ims

Results 326 - 350 of 356Sort Results By: Published Date | Title | Company Name
Published By: iCims     Published Date: Jan 17, 2013
Are you interested in growing your passive talent pools? Bring potential candidates in through a fully branded Social Connect Portal.
Tags : 
recruiting, recruiting solutions, social recruiting, human resources, talent management
    
iCims
Published By: iCims     Published Date: Jan 17, 2013
To fully realize the benefits of social recruiting and maximize the return on investment, job postings must be optimized in terms of format, content, and delivery time. Job postings need to be social media optimized (SMO) to deliver results.
Tags : 
social recruiting, human resources, recruiting, social media, social media optimization
    
iCims
Published By: iCims     Published Date: Jan 17, 2013
Check out this free webinar recording on ways to simplify social recruiting through technology.
Tags : 
recruiting, social media, social recruiting, human resources, icims
    
iCims
Published By: iCims     Published Date: Jan 17, 2013
In 2013, it’s time to get your recruitment processes up to par by automating and optimizing your hiring processes. Watch this free product overview of iCIMS Recruit to see how you can optimize your programs in 2013.
Tags : 
icims, talent management, workforce management, recruitment, career portals, onboarding
    
iCims
Published By: iCims     Published Date: May 15, 2013
Check out this free infographic on why it is important to connect with top talent for future positions. Build your talent pools today to optimize your workforce tomorrow.
Tags : 
workforce management, human resources, talent management, icims, infographic, workforce optimization
    
iCims
Published By: iCims     Published Date: Dec 06, 2013
In this recorded webinar you will learn how implementing iCIMS Onboard will help increase your onboarding efficiencies while increasing new hire engagement with branded onboarding portals.
Tags : 
icims, onboarding, eeo, hiring, new hire paperwork, staffing, new hires, onboarding, talent platform, icims connect, hire expectation, leverage data, review candidates
    
iCims
Published By: iCims     Published Date: Mar 12, 2014
Your career site should be a top source for driving qualified candidates in the door. Serving as a landing spot for anyone that comes across your jobs, easily provide direct access to job requisitions and much more. From there, use your back-end applicant tracking system, to monitor the sources of hire. View the iCIMS Career Site and Applicant Tracking Guide to see a career site checklist, a mobile recruitment eBook and a demo of the iCIMS Talent Platform.
Tags : 
icims, career site, mobile recruitment, icims talent platform, human resources
    
iCims
Published By: iCims     Published Date: Apr 03, 2014
Read iCIMS’ proprietary research on today’s job seeker behavior to understand where job seekers are looking for new opportunities and who is doing the looking. Learn how iCIMS’ applicant tracking system can help your company attract and hire the best talent.
Tags : 
applicant tracking systems (ats), candidate sourcing, employee engagement, external recruiting, hr strategy, job posting, online recruiting, recruitment technology, recruiting, talent management, knowledge management, business technology
    
iCims
Published By: iCims     Published Date: Jan 24, 2017
...and How to Get Started Today!
Tags : 
    
iCims
Published By: Adobe     Published Date: Oct 30, 2014
This guide aims to help transform your email marketing strategy into a money-making machine
Tags : 
a guide to email marketing, transforming email marketing, email marketing tactics
    
Adobe
Published By: Crimson Hexagon     Published Date: Mar 06, 2013
In this white paper, learn how to account for missing metric in financial reporting and valuations. How can we perform aggregate analysis of online consumer opinion to complement traditional marketing analysis and due diligence?
Tags : 
aggregate consumer voice, no longer on mute, social media, due diligence, financial institutions, voice of the consumer, business technology
    
Crimson Hexagon
Published By: Crimson Hexagon     Published Date: Mar 06, 2013
How can firms better understand consumer motivations to inform new product development and positioning strategies? Read this white paper and learn what Crimson Hexagon figured out.
Tags : 
consumer device, adoption, global markets, crimson hexagon, survival strategy, marketing strategy, business technology
    
Crimson Hexagon
Published By: BMC Software     Published Date: May 28, 2014
See what analyst 451 Research has to say about Control-M and how it is continuing to modernize with the addition of Workload Change Manager, which aims to make creating and verifying batch jobs and workflows easier for developers.
Tags : 
it management
    
BMC Software
Published By: IBM     Published Date: Nov 05, 2013
We live in an era in which customers expect perfection from their service providers. With competitors only a click (or tap) away, companies have a strong incentive to deliver flawless operations. Online retailers have “set a high bar” in the way they engage customers throughout the entire sales process—not just during the commercial transaction, but before, during and after the transaction. Your operations must be seamless, because individuals enjoy an interconnected and ubiquitous experience. And your operations must be insightful, because every personal and professional interaction is targeted and relevant. A Smarter Process approach helps you to reinvent business operations in the era of the customer.
Tags : 
business operations, business process management, bpm, process automation, healthcare, smarter process, life sciences, health plan, payer claims management, compliance management
    
IBM
Published By: Symantec     Published Date: Oct 07, 2014
An ongoing cyberespionage campaign against a range of targets, mainly in the energy sector, gave attackers the ability to mount sabotage operations against their victims. The attackers, known to Symantec as Dragonfly, managed to compromise a number of strategically important organizations for spying purposes and, if they had used the sabotage capabilities open to them, could have caused damage or disruption to energy supplies in affected countries. Read more into the research on these attacks in this Symantec Security Response special report.
Tags : 
cyberespionage attacks, range of targets, security, spying, damage or disruption
    
Symantec
Published By: IBM     Published Date: May 02, 2014
This eBookoutlines the best practices for data lifecycle management and how InfoSphere Optimsolutions enable organizations to support and implement them.
Tags : 
ibm, integrating big data, governing big data, integration, best practices, big data, ibm infosphere, it agility, performance requirements, hadoop, scalability, data integration, big data projects, high-quality data, leverage data replication, data persistence, virtualize data, lifecycle management, big data strategy, it management
    
IBM
Published By: Cisco     Published Date: Oct 07, 2014
Malware has changed considerably since the early PC viruses appeared more than 25 years ago. Today, it evolves so quickly that many customers find staying ahead of the latest threat nearly impossible. If the explosion in malware variants weren’t enough, sophisticated client-side attacks and advanced persistent threats (APTs) target victims in ways that evade traditional security measures. The question isn’t whether your network will be attacked with advanced malware. The question is when it will happen and how you will respond. Advanced malware is changing the way security is managed.
Tags : 
email, malware, web security, quadrant, solutions, threats, data loss, phishing attacks, protection, gateway, mitigate, cloud, hybrid, on-premises, networking
    
Cisco
Published By: Cisco     Published Date: Jun 21, 2016
Adversaries and defenders are both developing technologies and tactics that are growing in sophistication. For their part, bad actors are building strong back-end infrastructures with which to launch and support their campaigns. Online criminals are refining their techniques for extracting money from victims and for evading detection even as they continue to steal data and intellectual property
Tags : 
    
Cisco
Published By: Websense     Published Date: Oct 06, 2014
This paper aims to provide the shortest path to prevention and risk reduction.
Tags : 
data loss protection, protecting ip data loss and theft
    
Websense
Published By: VMware SD-WAN by VeloCloud     Published Date: May 21, 2019
As software-defined WAN (SD-WAN) continues to become a mainstream technology, its relationship to WAN Optimization (WANop) must be examined. At first glance, the two can appear alike, and are often erroneously mentioned as synonymous technologies. A deeper examination however, will reveal two distinct and highly complementary technologies with very limited feature overlap. This document aims to demystify the relationship between the two, outline the market shifts that have led to a reduced WANop sector, and provide a recommendation on deploying both technologies in a modern enterprise WAN.
Tags : 
    
VMware SD-WAN by VeloCloud
Published By: LogRhythm     Published Date: Jun 19, 2018
Every year, organizations spend millions of frustrating hours and countless sums of money trying to reverse the damage done by malware attacks. The harm caused by malware can be astronomical, going well beyond intellectual property loss and huge fines levied for non-compliance. In 2014, the cost of malware attacks and resulting breaches was estimated at $491 billion. i And these costs include more than just the money spent trying to directly respond to security breaches. Productivity, long-term profitability, and brand reputation are often severely impacted as well. The malware threat is growing larger and becoming more challenging to respond to every year. It seems like every month there are more major breaches. Target, Neiman Marcus, and UPS have all been victims of costly breaches in the past couple years, with each event showing signs that the breaches could have been prevented. Phishing-based malware was the starting point 95 percent of the time in state-sponsored attacks, and 67
Tags : 
hack, malware, intellectual, property, compliance
    
LogRhythm
Published By: CBRE     Published Date: Aug 02, 2017
Watch this on-demand Ask Us Anything HIMSS webinar as we engage with a panel of experts from St. Joseph Health, Box, and MobileIron. We'll uncover St. Joseph Health’s recent deployment of Box cloud storage with MobileIron to their employees’ mobile devices, major changes we’re seeing in the healthcare industry, and so much more!
Tags : 
webinar, cloud storage, healthcare, mobile devices, mobileiron
    
CBRE
Published By: Dun & Bradstreet     Published Date: Feb 21, 2017
As the volume of data coming into organizations – from both internal and external sources – continues to grow and makes its way across departmental systems in many different formats, there is a critical need to create a single, holistic view of the key data entities in common use across the enterprise. Master Data Management (MDM) aims to accomplish this goal. Not surprisingly, MDM has become a significant priority for global enterprises, with the market expected to triple from $9.4B to $26.8B by 2020 according to analysts. The reality, though, is that while seemingly everyone is investing heavily in the tools to manage data, few are putting a great enough emphasis on the data itself. And that’s a problem. Poor data quality is said to be costing businesses $3.1 trillion annually – and that’s just in the US alone. The information being put into MDM tools must be mastered first and foremost.
Tags : 
managing data, data management insight, mdm, master data management
    
Dun & Bradstreet
Published By: OnBase by Hyland     Published Date: Jun 26, 2017
Case management continues to gain traction as a key capability in the information management space – supporting work that is unpredictable, information-centric and driven by human decisions. These are the processes that often directly touch your customers and stakeholders, including areas like contract management, claims processing, customer service, incident tracking and more. Download this eBook to explore three steps you can take to embrace a case management approach – improving employee productivity and customer experiences.
Tags : 
case, management, ebook, e-book, information, content, dynamic, applications, claims, processing, incident, tracking, solutions, software, strategy, knowledge, worker, enterprise
    
OnBase by Hyland
Published By: Skytap     Published Date: Aug 23, 2017
Cloud migration has exploded in popularity since General Electric’s (GE’s) flashy keynote at Amazon Web Service’s (AWS’s) re:Invent in September 2015. GE claims to be migrating all workloads not containing secret information. Enterprises are revisiting public cloud and exploring whether existing or systems-of-record applications have a place in that world. Infrastructure and operations (I&O) professionals on this path should avoid a one-size-fits-all approach to outsourcing and migration plans, opting instead for an app-by-app assessment.
Tags : 
    
Skytap
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add A White Paper

Email sales@inetinteractive.com to find out about white paper options for your company.