design management

Results 1 - 25 of 195Sort Results By: Published Date | Title | Company Name

Return on Responsive Web Design

Published By: Adobe     Published Date: Jul 09, 2014
This paper outlines factors that influence successful business results and provides tips to achieve efficiency in content design, management, and publishing, ultimately increasing the return on your investment in responsive design.
Tags : 
responsive web design, adobe
    
Adobe

Charting a course for an exceptional customer experience.

Published By: Adobe     Published Date: Jun 26, 2019
While having the right tech is key to delivering great experiences, an equally important part of the equation is having the right people, processes and org structures. Three best practices to design your org for successful experience delivery: 1. Cultivate the right skills and find the right talent for customer obsession 2. Set up org structures that encourage cross channel collaboration 3. Embrace the possibility of using external support to address the challenges of change management
Tags : 
    
Adobe

Wireless Security: Ensuring Compliance with HIPAA, GLBA, SOX, DoD 8100.2 & Enterprise Policy

Published By: AirDefense     Published Date: Apr 24, 2007
This white paper is designed to guide network administrators and security managers to design, implement, and enforce wireless LAN security policies that enable every organization to fully reap the benefits of wireless LANs without experiencing undue management pains and security holes.
Tags : 
sox, sarbox, sarbanes oxley, sarbanes-oxley, compliance, hipaa, wlan, wlans
    
AirDefense

Keeping Cool In The Data Center

Published By: Alcatel-Lucent     Published Date: Dec 02, 2009
Faster, more powerful and dense computing hardware generates significant heat and imposes considerable data center cooling requirements.
Tags : 
data center design and management, distributed computing, internetworking hardware, power and cooling, database development, data integration
    
Alcatel-Lucent

IDS Evaluation Guide

Published By: AlienVault     Published Date: Mar 30, 2016
An Intrusion Detection System (IDS) is an essential tool in every security practitioner’s arsenal. Intrusion Detection Systems are designed to gather and analyze information from networks and hosts to detect malicious activity both before and after a security breach. In this guide, you will learn about the critical components of host and network IDS, requirements to evaluate IDS solutions, as well as how AlienVault Unified Security Management (USM) meets those requirements. Topics covered to help you evaluate IDS solutions include: • An overview of network and host-based IDS • Signature-based vs. anomaly-based systems • Throughput of IDS solutions • Protocol analysis • Aggregation capabilities • Integration capabilities • Contextual enhancement Download your version now to learn what capabilities you should consider when evaluating IDS solutions.
Tags : 
    
AlienVault

AlienVault® USM™: The Perfect Rx for HIPAA Compliance

Published By: AlienVault     Published Date: Oct 20, 2017
The security-oriented rule of the Health Insurance Portability and Accountability Act (HIPAA) is designed to ensure the confidentiality, integrity, and security of ‘electronic protected health information’ (ePHI). However, to comply with the Security Rule and to demonstrate that security controls are in place and working is no easy task, especially for today’s resource-constrained IT security teams. AlienVault® Unified Security Management™ (USM) helps you to accelerate your path to HIPAA compliance and simplifies maintaining your HIPAA certification thereafter. With multiple essential security capabilities together into a single platform, AlienVault USM gives you an affordable and easy-to-use solution to satisfy the HIPAA Security Rule, and provides highly customizable, predefined HIPAA compliance reports out of the box, making it fast and simple to get the visibility you need to maintain your organization’s security posture.
Tags : 
    
AlienVault

How to select benefits management software that will meet your company's current and future needs.

Published By: Ascentis     Published Date: Sep 28, 2010
HRIS solutions designed for very large organizations can be costly to set up and maintain, and often require the services of an army of consultants to keep them operational. Systems designed for very small organizations concentrate on either HR functions such as attendance and compensation, or on benefits management, but usually lack the ability to integrate the two areas. To be a practical investment choice for a mid-tier organization, a satisfactory HRIS solution must have its HR and benefits functions highly integrated. It must be agile so it can easily be kept aligned with the constant change in compliance laws, and it must be robust and secure, built on a tried and true platform foundation.
Tags : 
ascentis, open enrollment, benefits, automation, accuracy, self-service, human resources, errors
    
Ascentis

4 Revenue Metrics Driving Event Management Software Growth

Published By: Aventri     Published Date: Aug 14, 2018
"Revenue focused executives have four metrics that determine their success or failure: number of opportunities, size of opportunities, win rate, and speed to revenue. All teams work together to make sure that they achieve these goals and that they have the processes in place to optimize around them. Event management software is one piece of the puzzle that is designed to generate revenue. Read this eBook to see how event management software helps to speed up the buying process and win more deals!"
Tags : 
    
Aventri

4 Revenue Metrics Driving Event Management Software Growth

Published By: Aventri     Published Date: Apr 29, 2019
"Revenue focused executives have four metrics that determine their success or failure: number of opportunities, size of opportunities, win rate, and speed to revenue. All teams work together to make sure that they achieve these goals and that they have the processes in place to optimize around them. Event management software is one piece of the puzzle that is designed to generate revenue. Read this eBook to see how event management software helps to speed up the buying process and win more deals!"
Tags : 
    
Aventri

What You Need to Know About Operationalizing Your AWS Transit Hub

Published By: Aviatrix     Published Date: Jun 11, 2018
Once you've designed and secured your Global Transit Network, are you done? Are you ready to hand day-to-day responsibility over to an operations team? Or, are there other elements you need to ensure that the day-to-day operation of your transit hub is efficient and effective? As part of our fact-filled AWS Bootcamp series, Aviatrix CTO Sherry Wei and Neel Kamal, head of field operations at Aviatrix, demonstrate the best practices they've gleaned from working with operations teams, all who require: • Visibility: Do you have a way to centrally view your network, see performance bottlenecks, control security policies, and set other configuration details? • Deep Analytics: Can you easily gather performance and audit data and export it to Splunk, DataDog, or other advanced reporting tools? • Monitoring and Troubleshooting: Do you have a real-time view of network health, and how easily can you access the data needed to locate and fix issues? • Alert Management: When issues do occur, what r
Tags : 
aws, aws vpc, aws global transit network, aws transit vpc, cisco csr, csr 1000v
    
Aviatrix

Top 10 Features of BlackBerry Enterprise Service 10

Published By: BlackBerry     Published Date: Mar 12, 2013
BlackBerry® Enterprise Service 10 is designed to help organizations like yours address the full spectrum of Enterprise Mobility Management (EMM) challenges. In this webcast, find out what senior IT leaders like most about it.
Tags : 
blackberry 10, service, emm, enterprise mobility management, knowledge management, enterprise applications, mobile computing, mobile data systems
    
BlackBerry

Reporting Pages

Published By: Bluewater Learning     Published Date: Apr 30, 2018
Many Learning and Talent Management platforms don’t have the flexibility to customize the type of reporting that users want, or it’s too complicated to figure out. Bluewater’s team of developers and designers can create completely customized pages within your Learning and Talent Management System* for a seamless delivery of what you need,
Tags : 
    
Bluewater Learning

Integrating & Automating Composite Applications

Published By: BMC Control M     Published Date: Jul 16, 2009
Batch Application Integration allows you to process critical transactions, such as payment authorizations, in real-time, and cue fulfillment (such as packaging and shipping) or other lower priority actions for batch processing. Learn more about Batch Application Integration, and how BMC CONTROL-M makes it possible.
Tags : 
integrating, automation, composite applications, bmc, control-m, enterprise architects, batch application integration, batch processing
    
BMC Control M

Integrating & Automating Composite Applications.

Published By: BMC Control M     Published Date: Jul 22, 2009
Batch Application Integration allows you to process critical transactions, such as payment authorizations, in real-time, and cue fulfillment (such as packaging and shipping) or other lower priority actions for batch processing. Learn more about Batch Application Integration, and how BMC CONTROL-M makes it possible.
Tags : 
integrating, automation, composite applications, bmc, control-m, enterprise architects, batch application integration, batch processing
    
BMC Control M

Integrating and Automating Composite Applications.

Published By: BMC Software     Published Date: Jun 30, 2009
Batch Application Integration allows you to process critical transactions, such as payment authorizations, in real-time, and cue fulfillment (such as packaging and shipping) or other lower priority actions for batch processing. Learn more about Batch Application Integration, and how BMC CONTROL-M makes it possible.
Tags : 
integrating, automation, composite applications, bmc, control-m, enterprise architects, batch application integration, batch processing
    
BMC Software

Mobile First: Securing Information Sprawl

Published By: Box     Published Date: Jun 19, 2014
Mobile device management solutions are designed to set and enforce management at the device level, but have no inherent control of applications or content on those devices. As a result, IT leaders are looking to enterprise mobility management solutions to enable management, configuration and security across devices, applications and content – effectively addressing the problem of information sprawl. Learn how the partnership between Box and MobileIron can help you execute a “mobile first” strategy that manages and secures both mobile apps and content.
Tags : 
box, mobile first, securing information, mobile device management solutions, applications, enable management, it management, enterprise applications
    
Box

Enterprise Architecture Is More Than Engineering

Published By: Burton Group     Published Date: Jul 07, 2008
While many enterprise architecture (EA) programs may be less than effective or threatened by extinction, the EA discipline is still an important set of skills and processes that improve IT decision-making and CIO effectiveness. Yet, after decades of architecting systems, the advent of several EA frameworks, and the many definitions available for the term EA, we still strive to understand what EA is, what it does, and what it looks like when it is successful.
Tags : 
architecture, architect, network architecture, it management, network design, network management, burton group, enterprise architecture
    
Burton Group

Manage the Mobile Madness

Published By: CDW     Published Date: Jun 30, 2015
See why CDW has the expertise to design and deliver the best enterprise mobility management (EMM) solution for how your business handles the mobile device hoopla.
Tags : 
mobility, apps, strategy, platform, emm, risk management, productivity, monitoring
    
CDW

Enabling the Path to Private Cloud: Automation

Published By: CDW     Published Date: Apr 04, 2016
A critical step in moving from a shared virtualized environment toward a private cloud is the transition from infrastructure optimization to service optimization. NetApp’s design approach, technologies, and ecosystem integration build upon our storage efficiencies to deliver service-level efficiencies using centralized, policy-based management and automation. With NetApp® OnCommand® Workflow Automation, an efficient service-oriented approach can be implemented that enables storage provisioning, data protection, and operational processes to be integrated and automated. As a result, enterprises can meet workload service-level requirements while greatly reducing management costs and improving business agility.
Tags : 
cloud management, cloud services, cloud management, it infrastructure, cloud application, cloud computing, infrastructure, technology
    
CDW

Enabling the Path to Private Cloud: Automation

Published By: CDW - NetApp     Published Date: Apr 07, 2016
A critical step in moving from a shared virtualized environment toward a private cloud is the transition from infrastructure optimization to service optimization. NetApp’s design approach, technologies, and ecosystem integration build upon our storage efficiencies to deliver service-level efficiencies using centralized, policy-based management and automation. With NetApp® OnCommand® Workflow Automation, an efficient service-oriented approach can be implemented that enables storage provisioning, data protection, and operational processes to be integrated and automated. As a result, enterprises can meet workload service-level requirements while greatly reducing management costs and improving business agility.
Tags : 
cloud management, cloud services, cloud management, it infrastructure, cloud application, cloud computing, infrastructure, technology
    
CDW - NetApp

Managing Software Exposure Report

Published By: CheckMarx     Published Date: Apr 03, 2019
In the early years of software development, you would often design it, build it, and only then think about how to secure it. This was arguably fine in the days of monolithic applications and closed networks, when good perimeter-based protection and effective identity and access management would get you a long way towards minimising the risk. In today’s highly connected, API-driven application environments, however, any given software component or service can be invoked and potentially abused in so many different ways. Add to this the increasing pace of change through iterative ‘DevOps-style’ delivery and ever-faster release cycles, and many understandably assert that security management and assurance nowadays needs to be an ongoing and embedded part of the development and delivery process.
Tags : 
    
CheckMarx

Magic Quadrant for Application Security Testing

Published By: CheckMarx     Published Date: Jun 21, 2019
DevSecOps, modern web application design and high-profile breaches are expanding the scope of the AST market. Security and risk management leaders will need to meet tighter deadlines and test more complex applications by accelerating efforts to integrate and automate AST in the software life cycle.
Tags : 
    
CheckMarx

Cherwell Service Management Software

Published By: Cherwell Software     Published Date: Apr 07, 2016
Cherwell Service Management™ software empowers IT organizations to easily manage their infrastructure at a fraction of the cost and complexity associated with traditional, legacy IT service management software. Designed with a metadata-driven approach, the Cherwell Service Management platform can easily be configured to meet process and integration requirements without writing or touching a single line of code. Furthermore, configurations will never break during version upgrades.
Tags : 
best practices, customer support, business intelligence, business optimization, business management
    
Cherwell Software

Data Center Network Evolution WP

Published By: Cisco     Published Date: Sep 15, 2015
New business demands and technology trends are changing the role of IT and introducing new challenges to application availability that yesterday’s data centers were not designed to address. By upgrading to Cisco Nexus® switches—purpose-built for today’s data center needs—you can: ? Increase performance and scalability to meet the demands of virtualization, cloud computing, and modern enterprise applications ? Radically simplify management and operations ? Quickly adapt infrastructure to align the data center network with the needs of your business applications, today and in the future
Tags : 
applications, systems integration, cloud, development, network architecture, network management, network performance, application integration
    
Cisco

Campus Wireless LAN Technology Design Guide

Published By: Cisco     Published Date: Feb 23, 2016
Cisco Validated Designs (CVDs) present systems that are based on common use cases or engineering priorities. CVDs incorporate a broad set of technologies, features, and applications that address customer needs. Cisco engineers have comprehensively tested and documented each design in order to ensure faster, more reliable, and fully predictable deployment.
Tags : 
customer engagement, business practices, technology, design management, wireless communications, best practices, business intelligence, business management
    
Cisco
Start   Previous   1 2 3 4 5 6 7 8    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.