it strategies

Results 1026 - 1050 of 1070Sort Results By: Published Date | Title | Company Name
Published By: Tyco Integrated Security     Published Date: May 05, 2015
Download this white paper to discover why many pharmaceutical companies are turning to proactive strategies to assess and respond to threats.
Tags : 
global supply chain, medication, security threats, product tampering, security goals, security, data management
    
Tyco Integrated Security
Published By: Harvard Business School     Published Date: Jan 30, 2015
It’s easy to generate a burst of revenue. But will your strategies deliver consistently high profits over the long term? Discover the risks of strategic inertia and learn how to develop strategies that keep your firm on top—today and tomorrow.
Tags : 
strategy, competitive advantage, sustainable competitive advantage, global competition, technological innovation, formulate action plans, harvard business school, executive education
    
Harvard Business School
Published By: CA Technologies     Published Date: Jun 04, 2015
"To support digital transformation imperatives, organizations are increasingly exploring DevOps style approaches for the continuous delivery of high quality software. Unfortunately, however, many enterprises remain burdened with accumulated technical debt and legacy wasteful practices – waste that can quickly inhibit the flow of value to customers and the business. Lean thinking provides organizations with a framework by which to quickly identify all forms of waste impacting the flow of value, which DevOps practitioners can apply in a software development context to quickly pinpoint and eliminate 8 elements of waste across people, process and technology dimensions. This paper presents the 8 elements of waste framework, strategies needed to identify and eliminate waste, and the metrics needed to measure effectiveness.
Tags : 
    
CA Technologies
Published By: CA Technologies     Published Date: Jun 04, 2015
To support digital transformation imperatives, organizations are increasingly exploring DevOps style approaches for the continuous delivery of high quality software. Unfortunately, however, many enterprises remain burdened with accumulated technical debt and legacy wasteful practices – waste that can quickly inhibit the flow of value to customers and the business. Lean thinking provides organizations with a framework by which to quickly identify all forms of waste impacting the flow of value, which DevOps practitioners can apply in a software development context to quickly pinpoint and eliminate 8 elements of waste across people, process and technology dimensions. This paper presents the 8 elements of waste framework, strategies needed to identify and eliminate waste, and the metrics needed to measure effectiveness.
Tags : 
    
CA Technologies
Published By: Care360 by Quest Diagnostics     Published Date: Sep 01, 2015
This white paper discusses key strategies for Revenue Cycle Management (RCM) success in your medical practice.
Tags : 
revenue cycle management, rcm, care360, regulations, reimbursement, medical practice
    
Care360 by Quest Diagnostics
Published By: NetApp     Published Date: Nov 14, 2017
As companies’ transition to become digital enterprises, they must increasingly manage cost and performance across a hybrid IT environment. On-demand consumption strategies can be used to optimize your data storage costs, whether you are running applications in a private data center, across a hybrid cloud, or in the public cloud. Read this eBook and learn how on-demand consumption models can help you align IT spending with your business needs, both on-premises and in the cloud.
Tags : 
    
NetApp
Published By: NetApp     Published Date: Mar 05, 2018
Disaster recovery (DR) from remote sites with dedicated servers, storage, and networking gear has long been a best practice for mission-critical applications. However, other applications and data have often gone unprotected due to the costs required for redundant DR assets that are seldom, if ever, utilized. The ability to move DR to the cloud has changed the picture and enabled IT organizations to build more robust DR strategies than had been possible in the past.
Tags : 
netapp, database performance, flash storage, data management, cost challenges
    
NetApp
Published By: IBM     Published Date: Apr 01, 2015
Is email still the “killer app” it used to be? Social technologies and mobile capabilities are changing the way people communicate in the workplace. Many organizations are employing BYOD strategies and embracing social business tools like file sharing, chat, wikis and communities. In the past, email was used for storing and sharing documents and having conversations with groups. Tasks which are much better suited for today's social cloud collaboration tools. Email usage may be evolving, but email is not dead. In fact, everyone in the organization from executives to factory workers needs email to stay connected. And many organizations are moving their messaging to cloud to take advantage of the flexibility and cost savings a cloud environment provides. In this webcast, you will learn: • How the nature of email has changed and why everyone in your organization needs it. • Why the cloud makes sense for messaging for everyone from executives, to sales, to boundary workers, either as hybrid solution or for the entire workforce. • How email complements social business technologies and how you can start using your email more efficiently in the workplace. • How moving messaging to the cloud can help reduce IT cost and complexity.
Tags : 
email, social technologies, byod, file sharing, chat, cloud, ibm, networking, it management, business technology
    
IBM
Published By: SAP     Published Date: Jun 04, 2015
Not all turnover is created equal: there’s healthy turnover and there’s alarming turnover. Are the employees who are leaving your organization for other opportunities the same ones who are driving the critical strategies and projects across your organization and moving the business forward, the innovators, and the effective customer relations managers? In this white paper you will see why it is critical for organizations to dig deeper and get a clear understanding of who’s leaving and who’s staying.
Tags : 
    
SAP
Published By: SevOne     Published Date: Jul 07, 2015
This white paper describes two strategies organizations can employ to maximize the returns from their ERP investments: Use a proven methodology to speed implementation and achieve ROI faster, and define and track metrics to measure progress in meeting business objectives.
Tags : 
erp, efficiency, strategy, roi, methodology
    
SevOne
Published By: ServiceNow     Published Date: Jan 03, 2017
Learning ITIL is not easy. If memorizing ITIL terminology has made you either: Comatose Caffeine addicted Repeatedly Google the term “coping strategies” … Then clearly, you have not read our ITIL eBook series. This series will help you learn ITIL in a way that is actually (gasp!) fun. You’ll learn all about the five stages of ITIL and get: A deeper understanding of what ITIL is and why it’s so important to keep everything running at work Translations of ITIL terms (the digestible kind) to put you on the path to get ITIL certified Useful diagrams and processes to facilitate the smooth and efficient delivery of IT services What are you waiting for? Dive in!
Tags : 
    
ServiceNow
Published By: ServiceNow     Published Date: Jan 03, 2017
Learning ITIL is not easy. If memorizing ITIL terminology has made you either: Comatose Caffeine addicted Repeatedly Google the term “coping strategies” … Then clearly, you have not read our ITIL eBook series. This series will help you learn ITIL in a way that is actually (gasp!) fun. You’ll learn all about the five stages of ITIL and get: A deeper understanding of what ITIL is and why it’s so important to keep everything running at work Translations of ITIL terms (the digestible kind) to put you on the path to get ITIL certified Useful diagrams and processes to facilitate the smooth and efficient delivery of IT services What are you waiting for? Dive in!
Tags : 
    
ServiceNow
Published By: ServiceNow     Published Date: Jan 03, 2017
Learning ITIL is not easy. If memorizing ITIL terminology has made you either: Comatose Caffeine addicted Repeatedly Google the term “coping strategies” … Then clearly, you have not read our ITIL eBook series. This series will help you learn ITIL in a way that is actually (gasp!) fun. You’ll learn all about the five stages of ITIL and get: A deeper understanding of what ITIL is and why it’s so important to keep everything running at work Translations of ITIL terms (the digestible kind) to put you on the path to get ITIL certified Useful diagrams and processes to facilitate the smooth and efficient delivery of IT services What are you waiting for? Dive in!
Tags : 
    
ServiceNow
Published By: ServiceNow     Published Date: Jan 03, 2017
Learning ITIL is not easy. If memorizing ITIL terminology has made you either: Comatose Caffeine addicted Repeatedly Google the term “coping strategies” … Then clearly, you have not read our ITIL eBook series. This series will help you learn ITIL in a way that is actually (gasp!) fun. You’ll learn all about the five stages of ITIL and get: A deeper understanding of what ITIL is and why it’s so important to keep everything running at work Translations of ITIL terms (the digestible kind) to put you on the path to get ITIL certified Useful diagrams and processes to facilitate the smooth and efficient delivery of IT services What are you waiting for? Dive in!
Tags : 
    
ServiceNow
Published By: ServiceNow     Published Date: Jan 03, 2017
Learning ITIL is not easy. If memorizing ITIL terminology has made you either: Comatose Caffeine addicted Repeatedly Google the term “coping strategies” … Then clearly, you have not read our ITIL eBook series. This series will help you learn ITIL in a way that is actually (gasp!) fun. You’ll learn all about the five stages of ITIL and get: A deeper understanding of what ITIL is and why it’s so important to keep everything running at work Translations of ITIL terms (the digestible kind) to put you on the path to get ITIL certified Useful diagrams and processes to facilitate the smooth and efficient delivery of IT services What are you waiting for? Dive in!
Tags : 
    
ServiceNow
Published By: ServiceNow     Published Date: Jan 03, 2017
Learning ITIL is not easy. If memorizing ITIL terminology has made you either: Comatose Caffeine addicted Repeatedly Google the term “coping strategies” … Then clearly, you have not read our ITIL eBook series. This series will help you learn ITIL in a way that is actually (gasp!) fun. You’ll learn all about the five stages of ITIL and get: A deeper understanding of what ITIL is and why it’s so important to keep everything running at work Translations of ITIL terms (the digestible kind) to put you on the path to get ITIL certified Useful diagrams and processes to facilitate the smooth and efficient delivery of IT services What are you waiting for? Dive in!
Tags : 
    
ServiceNow
Published By: Microsoft Office 365     Published Date: Oct 14, 2016
“Hi, this is Kevin from IT. We've been notified of a virus on your department’s machines.” Add some authentic hold music, and a social-engineering attacker can trick employees into sharing company info, like passwords. Learn how to use technology and prevention strategies to guard against dumpster diving, spear phishing, and other tactics with: Real-world prevention strategies Tools to spot suspicious actions Real-time behavioral malware analysis
Tags : 
protection, prevention, malware, security, cyber attacks, information
    
Microsoft Office 365
Published By: IBM     Published Date: Jul 14, 2016
A basic business component, GRC strategy is implemented by all companies in some way shape or form, but it is not done well for many. Strategies need to be strong, structured, and integrated. Download the findings of the 2016 OCEG's GRC Technology Strategy Survey report to see how your GRC system stacks up against your peers. You'll learn how organizations currently and plan to use GRC technology and what strategies for GRC technology use are being employed by industry leaders.
Tags : 
technology, best practices, productivity, data, competitive advantage
    
IBM
Published By: IBM     Published Date: Jul 20, 2016
Big data. We've heard the phrase for quite some time, but how can human resource leaders get into the action? One way is through the development and implementation of talent analytics strategies. Talent analytics is fundamentally changing the way organizations and practitioners are thinking about the role of HR and organizations uncovering never before seen insights.
Tags : 
ibm, talent acquisition, talent acquisition technology, human resources, recruiting, human resource technology
    
IBM
Published By: Hewlett Packard Enterprise     Published Date: Jul 18, 2018
"This 56 page guide explores the foundational components of Hybrid IT, strategies to help CIOs partner with the business, and “key plays” that, if executed successfully, enable successful and sustainable digital transformation. Learn how transitioning to a Hybrid IT model can help you make the most of limited resources and free your team to spend less time keeping the lights on, and more time contributing to revenue growth as active participants in business innovation. "
Tags : 
    
Hewlett Packard Enterprise
Published By: Juniper Networks     Published Date: Aug 03, 2017
Agility creates more opportunities for new business and stronger bottom lines. Research from more than a half-dozen experts supports it all. What makes Uber’s and Airbnb’s network infrastructures unique The top factor shaping network strategies today Research from industry experts including Gartner and McKinsey
Tags : 
business agility, data usage, network infrastructure, information technology
    
Juniper Networks
Published By: IBM     Published Date: Apr 18, 2017
Master data management (MDM) programs provide ways to ensure that data is consistent in different systems throughout an organization, but poorly managed initiatives are large and complicated affairs. This handbook will provides practical advice on how to develop and implement successful MDM programs that can pay big business dividends. Discover expert advice on: - Strategies and tactics for effective MDM processes - The technology considerations that should be factored into project plans - The ramifications of incorporating pools of “big data” into MDM efforts - And more
Tags : 
data management, data system, business development, software integration, resource planning, enterprise management, data collection
    
IBM
Published By: IBM     Published Date: Oct 26, 2017
With the growing demand of business for tighter communication and collaboration with external parties such as business partners and customers, IT has to provide the technical foundation for such integration. Web Access Management and Identity Federation are key technologies for that evolution. They enable organizations to manage access both from and to external systems, including cloud services, in a consistent way. Organizations have to move forward towards strategic approaches to enabling that integration, in support of the Extended and Connected Enterprise.
Tags : 
access management, identity federation, it strategies, security, infrastructure
    
IBM
Published By: IBM     Published Date: Oct 26, 2017
Identity and access management exists for one critical reason—security. Organizations need to make certain the right people have access to the right resources to do their jobs—and that people without proper authorization can’t get in. In an era the IBM X-Force security team recently described as experiencing “an ever-upward trend of more attacks, more leaked records and more varied threats,” security is a critical function for business as well as IT.
Tags : 
access manager, security, cloud service, microsoft office 365, it strategies
    
IBM
Published By: IBM     Published Date: Oct 26, 2017
Authentication is the beating heart of security. The most fundamental action in all of IT is to identify “who you are”—and authentication is the building block that answers that question. Now more than ever, IT teams must do everything they can to ensure that users are who they say they are, and that their credentials have not been stolen. IT is in state of crisis, with hundreds of millions of identities stolen annually. For system administrators, it’s crucial to know which users have the right to access a given resource, and whether unauthorized users have tried to get in.
Tags : 
user authentication, mobile multi factor authentication, data flows, security, it strategies
    
IBM
Start   Previous    29 30 31 32 33 34 35 36 37 38 39 40 41 42 43    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

“I am the Inspector Morse of IT journalism. I haven't a clue. D'oh” - Mike Magee