HIT Consultant Insightful coverage of healthcare innovation
 

hr software

Results 176 - 200 of 304Sort Results By: Published Date | Title | Company Name
Published By: Workforce Software     Published Date: Apr 03, 2012
Employers have seen employment laws change at a breakneck pace over the last few years - a trend sure to continue in 2012. We've asked our Director of Compliance and attorney-at-law Paul Kramer to help us navigate through a slew of recent (and coming) regulatory changes.
Tags : 
human resources, hr management, legal issues, labor laws, compliance laws, employee rights, workforce software
    
Workforce Software
Published By: Workforce Software     Published Date: Apr 03, 2012
We will go over a brief introduction of what workforce analytics is, and take a look at why it is sometimes so difficult to get the information we need out of our HR or Business Intelligence systems. We will also dive into the important metrics we should consider as HR professionals and what metrics will ultimately drive your business forward.
Tags : 
human resources, hr management, workforce software, workforce analytics, employees, business analytics
    
Workforce Software
Published By: Workforce Software     Published Date: May 26, 2015
Inform your HR and labor practices with this list of issues to watch, compiled and analyzed by WorkForce Software’s Director of Compliance. Honing in on U.S. wage, hour, and absence regulations, this paper runs the gamut of compliance factors, including: • Legislative developments • Key court decisions • Enforcement actions • Common employer mistakes • Emerging trends
Tags : 
labor practices, hr practices, compliance, compliance update
    
Workforce Software
Published By: ChannelAdvisor     Published Date: Nov 29, 2017
"True e-commerce success hinges on how well you can connect to customers, grow sales and optimize operations across multiple channels. Unfortunately, not all e-commerce platforms are equally effective at streamlining these processes. If your current e-commerce platform is failing to follow through with the tools and support you need to dominate the competition, it may be time to make a move. Thankfully, the process of moving to a new software platform is much easier than you might think. Complete the self-assessments in this eBook to see if you’re ready to make the switch today."
Tags : 
ecommerce, retail, ecomerce software, ecommerce platform, marketplace
    
ChannelAdvisor
Published By: ChannelAdvisor     Published Date: Jul 20, 2018
"True e-commerce success hinges on how well you can connect to customers, grow sales and optimize operations across multiple channels. Unfortunately, not all e-commerce platforms are equally effective at streamlining these processes. If your current e-commerce platform is failing to follow through with the tools and support you need to dominate the competition, it may be time to make a move. Thankfully, the process of moving to a new software platform is much easier than you might think. Complete the self-assessments in this eBook to see if you’re ready to make the switch today. "
Tags : 
    
ChannelAdvisor
Published By: ChannelAdvisor     Published Date: Apr 23, 2019
There are a lot of reasons to consider moving to a new e-commerce software platform. If your current e-commerce software is failing to follow through with the tools and support you need to dominate the competition, it may be time to make a move. Thankfully, the process of switching to new software is much easier than you might think.
Tags : 
    
ChannelAdvisor
Published By: Veeam '18     Published Date: Dec 04, 2018
"The new EU General Data Protection Regulation (GDPR) is the most important change in data privacy regulation in 22 years and it will have a profound impact on every organization that relies on the storage and processing of personal data of EU citizens. Starting May 25, 2018, the penalties begin for noncompliance, with GDPR fines of up to 4% of annual global revenue or 20 million euros - whichever is greater. As this new regulation also impacts Veeam®, we wanted to share our insights on our road to compliancy. In a new executive brief, GDPR: 5 Lessons Learned, Veeam Compliance Experience Shared, we walk through these lessons and share how our software played a critical role within data management and protection strategies to ensure we remain compliant while delivering Availability for the Always On Enterprise™."
Tags : 
    
Veeam '18
Published By: Procore     Published Date: May 13, 2019
A huge portion of the world’s economy is managed through Excel; from small businesses all the way up to Fortune 500 corporations. But even the most experienced user can make mistakes, and Excel was not designed to be forgiving of errors. Nearly 90% of all large spreadsheets contain serious errors, with a 1.79% chance of error per cell. Download this eBook to learn: • The key concerns of Excel in construction • Alternatives to the Excel software • What to look for in these alternatives
Tags : 
    
Procore
Published By: Riverbed     Published Date: Nov 02, 2016
Digital transformation on the 3rd Platform continues to present unprecedented opportunities and challenges for enterprise networks and the IT professionals who operate them. Indeed, the requirements associated with cloud computing have already reverberated through datacenter networking, with software-defined networking (SDN) arising as an architectural approach that provided the network with the agility and responsiveness that it lacked previously but has come to require. Now, the focus is turning to how the WAN must change to accommodate the requirements of cloud applications and services. Fortunately, technologies such as hybrid WAN and software-defined WAN (SD-WAN) are coming to the rescue, giving enterprise IT the means to allow the WAN to meet these challenges directly.
Tags : 
    
Riverbed
Published By: McAfee EMEA     Published Date: Nov 15, 2017
The transition to the SDCC gives IT managers and security professionals the opportunity to build in a security architecture that is designed from the ground up to meet the needs of the cloud era. With the right architectural model, security can be much simpler to deploy, provision, manage, and scale. Organizations can save money, enhance protection, and leverage the agility of private and hybrid cloud infrastructures. IT teams can expand their visibility from the data center into the cloud, uncovering threats wherever they appear and coordinating an appropriate and comprehensive response.
Tags : 
software, data center, security, managers, professionals, organizations, money
    
McAfee EMEA
Published By: McAfee EMEA     Published Date: Mar 14, 2018
Die Nutzung von Cloud Computing-Services nimmt weiterhin stark zu, da Unternehmen ihre Geschäftsanwendungen und Daten zu Cloud-basierten Software-, Plattformund Infrastrukturdiensten migrieren. Gartner geht davon aus, dass die Ausgaben für öffentliche Cloud-Dienste im Jahr 2017 um 18 % steigen und bis 2020 mehr als 50 % der IT-Ausgaben in Zusammenhang mit der Cloud-Implementierung stehen werden. Deloitte Global sagt voraus, dass bis Ende des Jahres 2022 mehr als die Hälfte aller IT-Ausgaben auf IT-as-a-Service-Anbieter entfallen werden. Bei der Frage nach den größten Herausforderungen bei der Cloud-Absicherung nannten in der 2016er Ausgabe dieser Umfrage 56 % der befragten Sicherheitsexperten den unzureichenden Zugriff auf die erforderlichen Daten für die Reaktion auf Zwischenfälle sowie für forensische Analysen. 62 % gaben an, dass sie über nicht autorisierte Zugriffe von Außenstehenden besorgt sind, und 59 % machten sich Sorgen über andere Cloud-Mandanten. Von den 10 %, die eine Ko
Tags : 
    
McAfee EMEA
Published By: EMC Corporation     Published Date: Dec 01, 2014
The Solution Guide provides an introduction to data protection through continuous availability. The guide enables you to begin the planning and design of continuous availability for a Federation Software-Defined Center solution.
Tags : 
software-defined data center, data protection, planning and design, continuous availability
    
EMC Corporation
Published By: Secunia     Published Date: Oct 12, 2011
This report investigates year-to-year trends since June 2011, including the evolving threat of software portfolios and global vulnerability data.
Tags : 
    
Secunia
Published By: Symplfiied     Published Date: Nov 07, 2011
Symplified's innovative On Demand Identity leverages the software-as-a-service subscription business model to deliver breakthrough identity services with disruptive pricing. This White Paper explains how identity services eliminates all capital outlays for hardware, software and infrastructure, expenses for support and staffing. You also can reduce the costs of training and integration to reduce identity lifecycle costs by more than 80% from enterprise identity software.
Tags : 
symplified, technology, security, identity management, white paper, cloud computing
    
Symplfiied
Published By: Skillsoft     Published Date: Oct 20, 2015
Before you buy HR software, you should understand that your organization isn’t like everyone else’s. It’s doubtful that a general one-size-fits-all solution or what you might see in a brief demo will actually fit your needs. Besides, how can you develop a competitive advantage if you’re using the software the same way as everyone else?
Tags : 
skillsoft, hr software, tech buyers, software hr solutions
    
Skillsoft
Published By: Jive Software     Published Date: Feb 24, 2014
How can human resources partner with IT to drive communication and knowledge-sharing while supporting business objectives? In today’s distributed workforce HR can embrace social business, taking the lead in defining new HR practices to support the changing workplace landscape and foster innovation and integrated employee networks.
Tags : 
jive, gigaom research, human resources, human resource technology, distributed workforce, social business, workforce management, workplace management, productivity, social software solutions
    
Jive Software
Published By: SumTotal, a Skillsoft Company     Published Date: Aug 24, 2015
Read this report to know the questions to ask to avoid being duped by pretty demos of software with no substance and find a partner that can meet the hidden complexities that exist in your unique processes.
Tags : 
hr technology, software demos, efficiency, learning software, benefits, hr solutions
    
SumTotal, a Skillsoft Company
Published By: Oracle Service Cloud     Published Date: Mar 24, 2016
Despite the array of new technologies enabling customer contact across web and mobile channels, most serious interactions still have to pass through an agent in order to be resolved. Enterprises can push customers toward self-service, but in the end, people often still need to talk to other people. This means that, even in the best of circumstances, the customer experience is highly dependent on the capabilities of the agent manning the phones. That person needs more than skills and a beneficial temperament; they require a software environment that provides maximum space for flexibility, problem solving, and intuitive task switching.
Tags : 
oracle, service cloud, customer interaction, customer support
    
Oracle Service Cloud
Published By: Microsoft     Published Date: Jul 20, 2018
This guide presents a structured approach for designing cloud applications that are scalable, resilient, and highly available. The guidance in this ebook is intended to help your architectural decisions regardless of your cloud platform, though we will be using Azure so we can share the best practices that we have learned from many years of customer engagements. In the following chapters, we will guide you through a selection of important considerations and resources to help determine the best approach for your cloud application: 1. Choosing the right architecture style for your application based on the kind of solution you are building. 2. Choosing the most appropriate compute and data store technologies. 3. Incorporating the ten high-level design principles to ensure your application is scalable, resilient, and manageable. 4. Utilizing the five pillars of software quality to build a successful cloud application. 5. Applying design patterns specific to the problem you are trying to
Tags : 
    
Microsoft
Published By: Webroot UK     Published Date: Sep 05, 2013
Webroot SecureAnywhere Business - Endpoint Protection offers a revolutionary approach to malware protection. It brings together Webroot's innovative file pattern and predictive behavior recognition technology, with the almost limitless power of cloud computing, to stop known threats and prevent unknown zero-day attacks more effectively than anything else. Read this white paper to learn about ultimate performance and minimal management security software from Webroot.
Tags : 
webroot, secureanywhere, business, software, security software, revolutionary software, predictive behavior, known threats, zero day attacks, ultimate protection
    
Webroot UK
Published By: IBM     Published Date: Sep 10, 2009
Read this Trend and Risk report from IBM® ISS X-Force® to learn statistical information about all aspects of threats that affect Internet security, including software vulnerabilities and public exploitation, malware, spam, phishing, web-based threats, and more!
Tags : 
ibm iss x-force threat and risk report, ibm, web-related security threats, spam and phishing, malware, cvss, top vendor list, web application vulnerabilities, sql injection attacks, web browser exploitation, browser and plug-in vulnerabilities, activex, url spam, domains, international distribution of spam
    
IBM
Published By: IBM     Published Date: Sep 11, 2009
Discover the hidden dangers posed by privileged users and the damages they have caused. This webcast features two senior analysts from Burton Group Identity and Privacy Strategies, as well as IBM identity and access management solutions address this security and compliance challenge.
Tags : 
ibm, access management solutions, christopher bauseman, ibm tivoli software, lori rowland, senior analyst, mark diodati
    
IBM
Published By: ESET     Published Date: Jan 30, 2008
As another year draws to a close, few can have failed to notice the plagues of malicious software, floods of fraudulent emails and the generally increased pestilence of our online world, marking out 2007 as one of the most remarkable in the history of malware.  This report covers the top malware threats in 2007 and provides monthly summaries.
Tags : 
malware, global threats, 2007, threats, email, threat summary, threat report, viruses, eset, antivirus, nod32, internet threats, web-borne threats, phishing, trojans, spam, attacks, exploits, computers, malicious software
    
ESET
Published By: ESET     Published Date: Jan 30, 2008
Spam looks like a simple enough issue until you have to try to define it: after all, we all think we know it when we see it. Most people have a working definition along the lines of “email I don’t want.” While that’s perfectly understandable, it is difficult to implement technical solutions based on such a subjective definition. Read this paper to learn why SPAM is more than just unwanted email.
Tags : 
malware, threats, email, threat summary, viruses, eset, antivirus, nod32, internet threats, web-borne threats, phishing, trojans, spam, attacks, exploits, computers, malicious software, spam solution, email spam
    
ESET
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.