RSS feed Get our RSS feed

News by Topic

board

Results 151 - 175 of 684Sort Results By: Published Date | Title | Company Name
By: InfoPro Learning     Published Date: May 16, 2018
This webinar replay explains why a strong onboarding experience is founded on organizational values and a culture of learning.
Tags : onboarding training, onboarding program, onboarding experience, corporate training, elearning, e-learning, corporate learning, corporate training programs
     InfoPro Learning
By: HireVue     Published Date: May 16, 2018
WHY SO MANY COMPANIES ARE RETHINKING ASSESSMENTS If you’re a member of the Talent Acquisition team, there’s a good chance you use a pre-employment assessment at some point in your hiring process. According to the Talent Board, 75% of employers are using some sort of pre-hire assessment. And the Aberdeen Group notes that of its “Best in Class” organizations, 91% use assessments to screen candidates THIS EFFECTIVE SCREENING TOOL HAS UNINTENDED CONSEQUENCES In this eBook, we’ll look at the science behind traditional assessments and why despite sound science, they don’t work for candidates today- and how they can be transformed with video and artificial intelligence.
Tags : 
     HireVue
By: Groove     Published Date: May 16, 2018
Trader Interactive provides marketing services and technology solutions to customers across seven verticals. Their customer support team was bogged down with associating support requests with the appropriate cases in Salesforce, and they needed a solution to streamline their work. Now, the customer support team enjoys Gmail integration with Salesforce, and the sales team takes advantage of multi-step campaigns, email tracking, and much more. Overall, they’ve been able to work more efficiently and provide better value to their customers. Let’s check out their story.
Tags : 
     Groove
By: Absorb     Published Date: May 09, 2018
eLearning has become the prevailing approach to employee onboarding, compliance training, and professional development. The efficiencies that eLearning affords stem from automation, customization and self-service. These attributes allow end users (employees and others) to access just the right training at just the right time. They also provide Learning and Development administrators the peace of mind that training will be delivered as needed, in a consistent manner and that tracking the progress of individuals will also be made simpler by automation.
Tags : lms, employee, training, efficiencies, elearning, automation
     Absorb
By: MobileIron     Published Date: May 07, 2018
Ready or not, the global mobility trend is forcing enterprises to enable a modern, mobile workforce with business productivity tools on any device, regardless of the underlying operating system. As enterprise users increasingly demand the ability to use their own mobile devices and desktops for modern work, IT is quickly impacted by end-user technology decisions. Enterprises can no longer ignore this reality, especially given the explosive global demand for mobile devices. Considering that smartphone adoption is expected to grow from 1.47 billion devices in 2016 to more than 1.7 billion in 2021, it’s clear that organizations need a comprehensive way to quickly onboard and secure a vast range of employee devices coming into the enterprise.
Tags : endpoint, management, business, workforce, desktop, device, mobile
     MobileIron
By: Epicor     Published Date: Apr 30, 2018
More and more hardware and home center retailers are using the rich and robust Epicor® Eagle N Series® solutions for higher profits and faster growth—all while building loyal customer relationships. Now, with hundreds of additional enhancements built in, Epicor Eagle N Series software can help you streamline nearly everything you do for your business so you can focus on running more efficiently and profitably. With Eagle N Series, you can: • Simplify everyday processes—natural, intuitive workflows whisk you through everyday activities • Manage complex inventory despite seasonal and trend-based demand swings • Improve overall business performance—make fast, informed decisions using intuitive on-screen analytics and dashboards What do businesses powered by Eagle N Series have to say about it? Read on to find out.
Tags : retail pos software, hardware pos, mobility software, mobile pos, inventory management software, customer loyalty software, mobile technology, pos technology
     Epicor
By: WorkBook from Deltek     Published Date: Apr 26, 2018
Digital transformation (DX) is fundamentally changing enterprise resource planning (ERP) — allowing businesses to transform their decision making, which is enhancing their business outcomes significantly as we enter the digital economy. Digital transformation is an enterprisewide, board-level strategic reality for companies wishing to remain relevant or maintain or enhance their leadership positon in the digital economy. Digitally transformed businesses have a repeatable set of practices and disciplines that are used to leverage new business, 3rd Platform technology, and operating models to disrupt businesses, customers, and markets in pursuit of business performance and growth. DX is driving businesses to rethink their technology strategy, and that includes moving beyond their legacy ERP and back-office systems.
Tags : global, saas, cloud, psa, erp, applications, vendor, assessment
     WorkBook from Deltek
By: Dome9     Published Date: Apr 25, 2018
As of May 2017, according to a report from The Depository Trust & Clearing Corporation (DTCC), which provides financial transaction and data processing services for the global financial industry, cloud computing has reached a tipping point1. Today, financial services companies can benefit from the capabilities and cost efficiencies of the cloud. In October of 2016, the Federal Deposit Insurance Corporation (FDIC), the Office of the Comptroller of Currency (OCC) and the Federal Reserve Board (FRB) jointly announced enhanced cyber risk management standards for financial institutions in an Advanced Notice of Proposed Rulemaking (ANPR)2. These proposed standards for enhanced cybersecurity are aimed at protecting the entire financial system, not just the institution. To meet these new standards, financial institutions will require the right cloud-based network security platform for comprehensive security management, verifiable compliance and governance and active protection of customer data
Tags : 
     Dome9
By: DocuSign     Published Date: Apr 24, 2018
Staffing companies play a critical role in recruiting and onboarding talent to ensure that operations don’t skip a beat. In today’s competitive recruiting market, staffing companies need to be nimble and efficient. They need to invest in digital tools to hire and onboard the best professionals. Many organizations still use manual or paper-based processes, which are slow, expensive, and error-prone, resulting in inefficient operations and compliance risks. Investing in digital operations reduces search time and costs while delighting candidates and improving security and compliance.
Tags : 
     DocuSign
By: DocuSign     Published Date: Apr 24, 2018
At DocuSign, we understand that deploying new technology and processes in your organization can be a challenge. Based on our experience with on-boarding real estate offices across the country, we have found that there are several key factors that contribute to successful deployment and adoption. Within this guide, we have outlined critical change management principles and supporting materials that will help you successfully manage your organizations transition to DocuSign.
Tags : 
     DocuSign
By: Epicor     Published Date: Apr 17, 2018
More and more sporting goods and outdoor sports retailers are using the rich and robust Epicor® Eagle N Series® solutions for higher profits and faster growth—all while building loyal customer relationships. Now, with hundreds of additional enhancements built in, Epicor Eagle N Series software can help you streamline nearly everything you do for your business so you can focus on running more efficiently and profitably. With Eagle N Series, you can: • Simplify everyday processes—natural, intuitive workflows whisk you through everyday activities, plus it includes specialty tools for firearms compliance and equipment rentals • Manage complex inventory despite seasonal and trend-based demand swings • Improve overall business performance—make fast, informed decisions using intuitive on-screen analytics and dashboards What do businesses powered by Eagle N Series have to say about it? Read on to find out.
Tags : sporting goods pos software, retail pos software, sporting goods, inventory management, improve business efficiencies, smarter retailers, customer engagement software, customer loyalty software
     Epicor
By: Epicor     Published Date: Apr 17, 2018
Running a successful firearms and shooting sports retail business offers unique challenges. To achieve growth, you need a software solution that streamlines nearly every aspect of your firearms business—letting you focus on running a more compliant, efficient, and profitable operation. Created in collaboration with Orchid Advisors, Epicor FFL Compliance Manager is a robust, cloud-based system for firearms retailers that seamlessly manages ATF compliance for higher profits and faster growth. This fast, easy-to-use bound book solution can: • Quickly package compliance reports on demand and review bound book activity with dashboards to support ATF inspections • Save time by scanning serial numbers instead of entering them manually • Relieve audit stress thanks to easy access to bound book data and on-demand, ATF-friendly reporting Read on to hear from businesses currently powered by Epicor FFL Compliance solutions.
Tags : firearms collection software, firearms inventory software, firearms management system, firearms tracking software
     Epicor
By: Dynatrace     Published Date: Apr 16, 2018
Internet-of-things (IoT) is increasing in excitement across all industries as they look to provide innovation in their product and services, and monitor risks and costs in their business operations. But IoT is not a single technology. It is an ecosystem of human and non-human touchpoints that span across multiple technologies. This creates a dynamic and complex environment that is difficult to see and manage in scope. The traditional monitoring approach of watching dashboards, responding to alerts, and manually analyzing doesn’t work anymore. Today’s hyper-dynamic, highly distributed IoT application environments have become way too complex and move too quickly. The volume, velocity, and variety of information is simply more than humans can keep up with using traditional tools.
Tags : 
     Dynatrace
By: SAS     Published Date: Apr 04, 2018
Opioid use grabs headlines when important celebrities overdose. Prince is sadly the most recent. But the problem is persistent and pervasive. The marginally good news is that the number of opioid prescriptions written started to decline last year. Overdose deaths, however, continued to rise. Also in the news have been lawsuits against pharmaceutical companies and distributors for helping to create the astounding oversupply of opioids, but the root causes go deeper. Physicians and their patients, medical policy makers and licensing boards, pharma companies and pharmacies all have played roles. And all must work together to stem the opioid epidemic and achieve the fundamental objectives of reducing addiction and deaths.
Tags : 
     SAS
By: Lookout     Published Date: Mar 28, 2018
Mobile devices have rapidly become ground zero for a wide spectrum of risk that includes malicious targeted attacks on devices and network connections, a range of malware families, non-compliant apps that leak data, and vulnerabilities in device operating systems or apps. Read the four mobile security insights CISOs must know to prepare for a strategic conversation with the CEO and board about reducing mobile risks and the business value associated with fast remediation of mobile security incidents.
Tags : 
     Lookout
By: FICO     Published Date: Mar 22, 2018
Cybercrime and data breaches are daily news. Escalating cost, new regulations and increased focus on managing third-party relationships means cybercrime is a boardroom issue. This executive briefng explains why cybercrime is a relevant and pressing problem, and will show you how to evaluate and invest in layered controls to help you understand the security posture for your organisation.
Tags : 
     FICO
By: Persicope Data     Published Date: Mar 07, 2018
Some brands are great at connecting with new audiences. They might have a killer marketing campaign, demonstrably fulfill a gap in the marketplace, or just have that certain “it factor.” Being able to get new customers on board can lead to fantastic short-term financial gains.
Tags : 
     Persicope Data
By: Limelight Networks     Published Date: Mar 02, 2018
Today, digital security is top-of-mind. From the boardroom to the backroom, everyone is asking the same questions, “How do we protect our digital experiences? How do we ensure our website is safe for our visitors? How do we make sure that no one can steal our content?” But safeguarding a digital experience isn’t a one-size-fits-all solution. It often involves multiple techniques and layers of security. From verifying your identity (with HTTPS) to encrypting sensitive data to restricting access and protecting multimedia content, you must approach security in a layered manner, employing multiple means and techniques to protect the digital content through which your audience interacts. This paper explores ten different methods and technologies that an organization can employ to protect its content. This multi-layered approach can effectively protect your digital content, ensure high availability, and maintain superior quality of experience for every digital visitor. You’ll learn: 10 s
Tags : 
     Limelight Networks
By: Limelight Networks     Published Date: Mar 02, 2018
Today, digital security is top-of-mind. From the boardroom to the backroom, everyone is asking the same questions, “How do we protect our digital experiences? How do we ensure our website is safe for our visitors? How do we make sure that no one can steal our content?” But safeguarding a digital experience isn’t a one-size-fits-all solution. It often involves multiple techniques and layers of security. From verifying your identity (with HTTPS) to encrypting sensitive data to restricting access and protecting multimedia content, you must approach security in a layered manner, employing multiple means and techniques to protect the digital content through which your audience interacts. This paper explores ten different methods and technologies that an organization can employ to protect its content. This multi-layered approach can effectively protect your digital content, ensure high availability, and maintain superior quality of experience for every digital visitor. You’ll learn: 10 s
Tags : content delivery network, cdn, cybersecurity, ddos, waf, web application firewall, distributed denial of service attacks, cloud security
     Limelight Networks
By: LogMeIn     Published Date: Feb 27, 2018
Most customer engagement solutions on the market require complex data analysis and months of implementation before you start seeing results. But Bold360 ai uses Natural Language Understanding to start learning your customers’ needs from the very first interaction. Its smart routing capability directs customers to the best resource available, and captures data in an intuitive dashboard. Start seeing results now with Bold360 ai.
Tags : bold360, engagement, customer, market, data, analysis
     LogMeIn
By: Fujitsu     Published Date: Feb 26, 2018
As schools look to blended learning as a solution to personalize and positively impact student achievement, the need to train and support teachers has become blatantly clear. Thus, districts and schools have allocated scarce resources to the process of onboarding and supporting teachers as new tools and platforms are introduced. However, school leaders and teachers often fail to recognize the need to similarly onboard and support students into new digital environments, instead trusting the inherent technological competencies of the “digital native” student. Intel, the Intel logo, Intel Core, Intel vPro, Core Inside and vPro Inside are trademarks of Intel Corporation or its subsidiaries in the U.S. and/or other countries
Tags : digital, native, social, entertainment, technology, academic, fujitsu
     Fujitsu
By: Fiserv     Published Date: Feb 21, 2018
With the Financial Accounting Standards Board (FASB) Current Expected Credit Loss (CECL) impairment standard and Allowance for Loan and Lease Losses (ALLL) finalized, preparation and interpretation has begun. Having the right tools to help gather and organize the historical data, create pools and calculate loss rates is critical. In this webinar, we’ll walk through Prologue™ Credit Loss Manager from Fiserv and how it will help you be prepared for CECL.
Tags : cecl compliance, cecl consulting, allowance for loan loss calculator, fasb, cecl, current expected credit loss, alco, reserve
     Fiserv
By: Limelight Networks     Published Date: Feb 21, 2018
From the boardroom to the backroom, everyone is looking for ways to protect their digital content from cyber threats like DDoS attacks, unauthorized access or theft. In this white paper, we’ll discuss ten different ways to protect your digital content, ensure high availability and maintain superior quality of experience for every digital visitor.
Tags : 
     Limelight Networks
By: HireVue     Published Date: Feb 09, 2018
If you’re a member of the Talent Acquisition team, there’s a good chance you use a pre-employment assessment at some point in your hiring process. According to the Talent Board, 75% of employers are using some sort of pre-hire assessment. And the Aberdeen Group notes that of its “Best in Class” organizations, 91% use assessments to screen candidates.
Tags : 
     HireVue
By: TE Connectivity     Published Date: Feb 07, 2018
Our free solutions guide features all of our dependable connectivity solutions for data & power. You’ll get 1. Data Communications Product Guide 2. Standard Flexible Printed Circuit (FPC) Connectors Quick Reference Guide 3. Memory Sockets Quick Reference Guide 4. Stacking Height Guide for Parallel Board-to-Board Applications 5. RF Connectors Quick Reference Guide 6. High Speed Input/Output Solutions Quick Reference Guide 7. AMPLIMITE Subminiature D Connectors Catalog 8. Soft Shell Pin & Socket Connectors Catalog
Tags : 
     TE Connectivity
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics