Practices HowWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Practices How returned the following results.
RSS What is RSS?
Related Categories

 •   Data Security
 •   Enterprise Data Protection and Privacy
 •   Security Monitoring
 •   Application Lifecycle Management(ALM)
 •   Contact Center Management
 •   Managed Security Services
 •   Customer Self-service/ e-Self Help
 •   Mobile Device Management
 •   Enterprise Information Integration/ Metadata Management
 •   Application Security

Related Searches
 •   Firm Practices
 •   Functions Practices How
 •   Networks Practices How
 •   Practices How Arizona
 •   Practices How Concerns
 •   Practices How Online
 •   Programming Practices How
 •   Related Practices
 •   Systems Practices
 •   Test Practices How
Advertisement

ALL RESULTS
1 - 25 of 466 | Next Page

Best Practices: How to engage business leaders in succession by SuccessFactors

February 27, 2014 - (Free Research)
Effective succession management is critical if your organization hopes to prevent unplanned talent losses from disrupting business operations. This resource reveals three essential practices for getting your business leaders more engaged in the succession process. 
(WHITE PAPER) READ ABSTRACT |

E-Book: Best Practices - How to implement and maintain enterprise user roles by CA Technologies

June 29, 2010 - (Free Research)
Effective enterprise role management is essential for properly managing user access rights and enforcing access policies, but the implementation process can be challenging. To be successful, organisations should implement and maintain enterprise roles using 3 Best Practices described by our expert Andras Cser. 
(EBOOK) READ ABSTRACT |

SearchSecurity.com E-Guide: Database monitoring best practices: How to use DAM tools by IBM

August 11, 2011 - (Free Research)
Protecting databases and the data they contain is a challenging task for every IT security professional. This expert e-guide provides best practices for database activity monitoring and explains a step by step process for prioritizing data and protecting transactions. 
(EGUIDE) READ ABSTRACT |

Best Practices: How to Improve Business Continuity with Virtualization by VMware, Inc.

March 03, 2014 - (Free Research)
View this webcast to find out how virtualization can help you maximize uptime for the services and applications that are crucial to your business. 
(WEBCAST) READ ABSTRACT |

Exploring IBM SOA Technology & Practice: How to Plan, Build, and Manage a Service Oriented Architecture in the Real World by IBM

February 2008 - (Free Research)
This eBook is intended for readers who are already familiar with service oriented architecture (SOA) and who want to learn about IBM's advice on how to be successful with SOA. It is intended for IT and business professionals involved with adopting ... 
(WHITE PAPER)

Examining business resiliency management best practices: How to prepare today for future trends in business by IBM

June 2010 - (Free Research)
Today, organizations that aren’t able to respond to IT disruptions or rapid market changes can find themselves left behind. Read this paper and learn how  to effectively manage people, process, and technology within a business resilience strategy. 
(WHITE PAPER) READ ABSTRACT |

E-Guide: Climbing the Uphill Battle of Exponential Data Growth by Symantec Corporation

December 2010 - (Free Research)
This guide provides a simple yet reliable approach to securing data for the long term though the efficient optimization of IT resources and a set of straightforward best practices for data protection. Learn archiving best practices, how to choose a data archiving tool, and how to put together the best data archiving strategy for your business. 
(EGUIDE) READ ABSTRACT |

Agile Software Development And The Factors That Drive Success by Hewlett-Packard Company

September 2012 - (Free Research)
In this Forrester report, 112 IT professionals were surveyed about their agile and traditional application development practices, how they measure success, and what their success rates are. Read to discover the common characteristics of the most successful organizations and discover the truth behind some of the myths surrounding agile methods. 
(WHITE PAPER) READ ABSTRACT |

A contact center manager's guide to integrating self-service by KANA (E-mail this company)

August 2012 - (Free Research)
Leveraging self-service technologies in your contact center can significantly reduce costs, but successful implementation is tricky. Gain expert advice on how to ensure your self-service contact center initiative is a success. Read on to learn self-service contact center best practices, how to obtain executive support, and more. 
(EBOOK) READ ABSTRACT |

Best Practices: Converting Your Admin Space From a Cost Center To a Revenue Generator by Iron Mountain

June 2013 - (Free Research)
Real estate and rental costs are top expenses for a private practice. This resource details the importance of using your real estate wisely – and offers insight to help you convert your administrative space from a cost center to a revenue generator. 
(WHITE PAPER) READ ABSTRACT |

Worst Practices in Business Intelligence: Why BI Applications Succeed Where BI Tools Fail by Information Builders

August 2012 - (Free Research)
This paper addresses the top 4 worst practices in business intelligence (BI) and provides you with essential strategies for how to overcome these common mishaps. 
(WHITE PAPER) READ ABSTRACT |

The 10 Worst Practices for Technical Support and How to Overcome Them by NTR Global

October 2009 - (Free Research)
This white paper will explore 10 of the "worst practices" that are common to customer support operations. We will discuss how these worst practices can creep in to your contact center and ways to deal with them. We will also touch on how to eliminate well‐intentioned management blunders and discuss good and bad uses of support technology. 
(WHITE PAPER) READ ABSTRACT |

E-Book: SAP upgrade tips and best practices by Panaya, Inc.

March 2010 - (Free Research)
SAP upgrades are a perennial challenge - especially for organizations with many instances or customizations. The struggling economy has also made it difficult to make a case for a technical SAP ERP upgrade. Read this paper to learn about six SAP upgrade tips and best practices for global environments which can help avoid costly downtime and issues. 
(EBOOK) READ ABSTRACT |

Getting Value from Industry Best Practices the High-Tech Supply Chain Challenge by SAP AG

September 2008 - (Free Research)
Supply chain operations play a vital role in the success of any consumer or high-tech original equipment manufacturer (OEM). This SAP Executive Insight examines how the adoption of industry best practices can add value to your organization. 
(WHITE PAPER) READ ABSTRACT |

Worst Practices in SOA Implementation: Why Service-Oriented Architectures Fail by Information Builders Inc. (E-mail this company)

October 2007 - (Free Research)
Service-oriented architecture (SOA) enables different programs, applications, and tools to interact via self-contained services that do not depend on the context or state of the other service. This white paper provides insight into the top-four worst practices for SOA integration, and how to avoid and/or overcome these worst practices. 
(WHITE PAPER) READ ABSTRACT |

Worst Practices in BI: Why Business Intelligence (BI) Applications Succeed Where BI Tools Fail by Information Builders Inc. (E-mail this company)

June 2007 - (Free Research)
Tthis paper provides insight into the top-four worst practices for BI. It also provides guidance on how to avoid and/or overcome worst practices in order to tap into the true power of BI. By reading this paper, you will have a solid understanding of how to avoid BI failure and achieve success with your BI initiatives. 
(WHITE PAPER) READ ABSTRACT |

The 10 worst practices for Technical Support and how to overcome them by NTR Global

November 2011 - (Free Research)
Delivering superior service and support is more important than ever as companies strive to differentiate themselves from the competition. In many organizations, service quality is governed by self-harming "worst practices" instead of productive best practices. Learn what these practices are and how to avoid them. 
(WHITE PAPER) READ ABSTRACT |

Best Practices in Lead Development by KnowledgeStorm Webinars (E-mail this company)

May 2005 - (Free Research)
Learn how your company can change from a lead generation business model to a dynamic lead development process in this joint Webcast from SiriusDecisions and KnowledgeStorm. 
(WEBCAST) READ ABSTRACT |

11 Best Practices for Peer Code Review by SmartBear Software

August 2012 - (Free Research)
Read this paper to learn 11 best practice peer code review tips to optimize review sessions, improve code, and make the most of valuable time. Some of the key findings include how many lines of code you should review in an hour, annotating code before you begin reviewing, leveraging a check list system, and more. 
(WHITE PAPER) READ ABSTRACT |

E-Book: The New Best Practices for Document Imaging, OCR, and Scanning by Nuance

July 2011 - (Free Research)
Successful document management begins with efficient and well-managed document imaging, scanning and capture processes. This eBook examines the latest trends in document imaging and scanning, as well as optical character recognition (OCR), and provides expert advice on best practices in those areas. 
(EBOOK)

Best Practices for Improving Mobile Data Security by Thawte Inc.

July 2013 - (Free Research)
This expert guide from SearchConsumerization.com takes an in-depth look at mobile data security best practices, including creating a robust PIN or passcode, implementing anti-malware, understanding the top mobile risks and how to offset them, and much more. 
(EGUIDE) READ ABSTRACT |

Best Practices for Data Management by Iron Mountain

March 2013 - (Free Research)
This interactive eBook explores best practices for data management and dives into two questions answering how are current data management programs preforming relative to best practices? And what are the implications for backup and recovery practices moving forward? 
(EBOOK) READ ABSTRACT |

Best Practices for Protecting Laptop Data by i365, makers of Evault

June 2011 - (Free Research)
As data growth increases, and that data increasingly finds its way onto laptops, the threats of data loss and security breaches have also increased. To guard corporate data on endpoints at all times, companies can follow a number of data protection and data security best practices. Incorporating these can help you keep IT costs in check and more. 
(WHITE PAPER) READ ABSTRACT |

Six Best Practices to Prevent Enterprise Data Loss by RSA, The Security Division of EMC

February 2009 - (Free Research)
Join Tom Corn, Vice President of Data Security Products at RSA, The Security Division of EMC as he discusses six best practices for preventing enterprise data loss. Hear how these best practices enable you to protect your critical data throughout its lifecycle -- no matter where it moves, who accesses it or how it is used. 
(VIDEO) READ ABSTRACT |

Best Practices for Database Security and Compliance by Guardium, an IBM Company

February 2008 - (Free Research)
Attend this live Webcast with Forrester Principal Analyst Noel Yuhanna to learn about best practices for protecting enterprise data from both external hackers and insiders such as privileged users and disgruntled employees. 
(WEBCAST) READ ABSTRACT |

1 - 25 of 466 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts