information management

Results 226 - 250 of 654Sort Results By: Published Date | Title | Company Name
Published By: Oracle     Published Date: Nov 05, 2013
Sales people spend more time out of the office than in. When they are out of the office, they need information at their fingertips. And in today’s more mobile, more collaborative, and more data-rich business world, the needs of corporate sales forces are radically changing. In particular, sales people have always needed access to information about their customer before a meeting and an easy way to update customer information after a meeting. Now, to work more efficiently from the road, they could benefit from and in many cases need additional help in the form of relationship management assistance, collaboration tools, and contextual and relevant business analytics.
Tags : 
mobility, mobile, collaboration, crm, customer service, sales, enterprise communication, mobile crm
    
Oracle
Published By: Oracle     Published Date: Nov 05, 2013
Sales people spend more time out of the office than in. When they are out of the office, they need information at their fingertips. And in today’s more mobile, more collaborative, and more data-rich business world, the needs of corporate sales forces are radically changing. In particular, sales people have always needed access to information about their customer before a meeting and an easy way to update customer information after a meeting. Now, to work more efficiently from the road, they could benefit from and in many cases need additional help in the form of relationship management assistance, collaboration tools, and contextual and relevant business analytics.
Tags : 
mobility, mobile, collaboration, crm, customer service, sales, enterprise communication, mobile crm
    
Oracle
Published By: CA Technologies     Published Date: Apr 06, 2017
CA Privileged Access Manager (PAM) is a well-integrated suite that provides a comprehensive solution for privileged identity management in physical and virtual environments. CA PAM enables centralized control and management of privileged user access to a broad range of servers, network devices and applications.
Tags : 
security information, security management, event management, system security, system management, risk management, security infrastructure, it infrastructure, privilege management, system authentication
    
CA Technologies
Published By: IBM     Published Date: Oct 23, 2009
In the IBM white paper, "Achieving end-to-end information security: Five critical steps," you'll learn a more sophisticated approach to information security.
Tags : 
data security, ibm, information security, data retention, service management, security management, risk management, tivoli
    
IBM
Published By: Quark, Inc.     Published Date: Apr 28, 2011
Quark dynamic publishing software addresses the challenges of DITA by providing a friendly, familiar authoring interface based on Microsoft® Word.
Tags : 
quark, dita, pg bartlett, darwin information typing architecture, product documentation, technical publications, html, xml editing, cms, content management system, project management
    
Quark, Inc.
Published By: Quark, Inc.     Published Date: Apr 28, 2011
Quark dynamic publishing software addresses the challenges of DITA by providing a friendly, familiar authoring interface based on Microsoft® Word.
Tags : 
quark, dita, pg bartlett, darwin information typing architecture, product documentation, technical publications, html, xml editing, cms, content management system, project management
    
Quark, Inc.
Published By: CCMI     Published Date: Sep 19, 2012
In this whitepaper, you'll discover the five essential elements to consider when evaluating tools for telecom management.
Tags : 
information technology, telecommunications, telecom, telecom management, business technology
    
CCMI
Published By: MuleSoft     Published Date: Apr 13, 2016
The business of IT has changed dramatically. An always-on, always-connected world means that competition is fiercer, customers are more demanding, and businesses need to innovate faster than ever. Companies can try to harness digital transformation by trying to do things the old way, but they will fall behind; the traditional IT operating model is fracturing under the digital demands of their customers, partners and employees. This book will showcase: -how digital transformation is affecting your business -a roadmap to help you innovate faster, lower operational costs, and increase your IT capacity -real-life case studies of companies who achieved great business outcomes through API-led connectivity
Tags : 
information technology, business management, best practices, business intelligence
    
MuleSoft
Published By: netForensics     Published Date: Jan 04, 2008
Securing Federal information and systems is an ongoing challenge. By implementing comprehensive security compliance management methods for data collection, retention, monitoring and reporting, federal agencies can successfully demonstrate a sound framework that meets FISMA requirements.
Tags : 
fisma, fisma compliance, information protection, data protection, monitoring, information management, regulations, regulatory compliance, netforensics
    
netForensics
Published By: BetterUp     Published Date: Mar 06, 2019
Research suggests that up to half of the investment your organization is making in Learning & Development (L&D) is being wasted. Employees unfortunately lose up to 75% of the information they receive through traditional L&D approaches (including learning management systems, episodic trainings, and workshops) — an effect known as the training transfer problem. In this report, discover the five critical requirements for effective behavior change and leadership development.
Tags : 
    
BetterUp
Published By: CommVault     Published Date: Jun 10, 2015
Data and information management is becoming increasingly complex and dynamic. There are innovations in technology and process that can supply new advantages.
Tags : 
software, backup, optimize, management, efficiency, business technology
    
CommVault
Published By: IBM     Published Date: Nov 08, 2013
Because all processes should be aligned to customer metrics, process improvement is an important goal for organizations in every industry. This paper illustrates the impact analytics can make on business processes through real-world examples based on IBM client experiences, and describes the steps organizations can take to refine quality, warranty, financial, inventory and other processes that are essential to achieving operational excellence.
Tags : 
ibm, embedding business analytics, organizational processes, business analytics, building smarter processes, insight and alignment, consistent information, accurate information, business intelligence, connect business processes, performance management, customer metrics, internal processes, external processes, competitive benchmarking, critical insight and alignment
    
IBM
Published By: Tripwire     Published Date: Jan 29, 2013
Download this paper to learn five actions that will enhance your approach to information risk management and security and help you stay one step ahead of the information age adversary.
Tags : 
risk management, irms, it security, security
    
Tripwire
Published By: Epicor     Published Date: Feb 22, 2010
This paper outlines how the five lean principles are all supported and enhanced by comprehensive information control and the management tools that an end-to-end enterprise software suite delivers.
Tags : 
epicor, erp, enterprise resource planning, lean manufacturing, enterprise software, productivity, tco, collaboration
    
Epicor
Published By: Global Software     Published Date: Aug 13, 2018
Streamlining the close process is the new imperative for many financial executives in order to keep pace with the speed of information coming from various mediums. When financial information is released weeks after the period end, the risk is that this information is perceived and received as old news and less relevant for management decision making. This amplifies the perception of the finance department acting as the “back office” and just another cost center inside the organization.
Tags : 
financial, executives, management, organization
    
Global Software
Published By: McAfee     Published Date: Feb 06, 2013
Read about the top five issues McAfee customers face with security information and event management (SIEM) and see corresponding use cases and customer case studies.
Tags : 
big security data, siem, mcafee global threat intelligence, mcafee gti, mcafee risk advisor, security connected
    
McAfee
Published By: Human Capital Institute     Published Date: May 16, 2014
Your employees are also online consumers of information and entertainment. You can maximize enterprise learning by applying practices from the new generation of information delivery, while keeping the best of the old-school approaches.
Tags : 
hci, human capital institute, enterprise learning, information delivery, corporate learning, strategic learning, center for creative leadership, employee development, employee learning, peer networking, peer-based learning, consumer-employees, on-demand learning, mobile learning, streaming content, adobe systems, macy’s inc., performance management, talent development, synchronous training
    
Human Capital Institute
Published By: Oracle     Published Date: Apr 03, 2012
Although more than two-thirds of confidential information is regulated through database management systems, no computer security program offers adequate protection for the databases against the main threats affecting them today. Oracle, the leader in databases technologies, offers security solutions for the protection of all layers of the database.
Tags : 
grid computing, oracle, database applications, enterprise applications
    
Oracle
Published By: IBM     Published Date: Oct 12, 2015
This IBM-commissioned profile of government information management professionals examines the challenges of dealing with the increase in digital and unstructured content as well as the roles that shared capture service and improved case management.
Tags : 
ibm, forrester, digital, engagement, forrester technology, information management, software development, it management, knowledge management, enterprise applications, business technology
    
IBM
Published By: OneLogin     Published Date: Oct 24, 2017
From the information provided in the interviews, Forrester has constructed a Total Economic Impact (TEI) framework for those organizations considering investing in OneLogin. The objective of the framework is to identify the benefits, costs, flexibility, and risk factors that affect the investment decision. Forrester employed four fundamental elements of TEI in modeling OneLogin: benefits, costs, flexibility options, and risks. Forrester took a multistep approach to evaluate the impact that OneLogin can have on the Organization (see Figure 2). Specifically, we: › Interviewed OneLogin marketing, sales, and product management personnel, along with Forrester analysts, to better understand the value proposition for OneLogin. › Conducted an in-depth interview with the Organization’s senior application engineer and its supervisor of IT security to obtain data with respect to costs, benefits, and risks. › Constructed a financial model representative of the interviews using the TEI metho
Tags : 
    
OneLogin
Published By: The TriZetto Group     Published Date: Aug 01, 2011
Learn how to maximize efficiencies through greater system integration and automation, enable seamless interactions with providers, members and other constituents, and drive increased healthcare value with automated, value-based programs.
Tags : 
trizetto, trizeto, healthcare reform for payers, payers and healthcare reform, reform and payers, compliance with reform, administrative efficiency, technology, icd-10, 5010, claims administration, mlr requirement, value-based insurance design, value-based reimbursement programs, healthcare information technology, population health management, mlr
    
The TriZetto Group
Published By: PKWARE     Published Date: Aug 21, 2009
Any organization that stores or transfers health or insurance records electronically must comply with HIPAA, from health care facilities to HR departments. PKWARE offers straightforward strategies for managing protected health information.
Tags : 
compliance, hipaa compliance, hipaa, healthcare, privacy, health, health information management, him, database security, data protection, pkware
    
PKWARE
Published By: AlienVault     Published Date: Oct 20, 2017
Security Information and Event Management (SIEM) is a foundational cyber security technology. However, a properly executed SIEM strategy is difficult to execute even in static network environments with limited assets, much less for companies that have heterogeneous networks, transient end users, and plans of expansion. In this analyst report from Frost & Sullivan, you’ll read about several factors that companies big and small need to consider when purchasing and deploying a SIEM. You’ll also learn about AlienVault’s unified approach to solving for these challenges, with its on-prem appliance (USM Appliance™), and cloud-based SIEM-as-service, (USM Anywhere™). Download this report now to learn more about the changing SIEM market and AlienVault’s unified approach to security information and event management.
Tags : 
    
AlienVault
Start   Previous    3 4 5 6 7 8 9 10 11 12 13 14 15 16 17    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

“I am the Inspector Morse of IT journalism. I haven't a clue. D'oh” - Mike Magee