IT Management White Papers

IT Management includes a variety of functions for managing computers in a networked environment, including software distribution, version control, backup & recovery, job scheduling, virus protection and performance and capacity planning.

Sub-Categories: Desktop Management, Employee Performance, ITIL, Productivity, Project Management, Sarbanes Oxley Compliance, Service Management, Software Compliance
Results 251 - 275 of 3336Sort Results By: Published Date | Title | Company Name
By: Epicor     Published Date: Mar 19, 2015

Over the last few years, Software as a Service (SaaS) has become a compelling and credible delivery model for business applications. SaaS, also referred to as “On-Demand” or “Cloud Computing”, eliminates many of the barriers that keep companies from implementing or upgrading their software. More importantly, it enables you to focus on your core business operations instead of managing IT. So Cloud-based ERP may be right for your business, but where do you start? This white paper contains 10 questions to ask when considering a Cloud-based ERP solution.

Tags : cloud-based erp solutions, it management, business applications, business operations, enterprise applications
    
By: Epicor     Published Date: Mar 19, 2015

As we move through 2015, the subject of the future of the supply chain has come back into focus. What does the future supply chain look like, and what do we expect some of the essential characteristics to be? Although this requires a degree of speculation, there are also some trends and technologies that clearly are having, and will continue to have, an enormous impact on the supply chain.

Tags : manufacturing supply chain, supply chain characteristics, collaboration, mobile, it management, enterprise applications
    
By: IBM     Published Date: Mar 18, 2015

More and more companies are moving to the cloud for B2B services, and for good reason. There’s a huge potential for increased visibility and analytics-driven insights to be gained from B2B transactions that can give businesses unprecedented levels of information. But many organizations continue to struggle when it comes to going beyond basic transactional data and historical performance metrics. What does it take to not only report on past activity, but to get real-time alerts, predict future events, manage exceptions, and proactively leverage this wealth of data in order to put it to work? Read this IBM white paper to find out how B2B Services Reporting and Analytics provide new insights into your trading partner relationships and to drive better, more profitable business decisions.

Tags : b2b services, ibm, b2b analytics, b2b reporting, transactional data, trading partner relationships, it management, enterprise applications
    
By: NAVEX Global     Published Date: Mar 18, 2015

In this whitepaper, industry expert Michael Volkov, CEO of The Volkov Law Group, LLC, shares key questions no business can afford to overlook when evaluating and selecting vendor risk management solutions.

Tags : compliance, software compliance
    
By: CA Technologies     Published Date: Mar 12, 2015

Learn five simple strategies for securing APIs and see why they are an emerging technology for integrating applications using web technology.

Tags : api, mobile apps, mobile app, security, it management
    
By: CA Technologies     Published Date: Mar 12, 2015

Learn 5 OAuth Essentials for API Access Control and see how these tips will allow you to successfully manage your API management infrastructure.

Tags : oauth, api, ca tehnologies, twitter, resource server, authorization, it management
    
By: CA Technologies     Published Date: Mar 12, 2015

Learn 5 ways to get top mobile app developer talent for your open APIs and see why your organization will benefit from an API portal that allows you to provide a one-stop-shop for registration, documentation, exploration, collaboration, discussion and more.

Tags : mobile app, api, security, web-based, interface, it management
    
By: CA Technologies     Published Date: Mar 12, 2015

Learn how to develop secure mobile apps with a UX that delights customers and see how your organization can benefit from a winning API strategy.

Tags : api, mobile apps, mobile app, security, it management
    
By: CA Technologies     Published Date: Mar 12, 2015

Learn the in’s and out’s of OAuth & API security and see how this can greatly benefit your organization.

Tags : oauth, api, ca tehnologies, twitter, resource server, authorization, it management
    
By: CA Technologies     Published Date: Mar 12, 2015

Learn the 5 pillars of API management and see what opportunities having an API will supply for your organization.

Tags : api, it systems, web, security, api lifecycle, it management
    
By: IBM     Published Date: Mar 11, 2015

Cyber attacks are growing every day and become serious threats to your organization, but how do you know and understand the threats out there? Download a copy of this book, and you discover the zero-day exploits and threats used to compromise your enterprise. You also learn about a promising new technology developed by Trusteer, an IBM company, which provides effective yet transparent protection to enterprise endpoints. Start reading Stopping Zero-Day Exploits For Dummies, Trusteer Special Edition, today!

Tags : ibm, cybercrime prevention, it security solutions, trusteer, security, it management, knowledge management, data management
    
By: IBM     Published Date: Mar 11, 2015

The primary approaches used to fight advanced threats over the past several years simply aren’t effective. Traditional methods such as user education, vulnerability patching, and malware detection have failed to protect enterprises against the current threat landscape. Attackers continuously develop sophisticated tactics and evasion techniques to bypass the latest protection methods, requiring the security industry to find a different approach to malware protection. Trusteer has pioneered a new cybercrime prevention approach that provides unparalleled protection against spear-phishing, drive-by downloads and advanced, information-stealing malware.

Tags : ibm, malware detection, cybercrime prevention, it security solutions, security, knowledge management, enterprise applications, employee performance
    
By: Microsoft Dynamics     Published Date: Mar 10, 2015

Learn how organizations can set their sales teams up for success. Chapters include: - Buyer 2.0: The way people buy has changed - The role of content and conversations in today’s buying and selling process - Why and how sales reps need to tap into data for smarter selling

Tags : always be closing, ms dynamics partners, sales for dummies, how to motivate sales people, how to make more sales, sales success, how to make sales, sales approaches
    
By: IBM     Published Date: Mar 10, 2015

Using productivity tools for requirements management is like using a hammer to open a bottle. It gets the job done, but at what cost? IBM Rational DOORS NG offers effective requirements management capabilities by including the ability to capture relationships and manage dependencies.

Tags : ibm, systems engineering, productivity tools, project data, it management, enterprise applications, content management system, document management
    
By: IBM     Published Date: Mar 10, 2015

This IBM ebook explains what systems engineering is and how it can help you simplify the development of smart, connected products.  Learn how to speed time-to-market, ensure business agility, deliver high-quality smart products, and cut costs.

Tags : ibm, systems engineering, product quality, business agility, best practices, networking, it management, business activity monitoring
    
By: IBM     Published Date: Mar 10, 2015

This paper discusses the practices that companies should explore to move beyond traditional PLM and ALM to realize the broader capabilities of systems engineering for reducing time to market, meeting regulatory compliance mandates and improving product quality.

Tags : ibm, systems engineering, plm, alm, product quality, networking, it management, knowledge management
    
By: IBM     Published Date: Mar 10, 2015

Make the right decisions to define the right features and functions to build into your products for reaching the right market at the right time. Learn about making better product decisions with a Rational Focal Point solution for product portfolio management.

Tags : ibm, product management, product portfolio management, ibm rational approach, it management, best practices, business analytics, business intelligence
    
By: IBM     Published Date: Mar 10, 2015

The agile approach is unique in that it focuses on the important aspects of the development process: the people and the artifacts - software and hardware. Learn how Agile encourages developers to be more iterative, team-oriented, self-improving and customer focused.

Tags : agile approach, ibm, software development, hardware development, it management, best practices, business intelligence
    
By: IBM     Published Date: Mar 10, 2015

This paper introduces practical approaches to Agile focused on core principles and practices and shows how they improve project results for embedded systems development. Agile methods are a cohesive set of concepts, principles and practices to address the challenges of software development.

Tags : real-time agility, ibm, agile methods, software development, it management, best practices, business intelligence, business management
    
By: IBM     Published Date: Mar 10, 2015

Agile is a cornerstone of software delivery from IT to complex and embedded systems. This research-based paper reports on key challenges, patterns and working practices for extending Agile to cross-discipline deployment in product and systems development.

Tags : ibm, agile deployment, embedded software, product development, systems development, it management, knowledge management, enterprise applications
    
By: IBM     Published Date: Mar 10, 2015

This paper explains the methods and approaches that can enable continuous verification and validation and introduces a solution from IBM and National Instruments that designed for that purpose.

Tags : ibm, product quality, continuous engineering, continuous verification, embedded software, it management, knowledge management, enterprise applications
    
By: IBM     Published Date: Mar 10, 2015

This white paper describes software as the invisible thread that links product parts into an intelligent whole. It examines software delivery for smart products and strategies for evolving software development into a business process. Agile development has become a cornerstone of most software development organizations. Marked by iterative processes that deliver incremental value over time, agile development has enabled organizations to manage software complexity more effectively and to improve quality and time to market compared with previous development processes.

Tags : software development, ibm, agile development, software delivery, it management, business intelligence, business management
    
By: IBM     Published Date: Mar 10, 2015

Organizations developing products and systems in industries such as automotive, aerospace and defense, medical devices and consumer electronics are undergoing a transformation driven by the rapid growth in functionality delivered by software and electronics. This paper outlines an approach for using this shift to gain a competitive advantage.

Tags : ibm, systems development, product development, traceability, customer lifecycle, software development, it management, knowledge management
    
By: Tintri, Inc.     Published Date: Mar 09, 2015

In response to the desktop performance challenges of their widely dispersed workforce, a global financial management firm leveraged a VMware® Horizon View™ virtual desktop infrastructure (VDI) deployment with Tintri VMstore to meet end-user performance needs while reducing the burden on IT. A 600-employee money management corporation, this global financial management firm (GFMF) has approximately $300 billion in assets under management and four datacenters around the world. GFMF’s precise understanding of world markets, coupled with fundamentals-based and forward-looking analytical methods, are the foundation for tailored client solutions. GFMF’s investment capabilities range from indexing to alternatives, with the infrastructure and skill to transact in all liquid classes and securities.

Tags : vmware, finance, financial management, gfmf, tintri, it management
    
By: Adecco     Published Date: Mar 09, 2015

In the wake of the recent Sony data breach, customer and company privacy issues have become a hot topic in the media and the tech sector. The Sony incident and other widely covered consumer-facing data breaches experienced by Target, Home Depot, JPMorgan Chase and others have had a significant financial impact on these companies. Experts are projecting that both the number of incidents and the cost of dealing with data breaches will increase in 2015. To combat these attacks, businesses must respond with a heightened awareness of cybersecurity as well as increased spending on enterprise security as needed. Designating high level executives to lead security and hiring certified security experts are among the best practices for stronger IT security in 2015 and beyond.

Tags : adecco, security challenges, it spending, privacy concerns, cybersecurity, security experts, data breaches, consumer facing breaches
    
Start   Previous    4 5 6 7 8 9 10 11 12 13 14 15 16 17 18    Next    End

Related IT Whitepaper Topics

Add White Papers

Get your company's white papers in the hands of targeted business professionals.