inform

Results 201 - 225 of 4036Sort Results By: Published Date | Title | Company Name
Published By: ASG Software Solutions     Published Date: May 27, 2009
Application management requires visibility from multiple vantage points within the IT enterprise, combined with a centralized information store that pulls the technology pieces of the application puzzle into a coherent whole.
Tags : 
asg, cmdb, bsm, itil, configuration management, metadata, metacmdb, lob, sdm, service dependency mapping, ecommerce, bpm, workflow, itsm, critical application, cms, itsm
    
ASG Software Solutions
Published By: ASG Software Solutions     Published Date: Apr 07, 2009
Application Portfolio Optimization (APO) provides executives with tools and information to assess the quality and condition of application assets as well as a means for understanding the impact of proposed application changes.
Tags : 
asg, cmdb, bsm, itil, bsm, portfolio optimization, apo, mining tools, metacmdb, configuration management, metadata, metacmdb, lob, sdm, service dependency mapping, ecommerce, bpm, workflow, itsm, critical application
    
ASG Software Solutions
Published By: ASG Software Solutions     Published Date: Jun 09, 2009
Improved business productivity often requires more efficient IT and more efficient IT cannot be achieved without a better understanding of the way business services are run and delivered. Configuration Management Databases (CMDBs) have emerged as a central component for Information Technology Infrastructure Library (ITIL) and business service management (BSM).
Tags : 
asg, cmdb, bsm, itil, bsm, metacmdb, configuration management, metadata, metacmdb, lob, sdm, service dependency mapping, ecommerce, bpm, workflow, itsm, critical application, cms, itsm
    
ASG Software Solutions
Published By: ASG Software Solutions     Published Date: Feb 18, 2010
Configuration Management is at the heart of the IT Infrastructure Library (ITIL®) and forms the foundation for Business Service Management (BSM). In fact, it is safe to say that neither the ITIL IT Service Management (ITSM) processes nor the BSM functions that leverage ITSM can be efficiently carried out without accurate configuration and dependency information.
Tags : 
asg, cmdb, bsm, itil, bsm, metacmdb, asg ddm, cab, configuration management, metadata, metacmdb, lob, sdm, service dependency mapping, ecommerce, bpm, workflow, itsm, critical application, cms
    
ASG Software Solutions
Published By: ASG Software Solutions     Published Date: Feb 24, 2010
A recent survey of CIOs found that over 75% want to develop an overall information strategy in the next three years, yet over 85% are not close to implementing an enterprise-wide content management strategy. Meanwhile, data runs rampant, slows systems, and impacts performance. Hard-copy documents multiply, become damaged, or simply disappear.
Tags : 
asg, cmdb, bsm, itil, bsm, metacmdb, archiving, sap, ilm, mobius, workload automation, wla, visibility, configuration management, metadata, metacmdb, lob, sdm, service dependency mapping, ecommerce
    
ASG Software Solutions
Published By: ASG Software Solutions     Published Date: Mar 10, 2010
Configuration Management is at the heart of the IT Infrastructure Library (ITIL) and forms the foundation for Business Service Management (BSM). In fact, it is safe to say that neither the ITIL IT Service Management (ITSM) processes nor the BSM functions that leverage ITSM can be efficiently carried out without accurate configuration and dependency information.
Tags : 
asg, cmdb, bsm, itil, ema, configuration management, itsm, bsm, itil, asg, ddm, cms, bsm, bsp, metacmdb, configuration management, metadata, metacmdb, lob, sdm
    
ASG Software Solutions
Published By: ASG Software Solutions     Published Date: May 05, 2010
Read this topical and informative white paper from EMA Research and see how you can attain peace of mind that your end user's application performance will exceed expectations.
Tags : 
asg, end user, service assurance, ema, it infrastructure, service management
    
ASG Software Solutions
Published By: ASG Technologies     Published Date: Apr 25, 2017
In today’s business model, organizations must provide support and flexibility in addressing the needs of a growing mobile workforce, and interactions with external partners, suppliers, and clients. In short, today’s business model must look beyond corporate walls and extend their business processes and access to business information in an effective, and secure manner regardless of device type. In this way, cloud applications can be leveraged to enhance and extend business processes beyond their corporate walls and support the increasing use of mobile devices. This paper presents the challenges and benefits of implementing an integrated cloud solution that provides the flexibility, agility, and security business organizations need to increase operational efficiency, and responsiveness.
Tags : 
    
ASG Technologies
Published By: Astrocom     Published Date: Apr 23, 2008
Quality of Service (QoS) enables outbound network traffic to be identified and controlled to give priority to certain types of traffic. Network traffic may be categorized based on a variety of criteria including addressing information, protocol, port number (TCP and UDP), and packet length.
Tags : 
astrocom, networking, traffic, quality of service, traffic management, network management
    
Astrocom
Published By: Astute IT DACH     Published Date: Feb 28, 2018
Die direkte Integration zwischen NetBackup und Veritas Information Map sorgt für Transparenz und Kontrolle, um Risiken und Kosten zu reduzieren. Dank der direkten Integration von Veritas Resiliency Platform (VRP) in NetBackup erhalten Sie eine durchgängige Unternehmenslösung zur Ausfallsicherheit.
Tags : 
datenflusses, letzten, technologie, integrierten, datenschicht
    
Astute IT DACH
Published By: AstuteIT_ABM_EMEA     Published Date: Feb 02, 2018
Si prevede che la criminalità informatica possa costare all’economia globale fino a 6 trilioni di dollari nel 2021, rispetto ai 3 trilioni di dollari del 2016. Considerata da alcuni "la più grande minaccia per ogni azienda mondiale", ha alimentato il dibattito pubblico sulla sicurezza dei dati. Non solo a proposito del possibile sfruttamento criminale dei dati personali rubati ma anche del loro trattamento da parte delle aziende con cui abbiamo relazioni.
Tags : 
gdpr, l'impatto, della, normativa, sulla, gestione, dei, dati
    
AstuteIT_ABM_EMEA
Published By: AstuteIT_ABM_EMEA     Published Date: Feb 28, 2018
Die direkte Integration zwischen NetBackup und Veritas Information Map sorgt für Transparenz und Kontrolle, um Risiken und Kosten zu reduzieren. Dank der direkten Integration von Veritas Resiliency Platform (VRP) in NetBackup erhalten Sie eine durchgängige Unternehmenslösung zur Ausfallsicherheit.
Tags : 
datenflusses, letzten, technologie, integrierten, datenschicht
    
AstuteIT_ABM_EMEA
Published By: Asure Software     Published Date: Jun 22, 2012
Meeting Room Manager now gives you the option to share your company's reservations and events with others via SocialView - an innovative new optional add-on that's essentially a public, shared online calendar, view-only interface that you control. Integrate this online calendar creator option into your internal or external website, and you'll be able to announce event information and room availability in an instant.
Tags : 
asure software, desktop, technology, business, content management, application integration
    
Asure Software
Published By: AT&T     Published Date: Nov 07, 2011
Contact center hosting and cloud-based solutions are fast becoming integral to enabling customer care service for enterprises.
Tags : 
contact center services, contact center, trends in contact centers, services, solutions, customers, enterprises, at&t, att, at+t, mobile devices, communication, information, exchange, cloud
    
AT&T
Published By: AT&T     Published Date: Nov 07, 2011
Contact center hosting and cloud-based solutions are fast becoming integral to enabling customer care service for enterprises.
Tags : 
contact center services, contact center, trends in contact centers, services, solutions, customers, enterprises, at&t, att, at+t, mobile devices, communication, information, exchange, cloud
    
AT&T
Published By: athenahealth     Published Date: Apr 09, 2012
Are you wondering why there's so much buzz around cloud computing? Discover how cloud-based services offer a solution that's more flexible, scalable, and available.
Tags : 
cloud based practice management, cloud based medical billing, cloud based emr, cloud based ehr, cloud based health care, cloud computing, cloud health care, cloud technology, hit, health information technoloy, cloud technology, athenahealth, athena health
    
athenahealth
Published By: athenahealth     Published Date: Sep 05, 2013
Business intelligence analytics streamline the task of gathering critical data across the health care enterprise and turns it into readily accessible, actionable information. Health care business intelligence is a package of software and services that offers clarity on and control over the vast amount of data needed to successfully run a medical organization.
Tags : 
health care business intelligence, business intelligence, analytics, medical organization
    
athenahealth
Published By: Attachmate     Published Date: Mar 20, 2013
This whitepaper discusses the critical importance of finding a better alternative to email as a file-sharing mechanism. It also provides information on the sponsor of this white paper – Attachmate – and its relevant solutions.
Tags : 
download ftp program, secure sftp, secure large file transfer, managed file transfer, ftp automation, file transfer software, file transfer management, ftp client security, secure dropbox alternatives, enterprise file sharing, enterprise file sharing, automated secure file transfer, automated file transfer, file transfer automation, secure file transfer automation, alternatives to cloud file transfer, secure ftp software, secure ftp automation, filexpress managed file transfer
    
Attachmate
Published By: Attachmate     Published Date: Dec 05, 2013
From email to Dropbox and FTP, the file transfer process in most organizations is fraught with risk and simply does not meet most organizations’ corporate governance requirements. The result is that the status quo of file transfer in most organizations can be considered UFT—or Unmanaged File Transfer. What is needed to overcome the problem, therefore, is Managed File Transfer (MFT)—a solution that will enable complete control over content, its lifecycle, access rights to that information, the maintenance of an audit trail, and disposition of data according to corporate governance requirements. This white paper, sponsored by Attachmate and based on a survey conducted by Osterman Research, describes current file transfer practices and the extent of risk that organizations face by not managing file transfer properly. It also explains the benefits of MFT, provides guidelines for evaluating file transfer vendors, and describes FileXpress®, Attachmate’s MFT solution.
Tags : 
filexpress managed file transfer, download ftp program, secure sftp, secure large file transfer, managed file transfer, ftp automation, file transfer software, file transfer management, ftp client security, secure dropbox alternatives, enterprise file sharing, enterprise file sharing, automated secure file transfer, automated file transfer, file transfer automation, secure file transfer automation, alternatives to cloud file transfer, secure ftp software, secure ftp automation
    
Attachmate
Published By: AtTask EMEA     Published Date: Mar 11, 2014
A look at the necessity of collaboration for organisations to provide their workers with the processes and capabilities to empower them to do their best work.
Tags : 
collaboration, enterprise, connectivity, productivity, efficiency, information sharing
    
AtTask EMEA
Published By: Attivio     Published Date: Apr 07, 2010
In this paper, well known data management authority Mark Albala proposes replacing the reliance on data models as the fixed navigation scheme used for storing, reporting and analyzing information with a new unified information access capability that enables more agile, insightful and pro-active decisions.
Tags : 
attivio, post-discovery intelligent application, analytic information delivery, business intelligence, enterprise applications, executive information systems, eis
    
Attivio
Published By: Attivio     Published Date: Apr 07, 2010
The wealth and volume of content and data, including new applications and data sources, cloud computing, SaaS, email, SharePoint and public content, have made information integration more important than ever.
Tags : 
attivio, unified information access, voc, voice of the customer, customer service, crm
    
Attivio
Published By: Attivio     Published Date: Aug 20, 2010
With the explosion of unstructured content, the data warehouse is under siege. In this paper, Dr. Barry Devlin discusses data and content as two ends of a continuum, and explores the depth of integration required for meaningful business value.
Tags : 
attivio, data warehouse, unified information, data, content, unstructured content, integration, clob, blob
    
Attivio
Published By: Attivio     Published Date: Aug 20, 2010
Current methods for accessing complex, distributed information delay decisions and, even worse, provide incomplete insight. This paper details the impact of Unified Information Access (UIA) in improving the agility of information-driven business processes by bridging information silos to unite content and data in one index to power solutions and applications that offer more complete insight.
Tags : 
attivio, data warehouse, unified information, data, content, unstructured content, integration, clob, blob
    
Attivio
Published By: Auth0     Published Date: May 12, 2016
HIPAA is the Health Insurance Portability and Accountability Act. It’s the legislation that makes sure your protected health information (PHI) is kept private and kept secure. It covers how healthcare providers and associated businesses should keep handle your data and protect your health information, and provides the standards needed to ensure PHI data stored, handled, and accessed correctly at all times.
Tags : 
auth0, hipaa, compliance, health insurance, legislation
    
Auth0
Start   Previous    2 3 4 5 6 7 8 9 10 11 12 13 14 15 16    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.