mange

Results 1 - 25 of 39Sort Results By: Published Date | Title | Company Name

Warum Non-Stop-Daten den Start des Geschäftswachstums einläuten

Published By: Infinidat EMEA     Published Date: May 14, 2019
Für Geschäftsausfälle, oder zumindest für Rentabilitäts- und Gewinnverluste, wurden in den vergangenen 24 Monaten folgende Faktoren verantwortlich gemacht: Die digitale Disruption, wirtschaftliche Instabilität, politische Umwälzungen sowie ein anhaltender Fachkräftemangel. Vermutlich ist es keine große Überraschung, dass eine CEO-Umfrage von Gartner unter Geschäftsleuten ergab, dass das digitale Geschäft im nächsten Jahr oberste Priorität hat. Umfrageteilnehmer wurden gefragt, ob sie eine Management-Initiative oder ein TransformationsProgramm haben, um ihr Unternehmen digitaler zu machen. Die Mehrheit, 62 Prozent, sagte, sie hätten dies. 54 Prozent dieser Unternehmen gaben an, dass ihr digitales Geschäftsziel transformatorisch sei, während 46 Prozent angaben, das Ziel der Initiative sei die Optimierung. * Daher geht es für Unternehmen darum, zu lernen, sich zu entwickeln und agil zu sein. Zudem gilt es für sie, Technologien einzusetzen um effizienter zu konkurrieren und nicht der Trägh
Tags : 
    
Infinidat EMEA

The Forrester Wave: Cross-Channel Campaign Management Q1 2018

Published By: Adobe     Published Date: Mar 26, 2018
In our 33-criteria evalution of cross-channel campaign mangement providers, we identified the 12 most signiifcant ones.
Tags : 
    
Adobe

Secure Mobility: Windows Server 2012 helps Tame the BYOD Tide

Published By: Dell     Published Date: Oct 24, 2014
Employees are increasingly using bring-your-own devices (BYOD) to work and accessing corporate IT resources from home. Until now, management of BYOD within IT was piecemeal, with most organizations cob¬bling together solutions that included mobile device management software, unified access suites, security, and hardware. Read this technology brief to learn how Windows Server 2012 R2 takes the guesswork and integration out of BYOD security and administration, providing one point of control and management for IT organizations.
Tags : 
byod, mobile device mangement, secure mobility
    
Dell

Haribo enhances its data protection capabilities and enables rapid restores

Published By: IBM UK - ISM&S Storage     Published Date: Nov 17, 2011
Working with CVSI to deploy IBM Tivoli, BladeCenter and System Storage technologies
Tags : 
data growth, data, storage, blade, back up, backup, tivoli, rpo
    
IBM UK - ISM&S Storage

Identity as the New Perimeter: Securely Embracing Cloud, Mobile and Social Media

Published By: CA Technologies     Published Date: Jan 08, 2014
Cloud adoption, mobility, social media and the consumerization of IT are transforming many business activities for enterprise employees, partners and customers and eliminating the traditional network perimeter. Organizations have to change how they manage security and user identities if they want to keep their data and applications secure. Read this eBook to discover how a centralized identity and access management service can help you create a new identity perimeter.
Tags : 
ca technologies, identity, identity management, user provisioning, security, mobile, cloud computing, social media
    
CA Technologies

Identity as the New Perimeter: Securely Embracing Cloud, Mobile and Social Media

Published By: CA Technologies     Published Date: Jan 08, 2014
Cloud adoption, mobility, social media and the consumerization of IT are transforming many business activities for enterprise employees, partners and customers and eliminating the traditional network perimeter. Organizations have to change how they manage security and user identities if they want to keep their data and applications secure. Read this eBook to discover how a centralized identity and access management service can help you create a new identity perimeter.
Tags : 
ca technologies, identity, identity management, user provisioning, security, mobile, cloud computing, social media
    
CA Technologies

How Banca Intesa Counters Threats With HP ArcSight

Published By: HP - Enterprise     Published Date: Sep 27, 2013
Learn how Banca Intesa prepared themselves for future cyber attacks by teaming with HP and using their ArcSight security information and event management (SIEM) solution
Tags : 
banca intesa, threats, hp arcsight, cyber attacks, arcsight, security information, event mangement solutions, global cyber crime
    
HP - Enterprise

HR Strategies: Best Practices for Meeting Today's Top Challenges

Published By: SAP     Published Date: Jun 12, 2015
In this white paper you will find: • Five ways to create a high-performing global culture • Six ways to dial in your talent strategy • Five tactics for compensation managers to shift the business • Six moves for recruiting mangers to build a talent powerhouse • Five ways learning managers can make a strategic contribution
Tags : 
    
SAP

HR Strategies: Best Practices for Meeting Today's Top Challenges

Published By: SuccessFactors, an SAP Company     Published Date: Jun 18, 2015
In this white paper you will find: • Five ways to create a high-performing global culture • Six ways to dial in your talent strategy • Five tactics for compensation managers to shift the business • Six moves for recruiting mangers to build a talent powerhouse • Five ways learning managers can make a strategic contribution
Tags : 
    
SuccessFactors, an SAP Company

Track and Trace Visibility in Smart Manufacturing: Realising the Factory of the Future

Published By: Zebra Technologies     Published Date: Jun 13, 2016
Read on to find out how modern day technologies can provide a foundation for organisations to converge physical manufacturing with digital manufacturing, enabling you to better see and mange the entire ecosystem of your production facilities.
Tags : 
digital manufacturing, best practices, asset management
    
Zebra Technologies

Track-and-Trace-Transparenz in intelligenter Fertigung: Verwirklichen der Fabrik der Zukunft

Published By: Zebra Technologies     Published Date: Jun 13, 2016
Read on to find out how modern day technologies can provide a foundation for organisations to converge physical manufacturing with digital manufacturing, enabling you to better see and mange the entire ecosystem of your production facilities.
Tags : 
digital manufacturing, best practices, asset management
    
Zebra Technologies

Visibilité grâce au suivi et à la traçabilité pour une fabrication intelligente

Published By: Zebra Technologies     Published Date: Jun 13, 2016
Read on to find out how modern day technologies can provide a foundation for organisations to converge physical manufacturing with digital manufacturing, enabling you to better see and mange the entire ecosystem of your production facilities.
Tags : 
digital manufacturing, best practices, asset management
    
Zebra Technologies

Visibilità mediante monitoraggio e tracciabilità nella produzione intelligente

Published By: Zebra Technologies     Published Date: Jun 13, 2016
Read on to find out how modern day technologies can provide a foundation for organisations to converge physical manufacturing with digital manufacturing, enabling you to better see and mange the entire ecosystem of your production facilities.
Tags : 
digital manufacturing, best practices, asset management
    
Zebra Technologies

Identity as the New Perimeter: Securely Embracing Cloud, Mobile and Social Media

Published By: CA Technologies     Published Date: Jan 08, 2014
Cloud adoption, mobility, social media and the consumerization of IT are transforming many business activities for enterprise employees, partners and customers and eliminating the traditional network perimeter. Organizations have to change how they manage security and user identities if they want to keep their data and applications secure. Read this eBook to discover how a centralized identity and access management service can help you create a new identity perimeter.
Tags : 
ca technologies, identity, identity management, user provisioning, security, mobile, cloud computing, social media
    
CA Technologies

Identity as the New Perimeter: Securely Embracing Cloud, Mobile and Social Media

Published By: CA Technologies     Published Date: Jan 15, 2014
Cloud adoption, mobility, social media and the consumerization of IT are transforming many business activities for enterprise employees, partners and customers and eliminating the traditional network perimeter. Organizations have to change how they manage security and user identities if they want to keep their data and applications secure. Read this eBook to discover how a centralized identity and access management service can help you create a new identity perimeter.
Tags : 
ca technologies, identity, identity management, user provisioning, security, mobile, cloud computing, social media
    
CA Technologies

Identity as the New Perimeter: Securely Embracing Cloud, Mobile and Social Media

Published By: CA Technologies     Published Date: Jan 15, 2014
Cloud adoption, mobility, social media and the consumerization of IT are transforming many business activities for enterprise employees, partners and customers and eliminating the traditional network perimeter. Organizations have to change how they manage security and user identities if they want to keep their data and applications secure. Read this eBook to discover how a centralized identity and access management service can help you create a new identity perimeter.
Tags : 
ca technologies, identity, identity management, user provisioning, security, mobile, cloud computing, social media
    
CA Technologies

Connecting with Consumers in Life Sciences: Developing Sustainable Competitive Advantage

Published By: Merkle     Published Date: Sep 26, 2012
Download this white paper for a deeper look into the growing question surrounding the pharmaceutical industry--If customer centricity is so widely accepted as a way to unlock significant financial gains, why are companies so slow to adopt it?
Tags : 
crm, customer relationship amangement, customer centricity, connected crm, pharmaceuticals
    
Merkle

Five Ways to Transform Customer Service into a Strategic Advantage

Published By: Genesys     Published Date: Apr 25, 2013
Adopting a proactive approach to customer service has the potential to attract customers rather than losing them, to drive growth and innovation instead of hindering both.
Tags : 
customer service, cast study, change mangement, service, oriented, relationship management, customer interaction, application integration
    
Genesys

6 Must-Haves for Modern Financial Management Systems

Published By: Workday     Published Date: Sep 08, 2015
Download this white paper to understand the six key capabilities that separate Workday Financial Management from old-world business apps.
Tags : 
financial systems, finance technology, workday, security, payroll software, financial management, cloud computing, modern financial mangement system
    
Workday

The Total Economic Impact of VMware vCenter Site Recovery Manager: Forrester TEI Study

Published By: VMware, Inc     Published Date: Dec 05, 2013
Executive Summary: In November 2012, Vmware Commissioned Forrester Consulting to examine the total economic impact and potential return on investment (ROI) enterprises may realize by deploying Vmware vCenter Site Recovery Manager (SRM). The purpose of this study is to provide readers with a framework to evaluate the potential financial impact of the VMware vCenter Site Recovery Manger on their organizations. Please download the white paper to learn more.
Tags : 
vmware, roi, return on investment enterprises, vmware vcenter site recovery manager, forrester consulting. srm, networking, it management, knowledge management
    
VMware, Inc

Tech Tips: VMware Horizon Mirage

Published By: VMware, Inc     Published Date: Dec 05, 2013
VMware® Horizon Mirage™ is a layered image management solution that separates a PC into logical layers that either IT or the user own and manage. IT-owned layers are typically OS and corporate applications while user-owned layers consist of their own files and applications. The Horizon Mirage solution enables: • Updates to individual IT-managed layers, such as core operating system files and common business applications, without disrupting other layers, all while maintaining user data and installed applications. • Simpler backup by taking snapshots of layered images, enabling desktop disaster recovery and helping to ensure continued end-user productivity.
Tags : 
vmware, horizon mirage, image management solutions, it-owned layers, corporate applications, it-manged layers, core operating system files, desktop disaster recovery
    
VMware, Inc

Security Explorer trial download

Published By: Dell Software     Published Date: Oct 01, 2012
Quest® Security Explorer.
Tags : 
security management, desktop mangement, servers, windows servers, sql servers
    
Dell Software

Enterprise Marketing Management

Published By: IBM     Published Date: Oct 24, 2012
Enterprise Marketing Management, is a software technology solution for marketing organizations that provides a comprehensive marketing platform for managing customer and prospect interactions throughout the customer life-cycle. Read on to learn more.
Tags : 
ibm, emm, enterprise marketing mangement, knowledge, integration, enterprise applications, cross channel profile
    
IBM

Learn the Best Practices of Virtualizing Business-Critical Applications

Published By: VMTurbo     Published Date: Dec 09, 2013
Learn the best practices of virtualizing business-critical applications and overcome the major challenges that your organization might be facing with your virtualization management.
Tags : 
vmturbo, virtualization, business critical applications, applications, applications management, consolidation, workload, application performance
    
VMTurbo

Financial firm deploys virtualization solution in 1/10 the time of other tested deployments

Published By: Scale Computing     Published Date: Sep 24, 2012
Learn how this organization was able to virtualize their environment in under an hour and at a fraction of the cost of other solutions. Read the complimentary case study now.
Tags : 
vmware, virtualization, infrastructure, high availability, storage cluster, data cluster, clustering, storage
    
Scale Computing
Previous   1 2    Next    
Search      

Add Research

Get your company's research in the hands of targeted business professionals.