RSS feed Get our RSS feed

News by Topic

management applications

Results 451 - 475 of 515Sort Results By: Published Date | Title | Company Name
By: Sybase     Published Date: Aug 21, 2009
This paper provides guidance on how companies should rethink their existing management and security strategy to effectively secure mobile solutions in the workforce, over a wide array of devices, connections and applications. It details why mobile security must be included as a mission critical component of any enterprise strategy and implemented on a pro-active basis before any major security breach has the opportunity to negatively affect the enterprise.
Tags : security management, mobile device, mobile security, wireless security, secure laptop, secure pda, secure blackberry, network security
     Sybase
By: Winward     Published Date: Aug 21, 2009
To succeed in today's business environment, the enterprise must manage the effects of three realities: the recent, massive investment in technology has significantly increased IT complexity; the Internet has altered customers' expectations of availability, cost, and service; and the new economic climate highlights the need to leverage existing assets and improve the return on investment for new initiatives.
Tags : business management, cost control, it spending, analytical applications, report design, it investment, technology spending, roi
     Winward
By: SoftLanding Systems     Published Date: Dec 04, 2006
This white paper is packed full of practical advice on how to win management's support for improving your software management infrastructure.
Tags : software management, development, buyin, buy-in, software management system, sms, applications management, softlanding
     SoftLanding Systems
By: SOCRATIQ Intelligence Systems     Published Date: Feb 14, 2007
This White Paper discusses how intelligence agency management can apply machine translation as a much-needed support tool that can make linguists and intelligence analysts more effective in producing meaningful and actionable results.
Tags : translation, terrorists, homeland security, language, socratiq, voice recognition, business management, cia
     SOCRATIQ Intelligence Systems
By: GAO RFID Inc.     Published Date: Feb 28, 2007
GAO RFID has launched an intelligent parking control management system, integrating RFID technology, automatic control technology and applications software. Learn how the implementation of RFID technology can improve conditions and potentially increase revenues for your parking facility.
Tags : rfid, wireless hardware, wireless infrastructure, rfid tags, parking, transportation, gao, gao group
     GAO RFID Inc.
By: WorldTelemetry, Inc.     Published Date: Mar 26, 2007
ROI is based on the analysis of differential cash flows. In the case of remote data acquisition and aggregation systems for fuel tank operators, it is based on calculating the cost of acquiring and aggregating the data manually and compared to the total cost of owning, maintaining and operating an automated data acquisition and aggregation system.
Tags : business analytics, business intelligence, bi software, enterprise software, business management, business metrics, analyatical applications, roi
     WorldTelemetry, Inc.
By: Distributive Management     Published Date: Jun 19, 2007
DataDrill EXPRESS is known for being the most capable web-based performance dashboard tool available for software and IT projects and organizations, automating every aspect of performance measurement.
Tags : datadrill, distributive management, brochure, performance management, data collection, it management, project management, analytical applications
     Distributive Management
By: ProofSpace     Published Date: Aug 07, 2007
This white paper presents a solution framework for Life Science Organizations that want to implement enterprise digital trust management to protect their electronic value chain.
Tags : proofspace, proofmark, signing key vulnerability, trustworthy time, authenticated time stamps, time existence of data, electronic postmark, time stamp
     ProofSpace
By: Ecora Software     Published Date: Aug 15, 2007
Learn how to adhere to the PCI security standard by automating regulatory compliance and best practices reporting typically used to identify and validate IT configuration changes throughout operating systems, database management systems, applications and network devices.
Tags : pci, pci dss, pcidss, payment card, credit card, pci compliant, compliance, financial
     Ecora Software
By: Ecora Software     Published Date: Aug 15, 2007
Achieve and Maintain Compliance with PCI Data Security Standard – Part 4. Deep dive into PCI DSS requirements 10-12. Learn how to adhere to the PCI security standard by automating regulatory compliance and best practices reporting typically used to identify and validate IT configuration changes throughout operating systems, database management systems, applications and network devices.
Tags : pci, pci dss, pcidss, payment card, credit card, pci compliant, compliance, financial
     Ecora Software
By: Ecora Software     Published Date: Aug 15, 2007
Deep dive into PCI DSS requirements 5-9. Learn how to adhere to the PCI security standard by automating regulatory compliance and best practices reporting typically used to identify and validate IT configuration changes throughout operating systems, database management systems, applications and network devices.
Tags : pci, pci dss, pcidss, payment card, credit card, pci compliant, compliance, financial
     Ecora Software
By: Ecora Software     Published Date: Aug 16, 2007
Deep dive into the first 4 PCI DSS requirements. Learn how to adhere to the PCI security standard by automating regulatory compliance and best practices reporting typically used to identify and validate IT configuration changes throughout operating systems, database management systems, applications and network devices.
Tags : pci, pci dss, pcidss, payment card, credit card, pci compliant, compliance, financial
     Ecora Software
By: Ultimus     Published Date: Aug 16, 2007
By helping companies model, automate, manage, and optimize their business processes, BPM provides the framework for sustainable competitive advantage.
Tags : ultimus, bpm, business process management, automation, bpa, productivity, bpm basics, profitability
     Ultimus
By: Ultimus     Published Date: Aug 16, 2007
The challenge for BPM today is not to simply “automate” processes, but to deliver the human-centric capabilities people need in order to fully embrace the new, more efficient work processes. When BPM systems deliver on these needs BPM close the gap between its high potential and its relatively modest adoption to-date.
Tags : ultimus, bpm, business process management, automation, bpa, productivity, bpm basics, profitability
     Ultimus
By: Ultimus     Published Date: Aug 16, 2007
With the largest global installed base of pure-play BPM solutions, the Ultimus BPM Suite exemplifies the role of managing OSAP processes in the business process ecosystem. Customers worldwide use it to extend, maximize and complement their investments in SAP or other enterprise applications.
Tags : ultimus, bpm, business process management, automation, bpa, productivity, bpm basics, profitability
     Ultimus
By: Ultimus     Published Date: Aug 16, 2007
Ultimus has been build from the ground-up with scalability in mind. Ultimus’ component-based, database centric architecture position it perfectly as a solution that allows you to effortlessly scale your enterprise business processes.
Tags : ultimus, bpm, business process management, automation, bpa, productivity, bpm basics, profitability
     Ultimus
By: Ultimus     Published Date: Aug 16, 2007
Windows Workflow Foundation (WF) and the Ultimus BPM Suite compliment each other. WF can be used to extend the capabilities of Ultimus by performing specialized services. The Ultimus BPM Suite can be invoked by WF activities to perform workflows that are not simple and require extensive and robust human-centric capabilities.
Tags : ultimus, bpm, business process management, automation, bpa, productivity, bpm basics, profitability
     Ultimus
By: Watlow     Published Date: Jun 23, 2008
Ethernet communications is rapidly gaining popularity in industrial applications because it enables the real-time exchange of information between processing equipment and companies' Ethernet-based management systems. The emergence of protocols such as EtherNet/IP enables engineers to attain the advantages of using Ethernet in industrial applications.
Tags : ethernet, engineering, productivity, watlow
     Watlow
By: Tail-f Systems     Published Date: Sep 16, 2008
The NETCONF protocol is a modern building block for device management automation, offering a unified approach to network configuration, rather than a device-specific methodology. To equipment vendors, NETCONF is a way to standardize the management interface of network elements. To service providers, NETCONF is a way to optimize the administrative workflow, by moving management intelligence out of the device under management, and consolidating this management into higher-level applications.
Tags : netconf, netconf standard, device management automation, network standard, ietf standard, tail-f, tailf
     Tail-f Systems
By: Tail-f Systems     Published Date: Oct 01, 2008
Network management systems must adapt to meet the requirements of next generation networks.  For example, a user interfaces may need to be refreshed with a state-of-the-art Web interface or support for the NETCONF protocol may be required to help customers deploy scalable networks. Adding functionality and integrating with existing applications and data stores has multiple trade-offs in terms of development time and system efficacy.
Tags : network management, next-generation networks, netconf, legacy networks, network management systems, tail f, tail-f, tailf
     Tail-f Systems
By: HP - Enterprise     Published Date: Oct 16, 2008
As the military and US government rely more heavily on custom-built applications for communications and management, they also become more vulnerable to cyber attacks. Worse, according to the Dept. of Homeland Security, the number of attacks on custom-built applications is doubling every year. Learn about critical threats, methods that military and civilian agencies can use to deal with cyber attacks and technologies that improve security for custom-built applications.
Tags : security, application security, audit, risk, vulnerabilities, fortify, fortify software, hackers
     HP - Enterprise
By: HP - Enterprise     Published Date: Jun 04, 2013
In the world of storage management, something looms large on the horizon: the cloud. The cloud impacts storage strategies whether you are moving your storage to the cloud, managing the on-premises storage of private cloud applications, or a combination. Many organizations already take advantage of cloud storage, but an even greater shift is on the way. In a recent survey, respondents forecasted increases in cloud storage as large as 75 percent.
Tags : cloud, storage growth, storage resource management, solutions
     HP - Enterprise
By: Mimosa Systems     Published Date: Jan 14, 2009
Email archiving is emerging as a critical new IT application for managing email. For legal discovery, storage management, and regulatory compliance, email archiving provides important benefits that cannot be achieved with native email applications. The purpose of this “Email Archiving 101” paper is to provide a basic introduction to email archiving and explain how it benefits management of the email application server. The leading enterprise email application is Microsoft® Exchange Server, and this paper is geared toward this application; however, the principles discussed apply to all messaging applications.
Tags : mimosa systems, email archiving, mimosa nearpoint, microsoft exchange server, email applications, enterprise email application
     Mimosa Systems
By: Lionbridge     Published Date: Nov 19, 2009
This paper will interest ISV product managers and engineers of educational software products, chief learning officers and chief technology officers of corporate universities, along with information technology personnel at the community and state college level, including developers of custom applications & application services.
Tags : learning management systems, srcom 2004, saas, cms, ldap-based sso, isv product managers, educational software products, custom applications
     Lionbridge
By: Gladson     Published Date: Aug 25, 2010
Informational Retailing - transformation of shoppers taking control of the way that they research, select and buy products by using a diverse array of sources to gather product information when and where they want it.
Tags : consumer packaged goods, category management, cpg manufacturers, product databases, informational retailing, e-commerce, online shopping, interactive
     Gladson
Start   Previous    7 8 9 10 11 12 13 14 15 16 17 18 19 20 21    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics