absolute

Results 26 - 50 of 103Sort Results By: Published Date | Title | Company Name
Published By: Absolute Software     Published Date: Feb 14, 2012
Dysart Unified School District (DUSD) is Arizona's fastest-growing school district. Despite the district's extremely rapid expansion, it remains focused on its mission of "Increasing in Excellence" - or, preparing students for life in the new century.
Tags : 
laptop learning, dysart, dusd, arizona, students, application integration, best practices, business integration, business intelligence, business management, enterprise resource planning, it spending, virtualization, cloud computing, infrastructure, design and facilities
    
Absolute Software
Published By: Absolute Software     Published Date: Feb 14, 2012
Leonard Niebo, Director of IT for Brick Township Public Schools leads a discussion on overcoming the roadblocks of a manual auditing process, specialized computing needs, and incidents of loss and theft.
Tags : 
school, education, budget, diversity, managing diversity, auditing, enterprise resource planning, it spending, project management, business intelligence, itil, productivity, virtualization, cloud computing, infrastructure, design and facilities
    
Absolute Software
Published By: Absolute Software     Published Date: Feb 14, 2012
Working closely with Absolute Software Chicago Public Schools is managing over 100,000 PCs, Macs, and iOS 4 devices and have recovered over 350 stolen computers allowing them to invest in the future (versus replacement computers).
Tags : 
school, education, budget, diversity, managing diversity, auditing, application integration, application performance management, business management, business process management, enterprise resource planning, it spending, analytical applications, configuration management, virtualization, cloud computing, infrastructure, design and facilities
    
Absolute Software
Published By: Absolute Software     Published Date: Feb 14, 2012
Alice Owen, Executive Director of Technology for Irving Independent School District, discusses how she effectively secures and tracks her district's 12,000 computers. Leonard Niebo, Director of IT for Brick Township Public Schools leads our discussion on overcoming the roadblocks of a manual auditing process, specialized computing needs and incidents of loss and theft.
Tags : 
securing, tracking, laptops, irving, security, application integration, application performance management, best practices, business process management, enterprise resource planning, it spending, project management, virtualization, cloud computing, infrastructure, design and facilities
    
Absolute Software
Published By: Absolute Software     Published Date: Dec 20, 2012
Three Simple Steps to Legally Secure and Manage Employee-owned Devices Within a Corporate Environment
Tags : 
byod, policy, guide, mobile, security, cloud, apps, administration, device
    
Absolute Software
Published By: Absolute Software     Published Date: Dec 20, 2012
Aberdeen's analysis confirms that the case for convergence between endpoint management is still very strong in the mobile, Bring Your Own Device era.
Tags : 
byod, device, security, enterprise, mobility, policy
    
Absolute Software
Published By: Absolute Software     Published Date: Apr 11, 2013
There has yet to be a demonstrated case where an organization has reduced ITSSM spending over a five-year period solely on the basis of licensing in the SaaS model versus the perpetual model.
Tags : 
absolute software, saas, ssm, saas model, cost savings, perpetual model, itssm
    
Absolute Software
Published By: Cornerstone OnDemand     Published Date: Feb 05, 2018
The majority of training and performance management processes don’t lead to more skilled and productive employees. So what’s different about the ones that do? Download our brief, "The Absolute Must-Do’s to Build an Agile Organisation”, and learn: • How to increase employee productivity by 37% • What separates world-class learning and performance from ho-hum • Real business examples of this in action
Tags : 
performance management, performance, performance appraisal, employee engagement, goals, reviews, learning management system, performance management software, 360 degree feedback, workforce development, talent management, performance management software
    
Cornerstone OnDemand
Published By: Adobe     Published Date: Mar 03, 2017
The goal of a more positive and seamless engagement of clients is no longer a desire for the healthcare industry. It’s an absolute necessity. See how the right tools can help you create a dynamic enrollment process that you can continually adjust, test, and optimize in our guide, The New Doctor’s Order. Read the guide to learn the key components of a modern digital enrollment program, including: • Streamlined, mobile-optimized forms and digital signatures • Integrated workflows • Personalized communication and engagement
Tags : 
healthcare, workflow integration, digital enrollment, engagement, mobile-optimization
    
Adobe
Published By: Adobe     Published Date: Jun 22, 2017
The goal of more positive and seamless engagement of clients is no longer a desire for the healthcare industry. It’s an absolute necessity. See how the right tools can help you create a dynamic enrollment process that you can continually adjust, test, and optimize in our guide, The New Doctor’s Order. Read the guide to learn the key components of a modern digital enrollment program, including: • Streamlined, mobile-optimized forms and digital signatures • Integrated workflows • Personalized communication and engagement
Tags : 
mobile optimization, integration, communication, engagement, streamlining
    
Adobe
Published By: Box     Published Date: Jun 11, 2014
A modern mobile IT strategy is no longer an option, it is an absolute business necessity. Here’s how some of the nation’s most progressive corporations are meeting the many needs of their mobile workers — without overwhelming their IT departments — with the help of Box.
Tags : 
box, mobile, progressive, access, wireless, business technology
    
Box
Published By: GrowthIntel     Published Date: Feb 16, 2016
There are potentially tens of thousands of buyers who don’t know that they need your products or services. They are your passive, silent audience. And, if you want to grow quickly, that audience is absolutely vital. You can’t reach them using personas, content marketing, or retargeting – so how do you find buyers who’ve never even heard of you? This ebook explains how to reverse-engineer their digital footprints and follow the trail back to the owner.
Tags : 
advertising, medicine, clinical management, b2b, sales, business behavior, contact management, information management, productivity, project management, service management, advertising agencies, business intelligence
    
GrowthIntel
Published By: Absolute Software     Published Date: Jan 29, 2008
Does your PC lifecycle management (PCLM) reflect the issues associated with mobile users? Many organizations face expensive inefficiencies by not managing mobile assets effectively. These inefficiencies include dispersed and manual data collection, and inventory tools that are dependent on a connection to the company network.
Tags : 
absolute, intel, laptop, saas, managing laptops, pclm, computrace, absolute software, it asset management, remote data delete, geolocation tracking, theft recovery, service guarantee, lock down, rapid recovery, stolen, data defense, theft deterrence, pc protection, tpm
    
Absolute Software
Published By: Absolute Software     Published Date: Jan 27, 2010
This whitepaper explains how organizations can reduce their energy bills by remotely regulating computers. Topics include typical workplace computer usage, how to calculate your potential energy savings, debunking power management myths, and how you can assign multiple power saving profiles to clients.
Tags : 
computrace, absolute software, it asset management, remote data delete, geolocation tracking, theft recovery, service guarantee, application integration, application performance management, business activity monitoring, business analytics, business integration, business management, business process automation, business process management, groupware workflow, product lifecycle management
    
Absolute Software
Published By: Absolute Software     Published Date: Feb 23, 2010
A majority of environments today are cross-platform, combining both PCs and Macs. The result has become a common IT challenge: How can you maintain Macs in a network environment with a PC-centric infrastructure and with Windows-based network services?
Tags : 
computrace, absolute software, it asset management, remote data delete, geolocation tracking, theft recovery, service guarantee, application integration, application performance management, business activity monitoring, business analytics, business integration, business management, business process automation, business process management, analytical applications, configuration management
    
Absolute Software
Published By: Absolute Software     Published Date: Sep 06, 2011
View this flash demo to see Absolute in action and how you can monitor installed software/hardware and track location and take action if device is lost or stolen.
Tags : 
absolute, computrace, secure, tracking, security, manage, protect, application security, authentication, disaster recovery, encryption, internet security, intrusion detection, intrusion prevention, network security appliance, security management, security policies, vulnerability management
    
Absolute Software
Published By: Absolute Software     Published Date: Sep 06, 2011
Let us walk you through Absolute Manage's capabilities in this 10-minute demo; see how Absolute Manage can help you centrally manage both Mac and PCs.
Tags : 
absolute, intel, laptop, saas, lock down, rapid recovery, stolen, data defense, theft deterrence, pc protection, tpm, trusted platform module, anti theft, data breach, password protection, password, encryption, security, application security, disaster recovery
    
Absolute Software
Published By: Absolute Software     Published Date: Sep 06, 2011
Watch this webcast as Support Manager for La Jolla Institute for Allergy & Immunology relates how he successfully frees up 30 IT support hours a week.
Tags : 
absolute, intel, laptop, saas, lock down, rapid recovery, stolen, data defense, theft deterrence, pc protection, tpm, trusted platform module, anti theft, data breach, password protection, password, encryption, security, access control, application security
    
Absolute Software
Published By: Absolute Software     Published Date: Sep 06, 2011
Vice President and Research Fellow for Aberdeen Group, shares trends, best practices and actionable insight on management of iOS mobile devices.
Tags : 
absolute, intel, laptop, saas, lock down, rapid recovery, stolen, data defense, theft deterrence, pc protection, tpm, trusted platform module, anti theft, data breach, password protection, password, encryption, security, access control, application security
    
Absolute Software
Published By: Absolute Software     Published Date: Sep 06, 2011
Forrester Research and Absolute Software discuss the importance for IT to create a "layered approach" for endpoint security and management
Tags : 
absolute, intel, laptop, saas, lock down, rapid recovery, stolen, data defense, theft deterrence, pc protection, tpm, trusted platform module, anti theft, data breach, password protection, password, encryption, security, access control, application security
    
Absolute Software
Published By: Absolute Software     Published Date: Sep 06, 2011
See how Absolute Manage Mobile Device Management allows organizations to remotely manage their Apple® iOS devices (iPhone®, iPod® Touch, iPadT).
Tags : 
absolute, intel, laptop, saas, lock down, rapid recovery, stolen, data defense, theft deterrence, pc protection, tpm, trusted platform module, anti theft, data breach, password protection, password, encryption, security, access control, application security
    
Absolute Software
Published By: Absolute Software     Published Date: Sep 09, 2011
Join Michael Scarpelli, Technical Support Manager for La Jolla Institute for Allergy & Immunology, as he shares how his team streamlines and automates computer setup and maintenance for a rapidly growing network of more than 500 machines.
Tags : 
absolute, technical support, healthcare organizations, operating environment, database development, employee performance, productivity, project management, software compliance, service management
    
Absolute Software
Published By: Absolute Software     Published Date: Sep 09, 2011
Only the introduction of end-point security - the ability to force mobile computers to secure themselves - offers end-users the freedom to embrace mobility and IT departments robust protection for sensitive information.
Tags : 
absolute, end-point security, data breach protection, authentication, organizational policy, encryption, asset management, computrace, laptop, security management, security policies, data protection, database security, vulnerability management
    
Absolute Software
Published By: Absolute Software     Published Date: Sep 09, 2011
This white paper provides guidelines to help you create policies for computer energy consumption that are sensible and easy to enforce.
Tags : 
absolute, power saving policy, management, roi, energy savings, policy metrics, network management, application performance management, data protection, data quality, productivity, content management
    
Absolute Software
Published By: Absolute Software     Published Date: Sep 09, 2011
Security professionals are wondering how to best deal with the oncoming tide of personal mobile devices finding their way into the workplace. Download this research report to learn some key areas of consideration before moving ahead with a mobile implementations strategy.
Tags : 
absolute, managing security, risk challenges, mobile devices, it implementation, secure processes, mobile computing, mobile data systems, wireless application software, wireless phones, data protection, data quality, project management
    
Absolute Software
Start   Previous    1 2 3 4 5    Next    End
Search      

Search the Library

Add Research

Get your company's research in the hands of targeted business professionals.