practice

Results 401 - 425 of 3681Sort Results By: Published Date | Title | Company Name
Published By: HPE APAC     Published Date: Feb 24, 2017
In the full report, we will share with you what we learned and how you may be able to use this information to better inform your own path forward. Let’s start with a look at the general state of flash deployment in the data center.
Tags : 
flash storage, data center, storage, best practices
    
HPE APAC
Published By: HPE APAC     Published Date: Feb 24, 2017
In this white paper, we will examine the storage challenges faced by businesses. We consider the case for the allflash data center, discuss the importance of a flash-optimized data protection strategy, and provide tips for gaining support from business leaders for your vision.
Tags : 
flash storage, storage, sata protection, data protection strategy, data center, allflash, best practices
    
HPE APAC
Published By: IBM APAC     Published Date: Sep 25, 2017
Today, SAP’s solution portfolio looks very different and addresses different business needs than the SAP of a few years ago. Instead of primarily managing back-office enterprise resource planning (ERP) processes such as finance and the supply chain, SAP is evolving into a new type of software company that’s poised to enable digital business. Numerous acquisitions — including leading eCommerce solution hybris and cloud solutions Ariba, Concur, and SuccessFactors — and a new platform strategy based on SAP Hana, an in-memory computing solution, mean that the SAP core is positioned to support real-time digital business in the era of connected everything.
Tags : 
digital transformation, architecture, business processes, best practices, customer engagement, employee engagement
    
IBM APAC
Published By: CA Technologies     Published Date: Sep 25, 2017
These challenges stem from an increased focus on agility and scale for building modern applications—and traditional application development methodology cannot support this environment. CA Technologies has expanded full lifecycle API management to include microservices—an integration enabling the best of breeds to work together to provide the platform for modern architectures and a secure environment for agility and scale. CA enables enterprises to use best practices and industry–leading technology to accelerate and make the process of architecture modernization more practical.
Tags : 
api, microservices, digital transformation, performance management, enterprise, developers, ca technologies
    
CA Technologies
Published By: CA Technologies     Published Date: Sep 25, 2017
Microservices can have a positive impact on your enterprise- just ask Amazon and Netflix-but you can fall into many traps if you don't approach them in the right way. This practical guide covers the entire microservices landscape, including the principles, technologies, and methodologies of this unique, modular style of system building. You'll learn about the experiences of organizations around the globe that have successfully adopted microservices.
Tags : 
microservices, organization, business, ca technologies, architecture
    
CA Technologies
Published By: CA Technologies     Published Date: Sep 25, 2017
Several years into the app economy, business has changed. Accelerating product cycles and competitive threats now demand continuous planning. Change is constant and managing it is more important than ever. As a result, companies that for years have taken a traditional approach to managing initiatives are moving rapidly to implement agile business practices. And they’re seeing results, in the form of improved quality, faster delivery of value, reduced development costs and increased customer satisfaction. But this transition also creates new challenges and responsibilities for the project management office (PMO). In fact, the success of the transformation often hinges on the PMO’s ability to expand the underlying concepts of the agile development methodology into a companywide ethos¬—a concept known as business agility.
Tags : 
decision making, strategically, tools, pmo, entrepreneurial spirit, business, ca technologies
    
CA Technologies
Published By: Tenable     Published Date: Aug 07, 2018
The DevOps model drives digital transformation and the rapid delivery of new software products and services. However, this process largely takes place outside the purview of information security (InfoSec), often without their involvement. As a result, security teams struggle to keep pace. This whitepaper explores the intersection of DevOps and InfoSec, offering three reasons why security organizations will benefit by combining these two practices.
Tags : 
devops, dev sec ops, infosec, container security, idg, digital transformation
    
Tenable
Published By: Tenable     Published Date: Aug 15, 2018
"What’s your vulnerability assessment style? Are you scanning weekly, monthly or quarterly? And, what does your scanning habit reveal about the maturity of your organization’s vulnerability assessment practices, a critical part of cyber hygiene? These are the key questions Tenable Research set out to answer in our Cyber Defender Strategies Report. We discovered four common vulnerability assessment strategies in use today. These strategies tell us how mature an organization’s vulnerability discovery process is – and help us identify ways to improve. Download the report now to: - Learn what the four vulnerability assessment styles tell us about cyber risk maturity. - Compare your vulnerability assessment strategy to these four common scanning styles. - Find out what steps you can take today to improve your vulnerability assessment strategy – no matter where you are on the maturity scale."
Tags : 
cyber exposure, vulnerability management, vulnerability assesment, vulnerabiility scanner, cyber risk management, cyber risk, cyber security
    
Tenable
Published By: Tenable     Published Date: Nov 06, 2018
How are your peers securing the expanding attack surface within and beyond the traditional perimeter? Digital transformation is putting pressure on every organizational function – especially IT security. Whether it’s discovering short-lived assets like containers, assessing the state of cloud environments, or maintaining the security of web applications, accurately understanding and reducing cyber risk across your entire attack surface is a growing challenge. To give you perspective and insights into how other InfoSec leaders are addressing this challenge, join us at 2pm ET, March 15, 2018 for “Panel Webinar: Reducing Cyber Exposure from Cloud to Containers.” Tenable has assembled a panel of experts who will share their experiences and respond to your questions. Topics covered will include: Making the attack surface as small as possible Understanding asset priority and location Expanding visibility and control over assets beyond the perimeter Enhancing basic security practices to ac
Tags : 
    
Tenable
Published By: Tenable     Published Date: Feb 27, 2019
"Unlike other business disciplines (CRM, ERP, HR), cybersecurity lacks clear business metrics that help frame decision-making in language the C-suite and board easily understand. To evaluate which metrics matter most, Tenable commissioned Ponemon Institute to study the effects of cyber risk on business operations. The study, which surveyed 2,410 IT and infosec decision-makers in the US, UK, Germany, Australia, Mexico and Japan. Download the report now to: -See why organizations are vulnerable to multiple cyber attacks. Compare your own practices for measuring the business costs of cyber risk against those of peers in six countries. -Explore the seven key reasons why organizations struggle to evaluate the business impact of cyber events. -Get five tips, based on the research, that you can use today to start improving your ability to mitigate cyber risks in your own organization."
Tags : 
    
Tenable
Published By: IBM APAC     Published Date: Mar 06, 2019
A multicloud world is quickly becoming the new normal for many enterprises. Learn how the multicloud world is changing the face of IT. Understanding cloud environments and making decisions about multicloud management can be complex. IBM has identified ten key pain points and related best practices that help organizations successfully navigate these transformations.
Tags : 
    
IBM APAC
Published By: Kindred Hospital Rehabilitation Services     Published Date: Feb 22, 2019
A rehab program is only as good as its staff. Acquiring, retaining and keeping rehab talent engaged is critical for program effectiveness. Staffing issues can burden providers with additional costs and make it hard for them to deliver a consistently high quality of care, but there are key strategies to help relieve the staffing burden. The medical industry is facing a growing talent shortage. Recent estimates predict that America will be short of more than 130,000 doctors by 2025.1 Specialized departments will suffer especially high shortage rates. If healthcare providers want to minimize the impact of this shortage, they must optimize their recruitment and retention practices. This guide details the best strategies for making that happen.
Tags : 
    
Kindred Hospital Rehabilitation Services
Published By: Upside Travel     Published Date: Sep 20, 2019
A growing business can mean a lot of early mornings, late nights, business trips, impromptu meetings - the list goes on. With all this growth also comes the need to streamline manage costs, and keep your employees happy. Especially when it comes to the travel portion. Often one of the most costly line items, implementing the right travel practices at any stage of growth can make a significant impact on your team and overall business.
Tags : 
business travel/travel expenses, group travel, incentive travel, travel management, operational efficiency
    
Upside Travel
Published By: Juniper Networks     Published Date: Oct 19, 2015
The guidelines provided in this white paper make up some of the best practices entailed in creating an overall security policy for your organization that underlies deployment of effective firewalls.
Tags : 
juniper, firewall, threat, security, policy, configuration, packet, networking
    
Juniper Networks
Published By: Juniper Networks     Published Date: Oct 19, 2015
Many organizations that have realized the benefits of server virtualization are ready to move to network virtualization. By combining hardware and software resources and functionality into a single, software-based administrative entity, these organizations can reap the benefits of greater data center agility
Tags : 
best practices, network, virtualization, data center, software
    
Juniper Networks
Published By: Oracle     Published Date: May 13, 2017
Each chapter is illustrated by examples from successful businesses that have embraced digital technologies and the best practices being implemented so that CFOs and their finance teams have the opportunity to become the new organisational wide digital guidance system for their business.
Tags : 
modern finance, digital age, cloud, social, mobile, big data, big data analytics, digital transformation
    
Oracle
Published By: Oracle     Published Date: May 13, 2017
This digibook contains a step-by-step guide to overcoming the new challenges of raised expectations, big data, and globalization, with case studies and examples of how CFOs of the future are redefining reporting to improve their existing financial business process.
Tags : 
big data, globalisation, modern finance, case studies, best practices, finance
    
Oracle
Published By: Butler Technologies     Published Date: Jul 02, 2018
VoIP’s extreme sensitivity to delay and packet loss compared to other network applications such as web and e-mail services, presents a real challenge. A basic understanding of VoIP traffic and of the quality metrics provided by VoIP monitoring tools will help keep your network running smoothly. Follow our 10 VoIP best practices to ensure quality service for your network.
Tags : 
    
Butler Technologies
Published By: Oracle     Published Date: Oct 07, 2015
Aberdeen's Research Briefs provide a detailed exploration of key findings from a primary research study, including key performance indicators, Best-in-Class insight, and vendor insight.
Tags : 
    
Oracle
Published By: Oracle     Published Date: Oct 15, 2015
This brief will act as your roadmap with tips about how best to utilize people, processes, and technology to improve your company’s sales performance.
Tags : 
    
Oracle
Published By: Proofpoint     Published Date: Jun 22, 2017
Human targeted attacks continued to lead the pack in 2016. Attackers’ used automation and personalisation to increase the volume and click-through rates of their campaigns. Taking a page from the B2B e-marketer’s playbook, cyber criminals are adopting marketing best practices and sending their campaigns on Tuesdays and Thursdays when click-through rates are higher. Meanwhile, BEC and credential phishing attacks targeted the human factor directly--no technical exploits needed. Instead, they used social engineering to persuade victims into sending money, sensitive information and account credentials. Timing is everything—attackers know that hitting your employees with a well-crafted email at the just the right time produces the best results. Of course, this varies by region. So if you are responsible for worldwide SecOps, you need visibility into not only attack patterns but also when and which employees tend to click.
Tags : 
security solutions, ransomware, security technologies, protection technologies, malicious email, it security, server protection
    
Proofpoint
Published By: Oracle     Published Date: Mar 15, 2016
To capitalize on the growth in B2B eCommerce, B2B sellers need to address the rising expectations and needs of the modern business buyer. Read this eBook to learn best practices and the key capabilities you need in a modern B2B eCommerce platform to attract and retain today's business buyer. You will learn the key capabilities to drive revenue growth, improve customer experience, and address B2B complexity.
Tags : 
    
Oracle
Published By: SuccessFactors     Published Date: Sep 19, 2014
This paper provides 8 recommendations and best practices for turning engagement measurement into results.
Tags : 
engagement measurement, improving engagement in the workforce, how to measure workforce engagement
    
SuccessFactors
Published By: SuccessFactors     Published Date: Sep 19, 2014
This paper provides 8 recommendations and best practices for turning engagement measurement into results.
Tags : 
engagement measurement, improving engagement in the workforce, how to measure workforce engagement
    
SuccessFactors
Published By: Salesforce     Published Date: Dec 29, 2015
Join specialists from Salesforce and PwC to learn how you can improve security and compliance in the cloud by leveraging the core trust services of Salesforce — and the additional controls from the new Salesforce Shield suite of products.
Tags : 
salesforce, cloud, security, webinar, best practices, knowledge management, data management, business technology
    
Salesforce
Start   Previous    10 11 12 13 14 15 16 17 18 19 20 21 22 23 24    Next    End
Search      

Add A White Paper

Email sales@inetinteractive.com to find out about white paper options for your company.