Home
 > search for

Featured Documents related to » responsible sourcing



ad
Get Free ERP Systems Comparisons Now

Find the best ERP software solution for your business!

Use the software selection tool employed by IT professionals in thousands of selection projects per year. FREE software comparisons based on your organization's unique needsquickly and easily!
Register to access your free comparison reports and more!

Country:

 Security code
Already have a TEC account? Sign in here.

Documents related to » responsible sourcing


Administering Responsible Inheritance Engineering
For many projects, the transition from initiative to production is chaotic and lacks a pragmatic framework for ongoing support. Inheritance Engineering offers a means for carrying out change in a reliable fashion and retaining as much value as possible throughout the life of the software. Unfortunately, this does not occur for a variety of reasons. Find out what those reasons are, and how to address software maintenance.

RESPONSIBLE SOURCING: Administering Responsible Inheritance Engineering Administering Responsible Inheritance Engineering Source: Certellus LLC Document Type: White Paper Description: For many projects, the transition from initiative to production is chaotic and lacks a pragmatic framework for ongoing support. Inheritance Engineering offers a means for carrying out change in a reliable fashion and retaining as much value as possible throughout the life of the software. Unfortunately, this does not occur for a variety of
10/8/2009 4:04:00 PM

7 Mistakes You Can Avoid With E-mail Harassment Cases
In a landmark 7-2 decision, the US Supreme Court ruled that employers are responsible for harassment—even if they are not aware that it is going on. This “should have known” standard is particularly troublesome when harassment involves e-mail. How can you possibly know about every e-mail message from your employees, when thousands are sent every day?

RESPONSIBLE SOURCING: ruled that employers are responsible for harassment—even if they are not aware that it is going on. This “should have known” standard is particularly troublesome when harassment involves e-mail. How can you possibly know about every e-mail message from your employees, when thousands are sent every day? 7 Mistakes You Can Avoid With E-mail Harassment Cases style= border-width:0px; />   comments powered by Disqus Related Topics:   Human Capital Management (HCM),   E-mail Management Source:
1/30/2007 1:32:00 PM

Energy Management: Driving Value in Industrial Environments
Are you responsible for managing energy in your plant or currently in the process of establishing a formal energy management program? Aberdeen Group surveyed 230 executives to understand the success companies are realizing by effectively managing energy. Energy management started as a cost-saving initiative, but is becoming a strategic part of the company’s larger corporate social responsibility program. Learn more.

RESPONSIBLE SOURCING: Paper Description: Are you responsible for managing energy in your plant or currently in the process of establishing a formal energy management program? Aberdeen Group surveyed 230 executives to understand the success companies are realizing by effectively managing energy. Energy management started as a cost-saving initiative, but is becoming a strategic part of the company’s larger corporate social responsibility program. Learn more. Energy Management: Driving Value in Industrial Environments
9/14/2009 9:40:00 AM

Why Network Administrators Should Explore the “V” in KVM Switches
For data center administrators responsible for monitoring the screens of hundreds—and potentially thousands—of servers and PCs, video resolution is paramount for efficiency. A keyboard/video/mouse (KVM) switch can help by enabling IT staff to manage servers and other network devices, within the data center or remotely. Get a technical glimpse into the “whys” behind the “V” in KVM and the importance of video resolution.

RESPONSIBLE SOURCING: For data center administrators responsible for monitoring the screens of hundreds—and potentially thousands—of servers and PCs, video resolution is paramount for efficiency. A keyboard/video/mouse (KVM) switch can help by enabling IT staff to manage servers and other network devices, within the data center or remotely. Get a technical glimpse into the “whys” behind the “V” in KVM and the importance of video resolution. Why Network Administrators Should Explore the “V” in KVM Switches
9/15/2008 3:55:00 PM

CIOs Need to Be Held Accountable for Security
As systems, networks, and websites suffer new magnitudes of Denial of Service attacks, malicious network scans, and network intrusions, organizational CIOs need to be held accountable for information security.

RESPONSIBLE SOURCING: their investment holding is responsible and is being held accountable for security. If no one is held accountable, you can be assured that security will continue to be a low priority. All too often in Internet companies, security is an afterthought. The executive management team chooses not to take enough measures to protect its customers and systems until after a security incident of considerable magnitude has taken place. This consistent pattern of locking the barn door after the horse has been stolen
2/28/2000

Fighting Cybercrime on the Internet
Excerpts from a presentation on cybercrime by Laura Taylor, TEC Director of Security Research for the E-Gov 2000 Conference sponsored by SAIC on July 10, 2000 at the Washington Convention Center.

RESPONSIBLE SOURCING: be sued. Businesses are responsible not only for securing their websites against penetration, but also for insuring that the sites are not used for such illegal purposes as promoting pedophilia. Before I start discussing how to manage cyberpedophilia, we need to first look at pedophilia in general, and understand how to identify it so that we can most expeditiously enlist the proper authorities, create processes for action, and work towards national and local solutions. As a general rule of thumb,
7/18/2000

Trends in IT Needs, Purchasing, and Strategy » The TEC Blog
If those who are responsible for corporate strategy and approving IT purchasing don’t occupy themselves much with determining IT needs, how can IT be strategic? I suggest that supporting the area of determining needs is a key to IT’s shifting role. I mentioned that in one reading of “the modern enterprise,” the IT responsibility for selection gains prominence, and of course a critical early step in the selection process is determining needs. IT must develop a good comprehension of the needs and

RESPONSIBLE SOURCING: CEO, cfo, CIO, IT, IT purchasing, IT strategy, purchasing authorization, software needs assessment, TEC, Technology Evaluation, Technology Evaluation Centers, Technology Evaluation Centers Inc., blog, analyst, enterprise software, decision support.
13-09-2011

Business Intelligence Status Report: Recommendations
One of the biggest mistakes users often make with BI is forgetting the big picture, the strategic goals of what they hope to accomplish by accessing this information, while breaking out of traditional silo-ed metrics. BI is not a panacea, and enterprises must organize and prioritize their business needs across regions, departments (even across non-official

RESPONSIBLE SOURCING: products evolve, who is responsible for keeping the two in synch? And who is responsible for integration? Are you able to provide the internal hardware and software support required? Or will that have to be the vendors lookout? Part Seven of the Business Intelligence Status Report series. On the other hand, customers considering an enterprise application vendor that follows an alliance strategy with a renowned horizontal BI vendor, like Cognos or Business Objects , should consider the following: BI
7/16/2005

Harnessing the Power of an Enterprise IT Dashboard
IT management is faced with the daunting task of turning complex data into actionable information that supports an organization’s business strategy. IT management is also responsible for ensuring the availability and performance of mission-critical applications. Discover how to manage the IT environment from a dashboard that can deliver valuable and easy-to-use information from both physical and virtual environments.

RESPONSIBLE SOURCING: IT management is also responsible for ensuring the availability and performance of mission-critical applications. Discover how to manage the IT environment from a dashboard that can deliver valuable and easy-to-use information from both physical and virtual environments. Harnessing the Power of an Enterprise IT Dashboard style= border-width:0px; />   comments powered by Disqus Related Topics:   IT Infrastructure and Development,   Emulation and Virtualization,   Networking,   Server,   IT
12/9/2008 11:17:00 AM

Who to Blame for Project Failure? Look Up - Not Down, Not Left, Not Right.
Projects do fail. They fail from many different reasons. But the person at the top of the organization can stop or fix most of these problems before they derail the project. That person is the only one with the power to do so.

RESPONSIBLE SOURCING: Is Responsible? Who is responsible for the selection of the outsiders? Who is responsible for the performance of the internal team? The reality is that the person who is most responsible is the person at the top V for most failures, we need to look up within the organization. By top, we mean the person who is responsible for all the departments and people impacted by the project. If the project is confined to one plant, it may be the plant manager. If it impacts all plants, it may be the VP of
9/20/2002

Case Study: Faronics Power Save and Newport Independent School
Newport Independent school district’s implementation of a formal energy-conservation policy created problems for the district-wide computer system. Rather than having to manually shut down up to 900 computers at the end of every day, the district’s head IT technician opted to centralize control with Faronic’s Power Save technology. The final result: a solution that is both environmentally and fiscally responsible.

RESPONSIBLE SOURCING: both environmentally and fiscally responsible. Case Study: Faronics Power Save and Newport Independent School style= border-width:0px; />   comments powered by Disqus Related Topics:   Computerized Maintenance Management System (CMMS),   Energy Analysis and Management,   IT Asset Management (ITAM),   IT Infrastructure and Development,   Server Source: Faronics Learn more about Faronics Readers who downloaded this case study also read these popular documents! Developing an Effective CMMS Implement
10/3/2007 1:59:00 PM


Recent Searches
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Others