RSS feed Get our RSS feed

News by Topic

it manager

Results 326 - 350 of 947Sort Results By: Published Date | Title | Company Name
By: Entrust Datacard     Published Date: Dec 08, 2015
This whitepaper reveals how Entrust Authority Security Manager helps organizations easily manage their security infrastructure, and allows easy management of the digital keys and certificates that secure user and device identities.
Tags : entrust authority security manager, security, security infrastructure, digital, encryption, security management, digital certificates, digital signatures
     Entrust Datacard
By: CCSS     Published Date: May 01, 2008
IT Managers are not in the business of luck. They need to prepare for every disaster scenario, every contingency and ensure that even when every object, job and process is running 100% perfectly on the system, some other unforeseen network element doesn't swoop in and ruin all their efforts, just because it resides outside the parameters of the System i. After all, in a situation like this, people remember the one thing that went wrong – not the millions of things that went right – it's unfortunate, but that's life.
Tags : network, network management, network monitoring, ccss
     CCSS
By: NetApp     Published Date: Dec 12, 2013
IT managers have indicated their two most significant challenges associated with managing unstructured data at multiple locations were keeping pace with data growth and improving data protection. Learn how the NetApp Distributed Content Repository provides advanced data protection and system recovery capabilities that can enable multiple data centers and remote offices to maintain access to data through hardware and software faults.
Tags : netapp, lab validation, distibuted content repositor, big content scalability, enterprise reliability, intelligent object management
     NetApp
By: Hewlett Packard Enterprise     Published Date: Mar 29, 2017
Join this dynamic LinkedIn group to be part of the cyber-security education conversation to gain an understanding for the best practices to improve security. Learn why HP says 64% of IT managers believe their printers are infected with malware, but only 45% of those IT professionals consider printers to be a medium or high risk vulnerability. The first responsibility of IT professionals is to make sure their company’s information is secure and today any device can become an access point threat. Printers and MFPs can be the Achilles’ Heel of any cyber-security plan and are a goldmine for hackers looking to steal pertinent information. Join the conversation and learn what’s necessary to protect your company.
Tags : hewlett packard, printer security, information technology
     Hewlett Packard Enterprise
By: Brocade     Published Date: Sep 07, 2010
There is a significant problem with cloud offerings, namely that they present new challenges to IT managers, both in general security within their own enterprises and in assessing the risk profiles inherent in each cloud offering they might source.
Tags : brocade, cloud computing, security, computerworld uk
     Brocade
By: IBM     Published Date: Jun 24, 2009
Improving access to core applications and data is just one of many mandates facing IT, along with improving collaboration, reducing administration costs and improving performance. Fortunately, shops running System z have an advantage. You can integrate and enhance your System z assets faster when you use the version 6.1 update to IBM WebSphere Portal on z/OS. Use it to quickly deploy business applications across the enterprise, reduce costs and increase flexibility with workloads centralized on System z.
Tags : websphere, portal, version 6.1, web 2.0, web interfaces, intuitive applications, enhanced web 2.0, ibm
     IBM
By: HERE Technologies     Published Date: Sep 26, 2019
Despite the greater frequency of extreme weather events occurring around the globe, freight still has to be delivered on time and on a year-round basis. Truck drivers often find themselves driving through rain, snow, sleet, hail, fog, ice, thunderstorms, tornadoes and high winds. While drivers aren't generally expected to stick to pre-planned routes in extreme weather, fleet managers don’t really have the capacity to outline every possible alternate route in anticipation of a future hazardous weather scenario. Data-driven route planning saves fuel, prevents accidents and improves ETAs, which is why many logistics companies are turning to advanced supply chain optimization solutions with real-time weather alerts and rerouting functionalities. Today, tech-savvy fleet managers are looking for exactly this type of tech innovations to provide them with a sharp competitive edge in an already crowded industry such as long-haul logistics. As one of the world's leading location platforms, HER
Tags : 
     HERE Technologies
By: CA Technologies EMEA     Published Date: Oct 23, 2017
C’est l’un des changements majeurs de ces 20 dernières années au niveau de la protection de la vie privée dans le domaine numérique. Le Règlement général de l’UE sur la protection des données (RGPD) introduira, en mai 2018, des amendes d’un montant pouvant atteindre jusqu’à 20 millions d’euros en cas de non-conformité.
Tags : rgpd, gdpr, conformité, compliance, data testing, test data management, ca test data manager
     CA Technologies EMEA
By: IBM     Published Date: Feb 24, 2015
This paper asks the key questions that IT, legal, records, compliance officers and corporate managers should consider when contemplating an information lifecycle governance solution, and why these elements are critical in addressing e-discovery challenges.
Tags : ibm, lifecycle governance, e-discovery, e-discovery challenges, ilg solutions
     IBM
By: Infoblox     Published Date: Nov 07, 2013
Network management is becoming increasingly difficult, costly and time-consuming. Legacy manual procedures cannot keep up with today’s complex networks. Read this white paper to learn why implementing network automation is critical to managing your network
Tags : infoblox netmri, infoblox_switch_port_manager, infoblox_automation_change_manager, infoblox_spm, infoblox_acm, network_automation, netmri, spm
     Infoblox
By: Lookout     Published Date: Mar 28, 2017
In today’s Bring Your Own Device (BYOD) world more than a few IT managers have lost sleep over the thought of an employee device, loaded with sensitive company data, falling into the wrong hands. Lookout commissioned Forrester Consulting to conduct a national survey of IT managers in the Fall of 2013 that uncovered substantial security concerns related to mobile devices, especially around malware and data loss. Ultimately, the survey revealed that IT managers do not believe existing security solutions can adequately address the mobile security challenges faced by businesses today.
Tags : insights, mobile, security, byod, lookout
     Lookout
By: Lookout     Published Date: Aug 30, 2017
In today’s Bring Your Own Device (BYOD) world more than a few IT managers have lost sleep over the thought of an employee device, loaded with sensitive company data, falling into the wrong hands. Lookout commissioned Forrester Consulting to conduct a national survey of IT managers in the Fall of 2013 that uncovered substantial security concerns related to mobile devices, especially around malware and data loss. Ultimately, the survey revealed that IT managers do not believe existing security solutions can adequately address the mobile security challenges faced by businesses today.
Tags : byod, malware threats mobile security, data protection, mobile security solutions
     Lookout
By: Citrix     Published Date: Jun 10, 2009
This paper explores common challenges associated with server virtualization deployments and the ways Citrix Essentials for Hyper-V together with Windows Server 2008 Hyper-V and Microsoft System Center Virtual Machine Manager can help organizations maximize the value of server virtualization.
Tags : citrix, virtualization, tco, virtual machine, total cost of ownership, hyper-v, microsoft, datacenter
     Citrix
By: Success Factors     Published Date: Aug 19, 2014
With news of economic recovery reaching employees’ ears, compensation managers will have to face the challenge of creating compelling compensation solutions through proactively benchmarking, updating policies with the current state of the business, avoiding inefficient data analysis methods, visualizing reports and trends, and responding to the business
Tags : success factors, engage candidates, hiring process, candidate advocates, recruiting strategies, talent, hiring managers
     Success Factors
By: Kronos     Published Date: Sep 24, 2018
This is the second in a series of three white papers that discuss proven strategies and best practices for optimizing three key elements of success — People, Process, and Technology — to address critical challenges and drive competitive advantage in today’s logistics industry. Keep reading to gain valuable insights into the “Process” trends and issues that are top of mind for managers across the logistics sector.
Tags : 
     Kronos
By: insightsoftware     Published Date: Oct 19, 2018
Never has so much pressure fallen on the shoulders of finance to be timely and credible with the reporting of financial results. Ninety percent of financial executives report feeling pressured to close the books faster, according to a recent Adra Match study. This burden is driven by the needs of managers who have less time than ever before to make important tactical decisions. To download this White Paper, please complete the following form.
Tags : 
     insightsoftware
By: Success Factors     Published Date: Aug 20, 2013
SuccessFactors optimizes your recruiting process, enabling recruiters and hiring managers to interview and collaborate more efficiently. Follow these five recommendations to increase the efficiency and effectiveness of recruiting management in your small to medium-size business.
Tags : talent management, recruiting, recruiting process, recruiting management
     Success Factors
By: Pure Storage     Published Date: Nov 02, 2017
FlashBlade fabric modules implement a unified network that connects all blades to each other and to the data center network. With full connectivity, all blades can serve as client connection endpoints, as authorities that process client requests, and as storage managers that transfer data to and from flash and NVRAM.
Tags : storage systems, network, hardware components, architectural, storage software, integrated software
     Pure Storage
By: HotSchedules     Published Date: Sep 11, 2018
The cost of labor can be managed effectively when restaurateurs are equipped with the right training, tools and processes. Traditional methods for capturing critical forecasting data and formulating labor plans & budgets are incomplete and often inaccurate, rarely accounting for menu pricing changes or current economic conditions. Even when the best practices of forecasting are employed, the information isn’t always available to the store managers who are attempting to manage the cost of labor. This ebook will walk you through the ins and outs of labor forecasting and best practices to build efficiency, grow revenue, and positively impact your restaurant’s bottom line.
Tags : 
     HotSchedules
By: HotSchedules     Published Date: Jan 17, 2019
The cost of labor can be managed effectively when restaurateurs are equipped with the right training, tools and processes. Traditional methods for capturing critical forecasting data and formulating labor plans & budgets are incomplete and often inaccurate, rarely accounting for menu pricing changes or current economic conditions. Even when the best practices of forecasting are employed, the information isn’t always available to the store managers who are attempting to manage the cost of labor. This ebook will walk you through the ins and outs of labor forecasting and best practices to build efficiency, grow revenue, and positively impact your restaurant’s bottom line.
Tags : 
     HotSchedules
By: Iovation     Published Date: Sep 25, 2009
ReputationManager is a real time fraud management solution and a forensic fraud analysis tool to identify and reduce the impact of online fraud such as chargebacks, stolen credit cards and identity theft, as well as abusive activity such as chat abuse, predatory behavior, and other forms of online harassment. This study illustrates the financial impact of using ReputationManager as part of a financial services organization's online credit card application process.
Tags : iovation, reputationmanager, real time fraud management solution, forensic fraud analysis tool, online fraud, online harassment, fraudulent applications, detection process
     Iovation
By: Riverbed     Published Date: Nov 02, 2016
IT leaders are adopting hybrid WAN topologies to increase capacity and reliability while balancing cost and performance requirements. However, these hybrid architectures are often too complex, rigid, and fragile. As a result, many organizations are challenging the status quo of traditional networking. Read this Technology Adoption Profile from Forrester to learn why 90% of network managers are looking to evolve their WAN, and see why new approaches such as SD-WAN are required to compete in today's digital age.
Tags : 
     Riverbed
By: Hewlett Packard Enterprise     Published Date: Jul 18, 2018
Cost Savings And Business Benefits Enabled By The 3PAR StoreServ All-Flash Storage System and Recovery Manager Center (RMC)
Tags : 
     Hewlett Packard Enterprise
By: Hewlett Packard Enterprise     Published Date: Jul 18, 2018
Cost Savings And Business Benefits Enabled By The 3PAR StoreServ All-Flash Storage System and Recovery Manager Center (RMC)
Tags : 
     Hewlett Packard Enterprise
By: Hewlett Packard Enterprise     Published Date: Aug 23, 2018
Cost Savings And Business Benefits Enabled By The 3PAR StoreServ All-Flash Storage System and Recovery Manager Center (RMC)
Tags : 
     Hewlett Packard Enterprise
Start   Previous    7 8 9 10 11 12 13 14 15 16 17 18 19 20 21    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics