change management

Results 201 - 225 of 408Sort Results By: Published Date | Title | Company Name
Published By: Jobvite     Published Date: Aug 25, 2016
The talent acquisition market has changed dramatically. It is no longer just about placing ads on different sites and waiting for the resumes to roll in. Rather, it’s ferreting out those passive candidates and convincing them that your company is where they can shine and grow in their profession. Today’s recruiters must proactively search, find, and nurture candidates in this tough job market, and they need good tools to do this. In Forrester’s 45 criteria evaluation of talent acquisition vendors, we identified the 12 most significant software providers — ADP, Cornerstone OnDemand, Findly, IBM Kenexa, iCIMS, Jobvite, Lumesse, Oracle, PageUp People, PeopleFluent, SuccessFactors, and Technomedia — in the talent acquisition category that provide both applicant tracking system (ATS) and various levels of talent relationship management (TRM) functionality in their recruiting offering. This report details our findings about how well each vendor fulfills our criteria and where they stand in r
Tags : 
    
Jobvite
Published By: Tripwire     Published Date: Oct 14, 2010
Now smart CISOs are looking to lockdown the enterprise to achieve continuous compliance and narrow the breach-to-detection gap with baseline controls in configuration and change management.
Tags : 
tripwire, breach, detection, security, configuration and change management, compliance, intrusion detection, intrusion prevention, security management, configuration management
    
Tripwire
Published By: IBM     Published Date: Jul 23, 2009
Companies that successfully introduce a new requirements-engineering process not only change their process and technology but also change their thinking. While improving your requirements management and analysis practices, this step-by-step guide can help you accelerate change and process acceptance across your organization. Learn more today!
Tags : 
ibm, telelogic, doors, enterprise applications, business management, business process management, customer relationship management
    
IBM
Published By: IBM     Published Date: Jul 23, 2009
ECM can and should be applied across the enterprise as a whole. Focusing on ECM as described in this free white paper offers a disciplined, pragmatic approach to predicting and managing all types of change across an enterprise, while potentially delivering proven cost benefits and efficiency improvements throughout the organization. Learn more today!
Tags : 
ibm, ibm telelogic, enterprise change management, ecm, change management, enterprise applications
    
IBM
Published By: IBM     Published Date: Aug 24, 2009
Making changes to database schemas can often be complex and error prone. Changes impact dependent objects and sometimes even the underlying data, and the stakes are high.
Tags : 
iuui
    
IBM
Published By: WebEx     Published Date: Apr 02, 2009
This report represents the summary findings of our thirteenth annual survey of challenges impacting sales performance today. We identify and analyze these challenges, and examine how organizations are leveraging people, processes, technology, and knowledge to address these issues successfully. In addition, beginning in the Executive Summary and continuing throughout the report, we raise questions about troubling trends and offer a new model for overcoming the problematic issues related to the field of sales.
Tags : 
webex, sales performance optimization, crm, sales force demographics, sell cycle analysis, detailed performance assessment, change analysis, sales knowledge management, skm, business-to-business, b2b, b2c, sales performance optimization, knowledge management, enterprise applications, customer relationship management
    
WebEx
Published By: WebEx.     Published Date: Apr 03, 2009
This report represents the summary findings of our thirteenth annual survey of challenges impacting sales performance today. We identify and analyze these challenges, and examine how organizations are leveraging people, processes, technology, and knowledge to address these issues successfully. In addition, beginning in the Executive Summary and continuing throughout the report, we raise questions about troubling trends and offer a new model for overcoming the problematic issues related to the field of sales.
Tags : 
webex, sales performance optimization, crm, sales force demographics, sell cycle analysis, detailed performance assessment, change analysis, sales knowledge management, skm, business-to-business, b2b, b2c, sales performance optimization
    
WebEx.
Published By: Bazaarvoice     Published Date: Nov 05, 2014
It’s no longer enough to think of consumers as online vs. in-store. The mobile shopper is neither and both of these, becoming the norm rather than the exception. “7 Ways the Mobile Consumer Changes Everything” reveals new research.
Tags : 
bazaarvoice, mobile consumer, consumer changes, infographic, mobile use, social, mobile conversation, mobile shoppers, consumer feedback, change management, best practices, business intelligence
    
Bazaarvoice
Published By: Bazaarvoice     Published Date: Nov 05, 2014
It’s no longer enough to think of consumers as online vs. in-store. The mobile shopper is neither and both of these, becoming the norm rather than the exception. Download the new research “7 Ways the Mobile Consumer Changes Everything” now.
Tags : 
bazaarvoice, mobile consumer, consumer changes, infographic, mobile use, social, mobile conversation, mobile shoppers, consumer feedback, change management
    
Bazaarvoice
Published By: NetApp     Published Date: Dec 01, 2009
This paper addresses the many Exchange, SQL Server, and SharePoint implementations running on inefficient storage infrastructures, limiting scalability and complicating what should be fairly simple storage management tasks.
Tags : 
netapp, esg, storage efficiency, microsoft application environments, xchange, sql server, sharepoint, storage management, operating system, server virtualization, hyper-v, storage virtualization
    
NetApp
Published By: Kaseya     Published Date: Feb 16, 2011
The goal for this suite is to give you ITIL in a box. This release includes Incident Management, Service Request Management, Problem Management and Change Management.
Tags : 
kaseya, itil, incident management, service request management, problem management, change management, service desk, service management, desktop management
    
Kaseya
Published By: TIBCO     Published Date: May 15, 2013
This informative webinar focuses on the impact that mobile brings to your enterprise- to your enterprise architecture, changes in development, and how you can use mobile as a driver for change moving forward. Continue for an analysis of the challenges surrounding enterprise mobility.
Tags : 
mobile, enterprise architecture, development, enterprise, change management, network architecture, network management, network performance, network performance management, network provisioning, application integration, application performance management, best practices, business intelligence, business management, productivity
    
TIBCO
Published By: Lumension     Published Date: Feb 07, 2014
Do you know about advanced threats? Would you know how to deal with them? This white paper will teach you the 5 tactics for dealing with those advanced persistent threats.
Tags : 
lumension, persistent threats, information security, it regimes, threat solution, risk mitigation, vulnerability management, layered defenses, e-security, targeted phishing, organized attacks, apt attacks, computer security, infrastructure, encryption, business scanning, content control, patch management, change management, test environment
    
Lumension
Published By: Lumension     Published Date: Feb 07, 2014
Memory injections are on the rise. And traditional endpoint security tools can do little to stop them. Here’s what you need to know about memory-based attacks—and how to effectively protect against them.
Tags : 
lumension, persistent threats, memory-based attacks, information security, it regimes, threat solution, risk mitigation, data security products, vulnerability management, layered defenses, e-security, targeted phishing, organized attacks, apt attacks, computer security, infrastructure, whitelisting solutions, application control, encryption, business scanning
    
Lumension
Published By: Lumension     Published Date: Jun 03, 2015
The volume and sophistication of malware is skyrocketing, and traditional anti-virus approaches are struggling to keep up. It’s time to rethink how we protect our endpoints. Instead of trying to build a better anti-virus “mousetrap,” without any shift in the underlying management model for vetting change in endpoint environments, security professionals should investigate more innovative approaches to endpoint security that can automate trusted change policies. This paper discusses an innovative approach to application whitelisting – one that integrates application control, anti-virus, patch management and a trusted change management engine into one unified solution – to improve endpoint security and provide the necessary flexibility to optimize IT operations and user productivity.
Tags : 
anti-virus, security, application, management, patch, anti virus, application security, patch management, database development, database security
    
Lumension
Published By: Marketo     Published Date: Oct 03, 2014
Today, CEOs expect their CMOs to be leaders in digital business innovation and growth. But even though marketing automation is at the center of the marketer’s ability to lead digital growth, enterprise marketers are some of its slowest adopters.
Tags : 
marketo, marketing automation, crm, marketing automation platform, digital business, change management, lead management
    
Marketo
Published By: AtTask     Published Date: Jul 17, 2014
When it comes to project management, we tend to talk about the tactical—the assignments, the tasks, the approvals, and so on. But business is evolving, and many project teams are now being asked to lead change, instead of just timelines and milestones. This evolution is accelerating and is driven by fresh thinking and business necessity supported by advanced technologies that are highly accessible to a much broader range of contributors. Effectively managing work is no longer just the role of a few specialists. In this Whitepaper you will learn lessons from 40 PPM experts on making the transition from project management to project leadership.
Tags : 
at task, it organizations, work requests, technology changes, project updates, status reports, project management, knowledge management, enterprise applications
    
AtTask
Published By: AtTask     Published Date: Jul 17, 2014
Rapid changes in both technology and business mean that IT departments are constantly barraged with new projects whether it's writing a web app or implementing new infrastructure for mobile application. It's a challenge just to stay ahead of the curve. This Whitepaper examines the top 10 every day pains that prevent IT managers from getting work done and offers some new and trusted solutions for improving your productivity.
Tags : 
at task, it organizations, work requests, technology changes, project updates, status reports, project management, knowledge management, enterprise applications
    
AtTask
Published By: Aasonn     Published Date: Sep 26, 2014
Download to hear individual reflections and advice from SuccessFactors customers on their implementation journey. Personally listen to the unique takeaways and recommendations from the world’s most experienced Implementation Consultants, Project Managers, SAP Solution Architects, Sales Executives and Strategic Change Management Consultants. Here is your chance to get the insiders view.
Tags : 
aasonn, successfactors, hr project, customer experiences, human resources
    
Aasonn
Published By: Lumension     Published Date: Jun 05, 2015
The volume and sophistication of malware is skyrocketing, and traditional anti-virus approaches are struggling to keep up. It’s time to rethink how we protect our endpoints. Instead of trying to build a better anti-virus “mousetrap,” without any shift in the underlying management model for vetting change in endpoint environments, security professionals should investigate more innovative approaches to endpoint security that can automate trusted change policies. This paper discusses an innovative approach to application whitelisting – one that integrates application control, anti-virus, patch management and a trusted change management engine into one unified solution – to improve endpoint security and provide the necessary flexibility to optimize IT operations and user productivity.
Tags : 
anti-virus, security, application, management, patch, anti virus, application security, patch management, database development, database security
    
Lumension
Published By: Demand Frontier     Published Date: Mar 03, 2016
A plan for modernizing your marketing
Tags : 
market, management, marketing, business optimization, business strategies, network management, content delivery
    
Demand Frontier
Published By: VMware     Published Date: Feb 24, 2017
As enterprises embrace adoption of Microsoft Office 365 to drive business and alleviate the complexity and costs associated with on-premise Exchange environments, achieving a balance between identity management and user experience is often difficult. In this white paper, discover how VMware AirWatch® Enterprise Mobility Management (EMM) can easily integrate with Office 365 APIs, VMware Identity Manager, and an enterprise’s existing cloud, or on-premise, identity management solution to optimize user experience and ensure data is secure across all devices and platforms.
Tags : 
    
VMware
Published By: VMware     Published Date: Feb 24, 2017
As enterprises embrace adoption of Microsoft Office 365 to drive business and alleviate the complexity and costs associated with on-premise Exchange environments, achieving a balance between identity management and user experience is often difficult. In this white paper, discover how VMware AirWatch® Enterprise Mobility Management (EMM) can easily integrate with Office 365 APIs, VMware Identity Manager, and an enterprise’s existing cloud, or on-premise, identity management solution to optimize user experience and ensure data is secure across all devices and platforms.
Tags : 
    
VMware
Published By: VMware     Published Date: Feb 24, 2017
As enterprises embrace adoption of Microsoft Office 365 to drive business and alleviate the complexity and costs associated with on-premise Exchange environments, achieving a balance between identity management and user experience is often difficult. In this white paper, discover how VMware AirWatch® Enterprise Mobility Management (EMM) can easily integrate with Office 365 APIs, VMware Identity Manager, and an enterprise’s existing cloud, or on-premise, identity management solution to optimize user experience and ensure data is secure across all devices and platforms.
Tags : 
    
VMware
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search Resource Library      

Add Resources

Get your company's resources in the hands of targeted business professionals.