practical

Results 301 - 325 of 520Sort Results By: Published Date | Title | Company Name
Published By: VMTurbo     Published Date: Feb 11, 2014
Explore the challenges and best practices of virtualizing business-­critical applications. Identifies major practical barriers that organizations face so you don't have to.
Tags : 
vmturbo, virtualization, virtualizing business, business-critical, business applications, controlling interference, consolidation, managing spp
    
VMTurbo
Published By: Paycor     Published Date: Dec 04, 2013
Managers are spending 17% of their time managing poor performers, or one full workday every week. Wouldn’t their time be better spent improving the performance and productivity of their entire team? This 30-minute webinar provides simple, actionable tips for performance management from HR expert Becky Falvey.
Tags : 
performance management, employee engagement, talent management, human resources, employee, performance, productivity
    
Paycor
Published By: EVault     Published Date: Mar 21, 2014
This simple, practical white paper will prove invaluable whether you’re starting fresh or looking to upgrade your current data protection system.
Tags : 
evault, cloud computing, cloud connected diaster, disaster recovery, natural disaster, better for business
    
EVault
Published By: Cornerstone OnDemand     Published Date: Feb 22, 2016
For many small to medium size companies, finding the time to proactively manage employee performance is difficult. The emphasis is more often on increasing revenues and achieving stability, especially in the early days. However, as businesses grow, the need for improving staff engagement, productivity and loyalty becomes increasingly important. It is at this critical stage that Performance Management can mean the difference between businesses that experience sustained growth and those whose momentum falters. Even when organisations are aware of the importance of Performance Management, the tendency is to carry it out in an ad hoc manner. Such methods work with a low headcount, but as this increases, more formal processes are needed. 6 Steps to Performance Management Best Practice offers a practical guide for small and medium enterprises (SMEs) that have identified Performance Management as part of their long term growth strategy. Drawing on industry research, client case studies and
Tags : 
management, productivity, performance, growth, employee
    
Cornerstone OnDemand
Published By: Flexera     Published Date: Apr 19, 2019
How is enterprise security like a commercial airliner? Preventative maintenance and regular, in-depth inspections keep jumbo jets operating safely, and the same approach will protect your enterprise security, too. When you consider the widespread security vulnerabilities, the massively intertwined application dependencies, the diversity of deployment environments, and the potential device takeover of mobile apps, keeping your applications safe is a mind-boggling job. Traditional manual approaches are no longer practical. Our exclusive white paper, “Keeping Your Application Fleet Flying Risk Free,” will help you establish the preflight checks and regular inspections that keep the applications in your portfolio running reliably and securely. Download it today.
Tags : 
    
Flexera
Published By: CrowdStrike     Published Date: May 10, 2018
Finding out your organization has been breached can be devastating news — knowing how to deal with an intruder that’s broken through your cyber defenses can be even more challenging. This white paper, “You’ve Been Breached — Now What? How to Respond to a Worst-Case Scenario,” offers practical steps IT and security professionals should take after a cyberattack occurs. You’ll receive guidance for both short-term and long-term strategies to help minimize damage, protect sensitive assets and preserve forensic evidence that can help during the investigation and remediation process. This paper also includes recommendations for strengthening your organization’s defenses against a future breach. They are based on decades of experience from CrowdStrike® incident responders who work on the front lines fighting cyberthreat actors every day. Download this White Paper to learn: • How to collect and preserve data after a breach so that critical forensic information can be retrieved • What sort of in
Tags : 
    
CrowdStrike
Published By: CrowdStrike     Published Date: May 10, 2018
Where to invest next: Identifying the people, processes and technology you need for an effective cybersecurity strategy Building your organization’s cybersecurity maturity doesn’t happen overnight. It takes time and thought to adequately assess all the factors that go into creating and implementing an effective security strategy, particularly what steps to take after you’ve made an initial investment in security. This white paper, “Where to Invest Next: Guidance for Maturing Your Cyber Defenses,” offers practical advice on achieving the level of cyber defense maturity that’s right for your organization. Learn why developing a security program that takes into account your risk level and the current state of your security posture is critical. You’ll also see why ensuring that everyone in the organization, from the leadership to the rank-and-file, is working toward the goal of cyber maturity is crucial to your success. Gain important insights into the cybersecurity maturity process incl
Tags : 
    
CrowdStrike
Published By: CrowdStrike     Published Date: Nov 28, 2018
Finding out your organization has been breached can be devastating news — knowing how to deal with an intruder that’s broken through your cyber defenses can be even more challenging. This white paper, “You’ve Been Breached — Now What? How to Respond to a Worst-Case Scenario,” offers practical steps IT and security professionals should take after a cyberattack occurs. You’ll receive guidance for both short-term and long-term strategies to help minimize damage, protect sensitive assets and preserve forensic evidence that can help during the investigation and remediation process. This paper also includes recommendations for strengthening your organization’s defenses against a future breach. They are based on decades of experience from CrowdStrike® incident responders who work on the front lines fighting cyberthreat actors every day. Download this White Paper to learn: How to collect and preserve data after a breach so that critical forensic information can be retrieved What sort of int
Tags : 
    
CrowdStrike
Published By: Optimizely     Published Date: Jun 05, 2017
Learn about statistical significance, statistical error, and the concepts behind Optimizely’s Stats Engine: - Best practices for running your experiments to statistical significance - Tips for communicating results, optimizing low-traffic pages, using confidence intervals, and more - How Optimizely is creating an always-valid view of statistical significance
Tags : 
optimizely, online experiments, statistics, statistical significance, optimizely stats engine
    
Optimizely
Published By: IESE Business School     Published Date: Oct 01, 2018
This article reveals five practical steps for putting purpose into practice, achieving higher levels of motivation, commitment, engagement and fulfillment in your company in the process.
Tags : 
iese, business motivation, motivation, purpose, people management, service
    
IESE Business School
Published By: Adverity     Published Date: Jun 15, 2018
A Beginner's Guide to Marketing Data Analytics Marketing Data is big & highly fragmented Big data is messy. It’s scattered across platforms, it’s diverse, and in its raw form, it’s practically unusable. We know, it’s a painful truth. The fact of the matter is that having a lot of data doesn’t necessarily mean that you have the answers to your most pressing questions. Looking for the most relevant bits in your pile of big data is like looking for a needle in a haystack. But don't you worry - we are here to help. This handy e-book will give you a short overview what quality matters, why data is so important and what you need to pay attention to. Best thing is: getting this ebook is super easy. Just fill out the form to the right and voilá - your download is ready. Enjoy this read!
Tags : 
marketing business intelligence, saas marketing optimization, measuring marketing performance, roi analytics, automated report generator, performance based marketing, online marketing data, roi metrics
    
Adverity
Published By: bChannels     Published Date: May 13, 2019
How to choose the most productive collaboration tools to overcome the 5 key issues affecting workplace communication.
Tags : 
    
bChannels
Published By: IBM     Published Date: Feb 18, 2009
This white paper explains how the IBM® Optim™ Data Growth Solution provides proven technology and comprehensive capabilities that make archiving complex relational data both practical and desirable.
Tags : 
ibm integrated data management, database growth, optim data growth solution, database archiving, idm, disaster recovery, database referential integrity
    
IBM
Published By: IEX     Published Date: May 27, 2008
As more companies seek out performance management capabilities to gain a competitive advantage or keep pace with rivals who have already established an edge, the decision to build or buy a performance management solution must be considered. This paper will walk readers through the pros and cons of the build versus buy debate in order to help make practical business decisions for long-term success.
Tags : 
call center management, customer service, workforce management, contact management, iex, contact center, call center, performance management
    
IEX
Published By: MarkMonitor®     Published Date: May 17, 2013
Your social media presence helps you engage consumers and stay in tune with the market. But it also paves the way for brand impersonators, counterfeiters and scammers to exploit your brand. Download this informative white paper to understand the benefits of incorporating a brand protection component into your social media program. Learn practical, proven steps you can take to complete your social media strategy–and preserve brand health and customer trust.
Tags : 
brand health, social, social media, brand protection, social media presence, consumer trust, customer engagement, social media marketing
    
MarkMonitor®
Published By: White Horse     Published Date: Oct 07, 2009
Learn how to tap powerful real-time brand conversations taking place in social media by investing in the proper tool to aggregate and share the data across your organization. Download this Webinar for a standards-based benchmarking review of the top social media monitoring tools and practical knowledge that will equip you to make a business case for the single best social media investment.
Tags : 
brand marketing, brand research, social media monitoring, crisis management, social marketing, brand management
    
White Horse
Published By: Cornerstone OnDemand     Published Date: Oct 06, 2015
In our new whitepaper, “Shifting the Employee Productivity Curve with Smart Talent Management Strategies,” you'll learn: What the employee productivity curve is and how shifting the curve impacts your organization's bottom line. 5 practical measures you can take to enhance employee productivity. Stories of organizations that have successfully shifted the curve.
Tags : 
employee productivity, talent management, productivity, talent management strategy, human resources, recruitment, retention, onboarding
    
Cornerstone OnDemand
Published By: Riverbed     Published Date: Apr 27, 2011
The goal of this paper is to highlight these challenges and provide some "practical advice" for streamlining a BC/DR environment.
Tags : 
riverbed, business continuity, disaster recovery solutions, bob laliberte, bc/dr environment, data center consolidation, bandwidth, cloud storage
    
Riverbed
Published By: Webroot     Published Date: Sep 18, 2013
This white paper describes how new threats have stretched the capabilities of “fat client” security architectures to the limit, making it impractical to keep endpoints updated with signatures for all the new viruses. It discusses how a revolutionary approach is making traditional antivirus obsolete by replacing bloated clients and large signature downloads with: • Cloud/client architecture • Journaling and rollback • Behavioral recognition of malware These improve performance and effectively address the new threat environment, which includes protecting against zero day threats.
Tags : 
cloud architecture, behavior recognition, security, antivirus, journaling, rollback, malware
    
Webroot
Published By: IBM     Published Date: Jan 10, 2012
You will learn how to build a practical roadmap toward private Storage Cloud by starting with a virtualized, efficient storage environment and build a more flexible and responsive business.
Tags : 
    
IBM
Published By: CSB by Cornerstone on Demand     Published Date: Jun 26, 2013
Managing people is really very simple: hire people who can do the job, and let them do it. If they do something good, tell them they did done good; if they mess up, sort it out pronto. This e-book covers off a bunch of that stuff. It shouldn't contain anything new or groundbreaking, but it does feature zombies, impractical footwear, terrible ideas for thank you cards and one really creepy monkey. And it's anice reminder that keeping things simple is usually the best way to start.
Tags : 
management fundamentals, hiring best practices
    
CSB by Cornerstone on Demand
Published By: Citrix     Published Date: Nov 20, 2012
"The best way to get better at online meetings is to participate in more of them." This brief by Gihan Perera, founder of First Step Communications, provides 10 practical tips for keeping control of your online meetings.
Tags : 
10 tips, online meeting, citrix, virtual meeting, collaboration
    
Citrix
Published By: McAfee     Published Date: Nov 14, 2012
Why is database security so important? For a company that has suffered a serious data breach, it boils down to monetary damage in its many forms: business disruption, bad publicity, stiff fines for noncompliance, and undermined customer confidence.
Tags : 
database, security, mcafee, data breach
    
McAfee
Published By: Solgenia     Published Date: Jun 07, 2013
This White Paper outlines best practices and practical considerations that help ensure successful selection and implementation of document management solutions.
Tags : 
document management, best practices, implementation, deployments, automation, collaboration, cloud
    
Solgenia
Published By: OpenDNS     Published Date: Jan 07, 2013
This whitepaper examines how the dramatic shift toward mobility has impacted IT's ability to effectively secure users, wherever they choose to work. Inside, you'll find advice for securing your users that's both practical and easy to implement.
Tags : 
security, network security, cloud, mobile, nomadic users
    
OpenDNS
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      
Already a subscriber? Log in here
Please note you must now log in with your email address and password.