hr management

Results 401 - 425 of 982Sort Results By: Published Date | Title | Company Name
Published By: IBM     Published Date: May 30, 2018
This book is designed to help you get the upper hand on managing your enterprise security through an integrated threat management strategy.
Tags : 
    
IBM
Published By: IBM     Published Date: Jun 05, 2018
Keeping up with ever changing contract management work is challenging. Governing legal and procurement content is written by thousands of people and applied to hundreds of situations. To stay compliant, organizations employ knowledgeable professionals to analyze every sentence to determine the changes that need to be made to company contracts. The manual process of sifting through these dense, complicated documents is inefficient and prone to error. Watson Compare and Comply is trained on contract specific knowledge and classifications and can streamline contract workflows through semantic understanding. Join Director of Watson Offering Management, Adam Orentrichler, and Chief Data Scientist of SAP Ariba, David Herman, as they discuss how Watson can transform the way your company manages contract governance.
Tags : 
    
IBM
Published By: IBM     Published Date: Jul 16, 2018
Do your plans and forecasts need a reality check? The quality of your strategic decisions is only as good as the quality of your forecasts. And forecasts are only good if they reflect current reality—not the reality of two, three or more quarters ago. Enter “continuous planning.” With a methodology for forecasting at frequent intervals throughout the year, continuous planning “enables managers to see trends, patterns, and ‘breaks in the curve’ long before their competitors, and thus make better informed decisions regarding products and markets.” In this free online webinar, speakers Jim Collins & Guy Jones will explain how continuous planning keeps you in touch with current reality - and one step ahead of competitors. Jim Collins, Performance Management Strategy Executive, IBM Guy Jones, Worldwide Technical Sales Executive, IBM Performance Management,
Tags : 
    
IBM
Published By: IBM APAC     Published Date: Aug 22, 2017
While working to maintain tactical control of the mobile environment, IT managers often find themselves drowning in minutiae. Overwhelmed by the number of moving parts, they’re unable to stay abreast of the latest threats, let alone extract meaning from or make decisions based on the mountains of data now being collected. With limited IT resources dedicated to mobile technology tools that facilitate reactive rather than proactive management—and limited visibility into mobile intelligence across the organization—many managers have had to choose between security and productivity as the focus of their efforts.
Tags : 
security risks, it operations, workforce, advisor, mobile security, mobile metrics, cloud based, benchmarking data
    
IBM APAC
Published By: IBM APAC     Published Date: Jul 15, 2019
TBC
Tags : 
    
IBM APAC
Published By: IBM APAC     Published Date: Jul 19, 2019
It’s important to understand the impact of AI workloads on data management and storage infrastructure. If you’re selecting infrastructure for AI workloads involving ML and deep learning, you must understand the unique requirements of these emerging workloads, especially if you’re looking to use them to accelerate innovation and agility. This Gartner report highlights three main impacts that AI workloads have on data management and storage.
Tags : 
    
IBM APAC
Published By: IBM ILOG.     Published Date: Jul 14, 2009
Financial services managers must revisit the quality of their risk management capabilities while reducing cost through more efficient operations. Often, unique leverage can be found with improved business process management, policies and exception-based decisions.  Hear three industry experts discuss how banks are using BRMS to meet the demand for speed, control, and profits.
Tags : 
ibm, financial, quality, risk, management, cost, reduce costs, effiency
    
IBM ILOG.
Published By: IBM ILOG.     Published Date: Jul 14, 2009
Financial services managers must revisit the quality of their risk management capabilities while reducing cost through more efficient operations. Often, unique leverage can be found with improved business process management, policies and exception-based decisions.  Hear three industry experts discuss how banks are using BRMS to meet the demand for speed, control, and profits.
Tags : 
ibm, health, healthcare, customer, service, private, epxperience, insurance
    
IBM ILOG.
Published By: IBM MaaS360     Published Date: Oct 08, 2015
Hacktavists have made the move to mobile. Malware, phishing and network attacks are now as likely to strike smartphones and tablets like any other system. Mobile Threat Management is now needed to stay ahead of new vectors of vicious intent.
Tags : 
ibm, fiberlink, maas360, mobile, malware, hackers, phishing, threat management
    
IBM MaaS360
Published By: IBM Software     Published Date: Feb 03, 2012
This paper from IBM describes how to build a proactive threat and risk strategy based on predictive analytics; examples of how organizations used predictive analytics to minimize the negative impact of risk and maximize positive results; and steps to advance your organization's use of predictive analytics to combat threat and risk.
Tags : 
predictive threat, security, technology, risk management, security policy, ibm, intrustion protection
    
IBM Software
Published By: IBM Software     Published Date: Feb 03, 2012
In this technical white paper from IBM, learn how predictive analytics can be used to detect internal and external threats to your organization.
Tags : 
ibm, threat detection, technology, security, security policy, risk management, vulnerability management
    
IBM Software
Published By: IBM Software     Published Date: Oct 24, 2011
This paper describes how to build a proactive threat and risk strategy based on predictive analytics and provides real life examples of the benefits.
Tags : 
ibm, predictive analytics, collaboration, insights, integration, automation, smarter, data analysis
    
IBM Software
Published By: IBM US Smarter Buildings     Published Date: Jan 10, 2012
Progressive retailers have shifted to integrated store lifecycle (SLM) systems enabled by Integrated Workplace Management System (IWMS) to provide a seamless integration of all phases of the entire real estate lifecycle process from market planning; through site selection, store design and construction; to day-to-day operations such as lease administration and facility management.
Tags : 
ibm, smarter buildings, lifecycle management, workplace management, slm, iwms
    
IBM US Smarter Buildings
Published By: IBM Watson Health     Published Date: Jun 14, 2017
Electronic health records (EHRs) are necessary, but were not designed to anchor population health management (PHM). This is partly because they lack semantic interoperability, which is the ability of disparate information systems to share data and enable communications among users in a meaningful way. This paper explains how an approach that includes a care collaboration platform can manage population health by aggregating and normalizing the necessary data.
Tags : 
ehr, ibm, health management, population health management, data aggregation, information systems
    
IBM Watson Health
Published By: iCims     Published Date: Jan 17, 2013
Are you interested in growing your passive talent pools? Bring potential candidates in through a fully branded Social Connect Portal.
Tags : 
recruiting, recruiting solutions, social recruiting, human resources, talent management
    
iCims
Published By: iCims     Published Date: May 15, 2013
Check out this free infographic on why it is important to connect with top talent for future positions. Build your talent pools today to optimize your workforce tomorrow.
Tags : 
workforce management, human resources, talent management, icims, infographic, workforce optimization
    
iCims
Published By: iCims     Published Date: Jan 07, 2014
The War for Talent is going to have winners and losers, and we all want to hire a winning team. In such a competitive environment, an outstanding employment brand is required to attract the best and brightest. While most talent acquisition professionals know in theory that a company’s employment brand is key, few really analyze the candidate experience as the most important element of your brand. This eBook will dive into everything HR managers and recruiters must know about optimizing the candidate experience. You will also receive a product demo.
Tags : 
applicant tracking systems (ats), candidate sourcing, employment applications, hiring, hr strategy, human resource technology, job descriptions, online recruiting
    
iCims
Published By: iCims     Published Date: Apr 03, 2014
Read iCIMS’ proprietary research on today’s job seeker behavior to understand where job seekers are looking for new opportunities and who is doing the looking. Learn how iCIMS’ applicant tracking system can help your company attract and hire the best talent.
Tags : 
applicant tracking systems (ats), candidate sourcing, employee engagement, external recruiting, hr strategy, job posting, online recruiting, recruitment technology
    
iCims
Published By: iCIMS     Published Date: Dec 09, 2013
Learn more about the rise of mobile technology and how to build a recruitment strategy to support it in this complimentary ebook published by iCIMS Hire Expectations Institute.
Tags : 
icims, mobile, mobile hr, talent, new hire, new talent, online behavior, talent acquisition
    
iCIMS
Published By: iCIMS     Published Date: Jan 17, 2014
This webinar from iCIMS will show you how to equip your talent team with the proper screening technology, stay in compliance with HR regulations, and best practices for pre and post hire candidate screening.
Tags : 
icims, talent management, new hires, hiring, finding new employees, screening, new candidates, hr issues
    
iCIMS
Published By: iCIMS     Published Date: Jan 17, 2014
Access best-of-breed product tours of iCIMS Connect, Recruit, and Onboard products to fully experience how you can best optimize your talent acquisition processes using award winning technology.
Tags : 
icims, new products, free demo, talent acquisition, new hires, hiring, employees, new employees
    
iCIMS
Published By: iCIMS     Published Date: Jan 18, 2014
Check out this new whitepaper published by iCIMS Hire Expectations Institute to learn how video will drive the next generation of recruiting and how your HR team can be best equipped.
Tags : 
icims, recruiting, employee hiring, video recruiting, video interview, job interview, hr management, hr techhnology
    
iCIMS
Published By: IDFocus     Published Date: Aug 21, 2009
HRFeed is one of the most critical elements of every Identity Management or User Provisioning solution. This document outlines the different business and technical challenges that IDFocus faced when building successful HR-to-Provisioning integration for several clients.
Tags : 
identity management, human resources, hrfeed, identity management, user provisioning, system integration, idfocus
    
IDFocus
Published By: Illusive Networks     Published Date: Apr 10, 2019
APTs can be particularly harmful to financial service organizations, raising the need for early detection of malicious intruders. This white paper describes three use cases that illustrate how Illusive’s technology provides a nimble, easy-to-manage solution that guards the integrity of SWIFT services, defends legacy, custom, or “untouchable” applications and systems, and helps manage cyber risk during periods of disruptive business change.
Tags : 
cyber security, deception technology, endpoint security, cyber security, threat management, threat protection, illusive networks, endpoint protection
    
Illusive Networks
Published By: Illusive Networks     Published Date: Apr 10, 2019
In today’s healthcare environments, new cyber vulnerabilities and risks open as fast as older ones get remedied. This white paper describes three use cases that illustrate how Illusive’s technology provides a nimble, easy-to-manage solution for stopping attackers that succeed in bypassing security controls.
Tags : 
cyber security, deception technology, endpoint security, cyber security, threat management, threat protection, illusive networks, endpoint protection
    
Illusive Networks
Start   Previous    10 11 12 13 14 15 16 17 18 19 20 21 22 23 24    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.