business assets

Results 101 - 125 of 128Sort Results By: Published Date | Title | Company Name
Published By: Progress Software BTA Telecommunications     Published Date: Nov 04, 2008
The right software for managing critical applications can actually optimize your business results. Consider this... your critical applications are those that are vital to increasing revenue or productivity. In other words, they execute your key business transactions and are key business assets that support revenue generation, productivity, and customer satisfaction.
Tags : 
progress actional buyers guide, business critical applications, manage critical applications, manage business applications, managing mission critical applications, managing business applications, mission critical applications, progress software
    
Progress Software BTA Telecommunications
Published By: Quocirca     Published Date: Jan 13, 2009
Given today’s economic climate, businesses are, more than ever, looking to create additional value through the reduction of risk and by saving costs. For many, the economic downturn is seen as the best time to optimise the infrastructure that they already have in place, to look at ways to trim unnecessary expenditure and to use existing resources more effectively. As organisations are increasingly reliant on data networks that encompass an ever-growing range and number of internet protocol (IP) enabled devices and applications, they need to more effectively administer and manage these assets—they can no longer take the management of their IP networks for granted.
Tags : 
quocirca, ipam, dynamic host configuration protocol, domain name system, radio frequency identification, voice over ip
    
Quocirca
Published By: Real Asset Management Inc.     Published Date: Jun 24, 2011
The intent of this whitepaper is to explain the business requirement for physically auditing assets, to explore the bene?ts associated with conducting physical audits and to provide a step by step process for performing them.
Tags : 
real asset management, ram, physical audits, write-offs, data standards, manual, barcode, data consolidation, formal policies, accurate reporting, proper coverage
    
Real Asset Management Inc.
Published By: Red Hat     Published Date: Jan 07, 2019
A business survives when it extends its core competencies in new ways. Increasingly, one of the paths to innovation lies with application programming interfaces (APIs). APIs allow a business to take traditional revenue (and traditional customer and partner interactions) and carry them into a different technological foundation. This enables new customer and ecosystem relationships that can monetize the organization’s core assets and lead to sustained growth and new value and revenue streams.
Tags : 
    
Red Hat
Published By: Salesforce.com     Published Date: Apr 16, 2013
By 2014, smartphones and tablets will put power in the pockets of a billion global consumers, including your employees and partners and customers. However, mobile is not simply another device for IT to support with a shrunken website or a screen-scraped application. Rather, mobile is the visible manifestation of a much broader shift to systems of engagement that marry physical context and digital intelligence to deliver service directly into a person's hands. This shift will add value and take cost out of every business service, workflow process, and business application. But mobile engagement will also require wholesale changes to your app design, service delivery, IT skills, technology assets, and even your business model. This report lays out a vision for mobile engagement and introduces the strategic elements developed further in The CIO's Mobile Engagement playbook.
Tags : 
mobile, smartphones, tablets, engagement, experience, applications, customer experience/engagement
    
Salesforce.com
Published By: Schneider Electric     Published Date: Jan 26, 2018
The first event in the Partnering with Certainy Webinar Series, "Customer Demands at the Edge." Trends like IoT are driving customer experience expectations in a way that demands resiliency in local edge environments. As a result, we’re seeing a rise of edge computing (compute power coming out of the cloud and into the access layer). Customer demands manifest themselves differently based on things like company size and segment. For example, a retail customer’s business imperatives might look different from a doctor’s office. But one thing remains constant: A standardized, redundant, and repeatable physical infrastructure can protect the availability of these now-critical access-layer IT assets. APC by Schneider Electric has: The solutions you need to deliver a standardized, redundant, & repeatable infrastructure to your customers The tools you need to configure them, The alliances & certifications you trust & rely on, The program to make it profitable. Fill out your information and click "Register" to watch the kick off our Partnering with Certainty Webinar Series, “Customer Demands at the Edge: Always On, Always Connected.” This webinar originally aired on October 5th, 2017.
Tags : 
    
Schneider Electric
Published By: Seagate Technology     Published Date: Apr 14, 2015
Finding a better place to store an ever-expanding volume of valuables is a near universal challenge—for individuals and their businesses. From physical holes in the ground to the ethereal cloud and beyond, the range of options for stashing stuff is immense. And, depending on what you’re storing and how easily you want others to find it, some options are better than others. Read this white paper to learn how a Network Attached Storage (NAS) system provides the customization, speed, ease-of-use, security and affordability needed to protect and share digital assets for many small business owners.
Tags : 
cloud, security, network attached storage system, customization, affordability
    
Seagate Technology
Published By: Secureworks     Published Date: Nov 11, 2016
In this white paper we will discover what the evolving path ahead for security leaders looks like, the importance of communication from top to bottom, focusing on how proactive measures can stop threat actors from derailing businesses, and how building a security architecture that protects the most critical assets will support the overall goals of an organisation.
Tags : 
managed security services, security, threat and vulnerability management, security, security architecture, cyber security
    
Secureworks
Published By: Skillsoft     Published Date: Mar 03, 2015
The face of corporate learning has changed. It is no longer possible to develop your human capital with a single approach. Today’s corporate environment calls for out-of-the-box thinking, incorporating the advantages of many types of learning to benefit your company’s single biggest investment: your people. This handy guide will help you navigate the growing number of learning solutions and equip you with eight must-ask questions as you develop your learning program.
Tags : 
skillsoft, development, programs, processes, business management, elearning, corporate education, courses, courseware, technology, resources, access, devices, support, mobile, video, content, on-demand, build, buy
    
Skillsoft
Published By: SRC,LLC     Published Date: Jun 01, 2009
Companies spend millions of dollars every year on building data warehouses, buying business intelligence (BI) software tools and managing their analytic processes in the hope of gaining consumer insight and winning market share. Yet, many companies fail to realize the full benefits of their technology investments because they are hamstrung by the layers of expertise and the complexity of technology tools needed to integrate various data warehouses and associated tools within their existing analytic environments. Since analysis is only as good as the accessibility, timeliness and accuracy of the information being analyzed, the interoperability of any data warehouse with any analytic environment is essential to achieving insightful, actionable analysis and making better decisions.
Tags : 
src, enterprise, streamline, analytics, economy, analytic imperative, business intelligence, seamless, data warehouse, interoperability, analytic environment, data assets, report generation, output options, total cost of ownership, tco, roi, return on investment, olap
    
SRC,LLC
Published By: Symantec Corporation     Published Date: Jun 18, 2014
Cloud computing is rapidly transforming the IT landscape, and the conversation around adopting cloud technology has progressed from “if” to “when.” Enterprises are showing strong interest in outsourced (“public”) cloud offerings that can help them reduce costs and increase business agility. These cloud services offer enormous economic benefits but they also pose significant potential risks for enterprises that must safeguard corporate information assets while complying with a myriad of industry and government regulations. Read this white paper to find out what Symantec is doing help to bridge the gap to cloud computing!
Tags : 
symantec, ssl certificates, tco, third party vendors, hidden costs, ssl benefits, management platform, it professionals
    
Symantec Corporation
Published By: Tenable     Published Date: Feb 27, 2019
"Overwhelmed by the number of vulnerabilities your team faces? Uncertain which cyber threats pose the greatest risk to your business? You’re not alone. Cybersecurity leaders have been grappling with these challenges for years – and the problem keeps getting worse. On average, enterprises find 870 vulnerabilities per day across 960 IT assets. There just isn’t enough time or resources to fix them all. More than ever, it’s essential to know where to prioritize based on risk. Download the new whitepaper “Predictive Prioritization: How to Focus on the Vulnerabilities That Matter Most” to: -Learn how to focus on the 3% of vulnerabilities that have been – or will likely be – exploited -Uncover why CVSS is an insufficient metric for prioritization – and the key criteria you need to consider -Understand the Predictive Prioritization process, which uses machine learning to help you differentiate between real and theoretical risks Ensure you’re prioritizing the right vulnerabilities for your t
Tags : 
    
Tenable
Published By: Tenable     Published Date: Feb 27, 2019
"Overwhelmed by the number of vulnerabilities your team faces? Uncertain which cyber threats pose the greatest risk to your business? You’re not alone. Cybersecurity leaders have been grappling with these challenges for years – and the problem keeps getting worse. On average, enterprises find 870 vulnerabilities per day across 960 IT assets. There just isn’t enough time or resources to fix them all. More than ever, it’s essential to know where to prioritize based on risk. Download the new whitepaper “Predictive Prioritization: How to Focus on the Vulnerabilities That Matter Most” to: -Learn how to focus on the 3% of vulnerabilities that have been – or will likely be – exploited -Uncover why CVSS is an insufficient metric for prioritization – and the key criteria you need to consider -Understand the Predictive Prioritization process, which uses machine learning to help you differentiate between real and theoretical risks Ensure you’re prioritizing the right vulnerabilities for your t
Tags : 
    
Tenable
Published By: Third Brigade     Published Date: Aug 21, 2009
Businesses today are under intense pressure to open up their networks, comply with increasingly rigorous regulatory requirements, AND ensure their IT assets are protected from attacks. This white paper explores these security challenges and explains how host-based Intrusion Prevention Systems  play a critical role in an organization's overall security strategy.
Tags : 
intrusion prevention, security, network security, compliance, security compliance, attacks, hacker detection, ips, intrusion prevention system, security strategy, security management, third brigade
    
Third Brigade
Published By: TRIRIGA     Published Date: Apr 15, 2008
Workplace Performance Management: A strategic framework and system to align, measure and deliver greater shareholder value from workplace assets and operations. Corporations need to align workplace operations and assets to business strategies.  Workplace assets and operations must be measured and linked directly to stakeholder expectations to expose the true contributions of real estate to the organization.
Tags : 
workplace, performance, real estate, facility management, wpm, tririga, performance metrics, workplace strategy, tririga
    
TRIRIGA
Published By: UPS Capital     Published Date: Feb 13, 2019
WD Music is a one-of-a-kind company, but their path to growth was blocked by a problem faced by thousands of small and mid-sized businesses: their precious capital was tied up in a long cash-conversion cycle. WD Music had to pay suppliers in-full for guitar parts, then wait weeks or months to recoup the cash from customer sales. This left them without the working capital to buy more inventory, fulfill more orders and create a healthier, more profitable business. One day, Larry Davis, Vice President of WD Music, was speaking with Greg Kleehammer, from UPS Capital®. Kleehammer asked a simple question: “What if you could take one of your company’s biggest assets — your in-transit inventory — and turn it into working capital?” That’s how WD Music discovered an alternative-financing solution that opened the door to more growth, more prosperity and a lot less stress.
Tags : 
    
UPS Capital
Published By: UPS Capital     Published Date: Feb 19, 2019
WD Music is a one-of-a-kind company, but their path to growth was blocked by a problem faced by thousands of small and mid-sized businesses: their precious capital was tied up in a long cash-conversion cycle. WD Music had to pay suppliers in-full for guitar parts, then wait weeks or months to recoup the cash from customer sales. This left them without the working capital to buy more inventory, fulfill more orders and create a healthier, more profitable business. One day, Larry Davis, Vice President of WD Music, was speaking with Greg Kleehammer, from UPS Capital®. Kleehammer asked a simple question: “What if you could take one of your company’s biggest assets — your in-transit inventory — and turn it into working capital?” That’s how WD Music discovered an alternative-financing solution that opened the door to more growth, more prosperity and a lot less stress.
Tags : 
    
UPS Capital
Published By: VMware     Published Date: May 03, 2011
For small and midsize businesses, the new VMware vSphere 4.1 delivers higher efficiency, greater agility and more freedom of choice than ever before, making it easier than ever to optimize existing assets and get always-on IT with comprehensive, cost-effective backup and recovery.
Tags : 
vmware, vsphere 4.1, smb, small and midsize businesses, optimization, backup and recovery
    
VMware
Published By: VMware SD-WAN by VeloCloud     Published Date: Feb 19, 2019
The network of yesterday is not the network that can take businesses into the future. As mission critical enterprise applications move to the cloud, wide area network (WAN) must adapt to become agile, flexible, and scale rapidly. Leading IT trends such as Internet of Things (IoT), Software as a Service (SaaS), cloud storage, enterprise mobility, emerging transport alternatives, and globalization increase the importance of how network assets are leveraged and how the network is conceptualized. The advantages of public and private data centers and cloud-based applications are significantly diminished if the network is slow, inflexible, and unpredictable. Erratic network performance with high latency, jitter and packet loss can significantly impact user adoption, satisfaction, and overall corporate productivity. As connectivity options continue to emerge, end users are no longer tethered to the office or to the localized applications and services that were trademarks of a primary or branc
Tags : 
sd-wan, saas, cloud storage
    
VMware SD-WAN by VeloCloud
Published By: VMware SD-WAN by VeloCloud     Published Date: May 20, 2019
The network of yesterday is not the network that can take businesses into the future. As mission critical enterprise applications move to the cloud, wide area network (WAN) must adapt to become agile, flexible, and scale rapidly. Leading IT trends such as Internet of Things (IoT), Software as a Service (SaaS), cloud storage, enterprise mobility, emerging transport alternatives, and globalization increase the importance of how network assets are leveraged and how the network is conceptualized. The advantages of public and private data centers and cloud-based applications are significantly diminished if the network is slow, inflexible, and unpredictable. Erratic network performance with high latency, jitter and packet loss can significantly impact user adoption, satisfaction, and overall corporate productivity. As connectivity options continue to emerge, end users are no longer tethered to the office or to the localized applications and services that were trademarks of a primary or branc
Tags : 
    
VMware SD-WAN by VeloCloud
Published By: Waterline Data & Research Partners     Published Date: Nov 07, 2016
For many years, traditional businesses have had a systematic set of processes and practices for deploying, operating and disposing of tangible assets and some forms of intangible asset. Through significant growth in our inquiry discussions with clients, and in observing increased attention from industry regulators, Gartner now sees the recognition that information is an asset becoming increasingly pervasive. At the same time, CDOs and other data and analytics leaders must take into account both internally generated datasets and exogenous sources, such as data from partners, open data and content from data brokers and analytics marketplaces, as they come to terms with the ever-increasing quantity and complexity of information assets. This task is clearly impossible if the organization lacks a clear view of what data is available, how to access it, its fitness for purpose in the contexts in which it is needed, and who is responsible for it.
Tags : 
    
Waterline Data & Research Partners
Published By: webMethods     Published Date: Aug 21, 2009
The goal of Business Process Productivity is to enable enterprises to become both highly agile and highly efficient, allowing them to more easily leverage their existing information technology (IT) assets to address market opportunities and pressures, and to create competitive differentiation through their business processes. This white paper describes how webMethods Fabric helps companies increase Business Process Productivity.
Tags : 
business process, bpm, bpa, productivity, competitive, business management, efficiency, web methods, webmethods
    
webMethods
Published By: Winward     Published Date: Aug 21, 2009
To succeed in today's business environment, the enterprise must manage the effects of three realities: the recent, massive investment in technology has significantly increased IT complexity; the Internet has altered customers' expectations of availability, cost, and service; and the new economic climate highlights the need to leverage existing assets and improve the return on investment for new initiatives.
Tags : 
business management, cost control, it spending, analytical applications, report design, it investment, technology spending, roi, return on investment, winward
    
Winward
Published By: Zebra     Published Date: Jul 10, 2014
In this paper, Zebra shows how a solid device management solution can provide consistency and visibility into device status to maximize uptime and business efficiencies. Ensuring visibility of all assets whether they are directly on premise or at remote locations is another key benefit-for both IT and finance. Doing so helps maximize productivity where the devices are used, streamlines inventory management and compliance operations, and helps to create a more agile enterprise.
Tags : 
zebra, device management, centralized device management, finance, compliance operations, agile enterprises, device status
    
Zebra
Start   Previous    1 2 3 4 5 6    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.