Cookie policy: This site uses cookies (small files stored on your computer) to simplify and improve your experience of this website. Cookies are small text files stored on the device you are using to access this website. For more information on how we use and manage cookies please take a look at our privacy and cookie policies. Some parts of the site may not work properly if you choose not to accept cookies.

sections
 

critical it

Results 1501 - 1525 of 1825Sort Results By: Published Date | Title | Company Name
Published By: Symantec     Published Date: Jan 10, 2013
This paper explores the current state of website security and the contributions Symantec is making to help organizations protect critical data and build trust with customers. It begins with Secure Sockets Layer (SSL) encryption that address problems.
Tags : 
security and trust of doing business, business, trust, consumer confidence, consumer trust, security, it management
    
Symantec
Published By: Jive     Published Date: Mar 25, 2015
Like many roles in the C-Suite, the CIO role is changing. Its impact and control have been circumvented by cloud computing, the consumerization of IT, and employees’ unprecedented access to technology. The role of the CIO is at a critical juncture. In this exclusive Jive e-book, industry analyst Brian Vellmure takes a deep dive into the challenges and opportunities facing today’s CIO.
Tags : 
marketing, cio, cloud computing, technology, connectivity
    
Jive
Published By: Dice     Published Date: Jul 01, 2015
As the federal workforce nears retirement age, it is crucial for the government to hire members of the millennial generation, particularly in the mission-critical fields of science, technology, engineering and math where there is stiff competition with the private sector.
Tags : 
recruiting, management, talent, connectivity. culture, millenial
    
Dice
Published By: Dice     Published Date: Feb 10, 2016
As the federal workforce nears retirement age, it is crucial for the government to hire members of the millennial generation, particularly in the mission-critical fields of science, technology, engineering and math where there is stiff competition with the private sector. These results are a must-read for government officials who want to stay up-to-date with developing trends in recruiting.
Tags : 
reachmail dice, tech candidate sentiment, government officials, recruiting trends, millenials
    
Dice
Published By: Cisco     Published Date: Nov 17, 2015
Built for continuous availability in mission-critical data center environments, Cisco NX-OS has set the standard for resiliency, extensibility, efficiency, and virtualization. Now it has added programmability and automation to that list, too. For this episode of TechWiseTV, Robb Boyd talks to two foremost experts in this, the world's most deployed operating system in the data center. They discuss all the exciting changes Cisco has made to NX-OS and, more importantly, how organizations can take full advantage of this automation opportunity. This is truly a deep dive into the full potential of all the components that compose Open NX-OS.
Tags : 
cisco, twtv, nx-os, virtualization, programmability, networking, security, it management
    
Cisco
Published By: Cisco     Published Date: Nov 18, 2015
Cisco engaged Miercom to conduct a competitive analysis of its Catalyst 2960-X switch versus two comparable Hewlett-Packard switches from the 2920 and 5120 product families. Miercom executed comprehensive hands-on testing and evaluated the performance of some widely deployed features that are critical for reliable functioning of enterprise networks. The test methodology focused on specific areas in which Cisco believed there were key competitive differentiators between the products. Test results validated include throughput, latency, energy efficiency, stacking, LACP load balancing and Quality of Services (QoS) performance. Miercom found that the Cisco Catalyst 2960-X demonstrated superior performances against the competitive switches in the tests featured in this report. We tested the following switch-configurations of the Cisco Catalyst 2960-X, HP 2920 and HP 5120 product families.
Tags : 
competitive, analysis, deployed, methodology, networking, wireless
    
Cisco
Published By: Citrix Systems, Inc.     Published Date: Jan 27, 2016
Gartner evaluates nine vendors’ enterprise mobility management (EMM) solutions against 11 critical capabilities in the 2015 Critical Capabilities for Enterprise Mobility Management Suites report.
Tags : 
citrix, gartner, enterprise, mobility, management, mobility, ip telephony, network security
    
Citrix Systems, Inc.
Published By: IBM     Published Date: Sep 04, 2014
This IDC Technology Spotlight paper takes a look at why Email remains the primary mode of communication in business today. While there is prevalent speculation that social software and other real-time communications applications will replace email, email nevertheless remains a stalwart in business operations. In addition, as relationships across all business communication channels continue to be redefined, innovative modes and methods of communication are emerging. As a result, locating the right data and information at the right time — while still critical — becomes increasingly complex. IDC expects that organizations will use social software, such as Notes and Domino 9x Social Edition, to complement existing tools and address these business needs for the foreseeable future.
Tags : 
ibm, collaboration, email communication, real time communication, business communication, social software
    
IBM
Published By: Absolute Software     Published Date: May 08, 2009
Keeping data secure in a mobile environment is not just a daunting challenge, but a critical requirement. Loss and theft of computers leaves sensitive data vulnerable, creating serious financial and legal risks.
Tags : 
absolute, intel, laptop, saas, lock down, rapid recovery, stolen, data defense, theft deterrence, pc protection, tpm, trusted platform module, anti theft, data breach, password protection, password, encryption, security
    
Absolute Software
Published By: SPSS     Published Date: Jun 30, 2009
This paper describes why and how Enterprise Feedback Management (EFM) is a critical component in solving the problem of enhancing customer-driven innovation and improving the predictive capabilities of the IT organization.
Tags : 
predictive enterprise, spss, enterprise feedback management, efm, customer-driven innovation, crm, customer relationship management, customer experience, consumer behavior, actionable insight, centralized system, feedback programs, push orientation, lifecycle-based approach, customer retention, churn rate, compliance, internal r&d, behavioral data, descriptive data
    
SPSS
Published By: SPSS, Inc.     Published Date: Mar 31, 2009
This paper describes why and how Enterprise Feedback Management (EFM) is a critical component in solving the problem of enhancing customer-driven innovation and improving the predictive capabilities of the IT organization.
Tags : 
predictive enterprise, spss, enterprise feedback management, efm, customer-driven innovation, crm, customer relationship management, customer experience, consumer behavior, actionable insight, centralized system, feedback programs, push orientation, lifecycle-based approach, customer retention, churn rate, compliance, internal r&d, behavioral data, descriptive data
    
SPSS, Inc.
Published By: Cornerstone OnDemand     Published Date: Jun 29, 2018
There is no time like the present to come up with an improved strategy for employee retention and development. It is critical for you as supervisors and managers to engage employees effectively if you don’t want your top talent to look for opportunities elsewhere to grow in their careers. Help your employees do their best work by removing obstacles, recognizing valuable contributions and promoting creative approaches to career advancement. Take action to retain employees: authorize them to make decisions; initiate conversations about performance, be transparent; and provide guidance during times of change or uncertainty.
Tags : 
employee, retention, development, talent
    
Cornerstone OnDemand
Published By: Cornerstone OnDemand     Published Date: Jun 29, 2018
Over the past decade, talent management initiatives have become a critical priority for organizations. In 2016, KPMG found that 99 percent of CEOs reported they’ve taken action to develop existing or future talent.1 The same study also found that nearly half of CEOs expected their companies to be transformed into a significantly different entity within the next three years. This is because since 2000, 52% of companies in the Fortune 500 have gone bankrupt, been acquired, or ceased to exist.3 To remain competitive in our disruptive, digital age, this type of business transformation has become necessary. Achieving these huge business transformation feats is not for the faint of heart and requires robust organizational change and talent management.
Tags : 
talent, management, roi
    
Cornerstone OnDemand
Published By: ASG Software Solutions     Published Date: Jun 02, 2009
End-user expectations and high levels of performance against Service Level Agreements (SLAs) must be achieved or organizations risk the loss of business. This paper details key capabilities needed for successful end-user monitoring and provides critical considerations for delivering a successful end-user experience.
Tags : 
asg, cmdb, bsm, itil, bsm, metacmdb, archiving, sap, ilm, mobius, it service management, itil, performance testing, sla, sla management services, testing, wla, visibility, configuration management, metadata
    
ASG Software Solutions
Published By: ASG Software Solutions     Published Date: Jun 15, 2009
ASG's Business Service Portfolio (BSP) Virtualization Management provides comprehensive oversight, inspections, discoveries, warnings, diagnostics, and reporting for the critical technology and administrative disciplines involved in virtual workload management. This is all done in parallel with physical systems management.
Tags : 
asg, cmdb, bsm, itil, bsm, metacmdb, archiving, sap, ilm, mobius, workload automation, wla, visibility, configuration management, metadata, metacmdb, lob, sdm, service dependency mapping, ecommerce
    
ASG Software Solutions
Published By: Emerson Network Power     Published Date: Dec 14, 2010
Learn best practices for optimizing critical systems for cloud deployment in existing facilities, including optimizing power architectures for high availability.
Tags : 
emerson network power, liebert, dcim, data center infrastructure management, cloud computing, paas, iaas, saas, daas, high availability, business continuity, data center design and management
    
Emerson Network Power
Published By: Emerson Network Power     Published Date: Nov 18, 2010
In this paper, we compare both cooling systems' ability to maintain favorable environmental conditions, and their energy efficiency and annual operating costs.
Tags : 
precision cooling, comfort cooling, optimized cooling, liebert, emerson network power, tco, heat management, energy efficiency, total cost of ownership, power and cooling, data center design and management
    
Emerson Network Power
Published By: Idera     Published Date: Sep 03, 2013
Corruption and other data integrity issues can be scary to deal with, but if you follow the advice and tips provided in this whitepaper, you will limit your exposure to corruption and always be able to take the quickest route to resolution with minimal or no data loss and minimal downtime. Just remember to stay calm and walk through the steps
Tags : 
idera, sql, sql server, data validation processes, data integrity, corruption
    
Idera
Published By: Idera     Published Date: Jan 08, 2014
Download this whitepaper to learn the 5 Most Common Critical SQL Integrity Issues.
Tags : 
idera, sql, integrity sql, data typing, data validation, physical consistency, data storage, software development, it management
    
Idera
Published By: Eaton     Published Date: Jun 01, 2012
For all their advantages, virtualization and cloud computing bring some unique challenges: higher power demands per server and enclosure, more critical applications residing on each server, and a need for greater visibility into power conditions.
Tags : 
virtualization, cloud computing, resellers, power distribution, power protection, business continuity, power monitoring, power audits, servers, data center
    
Eaton
Published By: SugarCRM     Published Date: Jul 27, 2015
CRM is a critical tool for organizations looking to build extraordinary customer relationships. However, if the CRM system is only deployed to a single department its full value may not be achieved. Learn six tips for optimizing your CRM deployment in this informative whitepaper
Tags : 
crm, customer relationships, optimizing crm deployment
    
SugarCRM
Published By: SpectorSoft     Published Date: Apr 01, 2015
Corporate computers and information and communications systems (collectively, “electronic resources”) remain the workhorse for most businesses, even as alternatives, such as third-party text messaging services, external social media, and cloud computing, flourish. Employees rely on corporate electronic resources for e-mail, calendaring, business contacts, Internet access, document creation and storage, and a multitude of other business applications. Consequently, for employers, it is critical to establish and maintain their right to inspect all information stored on, and to monitor all communications transmitted by, corporate electronic resources. The corporate acceptable use policy is the linchpin of that effort. The ten tips below are intended to aid employers who either want to implement an acceptable use policy for the first time, or who need to update their policy.
Tags : 
acceptable use, communications systems, text messaging, acceptable use policy, confidentiality, security, it management
    
SpectorSoft
Published By: Riverbed     Published Date: Jan 28, 2014
In this ESG analyst white paper, learn how Riverbed introduces an integrated approach to ensure performance of your network and applications by leveraging Cascade network performance management and Steelhead WAN optimization solutions.
Tags : 
riverbed, riverbed performance management, network performance, business-critical applications, application-level visibility, saas, data center consolidation, wan optimization technologies, networking, it management, enterprise applications
    
Riverbed
Published By: Riverbed     Published Date: Jan 28, 2014
Forrester benchmark data on current state of application availability and performance within the enterprise. In conducting a survey of 159 IT professionals with direct responsibility for business-critical applications, Forrester found that all enterprises surveyed had fundamental issues while managing the performance of these applications and business services. Read the report to learn the key findings of this study.
Tags : 
riverbed, forrester consulting, application performance management, application availability, enterprise, it transactions, business services, business-critical applications, proactive performance management, lowering operational costs, it efficiency, meaningful alerts, proactive alerting, root-cause identification, end user experience monitoring, wan optimization technologies, networking, it management, enterprise applications
    
Riverbed
Published By: Symantec     Published Date: Aug 09, 2013
Symantec Endpoint Protection 12 positioned as a Leader in 2013 Gartner’s Magic Quadrant Symantec Endpoint Protection 12 and Critical System Protection are positioned highest in Gartner’s Magic Quadrant for completeness of vision and the ability to execute. Read the report to learn about the Endpoint Protection landscape, growth drivers and challenges, and where vendors are positioned.
Tags : 
symantec, security, threat, report, key findings, best practice, strategy, technology
    
Symantec
Start   Previous    54 55 56 57 58 59 60 61 62 63 64 65 66 67 68    Next    End
Search      

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.