X
Browse RFP templates
Visit the TEC store for RFP templates that can save you weeks and months of requirements gathering, and help ensure the success of your software selection project.
Browse Now


Compare Software Solutions
Visit the TEC store to compare leading software solutions by funtionality, so that you can make accurate and informed software purchasing decisions.
Compare Now
 

 managing risks


Managing Risks, Managing Measures: Decision Support Methodologies in Business Part 1: Guidelines
Poor measurement methods can take off millions or more from bottom lines, and contribute at least in part to project failures, corporate inefficiencies and poor

managing risks  Risks, Managing Measures: Decision Support Methodologies in Business Part 1: Guidelines Executive Summary When it comes to making decisions using some tool that purports to measure value, it is wise to know something about the tool and what it is measuring, as well as why. Poor measurement methods contribute at least in part to project failures and corporate inefficiencies that can take off millions or more from bottom lines and poor technology selections alone have contributed to tens of billions

Read More


Browse RFP templates

Visit the TEC store for RFP templates that can save you weeks and months of requirements gathering, and help ensure the succes of your software selection project.

Browse Now
Compare Software Solutions

Visit the TEC store to compare leading software by functionality, so that you can make accurate and informed software purchasing decisions.

Compare Now

Sales Force Automation (SFA)

Sales Force Automation (SFA) systems help sales and marketing teams with functions related to taking orders, generating proposals or quotes, managing territories, managing partners, and maintaining contact data. Systems often include various levels of analytic and reporting capabilities. 

Evaluate Now

Documents related to » managing risks

Understanding and Managing Supply Chain Risk


As supply chains continue to grow in size and complexity, companies are focusing more of their energies on managing supply chain risk. While the topic is gaining prominence in boardrooms, many companies do not yet fully comprehend the risks they face. But understanding risk is the first step to managing it—and using the right IT tools can help. Learn what steps you can take to better address your supply chain risks.

managing risks  focusing more energy on managing supply chain risk. While the topic is gaining prominence in boardrooms, many companies do not yet have a sufficient grip on the risks they face. Globe-spanning extended supply chains are susceptible to myriad disruptions. These range from the fairly typical and mild fluctuations of the normal course of business to major disruptions, such as lost production capability caused by a fire at a crucial fabrication plant, or the closing of ports or transportation corridors due Read More

Reducing the Risks of Managing Web Services Environments


There was a time when companies went with one platform, and stuck with it, hiring IT staff with that technology in mind. That time has passed. Today, heterogeneity is the name of the game, with orga¬nizations having combinations of legacy software and distributed systems, across multiple platforms and applications. But while heterogeneity brings multiple benefits, it also involves serious risk.

managing risks  the Risks of Managing Web Services Environments There was a time when companies went with one platform, and stuck with it, hiring IT staff with that technology in mind. That time has passed. Today, heterogeneity is the name of the game, with orga¬nizations having combinations of legacy software and distributed systems, across multiple platforms and applications. But while heterogeneity brings multiple benefits, it also involves serious risk. Read More

Managing Risks Associated with Outsourcing


Strategic cost reduction has been a focus area for financial institutions (FIs), with outsourcing emerging as a very attractive option lately. But outsourcing is fraught with risks. This article examines risks associated with outsourcing and offers perspectives on managing these risks.

managing risks  and offers perspectives on managing these risks. Read More

Managing WLAN Risks with Vulnerability Assessment


There are many ways to safeguard wireless local area networks (WLANs), but which measures should you deploy, and how can you tell whether your network is sufficiently hardened against 802.11 and 802.1X attacks? Download this white paper to learn about a process for business risk analysis, vulnerability identification, and threat remediation—and find out how to conduct your own WLAN vulnerability assessment.

managing risks  WLAN Risks with Vulnerability Assessment There are many ways to safeguard wireless local area networks (WLANs), but which measures should you deploy, and how can you tell whether your network is sufficiently hardened against 802.11 and 802.1X attacks? Download this white paper to learn about a process for business risk analysis, vulnerability identification, and threat remediation—and find out how to conduct your own WLAN vulnerability assessment. Read More

Managing Customer Returns and RMAs Using Microsoft Dynamics AX


Returned material authorization (RMA) built on sales order functionality, such as that used by Microsoft Dynamics AX, can drastically simplify RMA processes.

managing risks  straightforward solution approaches for managing customer returns and returned material authorization (RMAs). In particular, Dynamics AX employs the standard functionality for sales orders to support most RMA variations, thereby making it easier to implement for users already familiar with sales order processing. This second part of a two-part article explains how Dynamics AX supports variations in RMA processing. It contains some of the information in Dr. Hamilton’s new book Managing Your Supply Chain Read More

Managing Your Business Processes to Create Competitive Advantage


Any company efficiency improvements are going to involve business process management (BPM). BPM ensures process consistency, optimizes business processes, and ensures compliance. The result is not only cuts in cost and time, but it adds a price value and creates a price advantage which helps companies enhance their competitive edge.

managing risks  Your Business Processes to Create Competitive Advantage Any company efficiency improvements are going to involve business process management (BPM). BPM ensures process consistency, optimizes business processes, and ensures compliance. The result is not only cuts in cost and time, but it adds a price value and creates a price advantage which helps companies enhance their competitive edge. Read More

Managing Customer Returns and RMAs


There are common and unique variations to returned material authorizations (RMAs) that can compound a company’s enterprise resource planning (ERP) system. Identifying RMA variations enables a company to determine what needs to be simplified and what needs to be modeled in an ERP system.

managing risks  AX solution approach to managing RMAs. It contains some of the information in Dr. Hamilton’s new book Managing Your Supply Chain Using Microsoft Dynamics AX 2009 . Returned material generally requires an authorization, termed returned material authorization (RMA) or returned goods authorization (RGA). In a simple situation, for example, the customer wants to return a defective product and obtain a credit. The company creates an RMA and provides the RMA number to the customer, who returns the item. The Read More

Managing Enterprise Agility


Real-time IT infrastructure promises to deliver services to businesses with the same availability as utilities. Cost reductions will be achieved through virtualization and consolidation. This white paper looks at the business drivers and technology advances that will provide the foundation for manageability of infrastructures across enterprise applications.

managing risks  Enterprise Agility Real-time IT infrastructure promises to deliver services to businesses with the same availability as utilities. Cost reductions will be achieved through virtualization and consolidation. This white paper looks at the business drivers and technology advances that will provide the foundation for manageability of infrastructures across enterprise applications. Read More

Managing Devices Intelligently: Hurdles Remain, but a Promising Opportunity


This white paper reveals the results of a survey that examined how companies can intelligently manage devices to create value, and to look at implications for improving energy efficiency. While recognizing there are challenges facing smart management of devices, one third of those who responded to a related survey also acknowledged that such efforts could help cut costs or increase profits significantly across many areas of the business. Learn more. Download this white paper now.

managing risks  Devices Intelligently: Hurdles Remain, but a Promising Opportunity This white paper reveals the results of a survey that examined how companies can intelligently manage devices to create value, and to look at implications for improving energy efficiency. While recognizing there are challenges facing smart management of devices, one third of those who responded to a related survey also acknowledged that such efforts could help cut costs or increase profits significantly across many areas of the Read More

Managing Demand: Considerations for the Chemicals Industry


Enterprise systems have brought many benefits to chemical environments, but for individual enterprises, gaining these benefits requires selecting a solution that can deal with the unique needs of the business.

managing risks  for the Chemicals Industry Managing Demand Effectively Due to the inherent challenges of the chemicals industry, most chemicals companies are still unable to profitably respond to highly variable demand, or to execute predictable product supply strategies. Thus, optimizing their distribution networks and rationalizing their inventories are the keys to an efficient supply chain and smoother operations. Chemicals companies must also resolve the challenges posed by environmental regulations and the need for Read More

Managing Your Wireless Workforce


Mobile data security is most effective when implemented in layers: installing smart firewalls, deploying antivirus software, and using encrypted connections. True mobile security relies just as much on the actions of end users. This means companies must instill a culture of security within their organizations. Learn how well–considered policies and procedures encourage and enforce smart and safe business practices.

managing risks  Your Wireless Workforce Mobile data security is most effective when implemented in layers: installing smart firewalls, deploying antivirus software, and using encrypted connections. True mobile security relies just as much on the actions of end users. This means companies must instill a culture of security within their organizations. Learn how well–considered policies and procedures encourage and enforce smart and safe business practices. Read More

Managing Allocations while Processing Orders


Responding immediately to product availability requests with accurate delivery dates, and following through on commitments, is critical to serving the customer base. Improvement in this area will impact the bottom line through higher customer satisfaction, and decreased costs for goods sold. It is especially critical for enterprises to manage supply commitments to customers when products need to go on allocation.

managing risks  Allocations while Processing Orders Responding immediately to product availability requests with accurate delivery dates, and following through on commitments, is critical to serving the customer base. Improvement in this area will impact the bottom line through higher customer satisfaction, and decreased costs for goods sold. It is especially critical for enterprises to manage supply commitments to customers when products need to go on allocation. Read More

10 Keys to Managing Risk in Perilous Times


In the economist intelligence unit white paper managing risk in perilous times: practical steps to accelerate recovery, you'll find ten key recomme...

managing risks  Keys to Managing Risk in Perilous Times Risk management was hardly front page news—until last year, when financial markets around the world began to melt down. Now businesses in every industry are scrambling to find ways to address potential weaknesses in their risk identification, assessment, and management policies. In the Economist Intelligence Unit white paper Managing Risk in Perilous Times: Practical Steps to Accelerate Recovery , you'll find ten key recommendations for avoiding the risk Read More

Managing Vendor Code Customizations with AccuRev Stream-based SCM


Customizing third-party “vendor” source code is becoming increasingly common. But managing the incorporation of vendor application releases alongside customizations requires an additional layer of software configuration management (SCM) to integrate subsequent vendor releases. Traditional branch-based SCM tools require an unnecessarily complex branch-and-merge process. However, there is a more intuitive and efficient parallel development model for managing customizations to vendor code.

managing risks  becoming increasingly common. But managing the incorporation of vendor application releases alongside customizations requires an additional layer of software configuration management (SCM) to integrate subsequent vendor releases. Traditional branch-based SCM tools require an unnecessarily complex branch-and-merge process. However, there is a more intuitive and efficient parallel development model for managing customizations to vendor code. Read More