• RSS
  • Twitter
  • FaceBook

Related Topics

Add White Papers

Get your company's white papers in the hands of targeted business professionals.

managing it

Results 326 - 350 of 860Sort Results By: Published Date | Title | Company Name
By: VMware Citrix     Published Date: Jan 23, 2018
VMware Horizon and Workspace ONE is the most complete solution for delivering, managing, and protecting Windows desktops, applications, and online services across devices, locations, media, and connections. To learn more about how Workspace ONE delivers and manages any device by integrating identity, application, and enterprise mobility management: Visit http://www.vmware.com/products/horizon
Tags : 
vmware, horizon, workspace, delivering, managing, applications, desktop, online services
    
VMware Citrix
By: Location3     Published Date: Aug 31, 2018
Location3 client Mountain Mike’s Pizza and their franchisees face significant competitive challenges when advertising on Google,which ultimately requires the need to be both incredibly efficient with campaign setup and incredibly precise when managing bids and local budgets. A quick Google keyword search for “pizza near me” in Mountain Mike’s home state of California yields over 58,000,000 results (“pizza delivery” yields 56,000,000) and often features a predictable set of ad results from industry giants like Domino’s and Pizza Hut, among others. Suffice it to say that buying “pizza”-related terms in AdWords can get incredibly expensive, incredibly quickly, if a local franchisee’s budgets and bids are not managed with precision. When you combine that fact with limited location-level advertising budgets, our team atLocation3 was presented with a significant challenge in helping Mountain Mike’s Pizza generate increases in customer pizza orders whilesimultaneously ensuring that ad spend c
Tags : 
    
Location3
By: Location3     Published Date: Sep 04, 2018
Location3 client Mountain Mike’s Pizza and their franchisees face significant competitive challenges when advertising on Google, which ultimately requires the need to be both incredibly efficient with campaign setup and incredibly precise when managing bids and local budgets. A quick Google keyword search for “pizza near me” in Mountain Mike’s home state of California yields over 58,000,000 results (“pizza delivery” yields 56,000,000) and often features a predictable set of ad results from industry giants like Domino’s and Pizza Hut, among others. Suffice it to say that buying “pizza”-related terms in AdWords can get incredibly expensive, incredibly quickly, if a local franchisee’s budgets and bids are not managed with precision. When you combine that fact with limited location-level advertising budgets, our team atLocation3 was presented with a significant challenge in helping Mountain Mike’s Pizza generate increases in customer pizza orders while simultaneously ensuring that ad spen
Tags : 
marketing, local marketing, franchise, franchisor, digital marketing, multi-location businesses, mountain mike's pizza, paid search, us search awards, adwords, doubleclick
    
Location3
By: MobileIron     Published Date: May 23, 2016
Managing your device keeps getting more complex and your admins are juggling more complicated security and management tasks than ever before. Until now, you have needed many complex and disparate tools to secure and manage your devices. But now Windows 10 and MobileIron make your life much simpler by streaming many traditional PC management responsibilities.
Tags : 
security, mobile device, windows, best practices, streaming, device management, identity management, security management, business intelligence, database security
    
MobileIron
By: Juniper Networks     Published Date: Oct 02, 2018
Without specific and explicit design decisions about not only the network architecture but also network operations,enterprises risk drifting toward a future of many clouds, each with their own operational nuances. Those who are not mindful about managing new additions increase the complexity of their network with each variation. This white paper discusses how to approach the design of the network and operations in the move from cloud to multicloud. The focus is on meeting the business needs of today and tomorrow, battling complexity, preserving the possibilities for options, and supporting IT’s role as the steward of technology decisions for the business.
Tags : 
    
Juniper Networks
By: Adobe     Published Date: Nov 07, 2013
One of the key objectives of Adobe’s current advertising campaign is to explode the myth that ‘managing websites is hell’. We believe that in this day and age, the idea that website management is a nightmare should be a thing of the past.
Tags : 
adobe, econsultancy, trends and innovation, content management, customer experience management, driving engagement, brand-building, web content management, wcm, adobe experience manager, adobe marketing cloud, the cloud, cloud computing, social community, econsultancy and adobe, driving sales, multichannel customer experience, digital intelligence, targeting, segmentation
    
Adobe
By: Microsoft     Published Date: Jul 20, 2018
Cloud computing has ushered in a golden era for software companies. The cloud’s low barrier to entry allows creativity to flourish, especially for software developers who are creating applications directly on cloud-based infrastructure. Cloud-based infrastructure enables developers to do what they love: solve business problems and bring innovative new ideas to life, using their choice of tools. In a Software as a Service (SaaS) model, applications can easily be deployed to a cloud service, and delivered to clients who appreciate the ease of access and low cost. The cloud model relieves the developer and the enterprise IT professional from the burden of managing or maintaining capital-intense infrastructure. But the cloud’s low barrier to entry also allows competing software providers to enter the market every day, from every sector. Independent software vendors, or ISVs, are pressured by increased competition to deliver their applications faster, with greater functionality and ease of
Tags : 
    
Microsoft
By: ForeScout     Published Date: Feb 18, 2014
Find out how companies with hundreds to thousands of devices and distributed networks are managing security risks, enabling BYOD adoption, and supporting IT-GRC framework specifications. Download the Frost & Sullivan: Continuous Compliance and Next Generation NAC report. Click to download the report.
Tags : 
forescout, frost & sullivan, network access control, nac, deployment, interoperability, guest management, endpoint compliance, enforcement, remediation & scalability, byod, grc, networking, it management, knowledge management, enterprise applications
    
ForeScout
By: DataCore     Published Date: Apr 23, 2019
In our developing digital economy, IT is a strategic asset. By effectively leveraging data, businesses become more operationally efficient, create more differentiated customer experiences, and develop new products and business models. However, unlocking those benefits requires a higher degree of execution by IT. Simply keeping pace with demand is no longer good enough; IT needs to help drive the business’s digital pursuits. The increased pressure on IT has amplified complexity, as well—66% of IT decision makers surveyed by ESG say IT is more complex than it was just two years ago.1 Demands being placed on IT are scaling relentlessly, and the tools IT teams use are in a constant state of evolution. Integrating and optimizing those new infrastructure technologies while managing existing investments is a perpetual burden. IT organizations, therefore, have two choices: either increase their personnel and budgets enough to survive the evolution with just traditional tools, or redirect those
Tags : 
software defined storage, hyperconverged, storage consolidation, storage management, data migration, storage migration
    
DataCore
By: IBM     Published Date: May 12, 2008
Managing compliance is a huge challenge for companies, straining IT resources needed to meet service level agreements. To overcome these challenges, IT must support the objectives of your business. This white paper describes how IBM Service Management does just that. It defines and monitors IT governance and compliance management in a repeatable manner across businesses of any size.
Tags : 
service, service management, sla, service level, ibm, ibm g&rm, ibm grm, compliance
    
IBM
By: BMC ESM     Published Date: Aug 20, 2009
IT infrastructures have become exceedingly complex, resulting in a highly interconnected network of old and new technologies. In a world where IT budgets are shrinking and mergers are common, how do you get the most value from your IT resources?
Tags : 
it costs, it resources, it infrastructure, it budget, spend management, bmc, mergers, podcast, virtualization, legacy, mainframe computing, automation, enterprise applications, business process automation, enterprise resource planning, it spending, server virtualization, service oriented architecture, web service management, service management
    
BMC ESM
By: Group M_IBM Q3'19     Published Date: Aug 12, 2019
The introduction of the IBM z14 ZR1 and LinuxONE Rockhopper II fills out the product line of the latest generation of IBM mainframes. Infrastructure and operations leaders tasked with managing, protecting and, increasingly, using data for competitive advantage will find this new release interesting.
Tags : 
    
Group M_IBM Q3'19
By: Proofpoint     Published Date: Apr 06, 2012
Gartner, Inc. positions Proofpoint in the Challengers quadrant in its 2011 Magic Quadrant for the Enterprise Information Archiving (email archiving, file archiving, social media archiving, retention management, eDiscovery, search, legal hold) market.
Tags : 
gartner, email archiving, archive email, eia magic quadrant, gartner, search, ediscovery, legal hold, cloud archiving, storage costs, information governance, archiving, regulatory compliance, information governance, discovery, ediscovery, file shares, managing content, cloud archiving, email retention
    
Proofpoint
By: ServiceNow     Published Date: Oct 11, 2017
For years, companies have used CRM as the software of choice to manage customer engagement and information, in an attempt to deliver a great customer experience. Managing the front end of the engagement process is important. However, delivering proactive customer service – that prevents and resolves issues – requires much more than that. At ServiceNow, we believe that it is time to rethink the fundamentals of CRM and customer service and we invite you to explore the new strategies, processes, and technology presented in this toolkit. Doing so will enable your customer service teams to connect seamlessly with other departments and deliver the effortless and proactive service experience your customers expect. We hope you find the collection of research reports and whitepapers valuable.
Tags : 
    
ServiceNow
By: Cenzic     Published Date: Nov 11, 2008
Cenzic’s ClickToSecure ARC product is a certified PCI Scanner Vendor by the PCI Security Standards Council (certificate number 4192-01-01). This Software as a Service (SaaS) offering requires no software to install and provides your company with thorough reports via the Web that reveals security and compliance issues, remediation recommendations, and methods for process improvement. By using Cenzic, PCI compliance now just becomes one reporting feature among many in your arsenal of tools for managing application vulnerability.
Tags : 
cenzic, pci compliance, security, compliance
    
Cenzic
By: McAfee     Published Date: Feb 06, 2013
Read how managing risk today means making sense of more data: vulnerability scans, application and database logs, flows, access and session records, alerts, and trending analysis.
Tags : 
security connected framework, big security data, big data, log management, siem, anti spam, anti spyware, anti virus, application security, auditing, authentication, compliance, encryption, security management, security policies, best practices, data integration, data quality, vulnerability management
    
McAfee
By: McAfee     Published Date: Apr 16, 2014
Read how managing risk today means making sense of more data: vulnerability scans, application and database logs, flows, access and session records, alerts, and trending analysis.
Tags : 
security connected framework, big security data, big data, log management, siem, security
    
McAfee
By: Puppet     Published Date: May 20, 2016
If you’re managing an IT team, you may be turning to DevOps as the path to faster delivery of software. DevOps can help your team become more efficient — and your organization more competitive — but you’ll need to be able to communicate to your team why things are changing, and how their usual working practices are likely to alter. Download this guide to explore: • How to align DevOps with your organization’s goals. • What change might look like — for operations, development and the organization at large. • Why security is a great icebreaker. • The importance of focusing on the team over individual DevOps specialists. • How to embrace agile ways of working, along with infrastructure as code, code review, continuous integration and unit testing.
Tags : 
    
Puppet
By: Paycor     Published Date: Dec 04, 2013
Managers are spending 17% of their time managing poor performers, or one full workday every week. Wouldn’t their time be better spent improving the performance and productivity of their entire team? This 30-minute webinar provides simple, actionable tips for performance management from HR expert Becky Falvey.
Tags : 
performance management, employee engagement, talent management, human resources, employee, performance, productivity
    
Paycor
By: NAVEX Global     Published Date: Nov 19, 2013
Is your organization benefiting from the full ROI of automated policy and procedure management? Policies and procedures are the building blocks of every organization. This eBook offers articles geared toward managing the policy lifecycle from drafting and validating to approving and implementing, as well as increasing security and important steps toward protecting against data breaches.
Tags : 
compliance, benchmark, compliance programs, case management, hotline data benchmarking, ethics and compliance
    
NAVEX Global
By: Kaseya     Published Date: Mar 01, 2019
Three common types of software make you more vulnerable than you realize. While complete and thorough vulnerability management is next to impossible, a few simple steps go a long way toward reducing risk. Download this ebook to discover what steps to take to begin evolving away from patch management toward software and vulnerability management. The hidden threat in securing your infrastructure from vulnerabilities lies with IT’s difficulty in managing third-party software. 2017 was billed as the worst on record for cybersecurity. No doubt, the continued rise of modern threat vectors has IT on high alert. In essence, IT professionals view their role as responsible for keeping the door shut. However, even with IT administrators keenly aware that most exploits can be averted simply by keeping the environment current, the task is no small feat and often isn’t done as well as it needs to be.
Tags : 
    
Kaseya
By: HPE Intel     Published Date: Feb 19, 2016
The rising demands for capturing and managing video surveillance data are placing new pressures on state and local governments, law enforcement agencies, and education officials. The challenges go beyond the expanding costs of equipment, storage, software and management time. Officials must also lay the right foundation to scale their capabilities, improve performance and still remain flexible in a rapidly evolving ecosystem of surveillance tools. Find out what state, local government and education IT leaders need to know, and what steps you can take to: • Improve performance and ROI on cameras-per-server for the dollars invested • Optimize and simplify the management of daily surveillance processing, including the integration of facial recognition, redaction and analysis software • Fortify reliability and dependability to reduce the risk of surveillance data retrieval failures.
Tags : 
    
HPE Intel
By: Genesys     Published Date: Dec 20, 2018
Successfully implementing and managing a comprehensive suite of customer experience technologies is essential for global businesses seeking to sustain high levels of customer experience and brand value. However, knowing how to temper the instinct to throw technology solutions at efficiency problems is what distinguishes global customer experience leaders from the rest. New technologies must be balanced with appropriate investment in human resources. This is the central finding of a global survey of over 550 senior executives conducted by MIT Technology Review to examine the pressures that shape their customer experience processes and the tools and strategies they employ to mitigate those challenges and continuously improve customer engagement. Read the report to get a detailed look at: • The strategies that differentiates an Iconic firm from other businesses • How strategies vary across regions based on maturity and customer expectations • Future innovation management and technology
Tags : 
    
Genesys
By: Genesys     Published Date: Feb 08, 2019
Successfully implementing and managing a comprehensive suite of customer experience technologies is essential for global businesses seeking to sustain high levels of customer experience and brand value. However, knowing how to temper the instinct to throw technology solutions at efficiency problems is what distinguishes global customer experience leaders from the rest. New technologies must be balanced with appropriate investment in human resources. This is the central finding of a global survey of over 550 senior executives conducted by MIT Technology Review to examine the pressures that shape their customer experience processes and the tools and strategies they employ to mitigate those challenges and continuously improve customer engagement. Read the report to get a detailed look at: The strategies that differentiates an Iconic firm from other businesses How strategies vary across regions based on maturity and customer expectations Future innovation management and technology adopt
Tags : 
    
Genesys
By: Genesys     Published Date: Feb 12, 2019
Successfully implementing and managing a comprehensive suite of customer experience technologies is essential for global businesses seeking to sustain high levels of customer experience and brand value. However, knowing how to temper the instinct to throw technology solutions at efficiency problems is what distinguishes global customer experience leaders from the rest. New technologies must be balanced with appropriate investment in human resources. This is the central finding of a global survey of over 550 senior executives conducted by MIT Technology Review to examine the pressures that shape their customer experience processes and the tools and strategies they employ to mitigate those challenges and continuously improve customer engagement. Read the report to get a detailed look at: The strategies that differentiates an Iconic firm from other businesses How strategies vary across regions based on maturity and customer expectations Future innovation management and technology adopt
Tags : 
    
Genesys
Start   Previous    7 8 9 10 11 12 13 14 15 16 17 18 19 20 21    Next    End
Search White Papers      

Community Area

Log in | Register

Solution Center

Follow TechGenix on Twitter