it monitoring

Results 351 - 375 of 703Sort Results By: Published Date | Title | Company Name
Published By: Lenovo and Intel®     Published Date: Oct 14, 2016
Everything you need to know about Infrastructure for Desktop Virtualization—in one eBook. Dive into this extensive eBook to get all the details you need to consider when launching down the path of virtualization. In this eBook, from Brian Suhr, author of the blogs Data Center Zombie and VirtualizeTips, and editor Sachin Chheda, director of solutions and verticals marketing at Nutanix, we provide detailed analysis and key points to consider, including: • Architectural Principles • Building Blocks • Infrastructure Alternatives • Storage Requirements • Compute Sizing Get the eBook
Tags : 
infrastructure, capacity, monitoring, storage requirements, compute sizing, scalability
    
Lenovo and Intel®
Published By: VMware     Published Date: Nov 04, 2016
This 11-page whitepaper discusses the agility needs of today’s business, how IT is choosing a hybrid cloud approach to meet demand, and how hybrid cloud brings more agility but also increases management complexity in an environment that encompasses traditional architectures, private clouds, and public clouds. The paper outlines the role of a cloud management platform with vRealize® Suite for enabling faster and secure provisioning with monitoring and policy-driven controls. It highlights the 3 use cases (Intelligent Ops, Automated IT to Iaas, DevOps-Ready IT), the need for Day 1 and Day 2 capabilities, and how vRealize Suite helps automate IT.
Tags : 
    
VMware
Published By: Tracx     Published Date: Mar 08, 2017
"Can you prove social media is working? 86% of marketers identified measuring social media return on investment (ROI) as a top challenge. Social ROI can be daunting, but it’s also the key to winning resources and propelling your social media program forward. So how do you calculate the ROI of your social media? We’ve created a Guide and ROI Template to do just that. Arm yourself with not only the knowledge of what's working and what's not on social media, but the numbers to prove it. What You're Getting: *Advice on goal-driven analysis and which metrics matter *Insight on how to tie social data to marketing investments *An easy-to-follow, five-step process for determining ROI *A downloadable template to make calculations easy"
Tags : 
b2b social media, b2c social media, enterprise social, media engagement, media listening, media platform, media technology, social analytics, social analytics media, social engagement, social listening, social marketing, social media, social monitoring, social monitoring media, social optimization, social publishing, social roi tool, social software, social software media
    
Tracx
Published By: Tracx     Published Date: Mar 08, 2017
"With more than 2.3 billion active users worldwide, social media has officially gone from a ""nice-to-have"" to a ""must-have"" — and not just for consumer-facing companies. Listen as a panel of experts has a no-holds-barred discussion of how B2B CMOs can build A+ social businesses from the top down. In this webinar, you'll learn: *The biggest areas of opportunity for B2B social media *The 3 types of social CMOs *How to manage expectations and find your internal champions *Real-world use cases and best practices from CMOs just like you Hear from three socially savvy CMOs with a diverse range of experiences at companies large and small: Nick Panayi, Head of Global Brand & Digital Marketing at CSC; Jason Jue, CMO at Triblio; and Jenifer Kern, CMO at Tracx."
Tags : 
b2b social media, b2c social media, enterprise social, media engagement, media listening, media platform, media technology, social analytics, social analytics media, social engagement, social listening, social marketing, social media, social monitoring, social monitoring media, social optimization, social publishing, social roi tool, social software, social software media
    
Tracx
Published By: Tracx     Published Date: Mar 08, 2017
"The social internet is big, noisy, and always in flux — which makes it really hard to know where your audience is spending their time and how to reach them there. So, we've done the research for you. (You're welcome.) Join us for this on-demand webinar to learn why a ""listen-first"" philosophy sets your team up to discover game-changing opportunities before your competitors do. In this on-demand webinar, you'll learn: *How to create your ideal social media mix *The most up-to-date audience demographics from Facebook, Instragram, Twitter, Linkedin, Pinterest, Reddit, and more *Top performing networks based on industry demographics *When to adopt new networks (and when to ignore) *Where companies like yours spend time on social media (and where the missed opportunities are)."
Tags : 
b2b social media, b2c social media, enterprise social, media engagement, media listening, media platform, media technology, social analytics, social analytics media, social engagement, social listening, social marketing, social media, social monitoring, social monitoring media, social optimization, social publishing, social roi tool, social software, social software media
    
Tracx
Published By: AWS - ROI DNA     Published Date: Jun 12, 2018
Traditional data processing infrastructures—especially those that support applications—weren’t designed for our mobile, streaming, and online world. However, some organizations today are building real-time data pipelines and using machine learning to improve active operations. Learn how to make sense of every format of log data, from security to infrastructure and application monitoring, with IT Operational Analytics--enabling you to reduce operational risks and quickly adapt to changing business conditions.
Tags : 
    
AWS - ROI DNA
Published By: Oracle PaaS/IaaS/Hardware     Published Date: Jan 10, 2017
According to Mary Johnston Turner, Research Vice President at IDC; "Breaking down technology specific management as well as data silos also facilitates faster infrastructure and application rollouts, reduces human errors, and improves overall business agility.Cloud based management, monitoring and analytics help to improve collaboration between IT operations and developer teams by stabilizing service levels and monitoring usage to support accurate charge back." 
Tags : 
    
Oracle PaaS/IaaS/Hardware
Published By: Interactive Intelligence     Published Date: Jan 10, 2011
Contact centers face a tall order: Deliver stellar service and real-time response to customers, and still get more out of the workforce without risking burnout and turnover. Lori Bocklund is president of Strategic Contact, and Rachel Wentink is the senior director of Product Management for Interactive Intelligence, and when they discuss how to optimize agent performance and offer outstanding service, it's worth reading.
Tags : 
interactive intelligence, strategic contact, quality monitoring, wfm, workforce maangement
    
Interactive Intelligence
Published By: Trillium Software     Published Date: May 19, 2011
Today financial services institutions must meet the standards for data quality attestation by the FFEIC regulators of risk reporting. This paper discusses the platform and domain expertise needed to support the rigorous demands of commercial and retail risk reporting.
Tags : 
trillium software, data quality management, basel ii solution, data profiling, data monitoring, metadata, data supporting risk, grc
    
Trillium Software
Published By: Trillium Software     Published Date: May 19, 2011
By implementing the six pillars of data quality optimization, your organization can incrementally improve the quality of the data that drives all your operations.
Tags : 
trillium software, data quality management, iqm, information quality management, quality maturity model, enterprise data management, edm, data storage requirements, digital universe, data hygiene best practices, data standards, data monitoring
    
Trillium Software
Published By: Kaspersky Lab     Published Date: Feb 18, 2014
Download the Kaspersky Lab security experts' Guide to the Threat Landscape to have access to a wealth of IT security intelligence.
Tags : 
kaspersky, kaspersky lab, malware, anti-virus industry, organizational security, mobility, byod, the cloud, virtualization, it administrators, it security, monitoring intrusions, phishing, cybercriminals, system malware, infrastructure, data management, mobile malware, social networks, unpatched application
    
Kaspersky Lab
Published By: IBM     Published Date: May 04, 2009
Increased processing needs means increased energy costs. In fact, power costs can often exceed hardware costs. Read this white paper and see how the pairing of new IBM System x and BladeCenter servers with the new Intel Xeon Processor 5500 series can reduce costs and improve performance.
Tags : 
ibm, express seller, virtualization, intel, xeon, processor, 5500, bladecenter, system x, power, energy costs, hardware, cooling, rfg, director active energy manager, power distribution units, pdus, server problems, cost optimization, return on investment
    
IBM
Published By: IBM     Published Date: Sep 10, 2009
As data center costs continue to rise, green is the word of the day. What it means is cost savings through consolidation and lower energy usage, as this white paper shows. See the role energy consumption plays in today's data centers, and how IBM Tivoli solutions can help optimize energy use in the data center.
Tags : 
ibm, u.s. environmental protection agency, green data centers, visualization and reporting, asset management and spatial awareness, optimizing power usage and cost, ibm tivoli, storage
    
IBM
Published By: IBM     Published Date: Oct 13, 2009
Stopping inappropriate data access. This turnkey solution safeguards servers - where business data is stored and accessed - with a combination of software and managed security services that automate critical areas of security oversight. By monitoring and tracking system access, the solution is effective at enforcing security policies.
Tags : 
security threats, ibm, server, express mps, security policies, intrusion prevention, server sensor, internet security systems
    
IBM
Published By: IBM     Published Date: Aug 30, 2010
Stronger Measures Have Become Essential To Defend Against Growing Attacks. Database security is the last line of defense, so it deserves greater focus on the protection of private data from both internal and external attacks than IT pros have traditionally given it.
Tags : 
ibm, database security, enterprise, private data, privacy, intrusion, information security policies, auditing, monitoring, encryption
    
IBM
Published By: Microsoft Dynamics     Published Date: Jul 03, 2008
Find out how you can convert your pains into profit. Learn how Microsoft Customer Relationship Management (CRM) can help you develop profitable customer relationships. Microsoft CRM uses lead and opportunity management, incident management and a searchable knowledgebase. CRM also makes use of reporting tools for accurate forecasting, measurement of business activity, and employee performance.
Tags : 
sales, sales software, sales funnel, forecasting, analytics, business activity monitoring, microsoft, microsoft crm, microsoft dynamics
    
Microsoft Dynamics
Published By: netForensics     Published Date: Jan 04, 2008
Securing Federal information and systems is an ongoing challenge. By implementing comprehensive security compliance management methods for data collection, retention, monitoring and reporting, federal agencies can successfully demonstrate a sound framework that meets FISMA requirements.
Tags : 
fisma, fisma compliance, information protection, data protection, monitoring, information management, regulations, regulatory compliance, netforensics
    
netForensics
Published By: Progress Software Corporation CEP     Published Date: Aug 03, 2009
Forrester Research has named Apama as a standout leader in the complex event processing (CEP) platform market in The Forrester Wave: Complex Event Processing Platforms, Q3 2009 Report. The Report evaluated nine CEP platform vendors based on a comprehensive set of evaluation criteria.
Tags : 
progress software, idc, complex event processing, apama, business activity monitoring (bam), business process management, bpm, systems and operations management, active databases, business intelligence, cep, mom
    
Progress Software Corporation CEP
Published By: Progress Software Corporation CEP     Published Date: Jul 14, 2009
In the transport and logistics market where timing is critical, a matter of minutes can make or break a performance-based contract. Your success will depend on your organization's ability to visualize, monitor and act on internal events and external events that effect your operations.
Tags : 
progress software, idc, complex event processing, apama, transport, logistics, kpi, greening, consolidation, lifecycle, business activity monitoring, bam, business process management, bpm, systems and operations management, active databases, business intelligence, cep, mom
    
Progress Software Corporation CEP
Published By: Progress Software BTA Financial     Published Date: Oct 26, 2009
The Actional architecture enables end-to-end transaction monitoring and alerting as well as fast root cause analysis-with cost-effective scalability and high performance. This paper presents a detailed description of the unique technology that makes these and other key characteristics possible.
Tags : 
progress actional, actional architecture, soa operations, soa management, operational management, soa whitepaper
    
Progress Software BTA Financial
Published By: Progress Software BTA Telecommunications     Published Date: Apr 09, 2009
Did you know that 61 telcos worldwide reported a loss of up to 10% of revenue due to order fallout? Why is this happening? How else is order fallout affecting companies? This report by Vanson Bourne, an independent research firm, examines the scope and nature of the problem. Business transaction assurance-making sure orders process successfully-may seem simple but it isn't. Learn about the challenges that telecommunications experts face and why current monitoring and management systems can't do the job.
Tags : 
progress software, telecommunications, telcos, telecom, business transaction, vanson, transaction failure
    
Progress Software BTA Telecommunications
Published By: Progress Software BTA Telecommunications     Published Date: Oct 26, 2009
The Actional architecture enables end-to-end transaction monitoring and alerting as well as fast root cause analysis-with cost-effective scalability and high performance. This paper presents a detailed description of the unique technology that makes these and other key characteristics possible.
Tags : 
progress actional, actional architecture, soa operations, soa management, operational management, soa whitepaper
    
Progress Software BTA Telecommunications
Published By: Tripwire, Inc     Published Date: Jan 29, 2010
Tripwire provides IT organizations with enhanced file integrity monitoring, configuration assessment and log management that automates continuous PCI compliance.
Tags : 
tripwire, pci compliance, file integrity monitoring, configuration assessment, log management, malware, security, event management
    
Tripwire, Inc
Published By: Citrix Online     Published Date: Jun 09, 2010
This new white paper examines key challenges facing customer support organizations and explores the many advantages of collaborative remote support, including ad hoc training, faster first-contact resolution and an improved customer experience.
Tags : 
citrix gotoassist, corporate remote support, customer service, loyalty rentention, desktop management, manager monitoring
    
Citrix Online
Published By: SAS     Published Date: Oct 18, 2017
With enhanced regulatory pressure, banks must continuously evaluate their risks. To meet these demands, the AML industry has turned to analytical/statistical methodologies to reduce false-positive alerts, increase monitoring coverage and reduce the rapidly escalating financial cost of maintaining their AML programs. An effective AML transaction monitoring strategy includes segmenting the customer base by analyzing customer activity and risk characteristics in order to monitor them more effectively. This paper explains how to blend both quantitative and qualitative methods to tune scenarios to identify the activity that poses the most risk to the bank.
Tags : 
    
SAS
Start   Previous    8 9 10 11 12 13 14 15 16 17 18 19 20 21 22    Next    End
Search Resource Library