ngo

Results 201 - 225 of 349Sort Results By: Published Date | Title | Company Name
Published By: EMA Analyst Research     Published Date: Jun 03, 2016
Join Dennis Drogseth, VP of research at leading IT analyst firm, Enterprise Management Associates (EMA) and Hewlett Packard Enterprise (HPE) to get insights from recent EMA research on digital and IT transformation, as well as ongoing industry dialogs surrounding digital transformational initiatives. The webinar will focus on the need for a new, more business-aligned IT operational footprint in context with digital transformational needs.
Tags : 
    
EMA Analyst Research
Published By: IBM     Published Date: Feb 25, 2008
There is increasing concern that IT investment is approaching the point of diminishing marginal returns. This white paper highlights the costs of IT asset proliferation and the advantages of the IBM view of IT optimization as a strategic, ongoing process. It describes the holistic and practical IBM approach and shows how it is helping organizations realize greater initial savings and higher returns going forward.
Tags : 
roi, it spending, ibm, opt it, ibm opt it, network management, it management, return on investment
    
IBM
Published By: IBM     Published Date: Jun 24, 2009
This white paper outlines the advantages of WebSphere Portal for System z software and provides essential information to those considering adding Web-facing workloads on their mainframe hardware. Also, with these WebSphere Portal for System z options, IBM illustrates its ongoing commitment to mainframe computing and underscores the business value that remains inherent in the System z platform. Learn more today!
Tags : 
enterprise, web 2.0, ibm, system z, platform, mission critical applications, web facing, workloads
    
IBM
Published By: netForensics     Published Date: Jan 04, 2008
Securing Federal information and systems is an ongoing challenge. By implementing comprehensive security compliance management methods for data collection, retention, monitoring and reporting, federal agencies can successfully demonstrate a sound framework that meets FISMA requirements.
Tags : 
fisma, fisma compliance, information protection, data protection, monitoring, information management, regulations, regulatory compliance
    
netForensics
Published By: NetApp     Published Date: Aug 18, 2010
This paper discusses how consolidating your Microsoft SQL Server, Exchange, and SharePoint Server data along with your Windows files using NetApp storage for Windows environments reduces the cost of physical storage as well as ongoing management costs in Windows environments.
Tags : 
netapp, storage, windows environment, microsoft, consolidation, server data, unified storage, storage management
    
NetApp
Published By: Nuance     Published Date: Jul 11, 2011
By reading this document you will be able to assess the appropriate product requirements for your environment, determine acquisition costs, and understand what ongoing expenses you will bear after installing the product.
Tags : 
nuance, evaluating, scanning, scan, scanning solutions, prepurchase, digital copier, digital scanner
    
Nuance
Published By: IBM Software     Published Date: Feb 07, 2011
Learn how midsize companies can rapidly adopt Business Intelligence (BI) and Performance Management (PM) technologies while minimizing training, support and ongoing costs in this research note from Nucleus Research.
Tags : 
ibm cognos express, midsize companies, business intelligence, performance management, nucleus research, application performance management, business management
    
IBM Software
Published By: IBM Software     Published Date: Jan 25, 2012
Learn how midsize companies can rapidly adopt Business Intelligence (BI) and Performance Management (PM) technologies while minimizing training, support and ongoing costs in this research note from Nucleus Research.
Tags : 
ibm, congnos, nucleus research, business intelligence, technology, performance management, analytical applications, data quality
    
IBM Software
Published By: Lumension     Published Date: Jan 22, 2013
With ongoing compliance and evolving attacks against vulnerable endpoint devices, getting a handle on managing endpoints becomes more important.
Tags : 
endpoint management, security, compliance, patch management, file integrity monitoring, device control, access control, anti virus
    
Lumension
Published By: StrikeIron     Published Date: Aug 01, 2013
For internal and external applications, Web APIs provide flexibility and unlock the value of your data and software. However, ongoing API development, deployment and delivery require extensive domain knowledge in operating an enterprise-class infrastructure. Without this expertise, scalability, reliability, and security are compromised.
Tags : 
cloud computing, colocation and web hosting, web service security, soap web development, web services, web service security, xml, mobile computing
    
StrikeIron
Published By: IBM     Published Date: Oct 24, 2012
If you met a valued customer face to face, you'd probably greet the person with a smile and a "hello." You'd want the communication and ongoing discussion to be personal and specific to the individual. Deliver -- Learn to connect with your users.
Tags : 
ibm, analytics, consumer behavior, consumer interaction, communication, email marketing
    
IBM
Published By: IBM     Published Date: Nov 14, 2012
No matter what your business sells, where it operates or who its customers are, its ongoing success might ultimately depend on the answers to three simple questions. Read on to learn how these questions may help business success.
Tags : 
transaction integrity, integral business success, ibm, it systems, data management, data center
    
IBM
Published By: SAP     Published Date: Jul 17, 2012
Relational database management systems (RDBMSs) are systems of software that manage databases as structured sets of tables containing rows and columns with references to one another through key values. They include the ability to optimize storage, process transactions, perform queries, and preserve the integrity of data structures. When used with applications, they provide the beating heart of the collection of business functions supported by those applications. They vary considerably in terms of the factors that impact the total cost of running a database application, yet users seldom perform a disciplined procedure to calculate such costs. Most users choose instead to remain with a single vendor's RDBMS and never visit the question of ongoing hardware, software, and staffing fees.
Tags : 
sap, infrastructure, database, data management, white paper, management, storage, business functions
    
SAP
Published By: Enterprise Mobile     Published Date: Jul 14, 2014
Mobile devices are smallmany of them fit right into the palm of the handso why is handling a successful mobile infrastructure such a big hassle? The right provider can help with everything from planning and strategy to ongoing support and analytics. But how do you find the right provider? Our Mobility Services RFP template will guide you through the process.
Tags : 
managed mobility services, mobility-as-a service, enterprise mobile, mobility, enterprise mobility, mobile strategy, mobile management, device management
    
Enterprise Mobile
Published By: Percussion     Published Date: Jun 11, 2013
This paper will explore how WCMS buyers can assess the costs associated to buy, customize and maintain prospective solutions. We will examine the five key areas of cost: User Adoption, Initial Implementation, Upgrades and Ongoing Re-implementation, Maintenance and Support Cost and Application Integration
Tags : 
cms, cms best practices, cms software, content marketing, content marketing platform, digital content management, content marketing platform, wcms
    
Percussion
Published By: Cyveillance     Published Date: Apr 06, 2015
In this white paper, we examine notable trends and events in physical security from 2014 and assess what security professionals should expect in 2015. 2014 was truly an unpredictable year in the physical security and executive protection worlds, as large scale events targeted for disruption were executed relatively smoothly, while unforeseen developments in Ukraine and the Ebola outbreak caught many off guard. Looking ahead to 2015, we predict that local issues will continue to gain global importance, threat actors and activists will find new ways to utilize social media to spread their messages, and the lines between physical and digital threats will continue to converge. We also highlight ongoing developments in France, Mexico, Ukraine, and Germany.
Tags : 
information security threat, information security, protection, security breach, internet security, networking, security
    
Cyveillance
Published By: Enterprise Mobile     Published Date: Dec 04, 2014
Mobile devices are smallmany of them fit right into the palm of the handso why is handling a successful mobile infrastructure such a big hassle? The right provider can help with everything from planning and strategy to ongoing support and analytics. But how do you find the right provider? Our Mobility Services RFP template will guide you through the process.
Tags : 
managed mobility services, mobility-as-a service, enterprise mobile, mobility, enterprise mobility, mobile strategy, mobile management, device management
    
Enterprise Mobile
Published By: LogRhythm     Published Date: Apr 04, 2017
The value of peer input cannot be overstated. Authored by leading Chief Information Security Officers, CISOs Investigate is an ongoing series that offers first-hand insights to security leaders as they make business-driven technology decisions.
Tags : 
    
LogRhythm
Published By: Avaya     Published Date: Jan 04, 2017
To succeed in a tough marketplace, small businesses must be accessible, without significant interruption, even in the most adverse situations. This kind of ongoing accessibility is an important aspect of business continuity - a critical success strategy that doesn't just happen, but requires proactive planning. Although there are several aspects to a business continuity plan, a major component of any plan should be the SME's communications capabilities, not just its equipment or data. This paper will explore how different kinds of interruptions can adversely affect an SME's business continuity and illustrate how, through advanced features such as resiliency and mobility, Avaya's IP Office can help SMEs overcome interruptions and maintain business continuity.
Tags : 
avaya, communications, avaya ip office, unified communications, contact center, collaboration, midsize business solutions
    
Avaya
Published By: Epson     Published Date: Jun 22, 2018
Despite the digitization of business today, most organizations continue to rely on paper hard copies to get the job done. A great deal of printed information drives the fundamental workflow and success of nearly any business, especially in highimpact, high-touch areas like Marketing and Sales; Planning, Engineering and Design; and Human Resources. As a result, companies continue to look for ways to manage the ongoing cost, workflow and efficiency of using printed documents.
Tags : 
    
Epson
Published By: Avaya     Published Date: Nov 27, 2017
With Avaya, you have a complete, across-the-board solution that brings it all together. From telephony and video to mobility and contact center applications, to networking, security, and ongoing services, Avaya IP Office will help give your business a competitive edge. Let you do more, with less. Drive profitable growth, without driving up costs. Perform better now and in the future.
Tags : 
    
Avaya
Published By: NodeSource     Published Date: Nov 10, 2017
Digital transformation is the use of technology to radically improve performance or (business) reach. But for digital-native businesses that have never needed to make that shift e-commerce, social media, web-based services it involves a sharpening of that focus combined with an ongoing evolution of process and infrastructure.
Tags : 
nodesource, xml, software development, digital transformation, open source, web applications, web development, java
    
NodeSource
Published By: ThousandEyes     Published Date: Jan 14, 2018
ThousandEyes highlights the impact of an ongoing DDoS attack, provides visibility into the effectiveness of the mitigation and provides insight into the strategies of DDoS mitigation vendors.
Tags : 
thousandeyes, ddos, migration, network migration, network security, wireless security, data protection, secure content management
    
ThousandEyes
Published By: Rapid7     Published Date: May 22, 2012
The ongoing struggle to prevent hackers from breaching assets and malware from gaining a foothold requires a vulnerability management strategy that begins with a comprehensive measurement of security risk. Organizations must examine the entire IT stack, including the operating system, network, applications, and databases. These new technologies include dynamic, virtualized environments and services outside traditional physical IT infrastructures, such as virtualized, cloud-based services and social networking.
Tags : 
security, risk management, security intelligence, security assessment, prevent data breach, cyber security, vulnerability management, penetration testing
    
Rapid7
Published By: Skillsoft     Published Date: Mar 03, 2015
Learn how to manage and overcome ongoing difficulties in this informative webinar with Sandra Crowe, titled "I Didn't Sign Up for This! 7 Strategies for Dealing with Difficulty in Difficult Times."
Tags : 
skillsoft, leadership, development, programs, processes, business management, business issues and trends, human resources management
    
Skillsoft
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.