organization management

Results 276 - 300 of 998Sort Results By: Published Date | Title | Company Name
Published By: IBM     Published Date: Oct 13, 2016
To help enterprises create trusted insight as the volume, velocity and variety of data continue to explode, IBM offers several solutions designed to help organizations uncover previously unavailable insights and use them to support and inform decisions across the business. Combining the power of IBM® InfoSphere® Master Data Management (MDM) with the IBM big data portfolio creates a valuable connection: big data technology can supply insights to MDM, and MDM can supply master data definitions to big data.
Tags : 
ibm, mdm, big data, ibm infosphere, mdm advantagw
    
IBM
Published By: IBM     Published Date: Jan 27, 2017
Every day, torrents of data inundate IT organizations and overwhelm the business managers who must sift through it all to glean insights that help them grow revenues and optimize profits. Yet, after investing hundreds of millions of dollars into new enterprise resource planning (ERP), customer relationship management (CRM), master data management systems (MDM), business intelligence (BI) data warehousing systems or big data environments, many companies are still plagued with disconnected, “dysfunctional” data—a massive, expensive sprawl of disparate silos and unconnected, redundant systems that fail to deliver the desired single view of the business.
Tags : 
    
IBM
Published By: IBM     Published Date: Jan 27, 2017
High-priority big data and analytics projects often target customer-centric outcomes such as improving customer loyalty or improving up-selling. In fact, an IBM Institute for Business Value study found that nearly half of all organizations with active big data pilots or implementations identified customer-c entric outcomes as a top objective (see Figure 1).1 However, big data and analytics can also help companies understand how changes to products or services will impact customers, as well as address aspects of security and intelligence, risk and financial management, and operational optimization.
Tags : 
    
IBM
Published By: Entrust Datacard     Published Date: Jul 21, 2015
This paper reveals how Entrust Authority Security Manager, the world's leading public key infrastructure (PKI), helps organizations easily manage their security infrastructure, and allows easy management of the digital keys and certificates that secure user and device identities.
Tags : 
entrust authority security manager, security, security infrastructure, digital, encryption, security management, digital certificates, digital signatures
    
Entrust Datacard
Published By: Oracle     Published Date: Jan 28, 2019
Oracle Engineered Systems are architected to work as a unified whole, so organizations can hit the ground running after deployment. Organizations choose how they want to consume the infrastructure: on-premises, in a public cloud, or in a public cloud located inside the customer’s data center and behind their firewall using Oracle’s “Cloud at Customer” offering. Oracle Exadata and Zero Data Loss Recovery Appliance (Recovery Appliance) offer an attractive alternative to do-it-yourself deployments. Together, they provide an architecture designed for scalability, simplified management, improved cost of ownership, reduced downtime, zero-data loss, and an increased ability to keep software updated with security and patching. Download this whitepaper to discover ten capabilities to consider for protecting your Oracle Database Environments.
Tags : 
    
Oracle
Published By: CA Technologies     Published Date: Jan 08, 2014
Cloud adoption, mobility, social media and the consumerization of IT are transforming many business activities for enterprise employees, partners and customers and eliminating the traditional network perimeter. Organizations have to change how they manage security and user identities if they want to keep their data and applications secure. Read this eBook to discover how a centralized identity and access management service can help you create a new identity perimeter.
Tags : 
ca technologies, identity, identity management, user provisioning, security, mobile, cloud computing, social media, mobility, security management, access mangement, identity perimeter
    
CA Technologies
Published By: CA Technologies     Published Date: Jan 15, 2014
Cloud adoption, mobility, social media and the consumerization of IT are transforming many business activities for enterprise employees, partners and customers and eliminating the traditional network perimeter. Organizations have to change how they manage security and user identities if they want to keep their data and applications secure. Read this eBook to discover how a centralized identity and access management service can help you create a new identity perimeter.
Tags : 
ca technologies, identity, identity management, user provisioning, security, mobile, cloud computing, social media, mobility, security management, access mangement, identity perimeter, network provisioning, network security, access control, authentication, internet security, web service security, mobile device management
    
CA Technologies
Published By: CA Technologies     Published Date: Jan 15, 2014
Cloud adoption, mobility, social media and the consumerization of IT are transforming many business activities for enterprise employees, partners and customers and eliminating the traditional network perimeter. Organizations have to change how they manage security and user identities if they want to keep their data and applications secure. Read this eBook to discover how a centralized identity and access management service can help you create a new identity perimeter.
Tags : 
ca technologies, identity, identity management, user provisioning, security, mobile, cloud computing, social media, mobility, security management, access mangement, identity perimeter, network provisioning, network security, access control, authentication, internet security, web service security, mobile device management
    
CA Technologies
Published By: newScale     Published Date: Jan 30, 2008
Many organizations implementing ITIL as part of their IT Service Management framework begin with the Configuration Management Database (CMDB). While a CMDB is a key piece of any successful ITIL implementation, there are several traps that are easily fallen into when implementing one.
Tags : 
change management, cmdb, service catalogue, service catalog, service management, itil, newscale, itil, service catalog, service catalogue, itil service catalogue, it service catalogue
    
newScale
Published By: Avaya     Published Date: Jan 15, 2014
Be guided on what the best practices are, offering strategies, actionable tactics, and examples of enterprises on the cutting edge so your organization won't have an overabundance of options when working with partners and customers.
Tags : 
avaya, collaboration, effective enterprise, effective collaboration, new culture, broadcasting center, organizational roles, customer experience, customer satisfaction, the cloud, cloud center, cloud contact center, best practices, actionable tactics, collaboration technology, integration, change management, command and control, information age, distance barriers
    
Avaya
Published By: CA WA 2     Published Date: Oct 01, 2008
Management of a virtual environment presents unique challenges; many organizations do not thoroughly anticipate the differences in managing a virtual environment from a purely physical environment. Many of your existing management tools may, in fact, only be able to manage physical machines or may collapse under the sudden load of many more systems.
Tags : 
virtual, virtualization, ca wa, ca wa 2
    
CA WA 2
Published By: DigitalPersona UK     Published Date: Jul 21, 2011
This white paper shows how integrated security suites can help organizations achieve high security and compliance with internal and external mandates, while also providing lower out-of-pocket costs, simplified management, and no compatibility issues.
Tags : 
fingerprint authentication, identity management, identity protection, data security, identity theft, loss prevention, compliance, strong authentication, biometrics, fraud prevention, transaction authentication, identification
    
DigitalPersona UK
Published By: Oracle     Published Date: Sep 21, 2016
Overhauling your processes, rewiring your product focus, creating a new culture: large-scale, transformative organizational development and change is messy, difficult—and usually fails. This digibook contains a step-by-step guide to leading process management and overcoming the cultural and procedural challenges, with case studies and examples of how smart CFOs are leading the transformation of their enterprises.
Tags : 
    
Oracle
Published By: Oracle     Published Date: Jul 31, 2017
Consolidation in the healthcare industry has reached a record pace. The volume of organizational change has generated solid templates and best practices for change management. In addition, technological advances provide opportunities for sophisticated data analytics and systems integrations. By identifying and taking advantage of these technologies, healthcare organizations can increase the odds of successful integrations that result in greater agility decrease their cost base, and improve the quality of care they provide.
Tags : 
    
Oracle
Published By: RSA Security     Published Date: Oct 24, 2013
Starting with a foundational set of data management and analytic capabilities enables organizations to effectively build and scale security management as the enterprise evolves to meet Big Data challenges.
Tags : 
rsa, emc, big data, security, security analytics, scale, security management
    
RSA Security
Published By: Oracle     Published Date: Jan 15, 2014
Supporting Healthcare Organizations and Citizens in the Transformation from Episodic to Longitudinal Care.
Tags : 
oracle, healthcare, health management platform, organizations, citizens, health management platform (hmp)
    
Oracle
Published By: Red Hat     Published Date: Jul 17, 2014
As a strategic partner in your business, you need to respond to growing business demand. Unfortunately, you face several challenges. Your complex IT environment is costly to manage and has a high downtime risk. Most of your resources and budget likely go to maintaining the stability, security and reliability of your IT system. Your organization might lack the processes needed to confidently manage support issues, IT transitions and new application deployments. In this whitepaper you will read about how to maximize uptime, reduce management costs, and quickly respond to business demands.
Tags : 
business demand, security, it transitions, new applications, it systems, efficiency, maximize uptime, manage costs
    
Red Hat
Published By: Red Hat     Published Date: Mar 16, 2015
Today’s enterprise IT organizations require more flexible IT services, greater capacity, and faster service delivery. Meanwhile, system management is more complex and compliance and audit overhead is increasing. A standard operating environment can drastically increase IT efficiency and lower operational expenses. Watch this webinar and learn more about 5 transformative areas that can make IT operations more efficient: • System standardization • Architectural flexibility • Automation of updates and maintenance • Greater productivity • Access and control Standardize your infrastructure and streamline your system management with Red Hat.
Tags : 
it organizations, flexible it services, it efficiency, system standardization, automation
    
Red Hat
Published By: Red Hat     Published Date: Oct 23, 2014
The business case for standardizing on Red Hat infrastructure solutions Read this IDC whitepaper to discover the quantifiable business benefits that standardizing on Red Hat® infrastructure has delivered organizations like yours. You'll learn how customers using Red Hat Enterprise Linux® and Red Hat's system management product, Red Hat Satellite: • Quickly recover up-front subscription costs. • Experience higher ratios of servers and users per administrator. • Significantly reduce annual downtime.
Tags : 
quantifiable benefits, infrastructure, management product, higher ratios, reduce annual downtime
    
Red Hat
Published By: Delphix     Published Date: Mar 24, 2015
Cloud deployments are becoming essential to all businesses, but face several challenges: cost, compliance, and agility. Delphix Data as a Service is a scalable and flexible deployment platform enabling organizations to achieve compliance and data management agility, while lowering costs.
Tags : 
    
Delphix
Published By: Delphix     Published Date: May 28, 2015
"Security-conscious organizations face a gap between current requirements and capabilities as they relate to data masking. Data volumes are growing exponentially and the risk of data leaks continues to make news, yet many organizations rely on inefficient, legacy approaches to protecting sensitive data. In contrast, top performing companies are turning to virtual databases and service-based masking solutions to ensure that data management functions can keep up with software development.
Tags : 
    
Delphix
Published By: CEB     Published Date: Dec 03, 2014
As cost and productivity expectations persist, many functions are rethinking the way their work gets done to remain both efficient and innovative. But not all business partners may welcome these kinds of transformations. To stay progressive, the best companies enable employees to exercise greater influence over internal clients and alter the entrenched views their function.
Tags : 
procurement insights, operations insights, productivity expectations, proactive business, procurement organizations, productive supplier partnerships, supplier relationship management, procurement leaders, procurement executives, operations professionals, operations leaders, operations executives
    
CEB
Published By: Visier     Published Date: Nov 04, 2014
With workforce analytics, HR professionals can play a more pivotal role in their organizations to help direct senior management and hiring managers in connecting the dots between their company’s overall performance and their investment in their workforce. Workforce analytics empower HR professionals to shift from being an operational function to becoming more of a strategic role within their organization. Workforce analytics uncovers deep insights into workforce data by drilling down into the data and highlighting both patterns of success to be repeated and patterns of failure that could lead to risk and impact. Go from intuition- to fact-based workforce decision-making with this comprehensive guide to workforce analytics. This eBook includes advice on how to get started, tips to ensure successful implementation, and key recommendations for finding the right solution
Tags : 
visier, workforce analytics, hr metrics, planning, human resources
    
Visier
Published By: Extreme Networks     Published Date: Aug 30, 2016
Organizations looking to deliver a flexible infrastructure that supports new methods of engagement, including customer-facing applications, are turning to cloud for the management of their wired and wireless networks. Discover how to tailor your arguments along a variety of business-aligned pain points and motivations to help you get the backing of key constituents within your organization.
Tags : 
extreme networks, wireless, cloud, cloud networks, networking, network, cloud managed networking, cloud based network, cloud network infrastructure, cloud network architecture, private cloud network, cloud network management, hybrid cloud networking, cloud networking, cloud network solutions
    
Extreme Networks
Published By: MarkLogic     Published Date: Mar 13, 2015
Big Data has been in the spotlight recently, as businesses seek to leverage their untapped information resources and win big on the promise of big data. However, the problem with big data initiatives are that organizations try using existing information management practices and legacy relational database technologies, which often collapse under the sheer weight of the data. In this paper, MarkLogic explains how a new approach is needed to handle the volume, velocity, and variety of big data because the current relational model that has been the status quo is not working. Learn about the NoSQL paradigm shift, and why NoSQL is gaining significant market traction because it solves the fundamental challenges of big data, achieving better performance, scalability, and flexibility. Learn how MarkLogic’s customers are reimagining their data to: - Make the world more secure - Provide access to valuable information - Create new revenue streams - Gain insights to increase market share - Reduce b
Tags : 
enterprise, nosql, relational, databases, data storage, management system, application, scalable
    
MarkLogic
Start   Previous    5 6 7 8 9 10 11 12 13 14 15 16 17 18 19    Next    End
Search Resource Library