design management

Results 51 - 75 of 202Sort Results By: Published Date | Title | Company Name

Cisco Systems Digital Network Architecture vs. Huawei Agile Campus

Published By: Cisco     Published Date: Dec 27, 2017
Miercom was engaged by Cisco Systems to independently configure, operate and then assess aspects of competitive campus-network infrastructures from Cisco Systems and Huawei Technologies. The products of each vendor were configured and deployed strictly according to the vendors' recommended designs, and using their respective software for campus-wide network management, control, configuration and monitoring.
Tags : 
    
Cisco

Cisco WebEx Web Conferencing

Published By: Cisco     Published Date: Dec 21, 2016
The Federal Risk and Authorization Management Program (FedRAMP) provides a cost-effective, risk-based approach for the adoption and use of cloud services by U.S. government agencies. FedRAMP processes are designed to assist federal government agencies in meeting Federal Information Security Management Act (FISMA) requirements for cloud systems. By standardizing on security assessment, authorization, and continuous monitoring for cloud products and services, this program delivers costs savings, accelerated adoption, and increased confidence in security to U.S. government agencies that are adopting cloud technologies.
Tags : 
    
Cisco

Cloud Computing Solutions

Published By: Raghu     Published Date: Nov 25, 2010
Cloud Design Services, Cloud Management Services and Cloud Infrastructure, Application Support Services and Cloud Tools & Platforms
Tags : 
cloud computing, cloud solution, css corp, cloud services, automation and testing, support services, cloud platform, as/400
    
Raghu

Cloud-based Predictive Analytics Becoming a Critical Source of Vendor Differentiation for Customers

Published By: Hewlett Packard Enterprise     Published Date: Apr 26, 2019
With the maturing of the all-flash array (AFA) market, the established market leaders in this space are turning their attention to other ways to differentiate themselves from their competition besides just product functionality. Consciously designing and driving a better customer experience (CX) is a strategy being pursued by many of these vendors.This white paper defines cloud-based predictive analytics and discusses evolving storage requirements that are driving their use and takes a look at how these platforms are being used to drive incremental value for public sector organizations in the areas of performance, availability, management, recovery, and information technology (IT) infrastructure planning.
Tags : 
    
Hewlett Packard Enterprise

CMD transforms wasted time into billable hours with better file and font management

Published By: Extensis     Published Date: May 04, 2008
Integrated marketing communications agency, CMD, has an easy way of tracking the payoff from implementing Portfolio Server and Suitcase Server to manage their digital assets and fonts. It's called more billable hours.
Tags : 
cmd, extensis, font, website design, server, communications, digital asset management', configuration management
    
Extensis

Complete storage and data protection architecture for virtual environments

Published By: Intel Corp.     Published Date: Aug 08, 2012
Virtualization reduces the number of physical servers IT needs to provision and maintain, but it also transforms the data protection paradigm. Now businesses can recover from failures in minutes, not hours, with unprecedented affordability. The key to achieving the best business uptime and cost savings is the effective design of storage management and data protection. This white paper outlines an end-to-end storage and data protection architecture optimized for VMware vSphere and Microsoft® Hyper-V environments.
Tags : 
complete, storage, data, protection, architecture, virtual, environments, virtualization
    
Intel Corp.

Confessions of a CFO: 6 Challenges That Keep CFOs Awake at Night

Published By: Intacct Corporation     Published Date: Jan 02, 2014
In this guide, written by and designed for CFOs and finance executives, you'll learn about specific actions that leading companies are taking to improve their performance by: • Gaining control over deferred revenue and revenue recognition. • Streamlining order management and the quote-to-cash process. • Maximizing recurring revenue and automating billing and renewals. • Improving cash and collections while decreasing churn. • Speeding consolidation, reporting, and analysis across multiple business entities and currencies. • Streamlining processes across your organization and reduce IT costs. Please download the whitepaper to learn more.
Tags : 
cfo, improved performance, streamlining, streamlining processes, cost reduction, decreasing churn, it cost reduction, it management
    
Intacct Corporation

Content is the New Perimeter: The Security and Regulatory Drivers for Information Rights Management

Published By: Intralinks     Published Date: Apr 13, 2015
They say content is king. But if your content isn’t protected, it’s a king with no clothes. The proliferation of mobile devices in the workplace, and the availability of cloud services designed for consumers, can lead to improper sharing of corporate data. Information that leaves your firewalls can live forever, and without adequate protection, can end up in the wrong hands. This report by Ovum takes a look at the challenges of information security and explores how a new generation of Information Rights Management (IRM) technology directly addresses the most critical concerns. Key topics include: • The threat posed by Dropbox and other consumer-grade FSS providers • The need for lifetime control of information and content • The ability to perform audits, and locate files, anywhere, and who accessed them • How next-generation IRM technology is available to add a new layer of security to every file
Tags : 
    
Intralinks

Content is the New Perimeter: The Security and Regulatory for Information Rights Management

Published By: Intralinks     Published Date: Oct 30, 2014
The proliferation of file sync and share (FSS) products and other cloud services designed for consumers, along with mobile devices, leads to improper sharing of corporate data. Information that leaves your firewalls can live forever, and without adequate protection, can end up in the wrong hands. So what’s the solution? Protect your information with next-generation information rights management (IRM) technology. You can email, copy, upload or share any IRM-secured document — and the protection travels with it. Key topics include: The threat posed by Dropbox and other consumer-grade FSS providers The need for lifetime control of information and content The ability to perform audits, and locate files, anywhere, and who accessed them How next generation IRM technology is available to add a new layer of security to every file Information technology professionals interested in using IRM for secure collaboration don’t want to miss this important report.
Tags : 
rights management, security and regulatory, file sync and share, cloud services, irm technology, secure collaboration, security, business technology
    
Intralinks

Creating an Enterprise Risk Management (ERM) program is a value-add for your organization

Published By: Fiserv     Published Date: Mar 02, 2018
Corporate governance. Capital Requirements. Information Security. Identifying and measuring potential risks help you connect the dots to create a sound ERM program for your organization. In today’s environment of security regulations and requirements, organizations must take a comprehensive approach to ERM to identify and mitigate potential threats. Risk is cumulative, and unidentified weaknesses can quickly spiral out of control, resulting in costly solutions that can lead to reputational damage. The first step in designing a sound ERM program is to understand which components are needed and how to implement them. Ten Steps to Enterprise Risk Management: A Comprehensive Approach Reveals the Big Picture, provides a straight-forward approach to creating a reliable, yet flexible program to address existing threats with the ability to adapt to emerging ones. In the end risk management is everybody’s job – do you have a plan in place to help your employees manage unpredictable threats and
Tags : 
corporate governance, capital requirements, information security, erm program, enterprise risk management
    
Fiserv

Creating The Workspace of the Future – Today

Published By: VMware     Published Date: May 10, 2017
What is a digital workspace and what does it take to create one? If we break it down, the workspace is a portal for end users into all of their apps and online services that they canseamlessly and securely access across devices and locations. But what makes the workspace of today different from the desktop or mobile device of the past? And how can you move forward with delivering a digital workspace? Download this solution brief to learn how VMware® Workspace™ ONE™is designed to deliver a digital workspace that integrates device management, application delivery, and identity management into a single platform on your terms, via your data center, in the cloud, or through a combination of the two. This workspace can be accessed by your end users across devices and locations and be centrally secured and supported to streamline management and improve the quality of services you deliver across the entire organization.
Tags : 
    
VMware

Data Center Network Evolution WP

Published By: Cisco     Published Date: Sep 15, 2015
New business demands and technology trends are changing the role of IT and introducing new challenges to application availability that yesterday’s data centers were not designed to address. By upgrading to Cisco Nexus® switches—purpose-built for today’s data center needs—you can: ? Increase performance and scalability to meet the demands of virtualization, cloud computing, and modern enterprise applications ? Radically simplify management and operations ? Quickly adapt infrastructure to align the data center network with the needs of your business applications, today and in the future
Tags : 
applications, systems integration, cloud, development, network architecture, network management, network performance, application integration
    
Cisco

Deliver Distribution Growth

Published By: Epicor     Published Date: Jul 06, 2017
Distribution is being transformed by digital innovations. More and more distributors are replacing manual, paper-driven processes with digital tools and automation that allow employees to work more efficiently and effectively in the warehouse and beyond. Efficiency doesn’t just benefit employees—modern technology can help keep customers and vendors happier with up-to-date information accessible anytime. Epicor Prophet 21 software was designed to meet the unique needs of distributors. It offers robust features including eCommerce, mobility tools, customer relationship management (CRM), wireless warehouse management, purchase management, and analytics to make more informed business decisions. With deep industry knowledge and best practices built into features throughout the solution, Prophet 21 can deliver the digital transformation your organization needs to grow.
Tags : 
erp software, enterprise resource planning software, distribution software, prophet 21, p21, inventory management
    
Epicor

Deliver Mobile Apps: A Lifecycle Approach

Published By: HP - Enterprise     Published Date: Jun 04, 2013
Mobility services are frequently being positioned as part of broader application transformation offerings, enabling enterprises to support the bring-your-own-device (BYOD) approach, with the development of enterprise app stores and the ability to leverage personal devices for business functions. This white paper describes software and services that accelerate and simplify the creation of internally developed or “in-house” enterprise mobile applications. It also describes how to deploy and manage these mobile apps on both company-provided and “bring-your-own” smartphones and tablet computers. Solving the complete mobile app lifecycle means transforming enterprise apps for multiscreen devices; facilitating design, testing, security, performance, management, and compliance to reach new customers and employee expectations.
Tags : 
mobile apps, lifecycle approach, mobility services, bring-your-own-device, software, mobile computing, mobile data systems, smart phones
    
HP - Enterprise

Demystifying DO-254

Published By: Mentor Graphics     Published Date: Aug 20, 2009
Interest in DO-254 first occurred in Europe and has since spread to the US commercial aircraft industry. If you are being asked about your company's DO-254 direction and compliance, but have been overwhelmed with information on the subject, then this article is for you.
Tags : 
demystifying do-254, mentor graphics, airborne electronic hardware, hardware design assurance strategy, configuration management process, eda tools, analytical applications, content management system
    
Mentor Graphics

Design an Identity and Access Management Program Optimized for Your Business

Published By: IBM     Published Date: Oct 26, 2017
In today’s complex and distributed IT environments, identity and access management (IAM) programs do much more than simply manage user identities and grant access. They are at the core of achieving critical business objectives that are relevant to every high-performing organization. As a result, there are few IT or security initiatives that demand as much deliberation and scrutiny.
Tags : 
identity management, access management, it environments, data security, business performance
    
IBM

Design, Operate and Maintain for the Utility Industry

Published By: IFS     Published Date: Aug 15, 2011
Design, Operate, Maintain (DOM) - key concepts in asset management and maintenance, repair and operation. Utility facility designers and those who operate and maintain those facilities need to work together closely to improve plant efficiency and business profitability over time.
Tags : 
ifs, dom, design operate maintain, utility industry, plant efficieny, emissions, eam, enterprise software
    
IFS

Designing an identity and access management program optimized for your business

Published By: IBM     Published Date: Jan 09, 2017
In today’s complex and distributed IT environments, identity and access management (IAM) programs do much more than simply manage user identities and grant access. This paper provides four key steps that can move you toward a more mature solution now.
Tags : 
ibm, security, services operations, iam programs, enterprise applications, business technology
    
IBM

Direct Digital Manufacturing: Impact and Opportunity, Part 1—Freedom To Redesign

Published By: RedEye On Demand     Published Date: Jun 23, 2008
Rapid manufacturing's benefits extend far beyond the upfront savings on tooling. Discover how it will improve your operations, sales and profits and why it is heralded as the next industrial revolution. In the first of a series, you will discover the benefits of the freedom to redesign your products at any stage in the life cycle.
Tags : 
plm, product design, product lifecycle management, design, redeye
    
RedEye On Demand

Direct Digital Manufacturing: Impact and Opportunity, Part 2—Freedom Of Design

Published By: RedEye On Demand     Published Date: Jun 23, 2008
Adhering to the constraints and limiting design freedoms are necessary for conventional manufacturing processes. Rapid manufacturing eliminates all of the design constraints imposed by conventional manufacturing methods. It offers designers and engineers an unprecedented freedom to design a product and its components exclusively for the desired form, fit and function.
Tags : 
scm, design, product design, plm, product lifecycle management, redeye
    
RedEye On Demand

Economic Value Validation of Riverbed Performance Management Cascade

Published By: Riverbed     Published Date: Jul 15, 2014
ESG was engaged by Riverbed to develop a detailed EVV analysis designed to help IT organizations determine the relative costs and benefits of deploying Riverbed Cascade compared with a typical performance management solution.
Tags : 
economic value, validation, performance, management, esg, network performance, network performance management, application performance management
    
Riverbed

Eddison White Paper: Advantages & Efficiencies of Oracle SPARC S7 Server Over Commodity Alternatives

Published By: Oracle     Published Date: Oct 20, 2017
This whitepaper explores the new SPARC S7 server features and then compares this offering to a similar x86 offering. The key characteristics of the SPARC S7 to be highlighted are: Designed for scale-out and cloud infrastructures SPARC S7 processor with greater core performance than the latest Intel Xeon E5 processor Software in Silicon which offers hardware-based features such as data acceleration and security The SPARC S7 is then compared to a similar x86 solution from three different perspectives, namely performance, risk and cost. Performance matters as business markets are driving IT to provide an environment that: Continuously provides real-time results. Processes more complex workload stacks. Optimizes usage of per-core software licenses Risk matters today and into the foreseeable future, as challenges to secure systems and data are becoming more frequent and invasive from within and from outside. Oracle SPARC systems approach risk management from multiple perspectiv
Tags : 
    
Oracle

Eddison White Paper: Advantages & Efficiencies of Oracle SPARC S7 Server Over Commodity Alternatives

Published By: Oracle CX     Published Date: Oct 20, 2017
This whitepaper explores the new SPARC S7 server features and then compares this offering to a similar x86 offering. The key characteristics of the SPARC S7 to be highlighted are: ? Designed for scale-out and cloud infrastructures ? SPARC S7 processor with greater core performance than the latest Intel Xeon E5 processor ? Software in Silicon which offers hardware-based features such as data acceleration and security The SPARC S7 is then compared to a similar x86 solution from three different perspectives, namely performance, risk and cost. Performance matters as business markets are driving IT to provide an environment that: ? Continuously provides real-time results. ? Processes more complex workload stacks. ? Optimizes usage of per-core software licenses. Risk matters today and into the foreseeable future, as challenges to secure systems and data are becoming more frequent and invasive from within and from outside. Oracle SPARC systems approach risk management from multiple perspectiv
Tags : 
    
Oracle CX

Eight decisive success factors for an employee engagement program

Published By: IBM     Published Date: Jan 30, 2017
This white paper highlights factors that have a decisive influence on the design and effectiveness of employee engagement programs. The results revealed in this study help to ensure future engagement programs are implemented even more successfully. Through successful engagement programs, the HR department can better position itself as a strategic partner of company management and ensure HR has an influence.
Tags : 
ibm, employee engagement, engagement, employee voice
    
IBM

EMA: HP IRF Simplifies Networks and Operations

Published By: HP and Intel® Xeon® processors     Published Date: May 08, 2012
This EMA paper reviews the HP IRF approach and examines potential savings and efficiencies that it enables specific to the design, deployment, and ongoing operations management of Ethernet networks.
Tags : 
smb, networks, operations, ethernet, ema, design, ethernet networks, ip networks
    
HP and Intel® Xeon® processors
Start   Previous    1 2 3 4 5 6 7 8 9    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.