nis

Results 1776 - 1800 of 1947Sort Results By: Published Date | Title | Company Name
Published By: Mainline Information Systems     Published Date: Oct 27, 2009
View this webcast to learn about tuning for Oracle from an AIX administrative perspective. This session covers basic topics on AIX performance tuning including memory; starter set of tunables; page space; and memory tuning.
Tags : 
aix, mainline information systems, oracle, memory, tunables, page space
    
Mainline Information Systems
Published By: Mainline Information Systems     Published Date: Oct 27, 2009
View this webcast to learn about tuning for Oracle from an AIX administrative perspective. This session covers operating system related topics including Oracle and disk; volume groups and file systems; asynchronous and concurrent I/O; and Oracle AWR.
Tags : 
aix, mainline information systems, oracle, tuning, disk
    
Mainline Information Systems
Published By: Sage People     Published Date: Dec 04, 2017
What is People Science? With People Science, organisations can finally use people data to understand how and why the workforce behaves the way it does. Once they have an insight into how their people interact with their environment and how that affects systems and performance, they can go about making better people decisions.
Tags : 
analytics, workforce, data, sources, record, organisation
    
Sage People
Published By: Spectrum Enterprise     Published Date: Jun 05, 2017
Download this Case Study to learn the value of Spectrum Enterprises and how Spectrum has helped Front Room Furnishings with: - Their ability to use more Internet-based applications with confidence - A real-time view of what’s happening throughout the business - Greater control over systems, such as freedom from PBX phones -Virtually limitless scalability in upgrading and adding locations
Tags : 
    
Spectrum Enterprise
Published By: Cisco     Published Date: Jan 15, 2015
In today’s dynamic network environment, point-in-time solutions lack the visibility and control you need to implement an effective security policy that will accelerate threat detection and response. And disparate solutions only add to capital and operating costs and administrative complexity.
Tags : 
operating costs, capital, threat detection, visibility, networks, computing, cloud, innovation, enterprise, datacenter, social, analytics, data management
    
Cisco
Published By: MobileIron     Published Date: Nov 16, 2017
Der Wechsel zu modernen, mobilen Cloud-Technologien zwingt Unternehmen, ihr Endgeräte-Sicherheitskonzept komplett zu überdenken. Eine Absicherung mit Benutzerdaten reicht beispielsweise aus, um den Zugriff in einer von der IT kontrollierten Desktop-Umgebung abzusichern. Dies gilt jedoch nicht für die mobile Cloud. Identitätsabhängige Sicherheitsmaßnahmen, die lediglich Benutzernamen und Passwörter abfragen, komplizieren das Benutzererlebnis mit Mobilgeräten und fördern unsichere Sicherheitspraktiken, welche die Unternehmensdaten gefährden
Tags : 
    
MobileIron
Published By: Zebra Technologies     Published Date: Oct 04, 2017
Los dispositivos Zebra con Android le proporcionan a los clientes experiencias de compras consistentes y gratificantes que crean lealtad, mientras los asociados se benefician de formas mucho más eficientes de comunicarse y administrar el inventario.
Tags : 
mobile technologies, machine to machine communication, automation increase, accurate data capture, team collaboration, tc56, mc67, tc55, tc75, mobility dna software, traceability, field operations, industrial facilities, mobile solutions, enterprise productivity, choosing the right technology, enterprise grade technology, field applications, high battery capacity, rugged handheld computers
    
Zebra Technologies
Published By: Workday France     Published Date: Feb 04, 2019
Vous cherchez à évaluer un nouveau fournisseur technologique ? Ce guide complet pour les PME/ETI vous explique comment préparer votre évaluation et ce que votre entreprise devrait rechercher chez un fournisseur afin de réaliser votre cahier des charges et comparer les offres. Lisez le guide maintenant.
Tags : 
la finance, technologie de la main-d'œuvre, stratégie digitale
    
Workday France
Published By: Workday France     Published Date: May 01, 2019
Vous cherchez à évaluer un nouveau fournisseur technologique ? Ce guide complet pour les PME/ETI vous explique comment préparer votre évaluation et ce que votre entreprise devrait rechercher chez un fournisseur afin de réaliser votre cahier des charges et comparer les offres. Lisez le guide maintenant.
Tags : 
finance, workday, workforce technology, digital strategy
    
Workday France
Published By: Workday France     Published Date: May 17, 2019
Vous cherchez à évaluer un nouveau fournisseur technologique ? Ce guide complet pour les PME/ETI vous explique comment préparer votre évaluation et ce que votre entreprise devrait rechercher chez un fournisseur afin de réaliser votre cahier des charges et comparer les offres. Lisez le guide maintenant.
Tags : 
    
Workday France
Published By: CA Technologies EMEA     Published Date: Oct 19, 2017
OAuth est un protocole Web relativement nouveau qui régit l’octroi d’un accès limité aux applications et données. il a été conçu pour permettre aux utilisateurs d’octroyer un accès restreint aux ressources dont ils sont propriétaires (images résidant sur un site tel que Flickr ou smugMug, par exemple) à un client tiers tel qu’un site d’impression de photos par exemple. ce livre blanc de cA Technologies décrit ce qu’est OAuth et vous montre comment faciliter son implémentation au sein de votre organisation.
Tags : 
    
CA Technologies EMEA
Published By: Red Hat     Published Date: Jun 23, 2016
The Middleware Services Group within Information Technology Services (ITS) at the University of North Carolina at Chapel Hill needed a comprehensive, dynamic solution for frequent server provisioning requests and, in particular, managed servers. Without such a solution, the likelihood that users would employ outside vendors significantly increased. Use of outside vendors would potentially increase security concerns, present additional costs, and further complicate system administration. Moving to a fully-interoperable Platform-as-a-Service (PaaS) offering, built on OpenShift Enterprise by Red Hat, has allowed the middleware services team to deliver a flexible development and hosting environment that has fostered innovation and increased peace of mind.
Tags : 
best practices, technology, productivity, enterprise, red hat
    
Red Hat
Published By: Oracle     Published Date: Nov 30, 2017
DDoS attacks can impair your website, tarnish your brand, and impact your bottom line. Conventional security products like firewalls and intrusion prevention systems and newer cloud-based scrubbing services can’t protect your DNS infrastructure against today’s increasingly sophisticated attacks. The best way to defend against DDoS attacks is to trust the operation of your DNS infrastructure to a managed service provider that lives and breathes DNS. Best-of-breed managed DNS providers operate global anycast networks that mitigate DDoS threats to keep your online business up and running.
Tags : 
dns, provider, global, anycast, network, customer, pop, business
    
Oracle
Published By: Oracle Dyn     Published Date: Dec 06, 2017
DDoS attacks can impair your website, tarnish your brand, and impact your bottom line. Conventional security products like firewalls and intrusion prevention systems and newer cloud-based scrubbing services can’t protect your DNS infrastructure against today’s increasingly sophisticated attacks. The best way to defend against DDoS attacks is to trust the operation of your DNS infrastructure to a managed service provider that lives and breathes DNS. Best-of-breed managed DNS providers operate global anycast networks that mitigate DDoS threats to keep your online business up and running.
Tags : 
dns, provider, global, anycast, network, customer, pop, business
    
Oracle Dyn
Published By: Dyn     Published Date: Jan 14, 2015
A DDoS Attack or distributed denial of service attack can happen to any online entity, at any time. By overwhelming your DNS infrastructure, malicious attackers can impair your website, tarnish your company’s reputation, and impact your bottom line. So what are your company’s risks and how can you mitigate them?
Tags : 
mitigation, dns ddos, ddos attacks, business security, bottom line, mitigation, improve results, cloud based
    
Dyn
Published By: SAP     Published Date: Oct 11, 2018
Procurement organizations are moving in substantial numbers to implement integrated technology suites in areas like source-to-contract and purchase-to-pay. A new generation of technology has made it possible for these technologies to move to the cloud, simplifying maintenance and administration. A recent Hackett Group study analyzed the use of e-sourcing suites to uncover trends, benefits and drawbacks to unifying these processes in one solution. For organizations already invested in optimizing sourcing execution efforts, the arguments for moving to an integrated suite are compelling.
Tags : 
    
SAP
Published By: SAP Ariba     Published Date: Oct 11, 2018
Procurement organizations are moving in substantial numbers to implement integrated technology suites in areas like source-to-contract and purchase-to-pay. A new generation of technology has made it possible for these technologies to move to the cloud, simplifying maintenance and administration. A recent Hackett Group study analyzed the use of e-sourcing suites to uncover trends, benefits and drawbacks to unifying these processes in one solution. For organizations already invested in optimizing sourcing execution efforts, the arguments for moving to an integrated suite are compelling.
Tags : 
    
SAP Ariba
Published By: FICO     Published Date: Mar 22, 2018
Cybercrime and data breaches are daily news. Escalating cost, new regulations and increased focus on managing third-party relationships means cybercrime is a boardroom issue. This executive briefng explains why cybercrime is a relevant and pressing problem, and will show you how to evaluate and invest in layered controls to help you understand the security posture for your organisation.
Tags : 
    
FICO
Published By: F5 Networks Inc     Published Date: Jul 08, 2009
By providing a unified Application Delivery Networking platform, F5 BIG-IP offers the ability for organizations to adopt a single platform for all its application delivery needs. Adopting an organizational standard for application delivery can reduce management and administrative costs and improve the ability of the organization to migrate smoothly from traditional to emerging application architectures, and address the unforeseen issues that always arise in the wake of the introduction of new initiatives.
Tags : 
network, application, delivery, big-ip, organization, platform, management, administrative, solution, adopt, find, search
    
F5 Networks Inc
Published By: VMware     Published Date: Feb 24, 2017
Mobile device management (MDM) tools allow companies to connect their employees securely to basic corporate network resources. Enterprise mobility management (EMM) goes a step further by enabling secure mobile versions of business-critical applications and data loss prevention to protect corporate information. But in today's workplace, employees and businesses deal with a vast variety of devices with different operating systems and form factors, from PCs and laptops, to tablets and smartphones, and now, increasingly wearables and Internet of Things (IoT) endpoints. The solution is unified endpoint management (UEM), which enables organizations to take a consistent approach to manage and secure every endpoint, any app and content, and across deployment use cases from a single holistic platform. Read this whitepaper to uncover VMware AirWatch®'s leading UEM approach that is benefiting organizations tremendously.
Tags : 
    
VMware
Published By: HP     Published Date: Feb 02, 2015
In this study we compared the attributes of storage efficiency and ease of managing and monitoring an EMC VNX unified array versus an HP 3PAR StoreServ unified array. The approach we used was to setup two arrays side-by-side and recorded the actual complexity of managing each array for file and block access, per the documents and guides provided for each product. We also went through the exercise of sizing various arrays via publicly available configuration guides to see what the expected storage density efficiency would be for some typically configured systems. Our conclusion was nothing short of astonishment. Read this whitepaper to learn more.
Tags : 
    
HP
Published By: HP     Published Date: Feb 11, 2015
In this study we compared the attributes of storage efficiency and ease of managing and monitoring an EMC VNX unified array versus an HP 3PAR StoreServ unified array. The approach we used was to setup two arrays side-by-side and recorded the actual complexity of managing each array for file and block access, per the documents and guides provided for each product. We also went through the exercise of sizing various arrays via publicly available configuration guides to see what the expected storage density efficiency would be for some typically configured systems. Our conclusion was nothing short of astonishment. Read this whitepaper to learn more.
Tags : 
    
HP
Published By: Automation Anywhere APAC     Published Date: May 30, 2019
The University of Melbourne deployed Automation Anywhere’s Robotic Process Automation (RPA) technology to reduce manual work and automate a range of administrative processes across student admissions, faculty administration, and supplier tracking. The deployed software bots now automate the entry of all data and attachments for new admission applications, and the university has slowly expanded its automation capabilities for staff across other faculties. This has allowed the University of Melbourne to increase the efficiency of critical business processes, boost staff engagement, and improve customer experience for its teachers and student body.
Tags : 
    
Automation Anywhere APAC
Published By: Automation Anywhere APAC     Published Date: Aug 15, 2019
The University of Melbourne deployed Automation Anywhere’s Robotic Process Automation (RPA) technology to reduce manual work and automate a range of administrative processes across student admissions, faculty administration, and supplier tracking. The deployed software bots now automate the entry of all data and attachments for new admission applications, and the university has slowly expanded its automation capabilities for staff across other faculties. This has allowed the University of Melbourne to increase the efficiency of critical business processes, boost staff engagement, and improve customer experience for its teachers and student body.
Tags : 
    
Automation Anywhere APAC
Published By: Iconixx     Published Date: Mar 09, 2016
To unleash the beast in every sales professional, the sales beastmaster must wipe out every possibility of sales downtime caused by trivial administration and clunky processes. The beastmaster needs automated sales compensation
Tags : 
iconnix, automated sales compensation, sales compensation management, sales compensation solution, sales commission reconciliation, manual commission reconciliation, commission plans, data management
    
Iconixx
Start   Previous    64 65 66 67 68 69 70 71 72 73 74 75 76 77 78    Next    End
Search      

Add A White Paper

Email sales@inetinteractive.com to find out about white paper options for your company.