progress

Results 201 - 225 of 324Sort Results By: Published Date | Title | Company Name

Actional Enterprise: Free return on investment (ROI) E-kit

Published By: Progress Software BTA Telecommunications     Published Date: Oct 26, 2009
Learn how-and how much-you can gain in benefits from using Actional Enterprise for managing the operations of your distributed, interconnected applications. This E-kit will help you understand in measurable terms-such as the costs, cost savings, and ROI-of deploying Actional. Simply register and you will receive the resources required to help you build and communicate a business case.
Tags : 
roi, ekit, actional enterprise, interconnected application, cost savings, progress software, application integration, application performance management, business activity monitoring, business process management, total cost of ownership, service oriented architecture, web service management
    
Progress Software BTA Telecommunications

Management for Today's Interconnected Applications: A 5 minute demo of Progress Actional

Published By: Progress Software BTA Telecommunications     Published Date: Oct 26, 2009
Progress Actional is the leader in delivering management products and solutions for today's interconnected applications - including service-oriented architecture (SOA). Learn more about SOA and Web service management technologies by reading through our broad selection of white papers, on-demand webinars, podcasts and other helpful learning resources.
Tags : 
progress, actional, soa, management, interconnected application, application management, application integration, application performance management, business activity monitoring, business integration, business management, business process management, return on investment, service oriented architecture, web service management
    
Progress Software BTA Telecommunications

ExecBlueprints Reinventing Leadership Development: Proactive and Progressive Strategies

Published By: SkillSoft MKG     Published Date: Nov 05, 2010
What does it really take to be a leader at our company? Will this program enable tomorrow's leaders to see the forest for the trees and initiate a plan to protect and grow that forest?
Tags : 
leadership development, benchmarking, talent management, talent development, leadership capacity
    
SkillSoft MKG

The Factory of the Future: A practical guide to harnessing new value in manufacturing.

Published By: Zebra     Published Date: Jul 10, 2014
With around $900 billion of waste in global manufacturing supply chains*, it’s clear there’s scope to cut costs dramatically and create new value. As manufacturing regains favor with economic and political stakeholders worldwide, progressive enterprises are exploring ways to work more efficiently using asset information, system integration and process innovation.
Tags : 
zebra, waste, global manufacturing, asset information, system integration, progressive enterprises, economics, politics, enterprise applications
    
Zebra

Adding Networks to Integrated Service Management

Published By: IBM     Published Date: Apr 18, 2012
Integrated Services Management, or ISM, is a major evolutionary force guiding management technology and practice progress in enterprises today. The implications of ISM are broad, but the essence of the initiative is a re-thinking of how IT delivers value to the organization it serves, and a re-framing of all IT contributions around the concept of services.
Tags : 
ibm, technology, powervm, vmware, virtualization, intel platform, technology platform, application integration, analytical applications, service management, desktop management, business technology
    
IBM

Lease to Lifecycle Management

Published By: IBM     Published Date: Apr 24, 2012
Progressive retailers have shifted to integrated store lifecycle (SLM) systems enabled by Integrated Workplace Management System (IWMS) to provide a seamless integration of all phases of the entire real estate lifecycle process from market planning; through site selection, store design and construction; to day-to-day operations such as lease administration and facility management.
Tags : 
ibm, lease, lifecycle management, retail, real estate
    
IBM

In-Depth Visitor Profiling Creates Customers

Published By: Limelight Networks     Published Date: Jul 31, 2012
In this report you will learn how today's WCM platforms are fusing the best marketing automation practices with content management, allowing marketers to leverage content in new and innovative ways. Discover 10 of the top capabilities you should be considering for your website.
Tags : 
web content management, wcm, it management, it support, cms, marketing automation, visitor profiles, market segmentation, demographic, visitor identification, campaign tracking, lead scoring, progressive profiling, lead qualification, social engagement, multiedvice, multilingual, multisite support, traffic management, business intelligence
    
Limelight Networks

Initiating Progress From Within

Published By: CDW     Published Date: Aug 04, 2016
See how we can help you build a data center solution that supports today’s demands and positions your organization for success. Your current data center could be holding you back more than you realize. In today’s fast-paced world, some of your most critical operations revolve around technology. And for those systems to work, you need an infrastructure that’s ready to support your changing workloads and organizational needs. At CDW, we bring you the solutions and the support you need to further your goals. We can assess your environment, design the best approach, deploy your solution and manage it throughout its lifecycle. Because with a flexible, resilient and efficient data center, you can support flexibility, resiliency and efficiency throughout your organization.
Tags : 
technology, best practices, productivity, data, competitive advantage, business analytics, business intelligence, business management, business technology, data center
    
CDW

An Alternative to Today's Distributed Content Security Chaos

Published By: Box     Published Date: Feb 13, 2015
Many CISOs admit to trepidation about the state of cybersecurity within their organizations. Why? Aside from the increasingly dangerous threat landscape, many large organizations face other security challenges, including personnel shortages, an overwhelming number of manual processes, and technology complexity. Beyond these issues however, CISOs also face the progressively difficult responsibility of securing the distributed enterprise. Aside from PCs, departmental file servers, and remote office equipment, the distributed enterprise now includes recent IT additions like mobile computing, SaaS applications, and hybrid cloud infrastructure. In aggregate, this increasingly distributed infrastructure makes information security more cumbersome.
Tags : 
ciso, cybersecurity, esg, it/security, it architecture, it management
    
Box

Smart Protection Complete: Complete User Protection Provides Better, Simpler, More Flexible Security

Published By: CDW-Trend Micro     Published Date: Mar 26, 2015
Traditional security solutions can’t keep up with new trends in user behavior. Turning to point products to address discrete challenges only serves to increase complexity and may inadvertently leave gaps in your security. Plus, you need to consider how you will secure users as your IT philosophy progresses from on-premise to the cloud. To effectively counter today’s evolving threat landscape, you need a tightly woven mesh of security that consolidates your view across all layers of protection and all deployment models. Read this white paper to learn how Trend Micro Smart Protection Complete can protect your users.
Tags : 
user protection, security, cloud, endpoint, application, network, networking, it management
    
CDW-Trend Micro

CIO White Paper - Achieving the Mostly Digital Workplace: Progress and Pitfalls

Published By: DocuSign     Published Date: Mar 23, 2016
"Businesses are increasingly aware that digitization — converting or migrating non-digital information, practices, and processes into digital formats— can increase agility, productivity, and cost savings. According to a recent IDG Research survey, however, even organizations that are actively moving toward greater digitization have ample room for improvement. Discover how to move past the organizational bottlenecks and build a strong business case for further digitization as a competitive advantage with all the vital benefits DocuSign + Office 365 solution delivers. Download this white paper to learn more about DocuSign and Microsoft Office 365 solution and how you can: -Reduce the time needed to complete business transactions -Create and automate workflows to ensure transactions are safe and secure -Improve a user's ability to control and monitor these processes
Tags : 
    
DocuSign

The Ransomware Threat: A How-To Guide on Preparing for and Detecting an Attack Before it's too Late

Published By: LogRhythm     Published Date: Apr 04, 2017
Is your organization prepared for a ransomware attack? Successfully defending your organization against such an attack takes preparation and an understanding of what to look for if an attack begins. This guide shares the expert knowledge that researchers at LogRhythm have gathered about how ransomware attacks begin, how they progress through your endpoints and network, and what you can do to prevent them, or at least shut them down, to avoid serious repercussions.
Tags : 
    
LogRhythm

Cyber Intrusion Services Casebook 2018

Published By: CrowdStrike     Published Date: May 21, 2019
Stories from the front lines of Incident Response in 2018 and insights that matter for 2019 Threat actors are continuously adopting new means to achieve their objectives. Drawn from real-life client engagements, the annual CrowdStrike Cyber Intrusion Services Casebook 2018 provides valuable insights into ever-evolving attacker tactics, techniques and procedures (TTPs). The CrowdStrike Cyber Intrusion Services Casebook, 2018 provides expert, real-world analysis and practical guidance that can further your organization’s progress toward that goal. It also describes the strategies the CrowdStrike Services team used to quickly investigate, identify and effectively remove dangerous threats from victims’ networks. Download the Cyber Intrusion Casebook to learn: • The emerging trends observed in attack behaviors, including the tactics threat actors use to gain entry and maintain a foothold in targeted environments • Key takeaways — based on the CrowdStrike Services team’s extensive experience
Tags : 
    
CrowdStrike

5 Reasons to Avoid Pen and Paper Performance Reviews

Published By: Cornerstone OnDemand     Published Date: Oct 17, 2014
Whether you're just getting started or taking your business to the next level, paper-based performance reviews are not the way to go. When you have limited HR resources it probably seems easier to print off forms than sign up for software, but that pile of paper will cost you more in the long run… Get smart with your performance management, embrace technology you'll be able to: • Easily track progress and make sure everyone completes their reviews • Collect up to date, reliable information • Review teams as teams • Collect feedback via self-assessments, 360 degree and manager reviews
Tags : 
cornerstone on demand, csod, performance reviews, management, employee, motivation, team performance, reviews
    
Cornerstone OnDemand

Development-Driven Performance Management

Published By: Cornerstone OnDemand     Published Date: Sep 08, 2010
Each year, organizations around the world go through the ritual of performance appraisal. Many see it as the company's main event, in terms of performance management - the time at which most, if not all, feedback and guidance to employees is given. Progress is evaluated. Rewards are distributed. Goals are set. Then that is it, until next year. Managers often open the process with a mixture of resignation, dread and the question, Why are we doing this again?
Tags : 
cornerstone, talent management, business continuity, business performance, globalization, performance management
    
Cornerstone OnDemand

IBM Cognos Business Intelligence Demo

Published By: IBM     Published Date: Dec 21, 2012
Learn how different departments can use IBM Cognos Business Intelligence solutions to create scenarios, collaborate on strategy and execute and monitor progress on new initiatives.
Tags : 
ibm, cognos, business, intelligence, demo, business analytics
    
IBM

How Mature is Your Cyber-Security Risk Management?

Published By: IBM     Published Date: Nov 05, 2014
A security framework is a step-by-step approach to helping an organization move from meeting its basic security requirements to providing a fully security-optimized environment. Five types of frameworks address progressive steps in security maturity as needs and capabilities change.
Tags : 
ibm, cyber security, risk management, business threats, security framework, business protection, cyber protection, security framework, protection, security, it management, business intelligence, business management
    
IBM

Empowering Your Mobile Workers White Paper

Published By: Box     Published Date: Nov 09, 2014
Read how some of the nation’s most progressive corporations are meeting the many needs of their mobile workers — without overwhelming their IT departments — with the help of Box.
Tags : 
box, file sharing, mobile workers, mobile phones, smartphones, collaboration, storage, remote access, mobile computing, smart phones, wireless infrastructure, wireless phones, secure content management, email archiving, content management, mobile device management
    
Box

Job Seeker Nation Study: Inside the Mind of the Modern Job Seeker

Published By: Jobvite     Published Date: Mar 31, 2015
It’s been a long road to recovery, but the economy is finally bouncing back after the Great Recession. Businesses are growing, companies are hiring and quality talent is in high demand. For the skilled worker, the job market has shifted in their favor, and professionals everywhere are taking advantage. The findings of the fifth annual Job Seeker Nation Study explore the progression of the job market, the modern job seeker’s approach to job hunting, and what this means for the workforce in 2015. Read this study to learn more.
Tags : 
jobseekers, job search, employment, recruiting, technology, hiring, talent acquisition, workforce, sourcing, talent pools
    
Jobvite

2015 Data Protection Maturity Report

Published By: Lumension     Published Date: Jun 05, 2015
Lumension’s fourth-annual survey on data protection maturity highlights the threats, responses, policies, and technologies of a shifting data security landscape. It also reveals how organizations have made progress—and where they may still be at risk.
Tags : 
data protection, threats, security landscape, shifting data, data maturity
    
Lumension

Watson Studio: Simplify and scale AI for hybrid, multi-cloud world

Published By: Group M_IBM Q119     Published Date: Jan 08, 2019
• Do you want to win with AI in the hybrid, multi cloud world? Are you tackling data, algorithms and apps to drive business value from AI? We got you covered. Come and learn how you can simplify and scale your AI projects on Watson Studio. Hybrid cloud use cases spanning cloud, desktop and local are featured. Key Takeaways: • Open, trustworthy and secure approach to put AI to work for business • Go live and scale faster with AI-infused platform • Build train and deploy models across hybrid, cloud environments – including popular public cloud environments like AWS and Azure • Flexibility for cloud, on-premise and desktop deployment, bringing algorithms to wherever data resides • Progressing your AI/data science with Watson Studio • Register now and get ready to simplify and scale your AI investments to work for your business.
Tags : 
    
Group M_IBM Q119

Perspective: Oracle Value Chain Summit

Published By: Oracle     Published Date: Apr 28, 2014
Oracle continues to progress its capabilities in supply chain. Though there were many good presentations on the breadth and depth of Oracle's supply chain offerings, the real testament to the company's success comes from the manufacturers in attendance.
Tags : 
oracle, idc, supply chain, nearshoring, product value chain
    
Oracle

Cylance 2017 Threat Report

Published By: BlackBerry Cylance     Published Date: Jul 02, 2018
The cyberattacks of 2017 proved more numerous, sophisticated, and ruthless than in years past. Threat actors, armed with knowledge stolen from the CIA and tools lifted from the NSA, demonstrated an elevated level of proficiency. WannaCry and NotPetya, two prominent threats from last year, successfully exploited these stolen assets in their assault on systems worldwide. As 2017 progressed, new opportunities developed in ransomware-as-a-service (RaaS), opening the gates of malware-for-profit to everyone. Advancements in fileless attacks provided new ways for threats to hide from once reliable detection methods. Malware features such as polymorphism continued to play a powerful role in evading traditional defenses. The victims of cybercrime ranged from private businesses to the fundamental practices of democracy. France and the United States saw significant data breaches during their recent presidential elections. Several high-profile companies lost their customers’ personally identifiable information to cyberattacks, blemishing their brands and costing them untold millions in recovery operations. This report contains an overview of the threat trends and malware families Cylance's customers faced in 2017. This information is shared with the goal of assisting security practitioners, researchers, and individuals in our collective battle against emerging and evolving cyberthreats.
Tags : 
cyber attacks, cia, nsa, wannacry, notpetya
    
BlackBerry Cylance

What 100% Cloud and Mobile Really Means

Published By: OKTA     Published Date: Mar 30, 2018
"Today's workplace is flexible, collaborative, and dynamic-allowing people to work anywhere any time. A cloud-first strategy allows organizations to remain competitive and empowers greater productivity amongst their distributed workforce. But what does 100% cloud and mobile really mean? What does it really look like? Cloud-first is a philosophy of openness, security and user trust. It has specific components that embody a cloud- and mobile-first strategy. Read this whitepaper to learn the seven pillars of a 100% cloud and mobile organization. These core attributes serve as vital, interlinking nodes that alone promote efficiency and progress, and together drive cloud-first transformation."
Tags : 
    
OKTA

Get Complimentary Microsoft Online Training

Published By: C.B.Learning     Published Date: Jul 10, 2008
An official provider of Microsoft Online Learning, C.B.Learning offers cost-effective, managed training which your team can complete without leaving the office. Their Learning Management System (LMS) is a secure online service that offers you a direct way to monitor progress and helps you extend your training budget. Try a free Microsoft course today.
Tags : 
network management, microsoft, mcp, certification, microsoft certification, training, online training, online classes, online certification, c. b. learning, c.b.learning, learning, networking, it career advancement, microsoft exchange, windows, windows server
    
C.B.Learning
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.