systems management

Results 501 - 525 of 530Sort Results By: Published Date | Title | Company Name

Enterprise Readiness of Consumer Mobile Platforms

Published By: BlackBerry     Published Date: Oct 03, 2012
An evaluation of today's four leading mobile operating systems - BlackBerry OS, Apple iOS, Windows Phone, and Google Android - revealing how they compare to each other based upon twelve categories of security and management criteria.
Tags : 
consumer mobile platforms, blackberry, mobile os, mobile operating systems, mobile security, mobile device management, wireless, collaboration
    
BlackBerry

Enterprise Readiness of Consumer Mobile Platforms

Published By: Blackberry     Published Date: Oct 03, 2012
An evaluation of today's four leading mobile operating systems - BlackBerry OS, Apple iOS, Windows Phone, and Google Android - revealing how they compare to each other based upon twelve categories of security and management criteria.
Tags : 
consumer mobile platforms, blackberry, mobile os, mobile operating systems, mobile security, mobile device management
    
Blackberry

HP Converged Storage: Simplify and Optimize Your Virtualization and Cloud Deployment

Published By: HP - Intel® Xeon® processors     Published Date: May 06, 2013
What’s needed today is storage that’s flexible enough to be used for both legacy IT and virtual systems environments and repurposed as new needs arise. Storage must be quickly expandable and must enable data and applications to be easily and securely migrated, with workloads automatically rebalanced. Applications need to be online 24 x 7, so high availability is paramount. Management of the entire storage pool, as well as coordination with virtualized servers and networking, must be streamlined and simplified. This Tech Dossier reveals how HP Converged Storage can meet your organizations storage requirements.
Tags : 
converged storage, optimize, virtualization, cloud deployment, high availability
    
HP - Intel® Xeon® processors

The Power of Client Virtualization

Published By: CDW     Published Date: Mar 18, 2016
Client virtualization technologies are redefining the way IT resources are delivered to end users, and creating exciting new opportunities for IT organizations as they work to streamline and improve operations. By abstracting applications and operating systems from client hardware, virtualization enables client assets to be stored on central servers and delivered to client endpoints. The implications are profound. End users can log on to any networkconnected computing device and access their custom operating system and application environment. For IT departments, central management of client virtual machine (VM) images brings efficiencies in everything from routine maintenance and updating to operating system upgrades.
Tags : 
    
CDW

Optis: Build the Case to Integrate Workforce Data for Better Business Insight

Published By: Optis     Published Date: Mar 07, 2013
Integrating leave and workforce data doesn’t have to be overly complicated. With the right plans, you can make the business case to implement an integrated database so you can get the people answers you need.
Tags : 
integrated workforce database,   implementing integrated systems,   data quality management,   value of integrated data,   people data management,   disparate people data,   analyze leave data,   employment data
    
Optis

Best Practices Guide: Optimizing Your Construction Business for Profitable Growth

Published By: Maxwell Systems     Published Date: Sep 05, 2013
Construction companies are meeting the challenge of ever-intensifying competition by refining their business operations with standardized operating practices and “visible” information that is shared among multiple departments. “Before, only owners who wanted to grow a very large company would worry about transitioning from the informal business they started to formalized, standardized business processes,” says Jim Flynn, CEO of Maxwell Systems, a leading provider of construction management software solutions, expert services, and best practices. “But in the current environment, you also have to make that transition just to stay competitive and improve your profitability.”
Tags : 
construction, business processes, business management, process management, operations management
    
Maxwell Systems

HRG Assessment: Comparing IBM PureSystems and HP Converged Systems - 2012

Published By: IBM     Published Date: Sep 27, 2013
Customers require flexible, agile and easy to consume IT solutions to succeed in business. With those requirements in mind, IBM recently announced PureSystems. Harvard Research Group (HRG) has taken a closer look at PureSystems and and how it compares to Cisco UCS.
Tags : 
ibm, ibm puresystems, it services, expert integrated systems, it solutions, software, hardware, networking
    
IBM

Magic Quadrant for Integrated Workplace Management Systems

Published By: IBM     Published Date: Nov 12, 2013
Integrated Workplace Management System Systems (IWMS) is gaining industry momentum, in large part, because of the increasing focus on the importance of optimized, unified management of all assets across a complex enterprise. And that certainly includes real estate, facilities, and related assets that have historically been managed in isolated domains. In this study, leading technology analyst Gartner Inc. assesses the IWMS market to determine how the field is changing, who the leading software providers are, and how IWMS solutions have evolved in new directions to better fulfill emerging demand.
Tags : 
integrated workplace management system, fasb, capital project management, iasb, sustainability, cafm, roi, magic quadrant
    
IBM

Lease to Lifecycle Management

Published By: IBM     Published Date: Oct 24, 2013
Today, the retail industry faces daunting challenges as a result of current uncertain economic conditions, conflicting market influences and changes to financial reporting standards. Traditional point solutions utilized in the various phases of the real estate life cycle are no longer adequate to meet these challenges. This whitepaper examines the benefits of implementing life cycle management solutions in the retail environment.
Tags : 
lifecycle management, real estate systems integration, real estate, retail, retailer, new lease accounting standard, fasb, iasb
    
IBM

A European Manufacturer

Published By: IBM     Published Date: Oct 24, 2013
This case study examines a European manufacturer that successfully moved from an ad-hoc workplace organization to a strategic organization over a period of five years, saving $19 million in 2009 in addition to a 400 percent return on investment over five years (from 2004 - 2009). The organization moved from a decentralized siloed group of regional facilities and real estate organizations to a fully-centralized and matrixed organization, enabling close coordination and alignment with the regional business units.
Tags : 
lifecycle management, real estate systems integration, new lease accounting standard, fasb, iasb, workplace management system, iwms, facility management
    
IBM

IBM PowerVM Virtualization Technology on IBM POWER7 Systems

Published By: IBM     Published Date: Jan 09, 2014
Consolidating data center servers through virtualization is integral to successful IT systems design. Read the white paper and see how IBM PowerVM on POWER7 offers higher ratios of server virtualization than VMware on comparable Intel x86 platforms. This enables superior performance, greater operational savings and improved efficiency.
Tags : 
ibm power7 systems, virtualization, powervm, vsphere, powervm technology, virtualization performance, intel xeon, hp proliant
    
IBM

IBM’s System Director VMControl: Advanced Multi-Platform Virtualization Management

Published By: IBM     Published Date: Jan 09, 2014
For IT personnel looking to manage cross-platform workloads, IBM VMControl can provide an advanced solution. Read the white paper and learn why this technology beats the competition in terms of automated provisioning, systems integration and resource pooling. Also see how this environment offers advanced image management and higher resilience.
Tags : 
vmware, ibm, virtualization, director vmcontrol, clabby analytics, platform virtualization, system director, multi-platform
    
IBM

Forrester Total Economic Impact of Optim Solutions

Published By: IBM     Published Date: May 02, 2014
Learn more about Forrester’s results, and how these organizations are realizing both economic and operational benefits with InfoSphere Optim solutions.
Tags : 
ibm, big data, big sql, querying data, database management technology, apache hadoop, data administrators, infosphere
    
IBM

IBM Pure Systems Flex Frenzy

Published By: Sirius Computer Solutions, Inc.     Published Date: Jul 08, 2014
Can simplicity and flexibility finally work together in harmony? Today's technology, workloads, and habits are rapidly changing-almost daily. Download to learn how IBM Flex system can help!
Tags : 
sirius computer solutions, ibm, systems solution, pure systems, data, system management, it management, enterprise applications
    
Sirius Computer Solutions, Inc.

Soporte de AirWatch para Office 365

Published By: VMware AirWatch     Published Date: May 24, 2016
Una de las preguntas más frecuentes de los clientes es ¿cuánto soporte le provee AirWatch a Office 365? Muchos preguntan si AirWatch controla el acceso a Office 365 (O365) en los dispositivos móviles de la misma forma que lo controla en los sistemas de escritorio corporativos.
Tags : 
application management, best practices, mobile support, mobile, systems management, business optimization, network management, application security
    
VMware AirWatch

Magic Quadrant for BPM-Platform-Based Case Management Frameworks

Published By: Pega     Published Date: Sep 11, 2015
In this new report, Pegasystems is recognized as a leader in the growing market for flexible case management solutions. Pega leads the market in delivering applications that meet rising expectations for: -Built-in change governance procedures -Open APIs -Ability to federate case management -Flexible data structures -Focus on business outcomes
Tags : 
    
Pega

Ovum Decision Matrix: Selecting A Privileged Identity Management Solution, 2015–2016

Published By: CA Technologies     Published Date: Apr 06, 2017
A number of high-profile security breaches over the last two years have highlighted the damage that a rogue systems administrator or stolen privileged credentials can cause. Today, fewer than half of all business organizations have deployed the type of privileged identity management (PIM) solution that could help improve the situation. This Ovum Decision Matrix (ODM) provides an in-depth view of the leading PIM solutions that are available to deal with these issues. It compares their technology, the market position each vendor has achieved, their ability to execute, and the overall maturity of each offering.
Tags : 
data assets, risk management, it security, session management, authentication management, security intelligence, information management, infrastructure management
    
CA Technologies

The Key to Protecting Your Business Amid Cybercrime’s Current Boom

Published By: CA Technologies     Published Date: Jun 01, 2018
Thanks to numerous, headline-making incidents in recent years, cybercrime has risen toward the top of the concern list for many organizations—and the customers with whom they do business. You’ve heard many of the stories. Major health insurers, such as Anthem, Premera BlueCross and CareFirst had personal information for millions of their customers stolen. Sony Pictures experienced a breach that not only embarrassed employees and adversely impacted the release of the high-profile film, “The Interview,” but also damaged systems and applications—making it extremely difficult for the company to conduct business. The list goes on. Some you maybe haven’t heard, like the one about CodeSpaces, a provider of version management services to developers. When attackers were able to gain access to its cloud-based management consoles, they deleted the company’s entire infrastructure and backups—ultimately forcing CodeSpaces out of business. The bad news for organizations like yours is, thanks to the
Tags : 
    
CA Technologies

Ovum Decision Matrix: Selecting a Privileged Identity Management Solution, 2015–2016 Publication Dat

Published By: CA Technologies     Published Date: Jun 01, 2018
Within any organization, the most dangerous users are those with privileged access to the company’s most valuable and sensitive data assets. This includes systems administrators, business managers, partners, suppliers, and service providers, and also takes into account the automated interactions between business machines, systems, and applications. Privileged access has always been a high-risk issue, but for too long, organizations have not understood or have chosen to ignore the risks, preferring instead to rely on the integrity of the individuals and systems involved. A number of high-profile security breaches over the last two years have highlighted the damage that a rogue systems administrator or stolen privileged credentials can cause. Today, fewer than half of all business organizations have deployed the type of privileged identity management (PIM) solution that could help improve the situation. This Ovum Decision Matrix (ODM) provides an in-depth view of the leading PIM solution
Tags : 
    
CA Technologies

Addressing NIST And DOD Requirements for Mobile Device Management (MDM)

Published By: IBM     Published Date: Apr 20, 2017
The National Institute for Standards and Technology (NIST) and the Defense Information Systems Agency (DISA) have taken leading roles in exploring requirements for Mobile Device Management (MDM) systems for government agencies. Mobile devices, particularly smartphones, are exceptionally vulnerable to security breaches. They are easily lost, are filled with unknown applications, communicate over untrusted networks, and are often purchased by users without regard to IT standards and security features.
Tags : 
mobile security, mobile device management, enterprise data, application security, information security, communication interception, business data, app security
    
IBM

Unified Endpoint Management: the Next Step in the Evolution of Device Management

Published By: VMware     Published Date: Feb 24, 2017
Mobile device management (MDM) tools allow companies to connect their employees securely to basic corporate network resources. Enterprise mobility management (EMM) goes a step further by enabling secure mobile versions of business-critical applications and data loss prevention to protect corporate information. But in today's workplace, employees and businesses deal with a vast variety of devices with different operating systems and form factors, from PCs and laptops, to tablets and smartphones, and now, increasingly wearables and Internet of Things (IoT) endpoints. The solution is unified endpoint management (UEM), which enables organizations to take a consistent approach to manage and secure every endpoint, any app and content, and across deployment use cases from a single holistic platform. Read this whitepaper to uncover VMware AirWatch®'s leading UEM approach that is benefiting organizations tremendously.
Tags : 
    
VMware

Lessons from B2B Leaders in Managing Data

Published By: Dun & Bradstreet     Published Date: Feb 21, 2017
As the volume of data coming into organizations – from both internal and external sources – continues to grow and makes its way across departmental systems in many different formats, there is a critical need to create a single, holistic view of the key data entities in common use across the enterprise. Master Data Management (MDM) aims to accomplish this goal. Not surprisingly, MDM has become a significant priority for global enterprises, with the market expected to triple from $9.4B to $26.8B by 2020 according to analysts. The reality, though, is that while seemingly everyone is investing heavily in the tools to manage data, few are putting a great enough emphasis on the data itself. And that’s a problem. Poor data quality is said to be costing businesses $3.1 trillion annually – and that’s just in the US alone. The information being put into MDM tools must be mastered first and foremost.
Tags : 
managing data, data management insight, mdm, master data management
    
Dun & Bradstreet

Magic Quadrant for Manufacturing Execution Systems

Published By: Dassault Systèmes     Published Date: Jun 19, 2018
Dassault Systèmes' has been named by Gartner, Inc. as a “Leader” in its 2017 Magic Quadrant for Manufacturing Execution Systems. 2017 is the first year for the Gartner Magic Quadrant for MES, which specifically covered the MES market, including MOM applications. Because of our position as a Leader in the Gartner Magic Quadrant we believe it confirms the positive response we are receiving on our vision and ability to execute the transformation of manufacturing. We also believe we are being recognized for our unique and holistic approach to MOM / MES and the greater transformative value that digital continuity with DELMIA has across manufacturing engineering, manufacturing operations and the supply chain. DELMIA® Manufacturing Operations Management solutions transform global production operations to achieve and sustain operational excellence. This is accomplished through digital continuity, a shared digital landscape connecting all stakeholders to improve visibility into, control over a
Tags : 
    
Dassault Systèmes

Stop the Manual Madness with Datavail's DRM PeopleSoft Adapter

Published By: Datavail     Published Date: Nov 03, 2017
The management of financial data in an organization is of paramount importance. Reporting, evaluating ROI, making adjustments across the business, and increasing revenue depend on good, accessible financial data that can be updated and integrated across systems and software. For these reasons, many organizations have turned to master data management (MDM) software in the effort to better store, access, search, retrieve, and analyze their financial data. These MDM solutions are able to collect data within a single unified, fully integrated, user-friendly platform. However, in order to be most effective, MDM applications must also have capabilities in data relationship management (DRM). DRM software is able to describe and enforce the relationships between data, no matter where it's located within an organization, to provide a holistic and consistent solution.
Tags : 
    
Datavail

4 Critical Features of a Cyber-Resilient Architecture

Published By: Dell Server     Published Date: Aug 08, 2018
PowerEdge servers protect your customers and business with integrated security Analysts say attacks on firmware are becoming a greater threat to systems, making a cyber-resilient server architecture essential to the modern data center. Dell EMC PowerEdge servers, powered by Intel® Xeon® Scalable processors, deliver comprehensive management tools and robust layers of security to protect hardware and firmware throughout the server lifecycle.
Tags : 
    
Dell Server
Start   Previous    8 9 10 11 12 13 14 15 16 17 18 19 20 21 22    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.