dam

Results 101 - 125 of 902Sort Results By: Published Date | Title | Company Name
By: BMC Software     Published Date: Jun 13, 2014
The last five years have fundamentally changed the way people interact with technology, leaving IT in a reactive mode. As business customers have rushed to “consumerized” services and experiences, IT is beginning to redefine its approach to offering IT services.  In this eBook, explore the top trends driving the New IT for IT Service Management, and how leading organizations are evolving to focus on end-user experience.
Tags : bmc, itsm solutions, changing business, cloud, cios, software, it organizations, saas, mobile, social, on demand solutions, it management, data center
     BMC Software
By: BMC Software     Published Date: Jul 22, 2015
Integrieren Sie Ihrer Big Data Initiativen in Ihre Unternehmensweiten Geschäftsprozesse. Gerne machen wir Sie damit vertraut, wie sie mit Control-M für Hadoop die Anwendungsentwicklung beschleunigen und die Unternehmensintegration vereinfachen können. Besprochene Themen schließen folgende Punkte ein: * Wie können Sie mit einem Enterprise Scheduler für Hadoop, weitere Automationsinseln vermeiden. * Wie kann sichergestellt werden, dass Sie aus ihren Big Data Initiativen den gewünschten Mehrwert erhalten. * Wie können Sie mit Ihren Big Data initiativen sich den administrativen Herausforderungen & Bedürfnissen stellen und mögliche Konfrontationen erfolgreich meistern.
Tags : 
     BMC Software
By: Box     Published Date: Mar 14, 2012
Improving collaboration and access to the growing collection of content are critical, fundamental components of companies' future growth. Download this white paper to learn more.
Tags : reaping, ecm, cloud, enterprise, content, solutions, cloud, collabortation, growth, content management, enterprise applications
     Box
By: Box     Published Date: Jun 11, 2014
The old world of collaboration—desktops, wired network connections, virtual private networks, and clunky software—has given way to a new world of collaboration. Today’s generation of mobile devices, wireless technologies, and cloud capabilities has had an inexorable and fundamental impact on how people work together and share information. Collaboration is now device- and network-agnostic. It’s not just about being able to work anywhere and anytime, it’s about being able to connect to any document at any time. Read this CIO white paper to learn how to bridge the gap in the modern world.
Tags : box, collaboration, desktops, wired networks, virtual private networks, mobile devices, wireless technologies, it management
     Box
By: Box     Published Date: Jun 22, 2018
• Moving from legacy to cloud infrastructure is a huge win for business, but the process requires a fundamental shift in organizational culture and business processes both inside and outside IT. In fact, managing this change may be the biggest challenge your company faces when moving to the cloud, unless you're equipped with the resources that make for a simple, successful transition. • Here's our tried-and-true 3-step approach proving that change doesn't have to be hard. Download now to start your easy, secure and efficient move to the cloud.
Tags : 
     Box
By: Box     Published Date: Jul 29, 2019
Den meisten CIOs ist heute bewusst, dass Initiativen zum digitalen Wandel dazu beitragen können, Geschäftsprozesse zu optimieren, die Ef?zienz zu steigern und die Wettbewerbsfähigkeit zu erhöhen. Auf lange Sicht initiieren sie dadurch die Modernisierung und Zukunftsorientierung des Unternehmens. Einige der laufenden Transformationsinitiativen – auch in vielen wachstumsstarken Unternehmen – haben mit der Problematik zu kämpfen, den explosionsartigen Anstieg von unstrukturierten Daten zu verwalten und den damit verbundenen höheren Compliance- und Sicherheitsanforderungen gerecht zu werden. Zum Glück können neue Lösungen, die künstliche Intelligenz (KI) einsetzen, nicht genutzte Informationen aus unstrukturierten Daten extrahieren, beispielsweise aus Dokumenten, Bildern, Videos und Audiodateien. KI trägt auch dazu bei, viele der zeitaufwendigen Prozesse zur Klassi?zierung, Organisation und Analyse unstrukturierter Daten zu automatisieren.
Tags : 
     Box
By: Brandwatch     Published Date: Feb 25, 2015
This guide is an introductory overview of best practices for crisis and issues communications in the social media age, focusing on: • What reputation monitoring actually means • How to identify a crisis & assess the damage • Real-world examples from Marriott, United Airlines and Walmart/Asda
Tags : social media, social analytics, social media monitoring, crisis management, reputation management, social listening, social business intelligence, brand monitoring, social media management
     Brandwatch
By: Brightcove     Published Date: Feb 18, 2016
Video used to be a nice-to-have asset, but today it is a fundamental part of any successful marketing strategy. Yet, some companies still seem reluctant to invest in a video strategy because their leadership may not fully grasp the benefits of video.
Tags : video marketing, revenue marketing, demand generation, lead generation, video, martech, marketing technology, digital marketing, seo, social media marketing, marketing strategy, nurture email
     Brightcove
By: Brother     Published Date: Nov 23, 2015
Download this whitepaper and learn some some critical steps to help start the improvement effort in your office.
Tags : document management workflow, brother, document management strategy, multifunction printers, office technology, it management
     Brother
By: CA Mainframe     Published Date: Sep 12, 2008
Automated application quality assurance and testing are fundamental to the delivery of the service levels and managed risks that are essential to delivering business outcomes you can depend on. In this context, CA’s mainframe Application Quality Management and Testing Tools send very strong messages: the tools are being actively developed and, where appropriate, integrated with equivalent tools on the distributed platforms, to help companies deliver holistic, automated, business services.
Tags : ca mainframe, mainframe, application quality, application testing, testing
     CA Mainframe
By: CA Technologies     Published Date: Jan 06, 2014
Why should organizations take insider threats seriously? Because the stakes have never been higher, especially given the value enterprises place on intellectual capital and trade secrets.
Tags : mediacom, insider threats, substantial threats, bladley manning, edward snowden, malicious insiders, exploited insiders, sensitive information, steal information, secure data, secure passwords, security breaches, broken privacy, reputational damage, cyber-security, business closures, business security, insider rights, threat environment, security
     CA Technologies
By: CA Technologies     Published Date: Aug 01, 2014
This paper offers a look at the obstacles of prior generations of service management platforms, and it reveals how a new generation of solutions addresses some of these fundamental limitations.
Tags : service desks, service management platforms, service desk solutions, failing service desks, saas
     CA Technologies
By: CA Technologies     Published Date: Feb 13, 2015
Over the past 15 years, we’ve seen generations of service management platforms come and go—but many critical limitations persist. Consequently, IT organizations, and the businesses they serve, suffer from a lack of agility, poor service levels and high costs. This paper offers a look at the obstacles of prior generations of service management platforms, and it reveals how a new generation of solutions addresses some of these fundamental limitations.
Tags : service desk, management platforms, it organizations, limitations, solutions addresses, poor service levels
     CA Technologies
By: CA Technologies     Published Date: Feb 13, 2015
The need to speed innovation is a fundamental business reality today—but so is the need to contend with finite budgets and resources. Project and portfolio management (PPM) delivers the key capabilities organizations need to straddle these competing demands, but for many businesses, the time and money required to implement on-premises PPM platforms has kept these initiatives on the back burner. With CA Project & Portfolio Management SaaS (CA PPM SaaS) your organization can leverage a comprehensive, SaaS-based PPM solution. As a result, you can harness the capabilities you need to innovate more quickly and optimize your resource investments—without having to incur the time and effort of deploying and maintaining a PPM platform on premises.
Tags : portfolio management, saas, project management, ppm, optimization, resource investments, ppm platform, saas
     CA Technologies
By: CA Technologies     Published Date: Mar 06, 2015
Le API (Application Programming Interface) costituiscono le fondamenta di questa nuova azienda "aperta", consentendo alle società di riutilizzare le risorse informative esistenti al di là dei confini dell'organizzazione.
Tags : 
     CA Technologies
By: CA Technologies     Published Date: Jun 04, 2015
As empresas que dependem muito da TI para prestar serviços aos clientes são movidas constantemente pelas pressões do mercado para desenvolver e lançar novas funções de software que atendam às exigências cada vez maiores. Facilitar a colaboração entre o desenvolvimento e as operações de TI e colocar o aplicativo no mercado mais rapidamente e com maior qualidade são fundamentais para o sucesso dos negócios. Este resumo da solução apresenta informações sobre o movimento do DevOps, por que ele é importante e como é possível cruzar o abismo para melhorar a colaboração e gerar rapidamente valor para a empresa. Você aprenderá como as soluções da CA Technologies para DevOps otimizarão seu portfólio de tecnologias de TI em um ritmo de versões mais previsível e rápido, permitindo confirmar os resultados de cada fase do ciclo de vida do software que sejam positivos para a empresa.
Tags : 
     CA Technologies
By: CA Technologies     Published Date: Jun 04, 2015
"As empresas que dependem muito da TI para prestar serviços aos clientes são movidas constantemente pelas pressões do mercado para desenvolver e lançar novas funções de software que atendam às exigências cada vez maiores. Facilitar a colaboração entre o desenvolvimento e as operações de TI e colocar o aplicativo no mercado mais rapidamente e com maior qualidade são fundamentais para o sucesso dos negócios. Este resumo da solução apresenta informações sobre o movimento do DevOps, por que ele é importante e como é possível cruzar o abismo para melhorar a colaboração e gerar rapidamente valor para a empresa. Você aprenderá como as soluções da CA Technologies para DevOps otimizarão seu portfólio de tecnologias de TI em um ritmo de versões mais previsível e rápido, permitindo confirmar os resultados de cada fase do ciclo de vida do software que sejam positivos para a empresa."
Tags : 
     CA Technologies
By: CA Technologies     Published Date: Aug 26, 2016
Many breaches happen because of compromised privileged user accounts. Risks spread like wildfire in the dynamic traditional, virtualized and cloud environments common in enterprises today. One improperly authorized privileged account can cause widespread and irreparable damage to an organization’s infrastructure, intellectual property and brand equity, leading to sudden drops in market value, broad organizational disruption and costly compliance penalties. Effectively managing privileged access across your hybrid enterprise is an imperative to reducing security and compliance risks.
Tags : 
     CA Technologies
By: CA Technologies     Published Date: Apr 06, 2017
A number of high-profile security breaches over the last two years have highlighted the damage that a rogue systems administrator or stolen privileged credentials can cause. Today, fewer than half of all business organizations have deployed the type of privileged identity management (PIM) solution that could help improve the situation. This Ovum Decision Matrix (ODM) provides an in-depth view of the leading PIM solutions that are available to deal with these issues. It compares their technology, the market position each vendor has achieved, their ability to execute, and the overall maturity of each offering.
Tags : data assets, risk management, it security, session management, authentication management, security intelligence, information management, infrastructure management, database platforms, account management
     CA Technologies
By: CA Technologies     Published Date: Jun 26, 2017
Privileged user accounts—whether usurped, abused or simply misused—are at the heart of most data breaches. Security teams are increasingly evaluating comprehensive privileged access management (PAM) solutions to avoid the damage that could be caused by a rogue user with elevated privileges, or a privileged user who is tired, stressed or simply makes a mistake. Pressure from executives and audit teams to reduce business exposure reinforces their effort, but comprehensive PAM solutions can incur hidden costs, depending on the implementation strategy adopted. With multiple capabilities including password vaults, session management and monitoring, and often user behavior analytics and threat intelligence, the way a PAM solution is implemented can have a major impact on the cost and the benefits. This report provides a blueprint for determining the direct, indirect and hidden costs of a PAM deployment over time.
Tags : 
     CA Technologies
By: CA Technologies     Published Date: Aug 21, 2017
Wenn Sie noch nicht zu den Vorreitern zählen, aber einer werden möchten, lesen Sie weiter. Abteilungen arbeiten darauf hin, mehr Agilität für ihre Unternehmen zu erreichen. Dies ist sehr mühsam, aber Sie werden die Belohnungen dafür erhalten. Sogar wenn Sie nur den ersten Schritt abschließen, werden Sie echte geschäftliche Ergebnisse sehen. In diesem Artikel erfahren Sie, wie Sie: • Schritte identifizieren, mit denen Sie Ihre Abteilung transformieren und die Geschäftsflexibilität erhöhen können; • herausfinden, was Sie tun können, damit jeder Schritt Ihrer Transformation Fuß fasst; • die Änderungen an der Denkweise erkennen, die Sie benötigen, um das organisatorische Gleichgewicht zu erreichen und aufrechtzuerhalten, das den Mitarbeitern regelmäßige und schnelle Reaktionen auf Veränderungen ermöglicht.
Tags : 
     CA Technologies
By: CA Technologies     Published Date: Aug 22, 2017
Privileged user accounts—whether usurped, abused or simply misused—are at the heart of most data breaches. Security teams are increasingly evaluating comprehensive privileged access management (PAM) solutions to avoid the damage that could be caused by a rogue user with elevated privileges, or a privileged user who is tired, stressed or simply makes a mistake. Pressure from executives and audit teams to reduce business exposure reinforces their effort, but comprehensive PAM solutions can incur hidden costs, depending on the implementation strategy adopted. With multiple capabilities including password vaults, session management and monitoring, and often user behavior analytics and threat intelligence, the way a PAM solution is implemented can have a major impact on the cost and the benefits. This report provides a blueprint for determining the direct, indirect and hidden costs of a PAM deployment over time.
Tags : 
     CA Technologies
By: CA Technologies     Published Date: Aug 22, 2017
APIs are an emerging technology for integrating applications using web technology. This approach is exploding in popularity because it builds on well-understood techniques and leverages some existing infrastructure. But it is a mistake to think we can secure APIs using the same methods and technology that we used to secure the conventional, browser-centric web. While it is true that APIs share many of the same threats that plague the web, they are fundamentally differently and have an entirely unique risk profile that you need to manage. This eBooklet provides an overview of these new risks, and offers five simple solutions to counter the common threats. By adopting a secure API architecture from the beginning, organizations can pursue an API strategy more safely and securely — and reap the benefits of agile integration promised by this exciting new technology.
Tags : 
     CA Technologies
By: CA Technologies     Published Date: Aug 22, 2017
The application programming interface (API) is an emerging technology for integrating applications using Web technology. This approach is exploding in popularity because it builds on well-understood techniques and leverages some existing infrastructure. But it is a mistake to think you can secure APIs using the same methods and technology with which we secured the browser-centric Web. APIs are fundamentally different from websites and have an entirely unique risk profile that must be addressed.
Tags : 
     CA Technologies
By: CA Technologies     Published Date: Aug 22, 2017
The application programming interface (API) is an emerging technology for integrating applications using Web technology. This approach is exploding in popularity because it builds on well-understood techniques and leverages some existing infrastructure. But it is a mistake to think you can secure APIs using the same methods and technology with which we secured the browser-centric Web. APIs are fundamentally different from websites and have an entirely unique risk profile that must be addressed.
Tags : 
     CA Technologies
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search White Papers      

Add White Papers

Get your white papers featured in the insideHPC White Paper Library contact: Kevin@insideHPC.com