operational management

Results 1 - 25 of 170Sort Results By: Published Date | Title | Company Name
Published By: Group M_IBM Q4'19     Published Date: Oct 01, 2019
Watch a demo to see how IBM Maximo can help maximize uptime, boost operational performance and accelerate transformation in your enterprise asset management practices.
Tags : 
    
Group M_IBM Q4'19
Published By: Group M_IBM Q4'19     Published Date: Oct 16, 2019
Watch a demo to see how IBM Maximo can help maximize uptime, boost operational performance and accelerate transformation in your enterprise asset management practices.
Tags : 
    
Group M_IBM Q4'19
Published By: Virtela Communications, Inc.     Published Date: Oct 12, 2011
Multinational companies (MNCs) are facing a unique combination of escalating customer, competitive and operational pressures which are forcing them to fundamentally change the way they do business and manage their IT infrastructures supporting network, security and mobility needs. Lack of IT resources, limited capex and more complex global implementations are driving an increasing proportion of MNCs to offload, or 'out-task', various aspects of their day-to-day management responsibilities to skilled third-parties that can help perform these functions well.
Tags : 
health, global management service, cloud services, technology
    
Virtela Communications, Inc.
Published By: Viavi Solutions     Published Date: Feb 19, 2019
Network performance management tools can drive operational efficiency and improve network uptime, but many network managers havent adopted such tools. The potential benefits of a performance management tool are substantial, but network managers must make a business case for such investment. This white paper reveals why network operations teams should invest in network performance management solutions, and how they can justify to IT management and CIOs that the tool will deliver a substantial return on investment, along with improving ITs ability to support business goals.
Tags : 
    
Viavi Solutions
Published By: VMware     Published Date: Feb 24, 2017
The pace of business is faster than ever before. Due to the rapid adoption of cloud and mobile computing, driven by consumerization, operational needs, and security requirements, ESG believes that Identity and Access Management (IAM) is undergoing a profound transition. Download this ESG whitepaper to learn why organizations should combine Identity and Access Management (IAM) and Enterprise Mobility Management (EMM) solutions to adapt to the influx of workforce mobility without interfering with user experience or compromising security.
Tags : 
    
VMware
Published By: Dell EMC     Published Date: Nov 04, 2016
According to recent ESG research, 70% of IT respondents indicated they plan to invest in HCI over the next 24 months. IT planners are increasingly turning toward HyperConverged Infrastructure (HCI) solutions to simplify and speed up infrastructure deployments, ease day-to-day operational management, reduce costs, and increase IT speed and agility. HCI consists of a nodal-based architecture whereby all the required virtualized compute, storage, and networking assets are self-contained inside individual nodes. These nodes are, in effect, discrete virtualized computing resources in a box. However, they are typically grouped together to provide resiliency, high performance, and flexible resource pooling. And since HCI appliances can scale out to large configurations over time, these systems can provide businesses with investment protection and a simpler, more agile, and cost-effective way to deploy virtualized computing infrastructure. Read this paper to learn more.
Tags : 
data, software-defined, hyper-convergence, hdd, sddc, storage management, data warehousing
    
Dell EMC
Published By: Dell EMC     Published Date: Oct 08, 2015
Download this whitepaper to learn more about how to capture, analyze and manage a tidal wave of structured and unstructured data, turn this data into operational intelligence, And how to overcome the limitations of databases and data management tools that werent designed for a world of big data with Dell.
Tags : 
    
Dell EMC
Published By: ExtraHop     Published Date: Apr 03, 2013
The ExtraHop Discovery Edition is a free virtual appliance will help you to discover the performance of your applications across the network, web, VDI, database, and storage tiers. Get yours today!
Tags : 
it operational intelligence, application performance management, application performance monitoring, application monitoring, network performance management, network performance monitoring, network monitoring, infrastructure performance monitoring, network monitoring, infrastructure performance monitoring, infrastructure monitoring, business transaction management, end-user experience monitoring, end-user monitoring, real-user monitoring, operations analytics, cloud performance monitoring, web performance monitoring, database performance monitoring, citrix performance monitoring
    
ExtraHop
Published By: Canon Business Process Services     Published Date: Aug 27, 2013
Be confident that you are measurably improving operational efficiency and reducing costs for your business by initiating a best-practices document performance management system with proven methodologies and tools
Tags : 
records management, records management compliance, records retention, records retention schedule, electronic documents, electronic records management, document imaging, document and print management, document management services, managed print services, document processing center, document workflows, business management, business imaging, knowledge management, enterprise applications
    
Canon Business Process Services
Published By: CA Technologies     Published Date: Apr 06, 2017
Privileged credentials have served as a major attack vector in the successful execution of many breaches. Protecting privileged access is an imperative to successfully defend an organization from a breach and is a core requirement of multiple compliance regimes. CA Privileged Access Management helps drive IT security and compliance risk reduction and improves operational efficiency by enabling privileged access defense in depthproviding broad and consistent protection of sensitive administrative credentials, management of privileged identity access and control of administrator activity.
Tags : 
it security, security breach, it infrastructure, cyber crime, risk management, password management, incident response, audits, user authentication
    
CA Technologies
Published By: IBM     Published Date: Feb 23, 2012
Built on IBM's market-leading business rules management system and enhanced with capabilities for detecting time-based events, this offering drives more responsive actions to business opportunities or risk conditions, increasing the value of each customer, partner and internal interaction.
Tags : 
ibm, technology, information technology, it management, data management, data center, analytical applications, business intelligence, configuration management, data protection, secure content management, project management
    
IBM
Published By: Microsoft     Published Date: Oct 06, 2017
After rapid expansion of vendors and features, players in the operational DBMS market continue converging toward feature parity. Data and analytics leaders will be interested in the lack of Visionaries, competition in the Challengers quadrant and the maturing cloud capabilities among these vendors.
Tags : 
data management, data system, business development, software integration, resource planning, enterprise management, data collection
    
Microsoft
Published By: Schneider Electric     Published Date: Jun 03, 2019
Industrial process safety management has evolved beyond simple functional safety. Some companies are at risk because management and business process aspects are not integrated into the overall safety plan. Such gaps can impact both operational integrity and profitable performance. Explore the change drivers affecting plant process safety management and learn how operators can find, measure, and manage gaps to maintain safe conditions and improve profitability. Download the white paper to learn more.
Tags : 
smart control, empowered operators, optimized assets, future of automation, reliability, safety, cybersecurity, operational profitability, ecostruxure plant, process automation, profitable safety, defence in depth, industrial automation, process control, process systems, safety instrumented systems
    
Schneider Electric
Published By: CA Technologies     Published Date: Aug 21, 2017
To manage IT like a business, you need tools to proactively ensure IT service reliability while simultaneously boosting operational agility. This requires a new approach to IT infrastructure management, including the selection of an infrastructure management vendor that can meet modern IT and business requirements.
Tags : 
    
CA Technologies
Published By: CA Technologies     Published Date: Aug 21, 2017
To manage IT like a business, you need tools to proactively ensure IT service reliability while simultaneously boosting operational agility. This requires a new approach to IT infrastructure management, including the selection of an infrastructure management vendor that can meet modern IT and business requirements.
Tags : 
    
CA Technologies
Published By: IBM     Published Date: Jul 26, 2017
To compete in todays fast-paced business climate, enterprises need accurate and frequent sales and customer reports to make real-time operational decisions about pricing, merchandising and inventory management. They also require greater agility to respond to business events as they happen, and more visibility into business activities so information and systems are optimized for peak efficiency and performance. By making use of data capture and business intelligence to integrate and apply data across the enterprise, organizations can capitalize on emerging opportunities and build a competitive advantage. The IBM data replication portfolio is designed to address these issues through a highly flexible one-stop shop for high-volume, robust, secure information replication across heterogeneous data stores. The portfolio leverages real-time data replication to support high availability, database migration, application consolidation, dynamic warehousing, master data management (MDM), service
Tags : 
ibm, infosphere, data replication, security, data storage
    
IBM
Published By: New Relic     Published Date: Apr 07, 2015
Its all too easy for CIOs and technology management to build a strategy around any new technology area that is focused on delivering lower technology costs and greater operational efficiency. However, to get your cloud strategy right, you have to learn to move away from measuring the success of change against technology management care-abouts and focus on the priorities of the business. Forresters Business Technographics surveys show a stark disconnect between technology managements and the business desired outcomes from cloud computing; embracing the shift to cloud services means driving and measuring its success against metrics defined by the business before those of IT. This report outlines the strategic plan of Forresters solution for CIOs working on cloud computing. This report is designed to help you onboard the business to your cloud strategy.
Tags : 
    
New Relic
Published By: Oracle     Published Date: Sep 13, 2017
5 Ways to Boost Growth By Improving the Finance Teams Effectiveness
Tags : 
operational agility, innovation, risk management, decision making, finance, smb growth
    
Oracle
Published By: Lenovo     Published Date: Jul 07, 2015
Lenovo Flex System powered by Intel Xeon processors is the newest blade infrastructure design with the attributes that support soft ware-defi ned infrastructure and virtualization better than any competitor. It delivers key benefits better than any competitor: Reduces capital and operational costs with consistent hardware/software deployment and the ability to simply scale workloads with the highest VM capacity and performance. Increases agility with simplified rapid deployment and ongoing management to add, change, or move workloads with their associated resources. Improves efficiency and increases space, power, and cooling with the leading compute, storage, and network density. Download Now! Sponsored by Lenovo and Intel"
Tags : 
lenovo, flex system, network density, operational costs, software deployment, software development, it management, knowledge management, enterprise applications
    
Lenovo
Published By: CA Technologies     Published Date: Jul 20, 2017
e-book which lays out the case for machine learning and artificial intelligence for mainframe operational analytics. The mainframe is now part of a highly complex connected ecosystem driving trillions of mobile and web transactions critical to the functioning of the application economy. The emergence of new workloads and apps on the mainframe means that the status quo isnt enough when it comes to Mainframe management. IT professionals alone whether mainframe skilled or not simply cant keep up with the onslaught of performance alerts, false alarms. Machine learning deliver mainframe intelligence a more proactive and automated approach to handle this challenge.
Tags : 
    
CA Technologies
Published By: CA Technologies     Published Date: Jun 01, 2018
Privileged credentials have served as a major attack vector in the successful execution of many breaches. Protecting privileged access is an imperative to successfully defend an organization from a breach and is a core requirement of multiple compliance regimes. CA Privileged Access Management helps drive IT security and compliance risk reduction and improves operational efficiency by enabling privileged access defense in depthproviding broad and consistent protection of sensitive administrative credentials, management of privileged identity access and control of administrator activity.
Tags : 
    
CA Technologies
Published By: Oracle APAC ZO OD Prime Volume SCM ABM Leads June 2017     Published Date: Jul 12, 2017
Good supply chain management is essential to your operational efficiency, customer centricity, compliance, carbon footprint, and ultimately, your overall success. If handled correctly, your supply chain should improve customer servicealong with the reputation of your brandand boost your bottom line. But, as with many areas of business, the rules of the game are changing. Whats changing? Well, everything. New regulations, increased buyer expectations, shorter product lifecycles, fluctuations in demand, new market entrants, more ethical supplier management, poor visibility of globalized supply chainsall these things, and more, are testing the limits of the traditional supply chain model. The simple truth is that the way things used to be done, and the solutions that enabled it, are no longer up to the job.
Tags : 
cloud, supply chain management, scm, cloud computing
    
Oracle APAC ZO OD Prime Volume SCM ABM Leads June 2017
Published By: Elementum     Published Date: Sep 03, 2018
While everyone is scrambling to make sure their income statements reflect a profitable year by squeezing procurement costs, its actually the balance sheet that tells the full story of long term financial health.
Tags : 
elementum, operational costs, supply chain, balance sheet, bottom line, financial management, business management, inventory, customer satisfaction, eprocurement, total cost of ownership, information management, records management, project management, spend management
    
Elementum
Published By: Taleo     Published Date: Mar 10, 2011
Finding talented candidates can be challenging. Automating recruiting can improve candidate quality and increase efficiency. This paper outlines how to reduce time to hire by 50%, reduce cost per hire by 70%, and hire quality people.
Tags : 
recruiting costs, operational costs, savings, talent management, saas, best practices, recruitment
    
Taleo
Published By: RSA Security     Published Date: Nov 18, 2013
This paper will explain how to achieve a balance between risk and business agility through a comprehensive approach to Operational Risk Management.
Tags : 
archer, rsa, operational risk, security, technology, business agility, comprehensive approach
    
RSA Security
Start   Previous   1 2 3 4 5 6 7    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.