> Home

strategy

Results 351 - 375 of 2967Sort Results By: Published Date | Title | Company Name
Published By: Dell EMC     Published Date: Nov 02, 2015
Learn about Workload Awareness findings documented in a recent worldwide IDC survey of 683 enterprise IT decision makers.
Tags : 
emc, enterprise, hybrid, cloud, strategy, networking, security, it management, data management
    
Dell EMC
Published By: Dell EMC     Published Date: Nov 06, 2015
A Vblock from VCE isn’t just a sum of its parts—it’s a new way of implementing and supporting missioncritical infrastructure.
Tags : 
emc, vce, enterprise, strategy, vblock, infrastructure, it management, enterprise applications, data management
    
Dell EMC
Published By: Dell EMC     Published Date: Nov 06, 2015
Executives discuss the operational and strategic opportunities of Converged Infrastructure.
Tags : 
emc, cio, converged infrastructure, strategy, executive, it management
    
Dell EMC
Published By: NuCompass     Published Date: Sep 12, 2016
There are more relocation programs than ever and the strategies behind them aren’t always clear. In this guide, we compare the different types of relocation strategies and the potential impact of technology on them.
Tags : 
employee relocation, relocation, relocation program, new hire relocation, mobility, mobility services, mobility program, employee move, lump-sum relocation, lumpsum move, relocation technology, relocation services, mobility technology, human resources
    
NuCompass
Published By: BMC Software     Published Date: Jul 22, 2015
In this study conducted by Forrester Consulting and commissioned by BMC, you’ll find out why 93% of US and UK IT decision-makers surveyed consider capacity management important or very important to their cloud strategy. Learn how using capacity management to manage workloads in the cloud can help Increase flexibility and continuity for your organization.
Tags : 
cloud, capacity management, cloud strategy, workload, continuity
    
BMC Software
Published By: BMC Software     Published Date: Jul 22, 2015
In this on-demand webinar, you will hear about the results of a Forrester Consulting study with 432 IT practitioners that shows why capacity management is essential to your cloud transformation strategy and provides guidance on how you can get started.
Tags : 
capacity management, cloud, cloud strategy, cloud workload
    
BMC Software
Published By: VMware AirWatch     Published Date: Oct 14, 2016
Advances in the technologies of the electronic components essential to mobility continue to yield powerful and productive mobile computers and communicators, with an amazing range of function and raw capabilities that even seasoned professionals find remarkable. There also have been dramatic improvements in wireless networks—from Wi-Fi to the broadband cellular services that continue to expand in both coverage and capacity—that offer throughput and related performance characteristics that rival what’s possible on wire. Finally, add in apps, cloud solutions and related management capabilities, and there’s never been a better time than right now to profit from a strategy that reaps the benefits of a mobile workforce—and, really, a mobile organization.
Tags : 
    
VMware AirWatch
Published By: Epicor     Published Date: Nov 18, 2015
Companies develop strategic plans and establish business imperatives that define desired outcomes, e.g., to achieve superior financial results or to be the highest quality supplier in the world.
Tags : 
epicor, performance, strategy, business technology, customer experience, small business
    
Epicor
Published By: Dynatrace     Published Date: Apr 26, 2017
This new report from Dynatrace and O'Reilly Media details the 3 stages that businesses move through as they migrate to the cloud, and a winning strategy for each stage. It includes case studies that will show you how to tackle both technical and cultural challenges along the way.
Tags : 
cloud analytics, cloud development, cloud storage, cloud management, cloud security, cloud services, storage analytics
    
Dynatrace
Published By: Concerto Cloud Services     Published Date: Dec 18, 2015
This document will guide solution providers through the five main principles necessary to develop a practical, customized cloud transformation strategy designed to support a cloud-first customer offering. These principles include: Financial Considerations to Building a Cloud Model Marketing Approach How To “Sell” the Cloud Technical Strategy Operational Readiness
Tags : 
    
Concerto Cloud Services
Published By: Sitrion     Published Date: Feb 11, 2016
Internal communications is a critical component to your company’s success. You need to think about the role of internal communications more strategically than ever before. Not just in the face of change events like acquisitions or a major market shift, but also to align your employees behind your vision, your strategy, and to drive daily productivity. This only works if you can communicate effectively with them and excite them about their work. Reaching employees and engaging them will help you successfully meet your goals.
Tags : 
empowerment, workforce engagement, internal communication, human resources, employee performance, productivity
    
Sitrion
Published By: Sitrion     Published Date: Feb 11, 2016
An engaged workforce is a critical component to your company’s success. When employees are engaged and behind your vision and strategy, they are more motivated and focused on your organization’s business goals.
Tags : 
empowerment, workforce engagement, internal communication, human resources, employee performance, productivity
    
Sitrion
Published By: Sitrion     Published Date: May 11, 2016
Internal communications is critical to your company’s success. And aligning your employees behind your vision, your strategy, and driving daily productivity helps you to get there. Yet, this only works if you can communicate effectively with them. Download this white paper to learn more about how mobile drives internal communications success.
Tags : 
    
Sitrion
Published By: Cisco     Published Date: Apr 20, 2016
Note: Part two of Karen Walker’s blog series continues her insights about Digital Transformation and spotlights how Cisco’s Marketing and Communications team is using technology to transform their function. Excerpt: Today’s marketers are delivering more and more content digitally, but to be effective that digital content can’t just be generic reference material. Rather, effective content must be relevant, timely, and personalized. And its goal should be to create a dialogue with the customer. This is no easy task. It requires investing in marketing technologies that help deliver personalized content with speed and agility. For modern marketers, technology opens the door to new revenue pipelines. Digital platforms and applications combined with data and analytics augment our go-to-market model.
Tags : 
cisco, digital, marketing, technology, mobile, marketing strategy, emerging marketing, internet marketing, crm & customer care
    
Cisco
Published By: VMware     Published Date: Nov 02, 2016
As organizations begin to adopt public cloud, one element of consideration is what to do with existing applications. These applications were not built with cloud in mind, though most are virtualized today. These organizations must now determine a modernization strategy for these applications and incorporate how public cloud might fit into the picture. This paper examines the use of public cloud for data center extension and replacement, particularly in light of existing traditional enterprise applications. It also looks at the role of VMware's vCloud Air public cloud service in meeting the needs of these applications.
Tags : 
vmware data center, vcloud air, vsphere, hybrid cloud, public cloud, private cloud, disaster recovery, data center extension, data center replacement, date center modernization, virtual private cloud
    
VMware
Published By: Microsoft     Published Date: Jul 07, 2016
Before you transform your business with mobility services, you need to consider both the management and security challenges you’ll face from the combination of mobile devices and cloud-based apps. In this IDC report, you’ll examine enterprise mobility management technology—offered through solutions such as the Microsoft Enterprise Mobility Suite—and how it helps manage the security risks of your mobility strategy. Learn about these critical benefits: • Provisioning and configuration devices and users—across platforms • Ensuring only authorized users access data with identity system integration • Ensuring only compliant devices access the corporate network through conditional access policies • Allowing mobile applications to deploy in a more secure, streamline manner with enterprise app stores • Providing security for data at rest, within workflows or over wireless networks, using granular policies around applications
Tags : 
mobile, cloud, best practices, productivity, technology, business intelligence, business management
    
Microsoft
Published By: Panaya     Published Date: Aug 09, 2018
You can succeed in your digital transfomation and deliver applications and services faster, better, and safely. How? With Enterprise Agile Delivery. Enterprise Agile Delivery brings a wealth of benefits to organizations and can be adopted by any Agile hybrid framework: SAFe, LESS, Nexus as well as Agile/lean frameworks like Scrum and Kanban. Yet to achieve Eneterprise Agile Delivery, enterprises need an easy to use modern ALM tool for quick and successful onboarding. Download this white paper to understand how the right solution will help you: • Strategiaclly align feature releases and backlogs with your overall business strategy • Identify and prioritize dev and test activities with visibility into project waves and portfolios • Make data-based decisons for safe releases with real-time insights and multidimensional views into delivery risks • Sync business, dev, QA and release teams around shared objectives with automated coordination and communication
Tags : 
    
Panaya
Published By: CA Technologies     Published Date: Nov 02, 2016
Customer obsession has created a business environment of continual disruption. Constant change is forcing execs to recognize that traditional planning and delivery practices don’t sustain the ability to focus on strategy while delivering new capabilities. To adapt to an environment where change is the new normal, project management office (PMO) leaders and enterprise architecture (EA) strategists are expanding Agile methods, but scaling Agile to the enterprise requires significant process, organization, and cultural change. This report identifies best practices for tackling this challenge.
Tags : 
    
CA Technologies
Published By: CA Technologies     Published Date: Nov 02, 2016
In today’s competitive world, agile methodologies promise faster delivery, higher quality, increased productivity and better alignment with your company strategy. But while many companies introduce agile approaches at the team level, they often fail when scaling agile to the program and portfolio level. CA Agile Ready > Sync > Go provides a complete solution for building and launching successful, enterprise-scale agile programs. Integrating the industry leading expertise of CA Agile Transformation Consulting with the CA Agile Central enterprise-class planning and tracking platform, Ready > Sync > Go can help you build and launch a high-performing agile program in as little as three months.
Tags : 
    
CA Technologies
Published By: CA Technologies     Published Date: Aug 22, 2017
Enterprise security traditionally relied on a fortress strategy that locked down user endpoints and created walls around the network. Today, this strategy cannot support or secure the use of mobile devices and SaaS capabilities, which exist outside the fortress. As a result, Chief Information Security Officers (CISOs) have been looking for new solutions that can secure these technologies today, and adapt as threats and business needs change. The credit card industry’s security model is one example that provides a new way to think about risk and contain it—that is, if you can see past the occasional bad rap it’s gotten from attacks and breaches.
Tags : 
    
CA Technologies
Published By: CA Technologies     Published Date: Aug 22, 2017
Privileged user accounts—whether usurped, abused or simply misused—are at the heart of most data breaches. Security teams are increasingly evaluating comprehensive privileged access management (PAM) solutions to avoid the damage that could be caused by a rogue user with elevated privileges, or a privileged user who is tired, stressed or simply makes a mistake. Pressure from executives and audit teams to reduce business exposure reinforces their effort, but comprehensive PAM solutions can incur hidden costs, depending on the implementation strategy adopted. With multiple capabilities including password vaults, session management and monitoring, and often user behavior analytics and threat intelligence, the way a PAM solution is implemented can have a major impact on the cost and the benefits. This report provides a blueprint for determining the direct, indirect and hidden costs of a PAM deployment over time.
Tags : 
    
CA Technologies
Published By: CA Technologies     Published Date: Aug 22, 2017
APIs are an emerging technology for integrating applications using web technology. This approach is exploding in popularity because it builds on well-understood techniques and leverages some existing infrastructure. But it is a mistake to think we can secure APIs using the same methods and technology that we used to secure the conventional, browser-centric web. While it is true that APIs share many of the same threats that plague the web, they are fundamentally differently and have an entirely unique risk profile that you need to manage. This eBooklet provides an overview of these new risks, and offers five simple solutions to counter the common threats. By adopting a secure API architecture from the beginning, organizations can pursue an API strategy more safely and securely — and reap the benefits of agile integration promised by this exciting new technology.
Tags : 
    
CA Technologies
Published By: CA Technologies     Published Date: Aug 22, 2017
The mobile app has become “the” strategic initiative for all digital organizations attempting to drive business forward. “By 2017, mobile apps will be downloaded more than 268 billion times, generating revenue of more than $77 billion — making apps one of the most popular computing tools for users across the globe.”1 The app has become more than a simple method of communication. It is the new critical point of engagement, the face of the organization, and quite possibly the difference maker in customers staying or leaving. Getting the “user experience” (or UX) right in the eyes of the consumer is no longer a nice to have but fundamental to achieving success.
Tags : 
    
CA Technologies
Published By: CA Technologies     Published Date: Aug 22, 2017
The rise of the application programming interface (API) represents a business opportunity and a technical challenge. For business leaders, APIs present the opportunity to open new revenue streams and maximize customer value. But enterprise architects are the ones charged with creating the APIs that make backend systems available for reuse in new Web and mobile apps.
Tags : 
    
CA Technologies
Published By: CA Technologies     Published Date: Aug 24, 2017
Growing your enterprise is an ongoing priority. And, as the application economy continues to expand, it’s likely that you’re looking at digital business initiatives to fuel a significant portion of that growth.
Tags : 
    
CA Technologies
Start   Previous    8 9 10 11 12 13 14 15 16 17 18 19 20 21 22    Next    End
Search Home