inform

Results 326 - 350 of 4036Sort Results By: Published Date | Title | Company Name
Published By: Blue Jeans Network     Published Date: Oct 17, 2013
In this white paper, you will learn how third-party service providers can help Lync to become the ubiquitous solution empowering information workers, speeding decision making, and enabling the next generation of B2B and B2C communications.
Tags : 
visual collaboration, video conferencing, collaboration, unified communications
    
Blue Jeans Network
Published By: Blue Prism     Published Date: Mar 15, 2019
RPA platforms represent a hyper growth market, with enterprises investing in new RPA platforms for process and task automation to achieve greater operating efficiency and agility, while allowing the human workforce to focus on more strategic and higher priority projects and tasks. Intelligent process automation (IPA) is in an early phase of its evolution and represents the next frontier for RPA vendors. This Ovum Decision Matrix (ODM) is a comprehensive evaluation to help enterprise IT and business leaders, including chief information officers (CIOs), enterprise and process architects, IT directors, line-of-business (LOB) leaders and process owners, and digital transformation leaders select an RPA platform that is well suited to their specific requirements.
Tags : 
    
Blue Prism
Published By: BlueCat     Published Date: Jul 09, 2008
This paper briefly traces some of the challenges involved with IP address distribution over the past two decades, to the current adoption of DHCP as the dynamic protocol of choice for pain-free management of network resources. Integral to the theme of secure yet reliable network administration is the integration of DNS and DHCP into a single network device called the Adonis DNS/DHCP Appliance which ensures that traditional barriers to secure and effective resource allocations are overcome with an efficient yet easy-to-use solution that enhances enterprise information security.
Tags : 
ipam, ip address management, address management, dns, dhcp, ip address, bluecat, blue cat
    
BlueCat
Published By: BlueHornet     Published Date: Jun 11, 2008
The effectiveness of your targeting and personalization efforts are only as good as the data used to power them. This article will help you discover effective ways of collecting subscriber data -- allowing you to drive campaigns that evolve as your subscribers' preferences and behaviors change over time.
Tags : 
blue hornet, bluehornet, data collection, data mining, subscriber information, subscriber, newsletter design, newsletter managment, campaign managment, email marketing services/software
    
BlueHornet
Published By: Bluewater Learning     Published Date: Nov 02, 2018
Would you like to make better-informed decisions about where to invest your time & resources? Are you interested in gaining more insight into what is working, what isn't, & why? There is a movement towards advanced & predictive analytics in the Learning & Talent Management space. But what does that really mean? Bluewater's team of consultants & developers can help you define what analytics means for your company.
Tags : 
    
Bluewater Learning
Published By: BMC     Published Date: Jan 05, 2012
Find out what the future of cloud means for IT organizations, tech businesses and for the CIOs who have to make information technology work.
Tags : 
bmc, cloud, cio, cto, hardware, operations, business operations, productivity
    
BMC
Published By: BMC Control M     Published Date: Apr 01, 2009
Listen in as Sentrigo interviews Dr. Charles Popper, who discusses specific data integrity and security requirements for the pharma sector. Dr. Popper will address how to enforce the proper balance of information sharing and database protection, without compromising high-quality research.
Tags : 
    
BMC Control M
Published By: BMC Control M     Published Date: Jul 16, 2009
L’automatisation de la charge de travail (Workload Automation ou WLA) est une version aboutie de la planification des tâches qui permet d’automatiser des traitements informatiques complexes et qui accepte des charges de travail basées sur des événements, des plates-formes multiples, des services Web, des applications composites, des architectures orientées services (SOA), des systèmes virtuels, l’intégration des systèmes et des applications, l’alignement des services métier, etc.
Tags : 
wla, ema, bmc control-m, soa
    
BMC Control M
Published By: BMC Control M     Published Date: Jul 22, 2009
L’automatisation de la charge de travail (Workload Automation ou WLA) est une version aboutie de la planification des tâches qui permet d’automatiser des traitements informatiques complexes et qui accepte des charges de travail basées sur des événements, des plates-formes multiples, des services Web, des applications composites, des architectures orientées services (SOA), des systèmes virtuels, l’intégration des systèmes et des applications, l’alignement des services métier, etc.
Tags : 
wla, ema, bmc control-m, soa
    
BMC Control M
Published By: BMC ESM     Published Date: Jul 17, 2009
If your enterprise has multiple service desks in different geographies using disparate, disjointed tools and supporting diverse but possibly overlapping constituencies, you may be wasting hundreds of thousands of dollars every year. Service desk consolidation is a proven strategy for eliminating that waste.
Tags : 
service desk, consolidation, bmc, bmc software, itil, it infrastructure library, service, business service management, bsm, cobit
    
BMC ESM
Published By: BMC ESM     Published Date: Jul 22, 2009
If your enterprise has multiple service desks in different geographies using disparate, disjointed tools and supporting diverse but possibly overlapping constituencies, you may be wasting hundreds of thousands of dollars every year. Service desk consolidation is a proven strategy for eliminating that waste.
Tags : 
service desk, consolidation, bmc, bmc software, itil, it infrastructure library, service, business service management, bsm, cobit
    
BMC ESM
Published By: BMC ESM     Published Date: Aug 20, 2009
Using the five step process outlined in this white paper, we were able to eliminate more than 2,000 servers from our own IT infrastructure, saving an estimated $10 million dollars in data center costs.
Tags : 
data center consolidation, it infrastructure, bmc, esm, capacity, cobit, cmdb
    
BMC ESM
Published By: BMC Software     Published Date: Jan 31, 2014
IT is embracing to this new world of consumerized technology, with a focus on its own employees as internal customers. Explore how customer-first policies can make use of social, mobile and cloud technologies to give workers the freedom and flexibility they desire to drive company productivity. Please download the white paper for more information.
Tags : 
bmc, cosumerized technology, cloud technology, mobile technology, social technology, customer-first, modernized work processes, social-enabled enterprise applications, internal customers
    
BMC Software
Published By: BMC Software     Published Date: Jan 31, 2014
With software as a service (SaaS) you are integrating an external service, hosted by an external party, with your internal systems. The SaaS integration is a matter of connecting the clouds and well articulated interfaces defining the data that is traveling back and forth. With the right integration strategy, SaaS integration can be simple, straightforward, and easy. Moreover, it can position your IT organization to effectively leverage SaaS and migrate from one SaaS solution to another to avoid vendor lock-in. Read this information white paper to understand the things to consider when developing your integration strategy.
Tags : 
saas, cloud, itsm, integrating itsm, itsm integration, saas integration, bmc
    
BMC Software
Published By: BMC Software     Published Date: May 19, 2014
With software as a service (SaaS) you are integrating an external service, hosted by an external party, with your internal systems. The SaaS integration is a matter of connecting the clouds and well-articulated interfaces defining the data that is traveling back and forth. With the right integration strategy SaaS integration can be simple, straightforward, and easy. Moreover, it can position your IT organization to effectively leverage SaaS and migrate from one SaaS solution to another to avoid vendor lock-in. Read this information white paper to understand the things to consider when developing your integration strategy.
Tags : 
saas, cloud, itsm, integrating itsm, itsm integration, saas integration
    
BMC Software
Published By: BMC Software     Published Date: Oct 23, 2014
Rapid shifts in the ways that technology and information are consumed and delivered through cloud computing, big data, social networking, and smart devicesare transforming how companies compete. IT is at the center of the fray, working with business leaders to develop and execute a digital transformation strategy that capitalizes on these major new technologies. In order to lead this transformation, IT executives must focus on three areas: collaborating with business leaders to build a strategic vision, modernizing technology infrastructure, and rebuilding IT organizations to execute against new digital business goals.
Tags : 
saas, cloud, itsm, integrating itsm, itsm integration, saas integration
    
BMC Software
Published By: Bocada     Published Date: Aug 21, 2009
Today, the common approach to collecting information about computing activity across the enterprise is to use software agents installed on individual clients and servers. However, when this approach is applied to data protection management in the enterprise environment, it has proven both ineffective and inefficient.
Tags : 
data protection, network security, software agent, agentless, bocata, bocada
    
Bocada
Published By: Box     Published Date: Mar 14, 2012
Read how organizations are realizing massive productivity gains by transitioning their content management solutions to cloud-based models.
Tags : 
cloud, enterprise, collaboration, productivity, transition, management, content management, virtual, collaborate, information, data
    
Box
Published By: Box     Published Date: May 31, 2012
This IDC Vendor Profile analyzes Box, a company playing in the public cloud advanced storage services market and the content management and collaboration market, and reviews key success factors, highlighting market information tailored to investment.
Tags : 
content, cloud, collboration, enterprises, free online storage, online storage, file sharing, online file storage, share files online, store documents online, online collaboration, collaboration tools, ftp replacement, sharepoint alternative, file storage, mobile data access, share files online, asset management, online workspace, workspace
    
Box
Published By: Box     Published Date: Jun 11, 2014
The old world of collaborationdesktops, wired network connections, virtual private networks, and clunky softwarehas given way to a new world of collaboration. Todays generation of mobile devices, wireless technologies, and cloud capabilities has had an inexorable and fundamental impact on how people work together and share information. Collaboration is now device- and network-agnostic. Its not just about being able to work anywhere and anytime, its about being able to connect to any document at any time. Read this CIO white paper to learn how to bridge the gap in the modern world.
Tags : 
box, collaboration, desktops, wired networks, virtual private networks, mobile devices, wireless technologies
    
Box
Published By: Box     Published Date: Jun 19, 2014
Mobile device management solutions are designed to set and enforce management at the device level, but have no inherent control of applications or content on those devices. As a result, IT leaders are looking to enterprise mobility management solutions to enable management, configuration and security across devices, applications and content effectively addressing the problem of information sprawl. Learn how the partnership between Box and MobileIron can help you execute a mobile first strategy that manages and secures both mobile apps and content.
Tags : 
box, mobile first, securing information, mobile device management solutions, applications, enable management
    
Box
Published By: Box     Published Date: Jan 16, 2015
Desktop management at any scale is a tedious job. Imaging, reimaging, and troubleshooting desktop systems consume valuable IT resources, and keep employees from being productive. Securing the information generated on desktops, tablets, and smartphones is no simple job either. Many organizations are deploying virtual desktop infrastructures (VDI) for these reasons. But for deployment to be successful, computing and storage infrastructures must deliver high-quality, predictable, and productive user experiences. Often, the best way to accomplish this is through flash-based storage solutions due to its low latency/high IOPS nature. Unfortunately many IT professionals aren't sure what type of flash array is best for their needs or how to ensure that all elements of their VDI work seamlessly. Download now and learn how to validate a provide VDI configuration across NexGen N5 Hybrid Flash Array, VMWare Horizon View, Cisco Unified Computing System(UCS), and Cisco Nexus Switches.
Tags : 
nexgen, hybrid, flash, qos, quality of service
    
Box
Published By: Box     Published Date: Feb 13, 2015
Many CISOs admit to trepidation about the state of cybersecurity within their organizations. Why? Aside from the increasingly dangerous threat landscape, many large organizations face other security challenges, including personnel shortages, an overwhelming number of manual processes, and technology complexity. Beyond these issues however, CISOs also face the progressively difficult responsibility of securing the distributed enterprise. Aside from PCs, departmental file servers, and remote office equipment, the distributed enterprise now includes recent IT additions like mobile computing, SaaS applications, and hybrid cloud infrastructure. In aggregate, this increasingly distributed infrastructure makes information security more cumbersome.
Tags : 
ciso, cybersecurity, esg, it/security, it architecture
    
Box
Published By: Box     Published Date: Feb 18, 2015
For security and IT pros concerned with protecting sensitive information across multiple endpoints and applications. Explore how cloud can enable us to go back to basics of security to address the challenges of distributed computing and make our organizations more secure.
Tags : 
cloud, it pros, security, dlp, cloud securiity
    
Box
Published By: Box     Published Date: Nov 24, 2015
This report will discuss why EFSS tools will be the next- generation content management platforms. Well also briefly explore the emergence of Information Governance and how ECM delivers some of the required functionality.
Tags : 
ecm, content, management, box, efss tools, consumer oriented
    
Box
Start   Previous    7 8 9 10 11 12 13 14 15 16 17 18 19 20 21    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.