broad

Results 301 - 325 of 638Sort Results By: Published Date | Title | Company Name
By: ZIGZAG Marketing, Inc.     Published Date: Feb 13, 2007
Product management positions are among the toughest to fill in the high technology industry due to the broad range of skills and real-world experiences that make for success in any given environment. A successful product manager in one organization doesn't necessarily translate to a successful product manager in your organization because the circumstances may be very different.
Tags : hiring, project manager, project management, zigzag
     ZIGZAG Marketing, Inc.
By: ZIGZAG Marketing, Inc.     Published Date: Feb 13, 2007
Product management positions are among the toughest to fill in the high technology industry due to the broad range of skills and real-world experiences that make for success in any given environment. A successful product manager in one organization doesn't necessarily translate to a successful product manager in your organization because the circumstances may be very different.
Tags : hiring, project manager, project management, zigzag, it management, project management, product lifecycle management
     ZIGZAG Marketing, Inc.
By: Polycom     Published Date: Jun 17, 2010
To see how much a company can save by implementing a Hosted VoIP solution, Polycom and BroadSoft have introduced this free and easy-to-use cost-savings calculator.
Tags : polycom, hosted voip, cost savings calculator, tco, broadsoft
     Polycom
By: IBM     Published Date: Jun 15, 2009
Read this astounding case study to see how migrating to IBM Lotus software with a broadly functional messaging platform increased the efficiency and support of mobile users for the Kentucky Baptist Convention. Then you'll learn how your own business can improve communications, drive down costs and eliminate the need for additional Web software.
Tags : kentucky baptist convention, case study, nonprofit, lotus software, messaging platform, ibm lotus, domino, 8.5
     IBM
By: Genesys     Published Date: Jun 19, 2019
Successfully managing a contact center requires a collaborative, multidisciplinary approach to handle a broad range of operational and tactical tasks. Planning, day-to-day operations and quality management must be seamlessly orchestrated, along with human resources functions like recruitment, learning and development, and employee scheduling. Read this executive brief to learn how to transition to an AI strategy that can take your team – and business results – to the next level. See how you can: Create an AI strategy with a single data model that includes routing, interaction analytics, forecasting/scheduling and predictive engagement Harness the power of your data to align customers with the best resource Drive employee effectiveness by ensuring you hire the right people and manage their performance to drive their success over the long term
Tags : 
     Genesys
By: CA Technologies     Published Date: Aug 26, 2016
Many breaches happen because of compromised privileged user accounts. Risks spread like wildfire in the dynamic traditional, virtualized and cloud environments common in enterprises today. One improperly authorized privileged account can cause widespread and irreparable damage to an organization’s infrastructure, intellectual property and brand equity, leading to sudden drops in market value, broad organizational disruption and costly compliance penalties. Effectively managing privileged access across your hybrid enterprise is an imperative to reducing security and compliance risks.
Tags : 
     CA Technologies
By: CA Technologies     Published Date: Apr 06, 2017
Privileged credentials have served as a major attack vector in the successful execution of many breaches. Protecting privileged access is an imperative to successfully defend an organization from a breach and is a core requirement of multiple compliance regimes. CA Privileged Access Management helps drive IT security and compliance risk reduction and improves operational efficiency by enabling privileged access defense in depth—providing broad and consistent protection of sensitive administrative credentials, management of privileged identity access and control of administrator activity.
Tags : it security, security breach, it infrastructure, cyber crime, risk management, password management, incident response, audits
     CA Technologies
By: CA Technologies     Published Date: Jun 01, 2018
Privileged credentials have served as a major attack vector in the successful execution of many breaches. Protecting privileged access is an imperative to successfully defend an organization from a breach and is a core requirement of multiple compliance regimes. CA Privileged Access Management helps drive IT security and compliance risk reduction and improves operational efficiency by enabling privileged access defense in depth—providing broad and consistent protection of sensitive administrative credentials, management of privileged identity access and control of administrator activity.
Tags : 
     CA Technologies
By: Salsify     Published Date: Mar 15, 2019
Enhanced content, or the below-the-fold rich media on retailer product pages, is the best way to tell your brand's story and differentiate from your competition. It also happens to be one of the best ways to improve conversion rates (by an average of 25%). Get a comprehensive guide on how to select the best performing content for your brand and deliver it across your sales channels for the broadest impact. This new ebook created in collaboration with Hinge Consulting will arm you with the data and guidelines you need to tell your brand story across the digital shelf. You will learn: How to think creatively about the most relevant enhanced content to include in your story How to scale your brand content across your most important retailer sites, including Amazon and Walmart How to measure the most important KPIs to communicate the impact of rich media Salsify is the product experience management platform for thousands of brands and retailers worldwide.
Tags : 
     Salsify
By: Hewlett Packard Enterprise     Published Date: Sep 25, 2017
IT organizations today must work in an “and” world, rather than an “or” world to meet the demands of their users. In an “and” world, IT architectures and strategies leverage an ever-broadening variety of tools while still supporting and propelling a single strategy.
Tags : 
     Hewlett Packard Enterprise
By: ThingWorx     Published Date: Dec 02, 2015
The evolution of products into intelligent, connected devices— which are increasingly embedded in broader systems—is radically reshaping companies and competition.
Tags : thingworx, network, manufacturing, intelligent device, product, networking, security
     ThingWorx
By: IBM     Published Date: Sep 15, 2014
Join Eric Minick of IBM for a look at what a DevOps toolchain is made of. While IBM is a vendor that provides tools that can fit into this tool chain, this webinar will not be a product demo. Instead, he will be taking a broader view of the software delivery lifecycle.
Tags : software delivery, idea tracking, monitoring, software development
     IBM
By: MuleSoft     Published Date: Apr 13, 2016
Today everything truly is connected to everything, and APIs are the connection mechanisms. Many companies are finding that their use of APIs has accelerated over the past 12 months, and that it will continue to accelerate during the next 12 months. APIs aren't really a new technology; they've actually been around for a long time. What is new is that they are in far broader usage today than they have been in the past. As of late 2015, the ProgrammableWeb API directory listed more than 14,000 APIs. When thinking about designing and managing APIs, a number of important questions arise. Why are APIs so well used and what effect would they have on your business? What is the impact of the expanding API economy on both providers and consumers? What are API tools and how can an investment in tools be an extremely cost efficient foundation for production grade API use cases?
Tags : best practices, business optimization, business management, application management, enterprise application, business intelligence, api management
     MuleSoft
By: INXPO     Published Date: Oct 22, 2012
It seems that business moves at a rate more rapid than ever before. All the while, organizations aim to grow revenue, expand abroad and lower costs. Read this white paper to learn the business benefits of improving your organization's internal communications - and how to do it.
Tags : inxpo, organization communications, internal communications, communication, enterprise, framework, enterprise applications
     INXPO
By: Adobe     Published Date: Sep 23, 2019
An excellent CMS solution provides your business with the flexibility to grow into a broad experience delivery platform. It should enable your business to scale and add new capabilities as it grows, and easily integrate with other marketing technologies. Why should the target audience care? Customer expectations have increased. They now expect their in-store experiences to be continuous and consistent extensions of the online journey. And the online journey provides fast, dynamic, and interactive experiences. If your business is not well informed on what is needed from a content management solution, it may come up short on customer experience. A successful and growing business will choose a solution that helps them future-proof for emerging channels and effectively manage mature ones. Supporting Concepts: Navigate your business through the noise. Apply these questions and insights to your selection process and avoid the pitfalls of costly and rigid content management systems.
Tags : 
     Adobe
By: Unitrends     Published Date: Jun 15, 2010
In this document we're first going to explore the use of the insurance metaphor in terms of its most fundamental element: the broad consequences of data loss. We'll also discuss industry and regulatory consequences of data loss.
Tags : unitrends, backup, data protection, data quality, server, replication, data loss, sox
     Unitrends
By: Cambium Networks     Published Date: Oct 03, 2016
For PMP sectors, the ePMP1000 system supports two modes of operation: TDD GPS Synchronized and non-TDD Unsynchronized.
Tags : tdd, epmp, wireless broadband, iperf, jperf
     Cambium Networks
By: AWS     Published Date: Jun 03, 2019
Background Businesses are often challenged with the complexities of protecting their physical, virtual, and cloud workloads while also meeting their part of the Amazon Web Services (AWS) Shared Responsibility Model. IT security leaders are inundated with too many security tools that aren’t built for their specific environments. Additionally, these responsibilities often entail large amounts of manual processes and people to administer them. As such, there is a need for a solution that provides a secure environment for you to transact your business without slowing you down. Trend Micro™ Deep Security™ is optimized to support the broadest set of platforms and environments (on-premises, virtual, on AWS, or containers) while delivering multiple threat defense techniques to help DevOps teams rapidly detect security incidents, fulfill compliance requirements, and securely deploy containers.
Tags : 
     AWS
By: HP - Enterprise     Published Date: Sep 16, 2013
HP Enterprise Security provides a broad view of the vulnerability landscape, ranging from industry-wide data down to a focused look at different technologies, including web and mobile. The goal of this report is to provide the kind of actionable security that intelligence organizations need to understand the vulnerability landscape as well as best deploy their resources to minimize security risk.
Tags : internet security, intrusion detection, intrusion detection/ forensics, intrusion prevention, mobile security, network security appliance, security, security policies
     HP - Enterprise
By: HP - Enterprise     Published Date: Sep 16, 2013
HP Enterprise Security provides a broad view of the vulnerability landscape, ranging from industry-wide data down to a focused look at different technologies, including web and mobile. The goal of this report is to provide the kind of actionable security that intelligence organizations need to understand the vulnerability landscape as well as best deploy their resources to minimize security risk. Download this infographic for more info!
Tags : internet security, intrusion detection, intrusion detection/ forensics, intrusion prevention, mobile security, network security appliance, security, security policies
     HP - Enterprise
By: Sponsored by HP and Intel®     Published Date: May 13, 2013
Learn more about this offering that includes a self-service infrastructure portal for quick auto-provisioning, along with built-in infrastructure lifecycle management to optimize infrastructure, manage the resource pools, and help ensure uptime. CloudSystem Matrix is integrated by design with broad support of heterogeneous environments, including VMware, Microsoft® Hyper-V, and KVM through OpenStack as an enabling technology that manages and provisions virtual machines to the Red Hat KVM hosts.
Tags : 
     Sponsored by HP and Intel®
By: TriNet     Published Date: Nov 08, 2017
Human resource outsourcing is a complex industry with a broad spectrum of products and services that can be bundled or delivered a la carte. This paper identifies the complexities and potential risks for small businesses considering outsourcing HR.
Tags : 
     TriNet
By: Dell EMC     Published Date: Feb 23, 2017
Desktop and application virtualization have steadily gained ground to address a broad range of use cases across organizations of all sizes. According to ESG research, over the past few years, desktop virtualization has consistently risen to be included among the five most commonly-identified IT priorities, alongside such perennial corporate objectives as fortifying cybersecurity and managing data growth.
Tags : 
     Dell EMC
By: IBM     Published Date: Jul 24, 2012
Tax revenues have been declining recently and some of this loss is caused by fraud, tax evasion, and various forms of tax cheating. The ineffective recovery techniques can give government agencies poor results, which results in 20% of broad-approach audits ending in "no charge". By using IBM SPSS Predictive Analytics Solutions it is possible to maximize revenues, analyze the data you already collect, detect non-compliant accounts efficiently, and identify important differences in tax records. This program has tremendous power and features an easy to use interface that focuses investigations on case that yield large adjustments ensuring a successful ROI for clients.
Tags : tax revenues, fraud, ibm, business analytics, spss solutions, tax cheating, roi
     IBM
By: IBM     Published Date: Oct 13, 2017
IBM Security offers one of the most advanced and integrated portfolios of enterprise security products and services. The portfolio, supported by world-renowned X-Force research, provides security intelligence to help organizations holistically protect their infrastructures, data and applications, offering solutions for identity and access management, database security, application development, risk management, endpoint management, network security and more. These solutions enable organizations to effectively manage risk and implement integrated security for mobile, cloud, social media and other enterprise business architectures. IBM operates one of the world’s broadest security research, development and delivery organizations, monitors 15 billion security events per day in more than 130 countries, and holds more than 3,000 security patents.
Tags : it security, malware, malware protection, virus prevention, ibm, threat intelligence
     IBM
Start   Previous    6 7 8 9 10 11 12 13 14 15 16 17 18 19 20    Next    End
Search White Papers      

Add White Papers

Get your white papers featured in the insideHPC White Paper Library contact: Kevin@insideHPC.com