ip technology

Results 276 - 300 of 430Sort Results By: Published Date | Title | Company Name

The Seven Deadly Sins of Recruiting

Published By: Jobvite     Published Date: Mar 31, 2015
Once upon a time, finding candidates meant posting a job description…and then waiting. But today, everything’s different. • Jobs have changed • Jobseekers have changed • Technology has changed But here’s the kicker: When candidates change, and the recruiting environment changes, your job as a recruiter will change, too. Are you ready to adapt? If you aren't sure, don’t fret. A number of recruiters today are faced with the challenge of adjusting to the new climate. Now is the perfect time to analyze your behavior and rethink your perspective. Here’s a look at seven of the top “sins” recruiters commit today, along with valuable direction for correcting your bad habits.
Tags : 
jobseekers, job search, stem, employment, recruiting, technology, hiring, sourcing
    
Jobvite

Recruitment is Marketing : The future of talent acquisition

Published By: IBM     Published Date: Jan 06, 2016
Your recruiting strategy should be an integrated partnership between strategy and tools. There is no secret sauce. However, if you broaden your approach and your definition of recruiting, attraction and connection, the goal of finding the right talent becomes increasingly attainable. Try creating a multi-faceted approach to talent attraction using target audiences and ads. Create a robust strategy to connect with talent in your lead management tool, social network, and career site or recruitment technology system. Be willing to change and try new tactics, even if it means starting small. There are countless ways to approach a truly social strategy for recruitment – when done right; they yield great results that can actually prove ROI. Embrace that recruiting is marketing and change how your team finds, attracts and connects with the next great employee for your company.
Tags : 
recruitment, marketing, talent acquisition, recruiting strategy, talent search, social strategy, lead management tool
    
IBM

Modernize your applications, break free of commercial databases, and reach new customers

Published By: AWS     Published Date: Jul 24, 2019
Add more value to your business Independent Software Vendors (ISVs) are turning to the cloud to modernize their applications and get rid of their commercial database dependencies to improve application performance, lower total cost of ownership (TCO), and reach new customers. DB Best delivers the established processes and technology ISVs need to accelerate the modernization of applications still running on commercial databases to Amazon Aurora. This enables your customers to quickly get up-and-running on the cloud and drive greater business value through Amazon Web Services (AWS). View the webinar to learn how DB Best and AWS enable you to accelerate every stage of your application modernization journey – from evaluating the right migration path for your application, to following a proven and repeatable database migration process, to driving growth and reaching more customers.
Tags : 
    
AWS

Creating Business Value with Communication-Enabled CRM Processes

Published By: SAP     Published Date: Mar 28, 2011
Learn how SAP Business Communications Management and SAP Customer Relationship Management provide the technology foundation for communication-enabled business processes that result in simplified interactions across marketing, sales, and service processes.
Tags : 
sap bcm, sap crm, cebp, customer relationship management, marketing automation, sales automation, sap
    
SAP

Digital District Leadership in 5 Steps

Published By: Lenovo and Microsoft     Published Date: Jan 19, 2017
Building efficient, impactful, future-ready districts takes planning. Our checklist, Digital District Leadership in Five Steps, helps you get started by asking the questions needed to identify new learning opportunities supported by technology. ? How can new content engage students? ? How robust is your network? ? Do you have the right technology resources across classrooms?
Tags : 
lenovo, digital. leadership, network
    
Lenovo and Microsoft

Transforming Retail with Mobile Apps

Published By: Appcelerator     Published Date: Jun 25, 2012
In order to capitalize on the mobile boom, retailers need to find compelling ways to integrate mobile app technology into the shopping and purchase processes.
Tags : 
appcelerator, mobile devices, build relationships, brand, mobile space, social sharing, technology
    
Appcelerator

The Next Analytics Age: Artificial Intelligence (A Harvard Business Review Insight Center Report)

Published By: SAS     Published Date: Mar 06, 2018
What management and leadership challenges will the next wave of analytic technology bring? This Insight Center on HBR.org went beyond the buzz of what artificial intelligence can do, to talk about how it will change companies and the way we manage them.
Tags : 
    
SAS

Analytics Accelerates Monetization Opportunities for Connected Vehicle and Mobility Services

Published By: SAS     Published Date: Mar 06, 2018
The headlines and major company announcements share a common theme: Competitive disruption is reshaping business models and organizations’ very futures. Around the global automotive industry, component and original equipment manufacturers (OEMs) are taking a hard look at where their future growth will come from ? and it’s not all based on their core businesses. New technology has opened the door for new services and revenue streams.
Tags : 
    
SAS

Social Intelligence: Next-generation Social Media Monitoring

Published By: Gleanster     Published Date: Nov 10, 2011
This Gleansight benchmark report is based on the experiences of 387 companies and includes the following sections: Reasons to Implement, Challenges, Value Drivers, Core Technologies and Success Story. It also includes a Vendor Landscape with descriptions, rankings and analysis of 39 solution providers. Social intelligence is being increasingly used today to describe the next rung on the evolutionary ladder of listening to and acting upon consumer conversation on the social web. That rung maps to a number of technology innovations. Chief among them are improved capabilities around analyzing and integrating all sources of voice-of-the-customer data to generate more actionable insights. Social intelligence also speaks to an emerging corporate mindset regarding the strategic importance of social data and the need to better capitalize upon it. This Gleansight benchmark report reveals how Top Performers are achieving success when it comes to the incessant quest to extract customer insights and take actions that ultimately translate into revenue growth, cost reduction, risk reduction and relationship enhancement.
Tags : 
social intelligence, marketing, social media, gleanster
    
Gleanster

Email Marketing Personalization

Published By: Gleanster     Published Date: Dec 14, 2011
This benchmark report is 26 pages and is based on the experiences of 319 companies. It includes the following sections: Reasons to Implement, Challenges, Value Drivers, Core Technologies and Success Story. It also includes a Vendor Landscape section with company descriptions, analyst commentaries and comparative rankings for 47 technology solution providers.
Tags : 
gleanster, marketing, email marketing, personalization, b2b, customers, email campaigns
    
Gleanster

Demystifying Satellite Communications for the Smart Grid

Published By: iDirect     Published Date: Oct 13, 2011
In an insightful report from iDirect, find out why satellite is the best option for delivering cost-effective, reliable, broadband connectivity to any location. Today's satellite networks are enterprise-class platforms built on IP; offering seamless integration with existing communications technology. In addition, satellite now delivers up to 99.99 percent network availability and meets new security regulations, such as AES encryption. Get the facts on satellite for the smart grid and learn how satellite services can deliver the security, latency, and reliability required for all core utility applications. Download the report.
Tags : 
idirect, satellite communications, technology, smart grid, utility companies, wireless application software, wireless communications, wireless service providers
    
iDirect

Top 10 Tips for Optimizing SQL Server Performance

Published By: Dell Software     Published Date: Jul 07, 2013
In this new white paper, discover the top 10 tips to get the most from SQL Server. Learn the things you need to know about SQL Server performance, and how these optimization tricks and strategies will help kick mediocre SQL performance to new heights. Get the paper today.
Tags : 
sql, server performance issues, solve problems, tips, best practices, solve challenges, technology, database management
    
Dell Software

The Top 5 Telephony Solutions Your Business Needs Today

Published By: Vendor Guru     Published Date: Jan 04, 2008
Profound developments in business telephony have left some small businesses reeling under perceptions of a steep learning curve for expensive new products. But there’s no reason to be left behind. Affordability is the hallmark of the new generation in business telephony, thanks to hosted IP and other networked solutions. Is your business applying the new technology to best advantage?
Tags : 
ip pbx, pbx, acd, predictive dialing, automatic call distribution, voicemail, business communications, voice mail
    
Vendor Guru

Eight Elements of Effective Information Security Policies

Published By: Information Shield     Published Date: Jan 07, 2009
How mature is your information security policy program? Do you have a set of outdated documents stored in a binder or intranet site? Or do you have a documented management program that keeps your policies up to date, your users informed and your internal auditors sleeping at night?
Tags : 
information shield, information security policies, privacy frameworks, hipaa, glba, information technology, iso 17799, iso 27002
    
Information Shield

Ponemon Study: The TCO of Software vs. Hardware-based Full Disk Encryption

Published By: WinMagic Inc.     Published Date: Apr 23, 2013
This paper extends the findings of the Total Cost of Ownership for Full Disk Encryption (FDE), sponsored by WinMagic and independently conducted by Ponemon Institute published in July 2012, The purpose of this original research was to learn how organizations deploy full disk encryption solutions for desktop and laptop computers as well as the determination of total cost and benefits for organizations using this technology. A reanalysis of this research allows us to formulate new findings that compare the total cost of ownership of software versus hardware-based full disk encryption solutions.
Tags : 
ponemon, tco, software, hardware, full disk, encryption, total, cost
    
WinMagic Inc.

The Candidate Experience Playbook

Published By: iCims     Published Date: Jan 07, 2014
The War for Talent is going to have winners and losers, and we all want to hire a winning team. In such a competitive environment, an outstanding employment brand is required to attract the best and brightest. While most talent acquisition professionals know in theory that a company’s employment brand is key, few really analyze the candidate experience as the most important element of your brand. This eBook will dive into everything HR managers and recruiters must know about optimizing the candidate experience. You will also receive a product demo.
Tags : 
applicant tracking systems (ats), candidate sourcing, employment applications, hiring, hr strategy, human resource technology, job descriptions, online recruiting
    
iCims

Recruitment Success Kit – 15 HR Technology Tips for 2015

Published By: iCims     Published Date: Oct 27, 2014
The "15 Tips for 2015" eBook will help you gain valuable insight into what your recruitment strategy is missing and what can set you up for success in 2015.
Tags : 
icims, recruiting, staffing, hiring, technology tips, recruitment, hr technology, technology candidates
    
iCims

Building Critical Talent Pipelines

Published By: Taleo     Published Date: Jan 25, 2012
This paper outlines a 12 step methodology for building critical talent pipelines and provides insights into strategy and initiatives. It also describes the process and technology support that delivers Talent Intelligence information from defining roles to refining execution.
Tags : 
taleo, human resources, talent, employee, talent management, hr management
    
Taleo

The Unoptimized SEO

Published By: Conductor     Published Date: Apr 09, 2013
Due to the technical nature of the SEO industry and its relative immaturity compared to other technologically advanced marketing disciplines, many SEOs still spend a significant percentage of their time on manual tasks. Conductor analyzed the day-to-day life of an SEO professional, determined the tasks that could be automated, and quantified the resulting increase in productivity by using SEO technology. Download this research paper to learn how new technology can tremendously increase an SEO marketer’s output.
Tags : 
seo, seo technology, budget, roi, search engine optimization, digital marketing, online marketing
    
Conductor

Social Media Analytics: Making consumer insights actionable

Published By: IBM     Published Date: Apr 29, 2014
Social media is reshaping the relationships that customers have with products, services and brands. Read this white paper to learn how the right combination of technologies can help you understand emerging consumer trends and increase the ROI of your marketing campaigns.
Tags : 
ibm, retail, social media, social media analytics, consumer insights, customer relationships, roi, business technology
    
IBM

Phishing 2.0

Published By: Webroot Inc     Published Date: Mar 05, 2014
In this white paper we will summarize the decline of Phishing 1.0, discuss how phishing has turned toward business and become more costly, outline the structure of new Phishing 2.0 attacks, delineate how the new campaigns evade standard antiphishing countermeasures, and describe how web security services with real-time antiphishing capabilities can protect against Phishing 2.0 attacks.
Tags : 
phishing, campaigns, antiphishing, security, social media, malware, block, network
    
Webroot Inc

Why Marketing Should Be Personal

Published By: Adobe     Published Date: Apr 03, 2015
Read our report, Why Marketing Should be Personal, created in partnership with Econsultancy, to learn why 700 marketers ranked personalization as the number-one strategy for marketing success — and find out how you can seize new personalization opportunities for your business, too. Download the report now to discover all the findings, including: • 65% of companies use customer data to personalize the web experience • Personalization drives a 14% average uplift in sales • Integrated marketing technology enables personalization at scale
Tags : 
personalization, marketing, web experience, sales, marketing technology, adobe
    
Adobe

Can Online Fraud Damage Your Business?

Published By: MineralTree     Published Date: Jan 14, 2015
Yes, your company is a ripe target for fraud - but it doesn't have to be. Cybercriminals love small to medium businesses, since they have more money in their bank accounts than individuals, but often lack the sophisticated technology and vigilant processes of larger organizations. Gartner estimates that more than 10 percent of small businesses have had funds stolen from their bank accounts.
Tags : 
mineraltree, online fraud, business, damage, technology, bank, accounts, theft
    
MineralTree

Offering technology choice is easier than you think — and the benefits are plentiful

Published By: Insight     Published Date: Nov 07, 2017
Modernize your mobile management with more choice and less complexity. Discover the benefits of offering Mac as a technology choice for employees — and how to easily integrate and manage multiple technology platforms within your enterprise.
Tags : 
choice of mac or pc, mobile device management, outsource it, integrating mac, mac in the workplace, apple vs pc
    
Insight

Three ways coding and marking can make bakery operations sweeter

Published By: Domino     Published Date: Jan 24, 2018
For manufacturers of baked goods and snacks, the need for flexible, high-quality coding and marking solutions has never been greater. The wide array of packaging types and materials already in use today — combined with the SKU proliferation driven by consumer demands — means manufacturers have to print expiration codes and lot numbers on multiple substrates in multiple areas/orientations on their packaging lines. These codes need to be clear, precise and readable by both humans and machines to ensure customer safety and satisfaction. They must also provide traceability in the event of a recall. This white paper from Domino looks at the types of printing technology available today and discusses their various advantages and disadvantages in bakery line applications.
Tags : 
    
Domino
Start   Previous    4 5 6 7 8 9 10 11 12 13 14 15 16 17 18    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.