embedded

Results 76 - 100 of 127Sort Results By: Published Date | Title | Company Name

Real-time Agility: Core Principles and Practices for Embedded-Software Teams

Published By: IBM     Published Date: Oct 10, 2014
This paper introduces practical approaches to Agile focused on core principles and practices and shows how they improve project results for embedded systems development.
Tags : 
ibm, agility, software productivity, agile teams, agile practice, faster solutions, adoption mistakes, dummies, ebook, software teams, growing popularity, growing scalability, real-time, embedded software, solution for systems, software development, it management, change management, collaboration
    
IBM

How to Simplify SSL Certificate Management

Published By: Symantec Corporation     Published Date: Oct 08, 2014
"SSL certificates have moved beyond the ‘Buy’ page. They are embedded in your business. In fact, SSL Certificates are a business-critical part of your IT infrastructure. However, managing individual certificates in a large organization is complicated by multiple locations, many servers, different business units, and rapidly growing Web-based services. The risks of hiccups and problems increases with the number of certificates, including lost sales when customers see security warnings about expired certificates on your site, damage to your brand and consumer trust because of problems with certificates and more. With these risks in mind, this guide provides five simple steps for IT professionals to take control of SSL certificates across the enterprise, and recommendations centralizing certificate management throughout their lifecycle."
Tags : 
ssl
    
Symantec Corporation

Analytics: The Real-World Use of Big Data in Retail

Published By: IBM     Published Date: Aug 06, 2014
In this fact-based retail perspective, you will learn five key steps to start acting on the business insights embedded in your shopper, consumer and supplier interactions.
Tags : 
ibm, retail, analytics, data, big data, insights, shopper, consumer, supplier
    
IBM

3 Ways Real-Time Tracking Powers Digital Factories

Published By: Zebra     Published Date: Jul 10, 2014
Digital voices are everywhere in a digital factory. In this brief, we’ll elaborate on the technology tools digital factories use for three common functions: asset management, production planning and materials replenishment.
Tags : 
zebra, digital factories, asset management, production planning, material replenishment, embedded sensors, software, wireless, cloud, enterprise applications, data management, data center
    
Zebra

Streamlined server management at every stage of the IT life cycle

Published By: Hewlett-Packard Company     Published Date: May 15, 2014
Traditional server management and provisioning can create unnecessary burdens for many organizations. Information technology (IT) administrators in today’s business environments need a more streamlined process to manage servers throughout the IT life cycle, including tools to help them diagnose problems and procedures for efficiently resolving errors. This white paper provides an in-depth look at the key capabilities of HP Integrated Lights-Out (iLO) embedded in every ProLiant Gen8 server, the solution’s scalable licensing offerings, and mobile-app features that support IT staff—anywhere, anytime.
Tags : 
server management, ilo, proliant gen8 server, it management, enterprise applications
    
Hewlett-Packard Company

Delivering on the Promise of Virtualization: Cisco Unified Computing System

Published By: Cisco     Published Date: Apr 08, 2014
The Cisco Unified Computing System™ (Cisco UCS®) delivers on the promise of virtualization with a single unified system that integrates a unified fabric, embedded management, and powerful servers with intelligent Intel® Xeon® processors.
Tags : 
cisco, virtualization, cisco inified computing system, best practices, customer interaction service, project management
    
Cisco

ISVs: Top 5 Ways Embedded Connectivity Accelerates Your Business

Published By: Progress Software     Published Date: Mar 12, 2014
This paper demonstrates how Progress DataDirect Connect helps you accelerate your business by paving the way for operational excellence, customer satisfaction, revenue growth, profitability and market leadership.
Tags : 
progress software, connectivity, isv, datadirect connect, customer satisfaction, software development, data management, business technology, data center
    
Progress Software

Beyond Software: Agile for Product Development

Published By: IBM     Published Date: Feb 27, 2014
Agile methods are increasingly popular in application, enterprise and embedded development. Yet the question remains: Do the 12 agile principles apply to more than just software? Find out how leading companies are beginning to exploit agile's iterative processes for far more than software.
Tags : 
ibm, ibm software, product development, systems engineering, agile organization, embedded development, enterprise, application, 12 principles, customer satisfaction, change management, evolving product, working motivation, principle measure, adaptation, agile development, traditional development, customer collaboration, best practices, business intelligence
    
IBM

How to Simplify SSL Certificate Management

Published By: Symantec Corporation     Published Date: Aug 28, 2013
SSL certificates have moved beyond the ‘Buy’ page. They are embedded in your business. For example, they protect remote communications via webmail, chat and IM. Browser-to-server communications for cloud-based services require SSL certificates to protect confidential information. In addition, SSL certificates are used to secure server-to-server communications for applications and data exchange. In fact, SSL Certificates are a business-critical part of your IT infrastructure. However, managing individual certificates in a large organization is complicated by multiple locations, many servers, different business units, and rapidly growing Web-based services.
Tags : 
ssl certificates, communication, webmail, technical support, technology, data, security, knowledge management, data management, business technology
    
Symantec Corporation

11 Key Questions to Ask of a BI Solution

Published By: Birst     Published Date: Jul 16, 2013
This whitepaper first looks at the fundamental requirements that a BI solution should deliver to your company. Next, this whitepaper covers the 11 Key Questions that you should be asking of a future BI technology partner. When the BI provider can answer Yes to all of these questions, you have BI that is capable of fulfilling your analytical and reporting needs .
Tags : 
business intelligence, agile bi, self service bi, bi in the cloud, unified bi, mobile bi, embedded analytics, business analytics, sales analytics, hr analytics, marketing analytics, financial analytics, supply chain analytics, automated data management, dashboards, infrastructure
    
Birst

10 Critical Sales Management Reports that Salesforce.com Can't Generate and 10 Reasons to Care

Published By: Birst     Published Date: Jul 16, 2013
Birst’s Salesforce Reporting and Analytics helps sales managers analyze all of the critical salesforce.com data to uncover insightful pipeline information. Combining sales data with marketing, financial and operational data to obtain a comprehensive view of the pipeline is where Birst excels.
Tags : 
business intelligence, agile bi, self service bi, bi in the cloud, unified bi, mobile bi, embedded analytics, business analytics, sales analytics, hr analytics, marketing analytics, financial analytics, supply chain analytics, automated data management, dashboards, infrastructure
    
Birst

7 Signs You Need Advanced Analytics for Salesforce.com (or any CRM) and Why They Matter

Published By: Birst     Published Date: Jul 16, 2013
Discover seven indications that you need advanced analytics for your CRM application and why they matter. Learn about common CRM data analysis pain points and how advanced CRM analytics can solve them.
Tags : 
business intelligence, agile bi, self service bi, bi in the cloud, unified bi, mobile bi, embedded analytics, business analytics, sales analytics, hr analytics, marketing analytics, financial analytics, supply chain analytics, automated data management, dashboards, infrastructure
    
Birst

2013 Wisdom of the Crowds Business Intelligence Market Study

Published By: Birst     Published Date: Jul 16, 2013
Covering 23 vendors and 5 market segments, the 2013 Wisdom of Crowds Business Intelligence Market Study helps readers understand the current market landscape including the perceptions and plans of organizations adopting BI solutions, the latest user trends and technology.
Tags : 
business intelligence, agile bi, self service bi, bi in the cloud, unified bi, mobile bi, embedded analytics, business analytics, sales analytics, hr analytics, marketing analytics, financial analytics, supply chain analytics, automated data management, dashboards, infrastructure
    
Birst

The Top 10 Business Questions That Drive Your BI Technology Requirements

Published By: Birst     Published Date: Jul 16, 2013
This BI guide has 10 real-life business scenarios that will elicit your business intelligence requirements in plain English. Key stakeholders and executive sponsors will get an easy-to-digest view of business intelligence requirements without getting into the details.
Tags : 
business intelligence, agile bi, self service bi, bi in the cloud, unified bi, mobile bi, embedded analytics, business analytics, sales analytics, hr analytics, marketing analytics, financial analytics, supply chain analytics, automated data management, dashboards, infrastructure
    
Birst

The New Reality of Stealth Crimeware

Published By: McAfee     Published Date: Feb 06, 2013
Take the stealth, creativity and patience of Stuxnet, the commercialism, wide distribution and easy-to-use toolkits of Zeus, and you understand the potency of today’s malware. Start planning now to protect your intellectual property and other assets.
Tags : 
zues, stuxnet, stealthy threats, rootkits, malware, rootkit binaries, zero-day vulnerabilities, botnet, ddos attacks, keylogging, phishing, trojans, embedded security, endpoint security, anti spam, anti spyware, anti virus, encryption, hacker detection, internet security
    
McAfee

Stealthy Threats: Driving a New Approach to Security

Published By: McAfee     Published Date: Feb 06, 2013
Prevent rootkits and other stealthy threats with integrated solutions from Intel and McAfee that deliver embedded security to protect beyond the operating system.
Tags : 
stealthy threats, malware, stealth crimeware, rootkits, cybercrime, stuxnet, zeus, zero-day threats, kernel-mode rootkits, zeus botnets, kernel level security, anti spam, anti spyware, anti virus, application security, internet security, intrusion detection, intrusion prevention, security management, vulnerability management
    
McAfee

Strategy Guide to Application Modernization in Government

Published By: HP and Intel® Xeon® processors     Published Date: Dec 20, 2012
This whitepaper is a rich media document, and includes industry viewpoints, multimedia content, and up to three detailed customer case studies embedded within this single dossier - mainly about application modernization in government.
Tags : 
application modernization, modernization, government, data management, business technology
    
HP and Intel® Xeon® processors

Strategy Guide: Application Modernization In Government

Published By: HP - Intel®     Published Date: Oct 05, 2012
This whitepaper is a rich media document, and includes industry viewpoints, multimedia content, and up to three detailed customer case studies embedded within this single dossier.
Tags : 
virtualization, virtualized servers, it infrastructure, government, application modernization, servers, blade servers, business technology
    
HP - Intel®

Strategy Guide: Cloud In Government and Educational Institutions

Published By: HP - Intel®     Published Date: Oct 05, 2012
This whitepaper is a rich media document, and includes industry viewpoints, multimedia content, and up to three detailed customer case studies embedded within this single dossier.
Tags : 
cloud, cloud computing, virtualization, application modernization, blade servers, business technology, infrastructure
    
HP - Intel®

Strategy Guide: Security Information Management In Government

Published By: HP - Intel®     Published Date: Oct 05, 2012
This whitepaper is a rich media document, and includes industry viewpoints, multimedia content, and up to three detailed customer case studies embedded within this single dossier.
Tags : 
security, security practices, enterprise security, security information management, government, application security, security services, server virtualization, business technology
    
HP - Intel®

Servers So Intelligent, They Redefine the Service Experience

Published By: HP and Intel® Xeon® processors     Published Date: Oct 04, 2012
HP has developed new online and enhanced remote service technologies designed to capitalize on the embedded HP ProLiant Gen8 management and monitoring capabilities.
Tags : 
servers, intel, gen8, cloud, business technology, cloud computing
    
HP and Intel® Xeon® processors

3rd Gen Intel® Core™ vPro™ Processor Crimeware Protection

Published By: Intel     Published Date: Aug 10, 2012
3rd generation Intel® CoreT vProT helps IT to deliver crimeware protection and unprecedented embedded security for your clients and business data
Tags : 
it management, remote diagnoses, reimaging, pcs, intel, enterprise security, save time, save money, cloud computing, virtualization, enterprise applications, data management, mobile computing, mobile data systems, mobile workers, business technology
    
Intel

Improving claims management outcomes with predictive analytics

Published By: IBM     Published Date: Aug 07, 2012
As a claims management professional, you have to deal daily with formidable - and sometimes competing - challenges: provide superior customer experience; achieve operational excellence and cost containment; and effectively manage risk. Predictive analytics can help you improve each of these three outcomes, but more importantly, it helps strike the right balance among these three objectives for each new claim received. Read this white paper from IBM to learn about applying predictive analytics to claims management, including the typical ROI achieved, how embedded analytics improves decision making, and technology components of a predictive analytics solution.
Tags : 
improving, claims, management, outcomes, predictive, analytics, claims, management, professional, formidable, competing, superior, customer, experience, operational, excellence, cost, containment, risk, predictive
    
IBM

Complimentary Ventana Research Value Index Report: Total Compensation Management 2012

Published By: Success Factors     Published Date: Aug 02, 2012
This free Ventana Research report shows SuccessFactors to be a top supplier of applications that support the management and operations of compensation. According to Ventana, SuccessFactors Compensation (part of SuccessFactors BizX Suite) achieved the top overall ranking due to its scores in Reliability and Capabilities. In addition, the growing number of SuccessFactors customers and the company's commitment to cloud computing contributed to its top ranking in the Validation and TCO/ROI categories. Easy for managers at all levels to use, the application has capabilities for compensation reviews and adjustments, as well as an embedded analytic view-which shows the handling of promotions and support across pay ranges. Find out what else Ventana has to say about SuccessFactors in this complimentary report. Download it today.
Tags : 
successfactors, sap, ventana research, value index, total compensation management, benchmark research, human capital, vendors, value index, total cost operations, return on investment, roi, tco, usability, manageability, reliability, capability, adaptability, validation, successfactors
    
Success Factors

Quest Workspace Help Desk

Published By: Dell Software     Published Date: Jul 24, 2012
Quest Workspacetm Help Desk is a robust help desk solution for small to medium-sized businesses with complex network environments. It provides a powerful combination of management features integrated with a best-of-breed IT help desk platform. Use the help desk software to manage the ticket system workflows, dashboards, reporting and end-user self-service portals. Use the embedded management features within the help desk platform to proactively manage network events, desktops, servers and applications as well as resolve issues faster and more effectively.
Tags : 
help desk, active directory, resolve issues, reports, windows, iphone, priorituze requests, auto escalation, organizational data, customize reports, cuztomize dashboards, data fields, scriptlogic, quest software, itil, service levels, proactive event management, data management, infrastructure, internetworking hardware
    
Dell Software
Start   Previous    1 2 3 4 5 6    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.