Tag: Customer Relationship Management

Safety Data Sheets And Ghs: Is Your Company Ready? Presented by Stoner, Inc. Session ID 105100, presented at COLLABORATE 15 The Globally Harmonized System of Classification and Labeling of Chemicals(G

Power to the People: Understanding PeopleSoft Update Manager and the New Lifecycle Management Process Presented by Kerry Quast, Westfield Group, Inc. Kelly Korb, Westfield Group, Inc.

PeopleSoft Customers: Prepare yourselves for the new IFRS/GAAP Revenue Recognition Standards Presented by Chad Tovar, Cardinal Point Solutions Donald Woodford, Cardinal Point Solutions Duration: abo

Case Study - Converting Reports Into BI Publisher Presented by Sue Lhymn, Senior HRIS Analyst, Erie Insurance Group Duration: about one hour Intended for PeopleSoft Users Converting reports into BI

Learn what the exciting new PeopleSoft Asset Management, Real Estate Management, and Maintenance Management 9.2 capabilities can do for your organization and learn about the PeopleSoft plans to address the FASB and IASB's proposed changes to the lease accounting standards. This session will help you identify the key productivity-enhancing features in PeopleSoft Asset Management, Real Estate Management, and Maintenance Management 9.2 and beyond that you should plan to leverage, give you insight into what to think about for handling leases in the future, and provide you insight into how to prepare for the impact to applications and business practices.

Query - Tips, Tricks, and Observations Presented by Mark Kirkland, Manager, PeopleSoft Development Team, Packaging Corporation of America Duration: about one hour Intended for PeopleSoft Users This

How to Protect Your System in a World of Evolving Threats

Presented by Greg Kelly, Product Strategy Manager - PeopleTools, Oracle Corp.

Duration: about one hour

Intended for PeopleSoft Users

Hackers are becoming more resourceful, and more people have apparently valid access to your data, with the prospect of deliberate or inadvertent abuse. How do you develop an approach to provide the highest level of protection possible and to minimize the consequences if and when you do suffer a breach? This session looks at what features are available within Oracle 's PeopleSoft product family to secure data, transactions, devices, and humans. We'll also look at:

-Fundamental Breach Protection Guidelines

-PeopleTools Security and Secure Enterprise Enablement

-Enhancing Security (non Oracle Solutions)

-Guarding Against Phishing Attacks

-Considerations for BYOD (Mobile) Security

-Considerations for Cloud Security

-What about \"The Internet of Things?\"

OBJ 1: Learn about new PeopleSoft security features

OBJ 2: Understand phishing techniques

OBJ 3: Mitigate different threat vectors

Does the PeopleSoft Query tool intimidate you? Do you rely on others to write and/or maintain the queries you use? Maybe you are a frequent user and design your own queries, but have not used some of

Best Practices: JD Edwards World to EnterpriseOne Upgrade Project Management Presented by Roger Elwell: VP of Sales & Partner Management, SNP GL Associates Matt Geffken: Director of Business Land