RSS feed Get our RSS feed

News by Topic

softwar

Results 51 - 75 of 5299Sort Results By: Published Date | Title | Company Name
By: Absolute Software     Published Date: Feb 14, 2012
Dysart Unified School District (DUSD) is Arizona's fastest-growing school district. Despite the district's extremely rapid expansion, it remains focused on its mission of "Increasing in Excellence" - or, preparing students for life in the new century.
Tags : laptop learning, dysart, dusd, arizona, students
     Absolute Software
By: Absolute Software     Published Date: Feb 14, 2012
Leonard Niebo, Director of IT for Brick Township Public Schools leads a discussion on overcoming the roadblocks of a manual auditing process, specialized computing needs, and incidents of loss and theft.
Tags : school, education, budget, diversity, managing diversity, auditing
     Absolute Software
By: Absolute Software     Published Date: Feb 14, 2012
Working closely with Absolute Software Chicago Public Schools is managing over 100,000 PCs, Macs, and iOS 4 devices and have recovered over 350 stolen computers allowing them to invest in the future (versus replacement computers).
Tags : school, education, budget, diversity, managing diversity, auditing
     Absolute Software
By: Absolute Software     Published Date: Feb 14, 2012
Alice Owen, Executive Director of Technology for Irving Independent School District, discusses how she effectively secures and tracks her district's 12,000 computers. Leonard Niebo, Director of IT for Brick Township Public Schools leads our discussion on overcoming the roadblocks of a manual auditing process, specialized computing needs and incidents of loss and theft.
Tags : securing, tracking, laptops, irving, security
     Absolute Software
By: Absolute Software     Published Date: Dec 20, 2012
This IDC document presents highlights from the Adopting Mobility in the Enterprise Executive Roundtable held in New York City.
Tags : security, mobile, cloud, tablet, consumerization
     Absolute Software
By: Absolute Software     Published Date: Dec 20, 2012
Three Simple Steps to Legally Secure and Manage Employee-owned Devices Within a Corporate Environment
Tags : byod, policy, guide, mobile, security, cloud, apps, administration
     Absolute Software
By: Absolute Software     Published Date: Dec 20, 2012
Aberdeen's analysis confirms that the case for convergence between endpoint management is still very strong in the mobile, Bring Your Own Device era.
Tags : byod, device, security, enterprise, mobility, policy
     Absolute Software
By: Absolute Software     Published Date: Dec 20, 2012
David Johnson, Senior Analyst at Forrester has a look forward to the reality of supporting Apple devices in a post-BYOD world.
Tags : byod, network security, mobile, security, policy, apple, end user, device
     Absolute Software
By: Absolute Software     Published Date: Dec 20, 2012
In the last four years, the number of Mac computers at Under Armour has quadrupled.
Tags : apple, asset management, end users, security
     Absolute Software
By: Absolute Software     Published Date: Dec 20, 2012
Learn how Under Armour performs patch management, provides Mac and iOS device support and creates reports for business critical data.
Tags : apple, devices, patch management, ios, support, end user, security
     Absolute Software
By: Absolute Software     Published Date: Jan 02, 2013
The growing use of tablets, smartphones, and ultrabooks makes enpoint governance, risk management, and compliance (GRC) more challenging.
Tags : absolute software, grc strategy, adjust your endpoint, enpoint governance, security
     Absolute Software
By: Absolute Software     Published Date: Jan 10, 2013
Mobile diversity and employee demand drive growth in Byod programs
Tags : 
     Absolute Software
By: Absolute Software     Published Date: Apr 11, 2013
There has yet to be a demonstrated case where an organization has reduced ITSSM spending over a five-year period solely on the basis of licensing in the SaaS model versus the perpetual model.
Tags : absolute software, saas, ssm, saas model, cost savings, perpetual model, itssm
     Absolute Software
By: Absolute Software     Published Date: May 31, 2016
The US healthcare industry has historically lagged behind others in the maturity of security capabilities, only recently catching up on data security and privacy in response to HIPAA. But there is a wide range of other mounting risks unique to healthcare that S&R pros in healthcare canít ignore ó greater regulatory pressure, increasing targeted attacks, the frightening uncertainty of IoT security, and global economic pressures. This report outlines the most important security capabilities for security leaders in this sector to implement in the face of these challenges.
Tags : healthcare, security capabilities, data security, best practices, security
     Absolute Software
By: Absolute Software     Published Date: May 31, 2016
With companies embracing mobility to maintain competitive advantage in the digital era, information security threats have increased exponentially. Userfriendly technologies such as mobile devices, mobile apps, and cloud storage are often hacker-friendly too, creating opportunities for cybercriminals to covertly infiltrate company data. This opens the door to data loss, reputational damage, loss of proprietary information Ė not to mention the associated regulatory penalties and potential legal fees. IT bears the brunt of responsibility for information security, yet according to Forrester, internal incidents top the list of security breach causes in 2014.
Tags : mobility, competitive advantage, best practices, mobile devices, mobile applications
     Absolute Software
By: Absolute Software     Published Date: May 31, 2016
The OCR conducts HIPAA audits of covered entities and their business associates and subcontractors. If HIPAA violations are discovered during these audits, the OCR will implement significant penalties. Additionally, since OCR is posting the details of every breach affecting 500 or more individuals on a public website1 , the organizations involved have become susceptible to class-action lawsuits.
Tags : best practices, business analytics, productivity
     Absolute Software
By: Absolute Software     Published Date: May 31, 2016
IT leaders today are reinventing their infrastructure to support a mobile workforce and a complex array of connected devices. Against this backdrop of mobility and connectivity, Healthcare IT is tasked with meeting compliance challenges in an intricate and transformational regulatory environment. With a host of new data protection regulations and increasingly high settlement fees for data breaches, data security has never been more important to Healthcare organizations
Tags : mobility, mobile computing, best practices, data security
     Absolute Software
By: Absolute Software     Published Date: May 31, 2016
This is arguably the most unsettling time in history to be a CIO. The IT landscape is shifting at a rapid pace with advances in social media, mobility and big data. The proliferation of advanced robotics is just around the corner and the Internet of Things is connecting even the most mundane objects to the internetóand probably the corporate network. Back in the 1990s, most computer hackers were interested in gaining access to networks purely for kudos among their peers. Today hackers have monetized their skills and make their living from finding vulnerabilities in IT networks.
Tags : data, big data, security, corporate network, mobility
     Absolute Software
By: Absolute Software     Published Date: May 31, 2016
The release of a new Microsoft operating system is always an important event for IT departments, and Windows 10 is no exception. IT organizations and end users have been looking forward to a wide range of new features in Windows 10, with interest particularly high as users of Windows 7 and 8 can upgrade for free.
Tags : data, security, mobility, mobile computing, best practices
     Absolute Software
By: Absolute Software     Published Date: May 14, 2014
Three simple steps to legally secure and manage employee-owned devices within a corporate environment
Tags : byod, workforce mobility, enpoint protection, mobile devices, absolute software
     Absolute Software
By: Absolute Software     Published Date: May 14, 2014
Based on the reality of the changing workforce, Absolute Software provides the top four reasons IT should re-evaluate their endpoint protection strategies.
Tags : endpoint protection stategy, byod, workforce mobility, absolute software, own device
     Absolute Software
By: Accelerance     Published Date: Feb 01, 2008
Companies exploring offshore software development often find an overwhelming array of options. For example, is India the best choice? What about China, Russia or Brazil? Time, distance and language barriers also make it difficult to assess the quality of offshore developers. How can businesses reduce the risks of offshoring?
Tags : offshoring, vendor selection, offshore, outsource, outsourcing, india, development, developer
     Accelerance
By: Accelerance     Published Date: Feb 01, 2008
Despite the fact that Software Executives are pressured to do more with less and cut costs to the bone, many see offshoring as a "threat."  They know they need to go offshore - but where? And with who? What they want is an easier, better, more effective and safer way to use offshore programming resources.
Tags : it management, software development, development, developer, programmer, programming, developing, offshoring
     Accelerance
By: Accusytem     Published Date: Apr 13, 2011
Banks that have successfully implemented document imaging applications, developed comprehensive polices and diligently follow consistent procedures reap the benefits of efficiencies in loan portfolio management (even more efficiencies if the bank does enterprise-wide imaging), increased productivity, diminished loan policy and document exceptions and streamlined audit and examination processes.
Tags : document imaging, banking software system, bank imaging, document management, bank document management
     Accusytem
By: Acquia     Published Date: Sep 13, 2011
Read this paper from Acquia and learn about the underlying drivers for enterprise social software; key requirements and how Drupal meets those; how open source development outpaces proprietary alternatives; examples of communities built with Drupal and Acquia.
Tags : acquia, technology, social publishing, drupal commons, social communities, business software solution, social web, website development
     Acquia
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics