Cookie policy: This site uses cookies (small files stored on your computer) to simplify and improve your experience of this website. Cookies are small text files stored on the device you are using to access this website. For more information on how we use and manage cookies please take a look at our privacy and cookie policies. Some parts of the site may not work properly if you choose not to accept cookies.

sections
 

management practices

Results 326 - 350 of 555Sort Results By: Published Date | Title | Company Name
Published By: IBM     Published Date: Feb 18, 2009
This white paper explains the steps you need to consider when developing your privacy strategy and implementing your first data privacy project. Find out how you can help your organization implement best practices in privacy protection and make your privacy project successful from start to finish.
Tags : 
ibm integrated data management, data privacy, data security, ibm optim data privacy solution, hackers, security breach, best practices for data security, data inventory, security
    
IBM
Published By: IBM     Published Date: Jul 09, 2009
Value-driven product management is a repeatable process based on industry best practices that uses subjective and objective criteria to deliver successful products. This paper explains how assessment, alignment, achievability, accessibility, agility and accountability, the six key concepts of value-driven product management, can be applied to create a repeatable process for developing successful products.
Tags : 
ibm, telelogic, product success, value-driven, product management, assessment, alignment, achievability, accessibility, agility, accountability, enterprise applications
    
IBM
Published By: IBM     Published Date: Jul 23, 2009
Companies that successfully introduce a new requirements-engineering process not only change their process and technology but also change their thinking. While improving your requirements management and analysis practices, this step-by-step guide can help you accelerate change and process acceptance across your organization. Learn more today!
Tags : 
ibm, telelogic, doors, enterprise applications
    
IBM
Published By: VeriSign Authentication Services, now a part of Symantec Corp.     Published Date: Oct 15, 2011
"The Shortcut Guide to Business Security Measures Using SSL" examines current information security threats to business and describes techniques for developing a security management strategy that leverages established best practices.
Tags : 
extended validation, measures, green bar, online security, optimize, sgc, server gated cryptography, verisign, trust marks, security, ssl technology, malware, it infrastructure, operating systems, hacking, phishing, dos, cybercrime, bot herders, cloud computing
    
VeriSign Authentication Services, now a part of Symantec Corp.
Published By: Citrix Online     Published Date: Oct 17, 2008
Marketing professionals continue to rate Webinars as one of the top tools for lead generation. Yet, many marketing departments still do not have a process in place to maximize Webinar results.
Tags : 
best in class, webinar, management practice, b2b, business to business, webinars, effectiveness, sales, lead, leads, lead gen
    
Citrix Online
Published By: Cornerstone OnDemand     Published Date: Jun 23, 2016
For many small to medium-size companies, finding the time to proactively manage employee performance is difficult. The emphasis is more often on increasing revenues and achieving stability, especially in the early days. However, as businesses grow, the need for improving staff engagement, productivity and loyalty becomes increasingly important. It is at this critical stage that Performance Management can mean the difference between businesses that experience sustained growth and those whose momentum falters.
Tags : 
business management, best practices, productivity, competitive advantage
    
Cornerstone OnDemand
Published By: Lumension     Published Date: Sep 18, 2012
With the sophistication and sheer volume of exploits targeting major applications and operating systems.
Tags : 
vulnerability management, lumension, best practices, patch management
    
Lumension
Published By: EMA     Published Date: Oct 01, 2014
A new mantra is emerging for IT professionals – Quality of Experience (QoE). In order to align monitoring and management practices with the true demands of the business, IT professionals must expand beyond traditional comfort zones of watching network and system health metrics to begin measuring and understanding the experience IT end users are having. Join EMA Vice President of Research, Jim Frey, and Fluke Networks Director of Products, Doug Roberts, for this on-demand webinar and discussion that will reveal:
Tags : 
quality of experience, qoe, monitoring, network, systems, applications, services, proactive practices
    
EMA
Published By: CSB by Cornerstone on Demand     Published Date: Jun 26, 2013
Managing people is really very simple: hire people who can do the job, and let them do it. If they do something good, tell them they did done good; if they mess up, sort it out pronto. This e-book covers off a bunch of that stuff. It shouldn't contain anything new or groundbreaking, but it does feature zombies, impractical footwear, terrible ideas for thank you cards and one really creepy monkey. And it's anice reminder that keeping things simple is usually the best way to start.
Tags : 
management fundamentals, hiring best practices
    
CSB by Cornerstone on Demand
Published By: Solgenia     Published Date: Jun 07, 2013
This White Paper outlines best practices and practical considerations that help ensure successful selection and implementation of document management solutions.
Tags : 
document management, best practices, implementation, deployments, automation, collaboration, cloud
    
Solgenia
Published By: Oracle     Published Date: Nov 27, 2013
Today customers look to engage with organizations through an increasing number of channels – and expect more from every customer service and support experience. As a result, connecting customers quickly and efficiently with the information they need has become doubly important: both as a means to reduce service costs in a harsh economic climate, and as a key battleground in the drive to establish competitive differentiation and edge.
Tags : 
knowledge management, best practices, customer service, support, strategy, optimization of customer service, technology
    
Oracle
Published By: IBM     Published Date: Aug 06, 2014
Cybercrime prevention needs to reach beyond fraud prevention. Organizations also need to consider deployment costs, management complexity, impact to customers and regulatory compliance. This document examines seven best practices for achieving effective, sustainable cybercrime prevention.
Tags : 
ibm, banking, cybercrime, prevention, solution, fraud, security
    
IBM
Published By: Oracle     Published Date: Jan 16, 2014
Read Social Recruiting for Dummies to get simple, practical advice on recruiting with social media, from creating and implementing a social recruitment strategy to fostering a truly aspirational employment brand.
Tags : 
zenithoptimedia, oracle, transformational knowledge, operational efficiency, knowledge management, business management, social recruiting, recruit talent, employee networks, scaling efforts, best practices, social networks, human resources, consolidation, social recruit
    
Oracle
Published By: Oracle     Published Date: Jan 16, 2014
Read Social Recruiting for Dummies to get simple, practical advice on recruiting with social media, from creating and implementing a social recruitment strategy to fostering a truly aspirational employment brand.
Tags : 
zenithoptimedia, oracle, transformational knowledge, operational efficiency, knowledge management, business management, social recruiting, recruit talent, employee networks, scaling efforts, best practices, social networks, human resources, consolidation, social recruit
    
Oracle
Published By: Oracle     Published Date: Jan 16, 2014
Read Social Recruiting for Dummies to get simple, practical advice on recruiting with social media, from creating and implementing a social recruitment strategy to fostering a truly aspirational employment brand.
Tags : 
zenithoptimedia, oracle, transformational knowledge, operational efficiency, knowledge management, business management, social recruiting, recruit talent, employee networks, scaling efforts, best practices, social networks, human resources, consolidation, social recruit
    
Oracle
Published By: Lumension     Published Date: Feb 07, 2014
In this best practice guide, we are going to take a deep dive into a best practice process for patch and vulnerability management, developed by Lumension over thousands of customer engagements.
Tags : 
lumension, agent maintenance, value and risk, patch management, microsoft’s patch tuesday, it tasks, remediation process, endpoint management and security suite, automated patch solution, lemss, agent communication, test groups, best practices, business intelligence, managing patches, vulnerability monitoring, remediation techniques
    
Lumension
Published By: Adobe     Published Date: Sep 13, 2016
Streamline all your paperwork and processes by going 100% digital in HR. When everything is synced and organized, your team has more time to focus on strategies to attract and keep the best talent. Read Forbes Insights paper, How Digital Transformation Elevates Human Capital Management: Turning Talent into a Strategic Business Force to learn: - About the technology involved in digital HR - Best practices when going through digital transformation - How going digital elevates the role of HR in your company
Tags : 
adobe, cloud, document cloud, digital transformation, human capital, human capital management, human resources
    
Adobe
Published By: Alert Logic     Published Date: Jun 12, 2014
Log management is an organizational requirement that extends beyond simple data collection. Today’s compliance regulations demand the ability to collect, analyze and report on all data collected. This whitepaper discusses key best practices to consider when evaluating automated log management solutions.
Tags : 
log management, log collection, log solutions, log storage, security logs, it management, enterprise applications
    
Alert Logic
Published By: Alert Logic and Rackspace     Published Date: Jun 20, 2014
To comply with today’s government and industry mandates, such as PCI, Sarbanes-Oxley, HIPAA and GLBA, log data must be collected, regularly reviewed and archived. In addition, regular analysis and forensics can also be performed on the same log data to enhance overall security and availability. This paper discusses the challenges associated with effective log management and enables you to better define best practices and requirements for log management projects, as well as log management and review solutions.
Tags : 
alert logic, rackspace, log management, automated log management, pci, hipaa, glba, log data, security, it management
    
Alert Logic and Rackspace
Published By: Alert Logic and Sungard Availability Services     Published Date: Jun 20, 2014
To comply with today’s government and industry mandates, such as PCI, Sarbanes-Oxley, HIPAA and GLBA, log data must be collected, regularly reviewed and archived. In addition, regular analysis and forensics can also be performed on the same log data to enhance overall security and availability. This paper discusses the challenges associated with effective log management and enables you to better define best practices and requirements for log management projects, as well as log management and review solutions.
Tags : 
alert logic, sungard, log management, automated log management, pci, hipaa, glba, log data, security, it management
    
Alert Logic and Sungard Availability Services
Published By: Mobify     Published Date: Feb 20, 2015
Mobify’s Mobile Strategy Development Guide is aimed at retailers in the process of developing a mobile strategy or invested in upgrading their current strategy to meet customer expectations and incorporate emerging mobile technology. In our new guide, you’ll discover: - How to build a solid business case to win senior management buy-in - How to effectively assign responsibilities in the strategy development process - How to analyze your competitors’ mobile initiatives for best practices and lessons learned - How to identify the right metrics to measure strategy success
Tags : 
mobile strategy, mobile development, mobile technology, customer engagement
    
Mobify
Published By: ReadyTalk     Published Date: Jul 07, 2016
By now, most people have had the experience of attending a webinar. An attendee logs on, and spends a certain amount of time listening to audio and viewing a slide presentation. It is likely that attendees will interact via online polling and ask questions during the presentation. Hopefully they will leave the experience with a few takeaways. Webinars have proven to be a great marketing tool, as well as a valuable way to connect people in various geographic locations to information. But, how much of the webinar do attendees actually listen to?
Tags : 
best practices, business optimization, business management, productivity, engagement practices
    
ReadyTalk
Published By: NetApp     Published Date: Feb 14, 2017
All-flash storage arrays—with increasingly attractive performance levels— are a much sounder investment than traditional spinning disks. If you’re looking for affordable ways to boost application performance and simplify data management, you need to evaluate flash technology and how it can deliver a compelling return on investment. Watch this short webcast featuring industry experts including IDC, discuss proven strategies and best practices.
Tags : 
netapp, database performance, flash storage, data management, cost challenges
    
NetApp
Published By: IBM     Published Date: Aug 20, 2015
This report provides practical guidance on the critical 10 steps for the first 100 days of setting up an analytically enabled HR function.
Tags : 
workforce analytics, data analytics, hr function, talent management, recruitment, best practices, ibm smarter workforce, talent analytics
    
IBM
Published By: Mitel     Published Date: Jun 29, 2016
The cloud – and more specifically, cloud communications – is the source of the transformation, which has fundamentally changed the IT landscape. Some IT pros have embraced it. Some are working on migrating to the cloud over time. And others, through choice or necessity, are sticking with a premises-based approach. Read on to find out why some IT pros are shopping for game tables to go in empty server rooms while others are untangling wires and watching blinking lights—and which cases make the most sense for each approach.
Tags : 
cloud management, cloud services, cloud management, best practices, communications, cloud computing
    
Mitel
Start   Previous    7 8 9 10 11 12 13 14 15 16 17 18 19 20 21    Next    End
Search      

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.