14 items found
Value Stream Assessment (VSA) is an approach used to assess the strengths and weaknesses of an enterprise's value stream(s) for the express purpose of creating a value stream-driven solution. This Microsoft Project plan will help you do just that.
This Vendor Qualifications Evaluation details a complete description of the expected level of service and performance to be provided by prospective vendors.
Use this template to help manage your virtual team's performance by providing stage-specific guidance in key management areas. This handy virtual team management matrix will help you through all stages of JPACE (Justify, Plan, Activate, Control, End).
Teams of virtual knowledge workers can spin out of control if not following specific best practices meant for them. This troubleshooter allows for a quick, detailed analysis and determination of actions to resolve or mitigate problems.
Prepare to succeed with your virtual team with these specialized tasks for your work plan. They cover each stage of your project from planning to post mortem.
Chances are that you work on at least one virtual team. The obstacles to performance are many: time zone differences, matrix management, the blurring of the work/life boundary, and cultural differences. This webinar will summarize issues with virtual teams and offer possible solutions.
If you work in a large organization, then chances are better than good that you work on at least one 'virtual team,' possibly more. If you're like most people, you find this 'difficult,' if not almost impossible from time to time. The obstacles to performance are many; they include time zone differences, matrix management, the blurring of the work/life boundary, and cultural differences that are totally hidden until you're ensnared in some conflict that no one really understands. Welcome to the modern world.
Do you have a policy in place to protect your company's computers and data networks against viruses and other destructive programs? If you don't, it's never too late to put one together. Use this document as a template. If you do have a security policy in place, you can use this document as a framework to get that policy out on your corporate intranet so everyone can practice safe computing.
Having a virus protection policy and guidelines in place is the first step toward protecting your company's computers and data networks against viruses and other destructive programs.