Many large corporations currently exist. Such corporations often have thousands, or even tens of thousands, of employees. It is common for such companies to recruit and hire many employees during a given year.
There are many different processes for hiring people in such large organizations. Most of these processes involve multiple different people, and can even involve different groups of people.
One exemplary process can include a hiring team with members that have different roles. They can include, for instance, a business person who submits a requisition for a new employee, a hiring manager, pre-screening interviewers, in-person interviewers and recruiters, among others. In order to hire a new employee, it is common for such a set of people in the organization to collaborate with one another. The hiring manager is in charge of driving the hiring process. The recruiters receive information about the open position and find candidates. The recruiters then supply information regarding the candidates to the hiring manager. The hiring manager may review the candidates' information and provide feedback and approval to the recruiter to approach the candidates. Additional interviewers may be involved to screen the candidate's information or to conduct a pre-interview telephone screen and to conduct in-person interviews.
All of the different activity that these people engage in yields communications. For instance, the hiring manager provides information to the recruiters in order to locate qualified candidates. The recruiters provide information back to the hiring manager (and perhaps other members of the hiring team) regarding potentially qualified candidates. The hiring manager and the other members of the hiring team review that information and may provide additional information to clarify the requirements for the job opening, to the recruiters. Once potentially qualified candidates are identified, pre-screening interviews can be conducted and candidates can also be brought in for in-person or other interviews. Often, multiple rounds of interviews are conducted in order to fill a position.
A great deal of communication is generated in this process. The communications can include feedback from the interviewers, ratings for individual candidates, internal discussions regarding the open positions and the candidates who are being interviewed, decisions regarding which candidates are to be interviewed and who (on the hiring team) is to conduct the interviews, among others.
Currently, these types of communications are commonly handled through electronic mail. Some of the information is contained in the body of the mail messages themselves. Other information is contained in attachments (such as when a recruiter sends a resume of a potentially qualified candidate, as an attachment). Internal conversations that are held by electronic mail can also contain valuable information. Thus, in some cases, the best repository for all of the information about an open position, or about a specific candidate, or about a set of candidates, is contained in a “sent items” folder of the electronic mail system of a hiring team manager, or other hiring team members. Often, however, all of the relevant information is not even contained in that folder. Instead, it may be spread across multiple folders, or across different folders of multiple different people.
As the number of active positions, candidates, and hiring staff increases, the amount of these communications grows proportionately and the information can be lost. Or, at the very least, it can be very difficult to retrieve. Thus, company growth can exacerbate the problem.
The discussion above is merely provided for general background information and is not intended to be used as an aid in determining the scope of the claimed subject matter.
A recruiting system receives user inputs that generate events within the recruiting system related to recruiting a new employee. The recruiting system tags messages with filter tags so that they can be filtered for later viewing. The recruiting system then provides outputs that take action within a social network based on user-initiated events, within the recruiting system. The recruiting system also accesses the social network to display an information feed based on user inputs.
This Summary is provided to introduce a selection of concepts in a simplified form that are further described below in the Detailed Description. This Summary is not intended to identify key features or essential features of the claimed subject matter, nor is it intended to be used as an aid in determining the scope of the claimed subject matter. The claimed subject matter is not limited to implementations that solve any or all disadvantages noted in the background.
Business system 102 can be one of a wide variety of different kinds of business systems. For instance, it can be an enterprise resource planning (ERP) system, a customer relations management (CRM) system, a line-of-business (LOB) system, among others. In the embodiment described herein, system 102 will be described as an ERP system, although that description is provided for the sake of example only.
Business system 102 illustratively includes recruiting system 118, business applications 120, processor 122, user interface component 124 and business data store 126. It can include other components, or items, or systems as well.
Business data store 126 illustratively includes business data (such as entities), workflows, other business data records, and other information. The entities illustratively represent different items associated with the business that is using business system 102. For instance, a customer entity may represent a customer. A vendor entity can represent a vendor. A product entity can represent a product. A business opportunity entity can represent a business opportunity. A candidate requisition entity can represent a requisition for a candidate or for a new employee. A candidate entity can represent a candidate, etc.
Business applications 120 illustratively operate on the data and workflows and other information stored in data store 126 to enable users to perform activities, tasks, or other operations in order to conduct the business of the organization that is using system 102. For instance, applications 102 can include inventory applications, sales applications, general ledger applications among others.
In one embodiment, user interface component 124 (either under the control of other components or systems in business system 102, or by itself) illustratively generates a set of user interface displays with user input mechanisms that a user can interact with, in order to manipulate and control business system 102. For instance, user interface component 124 can generate a set of user interface displays, with user input mechanisms, that can be actuated by recruiters 106 and members of hiring team 108, in order to manipulate and control recruiting system 118. This is described in greater detail below.
Recruiting system 118 illustratively allows recruiters 106 and hiring team 108 to collaborate with one another in carrying out the process of hiring a new employee. This is also done in collaboration with certain portions of social network system 104. This is described in greater detail below with respect to
Social network system 104 is illustratively a computer system that implements social network services. A user can illustratively create a social network site (or account) that is connected to social network sites (or accounts) of others through a social media service. The social network connections between a given user and other users of the social media are sometimes referred to as the given user's social graph. The graph can sometimes include connection to other users of the social media service, but it can also sometimes include connections to a given subject matter area, various products, or groups, etc.
In the context of the present discussion, social network system 104 also provides functionality for creating a private group. A private group is a group that can have members added only by certain authorized personnel. Group component 130 and authorization component 132, are illustratively accessed by a user (or in the present discussion by recruiting system 118) in order to set up groups. Thread component 134 organizes, manages and presents for viewing, threaded communications or conversations based upon various inputs. Linking application 136 is illustratively used to link recruiting system 118 to social network system 104, and allow recruiting system 118 to make certain changes within social network system 104. The groups 142 and threads 144 can be stored in data store 138. In addition, social network system 104 illustratively keeps a set of topics 146 that can be used to cross-reference or index information provided to a user as well.
Before describing the operation of architecture 100 in more detail, a brief overview will be provided to enhance understanding. When a member of the organization that uses business system 102 wishes to hire a new employee, that user illustratively inputs an employee requisition or a candidate requisition to obtain information about potentially qualified candidates. When that happens, recruiting system 118 illustratively sets up a connection with social network system 104 and uses group component 130 to create a private group 142 within social network system 104. Various members are then added to the group (such as members of hiring team 108) and recruiters 106. Potentially qualified candidates can then be associated with the requisition and a unique message thread 144 is illustratively generated by thread component 134 in social network system 104. In doing so, recruiting system 118 receives the identity of the candidate from one of hiring team 108 or recruiters 106, and provides information to thread component 134 in order to generate a unique thread 144 within the group 142 corresponding to the requisition for which the candidate is being considered. As members of hiring team 108 or recruiters 106 take actions within recruiting system 118, recruiting system 118 provides inputs to social network system 104 to post messages to the group 142 corresponding to the requisition. By way of example, when hiring manager 110 inputs feedback about a candidate to recruiting system 118, recruiting system 118 accesses thread component 134 in social network system 104 to post a message to the appropriate thread 144 corresponding to that candidate, in the appropriate group 142, corresponding to the requisition. When any of the members that have access to that information desire to view the threads, they can provide filter inputs (through appropriate user input mechanisms—some of which are discussed below) to recruiting system 118. Recruiting system 118 then uses an embedded feed control in social network system 104 to display a message feed corresponding to the candidate, or corresponding to the requisition, or both.
Setup and authentication component 150 then sets up the authorizations that are needed to connect to and act within social network system 104. This is indicated by block 172 in
Setup and authentication component 150 then also illustratively obtains permission from the various users in hiring team 108 and recruiters 106 to act on their behalf within social network system 104. This is indicated by block 176 in
Once the connection between recruiting system 118 and social network system 104 is set up, group creation and maintenance component 158 illustratively receives an input from a user of system 102 indicative of a recruiting requisition. By way of example, a business manager or member of hiring team 108 or recruiters 106 may provide an input to business system 102 indicating that a new employee has been requisitioned. This is indicated by block 180 in
The user input can also provide the identity of the various members of hiring team 108 and recruiters 106. This is indicated by block 184 in
Group creation and maintenance component 158 then opens a candidate requisition entity in business system 102, corresponding to the requisition. This is indicated by block 188 in
When a specific candidate 204 is identified, a candidate requisition entity 200 is also illustratively opened within business system 102. This causes thread management component 159 to interact with thread component 134 in social network system 104 to open a unique message thread 202 in social network system 104, corresponding to that given candidate 204. The specific candidate 204 is also tagged as corresponding to a given topic 206. That is, each candidate 204 is assigned a unique topic identifier so that the candidate information can be viewed across various requisitions. By way of example, if a single candidate has applied for, and is being considered for, multiple open positions, the information for that candidate, if it is cross-referenced or indexed by topic 206, can be viewed across multiple different requisitions. This is described in greater detail below.
Referring again to the flow diagram of
Recruiting system 118 then takes various different actions within social network system 104 based on the user-initiated events. This is indicated by block 212. For instance, one of the users can add a candidate to the requisition. This is indicated by block 214. When that happens, thread management component 159 within recruiting system 118 interacts with thread component 134 in social network system 104 to start a unique thread within the group (corresponding to the requisition for which the candidate has been added) for that specific candidate. This is indicated by block 216 in
Another user-initiated event may be generated when a member of hiring team 108 rates a candidate on one of a variety of different rating criteria. As a simple example, a candidate's resume may be rated on a scale of 1-5 based upon how qualified the interviewer believes that candidate will be for the given requisition. In that case, information synchronization component 154 posts a message in the thread that has been opened for that specific candidate. Receiving an input from a team member rating the candidate is indicated by block 218 in
Another user-initiated event can be generated in system 218 when a hiring team member comments or provides feedback on a candidate. This is indicated by block 222. In that case, information synchronization component 154 also posts a message in the thread, for that candidate. This is indicated by block 224 in
As another user-initiated event, a user may change the recruitment stage corresponding to a candidate. For instance, each candidate may have a corresponding stage indicator, indicating where that candidate is in the recruitment process. One stage may be, for example, “hiring manager to review resume”. A next stage may be “interview candidate”, yet another stage may be “call back for second interview” and a different stage may be “make an offer”. These, of course, are exemplary stages only. However, when a user changes the recruitment stage corresponding to a given employee (or to a requisition for that matter—such as changing the stage from “actively recruiting” to “position filled”), then information synchronization component 154 illustratively posts another message in the thread for the candidate, or in the topic area corresponding to the requisition. Receiving a user input changing the recruitment stage is indicated by block 226 in
These are exemplary user-initiated events only. A wide variety of other or additional user-initiated events can be generated as well.
It will be appreciated that, while users are providing input as discussed above, they can also illustratively be viewing the message feeds for the various candidates, requisitions, topics, etc. In order to do so, information synchronization component 154 illustratively receives a user input indicating that a user wishes to view a message feed. This is indicated by block 230 in
The message feed can, in one embodiment, be a thread corresponding to a candidate, as indicated by block 242. It can display information from a plurality of different threads, across various groups (e.g., across various requisitions) where that candidate is being considered for different positions. This is indicated by block 244 in
The message feed can also include links back to recruiting system 118. By way of example, if business data store 126 or data store 160 in recruiting system 118 contains additional information that may not be found on social network system 104, (such as salary information or other information) that information can be linked to in various messages or in the message feed itself. When the user is viewing that information, the user can illustratively actuate that link to be navigated back to a view of the corresponding information within recruiting system 118. Providing the message feed with links back to system 118 is indicated by block 246. The information in the message feed can include other information as well. This is indicated by block 248 in
While the message feed is being displayed at block 240, it will be noted that, in one embodiment, security component 152 enforces security with respect to the message feed that is displayed. By way of example, if a member of a first hiring team is viewing information on a candidate, and wishes to view information for that candidate across multiple requisitions, that member may not be a member of all hiring teams. Therefore, security component 156 ensures that the user who is attempting to view information actually has authorization to view that information. In one embodiment, for instance, security component 152 checks to determine whether the user is a member of the hiring team for which he or she is seeking to view information. Security component 152 can also perform role-based security. By way of example, it may be that users in the human resources department, overall, have more access to personnel information than users in the sales department. Thus, even though a member of a sales department is on one or more hiring teams, that person may not get to view all of the information that a member of the human resources department can view. Of course, security component 152 can implement other security as well.
Identifiers 256 and 258 are illustratively user actuatable input mechanisms. For instance, they can be actuated by a user to change the message feed that is displayed. It can be seen in
It can thus be seen that recruiting system 118 illustratively provides social network group creation and membership maintenance for recruiting collaboration of a recruiting team or other individuals. Recruiting system 118 generates messages to a private social network group based on user-initiated events. It can also tag those messages to enable filtering and cross-team view of candidate feedback. When viewing a requisition in system 118, the social network system embedded feed control can be used to display a message feed for a group corresponding to that requisition. When viewing candidate information in system 118, the embedded feed control of the social network system can be used to display a message feed for the candidate across requisitions, by pointing the view control to the topic associated with the candidate.
In one embodiment, recruiting information discussed herein can be viewed in other ways as well. For instance, it can be viewed through the normal social networking website of system 104, as well as through the embedded feed control. In addition, candidates can be represented in other ways as well. For example, a candidate can be represented using a webpage that has the same functionality as any object within social network system 104. This can be done using a wide variety of different technologies and schemas, or by using a given protocol, such as Open Graph protocol, or others.
The above discussion has proceeded with respect to processor 122, and data stores 126, 138 and 160. A number of things will be appreciated. First, there can be multiple processors, instead of only processor 122. In addition, there can be a processor within social network system 104, or within devices that the users are using to access system 102. The processors are illustratively computer processors with associated memory and timing circuitry (not separately shown). They are illustratively a functional part of the system to which they belong, and are activated by, and facilitate the functionality of, other items, components, or systems, of the system to which they belong.
Data stores 126, 138 and 160 are all shown as single data stores and they are local to the systems accessing them. It will be appreciated that they can each be formed of multiple different data stores, and all of them can be local or remote, or some can be local while others are remote.
Further, the above discussion has mentioned a number of user interface displays, with corresponding user input mechanisms. The user interface displays that are discussed above are exemplary only, and a wide variety of other user interface displays can be used as well. In addition, the user input mechanisms discussed above are exemplary only and other user input mechanisms can also be used. For instance, the user input mechanisms can be links, icons, buttons, drop down menus, text boxes, search boxes, check boxes, etc. They can also be actuated in a wide variety of different ways. For instance, they can be actuated using hardware components, such as a point and click device (e.g., a mouse or track ball), a keyboard, a keypad, buttons, joysticks, thumb pads, thumb switches, etc. Further, they can also be actuated using virtual components, such as a virtual keyboard or keypad, a thumb pad, or other virtual actuators. If the display screen on which they are displayed is a touch sensitive screen, they can also be actuated using touch gestures (such as with a user's finger, a stylus, etc.). In addition, where the device with which they are used includes speech recognition components, they can be actuated using speech commands.
The above figures also show various blocks that have various functionality ascribed to them. It will be noted, that however, that additional blocks can be used with the functionality distributed among the additional blocks. In addition, the blocks shown can be combined into fewer blocks that perform the same functionality.
The description is intended to include both public cloud computing and private cloud computing. Cloud computing (both public and private) provides substantially seamless pooling of resources, as well as a reduced need to manage and configure underlying hardware infrastructure.
A public cloud is managed by a vendor and typically supports multiple consumers using the same infrastructure. Also, a public cloud, as opposed to a private cloud, can free up the end users from managing the hardware. A private cloud may be managed by the organization itself and the infrastructure is typically not shared with other organizations. The organization still maintains the hardware to some extent, such as installations and repairs, etc.
In the embodiment shown in
It will also be noted that architecture 100, or portions of it, can be disposed on a wide variety of different devices. Some of those devices include servers, desktop computers, laptop computers, tablet computers, or other mobile devices, such as palm top computers, cell phones, smart phones, multimedia players, personal digital assistants, etc.
Under other embodiments, applications or systems are received on a removable Secure Digital (SD) card that is connected to a SD card interface 15. SD card interface 15 and communication links 13 communicate with a processor 17 (which can also embody processors 122 from
I/O components 23, in one embodiment, are provided to facilitate input and output operations. I/O components 23 for various embodiments of the device 16 can include input components such as buttons, touch sensors, multi-touch sensors, optical or video sensors, voice sensors, touch screens, proximity sensors, microphones, tilt sensors, and gravity switches and output components such as a display device, a speaker, and or a printer port. Other I/O components 23 can be used as well.
Clock 25 illustratively comprises a real time clock component that outputs a time and date. It can also, illustratively, provide timing functions for processor 17.
Location system 27 illustratively includes a component that outputs a current geographical location of device 16. This can include, for instance, a global positioning system (GPS) receiver, a LORAN system, a dead reckoning system, a cellular triangulation system, or other positioning system. It can also include, for example, mapping software or navigation software that generates desired maps, navigation routes and other geographic functions.
Memory 21 stores operating system 29, network settings 31, applications 33, application configuration settings 35, data store 37, communication drivers 39, and communication configuration settings 41. Memory 21 can include all types of tangible volatile and non-volatile computer-readable memory devices. It can also include computer storage media (described below). Memory 21 stores computer readable instructions that, when executed by processor 17, cause the processor to perform computer-implemented steps or functions according to the instructions. Similarly, device 16 can have a client business system 24 which can run various business applications. Processor 17 can be activated by other components to facilitate their functionality as well.
Examples of the network settings 31 include things such as proxy information, Internet connection information, and mappings. Application configuration settings 35 include settings that tailor the application for a specific enterprise or user. Communication configuration settings 41 provide parameters for communicating with other computers and include items such as GPRS parameters, SMS parameters, connection user names and passwords.
Applications 33 can be applications that have previously been stored on the device 16 or applications that are installed during use, although these can be part of operating system 29, or hosted external to device 16, as well.
The mobile device of
Note that other forms of the devices 16 are possible.
Computer 810 typically includes a variety of computer readable media. Computer readable media can be any available media that can be accessed by computer 810 and includes both volatile and nonvolatile media, removable and non-removable media. By way of example, and not limitation, computer readable media may comprise computer storage media and communication media. Computer storage media is different from, and does not include, a modulated data signal or carrier wave. It includes hardware storage media including both volatile and nonvolatile, removable and non-removable media implemented in any method or technology for storage of information such as computer readable instructions, data structures, program modules or other data. Computer storage media includes, but is not limited to, RAM, ROM, EEPROM, flash memory or other memory technology, CD-ROM, digital versatile disks (DVD) or other optical disk storage, magnetic cassettes, magnetic tape, magnetic disk storage or other magnetic storage devices, or any other medium which can be used to store the desired information and which can be accessed by computer 810. Communication media typically embodies computer readable instructions, data structures, program modules or other data in a transport mechanism and includes any information delivery media. The term “modulated data signal” means a signal that has one or more of its characteristics set or changed in such a manner as to encode information in the signal. By way of example, and not limitation, communication media includes wired media such as a wired network or direct-wired connection, and wireless media such as acoustic, RF, infrared and other wireless media. Combinations of any of the above should also be included within the scope of computer readable media.
The system memory 830 includes computer storage media in the form of volatile and/or nonvolatile memory such as read only memory (ROM) 831 and random access memory (RAM) 832. A basic input/output system 833 (BIOS), containing the basic routines that help to transfer information between elements within computer 810, such as during start-up, is typically stored in ROM 831. RAM 832 typically contains data and/or program modules that are immediately accessible to and/or presently being operated on by processing unit 820. By way of example, and not limitation,
The computer 810 may also include other removable/non-removable volatile/nonvolatile computer storage media. By way of example only,
Alternatively, or in addition, the functionality described herein can be performed, at least in part, by one or more hardware logic components. For example, and without limitation, illustrative types of hardware logic components that can be used include Field-programmable Gate Arrays (FPGAs), Program-specific Integrated Circuits (ASICs), Program-specific Standard Products (ASSPs), System-on-a-chip systems (SOCs), Complex Programmable Logic Devices (CPLDs), etc.
The drives and their associated computer storage media discussed above and illustrated in
A user may enter commands and information into the computer 810 through input devices such as a keyboard 862, a microphone 863, and a pointing device 861, such as a mouse, trackball or touch pad. Other input devices (not shown) may include a joystick, game pad, satellite dish, scanner, or the like. These and other input devices are often connected to the processing unit 820 through a user input interface 860 that is coupled to the system bus, but may be connected by other interface and bus structures, such as a parallel port, game port or a universal serial bus (USB). A visual display 891 or other type of display device is also connected to the system bus 821 via an interface, such as a video interface 890. In addition to the monitor, computers may also include other peripheral output devices such as speakers 897 and printer 896, which may be connected through an output peripheral interface 895.
The computer 810 is operated in a networked environment using logical connections to one or more remote computers, such as a remote computer 880. The remote computer 880 may be a personal computer, a hand-held device, a server, a router, a network PC, a peer device or other common network node, and typically includes many or all of the elements described above relative to the computer 810. The logical connections depicted in
When used in a LAN networking environment, the computer 810 is connected to the LAN 871 through a network interface or adapter 870. When used in a WAN networking environment, the computer 810 typically includes a modem 872 or other means for establishing communications over the WAN 873, such as the Internet. The modem 872, which may be internal or external, may be connected to the system bus 821 via the user input interface 860, or other appropriate mechanism. In a networked environment, program modules depicted relative to the computer 810, or portions thereof, may be stored in the remote memory storage device. By way of example, and not limitation,
It should also be noted that the different embodiments described herein can be combined in different ways. That is, parts of one or more embodiments can be combined with parts of one or more other embodiments. All of this is contemplated herein.
Although the subject matter has been described in language specific to structural features and/or methodological acts, it is to be understood that the subject matter defined in the appended claims is not necessarily limited to the specific features or acts described above. Rather, the specific features and acts described above are disclosed as example forms of implementing the claims.
The present application is based on and claims the benefit of U.S. provisional patent application Ser. No. 61/896,374, filed Oct. 28, 2013, the content of which is hereby incorporated by reference in its entirety.
Number | Date | Country | |
---|---|---|---|
61896374 | Oct 2013 | US |