it manager

Results 326 - 350 of 926Sort Results By: Published Date | Title | Company Name
Published By: IBM     Published Date: Sep 30, 2016
Learn about the latest in the market and why IBM Security Access Manager is a recognized leader in the space.
Tags : 
ibm, security, access management, access manager, kuppingercole, leadership compass
    
IBM
Published By: Oracle     Published Date: Sep 21, 2016
In this white paper, learn how Oracle customers have transformed their finance operations and achieved significant reductions in close times and increases in manager productivity with Oracle’s Cloud based finance and accounting applications.
Tags : 
    
Oracle
Published By: LogRhythm     Published Date: Sep 19, 2016
In this webinar Randy Franklin Smith, Windows Security Subject Matter Expert, and Erik Ingleby, Product Manager at LogRhythm, discuss the lessons learned from Target, Niemen Marcus, Sony and other breaches. By analyzing the available information about these recent data breaches, from the perspective of detection, the two have assembled an interesting list of security monitoring lessons and ideas. The list includes tips on how to eliminate double false positives, a number of generalized monitoring scenarios, as well as acknowledges the incredible power of monitoring for new executables running for the first time on your environment. If you are concerned about data breaches and you're involved in SIEM and other security monitoring, this is the webinar for you.
Tags : 
cyber threat, cyber risk, technology, best practices
    
LogRhythm
Published By: Determine (Selectica)     Published Date: Sep 13, 2016
The sponsor named below commissioned Ardent Partners to write this report. While the report topic In 2015, collaboration is the name of the game in procurement and frequently entails working with key internal stakeholders (like line-of-business managers and legal departments) or preferred suppliers to drive greater value through sourcing and procurement. For Chief Procurement Officers ("CPOs") and other supply management leaders, collaboration has taken on many new and innovative forms over the years, causing these executives to leverage new (and, in some cases, existing) processes, relationships, and technologies to enhance compliance, decrease risk, and increase savings. One such business process, contract management, has been reborn with digital, automated features that can shift the way procurement teams collaborate, mitigate risk, drive performance, and realize greater savings for the enterprise.
Tags : 
    
Determine (Selectica)
Published By: Determine (Selectica)     Published Date: Sep 13, 2016
The sponsor named below commissioned Ardent Partners to write this report. While the report topic In 2015, collaboration is the name of the game in procurement and frequently entails working with key internal stakeholders (like line-of-business managers and legal departments) or preferred suppliers to drive greater value through sourcing and procurement. For Chief Procurement Officers ("CPOs") and other supply management leaders, collaboration has taken on many new and innovative forms over the years, causing these executives to leverage new (and, in some cases, existing) processes, relationships, and technologies to enhance compliance, decrease risk, and increase savings. One such business process, contract management, has been reborn with digital, automated features that can shift the way procurement teams collaborate, mitigate risk, drive performance, and realize greater savings for the enterprise.
Tags : 
    
Determine (Selectica)
Published By: Sailthru     Published Date: Aug 15, 2016
Download this guide to discover how to find a partner that moves beyond antiquated batch-and-blast methodologies to impact: -Audience retention rates -Subscription conversion -Advertising revenue -Effective reporting and predictive analytics Who should download: -Online Media and Digital Publishing Executives -Directors of Audience Development, CRM, and Engagement -Email Marketing Managers
Tags : 
sailthru, online media, digital publishing, rfp, request for proposal, email marketing, direct marketing, internet marketing
    
Sailthru
Published By: Sailthru     Published Date: Aug 15, 2016
Download this best practice guide on increasing repeat visits to learn: -High-impact strategies that drive repeat visits and audience retention -Tactics to test and deploy in order to put strategy into action -Actionable frameworks to properly measure and drill-down into repeat visit rates Who should download: -Directors of Audience Development & Retention -Directors of CRM -Digital Marketing Directors and Managers -Channel Marketing Managers (Web, Email, Mobile)
Tags : 
sailthru, media, marketing, repeat visits, nurturing, nurture, customer experience, email marketing
    
Sailthru
Published By: Sailthru     Published Date: Aug 15, 2016
Download this best practice guide on increasing repeat purchase rates to learn: -The top high-impact strategies that will drive repeat purchase rates and customer lifetime value -The priority tactics to test and deploy in order to put strategy into action -The frameworks you need to properly measure and drill-down into your business's repeat purchase rates Who should download: -Directors of CRM & Customer Retention -Digital Marketing Managers -Email Marketing Managers
Tags : 
salethru, digital, online retail, retail, purchase rates, marketing, email marketing, emerging marketing
    
Sailthru
Published By: Oracle ODA     Published Date: Aug 15, 2016
Learn more about the challenges faced by today’s IT leaders and database managers, and see how Oracle Database Appliance can help overcome them.
Tags : 
    
Oracle ODA
Published By: Glint     Published Date: Aug 10, 2016
Leaders care deeply about employee engagement. Most organizations measure it, why aren’t they equipped to address it? Download our guide to gauge your organization’s effectiveness in measuring and improving employee engagement by focusing on four main categories: • Are you measuring the right things at the right frequency? • Did you get actionable insights? • Are insights delivered to the right people—managers, not just HR leaders and the CEO • Are people equipped to act quickly? CTA (20) Download eBook
Tags : 
employee engagement, human resource, organization, best practices, business management
    
Glint
Published By: LogRhythm     Published Date: Aug 08, 2016
Security information and event management technologies vary widely in their focus and functionalities, with vendors offering divergent security monitoring visions. This research helps IT security managers align their needs with one of the three most common use cases to choose the best SIEM solution.
Tags : 
security, technology, best practices, information technology
    
LogRhythm
Published By: CDW     Published Date: Aug 04, 2016
With capacity demands growing constantly, storage environments must take advantage of both spinning-disk and flash technology. For decades, data center managers have faced a constant struggle to efficiently store and retrieve the massive amounts of information that their facilities collect, create and serve up to users. Being able to store and retrieve data quickly and cost-effectively is paramount to running a successful data center. But as the amounts of data that organizations store and retrieve grow at exponential rates, the challenges become thornier. Download this white paper to learn more!
Tags : 
best practices, technology, data, data center, demands, storage, white paper
    
CDW
Published By: Puppet     Published Date: Aug 03, 2016
After you set up your users and groups, the next thing you’ll want to do is configure the software running on your machines. In this webinar, you’ll get a taste of the many kinds of services and packages Puppet can manage on Windows. We’ll present some common use cases that will help you get some quick wins under your belt, including: - Managing Windows services (Windows Time, Disk Defragmenter, etc.) - Installing packages - Managing Windows maintenance tasks via WMI by executing arbitrary PowerShell code - Creating scheduled tasks in the Task Manager Puppet can do a lot, but we always recommend starting small and building on your success. Make 2016 the year you banish manual configuration for good!
Tags : 
    
Puppet
Published By: BitSight Technologies     Published Date: Aug 02, 2016
Organizations today aren’t just single entities—they are networks of partners, vendors, and third parties. While interconnected networks are critical for success in most businesses, they also leave data more vulnerable to exposure from bad actors. Because of this, vendor risk management (VRM) is a critical business practice.
Tags : 
    
BitSight Technologies
Published By: IBM     Published Date: Jul 20, 2016
Whether it's through using pre- or post-hire assessments, applying managerial feedback or learning results, identifying high potentials is a huge win for determining who will lead your company forward. With such information, businesses can ensure that their most valued employees are promoted, challenged, and encouraged to succeed - and that they stay with your business. Without this data, companies risk losing the talent that keeps them competitive and successful.
Tags : 
ibm, aberdeen group, talent acquisition, recruitment
    
IBM
Published By: IBM     Published Date: Jul 19, 2016
IBM Platform LSF family provides a complete set of workload management capabilities for demanding, distributed HPC environments. In this video, we will learn how a genomics workflow can be managed in a multi-architecture, hybrid-cloud environment with the IBM Platform LSF family. Featuring IBM Platform Application Center and IBM Process Manager, learn how these add-on products can help to drive productivity through easy-to-use interfaces for managing complex computational workflow.
Tags : 
ibm, analytics, ibm platform, lsf, ibm platform application center
    
IBM
Published By: IBM     Published Date: Jul 15, 2016
Learn about the latest in the market and why IBM Security Access Manager is a recognized leader in the space.
Tags : 
ibm, security, access manager, best practices
    
IBM
Published By: IBM     Published Date: Jul 15, 2016
Read Tolly's assessment of web application protection, federation capabilities, risk-based access features and overall performance of IBM Security Access Manager.
Tags : 
ibm, security, security access manager, federation capabilities, risk management, best practices, technology
    
IBM
Published By: Cisco     Published Date: Jul 11, 2016
It is the purpose of this white paper is to provide guidance to network planners, engineers, and managers who are deploying Cisco Nexus 9000 Series Switches in a data center as replacements for Cisco Catalyst® 6500 Series Switches.
Tags : 
    
Cisco
Published By: SnowFlake     Published Date: Jul 08, 2016
Jana provides free, unrestricted internet access to more than 30 million smartphone users in emerging markets. With their mCent Android app, Jana shifts the cost of mobile data to brands via sponsored content. When users engage with content in mCent, they earn free mobile data that can be used anywhere on the internet. Jana product managers use data to constantly analyze how well each of the features in mCent performs, to determine which features should be turned on for everyone, and which features should be turned off.
Tags : 
snowflake, data, technology], mcent, best practices, mobile computing, smartphone
    
SnowFlake
Published By: IBM     Published Date: Jul 07, 2016
Now in V8.7 of IBM Operational Decision Manager, IBM ODM Advanced applies insights and analytics to operational decisions by bringing together data from different sources and looking at historical trends and patterns to determine the next best action. With IBM Operational Decision Manager Advanced, you gain scope, scale, speed, and simplicity. You can now capture events, build context, and apply it to operational decisions in real-time. This helps detect situations as they occur – presenting risks or opportunities – to enable action.
Tags : 
ibm, odm, middleware, ibm operational decision manager, application services
    
IBM
Published By: SumTotal, a Skillsoft Company     Published Date: Jun 24, 2016
What if you could effortlessly connect people to the tools and resources that make continuous, self-directed learning and development both accessible and meaningful throughout the work day? Imagine a world where development and career discussions become meaningful and actionable, connecting people seamlessly to the learning and content they need to close skill gaps and map a personal path for progression. Come see how you can enable the Self-Developing Organization - a new workplace culture that simplifies the pursuit of organizational and individual objectives while empowering individuals, managers and leaders.
Tags : 
best practices, business optimization, business management, organization, talent management
    
SumTotal, a Skillsoft Company
Published By: Skillsoft     Published Date: Jun 23, 2016
What if you could effortlessly connect people to the tools and resources that make continuous, self-directed learning and development both accessible and meaningful throughout the work day? Imagine a world where development and career discussions become meaningful and actionable, connecting people seamlessly to the learning and content they need to close skill gaps and map a personal path for progression. Come see how you can enable the Self-Developing Organization - a new workplace culture that simplifies the pursuit of organizational and individual objectives while empowering individuals, managers and leaders.
Tags : 
best practices, business optimization, business management, talent management
    
Skillsoft
Published By: Cisco     Published Date: Jun 21, 2016
IT has gone through a significant evolution over the past decade. Virtualization has changed the entire face of the data center, the network edge has become predominantly wireless and consumer devices reign supreme. However, one of the few areas of IT that has yet to evolve is the corporate wide area network (WAN). Managing the WAN is something network managers have always struggled with because WAN speeds are typically an order of magnitude, or more, slower than local area networks (LANs).
Tags : 
    
Cisco
Published By: VMware AirWatch     Published Date: May 25, 2016
L’une des questions que de nombreux clients se posent récemment est « Comment Office 365 est-il pris en charge par VMware AirWatch® ? » Beaucoup se demandent si AirWatch peut contrôler l’accès à Office 365 (O365) non seulement sur leurs systèmes de Bureau d’entreprise mais surtout sur leurs terminaux mobiles. VMware AirWatch apporte un soutien complet aux organisations qui souhaitent utiliser O365 sur leurs terminaux mobiles. Notre récente intégration à VMware Identity Manager fournit un cadre de contrôle d’accès adaptatif pour s’assurer que toutes les applications professionnelles, dont O365, sont uniquement consultées depuis des terminaux gérés et conformes.
Tags : 
airwatch, best practices, competitive advantage, productivity
    
VMware AirWatch
Start   Previous    7 8 9 10 11 12 13 14 15 16 17 18 19 20 21    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.