corporate app

Results 176 - 200 of 200Sort Results By: Published Date | Title | Company Name

Adopting Lean Manufacturing in Packaging and Printing: How an ERP System Can Help

Published By: Radius Solutions     Published Date: Apr 29, 2008
"Lean" is defined as a process to improve manufacturing and service operations, reduce waste, improve quality and drive down cost. While many packaging companies have embraced a number of Lean Manufacturing concepts, many have yet to fully realize the benefits of a fully-integrated Lean environment. Leveraging an ERP system that embraces "Lean" principles and incorporates industry specific best practices can facilitate and support the process. In this white paper, learn how lean manufacturing can apply to printing and packaging, and how an ERP system fits into the process.
Tags : 
erp, lean, lean methods, lean manufacturing, printing, packaging, radius, radius solutions
    
Radius Solutions

Comparison of FTP and Signiant

Published By: Signiant Inc.     Published Date: Aug 14, 2008
FTP (File Transfer Protocol) is used to perform file transfers over Internet Protocol (IP) networks such as the public Internet and corporate intranets. FTP is widely deployed and is widely accepted as a file transfer solution. However, are there downsides to using FTP for file transfers? This paper compares FTP with file transfer methodologies of Signiant's software applications and identifies the shortcomings of FTP that Signiant was designed to overcome.
Tags : 
signiant, ftp, file transfer, file transfer protocol, content delivery
    
Signiant Inc.

E-Metrics: Business Metrics For The New Economy

Published By: RisingMedia     Published Date: Oct 14, 2008
Defining specific metrics for measuring the success of a Web site is a daunting task. The inability to identify proper criteria and meaningful calculations is hampering the e-business world's capacity to determine the value of corporate Web sites and to set appropriate budgets for their development.
Tags : 
emetrics, risingmedia, netgenesis, e-business, roi metrics
    
RisingMedia

Fraud Prevention & Detection for Mission Critical Spreadsheets

Published By: Prodiance Corp.     Published Date: Dec 22, 2008
According to Baseline Consulting, approximately 32% of corporate data is contained in enduser computing (EUC) applications and approximately 68% is stored in IT controlled applications. These EUCs – primarily spreadsheets, PC databases (e.g. Access databases), BI reports, and word documents – are often stored on employee desktops and corporate file shares, and for the most part, are uncontrolled. They lack the proper safeguards and controls one would expect with IT controlled applications, including documentation, version control, back-up and archival, change control, testing, security and access control, and more.
Tags : 
prodiance, end-user computing (euc), risk assessment, automation, monitoring, spreadsheet, link migration, networking
    
Prodiance Corp.

Identity Enabled Web Services: Standards-based identity for Web 2.0

Published By: Ping Identity     Published Date: May 05, 2009
Web Services are emerging as the preeminent method for program-to-program communication across corporate networks as well as the Internet. Securing web Services has been a challenge until recently, as typical Web authentication and authorization techniques employed browser-to-server architectures (not program-to-program). This resulted in user identity ending at the Web Application Server, forcing the Web Services Provider to trust blindly that the Web Services Requester had established identity and trust with the end user.
Tags : 
pingidentity, sso, standards-based, web 2.0, identity enabled, browser-to-server, soap, saml
    
Ping Identity

Learning Management Systems: Development Strategies for the Next Generation

Published By: Lionbridge     Published Date: Nov 19, 2009
This paper will interest ISV product managers and engineers of educational software products, chief learning officers and chief technology officers of corporate universities, along with information technology personnel at the community and state college level, including developers of custom applications & application services.
Tags : 
learning management systems, srcom 2004, saas, cms, ldap-based sso, isv product managers, educational software products, custom applications
    
Lionbridge

Five Best Practices of High-performing Corporate Wellness Programs

Published By: Virgin Pulse     Published Date: Jun 26, 2013
Discover how you can leverage these five best practices of high-performing corporate wellness programs to make your wellness initiatives more successful in reaching the end game: healthier, happier, and more-productive employees.
Tags : 
corporate wellness, heathcare, healthcare reform, benefits, corporate culture, employee hapiness, shrm, employee engagement
    
Virgin Pulse

Giant Tiger bridges the gap in financial planning - Aligning local stores with corporate objectives

Published By: IBM Software     Published Date: Oct 04, 2011
With a network of more than 200 stores across Canada, Giant Tiger wanted to find a better way to align local financial and operational planning with central corporate objectives. Learn how they automated budgeting and forecasting processes and enabled store-based users to enter actual data directly into the system via a simple web interface to reduce the budgeting cycle by up to 85 percent, save approximately 220 hours per month for store-based staff, and receive a full return on investment within 24 months.
Tags : 
customer, perfomance management, technology, ibm, planning objectives, budget, forecasting, investment
    
IBM Software

Sustainable Compliance: How to Align Compliance, Security and Business Goals

Published By: NETIQ     Published Date: Mar 12, 2013
Regulatory compliance has become an important corporate initiative as the complexity and scope of the regulatory environment increases. Organizations are searching for an effective, sustainable, and scalable approach that will achieve their compliance
Tags : 
security, compliance, it security, sustainable compliance, security management, it management, business technology
    
NETIQ

HP Converged Storage: Simplify and Optimize Your Virtualization and Cloud Deployment

Published By: HP and Intel ®     Published Date: May 06, 2013
In today’s hyperconnected world—with its multiple mobile devices, ubiquitous Internet access and pervasive social media platforms—people expect immediate access to information and services. These expectations are increasingly felt in corporate IT departments, where business units demand instant applications and fast services. Virtualization and cloud computing can help corporate IT meet these demands by bringing more flexibility and agility to the environment. But the ultimate solution is to transform the way IT is delivered. Indeed, many enterprises have already started on the journey toward the IT as a service (ITaaS) model.
Tags : 
    
HP and Intel ®

Users want Mobile File Access. IT Managers want Control. You can have Both.

Published By: Globalscape     Published Date: Mar 21, 2014
This whitepaper examines the way in which enterprise mobility has both increased employee productivity and decreased the security of corporate networks. The paper discusses the challenges IT managers have with controlling the "Bring Your Own Device" (BYOD) trend to allow mobile users to have access to the corporate network. Explained in the paper is the limit to visibility and control of file transfers when employees use ad hoc methods, and that educating employees on proper data access is not enough to protect the corporate network. The paper concludes by describing how Globalscape's EFT™ and Tappin™ can provide mobile access, without compromising security and controls over file sharing.
Tags : 
mobile, mobile access, remote access, byod, smartphones, tablets, laptops, ad hoc
    
Globalscape

Mobile Data Security: Finding the Balance

Published By: IBM MaaS360     Published Date: Feb 05, 2015
Bring Your Own Device has changed the rules for corporate security on smartphones and tablets. Companies need to find the right balance in securing email, apps and content without compromising user experience.
Tags : 
data security, byod, corporate security, mobile data security, user experience, security, it management, data management
    
IBM MaaS360

MobileIron Delivers Strong Security and Modern Management to Macs

Published By: MobileIron     Published Date: Feb 26, 2018
Enterprises are increasingly expected to support Macs as corporateapproved devices. In order to be in compliance, it is imperative that all devices accessing sensitive corporate and customer data be fully secured and managed. MobileIron delivers a new model for authentication and identity to Macs and enables enterprises to unify Apple mobile and desktop operations using a common security and management platform. MobileIron’s layered security can be extended to not only corporate-owned Macs, but to employee-owned devices as well. And, IT organizations can bring Macs under management across the organization with unparalleled speed and at scale thanks to seamless integration with Apple’s Device Enrollment Program (DEP) and Volume Purchase Program (VPP).
Tags : 
    
MobileIron

Efficient, Cost-Effective VDI Expansion on Converged Infrastructure

Published By: Dell EMC     Published Date: Feb 23, 2017
Business leaders are increasingly looking to IT to deliver a mobile workspace that allows employees to access corporate data, applications, and communication resources on their devices of choice. But making the most of the opportunity while minimizing risks can be complex and overwhelming for many IT teams. Therefore, it makes more sense than ever for IT leaders to consider virtual client computing (VCC), also commonly referred to as virtual desktop infrastructure (VDI) solutions.
Tags : 
    
Dell EMC

Be Prepared for the Next Frontier in ERM—Strategic Risk

Published By: IBM     Published Date: Jul 14, 2016
Enterprise risk management (ERM) is moving to the top of corporate agendas, and evidence shows strategic risk is a key factor in a robust ERM framework. Check out this white paper from risk management pioneer James Lam. In it, Lam explains why every organization should be focusing on strategic risk. You'll learn how to integrate risks into the planning process, use economic capital and risk-adjusted return on capital to measure risk, and how to apply these results.
Tags : 
best practices, risk management, enterprise, technology, frontier, it management, enterprise applications, business technology
    
IBM

Best-of-Breed Enterprise Mac Management

Published By: Jamf     Published Date: Jun 07, 2018
A decade ago, Mac was an uncommon sight in many businesses and routinely ignored by corporate IT — but times have changed. Today, employee-choice programs are driving Mac growth in enterprises with 72 percent of employees choosing Mac over PC when given the chance. Now, the need to properly deploy, manage and secure Apple is at an all-time high. This white paper examines how purpose-built management solutions are essential to a successful Apple strategy, and walks you through: • The current state of enterprise management solutions • Features required for best-of-breed Apple management • How Jamf and Microsoft are delivering co-management to the enterprise
Tags : 
    
Jamf

(DELETE)Best Practices For Mobile Application Lifecycle Management

Published By: IBM     Published Date: Apr 20, 2017
Security from design through deployment. Mobile devices are now a reality in many organizations. Building on Mobile Device Management (MDM) and Mobile Application Management (MAM), organizations are increasingly developing their own enterprise apps for specific job tasks to improve productivity, business partnerships, customer satisfaction and bottom-line performance. However, to achieve these benefits, it is imperative that mobile security best practices are incorporated throughout the lifecycle of the application.
Tags : 
    
IBM

Best Practices For Mobile Application Lifecycle Management

Published By: IBM     Published Date: Apr 20, 2017
Security from design through deployment. Mobile devices are now a reality in many organizations. Building on Mobile Device Management (MDM) and Mobile Application Management (MAM), organizations are increasingly developing their own enterprise apps for specific job tasks to improve productivity, business partnerships, customer satisfaction and bottom-line performance. However, to achieve these benefits, it is imperative that mobile security best practices are incorporated throughout the lifecycle of the application.
Tags : 
application management, application development, organization optimization, authentication, application security, enterprise applications, app blocking
    
IBM

Ten rules For Bringing Your Own Device (BYOD)

Published By: IBM     Published Date: Apr 20, 2017
Learn how to protect corporate data when users use personal devices for work. The rapid proliferation of mobile devices entering the workplace appears to be like divine intervention to many IT leaders. Mobile devices and their apps have transformed the way we live – how we communicate, travel, shop, work and so much more. This mobility transformation has been so radical, so revolutionary, that it is hard to imagine life without these devices. Bring Your Own Device (BYOD) was born and employees followed with fervor.
Tags : 
data management, data system, business development, software integration, resource planning, enterprise management, data collection
    
IBM

Unified Endpoint Management: the Next Step in the Evolution of Device Management

Published By: VMware     Published Date: Feb 24, 2017
Mobile device management (MDM) tools allow companies to connect their employees securely to basic corporate network resources. Enterprise mobility management (EMM) goes a step further by enabling secure mobile versions of business-critical applications and data loss prevention to protect corporate information. But in today's workplace, employees and businesses deal with a vast variety of devices with different operating systems and form factors, from PCs and laptops, to tablets and smartphones, and now, increasingly wearables and Internet of Things (IoT) endpoints. The solution is unified endpoint management (UEM), which enables organizations to take a consistent approach to manage and secure every endpoint, any app and content, and across deployment use cases from a single holistic platform. Read this whitepaper to uncover VMware AirWatch®'s leading UEM approach that is benefiting organizations tremendously.
Tags : 
    
VMware

Magic Quadrant for Cloud Strategic Corporate Performance Management Solutions

Published By: Host Analytics     Published Date: Aug 01, 2017
Summary Strategic corporate performance management solutions support the office of finance's efforts to manage organizational performance and strategy. Application leaders should use this Magic Quadrant to identify vendors that are a good match for their business needs. Strategic Planning Assumptions By 2020, at least 75% of organizations will seek to improve the accuracy and actionability of financial planning and analysis by using operational data from multiple business domains. By 2020, at least 25% of organizations will achieve more collaborative, continuous and consistent financial planning and performance management by closely linking key operational and financial planning processes.
Tags : 
    
Host Analytics

Inside BIGDATA Guide to Predictive Analytics

Published By: TIBCO Software     Published Date: May 31, 2018
Predictive analytics, sometimes called advanced analytics, is a term used to describe a range of analytical and statistical techniques to predict future actions or behaviors. In business, predictive analytics are used to make proactive decisions and determine actions, by using statistical models to discover patterns in historical and transactional data to uncover likely risks and opportunities. Predictive analytics incorporates a range of activities which we will explore in this paper, including data access, exploratory data analysis and visualization, developing assumptions and data models, applying predictive models, then estimating and/or predicting future outcomes.
Tags : 
    
TIBCO Software

Inside BIGDATA Guide to Predictive Analytics

Published By: TIBCO Software     Published Date: May 31, 2018
Predictive analytics, sometimes called advanced analytics, is a term used to describe a range of analytical and statistical techniques to predict future actions or behaviors. In business, predictive analytics are used to make proactive decisions and determine actions, by using statistical models to discover patterns in historical and transactional data to uncover likely risks and opportunities. Predictive analytics incorporates a range of activities which we will explore in this paper, including data access, exploratory data analysis and visualization, developing assumptions and data models, applying predictive models, then estimating and/or predicting future outcomes. Download now to read on.
Tags : 
    
TIBCO Software

Inside BIGDATA Guide to Predictive Analytics

Published By: TIBCO Software     Published Date: May 31, 2018
Predictive analytics, sometimes called advanced analytics, is a term used to describe a range of analytical and statistical techniques to predict future actions or behaviors. In business, predictive analytics are used to make proactive decisions and determine actions, by using statistical models to discover patterns in historical and transactional data to uncover likely risks and opportunities. Predictive analytics incorporates a range of activities which we will explore in this paper, including data access, exploratory data analysis and visualization, developing assumptions and data models, applying predictive models, then estimating and/or predicting future outcomes. Download now to read on.
Tags : 
    
TIBCO Software

Gartner Market Guide for Online Fraud Detection

Published By: Sift     Published Date: Jul 12, 2019
"As online fraud detection grows in complexity and demand, what qualities should security and risk management leaders look out for in a solution? Get key recommendations for navigating the online fraud detection market from Gartner Research. READ THIS GUIDE TO FIND OUT: Where the online fraud detection market is heading A list of vendors in the online fraud detection space, and their capabilities Recommendation for how to incorporate AI and machine learning into your fraud prevention approach "
Tags : 
    
Sift
Start   Previous    1 2 3 4 5 6 7 8     Next   End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.