management information

Results 251 - 275 of 475Sort Results By: Published Date | Title | Company Name
Published By: NetIQ     Published Date: Jul 27, 2011
Listen in as Andras Cser, Principal Analyst at Forrester Research, speaks about trends he is seeing in the Identity & Access Management (IAM) market, and specifically about the challenges and benefits of user provisioning.
Tags : 
active directory, ad administration, netiq, compliance, active directory administration, user provisioning, reduce administrative priviledge, itpa, it process automation, security, active directory management, data protection, information security, identity management, identity and access management, staffing, provisioning, threat, iam, privilege delegation
    
NetIQ
Published By: Liaison Technologies     Published Date: Feb 07, 2014
Big Data holds the promise of a virtually unlimited ability to gain insight – and foresight – to sharpen strategies and improve tactical execution but only if it can be harnessed and managed. Through this whitepaper, you can learn how.
Tags : 
liaison, data integration, data management, it resources, business continuity, systems and processes, autonomous acquisitions, information segregation, integration scope, internal resources, hybrid-type, m&a, data processes, it infrastructure, enterprise data, enterprise trends, productivity, hybrid acquisitions, integration phase, data center
    
Liaison Technologies
Published By: TeamQuest     Published Date: Sep 06, 2012
Watch how a global capacity management team managed service levels after multiple bank acquisitions.
Tags : 
capacity management, capacity planning, team quest, information technology, business technology
    
TeamQuest
Published By: TeamQuest     Published Date: Sep 06, 2012
Verizon Wireless executive Rich Rodgers explains how his team knew they had the right amount of capacity to handle the surge in IT service demand during the iPhone launch.
Tags : 
iphone, verizon wireless, capacity management, performance management, information technology, capacity planning, business technology
    
TeamQuest
Published By: IBM     Published Date: Jan 17, 2012
Come learn how the IBM portfolio of Business Analytics solutions, including the new IBM Software for Decision Management, empowers your organization to assemble and analyze information, improve decision-making and drive fact-based action to optimize business outcomes.
Tags : 
innovations, virtual, analytics, business, cognos, insight, decision-making
    
IBM
Published By: Janrain, Inc.     Published Date: Oct 29, 2012
Never before have digital marketers been blessed with such immense quantities of online customer data at our disposal, yet been so incapacitated by how to use it. This paper explores ways to collect value from customer related information.
Tags : 
janrain, user management, vibrant audience, online users, user engagement, big data, customer related information, collect value
    
Janrain, Inc.
Published By: IBM     Published Date: Jul 19, 2012
Transform your businesses to be smarter, greener and more cost effective by renewing your Software Subscription and Support. Watch our video and learn about the benefits of renewing on-time direct from Debbie Landers, Vice President, Worldwide Client Support, Information Management Software
Tags : 
ibm, technology, business management, information management, software, support, business technology
    
IBM
Published By: IBM     Published Date: Nov 09, 2012
Many organizations today are introducing additional controls and accountability into management practices to improve governance and mitigate against risk. Read this white paper to learn more about Information governance and auditing with System Z.
Tags : 
ibm, system z, information governance audit, protection, data protection, business technology
    
IBM
Published By: IBM     Published Date: Jul 11, 2012
Software Asset Management associated costs have once again risen as a high priority for IT, and rightfully so. This paper offers information on technology that manages software assets cost efficiently, cost effectively in a low risk environment.
Tags : 
software asset management, sam, software asset cost, cost effective, cost efficient, risk avoidance, managing software assets, substantial expense reduction, ibm tivoli, business alignment, it infrastructure library, itil, it strategy, it planning, software licences, analytics, audit preparedness, virtualization, cloud, saas
    
IBM
Published By: SAP     Published Date: Jul 19, 2012
With SAP® BusinessObjectsT Web Intelligence® software, companies can perform sophisticated ad hoc reporting and analysis. Powerful functionality and an intuitive user interface enable your people to turn data into insights, improve decision making and productivity, and share knowledge across the enterprise.
Tags : 
sap, business, management, software, business information, insights, analysis, interactive, businessobjects, web intelligence, business technology
    
SAP
Published By: SunGard     Published Date: Aug 13, 2012
A leader in performance management, marketing, and training, Frontline Focus required a new data solution to keep information flowing and secure. Any solution had to be resilient, highly available,completely scalable, and cost-effective.
Tags : 
cloud, scalable, cost-effective, sunguard, virtual, cloud, iaas, capital, expenditures, security, recoverability, storage, data management, business technology, data center
    
SunGard
Published By: CDW     Published Date: Apr 04, 2016
To power your new and legacy applications and workloads, different IT environments are required based on your unique industry and application needs. Organizations need the right mix of traditional infrastructure, private cloud, and public cloud with consistent management and control software to meet the demands for agility and excellent user experience.
Tags : 
infrastructure management, applications, information technology, cloud computing, content management
    
CDW
Published By: Box     Published Date: Jan 16, 2015
Desktop management at any scale is a tedious job. Imaging, reimaging, and troubleshooting desktop systems consume valuable IT resources, and keep employees from being productive. Securing the information generated on desktops, tablets, and smartphones is no simple job either. Many organizations are deploying virtual desktop infrastructures (VDI) for these reasons. But for deployment to be successful, computing and storage infrastructures must deliver high-quality, predictable, and productive user experiences. Often, the best way to accomplish this is through flash-based storage solutions due to its low latency/high IOPS nature. Unfortunately many IT professionals aren't sure what type of flash array is best for their needs or how to ensure that all elements of their VDI work seamlessly. Download now and learn how to validate a provide VDI configuration across NexGen N5 Hybrid Flash Array, VMWare Horizon View, Cisco Unified Computing System™(UCS), and Cisco Nexus Switches.
Tags : 
nexgen, hybrid, flash, qos, quality of service, it management
    
Box
Published By: ARMA     Published Date: Nov 04, 2014
The relationship between an organization's information-handling practices and the impact those practices have on its ability to respond to electronic discovery is recognized in the Electronic Discovery Reference Model (EDRM). But the EDRM falls short of describing standards or best practices that can be applied to the complex issues surrounding the creation, management, and governance of electronic information. ARMA International's Generally Accepted Record-keeping Principles and its information Governance Maturity Model are designed specifically to provide a scalable, broadly applicable framework to address these issues.
Tags : 
information-handling practices, edrm, electronic discovery, maturity model, it management, knowledge management, data management
    
ARMA
Published By: CDW-HPE Servers     Published Date: Apr 07, 2016
To power your new and legacy applications and workloads, different IT environments are required based on your unique industry and application needs. Organizations need the right mix of traditional infrastructure, private cloud, and public cloud with consistent management and control software to meet the demands for agility and excellent user experience.
Tags : 
infrastructure management, applications, information technology, cloud computing, content management, business technology
    
CDW-HPE Servers
Published By: Google - SAP     Published Date: Jun 20, 2019
According to SiriusDecisions, 79% of companies miss their forecast by 10% or more. Pipeline management is often mismanaged and sales forecasting often off-base. Getting accurate and reliable information about the state of the deals in your pipeline is the key to a happy sales force. Accurate pipeline information also is the foundation of predictable and reliable sales forecasts. Wouldn’t a sales forecast that’s right all of the time be a boon to your organization? Download our new eBook “Pipeline Management and Forecasting are Key to Improving the Sales Experience” to find out how automated tools, AI, and clean data sets can help you as a sales manager to: ? Eliminate the mid-pipeline “black hole” and find out what’s really going on ? Use signals outside of your CRM to get scarily accurate deal opportunity scores and quarterly forecasts. ? Help align the customer journey with your sales process and get happy customers and happy sales reps
Tags : 
    
Google - SAP
Published By: Gartner     Published Date: Dec 21, 2011
Enterprise content management (ECM) represents both a strategy to deal with all types of unstructured content and a set of software products for managing the entire content life cycle. However, new content types and disruptive forces - such as the consumerization of IT - continue to multiply the number of repositories and applications that enterprises must deal with.
Tags : 
gartnet, enterprise, content management, technology, ecm, information management
    
Gartner
Published By: VMware AirWatch     Published Date: May 18, 2016
In this paper, we discuss why a bring-your-own-device (BYOD) approach to workforce mobility can be a compromise-free approach, and then how the combined capabilities of Samsung KNOX and Enterprise Mobility Management from AirWatch by VMware turn this compromise-free approach into reality.
Tags : 
mobile management, mobile devices, enterprise management, information technology, best practices, business optimization
    
VMware AirWatch
Published By: VMware AirWatch     Published Date: May 18, 2016
A Google Trends search for “BYOD” reveals it is a fairly new term, appearing in news publications for the first time in late 2011. BYOD is one part of a much larger, deeper-rooted trend: The consumerization of IT, which can be traced back to the early 2000s. Around that time, most everyone had a personal computer, which enabled them to work from home after hours – and to realize the benefits of using the devices that they had carefully chosen and were comfortable using, rather than the corporate devices their IT departments had issued them. BYOD and the consumerization of IT continued to grow as devices became cheaper and more connected. Where IT leaders were once solely concerned with reining in all the unapproved devices accessing the corporate network, a recent Intel and readwrite report that shows 49 percent of U.S. IT managers “strongly agree that BYOD improves worker productivity.” The next era of BYOD has arrived, and IT departments are thinking about it as a strategic value-ad
Tags : 
productivity, best practices, business intelligence, business management, information technology, device support, device management, content management
    
VMware AirWatch
Published By: Cornerstone OnDemand     Published Date: Oct 17, 2014
Whether you're just getting started or taking your business to the next level, paper-based performance reviews are not the way to go. When you have limited HR resources it probably seems easier to print off forms than sign up for software, but that pile of paper will cost you more in the long run… Get smart with your performance management, embrace technology you'll be able to: • Easily track progress and make sure everyone completes their reviews • Collect up to date, reliable information • Review teams as teams • Collect feedback via self-assessments, 360 degree and manager reviews
Tags : 
cornerstone on demand, csod, performance reviews, management, employee, motivation, team performance, reviews
    
Cornerstone OnDemand
Published By: Skillsoft     Published Date: Oct 13, 2011
The IT department for Christiana Care Health Care Systems supports various projects throughout the health system that often require specialized training or expertise in particular IT areas, as well as project management skills. Following a recent reorganization and re-evaluation of job roles, the IT department needed to find a way to train existing staff quickly and cost-effectively to support various information technology needs.
Tags : 
skillsoft, technology, human resources, christiana care, health care systems, case study
    
Skillsoft
Published By: Trend Micro, Inc.     Published Date: Apr 29, 2009
The greatest threat to enterprise data security comes from inside threats. Securing the enterprise requires an understanding of the data leak points, environment, people, and processes for managing sensitive information. This white paper explains how network-based and endpoint-based solutions can work together to provide the broadest protection available while ensuring scalability and manageability, and that employee productivity is not impacted.
Tags : 
trend micro, datadna, data leak, threat, leak, network boundaries, vulnerability threats, data leak, laptop, environment, data loss, data protection, data management, data leak prevention, dlp, agent-based technology, remote computing, leakproof, monitoring, enforcement
    
Trend Micro, Inc.
Published By: Ping Identity     Published Date: May 05, 2009
This white paper, intended for a management-level audience, describes why and how any organization can implement secure Internet single sign-on with a federated identity management system. Learn more today!
Tags : 
pingidentity, sso, secure internet, single sign-on, federated identity management system, software as a service, saas, business process outsourcing, bpo, ciso, attack, threats, personally-identifiable information, pii, trojan, virus, proprietary security mechanisms, crypto libraries, security assertion markup language, saml
    
Ping Identity
Published By: Ping Identity     Published Date: May 05, 2009
Web Services are emerging as the preeminent method for program-to-program communication across corporate networks as well as the Internet. Securing web Services has been a challenge until recently, as typical Web authentication and authorization techniques employed browser-to-server architectures (not program-to-program). This resulted in user identity ending at the Web Application Server, forcing the Web Services Provider to trust blindly that the Web Services Requester had established identity and trust with the end user.
Tags : 
pingidentity, sso, standards-based, web 2.0, identity enabled, browser-to-server, soap, saml, security assertion markup language, pki, public key infrastructure, soa, oasis, ws-trust, sso, single sign-on, service oriented architecture, rest, user identity mapping, ldap
    
Ping Identity
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add A White Paper

Email sales@inetinteractive.com to find out about white paper options for your company.