RSS feed Get our RSS feed

News by Topic

control

Results 2076 - 2100 of 2260Sort Results By: Published Date | Title | Company Name
By: BMC ESM     Published Date: Jul 17, 2009
If your enterprise has multiple service desks in different geographies using disparate, disjointed tools and supporting diverse but possibly overlapping constituencies, you may be wasting hundreds of thousands of dollars every year. Service desk consolidation is a proven strategy for eliminating that waste.
Tags : service desk, consolidation, bmc, bmc software, itil, it infrastructure library, service, business service management
     BMC ESM
By: BMC ESM     Published Date: Jul 22, 2009
If your enterprise has multiple service desks in different geographies using disparate, disjointed tools and supporting diverse but possibly overlapping constituencies, you may be wasting hundreds of thousands of dollars every year. Service desk consolidation is a proven strategy for eliminating that waste.
Tags : service desk, consolidation, bmc, bmc software, itil, it infrastructure library, service, business service management
     BMC ESM
By: Intermec     Published Date: Sep 08, 2011
This white paper identifies best practices for workforce optimization, resource management, revenue assurance and performance control, explains how technology supports these processes, provides leveraging current mobile and wireless technology to enhance processes to improve productivity and profitability.
Tags : intermec, mobile technology, workforce optimization, data management, revenue assurance, asset tracking
     Intermec
By: Exel     Published Date: Sep 11, 2009
In challenging economic times, companies look for new ways to control costs and improve efficiency. To address these issues, manufacturers are taking a hard, strategic look at Maintenance, Repair and Operations (MRO) supply. Commonly known as "indirect materials," MRO supply includes a vast array of items that support internal operations, ranging from safety gloves and office supplies to spare parts for mission-critical industrial equipment and tooling.
Tags : mro, exel, supply, repair, operations, maitenance, mission critical, supply chain
     Exel
By: Bazaarvoice     Published Date: Nov 08, 2010
Today's UK shopper is an "empowered" consumer. This new breed of consumer is changing the rules of engagement for retailers simply by the power they possess in managing their own shopping experiences. Shoppers can easily access competing stores, brands, and products as part of their product research-whether it be online or on their mobiles.
Tags : bazaarvoice, engagement, empowerment, uk shopper, channel switch, ecommerce, mobile phones, mobile marketing
     Bazaarvoice
By: GGR Communications     Published Date: Jan 14, 2010
The paper explores the topic of remote working, the key considerations for implementing the solution and the implications from both an IT and an HR perspective.
Tags : ggr communication, remote working, data security, remote desktop control, voip, voice over ip, remote phone system, telephony
     GGR Communications
By: People for Business     Published Date: Jan 14, 2010
The paper explores the topic of remote working, the key considerations for implementing the solution and the implications from both an IT and an HR perspective.
Tags : people for business, remote working, data security, remote desktop control, voip, voice over ip, remote phone system, telephony
     People for Business
By: Symantec.cloud     Published Date: Sep 01, 2010
Part 1 describes the threat landscape as seen by SMBs, and describes the security controls that belong in Stage 1.
Tags : messagelabs us, it security, smb, risk management, protection, malware, anti-spam, anti-virus
     Symantec.cloud
By: Symantec.cloud     Published Date: Sep 01, 2010
This is the second part of a three-part white paper series. Part 2 describes how organizations can develop a security profile for themselves that will show them which of the Stage 1 controls they most need to build up and strengthen.
Tags : messagelabs us, it security, smb, security profile, anti virus, anti spam, firewalls, vulnerability
     Symantec.cloud
By: GoToMeeting     Published Date: Jul 29, 2011
Attend our Webinar to hear James Ware and Charles Grantham, creators of the Future of Work program, discuss how the nature of work has changed to include mobile and remote employees, the challenges this creates for managers and tactics to effectively manage people you can't see.
Tags : gotomeeting, citrix, meetings, online meetings, collaboration, gotomeeting, go to meeting, sharing resources
     GoToMeeting
By: e-LYNXX     Published Date: Jul 28, 2010
New methodology and technology make it possible to reduce the cost of procured print by 25% to 50%.
Tags : print procurement, cost savings, full accountability established, e-lynxx
     e-LYNXX
By: Webfishery     Published Date: Aug 03, 2010
This white paper explains how businesses can develop effective strategies to improve efficiency and reduce networking and application costs.
Tags : application management, white paper
     Webfishery
By: Gladson     Published Date: Aug 25, 2010
Informational Retailing - transformation of shoppers taking control of the way that they research, select and buy products by using a diverse array of sources to gather product information when and where they want it.
Tags : consumer packaged goods, category management, cpg manufacturers, product databases, informational retailing, e-commerce, online shopping, interactive
     Gladson
By: SAS     Published Date: Aug 03, 2016
New analytics tools and services are helping organizations extract exceptional business value from the massive volumes of available data provided by various internal and external sources. Many companies are harnessing these insights to improve operational and business processes, troubleshoot problems, identify business opportunities, and generally compete and innovate better. Now the benefits of analytics in those areas are prompting companies to look to analytics to improve information security. Enterprise security organizations are under tremendous pressure to change. Traditional perimeter-focused security controls and strategies have proved inadequate against modern, highly targeted attack campaigns.
Tags : best practices, technology, security, enterprise, analytics
     SAS
By: SAS     Published Date: Aug 03, 2016
On an average day, 78 Americans die from opioid overdose. Last year’s total was almost 30,000 deaths, roughly two-thirds involving prescription opioids (including Percocet, Vicodin, Hydrocodone, Oxycodone, Oxycontin), the rest involving heroin. The United States, with about 5 percent of the global population, consumes 80 percent of the prescription opioids. The problem affects people of all backgrounds and across the socioeconomic spectrum; the Center for Disease Control (CDC) has officially declared it an epidemic.
Tags : best practices, data, technology, analytics
     SAS
By: SAS     Published Date: Jun 27, 2019
In the quest to understand how a therapeutic intervention performs in actual use – in real medical practice outside the controlled environment of clinical trials – many life sciences organizations are stymied. They rely on one-off processes, disconnected tools, costly and redundant data stores, and ad hoc discovery methods. It’s time to standardize real-world data and analytics platforms – to establish much-needed consistency, governance, repeatability, sharing and reuse. The organizations that achieve these goals will formalize their knowledge base and make it scalable, while significantly reducing turnaround times, resources and cost. Learn the seven key components for putting that structure to real-world evidence – and four ways to take it to the next level.
Tags : 
     SAS
By: ScriptLogic     Published Date: Jan 11, 2012
Discover how the software helps achieve compliance with HIPAA standards, by giving IT administrators the power and control they need.
Tags : network administration, network management, desktop management, desktop administration, active directory management, patch management, desktop authority, active administrator
     ScriptLogic
By: e-DMZ Security LLC     Published Date: Sep 27, 2010
This white paper discusses key issues and offers innovative solutions to support granting access to production resources.
Tags : e-dmz security. emergency access, production access, access control, compliance, developer access, mission-critical, business-critical, datacenter security
     e-DMZ Security LLC
By: Okta     Published Date: May 07, 2015
Bring Your Own Device (BYOD) can be a very polarizing topic for IT. Some view it as a solution that can save money, improve end user satisfaction, and enable remote employees. For others, BYOD represents risk of data leakage, loss of control, and signing up to support an endless ecosystem of unknown devices. No matter what your opinion on BYOD is, the impact on IT policy cannot be overstated. Through 2017, Gartner reports that 90% of organizations will support some aspect of BYOD. Read this eGuide and learn how you can address several new BYOD challenges facing IT.
Tags : byod, okta, mobility, safety, dad, mobility management
     Okta
By: Okta     Published Date: Jul 01, 2015
To manage and control how the airport's employees make use of these cloud-computing services, Gatwick has turned to the cloud-based identity management service from Okta, which lets the security manager centrally manage, provision and de-provision single sign-on access to cloud services for Gatwick's staff. Watch this short video to see Gatwick's story.
Tags : 
     Okta
By: Ariba     Published Date: Mar 30, 2011
Read this e-book to learn how the Ariba Commerce Cloud can help companies transform their results by controlling and optimizing business relationships for maximum efficiency and effective financial performance.
Tags : ariba, commerce cloud, success stories
     Ariba
By: Lumension     Published Date: Mar 28, 2011
Learn three strategies to effectively take control of organizational endpoints and mitigate the rising risk from application viruses in this whitepaper.
Tags : lumension, organizational endpoint, risk mitigation, application virus, operating system, microsoft
     Lumension
By: Lumension     Published Date: Jan 22, 2013
Keeping track of 10,000+ of anything is a management nightmare. With ongoing compliance and evolving attacks against vulnerable endpoint devices, getting a handle on managing endpoints becomes more important.
Tags : endpoint management, security, compliance, patch management, file integrity monitoring, device control
     Lumension
By: QFilter.com     Published Date: Nov 23, 2010
The dangers posed by industrial Dust Explosions can affect a wide range of different industries. This article examines the topic, and gives recommendations on how to prevents such incidents from occurring.
Tags : dust explosions, dust control, dust safety, dust hazards, dust collection
     QFilter.com
Start   Previous    77 78 79 80 81 82 83 84 85 86 87 88 89 90 91    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics