HR Hero Your Employment Law Resource
 

practices

Results 1 - 25 of 3366Sort Results By: Published Date | Title | Company Name
Published By: HireRight     Published Date: May 18, 2012
This report explores the background checking practices, policies, and trends of small business professionals. It identifies the procedures and policies that work best from the standpoint of cost, performance, outcome, compliance, quality and speed.
Tags : 
human resources
    
HireRight
Published By: TriNet     Published Date: Jan 17, 2013
In this report, leading entrepreneurs, recruiters, and investors share the best practices they use to win the talent wars.
Tags : 
human resources
    
TriNet
Published By: TriNet     Published Date: Jan 17, 2013
For the first time in modern history, workplace demographics now span four generations. Download this white paper for best practices on how to better understand and effectively manage a multi-generational workforce.
Tags : 
human resources
    
TriNet
Published By: TriNet     Published Date: Apr 08, 2013
Explore the financial benefits of contracting with a PEO based on industry best practices.
Tags : 
    
TriNet
Published By: F5 Networks Singapore Pte Ltd     Published Date: Sep 19, 2019
"The fast pace of innovation demanded by today’s digital businesses challenges traditional processes for the deployment and governance of application delivery and supporting infrastructure. To address the increased pace of change, many organizations are transforming by adopting DevOps: a set of practices which employs continuous integration processes, breaking down the silos between development and operations teams. As cycle times accelerate, and development teams adopt more Agile delivery methodologies, the traditional model for application security can be a drag on the speed and agility inherent in a continuous integration process. This creates a natural friction. Security teams can be perceived as slowing down or blocking delivery. At the same time, however, the apps are exposed to significant threats. The goal of continuous integration is to deliver more frequent releases with more new capabilities to market, faster. It’s all about speed."
Tags : 
    
F5 Networks Singapore Pte Ltd
Published By: ServiceNow     Published Date: Oct 23, 2019
AIOps can dramatically improve the IT organization’s ability to be an effective partner to the business. An IT operations platform with built?in AIOps capabilities like ServiceNow® can help IT operations proactively identify potential issues with the services and technology it delivers to the business and correct them before they become problems. Read this whitepaper to learn best practices for adopting AIOps.
Tags : 
servicenow, it operations, technology, aiops
    
ServiceNow
Published By: Nextgen     Published Date: Sep 25, 2019
Your practice can save time and money by delivering on patient expectations. You can better keep up with regulatory demands and reporting requirements—and avoid unsatisfied and unresponsive patients—when you employ best practices that address patient needs. In this eBook, you’ll learn strategies to avoid missed revenue and save staff effort by using smart efficiency improvements, such as checking insurance information up front. You’ll also learn how you can get back to caring for patients, not chasing payments—and the secret to achieving strong financial outcomes. Finally, you’ll discover how you can get paid quickly, easily, and fully—all while addressing your patient demands for an improved, more efficient experience.
Tags : 
    
Nextgen
Published By: Black Duck Software     Published Date: Oct 01, 2009
Over the past decade, a powerful new approach to development - open source software - has risen to prominence, dramatically increasing the opportunity to re-use existing software.
Tags : 
black duck software, open source, platform, sap, multi-source, code, source, intellectual property
    
Black Duck Software
Published By: CloudHealth by VMware     Published Date: Aug 22, 2019
Public clouds have fundamentally changed the way organizations build, operate, and manage applications. Security for applications in the cloud is composed of hundreds of configuration parameters and is vastly different from security in traditional data centers. According to Gartner, “Through 2020, at least 95% of cloud breaches will be due to customer misconfiguration, mismanaged credentials or insider theft, not cloud provider vulnerabilities”1. The uniqueness of cloud requires that security teams rethink classic security concepts and adopt approaches that address serverless, dynamic, and distributed cloud infrastructure. This includes rethinking security practices across asset management, compliance, change management, issue investigation, and incident response, as well as training and education. We interviewed several security experts and asked them how public cloud transformation has changed their cloud security and compliance responsibilities. In this e-book, we will share the top
Tags : 
    
CloudHealth by VMware
Published By: CloudHealth by VMware     Published Date: Aug 22, 2019
In today’s fast-moving, competitive environment, companies are migrating to Microsoft Azure to increase their agility and decrease their time to market. While the payoff for adopting Azure can be great, many are finding it difficult to reach the cloud and business success they originally hoped for. It’s common for organizations investing in Azure to encounter numerous roadblocks early in their cloud journey, including monthly bills exponentially higher than anticipated and underutilized resources. For organizations looking to reach cloud maturity—where cost and performance are optimized, security and compliance best practices are established, and one’s environment is governed by policy-driven automation—gaining control of their Azure infrastructure is crucial. The goal of this eBook is to help with just that. For those of considering Azure or who are currently in the migration phase of your Azure cloud journey, we offer insight and expert best practices to make the early stages of your
Tags : 
    
CloudHealth by VMware
Published By: CloudHealth by VMware     Published Date: Sep 05, 2019
Public clouds have fundamentally changed the way organizations build, operate, and manage applications. Security for applications in the cloud is composed of hundreds of configuration parameters and is vastly different from security in traditional data centers. According to Gartner, “Through 2020, at least 95% of cloud breaches will be due to customer misconfiguration, mismanaged credentials or insider theft, not cloud provider vulnerabilities”1. The uniqueness of cloud requires that security teams rethink classic security concepts and adopt approaches that address serverless, dynamic, and distributed cloud infrastructure. This includes rethinking security practices across asset management, compliance, change management, issue investigation, and incident response, as well as training and education. We interviewed several security experts and asked them how public cloud transformation has changed their cloud security and compliance responsibilities. In this e-book, we will share the top
Tags : 
    
CloudHealth by VMware
Published By: Group M_IBM Q4'19     Published Date: Sep 26, 2019
The needs of your facilities and buildings can vary. IBM TRIRIGA can add value across all dimensions of a building. It can help optimize your space, improve energy usage and maintenance efforts, ensure the success of capital projects, and whip your lease accounting practices into shape. Learn the insights and benefits IBM TRIRIGA can provide you in better optimizing your organization’s space, maintenance efforts, energy usage, and more. Download this demo to learn more about each of these critical areas.
Tags : 
    
Group M_IBM Q4'19
Published By: Group M_IBM Q4'19     Published Date: Sep 26, 2019
Watch a demo to see how IBM Maximo can help boost uptime, operational performance, and transformation in your EAM practices.
Tags : 
    
Group M_IBM Q4'19
Published By: Group M_IBM Q4'19     Published Date: Oct 01, 2019
Watch a demo to see how IBM Maximo can help maximize uptime, boost operational performance and accelerate transformation in your enterprise asset management practices.
Tags : 
    
Group M_IBM Q4'19
Published By: Group M_IBM Q4'19     Published Date: Oct 21, 2019
Watch a demo to see how IBM Maximo can help maximize uptime, boost operational performance and accelerate transformation in your enterprise asset management practices.
Tags : 
    
Group M_IBM Q4'19
Published By: Resolver     Published Date: Nov 01, 2019
Based on what Resolver has learned by working with hundreds of security leaders, they’ve found there isn’t a one size fits all model for creating workflows that effectively responds to every security incident. Even within an organization, not every incident will be able to go through the same process. That’s why they’ve developed an incident workflow template for your corporate security team. This a great framework to get you thinking about the various stages that could be involved in a single incident. Download this resource to uncover: - Best practices on how to keep incident submission simple to ensure adoption across the organization - Important factors to consider for the portal and triage step of incident submission - How to include notification and task assignment to your incident workflow - A sample list of key metrics used by industry-leading security professionals - Plus! Get a free printable incident workflow template that you can use with your team
Tags : 
    
Resolver
Published By: Resolver     Published Date: Nov 01, 2019
Together with ASIS International, Resolver polled corporate security professionals in the ASIS community about the state of security management in 2019. Based on the results, Resolver examined current practices and trends in the systems and technologies involved with managing incidents and assessing threats. Watch this webinar for access to the survey results where Resolver identified the top incidents organizations face, where security teams are planning technology improvements or upgrades, and how they use incident management to assess future threats. You’ll walk away with the information you need to benchmark your team, as well as practical tactics to collect relevant data to help allocate and maximize your security budget for 2020.
Tags : 
    
Resolver
Published By: Jamf     Published Date: Aug 06, 2019
As a new generation of employees hit the workforce, a user-centric technology trend has begun to take shape. The question is how does IT shift their practices to embrace the trend toward this modern technology experience? Download this e-book for answers and learn: • The origins of the user-centric trend • Apple's role in evolving IT practices • Ways to implement and benefit from this new IT model
Tags : 
    
Jamf
Published By: CheckMarx     Published Date: Sep 12, 2019
Financial services organizations operate under a host of regulatory standards. This makes sense, as the assets and information managed by these firms are valuable, sensitive, and targeted by sophisticated cyber attackers daily. Compounding these challenges is the large volume of personally identifiable information (PII) that financial organizations handle regularly. PII is subject to many compliance regulations, notably the General Data Protection Regulation (GDPR), which regulates not only the processing of personal data, including PII, relating to individuals in the EU, for also any organization that processes personal data of EU residents. For US banking consumers, Section 5 (Unfair or Deceptive Acts or Practices) of the Federal Trade Commission Act and numerous state regulations enforce basic consumer protections, which financial organizations must also uphold.
Tags : 
    
CheckMarx
Published By: Apptio     Published Date: Oct 09, 2019
"Download this guide for six best practices to help you overcome your greatest IT finance challenges. Discover how to: -Better align IT plans to changing business priorities -Improve cross-functional planning, agility, and transparency -Engage stakeholders to drive accountability "
Tags : 
    
Apptio
Published By: Apptio     Published Date: Oct 09, 2019
"Optimizing technology investment isn’t about cutting costs — it’s about investing the right amount necessary to deliver the value required by the business, while at the same time looking for low-risk opportunities to fund innovation initiatives. But to be effective in optimization efforts, you need an efficient and repeatable approach. This guide shows you the way. We’ve outlined six best practices for optimizing financial and resource investments in technology, from getting a handle on where you stand today to: - Identifying opportunities - Determining tradeoffs - Demonstrating results - Staying optimized over time"
Tags : 
    
Apptio
Published By: Apptio     Published Date: Oct 09, 2019
Cloud migration is consistently one of the top priorities of technology leaders across the world today, but many are overwhelmed by trying to plan their cloud migration, struggling to prioritize workloads and unsure of the cost implications. Download this white paper to discover the 5 key steps for cloud migration based on the best practices of today’s most successful IT leaders: - Baseline TCO resources (cloud, on-premises, hybrid) - Map current on-premises resources to cloud offerings - Evaluate and prioritize migration strategy - Calculate migration costs - Define success metrics
Tags : 
    
Apptio
Published By: Apptio     Published Date: Oct 09, 2019
"Ready to communicate IT cost and value in terms your business unit partners understand? The Apptio TBM Unified Model® (ATUM®) standardizes the financial information necessary for IT leaders to manage their technology business. Use this poster as a resource to: • Establish better alignment between IT, Finance, and other business units by using common language around IT costs • Confidently manage the business of IT with the backing of peer-derived best practices • Understand 10 essential metrics you should track to communicate the business value of IT "
Tags : 
    
Apptio
Published By: Bell Micro     Published Date: Jun 14, 2010
This paper describes the benefits, features and best practices using a XIV in a SAP environment.
Tags : 
bell micro, sap application, best practices, ibm xiv, storage system
    
Bell Micro
Published By: Workday     Published Date: Oct 22, 2019
Read this eBook to learn how seven CFOs from midsize organizations are supercharging their financial reporting and leveraging real-time data. This eBook covers best practices and tips they have learned in their careers around data driven decisions and reporting.
Tags : 
    
Workday
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Social Networks:
Employers Forum
facebook
Twitter
YouTube
© 2019 BLR®—Business & Legal Resources. All rights reserved. 800-274-6774


Infinite Menus, Copyright 2006, OpenCube Inc. All Rights Reserved.