You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
Project or program health checks provide tremendous value to businesses and pay for themselves by multiples of magnitude. No matter how well a project or program is performing, there are always activities that can provide better value, reduce costs, or introduce more innovation. IT project and program health checks can help organizations reach their goals and dramatically improve Return on Investment (ROI). IT Project Health Checks: Driving Successful Implementation and Multiples of Business Value offers a proven approach for evaluating IT projects or programs in order to determine how they are performing and how the eventual outcome for the initiative is currently trending. The project or p...
As Web-based systems and e-commerce carry businesses into the 21st century, databases are becoming workhorses that shoulder each and every online transaction. For organizations to have effective 24/7 Web operations, they need powerhouse databases that deliver at peak performance-all the time. High Performance Web Databases: Design, Development, and
The move to manage medicine from a financial perspective, i.e. managed care, has added huge layers of bureaucratic and administrative functions to healthcare. The need to have the ability to track patient medical records, mandated by government legislation such as HIPAA, is bringing new technologies and processes into the healthcare arena. A univer
If you are a typical Oracle professional, you don't have the luxury of time to keep up with new technology and read all the new manuals to understand each new feature of the latest release from Oracle. You need a comprehensive source of information and in-depth tips and techniques for using the new technology. You need Oracle Internals: Tips, Trick
Like no other book before it, Global Information Warfare illustrates the relationships and interdependencies of business and national objectives, of companies and countries, and of their dependence on advances in technology. This book sheds light on the "Achilles heel" that these dependencies on advanced computing and information technologies creat
Today the vast majority of the world's information resides in, is derived from, and is exchanged among multiple automated systems. Critical decisions are made, and critical action is taken based on information from these systems. Therefore, the information must be accurate, correct, and timely, and be manipulated, stored, retrieved, and exchanged s
Applications that work perfectly in controlled settings often fail in production environments, impacting business operations. This book explores a frequently overlooked aspect of software development: non-functional design and testing. In the real world, hostile production conditions and changing business usage can lead to unforeseen downtime or unacceptable system performance. Written by technologists and based on real field experience, the book examines common failure scenarios, defensive design patterns, and effective performance strategies.
Given our increasing dependency on computing technology in daily business processes, and the growing opportunity to use engineering technologies to engage in illegal, unauthorized, and unethical acts aimed at corporate infrastructure, every organization is at risk. Cyber Forensics: A Field Manual for Collecting, Examining, and Preserving Evidence o
"Assess the health of your organization using Purba and Delaney's 12 keys methodology - metrics that track the value of a consulting organization's activities and investments - to measure for positive impact on the client, employee and profitability. Use these, along with ready to use forms and checklists, to effectively analyze your practice in terms of : client satisfaction, resource utilzation, employee health and morale, average billing rate, accounts receivable, operational costs, average sales discounts, sales pipeline, engagement backlog, sales hit ratio, resource leverage, and practice risk and exposure." - book jacket.
This handbook provides a detailed description and analysis of the concepts, processes, and technologies used in the development and implementation of an effective customer relationship (CRM) strategy. It takes readers through the evolution of CRM- from its early beginning to today's sophisticated data warehouse-based systems. Illustrations enhance the textual presentation. Case studies provide insight and lessons-to-be-learned and describe the benefits of successful CRM implementations. The chapter on privacy issues covers the processes companies use to ensure the privacy of their customer data, the last chapter explores the benefits of a well-conceived CRM strategy.