Business of Information Technology  >   Business Management  >   Risk Management  >   Occupational and Environmental Safety  >  

Safety-Improvement Programs

RSS Feed    Add to Google    Add to My Yahoo!
DEFINITION: Practices intended to constantly improve safety within a plant or across a company, including, but not limited to, safety teams, safety awareness programs and communications, safety "days," safety training, and setting of continuous-improvement goals targeting safety metrics, such as OSHA incidents or lost-workday rates.
Safety-Improvement Programs White Papers (View All Report Types)
76 - 100 of 1212 Matches Previous Page  |  Next Page
Accounts Payable FAQ Guide: 15 Questions to Differentiate Automation Solutions
sponsored by Esker Inc.
WHITE PAPER: Read this resource to find out how automating accounts payable could help your business get accurate intelligent data capture, improve vendor communications, increase global presence, and much more.
Posted: 22 Jan 2015 | Published: 22 Jan 2015

Esker Inc.

Accurate, Effective Fraud Prevention
sponsored by IBM
WHITE PAPER: This white paper describes an example of an airtight fraud prevention system.
Posted: 06 Mar 2015 | Published: 31 Aug 2014

IBM

Achieving Data-Drive Security Intelligence
sponsored by Splunk
WHITE PAPER: This white paper discusses how you can obtain the kind of data-driven security that's needed for combatting today's advanced threats.
Posted: 14 Aug 2015 | Published: 31 Dec 2014

Splunk

Achieving PCI DSS Peace of Mind in the Cloud
sponsored by CloudPassage
WHITE PAPER: Access this white paper to learn how you can achieve PCI DSS compliance in the cloud without any hassle or setbacks.
Posted: 09 Sep 2014 | Published: 30 Jun 2014

CloudPassage

Adapt Your Security to Today's Threats
sponsored by Digital Guardian
WHITE PAPER: This white paper discusses why changes in security strategies are necessary and how you can make these changes.
Posted: 14 Aug 2015 | Published: 14 Aug 2015

Digital Guardian

Addressing Liquidity and Solvency Risk
sponsored by IBM
WHITE PAPER: In this white paper, learn more about how different industries are responding to these changes. This survey unlocks some of the key differences in the industry, and what that could mean for your business.
Posted: 22 Aug 2015 | Published: 22 Aug 2015

IBM

Advance the Fight against Cyber Threats
sponsored by Hewlett-Packard Limited
WHITE PAPER: This white paper introduces the benefits of security services and gives you advice on how to best take advantage of them.
Posted: 21 May 2015 | Published: 30 Apr 2015

Hewlett-Packard Limited

Advance Your Cybersecurity Career with Unique Online Cybersecurity Graduate Program
sponsored by Mission Critical Institute
WHITE PAPER: This resource introduces the expert faculty in the online cybersecurity MBA program offered through Concordia St. Paul. Take a look to determine if these staff members could help you reach your further education goals.
Posted: 23 Jun 2015 | Published: 23 Jun 2015

Mission Critical Institute

Advanced Threat Detection and Response
sponsored by Splunk
WHITE PAPER: This white paper explains how to detect advanced threat activity from both the host and the network perspectives and advises on several solutions to combat these threats.
Posted: 13 Aug 2015 | Published: 13 Aug 2015

Splunk

Achieving Value in Healthcare Through Efficiency and Effectiveness
sponsored by Dell, Inc.
WHITE PAPER: this white paper demonstrates how, by reforming health care delivery, implementing appropriate technology, and reshaping the medical establishment which supports efficiency and effectiveness, America can provide the best value in health care services for its citizens.
Posted: 20 Jun 2012 | Published: 20 Jun 2012

Dell, Inc.

Actionable Enterprise Architecture
sponsored by IBM
WHITE PAPER: This white paper provides an overview of the enterprise architecture concept and highlights how an actionable enterprise architecture approach from IBM can help organizations manage complexity and align IT projects and solutions with business objectives.
Posted: 11 Sep 2009 | Published: 01 Jun 2009

IBM

Addressing IT governance, risk and compliance (GRC) to meet regulatory requirements and reduce operational risk in financial services organizations
sponsored by IBM
WHITE PAPER: Organizations must implement the right IT GRC controls to meet meet regulatory requirements in areas of specific concern to auditors and reduce operational risk. Learn how IBM provides the capabilities to tackle specific compliance and audit requirements and address issues affecting long-term, ongoing risk management.
Posted: 08 Aug 2011 | Published: 08 Aug 2011

IBM

Addressing the Destructive Business Impact of Data Performance Problems
sponsored by Syncsort
WHITE PAPER: This paper details non-disruptive strategies for eliminating performance problems in existing data integration environments.
Posted: 29 Oct 2009 | Published: 28 Oct 2009

Syncsort

Addressing the Insider Threat with NetIQ Operational Change Control Solutions
sponsored by SUSE
WHITE PAPER: Download "Addressing the Insider Threat with NetIQ Operational Change Control Solutions" to get the expert advice you need to build a comprehensive management system that reduces and eliminates the risk of an insider threat.
Posted: 09 Aug 2006 | Published: 29 Mar 2006

SUSE

Advanced Attacks Require Federal Agencies to Reimagine IT Security
sponsored by FireEye
WHITE PAPER: This guide outlines the malware "kill-chain" model used in many of today's cyber-attacks and how these can overwhelm traditional security tools.
Posted: 27 Feb 2014 | Published: 27 Feb 2014

FireEye

Advanced Case Management for Smarter Government
sponsored by IBM
WHITE PAPER: Case management is an area in which many government agencies can benefit by using new tools and approaches. By reading this White Paper, learn how to unify information, processes and people to provide better, faster services and programs.
Posted: 20 Aug 2010 | Published: 20 Aug 2010

IBM

Advanced Identity Tracking for Social Networking Sites
sponsored by Hewlett-Packard Company
WHITE PAPER: This resource details the methods used to assist social networking sites in identifying online predators and thwarting potentially serious attacks. View now to learn more!
Posted: 22 Apr 2013 | Published: 31 May 2012

Hewlett-Packard Company

Advancing Healthcare through the Application of Predictive Knowledge Management
sponsored by Dell, Inc.
WHITE PAPER: This white paper examines how the health care industry can proactively support patient-focused care through the use of technology services that enable predictive analysis.
Posted: 20 Jun 2012 | Published: 20 Jun 2012

Dell, Inc.

Advancing the Data Agenda: Roles and Responsibilities in the Data Quality Trenches
sponsored by DataFlux Corporation
WHITE PAPER: It is high-minded to observe that any data program requires a full partnership between business and IT. The real world is more mundane and far more demanding than that. Indeed, success with any data program depends on getting the right groups involved and assigning the right people the right roles and responsibilities. Read on to learn more.
Posted: 31 Jan 2011 | Published: 31 Jan 2011

DataFlux Corporation

After a Thorough Search and Exhaustive Testing of Device Control Solutions, Greenwood Academies Trust Chooses Lumension®
sponsored by Lumension
WHITE PAPER: This case study focuses on one organization that implemented device control to better manage its sensitive data across all endpoints and removable devices without any worry.
Posted: 11 Oct 2013 | Published: 11 Oct 2013

Lumension

After the crisis: What now?
sponsored by IBM
WHITE PAPER: To succeed in this new climate, you now need to take decisive action to preempt scarcity, drive cost efficiency and find targeted approaches to revenue growth. Read this executive report to find out how.
Posted: 26 Aug 2010 | Published: 09 Mar 2010

IBM

Agile Decision Services: How IBM ILOG’s Business Rule Management System Helps Organizations Deliver Fast Time to Value for Business and IT
sponsored by IBM
WHITE PAPER: This paper explores the challenges of trying to deliver quick time-to -value for IT projects and achieve the status of ‘agile enterprise’. It illustrates how IBM® WebSphere® ILOG BRMS can facilitate the alignment of IT with business and support the implementation of an ADS to provide business value within months of project adoption.
Posted: 12 Dec 2010 | Published: 12 Dec 2010

IBM

Aging ERP: When Old ERP is Too Old
sponsored by Sage Software
WHITE PAPER: This research reports looks at the overall performance of companies and what improvements companies were still getting from their ERP systems.  Find out what the benefits are from newer ERP systems, and when you should consider an upgrade or replacement.
Posted: 13 Sep 2011 | Published: 13 Sep 2011

Sage Software

Aligning Application Infrastructure with Business through SOA Delivery
sponsored by F5 Networks
WHITE PAPER: A successful SOA implementation relies as much on the flexibility of your network as it does the services which will be delivered on it. This white paper explores the unique challenges when implementing a service oriented architecture.
Posted: 28 Apr 2008 | Published: 01 Mar 2007

F5 Networks

Aligning Business and Insurance Technology, 2007 P&C Technology Survey Results
sponsored by Fiserv Insurance Solutions
WHITE PAPER: In May 2007, Fiserv Insurance Solutions surveyed IT leaders at some of the leading property & casualty insurance carriers in the United States. From our second annual survey we see new trends developing and others that continue because of their...
Posted: 25 Apr 2008 | Published: 01 Jun 2006

76 - 100 of 1212 Matches Previous Page    2 3 4 5 6 7    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement