RSS feed Get our RSS feed

News by Topic

teams

Results 1051 - 1075 of 1141Sort Results By: Published Date | Title | Company Name
By: Winshuttle     Published Date: Jun 29, 2017
Founded in 1996 by former University of Maryland football player Kevin Plank, Under Armour is a major innovator in performance apparel. The company made its start by developing a moisture-wicking compression T-shirt for athletes to wear underneath uniforms or pads. Under Armour now designs, markets, and distributes a full line of apparel and footwear for active men and women of all ages, and the company is the official outfitter for college and professional teams across North America and Europe.
Tags : 
     Winshuttle
By: ITinvolve     Published Date: Apr 16, 2013
Most assets in IT are governed by one or more policies, yet there is usually no quick and easy method to determine which policies apply to which assets and what specifically those policies govern. This means that IT teams are often making changes to assets that violate the policies meant to govern them. Read this use case document to understand how social knowledge collaboration techniques can help you to easily assign and track the policies that govern your assets to avoid out of compliance situations.
Tags : itinvolve, policies, it teams, compliance situations, social knowledge collaboration, techniques
     ITinvolve
By: Polycom     Published Date: Aug 16, 2017
"WR believes that huddle rooms should be an integral part of every organization’s meeting room and collaboration strategy for several reasons including: - the addition of millennials to the work environment - the enhanced interest (and in some cases use) of open work spaces and telecommuting - the increased need to support large numbers of collaborative and distributed work teams But most companies remain stymied about how to deal with these spaces. This study, sponsored by Polycom, is intended to raise awareness of the value and importance of these misunderstood, mismanaged, and often under-appreciated meeting spaces."
Tags : polycom, huddle room, wainhouse report, work environment, video collaboration
     Polycom
By: Palo Alto Networks     Published Date: Apr 25, 2017
Security practitioners and threat actors are constantly developing new techniques to gain advantages over the other. In recent years, security teams have stepped up their approaches to protecting their infrastructure by fortifying their network perimeter defenses, building up protections against advanced malware, upgrading vulnerable operating systems, automating the delivery of patches to stop exploits, and developing counter-measures to spot intruders. The threat actors looking to circumvent these measures are shifting their attention toward the next weakest link in the security chain – the user.
Tags : 
     Palo Alto Networks
By: Veracode     Published Date: Jun 27, 2019
The demand on software development teams is greater than ever.
Tags : 
     Veracode
By: Veracode     Published Date: Jul 01, 2019
The demand on software development teams is greater than ever. With the cultural move towards DevOps, the implementation of CI/CD systems, and the desire to operate in an agile manner, developers are being asked to push out more software - and in shorter periods of time - than ever before. In turn, developers are increasingly relying on open source libraries, or pre-built pieces of code available online, which allow them to add functionality to their code without having to build it from scratch. As a result, software today is rarely completely made of first-party code and is more often "assembled" from other sources.
Tags : 
     Veracode
By: AWS     Published Date: Jul 10, 2019
Being able to monitor and respond to patient inquiries quickly and effectively is critical to creating a positive clinical experience and delivering successful products. But compiling and monitoring this data to address customer concerns in a timely way is a challenge when you have disparate sources and systems, global teams, and multiple patients. Read how a top 10 global pharmaceutical company worked with Slalom and AWS to design and implement a unified and globally distributed event and inquiry data reporting system. By combining three types of requests into one solution, the company has improved the customer experience and increased call center and data input operational efficiency by 50%. Learn how to Increase access to relevant data to help inform future or ongoing clinical trials Adapt your existing system development processes to an agile approach Engage with Slalom and AWS throughout the lifecycle of a healthcare engagement
Tags : 
     AWS
By: dynatrace     Published Date: Feb 01, 2013
Read this paper to learn how you can unify and communicate effectively between teams throughout the application lifecycle to maximum the application performance that is the lifeblood of your organization’s business operation.
Tags : application, lifecycle, performance, development, testing, production
     dynatrace
By: Esker     Published Date: Jul 09, 2019
We all know that teamwork makes the dream work. And in the case of procurement and accounts payable (AP), this rings especially true.This IOFM white paper explores the negative effects of dissociated procurement and AP departments and the benefits of integrating them with an automated, end-to-end P2P workflow, including: -Fewer duplicate payments & improved ROI -More collaborative teams & increased efficiency -Heightened business intelligence from greater visibility & reporting
Tags : 
     Esker
By: Webex     Published Date: Dec 03, 2012
Enabling real-time collaboration to connect global employees and virtual teams is a growing trend among organizations seeking a competitive advantage.
Tags : real-time, virtual teams, webex, cisco, saas, security
     Webex
By: AVI-SPL     Published Date: Sep 01, 2016
There are a few factors that are influencing the complexity of enterprise collaboration. In this tech brief, we’ll examine three issues that often surface when we work with IT teams on a Collaboration Program Assessment.
Tags : collaboration, enterprise collaboration, video conferencing, video meetings, video
     AVI-SPL
By: Oracle     Published Date: Oct 20, 2016
Flexibility and the ability to adapt easily to change can create a compelling competitive advantage for E&C organisations. Whether it’s behind the desk, on the go, or at the job site, E&C project teams need to be empowered to get a project done no matter where the job takes them and with a limited amount of resources.
Tags : 
     Oracle
By: IBM     Published Date: Oct 26, 2017
Authentication is the beating heart of security. The most fundamental action in all of IT is to identify “who you are”—and authentication is the building block that answers that question. Now more than ever, IT teams must do everything they can to ensure that users are who they say they are, and that their credentials have not been stolen. IT is in state of crisis, with hundreds of millions of identities stolen annually. For system administrators, it’s crucial to know which users have the right to access a given resource, and whether unauthorized users have tried to get in.
Tags : user authentication, mobile multi factor authentication, data flows, security, it strategies
     IBM
By: Illusive Networks     Published Date: Apr 10, 2019
Attack Surface Manager (ASM) gives security teams unprecedented power to easily implement a cyber hygiene program to harden their networks against malicious lateral movement of cyberattackers. This paper provides an overview of common ways that Illusive's customers are using Attack Surface Manager, including fortifying PAM/PIM solutions, detecting insider threats and malicious insider activity, and providing powerful, automated Red Team functions.
Tags : attack surface, cyber hygiene, vulnerability management, vulnerabilities, network vulnerability, threat management, vulnerability assessment, network security
     Illusive Networks
By: Splunk     Published Date: Sep 10, 2018
One of the biggest challenges IT ops teams face is the lack of visibility across its infrastructure — physical, virtual and in the cloud. Making things even more complex, any infrastructure monitoring solution needs to not only meet the IT team’s needs, but also the needs of other stakeholders including line of business (LOB) owners and application developers. For companies already using a monitoring platform like Splunk, monitoring blindspots arise from the need to prioritize across multiple departments. This report outlines a four-step approach for an effective IT operations monitoring (ITOM) strategy. Download this report to learn: How to reduce monitoring blind spots when creating an ITOM strategy How to address ITOM requirements across IT and non-IT groups Distinct layers across ITOM Potential functionality gaps with domain-specific products
Tags : cloud monitoring, aws, azure, gcp, cloud, aws monitoring, hybrid infrastructure, distributed cloud infrastructures
     Splunk
By: Viavi Solutions     Published Date: Oct 11, 2013
Network teams are increasingly being told by management to track and manage the end user's experience without any clear guidance as to its meaning.
Tags : monitoring metrics, user experience, it managers, user experience metrics, essential monitoring, network teams, track users, network world
     Viavi Solutions
By: IBM     Published Date: Apr 07, 2015
IBM invites you to join us for an expert presentation and discussion of the methods and tools available to help Lean Six Sigma teams drive increased levels of efficiency, effectiveness and quality.
Tags : ibm, efficiencies, six sigma, quality, lean, reduce waste, variance, process improvement
     IBM
By: IBM     Published Date: Feb 04, 2016
IBM Blueworks Live is a process modeling tool used by Lean Six Sigma teams to improve business performance and deliver greater value to customers and stakeholders.
Tags : ibm, blueworks, live, cloud, computing, business performance, efficiency, operations
     IBM
By: IBM     Published Date: Mar 31, 2016
"IBM invites you to join us for an expert presentation and discussion of the methods and tools available to help Lean Six Sigma teams drive increased levels of efficiency, effectiveness and quality. This webcast will focus on how Lean Six Sigma teams can use collaboration tools to: Increase process efficiency and reduce waste Improve process quality and reduce variance Listen to the 'voice of the customer' to drive process improvement IBM Blueworks Live is a process modeling tool used by Lean Six Sigma teams to improve business performance and deliver greater value to customers and stakeholders."
Tags : ibm, ibm operational decision manager, ibm odm advanced, process improvement, lean six sigma
     IBM
By: Oracle     Published Date: Feb 26, 2014
This white paper offers a brief overview of how organizations can make best use of social data by implementing a framework to integrate social data with other enterprise and public or curated data. This framework provides a platform for uncovering new insights that can be fed into business intelligence and customer-experience-management systems in near real time to help marketing, sales, service, and commerce teams accelerate decision-making and create long-term, profitable customer relationships.
Tags : oracle, srm, social, social data, enterprise, business intelligence, customer experience management, customer experience
     Oracle
By: Oracle Social Cloud     Published Date: May 02, 2014
This white paper offers a brief overview of how organizations can best use social data by implementing a framework to integrate social data with other enterprise and public or curated data. This framework provides a platform for uncovering new insights that can be fed into business intelligence and customer experience management systems in near real-time to help marketing, sales, service, and commerce teams accelerate decision-making and create long-term, profitable customer relationships.
Tags : oracle, srm, social media, social data, digital marketing
     Oracle Social Cloud
By: EMC Converged Platforms     Published Date: Jan 27, 2016
In the spring of 2015, IDC organized a study on the business value Vblock systems bring VCE customers. The organizations that took part in this study ranged from 400 employees to 200,000 employees, with an average employee count of 27,113. These organizations represent a wide array of industries and countries. The results of this study were published in the VCE-sponsored IDC white paper entitled, “The Business Value of VCE Vblock Systems: Leveraging Convergence to Drive Business Agility, May 2015”. This report discusses how Vblock Systems empowers IT teams to move quickly and more flexibly.
Tags : vce, vblock systems, it management, it solutions, oil and gas industry, innovation, customer experience, financial benefits
     EMC Converged Platforms
By: Laser 2000     Published Date: Mar 12, 2019
End-user experience & network security unifying NetOps and SecOps teams
Tags : 
     Laser 2000
By: Viavi Solutions     Published Date: Jan 04, 2017
In the age of information, staying on top of emerging threats requires IT teams to leverage existing tools in innovative ways, such as applying deep packet inspection and analysis from performance monitoring solutions for advanced security forensics. Based on recent insight gathered from 322 network engineers, IT directors and CIOs around the world, 85 percent of enterprise network teams are now involved with security investigations, indicating a major shift in the role of those teams within enterprises. Large-scale and high-profile security breaches have become more common as company data establishes itself as a valuable commodity on the black market. As such, enterprises are now dedicating more IT resources than ever before to protect data integrity.
Tags : 
     Viavi Solutions
By: Viavi Solutions     Published Date: Apr 14, 2017
In the age of information, staying on top of emerging threats requires IT teams to leverage existing tools in innovative ways, such as applying deep packet inspection and analysis from performance monitoring solutions for advanced security forensics. Based on recent insight gathered from 322 network engineers, IT directors and CIOs around the world, 85 percent of enterprise network teams are now involved with security investigations, indicating a major shift in the role of those teams within enterprises. Large-scale and high-profile security breaches have become more common as company data establishes itself as a valuable commodity on the black market. As such, enterprises are now dedicating more IT resources than ever before to protect data integrity.
Tags : network security, security validation, technical security, cyber attacks, database security, it security, traffic analytics, data report
     Viavi Solutions
Start   Previous    32 33 34 35 36 37 38 39 40 41 42 43 44 45 46    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics