Cookie policy: This site uses cookies (small files stored on your computer) to simplify and improve your experience of this website. Cookies are small text files stored on the device you are using to access this website. For more information on how we use and manage cookies please take a look at our privacy and cookie policies. Some parts of the site may not work properly if you choose not to accept cookies.

sections
 

critical it

Results 1551 - 1575 of 1901Sort Results By: Published Date | Title | Company Name
Published By: IBM     Published Date: Jul 09, 2014
If you're unhappy with the state of your current disaster recovery operations, this Q and A is a must-read. IBM cloud experts share information on how cloud computing can provide nearly instantaneous failover and failback of critical business applications. This type of speedy recovery keeps your organization running in the event of disaster or disruption, limiting the risk of business losses and brand damage.
Tags : 
ibm, disaster recovery, disaster recovery solution, cloud technology, it operation, restoration, disaster as a service, draas
    
IBM
Published By: IBM     Published Date: Oct 07, 2014
This IDC paper discusses the critical role of hardware infrastructure in business analytics deployments, citing best practices, the IDC's decision framework, and four client case studies - Wellpoint, Vestas, AXTEL, and Miami-Dade County. IDC's recommendation is that "infrastructure cannot — and should not — be an afterthought". Hardware infrastructure and software requirements must be determined in parallel to maximize the success of business analytics projects.
Tags : 
ibm, idc, hardware infrastructure, business analytics deployments, software, software requirements, business analytics projects, infrastructure management
    
IBM
Published By: IBM     Published Date: Oct 14, 2014
Capitalizing on the transformative potential of private cloud requires leveraging the differentiators that will drive exponential value down the road. This IBM white paper discusses the core differentiators that drive transformative business value and to how best incorporate them into your environment, based on the latest research, technologies and solutions.
Tags : 
private cloud, business value, business agility, hybrid era, it management
    
IBM
Published By: IBM     Published Date: Oct 14, 2014
If you're unhappy with the state of your current disaster recovery operations, this Q and A is a must-read. IBM cloud experts share information on how cloud computing can provide nearly instantaneous failover and failback of critical business applications. This type of speedy recovery keeps your organization running in the event of disaster or disruption, limiting the risk of business losses and brand damage.
Tags : 
disaster recovery operations, cloud technologies, cloud computing, critical business aplplications, it management
    
IBM
Published By: IBM     Published Date: Nov 03, 2014
Business critical applications must always be available and performing. Furthermore, the reality is in today's customer centric world, slow is the new broke. Compounding this challenge, IT complexity is rapidly increasing.
Tags : 
infrastructure visibility, it complexity, search analytics, problem identification, it management
    
IBM
Published By: IBM     Published Date: Jan 09, 2015
As mobile technology evolves, it’s bringing rapid change to enterprises everywhere, so it’s essential to know the latest trends and how to build on them to create real business benefits. IDC believes third-party mobility service providers will play a key role in helping you do just that. Read the analyst report to get expert insight into how you can benefit from key mobile trends; building blocks and best practices for successful deployment and adoption of any mobility initiative; critical factors to consider when evaluating an IT services provider; and details on how IBM MobileFirst services can help you achieve a sustainable competitive advantage
Tags : 
ibm, mobile, network, capabilities, solutions, strategy, cisco, challenges
    
IBM
Published By: IBM     Published Date: Jan 14, 2015
Bloor Research investigated several key critical success factors for big data analytics. Their findings show that governance, data cleansing, and privacy and security have never been more important. Read this paper to see their conclusions.
Tags : 
big data, data management, data exploration, gain visibility, security extension, business intelligence, explore data, data analytics
    
IBM
Published By: IBM     Published Date: Feb 11, 2015
Safety certification for avionics hardware and software is an expensive, complicated process, but absolutely necessary to ensure safe skies for commercial aircraft passengers and military jets flying in the national airspace. Now unmanned aircraft flight critical electronics will also have to meet these same safety requirements as the U.S. Federal Aviation Administration (FAA) starts to open up the national airspace to unmanned aerial systems (UASs). While the rules are still being drawn up, embedded software and hardware designers are already looking at ways for UAS platform integrators to solve certification challenges and manage the process of compliance with safety certification standards such as DO-178B & C. This webcast of industry experts will discuss how to enable safety certification of UAS platforms through efficient and cost-effective solutions.
Tags : 
uas platforms, safety certification, avionics hardware, cost-effective solutions, certification challenges, it management, platforms
    
IBM
Published By: IBM     Published Date: Apr 06, 2015
Read this Forrester whitepaper to learn more about the critical, yet often overlooked, role that data classification and data discovery can play in reducing your organization's risk and enhancing security.
Tags : 
data discovery, data classification, security, risk, ibm, it management
    
IBM
Published By: IBM     Published Date: Apr 07, 2015
You may be considering the move to a SaaS model for several reasons: it's cheaper, easier, more flexible. But then reality sets in. You can't afford to move to SaaS right away. Many of your apps are too mission-critical to trust SaaS at this point, and security restrictions and company guidelines will not allow you to use SaaS for many apps. However, for some apps, it's not an issue, and that number continues to grow. So how do you reconcile? Enter stage left-- Hybrid APM. With the ability to pick and choose between SaaS or on-premises monitoring for your different applications and components, wherever they reside, your troubles are alleviated and the shift towards SaaS can be seamless.
Tags : 
ibm, saas, mission-critical, security, apps, growth, apm, cloud
    
IBM
Published By: Cornerstone OnDemand     Published Date: Jan 31, 2018
Over the past decade, talent management initiatives have become a critical priority for organizations. While CEOs see the business value of talent management— typically talent acquisition, learning, performance, talent mobility, compensation, and analytics—some organizations have found it challenging to quantify the business impact or return on such investments. If you are looking for help in building a talent management business case, this overview was created for you.
Tags : 
    
Cornerstone OnDemand
Published By: Symantec     Published Date: Jan 10, 2013
This paper explores the current state of website security and the contributions Symantec is making to help organizations protect critical data and build trust with customers. It begins with Secure Sockets Layer (SSL) encryption that address problems.
Tags : 
security and trust of doing business, business, trust, consumer confidence, consumer trust, security, it management
    
Symantec
Published By: Jive     Published Date: Mar 25, 2015
Like many roles in the C-Suite, the CIO role is changing. Its impact and control have been circumvented by cloud computing, the consumerization of IT, and employees’ unprecedented access to technology. The role of the CIO is at a critical juncture. In this exclusive Jive e-book, industry analyst Brian Vellmure takes a deep dive into the challenges and opportunities facing today’s CIO.
Tags : 
marketing, cio, cloud computing, technology, connectivity
    
Jive
Published By: Dice     Published Date: Jul 01, 2015
As the federal workforce nears retirement age, it is crucial for the government to hire members of the millennial generation, particularly in the mission-critical fields of science, technology, engineering and math where there is stiff competition with the private sector.
Tags : 
recruiting, management, talent, connectivity. culture, millenial
    
Dice
Published By: Dice     Published Date: Feb 10, 2016
As the federal workforce nears retirement age, it is crucial for the government to hire members of the millennial generation, particularly in the mission-critical fields of science, technology, engineering and math where there is stiff competition with the private sector. These results are a must-read for government officials who want to stay up-to-date with developing trends in recruiting.
Tags : 
reachmail dice, tech candidate sentiment, government officials, recruiting trends, millenials
    
Dice
Published By: Cisco     Published Date: Nov 17, 2015
Built for continuous availability in mission-critical data center environments, Cisco NX-OS has set the standard for resiliency, extensibility, efficiency, and virtualization. Now it has added programmability and automation to that list, too. For this episode of TechWiseTV, Robb Boyd talks to two foremost experts in this, the world's most deployed operating system in the data center. They discuss all the exciting changes Cisco has made to NX-OS and, more importantly, how organizations can take full advantage of this automation opportunity. This is truly a deep dive into the full potential of all the components that compose Open NX-OS.
Tags : 
cisco, twtv, nx-os, virtualization, programmability, networking, security, it management
    
Cisco
Published By: Cisco     Published Date: Nov 18, 2015
Cisco engaged Miercom to conduct a competitive analysis of its Catalyst 2960-X switch versus two comparable Hewlett-Packard switches from the 2920 and 5120 product families. Miercom executed comprehensive hands-on testing and evaluated the performance of some widely deployed features that are critical for reliable functioning of enterprise networks. The test methodology focused on specific areas in which Cisco believed there were key competitive differentiators between the products. Test results validated include throughput, latency, energy efficiency, stacking, LACP load balancing and Quality of Services (QoS) performance. Miercom found that the Cisco Catalyst 2960-X demonstrated superior performances against the competitive switches in the tests featured in this report. We tested the following switch-configurations of the Cisco Catalyst 2960-X, HP 2920 and HP 5120 product families.
Tags : 
competitive, analysis, deployed, methodology, networking, wireless
    
Cisco
Published By: Citrix Systems, Inc.     Published Date: Jan 27, 2016
Gartner evaluates nine vendors’ enterprise mobility management (EMM) solutions against 11 critical capabilities in the 2015 Critical Capabilities for Enterprise Mobility Management Suites report.
Tags : 
citrix, gartner, enterprise, mobility, management, mobility, ip telephony, network security
    
Citrix Systems, Inc.
Published By: IBM     Published Date: Sep 04, 2014
This IDC Technology Spotlight paper takes a look at why Email remains the primary mode of communication in business today. While there is prevalent speculation that social software and other real-time communications applications will replace email, email nevertheless remains a stalwart in business operations. In addition, as relationships across all business communication channels continue to be redefined, innovative modes and methods of communication are emerging. As a result, locating the right data and information at the right time — while still critical — becomes increasingly complex. IDC expects that organizations will use social software, such as Notes and Domino 9x Social Edition, to complement existing tools and address these business needs for the foreseeable future.
Tags : 
ibm, collaboration, email communication, real time communication, business communication, social software
    
IBM
Published By: Absolute Software     Published Date: May 08, 2009
Keeping data secure in a mobile environment is not just a daunting challenge, but a critical requirement. Loss and theft of computers leaves sensitive data vulnerable, creating serious financial and legal risks.
Tags : 
absolute, intel, laptop, saas, lock down, rapid recovery, stolen, data defense
    
Absolute Software
Published By: SPSS     Published Date: Jun 30, 2009
This paper describes why and how Enterprise Feedback Management (EFM) is a critical component in solving the problem of enhancing customer-driven innovation and improving the predictive capabilities of the IT organization.
Tags : 
predictive enterprise, spss, enterprise feedback management, efm, customer-driven innovation, crm, customer relationship management, customer experience
    
SPSS
Published By: SPSS, Inc.     Published Date: Mar 31, 2009
This paper describes why and how Enterprise Feedback Management (EFM) is a critical component in solving the problem of enhancing customer-driven innovation and improving the predictive capabilities of the IT organization.
Tags : 
predictive enterprise, spss, enterprise feedback management, efm, customer-driven innovation, crm, customer relationship management, customer experience
    
SPSS, Inc.
Published By: Cornerstone OnDemand     Published Date: Jun 29, 2018
There is no time like the present to come up with an improved strategy for employee retention and development. It is critical for you as supervisors and managers to engage employees effectively if you don’t want your top talent to look for opportunities elsewhere to grow in their careers. Help your employees do their best work by removing obstacles, recognizing valuable contributions and promoting creative approaches to career advancement. Take action to retain employees: authorize them to make decisions; initiate conversations about performance, be transparent; and provide guidance during times of change or uncertainty.
Tags : 
employee, retention, development, talent
    
Cornerstone OnDemand
Published By: Cornerstone OnDemand     Published Date: Jun 29, 2018
Over the past decade, talent management initiatives have become a critical priority for organizations. In 2016, KPMG found that 99 percent of CEOs reported they’ve taken action to develop existing or future talent.1 The same study also found that nearly half of CEOs expected their companies to be transformed into a significantly different entity within the next three years. This is because since 2000, 52% of companies in the Fortune 500 have gone bankrupt, been acquired, or ceased to exist.3 To remain competitive in our disruptive, digital age, this type of business transformation has become necessary. Achieving these huge business transformation feats is not for the faint of heart and requires robust organizational change and talent management.
Tags : 
talent, management, roi
    
Cornerstone OnDemand
Published By: ASG Software Solutions     Published Date: Jun 02, 2009
End-user expectations and high levels of performance against Service Level Agreements (SLAs) must be achieved or organizations risk the loss of business. This paper details key capabilities needed for successful end-user monitoring and provides critical considerations for delivering a successful end-user experience.
Tags : 
asg, cmdb, bsm, itil, bsm, metacmdb, archiving, sap
    
ASG Software Solutions
Start   Previous    56 57 58 59 60 61 62 63 64 65 66 67 68 69 70    Next    End
Search      

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.