RSS feed Get our RSS feed

News by Topic

hr success

Results 151 - 175 of 367Sort Results By: Published Date | Title | Company Name
By: TD.Org     Published Date: Nov 06, 2017
Talent development leaders recognize that a key element in keeping learning relevant and engaging involves seizing opportunities to creatively embed social media in their organizations’ talent development portfolios. ATD’s Social Learning: Developing Talent Through Connection, Contribution, and Collaboration whitepaper reports on the use of social media for learning and the approaches that are driving organizational success. Download this whitepaper to better understand the strategies and practices talent development leaders are using to leverage social learning effectively.
Tags : 
     TD.Org
By: Lenovo and Intel®     Published Date: Nov 03, 2017
The power of digital transformation (DX) is delivered through devices. But too many digital transformation initiatives focus entirely on broad cloud, app, and software solutions. While end-user computing devices account for only a fraction of DX investments, underestimating their importance can risk your entire initiative. To ensure the success of your DX initiative, you need to have the right devices in the right hands to deliver your transformative experience. In this white paper, you’ll see how to avoid the pitfalls of DX, and how to evaluate your device requirements to maximize the potential of your DX investment. Download the white paper to find out more!
Tags : 
     Lenovo and Intel®
By: Lenovo and Intel®     Published Date: Nov 03, 2017
How can you drive digital transformation? Find out in three steps! This eBook provides you with the details you need to drive digital transformation (DX) in your organization. Highlighted for you are the key decision points, a defined path to success, and the critical role devices play in helping your team maximize DX results. You’ll get: • Check lists • Device recommendations • How to leverage DX with other solutions Download the eBook now.
Tags : 
     Lenovo and Intel®
By: Trintech EMEA ABM Pilot     Published Date: Nov 03, 2017
In our previous eBook, “Part 1: Enabling Financial Transformation through Technology,” we examined the “why” of Record to Report transformation and briefly described ‘how” you can achieve this through the implementation of Record to Report technology. Now that you understand the “why” and the “how” it’s time to put it into action to ensure a successful Record to Report transformation delivery. But first we need to lay the framework, as the majority of you have probably never embarked on a financial transformation journey before or have experience with a technology purchase or implementation of this calibre.
Tags : account reconciliation, accounting automation, finance shared services, finance transformation program, finance transformation strategy, financial close, financial close process, reconciliation software
     Trintech EMEA ABM Pilot
By: Rosetta Stone     Published Date: Nov 02, 2017
Time and resource allocation for language programs has been shrinking while the need for multilingualism only grows. It is critical that our students remain competitive on the global playing field. As the benefits of a multilingual society become clearer, parents insist that language learning is important for their children’s future success. However, our current education system still lacks the resources to provide all children the opportunity to develop the skills that will prepare them to succeed in an interconnected world. Global competence and language skills are no longer just nice to have—they are essential.
Tags : 
     Rosetta Stone
By: XpertHR     Published Date: Oct 23, 2017
USE THIS GUIDE TO Learn how and why mergers and acquisitions fail to achieve their goals; Learn how and why HR can and should be involved in the process to boost the likelihood of success; Identify strategic goals before, during and after a restructure; Gain insight on obstacles and risk factors in a post-integration environment. Get a FREE Trial! Visit www.
Tags : 
     XpertHR
By: Amazon Web Services     Published Date: Oct 09, 2017
The following insights should be used as a resource for Chief Financial Officers (CFOs) as they lead or support their organisation through a cloud adoption journey. It is designed to provide an overview of cloud adoption drivers, costs, risks, and benefits, as well as raise important questions about staffing and technology decisions that are critical to success. It is also intended to help inform business cases, while surfacing measurements and indicators specific to cloud environments that impact the bottom line. The foundational guidance provided is a collection of insights captured and distilled from direct conversations and engagements between Amazon Web Services (AWS) and customer CFOs representing an extensive range of industries.
Tags : global expansion, mergers and acquisitions, business agility, real estate, tax exposure, talent acquisition, operations investment
     Amazon Web Services
By: Secureworks     Published Date: Oct 04, 2017
The SecureWorks® Counter Threat Unit™ (CTU) research team analyzes security threats and helps organizations protect their systems. During May and June 2017, CTU™ researchers identified lessons learned and observed notable developments in threat behaviors, the global threat landscape, and security trends: • The global WCry and NotPetya campaigns reinforced the need for a layered approach to security. • Attacks used obfuscated malicious files and scripts to bypass filtering and deliver malware. • A Chinese threat group has had repeated success using compromised websites to attack targeted organizations. • Threat actors have been stealing intellectual property from Japanese enterprises.
Tags : 
     Secureworks
By: Inspirus     Published Date: Oct 04, 2017
Many companies in HR technology claim to affect engagement — and many of them do! But most only touch one or two pieces of the engagement puzzle, and it’s tough to get a complete picture of how you’re affecting the entire employee experience. Think about the highlights of your work experiences for a moment. Maybe you won employee of the month. Maybe you hit a big goal and your team had a party to celebrate. Or maybe your team threw a baby shower or took a moment to appreciate the 10 years you spent growing with your company. You might consider those moments as you think about your work experiences, but you probably consider a number of other moments as well. The employee experience isn’t just one thing — it’s the sum of many different experiences across our relationships, our work, our personalities, and our lives. Making the connection to the individual is critical for success. When we look at how we make an impact on engagement, we can’t just look at one or two things; we have to con
Tags : 
     Inspirus
By: Microsoft Office 365     Published Date: Sep 26, 2017
Today’s businesses rely heavily on email to communicate with clients, partners, and colleagues. But research suggests that organizations are lacking when it comes to protecting themselves against the increasing number of customized and complex attacks. When polled by Mimecast, 83% of IT security managers said they see email as a primary source of attack, yet 65% claim they aren’t fully equipped to resolve the risks associated with email threats. Respondents’ perceptions of primary security threats also appeared to change based on having experienced a successful breach. However, viruses, malware, spam, and insider threats remain the top concerns for both groups, both with and without breach experience.
Tags : 
     Microsoft Office 365
By: CA Technologies     Published Date: Sep 25, 2017
Several years into the app economy, business has changed. Accelerating product cycles and competitive threats now demand continuous planning. Change is constant and managing it is more important than ever. As a result, companies that for years have taken a traditional approach to managing initiatives are moving rapidly to implement agile business practices. And they’re seeing results, in the form of improved quality, faster delivery of value, reduced development costs and increased customer satisfaction. But this transition also creates new challenges and responsibilities for the project management office (PMO). In fact, the success of the transformation often hinges on the PMO’s ability to expand the underlying concepts of the agile development methodology into a companywide ethos¬—a concept known as business agility.
Tags : decision making, strategically, tools, pmo, entrepreneurial spirit, business, ca technologies
     CA Technologies
By: KPMG     Published Date: Sep 21, 2017
Drive change or be changed. KPMG’s 2017 HR Transformation Survey reveals organizations divided into two camps: one half ‘enlightened’ and boldly engaged on strategic HR transformation, the other half ‘unenlightened’ and faltering amid uncertainty as the digital era redefines the world around them and dramatically rewrites the rules for success. View now.
Tags : 
     KPMG
By: KPMG     Published Date: Sep 21, 2017
Drive change or be changed. KPMG’s 2017 HR Transformation Survey reveals organizations divided into two camps: one half ‘enlightened’ and boldly engaged on strategic HR transformation, the other half ‘unenlightened’ and faltering amid uncertainty as the digital era redefines the world around them and dramatically rewrites the rules for success. View now.
Tags : 
     KPMG
By: Netsuite     Published Date: Sep 06, 2017
Moving your company to the cloud allows for more efficient and effective business operations—essential for growing an organization. Companies plagued by inaccurate, out of date information can instead get real-time access to critical business data anywhere. NetSuite has worked with businesses across all industries to guide them through the many phases of growth, from start-up to ramp up to IPO. Learn how to overcome the five obstacles to successful growth and why NetSuite will be the last business system you will ever need.
Tags : 
     Netsuite
By: Logrhythm     Published Date: Sep 05, 2017
The purpose of this white paper is to show you how you can successfully build a SOC, even with limited resources. The paper first explains the basics of the Cyber Attack Lifecycle and the need to address it through the Threat Lifecycle Management framework. Next, the paper explains the basics of SOCs, providing details of what SOCs mean in terms of people, processes, and technology. Finally, the paper walks you through a methodology for building a SOC with limited resources, focusing on tactics to make your rollout smooth and successful. After reading this paper, you should be ready to start planning your own SOC.
Tags : reconnaissance, initial compromise, command control, lateral movement, target attainment, corruption
     Logrhythm
By: Lookout     Published Date: Aug 30, 2017
The Practical Guide to Enterprise Mobile Security was created to help IT managers fulfll their dual role of both enabling productivity and reducing risk through the adoption of modern-enterprise mobile security practices. This guide will help answer questions you might have about implementing mobile security, identify the components that make up a holistic enterprise mobile security strategy, point out key considerations that lead to successful deployments, and provide tips on how to successfully drive adoption of that solution in your global workforce.
Tags : enterprise mobile security, mobile security risk, risk reduction, device security
     Lookout
By: Datastax     Published Date: Aug 23, 2017
A holistic approach to using customer data to enable data-driven decisions for attracting, retaining, and delivering value through customer experience is what is going to drive many business initiatives over the next 12-month period. Though they each have varying degrees of capability to transform their customer experience applications and remain continuously available no matter what is critical to their success. Companies surveyed are eager to deliver a great customer experience and capture market share, but many CX journeys are hindered by business unit siloes, insufficient budget, and technical challenges. The responses provide key insights into the business priorities, challenges, and data technology needs of companies embarking on or in the midst of their CX journey.
Tags : datastax, customer data
     Datastax
By: Juniper Networks     Published Date: Aug 10, 2017
The digital economy is transforming the financial services sector. The pace of innovation is accelerating, customers have higher expectations than ever, and new competitors are emerging from nontraditional markets. At the same time, financial services has long been a favorite target of cyber attackers, and despite firms’ best efforts, cybersecurity threats are rising and attacks are more successful than ever. Financial services firms need a more effective, adaptable approach to detecting and stopping cyberthreats.
Tags : account security, data management, network security, secure systems, application security, network performance, network diagnostics
     Juniper Networks
By: Oracle APAC ZO OD Prime Volume HCM ABM Leads June 2017     Published Date: Jul 12, 2017
As we turn our attention to 2017, HR leaders have their destinies and those of the modern workforce firmly in their hands. Businesses have never faced such extreme levels of uncertainty. On a macroeconomic level, they are still unclear on how and when the UK’s “Brexit” from Europe will proceed while trying to predict how a political outsider in the White House will affect global markets. Meanwhile, they are seeing their success threatened by disruptive upstarts and their operating models challenged by employees’ cry for new ways of working.
Tags : human resources, employee engagement, talent management
     Oracle APAC ZO OD Prime Volume HCM ABM Leads June 2017
By: Makino     Published Date: Jun 23, 2017
With rising demands for shorter lead-times, faster throughput, improved quality and lower costs, automated manufacturing systems have become essential to the success of U.S. manufacturing. Their benefits stretch across numerous industries and production methods; however, their complexity can oftentimes be intimidating to first-time investors. Within this white paper, manufacturers can uncover the information necessary to properly plan and specify the integration of a new automated manufacturing system.
Tags : automation, automated manufacturing, automated machining, automation systems, flexible manufacturing systems, machine tool automation
     Makino
By: InfoPro Learning     Published Date: Jun 01, 2017
As the benefits of investment in Learning and Development continue to be signaled to the market, Chief Learning Officers and leaders of learning organizations will be taking center-stage in the transformation of their organization. In addition, companies spent just over $180 billion on corporate training last year, putting immense pressure on training leaders to show return on investment. With the spotlight on, these CLOs and other leaders of learning organizations will be measured across three core levers; transforming the business performance of learners, creating learning experiences that engage learners, and improving the operational efficiency of the organization. Download The Three Levers of a Successful CLO to learn the first step in aligning yourself with the three levers that business find most important.
Tags : l&d outsourcing, training outsourcing, business transformation, learning experience, learning strategy, learning measurement, managed learning services, lbpo
     InfoPro Learning
By: IBM     Published Date: May 31, 2017
What defines cognitive manufacturing maturity? Our study found three stages of cognitive manufacturing maturity. We call those organizations in the earliest stage Observers, followed by Starters and Actives, respectively. These groups differ on two key characteristics: the presence of an overall strategy for cognitive manufacturing, and degree of strategic execution of multiple projects that enable higher project success and significantly fewer failed projects. Strategy is the crucial enabler of higher maturity. How do manufacturers get beyond the obstacles and barriers to increase cognitive manufacturing maturity? The obstacles encountered by our respondents are tied to organizational maturity. Overcoming them is fundamental to increase cognitive manufacturing success. In this report, we’ll first describe cognitive computing and how it gives rise to cognitive manufacturing. Then, we’ll review specific study findings and recommend actions for electronics executives.
Tags : cognitive manufacturing, cognitive computing, organizational maturity, electronics, ibv
     IBM
By: IBM APAC     Published Date: May 18, 2017
Technological advances are transforming the way we connect, disrupting the status quo and creating huge turbulence. Industries are converging, and new opportunities and threats are emerging, as never before. So how are CIOs managing their way through the mayhem? In the first installment of our latest C-suite Study, we interviewed 5,247 top executives to find out what they think the future holds and how they’re positioning their organizations to prosper in the “age of disruption.” This report delves more deeply into the views of the 1,805 CIOs who contributed to our research – and what the IT gurus of the most successful enterprises do differently.
Tags : insights, technology, cios
     IBM APAC
By: Teradata     Published Date: May 02, 2017
To understand the challenges and opportunities with the Internet of Things, MIT Sloan Management Review’s 2016 Global Executive Study conducted a comprehensive study with business executives, managers, and IT professionals globally. Through the survey results and interviews with subject matter and industry experts, MIT Sloan Management Review was able to reveal the business value and competitive issues from the Internet of Things (IoT). This comprehensive report dives into data sharing with competitors, analytic talent management, and the intersection with governing the data. Analytics is unsurprisingly is shown as the key to IoT success.
Tags : data, sharing, analytics, iot, mit
     Teradata
By: Mimecast     Published Date: Apr 18, 2017
"To tackle today’s cyber threats, IT security leaders must rethink traditional security strategies. Email security in particular has become a victim of its own success and requires a radical rethink, having played a key role in several high-profile security breaches. Today’s threats, like spear-phishing, are designed to bypass traditional Secure Email Gateway defenses, often taking advantage of end users who are considered the weakest link in business email security armor. A zero-trust approach to email security is needed. This white paper discusses how: - CISO’s should carefully assess email security as part of a strategic security review - IT Managers can evaluate the state of current email defenses and take tactical action to strengthen them - Security Administrators can deliver best-practice defense in depth for email - Organizations can remove a reliance on trust to more effectively protect information, their network and employees. "
Tags : email security, cyber threats, it security, phishing
     Mimecast
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics