pda

Results 201 - 225 of 410Sort Results By: Published Date | Title | Company Name
Published By: Infosys     Published Date: May 21, 2018
Our client was something of a niche retail brand - with an enormous heritage and reputation, yet in order to exploit the opportunities in an increasingly online world, they needed to embark on a digitization journey. The digitization program was extensive and touched many parts of the company operations. Already drawn up was a high-level list of 20 different areas that would put the brand firmly on it digital transformation journey. At the top of the list was perhaps the most business-critical project of all - updating the e-commerce platform - and that is where we began.
Tags : 
e-commerce, business, corporation, client, digitization
    
Infosys
Published By: Veeam '18     Published Date: Mar 13, 2018
Windows Server 2016 has been generally available since October 2016. This eBook has been updated to provide the latest and greatest additions within Window Server 2016 as it applies to virtualization; Hyper-V. This is the main topic we will be discussing in this eBook, Windows Server 2016 Virtualization — also known as Hyper-V 2016. Components within Hyper-V are updated or additional functionality is added with each release of Windows Server. Knowing this is important to understanding the increased functionality as well as the overall usability of Windows Server through documents such as this. Many of the new features and functionalities do require some basic usage of PowerShell. Throughout this eBook you will find sample PowerShell scripts documented as examples allowing IT professionals to leverage Hyper-V PowerShell within their own environments.
Tags : 
microsoft, windows, server, technology, organization, optimization
    
Veeam '18
Published By: iShares by BlackRock     Published Date: Apr 19, 2018
We update our three 2018 investment themes against a backdrop of synchronized global growth, rising inflation and interest rates, higher equity market volatility and more economic uncertainty. By submitting this form you agree to share your contact information with BlackRock and to follow-up communication. Investing involves risk, including possible loss of principal. Prepared by BlackRock Investments, LLC. iSHARES and BLACKROCK are registered trademarks of BlackRock, Inc., or its subsidiaries. All other marks are the property of their respective owners. BlackRock, Inc. is not affiliated with The Economist. 483635
Tags : 
ishares, institutional investors, global growth, trade wars, business management, business metrics, asset management, commodities, financial advisors, finance
    
iShares by BlackRock
Published By: Infosys     Published Date: Jun 12, 2018
Testing is often a major pain point for enterprises when taking new products to market, and can make or break customer loyalty. Testing speed impacts how fast the product can be rolled out to markets, with regular updates, while the quality of testing can determine the product’s success. So how can product testing be done better, faster, and in a more agile manner? A global CPG giant was looking to solve the same problem when it wanted to take its customer loyalty app to 18 countries. See how Infosys helped and the five key takeaways from the project.
Tags : 
brand, customer, loyalty, market, infosys
    
Infosys
Published By: Lenovo and Intel     Published Date: Jul 10, 2018
The risk of cyber attacks and the cost of failure are increasing. Penalties associated with failure are only going to increase. And these challenges are compounded by increasing collaboration, use of cloud-based solutions, and an increasingly mobile workforce. Join experts from Forrester, Lenovo and Microsoft as they explore Forrester’s newly updated Zero Trust Extended framework. Then Lenovo covers how the four core components of its Data, Identity, Online and Device (DIODe) approach can minimize risk to data and critical IT. By taking these important steps toward a full Zero Trust Extended framework, you can: Protect the business from advanced threats Reduce the impact of breaches Easily support new business and operating models Rise to the challenge of evolving regulations like FISMA, HIPPA, PCI and GDPR
Tags : 
    
Lenovo and Intel
Published By: Okta APAC     Published Date: Dec 19, 2018
Cost savings, storage, ease of updates. The allure of the cloud is hard to ignore, with some reports citing over 90% of organizations using cloud services in some manner. But all the benefits of the cloud disappear if you can't keep your data and users safe. In a perimeter-less world, it's identity that becomes the heart of security. Join us to discover why modern security starts with identity first and how identity can help overcome cloud frustrations. We would like to keep you in our database in order to send you product, service, and event announcements from Okta, and to share your information with certain service providers and partners, as described in detail here You may unsubscribe from Okta’s mailing list at any time, by following this process. Additional details about Okta’s privacy practices are available in our Privacy policy.
Tags : 
    
Okta APAC
Published By: Oracle HCM Cloud     Published Date: May 25, 2017
"Successful talent acquisition today puts candidates front and center. To accomplish the goals of recruiting and retaining top talent, providing excellent patient care, and consolidating healthcare with partners, payers need to think cost effectively. Updating talent acquisition tactics and technologies doesn't have to be expensive, though. Take note of how Best-in-Class companies recruit, hire, onboard, and retain employees. Learn more."
Tags : 
    
Oracle HCM Cloud
Published By: Dell Software     Published Date: Jul 24, 2012
Quest Workspacetm Privilege Manager lets IT administrators grant selected privileges to users so they can update their own PCs, reducing help desk calls while maintaining a secure network. Elevate and manage user rights quickly and precisely with our Validation Logic targeting technology. Use privilege elevation rules from the Privilege Authority Community Edition, or create your own rules and allow administrator-level access to only the applications, Windows processes and ActiveX controls you deem safe.
Tags : 
user access, network security, verify files, elevate activex, setup.exe, setup.msi, elevate applications, target workstations, target validation logic, delegate privilege management, access phone support, access email support, digital certificate verification, windows, activex, knowledge management, data management, productivity, project management, desktop management
    
Dell Software
Published By: Motorola     Published Date: Aug 09, 2007
In this paper, two case studies illustrate different approaches to unlocking the value of existing investments through mobilization. Each case study provides an overview of an application we mobilized, identifies the characteristics that made the application a good candidate and explains the value realized by enabling access to these applications from mobile devices.
Tags : 
applications, mobile applications, mobility, mobilization, pda application, optimizing applications, mobile computing, mobile workers, productivity, treo, smartphone, smart phone, blackberry, motorola, good technology, application optimization, pda, smart phones, wireless application software, wireless communications
    
Motorola
Published By: Motorola     Published Date: Feb 06, 2008
The need for the services provided by Specially for Children has continued to increase, placing extra demands on the group's physicians. To improve their efficiency, doctors began carrying multiple devices including cell phones, pagers and PDAs. Learn how Good Mobile Messaging helped the organization streamline its operation.
Tags : 
motorola, motorola good, case study, mobile workers, wireless communications
    
Motorola
Published By: Marketo     Published Date: Mar 22, 2018
Advertising on social media platforms has changed tremendously. Recent updates to many social networks' algorithms give users a better experience—one with less promotional content and more relevant content that they want to see. This means that, as a marketer, you need to supplement your organic posts with paid promotion to get your posts seen by your audience. Download this eBook to learn more!
Tags : 
    
Marketo
Published By: vWire     Published Date: Dec 02, 2009
vWire makes that process simple, and this white paper will go through the steps of upgrading the environment from ESXi 3.5.0 Update 4 to ESXi 4.0.
Tags : 
upgrade vmware vsphere 4.0, vwire 1.1, vsphere esxi, virtual hardware 3, tripwire, vwire, backup and recovery, storage management, storage virtualization, server virtualization
    
vWire
Published By: Shavlik Technologies     Published Date: Dec 15, 2010
Now you can have easy SaaS-based Discovery and Reporting on all Physical and Virtual Systems, Security Update Status and Assets in Minutes.
Tags : 
shavlik, cloud-based it management, saas, discovery and reporting, virtual systems, security update, netchk protect, virtual infrastructure, infrastructure, storage virtualization, server virtualization, cloud computing
    
Shavlik Technologies
Published By: Success Factors     Published Date: Feb 06, 2014
Keeping up with the speed of business is rarely easy, but with iContent, your organization can keep pace with its learning needs. Don’t wait to make a move until courses fail to load or slow down, course completions and scores aren’t tracked, or critical content updates don’t occur, jeopardizing compliance.
Tags : 
successfactors, learning management system, lms, e-learning, icontent, human resources, employee performance
    
Success Factors
Published By: Dell     Published Date: Mar 02, 2012
By now the fundamentals of computer and network security are familiar to almost everyone who interacts with a PC on a regular basis: install antivirus software, choose good passwords and protect them and download and install software updates. Despite these measures, businesses of all sizes continue to suffer security breaches.
Tags : 
dell, mobile data, mobile devices, smartphones, it planning, technology, it management, small business, technology trenfs, mobile computing, mobile data systems, smart phones, wireless application software, wireless communications, wireless infrastructure
    
Dell
Published By: Riverbed     Published Date: Oct 09, 2012
The enormity of a consolidation effort in a global organization can be daunting, but the rewards are compelling. To get a step in the right direction, download this informative report from Forrester Consulting to find out how organizations are successfully consolidating their environments using advanced WAN optimization solutions along with an updated vocabulary and adjusted business approaches to drive greater business value from IT infrastructure.
Tags : 
it infrastructure, data, virtualization, optimization, servers, wan optimization, it management, enterprise applications
    
Riverbed
Published By: Adobe     Published Date: May 22, 2012
How will trends in search, mobile, and social media impact your marketing strategy this year? Download our latest Global Digital Advertising Update to find out.
Tags : 
adobe, marketing, social media, emerging marketing, media, digital, digital advertising
    
Adobe
Published By: CDW Vmware     Published Date: Aug 02, 2012
As Tarkett Inc. continued to enjoy years of growth they realized their data center was in dire need of an update. It was strewn across eight locations with aging equipment and limited backup power. Tarkett turned to CDW to update and optimize their data center without affecting day-to-day business.
Tags : 
tarkett, case, study, optimizing, data, center, growth, backup, power, cdw, security, comliance, update, san, ibm, bladecenter, vmware, continuity, infrastructure, it management
    
CDW Vmware
Published By: CDW Symantec     Published Date: Aug 02, 2012
Read how chief information security officers (CISOs) view the state of mobile computing. This whitepaper discusses the importance of mobile enablement, policy updates, pertinent security practices and what organizations have done to secure their business mobility.
Tags : 
ciso, mobile, computing, security, idg, symantec, managers, enterprise, email, devices, apps, it management, mobile computing, mobile data systems, mobile workers, cloud computing, infrastructure
    
CDW Symantec
Published By: Oracle Service Cloud     Published Date: Mar 23, 2016
This document defines Oracle’s Customer Experience (CX) Value Equation as the strategic method to identify and measure the value of organizational CX. This model was originally documented in “CX Metrics and KPIs – September 2012.” It has received wide support, and has been the #1 searched hit and downloaded CX KPI document for 3+ years – a significant achievement in this industry – in an era where concepts are replaced daily with the latest, greatest fad. Since the original publication, I have received significant feedback that has been overwhelmingly positive, but with a request to comment on additional topics – most notably: brand impact, shared services, and Oracle’s Road to Modern. This updated paper leverages the original work, adds information around these additional topics and incorporates our continued client experience.
Tags : 
oracle, service cloud, service management, customer interaction, application integration, best practices, business analytics, business intelligence, customer interaction service
    
Oracle Service Cloud
Published By: VMware     Published Date: Nov 07, 2016
In today’s digital economy, the ability to bring new software applications and updates to market quickly is a key to competitive advantage. For companies in diverse industries, the goal is the same: Get high-quality software into production as fast as possible. In this quest to accelerate release cycles, organizations must get beyond historical barriers that impede the rapid delivery of the software that keeps an enterprise competitive. In too many cases, processes tend to be inefficient, slow, and prone to failed releases. Much of the blame for the problem can be laid at the feet of organizational structures that mandate conflicting goals for the two key departments at either end of the application development chain: development/testing (dev/test) and operations. Where dev/test teams want to push their applications and updates into production quickly, operations teams want to go more slowly in order to maintain control and keep applications and systems available.
Tags : 
    
VMware
Published By: InfoPro Learning     Published Date: May 24, 2017
Learning content is an investment and with most companies having a portfolio of over $18 million tied up in content, this represents a significant investment. Unfortunately, this investment depreciates at an alarming rate. In fact, most content is completely unusable for any number of reasons after only four years. Infopro Learning has created a guide that helps companies to extend the shelf life of their content using a modernization strategy. This strategy not only applies to the one-time effort of updating legacy content, but it also provides information about how to future-proof new content. In addition, companies that follow the modernization strategy can significantly decrease content production costs and timelines by leveraging evergreen content that already exists in their training portfolio.
Tags : 
elearning, content development, learning content development, learning strategy, content modernization, web based training, corporate training, training programs, training content, content library, wbt
    
InfoPro Learning
Published By: Canon Solutions America     Published Date: Feb 28, 2019
Fully updated for 2019, this guide covers the latest technologies and best practices for print, device, document, information, and cybersecurity. Learn how you can help maintain the confidentiality, integrity, and availability of health records throughout your organization.
Tags : 
phi security, healthcare data privacy, data protection in healthcare, ehr solutions, ehr security, electronic health records management, hipaa breach, hipaa compliance checklist, hipaa security, how to be hipaa compliant, hipaa compliant printing, healthcare data breach, security breaches in healthcare
    
Canon Solutions America
Published By: Mainline Information Systems     Published Date: Oct 20, 2009
This webcast will provide an overview of a very effective technology called Continuous Data Protection (CDP) also called continuous backup or real-time backup. CDP offers a valuable disk-based technology that enables a business to recover data to any point-in-time quickly and easily.
Tags : 
continuous data protection, cdp, mainline information systems, real-time backup, recover data, data protection, replication, cdp & ha, backup and recovery, data replication
    
Mainline Information Systems
Published By: Mainline Information Systems     Published Date: Oct 20, 2009
IBM adds innovation leadership, making the new System x HS22 Servers the most cost effective, resilient & energy efficient solutions available! Find out more in the IBM System x, HS22 & Virtualization Update.
Tags : 
ibm system x, virtualization, mainline information systems, hs22 servers, bladecenter, configuration & management tools, green- energy, blade servers, return on investment, server virtualization, green computing
    
Mainline Information Systems
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search Resource Library      

Add Resources

Get your company's resources in the hands of targeted business professionals.