work practices

Results 276 - 300 of 377Sort Results By: Published Date | Title | Company Name
Published By: Polycom     Published Date: Jun 08, 2016
Whether you are planning to retire legacy phone systems or have already adopted Skype for Business, organizations are looking past IM and presence and exploring other productivity and efficiency gains. And the most logical first step is Voice. Discover how to take full advantage of Skype for Business in this white paper from ZK Research: The Top 10 Ways to Maximize Your Skype for Business Investment. 2 ways are to make Skype for Business part of your BYOD strategy and consolidate infrastructure. Find out the remaining 8 ways to maximize your investment - and how to make it work for you.
Tags : 
business optimization, business strategy, network management, business applications, best practices, business process management, productivity
    
Polycom
Published By: Polycom     Published Date: Sep 07, 2016
"Seeing is believing. How we connect and collaborate is changing. It’s no longer about reviewing a PowerPoint deck or a document sent out in advance in the meeting invite over a voice bridge. It’s now about collaborating and working in real time with voice, video and content sharing—as a team. Together, Microsoft and Polycom make it simple. Watch now an interactive session covering the following hot topics: How the new Office 365 Services and Skype for Business Online change the collaboration experience and reduce conferencing/communications costs. How you can turn your conference rooms and huddles spaces into productive, collaborative workspaces. Polycom RealPresence Trio and how it accommodates our 3 collaboration needs: Voice, Content and Video. How easy it is to set up and how easy it is for users to connect. How flexible your workspace transition plan can be. Don’t miss this session featuring Polycom and Skype for Business solutions experts, Peter Huboi and Jovito Salonga, for a d
Tags : 
business optimization, business strategy, network management, business applications, best practices, business process management, collaboration, productivity
    
Polycom
Published By: Polycom     Published Date: Sep 07, 2016
"“Work” doesn’t have to be a place your employees go, it’s something they do, irrespective of time, location, and the devices used. Today, video-enabled devices allow people to work and communicate from virtually anywhere. In “Best Practices in Creating Collaborative Workspaces” on-demand webinar, we’ll show you how you can enable users to communicate in open spaces while focusing on greater productivity and stronger team cohesion and collaboration. Join Polycom leaders Amy Barzdukas and Chris Thorson as they share best practices on workplace collaboration and flexible work environments. "
Tags : 
best practices, business optimization, business management, application management, enterprise application, business intelligence, productivity
    
Polycom
Published By: Polycom     Published Date: Jun 08, 2016
"Build your business case. There is a transformational shift around enterprise voice solutions as organizations move from the PBX to unified communications (UC) for their voice needs. In parallel, many organizations are moving their existing on-premises infrastructure into the cloud. This brief outlines the benefits and considerations such as: • Microsoft Office 365 and the cloud • Selecting phones for Skype for Business • Replacing the PBX and making the transition • And more Download this brief that helps you realize the benefits that UC and collaboration brings to the modern workplace."
Tags : 
business optimization, business strategy, network management, business applications, best practices, business process management, productivity
    
Polycom
Published By: Polycom     Published Date: Jun 08, 2016
Microsoft Lync and Skype for Business each provides presence information within email and business applications and promotes voice and video collaboration within virtual teams, and with customers and partners. Polycom extends the benefits of Lync’s voice solutions with Polycom voice endpoints and enables collaboration experiences in multiple environments within the Microsoft Lync or Skype for Business interfaces.
Tags : 
business optimization, business strategy, network management, business applications, best practices, cost reduction, best practices
    
Polycom
Published By: Polycom     Published Date: Sep 07, 2016
"What are the benefits of moving your phone services to Office 365? How does the Skype for Business phone experience online differ from a traditional on-prem PBX phone experience? What are the important features to consider when selecting phones for your Office 365 cloud deployment? Join Polycom voice experts Randy Wintle and Peter Huboi as they cover these topics and more in one of our most accessed on-demand webinars."
Tags : 
business optimization, business strategy, network management, business applications, best practices, business process management, productivity
    
Polycom
Published By: Polycom     Published Date: Sep 07, 2016
View the on-demand webinar, “Create Exceptional Meeting Experiences with Skype for Business and Polycom: A Q&A with Jeff Schertz, Skype for Business MVP” for a conversation about Polycom’s newest solutions and see how they elevate the collaboration possibilities of Skype for Business. And how they can enhance your meeting experiences.
Tags : 
business optimization, business strategy, network management, business applications, best practices, business process management, productivity
    
Polycom
Published By: Tripwire     Published Date: Mar 31, 2009
Learn the basics about security benchmarks, and specifically how the security benchmarks developed by the Center for Internet Security (CIS) can help you with your compliance initiatives.
Tags : 
center for internet security, cis, tripwire, compliance, internet security, cis-certified, framework, regulation, security investment, risk, risk management, it security, cis benchmark, e-commerce security, gramm-leach-bliley act (glba), sarbanes-oxley act (sox), health insurance portability, accountability act (hipaa), windows server, sysadmin
    
Tripwire
Published By: EMA     Published Date: Apr 01, 2014
Application-aware Network Performance Management (AANPM) practices and products provide detailed insights into exactly who is using which resources, what quality of experience is taking place, and where to look when things go wrong. Such information can significantly improve planning, monitoring, and troubleshooting efforts.
Tags : 
ema, application aware network performace, aanpm, quality of experience, research, it management, data management, consulting
    
EMA
Published By: IBM     Published Date: Oct 06, 2014
IBM has worked for years with retailers to help them develop a complete Omni-channel Commerce solution that integrates various channels and provides a foundation that helps enable the seamless experience that consumers are looking for. Due to this joint effort, IBM provides the only Commerce Solution that can truly support a unique and personalized buying experience for consumers that incorporates marketing, selling, fulfillment, and returns across all physical and digital channels. This paper describes the best practices needed to enable a store to meet the cross-channel expectations of the customer and the ever-increasing order volumes of Omni-channel fulfillment.
Tags : 
omni-channel commerce, store enablement, channel integration
    
IBM
Published By: IBM     Published Date: Jul 22, 2016
"Increasingly, brands are looking to differentiate based on an exceptional customer experience. The key to improving the customer experience is being able to effectively measure what’s working and what you need to improve. IBM host a webinar presenting tips on how to measure the customer experience for your brand and how to use that data to build better journeys. Please join IBM and guest speaker Andrew Hogan from Forrester Research as we share tips on how to best measure the digital experiences customers have with your brand and how to use that information to build better journeys. The webinar will provide attendees with: • Best practices to measure the quality of digital customer experiences • Guidance on the kinds of tools to use to capture the right CX metrics • Tips for integrating metrics, including the role of customer journeys • Techniques to drive action and improve digital experiences"
Tags : 
ibm, commerce, customer analytics, marketing, customer experience, customer insight, forrester, digital experience
    
IBM
Published By: IBM     Published Date: Sep 16, 2014
In a world that demands scalability, modularity, quality, fast performance and a best practices approach is key to ensuring predictable results for the business. IBM’s PowerLinux Open Source Infrastructure Services solution is a workload-optimized system that meets or exceeds best practices for a virtualized infrastructure at a reasonable price point. The PowerLinux solution can help turn today’s IT infrastructure into a well-tuned utility, providing a more flexible, scalable and valuable asset to the business.
Tags : 
virtualized infrastructure, it infrastructure, deployment options
    
IBM
Published By: IBM     Published Date: Oct 21, 2016
By next year over half of all US companies will formally support BYOD, bringing on the challenge of securing data and applications on devices that may often be in the hands malicious users, or worse – teenagers looking to win a game of Pokémon Go with mom’s work iPhone. And, thanks to the consumerization of IT, mobile users increasingly expect the same smooth user experience with business applications that is provided by popular games and consumer applications. Fortunately, increased mobility and the bring your own device explosion don’t always add up to increased security challenges and UI/UX struggles. This Tech Byte series will look at the most important considerations when planning a mobile strategy – from application development platform to security and governance to user interface guidelines, and present best practices that businesses of all kinds can use to help ensure a successful shift towards a mobile-first enterprise.
Tags : 
ibm, mobile, mobile security, devices, platform to device
    
IBM
Published By: IBM     Published Date: Oct 21, 2016
By next year over half of all US companies will formally support BYOD, bringing on the challenge of securing data and applications on devices that may often be in the hands malicious users, or worse – teenagers looking to win a game of Pokémon Go with mom’s work iPhone. And, thanks to the consumerization of IT, mobile users increasingly expect the same smooth user experience with business applications that is provided by popular games and consumer applications. Fortunately, increased mobility and the bring your own device explosion don’t always add up to increased security challenges and UI/UX struggles. This Tech Byte series will look at the most important considerations when planning a mobile strategy – from application development platform to security and governance to user interface guidelines, and present best practices that businesses of all kinds can use to help ensure a successful shift towards a mobile-first enterprise.
Tags : 
ibm, cloud, mobility, enterprise, mobile applications, mobile application strategy
    
IBM
Published By: Utimaco     Published Date: Aug 18, 2008
Data protection programs at most organizations are concerned with protecting sensitive data from external malicious attacks, relying on technical controls that include perimeter security, network/wireless surveillance and monitoring, application and point security management, and user awareness and education. In this paper, the different leakage points are mapped with regulations and best practices.
Tags : 
leak, leakage, data protection, pci, cardholder, cardholder data, utimaco, database security
    
Utimaco
Published By: thawte     Published Date: Nov 06, 2006
Learn how you can build customer confidence around Internet security. This guide will explain the various ways in which your business can benefit if you secure your MSIIS server with a Thawte digital certificate.
Tags : 
security, security policies, network security, servers, windows server, microsoft web server, security certificate, networking best practices, digital certificate, web security, internet security, web server security, thawte, web server
    
thawte
Published By: CrownPeak     Published Date: Jun 30, 2009
Congratulations you've decided to embark on the journey to implement a content management system (CMS) for your Web site. This document assumes that you have already built the business case for purchasing a CMS and has been signed off on by the appropriate stakeholders. Learn more today!
Tags : 
crownpeak, cms, content management system, web site development, infocenter, hosted services, open source software, project definition, rfp, request for proposal, vendor strengths, os/ databases, hardware, infrastructure, document management, portal, licensing, workflow management, enterprise integration, enterprise application
    
CrownPeak
Published By: CrownPeak     Published Date: Jun 30, 2009
This is the second of a three part CrownPeak White Paper exploring Why Content Marketing Is Online Marketing. In this series we present the new idea that Web content marketing is the central and most important tenet of online marketing. Today, the function of online marketing revolves around the Web which, itself, revolves around content. So as we talk about online marketing/marketers and content marketing/marketers consider them and yourself one and the same. Learn more today!
Tags : 
crownpeak, roi, web content marketing, cms, content management system, web site development, infocenter, hosted services, open source software, project definition, rfp, request for proposal, vendor strengths, os/ databases, hardware, infrastructure, document management, portal, licensing, workflow management
    
CrownPeak
Published By: VeriSign Authentication Services, now a part of Symantec Corp.     Published Date: Oct 13, 2011
Read this white paper to learn how TLS works, best practices for its use and the various applications in which it can secure business computing.
Tags : 
best, practices, applications, tls, ssl, secure, business computing, transport layer security, secure sockets layer
    
VeriSign Authentication Services, now a part of Symantec Corp.
Published By: Cornerstone OnDemand     Published Date: Jan 03, 2018
90% of employees think annual reviews aren’t accurate, so how can managers flip the script and deliver more meaningful, growth-focused performance evaluations? Download “Reap What You Sow: How Fostering a Culture of Ongoing Performance Reviews Drives Growth” to learn why making performance management a continuous process, not a yearly or semi-yearly one, leads to more revenue and a more powerful workforce. This guide will show you: • Why you should make performance reviews ongoing • How to align employee goals with the organization’s vision • The positive impact training has on the bottom line Check out the guide today and learn additional best practices for creating a performance management culture!
Tags : 
    
Cornerstone OnDemand
Published By: Focus     Published Date: Nov 15, 2011
When it's time to expand your network, this guide will help you evaluate the needs of your organization and enable you to provide best performance for mission-critical applications.
Tags : 
network, infrastructure, best practices, mission critial, applications, network, scale
    
Focus
Published By: GoToMeeting     Published Date: Aug 11, 2010
Effectively engaging prospects is one of the greatest challenges you'll encounter with a virtual sales presentation. If you don't hold a prospect's attention, you probably won't make the sale. This new What Works! eBook explores best practices for effectively engaging prospects in a virtual environment to shorten the sales cycle, beat the competition and close more business.
Tags : 
citrix, virual sales presentation, web conference, virtual environment, sales cycle, prospect engagement, content, strategy
    
GoToMeeting
Published By: GoToMeeting     Published Date: Oct 11, 2011
Distributed work programs are one of the most effective ways of achieving badly-needed operational savings. To be effective, however, you need to know which practices and tools are most effective for managing remote staff. This new white paper addresses three fundamental management questions, explores key challenges of managing remote workers and provides best practices for setting up a successful remote work program.
Tags : 
citrix, technology, business. remote work program, management, employee
    
GoToMeeting
Published By: Esker     Published Date: Dec 08, 2014
Approximately 79% of customers seeking customer service and support wish it were easier and more convenient to obtain.* Read the new Customer Service Workbook to discover industry tips and best practices for bringing efficiency and profitability to order management while freeing up your CSRs to: • Process orders quicker with fewer errors • Carry out customer engagement strategies • Manage order volumes at current staffing levels • Increase customer loyalty
Tags : 
customer service, csr, outbound calls, self-service, strategies, automation, electronic workflow, visibility, streamline, social media
    
Esker
Published By: nlyte Software     Published Date: Oct 27, 2014
Much of the focus on flexible datacenters centers around the software application, compute, networking, and storage layers. Only after an initiative has begun are the most suitable best practices in datacenter infrastructure management (DCIM) considered.
Tags : 
nlyte, data centers, agile data centers, infrastructure, networking, storage
    
nlyte Software
Start   Previous    2 3 4 5 6 7 8 9 10 11 12 13 14 15 16    Next    End
Search Resource Library