management practice

Results 351 - 375 of 606Sort Results By: Published Date | Title | Company Name
Published By: VMware AirWatch     Published Date: May 18, 2016
In this paper, we discuss why a bring-your-own-device (BYOD) approach to workforce mobility can be a compromise-free approach, and then how the combined capabilities of Samsung KNOX and Enterprise Mobility Management from AirWatch by VMware turn this compromise-free approach into reality.
Tags : 
mobile management, mobile devices, enterprise management, information technology, best practices, business optimization
    
VMware AirWatch
Published By: VMware AirWatch     Published Date: May 18, 2016
Read this infographic to learn how EMM (Enterprise Mobility Management) empowers mobile users in becoming more productive.
Tags : 
mobile management, mobile devices, enterprise management, mobile device management, best practices, business optimization, productivity
    
VMware AirWatch
Published By: VMware AirWatch     Published Date: May 18, 2016
Organizations that invest in proprietary applications and data for competitive advantage in their industries only succeed by making those investments available to employees, customers, and partners that drive revenue and opportunity. Securing those investments requires a fresh perspective as the types of devices accessing the cloud datacenter are changing rapidly and new workloads, such as VDI desktops, are appearing more regularly alongside server workloads. These changes alter the potential attacks and potential threats to datacenters whose security primarily stands firm at the perimeter, however, within the data center the security is weak.
Tags : 
data management, business practices, data center. data application, enterprise applications, security
    
VMware AirWatch
Published By: VMware AirWatch     Published Date: May 19, 2016
In Forrester’s 25-criteria evaluation of enterprise mobile management (EMM) vendors, we identified the 11 most significant EMM providers — AirWatch by VMware, BlackBerry, Citrix, Good Technology, IBM, Landesk, Microsoft, MobileIron, SAP, Sophos, and Soti — and analyzed their offerings. This report details our findings about how well each vendor fulfills our criteria and where they stand in relation to each other to help infrastructure and operations (I&O) professionals select the right partner for their enterprise mobile management.
Tags : 
mobile management, best practices, providers, vendors, enterprise
    
VMware AirWatch
Published By: Sitecore     Published Date: Feb 26, 2016
Studies show mobile consumers look at their phones an average of 1,500 times each week and spend 177 minutes on their phone each day. With every swipe, tap, and zoom, iCustomers are learning to expect that every business look, feel, and act just like their favorite mobile app. What’s a marketer to do?
Tags : 
mobile, communications, mobile management, business practices
    
Sitecore
Published By: Sitecore     Published Date: Feb 26, 2016
Studies show mobile consumers look at their phones an average of 1,500 times each week and spend 177 minutes on their phone each day. With every swipe, tap, and zoom, iCustomers are learning to expect that every business look, feel, and act just like their favorite mobile app. What’s a marketer to do?
Tags : 
mobile, communications, mobile management, business practices
    
Sitecore
Published By: Sitecore     Published Date: Feb 26, 2016
This white paper features answers from Sitecore partner agencies to five questions about the mobile digital experience: challenges commonly faced; the best time for planning the mobile experience; what to look for in a dev partner, how to measure success from mobile, and what “mobile” most frequently means to Sitecore partner customers. With verbatim comments and analysis, it’s a helpful guide for IT and marketing leaders who want to mobilize their digital experience.
Tags : 
mobile, communications, mobile management, business practices
    
Sitecore
Published By: Centrify Corporation     Published Date: Apr 13, 2018
With compromised credentials as today’s #1 threat vector, and the premium hackers place on privileged access, status quo is a treacherous security path to remain on. This eBook looks at what’s behind the privilege crisis, helps you assess how your privileged access management strategy stacks up and proposes a rethink in your approach — one that better addresses the needs of the hybrid enterprise. It explores ways to strengthen your company’s identity maturity with a Zero Trust approach and proven best practices that reduce your risk of a security breach.
Tags : 
    
Centrify Corporation
Published By: Kaseya     Published Date: Aug 27, 2010
Register and attend this webinar and also receive a complimentary copy of Kaseya's Industry Alert entitled, "Top Ten IT Systems Management Pain Points" compiled from our interactions with thousands of customers worldwide.
Tags : 
kaseya webinar, it systems management, it automation, best practices, enterprise management
    
Kaseya
Published By: IBM     Published Date: Feb 18, 2009
This white paper explains the steps you need to consider when developing your privacy strategy and implementing your first data privacy project. Find out how you can help your organization implement best practices in privacy protection and make your privacy project successful from start to finish.
Tags : 
ibm integrated data management, data privacy, data security, ibm optim data privacy solution, hackers, security breach, best practices for data security, data inventory, data management
    
IBM
Published By: IBM     Published Date: Jul 09, 2009
Value-driven product management is a repeatable process based on industry best practices that uses subjective and objective criteria to deliver successful products. This paper explains how assessment, alignment, achievability, accessibility, agility and accountability, the six key concepts of value-driven product management, can be applied to create a repeatable process for developing successful products.
Tags : 
ibm, telelogic, product success, value-driven, product management, assessment, alignment, achievability, accessibility, agility, accountability
    
IBM
Published By: IBM     Published Date: Jul 23, 2009
Companies that successfully introduce a new requirements-engineering process not only change their process and technology but also change their thinking. While improving your requirements management and analysis practices, this step-by-step guide can help you accelerate change and process acceptance across your organization. Learn more today!
Tags : 
ibm, telelogic, doors
    
IBM
Published By: VeriSign Authentication Services, now a part of Symantec Corp.     Published Date: Oct 15, 2011
"The Shortcut Guide to Business Security Measures Using SSL" examines current information security threats to business and describes techniques for developing a security management strategy that leverages established best practices.
Tags : 
extended validation, measures, green bar, online security, optimize, sgc, server gated cryptography, verisign, trust marks, security, ssl technology, malware, it infrastructure, operating systems, hacking, phishing, dos, cybercrime, bot herders, cloud computing
    
VeriSign Authentication Services, now a part of Symantec Corp.
Published By: Citrix Online     Published Date: Oct 17, 2008
Marketing professionals continue to rate Webinars as one of the top tools for lead generation. Yet, many marketing departments still do not have a process in place to maximize Webinar results.
Tags : 
best in class, webinar, management practice, b2b, business to business, webinars, effectiveness, sales, lead, leads, lead gen
    
Citrix Online
Published By: Cornerstone OnDemand     Published Date: Jun 23, 2016
For many small to medium-size companies, finding the time to proactively manage employee performance is difficult. The emphasis is more often on increasing revenues and achieving stability, especially in the early days. However, as businesses grow, the need for improving staff engagement, productivity and loyalty becomes increasingly important. It is at this critical stage that Performance Management can mean the difference between businesses that experience sustained growth and those whose momentum falters.
Tags : 
business management, best practices, productivity, competitive advantage
    
Cornerstone OnDemand
Published By: Lumension     Published Date: Sep 18, 2012
With the sophistication and sheer volume of exploits targeting major applications and operating systems.
Tags : 
vulnerability management, lumension, best practices, patch management, business technology
    
Lumension
Published By: EMA     Published Date: Oct 01, 2014
A new mantra is emerging for IT professionals – Quality of Experience (QoE). In order to align monitoring and management practices with the true demands of the business, IT professionals must expand beyond traditional comfort zones of watching network and system health metrics to begin measuring and understanding the experience IT end users are having. Join EMA Vice President of Research, Jim Frey, and Fluke Networks Director of Products, Doug Roberts, for this on-demand webinar and discussion that will reveal:
Tags : 
quality of experience, qoe, monitoring, network, systems, applications, services, proactive practices
    
EMA
Published By: CSB by Cornerstone on Demand     Published Date: Jun 26, 2013
Managing people is really very simple: hire people who can do the job, and let them do it. If they do something good, tell them they did done good; if they mess up, sort it out pronto. This e-book covers off a bunch of that stuff. It shouldn't contain anything new or groundbreaking, but it does feature zombies, impractical footwear, terrible ideas for thank you cards and one really creepy monkey. And it's anice reminder that keeping things simple is usually the best way to start.
Tags : 
management fundamentals, hiring best practices
    
CSB by Cornerstone on Demand
Published By: Solgenia     Published Date: Jun 07, 2013
This White Paper outlines best practices and practical considerations that help ensure successful selection and implementation of document management solutions.
Tags : 
document management, best practices, implementation, deployments, automation, collaboration, cloud
    
Solgenia
Published By: Oracle     Published Date: Nov 27, 2013
Today customers look to engage with organizations through an increasing number of channels – and expect more from every customer service and support experience. As a result, connecting customers quickly and efficiently with the information they need has become doubly important: both as a means to reduce service costs in a harsh economic climate, and as a key battleground in the drive to establish competitive differentiation and edge.
Tags : 
knowledge management, best practices, customer service, support, strategy, optimization of customer service, technology
    
Oracle
Published By: IBM     Published Date: Aug 06, 2014
Cybercrime prevention needs to reach beyond fraud prevention. Organizations also need to consider deployment costs, management complexity, impact to customers and regulatory compliance. This document examines seven best practices for achieving effective, sustainable cybercrime prevention.
Tags : 
ibm, banking, cybercrime, prevention, solution, fraud
    
IBM
Published By: Oracle     Published Date: Jan 16, 2014
Read Social Recruiting for Dummies to get simple, practical advice on recruiting with social media, from creating and implementing a social recruitment strategy to fostering a truly aspirational employment brand.
Tags : 
zenithoptimedia, oracle, transformational knowledge, operational efficiency, knowledge management, business management, social recruiting, recruit talent, employee networks, scaling efforts, best practices, social networks, human resources, consolidation, social recruit
    
Oracle
Published By: Oracle     Published Date: Jan 16, 2014
Read Social Recruiting for Dummies to get simple, practical advice on recruiting with social media, from creating and implementing a social recruitment strategy to fostering a truly aspirational employment brand.
Tags : 
zenithoptimedia, oracle, transformational knowledge, operational efficiency, knowledge management, business management, social recruiting, recruit talent, employee networks, scaling efforts, best practices, social networks, human resources, consolidation, social recruit
    
Oracle
Published By: Oracle     Published Date: Jan 16, 2014
Read Social Recruiting for Dummies to get simple, practical advice on recruiting with social media, from creating and implementing a social recruitment strategy to fostering a truly aspirational employment brand.
Tags : 
zenithoptimedia, oracle, transformational knowledge, operational efficiency, knowledge management, business management, social recruiting, recruit talent, employee networks, scaling efforts, best practices, social networks, human resources, consolidation, social recruit
    
Oracle
Published By: Oracle     Published Date: Apr 22, 2014
This eBook sets out 5 simple steps for optimizing customer service and support with an effective, best-practice-led knowledge management initiative.
Tags : 
customer service, customer satisfaction, knowledge management, best practice
    
Oracle
Start   Previous    8 9 10 11 12 13 14 15 16 17 18 19 20 21 22    Next    End
Search      

Add A White Paper

Email sales@inetinteractive.com to find out about white paper options for your company.