asset management

Results 376 - 400 of 400Sort Results By: Published Date | Title | Company Name
By: CDW     Published Date: Feb 27, 2015
In a perfect world, managing the discovery of software assets, the capture of license entitlements and optimization of an organization’s software usage and compliance situation would be a single-click operation. Unfortunately, the world is not perfect and those charged with managing an organization’s software compliance, availability and expenditure face a number of challenges that can easily derail a Software Asset Management (SAM) program. This paper from the SAM experts at Snow Software investigates some of the major challenges facing SAM managers and IT executives and highlights how to build a successful strategy to overcome them, ensuring the SAM program delivers true value to the business.
Tags : software management, sam, software security, cloud computing, enterprise content management, business intelligence, office productivity apps, network security
     CDW
By: CDW     Published Date: Mar 18, 2016
Client virtualization technologies are redefining the way IT resources are delivered to end users, and creating exciting new opportunities for IT organizations as they work to streamline and improve operations. By abstracting applications and operating systems from client hardware, virtualization enables client assets to be stored on central servers and delivered to client endpoints. The implications are profound. End users can log on to any networkconnected computing device and access their custom operating system and application environment. For IT departments, central management of client virtual machine (VM) images brings efficiencies in everything from routine maintenance and updating to operating system upgrades.
Tags : 
     CDW
By: IBM     Published Date: Oct 24, 2013
"The potential to manage assets more efficiently, replace and upgrade them, and exploit them for purposes beyond their initial role, is significant in all cities in today’s world. However, technologies that support asset management in cities are numerous, fragmented and often inadequate. For any individual city agency, the level of cost and effort required to make improvement may seem daunting. This white paper highlights how Capgemini can help cities to become ‘smarter’: It describes how to offer to city agencies a leading practice asset management technical solution provided as-a-Service. This accelerates implementation, substantially removes funding hurdles, ensures an ongoing quality solution and incentivizes cities to migrate from a fragmented, costly and inadequate model to a common leading-edge solution."
Tags : city assets, asset managemnet, efficiency, smart city, work management, architecture, real estate management, facilities management
     IBM
By: Oracle     Published Date: Nov 01, 2013
In today’s lean business environment, companies are maximizing the value of their people. Your people—or talent— are an asset you can leverage to dramatically increase your success. The more you know about your talent, the more you can drive performance. Leveraging talent management can help you capture meaningful information about people, know the talent that is driving results, and act on insight for better business performance. In today’s lean business environment, your people are an asset that can be dramatically leveraged to increase success. This executive brief investigates how organizations can better understand the talent that is driving results.
Tags : zenithoptimedia, oracle, top 10, talent management, best practices of talent management, social recruiting strategy, extend employment brand, engaging line managers
     Oracle
By: Oracle     Published Date: Nov 13, 2013
In today’s lean business environment, companies are maximizing the value of their people. Your people—or talent— are an asset you can leverage to dramatically increase your success. The more you know about your talent, the more you can drive performance. Leveraging talent management can help you capture meaningful information about people, know the talent that is driving results, and act on insight for better business performance. In today’s lean business environment, your people are an asset that can be dramatically leveraged to increase success. This executive brief investigates how organizations can better understand the talent that is driving results.
Tags : zenithoptimedia, oracle, top 10, talent management, best practices of talent management, social recruiting strategy, extend employment brand, engaging line managers
     Oracle
By: IBM     Published Date: Aug 06, 2014
With IBM analytics for big data with a smart mobile strategy, banks can increase wallet share and assets under management while lowering the organization’s operating ratio by using more efficient channels.
Tags : ibm, banking, digital, data, big data, analytics, mobile
     IBM
By: Samanage     Published Date: Apr 24, 2014
As you evaluate Service Desk and Asset Management solutions in the marketplace, you likely have a set of requirements for features and functionality. But have you considered other key factors that will set you up for success with a cloud-based ITSM solution that might not be so obvious? Not evaluating solutions based on these considerations can delay implementation, driving up costs and causing undue stress for the IT professional. Don’t let them stop you in your tracks; instead, consider these criteria when making your solution decision and to gain greater organizational acceptance.
Tags : it service management, itsm, itsm solutions, itsm tools, itam tools, itam solutions, it ticket management system, it workflow
     Samanage
By: AlienVault     Published Date: Aug 11, 2015
Read this paper to accelerate your evaluation of SOC tools and technology needs.
Tags : security operations center, soc, threat detection, soc tools, siem event correlation, security management, behavior monitoring, threat assessment
     AlienVault
By: STANLEY Healthcare     Published Date: Mar 24, 2015
State University of New York Upstate Medical University faces the same challenges as many other hospital organizations—increased pressure to improve efficiency and preserve capital. Read this case study to learn how SUNY Upstate increases efficiency and reduces costs with STANLEY Healthcare’s AeroScout® Solutions, making every second and dollar count for patient care.
Tags : efficiency, cost reduction, patient care, healthcare, medicine, hospital organizations, wi-fi, asset management
     STANLEY Healthcare
By: IBM     Published Date: Apr 04, 2016
Discover how covert threats from the dark web can impact your network, and what you can do to protect your assets.
Tags : ibm, ibm x-force threat intelligence, threat intelligence, asset protection, threat management, security
     IBM
By: IBM     Published Date: Apr 04, 2016
"Title/Main headline: IBM X-Force Threat Intelligence Quarterly - 4Q 2015 Sub Headline: How can your organization better prepare for a security incident? Blurb: 2015 has been a challenging year as insider threats, malware, and stealthy and mutating attacks have affected the threat landscape. Read the latest security research from IBM X-Force to learn: How low-level attacks can mask stealthier infiltrations The benefits of regularly maintained security procedures and response plans When patterns of irregularities can be the first indicators of compromise Call to Action/Action Statement: ""Download Now"" as the action statement"
Tags : ibm, ibm x-force threat intelligence, threat intelligence, asset protection, threat management, security
     IBM
By: IBM     Published Date: May 09, 2016
In 3-5 minutes, get a good view of what integrated asset management means for the industry and what value it brings to manage infrastructure assets in a smarter way.
Tags : ibm, watson, internet of things, iot, asset management, integrated asset management, infrastructure assets
     IBM
By: OpenText     Published Date: May 26, 2017
Today’s manufacturers need to ensure their production facilities are available 24/7. Ensuring that production lines are operating smoothly, associated utilities supplies are maintained correctly and production stoppages are minimized can significantly help to reduce the operational costs and boost the profits of today’s manufacturing operations.
Tags : opentext, manufacturing, plant, asset management
     OpenText
By: OpenText     Published Date: May 26, 2017
Today’s fast-moving consumer market is putting pressure on manufacturers to be able to share digital product information seamlessly and quickly across retail and distribution channels. A centralized digital asset management platform helps to simplify the distribution of digital information across the extended enterprise.
Tags : opentext, manufacturing, retailer, distributor
     OpenText
By: CA Technologies     Published Date: Apr 06, 2017
A number of high-profile security breaches over the last two years have highlighted the damage that a rogue systems administrator or stolen privileged credentials can cause. Today, fewer than half of all business organizations have deployed the type of privileged identity management (PIM) solution that could help improve the situation. This Ovum Decision Matrix (ODM) provides an in-depth view of the leading PIM solutions that are available to deal with these issues. It compares their technology, the market position each vendor has achieved, their ability to execute, and the overall maturity of each offering.
Tags : data assets, risk management, it security, session management, authentication management, security intelligence, information management, infrastructure management
     CA Technologies
By: CA Technologies     Published Date: Jul 19, 2017
• Planning for DevOps implementation encompasses people, processes and technology • CA Technologies delivers DevOps for Mainframe anchored by CA Application Lifecycle Conductor, which allows organizations to continue using their existing products • Catch a detailed evaluation of how CA compares to Compuware on Platform Support, Software Development Lifecycle, Integration and Extension of Enterprise Assets, Configuration and Administrative Management
Tags : 
     CA Technologies
By: CA Technologies     Published Date: Jun 01, 2018
Within any organization, the most dangerous users are those with privileged access to the company’s most valuable and sensitive data assets. This includes systems administrators, business managers, partners, suppliers, and service providers, and also takes into account the automated interactions between business machines, systems, and applications. Privileged access has always been a high-risk issue, but for too long, organizations have not understood or have chosen to ignore the risks, preferring instead to rely on the integrity of the individuals and systems involved. A number of high-profile security breaches over the last two years have highlighted the damage that a rogue systems administrator or stolen privileged credentials can cause. Today, fewer than half of all business organizations have deployed the type of privileged identity management (PIM) solution that could help improve the situation. This Ovum Decision Matrix (ODM) provides an in-depth view of the leading PIM solution
Tags : 
     CA Technologies
By: Adobe     Published Date: Sep 28, 2016
The ideal customer experience is everything today, and it starts with a modern digital foundation. You can’t give customers the timely and relevant experiences they expect with outdated solutions that are cobbled together. Read The Blueprint Redefined to see how a modern digital foundation can get you there. You’ll learn: - How a unified platform lets you easily manage and refine customer experiences - Three steps to deliver great digital experiences on all devices - The roles of personalization, analytics, and asset management?
Tags : adobe, customer experience, digital, marketing marketers, digital experience
     Adobe
By: Datastax     Published Date: Aug 07, 2018
"As an Enterprise Architect (or an aspiring one), your job is to help define, build, and manage your company's technology architecture for its single most important asset - its information - in order to meet your company's business goals. Read this comprehensive guide to learn the ins and outs of designing data management architectures to manage mixed workloads at scale."
Tags : 
     Datastax
By: Datastax     Published Date: Aug 15, 2018
"As an Enterprise Architect (or an aspiring one), your job is to help define, build, and manage your company's technology architecture for its single most important asset - its information - in order to meet your company's business goals. Read this comprehensive guide to learn the ins and outs of designing data management architectures to manage mixed workloads at scale."
Tags : 
     Datastax
By: Datastax     Published Date: Aug 15, 2018
"As an Enterprise Architect (or an aspiring one), your job is to help define, build, and manage your company's technology architecture for its single most important asset - its information - in order to meet your company's business goals. Read this comprehensive guide to learn the ins and outs of designing data management architectures to manage mixed workloads at scale."
Tags : 
     Datastax
By: Tenable     Published Date: Feb 07, 2018
"This IDC Technology Spotlight examines the evolution of vulnerability management. By leveraging the cloud and new technologies that deliver greater visibility, organizations can gain an accurate picture of their assets and overall risk posture. This is a critical step toward addressing the current landscape where attackers are using a wide variety of vectors such as mobile, social, and cloud-based attacks to infiltrate organizations and steal data. By reading this report you will get an overview of: - Benefits of cloud-based security and vulnerability management - Challenges of adopting cloud-based vulnerability management - IDC assessment of Tenable.io cloud vulnerability management"
Tags : 
     Tenable
By: Dell PC Lifecycle     Published Date: Mar 08, 2018
Traditional PC lifecycle management is an inefficient and expensive process that will cost your business both time and money. Dell EMC can help you refresh your entire PC and technological ecosystem with latest hardware, software, peripherals and lifecycle services, including deployment, support and asset recovery. Our services and technology can reduce costs of PC lifecycle management by up to 25%. Learn more about Dell solutions powered by Intel®.
Tags : 
     Dell PC Lifecycle
By: DigiCert     Published Date: Jun 19, 2018
Your organization’s websites are some of its most valuable assets. But they are vulnerable to security issues and criminal attacks. Fortunately, many of these problems are preventable with effective, integrated website security management. For ecommerce sites, you can calculate the cost of downtime in terms of lost revenue. You can add to this the considerable cost of remediation, and beyond this, the damage to customer confidence and trust that may be intangible but will be significant. Even when there are no security issues, inefficient processes result in deployment of additional resource that drives up cost. This article explains why in comparison to the above costs, investing in security management, particularly across SSL/TLS Certificate management, can be a highly efficient and cost effective measure to take.
Tags : 
     DigiCert
By: Group M_IBM Q3'19     Published Date: Aug 22, 2019
Watson IoT is changing the way energy and utility companies design, build and operate their businesses using asset performance management. 
Tags : 
     Group M_IBM Q3'19
Start   Previous    2 3 4 5 6 7 8 9 10 11 12 13 14 15 16     Next   End
Search White Papers      

Add White Papers

Get your white papers featured in the insideHPC White Paper Library contact: Kevin@insideHPC.com