• RSS
  • Twitter
  • FaceBook

Related Topics

Add White Papers

Get your company's white papers in the hands of targeted business professionals.

asset management

Results 351 - 375 of 380Sort Results By: Published Date | Title | Company Name
By: Tririga     Published Date: Nov 10, 2011
This white paper covers the primary findings from the Sustainable Asset Management Survey conducted by TRIRIGA and Gartner.
Tags : 
sustainability, strategies, tactics, tririga, gartner, energy, environmental programs, facilities
    
Tririga
By: Tririga     Published Date: Nov 14, 2011
Take a look at this white paper to find out how asset and integrated workplace management can help create smarter buildings!
Tags : 
sustainable, operations, business, integrated, resources, consumption, competitive advantage
    
Tririga
By: IBM     Published Date: Apr 18, 2012
This webcast features a conversation with Tom Lentz, Manager of IT and Finance for the Facilities Department at The Johns Hopkins Hospital in Baltimore, MD/USA. During this Webcast, Axendia Industry Analyst Daniel Matlis discusses with Mr. Lentz how The Johns Hopkins Hospital uses its Integrated Asset and Service Management solution to improve uptime to support patient care; control costs for procurement, maintenance, labor and materials; support regulatory compliance activities; and use workflow capabilities for internal controls.
Tags : 
healthcare, johns hopkins, cost, asset management, service management, ibm
    
IBM
By: Adobe     Published Date: Feb 20, 2014
Adobe positioned highest in Ability to Execute and Completeness of Vision in Gartner’s Magic Quadrant for Web Content Management. Gartner’s evaluation is based on Adobe Experience Manager, part of the Adobe Marketing Cloud. Adobe is named a Leader and is positioned highest in both Ability to Execute and Completeness of Vision.
Tags : 
gartner, adobe, adobe social, digital asset management, web content management, adobe experience manager, aem, internet marketing
    
Adobe
By: ServiceNow     Published Date: Apr 19, 2013
Unauthorized software, painful software license compliance audits, long fulfillment times, limited visibility, unaccountability... if these issues sound familiar, you are not alone. These are real challenges faced by many IT organizations - with serious consequences if not properly addressed. During our Software Asset Management webinar you will learn how having asset, configuration and other service management processes together in one system of record provides the control and visibility you need to overcome these challenges.
Tags : 
software, lincense, compliance, software asset management, service management, application integration, application performance management, business activity monitoring
    
ServiceNow
By: ServiceNow     Published Date: Jul 24, 2013
You can make your life simpler when you automate your entire IT Asset Management (ITAM) lifecycle and Software Asset Management (SAM) in one system of record. You'll also reduce costs, eliminate wasted resources, improve compliance, mitigate security risks, and drive standardization.
Tags : 
asset management, technology, software asset management, compliance, mitigation of security risks, automation, security, it management
    
ServiceNow
By: CDW     Published Date: Feb 27, 2015
In a perfect world, managing the discovery of software assets, the capture of license entitlements and optimization of an organization’s software usage and compliance situation would be a single-click operation. Unfortunately, the world is not perfect and those charged with managing an organization’s software compliance, availability and expenditure face a number of challenges that can easily derail a Software Asset Management (SAM) program. This paper from the SAM experts at Snow Software investigates some of the major challenges facing SAM managers and IT executives and highlights how to build a successful strategy to overcome them, ensuring the SAM program delivers true value to the business.
Tags : 
software management, sam, software security, cloud computing, enterprise content management, business intelligence, office productivity apps, network security
    
CDW
By: CDW     Published Date: Mar 18, 2016
Client virtualization technologies are redefining the way IT resources are delivered to end users, and creating exciting new opportunities for IT organizations as they work to streamline and improve operations. By abstracting applications and operating systems from client hardware, virtualization enables client assets to be stored on central servers and delivered to client endpoints. The implications are profound. End users can log on to any networkconnected computing device and access their custom operating system and application environment. For IT departments, central management of client virtual machine (VM) images brings efficiencies in everything from routine maintenance and updating to operating system upgrades.
Tags : 
    
CDW
By: IBM     Published Date: Oct 24, 2013
"The potential to manage assets more efficiently, replace and upgrade them, and exploit them for purposes beyond their initial role, is significant in all cities in today’s world. However, technologies that support asset management in cities are numerous, fragmented and often inadequate. For any individual city agency, the level of cost and effort required to make improvement may seem daunting. This white paper highlights how Capgemini can help cities to become ‘smarter’: It describes how to offer to city agencies a leading practice asset management technical solution provided as-a-Service. This accelerates implementation, substantially removes funding hurdles, ensures an ongoing quality solution and incentivizes cities to migrate from a fragmented, costly and inadequate model to a common leading-edge solution."
Tags : 
city assets, asset managemnet, efficiency, smart city, work management, architecture, real estate management, facilities management
    
IBM
By: Oracle     Published Date: Nov 01, 2013
In today’s lean business environment, companies are maximizing the value of their people. Your people—or talent— are an asset you can leverage to dramatically increase your success. The more you know about your talent, the more you can drive performance. Leveraging talent management can help you capture meaningful information about people, know the talent that is driving results, and act on insight for better business performance. In today’s lean business environment, your people are an asset that can be dramatically leveraged to increase success. This executive brief investigates how organizations can better understand the talent that is driving results.
Tags : 
zenithoptimedia, oracle, top 10, talent management, best practices of talent management, social recruiting strategy, extend employment brand, engaging line managers
    
Oracle
By: Oracle     Published Date: Nov 13, 2013
In today’s lean business environment, companies are maximizing the value of their people. Your people—or talent— are an asset you can leverage to dramatically increase your success. The more you know about your talent, the more you can drive performance. Leveraging talent management can help you capture meaningful information about people, know the talent that is driving results, and act on insight for better business performance. In today’s lean business environment, your people are an asset that can be dramatically leveraged to increase success. This executive brief investigates how organizations can better understand the talent that is driving results.
Tags : 
zenithoptimedia, oracle, top 10, talent management, best practices of talent management, social recruiting strategy, extend employment brand, engaging line managers
    
Oracle
By: IBM     Published Date: Aug 06, 2014
With IBM analytics for big data with a smart mobile strategy, banks can increase wallet share and assets under management while lowering the organization’s operating ratio by using more efficient channels.
Tags : 
ibm, banking, digital, data, big data, analytics, mobile
    
IBM
By: Samanage     Published Date: Apr 24, 2014
As you evaluate Service Desk and Asset Management solutions in the marketplace, you likely have a set of requirements for features and functionality. But have you considered other key factors that will set you up for success with a cloud-based ITSM solution that might not be so obvious? Not evaluating solutions based on these considerations can delay implementation, driving up costs and causing undue stress for the IT professional. Don’t let them stop you in your tracks; instead, consider these criteria when making your solution decision and to gain greater organizational acceptance.
Tags : 
it service management, itsm, itsm solutions, itsm tools, itam tools, itam solutions, it ticket management system, it workflow
    
Samanage
By: AlienVault     Published Date: Aug 11, 2015
Read this paper to accelerate your evaluation of SOC tools and technology needs.
Tags : 
security operations center, soc, threat detection, soc tools, siem event correlation, security management, behavior monitoring, threat assessment
    
AlienVault
By: STANLEY Healthcare     Published Date: Mar 24, 2015
State University of New York Upstate Medical University faces the same challenges as many other hospital organizations—increased pressure to improve efficiency and preserve capital. Read this case study to learn how SUNY Upstate increases efficiency and reduces costs with STANLEY Healthcare’s AeroScout® Solutions, making every second and dollar count for patient care.
Tags : 
efficiency, cost reduction, patient care, healthcare, medicine, hospital organizations, wi-fi, asset management
    
STANLEY Healthcare
By: IBM     Published Date: Apr 04, 2016
Discover how covert threats from the dark web can impact your network, and what you can do to protect your assets.
Tags : 
ibm, ibm x-force threat intelligence, threat intelligence, asset protection, threat management, security, knowledge management, network security
    
IBM
By: IBM     Published Date: Apr 04, 2016
"Title/Main headline: IBM X-Force Threat Intelligence Quarterly - 4Q 2015 Sub Headline: How can your organization better prepare for a security incident? Blurb: 2015 has been a challenging year as insider threats, malware, and stealthy and mutating attacks have affected the threat landscape. Read the latest security research from IBM X-Force to learn: How low-level attacks can mask stealthier infiltrations The benefits of regularly maintained security procedures and response plans When patterns of irregularities can be the first indicators of compromise Call to Action/Action Statement: ""Download Now"" as the action statement"
Tags : 
ibm, ibm x-force threat intelligence, threat intelligence, asset protection, threat management, security, knowledge management, network security
    
IBM
By: IBM     Published Date: May 09, 2016
In 3-5 minutes, get a good view of what integrated asset management means for the industry and what value it brings to manage infrastructure assets in a smarter way.
Tags : 
ibm, watson, internet of things, iot, asset management, integrated asset management, infrastructure assets, infrastructure
    
IBM
By: OpenText     Published Date: May 26, 2017
Today’s manufacturers need to ensure their production facilities are available 24/7. Ensuring that production lines are operating smoothly, associated utilities supplies are maintained correctly and production stoppages are minimized can significantly help to reduce the operational costs and boost the profits of today’s manufacturing operations.
Tags : 
opentext, manufacturing, plant, asset management
    
OpenText
By: OpenText     Published Date: May 26, 2017
Today’s fast-moving consumer market is putting pressure on manufacturers to be able to share digital product information seamlessly and quickly across retail and distribution channels. A centralized digital asset management platform helps to simplify the distribution of digital information across the extended enterprise.
Tags : 
opentext, manufacturing, retailer, distributor
    
OpenText
By: CA Technologies     Published Date: Apr 06, 2017
A number of high-profile security breaches over the last two years have highlighted the damage that a rogue systems administrator or stolen privileged credentials can cause. Today, fewer than half of all business organizations have deployed the type of privileged identity management (PIM) solution that could help improve the situation. This Ovum Decision Matrix (ODM) provides an in-depth view of the leading PIM solutions that are available to deal with these issues. It compares their technology, the market position each vendor has achieved, their ability to execute, and the overall maturity of each offering.
Tags : 
data assets, risk management, it security, session management, authentication management, security intelligence, information management, infrastructure management
    
CA Technologies
By: CA Technologies     Published Date: Jul 19, 2017
• Planning for DevOps implementation encompasses people, processes and technology • CA Technologies delivers DevOps for Mainframe anchored by CA Application Lifecycle Conductor, which allows organizations to continue using their existing products • Catch a detailed evaluation of how CA compares to Compuware on Platform Support, Software Development Lifecycle, Integration and Extension of Enterprise Assets, Configuration and Administrative Management
Tags : 
    
CA Technologies
By: CA Technologies     Published Date: Jun 01, 2018
Within any organization, the most dangerous users are those with privileged access to the company’s most valuable and sensitive data assets. This includes systems administrators, business managers, partners, suppliers, and service providers, and also takes into account the automated interactions between business machines, systems, and applications. Privileged access has always been a high-risk issue, but for too long, organizations have not understood or have chosen to ignore the risks, preferring instead to rely on the integrity of the individuals and systems involved. A number of high-profile security breaches over the last two years have highlighted the damage that a rogue systems administrator or stolen privileged credentials can cause. Today, fewer than half of all business organizations have deployed the type of privileged identity management (PIM) solution that could help improve the situation. This Ovum Decision Matrix (ODM) provides an in-depth view of the leading PIM solution
Tags : 
    
CA Technologies
By: Adobe     Published Date: Sep 28, 2016
The ideal customer experience is everything today, and it starts with a modern digital foundation. You can’t give customers the timely and relevant experiences they expect with outdated solutions that are cobbled together. Read The Blueprint Redefined to see how a modern digital foundation can get you there. You’ll learn: - How a unified platform lets you easily manage and refine customer experiences - Three steps to deliver great digital experiences on all devices - The roles of personalization, analytics, and asset management?
Tags : 
adobe, customer experience, digital, marketing marketers, digital experience
    
Adobe
By: Datastax     Published Date: Aug 07, 2018
"As an Enterprise Architect (or an aspiring one), your job is to help define, build, and manage your company's technology architecture for its single most important asset - its information - in order to meet your company's business goals. Read this comprehensive guide to learn the ins and outs of designing data management architectures to manage mixed workloads at scale."
Tags : 
    
Datastax
Start   Previous    2 3 4 5 6 7 8 9 10 11 12 13 14 15 16    Next    End
Search White Papers      

Community Area

Log in | Register

Solution Center

Follow TechGenix on Twitter