Cookie policy: This site uses cookies (small files stored on your computer) to simplify and improve your experience of this website. Cookies are small text files stored on the device you are using to access this website. For more information on how we use and manage cookies please take a look at our privacy and cookie policies. Some parts of the site may not work properly if you choose not to accept cookies.

sections
 

rules

Results 151 - 175 of 277Sort Results By: Published Date | Title | Company Name
Published By: Sage     Published Date: Oct 14, 2014
Managing employer compliance can be a tedious task, but it’s a highly visible, important way that the human resources department minimizes risk for the business and keeps the workforce running smoothly. Use this guide to stay informed about employment laws, reporting rules, and developing workforce compliance issues that may impact your organization. We’ll help you navigate ten crucial mandates, explaining the obligations and compliance considerations you need to be aware of in order to take on your responsibilities.
Tags : 
sage, compliance, workforce, fines, reporting, mandates
    
Sage
Published By: Sage     Published Date: Nov 23, 2015
Learn how to protect yourself and your organization from government scrutiny, noncompliance penalties, or expensive employee lawsuits. Sage created this guide to help you stay informed about employment laws, reporting rules, and developing workforce compliance issues that may impact your organization. We’ll help you navigate ten crucial mandates, explaining the obligations and compliance considerations you need to be aware of in order to take on your responsibilities.
Tags : 
compliance, noncompliance, employer compliance, hr manager, employment laws
    
Sage
Published By: McAfee     Published Date: Apr 14, 2014
Beyond the basics in a next generation firewall, to protect your investment you should demand other valuable features: intrusion prevention, contextual rules, advanced evasion analytics, secured access control, and high availability.
Tags : 
next generation firewall, intrusion prevention systems, firewall, contextual security, advanced evasion detection, advanced evasion techniques, security, it management
    
McAfee
Published By: Red Hat     Published Date: Nov 08, 2017
Accelerated digital transformation places new demands on business. To stay competitive, organizations must quickly adapt their business models and processes. Business process management (BPM), business rules management (BRM), and mobile applications are increasingly important to many business transactions—from customer-facing to business-to-employee (B2E) and business-to-business (B2B) interactions.
Tags : 
digital transformation, business process management, business rules management, mobile applications, application programming interfaces
    
Red Hat
Published By: Oracle     Published Date: Feb 10, 2016
Good supply chain management is essential to your operational efficiency, customer centricity, compliance, carbon footprint, and ultimately, your overall success. If handled correctly, your supply chain should improve customer service—along with the reputation of your brand—and boost your bottom line. But, as with many areas of business, the rules of the game are changing. What’s changing? Well, everything. New regulations, increased buyer expectations, shorter product lifecycles, fluctuations in demand, new market entrants, more ethical supplier management, poor visibility of globalized supply chains—all these things, and more, are testing the limits of the traditional supply chain model. The simple truth is that the way things used to be done, and the solutions that enabled it, are no longer up to the job. Today, organizations need levels of flexibility, integration, and visibility that are beyond what those systems were designed to deliver.
Tags : 
oracle, supply chain leaders, cloud migration, supply chain management, operational efficiency best practices, it management
    
Oracle
Published By: Trend Micro SaaS     Published Date: Feb 09, 2009
Today's confidentiality and privacy requirements drive organizations of all sizes and industries to secure sensitive data in email. Often particular types of data need to be encrypted, such as credit card numbers, intellectual property, or client information. Organizations also need to protect confidential emails for particular groups, such as executive management, human resources or legal departments. Many organizations are turning to policy-based encryption to meet their encryption needs because it automatically encrypts data using content filtering rules that identify types of content or email for particular groups. Encryption is applied when the rules are triggered. With policy-based encryption, organizations avoid relying on individual users to secure important content.
Tags : 
saas, trend, trend micro, software as a service, trendlabs, email security, security, interscan messaging, service level agreement, sla, virus, spam, phishing, distributed denial of service, ddos, encryption, policy based, filtering
    
Trend Micro SaaS
Published By: IBM     Published Date: Apr 04, 2014
In the face of runaway innovation, there are leaders in every industry and region who are determined to push ahead and be the source of innovations that change our world. They've opened up their organizations to new ways of working, and they're leading from a position of trust.
Tags : 
ibm, c suite, global study, technology, customer engagement, digital experience, innovation, business technology
    
IBM
Published By: IBM ILOG.     Published Date: Jul 14, 2009
Has your organization run into difficulties adapting to evolving business conditions? Is there interest in being able to increase the efficiency of your operational processes? Are your business experts looking to more easily control the decisions within mission-critical systems? If you have answered 'yes' to any of the above, you may benefit from integrating a Business Rules Management System (BRMS) into your organization's overall enterprise architecture.  Learn more today!
Tags : 
ibm, organization, brms, business conditions, business rules management system, enterprise, improvement, profitabilty, decrease cost, enterprise applications
    
IBM ILOG.
Published By: IBM ILOG.     Published Date: Jul 14, 2009
How-to vidoes explain the inner workings of JRules and BRMS, from writing rules to invoking decision services.  Become an instant expert!
Tags : 
ibm, jrules, brms, video, rules, decision making, services, systems, control, data, customer, customer service, enterprise applications
    
IBM ILOG.
Published By: IBM ILOG.     Published Date: Jul 14, 2009
This white paper discusses one of the most effective ways to extend CRM functionality to competitively enhance your customers' experiences. By using business rules as a non-disruptive extension to your existing CRM system, you will facilitate highly personalized, flexible and consistent interactions in real time at the point of contact. Learn more today!
Tags : 
ibm, crm, functionality, customer, efficiency, system, flexible, atm, website, automated, organization, optimization, brms, knowledge, competitor, enterprise applications
    
IBM ILOG.
Published By: IBM ILOG.     Published Date: Jul 14, 2009
This white paper explains how a business rule management system can make business process automation easier to understand, maintain and manage. Compare BRMS with other business automation schemes, like traditonal software coding or standard business rule engines. Learn how the Welsh Assembly Government and a United States commercial lender have implemented business rules to make a difference in their business processes.
Tags : 
ibm, bpm, business, business rule management, brms, hipaa, risk, operational cost, software coding, business rules engine, bre, business rule management system, brms, throughput, enterprise applications
    
IBM ILOG.
Published By: IBM ILOG.     Published Date: Oct 26, 2009
This case study will showcase the challenges of clinical trial data management, but the highlighted techniques are applicable to any business needing smart, dynamic and adaptive Web-based user interfaces.
Tags : 
brms, business logic, business rules, claims management, data management, data validation, healthcare, productivity, web-based applications
    
IBM ILOG.
Published By: IBM ILOG.     Published Date: Oct 26, 2009
Learn how Vanderbilt University uses business rules in complex, critical patient care decisions to deliver increased speed and accuracy and arrive at better outcomes.
Tags : 
business rules, ibm, ilog, healthcare, case study, business rule management system, brms
    
IBM ILOG.
Published By: IBM ILOG.     Published Date: Oct 26, 2009
IBM WebSphere ILOG Rule Solutions for Office meets the demands of business users by integrating Microsoft Office Word and Excel with the market-leading WebSphere ILOG BRMS. See Rules for Office in action during this one-hour webinar, including a live demonstration.
Tags : 
ibm, ilog, business rule management systems, brms, websphere, application integration
    
IBM ILOG.
Published By: IBM ILOG.     Published Date: Oct 26, 2009
This automation not only cuts costs by reducing manual tasks, bottlenecks and errors-it also delivers the right answer to the right person at the right time.
Tags : 
ibm, ilog, business rule management systems, brms, insurance operation, business intelligence
    
IBM ILOG.
Published By: IBM ILOG.     Published Date: Dec 11, 2009
Businesses today need a Business Rule Management Systems (BRMS) solution that supports business changes and cycles far more effectively than traditional methods and takes direct advantage of business expertise. This IBM RedpaperT publication is intended for anyone who is interested in learning more about IBM WebSphere ILOG Rules for COBOL.
Tags : 
ibm redpaper, websphere ilog rules, cobol, code, cics channels and containers, business rule management systems, brms
    
IBM ILOG.
Published By: IBM     Published Date: Jul 07, 2014
In the face of runaway innovation, there are leaders in every industry and region who are determined to push ahead and be the source of innovations that change our world. They've opened up their organizations to new ways of working, and they're leading from a position of trust.
Tags : 
ibm, social business, smarter workforce, innovation, c-suite, global, ceo, leaders, software development
    
IBM
Published By: Dyn     Published Date: Nov 10, 2015
Read this O’Reilly report to learn the latest rules and recommendations to architecting your cloud instance, debunk the common fears to cloud adoption and discover how to gain back control in areas you didn’t realize you could.
Tags : 
dyn, performance optimization, cloud, o'reilly report, web experience, data center
    
Dyn
Published By: WePow     Published Date: Sep 02, 2015
Even though you are job-matching expert, you still need rules to create an awesome candidate experience. Get candidates talking about how great your hiring process was with these simple rules.
Tags : 
video interview, hr technology, recruitment, recruiting, candidate screening, talent acquisition, digital interviewing, interview tips, candidate experience, employer branding, video interviewing
    
WePow
Published By: BlackBerry Cylance     Published Date: Jul 02, 2018
With cybercriminals threatening nations globally, cybersecurity is taking a front seat in many regions. Most notably, the European Union (EU) has adopted regulations to combat the threats. Against the backdrop of increasingly sophisticated cyberattacks, the EU has set forth rules and procedures for enhanced cybersecurity, along with penalties for noncompliance, in the form of the General Data Protection Regulation (GDPR). This new body of mandated policies and procedures aims to protect EU member personal information collected and/or stored by organizations. Read more in the GDPR business brief.
Tags : 
data, gdpr, global, nationally, cybercriminals
    
BlackBerry Cylance
Published By: OKTA     Published Date: Mar 30, 2018
"As a modern organization, you embrace powerful new cloud apps to fuel your organization's growth. You know adopting, using and even building the best technologies will be a big driver for your future success. But did you realize that identity is the lynchpin for the modern cloud ecosystem? It's the new security standard in a world where there is no perimeter anymore. We've talked with technology and security leaders from small to large enterprises and organizations across every industry. You'll want to know the five key elements of an identity solution they said you need to have."
Tags : 
    
OKTA
Published By: SAS     Published Date: Mar 06, 2018
Machines learn by studying data to detect patterns or by applying known rules to: • Categorize or catalog like people or things • Predict likely outcomes or actions based on identified patterns • Identify hitherto unknown patterns and relationships • Detect anomalous or unexpected behaviors The processes machines use to learn are known as algorithms. Different algorithms learn in different ways. As new data regarding observed responses or changes to the environment are provided to the “machine” the algorithm’s performance improves. Thereby resulting in increasing “intelligence” over time.
Tags : 
    
SAS
Published By: Nemx Software Corporation     Published Date: Mar 15, 2007
Organizations are struggling to enforce both mandatory regulatory rules as well as internal corporate policies governing email content and distribution.  One of the biggest obstacles is determining whether or not the content of an email, or its attachment, is subject to any policy rules or restrictions.  This whitepaper describes the techniques required to perform intelligent, accurate content analysis and the shortcomings of most current approaches.
Tags : 
corporate governance, hipaa compliance, sarbanes oxley compliance, software compliance, content management system, messaging, document management, secure content management, compliance, email security, encryption, policy based management, security management, nemx
    
Nemx Software Corporation
Published By: Genius Inc     Published Date: Apr 28, 2010
This event will give you what you need to: •Evaluate your social media needs •Set the ground rules for your organization •Establish Goals •Match response and engagement to buyer interest •Measure Success •Get started and be successful with Social Marketing
Tags : 
genius, webinar, social marketing, social media, networking, response, engagement, sales, buyer interest
    
Genius Inc
Published By: Mentor Graphics     Published Date: Sep 01, 2010
This white paper discusses the conditions that have created the need for pattern matching techniques, the identification and creation of patterns, the Calibre Pattern Matching process, and the benefits derived from its use.
Tags : 
mentor graphics, calibre pattern matching, svrf, verification rules, ic design
    
Mentor Graphics
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12    Next    End
Search      

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.