model management

Results 101 - 125 of 156Sort Results By: Published Date | Title | Company Name
Published By: SAP     Published Date: Jul 17, 2012
Our Business Model is uniquely focused on generating business value, while our innovative service offerings help you put new ideas to work quickly. We use our knowledge and experience to deliver value and help your business run better to give you direct access to the experts and problem solvers that are best equipped to meet your needs by providing a comprehensive approach to quality improvement and risk reduction.
Tags : 
sap, services, value, innovation, business model, mobile computing, it service management, infrastructure management
    
SAP
Published By: VMTurbo     Published Date: Apr 11, 2013
This whitepaper describes VMTurbo’s supply chain economy approach, which uniquely addresses these requirements. VMTurbo combines monitoring, analytics and actions to enable proactive virtualization management. VMTurbo’s Observe Advise Automate model delivers intelligent and holistic visibility, analytics and automation.
Tags : 
economic, management, operations, virtualization, vmturbo, analytics
    
VMTurbo
Published By: VMTurbo     Published Date: Feb 11, 2014
VMTurbo’s Observe-­-Advise-­-Automate model delivers intelligent and holistic visibility, analytics and automation.
Tags : 
vmturbo, virtualization, virtualizing business, business-critical, business applications, controlling interference, consolidation, virtual currency
    
VMTurbo
Published By: VMTurbo     Published Date: Mar 25, 2015
Virtualization 1.0 vs. Virtualization 2.0: Where Are You? Virtualization 1.0 is marked by the ability to virtualize, monitor, and react to problems across the environment as they occur. Ever cognizant of the performance limitations that typify higher workload densities, Virtualization 1.0 hesitates to virtualize the critical applications that would be most beneficial. Virtualization 1.0 is limited by the inherent complexities of virtualization. Virtualization 2.0 is marked by complete, proactive control over the virtual environment. Virtualization 2.0 virtualizes up to 100% of its applications, guided by an intelligent abstraction that continually drives the environment to its desired state. Virtualization 2.0 is the promise of virtualization brought to fruition.
Tags : 
vmturbo, virtualization, it economic model, virtual environment, it management solutions, it management, knowledge management, enterprise applications
    
VMTurbo
Published By: HP     Published Date: Oct 01, 2014
Cloud computing is a model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications, and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction. At the time this definition was published, “cloud” was already part of industry parlance, and was beginning to take root in the general lexicon. Additionally, global business spending for infrastructure and services related to the cloud had topped $78 billion. This year, enterprise spending on the cloud will reach an estimated $174 billion, and is expected to climb to $235 billion by 2017.2 Inevitably, as both business IT and consumer mindsets evolve toward the cloud in coming years, we will continue to witness dramatic growth in IT products in some areas, and significant reductions in other areas—resulting in a reshaping of the industry as a whole.
Tags : 
cloud, computing, on-demand, management, interaction, network, access, configurable
    
HP
Published By: ARMA     Published Date: Nov 04, 2014
The relationship between an organization's information-handling practices and the impact those practices have on its ability to respond to electronic discovery is recognized in the Electronic Discovery Reference Model (EDRM). But the EDRM falls short of describing standards or best practices that can be applied to the complex issues surrounding the creation, management, and governance of electronic information. ARMA International's Generally Accepted Record-keeping Principles and its information Governance Maturity Model are designed specifically to provide a scalable, broadly applicable framework to address these issues.
Tags : 
information-handling practices, edrm, electronic discovery, maturity model, it management, knowledge management, data management, best practices
    
ARMA
Published By: Workterra     Published Date: Jan 27, 2016
In a world of increasingly complex financial models, ever-more confusing regulatory demands, and a multi-generational, highly mobile workforce, the future of human capital management (HCM) is wide open.
Tags : 
workterra, hcm, regulation, mobile workforce, enterprise applications, human resource technology
    
Workterra
Published By: Red Hat     Published Date: Nov 08, 2017
Accelerated digital transformation places new demands on business. To stay competitive, organizations must quickly adapt their business models and processes. Business process management (BPM), business rules management (BRM), and mobile applications are increasingly important to many business transactions—from customer-facing to business-to-employee (B2E) and business-to-business (B2B) interactions.
Tags : 
digital transformation, business process management, business rules management, mobile applications, application programming interfaces
    
Red Hat
Published By: Aberdeen Group     Published Date: Aug 16, 2011
The purpose of this report is to provide guidance on how best to streamline sales and use tax management.
Tags : 
aberdeen, minimizing audit exposure, pace model, tax management practices, best practices, business management, corporate governance, return on investment
    
Aberdeen Group
Published By: Sitecore     Published Date: Feb 04, 2015
This detailed Forrester Wave Model assesses the vendors of Web Content management (WCM) and discovers their focus on marketing scenarios, mobile device support and cloud deployment story.
Tags : 
wcm, mobile, marketing, cloud
    
Sitecore
Published By: Lumension     Published Date: Feb 07, 2014
Java vulnerabilities have dominated the security headlines. Some observers now say organizations should simply turn off the ubiquitous software platform. But what if there were a better way?
Tags : 
lumension, java vulnerabilities, unpatched vulnerabilities, blacklist order, third-party software, endpoint devices, data-security solutions, web content
    
Lumension
Published By: Lumension     Published Date: Jun 03, 2015
The volume and sophistication of malware is skyrocketing, and traditional anti-virus approaches are struggling to keep up. It’s time to rethink how we protect our endpoints. Instead of trying to build a better anti-virus “mousetrap,” without any shift in the underlying management model for vetting change in endpoint environments, security professionals should investigate more innovative approaches to endpoint security that can automate trusted change policies. This paper discusses an innovative approach to application whitelisting – one that integrates application control, anti-virus, patch management and a trusted change management engine into one unified solution – to improve endpoint security and provide the necessary flexibility to optimize IT operations and user productivity.
Tags : 
anti-virus, security, application, management, patch, anti virus, application security, patch management
    
Lumension
Published By: Aerohive Networks     Published Date: May 27, 2014
Learn how a controller-less wireless architecture will provide significant benefits over the traditional-controller-based model in terms of deployment simplicity, ongoing management, and cost..
Tags : 
aerohive, wi-fi, wlan, wireless lan, 802.11ac, gigabit speed wi-fi, cloud, byod
    
Aerohive Networks
Published By: Lumension     Published Date: Jun 05, 2015
The volume and sophistication of malware is skyrocketing, and traditional anti-virus approaches are struggling to keep up. It’s time to rethink how we protect our endpoints. Instead of trying to build a better anti-virus “mousetrap,” without any shift in the underlying management model for vetting change in endpoint environments, security professionals should investigate more innovative approaches to endpoint security that can automate trusted change policies. This paper discusses an innovative approach to application whitelisting – one that integrates application control, anti-virus, patch management and a trusted change management engine into one unified solution – to improve endpoint security and provide the necessary flexibility to optimize IT operations and user productivity.
Tags : 
anti-virus, security, application, management, patch, anti virus, application security, patch management
    
Lumension
Published By: Clarizen     Published Date: Sep 23, 2015
Read how Clarizen enabled Equifax's Creative Services Leader Dorian Usherwood to implement a new, flexible staffing model within the creative services function, so that all team members could connect, communicate and collaborate, including: agencies of record, internal art and video directors, creative services leaders, production management, and freelancers.
Tags : 
equifax, clarizen, project management, project management tools, productivity, employee performance
    
Clarizen
Published By: VMware AirWatch     Published Date: Dec 08, 2016
This white paper illustrates several real-world implementations and day-to-day experiences that demonstrate how IT organizations are embracing a user-centric model for improved management benefits to achieve key performance and business results and stay competitive.
Tags : 
    
VMware AirWatch
Published By: IBM     Published Date: Aug 22, 2014
Learn how an integrated modeling approach to regulatory stress-testing can help banks improve their overall risk management.
Tags : 
stress-testing, risk analytics, risk management, intergrated modeling approach
    
IBM
Published By: IBM     Published Date: Jan 20, 2015
Deploying a flexible, user-friendly framework for cloud-based risk modeling across multiple asset classes.
Tags : 
risk analytics, cloud-based risk modeling, asset classes, asset management, portfolio management, security, it management, knowledge management
    
IBM
Published By: Vindicia     Published Date: Jun 17, 2014
Many digital offerings are sold on a subscription and recurring basis. Bring Digital Goods and Subscribers Together - this eBook gives you nine essentials for acquiring subscription and recurring revenue customers.
Tags : 
subscription revenue billing, subscription payments, subscription model best practices, subscription billing solutions, subscription billing software, subscription billing platform, subscription billing company, subscription billing business models
    
Vindicia
Published By: Vindicia     Published Date: Jun 17, 2014
The eBook ‘Digital Age / Digital Goods’ provides information on the various components you’ll want to address while you test an acquisition mix best suited for your organization, and your target audience.
Tags : 
subscription revenue billing, subscription payments, subscription model best practices, subscription billing solutions, subscription billing software, subscription billing platform, subscription billing company, subscription billing business models
    
Vindicia
Published By: SAS     Published Date: Mar 06, 2018
The most recent decade has seen rapid advances in connectivity, mobility, analytics, scalability, and data, spawning what has been called the fourth industrial revolution, or Industry 4.0. This fourth industrial revolution has digitalized operations and resulted in transformations in manufacturing efficiency, supply chain performance, product innovation, and in some cases enabled entirely new business models. This transformation should be top of mind for quality leaders, as quality improvement and monitoring are among the top use cases for Industry 4.0. Quality 4.0 is closely aligning quality management with Industry 4.0 to enable enterprise efficiencies, performance, innovation and business models. However, much of the market isn’t focusing on Quality 4.0, since many quality teams are still trying to solve yesterday’s problems: inefficiency caused by fragmented systems, manual metrics calculations, quality teams independently performing quality work with minimal cross-functional own
Tags : 
    
SAS
Published By: Rackspace     Published Date: Jan 19, 2016
In recent years, the term “cloud” has appeared seemingly everywhere. But it’s become difficult to understand what precisely someone means when they say “cloud.” The National Institute of Standards and Technology defines cloud computing as a “model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources (e.g. networks, servers, storage, applications and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction.”
Tags : 
rackspace, cloud, application, software development, security
    
Rackspace
Published By: Tripwire     Published Date: Jul 13, 2007
In this whitepaper, you will learn how configuration audit and control can be used effectively to ensure system management productivity, and help reduce costs and sustain configuration viability within the bounds of operational, security and regulatory standards.
Tags : 
change management models, auditing, configuration management, security, change management, network security, efficiency, productivity
    
Tripwire
Published By: IBM     Published Date: Feb 11, 2015
Securely connect people, applications and devices to cloud environments. While organizations build their cloud environment by choosing from multiple service delivery models – Infrastructure as a Service (IaaS), Platform as a Service (PaaS) and Software as a Service (SaaS) – the security needs for each of the delivery models is different. Read this whitepaper to learn more about how: · Threat-aware identity and access management can strengthen security in each of the cloud delivery models · Self-service IAM solution can provide higher level of Security in Cloud as compared to on-premise
Tags : 
cloud environment, iaas, paas, saas, access management, security, it management, data protection
    
IBM
Published By: IBM     Published Date: Jul 22, 2016
IBM B2B Cloud Services comprise a comprehensive set of cloud-based B2B integration features and capabilities, which can be delivered on demand, as fully managed services, or under a hybrid management model. With IBM B2B Cloud Services, enterprises can meet a range of trading partner onboarding and management requirements, as well as improving reliability and performance of and control over multi-enterprise process automations.
Tags : 
ibm, commerce, swot assessment, ibm b2b cloud services, cloud, b2b, b2b integration, knowledge management
    
IBM
Start   Previous    1 2 3 4 5 6 7    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.