assets

Results 326 - 350 of 482Sort Results By: Published Date | Title | Company Name
Published By: QTS Data Centers     Published Date: May 01, 2017
In every industry, IT professionals are watching their roles and objectives evolve rapidly. The world is now digital and data is at the core of how enterprises, governments and individuals manage their core functions. Now, more than ever, CIOs and CTOs are challenged to build sustainable IT strategies against a constantly changing backdrop. Enterprises are quickly realizing that the resources required are exceeding their in-house capabilities. So, who are they trusting with these most valued assets? Data center providers. Learn how IT strategies are evolving and the role data centers play in those strategies.
Tags : 
    
QTS Data Centers
Published By: Samanage     Published Date: Aug 05, 2014
In this webinar recording, you will hear how Caleb Wagnon and Michael Arnold from the Sheridan School District were able to get fully implemented within 14 days with Samanage. In migrating to a unified Service Desk & Asset Management Solution, they were able to benefit from Samanage's Google Apps integration as well as map all of their assets accurately within minutes.
Tags : 
samanage, case study, asset management solution, integration, performance, budget, service desk, knowledge management, enterprise applications
    
Samanage
Published By: Oracle Social Cloud     Published Date: Feb 17, 2015
Last year's Super Bowl was disappointing on every level and simply could not live up to the hype. 2015 could not have provided a more opposite result. This was the year of the emotional rollercoaster. NBC is known for their heartfelt sports coverage and has mastered the art of storytelling, all on full display for Sunday's game. The network leveraged all their best tactics with outstanding results. The game was high drama at its best and kept the audience engaged to the very end. Brands had serious competition from the games itself this year, but brought their own flood of emotions with some familiar storylines that garnered significant social conversation volume to very unexpected commercials eliciting strong negative feedback. In this analysis we will examine how brands used social media to continue the conversation, leverage assets and advocates, and even create intentional mistakes to earn attention.
Tags : 
oracle, brand strategy, super bowl, social media strategy, engagement, continuing the conversation
    
Oracle Social Cloud
Published By: Imperva     Published Date: Sep 19, 2013
This guide will help you protect your organization from external threats targeting your high-value applications and data assets.
Tags : 
imperva, ddos, hackers, cybercriminals, cyberattacks, malware, phishing, web attack, spam, virus
    
Imperva
Published By: IHS GlobalSpec     Published Date: Jul 09, 2014
Industrial customers use content to research and make purchasing decisions. Are you giving them the info they need? Developed by IHS GlobalSpec, this white paper explains the growing importance of using content to attract, acquire and engage engineers and technical professionals. Content marketing positions your company as an expert, builds trust and introduces new products and services to a wider audience via webinars, technical articles, social media and more. Find out which content appeals most to technical professionals. Learn how to provide information that fulfills their needs at specific points in the buying cycle. And see examples of how and where industrial suppliers effectively use content marketing to deliver information that can help turn shoppers into buyers. Content Marketing for Industrial Marketers also explores the challenges of producing enough of the right content, repurposing it across multiple channels and budgeting for it. Plus, it provides the steps to start dev
Tags : 
ihs globalspec, influence buying decisions, content marketing, purchasing decision makers, content marketing strategy, building brand awareness, content marketing vehicles, engagement opportunities, user-generated content, improve engagement, engaging content, social media engagement, re-using content, b2b content marketing, content assets, content marketing budgets, curating information, content marketing measurement, industrial marketers
    
IHS GlobalSpec
Published By: Tripwire     Published Date: Jan 20, 2010
Gene Kim, CTO of Tripwire, describes seven practical steps owners and operators of the bulk power system can take to meet the mandatory IT configuration requirements set forth in the NERC-CIP standards. These steps help owners and operators avoid costly penalties for non-compliance while also protecting the Critical Cyber Assets that control or affect the reliability of North America's bulk electric power system.
Tags : 
tripwire, gene kim, nerc compliance, critical infrastructure protection, cip, cyber security standards, nerc-cip standard, information security, configuration control
    
Tripwire
Published By: IBM     Published Date: Oct 10, 2013
Today, your company's digital presence is your reputation and your brand. But websites and other IT assets are vulnerable to security breaches, downtime and data loss—all of which can negatively affect your reputation and competitive position. Read this paper, commissioned by IBM with leading analyst Forrester to learn how IT security decision makers across the globe are doing more with less by outsourcing key security tasks.
Tags : 
reputational risk, it outsourcing, it security, security, risk, security breach, digital presence, it assets, protection, safeguarding, outsourcing, risk management, data loss, data loss prevention, global it solutions
    
IBM
Published By: IBM     Published Date: Feb 25, 2014
In their efforts to keep up with these varied needs, healthcare organizations are experiencing a proliferation of assets and asset types. But assets themselves are experiencing a convergence. Clinical devices for patient monitoring and care, building systems for cooling and lighting, and technology devices for communications and record keeping share a common foundation. An enterprise asset management system can be at the core of this transformation. Download the whitepaper to learn more.
Tags : 
    
IBM
Published By: IBM     Published Date: Apr 13, 2015
IDC Retail Insights defines omni-channel merchandise optimization as the set of technologies, data assets, skills, processes, and management intent required to develop and maintain sets of targeted and localized offers that best satisfy important business objectives. These goals include customer satisfaction, customer lifetime value, and category, channel, and corporate performance. By "offers," IDC Retail Insights means the broad set of attributes that characterize assortments, products, services, prices, utility, and convenience that match customers' buying criteria and shopping behaviors. Targeted and localized offers present a compelling "choice set" that satisfies and delights consumers. Download this white paper to read the questions posed by IBM to Greg Girard, program director of Omni-Channel Analytics Strategies at IDC Retail Insights, on behalf of IBM's customers.
Tags : 
omni-channel merchandise, ibm, targeted offers, localized offers, customer satisfaction, corporate performance
    
IBM
Published By: IBM     Published Date: Apr 23, 2015
With IBM analytics for big data with a smart mobile strategy, banks can increase wallet share and assets under management while lowering the organization’s operating ratio by using more efficient channels.
Tags : 
ibm, analytics, efficiencies, digital banking, management, strategy, data management, business technology, data center
    
IBM
Published By: IBM     Published Date: Apr 23, 2015
Banks face many challenges as they strive to return to pre-2008 profit margins including reduced interest rates, unstable financial markets, tighter regulations and lower performing assets. Fortunately, banks taking advantage of big data and analytics can generate new revenue streams. Watch this real-life example of how big data and analytics can improve the overall customer experience.
Tags : 
ibm, big data, profit margins, regulations, analytics, customer experience, banking, bank, data management, business technology
    
IBM
Published By: IBM     Published Date: Dec 02, 2014
In a recent Aberdeen Group Analyst Insight report,1 Asset Management: The Changing Landscape of Predictive Maintenance, a survey of executives states that the number one risk to operations was failure of their critical physical assets —ensuring that they are available, reliable and performing as originally intended. Though, such a risk can become an opportunity. Top-performing companies rely on analytics related to maintenance, safety and replacement equipment to plan for capital expenditures, manage their assets on a daily basis and maximize asset performance.
Tags : 
asset productivity, operational performance, predictive maintenance, operational costs, it management, knowledge management, enterprise applications
    
IBM
Published By: IBM     Published Date: Jul 31, 2015
Governance solutions.
Tags : 
identity, protection, critical, solution
    
IBM
Published By: IBM     Published Date: Jan 15, 2016
White paper discusses how to secure the gateway to your organization with robust and integrated identity governance solutions from IBM
Tags : 
ibm, identity governance, security, protection, enterprise applications, business technology, data security
    
IBM
Published By: IBM     Published Date: Apr 04, 2016
White paper discusses how to secure the gateway to your organization with robust and integrated identity governance solutions from IBM
Tags : 
ibm, data security, risk management, data management, identity governance, security, knowledge management, enterprise applications
    
IBM
Published By: IBM     Published Date: Nov 07, 2016
Apache Spark hit the scene in 2014 and has grown to be the most popular software project in the history of Open Source. Attend this webinar and learn more about; -What is Apache Spark? -Why, is it so popular? -Why is it important to you and your organization? Apache Spark is allowing companies to drive innovative ways to compete using one of the most valuable assets in the 21st century, Data! Apache Spark is the fastest growing framework for powering Big Data Analytics today and for the future. Register to attend this webcast and learn more.
Tags : 
ibm, big data, platform computing, apache spark, enterprise applications, business technology
    
IBM
Published By: IBM     Published Date: Jun 22, 2017
Security threats are very real, and the stakes are higher than ever. Each day, tens of thousands of malware variants are created, with new classes of threats continually added and improved upon. Savvy attackers use polymorphic programs to alter malware into new form factors after each delivery. And all of this is exacerbated by the proliferation of mobile devices, cloud computing and social media—in fact, the intersection of these technologies provides fertile new ground for threats and malware. Today’s attacks are often not random, but targeted for maximum financial gain and impact. Rogue individuals and groups are constantly innovating new ways to attack organizations’ most valuable assets. As a result, traditional methods of dealing with threats are no longer enough. Organizations need more threat intelligence than ever before in order to effectively protect themselves.
Tags : 
cyber security, global threat intelligence, malware prevention, cyber threat, protection
    
IBM
Published By: IBM     Published Date: Oct 03, 2017
The demand for new data about customers, customer behaviour, product usage, asset performance, and operational processes is growing rapidly. Almost every industry wants new data. Some examples of this are: • Financial services organisations want more data to improve risk decisions, for ‘Know Your Customer (KYC) compliance and for a 360 degree view of financial crime. • Utilities companies want smart meter data to give them deeper understanding of customer and grid usage and to allow them to exploit pricing elasticity. They also want sensor data to monitor grid health, to optimise field service and manage assets. Download now to learn more!
Tags : 
scaling data, big data, customer behavior, product usage, data integration
    
IBM
Published By: Seagate Technology     Published Date: Apr 14, 2015
Finding a better place to store an ever-expanding volume of valuables is a near universal challenge—for individuals and their businesses. From physical holes in the ground to the ethereal cloud and beyond, the range of options for stashing stuff is immense. And, depending on what you’re storing and how easily you want others to find it, some options are better than others. Read this white paper to learn how a Network Attached Storage (NAS) system provides the customization, speed, ease-of-use, security and affordability needed to protect and share digital assets for many small business owners.
Tags : 
cloud, security, network attached storage system, customization, affordability
    
Seagate Technology
Published By: Utimaco     Published Date: Aug 18, 2008
If company laptops, PDAs, or other mobile devices can't be found, it doesn't always mean that they've been stolen. Companies often lose track of these IT assets because there's no clear record of them. Encryption and inventory management can help to safeguard against the loss of confidential data.
Tags : 
leak, leakage, data protection, encryption, asset management, mobile, laptop security, mobile security, wireless security, utimaco, security
    
Utimaco
Published By: Eaton Corp.     Published Date: Jun 01, 2009
If IT and Facilities could work collaboratively, organizations can operate more efficiently and effectively while still meeting their business objectives.  That's why Eaton® is partnering with organizations that develop IT management systems to create an integrated approach to energy management.  This white paper describes how a joint monitoring and management solution links IT assets, the data center infrastructure and Facilities assets into a holistic perspective aligned with business processes.
Tags : 
white paper, facilities, collaborate, single pane, joint monitoring, management solution, it assets, data center. solutions, data center design and management
    
Eaton Corp.
Published By: SAS     Published Date: Jun 05, 2017
Data professionals now have the freedom to create, experiment, test and deploy different methods easily – using whatever skill set they have – all within one cohesive analytics platform. IT leaders gain the ability to centrally manage the entire analytics life cycle for both SAS and other assets with one environment. Organizations get faster results and better ROI from analytics efforts.
Tags : 
    
SAS
Published By: SAS     Published Date: Aug 28, 2018
Starting data governance initiatives can seem a bit daunting. You’re establishing strategies and policies for data assets. And, you’re committing the organization to treat data as a corporate asset, on par with its buildings, its supply chain, its employees or its intellectual property. However, as Jill Dyché and Evan Levy have noted, data governance is a combination of strategy and execution. It’s an approach that requires one to be both holistic and pragmatic: • Holistic. All aspects of data usage and maintenance are taken into account in establishing the vision. • Pragmatic. Political challenges and cross-departmental struggles are part of the equation. So, the tactical deployment must be delivered in phases to provide quick “wins” and avert organizational fatigue from a larger, more monolithic exercise. To accomplish this, data governance must touch all internal and external IT systems and establish decision-making mechanisms that transcend organizational silos. And, it must provi
Tags : 
    
SAS
Published By: SAS     Published Date: Dec 20, 2018
Data professionals now have the freedom to create, experiment, test and deploy different methods easily using whatever skill set they have and all within one cohesive analytics platform. IT leaders gain the ability to centrally manage the entire analytics life cycle for both SAS and other assets with one environment. Organisations get faster results and better ROI from analytics efforts.
Tags : 
    
SAS
Published By: Cisco     Published Date: Nov 17, 2014
The desire to invest in antimalware software can be stated simply: avoid malware infection. Malware can create back doors into your network; puts your information, assets, and sensitive intellectual property in peril; and ultimately jeopardizes your business operations, resulting in unspecified collateral damage to your brand. This paper discusses Large-scale data mining technologies, Cloud computing platforms and Deep-seated knowledge of threats facing enterprises.
Tags : 
cloud-computing, malware, cisco, malware infection, amp, networking, security, it management, data management, business technology
    
Cisco
Start   Previous    6 7 8 9 10 11 12 13 14 15 16 17 18 19 20    Next    End
Search      

Related Topics

Add Your White Papers

Get your white papers featured in the Data Center Frontier Paper Library contact:
Kevin@DataCenterFrontier.com