Find White Papers
Home
About Us
List Your Papers
    

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.

information technology

Results 276 - 300 of 467Sort Results By: Published Date | Title | Company Name
Published By: Quinstreet - Infosec     Published Date: Jun 11, 2012
There are wide variations in the level of SIEM technology support for specific use cases, so understanding them is a prerequisite for selecting the best product in a given situation
Tags : 
security, enterprise applications
    
Quinstreet - Infosec
Published By: Intralinks     Published Date: Oct 30, 2014
The proliferation of file sync and share (FSS) products and other cloud services designed for consumers, along with mobile devices, leads to improper sharing of corporate data. Information that leaves your firewalls can live forever, and without adequate protection, can end up in the wrong hands. So what’s the solution? Protect your information with next-generation information rights management (IRM) technology. You can email, copy, upload or share any IRM-secured document — and the protection travels with it. Key topics include: The threat posed by Dropbox and other consumer-grade FSS providers The need for lifetime control of information and content The ability to perform audits, and locate files, anywhere, and who accessed them How next generation IRM technology is available to add a new layer of security to every file Information technology professionals interested in using IRM for secure collaboration don’t want to miss this important report.
Tags : 
rights management, security and regulatory, file sync and share, cloud services, irm technology, secure collaboration, security
    
Intralinks
Published By: TIBCO     Published Date: Aug 18, 2014
Digitalization—the process of exploiting digital information to maximize business success—has increased the value of your data to the point where it is arguably your most important asset. This paper explains why mastery will not be possible with merely adequate integration technology.
Tags : 
tibco, integration, data integration, business integration, business intelligence, intelligence, analytics, digitalization, information management, application integration, best practices, business activity monitoring, business analytics, business metrics, customer service, analytical applications, employee performance, data warehousing, employee performance management
    
TIBCO
Published By: ReadyTalk     Published Date: Jul 07, 2016
Let’s face it, employees in Information Technology have a tough job. You’re the technical experts, responsible for hardware and software as well as business processes and sometimes project management. You’re also charged with being experts in communications, sales, marketing, psychology, counseling, and more just to get your company to adopt new ways of doing things or new technology. This is especially true when trying to deliver everything on time and on budget.
Tags : 
best practices, business optimization, business management, productivity, information technology, communication, business intelligence
    
ReadyTalk
Published By: Mitel     Published Date: Jun 29, 2016
After years of being chained to the old ideas of office productivity, businesses are realizing that liberated employees are empowered employees. When you free people from the tethers of the office, amazing things start to happen: productivity rises, borders and barriers disappear, innovation replaces enervation, and the quality of work improves as employees’ quality of life improves.
Tags : 
productivity, best practices, business intelligence, business management, information technology, solutions, cloud computing
    
Mitel
Published By: Rackspace     Published Date: Mar 08, 2016
The cloud has taken many twists and turns on its route to maturity.
Tags : 
cloud management, information technology, cloud services, cloud management, productivity, cloud computing, content management
    
Rackspace
Published By: IBM     Published Date: Mar 28, 2016
To succeed today, organizations need to take advantage of information technology in every area of their business. Talent acquisition is no exception. Robust, reliable technology can help recruiters more effectively engage with candidates. According to Aberdeen Group, the user experience is key. It is more important than ever to have friendly and interactive platforms. In terms of talent acquisition, companies that prioritize the candidate experience are more than twice as likely to improve their cost per hire on a year–by-year basis.1 In addition, social capabilities can enable recruiting professionals to use the Internet for job applications, social referrals and video interviewing. Mobile integration also enables users to connect with information where and when they need it. With better tools and insight into people and data, organizations can much more quickly identify talent, match capabilities to market needs, retain the best talent and improve recruiting outcomes. Simply put, rec
Tags : 
ibm, talent acquisition, human resources, recruiting, recruiting software/services
    
IBM
Published By: SAP     Published Date: Jun 24, 2009
As information flows more freely in the business world, decisions need to be made quicker and based on sturdier data.
Tags : 
business intelligence, smb, sap, small business, medium business, best-in-class, time-to-information, laggards, benchmarking, knowledge management, performance management, technology, erp, crm, maturity, dashboard, maturity, pace, roi, return on investment
    
SAP
Published By: SAP     Published Date: Nov 23, 2009
Increased regulatory requirements, the need for transparency, and the desire to better manage and mitigate risks have combined to make Governance, Risk, and Compliance (GRC) top of mind for both business and Information Technology (IT) executives. Business managers and IT security managers must work collaboratively and continuously to control access and authorization, guarding against fraud and mistakes, while providing the clear visibility that is prerequisite for sound corporate oversight to ensure profitability and compliance.
Tags : 
sap, governance, risk, compliance, grc, risk management, vulnerability management
    
SAP
Published By: SAP     Published Date: Apr 13, 2011
This paper examines how an integrated information technology solution can help you take advantage of economies of scale to boost manufacturing utilization, enhance service levels, and improve the efficiency of your sales and administrative activities.
Tags : 
sap solutions, small businesses, midsize companies, capacity utilization, resource utilization, productivity, economies of scale, efficiency, application integration, business integration, manufacturing execution systems
    
SAP
Published By: SAP     Published Date: Nov 22, 2011
FreshDirect found it very challenging to get operational insights from its information systems. In order to improve, it was critical to FreshDirect that they select a BI technology that allows the company to measure and report on operational metrics across departmental applications without requiring the building of IT-intensive data marts. With this requirement as one of the key selection criteria, the company evaluated multiple vendors. Download this case study to learn more.
Tags : 
sap, businessobjects, business, technology, case study, freshdirect, bi technology, information systems, application integration, application performance management, business analytics, business intelligence, analytical applications
    
SAP
Published By: SAP     Published Date: Nov 22, 2011
Newell Rubbermaid sought to reduce time and effort to access information. They wanted to simplify access to global sales data and financial metrics. They also wanted to accelerate report query performance and improve decision making. SAP was selected because they are a comprehensive software program from a single vendor. Read to find out more.
Tags : 
sap, newell rubbermaid, data access, information management, technology, software, whitepaper, sales data, data management, business analytics, business intelligence, sales & marketing software, sales automation, analytical applications, data integration
    
SAP
Published By: IBM     Published Date: Dec 03, 2015
This white paper examines the business challenges and risks that IT dependence can present and why traditional approaches to IT risk management have become inadequate.
Tags : 
ibm, information technology, strategy, business goals, risk management, it management
    
IBM
Published By: 123Together     Published Date: Sep 19, 2008
Today's economy is especially hard on small businesses. How does your small business keep revenue coming in when your customers are spending less? How do you attract new customers in a cost efficient manner? How do you protect your businesses' valuable information assets without making a huge technology investment?
Tags : 
123together, it strategies, contact management, email, economy, stability, collaboration, green it, outsourcing, microsoft exchange, hosted exchange, mobile services, small business networks, return on investment, collaborative commerce, content integration, information management, cloud computing, colocation and web hosting, content management
    
123Together
Published By: BlackBerry Cylance     Published Date: Jul 02, 2018
Matthew Coy, Safelite’s Vice President of Information Technology, is responsible for overseeing all aspects of the company’s IT infrastructure, including selecting, administering, and supporting technology products. The company handles personally identifiable information, including credit card information and insurance data collected from several sources, and must comply with insurance industry regulations and the Payment Card Industry Data Security Standard. Safelite is the target of constant external attacks. The organization experienced ongoing security issues stemming from infected software, drivebys and other malicious downloads. According to Matthew, “A lot of malware and email viruses were making it through the environment, all bypassing our email security and AV.” Not only were the security controls ineffective, the previous AV platform required nearly 150 hours per week to manage. Matthew knew Safelite needed to make a change, and fast. Having worked with Cylance® at two previous companies, he was confident CylancePROTECT® could significantly improve Safelite’s endpoint security. Read the full case study to learn about the results Cylance was able to deliver.
Tags : 
safe, lite, cybersecurity, data
    
BlackBerry Cylance
Published By: BlackBerry Cylance     Published Date: Jul 02, 2018
Artificial intelligence (AI) technologies are rapidly moving beyond the realms of academia and speculative fiction to enter the commercial mainstream, with innovative products that utilize AI transforming how we access and leverage information. AI is also becoming strategically important to national defense and in securing our critical financial, energy, intelligence, and communications infrastructures against state-sponsored cyberattacks. According to an October 2016 report issued by the federal government’s National Science and Technology Council Committee on Technology (NSTCC), “AI has important applications in cybersecurity, and is expected to play an increasing role for both defensive and offensive cyber measures.” Based on this projection, the NSTCC has issued a National Artificial Intelligence Research and Development Strategic Plan to guide federally-funded research and development. The era of AI has most definitely arrived, but many still don’t understand the basics of this im
Tags : 
artificial, intelligence, cybersecurity, machine
    
BlackBerry Cylance
Published By: SAS     Published Date: Mar 06, 2018
Information on artificial intelligence (AI) is flooding the market, media and social channels. Without doubt, it’s certainly a topic worth the attention. But, it can be difficult to sift through market hype and grandiose promises to understand exactly how AI can be applied in practical and reliable solutions. Like most technological advances, incorporating new technology into business processes requires significant leadership and effective direction that all stakeholders can easily understand.
Tags : 
    
SAS
Published By: SAS     Published Date: Jun 06, 2018
The Internet of Things (IoT) is rapidly emerging as a core transformational technology of the digital era. The ability to gather data from sensors embedded throughout an enterprise can drive insights and operational efficiencies from the supply chain to the customer. But IoT and Industrial IoT (IIoT) implementations require high degrees of IT/OT convergence - collaboration and integration between information technology and operational technology groups - to succeed. These two groups, however, often have different goals, performance metrics, and perspectives on both the collaboration and the outcome. This SAS/HPE-sponsored paper helps readers get a better understanding of the relationship, either real or perceived, between these two groups. Futurum Research surveyed the state of the relationship between IT and OT teams as it pertains to the design, implementation, and creation of value through IoT technologies.
Tags : 
    
SAS
Published By: BlackBerry     Published Date: Aug 02, 2010
There is a communications revolution occurring in hospitals today. With highly mobile staff members and the increasing use of smartphones, new ways to share and act on information abound. Yet despite these technology changes, the need for fast, accurate messaging remains crucial to maintain patient safety at all times.
Tags : 
blackberry, healthcare, hospitals, smartphones, pda, mobile workers, mobile staff, integration, wifi, bes, mobile computing, mobile data systems, smart phones
    
BlackBerry
Published By: Information Shield     Published Date: Jan 07, 2009
How mature is your information security policy program? Do you have a set of outdated documents stored in a binder or intranet site? Or do you have a documented management program that keeps your policies up to date, your users informed and your internal auditors sleeping at night?
Tags : 
information shield, information security policies, privacy frameworks, hipaa, glba, information technology, iso 17799, iso 27002, security policy, sample security policy, policies and procedures, pci-dss, regulatory compliance, security, knowledge management, identity management, hipaa compliance, information management
    
Information Shield
Published By: DoubleTake     Published Date: Jul 14, 2010
The Department of Homeland Security puts businesses in two categories: those who have already experienced the pain of losing valuable electronic data, and those who will at some point in the future. Well-prepared businesses know that deploying the right resources, processes and technology to protect vital HR information is important, but having adequate resources and technology in place to protect the same invaluable data in branch offices is just as important, though often overlooked. This paper will teach you how real-time data replication software can automatically backup branch office data to a central server for a simpler, more reliable and cost-effective way to protect your branch.
Tags : 
double-take, data protection, branch offices, backup, vss, rpo, rto, cdp
    
DoubleTake
Published By: SAP     Published Date: Aug 24, 2010
Communicate to line-of-business managers how they can deliver the right information at the right time to support better, faster decisions, and thus ensure long-term company success.
Tags : 
sap sme, it managers, chief information officer, cio, project management, business operation, service-oriented architecture, soa, itil, service oriented architecture, productivity
    
SAP
Published By: SAP     Published Date: Aug 24, 2010
This paper examines how an integrated information technology solution can help you take advantage of economies of scale to boost manufacturing utilization, enhance service levels, and improve the efficiency of your sales and administrative activities.
Tags : 
sap sme, integrated information technology, manufacturing utilization, operational, productivity, smb, small business networks, application integration, itil
    
SAP
Published By: SAS     Published Date: Sep 13, 2013
If businesses are recognizing the need for a dial-tone approach to establishing “data utility” services for meeting user expectations for data accessibility, availability and quality, it is incumbent upon the information management practitioners to ensure that the organization is properly prepared, from both a policy/process level and a technology level.
Tags : 
sas, cio, chief information officer, data utility, information management, software development
    
SAS
Published By: IBM Corporation     Published Date: Sep 20, 2010
This IBM® Redguide™ publication provides a high level overview of the new IBM WebSphere® CloudBurst™ Appliance, including current issues being faced in the information technology (IT) industry and how WebSphere CloudBurst can address many of these issues.
Tags : 
application servers, enterprise software, ibm websphere, application server, middleware, cloudburst appliance, server provisioning, server virtualization, web sphere, service oriented architecture, cloud computing
    
IBM Corporation
Start   Previous    5 6 7 8 9 10 11 12 13 14 15 16 17 18 19    Next    End
Search