mange

Results 1 - 25 of 38Sort Results By: Published Date | Title | Company Name
Published By: Adobe     Published Date: Mar 26, 2018
In our 33-criteria evalution of cross-channel campaign mangement providers, we identified the 12 most signiifcant ones.
Tags : 
    
Adobe
Published By: Dell     Published Date: Oct 24, 2014
Employees are increasingly using bring-your-own devices (BYOD) to work and accessing corporate IT resources from home. Until now, management of BYOD within IT was piecemeal, with most organizations cob¬bling together solutions that included mobile device management software, unified access suites, security, and hardware. Read this technology brief to learn how Windows Server 2012 R2 takes the guesswork and integration out of BYOD security and administration, providing one point of control and management for IT organizations.
Tags : 
byod, mobile device mangement, secure mobility
    
Dell
Published By: IBM UK - ISM&S Storage     Published Date: Nov 17, 2011
Working with CVSI to deploy IBM Tivoli, BladeCenter and System Storage technologies
Tags : 
data growth, data, storage, blade, back up, backup, tivoli, rpo, rto, end-to-end, service, cvsi, storage mangement, storage manager, bladecenter, data protection, protection, recovery
    
IBM UK - ISM&S Storage
Published By: CA Technologies     Published Date: Jan 08, 2014
Cloud adoption, mobility, social media and the consumerization of IT are transforming many business activities for enterprise employees, partners and customers and eliminating the traditional network perimeter. Organizations have to change how they manage security and user identities if they want to keep their data and applications secure. Read this eBook to discover how a centralized identity and access management service can help you create a new identity perimeter.
Tags : 
ca technologies, identity, identity management, user provisioning, security, mobile, cloud computing, social media, mobility, security management, access mangement, identity perimeter
    
CA Technologies
Published By: CA Technologies     Published Date: Jan 08, 2014
Cloud adoption, mobility, social media and the consumerization of IT are transforming many business activities for enterprise employees, partners and customers and eliminating the traditional network perimeter. Organizations have to change how they manage security and user identities if they want to keep their data and applications secure. Read this eBook to discover how a centralized identity and access management service can help you create a new identity perimeter.
Tags : 
ca technologies, identity, identity management, user provisioning, security, mobile, cloud computing, social media, mobility, security management, access mangement, identity perimeter
    
CA Technologies
Published By: HP - Enterprise     Published Date: Sep 27, 2013
Learn how Banca Intesa prepared themselves for future cyber attacks by teaming with HP and using their ArcSight security information and event management (SIEM) solution
Tags : 
banca intesa, threats, hp arcsight, cyber attacks, arcsight, security information, event mangement solutions, global cyber crime
    
HP - Enterprise
Published By: SAP     Published Date: Jun 12, 2015
In this white paper you will find: • Five ways to create a high-performing global culture • Six ways to dial in your talent strategy • Five tactics for compensation managers to shift the business • Six moves for recruiting mangers to build a talent powerhouse • Five ways learning managers can make a strategic contribution
Tags : 
    
SAP
Published By: SuccessFactors, an SAP Company     Published Date: Jun 18, 2015
In this white paper you will find: • Five ways to create a high-performing global culture • Six ways to dial in your talent strategy • Five tactics for compensation managers to shift the business • Six moves for recruiting mangers to build a talent powerhouse • Five ways learning managers can make a strategic contribution
Tags : 
    
SuccessFactors, an SAP Company
Published By: Zebra Technologies     Published Date: Jun 13, 2016
Read on to find out how modern day technologies can provide a foundation for organisations to converge physical manufacturing with digital manufacturing, enabling you to better see and mange the entire ecosystem of your production facilities.
Tags : 
digital manufacturing, best practices, asset management
    
Zebra Technologies
Published By: Zebra Technologies     Published Date: Jun 13, 2016
Read on to find out how modern day technologies can provide a foundation for organisations to converge physical manufacturing with digital manufacturing, enabling you to better see and mange the entire ecosystem of your production facilities.
Tags : 
digital manufacturing, best practices, asset management
    
Zebra Technologies
Published By: Zebra Technologies     Published Date: Jun 13, 2016
Read on to find out how modern day technologies can provide a foundation for organisations to converge physical manufacturing with digital manufacturing, enabling you to better see and mange the entire ecosystem of your production facilities.
Tags : 
digital manufacturing, best practices, asset management
    
Zebra Technologies
Published By: Zebra Technologies     Published Date: Jun 13, 2016
Read on to find out how modern day technologies can provide a foundation for organisations to converge physical manufacturing with digital manufacturing, enabling you to better see and mange the entire ecosystem of your production facilities.
Tags : 
digital manufacturing, best practices, asset management
    
Zebra Technologies
Published By: CA Technologies     Published Date: Jan 08, 2014
Cloud adoption, mobility, social media and the consumerization of IT are transforming many business activities for enterprise employees, partners and customers and eliminating the traditional network perimeter. Organizations have to change how they manage security and user identities if they want to keep their data and applications secure. Read this eBook to discover how a centralized identity and access management service can help you create a new identity perimeter.
Tags : 
ca technologies, identity, identity management, user provisioning, security, mobile, cloud computing, social media, mobility, security management, access mangement, identity perimeter
    
CA Technologies
Published By: CA Technologies     Published Date: Jan 15, 2014
Cloud adoption, mobility, social media and the consumerization of IT are transforming many business activities for enterprise employees, partners and customers and eliminating the traditional network perimeter. Organizations have to change how they manage security and user identities if they want to keep their data and applications secure. Read this eBook to discover how a centralized identity and access management service can help you create a new identity perimeter.
Tags : 
ca technologies, identity, identity management, user provisioning, security, mobile, cloud computing, social media, mobility, security management, access mangement, identity perimeter, network provisioning, network security, access control, authentication, internet security, web service security, mobile device management
    
CA Technologies
Published By: CA Technologies     Published Date: Jan 15, 2014
Cloud adoption, mobility, social media and the consumerization of IT are transforming many business activities for enterprise employees, partners and customers and eliminating the traditional network perimeter. Organizations have to change how they manage security and user identities if they want to keep their data and applications secure. Read this eBook to discover how a centralized identity and access management service can help you create a new identity perimeter.
Tags : 
ca technologies, identity, identity management, user provisioning, security, mobile, cloud computing, social media, mobility, security management, access mangement, identity perimeter, network provisioning, network security, access control, authentication, internet security, web service security, mobile device management
    
CA Technologies
Published By: Merkle     Published Date: Sep 26, 2012
Download this white paper for a deeper look into the growing question surrounding the pharmaceutical industry--If customer centricity is so widely accepted as a way to unlock significant financial gains, why are companies so slow to adopt it?
Tags : 
crm, customer relationship amangement, customer centricity, connected crm, pharmaceuticals
    
Merkle
Published By: Genesys     Published Date: Apr 25, 2013
Adopting a proactive approach to customer service has the potential to attract customers rather than losing them, to drive growth and innovation instead of hindering both.
Tags : 
customer service, cast study, change mangement, service, oriented, relationship management, customer interaction
    
Genesys
Published By: Workday     Published Date: Sep 08, 2015
Download this white paper to understand the six key capabilities that separate Workday Financial Management from old-world business apps.
Tags : 
financial systems, finance technology, workday, security, payroll software, financial management, cloud computing, modern financial mangement system
    
Workday
Published By: VMware, Inc     Published Date: Dec 05, 2013
Executive Summary: In November 2012, Vmware Commissioned Forrester Consulting to examine the total economic impact and potential return on investment (ROI) enterprises may realize by deploying Vmware vCenter Site Recovery Manager (SRM). The purpose of this study is to provide readers with a framework to evaluate the potential financial impact of the VMware vCenter Site Recovery Manger on their organizations. Please download the white paper to learn more.
Tags : 
vmware, roi, return on investment enterprises, vmware vcenter site recovery manager, forrester consulting. srm, networking, it management, knowledge management, enterprise applications, storage, data management, business technology, data center
    
VMware, Inc
Published By: VMware, Inc     Published Date: Dec 05, 2013
VMware® Horizon Mirage™ is a layered image management solution that separates a PC into logical layers that either IT or the user own and manage. IT-owned layers are typically OS and corporate applications while user-owned layers consist of their own files and applications. The Horizon Mirage solution enables: • Updates to individual IT-managed layers, such as core operating system files and common business applications, without disrupting other layers, all while maintaining user data and installed applications. • Simpler backup by taking snapshots of layered images, enabling desktop disaster recovery and helping to ensure continued end-user productivity.
Tags : 
vmware, horizon mirage, image management solutions, it-owned layers, corporate applications, it-manged layers, core operating system files, desktop disaster recovery, layered images, networking, it management, knowledge management, enterprise applications, storage, data management, business technology
    
VMware, Inc
Published By: Dell Software     Published Date: Oct 01, 2012
Quest® Security Explorer.
Tags : 
security management, desktop mangement, servers, windows servers, sql servers
    
Dell Software
Published By: IBM     Published Date: Oct 24, 2012
Enterprise Marketing Management, is a software technology solution for marketing organizations that provides a comprehensive marketing platform for managing customer and prospect interactions throughout the customer life-cycle. Read on to learn more.
Tags : 
ibm, emm, enterprise marketing mangement, knowledge, integration, enterprise applications, cross channel profile
    
IBM
Published By: VMTurbo     Published Date: Dec 09, 2013
Learn the best practices of virtualizing business-critical applications and overcome the major challenges that your organization might be facing with your virtualization management.
Tags : 
vmturbo, virtualization, business critical applications, applications, applications management, consolidation, workload, application performance, shared peak provisioning, spp, spp mangement, it management, platforms
    
VMTurbo
Published By: Scale Computing     Published Date: Sep 24, 2012
Learn how this organization was able to virtualize their environment in under an hour and at a fraction of the cost of other solutions. Read the complimentary case study now.
Tags : 
vmware, virtualization, infrastructure, high availability, storage cluster, data cluster, clustering, storage, data storage, data mangement, data management, business technology, data center
    
Scale Computing
Published By: iCIMS     Published Date: Dec 02, 2013
Are you actively solving your company's "skills gap" problem? View this webcast to understand how to find and engage hidden, passive candidates through traditional channels and over social media. This webcast includes a sneak peek of the best-of-breed iCIMS Talent Platform.
Tags : 
icims, workforce mangement, hiring talent, talent pool, human resources, tech employees, it employees, building talent
    
iCIMS
Previous   1 2    Next    
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

“I am the Inspector Morse of IT journalism. I haven't a clue. D'oh” - Mike Magee