ep lan

Results 151 - 175 of 1229Sort Results By: Published Date | Title | Company Name
Published By: CA Technologies     Published Date: Jan 14, 2015
In the past, Enterprise IT managed the back of?ce…the data center…the systems that kept the business running. Today, there is a mandate for IT to adopt a new role—one that speaks a common language with the business. This new IT mans the storefront, interacts directly with customers and thinks beyond uptime metrics to give equal consideration to cost, spend, quality and consumption.
Tags : 
enterprise it, metrics, cost, quality and consumption, front office, it management
    
CA Technologies
Published By: MobileIron     Published Date: Mar 22, 2016
Este eBook está diseñado para ayudarle a su organización a anticipar, comprender y gestionar estas y otras preguntas sobre el sistema BYOD en la empresa. En esta guía formada por cuatro partes, analizaremos las prácticas recomendadas para preparar, crear, lanzar y mantener un exitoso programa de BYOD a largo plazo.
Tags : 
mobile apps, best practices, mobileiron, phones
    
MobileIron
Published By: MobileIron     Published Date: Apr 28, 2016
Welcome to the first edition of MobileIron Security Labs (MISL) quarterly Mobile Security and Risk Review. This report provides insights into the state of the mobile security and threat landscape, highlights emerging risks, and recommends ways to fortify mobile enterprise deployments.
Tags : 
mobile apps, best practices, mobileiron, phones
    
MobileIron
Published By: Fisher Investments     Published Date: Apr 22, 2015
This is whitepaper about best practices for the specific responsibilities and obligations in managing and administering a 401K plan.
Tags : 
best practices, 401k, small business, compliance, liability, violations, responsibilities, financial, fiduciary
    
Fisher Investments
Published By: SAP SME     Published Date: Nov 02, 2017
Este reporte de SCM World, destaca cómo los actuales líderes omnicanal planifican aún más inversiones para ampliar la brecha entre sus capacidades y las de aquellos con procesos y/o tecnología débiles. Además, menciona que no solo se comprometieron con la cadena de suministro centrada en el cliente, sino que además lograron avances.
Tags : 
    
SAP SME
Published By: Mitel     Published Date: Nov 08, 2018
Vous envisagez d’adopter un cloud privé pour vos communications professionnelles? Sachez que vous n’êtes pas un cas isolé! En réalité, de plus en plus d’entreprises se tournent vers les communications dans le cloud (ou « communications hébergées »), comme en témoigne la croissance extraordinaire de ce marché, d’environ 25 % chaque année. Pourquoi choisir un cloud privé pour vos communications? Que faut-il savoir à ce sujet? Et comment fautil procéder? Avant de vous lancer, vous devez être capable de répondre à ces questions essentielles. C’est pourquoi nous avons conçu ce guide pratique, qui vous présentera les bases des communications dans un cloud privé, ainsi que tout ce que vous devez savoir avant de commencer.
Tags : 
wireless communication, audio conferencing, communications systems, video conferencing, cloud-based unified communications, enterprise voice, unified messaging, collaboration portal, business communications
    
Mitel
Published By: JBoss Developer     Published Date: Feb 05, 2016
Perhaps the biggest transformation in enterprise IT since the public cloud emerged is the move toward “mobile-first” application development. As mobility continues to become the new enterprise standard, developers are looking for frameworks that provide the tools they need to create innovative mobile applications without sacrificing their existing investments. While there are proven, enterprise-ready frameworks and platforms for developing and deploying traditional desktop applications, the mobile application development landscape is still evolving. Mobile Backend as a Service (MBaaS) attempts to fill the gap between traditional application platforms and mobile applications. It is the new middleware, exposing APIs and functions that enable developers to rapidly build new mobile apps and mobile-enable legacy enterprise applications.
Tags : 
jboss, red hat, gigaom, enterprise, mbaas platforms, cloud, mobile applications, it management, business technology
    
JBoss Developer
Published By: Dynatrace     Published Date: Apr 26, 2017
It's impossible to optimize every page and action of every transaction for every device and user location...you need to identify the pages and actions that matter most and build an optimization plan. This report details how T-Mobile did exactly that, and how you can do the same: Base your plan on your own business and visitor data Correlate performance to transaction completion rate Determine where you'll see the most return for your technology and time investment Download the report to read more.
Tags : 
digital experience, digital experience monitoring
    
Dynatrace
Published By: Avi Networks     Published Date: Mar 06, 2019
OpenShift-Kubernetes offers an excellent automated application deployment framework for container-based workloads. Services such as traffic management (load balancing within a cluster and across clusters/regions), service discovery, monitoring/analytics, and security are a critical component of an application deployment framework. Enterprises require a scalable, battle-tested, and robust services fabric to deploy business-critical workloads in production environments. This whitepaper provides an overview of the requirements for such application services and explains how Avi Networks provides a proven services fabric to deploy container based workloads in production environments using OpenShift- Kubernetes clusters.
Tags : 
    
Avi Networks
Published By: SolidFire_NetApp     Published Date: Oct 10, 2016
With increasing demands being made on enterprise IT departments to keep up with the accelerating pace of business, infrastructure has to enable more dynamic, eficient application and IT service delivery. Unfortunately, more ofen than not, IT provisioning can be a bottleneck. Traditional means are ofen ineficient. When developers plan their projects and estimate the server, networking, and storage resources they need, they ofen overestimate and pad their requests to ensure what actually gets provisioned is adequate. The formal request comes via an IT ticket, and then the waiting begins. Days, possibly weeks go by before they get the resources they need, and all the while they’re unable to iterate on and evolve core business oferings.
Tags : 
    
SolidFire_NetApp
Published By: CA Technologies     Published Date: Nov 02, 2016
Keeping up with the new pace of change requires building agility into your business to adapt to change faster, while carefully overseeing your investments. The integrated solution of CA Project & Portfolio Management (CA PPM) and CA Agile Central (formerly Rally) helps you effectively balance agility and governance by connecting the work of agile teams to your enterprise portfolio. Supporting an evolutionary approach to adopting agile, the solution lets you continue using traditional methods, while growing agile adoption to deliver on portfolio investments faster—with higher quality and predictable business results. A holistic view across all projects helps portfolio managers optimize budgets and resources for maximum return on investment.
Tags : 
    
CA Technologies
Published By: CA Technologies     Published Date: Aug 21, 2017
By necessity, every company is now a software company. By 2017, two-thirds of customer service transactions will no longer require the support of a human intermediary. That means that if you haven’t already done so, you must adapt your business model to meet the needs of online customers. Failure to do so will put you at a severe competitive disadvantage. And chief among those demands is that you provide an exceptional user experience. App speed, reliability and ease of use are the new currency in this fast-changing landscape. In fact, app characteristics such as convenience and the ability to save users time can enhance brand loyalty by 60 percent or more.
Tags : 
    
CA Technologies
Published By: CA Technologies     Published Date: Aug 22, 2017
In seinem Buch „Die Psychologie der Wissenschaft“ von 1966 vertrat der US-Psychologe Abraham Maslow die Position, dass Psychologen multiperspektivische Behandlungsansätze verfolgen und neue Konzepte einführen sollten, statt weiter nur die Theorien von Verfahren anzuwenden, die Freud und seine Nachfolger vor langer Zeit entwickelt hatten. Maslow wusste, dass es schwierig ist, einen neuen Blickwinkel einzunehmen, und schreibt: „Es ist bestechend, in jedem Problem einen Nagel zu sehen, wenn man als Werkzeug nur einen Hammer hat.“ Wir alle kennen das. Wir gewöhnen uns so sehr an althergebrachte Abläufe, dass wir die Gründe dafür manchmal nicht infrage stellen.
Tags : 
    
CA Technologies
Published By: CA Technologies     Published Date: Aug 24, 2017
We can quote innumerable stats to impress, but there is no need—it is apparent that the world is getting more connected. Today’s connectivity will seem primitive in a few years as the connectivity extends beyond smartphones, tablets and computers to concepts such as devices implanted in the human body.
Tags : 
    
CA Technologies
Published By: CA Technologies     Published Date: Aug 24, 2017
Target, Home Depot, eBay, le Bureau de gestion du personnel des États-Unis... Les incidents de sécurité majeurs subis par ces organisations (et d’autres) récemment sont survenus suite au vol ou à la compromission des informations d’identification d’un utilisateur à forts privilèges qui disposait d’un accès étendu à des systèmes sensibles. Dans près de deux tiers des cas, la violation initiale a été facilitée par la faiblesse des pratiques de sécurité mises en place par un tiers, fournisseur ou partenaire commercial, qui avait accès à un réseau interne. C’est en volant les informations d’identification de ce tiers que les attaquants ont été en mesure d’exploiter les infrastructures informatiques des entreprises visées, pour y localiser des comptes à forts privilèges qu’ils ont ensuite utilisés pour accéder à des systèmes critiques et leur porter atteinte.
Tags : 
    
CA Technologies
Published By: Carbonite     Published Date: Apr 09, 2018
There are five essential steps to protecting data and applications from the most common causes of data loss and downtime. IT pros who follow these steps can feel confident in their long-term organizational plan. Read this expert guide from Ben Maas, an independent consultant and system architect who has guided many companies through backup and disaster recovery (BDR) deployments.
Tags : 
    
Carbonite
Published By: CA Technologies EMEA     Published Date: Sep 11, 2018
Suddenly, the network is cool again. Tech trends such as the Internet of Things, software-defined networking and growing end-user expectations all add up to a demand for “dialtone” network performance and reliability. But as the data deluge continues to accelerate, and as organizations continue to rely on multiple clouds to achieve business goals, how can the network keep up, much less meet tomorrow’s demands? This e-book looks at the trends that are impacting the enterprise network—the modern network—the issues it creates for NetOps professionals, and how organizations can act today to plan for tomorrow.
Tags : 
    
CA Technologies EMEA
Published By: This program is brought to you by Oracle and Intel     Published Date: Mar 15, 2018
IDC has put the business value of the Oracle Exadata to the test by interviewing eight customers. They reported better business outcomes and efficiencies as a result of improved database performance, scalability, and reliability. The resulting whitepaper also reveals business value highlights, such as 429 percent five-year ROI, US$222,000 additional revenue per 100 users, and 94 percent less unplanned downtime.
Tags : 
    
This program is brought to you by Oracle and Intel
Published By: ServiceNow     Published Date: May 14, 2019
Behind every successful CMDB deployment is a detailed configuration management plan for implementing, designing, and sustaining a configuration management capability. Learn the 4 key stages to deploying a healthy CMDB with this ebook including real-life examples that you can put into practice today.
Tags : 
    
ServiceNow
Published By: CA Technologies_Business_Automation     Published Date: Jun 29, 2018
Do you want to bring continuous delivery to your organization? Or would you simply like to begin your automation Journey? CA Technologies Automation Solutions (formerly Automic) proposes a fourstage blueprint to continuous delivery to assist enterprises at any stage of their DevOps journey. This e-book sets out a plan that can take a company of any maturity level all the way up to enterprise-scale continuous delivery using a combination of CA Continuous Delivery Automation, 40-plus years of business automation experience, and the proven tools and practices the company is already leveraging.
Tags : 
    
CA Technologies_Business_Automation
Published By: VMware     Published Date: Dec 18, 2018
VMware is once again positioned as a Leader in the Gartner Magic Quadrant for Hyperconverged Infrastructure. In the latest Magic Quadrant, Gartner acknowledges hyperconverged infrastructure is moving from compute and storage to a "full-stack." VMware believes it has the most trusted stack incorporating all major data center functions to deliver a single, ubiquitous control plane, agnostic of hardware. Download the report today to learn more about the hyperconverged infrastructure landscape and VMware's leading solution.
Tags : 
    
VMware
Published By: Vena Solutions     Published Date: Oct 29, 2018
As digitization drives business at ever-faster speeds, CFOs recognize the need to keep pace. They understand the importance of financial planning and analysis (FP&A) solutions that allow their finance teams to develop budgets and forecasts quickly and accurately. They need confidence in their numbers and the decisions they drive. But selecting the right FP&A software is only half the battle.
Tags : 
fp&a software, fp&a, financial planning and analysis, fp&a solutions, financial planning, financial analysis, fp&a process, fp&a implementation, finance software implementation, financial software implementation, enterprise financial software, financial systems, vena solutions
    
Vena Solutions
Published By: Vena Solutions     Published Date: Oct 29, 2018
Based on in-depth research and customer interviews, the annual Nucleus Research Value Matrix map out the corporate performance management (CPM) market landscape, evaluating vendors on a matrix contrasting usability and ease-of-use versus features and depth of functionality. Read or download the 2018 edition to uncover the most up-to-date CPM landscape, to find the best finance software solution for your needs, and to see why Vena led the pack in usability to land in the Leader quadrant for the third straight year.
Tags : 
nucleus research, cpm matrix, cpm technology value, cpm technology matrix 2018, excel replacement, financial planning, budgeting, forecasting, financial modeling, business modeling, finance what-if scenarios, financial close and consolidation, risk and audit management, erp data integration systems, adaptive insights, hyperion, anaplan, prophix, vena solutions
    
Vena Solutions
Published By: Fidelis Cybersecurity     Published Date: May 15, 2019
Its the start of a new year and amidst the countless predictions flooding the internet, one things for certain 2019 is shaping up to be the year of cloud adoption. Analysts are expecting that enterprise adoption of cloud will ramp up significantly, but with this migration and the continued adoption of mobile and IoT technologies, the attack surface is changing dramatically and this has major implications for security. Fundamentally, security boundaries extend from on premises infrastructure to cloud service provider environments where perimeters no longer exist. Organizations cannot defend themselves with the same strategies and tactics that applied when it did. In this brave new world of cloud, IoT and mobile technology, organizations must be agile and shift, extend, and evolve their perimeter-based defense practices to those that are more robust. Further, a comprehensive defense in depth approach enables defense of high value assets amidst a more unpredictable cyber security landsca
Tags : 
    
Fidelis Cybersecurity
Published By: Fidelis Cybersecurity     Published Date: May 15, 2019
This report, conducted by SC Media and sponsored by Fidelis asked security leaders, decision makers and influencers what they were most concerned about, what their C-Suite was most concerned about, and what they’re doing (or planning to do) about it. As we start off 2018 it is clear that cybersecurity is ripe for transformation. The focus has shifted away from tactical technologies that provide more proverbial fingers in the dam and towards a strategic approach that focuses on delivering quantifiable improvement to the effectiveness and efficiency of security operations. Download this a research report to: See what executives and boards of directors care most about. See the top obstacles, gaps and concerns faced by security leaders. See where we are on the road to cyber maturity, as reported by your peers. See when security professionals prefer tactical approaches and when they prefer strategic plans.
Tags : 
    
Fidelis Cybersecurity
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add A White Paper

Email sales@inetinteractive.com to find out about white paper options for your company.