RecruitingBlogscom

Follow Us:

 

business practices

Results 501 - 525 of 565Sort Results By: Published Date | Title | Company Name
Published By: Quocirca     Published Date: Mar 20, 2008
After years of uncontrolled growth, many data centers face a crisis as they run into space and power constraints. While remedies exist, present business practices do not encourage the prioritization of power reduction within one of the most power hungry areas of a business — the data center.
Tags : 
quocirca, scalability, power, data centre, data center, servers, network management, it management
    
Quocirca
Published By: Infor     Published Date: Feb 27, 2007
A fast-growing supplier, NEI's delivery performance was declining, creating a significant problem with past-due shipments, even though the company had an excess of finished goods. Access this case study to learn about how they addressed their challenges.
Tags : 
productivity, supply chain management, scm, product lifecycle management, enterprise resource planning, erp, customer service, customer satisfaction
    
Infor
Published By: Infor     Published Date: May 25, 2007
External forces can knock your business off balance with no warning. To meet these external challenges, you need the capability to extend supply chain visibility, respond to changes in real time, and improve performance measurement across the entire chain.
Tags : 
supply chain, scm, business management, bpm, best practices, customer service, manufacturing, manufacture
    
Infor
Published By: Adlib Software     Published Date: Aug 21, 2007
Read this whitepaper to learn about PDF/A and how it must be implemented in conjunction with tools and applications to manage records according to the various business practices and recordkeeping processes today's information-dependant organizations employ.
Tags : 
data management, adlib, adlib software, document management, pdf, portable document format, adobe acrobat, pdfs
    
Adlib Software
Published By: AT&T     Published Date: Jun 25, 2008
Whether you’re implementing new technologies, upgrading existing infrastructure or evaluating current needs, consultants can help you identify and document the gap between your current situation and a desired future state. When an assessment is done correctly, it can provide a solid foundation for successful implementation and improvement. The consultant first interviews stakeholders, analyzes data, and compares your business against best practices or specific industry competitors.
Tags : 
consulting, consult, consultant, management, expert, expertise, guidance, implementation
    
AT&T
Published By: Tideway Systems     Published Date: Dec 11, 2007
IT service providers need to offer services that deliver new business opportunities whilst increasing levels of availability, controlling risks and reducing costs. This paper provides you with practical guidance based on the practices in ITIL® V3 that will help you manage application and infrastructure changes and configurations.
Tags : 
service management, itil, change management, configuration management, knowledge management, service strategy, service design, tideway
    
Tideway Systems
Published By: eG Innovations     Published Date: Jun 13, 2008
This EMA white paper investigates virtualization management issues in detail, outlining the key drivers and outcomes of virtualization, explaining critical inhibitors to virtualization success (and how to overcome them), and describing core virtualization performance management solution requirements. It also briefly describes one such solution, the eG Enterprise Suite, and includes a short case study highlighting this solution in action.
Tags : 
virtualization management, application performance management, it infrastructure management, root cause diagnostics, eg innovations, virtualization, it management
    
eG Innovations
Published By: ZSL Inc.     Published Date: Dec 16, 2008
This paper explains the constraints in using the legacy systems and the essential of modernizing the legacy systems and strategic alignment of IT with business. We have discussed different approaches towards modernizing the legacy systems and the ways to make your legacy modernization a success. Along the way, we have explained the benefits and possibilities of maximizing ROI and lowering TCOs by effectively modernizing your legacy applications and aligning IT and business practices.
Tags : 
zsl, legacy modernization, roi, soa, data management, enterprise applications
    
ZSL Inc.
Published By: ZSL Inc.     Published Date: Jul 20, 2009
Organizations have implemented enterprise applications such as ERP and CRM for business process execution but have failed to address the key enterprise asset: data. In the current economic environment, enterprises that fail to capitalize on their data assets jeopardize their cost structures and their earnings potential. It is vital for organizations to leverage their data assets to measure their business performance, identify the weak poles and strategic improvement spots to scale their business to new heights. Business Intelligence (BI), the recent innovation in IT, has emerged to be a potential hope for the organizations to build a strong business milieu without any new asset investments and utilizing the existing key assets of the organizations.
Tags : 
business intelligence, zsl, erp, crm, enterprise application, enterprises, investments, business transformation
    
ZSL Inc.
Published By: Likewise Software     Published Date: Oct 07, 2008
This document describes how Likewise and Microsoft Active Directory can foster compliance with the Payment Card Industry Data Security Standard, a set of requirements for businesses that process payment card information. Developed by Visa, American Express, Discover Financial Services, and other members of the PCI Security Standards Council, the standard sets forth policies, procedures, and practices to protect customer account data. The standard includes specific requirements for strictly controlling access to customer data, authenticating business users, monitoring access, maintaining a secure network, and auditing system resources. Likewise integrates Linux, Unix, and Mac OS X workstations and servers into Active Directory, providing the basis to assign each user a unique ID for authentication, authorization, monitoring, and tracking. Likewise also provides group policies for non-Windows computers so that their security settings and other configurations can be centrally managed in the same way as Windows computers.
Tags : 
likewise, pci data security, linux, unix, mac os x, windows
    
Likewise Software
Published By: MoreVisibility     Published Date: Mar 28, 2012
Curious if your social media efforts are measuring up for your business? Then take a moment to see what best practices we advise upon to ensure social media success.
Tags : 
morevisibility, google, marketing, social media, emerging marketing, internet marketing, digital media
    
MoreVisibility
Published By: Symantec.cloud     Published Date: Nov 29, 2010
This paper will provide advice, best practices, and insight on how to create security and management policies for a wireless workforce.
Tags : 
messagelabs symantec hosted services, wireless workforce, mobile data security, data and services, business practices, security, management policy
    
Symantec.cloud
Published By: Webtrends     Published Date: Jun 13, 2011
Awareness, conversion, retention. As a marketer, your job hasn't changed, but the digital ecosystem changes fast. In this whitepaper from the CMO Council, top marketing execs discuss digital challenges and the resulting opportunities. Sponsored by Webtrends.
Tags : 
webtrends, cmo, international, digital marketing, process, partnerships, go-to-market, customer experience
    
Webtrends
Published By: SAS     Published Date: Aug 04, 2016
A persistent skills gap plagues employers in all major industries, spurring SAS to provide additional resources that support the next generation of analytical talent. But we know the skills gap can mean different things to different people. This e-book features interviews with those who employ, possess, and educate analytics talent. Keep reading to learn how employers, educators and students are working to fill the analytics skills gap.
Tags : 
best practices, competitive advantage, business practices, ebook
    
SAS
Published By: Focus     Published Date: Feb 02, 2011
Learn how Webinar effectiveness defines the 9 Management Practices any company can embrace to ensure their Webinar initiative becomes the cornerstone of a proven lead-generation engine.
Tags : 
citrix, webinar, business practices, lead-generation, lead gen, leads, integration, b2b
    
Focus
Published By: Integrated Research     Published Date: Apr 13, 2011
"How to be a Sustainable IT Hero: Building a Business Case for PC Power Management" explains the benefits of implementing a PC Power Management solution, and shows how to avoid the common pitfalls along the way.
Tags : 
energy management software, power management, pc power management, power management software, computer power management, green technology, how to save electricity, save power
    
Integrated Research
Published By: Achievers     Published Date: Nov 08, 2013
Recent research conducted by Harvard Business Review Analytic Services and Achievers reveals how best-in-class companies gain a competitive advantage by improving their employee engagement initiatives. Download The impact of employee engagement on performance and learn best practices for tying engagement to business performance, the business case for employee engagement and helpful metrics to measure the impact of engagement.
Tags : 
employee engagement, business results, performance management, employee metrics, human resources
    
Achievers
Published By: Liaison Technologies     Published Date: Jun 03, 2011
Tune in to this Tokenization webcast where we'll discuss the business drivers behind tokenization, exactly what 'tokenization' is, some best practices for a successful implementation, and lastly, a customer example of tokenization used to reduce the PCI DSS audit scope.
Tags : 
liaison, nubridges, tokenization implementation, pci dss audit scope, gary palgon, brian grafsgaard, data protection
    
Liaison Technologies
Published By: Dell Storage     Published Date: Aug 14, 2012
Engagement with customers online has evolved from novelty to necessity, with an estimated $202 billion spent in 2011 and projected 10% growth to $327 billion in 2016, according to Forrester Research. Businesses are maneuvering to connect with the growing pool of online customers, but the move to eCommerce brings new security risks with the exchange of sensitive consumer information, including cardholder data and personally identifiable information that can enable identity theft. At stake is reputation of brand, ongoing access to merchant credit lines, and substantial penalties and remediation in the event of a breach. This white paper elucidates the aspects of PCI DSS (Payment Card Industry Data Security Standards) compliance that must be considered when choosing a secure environment for servers involved in eCommerce. Whether deciding to outsource or keep data hosting in-house, any company collecting, storing or transmitting customer cardholder data needs to be compliant, and this document helps pinpoint the specific concerns and standards a company should be aware of when choosing how to keep their data secure. Understanding requirements and best practices for security policies and procedures, physical safeguards, and security technologies is essential to establishing cardholder data security and meeting QSA and SAQ audit requirements.
Tags : 
pci, compliant, data, centers, engagement, connect, ecommerce, compliance
    
Dell Storage
Published By: HP and Intel® Xeon® processors     Published Date: Dec 20, 2012
Learn more about HP Business Protection, which includes components that improve reliability, disaster recovery and overall systems management, help physician practices manage IT risk, improve services and protect their business.
Tags : 
strategy guide, business protection, physician practices, healthcare, information technology, practice management
    
HP and Intel® Xeon® processors
Published By: uberVU via HootSuite     Published Date: Oct 10, 2012
Find out how to use our Facebook Timeline best practices to help your organization build an effective social media strategy, strengthen relationships with your brand's community and see your ROI on your Facebook campaign.
Tags : 
social media management, social media strategy, social media strategies, social strategy, social business, social enterprise, enterprise social networks, facebook strategies
    
uberVU via HootSuite
Published By: CDW     Published Date: Feb 27, 2015
Man Investments is one of the world’s largest independent alternative asset managers. With a fast moving and diverse IT infrastructure, Man needed to be able to automate software license compliance reporting in conjunction with optimizing license usage and sourcing.
Tags : 
software management, sam, software security, cloud computing, enterprise content management, business intelligence, office productivity apps, network security
    
CDW
Published By: CDW     Published Date: Feb 27, 2015
Bank of Ireland is a leading retail and commercial bank. Snow has helped Bank of Ireland streamline and optimize its software licensing.
Tags : 
software management, sam, software security, cloud computing, enterprise content management, business intelligence, office productivity apps, network security
    
CDW
Published By: CDW     Published Date: Feb 27, 2015
The real test of any SAM system goes beyond creating a one-time Effective Licensing Position (ELP) for a given software publisher. To be truly valuable, the SAM solution has to have the ability to manage change. Being able to work from a dependable list of software that has been approved by, and which also serves the business, means that finite IT & SAM resources are not wasted through the support of legacy software that might be deemed redundant, and should keep a company on track technically by not becoming dependent on aging software. This 10 –Minute Guide from SAM experts at Snow Software will show how to establish and maintain a Software Catalog for the purpose of ensuring that your software estate remains relevant and fit for its business purpose.
Tags : 
software management, sam, software security, cloud computing, enterprise content management, business intelligence, office productivity apps, network security
    
CDW
Published By: CDW     Published Date: Feb 27, 2015
In a perfect world, managing the discovery of software assets, the capture of license entitlements and optimization of an organization’s software usage and compliance situation would be a single-click operation. Unfortunately, the world is not perfect and those charged with managing an organization’s software compliance, availability and expenditure face a number of challenges that can easily derail a Software Asset Management (SAM) program. This paper from the SAM experts at Snow Software investigates some of the major challenges facing SAM managers and IT executives and highlights how to build a successful strategy to overcome them, ensuring the SAM program delivers true value to the business.
Tags : 
software management, sam, software security, cloud computing, enterprise content management, business intelligence, office productivity apps, network security
    
CDW
Start   Previous    9 10 11 12 13 14 15 16 17 18 19 20 21 22 23    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.

© 2019  Created by RecruitingBlogs.   Powered by

Badges  |  Report an Issue  |  Terms of Service

scroll to the top