HR Hero Your Employment Law Resource
 

hr solutions

Results 276 - 300 of 487Sort Results By: Published Date | Title | Company Name
Published By: IBM     Published Date: May 08, 2013
Read this whitepaper to learn how Big analytics can improve your business decision making and enhance business innovation. Most of all what does it provide in terms of business value for big data. Learn more about ‘Big Data and Business Analytics’ through IBM’s latest market leading solutions. Register and attend this complimentary virtual event on June 11 by IBM Business Analytics
Tags : 
big data, value, analytics, improve, business, innovation
    
IBM
Published By: IBM     Published Date: May 08, 2013
Download this whitepaper to learn how organizations can extend their productivity gains provided by disclosure management solutions to their budgeting, planning and forecasting processes as well. Learn more about ‘Big Data and Business Analytics’ through IBM’s latest market leading solutions. Register and attend this complimentary virtual event on June 11 by IBM Business Analytics
Tags : 
management, budgeting, planning, forecasting, organizations, productivity, solutions
    
IBM
Published By: IBM     Published Date: May 08, 2013
Read this whitepaper from FSN's Gary Simon to learn how disclosure management solutions from IBM can extend the value of your existing Business Intelligence tools. Learn more about ‘Big Data and Business Analytics’ through IBM’s latest market leading solutions. Register and attend this complimentary virtual event on June 11 by IBM Business Analytics
Tags : 
value, business intelligence, disclosure management, solutions
    
IBM
Published By: IBM     Published Date: May 08, 2013
Learn what CFO Research found when they surveyed finance executives from U.S. companies about their reporting processes and the tools they use to prepare financial statements. Learn more about ‘Big Data and Business Analytics’ through IBM’s latest market leading solutions. Register and attend this complimentary virtual event on June 11 by IBM Business Analytics
Tags : 
cfo, finance, tools, financial statements
    
IBM
Published By: Sage     Published Date: Jan 08, 2013
Download this whitepaper for the 5 things to consider when choosing a human resources management system.
Tags : 
hrms, human resources management system, hr solutions, sage hrms, roei, human resources
    
Sage
Published By: Sage     Published Date: Jan 30, 2015
As organizations look for more ways to increase productivity and profitability, human resources departments are being asked to provide more strategic input to executives. Doing so requires tools that improve access to timely, accurate information for enhanced business decision making. If you don’t have a human resource management system (HRMS), HR can end up spending too much time on repetitive day-to-day tasks like paperwork while struggling to deliver meaningful workforce insights. The right HR management software can help the HR team increase control over employee data, optimize productivity, and take employee engagement to the next level, so you can deliver the future workforce your organization needs to succeed. This white paper discusses the five areas to keep in mind when evaluating solutions to find an HRMS that’s a good fit for your business.
Tags : 
sage, hr management, hr software, hrms, hr team, evaluating solutions, human resources
    
Sage
Published By: Jobvite     Published Date: Jan 28, 2013
Social recruiting is a word we often hear, but what does it actually mean? And more importantly, what is it and how can you use it to find quality candidates? Download this workbook and focus on the values of your company's social recruiting strategy.
Tags : 
social recruiting strategy, recruiting, jobvite, recruiting solutions, employee referrals, human resources
    
Jobvite
Published By: CEB     Published Date: Sep 23, 2013
Global executives believe the key to delivering profitable growth is a 20% increase in staff productivity, above current levels. However, employees are stretched to their limit; 80% report increased workloads and 55% say they can no longer handle the resulting levels of stress. Effective talent measurement can improve performance and productivity across the workforce by placing the right people in the right roles, and identifying and nurturing those that are most likely to succeed.
Tags : 
talent management, workforce management, workforce efficiency, talent management solutions, hr solutions, human resources
    
CEB
Published By: Box     Published Date: Jan 16, 2015
Desktop management at any scale is a tedious job. Imaging, reimaging, and troubleshooting desktop systems consume valuable IT resources, and keep employees from being productive. Securing the information generated on desktops, tablets, and smartphones is no simple job either. Many organizations are deploying virtual desktop infrastructures (VDI) for these reasons. But for deployment to be successful, computing and storage infrastructures must deliver high-quality, predictable, and productive user experiences. Often, the best way to accomplish this is through flash-based storage solutions due to its low latency/high IOPS nature. Unfortunately many IT professionals aren't sure what type of flash array is best for their needs or how to ensure that all elements of their VDI work seamlessly. Download now and learn how to validate a provide VDI configuration across NexGen N5 Hybrid Flash Array, VMWare Horizon View, Cisco Unified Computing System™(UCS), and Cisco Nexus Switches.
Tags : 
nexgen, hybrid, flash, qos, quality of service
    
Box
Published By: CEB     Published Date: Nov 09, 2015
As an HR professional, you know the spotlight is on recruitment functions to prove their value to the business. You’ve seen how the volume of job applications has risen over the last few years, yet all it has done is create more work and rarely better outcomes – for candidates, recruiters or employers. Based on CEB research, this eBook uncovers the insights and solutions to overcome these volume recruitment challenges: • How to create an effective employer brand • How to optimize the candidate experience • How to make the recruitment process more efficient
Tags : 
recruitment, recruiting, volume recruitment, volume hire, volume recruiting, high volume recruitment, high volume recruiting, applicant sifting, candidate sifting, sifting applications, large scale recruiting, graduate recruitment, pre-hire, pre-hire assessments, ability tests, employer branding, employer brand, candidate experience, talent assessments, human resources
    
CEB
Published By: Tyco Integrated Security     Published Date: Mar 09, 2016
In today’s challenging retail world, businesses have little time to spare. Every day, retailers are under extreme pressure to reduce shrink, improve store operations, increase profits and enhance the customer experience, all at the same. When every minute counts, time-saving solutions like source tagging, can help.
Tags : 
tyco, security, source tag, time-saving, retail
    
Tyco Integrated Security
Published By: CDW-Trend Micro     Published Date: Mar 26, 2015
As you take advantage of the operational and economic benefits of virtualization and the cloud, it’s critical to secure your virtualized data centers, cloud deployments, and hybrid environments effectively. Because if you neglect any aspect of security, you leave gaps that open the door to web threats and serious data breaches. And, to meet data privacy and compliance regulations, you will need to demonstrate that you have the appropriate security, regardless of your computing environment. Trend Micro Cloud and Data Center Security solutions protect applications and data and prevent business disruptions, while helping to ensure regulatory compliance. Whether you are focused on securing physical or virtual environments, cloud instances, or web applications, Trend Micro provides the advanced server security you need for virtual, cloud, and physical servers via the Trend Micro Deep Security platform. Download this white paper to learn more about the Trend Micro Deep Security platform.
Tags : 
cloud, date security, cloud security, virtualization, security
    
CDW-Trend Micro
Published By: CDW-Trend Micro     Published Date: Jul 17, 2015
Rush University Medical Center (Rush) is a not-for-profit healthcare, education, and research enterprise with a 664-bed academic medical center that includes hospital facilities for adults and children. Rush offers residency and fellowship programs in medical and surgical specialties to more than 2,000 students. With a large and experienced IT team, Rush manages three data centers across its campuses. The organization currently supports approximately 1,600 virtual desktops and 600 virtual servers, along with 10,000 physical desktops. The Rush IT team is tasked with supporting users on all devices, including smartphones and tablets. Watch the video to see how Rush protects the entire organization and protects against advanced threats with Trend Micro solutions, including Deep Discovery. Webinar Brought To You By CDW-Trend Micro
Tags : 
security threats, trend micro, security solutions, mobile devices, network
    
CDW-Trend Micro
Published By: Flexera     Published Date: Feb 19, 2019
As the technology landscape grows and evolves with new devices, new software, and new platforms, keeping tabs on an organization's IT assets is a moving target. How can you gain accurate visibility of software assets to drive strategic and financial decisions that impact finance and reduce security risk? A commissioned study conducted by Forrester Consulting on behalf of Flexera shows the potential return on investment for a Data Platform customer. Through their research, Forrester found that customers achieved a 302% ROI with their investment, with payback within months by benefiting from multiple use cases throughout the organization in the following areas: -Cost savings from reduction in licenses -Avoided increases in licenses from audit activities -Hardware maintenance savings -Improved productivity -Reduced effort for divestiture activities Get the full study to learn how your business can benefit from Flexera solutions.
Tags : 
    
Flexera
Published By: AWS     Published Date: May 18, 2018
This eBook will take you through the benefits of using APN Partner solutions and AWS storage services to create an efficient, reliable, and secure backup and recovery solution that can grow with your business. It also explores how organizations can pay for storage per gigabyte and only for what they use. Also included is information on how customers are leveraging object storage services on Amazon Web Services (AWS) like Amazon Simple Storage Service (Amazon S3) and Amazon Glacier. Download this eBook to learn how customers like Oath, IDT, and King County are deploying backup and recovery solutions with our featured APN partners.
Tags : 
    
AWS
Published By: CrowdStrike     Published Date: Nov 28, 2018
The Guide to AV Replacement provides in-depth information from leading security experts that will guide you through each phase of your decision-making process. From the critical elements you need to consider, to how to evaluate and review solutions, you’ll get expert advice that can help you choose a security solution that best fits your organization’s requirements. Before initiating a change from your current AV solution read this guide to learn: • How to plan an AV replacement project and the critical elements to consider • How to measure important factors such as protection, performance and time-to-value when reviewing AV replacement solutions • What prevalent technologies are available and what are the pros and cons of each? • How to measure the efficacy of a solution and what steps you should take to ensure you’re getting accurate results • Why you should consider evaluating CrowdStrike Falcon’s next-gen AV replacement and how it fulfills the criteria outlined in the guide
Tags : 
    
CrowdStrike
Published By: CrowdStrike     Published Date: Nov 28, 2018
The endpoint security market continues to expand with vendors old and new marketing their solutions as “next-generation” game-changers. However, closer inspection reveals that many new solutions have been built on old platforms, many of which still rely heavily on signature-based detection and obsolete architecture. Navigating this crowded vendor landscape can be challenging — how does the buyer find the true next-generation protection today’s targeted, advanced threats demand? This white paper, “The Five Essential Elements of Next-Generation Endpoint Protection,” offers guidance on how to see through the hype and understand the critical must-have elements that meet true next-generation criteria and set a new standard in EPP. Download the white paper to learn: • Details on the five essential capabilities that define true next-generation EPP and why they are so important • A matrix that evaluates and compares the potential impact of different solutions • A list of top questions to ask
Tags : 
    
CrowdStrike
Published By: McAfee     Published Date: Apr 06, 2017
McAfee threat management solutions can cut through the grey to provide a clear understanding of risk so immediate corrective actions are taken. Tight integration between solutions optimizes security operations response and efficiency with visibility and action.
Tags : 
malware, advanced threats, greyware, threat management, sandbox, siem, security operations, secops
    
McAfee
Published By: Zebra Technologies     Published Date: Jan 30, 2019
Don’t let your legacy devices hold you back. Watch these three exclusive 2018 webinars to learn how Zebra can help you and your organization modernize your warehouse. Webinar #1: The Age of Android in the Enterprise Zebra’s Kevin Lollock, Regional Product Manager, Mobile Computing OS and Developer Platforms will unpack the vast migration to Android™ and the opportunities available for your warehouse and distribution centers. Webinar #2: Modernize the Warehouse with Android Warehouses without Windows®? Mark Wheeler, Zebra’s Director of Supply Chain Solutions discusses the migration to Android devices and shares a vision of the warehouse of the future. Webinar #3: How to Start your OS Migration Zebra’s Ritesh Gupta, Lead for Zebra Learning Services simplifies the steps of migrating to Android devices, including key considerations for planning, management, support and security. Get free access to these Webinars today!
Tags : 
    
Zebra Technologies
Published By: Zebra Technologies     Published Date: Mar 19, 2019
KEEP YOUR TEAMS MOVING AND PATIENTS SAFER More and more patients are turning to Ambulatory Surgery Centers (ASC) for outpatient surgeries, diagnostic testing and preventive procedures. Case volumes continue to rise and competition for patients is intensifying. At the same time, reimbursement rates are declining. How are ASCs thriving in this rapidly-changing climate? By incorporating sophisticated data capture solutions throughout the patient journey, ASCs are enhancing patient safety, improving clinical work flows and reducing overall costs.
Tags : 
    
Zebra Technologies
Published By: Google - SAP     Published Date: Jun 20, 2019
Maximize go-to-market initiatives with SAP To succeed in today’s hypercompetitive environment, consumer products companies need greater speed and agility. See how SAP C/4HANA solutions can help you synchronize activities across your modern trade and direct-to-consumer efforts – and ultimately bring you closer to your consumers. Grow your brand and your market share with an intelligent strategy. The Crossover Effect: Positioning Consumer Products Companies for Growth Learn how SAP empowers consumer products companies to improve customer experience and leverage new types of data, digital capabilities, and success measures to drive growth. ? Join the Direct-to-Consumer Revolution Learn about how SAP Customer Experience solutions enable consumer products companies to get closer to the consumer than ever before. ? Henkel Drives Sales Innovation with SAP Trade Management Martin Reinicke of Henkel Beauty Care shares how the SAP Trade Management solution helps the company adapt to rapid m
Tags : 
    
Google - SAP
Published By: Trend Micro SaaS     Published Date: Oct 08, 2008
According to experts at TrendLabs, spam now makes up close to 95% of all email and continues to grow. In the first three months of 2008 spam rates almost doubled over rates observed at the end of 2007 and TrendLabs predicts that average daily spam volumes will increase by 30 to 50 billion messages per day within the year.1 As spam continues to grow at dramatic rates, traditional on-premise email security products are failing to keep up. This limitation is one of the primary reasons that IDC predicts demand for hosted security solutions -also known as SaaS (Software as a Service) solutions-will grow by more than 30% annually through 2012.2 For context, the growth rate for hosted email security is projected to be more than eight times that of the traditional software email security market, and more than 60% faster than appliance-based email security solutions.
Tags : 
saas, trend, trend micro, software as a service, trendlabs, email security, security, interscan messaging, service level agreement, sla, virus, spam, phishing, distributed denial of service, ddos, filtering
    
Trend Micro SaaS
Published By: VMware AirWatch     Published Date: May 19, 2016
Innovation in business mobility is adding up to opportunity for the enterprise— opportunity to accelerate employee productivity, increase collaboration, and streamline business processes through mobile applications. At the same time, IT organizations are keen to control costs and maintain safeguards around their corporate information. With the goal of striking a balance between opportunity and control, increasing numbers of IT decision makers are adopting enterprise mobility management (EMM) solutions. But how do you know your organization is poised to make the move to EMM, or if you should be leveraging more from an existing EMM solution? Here are five cues to consider that the time is right to adopt EMM for your organization.
Tags : 
innovation, opportunity, best practices, productivity, mobile, application
    
VMware AirWatch
Published By: Centrify Corporation     Published Date: Apr 13, 2018
As business models have become increasingly digital, high-profile, reputation-damaging security breaches are grabbing more news media headlines. Leading companies have ramped up their investments in cybersecurity, yet that spending is often not well aligned with actual threats. Studies have shown that server-focused solutions such as network anti-virus, malware detection and website firewalls attract the biggest investments, ignoring the fact that misuse of privileged credentials is by far the most common cause of breaches. The reasons for this disconnect are not well understood, in part because it sits at the intersection of the people and technology domains. This survey, conducted by WSJ Custom Studios with sponsorship from Centrify, seeks insights into senior-level thinking on this issue, including current cybersecurity priorities and the perceived degree of alignment between threats and solutions.
Tags : 
    
Centrify Corporation
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Social Networks:
Employers Forum
facebook
Twitter
YouTube
© 2019 BLR®—Business & Legal Resources. All rights reserved. 800-274-6774


Infinite Menus, Copyright 2006, OpenCube Inc. All Rights Reserved.