Cookie policy: This site uses cookies (small files stored on your computer) to simplify and improve your experience of this website. Cookies are small text files stored on the device you are using to access this website. For more information on how we use and manage cookies please take a look at our privacy and cookie policies. Some parts of the site may not work properly if you choose not to accept cookies.

sections
 

dev

Results 5626 - 5650 of 6029Sort Results By: Published Date | Title | Company Name
Published By: Jive     Published Date: Jun 28, 2013
Let's get real. Social business isn't just about connecting employees and customers to "collaborate better" wherever they are, from whatever device.
Tags : 
jive, jive software, social intranet, ebook, mckinsey global institute, it management
    
Jive
Published By: Jive     Published Date: Apr 10, 2014
Aberdeen Group gathered data from more than 600 organizations to find out how social collaboration tools help meet business and talent goals.
Tags : 
reachmail, social collaboration, talent, employee development, business goals, talent goals
    
Jive
Published By: NETIQ     Published Date: Mar 12, 2013
Sally Hudson, IDC research and analysis, sums up thoughtful Q&A session that highlights evaluating access governance solutions, developing agile processes and policies that meet security and compliance needs.
Tags : 
idc research, governance solutions, netiq
    
NETIQ
Published By: NETIQ     Published Date: Mar 12, 2013
Is change and complexity causing you to rethink your approach to identity, security and governance? Examine some of the challenges organizations face when developing and adapting a compliance program.
Tags : 
iag, identity management, access governance, it security, compliance
    
NETIQ
Published By: ExtraHop     Published Date: Jul 25, 2013
Practice Fusion, the leading provider of web-based electronic medical records, used ExtraHop to improve collaboration between its Development and Operations teams. “We’re not just remediating problems faster, but preventing problems from occurring in the first place,” says John Hluboky, VP of Technical Operations.
Tags : 
collaboration, storage, technology, extrahop, best practices
    
ExtraHop
Published By: Logicalis     Published Date: Aug 20, 2014
We are pleased to present the findings of The Impact of IT Transformation on Enterprise Computing sponsored by Logicalis. The objective of this research is to better understand how the different stages of IT transformation can affect an organization, the challenges of advancing through each stage, and how successful progression can improve an organization’s IT effectiveness.
Tags : 
logicalis, it transformation, it strategy, it budget, it solutions, it system, it priorities, networking
    
Logicalis
Published By: HP and Intel ®     Published Date: May 06, 2013
In today’s hyperconnected world—with its multiple mobile devices, ubiquitous Internet access and pervasive social media platforms—people expect immediate access to information and services. These expectations are increasingly felt in corporate IT departments, where business units demand instant applications and fast services. Virtualization and cloud computing can help corporate IT meet these demands by bringing more flexibility and agility to the environment. But the ultimate solution is to transform the way IT is delivered. Indeed, many enterprises have already started on the journey toward the IT as a service (ITaaS) model.
Tags : 
    
HP and Intel ®
Published By: HP and Intel ®     Published Date: May 06, 2013
Read this case study to learn how GMO Media achieved a significant reduction in the implementation period of a service development environment using a private cloud. HP Converged Infrastructure and private cloud built on HP ProLiant BL465c G7 Server Blades and open-source software (OSS) with Red Hat Enterprise Virtualization (RHEV) enables speed and supports business growth.
Tags : 
implementation, case study, deployment, it infrastructure, private cloud, virtualization, servers
    
HP and Intel ®
Published By: Lenovo and Microsoft     Published Date: Oct 18, 2016
We’ve analyzed the new features in Windows 10 to provide you with this quick and easy look at how to get the most benefit from these innovations when coupled with a Lenovo ThinkPad®, ThinkCentre®, or ThinkStation® device. Key features you and your team will love include: • Seamless productivity across multiple tasks, locations, and devices • New features start tile and screen snap combined with classic Windows ease of use • Robust, integrated security that matches cutting edge bio-metrics with enterprise-grade basics Find out more now.
Tags : 
lenovo, innovation, microsoft, windows 10, thinkpad, thinkcentre, networking
    
Lenovo and Microsoft
Published By: OutSystems     Published Date: Jan 29, 2014
11 Usability Rules for IT Developers
Tags : 
outsystems, usability, apps, it developers, outsystems platform, usability principles, it management
    
OutSystems
Published By: Salesforce.com     Published Date: Jun 17, 2013
Get the Nucleus Research survey of CRM decision makers, showing the the significant ROI opportunity all organizations should consider regarding mobile and social CRM adoption.
Tags : 
customer relationship management, crm, technology, value matrix, support sales, marketing, customer service, crm solutions
    
Salesforce.com
Published By: BMC Software     Published Date: May 28, 2014
See what analyst 451 Research has to say about Control-M and how it is continuing to modernize with the addition of Workload Change Manager, which aims to make creating and verifying batch jobs and workflows easier for developers.
Tags : 
it management
    
BMC Software
Published By: Oracle     Published Date: Oct 25, 2013
Learn about the challenges and opportunities faced by global businesses as they optimize sales resources to develop territories and compensation plans, which are critical in response to emerging market opportunities and complex global economic challenges.
Tags : 
data, instinct, global sales, sales, performance, global sales performance, global business, optimze sales
    
Oracle
Published By: Oracle     Published Date: Oct 25, 2013
Learn how to provide the same experience across all devices and avoid the need for duplicate data entry, which might limit access to customer data or create errors.
Tags : 
leverage, mobility, sales, customer data, data, devices, mobile, tablet
    
Oracle
Published By: IBM     Published Date: Sep 27, 2013
Analyst Joe Clabby writing about HP's flawed Itanium strategy states that continued investment in a converged Itanium/x86 infrastructure is a huge waste of research and development money. Itanium should be treated as a specialty processor that performs certain workloads. Read it here.
Tags : 
hewlett packard, itanuim, converged infrastructure, feint, x86 server, servers
    
IBM
Published By: IBM     Published Date: Oct 24, 2013
While a business case is all about the numbers, knowing how and when to push the proposal through the approval process requires an understanding of the psychology behind how proposals are selected and funded. Learn the tools and strategies to develop a business case and gain approval within your company.
Tags : 
business case, best practices, success tactics, leadership, persuasion, decision making, selling
    
IBM
Published By: CEB     Published Date: Sep 04, 2013
Analysis on the key challenges, developments, and innovations affecting corporate and business finance. This edition helps you to compare your cost and growth assumptions with peers, establish a finance-friendly corporate culture, develop critical guidance-based skills on your team, mobilize global cash balances, increase the effectiveness of investor targeting, and improve business analytics.
Tags : 
corporate culture, thought leadership, finance talent, cash balances, investor targeting, finance outlook, business analytics
    
CEB
Published By: Norse     Published Date: Apr 18, 2014
Learn about the epidemic of compromises that are taking place at healthcare organizations due to cyberattacks and see what steps your organization should take to protect against these threats.
Tags : 
health care, cyberattacks, compromised devices, norse, epidemic of compromises, protection against threats, security, it management
    
Norse
Published By: Oracle     Published Date: Nov 01, 2013
Advances in human capital management technology mean that with the right talent management system in place, HR leaders can implement world-class strategies at their companies. Oracle Talent Cloud was developed using a holistic approach, so HR leaders can manage everything from recruiting, compensation and goal and performance management to employee learning and talent review, in a single, cohesive SaaS-based system.
Tags : 
zenithoptimedia, oracle, talent management, talent cloud, human capital management, accelerating businesses, global technology, operational complexities increase
    
Oracle
Published By: Oracle     Published Date: Nov 01, 2013
The ability to manage talent effectively can dictate the success of the entire organization. Organizations must invest in solutions that help attract, retain and develop talent while aligning to the overall goals and success of the business. This infographic provides insight why the future of human capital management depends on cloud-based talent management technology.
Tags : 
zenithoptimedia, oracle, future of hcm, cloud-based talent, talent management, oracle talent cloud, cloud integration, oracle integration architecture
    
Oracle
Published By: Oracle     Published Date: Nov 03, 2016
Mitigating Risk in Public Infrastructure Development
Tags : 
    
Oracle
Published By: Oracle     Published Date: Mar 22, 2018
The Staatsbetrieb Sächsische Informatik Dienste (SID) is the German Federal State of Saxony’s central IT service provider. SID supports the state administration with cutting-edge information technology and provides expert advice to its customers on all IT matters. Its brief includes the development, introduction, operation and maintenance of IT processes, planning, operation and administration of the IT infrastructure, and central IT procurement. SID had been operating Oracle Databases at its datacenters for many years, running on IA64 hardware. However, this older technology had to be replaced for technical and financial reasons, while SID wanted to leverage the project to re-engineer its Oracle Database infrastructure. The project was initially financed and realized for migrating the IT system FÖMISAX (Landeseinheitliche Fördermitteldatenbank des Freistaates Sachsen), the State of Saxony’s subsidies database.
Tags : 
    
Oracle
Published By: Oracle     Published Date: May 07, 2018
2017 was a momentous year in security, even though the DDoS landscape appeared to plateau. Maybe it was because Mirai hit so hard at the end of 2016 and the owners of other botnets were retooling to catch up. Maybe it was because news of large data breaches captured so many headlines, drawing the attention of both criminals and the public. Or maybe it is simply due to the cyclical nature of attack popularity that we have seen in the past. No matter the cause, our prediction is that the trend won’t continue in 2018, and it is not time to be complacent. The Mirai botnet is far from played out, as botnet creators are continuing to modify the source code for their individual needs and, with more connected platforms devices than ever, the Internet will continue to offer fertile ground for largescale attacks.
Tags : 
internet, security, cryptocurrency, data, breaches, botnet
    
Oracle
Published By: Symantec     Published Date: Oct 07, 2014
The rising intensity and sophisticated nature of cyber-attacks has created a precarious environment for businesses charged with protecting their customers’ personal data. In 2012, credit card and debit card fraud resulted in losses amounting to $11.27 billion. In January 2014 alone, a single cyber-attack exposed more than 105 million identities. To steal this data, one option is to target the point at which a retailer first acquires that card data – the Point-of-Sale (PoS) system. PoS systems are increasingly being targeted by these attackers, which is why it's more important than ever to protect these devices and the systems they are connected to. Read more into the research on these attacks in this Symantec Security Response special report.
Tags : 
point of sale systems, cyber-attacks, precarious environment, fraud, personal data, pos, security response, security
    
Symantec
Published By: IBM     Published Date: Jan 09, 2014
This interactive eBook describes how virtualization is not a device to implement, but rather a journey to realize greater and greater gains. Featuring cases from midsize companies around the world, the eBook details how to get started, the importance of consolidation, tangible ways to fully benefit from virtualization and more.
Tags : 
ibm, virtualization, ebook, midsize businesses, midmarket, virtualization, consolidate, workload management
    
IBM
Start   Previous    219 220 221 222 223 224 225 226 227 228 229 230 231 232 233    Next    End
Search      

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.