RecruitingBlogscom

Follow Us:

 

business

Results 13401 - 13425 of 14494Sort Results By: Published Date | Title | Company Name
Published By: Adaptive Planning     Published Date: Oct 19, 2011
Despite a number of compelling reasons to move away from annual plans and budgets, many CFOs are reluctant to make the change. They fail to recognize that there are alternative (and less dysfunctional) ways of driving performance improvement and making managers accountable for performance. CFOs need to implement systems that provide managers at every level with the capability to make fast, well-informed decisions. They need to replace annual planning cycles with more regular business reviews that enable managers to see trends, patterns, and "breaks in the curve" long before the competition.
Tags : 
adaptive, marketry, cfo, business, finance, decision making
    
Adaptive Planning
Published By: Adaptive Planning     Published Date: Oct 19, 2011
This article includes a one-page preview that quickly summarizes the key ideas and provides an overview of how the concepts work in practice along with suggestions for further reading.
Tags : 
harvard business, finance, business, analytics, data, adaptive, marketry
    
Adaptive Planning
Published By: Adaptive Planning     Published Date: Oct 19, 2011
It's inefficient, ages too quickly, and is out of sync with the strategic plan. No wonder so many executives hate toiling over the annual budget. But, says Peter Horvath, don't look to the budget as the sole management system. Horvath and his associate Ralf Sauter describe six ways to fix budgeting, including integrating it with such systems as the Balanced Scorecard, so that it supports strategy execution in today's fast-changing environment.
Tags : 
adaptive, marketry, business, finance, accounting, budget
    
Adaptive Planning
Published By: Adaptive Planning     Published Date: Oct 19, 2011
Grounded in extensive research, Reinventing the CFO outlines seven critical roles--from streamlining redundant processes to regulating risk to identifying a few key measures--that CFOs must take on to transform the finance operation successfully. Challenging many of the finance field's accepted practices and systems, this bold book revolutionizes the role of financial managers and frees them to make smart, ethical, strategic decisions that add real value to the firm.
Tags : 
adaptive, marketry, cfo, harvard review, business, finance, finance operations
    
Adaptive Planning
Published By: Blue Coat Systems     Published Date: Oct 24, 2011
View this paper now to explore the top 4 security risks businesses face when using social networks and ways to protect against and mitigate the risks.
Tags : 
blue coat, insider threats, security, social media risks, twitter risks, facebook risks, linkedin risks, secure web gateway
    
Blue Coat Systems
Published By: Blue Coat Systems     Published Date: Oct 25, 2011
IT and business leaders must ensure they have the right security strategies to protect against the rapid evolution of social networking threats
Tags : 
blue coat, insider threats, security, social media risks, twitter risks, facebook risks, linkedin risks, secure web gateway
    
Blue Coat Systems
Published By: Blue Coat Systems     Published Date: Oct 25, 2011
Take a look at this techincal overview to see how Blue Coat's defense systems, powered by WebPulse helps businesses get in front of malware networks
Tags : 
blue coat, insider threats, security, social media risks, twitter risks, facebook risks, linkedin risks, secure web gateway
    
Blue Coat Systems
Published By: Dell Storage     Published Date: Mar 06, 2012
By enabling organizations to centralize desktop deployment, a VDI can help simplify admin and reduce costs while enhancing security and regulatory compliance and increasing IT flexibility and business agility. Don't wait - find out more now.
Tags : 
technology, dell, storage center, storage, san, vmware, desktop management, infrastructure
    
Dell Storage
Published By: Dell Storage     Published Date: Aug 14, 2012
The importance of healthcare providers to assure their patients the utmost security, confidentiality and integrity of their sensitive information cannot be understated. This means being HIPAA compliant within every aspect of their practice, with a particular emphasis on the components of their healthcare IT infrastructure This white paper described elements and best practices of a HIPAA compliant data center. This comprehensive guide spans the administrative, physical, and technical safeguards of the HIPAA Security rule from the physical security and environmental controls necessary of the facility itself, to the requirements needed between a Covered Entity (CE) and the data center provider when outsourcing. Detailing both the benefits and risks of a third-party partnership, this white paper provides answers to key questions such as what exactly makes a data center HIPAA compliant, what to look for when choosing a service provider to work with, and why a Business Associate Agreement (BAA) is important for establishing accountability with these partners.
Tags : 
hipaa, compliant, data, center, centers, healthcare, providers, assure
    
Dell Storage
Published By: Dell Storage     Published Date: Aug 14, 2012
Engagement with customers online has evolved from novelty to necessity, with an estimated $202 billion spent in 2011 and projected 10% growth to $327 billion in 2016, according to Forrester Research. Businesses are maneuvering to connect with the growing pool of online customers, but the move to eCommerce brings new security risks with the exchange of sensitive consumer information, including cardholder data and personally identifiable information that can enable identity theft. At stake is reputation of brand, ongoing access to merchant credit lines, and substantial penalties and remediation in the event of a breach. This white paper elucidates the aspects of PCI DSS (Payment Card Industry Data Security Standards) compliance that must be considered when choosing a secure environment for servers involved in eCommerce. Whether deciding to outsource or keep data hosting in-house, any company collecting, storing or transmitting customer cardholder data needs to be compliant, and this document helps pinpoint the specific concerns and standards a company should be aware of when choosing how to keep their data secure. Understanding requirements and best practices for security policies and procedures, physical safeguards, and security technologies is essential to establishing cardholder data security and meeting QSA and SAQ audit requirements.
Tags : 
pci, compliant, data, centers, engagement, connect, ecommerce, compliance
    
Dell Storage
Published By: Gleanster     Published Date: Nov 10, 2011
This comprehensive 25-page benchmark report explores the elements of a successful BI strategy along with a full vendor landscape. Some of the best examples of rapid ROI from BI projects are associated with tactical implementations that emphasize immediate results over a perfect system architecture.
Tags : 
    
Gleanster
Published By: Tririga     Published Date: Nov 14, 2011
Take a look at this white paper to find out how asset and integrated workplace management can help create smarter buildings!
Tags : 
sustainable, operations, business, integrated, resources, consumption, competitive advantage, finance
    
Tririga
Published By: Tririga     Published Date: Nov 14, 2011
Purchasing a new software package like the IWMS from TRIRIGA, an IBM Company, could be viewed as a great investment especially, if money is available.
Tags : 
iwms, integrated workplace management, business case
    
Tririga
Published By: Workforce Software     Published Date: Nov 17, 2011
During the past several years, challenges such as increased regulatory pressures, employee fatigue and the ever-present need to reduce costs have all weighed heavily on most human resource organizations. As a result, HR and payroll professionals are playing an increasingly strategic role in the day-to-day operation of the business.
Tags : 
workforce management software, labor laws, california labor laws, change management, labor law compliance, time and attendance, time and attendance software, labor scheduling
    
Workforce Software
Published By: Tibco Spotfire     Published Date: Nov 30, 2011
In this recorded webinar you will also learn why in-memory architecture and collaborative functionality are key to successful Agile BI applications.
Tags : 
    
Tibco Spotfire
Published By: Oracle     Published Date: Feb 28, 2012
In 7 simple steps, eBusiness professionals can boost sales and customer satisfaction while reducing customer service costs by delivering the right information and service to the right customer at the right time. Find out how!
Tags : 
on demand, oracle on demand, instant gratification, crm, customer relationship management, deployment, saas, software-as-service
    
Oracle
Published By: Oracle     Published Date: Feb 28, 2012
This white paper describes how B2B organizations can use B2B online commerce to lower costs, retain customers, grow the business, and reduce complexity for customers-all essential activities for competing in the evolving marketplace.
Tags : 
on demand, oracle on demand, instant gratification, crm, customer relationship management, deployment, saas, software-as-service
    
Oracle
Published By: Facebook     Published Date: Dec 28, 2011
Want practical tips on how to get started and drive value using Facebook? Then download the official guide to business success on Facebook.
Tags : 
facebook, marketing, value, new media, emerging marketing, social media
    
Facebook
Published By: Symantec     Published Date: Jan 04, 2012
This paper highlights how attackers distribute malwale and how cybercriminals have developed attack techniques.
Tags : 
ssl, ssl certificates, internet infrastructure services, trust services, extended validation, two-factor authentication, identity protection, ddos mitigation
    
Symantec
Published By: Symantec     Published Date: Oct 02, 2012
Whether you are an individual or a company, you should approach online security in the same way that you would approach physical security for your home or business.
Tags : 
ssl certificates, online security options, business technology
    
Symantec
Published By: Symantec     Published Date: Oct 02, 2012
The Shortcut Guide to Business Security Measures Using SSL
Tags : 
realtime, symantec, ssl, security measures, technology, business technology
    
Symantec
Published By: Symantec     Published Date: Oct 02, 2012
Security and Trust: The Backbone of Doing Business Over the Internet
Tags : 
backbone, security, trust, ssl, internet, data in-transit, business technology
    
Symantec
Published By: AtTask     Published Date: Feb 04, 2012
In this free case study Forrester Research explains how the melding of task management with social networking is increasing transparency and team member buy-in for projects - dramatically increasing projects delivered on time and within budget.
Tags : 
task management software, task tracking software, task software, task project management, business task management software, task it, task tracking, task tracker
    
AtTask
Published By: AtTask     Published Date: Feb 11, 2012
Regardless the structure of your projects and work, the right work management approach can be the formula for success in your organization. This easy to read, 3 page guide, will introduce you to this formula.
Tags : 
successful project techniques, project management success, achieving business success, project management techniques, project success, project success criteria, project success factors, measuring project success
    
AtTask
Published By: AtTask     Published Date: Feb 11, 2012
To protect their investment in a project, an organization needs to engage in a three step process to put a reasonable and viable risk management plan in place. This free guide walks you through the process.
Tags : 
project risk management, risk management tools, it project risk management, enterprise risk management, risk management plan, business risk management, knowledge management
    
AtTask
Start   Previous    530 531 532 533 534 535 536 537 538 539 540 541 542 543 544    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.

© 2019  Created by RecruitingBlogs.   Powered by

Badges  |  Report an Issue  |  Terms of Service

scroll to the top