drivers behind mobile talent management, the benefits of mobile Talent Management for you and your workforce and the five key steps on your journey to mobile talent management.
Tags : 
mobile talent management, benefits of mobile talent management, mobility, mobile workers, mobile, mobility trends, hr technology, go mobile, best practices, benefits, business issues and trends, global hr management, human resources management, staffing, technology
    
Lumesse
Published By: ClearSlide, Inc     Published Date: Jan 28, 2015
As the landscape of modern sales evolves based on global trends, sales people are finding themselves stretched to do more, sell on the go, and make quota faster. Today, sales leaders need to increase productivity and reduce friction in the sales process in order to hit their quotas. This white paper orchestrates the five steps necessary to improve your sales pipeline and forecast.
Tags : 
b2b sales, buyers journey, sales strategies, sales-engagement, engagement strategies, prospecting solutions
    
ClearSlide, Inc
Published By: Polycom     Published Date: Jan 06, 2015
This document will outline five easy steps to create awareness, increase utilization and expedite adoption of video collaboration across your organization. You’ve recently added video to your communications environment. Now the real challenge begins –getting your company to actually use the solution. What is the best way to launch and promote video collaboration internally? Which departments or groups should you be targeting? What are the keys to maximizing usage levels? What are the major concerns surrounding video, and how do you overcome them?
Tags : 
train, video, network, telecommuting, mobility, on-demand webinar, polycom, collaboration, guide, networking, it management, knowledge management, enterprise applications, data management
    
Polycom
Published By: IBM     Published Date: Nov 05, 2014
A security framework is a step-by-step approach to helping an organization move from meeting its basic security requirements to providing a fully security-optimized environment. Five types of frameworks address progressive steps in security maturity as needs and capabilities change.
Tags : 
ibm, cyber security, risk management, business threats, security framework, business protection, cyber protection, security framework, protection, security, it management, business intelligence, business management
    
IBM
Published By: Visier     Published Date: Nov 04, 2014
Read an industry report or blog post on hot HR trends and technologies today, and you are bound to see workforce analytics near the top. Analysts and commentators agree: workforce analytics has become a “must have” tool for HR and a key component of delivering business value. But how do you get started with this complex topic? By thinking through the first four steps, you can develop the requirements to support the fifth step: selecting the right workforce analytics solution for your organization. Download this white paper, Five Steps to Getting Started with Workforce Analytics, to find out how you can simplify and accelerate your journey from HR metrics to workforce analytics.
Tags : 
visier, workforce analytics, hr metrics, planning, human resources
    
Visier
Published By: IBM     Published Date: Oct 16, 2014
Because all processes should be aligned to customer metrics,process improvement is an important goal for organizations in every industry. This paper illustrates the impact analytics can make on business processes through real-world examples based on IBM client experiences, and describes the steps organizations can take to refine quality, warranty, financial,inventory and other processes that are essential to achieving operational excellence.
Tags : 
business analytics, organizational processes, customer metrics, process improvement, operational excellence
    
IBM
Published By: IBM     Published Date: Oct 14, 2014
Gives an insight into distributed denial of service (DDoS) attacks and defines a five-step process including preparation, mitigation, around-the-clock monitoring, response and intelligence to help address DDoS attacks.
Tags : 
ddos attacks, it security, ddos mitigation, security, it management, best practices, business activity monitoring, business analytics
    
IBM
Published By: IBM     Published Date: Oct 10, 2014
Delivering applications that meet the needs of the business can be a challenge in a complex business climate that is constantly changing. Diverse, multiple heterogeneous environments are the norm, all of which must be maintained and deployed. Multiple tools and technologies connect, support and create work.
Tags : 
ibm, software delivery, collaborative platform, investments, application delivery, customer feedback, standardized process, deployed, it landscape, delivery software, software development, productivity, software compliance, service management
    
IBM
Start   Previous    1 2 3 4 5 6 7    Next    End
Search Resource Library      

Add Resources

Get your company's resources in the hands of targeted business professionals.