guida

Results 176 - 200 of 377Sort Results By: Published Date | Title | Company Name
Published By: Innotas     Published Date: Jan 09, 2014
A complex and chaotic IT infrastructure has become an albatross around the neck for many businesses. Following guidance from the age-old text, Tao de Ching, this eBook walks you through the 10 steps to achieving enlightenment through Integrated IT Portfolio Management.
Tags : 
innotas, project management system, portfolio management, project management office, it governance, governance model, resource management software, ppm software, it project portfolio management, apm saas, pmo services, ppm tools, business technology
    
Innotas
Published By: Intacct Corporation     Published Date: May 07, 2015
Read this white paper for important guidance from industry leaders, including: • Choose best of breed—95 percent of PS firms select best-of-breed applications • Start with ERP—PS companies with the highest financial maturity rely heavily on financial metrics • Build it out across the organization—Leading PS firms achieve organizational as well as financial success by connecting their core ERP systems to other critical parts of the business • Take advantage of the cloud—Cloud-based applications have helped PS organizations more than any other development in the technology landscape over the past decade
Tags : 
professional services firms, financial performance, operational performance, financial metrics, erp systems, cloud
    
Intacct Corporation
Published By: Workday     Published Date: Jul 30, 2019
As a leading performance study in the services industry, this report offers: Important visibility into key business functions Useful support and guidance Valuable insights into the year ahead
Tags : 
    
Workday
Published By: C2C Systems     Published Date: Apr 24, 2013
Download this white paper specifically looking at PST elimination budgeting and justification, which will provide guidance across the steps we typically see customers taking to effectively budget and gain buy-in for PST elimination projects.
Tags : 
pst, elimination, project, budget, customers
    
C2C Systems
Published By: Aruba Networks     Published Date: Nov 15, 2013
L'802.11ac è sulla buona strada per diventare lo standard del Wi-Fi di nuova generazione. La velocità in gigabit, le migliori capacità e l'affidabilità che l'802.11ac conferisce alle reti LAN senza filo (WLAN) sono amplificate, mentre cresce a vista d'occhio l'utilizzo da parte di utenti, applicazioni e dispositivi. Sia che siate dei precursori che hanno già iniziato a pianificare o, come molte aziende, siate incerti sul da farsi, scaricando questa guida in cinque fasi potrete prepararvi e pianificare la corretta migrazione verso una rete WLAN da 802.11ac.
Tags : 
just media, aruba networks, emea, audit infrastructure, migrate to 802.11ac, hardware replacement, gigabit wifi, optimize to leverage, wired network, traffic congestion, performance degradation, optimal performance, controller-based deployment, quadrature amplitude modulation, planning for capacity, mobile devices, complex deployments, client density, real-time location services, location accuracy
    
Aruba Networks
Published By: Adobe     Published Date: Oct 24, 2018
Personalized customer experiences can drive double-digit revenue growth for your business. However, poor personalization can hurt your bottom line, as consumers switch from companies that fail to meet expectations to those that do. In this playbook, we provide clear guidance to help you formulate a winning personalization strategy for your organization over three phases of maturity: Embrace, Expand, and Excel.
Tags : 
    
Adobe
Published By: Cherwell Software     Published Date: Jun 29, 2015
This guide provides: Key insight into how to create a service catalog, clear guidance on defining a service catalog, and an easy to use service catalog template to help you start realizing business and customer benefits.
Tags : 
service catalogue, service level agreement, service catalog template, operational service agreements, continual service improvement
    
Cherwell Software
Published By: CA Technologies EMEA     Published Date: May 23, 2018
Oggi la tecnologia digitale è ovunque: cloud, mobility, social network e Internet of Things stanno cambiando il modo in cui tutti noi lavoriamo e ci divertiamo. Questo mondo digitale in rapida evoluzione sta anche rimodellando il rapporto tra le aziende e i clienti, che ora si aspettano dai propri brand preferiti un'esperienza utile e interattiva. Anche la sicurezza è motivo di preoccupazione. Azienda e clienti si scambiano un volume in continuo aumento di dati sensibili, aumentando i fattori di rischio.La trasformazione del mercato sta inoltre intensificando la concorrenza. Come osserva l'analista Mark Raskino, "Come conseguenza, tutti i contendenti hanno rielaborato le proprie strategie e si sono risvegliate alla potenza del business digitale nello stesso momento. Il conflitto è quindi inevitabile.
Tags : 
    
CA Technologies EMEA
Published By: CA Technologies EMEA     Published Date: May 23, 2018
Nell'economia digitale, le API (Application Programming Interfaces) sono essenziali per concretizzare rapidamente le idee e approfittare delle nuove opportunità di business. Rappresentano la chiave per la digital transformation, consentendo alle aziende di offrire una customer experience eccezionale, creare nuovi flussi di ricavi e permettere a dipendenti, partner, app e device di accedere ai dati ovunque e in qualsiasi momento.Le API non sono necessariamente una nuova tecnologia, ma nel mondo digitale di oggi hanno assunto una particolare rilevanza in ogni aspetto del business. Questo ha accresciuto l'esigenza di implementare una soluzione di API Management realmente efficace. Ma quali sono le caratteristiche di una soluzione efficace?
Tags : 
    
CA Technologies EMEA
Published By: CA Technologies EMEA     Published Date: May 23, 2018
Nel suo libro Psicologia della scienza, pubblicato nel 1966, lo psicologo americano Abraham Maslow analizzò la teoria secondo cui coloro che operavano in ambito psicologico necessitavano di un approccio alla cura da più punti di vista per favorire la genesi di nuove idee, senza limitarsi a utilizzare le stesse teorie e le medesime tecniche create da Freud e dai suoi seguaci in un passato ormai remoto. Partendo dal presupposto che può risultare difficile cambiare il proprio punto di vista, Maslow scrisse: "[...] La tentazione, se l'unico strumento che hai è un martello, è di trattare tutti i problemi come se fossero chiodi". Abbiamo fatto tutti questa esperienza. Siamo talmente abituati a fare le cose come si facevano in passato che a volte non ci chiediamo neppure più il motivo per cui continuiamo a farle oggi.
Tags : 
    
CA Technologies EMEA
Published By: CA Technologies EMEA     Published Date: May 23, 2018
Today’s most damaging security threats are not originating from malicious outsiders or malware but from trusted insiders - both malicious insiders and negligent insiders. This survey is designed to uncover the latest trends and challenges regarding insider threats as well as solutions to prevent or mitigate insider attacks. Our 400,000 member online community, Cybersecurity Insiders, in partnership with the Information Security Community on LinkedIn, asked Crowd Research Partners to conduct an in-depth study of cybersecurity professionals to gather fresh insights, reveal the latest trends, and provide actionable guidance on addressing insider threat.
Tags : 
    
CA Technologies EMEA
Published By: VMware     Published Date: Sep 06, 2017
"Whether your goal is to migrate an existing XenApp infrastructure to Horizon, replace it with a new system, or simply integrate legacy Citrix infrastructure with your Horizon virtual desktop deployment, VMware has the innovative products and technology you need. Download this white paper to access valuable guidance for planning and undertaking a migration from Citrix XenApp to VMware Horizon through four detailed approaches, including the major steps required for their implementation. "
Tags : 
vmware, citrix, xenapp, vmware horizon
    
VMware
Published By: Forcepoint     Published Date: May 14, 2019
In Philip K. Dick's 1956 "The Minority Report," murder ceased to occur due to the work of the "Pre-Crime Division," that anticipated and prevented killings before they happened. Today, we are only beginning to see the impact of predictive analytics upon cybersecurity – especially for insider threat detection and prevention. Based on user interaction with data, CISOs and their teams emerge as the IT equivalent of a Pre-Crime Division, empowered to intervene before a violation is ever committed. Watch this webcast where we examine the technologies which make predictive analytics valuable, along with ethically minded guidance to strike the balance between vigilance and privacy.
Tags : 
    
Forcepoint
Published By: Forcepoint     Published Date: May 14, 2019
As more and more companies are encouraging their employees to work from anywhere, on any device, data loss prevention (DLP) has evolved from an option to a requirement. In the past, DLP has been associated with complicated deployments and pervading operational management issues, yet DLP is not so much a product but a strategy—success depends on methodology and execution. Download the whitepaper for insightful guidance on implementing DLP. Key topics include: • Latest data-breach trends • Assessing DLP vendors • Nine-step framework • Best practices to ensure success
Tags : 
    
Forcepoint
Published By: Forcepoint     Published Date: Jun 06, 2019
As more and more companies are encouraging their employees to work from anywhere, on any device, data loss prevention (DLP) has evolved from an option to a requirement. In the past, DLP has been associated with complicated deployments and pervading operational management issues, yet DLP is not so much a product but a strategy—success depends on methodology and execution. Download the whitepaper for insightful guidance on implementing DLP. Key topics include: • Latest data-breach trends • Assessing DLP vendors • Nine-step framework • Best practices to ensure success
Tags : 
    
Forcepoint
Published By: Forcepoint     Published Date: Jun 06, 2019
In today’s average large enterprise, more than 1,000 cloud applications may be in use—whether sanctioned or unsanctioned by IT. But traditional security technologies can’t adequately address the inevitable security and compliance challenges that follow. The Cloud Access Security Broker (CASB) is an emerging security technology that specifically addresses the data protection challenges and other associated threats that come with the cloud. Based on results from an in-depth survey of decisions makers and influencers with CASB deployment experience, this Osterman Research whitepaper: Analyzes the core drivers behind CASB adoptions Provides guidance in how to demonstrate need for CASB technology in a particular organization Identifies features and functionality to consider when evaluating CASB solutions
Tags : 
    
Forcepoint
Published By: Forcepoint     Published Date: Jun 06, 2019
Today’s employees demand greater flexibility, productivity, and mobility. And while cloud and BYOD policies have answered that call, they’ve also added unforeseen complexities the way IT manages data security and compliance. How can you balance productivity and risk in SaaS environments? “A Guide to Achieving SaaS Security and Compliance” deconstructs the idea that cloud security and user productivity are mutually exclusive. This whitepaper includes guidance on how to: Select SaaS providers that follow the very same external standards (e.g., PCI DSS) as your organization. Apply the same in-house security, governance, and compliance principles to cloud services. Leverage tools and processes to gain visibility, control access, and protect data in your SaaS environment.
Tags : 
    
Forcepoint
Published By: Tenable     Published Date: Nov 06, 2018
"What steps should you take to enable the effective and secure use of public cloud services? According to Gartner, “CIOs need to ensure their security teams are not holding back cloud initiatives with unsubstantiated cloud security worries. Instead, they should encourage their teams to apply imagination and energy to develop new approaches to securely and reliably leverage the benefits of SaaS, PaaS and IaaS.” By reading, “Clouds Are Secure: Are You Using Them Securely?,” you will gain insight into Gartner’s recommended practices for effective and secure adoption of public cloud services, including: Develop an enterprise cloud strategy, including guidance on what data can be placed into which clouds and under what circumstances. Implement and enforce policies on cloud ownership, responsibility and risk acceptance by outlining expectations for form, significance and control of public cloud use. Follow a life cycle approach to cloud governance that emphasizes the operational control of
Tags : 
    
Tenable
Published By: Zilliant     Published Date: Oct 11, 2019
The building products / construction industry is more visibly representative of the health of the economy than any other. The avatar of the Great Recession may well be images of doomed projects on abandoned construction sites. As such, it’s unavoidable for leaders of building products distributors to experience market-induced anxiety as a matter of course. 2020 looms as the start of a new decade but many analysts fear it will also mark the end of the building boom. Recent indicators point to a slowdown at least. The existential question: what areas of building products distribution are ripe for reimagination, safeguarding against ambiguous market conditions now and in the future? This whitepaper provides the answers with a playbook that reveals where margins and revenue leak in most B2B distribution companies and provides reimagined strategies for retaining and growing share through price optimization, deal management and costing guidance.
Tags : 
    
Zilliant
Published By: Zilliant     Published Date: Oct 11, 2019
The maintenance, repair and overhaul (MRO) and industrial distribution industry is massive and continues to grow at a steady pace. Despite this positive outlook, individual MRO distributors aren’t short on their own challenges when it comes to retaining and growing their market share. There are several factors hindering MRO companies from retaining the share they have and claiming more. Namely: • Complexity: Their large customer counts and behemoth SKU counts render it impossible to give reps market-aligned pricing guidance and sales intelligence • Competition: MRO is ripe for poaching by Amazon, and as a result, traditional distributors continue to see market share slipping away to the online giant • Skills: A massive generational shift in the workforce is resulting in a skills gap that’s proving particularly problematic to fill In this playbook for MRO and industrial products distributors, we will discuss how growth is hindered in this dynamic industry and then provide reimagin
Tags : 
    
Zilliant
Published By: Zilliant     Published Date: Oct 30, 2019
System price drift and an overabundance of price deviations are causing preventable margin leakage for MRO/industrial distributors
Tags : 
mro, industrial distribution, maintenance, repair, operations, overhaul, distributor, b2b, amazon, margin, revenue, deal management, price management, price optimizations, sales intelligence, skills gap, negotiation, guidance, data science, ecommerce
    
Zilliant
Published By: Zilliant     Published Date: Oct 30, 2019
System price drift and an overabundance of price deviations are causing preventable margin leakage for electrical products distributors
Tags : 
electrical products, distribution, distributor, b2b, deviations, system prices, margin, price optimization, price management, deal management, cost fluctuation, negotiation, guidance, data science, pricing process, ecommerce, amazon, cost, costing, customer-specific price
    
Zilliant
Published By: Zilliant     Published Date: Oct 30, 2019
System price drift and an overabundance of price deviations are causing preventable margin leakage for building products and construction distributors
Tags : 
building products, distribution, distributor, construction, b2b, deviations, system prices, margin, price optimization, price management, deal management, building starts, recession, cost, costing, sales, negotiation, guidance, data science, customer-specific price
    
Zilliant
Published By: Jelecos     Published Date: Feb 11, 2019
The AWS Well-Architected framework has been developed to help cloud architects utilize best practices to build the most secure, high-performing, resilient, and efficient infrastructure possible for their applications. This framework provides a consistent approach for Jelecos and its customers to evaluate architectures and provides guidance to help implement designs that will scale with your application needs over time.
Tags : 
    
Jelecos
Published By: Workday UK     Published Date: Apr 25, 2019
Technology is now shaking up the way we work. To help IT leaders navigate the best path forward, we created a digital magazine called CIO Perspectives. Read it for insights and guidance from leaders and visionaries on how to break free from day-to-day tasks and gain a greater perspective. Check it out now.
Tags : 
workday, workforce technology, digital strategy
    
Workday UK
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

“I am the Inspector Morse of IT journalism. I haven't a clue. D'oh” - Mike Magee