list management

Results 126 - 142 of 142Sort Results By: Published Date | Title | Company Name
Published By: IBM     Published Date: Jan 23, 2013
Global organizations are increasingly emphasizing business resilience, that is, the ability to adapt rapidly to a continuously changing business environment.
Tags : 
risk management, disaster recovery, business continuity, security
    
IBM
Published By: IBM     Published Date: Jan 23, 2013
Business continuity planning and IT security management are becoming an integral part of enterprise-wide risk management and business resilience frameworks at a growing number of organizations.
Tags : 
    
IBM
Published By: sweetiQ     Published Date: Oct 29, 2012
Smartphones and the social, local, mobile ecosystem are the future of retail. Where once there was the yellow pages, today's mobile consumer has much more access to information. Read on to learn how to presence on the social local and mobile web.
Tags : 
local listing management, google+ local, google places, location-based marketing, local search, local search optimization, business listings, solomo, social local mobile, local search analytics, local marketing, local marketing analytics, local listing presence, local search optimization analytics, local search optimization software, local search optimization tools, local venue listings, local marketing recommendation, local search analytics, local seo analytics
    
sweetiQ
Published By: IBM     Published Date: Sep 10, 2013
This guide discusses the benefits of each capability and provides checklists to help you evaluate whether or not a particular vendor's solution addresses each of these areas effectively. You will also find a list of attributes and capabilities yous should look for in selecting a provider that can support the full breadth of your endpoint management requirements.
Tags : 
endpoint management, endpoint, security, ibm, it management, capabilities, vendor solutions, endpoint solutions, enterprise applications, business technology
    
IBM
Published By: Oracle     Published Date: Nov 01, 2013
Advances in human capital management technology mean that with the right talent management system in place, HR leaders can implement world-class strategies at their companies. Oracle Talent Cloud was developed using a holistic approach, so HR leaders can manage everything from recruiting, compensation and goal and performance management to employee learning and talent review, in a single, cohesive SaaS-based system.
Tags : 
zenithoptimedia, oracle, talent management, talent cloud, human capital management, accelerating businesses, global technology, operational complexities increase, hcm solutions, manage growth globally, range of deployment, best talent management, talent management strategies, increase engagement, speed productivity, social and mobile capabilities, achieve operational efficiencies, hr data, lower operating costs
    
Oracle
Published By: Cisco     Published Date: Sep 15, 2015
In a recent Enterprise Strategy Group (ESG) paper1, senior analyst Mark Bowker listed several requirements and best practices for building a private cloud. High levels of availability and scalability, policy-based automation and application control, workload portability, and unified visibility and management across infrastructures and applications were all cited as desirable attributes.
Tags : 
enterprise, policy-based, infrastructure, cloud, visibility, scalability, it management, enterprise applications
    
Cisco
Published By: IBM MaaS360     Published Date: Apr 15, 2015
Tired of hearing all the ways you need to go “mobile” and all the ”things” it can do for your business. Don’t buy the hype, here’s a list of perfectly valid reasons fast and secure mobile deployment and management is a bunch of hullabaloo and poppycock.
Tags : 
fiberlink, mobile users, strategy, app enabled, scalability, security, device management, enterprise, byod
    
IBM MaaS360
Published By: Meltwater     Published Date: Jul 29, 2015
When a brand crisis hits, your most important asset is media intelligence. But don’t wait for all hell to break loose to get up to speed on the latest tools and best practices for crisis communications in the age of social media. Get the tools you need to help spot early warning signs, stay organized, and enforce due process should a crisis hit—Download our Media Intelligence for Crisis Communications e-book today.
Tags : 
media monitoring, social media monitoring, media intelligence, crisis communication, crisis communication plan, crisis management, crisis preparation, crisis planning, social listening, brand crisis, brand monitoring, brand protection, reputation management, corporate communications, public relations
    
Meltwater
Published By: Intralinks     Published Date: Nov 23, 2015
This Buyer’s Guide offers a holistic approach for your evaluation process by examining the granular aspects of enterprise file sharing, as well as infrastructure and extended collaboration, including Information Rights Management (IRM).
Tags : 
intralinks, infrastructure, information rights management, data management, business technology, data center
    
Intralinks
Published By: VMware AirWatch     Published Date: Oct 02, 2015
Nemmeno un anno fa, le previsioni degli analisti inducevano gli entusiasti della mobility a ritenere che il destino del settore del Mobile Device Management (MDM) fosse ormai segnato.
Tags : 
mdm, containerization, security, enterprise mobility
    
VMware AirWatch
Published By: VMware AirWatch     Published Date: May 24, 2016
Nemmeno un anno fa, le previsioni degli analisti inducevano gli entusiasti della mobility a ritenere che il destino del settore del Mobile Device Management (MDM) fosse ormai segnato. In occasione di una convention di analisti svoltasi nel 2013, un gruppo di esperti aveva espresso la convinzione che il fenomeno del BYOD (Bring Your Own Device) avrebbe portato a una forte riduzione dei prezzi, a un crollo delle vendite e alla fine di un intero settore. Così si rivolgeva l'analista di Gartner John Girard alla platea dei partecipanti (fonte: CRN.com): "Il mercato del Mobile Device Management è in pieno marasma e a mio parere ha i giorni contati". Girard prevedeva che il trend del BYOD e la refrattarietà dei dipendenti alla gestione dei dispositivi personali avrebbero reso necessaria la transizione verso un modello di gestione a livello di applicazione.
Tags : 
best practices, business optimization, business management, application management, enterprise application, business intelligence
    
VMware AirWatch
Published By: CA Technologies     Published Date: Jun 01, 2018
Thanks to numerous, headline-making incidents in recent years, cybercrime has risen toward the top of the concern list for many organizations—and the customers with whom they do business. You’ve heard many of the stories. Major health insurers, such as Anthem, Premera BlueCross and CareFirst had personal information for millions of their customers stolen. Sony Pictures experienced a breach that not only embarrassed employees and adversely impacted the release of the high-profile film, “The Interview,” but also damaged systems and applications—making it extremely difficult for the company to conduct business. The list goes on. Some you maybe haven’t heard, like the one about CodeSpaces, a provider of version management services to developers. When attackers were able to gain access to its cloud-based management consoles, they deleted the company’s entire infrastructure and backups—ultimately forcing CodeSpaces out of business. The bad news for organizations like yours is, thanks to the
Tags : 
    
CA Technologies
Published By: IBM     Published Date: Apr 20, 2017
Essentials for your organization’s first MDM deployment. IBM’s security platform provides the security intelligence to help organizations holistically protect their people, data, applications and infrastructure. IBM offers solutions for identity and access management, security information and event management, database security, application development, risk management, endpoint management, next-generation intrusion protection and more. IBM operates one of the world’s broadest security research and development, and delivery organizations.
Tags : 
mobile security, mobile device management, enterprise data, application security, information security, communication interception, business data
    
IBM
Published By: IBM     Published Date: Oct 26, 2017
When choosing among providers of identity and access management as a service (IDaaS), a great place to start is evaluating your own organization’s IAM needs. Create a personalized list of your identity and access management (IAM) needs and determine if IBM® Cloud Identity Service is right for you. With this checklist, you will be able to determine if your needs match up with the benefits of IBM Cloud Identity Service.
Tags : 
iam, idaas, web access management, cloud based security, governance administration, enterprise grade identity
    
IBM
Published By: Dun & Bradstreet     Published Date: Feb 21, 2017
As the volume of data coming into organizations – from both internal and external sources – continues to grow and makes its way across departmental systems in many different formats, there is a critical need to create a single, holistic view of the key data entities in common use across the enterprise. Master Data Management (MDM) aims to accomplish this goal. Not surprisingly, MDM has become a significant priority for global enterprises, with the market expected to triple from $9.4B to $26.8B by 2020 according to analysts. The reality, though, is that while seemingly everyone is investing heavily in the tools to manage data, few are putting a great enough emphasis on the data itself. And that’s a problem. Poor data quality is said to be costing businesses $3.1 trillion annually – and that’s just in the US alone. The information being put into MDM tools must be mastered first and foremost.
Tags : 
managing data, data management insight, mdm, master data management
    
Dun & Bradstreet
Published By: Dassault Systèmes     Published Date: Jun 19, 2018
Dassault Systèmes' has been named by Gartner, Inc. as a “Leader” in its 2017 Magic Quadrant for Manufacturing Execution Systems. 2017 is the first year for the Gartner Magic Quadrant for MES, which specifically covered the MES market, including MOM applications. Because of our position as a Leader in the Gartner Magic Quadrant we believe it confirms the positive response we are receiving on our vision and ability to execute the transformation of manufacturing. We also believe we are being recognized for our unique and holistic approach to MOM / MES and the greater transformative value that digital continuity with DELMIA has across manufacturing engineering, manufacturing operations and the supply chain. DELMIA® Manufacturing Operations Management solutions transform global production operations to achieve and sustain operational excellence. This is accomplished through digital continuity, a shared digital landscape connecting all stakeholders to improve visibility into, control over a
Tags : 
    
Dassault Systèmes
Start   Previous    1 2 3 4 5 6     Next   End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.

We use technologies such as cookies to understand how you use our site and to provide a better user experience. This includes personalizing content, using analytics and improving site operations. We may share your information about your use of our site with third parties in accordance with our Privacy Policy. You can change your cookie settings as described here at any time, but parts of our site may not function correctly without them. By continuing to use our site, you agree that we can save cookies on your device, unless you have disabled cookies.
I Accept