gesti de ti

Results 176 - 200 of 241Sort Results By: Published Date | Title | Company Name

Android en Manufactura

Published By: Zebra Technologies     Published Date: Oct 04, 2017
Como evitar elegir el dispositivo incorrecto para su aplicación. Para saber más sobre cada consideración, descargue nuestro documento técnico. El documente provee razones convincentes para elegir los dispositivos de nivel empresarial en lugar de dispositivos de nivel de consumidor, incluyendo: • Las principales comparaciones de rendimiento de escaneo • La importancia de la gestión de energía y los accesorios correctos • La importancia de la conectividad y por qué no todos los dispositivos son iguales
Tags : 
mobile technologies, machine to machine communication, automation increase, accurate data capture, team collaboration, tc56, mc67, tc55
    
Zebra Technologies

Android en Logística y Servicios de Envío

Published By: Zebra Technologies     Published Date: Oct 04, 2017
Como evitar elegir el dispositivo incorrecto para su aplicación. Para saber más sobre cada consideración, descargue nuestro documento técnico. El documente provee razones convincentes para elegir los dispositivos de nivel empresarial en lugar de dispositivos de nivel de consumidor, incluyendo: • Las principales comparaciones de rendimiento de escaneo • La importancia de la gestión de energía y los accesorios correctos • La importancia de la conectividad y por qué no todos los dispositivos son iguales
Tags : 
mobile technologies, machine to machine communication, automation increase, accurate data capture, team collaboration, tc56, mc67, tc55
    
Zebra Technologies

The Definitive Guide to Data Quality

Published By: Talend     Published Date: Nov 02, 2018
Siloed data sources, duplicate entries, data breach risk—how can you scale data quality for ingestion and transformation at big data volumes? Data and analytics capabilities are firmly at the top of CEOs’ investment priorities. Whether you need to make the case for data quality to your c-level or you are responsible for implementing it, the Definitive Guide to Data Quality can help. Download the Definitive Guide to learn how to: Stop bad data before it enters your system Create systems and workflow to manage clean data ingestion and transformation at scale Make the case for the right data quality tools for business insight
Tags : 
    
Talend

La compagnie aérienne Europe Airpost sécurise son infrastructure poste de travail

Published By: RES Software     Published Date: Apr 08, 2013
RES Software, éditeur leader de solutions de poste de travail dynamique, annonce le déploiement de sa solution de gestion des environnements de travail au sein de la compagnie aérienne Europe Airpost. Europe Airpost, est l’une des principals compagnie aérienne française. Elle est membre du groupe international de services aériens ASL Aviation.
Tags : 
    
RES Software

La gestion des espaces de travail utilisateur et virtualisation des postes de travail

Published By: RES Software     Published Date: Apr 08, 2013
Ce livre blanc a pour objectif de décrire les principes de base de la gestion des espaces de travail utilisateur et son rôle stratégique dans les projets de virtualisation de postes de travail. Bon nombre de professionnels de l’informatique et d’analystes s’accordent aujourd’hui à dire que l’avenir des environnements informatiques d’entreprise est aux configurations hybrides alliant postes de travail traditionnels, clients légers, terminaux distants et postes de travail virtuels, une évolution qui complique considérablement le contrôle des données utilisateur par les administrateurs informatiques et appelle à imaginer de nouvelles méthodes de gestion des espaces de travail utilisateur.
Tags : 
    
RES Software

Le Groupe Chèque Déjeuner transforme et sécurise sa stratégie d’environnement de travail

Published By: RES Software     Published Date: Apr 08, 2013
RES Software, éditeur leader de solutions de poste de travail dynamique, annonce le déploiement de sa solution de gestion des environnements de travail au sein du Groupe Chèque Déjeuner. Le Groupe Chèque Déjeuner est une entreprise sociale créée en 1964, considéré comme le numéro 3 mondial sur le marché des titres spéciaux de paiement à vocation sociale et culturelle. Fort d’une présence à l’international dans 13 pays, regroupant plus de 2130 collaborateurs, en 2011, le Groupe Chèque Déjeuner a realise un volume d’affaires de 4,3 milliards d’euros et un chiffre d’affaires de 290,3 millions.
Tags : 
    
RES Software

GESTIONE DELL'ENTERPRISE MOBILITY UTENTI MOBILI PIÙ PRODUTTIVI. IT PIÙ POTENTE.

Published By: VMware AirWatch     Published Date: Nov 12, 2015
GESTIONE DELL'ENTERPRISE MOBILITY UTENTI MOBILI PIÙ PRODUTTIVI. IT PIÙ POTENTE.
Tags : 
mobile empowerment, airwatch, mobile, cloud, it management, wireless, knowledge management, data management
    
VMware AirWatch

Meilleures pratiques en matière de mobilité d’entreprise: gestion des terminaux mobiles ou les deux?

Published By: VMware AirWatch     Published Date: Nov 12, 2015
Il y a moins d’un an, les prévisions des analystes avaient laissé croire aux fervents défenseurs de la mobilité qu’une catastrophe allait toucher de plein fouet le secteur de la gestion des terminaux mobiles. Lors d’un événement réservé aux analystes qui s’est tenu en 2013, un panel de spécialistes indiquait que l’utilisation des terminaux personnels allait aboutir à une réduction des prix et faire chuter les ventes. Ils annonçaient la mort de cette industrie. « La gestion des terminaux mobiles est actuellement totalement chaotique et je pense que ce marché est en train de mourir, » déclarait l’analyste Gartner John Girard (CRN.com). John Girard avait prédit une nouvelle orientation dans la gestion de terminaux personnels qui consiste à gérer uniquement les applications pour répondre à la résistance que montraient les employés devant la gestion par l’entreprise de leurs terminaux personnels.
Tags : 
mdm, containerization, security, enterprise mobility, enterprise applications, business technology
    
VMware AirWatch

Best practice di Enterprise Mobility: MDM, containerizzazione o entrambi?

Published By: VMware AirWatch     Published Date: Nov 12, 2015
Nemmeno un anno fa, le previsioni degli analisti inducevano gli entusiasti della mobility a ritenere che il destino del settore del Mobile Device Management (MDM) fosse ormai segnato. In occasione di una convention di analisti svoltasi nel 2013, un gruppo di esperti aveva espresso la convinzione che il fenomeno del BYOD (Bring Your Own Device) avrebbe portato a una forte riduzione dei prezzi, a un crollo delle vendite e alla fine di un intero settore. Così si rivolgeva l'analista di Gartner John Girard alla platea dei partecipanti (fonte: CRN.com): "Il mercato del Mobile Device Management è in pieno marasma e a mio parere ha i giorni contati". Girard prevedeva che il trend del BYOD e la refrattarietà dei dipendenti alla gestione dei dispositivi personali avrebbero reso necessaria la transizione verso un modello di gestione a livello di applicazione.
Tags : 
mdm, containerization, security, enterprise mobility, enterprise applications, business technology
    
VMware AirWatch

Whitepaper: Best Practices for Implementing Security Awareness Training (Osterman)

Published By: Mimecast     Published Date: Oct 22, 2018
What if your employees were more informed about security threats, more skeptical about what they receive in email, and less likely to click on malicious links in email without first verifying them? There are some impactful, quick wins that you and your organization can realize by implementing security awareness training. This recent in-depth survey of security professionals by Osterman Research shows that the leading security concerns across organizations are all areas in which security awareness training can yield significant benefits. Here are some suggestions on processes and practices to consider when developing a security awareness training program that will actually change behavior and make the organization less likely to fall prey to a cyberattack.
Tags : 
    
Mimecast

How To Become A Recruiting Powerhouse: A Practical Guide for HR and Hiring Managers

Published By: Jobvite     Published Date: Mar 31, 2015
Recruiting has traditionally been considered a function of Human Resources, but with new tools on the market and new strategies in the air, some are saying it belongs with the marketing team. Others are suggesting Talent Acquisition be pulled out into it’s own unique department in larger organizations. There are innovative strategies that address the changing landscape of digital relationships and networks, and powerful new tools that can seem magical when you’re trying to find the perfect candidate for the available position. Understanding these strategies and harnessing these tools will prepare you to source, screen, interview and hire the best talent for your growing organization. Read this ebook to learn more.
Tags : 
hiring, employment, jobseekers, talent acquisition, interview, sourcing, talent pools
    
Jobvite

Data Lakes, Purposes, Practices, Patterns and Platforms

Published By: SAS     Published Date: Mar 06, 2018
When designed well, a data lake is an effective data-driven design pattern for capturing a wide range of data types, both old and new, at large scale. By definition, a data lake is optimized for the quick ingestion of raw, detailed source data plus on-the-fly processing of such data for exploration, analytics, and operations. Even so, traditional, latent data practices are possible, too. Organizations are adopting the data lake design pattern (whether on Hadoop or a relational database) because lakes provision the kind of raw data that users need for data exploration and discovery-oriented forms of advanced analytics. A data lake can also be a consolidation point for both new and traditional data, thereby enabling analytics correlations across all data. With the right end-user tools, a data lake can enable the self-service data practices that both technical and business users need. These practices wring business value from big data, other new data sources, and burgeoning enterprise da
Tags : 
    
SAS

GESTION DE L' INFORMATION ET DES DOCUMENTS : POUR PARTIR SUR DE BONNES BASES

Published By: Iron Mountain     Published Date: Jun 01, 2015
Il constitue une étape cruciale non seulement pour assurer la conformité avec la législation, mais aussi pour contrôler les coûts et garantir que vos données sont disponibles à tout moment – quel que soit leur emplacement.
Tags : 
storage management, web service security, business management, collaboration, content delivery, document management, records management, desktop management
    
Iron Mountain

Failure to Launch: From Big Data to Big Decisions

Published By: Forte Wares     Published Date: Jun 24, 2014
The key to making big data initiatives a success lies within making the produced data more digestible and usable in decision making, rather than making it just ‘more,’ resulting in the creation of an environment wherein information is used to generate real impact. Put another way, the survival of Big Data is more about making the right data (not just higher volume) available to the right people (not just higher variety) at the right time (not just higher velocity).
Tags : 
    
Forte Wares

Data Lakes, Purposes, Practices, Patterns and Platforms

Published By: SAS     Published Date: Aug 28, 2018
When designed well, a data lake is an effective data-driven design pattern for capturing a wide range of data types, both old and new, at large scale. By definition, a data lake is optimized for the quick ingestion of raw, detailed source data plus on-the-fly processing of such data for exploration, analytics and operations. Even so, traditional, latent data practices are possible, too. Organizations are adopting the data lake design pattern (whether on Hadoop or a relational database) because lakes provision the kind of raw data that users need for data exploration and discovery-oriented forms of advanced analytics. A data lake can also be a consolidation point for both new and traditional data, thereby enabling analytics correlations across all data. To help users prepare, this TDWI Best Practices Report defines data lake types, then discusses their emerging best practices, enabling technologies and real-world applications. The report’s survey quantifies user trends and readiness f
Tags : 
    
SAS

How to Choose a Data Management Platform (DMP)

Published By: APSALAR     Published Date: Jun 03, 2015
Because a DMP is a complex piece of technology, it can feel daunting for a marketer to thoughtfully evaluate alternatives. That’s why we’ve created this paper – to help simplify and streamline the process by suggesting a short list of questions that get to the heart of what matters strategically in a DMP so that you can make your decision with a focused yet sufficient set of information.
Tags : 
    
APSALAR

Financial Instruction Advantage and the Optimization of Information Processing

Published By: SAS     Published Date: Feb 09, 2016
In this ebook, we provide some suggestions as to how firms might approach model risk measurement under the assumption that the firm has control over its broader information infrastructure, or at least is on a committed path toward that goal.
Tags : 
sas, white paper, information processing, best practices, model risk measurement, networking, it management, wireless
    
SAS

TDWI Best Practices: Data Lakes, Purposes, Practices, Patterns and Platforms (customized reports)

Published By: SAS     Published Date: Oct 18, 2017
When designed well, a data lake is an effective data-driven design pattern for capturing a wide range of data types, both old and new, at large scale. By definition, a data lake is optimized for the quick ingestion of raw, detailed source data plus on-the-fly processing of such data for exploration, analytics and operations. Even so, traditional, latent data practices are possible, too. Organizations are adopting the data lake design pattern (whether on Hadoop or a relational database) because lakes provision the kind of raw data that users need for data exploration and discovery-oriented forms of advanced analytics. A data lake can also be a consolidation point for both new and traditional data, thereby enabling analytics correlations across all data. To help users prepare, this TDWI Best Practices Report defines data lake types, then discusses their emerging best practices, enabling technologies and real-world applications. The report’s survey quantifies user trends and readiness f
Tags : 
    
SAS

Risk Mitigation: Keeping Employee Risk from Becoming Insider Threat

Published By: SpectorSoft     Published Date: Jan 23, 2015
This White Paper will present some common sense suggestions for improving the “beginning of the lifecycle” risk mitigation process. In other words, ways to add a bit more intelligence beginning with the screening and hiring process. Then, we’ll look at how to tie the efforts made at the beginning of the lifecycle to the rest of the employee lifecycle, using a combination of process and tools to significantly improve security, and reduce the chances of an insider incident.
Tags : 
spectorsoft, risk mitigation, insider threat, background checks, screening process, hiring process, networking, security
    
SpectorSoft

Bolster Network Security with VPN Load Balancing and Redundancy

Published By: Ecessa Corporation     Published Date: Mar 11, 2009
Today’s Wide Area Networks (WANs) are experiencing increased saturation with the deployment of bandwidth-intensive applications, increased numbers of users, and the need for reliable security transmissions. IT personnel responsible for these issues acknowledge the increased congestion and have strived to maintain high levels of network performance. At the same time, IT departments are tasked with the job of lowering the cost of network infrastructure and ongoing operations. Network administrators continually face the challenge of balancing the increased use of critical applications on the Internet, while eliminating downtime and congestion from affecting user quality and day-to-day business operations.
Tags : 
adsl load balancing, vpn load balancing and redundancy, bandwidth aggregation, qos, bandwidth control, bandwidth management, multi-homing, bgp multihoming
    
Ecessa Corporation

Le Groupe Chèque Déjeuner transforme et sécurise sa stratégie d’environnement de travail

Published By: RES Software     Published Date: Apr 08, 2013
RES Software, éditeur leader de solutions de poste de travail dynamique, annonce le déploiement de sa solution de gestion des environnements de travail au sein du Groupe Chèque Déjeuner. Le Groupe Chèque Déjeuner est une entreprise sociale créée en 1964, considéré comme le numéro 3 mondial sur le marché des titres spéciaux de paiement à vocation sociale et culturelle. Fort d’une présence à l’international dans 13 pays, regroupant plus de 2130 collaborateurs, en 2011, le Groupe Chèque Déjeuner a realise un volume d’affaires de 4,3 milliards d’euros et un chiffre d’affaires de 290,3 millions.
Tags : 
    
RES Software

Le guide permanent de la Gestion des incidents

Published By: NAVEX Global     Published Date: Jan 11, 2018
NAVEX Global recommande l’utilisation d'un logiciel (tel que le logiciel de gestion des incidents EthicsPoint™) pour bénéficier d'une approche cohérente de recueil de données et d’outils applicables à l’ensemble de l’entreprise pour gérer plusieurs programmes de signalement. Les utilisateurs sont ainsi en mesure d’identifier facilement les tendances concrètes, d’atténuer les risques et de gérer un programme efficace de gestion des incidents où qu’ils se trouvent, tout en restant ouverts aux audits et informés des évolutions constantes de leur environnement professionnel. Un système solide de gestion des incidents n’est pas seulement essentiel pour susciter l’implication des employés et développer un climat de confiance au sein d'une entreprise, c’est également une composante cruciale de protection des employés, de la réputation et de la santé financière de l’entreprise.
Tags : 
planification, mise en ceuvre, evaluation, ressources, supplementaires, navex
    
NAVEX Global

Gestión de Riesgo en una era de Complejidad

Published By: SAP     Published Date: Nov 06, 2015
La gestión del riesgo nunca ha sido tan importante para las empresas, ni tampoco tan difícil. Una nueva investigación mundial encargada por SAP reveló que un entorno cada vez más complejo de riesgos y negocios está presentando importantes desafíos para las compañías. La encuesta realizada por Loudhouse Research a 1.010 ejecutivos con responsabilidad sobre la gobernanza, riesgo y cumplimiento (GRC) de sus organizaciones descubrió que la creciente complejidad normativa y del riesgo ahora es la mayor presión hecha a las funciones de GRC en las organizaciones.
Tags : 
    
SAP

Meilleures pratiques en matière de mobilité d’entreprise :

Published By: VMware AirWatch     Published Date: Oct 02, 2015
John Girard avait prévu une nouvelle orientation dans la gestion de niveau application qui était liée à l’utilisation de terminaux personnels et à la résistance que montraient les employés devant la gestion par l’entreprise de leurs terminaux personnels.
Tags : 
mdm, containerization, security, enterprise mobility, mobile computing, mobile data systems, mobile workers, best practices
    
VMware AirWatch

Prácticas recomendadas de movilidad empresarial:

Published By: VMware AirWatch     Published Date: Oct 02, 2015
Hace menos de un año, las predicciones de los analistas inducían a los entusiastas de la movilidad a creer que se acercaba el día del juicio final para el sector de la gestión de dispositivos móviles (MDM).
Tags : 
mdm, containerization, security, enterprise mobility, mobile computing, mobile data systems, mobile workers, best practices
    
VMware AirWatch
Start   Previous    1 2 3 4 5 6 7 8 9 10    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.