Cookie policy: This site uses cookies (small files stored on your computer) to simplify and improve your experience of this website. Cookies are small text files stored on the device you are using to access this website. For more information on how we use and manage cookies please take a look at our privacy and cookie policies. Some parts of the site may not work properly if you choose not to accept cookies.

sections
 

it management software

Results 251 - 275 of 464Sort Results By: Published Date | Title | Company Name
Published By: CDW - EMC     Published Date: Apr 07, 2016
The EMC VNX family delivers industry-leading innovation and enterprise capabilities for file and block storage in a scalable, easy-to-use unified storage solution. VNX storage combines powerful and flexible hardware with advanced efficiency, management, and protection software to meet your economical, and performance needs. With the VNX you can consolidate multiple workloads and still enjoy the best economics for yoru virtual and physical applications without compromise. The VNX allows you to enjoy the performance of flash at the cost-effectiveness of disk for all your mixed workloads. With industry leading application integration, you can start small and scale to multi-petabyte environments, you can utilize automated storage tiering, encryption, local and remote protection all while knowing that VNX is trusted by tens of thousands of customers.
Tags : 
storage management, performance management, best practices, application integration, software protection, business intelligence, it management, enterprise applications, infrastructure, network management, network performance
    
CDW - EMC
Published By: ThousandEyes     Published Date: Nov 17, 2016
Traditional performance management solutions were built for applications owned by the enterprise and run inside the corporate network. The explosive adoption of Software-as-a-Service (SaaS) and cloud applications have brought new performance management challenges that push the limits of the enterprise infrastructure and break these traditional approaches. In this white paper, we examine why existing solutions don’t work for the modern enterprise and discuss a fundamentally different approach that is needed to address the new challenges. Download now to learn more!
Tags : 
    
ThousandEyes
Published By: Red Hat     Published Date: Nov 08, 2017
This BPM.com whitepaper examines the role of business process management (BPM) software in enabling physical things to be connected to digital processes in the context of the Internet of Things (IoT)—exploring both the required capabilities for the next generation of BPM platforms as well as the benefits offered by BPM and IoT.
Tags : 
digital transformation, digital interface, business process management, internet of things, big data
    
Red Hat
Published By: Eloqua     Published Date: Sep 28, 2011
B2B purchasing in a Web 2.0 world has transformed into an interactive process driven by the customer, not the vendor. Learn how using clickstream data to target buyers' motivations allows marketers to trigger automated processes to drive better leads for sales.
Tags : 
digital body language, sales lead management, lead management system, lead nurturing, b2b social media, b2b software marketing, marketing white paper, lead generation, business to business advertising, social media optimization, b2b lead generation, lead scoring
    
Eloqua
Published By: Jive     Published Date: Apr 20, 2010
Learn how VMware used Jive's Social Business Software to earn additional revenue and reduce event management costs. Download this free white paper from Jive Software now!
Tags : 
jive software, social platform, social media, vmware, virtualization, vmware, customer satisfaction
    
Jive
Published By: Dell Software     Published Date: Jul 18, 2012
Paper: Is System Center Enough?
Tags : 
technology, asset, management, asset management, system center, vendor tracking, active software, passive software, metering
    
Dell Software
Published By: Microsoft Visual Studio Team System     Published Date: Apr 29, 2009
Today’s economic climate presents challenges in achieving business differentiation.  Investing in innovation during an economic downturn may seem counterintuitive at first, but it can help companies pull ahead of the competition by displaying a show of strength in a climate of weakness.  The Microsoft® Application Platform can help organizations do more with less, enabling them to more quickly, efficiently, and cost-effectively deliver custom solutions that provide strong business value.
Tags : 
microsoft, vsts, microsoft vsts, affordable innovation, application platform, custom solutions, application life-cycle management, rich development platform, designer-developer collaboration, application life-cycle management, alm, microsoft visual studio team system, version control, work assignment, tracking, builds, testing, shaw group, microsoft .net framework, ch2m hill
    
Microsoft Visual Studio Team System
Published By: Ping Identity     Published Date: May 05, 2009
This white paper, intended for a management-level audience, describes why and how any organization can implement secure Internet single sign-on with a federated identity management system. Learn more today!
Tags : 
pingidentity, sso, secure internet, single sign-on, federated identity management system, software as a service, saas, business process outsourcing, bpo, ciso, attack, threats, personally-identifiable information, pii, trojan, virus, proprietary security mechanisms, crypto libraries, security assertion markup language, saml
    
Ping Identity
Published By: Ping Identity     Published Date: May 05, 2009
Web Services are emerging as the preeminent method for program-to-program communication across corporate networks as well as the Internet. Securing web Services has been a challenge until recently, as typical Web authentication and authorization techniques employed browser-to-server architectures (not program-to-program). This resulted in user identity ending at the Web Application Server, forcing the Web Services Provider to trust blindly that the Web Services Requester had established identity and trust with the end user.
Tags : 
pingidentity, sso, standards-based, web 2.0, identity enabled, browser-to-server, soap, saml, security assertion markup language, pki, public key infrastructure, soa, oasis, ws-trust, sso, single sign-on, service oriented architecture, rest, user identity mapping, ldap
    
Ping Identity
Published By: Ping Identity     Published Date: May 05, 2009
With the success of single sign-on (SSO) inside the enterprise, users are calling for interoperability outside of the enterprise’s security domain to outsourced services, including business process outsourcing (BPO) and software as a service (SaaS) providers, and trading partners, as well as within the enterprise to affiliates and subsidiaries. Learn more today!
Tags : 
pingidentity, sso, standards-based, web 2.0, identity enabled, browser-to-server, soap, saml, security assertion markup language, pki, public key infrastructure, soa, oasis, ws-trust, sso, single sign-on, service oriented architecture, rest, user identity mapping, ldap
    
Ping Identity
Published By: IBM ILOG.     Published Date: Jul 14, 2009
This white paper explains how a business rule management system can make business process automation easier to understand, maintain and manage. Compare BRMS with other business automation schemes, like traditonal software coding or standard business rule engines. Learn how the Welsh Assembly Government and a United States commercial lender have implemented business rules to make a difference in their business processes.
Tags : 
ibm, bpm, business, business rule management, brms, hipaa, risk, operational cost, software coding, business rules engine, bre, business rule management system, brms, throughput, enterprise applications
    
IBM ILOG.
Published By: IBM ILOG.     Published Date: Oct 26, 2009
Find out how the role technologies such as Business Rule Management Systems (BRMS) and Optimization software will play in helping Healthcare organizations of all types and sizes build smarter processes that allow you to adapt to change faster, overcome process silos and improve patient care and safety.
Tags : 
ibm, ilog, healthcare, productivity, business rule management systems, brms, silos, optimization software, risk assesment, compliance risk
    
IBM ILOG.
Published By: Kaseya     Published Date: Mar 01, 2010
IDC research shows that standardized IT operations processes and workflows supported by automated, integrated tools consistently save time and money while improving service levels.
Tags : 
kaseya, automated, integrated it operations, productivity, system management software, automation, operations management
    
Kaseya
Published By: Kaseya     Published Date: Mar 01, 2010
This fact-filled white paper presents the top ten IT management pain points and the solutions for making your life easier.
Tags : 
kaseya, it system management, pain points, infrastructure, automation framework, management software, virtualization
    
Kaseya
Published By: Cornerstone OnDemand     Published Date: Apr 24, 2014
In the 2014 Workforce Talent and Workforce Management Outlook survey, Human Capital Media Advisory Group, the research arm of Workforce magazine, in partnership with Cornerstone OnDemand set out to discover where HR leaders are seeing their greatest successes and feeling the greatest pain. Additionally, we explored how HR leaders are setting priorities for the coming years. While there are surveys that address how the needs of HR vary, many focus on the difference between small and large organizations with the assumption that midsized organizations are similar enough to large organizations not to require extra focus. To get a different perspective, we looked specifically at how the HR function in midsized organizations compares to their much larger counterparts. Are they as similar as is popularly believed?
Tags : 
cornerstone ondemand, cornerstone, talent management software, performance management, recruiting software, connect, learning management software, learning software, lms, compensation management software, succession software, networking, human resource technology
    
Cornerstone OnDemand
Published By: Cornerstone OnDemand     Published Date: Apr 24, 2014
Everyone loves a good spreadsheet. But if you have more than a few hundred employees, tracking performance, training, and succession with them is the stuff of nightmares. Our clients shared their reasons for making the switch from spreadsheet to software. Which one tops your list?
Tags : 
cornerstone ondemand, cornerstone, talent management software, performance management, recruiting software, connect, learning management software, learning software, lms, compensation management software, succession software, networking, human resource technology
    
Cornerstone OnDemand
Published By: Cornerstone OnDemand     Published Date: Sep 12, 2016
It’s a fact: when companies employ newer talent management tools, they see reduced hiring times and higher retention rates. But what features, tool, and apps should you look for when shopping for a next-gen talent management system? Download “How to Conquer Your First Talent Management Purchase” and learn: • The fundamentals of talent management software (and why you need it!) • How to make the talent management business case to key business units • What to look for in a talent management software provider • Why a "unified" system drives tangible workforce growth Check out this brief on how to conquer your first talent management purchase today!
Tags : 
    
Cornerstone OnDemand
Published By: GoToMeeting     Published Date: Jun 09, 2010
This new Forrester white paper explores the evolution of project management and outlines steps for defining, hiring and developing your next-generation project managers.
Tags : 
citrix gotomeeting, project management, collaboration, software delivery, remote access, remote network management
    
GoToMeeting
Published By: Black Duck Software     Published Date: Dec 29, 2015
Addressing the constantly-morphing landscape of open source security threats might seem like a never-ending process, but we’ll help you get started in four easy steps.
Tags : 
black duck, open source, application security, security, compliance, appsec, software vulnerabilities, risk management, open source management, open source monitoring, oss, oss security, open source tools, open source software, open source scanning, enterprise applications
    
Black Duck Software
Published By: Black Duck Software     Published Date: Dec 29, 2015
Security teams understand that developers turn to open source to save time, cut costs, and promote innovation. But getting a handle on the security implications of open source use can be difficult. Learn how to identify security vulnerabilities and monitor your codebase for future security.
Tags : 
black duck, open source, application security, security, compliance, appsec, software vulnerabilities, risk management, open source management, open source monitoring, oss, oss security, open source tools, open source software, open source scanning, enterprise applications
    
Black Duck Software
Published By: Black Duck Software     Published Date: Dec 29, 2015
Many organizations think they have application security covered, but most security testing tools leave companies exposed. With over 4,000 open source vulnerabilities reported every year, make sure your company’s applications aren’t at risk!
Tags : 
black duck, open source, application security, security, compliance, appsec, software vulnerabilities, risk management, open source management, open source monitoring, oss, oss security, open source tools, open source software, open source scanning, enterprise applications
    
Black Duck Software
Published By: Black Duck Software     Published Date: Dec 29, 2015
Today, companies are more concerned than ever about software security threats. With some 95 percent of companies relying on open source software, its security is now a critical focus for CEOs, COOs, and boards of directors. Learn which security tools and methodologies are best suited for your organization's environment.
Tags : 
black duck, open source, application security, security, compliance, appsec, software vulnerabilities, risk management, open source management, open source monitoring, oss, oss security, open source tools, open source software, open source scanning, enterprise applications
    
Black Duck Software
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.