Skip to main content
 

life

Results 101 - 125 of 1900Sort Results By: Published Date | Title | Company Name
Published By: IBM     Published Date: Oct 17, 2013
In this Solution Spotlight, QA and test managers learn more about how they can be change agents to help ensure a smooth transition to Agile for their test teams, as well as tips on fitting testing into the development lifecycle.
Tags : 
ibm, solution spotlight, test, test managers, agile, agile testing, development, development lifecycle
    
IBM
Published By: RingCentral     Published Date: May 22, 2014
The Cloud; software as service across the Internet, is experiencing mass proliferation for everything from banking to CRM. Communications are part of this migration and offer a compelling solution over the retro, hardware-based systems known as PBX. This paper illustrates comparative anatomies of the old and new models. Major benefits of cloud communications are detailed, including the elimination of costs, removal of complexity for managing the system, alleviating IT resources, and the benefits of one system with a host of features. A deep-dive of the technology supporting the solution is included.
Tags : 
ringcentral, phone system, business phone, mobile phone, business transition, phone provider, cloud based phone, changing attitudes
    
RingCentral
Published By: LeanData     Published Date: Oct 30, 2015
Consider the humble lead. It’s the lifeblood of any business. A lead represents possibility. Opportunity. And ultimately, revenue. It’s why, of course, companies spend so much time and effort generating them. Then they celebrate when leads come flooding into their systems.
Tags : 
    
LeanData
Published By: Google Cloud     Published Date: Feb 22, 2018
xxx
Tags : 
    
Google Cloud
Published By: Oracle     Published Date: Sep 26, 2019
Data is the lifeblood of business success, but has been trapped in silos for too long. To unleash its value, analytics must transform from merely reporting on data to providing fuel for data-driven marketing.
Tags : 
    
Oracle
Published By: CA Technologies     Published Date: Jun 05, 2014
A report into how an automated lifecycle approach to DevOps supports the agile business
Tags : 
application delivery, high velocity application delivery, devops strategy, service virtualization, release automation, application performance management
    
CA Technologies
Published By: Okta     Published Date: Jul 19, 2016
With a secure foundation in place to manage internal IT, many IT leaders are thinking about a foundation for the entire business. In the new world of mobile apps, cloud services, and the Internet of Everything, people, processes, data, and devices are all converging to reshape how day-to-day business is done. Companies are reaching out to customers and partners—and even intelligent objects like connected cars and monitoring systems—and modifying the products and services they bring to market as a result. To an unprecedented degree, the future of an enterprise lies in the hands of the CIO and her IT staff who orchestrate these connections and act on the benefits they bring. IT leaders are finding new opportunities in an era of digital disruption. This executive brief provides a quick overview of how they are driving growth and increasing efficiency by securely connecting the digital enterprise with customers, partners, suppliers and distributors.
Tags : 
identity, idaas, iam, identity lifecycle management, mobile, provisioning, active directory, security
    
Okta
Published By: QTS     Published Date: Nov 04, 2016
Healthcare accounts for 21% of all cybersecurity breaches, making it the most affected business sector in the U.S. economy. Ongoing attacks are predicted to cost providers $305 billion in lifetime revenue over the next few years. Download this white paper to learn how to make healthcare cybersecurity stronger.
Tags : 
healthcare, cyber security, data security
    
QTS
Published By: CA Technologies     Published Date: Jun 26, 2017
Organizations undergoing digital transformations are dealing with amplified concerns around risk and security, which isn’t surprising. Ensuring visibility and accountability for compliance, security and governance while enabling flexibility for digital transformation requires a fresh and more tightly aligned approach to who—and now what in the form of applications, services, machines and things—are given the keys to the kingdom: privileged access. Read this white paper to understand how the digital transformation journey requires thinking through a clear roadmap that spans multiple years, anticipating near- and long-term requirements from a privileged access management solution and ensuring scope and scale needs at a reasonable cost of ownership through the entire lifecycle.
Tags : 
    
CA Technologies
Published By: CA Technologies     Published Date: Aug 22, 2017
Organizations undergoing digital transformations are dealing with amplified concerns around risk and security, which isn’t surprising. Digital transformation initiatives inevitably result in more points of access to enterprise infrastructure that are outside of existing controls, accessible by a greater number and more diverse set of identities, and proliferated across a distributed and dynamic infrastructure.
Tags : 
    
CA Technologies
Published By: CA Technologies EMEA     Published Date: Apr 10, 2018
Challenge Organizations undergoing digital transformations are dealing with amplified concerns around risk and security, which isn’t surprising. Digital transformation initiatives inevitably result in more points of access to enterprise infrastructure that are outside of existing controls, accessible by a greater number and more diverse set of identities, and proliferated across a distributed and dynamic infrastructure. Opportunity Knowing your privileged users is knowing your risk. Privileged access management tools themselves must be able to support automation in the authorization process and enable scalability through support for both dynamic operations and ephemeral infrastructure. Benefits Better pinpointing attacks exploiting credential theft isn’t simply a question of accumulating more data but involves incorporating better data about privileged user behaviour, which can identify significant changes that represent real risk.
Tags : 
    
CA Technologies EMEA
Published By: Collaborative Consulting     Published Date: Dec 20, 2013
Collaborative helped a research company transitioning to commercialization identify critical timelines, tasks, milestones and resources required to bring a new drug to market. As part of the project, leaders were given the information and tools they needed and the business began building the strong foundation necessary for a successful launch.
Tags : 
collaborative consulting, biotech organization, case study, launch strategy, biotech company, infrastructure, tailored segment, particular market
    
Collaborative Consulting
Published By: Centric Software     Published Date: Dec 20, 2010
Customers should see meaningful returns on PLM investments within one product cycle, or 4 to 6 months.
Tags : 
product lifecycle management, plm, plm software, manufacturing best practices
    
Centric Software
Published By: Skillsoft     Published Date: Jan 19, 2017
An introductory guide on how to use learning to catapult your customer experience to excellence. Get tips on how to apply learning at every phase of the customer life cycle, the benefits you'll gain, and examples of how leading organizations are putting external learning into practice.
Tags : 
sumtotal systems, customer experience, customer life cycle, external learning
    
Skillsoft
Published By: SumTotal Systems     Published Date: Jan 19, 2017
An introductory guide on how to use learning to catapult your customer experience to excellence. Get tips on how to apply learning at every phase of the customer life cycle, the benefits you'll gain, and examples of how leading organizations are putting external learning into practice.
Tags : 
sumtotal systems, customer experience, customer life cycle, external learning
    
SumTotal Systems
Published By: HireRight     Published Date: Oct 04, 2012
View this recorded webinar to learn the who, what, when, where, and how of criminal records checks. You'll also learn some of the basics, how these records are collected, and why multiple searches are very important.
Tags : 
    
HireRight
Published By: Okta     Published Date: May 09, 2016
Part of a strong foundation for cloud-first, mobile-first IT includes supporting BYOD. BYOD can improve end user satisfaction and enable employees to work anywhere from any device. To really get these benefits though, the end-user experience must provide seamless access to the applications end-users want and need. Accomplishing this starts with extending app provisioning to mobile devices, and automatically deprovisioning mobile access as part of the identity lifecycle. For the best user experience, you’ll want automatic configuration of native mobile applications with mobile SSO, security settings and app settings like usernames, URLs and tenant IDs. Provisioning devices to users should be simply an extension of the foundational identity lifecycle management system. And, mobility management should enable IT teams to implement simple policies to enable and secure access from mobile. This eGuide provides an overview of how Okta can power BYOD programs with integrated identity and mobili
Tags : 
    
Okta
Published By: Okta     Published Date: Jul 19, 2016
Part of a strong foundation for cloud-first, mobile-first IT includes supporting BYOD. BYOD can improve end user satisfaction and enable employees to work anywhere from any device. To really get these benefits though, the end-user experience must provide seamless access to the applications end-users want and need. Accomplishing this starts with extending app provisioning to mobile devices, and automatically deprovisioning mobile access as part of the identity lifecycle. For the best user experience, you’ll want automatic configuration of native mobile applications with mobile SSO, security settings and app settings like usernames, URLs and tenant IDs.
Tags : 
identity, idaas, iam, identity lifecycle management, mobile, provisioning, active directory, security
    
Okta
Published By: Cisco EMEA     Published Date: Jun 01, 2018
Collaboration, leading to innovation, leading to success. Based upon gathering together to share ideas and information. Working together as a team to bring ideas to life. And putting together a consistently reliable, secure, scalable, easy-to-use, and easy-to-integrate system to empower all of it. Cisco collaboration solutions learn as they work together with your team. Frictionless collaboration experiences make customers happy to work together with you. Work with Cisco Webex. And your teams will work better together.
Tags : 
cisco, collaboration, innovation, webex
    
Cisco EMEA
Published By: Oracle Primavera     Published Date: Oct 09, 2015
As the oil and gas pipeline industry grapples with change at every level — including increasing pipeline operations and expanding regulatory oversight infrastructure —cost savings and operating efficiencies have become more important than ever. Both pipeline operators and contractors can benefit from utilizing EPPM solutions to help them pinpoint the best strategies to develop and implement projects from conception through execution to end game — thereby helping to reduce risk and manage cost. In the end, it’s all about smartly using an approach, such as EPPM solutions, like those from Oracle, to help pipeline operators and contractors reduce costs at the project, portfolio, and enterprise levels through the project lifecycle. The midstream companies that are able to implement the best approach to managing risk to their operations in the most cost - effective way will be the ones to best weather another tumultuous decade to come for the oil and gas industry.
Tags : 
oracle, oil and gas, oil and gas pipeline industry, cost savings, eppm solutions, midstream oil industry, project management, project portfolio management
    
Oracle Primavera
Published By: Infor     Published Date: Aug 04, 2011
AB World Foods has a highly complex supply chain, driven in part by the nature of its globally sourced and distributed products as well as by the demands of growth and acquisition. With Infor SCM Demand Planning, the company cut costs while also improving service levels.
Tags : 
infor, ab world food, scm, enterprise business software, customer relationship management, enterprise asset management, enterprise resource planning, financial management
    
Infor
Published By: Avi Networks     Published Date: May 23, 2019
TCPdump may be old, but does that matter? Application proliferation as apps move from bare metal to virtual machine to containers Network teams are asked to do more with the same number of people Network analysis in public clouds and containers requires different tools
Tags : 
    
Avi Networks
Published By: Oracle     Published Date: Apr 29, 2014
Cash forecasting in an extremely important process that organizations must execute effectively in order to succeed. Since cash is the lifeblood of a business, business leaders must know how much cash is going to be available to the organization at any given time. Download this white paper to learn more!
Tags : 
oracle, cash forecasting, cash, available cash, modern business approach, cash management
    
Oracle
Published By: Infor     Published Date: Aug 04, 2011
Find out what characteristics you should take into account when selecting Sales and Operations Technology and how Infor10 Sales & Operations Planning respond to those needs today.
Tags : 
infor, aberdeen, s&op, infor10, sales and operations, sales & operations, scm, enterprise business software
    
Infor
Published By: Oracle     Published Date: Oct 29, 2015
Business buyers are more demanding than ever. They expect organizations to meet their precise needs through the life-cycle of interactions with B2B brands. This means providing today’s business buyers with consumer like-experiences that allow them to do their job better and easier, and making the complex simple. Download this white paper from Aberdeen Group to learn the five best practices to get B2B e-commerce right and how to achieve best-in-class performance in customer retention, revenue growth, and operational efficiency.
Tags : 
oracle, aberdeen group, b2b brands, customer retention, revenue growth, operational efficiency
    
Oracle
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.