Best Practices White Papers

Best Practice is a management idea which asserts that there is a technique, method, process, activity, incentive or reward that is more effective at delivering a particular outcome than any other technique, method, process, etc. The idea is that with proper processes, checks, and testing, a project can be rolled out and completed with fewer problems and unforeseen complications.
Results 1 - 25 of 867Sort Results By: Published Date | Title | Company Name
By: Cornerstone OnDemand     Published Date: Dec 12, 2014

The new way of work is multigenerational, multi-geographical, multi-cultural, and location-agnostic and device-independent. Workteam and organizational structures have morphed into more matrixed (vs. hierarchical) arrangements. Find out the different expectations of how, where and what people use to get their jobs done through this whitepaper.

Tags : cornerstone ondemand, millennials, work management, multicultural, work place, gen x, expectations, business management
    
By: Cornerstone OnDemand     Published Date: Dec 10, 2014

With great change comes great opportunity, especially for organizations eager to build success around their talent. Download this whitepaper to see what 7 actions need to be taken to ensure your organization delivers what the people want.

Tags : cornerstone, organizations, boomer exodus, transitions, transparency, employee trust, business management, best practices
    
By: Tyco Integrated Security     Published Date: Dec 08, 2014

In order to protect your business against a potential burglary, it pays to get in the mind of a burglar. So we did just that.

Tags : intrusion, vandalism, theft, burglary, security, best practices, business intelligence
    
By: Tyco Integrated Security     Published Date: Dec 08, 2014

Today’s systems are better at detecting fires than ever before, yet they’re more complex and require maintenance in order to be effective. One missed inspection or instance of deferred maintenance can result in a system that doesn’t work when you need it most. Learn how you can fireproof your business and protect your company and employees.

Tags : business protection, fire safety, security, best practices
    
By: Tyco Integrated Security     Published Date: Dec 08, 2014

Security measures are becoming important aspects of new business opportunities. See how they are benefitting businesses beyond simply securing the environment.

Tags : video surveillance, access control, business intelligence, security, best practices
    
By: Tyco Integrated Security     Published Date: Dec 08, 2014

When theft or violence is mixed with your bottom line, the damage can go way beyond physical and monetary consequences. We’ve outlined some ways you can begin eliminating both internal and external threats.

Tags : business protection, workplace violence, burglary, employee theft, business management, security, best practices, business intelligence
    
By: Ipswitch     Published Date: Dec 01, 2014

You’ve seen the digital evolution that’s taking place in healthcare and you’re at your job every day as this evolution continues—and organizations seek to more efficiently and securely manage the proliferation and management of electronic health records (EHRs) and every type of digital file that relates to patient care.

Tags : ipswitch, healthcare, compliance, file transfer, secure transfer, efficiently transfer, clinical data, medical file
    
By: ADP AdvancedMD     Published Date: Nov 17, 2014

Private practices are now among the largest unsecured credit grantors in the country. As the money from insurance companies decreases, patient portions have increased. As a result, both patient liability and bad debt are on the rise and healthcare providers are experiencing unprecedented revenue and margin pressure. With this whitepaper, you can learn how to improve the process of patient payments.

Tags : adp, advancedmd, patient balance, balance collections, best practices, process payments, patient balance, medical debt
    
By: Skyword     Published Date: Nov 14, 2014

Eventually, you’ll want to move your content strategy past awareness-driven content creation and start converting leads. To show meaningful content ROI, you must have a framework in place to create a diverse array of custom content, and this free eBook will give you the tools and strategy to get started. Download it today!

Tags : content strategy, content marketing, b2c content, b2b content, content marketing platform, content marketing agency, brand content, branded content
    
By: SAS     Published Date: Nov 10, 2014

Learn how data is evolving and the 7 reasons why a comprehensive data management platform supersedes the data integration toolbox that you are using these days.

Tags : sas, data integration, data evolution, comprehensive data, data management, data virtualization, data warehouses, data profiling
    
By: SAS     Published Date: Nov 10, 2014

Learn how this upcoming year should be the year you make your big data actionable and see what else you should be doing to maximize its potential.

Tags : sas, data integration, data evolution, comprehensive data, data management, data virtualization, data warehouses, data profiling
    
By: IBM     Published Date: Nov 05, 2014

How security and business continuity can shape the reputation and value of your company.

Tags : ibm, security, cyber security, business intelligence, financial services, protection, secure protection, business security
    
By: IBM     Published Date: Nov 03, 2014

Learn how to understand, manage and debug problems due to size, complexity and scale in operation of virtualized networks for modern data centers, including developer- and user-controlled software in clouds.

Tags : cloud management, virtualized networks, data centers, cloud it optimization, it management, knowledge management, data management, best practices
    
By: IBM     Published Date: Nov 03, 2014

Business critical applications must always be available and performing. Furthermore, the reality is in today's customer centric world, slow is the new broke. Compounding this challenge, IT complexity is rapidly increasing.

Tags : infrastructure visibility, it complexity, search analytics, problem identification, it management, knowledge management, data management, best practices
    
By: CA Technologies     Published Date: Oct 21, 2014

This paper provides new perspectives enabling today's operators to deliver quad play services and more in the face of intense competition

Tags : telco services, virtualization, application automation, quad play services, application integration, application performance management, best practices, business process automation
    
By: IBM     Published Date: Oct 17, 2014

In this first-release MQ, Gartner evaluates providers on service delivery, B2B Network/Collaboration, Integration Functionality and success in capitalizing on vision. Rated against an extensive 15-criteria evaluation, IBM earned one of only three Leader positions, and outpaced the competition in "completeness of vision," signifying our strength in delivering the most competitive solution to the marketplace.

Tags : integration brokerage, service delivery, integration functionality, competitive solutions, it management, data management, best practices, business analytics
    
By: IBM     Published Date: Oct 17, 2014

According to a study from the Aberdeen Group, the number of companies starting initiatives for collaboration has doubled in the last two years. Their research indicates that collaborating with customers and collaborating with partners are both in the top five actions being taken by survey respondents.

Tags : internal collaboration, b2b collaboration, visibility, globalization, data management, best practices, business analytics, business management
    
By: IBM     Published Date: Oct 06, 2014

This ebook presents an overview of the B2B integraiton landscape: its challenges, its opportunities, and the approaches that leading organizations follow in developing a robust and scalable EDI solution. It also summarizes the IBM B2B Cloud Services offering, with real-world examples of how companies are leveraging the IBM Cloud to Excel amid escalation global complexity, demand volatility and new customer requirements.

Tags : cloud integration, b2b, value chain, cloud services, it management, knowledge management, best practices, business intelligence
    
By: Bit9     Published Date: Sep 30, 2014

In October 2013, Bit9 conducted its third-annual survey on server security. In the past year, the inability to detect or stop advanced attacks has remained a constant challenge for enterprises. This survey was designed to analyze these challenges from respondents who are responsible for their organization’s security posture.

Tags : data center security, server security, targeted attacks, data breaches, security, it management, knowledge management, best practices
    
By: Bit9     Published Date: Sep 30, 2014

Regardless of how they initially enter the organization, most attackers today still aim to compromise internal servers to steal user credentials, steal sensitive data, and turn compromised servers into hosting platforms used to help attackers steal even more assets. This SANS whitepaper discusses the methodology of internal and external attacks on data center servers and the applications running on them. It also discusses why, even with our layers of security in place today, servers are still vulnerable, and how organizations can leverage application controls to permit what is known and trusted while denying everything else.

Tags : server security, platform protection, data center servers, server vulnerability, security, knowledge management, best practices, project management
    
By: CA Technologies     Published Date: Sep 11, 2014

In this white paper IT Luminaries Discuss the Major Issues Impacting DevOps today.

Tags : devops, software, training, project management, software development, application integration, application performance management, best practices
    
By: Kaspersky     Published Date: May 20, 2014

Virtualization promises to boost efficiency and cut costs. Whether you’re running applications on physical or virtual machines, you still need to stay vigilant to guard against the constant and growing hazard of malware and other cyberthreats that can put your business at risk. This guide will show you how.

Tags : virtualization, kaspersky, virtualization security, cyberthreat, hackers, phishing, security breach, intrusion prevention
    
By: ServiceNow     Published Date: Mar 27, 2014

Eight top considerations on how to add mobile capabilities and support successfully, with the first three focusing on adding mobile views and functionality to business applications, the next three focusing on using increased mobility to help reinvent IT, and the final two bringing it all together.

Tags : simplify mobility, mobile capabilities, mobile views, functionality, business applications, connectivity, mobile computing, mobile data systems
    
By: Lumension     Published Date: Feb 07, 2014

In this best practice guide, we are going to take a deep dive into a best practice process for patch and vulnerability management, developed by Lumension over thousands of customer engagements.

Tags : lumension, agent maintenance, value and risk, patch management, microsoft’s patch tuesday, it tasks, remediation process, endpoint management and security suite
    
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End

Related IT Whitepaper Topics

Add White Papers

Get your company's white papers in the hands of targeted business professionals.