change management

Results 176 - 200 of 413Sort Results By: Published Date | Title | Company Name
By: IBM     Published Date: Feb 27, 2014
Agile methods are increasingly popular in application, enterprise and embedded development. Yet the question remains: Do the 12 agile principles apply to more than just software? Find out how leading companies are beginning to exploit agile's iterative processes for far more than software.
Tags : ibm, ibm software, product development, systems engineering, agile organization, embedded development, enterprise, application, 12 principles, customer satisfaction, change management, evolving product, working motivation, principle measure, adaptation, agile development, traditional development, customer collaboration
     IBM
By: IBM     Published Date: Feb 27, 2014
If you're looking for ways to expedite time-to-market, ensure business agility, and deliver high-quality smart products while cutting costs, this ebook is for you. This IBM Limited Edition ebook, "Systems Engineering For Dummies," explains what systems engineering is and how it can help you simplify the development of smart, connected products.
Tags : ibm, ibm software, systems engineering, business agility, smart products, cut costs, systems engineering for dummies, revolutionizing requirements, system modeling, collaboration, change management, tip-top quality, role requirements, systems development cycle, software house, integrating hardware, software development, it management
     IBM
By: IBM     Published Date: Feb 27, 2014
Organizations developing products and systems in industries such as automotive, aerospace and defense, medical devices and consumer electronics are undergoing a transformation driven by the rapid growth in functionality delivered by software and electronics. This paper outlines an approach for using this shift to gain a competitive advantage.
Tags : ibm, ibm software, systems engineering, business agility, smart products, traceability, engineering information, collaboration, engineering disciplines, business objectives, change management, compliance standards, systems age, engineering process, information integration, communication, it management
     IBM
By: IBM     Published Date: Feb 27, 2014
This executive summary discusses the current state of project portfolio management and how it could help drive value in software delivery when it focuses on doing the right thing at the right time instead of simply on efficiency.
Tags : ibm, ibm software, connecting ppm, software delivery, value-driven ppm, portfolio management, it rationalization, software projects, smarter products, outdated approach, collaboration, agile planning, structure, guidance, visibility, dynamic planning, change management, source control, process guidance, deliver transparency
     IBM
By: IBM     Published Date: Feb 27, 2014
Why should we bother automating deployments in the first place? What should the scope of the automation effort be? How do we get started? This white paper provides a solid introduction to these topics.
Tags : ibm, ibm software, deployment automation, manual deployments, automation, change management, automated solution, automated investments, deployment checklists, it organizations, deployment automation, visibility, traceability, deployment process, deployment failures, manual deployment steps
     IBM
By: Liaison Technologies     Published Date: Feb 07, 2014
Learn why businesses are increasingly using a managed services approach for their EDI/B2B needs. You too may consider it for your business.
Tags : liaison, electronically exchange, managed services, manage data, b2b, data management, enterprise application integration, eai, business integration, service provider, it systems, it functions, productivity, partner management, core competency, integration platform, change management, edi vendors, data infrastructure, data mapping
     Liaison Technologies
By: Liaison Technologies     Published Date: Feb 07, 2014
Businesses and their IT departments are increasingly looking into the Cloud to drive innovation and increase business agility. Are you on the cloud?
Tags : liaison, the cloud, cloud computing, hybrid approach, hybrid business, business agility, increase innovation, applications or processes, electronically exchange, managed services, manage data, b2b, data management, enterprise application integration, data infrastructure, data mapping, connectivity protocols, it management
     Liaison Technologies
By: Lumension     Published Date: Feb 07, 2014
Do you know about advanced threats? Would you know how to deal with them? This white paper will teach you the 5 tactics for dealing with those advanced persistent threats.
Tags : lumension, persistent threats, information security, it regimes, threat solution, risk mitigation, vulnerability management, layered defenses, e-security, targeted phishing, organized attacks, apt attacks, computer security, infrastructure, encryption, business scanning, content control, patch management, change management, test environment
     Lumension
By: Lumension     Published Date: Feb 07, 2014
Memory injections are on the rise. And traditional endpoint security tools can do little to stop them. Here’s what you need to know about memory-based attacks—and how to effectively protect against them.
Tags : lumension, persistent threats, memory-based attacks, information security, it regimes, threat solution, risk mitigation, data security products, vulnerability management, layered defenses, e-security, targeted phishing, organized attacks, apt attacks, computer security, infrastructure, whitelisting solutions, application control, encryption, business scanning
     Lumension
By: Interactive Intelligence     Published Date: Jan 17, 2014
Learn about how the expanding guidelines for compliance have changed and how compliance has never been more relevant within the Accounts Receivable Management (ARM) industry.
Tags : compliance, cloud solutions, interactive intelligence, customer support, workforce management, data solution, customer experience
     Interactive Intelligence
By: Avaya     Published Date: Jan 15, 2014
Be guided on what the best practices are, offering strategies, actionable tactics, and examples of enterprises on the cutting edge so your organization won't have an overabundance of options when working with partners and customers.
Tags : avaya, collaboration, effective enterprise, effective collaboration, new culture, broadcasting center, organizational roles, customer experience, customer satisfaction, the cloud, cloud center, cloud contact center, best practices, actionable tactics, collaboration technology, integration, change management, command and control, information age, distance barriers
     Avaya
By: CA Technologies     Published Date: Jan 15, 2014
Cloud adoption, mobility, social media and the consumerization of IT are transforming many business activities for enterprise employees, partners and customers and eliminating the traditional network perimeter. Organizations have to change how they manage security and user identities if they want to keep their data and applications secure. Read this eBook to discover how a centralized identity and access management service can help you create a new identity perimeter.
Tags : ca technologies, identity, identity management, user provisioning, security, mobile, cloud computing, social media, mobility, security management, access mangement, identity perimeter, network provisioning, network security, access control, authentication, internet security, web service security, mobile device management
     CA Technologies
By: CA Technologies     Published Date: Jan 15, 2014
Cloud adoption, mobility, social media and the consumerization of IT are transforming many business activities for enterprise employees, partners and customers and eliminating the traditional network perimeter. Organizations have to change how they manage security and user identities if they want to keep their data and applications secure. Read this eBook to discover how a centralized identity and access management service can help you create a new identity perimeter.
Tags : ca technologies, identity, identity management, user provisioning, security, mobile, cloud computing, social media, mobility, security management, access mangement, identity perimeter, network provisioning, network security, access control, authentication, internet security, web service security, mobile device management
     CA Technologies
By: IBM     Published Date: Jan 09, 2014
This IDC analyst white paper discusses an important sea change happening in IT: the development of expert integrated systems. Converged systems are becoming increasingly important in the systems market. Similarly, convergence is occurring in middleware core runtime services for application development and deployment that are being unified as an enterprise application platform. Given the similarity in derived value propositions, converged systems and platforms are coming together as integrated systems; with the addition of capabilities focused on deployment, management, and optimization, integrated systems become expert integrated systems.
Tags : ibm, pureflex, integrated systems, pureflex system, legacy solution, uefi code, system management, platform infrastructure, system security, ibm pureflex, intrachassis communication, security, storage, data center
     IBM
By: Red Hat     Published Date: Jan 09, 2014
In this Forrester report: How the infrastructure/operations (I&O) role changes in a hybrid cloud world. How they accelerate the cloud application delivery life cycle to exceed business expectations of cloud & which management capabilities must be mastered to take on the role of hybrid cloud manager.
Tags : red hat, cloudforms, cloud management, hybrid cloud, infrastructure, operations, acceleration, application delivery, life cycle, hybrid cloud manager, deployment, it management, enterprise applications
     Red Hat
By: Marketo     Published Date: Jan 08, 2014
Implementing a marketing automation solution is just the beginning to achieving marketing greatness. You need to make sure your people, process, and technology are aligned to get the fastest speed-to-results. But you can't map bad processes to new technology, you need complete user adoption in order to be successful, and you need to proactively grow your solution as marketing continues to evolve.
Tags : marketing automation, marketo, lead nurturing
     Marketo
By: CA Technologies     Published Date: Jan 08, 2014
Cloud adoption, mobility, social media and the consumerization of IT are transforming many business activities for enterprise employees, partners and customers and eliminating the traditional network perimeter. Organizations have to change how they manage security and user identities if they want to keep their data and applications secure. Read this eBook to discover how a centralized identity and access management service can help you create a new identity perimeter.
Tags : ca technologies, identity, identity management, user provisioning, security, mobile, cloud computing, social media, mobility, security management, access mangement, identity perimeter
     CA Technologies
By: CA Technologies     Published Date: Jan 08, 2014
Cloud adoption, mobility, social media and the consumerization of IT are transforming many business activities for enterprise employees, partners and customers and eliminating the traditional network perimeter. Organizations have to change how they manage security and user identities if they want to keep their data and applications secure. Read this eBook to discover how a centralized identity and access management service can help you create a new identity perimeter.
Tags : ca technologies, identity, identity management, user provisioning, security, mobile, cloud computing, social media, mobility, security management, access mangement, identity perimeter
     CA Technologies
By: CA Technologies     Published Date: Jan 08, 2014
Cloud adoption, mobility, social media and the consumerization of IT are transforming many business activities for enterprise employees, partners and customers and eliminating the traditional network perimeter. Organizations have to change how they manage security and user identities if they want to keep their data and applications secure. Read this eBook to discover how a centralized identity and access management service can help you create a new identity perimeter.
Tags : ca technologies, identity, identity management, user provisioning, security, mobile, cloud computing, social media, mobility, security management, access mangement, identity perimeter
     CA Technologies
By: Esker     Published Date: Jan 06, 2014
How to Bring Speed, Visibility and Accuracy to Every Phase of Order Processing
Tags : esker, fax and email, automation, erp systems, electronic data interchange, automation solutions, cost savings, process efficiencies, electronic processing, visibility control, order-to-cash cycle, order management
     Esker
By: Esker     Published Date: Jan 06, 2014
Business performance depends on how well a company manages its internal processes. Companies with effective business process management in place are able to analyze key performance indicators to monitor efficiency of day-to-day activities and employees against operational targets.
Tags : esker, automation, sales order processing, order-to-cash, erp systems, automated sales, streamlining, order processing, deliverware solution, automation solutions, sales order workflow, automation benefits, implementation, change management, integration, inbound customer orders
     Esker
By: Eloqua     Published Date: Dec 17, 2013
Making Momentum Happen: Change Management for Financial Services and Insurance Marketing.
Tags : oracle, financial services, marketing, insurance marketing
     Eloqua
By: Aruba Networks     Published Date: Nov 15, 2013
Whether you are an early adopter who has already started planning, or like several organizations, unsure of your next step, the following guidelines will help you prepare and plan for a successful migration to an 802.11ac WLAN.
Tags : just media, aruba networks, emea, audit infrastructure, migrate to 802.11ac, hardware replacement, gigabit wifi, optimize to leverage, wired network, traffic congestion, performance degradation, optimal performance, controller-based deployment, quadrature amplitude modulation, planning for capacity, mobile devices, complex deployments, client density, real-time location services, location accuracy
     Aruba Networks
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search White Papers      

Add White Papers

Get your white papers featured in the insideHPC White Paper Library contact: Kevin@insideHPC.com