Staff Training White Papers

(View All Report Types)
Virtual Data Center eZine - Volume 4
sponsored by Virtual Data Center eZine - Volume 4
WHITE PAPER: This e-zine issue explains the direct benefits of implementing a SAP virtualization plan. It compares virtualization platforms, highlights common problems, and offers tips to leverage hardware-assisted memory virtualization.
Posted: 20 Aug 2008 | Published: 18 Aug 2008

All resources sponsored by Virtual Data Center eZine - Volume 4

Agile Transformation Strategy
sponsored by CollabNet
WHITE PAPER: The CollabNet Agile Coaches have observed patterns and key milestones in the way organizations adopt and scale Agile. "Agile Transformation Strategy," by Angela Druckman, CollabNet Certified Scrum Trainer and Agile Transformational Coach, outlines a sound strategy and transformational "blueprint" to help guide organizations on the path to Agility.
Posted: 08 Apr 2011 | Published: 08 Apr 2011

CollabNet

Four EHR Change Management Mistakes (And How to Avoid Them)
sponsored by HP & Intel®
WHITE PAPER: The question is no longer if your healthcare practice will make the transition to EHR, but when.  Careful planning and effective change management can help keep missteps – and the stress and costs that come with them – to a minimum.  This white paper presents strategies for avoiding common EHR implementation problems.
Posted: 01 Aug 2013 | Published: 16 Sep 2011

HP & Intel®

The key to Effective EHR Change Management
sponsored by HP & Intel®
WHITE PAPER: There are many factors to consider when rolling out an EHR implementation, and one of the most important is getting your people behind the change. This paper provides insight into where your staff may be in terms of resistance to or support for a new EHR system, and the necessary tools, training and support to transition successfully.
Posted: 01 Aug 2013 | Published: 15 Sep 2011

HP & Intel®

Best Practices for a Successful Upgrade Project
sponsored by HCL Software
WHITE PAPER: Upgrades help businesses to maintain a competitive edge in the market. Yet, upgrades pose their own set of challenges. This white paper lists the best practices that should be followed when upgrading to achieve maximum reliability.
Posted: 10 Jul 2008 | Published: 16 May 2008

HCL Software

Four Steps to a Best-Run Business
sponsored by SAP America, Inc.
WHITE PAPER: This document describes how you can build a strategy to unify and run your business more effectively.
Posted: 17 Sep 2008 | Published: 17 Sep 2008

SAP America, Inc.

Step Up to Cisco Premier
sponsored by Comstor
WHITE PAPER: Access this one-page resource to learn about Step Up to Cisco Premier, a unique training that can help your associates receive the Cisco Premier certification so you can identify your company as a qualified, trained, and experienced Cisco resource.
Posted: 08 Feb 2012 | Published: 27 Jan 2012

Comstor

Virtual Firsthand Training – A New Dimension of SAP® Education
sponsored by SAP America, Inc.
WHITE PAPER: This paper describes how new virtual learning options from the SAP® Education organization fulfill the requirements of many companies and consultants. Continue reading to learn how they reduce training investments, meet various needs, and offer a flexible learning approach.
Posted: 28 Sep 2010 | Published: 28 Sep 2010

SAP America, Inc.

Overcoming the Challenges of Green Procurement through eProcurement
sponsored by Dimension Data Global
WHITE PAPER: This eBook discusses nine eProcurement best practices. It also demonstrates how they will help you reduce environmental waste while implementing and managing your Green purchasing program.
Posted: 30 Sep 2008 | Published: 26 Sep 2008

Dimension Data Global

Measuring End User Susceptibility and Defenses Against Phishing Attacks with CORE Insight
sponsored by Core Security Technologies
WHITE PAPER: This white paper contains critical information about spear phishing and how to prepare your users and systems from falling for these targeted attacks being masked as trustworthy content.
Posted: 11 Oct 2013 | Published: 11 Oct 2013

Core Security Technologies