mapping

Results 126 - 150 of 173Sort Results By: Published Date | Title | Company Name

Communications Compliance - An Information Guide

Published By: NACR     Published Date: Feb 09, 2015
Do you know what the compliance issues are for your organization and the technology solutions you might consider? Download this guide to learn what you need to know.
Tags : 
nacr, compliance, technology, technology solutions, regulations, software compliance – contact center, data security, customer security, hippa, biometrics, wfo, speech analytics, sarbanes-oxley, big data, telecommuting, remote agent, telemarketing, caller id, call recording, predictive dialers
    
NACR

BlueWorks: The easy on-ramp to Business Process Management (BPM).

Published By: IBM     Published Date: Oct 09, 2009
With BPM BlueWorks from IBM, it's never been easier to get started with BPM. Using cloud-based processes and strategy tools, BPM BlueWorks allows you to capture and collaborate on BPM Business Designs, discover and contribute industry-specific BPM content and participate easily in the community. See how today.
Tags : 
business process management, bpm, blueworks, cloud computing, mapping tools, process modeling, deployment, ibm
    
IBM

Top 5 Reasons Managed Services Make Sense

Published By: Liaison Technologies     Published Date: Feb 07, 2014
Learn why businesses are increasingly using a managed services approach for their EDI/B2B needs. You too may consider it for your business.
Tags : 
liaison, electronically exchange, managed services, manage data, b2b, data management, enterprise application integration, eai, business integration, service provider, it systems, it functions, productivity, partner management, core competency, integration platform, change management, edi vendors, data infrastructure, data mapping
    
Liaison Technologies

Cloud: Taking the Hybrid Approach

Published By: Liaison Technologies     Published Date: Feb 07, 2014
Businesses and their IT departments are increasingly looking into the Cloud to drive innovation and increase business agility. Are you on the cloud?
Tags : 
liaison, the cloud, cloud computing, hybrid approach, hybrid business, business agility, increase innovation, applications or processes, electronically exchange, managed services, manage data, b2b, data management, enterprise application integration, data infrastructure, data mapping, connectivity protocols, it management, application integration, data integration
    
Liaison Technologies

Discover and Visualize Your Dynamic IT Infrastructure Solution Brief

Published By: IBM Corporation     Published Date: Jun 30, 2011
IBM Tivoli Application Dependency Discovery Manager supports the alignment of IT and business with robust and automated application mapping and discovery that helps organizations understand the impact of change and meet compliance needs with detailed reporting and auditing.
Tags : 
energy management, tivoli, disaster prevention, infrastructure, bms, building management system, ecosystem, opc, power and cost savings, energy optimization, backup and recovery, compliance
    
IBM Corporation

What is Projection Mapping?

Published By: Epson     Published Date: Jun 22, 2018
Projection mapping is the projection of video, animation, and other colorful displays onto three-dimensional surfaces within venues, such as sports stadiums, night clubs, and concert halls. Once available for only big-budget productions, recent advances in projector technology deliver affordable, bright, high-quality, high-lumens projection that is within the reach of virtually any venue owner or manager.
Tags : 
    
Epson

Identity Enabled Web Services: Standards-based identity for Web 2.0

Published By: Ping Identity     Published Date: May 05, 2009
Web Services are emerging as the preeminent method for program-to-program communication across corporate networks as well as the Internet. Securing web Services has been a challenge until recently, as typical Web authentication and authorization techniques employed browser-to-server architectures (not program-to-program). This resulted in user identity ending at the Web Application Server, forcing the Web Services Provider to trust blindly that the Web Services Requester had established identity and trust with the end user.
Tags : 
pingidentity, sso, standards-based, web 2.0, identity enabled, browser-to-server, soap, saml, security assertion markup language, pki, public key infrastructure, soa, oasis, ws-trust, sso, single sign-on, service oriented architecture, rest, user identity mapping, ldap
    
Ping Identity

Secure Internet Single Sign-On 101

Published By: Ping Identity     Published Date: May 05, 2009
With the success of single sign-on (SSO) inside the enterprise, users are calling for interoperability outside of the enterprise’s security domain to outsourced services, including business process outsourcing (BPO) and software as a service (SaaS) providers, and trading partners, as well as within the enterprise to affiliates and subsidiaries. Learn more today!
Tags : 
pingidentity, sso, standards-based, web 2.0, identity enabled, browser-to-server, soap, saml, security assertion markup language, pki, public key infrastructure, soa, oasis, ws-trust, sso, single sign-on, service oriented architecture, rest, user identity mapping, ldap
    
Ping Identity

Engage! How to Avoid the Seven Sins of Live, Online Presentations

Published By: Citrix Online     Published Date: Jun 02, 2009
Webinars have become a common business practice. They reduce travel time and costs, increase geographic reach and enable greater efficiency.
Tags : 
engage, gtm, goto meeting, citrix online, webinars, presentations, travel, presenter, collaboration, mapping, 1080, web seminar
    
Citrix Online

Driving Better, Faster Decision Making through Finance

Published By: SAP     Published Date: Apr 07, 2011
In companies of all sizes, the chief financial officer (CFO) is the crucial link between strategy and execution. The CFO acts as a trusted advisor to the chief executive officer (CEO) in mapping out your company's strategic vision, and plays a key role in making sure that vision is realized in all business activities in a profitable way.
Tags : 
financial planning, budgeting, forecasting, sap, business intelligence, business activity monitoring, spend management, financial management
    
SAP

Mapping Roles and Responsibilities for Social Media Risk

Published By: Nexgate     Published Date: Jun 17, 2015
This report will outline a framework for assigning roles and responsibilities to manage social media risk.
Tags : 
proofpoint, nexgate, social media risk, social media, risk management, compliance, security policies, content delivery, secure content management
    
Nexgate

Conversion Mapping: Building a Call-to-Action Architecture that Speeds Your Sales Pipeline

Published By: Bulldog Solutions     Published Date: Jul 20, 2009
A call-to-action architecture helps you engage more prospects in conversations that could lead to closed sales. This white paper outlines a strategy to create a call-to-action architecture that sets your sales team up for a success.
Tags : 
conversion mapping, sales pipeline, prospects, call-to-action architecture, lead generation, sales engagement, conversion points, planning, btob, hosted solutions, on-premise, bulldog solutions, lead gen, nurture, convert, sales leads, bds
    
Bulldog Solutions

Defining Your Audience: A Step-by-Step Guide to Creating Buyer Personas

Published By: Bulldog Solutions     Published Date: Jul 20, 2009
If you’re under increasing pressure to be as efficient as possible with your marketing spend, you need to avoid wasting resources on strategies and messages targeted at the wrong audience. This white paper is a step-by-step guide on creating buyer personas to help focus your marketing efforts.
Tags : 
audience, bds, bulldog solutions, client list, pain points, motivators, validation, map, mapping, audience development, resources, buyer personas, sales development, sales leads, in-person environment, audience segmentation, promotion planning, audience, b2b, btob
    
Bulldog Solutions

Reengineering IT discovery with analytics and visulaization

Published By: IBM     Published Date: Oct 10, 2013
With modern IT infrastructures an intricate web of interdependencies, uncovering the total IT environment, including the logical relationships between physical, virtual and cloud elements, has never been more important—or more complex. This white paper discusses how IBM’s analytics for logical dependency mapping, ALDM, reengineers the IT discovery process to provide a more complete and accurate view of the IT infrastructure.
Tags : 
reengineering, it discovery, analytics, visualization, interdependencies, it environment, logic, logical relationships, virtual, cloud, logical dependency, logical dependency mapping, aldm, it infastructure
    
IBM

Optimizing The End-User Experience Across Your Enterprise

Published By: ASG Software Solutions     Published Date: Jun 02, 2009
End-user expectations and high levels of performance against Service Level Agreements (SLAs) must be achieved or organizations risk the loss of business. This paper details key capabilities needed for successful end-user monitoring and provides critical considerations for delivering a successful end-user experience.
Tags : 
asg, cmdb, bsm, itil, bsm, metacmdb, archiving, sap, ilm, mobius, it service management, itil, performance testing, sla, sla management services, testing, wla, visibility, configuration management, metadata
    
ASG Software Solutions

ASG's Business Service Portfolio Virtualization Management

Published By: ASG Software Solutions     Published Date: Jun 15, 2009
ASG's Business Service Portfolio (BSP) Virtualization Management provides comprehensive oversight, inspections, discoveries, warnings, diagnostics, and reporting for the critical technology and administrative disciplines involved in virtual workload management. This is all done in parallel with physical systems management.
Tags : 
asg, cmdb, bsm, itil, bsm, metacmdb, archiving, sap, ilm, mobius, workload automation, wla, visibility, configuration management, metadata, metacmdb, lob, sdm, service dependency mapping, ecommerce
    
ASG Software Solutions

Five reasons why mobilizing Windows applications is simpler than you think

Published By: Citrix     Published Date: Aug 15, 2012
Mobility and consumerization are little more than buzzwords without the applications that drive business activities. A successful enterprise mobility strategy places priority on applications first, mapping their mission to the variety of use cases out in the field. This paper describes how you can simplify application mobilization with Citrix.
Tags : 
citrix, xenapp, windows applications, microsoft applications, windows, microsoft, mobilizing applications, mobile devices, secure instant messaging, mobile computing, mobile data systems, smart phones, wireless application software, wireless messaging, application integration, workforce management, microsoft exchange, windows server, content delivery, mobile device management
    
Citrix

Next Generation Firewall (NGFW) Security Value Map

Published By: Cisco     Published Date: Jan 15, 2015
Empirical data from our individual Product Analysis Reports (PARs) and Comparative Analysis Reports (CARs) is used to create the unique Security Value MapTM (SVM). The SVM provides a quick, clear overview of the relative value of security investment options by mapping security effectiveness and value (TCO per protected Mbps) of tested product configurations.
Tags : 
comparitive analysis, datacenter, social, analytics, security, data management
    
Cisco

Vodafone Ireland implements world-class service excellence with HP BSM

Published By: HP     Published Date: Apr 13, 2014
Learn how business service management helped Vodafone Ireland transform from a reactive to a proactive IT Operations function. Read how BSM solutions enabled the Vodafone IT Operations group to align priorities to match the business and drive business value, delivering 300% ROI in one year.
Tags : 
apm, application performance, arcsight, bsm, business service management, communication service provider, ddma, discovery and dependency mapping, it operations group, it performance suite, it case study, omi, operations manager i, perform it, vodafone ireland, enterprise security, it management, knowledge management
    
HP

GE Capital: Winner 2014 Awards of Excellence for Business Service Management

Published By: HP     Published Date: May 05, 2014
Discover, map, and optimize assets to streamline global data centers, speed audits, slash costs: Using HP’s Business Services Management portfolio, GE Capital has realized an $8 million annual savings through data center consolidation. Find out how they addressed their key IT challenges of data center simplification, asset management and capacity management. GE Capital is the financial services unit of the American conglomerate General Electric. GE Capital provides commercial lending and leasing, as well as a range of financial services.
Tags : 
bsm, business service management, ddma, discovery and dependency mapping, it operations group, it performance suite, it case study, ge capital, services, it management, knowledge management, data management
    
HP

NSS Labs - Web Application Firewall (WAF) Analysis Security Value Map™ (SVM)

Published By: Citrix Systems, Inc.     Published Date: Jan 19, 2016
The SVM illustrates the relative value of security investment options by mapping security effectiveness and value of tested product configurations. The SVM provides an aggregated view of the detailed findings from NSS Labs’ group tests.
Tags : 
citrix, firewall, security, svm, firewalls, intrusion prevention, web service security, data protection
    
Citrix Systems, Inc.

NSS Labs - Web Application Firewall (WAF) Security Value Map™

Published By: Citrix Systems, Inc.     Published Date: Jan 19, 2016
The SVM provides a quick, clear overview of the relative value of security investment options by mapping security effectiveness and value of tested product configurations.
Tags : 
citrix, waf, firewall, tco, security, network security, application security, firewalls
    
Citrix Systems, Inc.

Lean Content Marketing

Published By: Marketo     Published Date: Jul 13, 2015
This ebook goes through tried and true strategies for lean content marketing—so you can extend the value of all your thought leadership.
Tags : 
content marketing, content strategy, collaboration, content creation, content contribution incentives, content planning, content mapping
    
Marketo
Start   Previous    1 2 3 4 5 6 7    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.