Best Practices White Papers

Best Practice is a management idea which asserts that there is a technique, method, process, activity, incentive or reward that is more effective at delivering a particular outcome than any other technique, method, process, etc. The idea is that with proper processes, checks, and testing, a project can be rolled out and completed with fewer problems and unforeseen complications.
Results 1 - 25 of 788Sort Results By: Published Date | Title | Company Name
By: Citrix     Published Date: Jul 25, 2014

In this exclusive Security Leadership Series eBook, Citrix chief information security officer Stan Black and chief security strategist Kurt Roemer share security best practices for IT leaders.

Tags : network security, application security, compliance, email security, hacker detection, best practices, software compliance, pci compliance
    
By: Citrix     Published Date: Jul 25, 2014

Managing mobile devices, data and all types of apps—Windows, datacenter, web and native mobile—through a single solution.

Tags : enterprise, mobility, challenge, data, windows, datacenter, web, solution
    
By: Citrix     Published Date: Jul 25, 2014

Discover how to select technologies and develop policies for your BYOD program.

Tags : boyd, simple, secure, technologies, wireless infrastructure, wireless security, best practices, collaboration
    
By: Acquia     Published Date: Jul 15, 2014

This ebook provides best practices to consider while thinking through your redesign.

Tags : best practices for redesign, mobile computing, mobile friendly site design, responsive design, network architecture, best practices, managed hosting services, website/graphic design
    
By: CA Technologies     Published Date: Jun 05, 2014

An eBooklet discussing the pitfalls of DevOps, how you can avoid them, and how to get started on your DevOps journey.

Tags : devops, a guide to devops, integrated journey, application integration, best practices, business process management, enterprise software
    
By: Kaspersky     Published Date: May 20, 2014

Virtualization promises to boost efficiency and cut costs. Whether you’re running applications on physical or virtual machines, you still need to stay vigilant to guard against the constant and growing hazard of malware and other cyberthreats that can put your business at risk. This guide will show you how.

Tags : virtualization, kaspersky, virtualization security, cyberthreat, hackers, phishing, security breach, intrusion prevention
    
By: Allscripts     Published Date: May 01, 2014

Meaningful Use Stage 2 increases many of the thresholds that were in Stage 1, but the main focus of Stage 2 is on exchanging structured information among providers and patients. With less than 7% of EHR vendors certified, are your systems and providers ready?

Tags : allscripts, ehr certification, portal challenges, cpoe adoption, direct messaging, technology upgrade, replacements, cloud reporting
    
By: Global Knowledge     Published Date: Apr 24, 2014

Nearly every WebSphere administrator has desired a deeper understanding of how passwords are created, used, stored, and encrypted. Learn about the different types of passwords used inside of the WebSphere Application Server and the recovery plans to help restore your server when passwords go awry.

Tags : global knowledge, websphere application server, password security, security, best practices
    
By: Global Knowledge     Published Date: Apr 08, 2014

Microsoft no longer supports Windows XP (or Office 2003), so now it's decision time for many organizations. Remarkably, Windows XP in early 2014 still holds somewhere between 15% and 25% of the overall PC operating system market, depending on whose analysis you read. Find out what to consider when upgrading from Windows XP to a new operating system.

Tags : global knowledge, windows xp, windows 7, windows 8, end of life, support lifecycle policy, best practices, product lifecycle management
    
By: Global Knowledge     Published Date: Apr 08, 2014

AWS has introduced Auto Scaling so that you can take advantage of cloud computing without having to incur the costs of adding more personnel or building your own software. You can use Auto Scaling to scale for high availability, to meet increasing system demand, or to control costs by eliminating unneeded capacity. You can also use Auto Scaling to quickly deploy software for massive systems, using testable, scriptable processes to minimize risk and cost of deployment.

Tags : global knowledge, amazon auto scaling, cloud computing, security, best practices, productivity, project management
    
By: Riverbed     Published Date: Apr 03, 2014

The purpose of this book is to introduce you to common network performance management (NPM) issues and give you a new way of looking at solving them.

Tags : riverbed, npm, network performance management, performance management, network management, networking, performance tools, security
    
By: Dyn     Published Date: Mar 27, 2014

If you use multiple CDNs to serve your content, you are well aware of the benefit of quick content delivery. However, what happens if one of your CDNs goes down? Without load balancing, that fast load time can turn into downtime in an instant. Luckily your trusty DNS provider is here to help.

Tags : dyn, cdn, content delivery network, interconnected, dns companies, load balancing, proximity-based delivery, anycast network
    
By: Dyn     Published Date: Mar 27, 2014

If your ads are slow to load, chances are, consumers aren’t going to wait around to see them. Just the smallest amount of latency can cost you thousands of views, clicks, and conversions. By following these 5 guidelines, you can reduce your overall network latency and keep those clicks coming.

Tags : dyn, network latency, customer retention, serve content, combating latency, own network, global network, anycast
    
By: Dyn     Published Date: Mar 27, 2014

DDoS, cache poisoning, footprinting, oh my! Who knew that there were so many ways to threaten the security of your DNS? Find out all of the scary details about these attacks and what you can do to prevent them.

Tags : dyn, dns, security risks, arbor networks survey, ddos attacks, dns amplification, amplification exploits, network performance
    
By: Sage     Published Date: Mar 26, 2014

Here’s a riddle: What have you used for a very long time, occasionally pulled your hair out over, contains lots of cells with mathematical formulas, and is very stressful to update whenever a tax law or GAAP principle changes?

Tags : sage, fixed assets, spreadsheets, tax payments, sarbanes-oxley, depreciation, tracking, planning
    
By: Sage     Published Date: Mar 26, 2014

Do you often find yourself daydreaming about a perfect fixed assets management solution?

Tags : sage, fixed assets, spreadsheets, tax payments, sarbanes-oxley, depreciation, tracking, planning
    
By: Box     Published Date: Mar 13, 2014

This recorded webinar discusses the latest challenges with BYOD (Bring Your Own Device) faced by today's organizations and recommendations on how to move forward with a BYOD workforce.

Tags : box, byod, mobile devices, iphone, android, mobile workers, mobile workforce, remote management
    
By: Equinix     Published Date: Feb 11, 2014

Get insights about your cloud options and learn how you can use hybrid cloud to make a difference in your business.

Tags : cloud applications, hybrid cloud, cloud computing, data center, data center optimization, application performance management, best practices
    
By: Imprivata     Published Date: Dec 06, 2013

Ensure that you have the right single sign-on vendor with this easy to use vendor selection evaluator’s guide.

Tags : sso, single sign on, single sign on authentication, two factor authentication, single sign on solutions, identity and access management, epcs, e-prescribing
    
By: TriNet     Published Date: Jan 17, 2012

Read this white paper to learn about 10 principles to follow in order to build an effective human capital plan for your organization.

Tags : trinet, integrated hr outsourcing, in-house infrastructure, internal costs, human resources, cost structure, application integration, application performance management
    
By: Lexmark     Published Date: Jun 02, 2014

A UBM tech report on the 6 secrets that banks can use to reduce cost and drive process improvements

Tags : lexmark, reducing costs, driving process improvements, modern document management, best practices, business process management, document management
    
By: Chief Marketer     Published Date: May 29, 2014

Listen to Marketo CMO, Sanjay Dholakia, and guest Forrester analyst, Lori Wizdo, to discover how automating the lead-to-revenue process can increase sales pipeline in your enterprise organization.

Tags : marketing automation, sales automation, sales pipeline, lead nurturing, sales growth, marketing roi, sales, sales revenue
    
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End

Related IT Whitepaper Topics

Add White Papers

Get your company's white papers in the hands of targeted business professionals.