it strategy

Results 1901 - 1925 of 2122Sort Results By: Published Date | Title | Company Name
Published By: SAP     Published Date: Nov 22, 2011
Explore the Aberdeen e-book "High-Performance Organizations Empower Employees with Real-Time Mobile Analytics" - and see how you can get the edge. Hear from industry experts how to effectively roll out your mobile analytics strategy, and empower your front-line workers with real-time insight and tools. Don't confine intelligent decisions to desktops - be ahead of the mobile analytics curve.
Tags : 
sap, mobile, mobile analytics, real-time, technology, high-performance
    
SAP
Published By: Absolute Software     Published Date: Nov 21, 2011
Learn about best practices in the management and security of IT assets and the sensitive information they contain.
Tags : 
security, strategy, healthcare, absolute, it assets, sensitive information, phi, ehr, asset security strategy, patients, employees, best practices, reportable incidents
    
Absolute Software
Published By: ScriptLogic     Published Date: Nov 14, 2011
In this whitepaper, you'll get an idea of a very different migration strategy -- moving your users and their desktops to Windows 7.
Tags : 
windows 7, migration, operating system
    
ScriptLogic
Published By: Gleanster Research     Published Date: Nov 10, 2011
This Gleansight benchmark report is based on the experiences of 229 companies and includes the following sections: Reasons to Implement, Challenges, Value Drivers, Core Technologies and Success Story. It also includes a Vendor Landscape with descriptions and analysis of 32 solution providers. Most organizations today have business intelligence (BI) tools or at least some way of churning out reports. Fewer have a true business intelligence strategy or a well-architected BI platform for generating actionable insights. Broadly considered, BI encompasses all aspects of gathering, storing, cleansing, analyzing and distributing data. This Gleansight benchmark report reveals how Top Performers are justifying their investments in next-generation BI capabilities, how they're overcoming implementation and organizational hurdles, and how, as a result of their investments, they're now able to make more timely and better informed business decisions across multiple organizational functions.
Tags : 
gleanster, business, benchmark, business intelligence, roi
    
Gleanster Research
Published By: Reevoo     Published Date: Nov 03, 2011
Facebook is not the only social commerce tool out there. Read this whitepaper to learn more about the trends and create a successful strategy.
Tags : 
facebook, social, social commerce, reevoo, trends, marketing, strategy, promotion, f-store, social network
    
Reevoo
Published By: Radian6     Published Date: Oct 26, 2011
This eBook by Brent Leary highlights how companies are integrating social tools and strategies in today's business environment.
Tags : 
social media, ebook, retention, social strategy, brent leary, social media marketing, crm, saas, social media monitoring, best practices, social strategy
    
Radian6
Published By: Adaptive Planning     Published Date: Oct 19, 2011
It's inefficient, ages too quickly, and is out of sync with the strategic plan. No wonder so many executives hate toiling over the annual budget. But, says Peter Horvath, don't look to the budget as the sole management system. Horvath and his associate Ralf Sauter describe six ways to fix budgeting, including integrating it with such systems as the Balanced Scorecard, so that it supports strategy execution in today's fast-changing environment.
Tags : 
adaptive, marketry, business, finance, accounting, budget
    
Adaptive Planning
Published By: EdgeWave     Published Date: Oct 15, 2011
This newly updated handbook is an invaluable tool for IT and HR professionals who need to establish rules for e-communications at their organizations.
Tags : 
e-policy best practices, web filter for enterprise, web security, email security, messaging security, best practices, handbook, edgewave, human resources, p2p, social media, blogging, blog, instant message, instant messaging, peer-to-peer, peer-2-peer, policies, filtering, security
    
EdgeWave
Published By: VeriSign Authentication Services, now a part of Symantec Corp.     Published Date: Oct 15, 2011
"The Shortcut Guide to Business Security Measures Using SSL" examines current information security threats to business and describes techniques for developing a security management strategy that leverages established best practices.
Tags : 
extended validation, measures, green bar, online security, optimize, sgc, server gated cryptography, verisign, trust marks, security, ssl technology, malware, it infrastructure, operating systems, hacking, phishing, dos, cybercrime, bot herders, cloud computing
    
VeriSign Authentication Services, now a part of Symantec Corp.
Published By: snagajob     Published Date: Oct 14, 2011
Seasonal staffing decisions are among the most critical you will make. And the strategy is not what you'd expect. Learn how to build a successful seasonal staffing plan from the experts at Snagajob.
Tags : 
seasonal hiring, seasonal staffing, holiday hiring, holiday staffing, retail hiring, hiring strategies, hiring best practices, holiday hiring strategy
    
snagajob
Published By: Virtela Communications, Inc.     Published Date: Oct 13, 2011
Christian Kane is an Enterprise Mobility Management Research Analyst with Forrester Research, where he helps clients develop and improve their desktop and mobile strategy. His research spans mobile hardware, mobile operating systems, mobile device management solutions, and mobile applications.
Tags : 
cloud computing, technology, virtela, device management, christian kane, mobility management, research
    
Virtela Communications, Inc.
Published By: Skillsoft     Published Date: Oct 13, 2011
From understanding the potential of e-learning to understanding how to measure its ROI, Dorman Woodall, director of Skillsoft Learning addresses the eight key questions to ask of your e-learning strategy.
Tags : 
skillsoft, technology, human resources, e-learning, roi, dorman woodall
    
Skillsoft
Published By: Dell Mobility     Published Date: Oct 12, 2011
Download this report and learn how to build your mobile consumerization strategy
Tags : 
dell, mobility, solutions, servers, storage, datacenter, client refresh, wireless, mobility, workstation productivity, mobile phones, smartphones, smart phones, touch screen phones, pda phones, infrastructure, consumerization, strategy
    
Dell Mobility
Published By: Secunia     Published Date: Oct 12, 2011
Measurements within this white paper demonstrate that an intelligent patching strategy is an effective approach for reducing vulnerability risks.
Tags : 
vulnerability assessment, internet security, windows patching, exploit definition, endpoint security, microsoft patch management, patch management policy, vulnerability intelligence, solutions, inspector, software, secure, vital, protect, networks, endpoints, zeroboard, patch, patch manager, tools
    
Secunia
Published By: Absolute Software     Published Date: Sep 09, 2011
Security professionals are wondering how to best deal with the oncoming tide of personal mobile devices finding their way into the workplace. Download this research report to learn some key areas of consideration before moving ahead with a mobile implementations strategy.
Tags : 
absolute, managing security, risk challenges, mobile devices, it implementation, secure processes
    
Absolute Software
Published By: YouSendIt     Published Date: Sep 08, 2011
This helps to answer the critical question about what are the best opportunities for IT to deliver short- and long-term business value without diverting limited resources from IT's front-line goals of keeping business running.
Tags : 
yousendit, it leaders, dortch, business value, front-line goals, growth strategy, collaborative application
    
YouSendIt
Published By: Absolute Software     Published Date: Sep 06, 2011
Forrester Research and Absolute Software discuss the importance for IT to create a "layered approach" for endpoint security and management
Tags : 
absolute, intel, laptop, saas, lock down, rapid recovery, stolen, data defense, theft deterrence, pc protection, tpm, trusted platform module, anti theft, data breach, password protection, password, encryption, security
    
Absolute Software
Published By: Spredfast, Inc.     Published Date: Aug 30, 2011
Learn how to plan and execute successful social media initiatives with this 28-page framework including best practices on developing your social media strategy, writing day-to-day content and managing your social media team.
Tags : 
spredfast, social media management, social media strategy, social media planning, twitter, facebook, linkedin, youtube, flickr, social business, engagement, awareness, monitoring
    
Spredfast, Inc.
Published By: VMware     Published Date: Aug 23, 2011
The road map outlines a set of evolving objectives, challenges, required competencies, and success measures needed to transform IT from a cost center to a strategic value driver. It is designed to address key success factors at the executive sponsorship level and at the infrastructure level.
Tags : 
vmware, cloud computing strategy, virtualization, private cloud, it value transformation, roadmap
    
VMware
Published By: UNIT4 CODA     Published Date: Aug 22, 2011
Financial executives need to have a no-compromise approach to financial modeling and application choice, irrespective of where these applications are deployed.
Tags : 
unit4 coda, best-of-class strategy, cloud computing, saas, aberdeen group, financial executives, financial modeling, applications choice, business applications, cfo, financial management, solution deployment methods
    
UNIT4 CODA
Published By: VMware     Published Date: Aug 18, 2011
Virtualization is just one step in a much larger transition. This publication builds on powerful insights from Gartner research to articulate a cloud computing strategy that minimizes problems and maximizes ROI.
Tags : 
vmware, gartner, virtualization, cloud computing, roi, bottom line, hybrid cloud, private cloud, public cloud, server virtualization
    
VMware
Published By: TDi Technologies     Published Date: Aug 16, 2011
Configuration ports on critical and non-critical cyber assets are often misunderstood and overlooked in the overall cyber security strategy.
Tags : 
    
TDi Technologies
Published By: Sysomos     Published Date: Aug 01, 2011
This paper is designed to help individuals responsible for portions of their company's websites - PR and IR, professionals, marketing, product and HR managers, to name a few - be more effective.
Tags : 
marketwire, b2b marketers, content marketing, roi, social media, inbound marketing, conversation, rich web content, search engine visibility, content strategy
    
Sysomos
Published By: Trend Micro, Inc.     Published Date: Jul 19, 2011
In a new video, security analyst Rich Mogull discusses mobile data protection topics and addresses many issues, including, the latest trends in mobile security, mobile device management, and mobile data protection.
Tags : 
trend micro, internet content security, smart protection network, internet security, enterprise business security, worry-free business security, web threat management, australia, cloud, android mobile security, antivirus, consumerisation of it, enterprise mobile management, enterprise mobile security, enterprise network security, mobile device management, ipad mobile device, ipad, iphone, it strategy
    
Trend Micro, Inc.
Published By: Trend Micro, Inc.     Published Date: Jul 19, 2011
Maintain visibility and control, regardless of device or OS. The consumerisation of enterprise information technology is one of the most significant security concerns today. Gartner's Analyst Ken Delaney explains the impact of consumerisation on enterprise IT.
Tags : 
trend micro, internet content security, smart protection network, internet security, enterprise business security, worry-free business security, web threat management, australia, cloud, android mobile security, antivirus, consumerisation of it, enterprise mobile management, enterprise mobile security, enterprise network security, mobile device management, ipad mobile device, ipad, iphone, it strategy
    
Trend Micro, Inc.
Start   Previous    76 77 78 79 80 81 82 83 84 85    Next    End
Search      
Already a subscriber? Log in here
Please note you must now log in with your email address and password.