management practice

Results 51 - 75 of 609Sort Results By: Published Date | Title | Company Name
Published By: Focus     Published Date: Feb 02, 2011
Learn how Webinar effectiveness defines the 9 Management Practices any company can embrace to ensure their Webinar initiative becomes the cornerstone of a proven lead-generation engine.
Tags : 
citrix, webinar, business practices, lead-generation, lead gen, leads, integration, b2b, marketing communications
    
Focus
Published By: Cleversafe     Published Date: Mar 29, 2013
Cloud applications and web-based services, such photo sharing sites, create some monumental challenges for a storage infrastructure.
Tags : 
raid, cloud storage, storage, replication, capacity, bandwith, efficiency, web applications, backup and recovery, network attached storage, storage management, storage virtualization, application integration, application performance management, best practices, business technology
    
Cleversafe
Published By: Zugata     Published Date: Feb 02, 2018
Performance Management: The Practice Everyone Loves to Hate Let’s start with some real talk: Performance management is a topic that strikes fear into the hearts of most people in the HR field (not to mention managers and employees!). Most companies care about it, but few have figured out how to do it well. Research from CEB found that managers spend up to 200 hours per year on performance documentation, and a company of 10,000 spends an estimated $35 million a year to conduct reviews. Despite this huge investment of time and money, there is minimal return. Reviews don’t drive engagement or performance—and 95% of managers are dissatisfied with the way their companies conduct performance reviews.
Tags : 
performance management, performance reviews, employee engagement
    
Zugata
Published By: HP - Enterprise     Published Date: Nov 19, 2008
For a CISO, open source introduces a new source of risk and unique security challenge: how do you influence developers over whom you have no direct management control? Jennifer Bayuk, former CISO of Bear Stearns, provides insight on best practices for evaluating, deploying and managing open source code.
Tags : 
business risk, security, application security, audit, risk, vulnerabilities, fortify, fortify software, hackers, cyber threats, application security standards, threats, assessment, remediation, jennifer bayuk, bear stearns, ciso, application security best practices
    
HP - Enterprise
Published By: Ruckus Wireless     Published Date: Jul 11, 2018
In an era of "lean IT," the centralized management capabilities of cloud-managed Wi-Fi make it an attractive option to manage and maintain wireless LANs (WLANs) across multiple locations. The decision to move WLAN management to the cloud requires one key assurance: end-to-end security from user devices to the cloud. This means that user data must be protected over the WAN and in the data center. These security measures should not require on-staff WLAN security expertise to manage. And security measures should be largely transparent to users. This paper provides an overview of the security architecture of Ruckus Cloud Wi-Fi, as well as best practices for specific security scenarios.
Tags : 
    
Ruckus Wireless
Published By: ServiceNow     Published Date: Feb 24, 2017
At the highest level of organizations, a new management directive has emerged to meet the changed nature of customer demands and interactions as well as the need to differentiate within the market. This directive has one goal: providing a differentiated customer service experience. As products become increasingly commoditized, organizations can set themselves apart from their competitors by providing a unique customer service experience that creates a "relationship" based on intangible benefits that their customers will find hard to give up. While this vision is theoretically sound, it requires a significant tactical shift in business thinking and processes. The modern customer's habits and service requirements have changed radically. Meeting these needs challenges many historically held beliefs and practices regarding the customer and modes of interaction.
Tags : 
    
ServiceNow
Published By: Service Now     Published Date: Jan 26, 2018
At the highest level of organizations, a new management directive has emerged to meet the changed nature of customer demands and interactions as well as the need to differentiate within the market. This directive has one goal: providing a differentiated customer service experience. As products become increasingly commoditized, organizations can set themselves apart from their competitors by providing a unique customer service experience that creates a "relationship" based on intangible benefits that their customers will find hard to give up. While this vision is theoretically sound, it requires a significant tactical shift in business thinking and processes. The modern customer's habits and service requirements have changed radically. Meeting these needs challenges many historically held beliefs and practices regarding the customer and modes of interaction.
Tags : 
    
Service Now
Published By: Kapost     Published Date: Jan 16, 2014
Today, the internet has changed the way buyers discover solutions. More people are meeting and researching vendors online than ever before. Your ideal customers are reading blog posts and articles, checking Facebook, Twitter, and LinkedIn profiles, and forming opinions based on what you say and share online. Before they call to get to know your company better, they turn to Google for answers and information. If a competing vendor appears smarter, more interesting, or more reliable than you, your buyers will reach out to them first. These online engagements have changed the rules of buyer/brand communications. So how can you and your company form meaningful relationships with buyers who are getting to know you long before they’ve been introduced?
Tags : 
content marketing, content strategy, content management, content planning, content distribution, marketing campaigns, marketing campaign management, content marketing platform, content marketing software, editorial strategy, marketing campaign planning, content marketing best practices, content marketing companies, editorial content, content marketing workflow
    
Kapost
Published By: IBM     Published Date: Jul 14, 2016
If your company is engaged in international activities, it's critical that you assess and understand the risks of non-compliance with the Foreign Corrupt Practices Act (FCPA). To avoid becoming a costly statistic, you need to design your controls accordingly. Download this white paper from experts Joseph Howell, Cofounder and Executive Vice President at Workiva, and Brent Macey, Director of Internal Audit for Schnitzer Steel Industries, Inc. They'll discuss the major components of the FCPA, and how companies can perform the risk assessment process in an efficient manner. They'll also provide a practical guide to implement internal controls for FCPA at an international level.
Tags : 
best practices, risk management, foreign corrupt practice act, technology, business management, business technology
    
IBM
Published By: Centric Software     Published Date: Dec 20, 2010
Customers should see meaningful returns on PLM investments within one product cycle, or 4 to 6 months.
Tags : 
product lifecycle management, plm, plm software, manufacturing best practices
    
Centric Software
Published By: Salesforce.com     Published Date: Sep 16, 2013
What can the World's #1 CRM app do for you? Download this ebook now and get a taste of the world's #1 sales, service, and marketing app. Download now.
Tags : 
crm, customer relationship management, application, technology, sales results, best practices, it management, knowledge management, data management, business technology, data center
    
Salesforce.com
Published By: BitSight Technologies     Published Date: Aug 02, 2016
Organizations today aren’t just single entities—they are networks of partners, vendors, and third parties. While interconnected networks are critical for success in most businesses, they also leave data more vulnerable to exposure from bad actors. Because of this, vendor risk management (VRM) is a critical business practice.
Tags : 
    
BitSight Technologies
Published By: Concur     Published Date: Jan 14, 2013
Where was the most popular place worldwide for business travelers to dine out, drive in or hang their hat in 2011? This report reveals where travelers are spending money, where they aren’t, and what the state of the industry is at home and abroad.
Tags : 
business expense, cloud expense management, cloud expense reporting, expense best practices, expense management, expense management best practices, expense management report, expense management research, expense management study, expense report software, expense reporting, expense research, expense software, t&e best practices, t&e report, travel expense management, travel expense software, travel expense cloud, mobile expense management, mobile expense
    
Concur
Published By: Sitecore     Published Date: Nov 04, 2009
This report highlights the strategic value of a next generation web content management system integrated with lead scoring, email marketing, customer relationship management, and web analytics. The report links the technology and practices of Best-in-Class organizations to engage customers, provide personalized experiences and manage the lead lifecycle.
Tags : 
sitecore, aberdeen, lifecycle management, web content management, analytics, crm, emarketing, email marketing, lead generation
    
Sitecore
Published By: Plex Systems     Published Date: Feb 26, 2014
Plex is the easy way for a processor to ensure compliance, have complete quality assurance and traceability, and have a record of ingredients movements up and down the supply chain. Using Plex means a processor can always know the product genealogy in high detail.
Tags : 
cloud, plex, erp, cloud computing, manufacturing, management, best practices, productivity, high level production
    
Plex Systems
Published By: Dassault Systèmes     Published Date: Aug 08, 2017
Learn how Dassault Systèmes Program Management solutions can help Aerospace and Aviation companies reliably execute on their proposed plans to meet their design, cost and schedule targets. Read this whitepaper and gain insights into new practices in four key areas: • Consolidate all program data in one central data repository to use institutional knowledge and improve design analysis and decision support • Data reuse between organizations to avoid duplicate efforts and misunderstandings • Real-time reporting automation of key data to assess program performance and anticipate risks and opportunities • Program control with real-time, up-to-date, detailed and verifiable information while preserving program and partner IP
Tags : 
dassault, systemes, program management, aerospace and aviation, program data, automation
    
Dassault Systèmes
Published By: NetApp     Published Date: Feb 14, 2017
All-flash storage arrays—with increasingly attractive performance levels— are a much sounder investment than traditional spinning disks. If you’re looking for affordable ways to boost application performance and simplify data management, you need to evaluate flash technology and how it can deliver a compelling return on investment. Watch this short webcast featuring industry experts including IDC, discuss proven strategies and best practices.
Tags : 
netapp, database performance, flash storage, data management, cost challenges
    
NetApp
Published By: Kronos     Published Date: Sep 24, 2018
When a government organization deploys lean workforce management practices, it affects their largest operational expense: the workforce. As the public sector moves to reinvent itself, workforce management systems and adopting lean labor practices are perhaps two of the most immediate and high-impact mechanisms. Lean practices help government organizations control labor costs and allow them to reallocate those savings into preserving critical programs, services, and jobs ... which is the very essence of the public sector mission.
Tags : 
    
Kronos
Published By: Datastax     Published Date: Aug 15, 2018
"True data protection and compliance starts at the data layer. When enterprises think of how best to protect their data and meet ever stricter and more complex compliance requirements, they should first and foremost be considering their data management solution. Read this white paper to learn how DataStax Enterprise Advanced Security allows enterprises to protect their data via features such as authentication, authorization, and data auditing, and also meet regulatory compliance requirements by leveraging advanced security features in accordance with best practices."
Tags : 
    
Datastax
Published By: Datastax     Published Date: Aug 27, 2018
"True data protection and compliance starts at the data layer. When enterprises think of how best to protect their data and meet ever stricter and more complex compliance requirements, they should first and foremost be considering their data management solution. Read this white paper to learn how DataStax Enterprise Advanced Security allows enterprises to protect their data via features such as authentication, authorization, and data auditing, and also meet regulatory compliance requirements by leveraging advanced security features in accordance with best practices."
Tags : 
    
Datastax
Published By: Datastax     Published Date: Aug 28, 2018
"True data protection and compliance starts at the data layer. When enterprises think of how best to protect their data and meet ever stricter and more complex compliance requirements, they should first and foremost be considering their data management solution. Read this white paper to learn how DataStax Enterprise Advanced Security allows enterprises to protect their data via features such as authentication, authorization, and data auditing, and also meet regulatory compliance requirements by leveraging advanced security features in accordance with best practices."
Tags : 
    
Datastax
Published By: eG Innovations     Published Date: Jun 13, 2008
This EMA white paper investigates virtualization management issues in detail, outlining the key drivers and outcomes of virtualization, explaining critical inhibitors to virtualization success (and how to overcome them), and describing core virtualization performance management solution requirements. It also briefly describes one such solution, the eG Enterprise Suite, and includes a short case study highlighting this solution in action.
Tags : 
virtualization management, application performance management, it infrastructure management, root cause diagnostics, eg innovations, virtualization, it management
    
eG Innovations
Published By: IBM     Published Date: Apr 18, 2012
Integrated Services Management, or ISM, is a major evolutionary force guiding management technology and practice progress in enterprises today. The implications of ISM are broad, but the essence of the initiative is a re-thinking of how IT delivers value to the organization it serves, and a re-framing of all IT contributions around the concept of services.
Tags : 
ibm, technology, powervm, vmware, virtualization, intel platform, technology platform, business technology
    
IBM
Published By: Tripwire     Published Date: Mar 31, 2009
Learn the basics about security benchmarks, and specifically how the security benchmarks developed by the Center for Internet Security (CIS) can help you with your compliance initiatives.
Tags : 
center for internet security, cis, tripwire, compliance, internet security, cis-certified, framework, regulation, security investment, risk, risk management, it security, cis benchmark, e-commerce security, gramm-leach-bliley act (glba), sarbanes-oxley act (sox), health insurance portability, accountability act (hipaa), windows server, sysadmin
    
Tripwire
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add A White Paper

Email sales@inetinteractive.com to find out about white paper options for your company.