change management

Results 176 - 200 of 413Sort Results By: Published Date | Title | Company Name
By: CA Technologies     Published Date: Jan 08, 2014
Cloud adoption, mobility, social media and the consumerization of IT are transforming many business activities for enterprise employees, partners and customers and eliminating the traditional network perimeter. Organizations have to change how they manage security and user identities if they want to keep their data and applications secure. Read this eBook to discover how a centralized identity and access management service can help you create a new identity perimeter.
Tags : ca technologies, identity, identity management, user provisioning, security, mobile, cloud computing, social media, mobility, security management, access mangement, identity perimeter
     CA Technologies
By: CA Technologies     Published Date: Jan 15, 2014
Cloud adoption, mobility, social media and the consumerization of IT are transforming many business activities for enterprise employees, partners and customers and eliminating the traditional network perimeter. Organizations have to change how they manage security and user identities if they want to keep their data and applications secure. Read this eBook to discover how a centralized identity and access management service can help you create a new identity perimeter.
Tags : ca technologies, identity, identity management, user provisioning, security, mobile, cloud computing, social media, mobility, security management, access mangement, identity perimeter, network provisioning, network security, access control, authentication, internet security, web service security, mobile device management
     CA Technologies
By: CA Technologies     Published Date: Jan 15, 2014
Cloud adoption, mobility, social media and the consumerization of IT are transforming many business activities for enterprise employees, partners and customers and eliminating the traditional network perimeter. Organizations have to change how they manage security and user identities if they want to keep their data and applications secure. Read this eBook to discover how a centralized identity and access management service can help you create a new identity perimeter.
Tags : ca technologies, identity, identity management, user provisioning, security, mobile, cloud computing, social media, mobility, security management, access mangement, identity perimeter, network provisioning, network security, access control, authentication, internet security, web service security, mobile device management
     CA Technologies
By: Kaseya     Published Date: Feb 16, 2011
The goal for this suite is to give you ITIL in a box. This release includes Incident Management, Service Request Management, Problem Management and Change Management.
Tags : kaseya, itil, incident management, service request management, problem management, change management, service desk
     Kaseya
By: HP     Published Date: Aug 26, 2014
Get safe, secure always-on access to email, calendar, and contacts almost anywhere, from almost any device. HP Flex-Bundles for Microsoft® Exchange Server 2013 are Microsoft Exchange ready, affordable business email packages that combine the world’s most intelligent servers—HP ProLiant Gen8 servers—with high-performance Intel® processors, HP software, and Microsoft Windows® operating system software to get you started—and keep you moving—on your IT infrastructure journey. HP ServeIT Flex-Bundles, built upon the HP ProLiant ML350p Gen8 server and Microsoft® Exchange Server 2013, provide pre-defined configurations that can improve your productivity by enhancing accessibility to email, calendars, and contacts while simplifying IT management. Learn more.
Tags : productivity, secure, safe, servers, processor, email, calendar, solution, improve, exchange, accessibility, management, system, contacts, device, performance, infrastructure, data management
     HP
By: ITinvolve     Published Date: Apr 16, 2013
What if you could quickly and easily review the potential impacts of making a change in your environment and identify each and every stakeholder who should weigh in on the risk of the change before it is approved? With social knowledge collaboration you can. Read this use case document to explore a real-world example of how social knowledge collaboration improves the accuracy and speed of change planning.
Tags : knowledge collaboration, social knowledge collaboration, social knowledge, collaboration, stakeholder, itinvolve
     ITinvolve
By: Solidcore     Published Date: Jan 07, 2008
This paper lays out the challenges with complying with SOX and suggests a radical solution: build a self-service, automated IT control framework in which all the information required to verify compliance is available in a single reporting system.
Tags : compliance, sox, sox compliance, sarbox, sarbox compliance, audit, self audit, self auditing, change management, it controls, solidcore
     Solidcore
By: Bazaarvoice     Published Date: Nov 05, 2014
It’s no longer enough to think of consumers as online vs. in-store. The mobile shopper is neither and both of these, becoming the norm rather than the exception. “7 Ways the Mobile Consumer Changes Everything” reveals new research.
Tags : bazaarvoice, mobile consumer, consumer changes, infographic, mobile use, social, mobile conversation, mobile shoppers, consumer feedback, change management
     Bazaarvoice
By: Success Factors     Published Date: Jul 02, 2013
Navigate and support major changes such as growth, expansion, efficiency and innovation by building the right talent management road map.
Tags : infographic, successfactors, talent management, road map, business
     Success Factors
By: IBM     Published Date: Mar 17, 2009
This Webcast is brought to you by Manufacturing Business Technology, PTC, IBM. It addresses what Companies recognize as the market trends that are driving the need for Product Lifecycle Management (PLM), and how PLM is delivered with alternative business scenarios. Key speakers are Jim Brown, President and analyst of Tech-Clarity Inc, Tom Shoemaker, VP of Solutions Marketing for PTC, and Naseem Rao, Global Solutions Executive for IBM.
Tags : ibm, telelogic, core business values, business continuity, change and configuration management, best practices, plm, market trends, security, enterprise applications
     IBM
By: CA Technologies     Published Date: Nov 02, 2016
Keeping up with the new pace of change requires building agility into your business to adapt to change faster, while carefully overseeing your investments. The integrated solution of CA Project & Portfolio Management (CA PPM) and CA Agile Central (formerly Rally) helps you effectively balance agility and governance by connecting the work of agile teams to your enterprise portfolio. Supporting an evolutionary approach to adopting agile, the solution lets you continue using traditional methods, while growing agile adoption to deliver on portfolio investments faster—with higher quality and predictable business results. A holistic view across all projects helps portfolio managers optimize budgets and resources for maximum return on investment.
Tags : 
     CA Technologies
By: Watlow     Published Date: Jun 23, 2008
Ethernet communications is rapidly gaining popularity in industrial applications because it enables the real-time exchange of information between processing equipment and companies' Ethernet-based management systems. The emergence of protocols such as EtherNet/IP enables engineers to attain the advantages of using Ethernet in industrial applications.
Tags : ethernet, engineering, productivity, watlow
     Watlow
By: Box     Published Date: Jun 22, 2018
There’s more to your content than you might think. Beyond the differences of enterprise vs. web vs. cloud content management, new changes in intelligent machine-to-machine apps are reinventing the content management market. In this expert e-guide, we explore a flexible, API-led approach to cloud-based content management and collaboration. Learn about a platform designed to enable you to: • Power content with machine learning and metadata • Drive intelligent capabilities like smart search • Modernize content-based processes • And more
Tags : 
     Box
By: Lumension     Published Date: Jun 03, 2015
The volume and sophistication of malware is skyrocketing, and traditional anti-virus approaches are struggling to keep up. It’s time to rethink how we protect our endpoints. Instead of trying to build a better anti-virus “mousetrap,” without any shift in the underlying management model for vetting change in endpoint environments, security professionals should investigate more innovative approaches to endpoint security that can automate trusted change policies. This paper discusses an innovative approach to application whitelisting – one that integrates application control, anti-virus, patch management and a trusted change management engine into one unified solution – to improve endpoint security and provide the necessary flexibility to optimize IT operations and user productivity.
Tags : anti-virus, security, application, management, patch
     Lumension
By: Lumension     Published Date: Jun 05, 2015
The volume and sophistication of malware is skyrocketing, and traditional anti-virus approaches are struggling to keep up. It’s time to rethink how we protect our endpoints. Instead of trying to build a better anti-virus “mousetrap,” without any shift in the underlying management model for vetting change in endpoint environments, security professionals should investigate more innovative approaches to endpoint security that can automate trusted change policies. This paper discusses an innovative approach to application whitelisting – one that integrates application control, anti-virus, patch management and a trusted change management engine into one unified solution – to improve endpoint security and provide the necessary flexibility to optimize IT operations and user productivity.
Tags : anti-virus, security, application, management, patch, anti virus, application security, patch management, database development
     Lumension
By: BlackBerry     Published Date: Apr 13, 2010
In this webcast, Mike Kirkup tells about BlackBerry application platform which simplifies the development, deployment and management of wireless applications. Leverages the core strengths of the BlackBerry solution to mobilize additional business processes and applications.
Tags : blackberry, microsoft exchange, mobile device management, mobile device management software, mobile workers, remote computing, wireless applications software, wireless computing
     BlackBerry
By: BlackBerry     Published Date: Apr 13, 2010
The Blackberry Java Development Environment (BlackBerry JDE) is a fully integrated development environment and simulation tool for building Java Micro Edition (Java MET) applications for Java-based Blackberry smartphones.
Tags : blackberry, java, jde, microsoft exchange, mobile device management, mobile device management software, mobile workers, remote computing, wireless applications software, wireless computing
     BlackBerry
By: BlackBerry     Published Date: Apr 13, 2010
n this webcast you will learn that Global Positioning System (GPS) is a series of 24 geosynchronous satellites that continually transmits position information.
Tags : blackberry, gps, tracking, microsoft exchange, mobile device management, mobile device management software, mobile workers, remote computing, wireless applications software, wireless computing
     BlackBerry
By: ServiceNow     Published Date: Jan 17, 2017
The End of No. The Beginning of Now. Your IT service desk is swamped from the moment work begins. It’s unclear how to gain control without the right tracking, prioritization and reporting. But with the right guidance, you can improve IT service delivery and demonstrate how IT is performing to support the business. This eBook, the first in a series that addresses key aspects of IT Service Management, provides best practices on how to: Accelerate incident resolution with automation and prioritization Improve change management processes with better controls and visibility Optimize reporting for setting goals, aligning priorities, demonstrating results
Tags : itsm, it service management, reporting, service, management
     ServiceNow
By: ServiceNow     Published Date: Jan 17, 2017
Provide better IT service delivery, more consistently, and with less effort This eBook, “Define Your Services for Fast and Accurate Service Delivery,“ shows you: A simple plan for defining and managing your services and building your single system of record in a CMDB Best practices for incident, change, problem and asset management, reporting, and more How to prevent unexpected downtime creating a comprehensive, connected view of business services and IT Infrastructure
Tags : it management, it automation, it ticketing, help desk, service desk, itsm, it service management, management, service, infrastructure
     ServiceNow
By: Tripwire     Published Date: Jul 05, 2007
Learn how to align PCI compliance with business processes for a more streamlined and reliable IT infrastructure with this whitepaper from the IT Compliance Institute.
Tags : compliance, pci, payment card, credit card, customer privacy, consumer privacy, consumer data, customer data, pci dss, data protection, database security, authentication, monitoring, change management, tripwire
     Tripwire
By: ServiceNow     Published Date: Jan 13, 2017
The End of Now. The Beginning of Now. Your IT service desk is swamped from the moment work begins. It’s unclear how to gain control without the right tracking, prioritization and reporting. But with the right guidance, you can improve IT service delivery and demonstrate how IT is performing to support the business. This eBook, the first in a series that addresses key aspects of IT Service Management, provides best practices on how to: Accelerate incident resolution with automation and prioritization Improve change management processes with better controls and visibility Optimize reporting for setting goals, aligning priorities, demonstrating results
Tags : 
     ServiceNow
By: Tideway Systems     Published Date: Dec 11, 2007
IT service providers need to offer services that deliver new business opportunities whilst increasing levels of availability, controlling risks and reducing costs. This paper provides you with practical guidance based on the practices in ITIL® V3 that will help you manage application and infrastructure changes and configurations.
Tags : service management, itil, change management, configuration management, knowledge management, service strategy, service design, tideway, tideway systems
     Tideway Systems
By: HP     Published Date: Jul 29, 2008
This white paper describes critical steps IT executives must take to prepare for change and manage an ITSM implementation to maximize its value and ensure that it achieves the full transformation effect it is capable of delivering. IT Service Management (ITSM) is a proven and effective framework for helping IT organizations become more adaptive, flexible, cost effective, and service oriented.
Tags : itsm, it service management, service management, itil, mission critical, change management, it management
     HP
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search White Papers      

Add White Papers

Get your white papers featured in the insideHPC White Paper Library contact: Kevin@insideHPC.com