hr strategies

Results 126 - 150 of 191Sort Results By: Published Date | Title | Company Name
Published By: Oracle     Published Date: Jul 08, 2015
In a low-margin, highly competitive sector such as grocery, it’s never enough to simply maintain market share and customer count. This E-book from Oracle Retail shares three primary strategies for leveraging science to increase profit and competitive differentiation.
Tags : 
    
Oracle
Published By: Teradata     Published Date: Jul 07, 2015
As cyber security challenges continue to grow, new threats are expanding exponentially and with greater sophistication—rendering conventional cyber security defense tactics insufficient. Today’s cyber threats require predictive, multifaceted strategies for analyzing and gaining powerful insights into solutions for mitigating, and putting an end to, the havoc they wreak.
Tags : 
    
Teradata
Published By: SuccessFactors, an SAP Company     Published Date: Jun 18, 2015
In this white paper you will find: • Five ways to create a high-performing global culture • Six ways to dial in your talent strategy • Five tactics for compensation managers to shift the business • Six moves for recruiting mangers to build a talent powerhouse • Five ways learning managers can make a strategic contribution
Tags : 
    
SuccessFactors, an SAP Company
Published By: SAP     Published Date: Jun 12, 2015
In this white paper you will find: • Five ways to create a high-performing global culture • Six ways to dial in your talent strategy • Five tactics for compensation managers to shift the business • Six moves for recruiting mangers to build a talent powerhouse • Five ways learning managers can make a strategic contribution
Tags : 
    
SAP
Published By: Affirm     Published Date: May 13, 2015
Millennials have very different expectations about online shopping than other generations, and retailers need to learn how to meet and exceed them. This article will showcase three successful e-commerce companies -- Casper, Tradesy, and Boosted Boards -- and how they are using specific strategies to build loyalty among their Millennial customers. We also offer actionable tips for e-commerce merchants to win over Millennials.
Tags : 
e-commerce, repeat visits, customer expectations, successful e-commerce, customer loyalty
    
Affirm
Published By: Adobe     Published Date: Apr 03, 2015
Download the Top 10 Mobile Predictions for 2015 to learn how you can win big in the new year by investing heavily in mobile marketing. You’ll learn about the oncoming mobile technology arms race — and you’ll discover the steps you must take to stay ahead of the pack. Download the report now to see all ten predictions and actions for marketers, including: • How mobile technologies will disrupt entire industries. And what you must do to prepare. • Why mobile moments will shrink to micro-moments. And which strategies you’ll need to integrate. • How mobile wallets will soon take over. And what you can do to seize the opportunities.
Tags : 
mobile marketing, mobile technology, personalization, mobile wallets, adobe, marketing
    
Adobe
Published By: IBM     Published Date: Mar 10, 2015
This white paper describes software as the invisible thread that links product parts into an intelligent whole. It examines software delivery for smart products and strategies for evolving software development into a business process. Agile development has become a cornerstone of most software development organizations. Marked by iterative processes that deliver incremental value over time, agile development has enabled organizations to manage software complexity more effectively and to improve quality and time to market compared with previous development processes.
Tags : 
software development, ibm, agile development, software delivery
    
IBM
Published By: Teradata     Published Date: Feb 04, 2015
The Enterprise Priorities in Digital Marketing report, produced by Econsultancy in partnership with Teradata, provides guidance for the future through specific benchmarks from digital marketing leaders at enterprise organizations. The report focuses on the technology priorities of the world's largest companies, the strategies they support and the marketing budgets with which they're aligned. The report is based on an international survey of 402 senior marketers (director and above) from global enterprises. Respondents were from companies with more than $500 million in revenue, with 56% having revenues over $3 billion.
Tags : 
teradata, marketing, strategic direction, attribution, cloud, application, audience, management, conversion, data, platform, social, tag, content, email, technology, digital, retention, media, measurement
    
Teradata
Published By: CA Technologies     Published Date: Jan 09, 2015
This paper outlines the defense-in-depth strategy that complements the traditional security solutions to provide protection against ATP's across all four phases of the attack.
Tags : 
advanced persistent threats, apts, defense-in-depth strategy, new security strategies, ca security
    
CA Technologies
Published By: Adobe     Published Date: Dec 08, 2014
When it comes to digital asset management (DAM) projects and rich media, marketers and IT professionals struggle to find the best ways to store, share, and deliver assets across devices. The Gartner Three Best Practices for Digital Asset Management Projects report identifies the key DAM challenges facing organizations and provides recommended strategies and best practices.
Tags : 
asset management, dam, rich media, metadata issues
    
Adobe
Published By: AlienVault     Published Date: Oct 21, 2014
Event logs provide valuable information to troubleshoot operational errors, and investigate potential security exposures. They are literally the bread crumbs of the IT world. As a result, a commonly-used approach is to collect logs from everything connected to the network "just in case" without thinking about what data is actually useful. But, as you're likely aware, the "collect everything" approach can actually make threat detection and incident response more difficult as you wade through massive amounts of irrelevant data. Join us for this session to learn practical strategies for defining what you actually need to collect (and why) to help you improve threat detection and incident response, and satisfy compliance requirements.
Tags : 
alienvault, troubleshooting operational errors, potential security exposures, satisfy compliance requirements
    
AlienVault
Published By: AlienVault     Published Date: Oct 21, 2014
If you're like most IT practitioners, you are busy. You have a million things to do and preparing the reports needed to prove PCI DSS compliance requires time you just don't have. It doesn't have to be so hard. In this practical webinar, PCI DSS compliance experts walk through strategies for taking the pain out of PCI DSS reporting.
Tags : 
alienvault, pci dss reporting, pci dss compliance
    
AlienVault
Published By: AlienVault     Published Date: Oct 21, 2014
As cyber attacks grow more sophisticated, many organizations are investing more into incident detection and response capabilities. Event monitoring and correlation technologies and security operations are often tied to incident handling responsibilities, but the number of attack variations is staggering, and many organizations are struggling to develop incident detection and response processes that work for different situations. In this webcast, we'll outline the most common types of events and indicators of compromise (IOCs) that naturally feed intelligent correlation rules, and walk through a number of different incident types based on these. We'll also outline the differences in response strategies that make the most sense depending on what types of incidents may be occurring. By building a smarter incident response playbook, you'll be better equipped to detect and respond more effectively in a number of scenarios.
Tags : 
vulnerability, management, risk, prioritize, profile, environment, data, asset value, network, authenticated, unauthenticated, remediation, best practices, intelligence, scores, attacks, policy violations, compromise, ex filtration, exploit
    
AlienVault
Published By: IBM     Published Date: Oct 10, 2014
This white paper describes software as the invisible thread that links product parts into an intelligent whole. It examines software delivery for smart products and strategies for evolving software development into a business process.
Tags : 
ibm, agility, software productivity, agile teams, agile practice, faster solutions, adoption mistakes, dummies, ebook, software teams, growing popularity, growing scalability
    
IBM
Published By: Oracle     Published Date: Sep 30, 2014
On average, about 40 percent of e-mail opens come from mobile devices and tablets. Mobile subscribers are less engaged because they are being forced through an experience that is not optimized to help them take the action marketers are asking them to. As a marketer, it's daunting figuring out how to address this growing challenge. This guide walks you through where to begin and provides some design strategies to help you capture those clicks.
Tags : 
oracle, marketing, cloud, connected, customer, modern, mobile, email
    
Oracle
Published By: Juniper Networks     Published Date: Sep 10, 2014
Understand the changing threat landscape and how to secure your business against Distributed Denial of Service attacks with our Whitepaper. Read about the latest detection and mitigation strategies to ensure always-on protection.
Tags : 
security, ddos attacks, detection, prevention, mitigation strategy, always on-protection
    
Juniper Networks
Published By: EMC Corporation     Published Date: Aug 05, 2014
To develop the visibility, agility and speed to deal with advanced threats, traditional security strategies for monitoring, often based around security information and event management (SIEM) systems need to evolve into a central nervous system for large-scale security analytics. In particular, four fundamental capabilites are required: 1. Pervasive visibility 2. Deeper analytics 3. Massive scalability 4. Unified view Download here to learn more!
Tags : 
big data, data management, security threats, advanced analytics, security management, predictive analytics, compliance
    
EMC Corporation
Published By: Success Factors     Published Date: Jul 10, 2014
Engaging candidates must be a priority throughout the entire hiring process. Shifting organizational needs and changing business conditions keep recruiting strategies in a constant state of flux, and top candidates usually aren’t sitting on the sidelines waiting to be found. Responding rapidly and using a variety of strategies — from turning your employees into candidate advocates to creating talent communities to involving hiring managers earlier in the process — can be the difference between hiring a great candidate and missing out.
Tags : 
success factors, engage candidates, hiring process, candidate advocates, recruiting strategies, talent, hiring managers, human resources
    
Success Factors
Published By: Success Factors     Published Date: Jul 08, 2014
Engaging candidates must be a priority throughout the entire hiring process. Shifting organizational needs and changing business conditions keep recruiting strategies in a constant state of flux, and top candidates usually aren’t sitting on the sidelines waiting to be found. Responding rapidly and using a variety of strategies — from turning your employees into candidate advocates to creating talent communities to involving hiring managers earlier in the process — can be the difference between hiring a great candidate and missing out.
Tags : 
success factors, engage candidates, hiring process, candidate advocates, recruiting strategies, talent, hiring managers
    
Success Factors
Published By: EMC Corporation     Published Date: Mar 20, 2014
Gain insight into the effects of the changing information security threat landscape. Learn RSA’s approach to identifying strategies and techniques to establish a good defense, the “kill chain” concept and how to detect and respond, and how to level the adversarial playing field
Tags : 
emc, security threats, malware threats, malware protection, kill chain, rsa, defense
    
EMC Corporation
Published By: IBM     Published Date: Feb 27, 2014
This white paper describes software as the invisible thread that links product parts into an intelligent whole. It examines software delivery for smart products and strategies for evolving software development into a business process.
Tags : 
ibm, ibm software, innovation, software development, smart products, product delivery, smart software, consumerization, unified platform, control risks, software delivery, manage big data, automation, configuration data, error-free data, information technology, lifecycle risks
    
IBM
Published By: IBM     Published Date: Feb 05, 2014
This Analyst Insight will look at how leading organizations are influencing average order value, customer conversion, and customer satisfaction through the integration of site search with precision marketing and product content management. Besides examining the key drivers and pain points organizations are facing in relation to their search strategy, this report will look at the key differentiating strategies, capabilities, and technologies that are driving success in the digital era.
Tags : 
ibm, aberdeen group, merchandising, ecommerce, content management, marketing, order value, customer conversion, customer satisfaction, site search, search strategy, business technology
    
IBM
Published By: Marketo     Published Date: Jan 08, 2014
Marketing Automation is technology that allows you to nurture leads through automated campaigns. Because marketing automation uses email as one of its methods for engaging customers, we are often asked, “What is the difference between Marketing Automation and Email Marketing?” For small businesses, marketing automation is a tool to take your marketing to the next level while saving your organization’s resources in the long run. Marketing automation builds upon your email marketing strategies to produce superior results. In this paper, we’d like to show you what marketing automation can do for you and help you decide if your organization is ready to graduate to a marketing automation solution.
Tags : 
marketing, marketing automation, email marketing, lead nurturing, small business, smb, crm
    
Marketo
Published By: Oracle     Published Date: Nov 27, 2013
Global business has affected no group more than Human Resources (HR). Recruiting, hiring, developing, and retaining global workers is more complicated in a global economy adding another layer complexity, and without doing those things effectively, companies simply can’t grow. Therefore there’s more pressure than ever on HR leaders to develop and execute new workforce and talent strategies. Unfortunately, many HR organizations are simultaneously juggling these demands with a set of legacy technologies that are not up to the task because they don’t address the increasingly complex nature of HR’s role in the business.
Tags : 
human capital, human resources, recruiting, hiring, development, global, technology, business, best practicies
    
Oracle
Published By: Success Factors     Published Date: Nov 20, 2013
Firms must use metrics to ensure recruiting practices are delivering results. These metrics cover monitoring career site performance, owning sources of talent, leveraging free sources through SEO, measuring social media performance, and utilizing mobile interfaces and tools.
Tags : 
recruiting, human resources, talent management, recruiting strategies, social media, social media recruiting, engaging talent
    
Success Factors
Start   Previous    1 2 3 4 5 6 7 8    Next    End
Search Resource Library