level

Results 226 - 250 of 1791Sort Results By: Published Date | Title | Company Name
Published By: Quest Software     Published Date: Apr 19, 2012
In this Quest white paper, discover best practices for a successful post-migration operation. See why you MUST have the same level of post-migration planning that you had for pre-migration, and learn four key aspects of post-migration management.
Tags : 
scriptlogic, quest, desktop authority, best practices, post-migration, operation, pre-migration, security
    
Quest Software
Published By: Frontrange     Published Date: Mar 13, 2013
Recent new technology introductions are fundamentally changing the way we utilize and manage IT resources. This whitepaper shows how these new processes and automation solutions deliver the agility and extensibility to maintain performance and relia
Tags : 
it service management, itsm, service desk, service catalog, service management software, mobile service management, cloud itsm, service manager
    
Frontrange
Published By: Oracle Corp     Published Date: Sep 18, 2013
Confused about how to get started with social customer service or how to take it to the next level? Oracle can help you address the challenges of this rapidly evolving service channel - and help you deliver social customer service that delights your customers. Join our webcast featuring Aphrodite Brinsmead, senior analyst at Ovum, and learn her best practices for social customer service.
Tags : 
social media, customer service, customer experience management
    
Oracle Corp
Published By: CA Mainframe     Published Date: Sep 12, 2008
Increased regulatory scrutiny on the protection levels afforded sensitive information by those that transact and process it is causing enterprises to improve mainframe security strategies. This entails proactively investigating exposures and implementing appropriate policies, processes and technologies, including those for data z/OS tape encryption. Read this Technology Brief created by CA to learn how to identify exposure points and through the use of Tape Encryption.
Tags : 
tape library, tape backup, tape encryption, backup, encryption, best practices, ca mainframe, mainframe
    
CA Mainframe
Published By: Cisco     Published Date: Oct 08, 2015
This document consolidates the enterprise campus network design and deployment guidelines with various best practices from multiple deeply focused Cisco Validated Design Guides. The best practices conclusions are derived from thorough solution-level end-to-end characterization of various levels of system types, network design alternatives, and enterprise applications.
Tags : 
cisco infrastructure, enterprise network, network design, infrastructure, migration, network architecture, network management, network performance
    
Cisco
Published By: Juniper Networks     Published Date: Jun 29, 2017
Whilst the FSI sector races to implement cutting-edge technologies such as AI, blockchain and automation, there are no mutually agreed upon set of best practices to implement these technologies. As a result, organisations are using their own blend of strategic initiatives and company culture to drive innovation, with varying levels of success. To help, this article features advice from five of the leading experts in the FSI and technology sector today. Several of the most visible tactics to kick-start innovation in FSI organisations include launching innovation or incubation centres, launching hackathons, partnering with or acquiring start-ups, venture investment or simply trying to develop solutions in house. Whilst each of these approaches has potential, there is a risk that organisations fall into the trap of innovation theatre, in other words, failing to effectively integrate cutting edge technology into key business functions.
Tags : 
business resources, enterprise headcounts, individual roles, organizational charts, corporate initiatives, management principles, department optimization
    
Juniper Networks
Published By: Juniper Networks     Published Date: Aug 10, 2017
Whilst the FSI sector races to implement cutting-edge technologies such as AI, blockchain and automation, there are no mutually agreed upon set of best practices to implement these technologies. As a result, organisations are using their own blend of strategic initiatives and company culture to drive innovation, with varying levels of success. To help, this article features advice from five of the leading experts in the FSI and technology sector today.
Tags : 
technology efficiency, market dynamics, data privacy, data security, device management, platform management, enterprise management
    
Juniper Networks
Published By: Bulldog Solutions     Published Date: May 20, 2013
This executive overview focuses on one of these drivers--program effectiveness--defined by leading marketers as programs that drive a high level of conversion and prospect engagement throughout the buyer's journey. in this executive overview, we'll take a look at the current buyer landscape, and then at five five best practice areas that need to be optimized in order for your programs to reach their full potential.
Tags : 
program effectiveness, b2b, b2b buyers, message alignment, buyer insights, audience acquisition, performance monitoring, campaign
    
Bulldog Solutions
Published By: Liaison Technologies     Published Date: Jun 03, 2011
This white paper describes best practices in encryption, key management and tokenization and how an integrated, multi-level solution can effectively meet these best practices.
Tags : 
liaison, nubridges, data protection, encryption, key management, tokenization, data security, audit trails
    
Liaison Technologies
Published By: IBM     Published Date: Feb 25, 2008
IBM HACMP supports a wide variety of configurations, and provides the cluster administrator with a great deal of flexibility. With this flexibility comes the responsibility to make wise choices. This paper discusses the choices that the cluster designer can make, and about the alternatives that make for the highest level of availability.
Tags : 
high availability, backup, recovery, utility computing, network management, ibm, backup and recovery
    
IBM
Published By: SAP     Published Date: Nov 17, 2016
Employee engagement levels have been dropping for several years, and today they hover near all-time lows. This decline must be halted and reversed because at the end of the day, business success comes down to a human equation. Companies cant grow and thrive without the passion, innovation, and productivity their people bring to the business. Here are five practical, forward-looking steps you can take now, together with guidance on how you can use SAP SuccessFactors solutions to increase employee engagement.
Tags : 
sap, human resources, employee engagement, productivity
    
SAP
Published By: IBM Software     Published Date: Jan 25, 2012
Business analytics is the means by which organizations optimize business outcomes. Using insights that can be accessed, shared and acted on by employees at every level, organizations can increase profits, reduce costs, manage risk and make more accurate predictions to prepare for future outcomes. Learn why analytics-driven organizations outperform their peers.
Tags : 
ibm, cognos, business intelligence, technology, analytics, business analytics, application integration, analytical applications
    
IBM Software
Published By: Cisco     Published Date: Jul 08, 2016
Modern networks and their components are constantly evolving and traditional next-generation firewalls are not able to provide the level of protection organizations require. In this paper you will learn: Why typical next-generation firewalls that focus primarily on application visibility and control offer an incomplete approach to threat defense What organizations need to defeat advanced threats in a resource-constrained environment What benefits you can gain with the Cisco Firepower Next-Generation Firewall (NGFW), the industrys first fully integrated, threat-focused NGFW
Tags : 
    
Cisco
Published By: Aveksa     Published Date: Dec 07, 2007
Every large enterprise has employees who need some level of access to its critical information resources, and many also provide a wide variety of types and levels of access to contractors, partners, vendors, and customers. Each of these points of access represents a source of potential business and compliance risk.
Tags : 
access control, access certification, compliant, certification, rules, compliance, governance, risk management
    
Aveksa
Published By: Oracle Corporation     Published Date: May 11, 2012
This white paper describes how to build a better business case for BI, by understanding the level of ambition organizations can have and the layers in the business case that should contribute to that level of ambition.
Tags : 
oracle, busines intelligence, business intelligence applications, bi applications, bi apps, 11g, cross-value, decision
    
Oracle Corporation
Published By: IBM     Published Date: Apr 18, 2017
Apache Hadoop technology is transforming the economics and dynamics of big data initiatives by supporting new processes and architectures that can help cut costs, increase revenue and create competitive advantage. An effective big data integration solution delivers simplicity, speed, scalability, functionality and governance to produce consumable data. To cut through this misinformation and develop an adoption plan for your Hadoop big data project, you must follow a best practices approach that takes into account emerging technologies, scalability requirements, and current resources and skill levels.
Tags : 
data integration, data security, data optimization, data virtualization, database security, data migration, data assets, data delivery
    
IBM
Published By: FICO     Published Date: Jun 07, 2016
As any line of business (LOB) leader knows, making customer level decisions that balance risk and profit just keeps getting harder. And even when you think you have the right decisions, turning them into actions can be even trickier. You also need to consider the factors that make smart decisions difficult. Big data. Regulations. Customers who want an offer, fast, or else youre going to lose them.
Tags : 
    
FICO
Published By: FICO     Published Date: Jun 07, 2016
As any line of business (LOB) leader knows, making customer level decisions that balance risk and profit just keeps getting harder. And even when you think you have the right decisions, turning them into actions can be even trickier. You also need to consider the factors that make smart decisions difficult. Big data. Regulations. Customers who want an offer, fast, or else youre going to lose them.
Tags : 
    
FICO
Published By: Collaborative Consulting     Published Date: Dec 20, 2013
The explosion of Big Data represents an opportunity to leverage trending attitudes in the marketplace to better segment and target customers, and enhance products and promotions. Success requires establishing a common business rationale for harnessing social media and determining a maturity model for sentiment analysis to assess existing social media capabilities.
Tags : 
collaborative consulting, big data, social media, customer sentiment, influence sentiment, govern sentiment, maturity model, generate revenue
    
Collaborative Consulting
Published By: Rosetta Stone     Published Date: Mar 22, 2012
MarketBridge, a leading global provider of sales and marketing services, surveyed 493 senior and upper management-level business professionals in a variety of functional roles at leading international corporations to learn more about their company's language-learning needs. Please download this free white paper for more information.
Tags : 
bilingual, human resources, rosetta stone, global human resources, business research
    
Rosetta Stone
Published By: Bloomberg     Published Date: Dec 14, 2010
An open symbology framework for financial instrument identifiers can automate and accelerate transaction processes while driving out costs and introducing higher levels of transparency for effective risk management. Bloomberg explores open symbology in the securities industry. *Whitepaper content is specific to Financial Industry Executives*.
Tags : 
bloomberg, open symbology, market identifiers, financial instruments, analytics
    
Bloomberg
Published By: Bloomberg     Published Date: Nov 29, 2010
An open symbology framework for financial instrument identifiers can automate and accelerate transaction processes while driving out costs and introducing higher levels of transparency for effective risk management. Bloomberg explores open symbology in the securities industry. *Whitepaper content is specific to Financial Industry Executives*.
Tags : 
bloomberg, open symbology, market identifiers, financial instruments, analytics, business intelligence
    
Bloomberg
Published By: Reltio     Published Date: Nov 20, 2018
Modern Master Data Management (MDM) is more than an extension of your data governance strategy. See how Reltio is taking MDM to the next level with its data platforms in AWS and Google Cloud.
Tags : 
    
Reltio
Published By: Blue Medora     Published Date: Oct 24, 2016
Download this report to learn more about Blue Medora's new SELECTStar platform which provides new levels of visibility into the data tier that multiple tools can utilize.
Tags : 
blue medora, selectstar, data tier, database virtualization, data tier management, vmware, virtual monitoring consoles, data layer platform
    
Blue Medora
Published By: Pentaho     Published Date: Jan 16, 2015
If youre considering a big data project, this whitepaper provides an overview of current common use cases for big data, from entry-level to more complex. Youll get an in-depth look at some of the most common, including data warehouse optimization, streamlined data refinery, monetizing your data, and getting a 360 degree view of your customer. For each, youll discover why companies are investing in them, what the projects look like, and key project considerations, including tools and platforms.
Tags : 
big data, nosql, hadoop, data integration, data delivery, data management, data center
    
Pentaho
Start   Previous    3 4 5 6 7 8 9 10 11 12 13 14 15 16 17    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.