Best Practices White Papers

Best Practice is a management idea which asserts that there is a technique, method, process, activity, incentive or reward that is more effective at delivering a particular outcome than any other technique, method, process, etc. The idea is that with proper processes, checks, and testing, a project can be rolled out and completed with fewer problems and unforeseen complications.
Results 1 - 25 of 911Sort Results By: Published Date | Title | Company Name
By: IBM     Published Date: Feb 19, 2015

Refining business processes can be the key to achieving operational excellence.

Tags : business analytics, ibm, predictive analytics, performance management, it management, knowledge management, best practices, business intelligence
    
By: Windstream     Published Date: Feb 09, 2015

The Path to Value in the Cloud, by Oxford Economics and Windstream, brings together the latest insights, tactics and strategies C-suite respondents are using to make the cloud work for them.

Tags : windstream, solutions, smart, personalized, service, enterprise technology, cloud, computing
    
By: Harvard Business School     Published Date: Feb 04, 2015

It’s easy to generate a burst of revenue. But will your strategies deliver consistently high profits over the long term? Discover the risks of strategic inertia and learn how to develop strategies that keep your firm on top—today and tomorrow.

Tags : strategy, competitive advantage, sustainable competitive advantage, global competition, technological innovation, formulate action plans, harvard business school, executive education
    
By: BitSight Technologies     Published Date: Feb 03, 2015

Download "Making Risk Management More Effective with Security Ratings" to learn how BitSight is revolutionizing the way organizations manage security risk throughout their ecosystem.

Tags : risk management, security ratings, compliance mandates, executive reporting, security risk assessments, security, it management, knowledge management
    
By: BitSight Technologies     Published Date: Feb 03, 2015

In this white paper, Jon Oltsik, Senior Principle Analyst at Enterprise Strategy Group, explores the need for objective security performance metrics in order to identify, quantify and mitigate cyber risk across the business ecosystem.

Tags : security ratings, it risk mitigation, cyber risk, performance metrics, network security risk, security, it management, knowledge management
    
By: Harvard Business School     Published Date: Jan 30, 2015

Market leaders build innovative strategies that drive industry change. Harvard Business School’s one-week strategy program for senior executives can help you master strategy development and execution—and set the stage for sustainable competitive advantage.

Tags : strategy, competitive advantage, sustainable competitive advantage, global competition, technological innovation, formulate action plans, harvard business school, executive education
    
By: Teradata     Published Date: Jan 30, 2015

Hadoop is the rising star of the business technology agenda for a simple reason — it disrupts the economics of data, analytics, and someday soon, all enterprise applications; it is secretly becoming an application platform too. Application development and delivery (AD&D) professionals should be aware of and take action on these eight predictions, including the disruptive power of “Hadooponomics,” Hadoop’s current killer app, the closing data management gap, and the emergence of brand new distros.

Tags : hadoop, hadoop adoption, cornerstone, business technology, hadooponomics, enterprise adoption, applications, data management
    
By: Teradata     Published Date: Jan 28, 2015

Althrough Hadoop and related technologies have been with us for several years, most business intelligence (BI) professionals and their business counterparts still harbor a few misconceptions that need to be corrected about Hadoop and related technologies such as MapReduce. This webcast presents the 10 most common myths about Hadoop, then corrects them. The goal is to clarify what Hadoop is and does relative to BI, as well as in which business and technology situations Hadoop-based BI, data warehousing and analytics can be useful.

Tags : teradata, business, intelligence, hadoop, data, integration, analytics, mapreduce
    
By: Comcast     Published Date: Jan 15, 2015

For most small and mid-sized businesses the future is all about growth, and a cloud-based approach to information technology is inherently supportive of growth strategies.

Tags : comcast, technology, business, blueprint, plan, start-up, start, future
    
By: Comcast     Published Date: Jan 15, 2015

Technology evolves at breakneck speed, and it plays an increasingly important role in the success of all types of businesses, regardless of size.

Tags : comcast, technology, business, blueprint, plan, start-up, start, future
    
By: LogMeIn     Published Date: Jan 06, 2015

This White Paper provides information on how to avoid technology frustrations that sap productivity.

Tags : online meetings, business online meetings, how to improve online meetings, online conferences, network performance, quality of service, remote access, remote network management
    
By: MaaS360 by Fiberlink     Published Date: Sep 30, 2014

There's an app for that, but is it secure? Mobile Application Lifecycle Management (MALM) is the key to ensuring the protection of apps and associated data by integrating security throughout the end to end process.

Tags : application security, mobile enterprise, malm, device compliance, data loss prevention, it management, application performance management, best practices
    
By: Kaspersky     Published Date: May 20, 2014

Virtualization promises to boost efficiency and cut costs. Whether you’re running applications on physical or virtual machines, you still need to stay vigilant to guard against the constant and growing hazard of malware and other cyberthreats that can put your business at risk. This guide will show you how.

Tags : virtualization, kaspersky, virtualization security, cyberthreat, hackers, phishing, security breach, intrusion prevention
    
By: LogMeIn     Published Date: Jan 15, 2014

A Quick Guide for More Profitable Sales Meetings.

Tags : logmein, client expectations, sales meetings, sales, build relationships, business solutions, share information, engage clients
    
By: CompareBusinessProducts     Published Date: Feb 27, 2015

The business phone system search can be a complex one… but there are some must-have features that will help you narrow down your search. Our new infographic details the features that really matter for most businesses.

Tags : phone system, the cloud, byod, identity phone, integration, business tools, communication value, value pyramid
    
By: CompareBusinessProducts     Published Date: Feb 27, 2015

One sign that your phone system is getting obsolete is when your spare parts are available on order only, and it takes a week for the items to arrive. Our infographic unveils the other symptoms!

Tags : phone system, the cloud, byod, identity phone, integration, business tools, communication value, value pyramid
    
By: Riverbed     Published Date: Feb 26, 2015

In the world of network management, knowledge is power. But many organizations know a lot less about their network than they think. With proper network auditing and configuration, businesses can fill this knowledge gap.

Tags : network management, network auditing, automation, key network management processes, audit, network infrastructure, network performance, best practices
    
By: Riverbed     Published Date: Feb 26, 2015

The goal of understanding and managing service behavior remains elusive. Failure to adopt operational practices such as service portfolio management, process refinement, consolidation of tools, and consolidation of the organizational entities themselves explain most of the trouble.

Tags : service management, application visibility, operational practices, infrastructure, application monitoring, database monitoring, cloud performance management, network management
    
By: Riverbed     Published Date: Feb 26, 2015

The Riverbed SteelCentral network performance management suite of products provides considerable advantages over those of JDSU Network Instruments because of its breadth, depth and ease of use to quickly understand and pinpoint the root cause of performance problems.

Tags : network performance management, performance issues, performance management, end-user experience management, cloud computing, mobile device, network management, network performance
    
By: Riverbed     Published Date: Feb 26, 2015

Hospitals and healthcare providers are united under one central mission: to provide exceptional care to patients while keeping costs down. Increasingly, that’s being accomplished through technology, and healthcare providers are becoming incredibly dependent on IT for their day-to-day operations.

Tags : healthcare, daily operations, health record system, practice management, coding software, health statistics, prescribing systems, healthcare providers
    
By: CDW     Published Date: Feb 24, 2015

Software piracy, whether accidental or malicious, is a problem for software vendors as these activities can directly affect the bottom line. Organizations that use software are affected as well. Along with rising software prices, they can face stiff fines and other costs for noncompliance with software licenses. This can come as a result of an audit that software vendors are more inclined to initiate in a lackluster economy. This white paper will discuss actions to take before, during and after an audit. As well as outline the best ways for the enterprise to remain compliant with software licenses.

Tags : software piracy, software vendors, audit, software licenses, software compliance, piracy misconceptions, auditing, compliance
    
By: Echelon     Published Date: Feb 19, 2015

Making outdoor lighting more efficient, safe, and affordable with open-standard control networking technology

Tags : outdoor lighting, smart lighting, smart cities, outdoor lighting controls, commercial lighting, wireless outdoor lighting, rf outdoor lighting, power-line based outdoor lighting
    
By: Echelon     Published Date: Feb 19, 2015

Parking lot, area, and pathway lighting that burns all night represents a significant source of energy waste and contributes to needless sky glow and light pollution. Learn how that can be avoided with this whitepaper.

Tags : outdoor lighting, commercial lighting, wireless outdoor lighting, rf outdoor lighting, lighting controls, outdoor lighting controls, outdoor lighting solutions, lumewave
    
By: Cisco     Published Date: Feb 17, 2015

Analyst brief brought to you by NSS Labs. Where the goal of cyberprevention has been to reduce the probability of an attack against the organization, cyber resilience looks to reduce the impact of these attacks through cyber risk management. A cyber resilience program still considers detection and prevention techniques, but it also assumes that a breach is likely. This stance emphasizes anticipation, agility, and adaptation. Not every attack can be prevented, but with a cyber resilience program, damage can be mitigated or avoided altogether.

Tags : cisco, nss, cyber, prevention, risk management, resilience, firewall, security
    
By: Cisco     Published Date: Feb 17, 2015

The Cisco 2015 Annual Security Report, which presents the research, insights, and perspectives provided by Cisco® Security Research and other security experts within Cisco, explores the ongoing race between attackers and defenders, and how users are becoming everweaker links in the security chain.

Tags : cisco, security, report, 2015, threat, intelligence, capabilities, benchmark
    
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End

Related IT Whitepaper Topics

Add White Papers

Get your company's white papers in the hands of targeted business professionals.