hr systems

Results 176 - 200 of 331Sort Results By: Published Date | Title | Company Name

SBIC Report-Transforming Information Security (Designing a state-of-the-art extended team)

Published By: EMC Corporation     Published Date: Aug 05, 2014
To develop the visibility, agility and speed to deal with advanced threats, traditional security strategies for monitoring, often based around security information and event management (SIEM) systems need to evolve into a central nervous system for large-scale security analytics. In particular, four fundamental capabilites are required: 1. Pervasive visibility 2. Deeper analytics 3. Massive scalability 4. Unified view Download here to learn more!
Tags : 
big data, data management, security threats, advanced analytics, security management, predictive analytics, compliance, security
    
EMC Corporation

Making the Case for HRIS

Published By: Epicor HCM     Published Date: Sep 26, 2012
In this white paper you will learn how to make the business case for a new HRIS to senior executives.
Tags : 
hris upgrade, hris implementation, human resources, hr systems, human resources information systems, human resource technology
    
Epicor HCM

Digging into the Details: Using Analytics to Drive Your Business Forward

Published By: Workforce Software     Published Date: Apr 03, 2012
We will go over a brief introduction of what workforce analytics is, and take a look at why it is sometimes so difficult to get the information we need out of our HR or Business Intelligence systems. We will also dive into the important metrics we should consider as HR professionals and what metrics will ultimately drive your business forward.
Tags : 
human resources, hr management, workforce software, workforce analytics, employees, business analytics
    
Workforce Software

McAfee Vulnerability Manager Product Review by S3KUR3 Inc

Published By: McAfee     Published Date: Jan 23, 2013
Threats and vulnerabilities are a way of life for IT admins. This paper focuses on how McAfee's Vulnerability Manager and McAfee e Policy Orchestrator provide IT Admins with powerful and effective tool for identifying and re-mediating systems.
Tags : 
mcafee vulnerability manager, s3kur3, tom bradley, mcafee epolicy orchestrator, mcafee vulnerability scanner, mcafee epolicy orchestrator, mcafee global threat intelligence, vulnerability scan
    
McAfee

The Cost of Water in the Data Center

Published By: Compass Datacenters     Published Date: Jul 07, 2015
A high percentage of today’s data centers use water-based cooling methods. Although evaporative cooling, whether through traditional towers or “advanced” adiabatic cooling systems (aka swamp coolers), remain highly effective cooling methods, when you’re planning a new data center you may want to consider the impact of the weather and water availability on your decision.
Tags : 
echnology, water, evaporative cooling, swamp coolers, data center maintenance, it management, disaster recovery
    
Compass Datacenters

Containing the Storm: How Superior Performance Management Multiples VDI Value

Published By: Xangati     Published Date: Sep 01, 2015
If you are a healthcare professional, then you and your organization are caught between the horns of compliance and improving the patient experience. With the Health Information Technology for Economic and Clinical Health Act (HITECH) now in full effect, the days of lax enforcement are over. First-time penalties or violations can reach up to $250,000. The transition to EMR/EHR use, along with all of the systems and equipment upgrading that entails, will be done and done well – or else. Penalties can also extend to your organization’s business associates.
Tags : 
performance management, information technology, cloud and systems virtualization, application performance management
    
Xangati

SANS LogRhythm Review - Speed and Scalability Matter

Published By: LogRhythm     Published Date: Jun 19, 2018
In today’s fast-paced threat environment, speed to detect and respond is critical. Yet, according to multiple SANS surveys,1 analysts are finding it difficult to keep up with the speed in which hackers attack their systems.
Tags : 
logrhythm, scalability, hackers, systems, scripts
    
LogRhythm

The Utility of the Future, Considerations for Evolving to a Smart Grid Infrastructure.

Published By: Ciena     Published Date: Jun 12, 2017
Explore "The Utility of the Future, Considerations for Evolving to a Smart Grid Infrastructure" by downloading it today.
Tags : 
sdh, sonet sdh, sonet/sdh, sdh network, synchronous digital hierarchy, what is sdh, sonet vs sdh, define sdh
    
Ciena

Connected government. ‘Smart’ cities. The brains behind it all is SDN and NFV

Published By: Ciena     Published Date: Jun 12, 2017
In this whitepaper, you will see the smart city models and the keys to obtaining a smart city with SDN and NFV.
Tags : 
sdh, sonet sdh, sonet/sdh, sdh network, synchronous digital hierarchy, what is sdh, sonet vs sdh, define sdh
    
Ciena

Building the Business Case for Next-Generation HR Systems

Published By: Kronos     Published Date: Jul 26, 2017
With the pace of human resources technology solution development progressing quickly, HR leaders need to gain a solid understanding of the HR system options available. This tool is designed to help HR leaders build a business case for investing in next-generation HR systems to meet the growing HR demands of your organization. Demands include interfacing or integrating data, incorporating social and mobile technologies, and providing an employee experience that grows from the experience given to candidates.
Tags : 
interfacing data, integrating data, mobile technologies, social technologies, employee experience
    
Kronos

Securing Internal Applications the Smart Way

Published By: Infosys     Published Date: Jun 12, 2018
In the wake of data hacks and privacy concerns, enterprises are working extra hard to make sure they secure customer data from external threats. But what about securing data internally? Organizations unknowingly leave a big security hole in their own systems when they fail to have structured internal processes to handle access requests for employees, which could have disastrous implications for data security. A leading US bank sought to move its internal applications to a secure system for a standard and consistent access rights experience. See how Infosys helped and the five key takeaways from the project.
Tags : 
internal, applications, data, hacks, privacy, enterprises
    
Infosys

A Mobile UX Refresh to Reach Customers Worldwide

Published By: Infosys     Published Date: Jun 12, 2018
The digital world has made it possible for enterprises to reach, and deliver services to customers near and far through mobile applications. However, regular and rapid rollout of features and new versions across geographies and different operating systems call for flawless applications and mobile app testing capabilities. A chemical giant wanted to deliver agriculture data and services to their farmer clients across geographies through their mobile applications. See how Infosys helped and the five key takeaways from the project.
Tags : 
mobile, digital, customer, applications
    
Infosys

Health Care Payers: Overcoming Challenges through Innovation

Published By: Oracle HCM Cloud     Published Date: May 25, 2017
Health reforms and increased consumer focus on value are pushing health care organizations to deliver improved outcomes and enhanced patient experiences at reduced cost. Leading organizations are reassessing their ERP financial and HR systems to define where investments are required to tackle these challenges and provide scalability for growth. Read more.
Tags : 
    
Oracle HCM Cloud

Healthcare Leaders Integrate HCM and ERP Solutions in the Cloud to Improve Decision Making

Published By: Oracle HCM Cloud     Published Date: May 25, 2017
The changing healthcare environment means that both payers and providers must use all of their available data to ensure that employee productivity goals are met, members and patients receive high-quality service, and compliance is maintained. Unfortunately, many organizations face challenges with disparate systems providing inconsistent data. Find out how leading healthcare organizations are integrating HR and finance systems for one source of truth, and in turn enabling better decisions.
Tags : 
    
Oracle HCM Cloud

Asia: The Face of Innovation (A whitepaper by Harvard Business Review Analytic Services)

Published By: Singapore Economic Development Board     Published Date: Nov 14, 2018
Asia is well positioned to continue its role as an innovation incubator and an important market for new products and services. Harvard Business Review articulates how the three key factors of People, Policies and Resources contribute to Asia’s innovation ecosystems, and shares how companies like Intel, Micron, Medtronic have been innovating for Asia from Singapore.
Tags : 
    
Singapore Economic Development Board

The Impact of Cloud on the IT/Business Partnership

Published By: Oracle     Published Date: Apr 05, 2016
While the cloud can be a disruptive force, this global survey, conducted by Harvard Business Review and sponsored by Oracle, shows it is no longer a divisive one. The cloud is emerging as a unifying force that’s forging tighter collaboration between business and IT managers to drive innovation. The survey debunks three myths around implementing a public and/or private cloud strategy, including whether corporate systems need public cloud app data and how aligned IT and business are when it comes to the cloud.
Tags : 
cloud services, cloud management, best practices, information technology, business strategy, application performance management, information management, cloud computing
    
Oracle

Managing Web Security

Published By: Webroot UK     Published Date: Sep 25, 2013
Managing web security in an increasingly challenging threat landscape. Cybercriminals have increasingly turned their attention to the web, which has become by farther predominant area of attack. Small wonder. Those who would do harm to our computer systems for profit or malice always manage to focus their efforts on our most vulnerable weak spots. Today, that is the web, for a wide number of reasons.
Tags : 
web security, webroot, web attack, ddos, web, internet security, malware, networking
    
Webroot UK

Advanced Analytics and Machine Learning: A Prescriptive and Proactive Approach to Security

Published By: McAfee EMEA     Published Date: Nov 15, 2017
Machine learning offers the depth, creative problem-solving capabilities, and automation to help security organizations gain significant ground against attackers. It’s a powerful tool for processing massive amounts of data for the purpose of malware classification and analysis, especially for unknown threats. Through supervised learning, human researchers can continually develop new training models that expand the understanding and competency of machine learning systems.
Tags : 
analytics, security, problem solving, creative, data, researching, malware
    
McAfee EMEA

Reducing Operational Costs and Combating Ransomware with McAfee SIEM and Integrated Security

Published By: McAfee EMEA     Published Date: Nov 15, 2017
Atrius Health Chief Information Security Officer Chris Diguette oversees security for Atrius Health, the largest physician-led healthcare provider in the northeastern US. The organization is recognized nationally for its use of health information technology. Diguette is also CIO of the VNA Care Network, a home healthcare provider and subsidiary of Atrius Health. As CISO, Diguette and his team work to implement and maintain a security infrastructure that safeguards the organization’s critical health information systems and applications, such as its Epic Systems Electronic Medical Records (EMR) system and the personal data of more than 675,000 patients at 29 facilities in eastern and central Massachusetts.
Tags : 
artius, health, chief, information, security, officer, organization
    
McAfee EMEA

Leading banks eye APIs to leapfrog the competition

Published By: MuleSoft     Published Date: Nov 27, 2018
The market for financial services is changing fast. To evolve, banks are transforming their organizations into digital ecosystems using APIs. APIs have emerged as critical enablers to help financial services firms meet new consumer expectations. Through collaboration with fintechs, banks will use APIs to add new functionality from business partners and deliver internally-developed service offers to partner value chain and ecosystems. Read this whitepaper to learn more about the role of APIs and how this new ecosystem will allow banks to: Drive horizontal and vertical integration Foster a culture of collaboration Create new revenue streams and get solutions to market faster Deliver innovation and functionality to the business
Tags : 
    
MuleSoft

Building a digital banking platform with APIs

Published By: MuleSoft     Published Date: Sep 09, 2019
More and more financial institutions are partnering with fintechs and leveraging Application Program Interfaces (APIs) to attract new prospects and to delight current consumers through unprecedented Customer Experience (CX). APIs offer a bridge between systems while paving a digital path to a connected financial ecosystem. The institutions that are able to drive this digital transformation successfully, do not think of these capabilities as additional channels and services. Rather, these institutions understand that they must move from a vision of banking as a physical network of branches and ATMs, to a digital platform, comprising core capabilities such as account servicing and the provision of financial products that can be accessed wherever, and whenever, customers wish. Join this webinar and learn how these institutions are building a digital banking platform with APIs. Presented by: Angie Campos, Industry Marketing for FS&I, MuleSoft Michel Vaja, Head of UK Payments Practice, C
Tags : 
    
MuleSoft

Unlocking data to deliver a unified bank

Published By: MuleSoft     Published Date: Sep 09, 2019
Today’s digital era places strain on traditional financial firms, including increased customer expectations, the threat of disintermediation by market entrants, strict regulatory requirements, and more. How do banks, who face operational silos and aging systems, keep up? The answer lies in building a digital platform with APIs. In this session, hear directly from seasoned technologists to learn about the approach, tools, and operating model they use to successfully adapt and lead in the marketplace. Discover how to get more out of your existing legacy and cloud infrastructure and, in turn, deliver a flexible architecture that can easily adapt as new technologies emerge. During this session, you will learn: Why industry disruptions and increased customer expectations demand a bank that transforms into a digital platform. How an API-led approach to integration can help financial firms transform into digital platforms. SunTrust’s journey with MuleSoft’s Anypoint Platform and Salesf
Tags : 
    
MuleSoft

Automating business processes using APIs

Published By: MuleSoft     Published Date: Nov 27, 2018
In today’s digitally disrupted economy, organizations across industries face competition at unparalleled heights. As a result, differentiation through business automation has become synonymous with convenience and speed. However, since the technology landscape is changing at an increasing pace, business automation shouldn’t be thought of as a one-time, centralized effort in a discrete process. Rather, organizations should view business automation as a way to decentralize access to systems and enable the broader organization. Download this whitepaper to learn: The value of business automation Why traditional approaches to business automation – such as custom code, implementing standalone solutions, or using point-to-point connections – do not suffice. The benefits of an API-led approach to business automation. How organizations like Wells Fargo, the State of Colorado, Tic:Toc, and Addison Lee achieved business automation success using APIs.
Tags : 
    
MuleSoft

Transforming Traditional Security Strategies into an Early Warning System for Advanced Threats

Published By: EMC Corporation     Published Date: Mar 20, 2014
To develop the visibility, agility and speed to deal with advanced threats, security information and event management (SIEM) systems need to evolve into a central nervous system for large-scale security analytics.
Tags : 
emc, siem, security transformation, malware detection, malware threats, big data security platform, incident detection, advanced security analysis
    
EMC Corporation

THREE-MINUTE VIDEO: Seize the Mobile Moment—Without Leaving Your Mainframe Behind

Published By: Attachmate     Published Date: Feb 07, 2014
It’s time to rethink your move to mobility. Now your legacy mainframe applications—despite their infamous obstacles to integration—can play an active role in the mobility mix. And with Attachmate Verastream you don’t have to start from scratch, even when it comes to the most locked-down host applications. Watch this demo and learn three ways to exploit business mobility while your established mainframe systems continue to perform their everyday operations.
Tags : 
attachmate, verastream, mobility, legacy applications, host applications, business mobility, mobile enablement, legacy modernization
    
Attachmate
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.