This guide is designed to provide the project manager with guidance for basing certain workforce planning and communication tasks on corporate vacation policy.
13 items found
This very detailed template helps you define your project's unique value proposition and compare it against other projects being proposed within your organization. It outlines three simple steps to help you understand and articulate your project's relative value to others. If you’re struggling with getting your effort approved, this template is a must-have.
How do you decide which application package vendors are suitable candidates for your project? Make sure industry and in-house benchmark standards factor into the mix.
This Vendor Qualifications Evaluation details a complete description of the expected level of service and performance to be provided by prospective vendors.
Use this form to capture information you quoted to a client for proposed work or services.
How would you show the client your analysis of a necessary technology? This report analyzes and compares video delivery systems and multimedia architectures for a website, using straightforward language and a clear recommendation.
Use this template to help manage your virtual team's performance by providing stage-specific guidance in key management areas. This handy virtual team management matrix will help you through all stages of JPACE (Justify, Plan, Activate, Control, End).
Teams of virtual knowledge workers can spin out of control if not following specific best practices meant for them. This troubleshooter allows for a quick, detailed analysis and determination of actions to resolve or mitigate problems.
Prepare to succeed with your virtual team with these specialized tasks for your work plan. They cover each stage of your project from planning to post mortem.
Do you have a policy in place to protect your company's computers and data networks against viruses and other destructive programs? If you don't, it's never too late to put one together. Use this document as a template. If you do have a security policy in place, you can use this document as a framework to get that policy out on your corporate intranet so everyone can practice safe computing.