hr organization

Results 901 - 925 of 1027Sort Results By: Published Date | Title | Company Name
Published By: IBM     Published Date: Feb 08, 2008
Throughout the industrialized world, healthcare systems are in crisis. Aging populations and skyrocketing costs are putting unprecedented financial and organizational pressure on healthcare providers and payers. The result is often a decreasing level of care. In response, fundamental changes are taking place. Patient-centric systems are evolving in which the patient's well-being and the responsibility for good health are defining treatment and operational policies.
Tags : 
health, healthcare, medical, medical records, patient, patient records, hipaa, customer-centric
    
IBM
Published By: IBM     Published Date: Nov 13, 2008
To grow your subscriber base, reduce churn and control costs, it is imperative that you achieve and maintain a deep understanding of the customer experience throughout your organization. This white paper highlights IBM Tivoli® Netcool® Service Quality Manager Service Solutions — how it can change the way telecommunications providers are taking new services to market and helping to crystallize.
Tags : 
ibm, tivoli, voip, iptv, blackberry, service level agreement
    
IBM
Published By: Internet Security Systems     Published Date: Aug 21, 2009
Spyware is but the latest in a long list of Internet threats facing individuals and organizations alike. While it may sound relatively innocuous, spyware is the culmination of years of hacking development by cyber criminals. Spyware does more than just spy; it records and reports back specific information about the computer it infects.
Tags : 
spyware, information management, information theft, identity theft, data protection, anti spyware, anti-spyware, cybercrime
    
Internet Security Systems
Published By: Secure Computing     Published Date: Aug 21, 2009
This paper outlines the types of threats that leverage the Internet as a means of delivery and the risks that they pose to your organization. Learn the key drivers of a corporate security policy and how you can protect against HTTP-based threats using Web filtering as part of a multi-layered content security strategy.
Tags : 
security, anti spyware, malware prevention, malware, access control, hacker detection, internet security, security management
    
Secure Computing
Published By: Secure Computing     Published Date: Aug 21, 2009
Spyware presents a daily threat to organizations. It can even lead to networks being exposed to malicious attacks. Find out about the specific types of spyware threats that are out there and how you can combat these threats today.
Tags : 
security, internet security, anti spyware, intrusion prevention, intrusion detection, malware, anti virus, secure computing
    
Secure Computing
Published By: Third Brigade     Published Date: Aug 21, 2009
Healthcare organizations are being targeted by financially motivated attackers that steal and sell valuable data, including identities and computing resources. This white paper defines the new threat, and outlines three important steps that providers can take to protect their critical systems.
Tags : 
hipaa, hipaa compliance, network security, network security appliance, security management, intrusion prevention, intrusion detection, hacker detection
    
Third Brigade
Published By: Avalere     Published Date: Apr 02, 2007
Sensitive documents, files and intellectual property are extracted from a central repository such as a database, records management system, or document management system to complete daily tasks, however, extracting this information can lead to a security breach.  Avalere provides the tools you need to control the proliferation of sensitive information throughout your organization.
Tags : 
security, security management, database admin, dba, records management, database management, document management, data security
    
Avalere
Published By: Microsoft Dynamics     Published Date: Nov 06, 2008
The Rodgers & Hammerstein Organization (R&H) manages and administers musical and theatrical licensing rights for the heirs of Richard Rodgers, Oscar Hammerstein II, and many other talented writers. The company implemented Microsoft Dynamics AX in 2006 to gain complete control and visibility over its licensing and business operations. More recently, the company wanted to give employees quick and easy access to the information they need to perform their jobs more efficiently. R&H enrolled in the Microsoft Technology Adoption Program and became one of the first companies in the world to implement Microsoft Dynamics AX 2009. Now, employees throughout the organization have almost instant access to company information tailored to their specific roles. Employees spend less time tracking tasks and more time efficiently serving customers.
Tags : 
microsoft dynamics, rodgers & hammerstein
    
Microsoft Dynamics
Published By: GFI     Published Date: Jun 14, 2007
This white paper examines the nature of the threat that devices such as iPods, USB sticks, flash drives and PDAs present and the counter-measures that organizations can adopt to eliminate them.
Tags : 
endpointsecurity, end-point, endpoint security, insider, usb, mole, i-pod, ipod
    
GFI
Published By: CCSS     Published Date: Sep 04, 2007
Many IT Managers will be familiar with the ‘disk or die’ ultimatums that a disgruntled system can issue. If the system demands feeding and threatens to shut down if it doesn’t get more disk to chew, it’s time to address the issue of disk once and for all.  The expense of using disk to accommodate problems in the hope of buying extra investigation time is a quick fix that few organizations can sustain.
Tags : 
systems management, monitoring, disk management, disk monitoring, ccss, network performance, network performance management, disk
    
CCSS
Published By: Ecora Software     Published Date: Aug 15, 2007
High-profile data losses are grabbing more and more headlines every week, threatening the reputation, customer base, and overall bottom line of organization whose systems have been exploited. In addition to this lurking threat, now organizations face potential fines for PCI non-compliance from VISA, beginning in September 2007. Ecora Software will provide you with the information you need to proactively address PCI compliance and, of equal importance, minimize your risk of a costly data breach.
Tags : 
pci, pci dss, pcidss, payment card, credit card, pci compliant, compliance, financial
    
Ecora Software
Published By: Interactive Intelligence     Published Date: Feb 21, 2013
The economic pressures of the last three years have forced businesses to focus on cost reduction, often ahead of everything else. At the onset, the belt-tightening in the customer contact organization was viewed as temporary. Read on for more.
Tags : 
home agent series, leveraging technologies, remote agents, interactive intelligence
    
Interactive Intelligence
Published By: OneNeck IT Services     Published Date: Aug 24, 2007
In November 2002, Skanska embarked on the construction industry’s largest consolidation effort. Having acquired numerous companies in the previous 12 years — ranging in size from $100 million to $1 billion and comprising the $3.9 billion Skanska of today — CIO Chris Stockley was charged with migrating all the companies onto the J.D. Edwards application platform already in use by a few of the organizations.
Tags : 
skanska, building, construction, case study, oneneck, erp hosting, erp outsourcing, it outsourcing
    
OneNeck IT Services
Published By: CopiaTECH     Published Date: Mar 18, 2008
Unmanaged Internet access presents many challenges to organizations that rely on the Web for day-to-day business. Even seemingly-harmless Internet use may expose organizations to productivity loss and serious security threats. While large organizations may have access to expensive, sophisticated security solutions, mid-sized and smaller organizations may not have the budgets or technical staffing required to protect against these threats.
Tags : 
websense, copiatech
    
CopiaTECH
Published By: ALL ICT Ltd     Published Date: Mar 26, 2008
The aim of this document is to assist organizations protecting their assets – tangible and intangible – through a Security Management Program. This program provides a holistic, hands-on, and consistent approach for securing the organization against serious security breaches, such as data leakage, while providing the organization with the required flexibility to adapt itself to the business needs and to remain competitive in the market.
Tags : 
allict, all ict, security management
    
ALL ICT Ltd
Published By: Dimension     Published Date: Jun 22, 2008
Companies who use 3D printing in the design process have a distinct competitive advantage due to its speed and ability to facilitate design communication and concurrent engineering throughout an organization.
Tags : 
product design, dimension, productivity, spend management, product lifecycle management, scm, supply chain, design
    
Dimension
Published By: Lawson     Published Date: Jun 23, 2008
Managing and maintaining your key assets throughout their entire lifecycle is critical to your organizations success. Rather than looking at each part of the asset's lifecycle in isolation or only focusing on the operational phase, your asset management solution should enable a more holistic view. It should help you manage the entire cycle.
Tags : 
erp, eam, lawson, manufacturing, enterprise asset management
    
Lawson
Published By: Marketo     Published Date: Jul 30, 2013
Marketing Automation is technology that allows you to nurture leads through automated campaigns. Because marketing automation uses email as one of its methods for engaging customers, we are often asked, “What is the difference between Marketing Automation and Email Marketing?” For small businesses, marketing automation is a tool to take your marketing to the next level while saving your organization’s resources in the long run. Marketing automation builds upon your email marketing strategies to produce superior results. In this paper, we’d like to show you what marketing automation can do for you and help you decide if your organization is ready to graduate to a marketing automation solution.
Tags : 
marketing, marketing automation, email marketing, lead nurturing, small business, smb, crm
    
Marketo
Published By: CA ITAM     Published Date: Sep 09, 2008
Learn more on how improving the efficiency of software inventory and license management processes can provide you with a host of benefits, including improved IT governance through stronger software compliance standards and processes, automated correlation of relevant software products within an organization’s infrastructure to their respective licenses, and reduced costs in the areas of license procurement, use rights and software purchases.
Tags : 
    
CA ITAM
Published By: Cornerstone OnDemand     Published Date: Feb 12, 2009
Talent management has become one of the most pressing topics within HR organizations today - and it is no wonder, given the current economic environment and business imperatives. In this research bulletin, we will outline the approach HR organizations must take to identify, cost-justify, develop and implement the highest impact talent management strategy.
Tags : 
cornerstone, talent management, business continuity, business performance, globalization, recession, planning, economic
    
Cornerstone OnDemand
Published By: Symantec.cloud     Published Date: Sep 01, 2010
This is the second part of a three-part white paper series. Part 2 describes how organizations can develop a security profile for themselves that will show them which of the Stage 1 controls they most need to build up and strengthen.
Tags : 
messagelabs us, it security, smb, security profile, anti virus, anti spam, firewalls, vulnerability
    
Symantec.cloud
Published By: Symantec.cloud     Published Date: Jan 26, 2011
This report examines the new generation of threats, vulnerabilities and attacks, and explores the role that cloud security strategies can play in managing core risks to organizations of all sizes and across all industries.
Tags : 
symantec cloud, web threats, threats, vulnerabilities, cloud security, productivity, mobile communication
    
Symantec.cloud
Published By: Okta     Published Date: May 07, 2015
Bring Your Own Device (BYOD) can be a very polarizing topic for IT. Some view it as a solution that can save money, improve end user satisfaction, and enable remote employees. For others, BYOD represents risk of data leakage, loss of control, and signing up to support an endless ecosystem of unknown devices. No matter what your opinion on BYOD is, the impact on IT policy cannot be overstated. Through 2017, Gartner reports that 90% of organizations will support some aspect of BYOD. Read this eGuide and learn how you can address several new BYOD challenges facing IT.
Tags : 
byod, okta, mobility, safety, dad, mobility management
    
Okta
Published By: Lumension     Published Date: Mar 28, 2011
Learn three strategies to effectively take control of organizational endpoints and mitigate the rising risk from application viruses in this whitepaper.
Tags : 
lumension, organizational endpoint, risk mitigation, application virus, operating system, microsoft
    
Lumension
Published By: BambooHR - HR Software     Published Date: Oct 31, 2012
This whitepaper recognizes HR's struggle with using spreadsheets to track employee data and advises how to evaluate HR software system to start realizing the benefits. Included is a checklist of what to look for when considering HR software for your organization.
Tags : 
human resources management, hr information, hr information systems
    
BambooHR - HR Software
Start   Previous    28 29 30 31 32 33 34 35 36 37 38 39 40 41 42    Next    End
Search      
Already a subscriber? Log in here
Please note you must now log in with your email address and password.