hr leaders

Results 201 - 225 of 279Sort Results By: Published Date | Title | Company Name
Published By: SuccessFactors, an SAP Company     Published Date: Jun 18, 2015
Tracking and assessing workforce-diversity programs shouldn’t be hard work, but it should be a top priority. Because businesses benefit when they employ highly engaged workers with different backgrounds, HR leaders and hiring professionals contribute directly to a company’s success when diversity programs meet their goals. How can you create or transition to an effective tracking-and-assessment method? In this white paper you will find fifteen metrics that are a great place to start.
Tags : 
    
SuccessFactors, an SAP Company
Published By: CDW     Published Date: Jun 15, 2015
This paper looks at the Windows Server Migration effort in the context of broader IT and business goals. It also steps through a decision process for SMB IT leaders who are considering hiring professional consultants to shape the project.
Tags : 
server, windows 2003, migrate, infrastructure
    
CDW
Published By: CDW     Published Date: Jun 08, 2015
This paper looks at the Windows Server Migration effort in the context of broader IT and business goals. It also steps through a decision process for SMB IT leaders who are considering hiring professional consultants to shape the project.
Tags : 
server, windows 2003, migrate, infrastructure
    
CDW
Published By: SAP     Published Date: Jun 04, 2015
Tracking and assessing workforce-diversity programs shouldn’t be hard work, but it should be a top priority. Because businesses benefit when they employ highly engaged workers with different backgrounds, HR leaders and hiring professionals contribute directly to a company’s success when diversity programs meet their goals. How can you create or transition to an effective tracking-and-assessment method? In this white paper you will find fifteen metrics that are a great place to start.
Tags : 
    
SAP
Published By: Lumesse     Published Date: May 28, 2015
This report shows how building talent, leadership and agility advantages are the top three HR imperatives for businesses to create a sustained competitive edge.
Tags : 
hr trends, talent, leadership, agility, hr functions, digital, digital hr, lumesse, technology, hr technology, hr professionals, hr decision-makers
    
Lumesse
Published By: Lumesse     Published Date: May 28, 2015
This report shows how building talent, leadership and agility advantages are the top three HR imperatives for businesses to create a sustained competitive edge.
Tags : 
hr trends, talent, leadership, agility, hr functions, digital, digital hr, lumesse, technology, hr technology, hr professionals, hr decision-makers
    
Lumesse
Published By: IBM     Published Date: May 07, 2015
Hear a panel of HR leaders engage in a conversation about how they are using predictive and prescriptive analytics applied to talent to drive better business results. Join us to explore how you can be more effective in designing pilots, demonstrating the ROI for talent analytics, and translating talent data into talent insight.
Tags : 
talent acquisition, recruiting, optimization, technology, talent analytics, ibm
    
IBM
Published By: IBM     Published Date: May 07, 2015
Learn IBM emerged as one of the three leaders after Forrester Research evaluated 13 big data predictive analytics solution vendors.
Tags : 
analytics solution, predictive analytics, embed intelligence, forrester wave, application development
    
IBM
Published By: SAS     Published Date: Apr 16, 2015
Former Intel CEO Andy Grove once coined the phrase, “Technology happens.” As true as Grove’s pat aphorism has become, it’s not always good news. Twenty years ago, no one ever got fired for buying IBM. In the heyday of customer relationship management (CRM), companies bought first and asked questions later. Nowadays, executives are being enlightened by the promise of big data technologies and the role data plays in the fact-based enterprise. Leaders in business and IT alike are waking up to the reality that – despite the hype around platforms and processing speeds – their companies have failed to established sustained processes and skills around data.
Tags : 
    
SAS
Published By: QTS Data Centers     Published Date: Mar 31, 2015
To keep pace with new business demands, rising customer expectations, and emerging technologies, IT leaders are realizing an important opportunity: infrastructure outsourcing. These services, including colocation, hosting, and cloud computing, give IT organizations the flexibility and agility to better serve the needs of the business.
Tags : 
qts, cloud, security, data transactions, cio report, cyber threats, security breaches, it leaders, it management
    
QTS Data Centers
Published By: QTS Data Centers     Published Date: Mar 31, 2015
One of IT’s biggest balancing acts is to make data transactions easily available to authorized users while preventing all others from accessing its data assets. With high-profile data security breaches splashed across headlines nearly every day, CIOs are understandably worried about protecting their data. And for IT leaders who are considering moving their business to the cloud it is critical to ensure the provider they select has undertaken full and robust measures for physical and logical security.
Tags : 
qts, cloud, security, data transactions, cio report, cyber threats, security breaches, it leaders, it management
    
QTS Data Centers
Published By: QTS Data Centers     Published Date: Mar 31, 2015
Information technology is undergoing rapid change as organizations of all types begin to embrace the idea of moving computing infrastructure from on-premises to the cloud. It is easy to understand why the cloud has taken off faster than any technology phenomenon in recent memory. The cloud has the potential to reduce total cost of ownership (TCO) while enabling quicker responses to fast-moving markets and ever-changing customer needs. “Being able to flex your compute resources based on changes in volume and customer demand increases agility, making going to the cloud a very attractive proposition for our customers,” says Brian Johnston, chief technology officer for QTS in Overland Park, Kansas, a provider of data center solutions and fully managed services.
Tags : 
qts, cloud, security, data transactions, cio report, cyber threats, security breaches, it leaders, it management
    
QTS Data Centers
Published By: Skillsoft     Published Date: Mar 27, 2015
Read peer insight by HR leaders at Rent-A-Center, Madonna University & Copper Phoenix Consulting, Schnitzer Steel and Southwestern Energy Company and get actionable ideas on effective approaches for recruiting and retaining the “millennials” generation that has been alternatively described as entitled and creative.
Tags : 
leadership, leadership development, succession planning, millennials, skills gap, talent gap, leaders, managers
    
Skillsoft
Published By: Venafi     Published Date: Mar 26, 2015
This technical case study addressing key and certificate security issues is designed for security conscious enterprises to understand real-life attack scenarios that threaten their businesses in today’s world. This white paper demonstrates a recent attack that used cryptographic keys and digital certificates as well as guidance on how to protect certificates and keys and quickly discover and remediate breaches. This paper should be read by more technical IT security sta? who are interested in detailed attack methods and remediation tactics. The executive summary is intended for IT Security leaders (CISOs and their direct reports) and addresses the proof-of-concept attack impacts on the business.
Tags : 
secutiry, certificates, keys, security attacks, business
    
Venafi
Published By: LogMeIn     Published Date: Mar 19, 2015
Within today’s competitive environment, where customers are more empowered than ever, organizations are looking to differentiate themselves from the competition and reduce customer churn through improvements in customer satisfaction. A recent Forrester survey found that 86% of decision-makers rank their customers’ experience as one of the top strategic priorities, and that 68% want to be customer service leaders in their industry.
Tags : 
customer experience, customer satisfaction, support desk, customer care, customer support
    
LogMeIn
Published By: LogMeIn     Published Date: Mar 19, 2015
Within today’s competitive environment, where customers are more empowered than ever, organizations are looking to differentiate themselves from the competition and reduce customer churn through improvements in customer satisfaction. A recent Forrester survey found that 86% of decision-makers rank their customers’ experience as one of the top strategic priorities, and that 68% want to be customer service leaders in their industry. How does today’s customer support organization manage to respond? The answer lies in building a better support desk that will let you do more with less without sacrificing on support quality or end-user satisfaction. Wondering where to start? You may want to read these five tips.
Tags : 
customer experience, customer satisfaction, customer service, customer support
    
LogMeIn
Published By: Arbor Networks     Published Date: Mar 13, 2015
The ground has shifted under most enterprise IT security staff. Breaches are now capturing prime-time air across mainstream media outlets. As the world becomes more connected, it is no longer enough for enterprises to react once an alert indicates an attacker is inside the network. Instead, with continuous packet capture and threat feeds followed by analysis, it is now possible to hunt the attackers and locate them versus waiting for an alert. Experienced security leaders are forming internal teams directed to stop waiting for alerts to indicate there’s a problem and to go hunt for the attacker. Read this white paper to learn: • Why waiting for an alert, signaling an attack may be underway, is no longer a good option • Why using security analytics technology will help you make faster and more accurate decisions across complex networks • How Pravail Security Analytics simplifies analysts’ workload via real-time and historical deep inspection to uncover possible pre-existing compromise
Tags : 
security, enterprise, attacks
    
Arbor Networks
Published By: Venafi     Published Date: Mar 04, 2015
This technical case study addressing key and certificate security issues is designed for security conscious enterprises to understand real-life attack scenarios that threaten their businesses in today’s world. This white paper demonstrates a recent attack that used cryptographic keys and digital certificates as well as guidance on how to protect certificates and keys and quickly discover and remediate breaches. This paper should be read by more technical IT security staff who are interested in detailed attack methods and remediation tactics. The executive summary is intented for IT Security leaders (CISOs and their direct reports) and addresses the proof-of-concept attack impacts on the business. The attack scenario described in this technical white paper is based on a reproduction of a real-world attack in a Raxis test environment that simulated an enterprise security infrastructure.
Tags : 
venafi, ssh keys, vpn credentials, digital certificates
    
Venafi
Published By: Lumesse     Published Date: Feb 13, 2015
This White Paper illustrates the trends that increase the complexity of recruitment, causing talent acquisition managers and HR leaders significant concern: the emergence of new technology, changing demographics and recruiting across borders and increasing globalisation.
Tags : 
use of technology in recruitment, new recruitment methods, mobile jobseekers
    
Lumesse
Published By: Cornerstone OnDemand     Published Date: Feb 12, 2015
Today’s executives don’t hold HR in very high esteem: according to Deloitte, “42 percent of business leaders believe their HR teams are underperforming or just getting by, compared to the 27 percent who rate HR as excellent or good when assessing HR and talent programs.” Learn how HR can become a strategic partner to the C-Suite..=
Tags : 
cornerstone ondemand, employee engagement, leadership, development strategy, employees, high performing, operational leadership, business success
    
Cornerstone OnDemand
Published By: Teradata     Published Date: Feb 04, 2015
The Enterprise Priorities in Digital Marketing report, produced by Econsultancy in partnership with Teradata, provides guidance for the future through specific benchmarks from digital marketing leaders at enterprise organizations. The report focuses on the technology priorities of the world's largest companies, the strategies they support and the marketing budgets with which they're aligned. The report is based on an international survey of 402 senior marketers (director and above) from global enterprises. Respondents were from companies with more than $500 million in revenue, with 56% having revenues over $3 billion.
Tags : 
teradata, marketing, strategic direction, attribution, cloud, application, audience, management, conversion, data, platform, social, tag, content, email, technology, digital, retention, media, measurement
    
Teradata
Published By: ThreatTrack Security     Published Date: Jan 22, 2015
According to the report ‘Trail Blazers’ “hold the power to dethrone the current market leaders…[and] often shape the future of technology with their innovations and new product designs.” VIPRE was evaluated alongside nearly a dozen endpoint security products and was called a “highly capable solution for small and midsize enterprises with advanced needs that are looking for a solution that is easy to manage and deploy.”
Tags : 
threattrack, security, threat, track, information, admins, best, practices, training, defense, tips, web, email, smartphones, education, data, breach, prevention, vipre, mcafee
    
ThreatTrack Security
Published By: Quantcast     Published Date: Jan 07, 2015
This white paper, published in partnership with the Interactive Advertising Bureau, will explore and present a snapshot of how publishers, marketers and technologists are “going global” in their practice of programmatic audience development across each of 12 markets. Conclusions are derived through a combination of survey and interview data— encompassing feedback from more than 200 executive-level leaders in the Americas, Europe, Africa, Asia, Australia and the Middle East.
Tags : 
programmatic audience development, marketing solutions, global marketing, audience culture, global branding
    
Quantcast
Published By: OutSystems     Published Date: Nov 07, 2014
This paper chronicles the adventures and misadventures of the enterprise mobile app journey based on our observations working with industry leaders who have weathered three years of pain to arrive at the same conclusions.
Tags : 
mobility, mobile devices, web apps, enterprise mobile app development, it management, knowledge management, business technology
    
OutSystems
Published By: BMC Software     Published Date: Oct 23, 2014
Rapid shifts in the ways that technology and information are consumed and delivered— through cloud computing, big data, social networking, and smart devices—are transforming how companies compete. IT is at the center of the fray, working with business leaders to develop and execute a digital transformation strategy that capitalizes on these major new technologies. In order to lead this transformation, IT executives must focus on three areas: collaborating with business leaders to build a strategic vision, modernizing technology infrastructure, and rebuilding IT organizations to execute against new digital business goals.
Tags : 
saas, cloud, itsm, integrating itsm, itsm integration, saas integration, networking, it management, data center
    
BMC Software
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12    Next    End
Search      

Add A White Paper

Email sales@inetinteractive.com to find out about white paper options for your company.