management practice

Results 101 - 125 of 611Sort Results By: Published Date | Title | Company Name
Published By: IBM     Published Date: May 29, 2015
Asset management will make the world a better place and reliability is a key element in making asset management work. They are two sides of the same coin.
Tags : 
asset management, benchmarking, management program, amp, gap assessment, reliability, implementation
    
IBM
Published By: IBM     Published Date: May 13, 2016
Download this research report now to learn more about the financial and operational impacts on asset-intensive industries worldwide.
Tags : 
ibm, watson, iot, cognitive asset management, asset management, iot, knowledge management, business technology
    
IBM
Published By: Cisco     Published Date: Jul 30, 2015
Attaining value
Tags : 
cisco, network management, network management, business practices, research analysis
    
Cisco
Published By: Entelo     Published Date: Sep 06, 2017
While there are many approaches to attracting diverse candidates, sourcing and pipeline management is one of the most critical. As organizations attempt to increase their sourcing efficiency by narrowing their focus on high-yield sources, they may inadvertently impact their ability to attract or find diverse candidates. Stacia Sherman Garr, VP and Talent Management Research Leader at Bersin by Deloitte, Deloitte Consulting LLP, will share five critical sourcing practices organizations can use to attempt to address this situation, expand their talent pools, and enhance their capability to identify diverse talent. We'll also share Schneider Electric's story of how they've used better sourcing and pipeline management to meaningfully impact their diversity hiring numbers. In this webinar, you'll learn: The role of diversity sourcing in creating an inclusive organization The importance of considering sourcing efficiency and its impact on diversity recruiting Five practices to help impr
Tags : 
    
Entelo
Published By: GE Healthcare     Published Date: Aug 27, 2015
Healthcare organizations are facing uncertain times, which are putting enormous strains on their revenue cycle management (RCM). Automation is proven to improve RCM measures, and even small improvements can significantly impact the bottom line. This whitepaper details how providers can embrace automation to help drive financial performance.
Tags : 
centricity business, financial management, revenue cycle, hospital billing, hospital finance, patient billing, rcm, episodic payment
    
GE Healthcare
Published By: Plex Systems     Published Date: Feb 21, 2014
No more upgrades and patches. Plex Cloud ERP replaced more than a dozen separate systems for preventive maintenance, production, gages, problem controls & reporting. And Plex is completely integrated.
Tags : 
cloud, plex, erp, cloud computing, manufacturing, management, best practices, productivity
    
Plex Systems
Published By: CDW     Published Date: Feb 27, 2015
Bank of Ireland is a leading retail and commercial bank. Snow has helped Bank of Ireland streamline and optimize its software licensing.
Tags : 
software management, sam, software security, cloud computing, enterprise content management, business intelligence, office productivity apps, network security
    
CDW
Published By: Rackspace     Published Date: Mar 20, 2019
Banks embarking on any cloud activities must first overcome the compliance of rigorous security policies and regulations. For its 100th anniversary commemorative website, The Bank of East Asia (BEA) partnered Rackspace Professional Services – for expertise and advice on advanced cloud management, best practices and security – to help with the designing of a highly secured and compliant AWS environment to host the new, celebratory website.
Tags : 
    
Rackspace
Published By: SAS     Published Date: Jun 06, 2018
A multitude of “things” generate floods of big data – cars, wearables, machines and appliances. Wouldn’t you like to sift through that noise and become an organization that relies on data to make fact-based decisions? Learn about the three foundations of becoming data-driven – data management, analytics and visualization – and how they can increase profitability, boost performance, raise market share and improve operations. Read about hurdles to becoming a data-driven organization and learn best practices from others. Then get a glimpse of what the future holds with the Internet of Things (IoT), edge analytics, artificial intelligence (AI) and other technology innovations.
Tags : 
    
SAS
Published By: Jive Software     Published Date: Feb 24, 2014
This IDC study addresses the management challenges and subsequent best practice outcomes that can be achieved through the integration of existing enterprise social network tools with other networks or enterprise applications.
Tags : 
jive, idc, social business, social software, integration, enterprise social network, esn, unified communications
    
Jive Software
Published By: Infor     Published Date: Feb 27, 2007
Countless surveys have confirmed that most lean initiatives are abandoned outright or fail to deliver expected and needed results.  One well-known lean business consultant estimates that the failure rate is 98%. What is it the 2% of companies know that the others do not? Download this white paper to learn more.
Tags : 
supply chain management, best practices, workforce management, productivity, employee performance, lean methods, lean, six sigma
    
Infor
Published By: SocialFlow     Published Date: Oct 30, 2014
Research shows that Data-Driven Social Media publishing delivers a 91% increase in reach and a 26% increase in engagement. This report is based on 1.6 M posts on Facebook, Twitter and Google Plus, and proves that how you distribute your social posts is more important to improving your engagement than what you’re posting.
Tags : 
social media, social media management, social performance, social best practices, social publishing, social media results, earned media, facebook results
    
SocialFlow
Published By: BMC Software     Published Date: May 12, 2015
This guide provides a primer on the essentials of the Service Operation framework and highlights the key elements and important concepts from BMC Software ITIL experts.
Tags : 
it service management, practiced approaches, it organizations, it services management, strategy, design, key elements, it management
    
BMC Software
Published By: BMC Software     Published Date: May 12, 2015
This guide provides a primer on the essentials of the Service Strategy framework and highlights the key elements and important concepts from BMC Software ITIL experts.
Tags : 
it service management, it organizations, it services, best practices, service strategy framework, important concepts, it management
    
BMC Software
Published By: Focus CRM     Published Date: Aug 04, 2011
Get your on-demand CRM rollout right by following the Best Practices suggested by Focus Experts.
Tags : 
focus crm, on-demand crm implementation, customer relationship management, best practices, sales, marketing
    
Focus CRM
Published By: Secure Computing     Published Date: Jan 25, 2008
In an environment where business and government databases store ever-increasing amounts of sensitive and confidential data; and where a growing number of employees need to access that data remotely, password security alone is insufficient to ensure user authentication. Two-factor authentication requires two measures for users to verify their identities and access data.
Tags : 
cell phone, cell phones, wireless security, mobile security, mobile workers, authentication, 2-factor authentication, iam
    
Secure Computing
Published By: Alert Logic     Published Date: Jun 12, 2014
Log management is an organizational requirement that extends beyond simple data collection. Today’s compliance regulations demand the ability to collect, analyze and report on all data collected. This whitepaper discusses key best practices to consider when evaluating automated log management solutions.
Tags : 
log management, log collection, log solutions, log storage, security logs, it management
    
Alert Logic
Published By: Sage FAS Fixed Assets     Published Date: Apr 11, 2011
The goal of this paper is to help you learn about best practices for fixed asset management and suggest tips for implementing them in your organization.
Tags : 
sage fas, fixed asset management, best practices, financial reporting, baseline, ghost assets, asset inventories, inventory software
    
Sage FAS Fixed Assets
Published By: Trillium Software     Published Date: May 25, 2011
To achieve business goals and objectives, you must first optimize the information supporting all of your business processes. Implementing an Information Quality Management practice and applying best practices will help maximize the value of your information.
Tags : 
trillium software, information quality management, iqm, business process silos, tactical data, strategic information, productivity, mdm
    
Trillium Software
Published By: Trillium Software     Published Date: May 25, 2011
To achieve business goals and objectives, you must first optimize the information supporting all of your business processes. Implementing an Information Quality Management practice and applying best practices will help maximize the value of your information.
Tags : 
trillium software, information quality management, iqm, business process silos, tactical data, strategic information, productivity, mdm
    
Trillium Software
Published By: AlienVault     Published Date: Oct 21, 2014
The state of threat intelligence in the information security community is still very immature. Many organizations are still combating threats in a reactive manner, only learning what they're dealing with, well...when they're dealing with it. There is a wealth of information in the community, and many organizations have been gathering data about attackers and trends for years. How can we share that information, and what kinds of intelligence are most valuable? In this presentation, we'll start with a brief overview of AlienVault's Open Threat Exchange™ (OTX), and then we'll discuss attack trends and techniques seen in enterprise networks today, with supporting data from AlienVault OTX. We'll also take a look at some new models for collaboration and improving the state of threat intelligence going forward.
Tags : 
vulnerability, management, risk, prioritize, profile, environment, data, asset value
    
AlienVault
Published By: IBM     Published Date: Apr 20, 2017
Security from design through deployment. Mobile devices are now a reality in many organizations. Building on Mobile Device Management (MDM) and Mobile Application Management (MAM), organizations are increasingly developing their own enterprise apps for specific job tasks to improve productivity, business partnerships, customer satisfaction and bottom-line performance. However, to achieve these benefits, it is imperative that mobile security best practices are incorporated throughout the lifecycle of the application.
Tags : 
application management, application development, organization optimization, authentication, application security, enterprise applications, app blocking
    
IBM
Published By: Prophix     Published Date: Apr 24, 2013
This white paper focuses on best practices that will enable companies to transform the planning cycle into an evolutionary process, bringing tangible and intangible returns for the organization and leadership back into the finance department. You can improve business management through the application and adherence of budgeting and planning best practices. Read on to learn the twelve best practices that have been adopted by leading companies.
Tags : 
best practices, budgeting, forecasting, data, analytics, finance, efficiency
    
Prophix
Published By: Qualys     Published Date: Nov 05, 2013
Automated Vulnerability Management (VM) solutions help you discover devices running in your network, determine whether they are vulnerable to attack, find fixes to the underlying problems, and protect yourself while those fixes are being implemented. This checklist of best practices will save you time and help you understand what to look for when selecting a VM, whether you have a dozen systems or a million.
Tags : 
vulnerability management solution, best practices, architecture, scanning, automation, continuity, reporting, cyber security
    
Qualys
Published By: Qualys     Published Date: Nov 05, 2013
Automated Web Application Scanning (WAS) solutions help you discover web apps running in your network, determine whether they are vulnerable to attack, understand how to fix them, and protect your business. This checklist of best practices will save you time and help you understand what to look for when selecting a WAS solution, whether you have a handful of apps or thousands.
Tags : 
vulnerability management solution, best practices, architecture, scanning, automation, continuity, reporting, cyber security
    
Qualys
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add A White Paper

Email sales@inetinteractive.com to find out about white paper options for your company.