> Technology > IT Management
 

IT Management

IT Management includes a variety of functions for managing computers in a networked environment, including software distribution, version control, backup & recovery, job scheduling, virus protection and performance and capacity planning.
Results 1 - 25 of 2831Sort Results By: Published Date | Title | Company Name
By: FICO     Published Date: Nov 30, 2016
Unexpected failure or performance erosion of production equipment can significantly impact productivity, product quality and maintenance expenses within any manufacturing organization. It’s also difficult to get operations ‘back on track’ after these failures occur. The good news is that, via the Internet of Things, intelligent use of sensor data, machine learning and optimization can help companies take a proactive approach to predicting failures and re-optimizing processes around them.
Tags : iot, internet of things, manufacturing, it management, knowledge management
     FICO
By: FICO     Published Date: Nov 30, 2016
FICO® Optimization Solutions for Manufacturers is an integrated and flexible modeling, solving and rapid application development platform for building solutions across the entire lifecycle of manufacturing and supply chain business challenges. It helps businesses readily account for massive amounts of data as well the myriad constraints and conflicting objectives within your business. This easy-to-modify solution incorporates strong and proven optimization engines, flexible workflow and usability at every level to drive consistent, transparent and profitable decisions, which ultimately drive the best action(s) for your business.
Tags : it management, knowledge management, enterprise applications, data management
     FICO
By: FICO     Published Date: Nov 30, 2016
Historically, manufacturers have “looked to the past” to help predict what they need to do in the future. This would include basic business intelligence, powered by spreadsheets, and even manual processes. The challenge is that what will happen may be something outside of what the past can predicts – who, 25 years ago, would have considered the Internet as a primary vehicle for commerce, or that Big Data would become both a treasure and a tragedy for organizations? Consider other factors, such as regulations, largely transient customers (where loyalty and brand aren’t what they used to be), disruptors (such as new entrants and technologies), and the need for manufacturers to “move faster than ever” – in effect, to be able to plan for the future before it happens.
Tags : manufacturing optimizations, enterprise software, infrastructure, it management, knowledge management
     FICO
By: FICO     Published Date: Nov 30, 2016
Optimizing supply chain strategies and network designs keeps getting harder, with persistent challenges from increasing customer demands, spiraling costs, disruptive competitors and multifaceted partnership and logistical options.
Tags : supply chain, network design, logistics, it management, data management
     FICO
By: Citrix ShareFile     Published Date: Nov 09, 2016
Ever feel like it takes too long to do something that should be simple? Or feel like your work processes just have way too many steps? Don’t worry – help is here.
Tags : it management, enterprise applications, it career advancement
     Citrix ShareFile
By: Citrix ShareFile     Published Date: Nov 09, 2016
How are small and medium businesses (SMBs) thinking about and adapting to create a smarter, more agile workforce? SMB Group recently surveyed 730 SMB decision-makers via our 2016 Small and Medium Business Communication, Collaboration & Mobility Study to find out.
Tags : it management, knowledge management, enterprise applications, data management, human resource technology
     Citrix ShareFile
By: Citrix ShareFile     Published Date: Nov 09, 2016
If you want to grow your small business, you must also focus on mobile sales, marketing, email and payment.
Tags : it management, wireless, knowledge management, enterprise applications, data management
     Citrix ShareFile
By: Citrix ShareFile     Published Date: Nov 09, 2016
There are many headlines about security challenges but first impressions can be deceiving.
Tags : it management, wireless, knowledge management, enterprise applications, data management
     Citrix ShareFile
By: Citrix ShareFile     Published Date: Nov 09, 2016
The workplace is changing. Are you taking advantage of new technology to improve your productivity?
Tags : it management, wireless, knowledge management, enterprise applications, storage
     Citrix ShareFile
By: QTS     Published Date: Nov 04, 2016
At the heart of the Data Solved promise are three core attributes - People Powered, Technology Focused and Infrastructure Invested. We leverage our strong, diverse team of more than 700 employees to enable our Powered by People motto and deliver on our promise. With 24 data centers on four continents, we are poised to deliver world-class infrastructure and value added technology services to our more than 1,000 customers in North America, Europe, Asia and Australia.
Tags : data centers, infrastructure, value added technology services, data security, data center
     QTS
By: QTS     Published Date: Nov 04, 2016
Watch this video to hear from American Hacker, Jeff Moss, about the security threats faced by companies today!
Tags : information security, security threats, data security, it management, data management
     QTS
By: Pluralsight     Published Date: Oct 26, 2016
Are you ready for AngularJS 2.0? How will this potentially major overhaul impact you and your business? In this on demand webinar, Pluralsight author Joe Eames will cover what’s different with 2.0, what’s staying the same and how you can begin experimenting with it today.
Tags : pluralsight, webinar, angularjs 2.0, joe eames, it management
     Pluralsight
By: Pluralsight     Published Date: Oct 26, 2016
In this webinar, Pluralsight author & IT Consultant Elias Khnaser, walks listeners through the differences between Amazon AWS and Microsoft Azure. You will be ready to make more informed decisions as you migrate your workloads to the public cloud.
Tags : pluralsight, microsoft azure, amazon aws, webinar, elias khnaser
     Pluralsight
By: Staples Business Advantage     Published Date: Oct 17, 2016
Changing vendors can be a pain. But the upside can be broader product choices, better prices, and deeper expertise. Watch this short video to find out if your organization is getting everything it could be from your primary vendor.
Tags : it management, human resource technology, it career advancement, electronics
     Staples Business Advantage
By: Staples Business Advantage     Published Date: Oct 17, 2016
Less than 20% of employees feel their workspace is “well designed” for employee needs. Watch this short video to learn how you can develop a workplace strategy that fits your unique organization.
Tags : it management, human resource technology, it career advancement, electronics
     Staples Business Advantage
By: Staples Business Advantage     Published Date: May 24, 2016
Learn the strategy one major university employed recently to streamline its printer management and unleash its IT staff on much more pressing priorities.
Tags : it case study, mps, printer fleet, it management
     Staples Business Advantage
By: Mimecast     Published Date: Apr 20, 2016
Mimecast conducted a whaling attack survey with 500 organizations around the globe and the results were alarming.
Tags : mimecast, data breach, personalized emails, network defenses, cyber threats
     Mimecast
By: BitSight Technologies     Published Date: Mar 02, 2016
Cybersecurity in the financial services industry is rapidly evolving. Do you know how to stay ahead of the curve? The financial sector has been a pioneer for vendor risk management (VRM) best practices for a long time. Yes cybersecurity practices are continuing to evolve, and regulatory bodies are focusing more on third-party risk. Are you prepared for these changes? We'll dive further into this topic in this white paper and exploe: - How the threat landscape has been changing - and what can you do about it. - Some challenges the financial industries face in taking on VRM. - Four proactive tips for better VRM practices that you can put into place today. Download this free white paper now to better understand the changes to cybersecurity in the financial industry and what you can do about it.
Tags : bitsight, risk management, cybersecurity, vrm practices, vendor risk management
     BitSight Technologies
By: BitSight Technologies     Published Date: Feb 29, 2016
Cybersecurity is an issue facing nearly every organization today—and if you aren’t taking the necessary precautions, your company, customers, and vendors could all suffer.
Tags : cybersecurity, security risk, security ratings, security, it management
     BitSight Technologies
By: BitSight Technologies     Published Date: Jan 27, 2016
During this webinar, BitSight CTO and Co-Founder Stephen Boyer shows you how to use Security Ratings to quickly and accurately assess the security risk an acquisition target (or other third party) brings to your information ecosystem.
Tags : cybersecurity, security risk, acquisition target, security ratings, risk-based conversations
     BitSight Technologies
By: Mimecast     Published Date: Jan 15, 2016
Learn Office 365™ Migration Risks and How to Avoid a SaaS Monoculture.
Tags : mimecast, migration, microsoft office 365, storage, cloud backup
     Mimecast
By: BitSight Technologies     Published Date: Jan 11, 2016
Need some assistance with the creation of your vendor security risk assessment? This eBook contains vital questions you should be incorporating into your vendor risk management program.
Tags : it management, knowledge management, enterprise applications, data management, human resource technology
     BitSight Technologies
By: BitSight Technologies     Published Date: Jan 11, 2016
Why does the cyber security performance of several industries differ? Download the latest BitSight Industry Benchmarking report to find out.
Tags : it management, knowledge management, data management, it career advancement, data center
     BitSight Technologies
By: BitSight Technologies     Published Date: Jan 11, 2016
Is Illegal File Sharing Occurring Within Your or Your Vendors’ Cyber Ecosystem? Learn about the risks posed by peer-to-peer file sharing and why you should be monitoring this activity.
Tags : it management, data management, human resource technology, it career advancement
     BitSight Technologies
By: Mimecast     Published Date: Aug 19, 2015
A spear-phishing attack could bring your company to its knees – today. For all you know, you may already be under attack. That could result in a data breach that lands your company in the glare of the news cameras – and in hot water with your customers, partners and investors.
Tags : mimecast, social media, spear-phishing, data breach, personalized emails
     Mimecast
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search