HIT Consultant Insightful coverage of healthcare innovation
 

hr trends

Results 51 - 75 of 239Sort Results By: Published Date | Title | Company Name
Published By: Lumesse     Published Date: May 15, 2015
This White Paper explores how employer branding can be one of the most powerful recruitment tools.
Tags : 
employee, employer brand, hr technology, hr trends, human resources trends, empower employer brand, recruitment, social media hr, human resources
    
Lumesse
Published By: Lumesse     Published Date: May 15, 2015
This paper explores how critical it is to have an agile talent management strategy in place. Being mobile and social are key to attracting, developing and retaining the cream of Gen Z.
Tags : 
gen z, employees, retain talent, talent management, strategy, generation z, workplace, hr trends, hr technology, recruitment, social media hr
    
Lumesse
Published By: Lumesse     Published Date: May 28, 2015
This report shows how building talent, leadership and agility advantages are the top three HR imperatives for businesses to create a sustained competitive edge.
Tags : 
hr trends, talent, leadership, agility, hr functions, digital, digital hr, lumesse, technology, hr technology, hr professionals, hr decision-makers
    
Lumesse
Published By: IBM     Published Date: Apr 24, 2017
Cybercrime is more sophisticated and dangerous than ever before, and the scope of newly emerging threats is unprecedented. At the same time, the growing number and diversity of endpoints in the enterprise is expanding the network edge to the point of disappearing. Both these trends will continue with ongoing bring your-own-device (BYOD) initiatives and explode with the emerging Internet of Things (IoT).
Tags : 
cyber crime, security compromise, software management, information security, it management
    
IBM
Published By: RES Software     Published Date: Mar 26, 2013
With a long list of strategic projects and requests from users to enhance their experience, healthcare IT professionals will need to focus on key trends that will lead to more efficient IT and more satisfied users.
Tags : 
ehr, healthcare records, patient data, meaningful use, healthcare, trends, information technology, electronic health records, enterprise content management
    
RES Software
Published By: RES Software     Published Date: Mar 26, 2013
IT departments today are finding themselves squarely at the epicenter of healthcare compliance scrutiny.
Tags : 
ehr, healthcare records, patient data, meaningful use, healthcare, trends, electronic health records, data warehousing, network infrastructure, privacy and security, workforce management, enterprise content management
    
RES Software
Published By: Oracle HCM Cloud     Published Date: Jun 07, 2016
Get Ready for a New Era of HR - Competition for talent is increasing, skills shortages are worsening and social recruiting tools are making it easier than ever for faculty and staff to change jobs. HR leaders must align their human capital management, data and talent strategies around these trends in order to create great employee experiences that serve their students and institution best.
Tags : 
    
Oracle HCM Cloud
Published By: Rosetta Stone     Published Date: Mar 01, 2017
Sie wollen in die Fremdsprachenkompetenzen Ihrer Mitarbeiter investieren? Sabine Schnorr, Director Central Europe von Rosetta Stone, hat zusammengefasst, welche aktuellen Entwicklungen die Branche nachhaltig beeinflussen und welche Trends Unternehmen unbedingt kennen sollten.
Tags : 
    
Rosetta Stone
Published By: Secureworks     Published Date: Oct 04, 2017
The SecureWorks® Counter Threat Unit™ (CTU) research team analyzes security threats and helps organizations protect their systems. During May and June 2017, CTU™ researchers identified lessons learned and observed notable developments in threat behaviors, the global threat landscape, and security trends: • The global WCry and NotPetya campaigns reinforced the need for a layered approach to security. • Attacks used obfuscated malicious files and scripts to bypass filtering and deliver malware. • A Chinese threat group has had repeated success using compromised websites to attack targeted organizations. • Threat actors have been stealing intellectual property from Japanese enterprises.
Tags : 
    
Secureworks
Published By: Lookout     Published Date: Aug 30, 2017
This report examines enterprise security threats for iOS and Android. While Android has higher consumer market share, iOS commands more market share in the enterprise, accounting for 72% of enterprise mobile activations in Q1 2015 compared to Android’s 26% activation share1 . The perception that iOS is more secure has helped drive its enterprise adoption, but this perception comes largely from security trends observed in the consumer space. Android, with a more open mobile platform and 81% global market share2 , predictably invites more broad-based attacks than iOS. When it comes to iOS and Android in the enterprise, however, both need threat protection because at a fundamental level both platforms are subject to similar vulnerabilities and attack methods. iOS attacks may be relatively uncommon today, but they have happened and can occur. Moreover, enterprises increasingly rely on iOS app-distribution methods that forgo Apple’s app-review and they face the risk that attackers will cont
Tags : 
enterprise security, enterprise mobile security, ios attacks, mobile threat protection, android attacks
    
Lookout
Published By: Fiserv     Published Date: Nov 09, 2017
Financial institutions seeking to attract new customers and revenue channels are expanding into digital services, real-time payments and global transactions. However, with every new service, criminals are developing innovative ways to infiltrate financial systems, and older technologies that mitigate fraud no longer work as effectively. So how can financial institutions respond to this growing threat? Fortunately, more advanced technologies hold great potential for real-time financial crime mitigation. Learn about five current and emerging technologies that could impact money laundering and fraud mitigation, including artificial intelligence/machine learning, blockchain, biometrics, predictive analytics (hybrid model) and APIs. Read the latest Fiserv white paper: Five Tech Trends That Can Transform How Financial Institutions Detect and Prevent Financial Crime.
Tags : 
kyc, know your customer, beneficial ownership, financial crime, financial crimes, compliance, enhanced due diligence, suspicious activity report, currency transaction report, aml directive, anti-money laundering laws
    
Fiserv
Published By: Applause Israel     Published Date: Jun 19, 2018
There’s no denying the effect digital has on the retail industry. $.56 of every $1 spent in physical stores is influenced by digital. What’s more, three of the world’s top five retailers are internetfirst: Amazon, Alibaba, and JD.com. According to PricewaterhouseCoopers’ Total Retail 2017 report, 56% of global shoppers use Amazon. Of these, 28% say they shop less often at retail stores because of Amazon. 18% say they shop less on other retailers’ e-commerce sites because of Amazon. And 10% say they shop exclusively on Amazon. Retailers need to find a way to compete in this changing retail landscape. These five global trends can provide some guidance on where retail is headed and how brands can thrive in this new era of retail.
Tags : 
    
Applause Israel
Published By: Splunk     Published Date: Nov 29, 2018
IT organizations struggle with numerous challenges — hybrid environments, lack of visibility during cloud migration, multiple infrastructure monitoring tools, and reliance on manual processes. Yet according to a 2018 global survey, less than half of IT practitioners are confident they can ensure performance and system availability with their current toolset. As a Splunk customer, you understand the power of running your monitoring and logging environment in a machine data platform. Are you utilizing your machine data platform to effectively run APM, infrastructure monitoring and Network performance monitoring and diagnostics? This guide outlines the 8 biggest mistakes IT practitioners make and provides solutions, key takeaways and real-world examples to help you improve IT monitoring and troubleshooting in your organization. Download your copy to learn how to: Achieve end-to-end-visibility throughout cloud migration Find trends and root cause faster with automated investigations
Tags : 
application performance monitoring, network tools, network monitoring tools, network monitoring software, network monitoring, it monitoring
    
Splunk
Published By: Cisco Umbrella EMEA     Published Date: Aug 08, 2019
Building on the popular Threat of the Month series, Cisco researchers looked at notable 2018 cybersecurity incidents with a fresh perspective: what do they reveal about future adversary tactics? With this lens, they chose threats that best embody what defenders should expect in the year ahead. The report contains in-depth analysis, best practices, and trends to watch.
Tags : 
    
Cisco Umbrella EMEA
Published By: Oracle     Published Date: Oct 23, 2019
Organisations should reimagine their workforces with a human focus, and HR leaders have a key role in this transformation. Our webinar discusses the recent trends highlighted in a Deloitte report, including why human capital can no longer be seen as an expense; it has to be viewed as investment. The rise of the individual, self fulfilment and how it should be a prime consideration, and how HR leaders can use cloud as a launch pad to new approaches of finding, rewarding and retaining talent. Discover how future success lies in social enterprises and the role HR and cloud will play.
Tags : 
    
Oracle
Published By: Symantec     Published Date: Jul 30, 2014
This paper analyses the emerging trends, malicious code activity, phishing and spam to help present essential information to help you secure your systems.
Tags : 
website security threat report, emerging security trends, malicious activity, essential security
    
Symantec
Published By: Symantec     Published Date: Jul 30, 2014
This paper analyses the emerging trends, malicious code activity, phishing and spam to help present essential information to help you secure your systems.
Tags : 
website security threat report, emerging security trends, malicious activity, essential security
    
Symantec
Published By: Symantec     Published Date: Jul 30, 2014
This paper analyses the emerging trends, malicious code activity, phishing and spam to help present essential information to help you secure your systems.
Tags : 
website security threat report, emerging security trends, malicious activity, essential security
    
Symantec
Published By: Symantec     Published Date: Jul 30, 2014
This paper analyses the emerging trends, malicious code activity, phishing and spam to help present essential information to help you secure your systems.
Tags : 
website security threat report, emerging security trends, malicious activity, essential security
    
Symantec
Published By: Symantec     Published Date: Jul 30, 2014
This paper analyses the emerging trends, malicious code activity, phishing and spam to help present essential information to help you secure your systems.
Tags : 
website security threat report, emerging security trends, malicious activity, essential security
    
Symantec
Published By: Aerohive     Published Date: May 14, 2015
A whitepaper on how to enable modern classrooms to deliver immersive, personalised learning experiences, enhance campus productivity, and adopt new curriculum standards.
Tags : 
    
Aerohive
Published By: Trend Micro, Inc.     Published Date: Jul 19, 2011
In a new video, security analyst Rich Mogull discusses mobile data protection topics and addresses many issues, including, the latest trends in mobile security, mobile device management, and mobile data protection.
Tags : 
trend micro, internet content security, smart protection network, internet security, enterprise business security, worry-free business security, web threat management, australia, cloud, android mobile security, antivirus, consumerisation of it, enterprise mobile management, enterprise mobile security, enterprise network security, mobile device management, ipad mobile device, ipad, iphone, it strategy
    
Trend Micro, Inc.
Published By: Trend Micro, Inc.     Published Date: Jul 19, 2011
The Consumerisation of Enterprise Mobility: A Formidable Challenge for CIOs, but a great opportunity. Download the Trend Micro Enterprise Security Whitepaper: The Consumerisation of Enterprise Mobility to learn the secrets to data protection on mobile devices.
Tags : 
trend micro, internet content security, smart protection network, internet security, enterprise business security, worry-free business security, web threat management, australia, cloud, android mobile security, antivirus, consumerisation of it, enterprise mobile management, enterprise mobile security, enterprise network security, mobile device management, ipad mobile device, ipad, iphone, it strategy
    
Trend Micro, Inc.
Published By: Symantec     Published Date: Jul 30, 2014
This paper analyses the emerging trends, malicious code activity, phishing and spam to help present essential information to help you secure your systems.
Tags : 
website security threat report, emerging security trends, malicious activity, essential security
    
Symantec
Published By: KPMG     Published Date: Jul 11, 2018
Looking for a smarter approach to workforce planning? With robotics and artificial intelligence transforming the workplace, analysing supply and demand over 3–5 years doesn’t make sense. HR leaders need to find a more flexible approach to workforce shaping. Read this report to discover: • the key trends that will shape the future workforce • what early movers into intelligent automation can teach us • what’s involved in agile workforce shaping • how to use our 5C Framework to navigate the changes ahead.
Tags : 
    
KPMG
Start   Previous    1 2 3 4 5 6 7 8 9 10    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.