framework

Results 251 - 275 of 571Sort Results By: Published Date | Title | Company Name
Published By: Burton Group     Published Date: Jul 07, 2008
While many enterprise architecture (EA) programs may be less than effective or threatened by extinction, the EA discipline is still an important set of skills and processes that improve IT decision-making and CIO effectiveness. Yet, after decades of architecting systems, the advent of several EA frameworks, and the many definitions available for the term EA, we still strive to understand what EA is, what it does, and what it looks like when it is successful.
Tags : 
architecture, architect, network architecture, it management, network design, network management, burton group, enterprise architecture
    
Burton Group
Published By: Dell     Published Date: Oct 20, 2008
Dell has improved PC deployment activities through patent-pending automation technology and offers an array of services from planning a Windows Vista migration to post-deployment management.
Tags : 
dell, deploying vista, dell deployment framework, dell deployment model, deployment automation toolset, optimized deployment
    
Dell
Published By: F5 Networks Inc     Published Date: Jan 22, 2009
This white paper is focused on the design and architecture of an OCS 2007 environment in an HP BladeSystem infrastructure. The document outlines a building block approach to deploying OCS on the HP BladeSystem and focuses on how the design decisions around levels of availability, scalability, and the OCS 2007 feature set impact the hardware that is deployed and the version of OCS that is used. The white paper also covers a brief overview of the Microsoft Unified Communications framework including Microsoft Exchange Server 2007 and Office Communications Server 2007 and an overview of the HP BladeSystem architecture and how the HP BladeSystem can help lower the total cost of ownership (TCO).
Tags : 
hp bladesystem, ocs, voip
    
F5 Networks Inc
Published By: Aldon     Published Date: Jan 13, 2009
Learn what this regulation expects of IT and how to avoid the risk of expensive fines.
Tags : 
aldon, sox, sarbanes-oxley act compliance, sox responsibilities, automated change management
    
Aldon
Published By: VMware     Published Date: Feb 26, 2009
The primary goal of this guide is not simply to provide a checklist of tasks, but to help you develop an understanding of the disaster recovery (DR) planning process and the principles that underlie it. Before getting into the details, let’s consider first just what this guide will do for you and equally importantly, what it will not do. What this guide will do is to lay out a framework for DR planning that keeps things conceptually simple and helps you know what steps must be carried out and why, without a lot of jargon or unnecessary formality.
Tags : 
ca xosoft, vmware, disaster recovery, business impact analysis, bia, outside-in analysis, inside-out analysis, contingency planning guide, planning, plan maintenance, system information form, sif, cost to recover, disaster planning, crm application, mission critical data, preventative measures, scale of disaster, scope of disaster, recovery team
    
VMware
Published By: PC Mall     Published Date: Mar 02, 2011
Download this HP White Paper to learn how to protect your high value virtual assets with a combination of purpose-built IPS platforms and enterprise-class management solutions.
Tags : 
pc mall, virtualization, server virtualization, data centers, data center security, security
    
PC Mall
Published By: PC Mall     Published Date: Mar 21, 2011
Companies realize the benefits of moving to virtualization, however, most virtualized environments today are being deployed in an insecure manner. Download this HP White Paper to learn how to protect your high value virtual assets with a combination of purpose-built IPS platforms and enterprise-class management solutions.
Tags : 
keywords: virtualization, server virtualization, data centers, data center security, security
    
PC Mall
Published By: Citrix Systems     Published Date: Nov 23, 2015
The purpose of this study is to provide a framework for businesses to evaluate the potential financial impact that NetScaler can have in their organizations based on results from existing customers.
Tags : 
citrix, netscaler, business benefits, networks, applications, cost savings
    
Citrix Systems
Published By: Trend Micro Inc.     Published Date: Aug 25, 2011
The purpose of this study is to provide readers with a framework to evaluate the potential financial impact of choosing Trend Micro Enterprise Security for their complete content security protection.
Tags : 
trend micro, enterprise security, forrester, roi, total economic impactt, web security, vendor management savings, worry-free business security, web threat management, medium business, mid-sized business, mid-size, medium, anti-spam, antispam, spam filter service, internet content security, smart protection network
    
Trend Micro Inc.
Published By: SuccessFactors, Inc.     Published Date: Dec 01, 2011
Turn strategy into success by automating your manual performance management process in harmony with your culture. Discover how when you download SuccessFactors' new white paper, "The Perfect Marriage: Introduce Your Culture to Automated Performance Management."
Tags : 
accelerate, accountability, alignment, automation, best practice, coaching, consistency, culture, data, development, efficient, engagement, execute, fairness, feedback, foundation, framework, impact, infrastructure, innovation
    
SuccessFactors, Inc.
Published By: Skillsoft     Published Date: Mar 06, 2014
Establishing an integrated GRC framework gives a company visibility and insight, plus the ability to reduce cost and exposure to violations, and increased control over remote operations and employees.
Tags : 
skillsoft, governance, risk management, compliance, grc framework, remote operations
    
Skillsoft
Published By: Skillsoft     Published Date: Jul 23, 2014
This ExecBlueprint discusses how companies can address these risks through the development of a comprehensive risk management framework that incorporates both company policy to enforce standards for safe social media and technology use and technical controls to monitor activity. Although no single blueprint exists, the framework should be sufficiently robust to prevent most employees from clicking on suspicious links and posting confidential information— and contain damage caused by inevitable human error, before the story ends up in The New York Times.
Tags : 
skillsoft, compliance, social media, online activity, security standards, awareness, risk management, malware, threats
    
Skillsoft
Published By: Bluekai     Published Date: Aug 10, 2012
Hewlett-Packard, a leading technology provider with a global footprint, saw an opportunity to significantly improve its digital marketing efforts by creating a universal framework for user-level data collection and usage.
Tags : 
data management platform, bluekai, supply-side platforms, audience engagement, audience extension, audience analytics, hewlett-packard, omnicom, managing data
    
Bluekai
Published By: ForeScout     Published Date: Aug 14, 2012
Information security has undergone a sea change in the past 10 years. Compliance mandates in the form of industry standards and Federal rules like NERC, FFIEC, HIPAA/HITECH and PCI-DSS are the new norm. To stay in compliance, IT teams need to be able to keep up with updatesand changes to existing mandates while also being prepared for new ones. To maximize efficiency, manage risk and reduce potential violations due to compliance failure, organizations need to implement security tools whose features support multiple specifications within and across different compliance frameworks.
Tags : 
forescout, counteract, compliance, independent, assesment, network, access, control, maps, leading, compliance, mandates, and helps, automate, grc, operations, federal, rules, nerc, ffiec
    
ForeScout
Published By: Merkle     Published Date: Oct 19, 2012
An effective marketing investment strategy will help you take inventory of your current measurement framework and develop a more accurate, reliable and consistent strategy for assessing and improving the performance of your marketing spend.
Tags : 
marketing accountability, roi, data management, customer centricity, crm, buying behaviors, segmentation, customer lifecycle, integrated, customer solutions, target segmented customers, marketing measurement, marketing strategy, competitive advantage, business strategy, customer value, optimization, integrated marketing strategies, integrated, customer experience
    
Merkle
Published By: Crimson Hexagon     Published Date: Oct 10, 2013
Download this case study to learn how Crimson Hexagon developed a framework for measuring advertising effectiveness by analyzing the online conversations surrounding Target's major Black Friday ad campaigns in 2011 and 2012.
Tags : 
campaign effectiveness, ad campaign effectiveness, online conversation, ad agencies, ad appraisal
    
Crimson Hexagon
Published By: Crimson Hexagon     Published Date: Oct 10, 2013
In order to develop a framework for evaluating the success of non-traditional advertising. Crimson Hexagon analyzed the online conversions surrounding the 8-bit video game released by Old Spice in Dec. 2013, in which users play the game's eponymous hero. Download this case study to learn more about their findings.
Tags : 
old spice, online conversations, measuring consumer engagement
    
Crimson Hexagon
Published By: McAfee     Published Date: Feb 06, 2013
Read how managing risk today means making sense of more data: vulnerability scans, application and database logs, flows, access and session records, alerts, and trending analysis.
Tags : 
security connected framework, big security data, big data, log management, siem
    
McAfee
Published By: McAfee     Published Date: Feb 06, 2013
Integrating SIEM and threat intelligence to mitigate bad actors is essential for having a resilient security posture. The McAfee response is to expand the Security Connected framework by pairing McAfee SIEM and McAfee Global Threat Intelligence.
Tags : 
threat intelligence, bad actors, siem, mcafee global threat intelligence, mcafee gti, mcafee risk advisor, security connected
    
McAfee
Published By: McAfee     Published Date: Apr 16, 2014
Read how managing risk today means making sense of more data: vulnerability scans, application and database logs, flows, access and session records, alerts, and trending analysis.
Tags : 
security connected framework, big security data, big data, log management, siem
    
McAfee
Published By: McAfee     Published Date: Oct 28, 2014
Compliance and financial risk used to be the driving concerns for security and risk management. Read how managing risk today means making sense of more data: vulnerability scans, application and database logs, flows, access and session records, alerts, and trending analysis.
Tags : 
security connected framework, big security data, big data, log management, siem
    
McAfee
Published By: VMware, Inc     Published Date: Dec 05, 2013
Executive Summary: In November 2012, Vmware Commissioned Forrester Consulting to examine the total economic impact and potential return on investment (ROI) enterprises may realize by deploying Vmware vCenter Site Recovery Manager (SRM). The purpose of this study is to provide readers with a framework to evaluate the potential financial impact of the VMware vCenter Site Recovery Manger on their organizations. Please download the white paper to learn more.
Tags : 
vmware, roi, return on investment enterprises, vmware vcenter site recovery manager, forrester consulting. srm
    
VMware, Inc
Published By: Cisco     Published Date: May 14, 2015
Cisco Validated designs (CVds) provide the framework for systems design based on common use cases or current engineering system priorities.
Tags : 
cloud computing, erp, productivity, applications, efficiency, cisco
    
Cisco
Published By: CEB     Published Date: Jul 01, 2014
Expand your survey’s potential by linking its content to your firm’s business priorities, and create a culture that fuels your organization’s strategy.
Tags : 
business priorities, framework, alignment, agility, engagement, organization, cultural attributes
    
CEB
Published By: Gigaom     Published Date: Oct 07, 2019
While interest in Machine Learning/Artificial Intelligence/ (ML/AI) has never been higher, the number of companies deploying it is only a subset, and successful implementations a smaller proportion still. The problem isn’t the technology; that part is working great. But the mere presence and provision of tools, algorithms, and frameworks aren’t enough. What’s missing is the attitude, appreciation, and approach necessary to drive adoption and working solutions. To learn more, join us for this free 1-hour webinar from GigaOm Research. The webinar features GigaOm analyst Andrew Brust and panelists Jen Stirrup, Lillian Pierson, and special guest from Cloudera Fast Forward Labs, Alice Albrecht. Our panel members are seasoned veterans in the database and analytics consulting world, each with a track record of successful implementations. They’ll explain how to go beyond the fascination phase of new technology towards the battened down methodologies necessary to build bulletproof solutions th
Tags : 
    
Gigaom
Start   Previous    4 5 6 7 8 9 10 11 12 13 14 15 16 17 18    Next    End
Search      
Already a subscriber? Log in here
Please note you must now log in with your email address and password.