Home
 > search for

Featured Documents related to »  managing risks


Managing Risks, Managing Measures: Decision Support Methodologies in Business Part 1: Guidelines
Poor measurement methods can take off millions or more from bottom lines, and contribute at least in part to project failures, corporate inefficiencies and poor

managing risks  Risks, Managing Measures: Decision Support Methodologies in Business Part 1: Guidelines Executive Summary When it comes to making decisions using some tool that purports to measure value, it is wise to know something about the tool and what it is measuring, as well as why. Poor measurement methods contribute at least in part to project failures and corporate inefficiencies that can take off millions or more from bottom lines and poor technology selections alone have contributed to tens of billions Read More

Sales Force Automation (SFA)
Sales Force Automation (SFA) systems help sales and marketing teams with functions related to taking orders, generating proposals or quotes, managing territories, managing partners, and maintaining...
Start evaluating software now
Country:
 Security code
Already have a TEC account? Sign in here.
 
Don't have a TEC account? Register here.

Documents related to » managing risks


Understanding and Managing Supply Chain Risk
As supply chains continue to grow in size and complexity, companies are focusing more of their energies on managing supply chain risk. While the topic is

managing risks  focusing more energy on managing supply chain risk. While the topic is gaining prominence in boardrooms, many companies do not yet have a sufficient grip on the risks they face. Globe-spanning extended supply chains are susceptible to myriad disruptions. These range from the fairly typical and mild fluctuations of the normal course of business to major disruptions, such as lost production capability caused by a fire at a crucial fabrication plant, or the closing of ports or transportation corridors due Read More
Reducing the Risks of Managing Web Services Environments
There was a time when companies went with one platform, and stuck with it, hiring IT staff with that technology in mind. That time has passed. Today

managing risks  the Risks of Managing Web Services Environments There was a time when companies went with one platform, and stuck with it, hiring IT staff with that technology in mind. That time has passed. Today, heterogeneity is the name of the game, with orga¬nizations having combinations of legacy software and distributed systems, across multiple platforms and applications. But while heterogeneity brings multiple benefits, it also involves serious risk. Read More
Managing Risks Associated with Outsourcing
Strategic cost reduction has been a focus area for financial institutions (FIs), with outsourcing emerging as a very attractive option lately. But outsourcing

managing risks  and offers perspectives on managing these risks. Read More
Managing WLAN Risks with Vulnerability Assessment
There are many ways to safeguard wireless local area networks (WLANs), but which measures should you deploy, and how can you tell whether your network is

managing risks  WLAN Risks with Vulnerability Assessment There are many ways to safeguard wireless local area networks (WLANs), but which measures should you deploy, and how can you tell whether your network is sufficiently hardened against 802.11 and 802.1X attacks? Download this white paper to learn about a process for business risk analysis, vulnerability identification, and threat remediation—and find out how to conduct your own WLAN vulnerability assessment. Read More
Managing Customer Returns and RMAs Using Microsoft Dynamics AX
Returned material authorization (RMA) built on sales order functionality, such as that used by Microsoft Dynamics AX, can drastically simplify RMA processes.

managing risks  straightforward solution approaches for managing customer returns and returned material authorization (RMAs). In particular, Dynamics AX employs the standard functionality for sales orders to support most RMA variations, thereby making it easier to implement for users already familiar with sales order processing. This second part of a two-part article explains how Dynamics AX supports variations in RMA processing. It contains some of the information in Dr. Hamilton’s new book Managing Your Supply Chain Read More
Managing Your Business Processes to Create Competitive Advantage
Any company efficiency improvements are going to involve business process management (BPM). BPM ensures process consistency, optimizes business processes, and

managing risks  Your Business Processes to Create Competitive Advantage Any company efficiency improvements are going to involve business process management (BPM). BPM ensures process consistency, optimizes business processes, and ensures compliance. The result is not only cuts in cost and time, but it adds a price value and creates a price advantage which helps companies enhance their competitive edge. Read More
Managing Customer Returns and RMAs
There are common and unique variations to returned material authorizations (RMAs) that can compound a company’s enterprise resource planning (ERP) system

managing risks  AX solution approach to managing RMAs. It contains some of the information in Dr. Hamilton’s new book Managing Your Supply Chain Using Microsoft Dynamics AX 2009 . Returned material generally requires an authorization, termed returned material authorization (RMA) or returned goods authorization (RGA). In a simple situation, for example, the customer wants to return a defective product and obtain a credit. The company creates an RMA and provides the RMA number to the customer, who returns the item. The Read More
Managing Enterprise Agility
Real-time IT infrastructure promises to deliver services to businesses with the same availability as utilities. Cost reductions will be achieved through

managing risks  Enterprise Agility Real-time IT infrastructure promises to deliver services to businesses with the same availability as utilities. Cost reductions will be achieved through virtualization and consolidation. This white paper looks at the business drivers and technology advances that will provide the foundation for manageability of infrastructures across enterprise applications. Read More
Managing Devices Intelligently: Hurdles Remain, but a Promising Opportunity
This white paper reveals the results of a survey that examined how companies can intelligently manage devices to create value, and to look at implications for

managing risks  Devices Intelligently: Hurdles Remain, but a Promising Opportunity This white paper reveals the results of a survey that examined how companies can intelligently manage devices to create value, and to look at implications for improving energy efficiency. While recognizing there are challenges facing smart management of devices, one third of those who responded to a related survey also acknowledged that such efforts could help cut costs or increase profits significantly across many areas of the Read More
Managing Demand: Considerations for the Chemicals Industry
Enterprise systems have brought many benefits to chemical environments, but for individual enterprises, gaining these benefits requires selecting a solution

managing risks  for the Chemicals Industry Managing Demand Effectively Due to the inherent challenges of the chemicals industry, most chemicals companies are still unable to profitably respond to highly variable demand, or to execute predictable product supply strategies. Thus, optimizing their distribution networks and rationalizing their inventories are the keys to an efficient supply chain and smoother operations. Chemicals companies must also resolve the challenges posed by environmental regulations and the need for Read More
Managing Your Wireless Workforce
Mobile data security is most effective when implemented in layers: installing smart firewalls, deploying antivirus software, and using encrypted connections

managing risks  Your Wireless Workforce Mobile data security is most effective when implemented in layers: installing smart firewalls, deploying antivirus software, and using encrypted connections. True mobile security relies just as much on the actions of end users. This means companies must instill a culture of security within their organizations. Learn how well–considered policies and procedures encourage and enforce smart and safe business practices. Read More
Managing Allocations while Processing Orders
Responding immediately to product availability requests with accurate delivery dates, and following through on commitments, is critical to serving the customer

managing risks  Allocations while Processing Orders Responding immediately to product availability requests with accurate delivery dates, and following through on commitments, is critical to serving the customer base. Improvement in this area will impact the bottom line through higher customer satisfaction, and decreased costs for goods sold. It is especially critical for enterprises to manage supply commitments to customers when products need to go on allocation. Read More
10 Keys to Managing Risk in Perilous Times
In the economist intelligence unit white paper managing risk in perilous times: practical steps to accelerate recovery, you'll find ten key recomme...

managing risks  Keys to Managing Risk in Perilous Times Risk management was hardly front page news—until last year, when financial markets around the world began to melt down. Now businesses in every industry are scrambling to find ways to address potential weaknesses in their risk identification, assessment, and management policies. In the Economist Intelligence Unit white paper Managing Risk in Perilous Times: Practical Steps to Accelerate Recovery , you'll find ten key recommendations for avoiding the risk Read More
Managing Vendor Code Customizations with AccuRev Stream-based SCM
Customizing third-party “vendor” source code is becoming increasingly common. But managing the incorporation of vendor application releases alongside

managing risks  becoming increasingly common. But managing the incorporation of vendor application releases alongside customizations requires an additional layer of software configuration management (SCM) to integrate subsequent vendor releases. Traditional branch-based SCM tools require an unnecessarily complex branch-and-merge process. However, there is a more intuitive and efficient parallel development model for managing customizations to vendor code. Read More

Recent Searches
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Others