Browse Definitions :
114 results for:

HR SuccessFactors

SuccessFactors Presentations

Definition | SearchSAP

SuccessFactors Presentations is a feature within SuccessFactors software that HR managers can use to create more dynamic talent review presentations.

SuccessFactors Employee Central

Definition | SearchSAP

SuccessFactors Employee Central is SuccessFactors' integrated suite of human capital management (HCM) cloud applications.

SAP SuccessFactors

Definition | SearchSAP

SAP SuccessFactors is a major vendor of cloud-based human capital management (HCM) software and talent management software.

SuccessFactors MetaData Framework

Definition | SearchSAP

The SuccessFactors Metadata Framework is Web-based software that gives SuccessFactors users the ability to create and maintain custom objects, ...

digital HR

Definition | SearchHRSoftware

Digital HR is the digital transformation of HR services and processes through the use of social, mobile, analytics and cloud (SMAC) technologies.

core HR (core human resources)

Definition | SearchHRSoftware

Core HR (core human resources) is an umbrella term that means the basic functions of an HR department; the basic data captured about employees; and ...

Human Resources (HR) Generalist

Definition | SearchHRSoftware

A human resources (HR) generalist is an employee in the HR department who handles a wide variety of responsibilities.

hour (hr)

Definition |

The hour (symbolized hr) is a unit of time, equivalent to 3600 seconds (s), 60 minutes (min), or 1/24 of a mean solar day (msd).

HR help desk

Definition | SearchHRSoftware

HR help desk refers to a central source of information employees can consult about human resource questions.

HR service delivery

Definition | SearchHRSoftware

HR service delivery is a term used to explain how an organization's human resources department offers services to and interacts with employees.




  • cybersecurity

    Cybersecurity is the protection of internet-connected systems, including hardware, software and data, from cyberattacks.

  • asymmetric cryptography (public key cryptography)

    Asymmetric cryptography, also called public key cryptography, uses a pair of numerical keys that are mathematically related to ...

  • digital signature

    A digital signature is a mathematical technique used to validate the authenticity and integrity of a message, software or digital...



  • business continuity plan (BCP)

    A business continuity plan (BCP) is a document that consists of the critical information an organization needs to continue ...

  • disaster recovery team

    A disaster recovery team is a group of individuals focused on planning, implementing, maintaining, auditing and testing an ...

  • cloud insurance

    Cloud insurance is any type of financial or data protection obtained by a cloud service provider. 


  • hard disk drive (HDD)

    A computer hard disk drive (HDD) is a non-volatile memory hardware device that controls the positioning, reading and writing of ...

  • byte

    In most computer systems, a byte is a unit of data that is eight binary digits long. Bytes are often used to represent a ...

  • network-attached storage (NAS)

    Network-attached storage (NAS) is dedicated file storage that enables multiple users and heterogeneous client devices to retrieve...