systems management

Results 426 - 450 of 520Sort Results By: Published Date | Title | Company Name

Master Data Management: Effective Data Governance

Published By: IBM     Published Date: May 30, 2008
Organizations with data-sharing environments, complex information and systems hinder business responsiveness and decision makers’ ability to make informed decisions. This white paper will describe how engaging in a master data management (MDM) project enables effective governance of data - specifically master data - and achieves maturity in key categories of the IBM Data Governance Maturity Model.
Tags : 
ibm, mdm, master data management, data management, data governance, business analytics, data integration
    
IBM

Banks get relief with IBM WebSphere software

Published By: IBM     Published Date: Jan 12, 2009
Retail banks are in a state of transformation all over the world. They must integrate new remote payment systems, digitize process integration and update credit management. Watch this webcast to see how IBM WebSphere Portal is helping these companies deliver targeted information to support decision-making, and to aid in their transformation.
Tags : 
ibm, websphere portal banking initiative, websphere portal, portal solutions for retail banks, updating credit management, internet banking delivery, networking, it management
    
IBM

Manage Web content by integrating IBM software with your existing systems

Published By: IBM     Published Date: Jan 13, 2009
The rapid growth of Web-based initiatives means organizations need to manage large amounts of targeted data. Existing enterprise content management (ECM) systems can be integrated with IBM Lotus Web Content Management software to help align accurate information with the people who affect your business. This white paper explains how.
Tags : 
ibm, web content management, enterprise content management, ecm, ibm lotus, knowledge management, enterprise applications, application integration
    
IBM

Addressing Future Automotive Needs with Model-Driven Systems Development

Published By: IBM     Published Date: Mar 17, 2009
CPDA’s Product Lifecycle Management (PLM) research programs target the critical decisions in Product Lifecycle Management challenging Design, Engineering, Manufacturing, and Information Technology managers and executives. CPDA’s PLM collaborative research programs provide indepth analysis of strategies, products, issues, processes, technologies, trends, case studies, and surveys for assessing technology, business goals and objectives, and implementation road maps.
Tags : 
ibm, telelogic, addressing future automotive needs, model-driven systems, product value management, plm, computer-aided design, cad
    
IBM

Automotive System Design and Mechatronics

Published By: IBM     Published Date: Mar 24, 2009
Electronics and Software Engineering are quickly merging with traditional Mechanical Engineering to create a new paradigm in auto manufacturing: Mechatronics. Industry experts predict that this shift will bring about profound advances in automotive product development. Unfortunately, existing IT and process infrastructures do not provide sufficient capabilities to support the new paradigm: multiple data silos, a lack of standardized processes, and integration issues on a tool level (Mechanical, Electronic, Software) continue to pose serious obstacles to development efficiency, and remain a frequent source of delays, quality issues and cost increases.
Tags : 
ibm, ibm telelogic, automotive system design, mechanical engineering, mechatronics, oems, electronic stability programs, esp
    
IBM

Implementing Best Practices for Network & Systems Management

Published By: PerformanceIT     Published Date: Aug 21, 2009
The phrase "Best Practices" has become so overused, it has become practically meaningless for IT managers. Improvement is necessary, but where do you start, what tools are appropriate, where do I find actionable information, and how do I do this with minimal cost? If these questions apply to you, this paper provides a plan of attack.
Tags : 
it management, best practice, network management, systems management, improvement, streamline, streamlining, efficiency
    
PerformanceIT

Top Ten Network Management Lies and Deceptions

Published By: PerformanceIT     Published Date: Aug 21, 2009
It's confusing and sometimes overwhelming. Learn about common misconceptions about network and system management software and the distortions that software vendors promote when it comes to marketing their product's features.
Tags : 
network management, compliance, networking, systems management, sms, management software, performanceit, performance it
    
PerformanceIT

GIS Interoperability: The Safe Way

Published By: Safe Software     Published Date: Aug 21, 2009
This paper by S. Raghavendran of Pixel Infotek Pvt Ltd on GIS Interoperability and Spatial ETL solutions was presented at the GSDI conference in India and provides an excellent description of the interoperability challenges that Safe's products address.
Tags : 
spatial, geographic information system, geographic information systems, geological, information management, data processing, database, data transfer
    
Safe Software

GIS and Spatial ETL: Complementary Spatial Data Technologies

Published By: Safe Software     Published Date: Aug 21, 2009
This paper defines the function of spatial ETL and expands the role and impact it has with spatial data processes and GIS systems.
Tags : 
spatial, geographic information system, geographic information systems, geological, information management, data processing, database, data transfer
    
Safe Software

GML: Experiences from the Field

Published By: Safe Software     Published Date: Aug 21, 2009
One of the most powerful aspects of GML is the freedom it gives users to define their own custom application schemas. While this capability provides extraordinary flexibility to data modellers, it also creates significant challenges, particularly when the data is interpreted.
Tags : 
spatial, geographic information system, geographic information systems, geological, geography, information management, data processing, database
    
Safe Software

Enhance BMC Change Management with Closed-Loop Control

Published By: Solidcore     Published Date: Jan 28, 2008
Are you about to implement change management using BMC Remedy Service Management or BMC IT Service Management for Mid-sized Businesses (a.k.a. Magic or Service Desk Express)? Have you already implemented one of these systems and want to maximize the return on your investment? Get this white paper to see how others have optimized their change management implementation approach to derive the most value from their investment by adding closed-loop control.
Tags : 
cmdb, change management, service management, bmc, remedy, bmc remedy, it management, roi
    
Solidcore

Implementing PCI Compliance with ScriptLogic

Published By: Dell Software     Published Date: Jul 18, 2012
Implement PCI Compliance
Tags : 
pci, payment card industry, data security, scriptlogic, mocrosoft windows, it systems, data security, secure network
    
Dell Software

BSM, IT and Business Facilitation: How BSM Can Bring IT into the Business Decision Making Process

Published By: Quocirca     Published Date: Jul 03, 2008
Technology is no longer a nice to have, or a tool for the few. With many organizations now being completely dependent on their IT systems, the need for the IT department to be seen to be responding to the organization's requirements is of critical importance.  Business Service Management, or BSM, can help in providing underpinnings to the IT function. This paper looks at how the changing processes and market conditions within an organization can be augmented through the use of a Business Service Management (BSM) approach, creating a flexible and responsive technology infrastructure aimed at supporting a rapidly changing commercial landscape and enabling greater competitiveness in the markets.
Tags : 
quocirca, business service management, bsm, service management, business management
    
Quocirca

The Perfect Storm Time to Review Client Computing Strategies

Published By: Quocirca     Published Date: Mar 12, 2009
For many years, server-based computing has been seen as a means of, at best, providing those within highly task-based environments with a controlled desktop environment. However, changes in software, hardware, security and management systems are leading towards server-based computing being suitable for a far larger proportion of an organization's user base.
Tags : 
quocirca, desktop environment, software, hardware, security, management systems, data security, business continuity
    
Quocirca

GE Medical Systems Use Case: SpringCM Secure Document Management

Published By: SpringCM     Published Date: Dec 06, 2006
SpringCM forms the basis for GE Medical’s secure document management platform that connects main office staff with field-based technicians and outside contractors.
Tags : 
document management, case study, content management, cms, content management system, document security, collaboration, springcm
    
SpringCM

Secure Critical Company Information when a Mobile Device is Lost

Published By: Avalere     Published Date: Apr 02, 2007
Laptops, USB devices, and other endpoint devices foster a flexible and more productive work environment, yet also increase a company's exposure to the loss or theft of critical information. Avalere inventories, protects, and controls your company’s laptop, desktop or removable storage device information to mitigate risks of lost or stolen equipment.
Tags : 
mobile computing, lost laptop, lost equipment, mobile data systems, computer loss, equipment loss, risk management, avalere
    
Avalere

LANDesk Management Suite for ThinkVantage Technologies

Published By: LANDesk     Published Date: Feb 12, 2007
LANDesk Software and Lenovo have teamed up to create an integrated hardware and software management solution to manage your systems from a single console.
Tags : 
it management, network management, remote network management, security management, systems management, landesk
    
LANDesk

Solutions for the Metal Fabrication Industry: A More Profitable Industry Value Chain

Published By: Infor     Published Date: Feb 27, 2007
In order to align their production plans with customer's demand, metal fabricators must integrate seamlessly into the customer's own processes. As a result, integrated systems are essential, bringing design, product lifecycle management and service together in ways that predict, act and rapidly change in accordance with the customer's needs.
Tags : 
productivity, customer experience management, supply chain management, scm, business process management, bpm, manufacturing, metal
    
Infor

How RFID Technology Can Enhance Asset Tracking

Published By: Infor     Published Date: Apr 19, 2007
This paper includes a comparison between using RFID and barcoding for asset management as well as real-life examples of how RFID technology is being used by enterprising organizations today to gain significant time savings and enable better asset and maintenance management.
Tags : 
wireless, wireless hardware, wireless infrastructure, rfid, radio frequency, mobile data systems, asset management, barcode
    
Infor

RFID Solutions for ID Badges and Access Control

Published By: GAO RFID Inc.     Published Date: Feb 28, 2007
Barcodes, magnetic stripes, and proximity readers all rely on the user to either make contact or place the badge very close to the reader. In addition, bar codes can only be read one at a time and the respective embedded information cannot be updated. Find out how an RFID access control system can provide an easy and efficient solution.
Tags : 
rfid, rfid tags, mobile data systems, access control, identity management, gao, gao group, gao rfid
    
GAO RFID Inc.

Disk Monitoring: Calculating the Real Cost of Disk

Published By: CCSS     Published Date: Sep 04, 2007
Many IT Managers will be familiar with the ‘disk or die’ ultimatums that a disgruntled system can issue. If the system demands feeding and threatens to shut down if it doesn’t get more disk to chew, it’s time to address the issue of disk once and for all.  The expense of using disk to accommodate problems in the hope of buying extra investigation time is a quick fix that few organizations can sustain.
Tags : 
systems management, monitoring, disk management, disk monitoring, ccss, network performance, network performance management, disk
    
CCSS

Achieve and Maintain Compliance with PCI Data Security Standard - Part 1

Published By: Ecora Software     Published Date: Aug 15, 2007
Learn how to adhere to the PCI security standard by automating regulatory compliance and best practices reporting typically used to identify and validate IT configuration changes throughout operating systems, database management systems, applications and network devices.
Tags : 
pci, pci dss, pcidss, payment card, credit card, pci compliant, compliance, financial
    
Ecora Software

Achieve and Maintain Compliance with PCI Data Security Standard - Part 4

Published By: Ecora Software     Published Date: Aug 15, 2007
Achieve and Maintain Compliance with PCI Data Security Standard – Part 4. Deep dive into PCI DSS requirements 10-12. Learn how to adhere to the PCI security standard by automating regulatory compliance and best practices reporting typically used to identify and validate IT configuration changes throughout operating systems, database management systems, applications and network devices.
Tags : 
pci, pci dss, pcidss, payment card, credit card, pci compliant, compliance, financial
    
Ecora Software

Achieve and Maintain Compliance with PCI Data Security Standard - Part 3

Published By: Ecora Software     Published Date: Aug 15, 2007
Deep dive into PCI DSS requirements 5-9. Learn how to adhere to the PCI security standard by automating regulatory compliance and best practices reporting typically used to identify and validate IT configuration changes throughout operating systems, database management systems, applications and network devices.
Tags : 
pci, pci dss, pcidss, payment card, credit card, pci compliant, compliance, financial
    
Ecora Software

Achieve and Maintain Compliance with PCI Data Security Standard - Part 2

Published By: Ecora Software     Published Date: Aug 16, 2007
Deep dive into the first 4 PCI DSS requirements. Learn how to adhere to the PCI security standard by automating regulatory compliance and best practices reporting typically used to identify and validate IT configuration changes throughout operating systems, database management systems, applications and network devices.
Tags : 
pci, pci dss, pcidss, payment card, credit card, pci compliant, compliance, financial
    
Ecora Software
Start   Previous    7 8 9 10 11 12 13 14 15 16 17 18 19 20 21    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.