• RSS
  • Twitter
  • FaceBook

Related Topics

Add White Papers

Get your company's white papers in the hands of targeted business professionals.

hr management

Results 351 - 375 of 965Sort Results By: Published Date | Title | Company Name
By: IBM     Published Date: May 07, 2015
Learn how to build a proactive threat and fraud strategy based on business analytics. You’ll see extensive examples of how organizations worldwide apply IBM Business Analytics solutions to minimize the negative impact of risk and maximize positive results.
Tags : 
business analytics, risk management, threat management, fraud, proactive threat, analytics solutions, reduce exposure, reduce threats, intrusion prevention, security management, vulnerability management
    
IBM
By: IBM     Published Date: Jun 03, 2015
Facilities count as a major expense for most organizations, if not the number one cost of business. But through enhanced facilities management, organizations can reap huge potential savings. Learn how to create smarter buildings through the right facilities management system in this detailed report, which includes multiple checklists on critical features.
Tags : 
facilities management, asset management, benchmarking, management program, amp, gap assessment, reliability, implementation, best practices, business intelligence, business management, solutions
    
IBM
By: IBM     Published Date: Jul 15, 2015
This paper talks about the state of today’s cyber threat landscape, current platforms for fraud management fall short, hurting customers in the process, and Trusteer's Cybercrime Prevention Architecture.
Tags : 
cybercrime, malware prevention management, malware fraud, financial fraud, security solutions, vulnerability management, malware attacks, data security, compliance, disaster recovery, email security, internet security, intrusion prevention, security management
    
IBM
By: IBM     Published Date: Jul 15, 2015
This paper talks about the importance of adapting to changes in fraud attacks without significant bank involvement or end user disruptions.
Tags : 
cyber threats, fraud prevention, fraud management, holistic solutions, end user disruptions, defrauding, malware management, disaster recovery, internet security, intrusion detection, intrusion prevention, security management, security policies, vulnerability management
    
IBM
By: IBM     Published Date: Aug 20, 2015
Hear from industry experts, how forward-thinking organizations can use workforce science and analytics to turn data into insights and then into action
Tags : 
data analytics, ibm recruitment, data insights, hr leaders, workforce science, talent management, hr analytics
    
IBM
By: IBM     Published Date: Aug 20, 2015
This report provides practical guidance on the critical 10 steps for the first 100 days of setting up an analytically enabled HR function.
Tags : 
workforce analytics, data analytics, hr function, talent management, recruitment, best practices, ibm smarter workforce, talent analytics
    
IBM
By: IBM     Published Date: Aug 20, 2015
Talent analytics is one of the most misunderstood areas of HCM.
Tags : 
workforce insights, talent analytics, data visibility, hr analytics, talent management
    
IBM
By: IBM     Published Date: Sep 29, 2015
Improve business performance in today's increasingly competitive environment.
Tags : 
roi, talent, performance, talent data, hr analytics, business analytics
    
IBM
By: IBM     Published Date: Jan 07, 2016
Integrated Threat Management for Dummies lays the foundation for effective tools and techniques that work together to counter today's advanced threats.
Tags : 
ibm, threat, prevention, protection, system, security
    
IBM
By: IBM     Published Date: Jan 27, 2016
This paper describes how predictive analytics can play a critical role in your threat and risk strategy.
Tags : 
ibm, threat, risk, management, security, analytics, fraud, enterprise applications
    
IBM
By: IBM     Published Date: Mar 28, 2016
Analytics has permeated, virtually, every department within an organization. It’s no longer a ‘nice to have’. It’s an organizational imperative. HR, specifically, collects a wealth of data; from recruiting applications, employee surveys, performance management data and it sits in systems that remain largely untapped. This data can help drive strategic decisions about your workforce. Analytic tools have, historically, been difficult to use and required heavy IT lifting in order to get the most out of them. What if an analytics system learned and continue to learn as it experienced new information, new scenarios, and new responses. This is referred to as Cognitive Computing and is key to providing an analytics system that is easy to use but extremely powerful.
Tags : 
ibm, talent analytics, kenexa talent insights, workforce science, talent insights, human resource technology
    
IBM
By: IBM     Published Date: Apr 04, 2016
"Integrated Threat Management for Dummies lays the foundation for effective tools and techniques that work together to counter today's advanced threats. Read the ebook to learn: The principles of attack prevention How security tools work together to protect an organization IBM's tools for prevention, detection, and response"
Tags : 
ibm, integrated threat management, threat mitigation, threat management, security, knowledge management, network security
    
IBM
By: IBM     Published Date: Apr 04, 2016
Discover how covert threats from the dark web can impact your network, and what you can do to protect your assets.
Tags : 
ibm, ibm x-force threat intelligence, threat intelligence, asset protection, threat management, security, knowledge management, network security
    
IBM
By: IBM     Published Date: Apr 04, 2016
"Title/Main headline: IBM X-Force Threat Intelligence Quarterly - 4Q 2015 Sub Headline: How can your organization better prepare for a security incident? Blurb: 2015 has been a challenging year as insider threats, malware, and stealthy and mutating attacks have affected the threat landscape. Read the latest security research from IBM X-Force to learn: How low-level attacks can mask stealthier infiltrations The benefits of regularly maintained security procedures and response plans When patterns of irregularities can be the first indicators of compromise Call to Action/Action Statement: ""Download Now"" as the action statement"
Tags : 
ibm, ibm x-force threat intelligence, threat intelligence, asset protection, threat management, security, knowledge management, network security
    
IBM
By: IBM     Published Date: Apr 04, 2016
A white paper discussing why global threat intelligence is more important than ever in the fight against web fraud, and how IBM uses this threat intelligence to deliver automated threat protection to financial institutions.
Tags : 
ibm, threat management, global threat intelligence, automated processes, web fraud, security, knowledge management, enterprise applications, network security
    
IBM
By: IBM     Published Date: May 09, 2016
Agile methods have proven effective for software development and have grown in popularity across a number of software disciplines. Agile methods build capabilities using an iterative approach, as opposed to traditional approaches where requirements are defined early and designs are completed in full before a single line of code is written. Agile incrementally defines requirements with priorities, partial component designs and working systems that evolve through iterations called sprints. The question remains, however: Do the 12 agile principles apply to more than just software? Agile principles are in line with lean management’s approach. Given that, it seems as though agile principles should directly apply beyond software development. However, the answer is not straightforward, because differences between software and physical components affect how agile is applied. Let’s explore how agile can be applied in light of these differences.
Tags : 
ibm, continuous engineering, watson, iot, internet of things, agile, product development, software development, productivity, project management
    
IBM
By: IBM     Published Date: Jun 13, 2016
Analytics has permeated, virtually, every department within an organization. It’s no longer a ‘nice to have’. It’s an organizational imperative. HR, specifically, collects a wealth of data; from recruiting applications, employee surveys, performance management data and it sits in systems that remain largely untapped. This data can help drive strategic decisions about your workforce. Analytic tools have, historically, been difficult to use and required heavy IT lifting in order to get the most out of them. What if an analytics system learned and continue to learn as it experienced new information, new scenarios, and new responses. This is referred to as Cognitive Computing and is key to providing an analytics system that is easy to use but extremely powerful.
Tags : 
ibm, talent acquisition, talent acquisition technology, human resources, recruiting, talent acquisition technology
    
IBM
By: IBM     Published Date: Jul 20, 2016
Analytics has permeated, virtually, every department within an organization. It’s no longer a ‘nice to have’. It’s an organizational imperative. HR, specifically, collects a wealth of data; from recruiting applications, employee surveys, performance management data and it sits in systems that remain largely untapped. This data can help drive strategic decisions about your workforce. Analytic tools have, historically, been difficult to use and required heavy IT lifting in order to get the most out of them. What if an analytics system learned and continue to learn as it experienced new information, new scenarios, and new responses. This is referred to as Cognitive Computing and is key to providing an analytics system that is easy to use but extremely powerful.
Tags : 
ibm, talent acquisition, talent acquisition technology, human resources, recruiting, talent acquisition technology, human resource technology
    
IBM
By: IBM     Published Date: Oct 26, 2016
In this paper, you’ll explore how business analytics can form the foundation for a proactive threat management strategy. - See examples of how different types of organizations are applying analytics. - Learn practical steps you can take to combat threat and fraud in your own organization.
Tags : 
ibm, analytics, predictive analytics, risk management, enterprise applications
    
IBM
By: IBM     Published Date: Jan 09, 2017
As security threats increase and government regulations require more control over users and data, it is important for organizations to evolve their security measures. By aligning governance related policies and rules with all identity management processes, organizations can achieve continuous, sustainable compliance, thereby reducing the need for after the fact fixes and expensive, error prone manual remediation. IBM Security Identity Governance and Intelligence helps organizations effectively, comprehensively manage identities and application access
Tags : 
ibm, security, identity governance and intelligence, identity governance, enterprise applications
    
IBM
By: IBM     Published Date: Jan 09, 2017
Security managers should evaluate MSSPs for enterprise scale operations, multinational and local presence, and effective threat management and compliance capabilities. Use this Magic Quadrant to evaluate MSSPs to support global service requirements, regional presence and leading-edge services.
Tags : 
ibm, security, maturity, gartner, magic quadrant, managed security services, enterprise applications
    
IBM
By: IBM     Published Date: Jan 27, 2017
Every day, torrents of data inundate IT organizations and overwhelm the business managers who must sift through it all to glean insights that help them grow revenues and optimize profits. Yet, after investing hundreds of millions of dollars into new enterprise resource planning (ERP), customer relationship management (CRM), master data management systems (MDM), business intelligence (BI) data warehousing systems or big data environments, many companies are still plagued with disconnected, “dysfunctional” data—a massive, expensive sprawl of disparate silos and unconnected, redundant systems that fail to deliver the desired single view of the business.
Tags : 
    
IBM
By: IBM     Published Date: Jan 30, 2017
This white paper highlights factors that have a decisive influence on the design and effectiveness of employee engagement programs. The results revealed in this study help to ensure future engagement programs are implemented even more successfully. Through successful engagement programs, the HR department can better position itself as a strategic partner of company management and ensure HR has an influence.
Tags : 
ibm, employee engagement, engagement, employee voice
    
IBM
By: IBM     Published Date: Jan 30, 2017
Analytics has permeated, virtually, every department within an organization. It’s no longer a ‘nice to have’. It’s an organizational imperative. HR, specifically, collects a wealth of data; from recruiting applications, employee surveys, performance management data and it sits in systems that remain largely untapped. This data can help drive strategic decisions about your workforce. Analytic tools have, historically, been difficult to use and required heavy IT lifting in order to get the most out of them. What if an analytics system learned and continue to learn as it experienced new information, new scenarios, and new responses. This is referred to as Cognitive Computing and is key to providing an analytics system that is easy to use but extremely powerful.
Tags : 
ibm, talent analytics, cognitive computing, analytics, engagement
    
IBM
By: IBM     Published Date: Feb 28, 2017
Energy companies are being challenged on multiple fronts. Core expectations require the delivery of safe, reliable, affordable and sustainable energy. Business models are being challenged by alternatives such as renewables and consumers demanding more sophisticated interactions through social and mobile. Energy companies need to: Disruptively innovate business processes through analytics driven operational excellence to increase agility and responsiveness, reduce operational costs and improve asset reliability Assume the role of energy integrator to optimally balance supply and demand points Deliver a 360-degree customer-of-one experience to increase customer satisfaction and loyalty, reduce costs, and improve management of energy demand
Tags : 
ibm, energy & utilities, utility trends, pov, ibm pov, customer experience, sustainable energy, affordable energy
    
IBM
Start   Previous    8 9 10 11 12 13 14 15 16 17 18 19 20 21 22    Next    End
Search White Papers      

Community Area

Log in | Register

Solution Center

Follow TechGenix on Twitter