Cookie policy: This site uses cookies (small files stored on your computer) to simplify and improve your experience of this website. Cookies are small text files stored on the device you are using to access this website. For more information on how we use and manage cookies please take a look at our privacy and cookie policies. Some parts of the site may not work properly if you choose not to accept cookies.

sections
 

critical

Results 326 - 350 of 2679Sort Results By: Published Date | Title | Company Name
Published By: VMTurbo     Published Date: Feb 11, 2014
VMTurbo’s Observe-­-Advise-­-Automate model delivers intelligent and holistic visibility, analytics and automation.
Tags : 
vmturbo, virtualization, virtualizing business, business-critical, business applications, controlling interference, consolidation, virtual currency
    
VMTurbo
Published By: Esker     Published Date: Jun 29, 2017
With little to no oversight into billing and collections‚ it can be hard to evaluate and improve the performance of accounts receivable (AR) processes — but not anymore. AR Automation solutions provide access to critical analytics that go beyond DSO to transform your AR department into a more strategic‚ value-added operation. Read our new AR Analytics Playbook to discover the six essential metrics that can bring big gains in efficiencies‚ such as: • Faster customer payments • Reduced administrative costs • Enhanced collections efficiencies • Improved customer retention The competition isn’t getting any weaker. Start strengthening your business with an AR automation solution today!
Tags : 
accounts receivable management, invoice management, collections management, ar best practices, invoice portal, invoice delivery
    
Esker
Published By: ASG Software Solutions     Published Date: Feb 24, 2010
A recent survey of CIOs found that over 75% want to develop an overall information strategy in the next three years, yet over 85% are not close to implementing an enterprise-wide content management strategy. Meanwhile, data runs rampant, slows systems, and impacts performance. Hard-copy documents multiply, become damaged, or simply disappear.
Tags : 
asg, cmdb, bsm, itil, bsm, metacmdb, archiving, sap
    
ASG Software Solutions
Published By: Oath     Published Date: Oct 31, 2017
Consumers are better than ever at differentiating between low-quality and premium content. For marketers, this means the placement of their ads is critically important. Brands can’t afford to risk appearing alongside questionable content, not with 75% of consumers holding brands accountable for their ad environments. When brands are shown adjacent to Oath’s trustworthy, premium content, they experience 5x greater favorability - a striking example of the power of positive associations and the importance of knowing your digital neighbors.
Tags : 
digital advertising, online advertising, ad placement, quality content, quality video content, online news, online video, offensive content
    
Oath
Published By: Keas     Published Date: Sep 17, 2013
The start of the Affordable Care Act has been delayed to January 2015 and now is the time to get educated on provisions for Corporate Wellness Programs which are critical to combatting rising healthcare costs.
Tags : 
aca, affordable care act, employee wellness, health and wellness programs, wellness programs
    
Keas
Published By: Riverbed     Published Date: Jul 11, 2017
Four Stages to Successful Cloud Adoption Forrester Research predicts 81% of companies expect to leverage the cloud for business-critical applications and services in the next two years. If you’re planning to move applications to the cloud, watch this webinar to learn how Asurion, an insurance provider with 280 million customers worldwide, undertook their cloud migration.
Tags : 
cloud, adoption, application, migration, performance
    
Riverbed
Published By: Dell Software     Published Date: May 10, 2013
Active Directory is critical to your IT infrastructure, but, if you’re relying on native tools and PowerShell scripts, it may be costing you much more than you think. Learn about how the right tools can put you back in control, making AD management easy and cost effective.
Tags : 
native tools, powershell scripts
    
Dell Software
Published By: Infoblox     Published Date: Nov 07, 2013
According to the Ponemon Institute, the annual cost of malware breaches averaged $8.4 million. Read this white paper to gain insights into critical information to safeguard against DNS security threats and disrupt malware communications to your DNS servers.
Tags : 
infoblox_dns_firewall, infoblox_dns, infoblox_dns_server, infoblox_security, infoblox_dns_security, infoblox_security_device_controller, infoblox_dhcp_fingerprinting, infoblox_sdc
    
Infoblox
Published By: Riverbed     Published Date: Jun 02, 2015
Learn about the 3 critical evaluation activities to ensure migration success.
Tags : 
the cloud, legacy application, implementation, integration costs, legacy services, cloud migration, operational expenditure, capital expenditure
    
Riverbed
Published By: IBM     Published Date: Nov 10, 2015
Ever since the publication of the War for Talent in 1997, the stakes for getting things right have been high…and they continue to be a top priority for CEOs. However, an over-reliance on traditional methods across critical human capital management processes may be limiting effectiveness.
Tags : 
ibm, human resources, human capital management, hiring
    
IBM
Published By: ASG Software Solutions     Published Date: Jun 05, 2009
ASG's Business Service PortfolioT (BSPT) Virtualization Management provides comprehensive oversight, inspections, discoveries, warnings, diagnostics, and reporting for the critical technology and administrative disciplines involved in virtual workload management. This is all done in parallel with physical systems management.
Tags : 
asg, sla, cmdb, bsm, metadata, metacmdb, lob, ecommerce
    
ASG Software Solutions
Published By: ASG Software Solutions     Published Date: Jun 15, 2009
ASG's Business Service Portfolio (BSP) Virtualization Management provides comprehensive oversight, inspections, discoveries, warnings, diagnostics, and reporting for the critical technology and administrative disciplines involved in virtual workload management. This is all done in parallel with physical systems management.
Tags : 
asg, cmdb, bsm, itil, bsm, metacmdb, archiving, sap
    
ASG Software Solutions
Published By: ASG Software Solutions     Published Date: May 27, 2009
Application management requires visibility from multiple vantage points within the IT enterprise, combined with a centralized information store that pulls the technology pieces of the application puzzle into a coherent whole.
Tags : 
asg, cmdb, bsm, itil, configuration management, metadata, metacmdb, lob
    
ASG Software Solutions
Published By: Microsoft Dynamics     Published Date: Jul 11, 2007
Until recently, many high-tech manufacturers – especially small and medium-sized businesses – have been able to survive by applying 80% of their operational focus to 20% or less of their critical customers and suppliers. That was then. The new mandate from channel masters is for more intense, collaborative relationships with fewer suppliers.
Tags : 
industry directions, oem, manufacturing, manufacturer, scm, supply chain, ems, electronics manufacturing
    
Microsoft Dynamics
Published By: CA Service Assurance     Published Date: Jul 29, 2011
Many organizations are breaking down on the traditional IT silos to look at applications, infrastructure, and management as one organization working together to provide a real-time model of what is happening across the enterprise. Read this eBook from a recent IT executive panel to learn how industry experts are addressing these challenges.
Tags : 
application lifecycle, cloud, cloud computing, application management, application delivery, critical services, virtualized, virtualization.
    
CA Service Assurance
Published By: Blue Coat Systems     Published Date: Jun 26, 2013
Does your network bandwidth usage align with business goals?  This white paper highlights the challenges of ensuring SaaS application access and performance. It discusses the pros and cons of popular approaches and explains how you can control, prioritize and optimize traffic so that business-critical applications have the performance users need.
Tags : 
network, bandwidth, saas, application, optimize traffic, performance, technology, cloud
    
Blue Coat Systems
Published By: Blue Coat Systems     Published Date: Jul 18, 2013
Does your network bandwidth usage align with business goals?  This white paper highlights the challenges of ensuring SaaS application access and performance. It discusses the pros and cons of popular approaches and explains how you can control, prioritize and optimize traffic so that business-critical applications have the performance users need.     
Tags : 
cloud, applications, network, bandwith, saas, infrastructure, network performance management
    
Blue Coat Systems
Published By: Polycom     Published Date: Feb 25, 2015
AOL's wide-open, work-the-way-you-want approach seems perfectly suited to a company where staffers defy distance by overcoming more than miles. "Distance obviously is going to separate you and your colleagues, but flexibility is really what's going to bring it all together." AOL has identified Polycom collaboration as one of the top three mission-critical tools for the business.
Tags : 
polycom, aol, adap.tv, huffington post, collaboration, connectivity, communication, telecom
    
Polycom
Published By: Illusive Networks     Published Date: Apr 10, 2019
Do you know how attackers can move once they’re inside your network? The access footprint changes constantly as users log on and off, restart systems, change roles, and access resources. Until now, these conditions have only been visible when skilled analysts inspect individual systems. Attack Surface Manager reveals hidden credentials and paths to critical systems so you can continuously impede attacker movement—without impeding the business.
Tags : 
attack surface, cyber hygiene, vulnerability management, vulnerabilities, network vulnerability, threat management, vulnerability assessment, network security
    
Illusive Networks
Published By: Entelo     Published Date: Sep 06, 2017
While there are many approaches to attracting diverse candidates, sourcing and pipeline management is one of the most critical. As organizations attempt to increase their sourcing efficiency by narrowing their focus on high-yield sources, they may inadvertently impact their ability to attract or find diverse candidates. Stacia Sherman Garr, VP and Talent Management Research Leader at Bersin by Deloitte, Deloitte Consulting LLP, will share five critical sourcing practices organizations can use to attempt to address this situation, expand their talent pools, and enhance their capability to identify diverse talent. We'll also share Schneider Electric's story of how they've used better sourcing and pipeline management to meaningfully impact their diversity hiring numbers. In this webinar, you'll learn: The role of diversity sourcing in creating an inclusive organization The importance of considering sourcing efficiency and its impact on diversity recruiting Five practices to help impr
Tags : 
    
Entelo
Published By: Schneider Electric     Published Date: Mar 28, 2019
Attracting Investors Webinar: With more than $18 billion in M&A activity in the first half of last year alone, the colocation industry is riding the bubble of rapid growth. Colocation data center providers are being evaluated by a wide range of investors, with varying experience and perspectives. Understanding the evaluation criteria is a critical competency for attracting the right type of investor and investment to your colocation business. Steve Wallage, Managing Director of Broad Group Consulting, has led more than 30 due diligence projects and will discuss specific areas of focus including assessment of financials, management, customers, business plan, competitive positioning and future strategy and exit. By attending this presentation colocation providers will: • Hear how investors are assessing colocation providers • Understand different types of investor strategy and positioning • Explore actual case studies –success stories as well as examples where investors walked away • Walk away with a greater understanding of how to not only attract investment, but the right type of investor to propel their business growth
Tags : 
investors, schneider electric, - colocation provider, attracting investors, colo data center
    
Schneider Electric
Published By: Schneider Electric     Published Date: Jun 07, 2019
Attracting Investors Webinar: With more than $18 billion in M&A activity in the first half of last year alone, the colocation industry is riding the bubble of rapid growth. Colocation data center providers are being evaluated by a wide range of investors, with varying experience and perspectives. Understanding the evaluation criteria is a critical competency for attracting the right type of investor and investment to your colocation business. Steve Wallage, Managing Director of Broad Group Consulting, has led more than 30 due diligence projects and will discuss specific areas of focus including assessment of financials, management, customers, business plan, competitive positioning and future strategy and exit. By attending this presentation colocation providers will: Hear how investors are assessing colocation providers Understand different types of investor strategy and positioning Explore actual case studies –success stories as well as examples where investors walked away Walk away with a greater understanding of how to not only attract investment, but the right type of investor to propel their business growth
Tags : 
investors, schneider electric, - colocation provider, attracting investors, colo data center
    
Schneider Electric
Published By: NetApp     Published Date: Dec 15, 2014
Organizations expect their IT departments to deliver a SAN storage infrastructure that can support faster rollout of applications and services, continuous and fast access to data in key applications, and efficient scale to address corporate data growth without comparable growth in IT expenses. This IDC white paper reviews the key SAN storage features required to meet such challenges and the NetApp SAN storage portfolio offerings that best address your needs.
Tags : 
san storage, business workloads, access to data, data growth, it expenses, data center
    
NetApp
Published By: Panasonic     Published Date: Apr 23, 2019
Mobility is critical to government productivity, but mobile data and devices present attractive targets to cybercriminals seeking to exploit vulnerabilities across the spectrum. Federal agencies are no strangers to cybersecurity attacks, and several recent high-profile breaches involving mobile devices demonstrate ongoing vulnerabilities in government’s expanding network of endpoints. This issue brief describes what can be done to protect devices, data and networks, including multi-factor authentication to authorization controls and user education.
Tags : 
    
Panasonic
Published By: Panasonic     Published Date: Oct 10, 2019
Mobility is critical to government productivity, but mobile data and devices present attractive targets to cybercriminals seeking to exploit vulnerabilities across the spectrum.
Tags : 
    
Panasonic
Start   Previous    7 8 9 10 11 12 13 14 15 16 17 18 19 20 21    Next    End
Search      

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.