list

Results 201 - 225 of 1320Sort Results By: Published Date | Title | Company Name
Published By: Sage Software (APAC)     Published Date: May 02, 2018
Guru Labels, a specialist label printing company, deploys Sage Business Cloud Enterprise Management to replace a variety of stand-alone systems with a single, integrated solution that could bring together data from Guru Labels’ manufacturing, inventory, purchasing, finance, CRM an sales systems. It enables the business to improve job scheduling, reduce costs, retain margins and provide rapid responses to quotes that ultimately leads to high customer satisfaction rates.
Tags : 
    
Sage Software (APAC)
Published By: Sage Software (APAC)     Published Date: May 02, 2018
Sherwood International, a specialist in providing customised in-bound supply chain solutions into Africa, has implemented the Sage Business Cloud Enterprise Management solution business management solution to boost efficiencies in its operations and gain better visibility into its business. It has also been able to streamline finances and improve operational controls.
Tags : 
    
Sage Software (APAC)
Published By: IBM     Published Date: Jun 26, 2013
An Economist Intelligence Unit research program commissioned by IBM.
Tags : 
holistic, risk management, business continuity planner
    
IBM
Published By: IBM     Published Date: Apr 11, 2016
This book helps you understand DevOps and how your organization can gain real business benefits from it. You also discover how a holistic view of DevOps that encompasses the entire software delivery life cycle.
Tags : 
ibm, cloud, application platform, devops, software development
    
IBM
Published By: Qualys     Published Date: Jul 20, 2012
Vulnerability Management (VM) means systematically finding and eliminating network vulnerabilities. Choosing a solution for VM is a critical step toward protecting your organization's network and data. Without proven, automated technology for precise detection and remediation, no network can withstand the daily onslaught of new vulnerabilities that threaten security. This checklist from Qualys provides a 12 point shortlist of considerations to determine what solutions will work best for your organization.
Tags : 
technology, security, vulnerabilities, internet, virus, solutions, vulnerability management, business technology, research
    
Qualys
Published By: Kaminario     Published Date: Sep 09, 2016
Here’s a handy checklist you can use in evaluating how well your healthcare data storage strategy holds up.
Tags : 
ehr, healthcare, records, it strategy, it management, enterprise applications, storage, business technology
    
Kaminario
Published By: Adobe     Published Date: Jan 20, 2017
Au large de l’île de la Grenade dans les Caraïbes, au cœur de la baie de Molinere, la vie marine s’épanouit au milieu d’étranges sculptures d’art réalistes. Le sculpteur et conservateur Jason deCaires Taylor a conçu cette toute première galerie de sculptures sous-marines. Cet espace unique a été créé, non seulement pour exposer le talent de l’artiste, mais aussi pour permettre aux gens, à la vie marine et aux fragiles habitats sous-marins de cohabiter en parfaite harmonie.
Tags : 
    
Adobe
Published By: bChannels - Software One     Published Date: Dec 11, 2018
IT service continuity undoubtedly is at or near the very top of every IT organization’s list of strategic initiatives, considering the dramatic costs and implications of downtime. Download this informative whitepaper for some compelling reasons to upgrade.
Tags : 
    
bChannels - Software One
Published By: Gigamon EMEA     Published Date: Feb 20, 2019
IDG survey confirms: CEOs consider cybersecurity a top priority. Get “Countering Escalating Cyberthreats” and improve your threat visibility across the entire network. As CEOs struggle with the risks of a digital business, it is time to adopt a more holistic approach to security. You can distribute traffic to the right tool at the right time, eliminate network weaknesses and keep your CEO happy. Read now.
Tags : 
    
Gigamon EMEA
Published By: CA Mainframe     Published Date: Sep 12, 2008
Automated application quality assurance and testing are fundamental to the delivery of the service levels and managed risks that are essential to delivering business outcomes you can depend on. In this context, CA’s mainframe Application Quality Management and Testing Tools send very strong messages: the tools are being actively developed and, where appropriate, integrated with equivalent tools on the distributed platforms, to help companies deliver holistic, automated, business services.
Tags : 
ca mainframe, mainframe, application quality, application testing, testing
    
CA Mainframe
Published By: UL EduNeering     Published Date: Jul 05, 2012
Third party intermediaries have played starring roles in some of the most highly publicized global corruption trials. By any measure, third party intermediaries routinely rank high on the list of compliance worries for brand companies.
Tags : 
fda, gmp, gcp, gxp, cms, osha, qsr, 21 cfr part 11, regulatory compliance, pharmaceuticals, medical device, good manufacturing practices, quality system regulation, online compliance training, part 11 compliance, fda part 11 compliance, iso 13485, quality management system, life science, health care
    
UL EduNeering
Published By: iCims     Published Date: Jan 24, 2017
You know just how easy it can be to overlook the type of hiring experience you’re serving up to candidates day in and day out. Recruiting can run at a break-neck pace, so whether candidates feel like a priority, or just another name on a list, doesn’t always stay top of mind. But the truth is that a stellar candidate experience has to be a priority, even for companies that don’t have trouble getting applicants in the door.
Tags : 
    
iCims
Published By: EMC     Published Date: Apr 15, 2011
This white paper discusses Unisphere for VNXe. It describes the Unisphere for VNXe interface, and explains how an IT generalist can easily complete storage-related tasks using this intuitive, easy-to-use interface.
Tags : 
emc unisphere, vnxe, storage management, connection utility, configuration wizard, cifs, iscsi, nfs
    
EMC
Published By: TriNet     Published Date: Jul 28, 2015
Top 5 HR Compliance Concerns for Small Business
Tags : 
hr compliance, small business, infrastructure, administration results, hr functions, workplace litigation, benefit regulations, hr policies, hr generalist
    
TriNet
Published By: TriNet     Published Date: Jul 28, 2015
Download this white paper for best practices on how to better understand and effectively manage a multi-generational workforce.
Tags : 
leadership tips, best practices, generation x, generation y, baby boomers, traditionalist, finite data facts
    
TriNet
Published By: Teradata     Published Date: Jan 30, 2015
This TDWI Checklist Report discusses adjustments to DW architectures that real-world organizations are making today, so that Hadoop can help the DW environment satisfy new business requirements for big data management and big data analytics.
Tags : 
data, data warehouse, hadoop, hadoop ecosystem, data architectures, data archiving, advanced analytics, data management, data center
    
Teradata
Published By: Genesys     Published Date: Oct 16, 2013
Presumably, service-oriented businesses already have customer relationship management (CRM) and business process management (BPM) systems in place that create workflows and processes. However, traditional systems aren't enough - they often result in blind spots in the completion of work processes. To meet the increasing demands of customers in today's fast-paced marketplace, you need a way to manage these efficiency gaps - to effectively assign work and monitor completion. In other words, you need workload management. Download this resource to get a more in-depth look at the shortcomings of traditional customer service processes, and learn how enterprise workload management can help you overcome these issues as well as: • Create a holistic view • Increase flexibility • Reduce cost • And more
Tags : 
contact center, customer service, customer relationship management, technology, business process management, bpm, crm, enterprise applications, business technology
    
Genesys
Published By: Castlight Health     Published Date: Feb 14, 2017
Steel Dynamics had a confusing mix of contact lists and brochures for more than a dozen benefit vendors. They knew they needed a strategic partner to help them transform the employee user experience. Castlight Health was that partner. They gave the steel maker a way to provide employees with a single place to access and understand their benefits. The results were pretty impressive, as employee engagement quickly soared to 87%.
Tags : 
    
Castlight Health
Published By: Salesforce Pardot     Published Date: Sep 09, 2014
This guide is designed to help you align the sales and marketing departments in your own company so that you can start experiencing the results listed above. Take a look at the six keys to alignment outlined in chapters one and two, then read through the benefits of an aligned strategy in chapter three.
Tags : 
    
Salesforce Pardot
Published By: MobileIron     Published Date: Sep 22, 2014
The release of iOS 8 not only introduces a comprehensive list of features to enable greater enterprise mobility, it also highlights the pervasive need for an agile mobility strategy and EMM platform. According to a March 2014 study conducted by the Ponemon Institute, 50 percent of IT professionals in financial services say their company has no mobile strategy(1). Without a strategic approach to mobility and an EMM provider, organizations lack control over data security, end-user privacy, and mobile technologies that support corporate productivity. As iOS 8 becomes widely adopted, it will impact other mobility trends such as the continued migration away from Blackberry. Enterprises will need to move quickly to address these challenges, so updating the mobile strategy should be a top priority in every IT organization.
Tags : 
ios 8, agile mobility strategy, emm platform, data security, end-user privacy, corporate productivity, mobility trends, it management, wireless, enterprise applications
    
MobileIron
Published By: MobileIron     Published Date: Sep 22, 2014
The release of iOS 8 not only introduces a comprehensive list of features to enable greater enterprise mobility, it also highlights the pervasive need for an agile mobility strategy and EMM platform. According to a March 2014 study conducted by the Ponemon Institute, 50 percent of IT professionals in financial services say their company has no mobile strategy(1). Without a strategic approach to mobility and an EMM provider, organizations lack control over data security, end-user privacy, and mobile technologies that support corporate productivity. As iOS 8 becomes widely adopted, it will impact other mobility trends such as the continued migration away from Blackberry. Enterprises will need to move quickly to address these challenges, so updating the mobile strategy should be a top priority in every IT organization.
Tags : 
ios 8, agile mobility strategy, emm platform, data security, end-user privacy, corporate productivity, mobility trends, it management, wireless, enterprise applications
    
MobileIron
Published By: Dell     Published Date: Feb 02, 2018
All companies, small and large, grapple with infrastructure growth and IT modernization. For many companies, datacenter infrastructure has become an essential part of a hybrid cloud environment that allows users to consume internal and external resources seamlessly. This, in turn, is helping modernize today's datacenters and drive new levels of agility, productivity, and scale. A common attribute of modern datacenter infrastructure is solutions that provide all compute and data services as a single system that can be managed holistically at a rack scale. IDC refers to such solutions as converged infrastructure.
Tags : 
    
Dell
Published By: CA Technologies     Published Date: Jul 13, 2015
It’s not exactly breaking news that cardholder security is front and center of the payments ecosystem “to do” list. And, with that, the search for a solution that keeps cardholder data secure without compromising the consumer experience at checkout. Nowhere is this more important than online, where the incidences of fraud are increasing, and it becomes harder to authenticate the user.
Tags : 
3d secure, ca technologies, mobile, data management
    
CA Technologies
Published By: MobileIron     Published Date: Feb 15, 2017
The third edition of the Mobile Security and Risk Review is a must read and provides IT security leaders with timely information about the mobile threat landscape and the emerging risks facing their organizations. The report also includes a list of the most popular business apps, Apple VPP and DEP adoption metrics, top blacklisted mobile apps and information about healthcare and financial services industries.
Tags : 
    
MobileIron
Published By: Mimecast     Published Date: Nov 14, 2018
Are your employees behaving badly? Quick Fact: Only 11% of organizations continuously train employees on how to spot cyberattacks. Too often time, resources and conflicting priorities push training to the bottom of the list. Check out the latest insights from the Cyber Resilience Think Tank to learn how to make security awareness a key facet of your organization’s culture. The consequences of not prioritizing security awareness training are real. Read about it.
Tags : 
    
Mimecast
Start   Previous    2 3 4 5 6 7 8 9 10 11 12 13 14 15 16    Next    End
Search      

Related Topics

Add Your White Papers

Get your white papers featured in the Data Center Frontier Paper Library contact:
Kevin@DataCenterFrontier.com