• RSS
  • Twitter
  • FaceBook

Related Topics

Add White Papers

Get your company's white papers in the hands of targeted business professionals.

technology management

Results 176 - 200 of 783Sort Results By: Published Date | Title | Company Name
By: Oracle     Published Date: Mar 28, 2017
Restaurant operators often speak of innovation in terms of putting new signature dishes and food creations on the menu. But where the biggest innovation is happening today, arguably, is less on the menu and more in the technology that is driving increased efficiency and effectiveness across all parts of the food and beverage services industry. Next-generation restaurant management and POS systems are having a profound impact on business operations, guest satisfaction, revenue growth and overall profitability.
Tags : 
restaurant, pos, technology, oracle, food, service
    
Oracle
By: IBM     Published Date: May 19, 2016
MWD Advisors report on how Case Management technology can help drive effective outcomes and how a clear Content Management strategy underpins success in Case Management.
Tags : 
ibm, mdw, advisors report, content management, case management, enterprise applications
    
IBM
By: EMC Corporation     Published Date: Jul 07, 2013
While the concept of big data is nothing new, the tools and technology and now in place for companies of all types and sizes to take full advantage. Enterprises in industries such as media, entertainment, and research and development have long been dealing with data in large volumes and unstructured formats - data that changes in near real time. However, extracting meaning from this data has been prohibitive, often requiring custom-built, expensive technology. Now, thanks to advancements in storage and analytics, all organizations can leverage big data to gain the insight needed to make their businesses more agile, innovative, and competitive.
Tags : 
big data, emc, technology, storage, analytics, data management, security, knowledge management
    
EMC Corporation
By: SumTotal     Published Date: Feb 01, 2013
Most HR professionals are ready for a completely different approach to HR technology. This engaging paper from SumTotal explains why that is — and how one system is revolutionizing the industry in response.
Tags : 
sumtotal, sumtotal systems, elixhr, talent expansion, integrated hr solutions, human resources, hr technology, hr solutions
    
SumTotal
By: SumTotal     Published Date: May 24, 2013
The Value Matrix is based on functionality and usability, the two core measures that Nucleus has found indicate an application’s ability to deliver initial ROI and, ultimately, maximum value over time. Leaders, Experts, Facilitators, and Core Providers are identified in this matrix. Discover how the current workforce management providers stack up in this streamlined and concise evaluation.
Tags : 
workforce management, streamline hr, workforce management solutions, sumtotal
    
SumTotal
By: SAP     Published Date: Dec 08, 2011
Register to view an on demand video presentation and learn how to leverage powerful business intelligence and performance management software for the midmarket with valuable tips and access to more in depth information.
Tags : 
sap, kit-digital, webinar, technology, business intelligence, software management, reporting, dashboards
    
SAP
By: RES Software     Published Date: Jul 03, 2012
George Curtis, CIO of URMC, was looking for a way to keep his team from needing to touch desktops every day. He was in search of solution that would simplify desktop management, and when he learned about RES Software, he was immediately hooked. After only a few months of beginning the implementation of RES, George and his team began seeing major benefits.
Tags : 
res software, technology, healthcare it, healthcare technology, compliance, desktop management, desktop migration, networking solutions
    
RES Software
By: RES Software     Published Date: Jul 06, 2012
Today's IT managers face tough challenges. There's pressure to reduce IT costs, end user demand for flexible yet secure working, and the constant need to maintain regulatory compliance. Join the IT managers around the world who are solving their biggest challenges with RES Software. Learn how organizations in every sector are giving end users the freedom to work the way they want, in any location and via multiple devices, while drastically reducing demand for hands-on IT professionals.
Tags : 
technology, res software, healthcare, desktop, healthcare it, medical device, it management, desktop migration
    
RES Software
By: Dell Software     Published Date: Oct 03, 2013
Download Transaction-Centric vs. Infrastructure Centric Application Performance Management from TRAC Research to examine the major differences between the two approaches, the pros and cons of both in difference use cases, and finally which technology better fits your organization.
Tags : 
transaction, dell foglight, apm, infrastructure, technology, application performance management, best practices, knowledge management
    
Dell Software
By: RSA Security     Published Date: Nov 06, 2013
See a visual representation of the GRC framework needed within an organization to meet today's governance, risk and compliance needs, as well as how an organization should view GRC, its guiding principles and final objectives.
Tags : 
grc, risk, compliance, technology, best practices, archer, rsa, security
    
RSA Security
By: RSA Security     Published Date: Nov 06, 2013
This paper discusses the value of operational technologies while acknlowledging there is a "value ceiling" for some niche tools, highlighting the opportunity to seek broader value as part of the GRC program maturity process.
Tags : 
grc, risk, compliance, technology, best practices, archer, rsa, security
    
RSA Security
By: RSA Security     Published Date: Nov 06, 2013
This business continuity white paper will help you address which sources to comply with and why, how to handle conflicts between the sources, how to prioritize your efforts.
Tags : 
grc, risk, compliance, technology, best practices, archer, rsa, security
    
RSA Security
By: RSA Security     Published Date: Nov 06, 2013
This paper illustrates the major challenges faced by today's Federal IA professionals, and offers solutions, along with ROI for each of those challenges.
Tags : 
grc, risk, compliance, technology, best practices, archer, rsa, security
    
RSA Security
By: RSA Security     Published Date: Nov 06, 2013
RSA, the security division of EMC, was positioned by Gartner in the Leader’s quadrant of the 2013 Magic Quadrant for Business Continuity Management Platforms based on completeness of vision and ability to execute.
Tags : 
grc, risk, compliance, technology, best practices, archer, rsa, security
    
RSA Security
By: RSA Security     Published Date: Nov 06, 2013
RSA, the security division of EMC has received the highest rating of “Strong Positive” in Gartner MarketScope for IT Governance, Risk & Compliance Management (IT GRC) 2013 for the fifth consecutive time.
Tags : 
grc, risk, compliance, technology, best practices, archer, rsa, security
    
RSA Security
By: RSA Security     Published Date: Nov 06, 2013
RSA, the security division of EMC, was positioned by Gartner in the Leader’s quadrant of the 2013 Magic Quadrant for Enterprise Governance, Risk and Compliance Platforms based on completeness of vision and ability to execute.
Tags : 
grc, risk, compliance, technology, best practices, archer, rsa, security
    
RSA Security
By: Millennia Patient Service     Published Date: May 05, 2014
Learn the five most important considerations for successfully converting to a new revenue cycle management solution with minimal cash flow disruption.
Tags : 
millennia patient services, revenue cycle management, healthcare, healthcare technology, patient receivables, healthcare it, financial management systems, billing
    
Millennia Patient Service
By: AppDynamics     Published Date: Aug 25, 2015
In collaboration with Enterprise Management Associates (EMA), AppDynamics has conducted a survey of application management professionals and managers to determine exactly what IT organizations want and need from APM providers. Here are some key findings from the research: • Only 30% of companies currently have application-specific solutions to monitor apps • 50% or fewer of the tools companies have purchased are actively being used to monitor apps • 27% of application-related problems are detected by monitoring tools • A “unified monitoring platform” is the top choice in a feature of an APM solution Download the full report to review the findings and understand the key challenges and “must haves” associated with APM solutions voiced by IT professionals themselves.
Tags : 
business technology, digital, customer service, efficiency, operations, infrastructure, business intelligence, business management
    
AppDynamics
By: Kaseya     Published Date: May 13, 2015
Banks want to use technology to work smarter, better and faster to maintain regulatory compliance, reduce risk and increase productivity. Automated IT systems management is helping them reach those goals in a seamless, efficient manner.
Tags : 
kaseya, hybrid, cloud, management, msp, mobile, big data, finance
    
Kaseya
By: NetApp     Published Date: Jan 08, 2016
This IDC Technology Spotlight examines trends regarding cloud backup and data protection and how NetApp's SnapProtect backup management software and AltaVault cloud-integrated storage can play a role in simplifying the effort.
Tags : 
data protection, business continuity, cloud backup, snapprotect, backup management software, altavault, cloud-integrated storage, it management
    
NetApp
By: Ping Identity     Published Date: Feb 12, 2016
Most organizations today are scrutinizing technology budgets more and more. It helps to see technology investments in terms of total economic impact (TEI). Forrester Research quantified the benefits of implementing Identity and Access Management (IAM), and one of the top reasons supporting IAM was to eliminate the need for repeated user sign-ons, which increases user satisfaction. In measuring the TEI of one large organization’s IAM investment, Forrester uncovered several areas where SSO had a direct impact on improving the customer experience and driving revenue.
Tags : 
    
Ping Identity
By: Jamf     Published Date: Mar 29, 2018
As iPad and iPhone usage continues to grow in higher education institutions around the world, finding the right way to manage iOS devices can be as important as the technology itself. In this e-book, we’ll educate you on the basics of mobile device management (MDM) and explain how you can maximize your education technology purchases. Become an expert in: • The state of iOS in higher education • Best practices and workflows for iPad and iPhone device management • Moving higher education forward with Apple TV
Tags : 
    
Jamf
By: Lookout     Published Date: Dec 13, 2018
The world has changed. Yesterday everyone had a managed PC for work and all enterprise data was behind a firewall. Today, mobile devices are the control panel for our personal and professional lives. This change has contributed to the single largest technology-driven lifestyle change of the last 10 years. As productivity tools, mobile devices now access significantly more data than in years past. This has made mobile the new frontier for a wide spectrum of risk that includes cyber attacks, a range of malware families, non-compliant apps that leak data, and vulnerabilities in device operating systems or apps. A secure digital business ecosystem demands technologies that enable organizations to continuously monitor for threats and provide enterprise-wide visibility into threat intelligence. Watch the webinar to learn more about: What makes up the full spectrum of mobile risks Lookout's Mobile Risk Matrix covering the key components of risk How to evolve beyond mobile device management
Tags : 
    
Lookout
By: Singularity University     Published Date: Oct 17, 2017
Agile and innovative companies like Netflix, Instagram, Amazon, Airbnb, and Uber have used exponential technologies to completely disrupt their industries. But some of the largest industries in the world have fallen prey to these and other disruptive companies. And most of them didn’t even see it coming. The convergence of exponential technologies, along with bold thinking and the willingness to take risks, is completely altering the business landscape. And that landscape is changing at an accelerating pace. Disruption is occurring far more quickly than ever before. On average, an S&P 500 company is being replaced every 2 weeks, and over 40% of today’s Fortune 500 companies on the S&P 500 will no longer exist within 10 years. The only options are to disrupt yourself or be disrupted by your competition. Which will you choose? If you choose the former, do you know how to proceed? This guide shares strategies you can employ today to start future-proofing your company.
Tags : 
innovation, disruption, technology, business, management, leadership, strategy, revenue
    
Singularity University
By: CA Technologies EMEA     Published Date: Aug 03, 2017
If the notion of GDPR approach as an agile methodology was the thesis for this paper, the conclusion surely has to be that there is much work still to be done by the enterprise. From an obvious mismatch between the belief of board preparedness to actual preparedness, drilling down into the specific areas of storage, security and development, there’s a feeling that while organisations are now aware of the risks and the necessary philosophical practice that has – or will – become action, there is still an absence of that ‘organic’ inclusion that should make GDPR part of the furniture.
Tags : 
technology solutions, gdpr, access management, identifiable data, ca technologies
    
CA Technologies EMEA
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search White Papers      

Community Area

Log in | Register

Solution Center

Follow TechGenix on Twitter