developing

Results 251 - 275 of 429Sort Results By: Published Date | Title | Company Name
Published By: Equinix     Published Date: Sep 25, 2012
Issues of performance, security and compliance requirements are critical when developing cloud services.
Tags : 
cloud computing, security, compliance, equinix
    
Equinix
Published By: Sage     Published Date: Oct 14, 2014
Managing employer compliance can be a tedious task, but it’s a highly visible, important way that the human resources department minimizes risk for the business and keeps the workforce running smoothly. Use this guide to stay informed about employment laws, reporting rules, and developing workforce compliance issues that may impact your organization. We’ll help you navigate ten crucial mandates, explaining the obligations and compliance considerations you need to be aware of in order to take on your responsibilities.
Tags : 
sage, compliance, workforce, fines, reporting, mandates
    
Sage
Published By: Sage     Published Date: Jan 30, 2015
With massive numbers of Baby Boomers starting to retire, one of the greatest challenges facing human resources managers is replacing the decades’ worth of invaluable knowledge and skills possessed by experienced Boomers. This white paper will examine the changing workforce, the skill gap crisis, the importance of managing and developing your workforce, and the most practical and effective ways to go about it.
Tags : 
sage, career development, baby boomers, changing workforce, managing workforce
    
Sage
Published By: Sage     Published Date: Nov 23, 2015
Learn how to protect yourself and your organization from government scrutiny, noncompliance penalties, or expensive employee lawsuits. Sage created this guide to help you stay informed about employment laws, reporting rules, and developing workforce compliance issues that may impact your organization. We’ll help you navigate ten crucial mandates, explaining the obligations and compliance considerations you need to be aware of in order to take on your responsibilities.
Tags : 
compliance, noncompliance, employer compliance, hr manager, employment laws
    
Sage
Published By: Jobvite     Published Date: Jan 28, 2013
Social recruiting is a word we often hear, but what does it actually mean? And more importantly, what is it and how can you use it to find quality candidates? Download this workbook and focus on the values of your company's social recruiting strategy.
Tags : 
social recruiting strategy, recruiting, jobvite, recruiting solutions, employee referrals
    
Jobvite
Published By: IBM     Published Date: Jun 20, 2013
The message is simple: Trust has been lost and the digital world is here. Successful relationships with customers in the digital world are high-trust relationships. It is time for bankers to rebuild trust at the same time as developing all the communications and analytical advantages of digital technology. There is no other way. The highly digitalised, non-bank competitors are already taking the best parts of banking. Time is short. Is Apple about to join the fray? Is Amazon? Is Facebook?
Tags : 
customer, trust, banking, retail
    
IBM
Published By: E-SignLive by Silanis     Published Date: Oct 02, 2013
While we tend to think about mobility largely as a consumer phenomenon, it is also changing how the workforce carries out business. With so much being done beyond traditional office walls, many insurance companies, financial service organizations and even government agencies are adopting mobile devices as productivity tools and developing enterprise apps for these devices. Electronic signature technology is pivotal to enabling mobile transactions beyond just informational apps. Not only in terms of straight-through processing (STP), but also for full compliance, legal enforceability and record retention. With most organizations’ mobile strategies still in the early stages, this article provides a starting point to help you better understand mobile e-signatures for business. It reviews the top 10 capabilities that businesses need in order to properly equip their customer-facing workforce with mobile e-signing.
Tags : 
ipad, mobility, apple, e-signatures, esign, marketing, enterprise, cio, sales
    
E-SignLive by Silanis
Published By: RingCentral     Published Date: May 22, 2014
As a purchasing executive or vendor management professional, your goal is to balance business value, cost and associated risks when sourcing and managing technology vendors. Download this whitepaper and learn: • To identify internal drivers that shape sourcing strategies • Best practices for developing a new T&M sourcing strategy • 5 key sourcing and vendor management activities that strengthen your sourcing strategy
Tags : 
ringcentral, phone system, business phone, mobile phone, business transition, phone provider, cloud based phone, changing attitudes
    
RingCentral
Published By: OpenText     Published Date: Apr 16, 2014
Learn how to provide a framework for developing a business case for new or continued justification of BPM projects and see how this can help accelerate the startup time and enable more organizations to realize success from BPM.
Tags : 
opentext, bpm, business process management, it projects, produce results, framework, startup time, potential of bpm
    
OpenText
Published By: Cornerstone OnDemand     Published Date: Feb 22, 2016
Almost 20% of baby boomers will retire in the next 5 years, taking essential knowledge with them and vacating a significant number of leadership roles. With the Millennial generation now making up the majority of the workforce, outnumbering Gen X-ers, they will undoubtedly have to fill the gaps left by those heading into retirement. While this might be a startling prospect for some organisations, the best approach is to embrace this shift in personnel and train your Millennials to be the managers and executives you want – and need - them to be.
Tags : 
millennials, leadership, generation
    
Cornerstone OnDemand
Published By: Microsoft Azure     Published Date: Apr 11, 2018
When you extend the global reach of your enterprise, you’ll find new markets for your products and services. That means reaching more potential customers, bigger growth potential, and higher ROI. But to tap into those emerging markets, you need to provide the best, most consistent user experience. Now, it’s possible for you to build, deploy, and manage modern apps at scale with a globally-distributed database—without the hassles associated with hosting in your data center. Read the e-book Build Modern Apps with Big Data at a Global Scale and learn how Azure Cosmos DB, a globally-distributed turnkey database service, is transforming the world of modern data management. Keep access to your data available, consistent, and safe—with industry-leading, enterprise-grade security and compliance. Start developing the best app experience for your users based on five well-defined consistency models: Strong: Favors data consistency. Ideal for banks, e-commerce processing, and online booking. Boun
Tags : 
    
Microsoft Azure
Published By: Microsoft Azure     Published Date: Apr 11, 2018
Distributed systems enable different areas of a business to build specific applications to support their needs and drive insight and innovation. While great for the business, this new normal can result in development inefficiencies when the same systems are reimplemented multiple times. This free e-book provides repeatable, generic patterns, and reusable components to make developing reliable systems easier and more efficient—so you can free your time to focus on core development of your app. In this 160–page e-book, you’ll find: An introduction to distributed system concepts. Reusable patterns and practices for building distributed systems. Exploration of a platform for integrating applications, data sources, business partners, clients, mobile apps, social networks, and Internet of Things devices. Event-driven architectures for processing and reacting to events in real time. Additional resources for learning more about containers and container orchestration systems. “There are more
Tags : 
    
Microsoft Azure
Published By: Microsoft Azure     Published Date: Apr 11, 2018
Developing for and in the cloud has never been more dependent on data. Flexibility, performance, security—your applications need a database architecture that matches the innovation of your ideas. Industry analyst Ovum explored how Azure Cosmos DB is positioned to be the flagship database of internet-based products and services, and concluded that Azure Cosmos DB “is the first to open up [cloud] architecture to data that is not restricted by any specific schema, and it is among the most flexible when it comes to specifying consistency.” From security and fraud detection to consumer and industrial IoT, to personalized e-commerce and social and gaming networks, to smart utilities and advanced analytics, Azure Cosmos DB is how Microsoft is structuring the database for the age of cloud. Read the full report to learn how a globally distributed, multi-model data service can support your business objectives. Fill out the short form above to download the free research paper.
Tags : 
    
Microsoft Azure
Published By: Adobe     Published Date: Sep 28, 2016
Five years ago, the mobile revolution was in its adolescence. Now, it’s in the midst of a growth spurt, and it’s developing faster than ever. To keep up, you need to deliver customer-winning mobile experiences that drive loyalty for your brand. And the key for achieving this is mobile maturity. Our report outlines survey results from marketing and IT decision makers who share how they’re using mobile today. Read the report ‘Mobile is the strategy’ to learn: • The four components of the mobile maturity lifecycle • Why mobile apps are crucial to a successful mobile strategy • The role analytics plays in reaching mobile maturity
Tags : 
adobe, mobile, mobile strategy, marketing, mobile maturity, mobile apps, analytics, emerging marketing, marketing research, traditional marketing
    
Adobe
Published By: CrowdStrike     Published Date: May 10, 2018
Where to invest next: Identifying the people, processes and technology you need for an effective cybersecurity strategy Building your organization’s cybersecurity maturity doesn’t happen overnight. It takes time and thought to adequately assess all the factors that go into creating and implementing an effective security strategy, particularly what steps to take after you’ve made an initial investment in security. This white paper, “Where to Invest Next: Guidance for Maturing Your Cyber Defenses,” offers practical advice on achieving the level of cyber defense maturity that’s right for your organization. Learn why developing a security program that takes into account your risk level and the current state of your security posture is critical. You’ll also see why ensuring that everyone in the organization, from the leadership to the rank-and-file, is working toward the goal of cyber maturity is crucial to your success. Gain important insights into the cybersecurity maturity process incl
Tags : 
    
CrowdStrike
Published By: TD.Org     Published Date: Nov 06, 2017
Talent development leaders recognize that a key element in keeping learning relevant and engaging involves seizing opportunities to creatively embed social media in their organizations’ talent development portfolios. ATD’s Social Learning: Developing Talent Through Connection, Contribution, and Collaboration whitepaper reports on the use of social media for learning and the approaches that are driving organizational success. Download this whitepaper to better understand the strategies and practices talent development leaders are using to leverage social learning effectively.
Tags : 
    
TD.Org
Published By: Skillsoft     Published Date: Mar 03, 2015
With smartphones and tablets becoming more commonplace in enterprise environments, the interest in mobile learning is growing. Many organizations see the promise of mobile learning, but actual implementations are still relatively rare. Is now the time to take the plunge into mobile learning? Is your organization prepared? It’s important for organizations to focus on some basic issues before making this important decision.
Tags : 
skillsoft, development, programs, processes, business management, mobile learning, corporate education, courses, courseware, technology, resources, access, devices, support
    
Skillsoft
Published By: Mimecast     Published Date: Oct 22, 2018
What if your employees were more informed about security threats, more skeptical about what they receive in email, and less likely to click on malicious links in email without first verifying them? There are some impactful, quick wins that you and your organization can realize by implementing security awareness training. This recent in-depth survey of security professionals by Osterman Research shows that the leading security concerns across organizations are all areas in which security awareness training can yield significant benefits. Here are some suggestions on processes and practices to consider when developing a security awareness training program that will actually change behavior and make the organization less likely to fall prey to a cyberattack.
Tags : 
    
Mimecast
Published By: IBM     Published Date: Sep 30, 2013
In a “talent-constrained” economy, attracting and engaging highly talented people, developing globalleaders, improving and sharing new skills, and keeping people aligned and working together are major challenges. In this report, we discuss how new approaches and a new science of human resources have emerged to develop a “smarter workforce,” resetting the bar on talent, learning, and leadership strategies.
Tags : 
smarter workforce, workforce management, workforce, global, global businesses, recruiting, human resources, data analysis, analytics, employee retention, social media
    
IBM
Published By: IBM     Published Date: Jan 10, 2014
In a “talent-constrained” economy, attracting and engaging highly talented people, developing globalleaders, improving and sharing new skills, and keeping people aligned and working together are major challenges. In this report, we discuss how new approaches and a new science of human resources have emerged to develop a “smarter workforce,” resetting the bar on talent, learning, and leadership strategies.
Tags : 
global economy, smarter workforce, talent, talent analytics, impact learning prehire assessments, human capital, learning organization, employee engagement, leadership models, global leadership, bersin, deloitte
    
IBM
Published By: AcquireWeb     Published Date: Apr 07, 2008
This case study, published by DM News in July 2007, explores how email helped top-ranked ad agency Radarworks succeed in a changing market in developing a marketing campaign using a mixture of media channels with a set budget to maximize brand and event awareness and drive participation, and be able to measure the ROI from each marketing channel.
Tags : 
acquireweb, complete campaign, complete, multi-faceted, multichannel, multi-channel, integrated marketing, e-mail, acquisition e-mail, lead generation, e-mail marketing, e-mail appending, acquirelocal, local marketing, local store marketing, restaurant marketing, franchise marketing, acquisition marketing, data management/analytics
    
AcquireWeb
Published By: IBM     Published Date: Feb 18, 2009
This white paper explains the steps you need to consider when developing your privacy strategy and implementing your first data privacy project. Find out how you can help your organization implement best practices in privacy protection and make your privacy project successful from start to finish.
Tags : 
ibm integrated data management, data privacy, data security, ibm optim data privacy solution, hackers, security breach, best practices for data security, data inventory
    
IBM
Published By: IBM     Published Date: Jul 09, 2009
Value-driven product management is a repeatable process based on industry best practices that uses subjective and objective criteria to deliver successful products. This paper explains how assessment, alignment, achievability, accessibility, agility and accountability, the six key concepts of value-driven product management, can be applied to create a repeatable process for developing successful products.
Tags : 
ibm, telelogic, product success, value-driven, product management, assessment, alignment, achievability, accessibility, agility, accountability
    
IBM
Published By: VeriSign Authentication Services, now a part of Symantec Corp.     Published Date: Oct 15, 2011
"The Shortcut Guide to Business Security Measures Using SSL" examines current information security threats to business and describes techniques for developing a security management strategy that leverages established best practices.
Tags : 
extended validation, measures, green bar, online security, optimize, sgc, server gated cryptography, verisign, trust marks, security, ssl technology, malware, it infrastructure, operating systems, hacking, phishing, dos, cybercrime, bot herders, cloud computing
    
VeriSign Authentication Services, now a part of Symantec Corp.
Published By: GoToMeeting     Published Date: Jun 09, 2010
This new Forrester white paper explores the evolution of project management and outlines steps for defining, hiring and developing your next-generation project managers.
Tags : 
citrix gotomeeting, project management, collaboration, software delivery, remote access
    
GoToMeeting
Start   Previous    4 5 6 7 8 9 10 11 12 13 14 15 16 17 18    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.