Skip to main content
 

roadm

Results 26 - 50 of 192Sort Results By: Published Date | Title | Company Name
Published By: CA Technologies     Published Date: Aug 21, 2017
Agile Softwareentwicklung ist keine Modeerscheinung bzw. keine Nischenmethode mehr, und sie ist auch nicht nur für Start-ups relevant: Sie ist eine Voraussetzung für jede moderne und anpassungsfähige Softwareentwicklungsabteilung. Ohne die Einführung agiler Praktiken kann es Ihrem Unternehmen Probleme bereiten, mit Kundenverpflichtungen Schritt zu halten, im Wettbewerb zu bestehen und eine Roadmap für strategische Innovationen zu erstellen. Ein bewährtes Framework für die agile Transformation, das Services und Tools umfasst, kann Ihre Produktivität und Ihre Geschwindigkeit jedoch steigern und Ihr Wachstum unterstützen.
Tags : 
    
CA Technologies
Published By: CA Technologies     Published Date: Aug 22, 2017
Privileged user accounts—whether usurped, abused or simply misused—are at the heart of most data breaches. Security teams are increasingly evaluating comprehensive privileged access management (PAM) solutions to avoid the damage that could be caused by a rogue user with elevated privileges, or a privileged user who is tired, stressed or simply makes a mistake. Pressure from executives and audit teams to reduce business exposure reinforces their effort, but comprehensive PAM solutions can incur hidden costs, depending on the implementation strategy adopted. With multiple capabilities including password vaults, session management and monitoring, and often user behavior analytics and threat intelligence, the way a PAM solution is implemented can have a major impact on the cost and the benefits. This report provides a blueprint for determining the direct, indirect and hidden costs of a PAM deployment over time.
Tags : 
    
CA Technologies
Published By: CA Technologies     Published Date: Jun 01, 2018
Privileged user accounts—whether usurped, abused or simply misused—are at the heart of most data breaches. Security teams are increasingly evaluating comprehensive privileged access management (PAM) solutions to avoid the damage that could be caused by a rogue user with elevated privileges, or a privileged user who is tired, stressed or simply makes a mistake. Pressure from executives and audit teams to reduce business exposure reinforces their effort, but comprehensive PAM solutions can incur hidden costs, depending on the implementation strategy adopted. With multiple capabilities including password vaults, session management and monitoring, and often user behavior analytics and threat intelligence, the way a PAM solution is implemented can have a major impact on the cost and the benefits. This report provides a blueprint for determining the direct, indirect and hidden costs of a PAM deployment over time.
Tags : 
    
CA Technologies
Published By: CA Technologies     Published Date: Sep 25, 2017
Today’s adaptive enterprises have to leverage data to remain flexible and responsive, but they need the right data. But it isn’t easy: Many companies struggle to improve technical execution while maintaining the visibility executives need. That’s why we created CA PPM + CA Agile Central, a seamless integration of our agile-management and business-portfolio management solutions. Together, they provide unparalleled visibility into both funding and work across every level of your organization.
Tags : 
funding, increment, planning, value, roadmap, agile central, ca technologies
    
CA Technologies
Published By: Casewise Systems Inc.     Published Date: Jun 05, 2007
Read this guide, that was published in BusinessWeek, on how organizations are now beginning to tackle this problem by taking a more holistic approach to IT Portfolio Management, enabling rapid decision-making based on a company roadmap.
Tags : 
business management, architecture, alignment, align, strategy, it management, network management, casewise
    
Casewise Systems Inc.
Published By: CEB     Published Date: Dec 05, 2013
Improve confidence in your technology plans and break through the vendor hype with this real-world look at technologies actually being deployed by Infrastructure functions across the globe.
Tags : 
emerging technologies, managed cloud services, cloud based architectures, security technologies, industry trends, technology adoption, technology investment plan
    
CEB
Published By: Chally Group Worldwide     Published Date: Mar 21, 2011
Is Your Sales Force Ready to Transform?
Tags : 
sales, transformation, marketing, talent management, human resources, leadership
    
Chally Group Worldwide
Published By: Ciena     Published Date: Nov 15, 2016
Healthcare providers use Packet-Optical Networks to meet performance and bandwidth demands. Learn the advantages of Packet-Optical Networks.
Tags : 
packet networking, packet networking portfolio, packet optical hie network, packet-optical transport, patient data security, private and hybrid cloud, private optical network for healthcare, private optical network for hospitals
    
Ciena
Published By: Ciena     Published Date: Nov 15, 2016
Healthcare providers use Packet-Optical Networks to meet performance and bandwidth demands. Learn the advantages of Packet-Optical Networks.
Tags : 
packet networking, packet networking portfolio, packet optical hie network, packet-optical transport, patient data security, private and hybrid cloud, private optical network for healthcare, private optical network for hospitals
    
Ciena
Published By: Cisco     Published Date: Jan 29, 2009
In a marketplace where too many products and services are chasing too little demand, businesses face a daunting challenge: do everything possible to attract and retain customers.The stakes are high.
Tags : 
cisco, customer satisfaction, crm, customer attrition, retain customers, customer infidelity, trouble-free shopping experience, knowing your customer
    
Cisco
Published By: Cisco     Published Date: Nov 17, 2015
This whitepaper provides background on cloud contact centers, their advantages and the essential considerations for selecting a vendor. It describes: - Trends surrounding the adoption of cloud contact center technology; - The advantages of selecting a cloud contact center solution; - Key factors to review when selecting a vendor and contact center platform; - Recommendations and a maturity model that businesses can use to develop a cloud contact center roadmap.
Tags : 
ovum, cisco, white paper, cloud contact center, contact center solution, cloud technology
    
Cisco
Published By: Cisco     Published Date: Nov 18, 2015
In this playbook, we provide you with a framework to bring big data to your agency. We break down big data into manageable components to help you understand how to make big data a reality at your agency. Our guide will serve as a roadmap for innovation and provide you with step-by-step instructions to deploy big data at your agency.
Tags : 
big data, data platform, ioe, analytics
    
Cisco
Published By: Cisco     Published Date: Feb 12, 2016
This whitepaper provides background on cloud contact centers, their advantages and the essential considerations for selecting a vendor. It describes: - Trends surrounding the adoption of cloud contact center technology; - The advantages of selecting a cloud contact center solution; - Key factors to review when selecting a vendor and contact center platform; - Recommendations and a maturity model that businesses can use to develop a cloud contact center roadmap.
Tags : 
    
Cisco
Published By: Cisco     Published Date: Jul 11, 2016
Cisco estimates that the Internet of Everything (IoE) — the networked connection of people, process, data, and things — will generate $19 trillion in Value at Stake for the private and public sectors combined between 2013 and 2022. More than 42 percent of this value — $8 trillion — will come from one of IoE’s chief enablers, the Internet of Things (IoT). Defined by Cisco as “the intelligent connectivity of physical devices, driving massive gains in efficiency, business growth, and quality of life,” IoT often represents the quickest path to IoE value for private and public sector organizations. This paper combines original and secondary research, as well as economic analysis, to provide a roadmap for maximizing value from IoT investments. It also explains why, in the worlds of IoT and IoE, the combination of edge computing/analytics and data center/cloud is essential to driving actionable insights that produce improved business outcomes.
Tags : 
    
Cisco
Published By: Cisco     Published Date: Jul 11, 2016
In this playbook, we provide you with a framework to bring big data to your agency. We break down big data into manageable components to help you understand how to make big data a reality at your agency. Our guide will serve as a roadmap for innovation and provide you with step-by-step instructions to deploy big data at your agency. This playbook will: - Teach you how to bring big data to your agency. - Identify which programs to select for a big data initiative. - Show you what big data is and how to define it for your agency. - Explore the necessary workforce skills for big data. - Examine what kind of IT supports big data programs. - Provide you with worksheets and activities designed to bring big data to your agency and build your big data roadmap. - Share three government case studies. - Highlight how industry can support government’s big data efforts.
Tags : 
    
Cisco
Published By: Cisco     Published Date: Jun 24, 2015
This paper reveals how new Fast IT model enables IT departments to shift focus from spending too much time keeping the lights on to capturing the value of today’s connections and preparing for the future.
Tags : 
fast it, it departments, it professionals, roadmap
    
Cisco
Published By: Cisco and NVIDIA Corporation     Published Date: May 06, 2019
IT organizations are no longer just a business support function and cost center—they are expected to drive business as part of the core corporate strategy. Adding to this, IT landscapes continue to increase in complexity, complicating management and innovation. Digital transformation helps IT adapt to these changes. Building a hybrid or multi-cloud IT environment can help you transform successfully. An effective cloud environment can provide: • Improved infrastructure management and flexibility • More time for IT to focus on strategic projects rather than manage data centers. • Better IT cost management In fact, 49% of companies cite “modernized IT infrastructure and technologies with increased agility, flexibility, manageability, and security” as a digital initiative on their long-term roadmap.
Tags : 
    
Cisco and NVIDIA Corporation
Published By: Cisco and NVIDIA Corporation     Published Date: Jun 13, 2019
IT organizations are no longer just a business support function and cost center—they are expected to drive business as part of the core corporate strategy. Adding to this, IT landscapes continue to increase in complexity, complicating management and innovation. Digital transformation helps IT adapt to these changes. Building a hybrid or multi-cloud IT environment can help you transform successfully. An effective cloud environment can provide: • Improved infrastructure management and flexibility • More time for IT to focus on strategic projects rather than manage data centers. • Better IT cost management In fact, 49% of companies cite “modernized IT infrastructure and technologies with increased agility, flexibility, manageability, and security” as a digital initiative on their long-term roadmap. To learn more, download this eBook!
Tags : 
    
Cisco and NVIDIA Corporation
Published By: Citrix Online     Published Date: Jul 02, 2010
This new Quantum Leap Marketing eGuide provides the definitive roadmap for creating a Webinar marketing plan designed to significantly boost sales for your company.
Tags : 
citrix online marketing, gotowebinar, webinar, presentation, lead sales
    
Citrix Online
Published By: Clarabridge     Published Date: Dec 03, 2013
This paper explores the impact of social media on the marketplace and customer behaviors, and provides a six-step “road map” that guides organizations through the process of implementing a social media program.
Tags : 
clarabridge, digital communications, digital revolution, product information, using social media, customer behaviors, social media program, interacting with customers
    
Clarabridge
Published By: Clarabridge     Published Date: Dec 03, 2013
Transforming the customer contact center from cost center to a strategic asset by leveraging the voice of the customer
Tags : 
clarabridge, customer behaviors, social media program, interacting with customers, product and service problems, respond quickly, customer satisfaction, customer loyalty
    
Clarabridge
Published By: Clarabridge     Published Date: Dec 03, 2013
The purpose of this white paper is to provide a five step “roadmap” that organizations can use to transform their marketing organization into a Center of Customer Experience Excellence.
Tags : 
clarabridge, optimizing customer experience, voice of the customer, customer engagement, data source, voc program, customer behaviors, operationalize voc
    
Clarabridge
Published By: Clarabridge     Published Date: Dec 03, 2013
The purpose of this white paper is to provide organizations with a four step roadmap that details how organizations can use VoC to make Product Management more customer-centric and significantly increase the odds of consistently delivering products that are successful in the marketplace.
Tags : 
clarabridge, customer behaviors, social media program, interacting with customers, product and service problems, respond quickly, customer satisfaction, customer loyalty
    
Clarabridge
Published By: Code42     Published Date: Feb 28, 2018
Disaster Recovery Plan Roadmap Learn how automatic backup delivers guaranteed business data protection and recovery—no matter the threat. When ransomware hits, the average small business experiences two full days of downtime. One-third of businesses lose revenue and all experience brand and loyalty damage that’s harder to quantify. To stop the bleeding, most small businesses end up paying at least $2,500 to get their data back. But paying the ransom doesn’t guarantee anything. Plenty of businesses have fully complied with the ransom demands, only to have the ransomer increase the ransom request—or simply take off with the ransom and the data.
Tags : 
    
Code42
Start   Previous    1 2 3 4 5 6 7 8    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.