information technology

Results 276 - 300 of 462Sort Results By: Published Date | Title | Company Name
By: Rackspace     Published Date: Mar 08, 2016
The cloud has taken many twists and turns on its route to maturity.
Tags : cloud management, information technology, cloud services, cloud management
     Rackspace
By: IBM     Published Date: Mar 28, 2016
To succeed today, organizations need to take advantage of information technology in every area of their business. Talent acquisition is no exception. Robust, reliable technology can help recruiters more effectively engage with candidates. According to Aberdeen Group, the user experience is key. It is more important than ever to have friendly and interactive platforms. In terms of talent acquisition, companies that prioritize the candidate experience are more than twice as likely to improve their cost per hire on a year–by-year basis.1 In addition, social capabilities can enable recruiting professionals to use the Internet for job applications, social referrals and video interviewing. Mobile integration also enables users to connect with information where and when they need it. With better tools and insight into people and data, organizations can much more quickly identify talent, match capabilities to market needs, retain the best talent and improve recruiting outcomes. Simply put, rec
Tags : ibm, talent acquisition, human resources, recruiting
     IBM
By: SAP     Published Date: Jun 24, 2009
As information flows more freely in the business world, decisions need to be made quicker and based on sturdier data.
Tags : business intelligence, smb, sap, small business, medium business, best-in-class, time-to-information, laggards, benchmarking, knowledge management, performance management, technology, erp, crm, maturity, dashboard, maturity, pace, roi, return on investment
     SAP
By: SAP     Published Date: Nov 23, 2009
Increased regulatory requirements, the need for transparency, and the desire to better manage and mitigate risks have combined to make Governance, Risk, and Compliance (GRC) top of mind for both business and Information Technology (IT) executives. Business managers and IT security managers must work collaboratively and continuously to control access and authorization, guarding against fraud and mistakes, while providing the clear visibility that is prerequisite for sound corporate oversight to ensure profitability and compliance.
Tags : sap, governance, risk, compliance, grc
     SAP
By: SAP     Published Date: Apr 13, 2011
This paper examines how an integrated information technology solution can help you take advantage of economies of scale to boost manufacturing utilization, enhance service levels, and improve the efficiency of your sales and administrative activities.
Tags : sap solutions, small businesses, midsize companies, capacity utilization, resource utilization, productivity, economies of scale, efficiency
     SAP
By: SAP     Published Date: Nov 22, 2011
FreshDirect found it very challenging to get operational insights from its information systems. In order to improve, it was critical to FreshDirect that they select a BI technology that allows the company to measure and report on operational metrics across departmental applications without requiring the building of IT-intensive data marts. With this requirement as one of the key selection criteria, the company evaluated multiple vendors. Download this case study to learn more.
Tags : sap, businessobjects, business, technology, case study, freshdirect, bi technology, information systems, business technology
     SAP
By: SAP     Published Date: Nov 22, 2011
Newell Rubbermaid sought to reduce time and effort to access information. They wanted to simplify access to global sales data and financial metrics. They also wanted to accelerate report query performance and improve decision making. SAP was selected because they are a comprehensive software program from a single vendor. Read to find out more.
Tags : sap, newell rubbermaid, data access, information management, technology, software, whitepaper, sales data, data management
     SAP
By: IBM     Published Date: Dec 03, 2015
This white paper examines the business challenges and risks that IT dependence can present and why traditional approaches to IT risk management have become inadequate.
Tags : ibm, information technology, strategy, business goals, risk management, it management, business technology
     IBM
By: 123Together     Published Date: Sep 19, 2008
Today's economy is especially hard on small businesses. How does your small business keep revenue coming in when your customers are spending less? How do you attract new customers in a cost efficient manner? How do you protect your businesses' valuable information assets without making a huge technology investment?
Tags : 123together, it strategies, contact management, email, economy, stability, collaboration, green it, outsourcing, microsoft exchange, hosted exchange, mobile services
     123Together
By: Cylance     Published Date: Jul 02, 2018
Matthew Coy, Safelite’s Vice President of Information Technology, is responsible for overseeing all aspects of the company’s IT infrastructure, including selecting, administering, and supporting technology products. The company handles personally identifiable information, including credit card information and insurance data collected from several sources, and must comply with insurance industry regulations and the Payment Card Industry Data Security Standard. Safelite is the target of constant external attacks. The organization experienced ongoing security issues stemming from infected software, drivebys and other malicious downloads. According to Matthew, “A lot of malware and email viruses were making it through the environment, all bypassing our email security and AV.” Not only were the security controls ineffective, the previous AV platform required nearly 150 hours per week to manage. Matthew knew Safelite needed to make a change, and fast. Having worked with Cylance® at two previous companies, he was confident CylancePROTECT® could significantly improve Safelite’s endpoint security. Read the full case study to learn about the results Cylance was able to deliver.
Tags : safe, lite, cybersecurity, data
     Cylance
By: Cylance     Published Date: Jul 02, 2018
Artificial intelligence (AI) technologies are rapidly moving beyond the realms of academia and speculative fiction to enter the commercial mainstream, with innovative products that utilize AI transforming how we access and leverage information. AI is also becoming strategically important to national defense and in securing our critical financial, energy, intelligence, and communications infrastructures against state-sponsored cyberattacks. According to an October 2016 report issued by the federal government’s National Science and Technology Council Committee on Technology (NSTCC), “AI has important applications in cybersecurity, and is expected to play an increasing role for both defensive and offensive cyber measures.” Based on this projection, the NSTCC has issued a National Artificial Intelligence Research and Development Strategic Plan to guide federally-funded research and development. The era of AI has most definitely arrived, but many still don’t understand the basics of this im
Tags : artificial, intelligence, cybersecurity, machine
     Cylance
By: SAS     Published Date: Mar 06, 2018
Information on artificial intelligence (AI) is flooding the market, media and social channels. Without doubt, it’s certainly a topic worth the attention. But, it can be difficult to sift through market hype and grandiose promises to understand exactly how AI can be applied in practical and reliable solutions. Like most technological advances, incorporating new technology into business processes requires significant leadership and effective direction that all stakeholders can easily understand.
Tags : 
     SAS
By: SAS     Published Date: Jun 06, 2018
The Internet of Things (IoT) is rapidly emerging as a core transformational technology of the digital era. The ability to gather data from sensors embedded throughout an enterprise can drive insights and operational efficiencies from the supply chain to the customer. But IoT and Industrial IoT (IIoT) implementations require high degrees of IT/OT convergence - collaboration and integration between information technology and operational technology groups - to succeed. These two groups, however, often have different goals, performance metrics, and perspectives on both the collaboration and the outcome. This SAS/HPE-sponsored paper helps readers get a better understanding of the relationship, either real or perceived, between these two groups. Futurum Research surveyed the state of the relationship between IT and OT teams as it pertains to the design, implementation, and creation of value through IoT technologies.
Tags : 
     SAS
By: BlackBerry     Published Date: Aug 02, 2010
There is a communications revolution occurring in hospitals today. With highly mobile staff members and the increasing use of smartphones, new ways to share and act on information abound. Yet despite these technology changes, the need for fast, accurate messaging remains crucial to maintain patient safety at all times.
Tags : blackberry, healthcare, hospitals, smartphones, pda, mobile workers, mobile staff, integration, wifi, bes
     BlackBerry
By: Information Shield     Published Date: Jan 07, 2009
How mature is your information security policy program? Do you have a set of outdated documents stored in a binder or intranet site? Or do you have a documented management program that keeps your policies up to date, your users informed and your internal auditors sleeping at night?
Tags : information shield, information security policies, privacy frameworks, hipaa, glba, information technology, iso 17799, iso 27002, security policy, sample security policy, policies and procedures, pci-dss, regulatory compliance, security, knowledge management
     Information Shield
By: DoubleTake     Published Date: Jul 14, 2010
The Department of Homeland Security puts businesses in two categories: those who have already experienced the pain of losing valuable electronic data, and those who will at some point in the future. Well-prepared businesses know that deploying the right resources, processes and technology to protect vital HR information is important, but having adequate resources and technology in place to protect the same invaluable data in branch offices is just as important, though often overlooked. This paper will teach you how real-time data replication software can automatically backup branch office data to a central server for a simpler, more reliable and cost-effective way to protect your branch.
Tags : double-take, data protection, branch offices, backup, vss, rpo, rto, cdp
     DoubleTake
By: SAP     Published Date: Aug 24, 2010
Communicate to line-of-business managers how they can deliver the right information at the right time to support better, faster decisions, and thus ensure long-term company success.
Tags : sap sme, it managers, chief information officer, cio, project management, business operation, service-oriented architecture, soa, itil
     SAP
By: SAP     Published Date: Aug 24, 2010
This paper examines how an integrated information technology solution can help you take advantage of economies of scale to boost manufacturing utilization, enhance service levels, and improve the efficiency of your sales and administrative activities.
Tags : sap sme, integrated information technology, manufacturing utilization, operational, productivity, smb
     SAP
By: SAS     Published Date: Sep 13, 2013
If businesses are recognizing the need for a dial-tone approach to establishing “data utility” services for meeting user expectations for data accessibility, availability and quality, it is incumbent upon the information management practitioners to ensure that the organization is properly prepared, from both a policy/process level and a technology level.
Tags : sas, cio, chief information officer, data utility, information management, software development
     SAS
By: IBM Corporation     Published Date: Sep 20, 2010
This IBM® Redguide™ publication provides a high level overview of the new IBM WebSphere® CloudBurst™ Appliance, including current issues being faced in the information technology (IT) industry and how WebSphere CloudBurst can address many of these issues.
Tags : application servers, enterprise software, ibm websphere, application server, middleware, cloudburst appliance, server provisioning
     IBM Corporation
By: Microsoft Corporation     Published Date: Oct 19, 2010
This hosted solution helps organizations reduce the costs of managing and maintaining business systems, which frees information technology resources and enables staff to focus on initiatives that can deliver competitive advantage to the business.
Tags : microsoft online services, collaboration, business productivity, software services, integrated online service, it operation
     Microsoft Corporation
By: IBM     Published Date: Nov 09, 2011
Learn how Forrester evaluated the strengths and weaknesses of top CCCM vendors.
Tags : information technology, marketing, cccm, communications, forrester
     IBM
By: EMA     Published Date: Aug 22, 2012
This webinar will serve as a guide for IT executives and professionals seeking to align IT Operations more closely with Agile Development and Business initiatives.
Tags : it operations, agile development, information technology, static operations, extrahop, application development, business technology
     EMA
By: Dextra Technologies     Published Date: Aug 30, 2013
It’s no longer sufficient talk about the importance of mobility for IT-enabled operations. Instead, think about the concept of pervasive mobility, where the current generation of traditional devices like notebooks are augmented, and perhaps eventually replaced, by a new armada of consumer-class devices at the edge of the network. In fact, the bulk of information now being created and stored on corporate networks comes from notebooks, tablets and smartphones.
Tags : best practices, pervasive mobility, information technology, mobile, network, gadgets, consumer class devices, smartphones, dextra, wireless
     Dextra Technologies
By: Singtel     Published Date: Oct 28, 2014
Examine the three broad challenges that Financial Services Institutions (FSIs) face today: compliance and risk management, consolidation and innovation. To address these effectively, FSIs require an Information and Communication Technology (ICT) infrastructure that offers both the security and reliability of their legacy communications systems as well as the flexibility and scalability that new generation networks provide, in order to adapt and innovate in the highly competitive financial services environment.
Tags : singtel, vpn, wan, lan
     Singtel
Start   Previous    5 6 7 8 9 10 11 12 13 14 15 16 17 18 19    Next    End
Search White Papers      

Add White Papers

Get your white papers featured in the Energy Efficiency Markets White Paper Library contact: Kevin@EnergyEfficiencyMarkets.com