service management

Results 1 - 25 of 1383Sort Results By: Published Date | Title | Company Name
Published By: Here Technologies     Published Date: Mar 29, 2019
By making use of the right technology, transportation and logistics (T&L) companies can reinvent their industry with superior customer service, increased revenues, and reduced costs. This whitepaper looks at the obstacles facing the T&L industry and examines how fleet planning and trip analysis software businesses can help by enabling faster and smarter data-driven decision-making. As the world’s leading location platform in 2018 (Source: Ovum and Counterpoint Research annual indexes) HERE can help T&L companies improve fleet management.
Tags : 
here technologies, transport and logistics
    
Here Technologies
Published By: Here Technologies     Published Date: Mar 29, 2019
Discover the four big trends in fleet management being powered by location services. Trends to help you differentiate your solutions and enable transportation companies to overcome their logistical challenges and increase asset utilization. Discover what’s making the biggest impact, together with how, by integrating some of these trends into your solutions, you can position yourself as the service provider of choice in fleet and transportation management solutions. And find out how HERE is delivering features, from comprehensive mapping capabilities and real-time location data, to truck-specific attributes, to help you do just that. Download the eBook now
Tags : 
here technologies, transport and logistics
    
Here Technologies
Published By: CheckMarx     Published Date: Apr 03, 2019
In the early years of software development, you would often design it, build it, and only then think about how to secure it. This was arguably fine in the days of monolithic applications and closed networks, when good perimeter-based protection and effective identity and access management would get you a long way towards minimising the risk. In today’s highly connected, API-driven application environments, however, any given software component or service can be invoked and potentially abused in so many different ways. Add to this the increasing pace of change through iterative ‘DevOps-style’ delivery and ever-faster release cycles, and many understandably assert that security management and assurance nowadays needs to be an ongoing and embedded part of the development and delivery process.
Tags : 
    
CheckMarx
Published By: Forcepoint     Published Date: May 14, 2019
IDC Infobrief: How Security Solutions Enable Cloud Success Cloud applications have transformed how organizations conduct business, increasing productivity and reducing costs. However, moving to the cloud means critical data now flows outside the organization’s traditional security boundaries. Unsurprisingly, security concerns still rank as the number one reason for not using cloud services*. This IDC InfoBrief, sponsored by Forcepoint, outlines five key security considerations and best practices for safe cloud adoption, including: Multi-cloud adoption: exposing challenges for security architectures Cloud-first and GDPR implications Cloud application visibility and control Data management and DLP in the cloud Leveraging User and Entity Behavior Analytics (UEBA) for protection Read the eBook to find out the five information security lessons learned from transitioning to the cloud. *IDC’s 2017 CloudView Survey; IDC’s 2017 CloudImpact Survey
Tags : 
    
Forcepoint
Published By: Forcepoint     Published Date: May 14, 2019
IDC Infobrief: How Security Solutions Enable Cloud Success Cloud applications have transformed how organizations conduct business, increasing productivity and reducing costs. However, moving to the cloud means critical data now flows outside the organization’s traditional security boundaries. Unsurprisingly, security concerns still rank as the number one reason for not using cloud services*. This IDC InfoBrief, sponsored by Forcepoint, outlines five key security considerations and best practices for safe cloud adoption, including: Multi-cloud adoption: exposing challenges for security architectures Cloud-first and GDPR implications Cloud application visibility and control Data management and DLP in the cloud Leveraging User and Entity Behavior Analytics (UEBA) for protection Read the eBook to find out the five information security lessons learned from transitioning to the cloud. *IDC’s 2017 CloudView Survey; IDC’s 2017 CloudImpact Survey
Tags : 
    
Forcepoint
Published By: Forcepoint     Published Date: May 14, 2019
IDC Infobrief: How Security Solutions Enable Cloud Success Cloud applications have transformed how organizations conduct business, increasing productivity and reducing costs. However, moving to the cloud means critical data now flows outside the organization’s traditional security boundaries. Unsurprisingly, security concerns still rank as the number one reason for not using cloud services*. This IDC InfoBrief, sponsored by Forcepoint, outlines five key security considerations and best practices for safe cloud adoption, including: Multi-cloud adoption: exposing challenges for security architectures Cloud-first and GDPR implications Cloud application visibility and control Data management and DLP in the cloud Leveraging User and Entity Behavior Analytics (UEBA) for protection Read the eBook to find out the five information security lessons learned from transitioning to the cloud. *IDC’s 2017 CloudView Survey; IDC’s 2017 CloudImpact Survey
Tags : 
    
Forcepoint
Published By: Gameffective     Published Date: Feb 26, 2019
Comdata Group is one of the world's largest business process outsourcing (BPO) providers. It operates hundreds of call-centers around the globe, with tens of thousands of employees offering, a variety of services, including sales and customer service. In a competitive BPO market, Comdata was looking for ways to increase the productivity and efficiency of its agents. It looked for a unified solution that would successfully engage employees, drive higher accountability and better focus them on their performance. Using Gameffective's platform, Comdata deployed gamified, real-time performance management. This process provides employees with the ability and motivation to self-track their performance against goals and benchmarks, and offers just-in-time coaching based on their needs. The results were impressive: 12% increase in sales per hour, and significant reductions in both new-hire learning curves and in ongoing training time. Read the case study to learn how Comdata: Increased emp
Tags : 
    
Gameffective
Published By: Cherwell Software     Published Date: Apr 24, 2019
Founded over a century ago for the betterment of society, The London School of Economics and Political Science (LSE) is one of the foremost social science universities in the world. The prestigious University has produced some of the leading lights in fi elds including law, economics, history and politics, with dozens of Nobel Prize winners and Members of Parliament among its alumni. Today, the LSE is home to more than 10,000 students and 3,300 staff, placing considerable demand on its IT service management team. However, as the university continued to expand in scope and complexity, its support team looked for new solutions to overcome the infl exible and outdated service management tools. Nicos Kyriacou, IMT Service Management Offi cer at LSE, explained: “We had the same tool for over a decade and it was so rigid that we were forced to adapt our working practices around it, rather than vice versa.
Tags : 
    
Cherwell Software
Published By: Cherwell Software     Published Date: Apr 24, 2019
Each year, a total of 180,000 IT service tickets are created and processed. These include requests and incidents of all kinds, such as the provision of the flight information displays, an employee request for a laptop, through to IT equipment for an airline customer. The Airport’s IT team therefore decided to undertake a complex and ambitious project, entitled “ITSM 2020,” which aimed to establish a uniform and future-oriented IT service management system that would effectively and efficiently serve all areas of Munich Airport. Munich Airport evaluated various bidders in a two stage process conducted on the basis of the European Union tendering procedures. Cherwell was able to hold its own against other ITSM solutions both technically and in terms of price.
Tags : 
    
Cherwell Software
Published By: ASG Software Solutions     Published Date: Aug 20, 2008
A forward-looking CMDB does more than keep an organization's IT operations running. It draws clear connections between IT components and business services, which is the core of Business Service Management (BSM). But even more critical than the CMDB's ability to support business as it is now, is the question of how well it will drive business innovation in the future.
Tags : 
asg, cmdb, bsm, metadata, metacmdb, lob, ecommerce, business activity monitoring, business process management, system management software, application integration, business intelligence, configuration management, web service management, content management system
    
ASG Software Solutions
Published By: ASG Software Solutions     Published Date: Jun 05, 2009
ASG's Business Service PortfolioT (BSPT) Virtualization Management provides comprehensive oversight, inspections, discoveries, warnings, diagnostics, and reporting for the critical technology and administrative disciplines involved in virtual workload management. This is all done in parallel with physical systems management.
Tags : 
asg, sla, cmdb, bsm, metadata, metacmdb, lob, ecommerce, bpm, workflow, itil, cmdmdb, service optimization, business activity monitoring, business process automation, business process management, change management, server virtualization, application integration, business intelligence
    
ASG Software Solutions
Published By: ASG Software Solutions     Published Date: Apr 30, 2008
In order to provide high quality, cost effective business services in complex, distributed environments, improved IT management strategies are required. Business Service Management (BSM) is a strategic approach to managing IT services in support of improved business performance.
Tags : 
asg, sla, cmdb, bsm, metadata, itsm, metacmdb, lob, ecommerce, bpm, workflow, itil, cmdmdb, service optimization, application performance management, best practices, business activity monitoring, business integration, business intelligence, business management
    
ASG Software Solutions
Published By: ASG Software Solutions     Published Date: Nov 03, 2008
The Information Technology Infrastructure Library (ITIL) provides guidance for the management of IT, and has quickly become the worldwide standard for IT Service Management (ITSM).
Tags : 
asg, sla, cmdb, bsm, metadata, itsm, metacmdb, lob, ecommerce, bpm, workflow, itil, cmdmdb, service optimization, application integration, application performance management, business activity monitoring, business process automation, business process management, analytical applications
    
ASG Software Solutions
Published By: ASG Software Solutions     Published Date: Aug 08, 2008
Business runs on content and that content must be managed holistically, across the entire business. However, managing content is, in itself, not enough to drive business. Enterprises must incorporate ECM with other IT management systems to provide complete Business Service Management (BSM).
Tags : 
asg, cmdb, bsm, metadata, metacmdb, lob, ecommerce, bpm, workflow, itil, cmdmdb, service optimization, business activity monitoring, business analytics, business intelligence, business management, business process management, enterprise resource planning, enterprise software, application integration
    
ASG Software Solutions
Published By: ASG Software Solutions     Published Date: Jul 27, 2009
To meet the challenges of intense competition and increasing customer demands, companies must tightly align their IT service management with business issues and priorities. This paper outlines the maturity steps involved in the progression towards proactive Business Service Management (BSM) and explains how ASG's metaCMDB helps secure its seamless adoption.
Tags : 
asg, cmdb, bsm, itil, bsm, metacmdb, configuration management, metadata, metacmdb, lob, sdm, service dependency mapping, ecommerce, bpm, workflow, itsm, critical application, cms, itsm, application integration
    
ASG Software Solutions
Published By: ASG Software Solutions     Published Date: Jun 09, 2009
Improved business productivity often requires more efficient IT and more efficient IT cannot be achieved without a better understanding of the way business services are run and delivered. Configuration Management Databases (CMDBs) have emerged as a central component for Information Technology Infrastructure Library (ITIL) and business service management (BSM).
Tags : 
asg, cmdb, bsm, itil, bsm, metacmdb, configuration management, metadata, metacmdb, lob, sdm, service dependency mapping, ecommerce, bpm, workflow, itsm, critical application, cms, itsm, application integration
    
ASG Software Solutions
Published By: ASG Software Solutions     Published Date: Apr 02, 2008
Business Service Management (BSM) is of growing importance in the IT world. By managing IT systems according to the business services they support - like order entry, online sales, shipping, or customer service - IT is able to deliver on real business goals like providing competitive advantage, improving customer satisfaction, driving revenue growth, and increasing shareholder value.
Tags : 
asg, cmdb, bsm, itil, bsm, bsp, metacmdb, configuration management, metadata, metacmdb, lob, sdm, service dependency mapping, bsm, ecommerce, bpm, workflow, itsm, critical application, cms
    
ASG Software Solutions
Published By: ASG Software Solutions     Published Date: Feb 18, 2010
Configuration Management is at the heart of the IT Infrastructure Library (ITIL®) and forms the foundation for Business Service Management (BSM). In fact, it is safe to say that neither the ITIL IT Service Management (ITSM) processes nor the BSM functions that leverage ITSM can be efficiently carried out without accurate configuration and dependency information.
Tags : 
asg, cmdb, bsm, itil, bsm, metacmdb, asg ddm, cab, configuration management, metadata, metacmdb, lob, sdm, service dependency mapping, ecommerce, bpm, workflow, itsm, critical application, cms
    
ASG Software Solutions
Published By: ASG Software Solutions     Published Date: Feb 23, 2010
There are success stories of businesses that have implemented Business Service Management (BSM) with well-documented, bottom-line results. What do these organizations know that their discouraged counterparts don't?
Tags : 
asg, cmdb, bsm, itil, bsm, metacmdb, archiving, sap, ilm, mobius, workload automation, wla, visibility, configuration management, metadata, metacmdb, lob, sdm, service dependency mapping, ecommerce
    
ASG Software Solutions
Published By: ASG Software Solutions     Published Date: Mar 10, 2010
Configuration Management is at the heart of the IT Infrastructure Library (ITIL) and forms the foundation for Business Service Management (BSM). In fact, it is safe to say that neither the ITIL IT Service Management (ITSM) processes nor the BSM functions that leverage ITSM can be efficiently carried out without accurate configuration and dependency information.
Tags : 
asg, cmdb, bsm, itil, ema, configuration management, itsm, bsm, itil, asg, ddm, cms, bsm, bsp, metacmdb, configuration management, metadata, metacmdb, lob, sdm
    
ASG Software Solutions
Published By: ASG Software Solutions     Published Date: May 05, 2010
Read this topical and informative white paper from EMA Research and see how you can attain peace of mind that your end user's application performance will exceed expectations.
Tags : 
asg, end user, service assurance, ema, it infrastructure, service management, application integration, business integration, business intelligence, web service management, project management
    
ASG Software Solutions
Published By: Entrust Datacard     Published Date: Aug 10, 2016
Consolidate SSL providers and processes, without interruption, using Entrust SSL management and monitoring services This whitepaper provides a blueprint for migrating to Entrust SSL certificates and related services. It’s based on experiences that help many customers, in a wide variety of environments, bring their SSL certificate management under centralized administration.
Tags : 
    
Entrust Datacard
Published By: Cherwell Software     Published Date: Feb 24, 2017
Are you ready to transform your service desk and unleash the power of effective and affordable IT service management? Schedule your demo of Cherwell Service Management® today.
Tags : 
    
Cherwell Software
Published By: Dell PC Lifecycle     Published Date: Feb 13, 2018
Traditional PC lifecycle management is an inefficient and expensive process that will cost your business both time and money. Dell EMC’s PC as a Service (PCaaS) will transform your company’s approach to IT infrastructure. The cost of PC lifecycle management can be reduced by up to 25% by using PCaaS. Learn more about Dell solutions powered by Intel®. Intel Inside®. Powerful Productivity Outside.
Tags : 
productivity, migration, security, support, hardware, software, devices, dell
    
Dell PC Lifecycle
Published By: Dell PC Lifecycle     Published Date: Feb 13, 2018
Traditional PC lifecycle management is an inefficient and expensive process that will cost your business both time and money. Dell EMC’s PC as a Service (PCaaS) will transform your company’s approach to IT infrastructure. The cost of PC lifecycle management can be reduced by up to 25% by using PCaaS. Learn more about Dell solutions powered by Intel®.
Tags : 
productivity, migration, security, support, hardware, software, devices, dell
    
Dell PC Lifecycle
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search Resource Library      

Add Resources

Get your company's resources in the hands of targeted business professionals.