RSS feed Get our RSS feed

News by Topic

hr issues

Results 51 - 75 of 111Sort Results By: Published Date | Title | Company Name
By: IBM     Published Date: May 01, 2017
If you function like most IT organizations, you've spent the past few years relying on mobile device management (MDM), enterprise mobility management (EMM) and client management tools to get the most out of your enterprise endpoints while limiting the onset of threats you may encounter. In peeling back the onion, you'll find little difference between these conventional tools and strategies in comparison to those that Chief Information Officers (CIOs) and Chief Information Security Officers (CISOs) have employed since the dawn of the modern computing era. Their use has simply become more: Time consuming, with IT trudging through mountains of endpoint data; Inefficient, with limited resources and limitless issues to sort through for opportunities and threats; and Costly, with point solution investments required to address gaps in OS support across available tools. Download this whitepaper to learn how to take advantage of the insights afforded by big data and analytics thereby usher i
Tags : ibm, endpoint management, mobile device management, enterprise mobility, os support, it organizations
     IBM
By: IBM     Published Date: Jul 17, 2018
Ensuring your data is compliant can be a fairly straightforward task. Your IT team works their way through the checklist, and stays out of trouble with lawyers and regulatory agencies. There’s value to that. But true data protection is more than regulatory compliance. In fact, even if you’re compliant, your organization could still be at risk unless you strategically identify and protect your most valuable data. Traditionally, you’ve been presented with IT security metrics—sometimes reassuring, other times alarming. But simply reviewing IT security metrics is not meaningful in and of itself. As an executive, you don’t evaluate issues in siloes. Instead, you excel at assessing issues in the broader context of your organizational operations. In other words, technical security data and metrics lack value unless viewed through the lens of business risk. When you’re presented with IT security metrics, your question is: What does this mean for my business? And ultimately, what data should I
Tags : 
     IBM
By: iCIMS     Published Date: Jan 17, 2014
This webinar from iCIMS will show you how to equip your talent team with the proper screening technology, stay in compliance with HR regulations, and best practices for pre and post hire candidate screening.
Tags : icims, talent management, new hires, hiring, finding new employees, screening, new candidates, hr issues
     iCIMS
By: Insight Software     Published Date: Oct 03, 2017
It’s critical that Finance teams have accurate, relevant, and timely data to understand current run rates and to steer your company toward growth. “The Finance Boss Guide to Oracle E-Business Suite to Drive Exponential Financial Gains” will help you translate numbers into fiscal performance through better reporting, analytics and planning, such as: How to create your own usable, sharable reports and web-based dashboards tracking financial performance and progress against company-wide KPIs Avoiding over-investing in dated ERP tools Industry analyst’s take on how to get better reporting and planning best practices and tools How Finance leaders at Bibby Distribution used the ability to drill down into reports to get exactly the detail they needed to address immediate business issues
Tags : 
     Insight Software
By: Insight Software     Published Date: Oct 03, 2017
It’s critical that Finance teams have accurate, relevant, and timely data to understand current run rates and to steer your company toward growth. “The Finance Boss Guide to JD Edwards to Drive Exponential Financial Gains” will help you translate numbers into fiscal performance through better reporting, analytics and planning, such as: How to create your own usable, sharable reports and web-based dashboards tracking financial performance and progress against company-wide KPIs Avoiding over-investing in dated ERP tools Industry analyst’s take on how to get better reporting and planning best practices and tools How Finance leaders at Bibby Distribution used the ability to drill down into reports to get exactly the detail they needed to address immediate business issues
Tags : 
     Insight Software
By: Insight Software     Published Date: Oct 03, 2017
Get “The Consummate IT Pro’s Guide to JD Edwards,” and we’ll help you capitalize on the value of IT through better reporting, analytics, and planning directly through your critical business systems. Use these resources to get up to speed on: Enabling end users to create their own usable, sharable reports and web-based dashboards tracking financial performance and progress against company-wide KPIs Avoiding costly mistakes when upgrading your ERP system Industry analyst’s take on how to get better reporting and planning from ERP systems How Bibby Distribution gave users the ability to drill down into reports to get exactly the detail they needed to address immediate business issues
Tags : 
     Insight Software
By: Insight Software     Published Date: Oct 03, 2017
Forget making business decisions with outdated data. Keep operations on track with real-time insights from every facet of your business including finance to supply chain management. “The Operations Guru’s Guide to JD Edwards” will help you master more efficient company operations so you can focus on making a massive operational impact. Tactical insights, covering: How your team can create usable, sharable reports and web-based dashboards tracking progress against company-wide KPIs from multiple systems, without leaning heavily on IT An industry analyst’s view on how to get better reporting and analytics from ERP and other critical data sources How Bibby Distribution gave users throughout the company the ability to drill down into reports to get exactly the detail they needed to address immediate business issues
Tags : 
     Insight Software
By: Intacct Corporation     Published Date: Jan 26, 2016
Download the white paper, “Developing P&L Reports to Improve Visibility” and learn how to improve: • Insight into organizational performance through a reliable and actionable P&L statement • Visibility into operational, competitive or strategic issues • Data integrity with a single source of truth for profit and loss information
Tags : 
     Intacct Corporation
By: Intel Corp.     Published Date: Nov 21, 2017
This Pathfinder paper navigates decision-makers through the issues surrounding a specific technology or business case, explores the business value of adoption, and recommends the range of considerations and concrete next steps in the decision-making process.
Tags : 
     Intel Corp.
By: Intel Corp.     Published Date: Nov 21, 2017
A Pathfinder paper navigates decision-makers through the issues surrounding a specific technology or business case, explores the business value of adoption, and recommends the range of considerations and concrete next steps in the decision-making process.
Tags : 
     Intel Corp.
By: Klocwork     Published Date: May 11, 2011
This technical white paper looks at the issues of developing for multicore and multiprocessor environments in detail, explains how static analysis can be used to address them, and walks through two examples of these issues in prominent open source projects.
Tags : klocwork, software development cycle, multiprocessor, open source, processor architecture
     Klocwork
By: Kronos     Published Date: May 30, 2018
How do you know for sure that you're managing compliance with labor laws and regulations correctly and accurately? Start by completing this checklist. Responses to a recent Kronos® survey of 812 HR and payroll managers identified five key compliance readiness issues that organizations need to address to reduce risk of noncompliance. These issues were determined from questions such as: •Can I easily respond to and communicate to my organization about new regulations within 60 to 90 days? •Do I spend more time on duplicate data entry among various systems than I do on strategic initiatives? •Does my workforce management vendor provide education and tools that help my organization stay compliant? Download this piece and complete the entire checklist to see where your organization stands on compliance preparedness. You can also and find out more about the Kronos single unified platform for HR and payroll that can help you adapt to regulatory changes and reduce the data-entry complexity, co
Tags : 
     Kronos
By: Kronos     Published Date: Sep 20, 2018
Approximately 75 percent of convenience store operators do not have a program in place to measure employee satisfaction. As a result, 43.8 percent of c-store operators reported their turnover rate for the associate position has risen, according to the 2016 Convenience Store News HR & Labor Study. Learn more about this and other human capital management issues among c-store operators by downloading this infographic.
Tags : 
     Kronos
By: Kronos     Published Date: Sep 24, 2018
This is the second in a series of three white papers that discuss proven strategies and best practices for optimizing three key elements of success — People, Process, and Technology — to address critical challenges and drive competitive advantage in today’s logistics industry. Keep reading to gain valuable insights into the “Process” trends and issues that are top of mind for managers across the logistics sector.
Tags : 
     Kronos
By: Lookout     Published Date: Mar 29, 2017
When it comes to enterprise mobility, both iOS and Android suffer from major security vulnerabilities and are at risk of malicious threats and malware attacks. Read the Lookout’s review of today’s most prevalent issues, including OS, app, and jailbreak threats.
Tags : risks, mobile technology, enterprise, ios, android, lookout
     Lookout
By: McAfee     Published Date: Oct 28, 2014
For SIEM to help usher in more effective security and risk management strategies—particularly related to threat mitigation, embracing trends, and aligning with business priorities—these five business issues must be addressed. McAfee spoke with SIEM users and this brief lists those top issues along with corresponding customer case studies and use cases.
Tags : big security data, situational awareness, real-time context, management ease, integrated security, siem, mcafee, risk management strategies
     McAfee
By: McAfee     Published Date: Dec 04, 2014
The attacks continue. The breaches occur. Penalties are assessed. While most universities manage to keep pace with the latest digital trends, they have been far less timely when it comes defending their networks and sensitive data against the latest targeted attacks and threats. This lack of protection is evident as recent headlines expose costly data breaches of student records and research, state and federal compliance violations, and a raft of other privacy and security issues that put students, alumni, staff, and the institutions themselves at considerable risk.
Tags : mcafee, security crisis, higher education, breaches, digital trend, privacy, security issues, sensitive data
     McAfee
By: Medsphere     Published Date: Aug 21, 2013
Learn why the three major barriers to healthcare technology has slowed its adoption and see how to solve these issues to maximize the benefits from your Electronic Health Records.
Tags : medsphere, healthcare, health it adoption, health information technology, ehr, efficiency
     Medsphere
By: MeQuilibrium     Published Date: Jul 31, 2019
More people suffer from anxiety than ever before, and it’s deeply affecting companies like yours. Many organizations are stuck wondering what to do. In this white paper, “The Triple A Threat,” we explore the Triple A Threat of anxiety, anger, and aggression. We’ll explain what impact these issues have on your workplace and your bottom line. You’ll also learn: ? The debilitating impacts of anxiety, which can lead to workplace anger and aggression ? Why resilient employees suffer less anxiety and can rebound after a setback ? How to build a habituated, protective shield through proven prevention techniques Resilience can equip your people with the skills to address stress and the challenges that work presents every day. With more resilient employees, organizations can dramatically reduce the threats of anxiety, anger, and aggression. Download Now
Tags : 
     MeQuilibrium
By: Microsoft     Published Date: Jul 07, 2016
Enable, protect, and manage mobile productivity Protecting email and other corporate data on mobile devices—without bogging down workers—is one of today’s biggest challenges faced by IT pros today. With the massive, global proliferation of mobile devices, it can be a struggle to manage and secure these devices and your data, both on approved enterprise applications and shadow IT. Download this free e-book to learn how to control the uncontrollable and create a solution that: • Enables continuous management, so your employees are more productive. • Offers threat protection, so you can detect abnormal user behavior, suspicious activities, known malicious attacks, and security issues right away. • Guards against data leakage. • Provides security after loss or theft of mobile devices. • Helps protect your Microsoft Office email, files, and apps.
Tags : mobile devices, enterprise, best practices, management
     Microsoft
By: Microsoft     Published Date: Oct 04, 2016
Security was once largely limited to the confines of an on-premises world, but now it must extend to the cloud, as well as a myriad of mobile devices. Employees and companies now expect increasingly complex interactions with devices, apps, data, and even other users. As many companies struggle to keep up with traditional single-point solutions, and limited budgets, this pressure is creating security blind spots for IT. In a world of evolving threats, it is becoming increasingly impossible to address all of these issues with an on-premises solution. What is needed is a holistic approach to identity-driven security—one that leverages a cloud-scale intelligent security graph to help you protect your business. In this vision whitepaper, we look into some of the challenges facing IT in the modern world and examine the possible solutions.
Tags : 
     Microsoft
By: Microsoft     Published Date: Oct 07, 2016
Security was once largely limited to the confines of an on-premises world, but now it must extend to the cloud, as well as a myriad of mobile devices. Employees and companies now expect increasingly complex interactions with devices, apps, data, and even other users. As many companies struggle to keep up with traditional single-point solutions, and limited budgets, this pressure is creating security blind spots for IT. In a world of evolving threats, it is becoming increasingly impossible to address all of these issues with an on-premises solution.
Tags : technology, best practices, data, enterprise, business analytics, business intelligence, business management
     Microsoft
By: NAVEX Global     Published Date: Mar 04, 2014
The following six lessons will help you assess the focus of your compliance training program and formulate a strategy to tackle your biggest training risks.
Tags : navex global, compliance training, compliance implementation, effective compliance, risks, hr issues, human resources, compliance mix
     NAVEX Global
By: NetApp APAC     Published Date: Jul 08, 2019
All-flash storage is on a strong growth trajectory, but the industry is not swooning naively over the blazing fast I/O speeds. Most IT managers are talking a mature, step-by-step approach to all-flash adoption. Falling per-gigabyte prices are making the technology more commonplace. Solid state drives are no longer just for specialized, high-performing tasks. Before they leap, however, storage professionals want to understand the full business picture as they formulate a winning strategy for putting all-flash storage to use for more workloads. This paper offers insights for business success with all-flash storage based on IT Central Station reviews. Real users weigh in on what it takes to get the most out of the technology. It covers such aspects of flash storage as the need for simplicity and the importance of flexibility. The paper also looks at how to build a business case for all-flash and think through the implications of issues such as integration with existing infrastructure.
Tags : 
     NetApp APAC
By: NetIQ     Published Date: Dec 23, 2010
This white paper describes three significant issues with Group Policy change management using native tools and describes a solution for applying best practices for change management.
Tags : netiq, change management, microsoft group policy, compliance auditing, recovery
     NetIQ
Start   Previous    1 2 3 4 5    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics