significant

Results 176 - 200 of 1108Sort Results By: Published Date | Title | Company Name
Published By: Schneider Electric     Published Date: May 31, 2019
Colocation providers are dealing with market forces that represent both great opportunity and significant challenge – in some cases from the same development. Providers have to deal with an ever-changing set of buyers, with CFOs and COOs playing an increased role in the decision-making. And they need to address emerging trends such as the Internet of Things and cloud computing, which can have both a positive and negative impact on their businesses.
Tags : 
emerging threats, user experience, digital transformation, schneider electric
    
Schneider Electric
Published By: Okta     Published Date: Jul 01, 2015
Amadeus Capital Partners needed to centrally manage employee identities to successfully deploy Dropbox for Business. See how Amadeus gained significant IT savings, end-user productivity and security benefits with Okta in this short video.
Tags : 
    
Okta
Published By: Okta     Published Date: Jul 01, 2015
Are you facing a classic username and password proliferation problem? See how National Geographic leveraged Okta to create policy around employee usernames and passwords, prevent rogue IT scenarios, and provide significant cost savings and end-user productivity benefits.
Tags : 
    
Okta
Published By: Okta     Published Date: Aug 24, 2015
Amadeus Capital Partners needed to centrally manage employee identities to successfully deploy Dropbox for Business. See how Amadeus gained significant IT savings, end-user productivity and security benefits with Okta in this short video.
Tags : 
    
Okta
Published By: Okta     Published Date: Aug 24, 2015
Are you facing a classic username and password proliferation problem? See how National Geographic leveraged Okta to create policy around employee usernames and passwords, prevent rogue IT scenarios, and provide significant cost savings and end-user productivity benefits.
Tags : 
    
Okta
Published By: CA Technologies     Published Date: Sep 29, 2011
Organizations must confront the reality that insider attacks are a significant threat and increasing in complexity. Given that so much of an organization's assets and information are online and accessible, organizations must take a proactive approach to defending against the insider attack. This proactive attack should involve a range of solutions that address identity and access management and information protection. Nothing can completely prevent all insider attacks, but those who adopt an aggressive proactive approach can help reduce risk, improve compliance, and enable the IT organization to better support business initiatives.
Tags : 
risk, attack, security, business
    
CA Technologies
Published By: VMware     Published Date: Aug 23, 2011
Virtualization is the essential catalyst for enabling the transition to cloud computing. VMware, the fastest growing enterprise software company and virtualization industry leader, builds on virtualization to deliver cloud infrastructure and management solutions that significantly reduce IT complexity.
Tags : 
vmware, cloud computing, it revolution, virtualization
    
VMware
Published By: Dell & Microsoft     Published Date: Aug 14, 2013
With the arrival of Dell 12th generation servers (12G) and Microsoft Windows Server 2012, your organization can now significantly simplify Windows Server deployment. Window Server 2012 delivers a number of new enhancements and features over your current Windows Server 2003 or Windows Server 2008 infrastructure. With Windows Server 2012, your organization can benefit from improved virtualization, identity and access control management, graphical interface, storage and networking, and Web and application hosting. Dell 12G servers provide a powerful platform for Windows Server 2012 and its advanced features, giving your organization better performance, reliability and management, all of which improve return on investment (ROI) and your bottom line. For more information on powering Dell servers with Windows Server 2012, see www.dell.com/ws2012.
Tags : 
dell poweredge, 12g servers, windows servers, performance, reliability, control management, graphical interface, storage, networking, web hosting, application hosting
    
Dell & Microsoft
Published By: Oracle     Published Date: Feb 28, 2018
When application and database numbers increase, how does an organisation avoid overstretching its staff, multiplying costs, and complications? Many companies are using Oracle Exadata—a platform that’s powerful, optimised, and cloud-ready when you are. And they’re seeing, on average, a five-year ROI of 429 percent, 94 percent less unplanned downtime, and 103 percent improvement in transaction rates. See our infographic for more significant findings.
Tags : 
database, application, revenue, downtime, results, financial
    
Oracle
Published By: MobileIron     Published Date: Feb 05, 2016
In Forrester’s 25-criteria evaluation of enterprise mobile management (EMM) vendors, we identified the 11 most significant EMM providers — AirWatch by VMware, BlackBerry, Citrix, Good Technology, IBM, Landesk, Microsoft, MobileIron, SAP, Sophos, and Soti — and analyzed their offerings. This report details our findings about how well each vendor fulfills our criteria and where they stand in relation to each other to help infrastructure and operations (I&O) professionals select the right partner for their enterprise mobile management.
Tags : 
enterprise mobile management, emm, infrastructure and operations, mobileiron, forrester
    
MobileIron
Published By: OutSystems     Published Date: Oct 12, 2015
In The Forrester Wave™: Enterprise Public Cloud Platforms, Q4 2014, Forrester evaluates the 16 most significant Enterprise Public Cloud Platforms and details how each vendor fulfills the 19 evaluation criteria points.
Tags : 
outsystems, forrester, enterprise, public cloud, platforms, saas, infrastructure, networking, business technology
    
OutSystems
Published By: ServiceNow     Published Date: Feb 24, 2017
At the highest level of organizations, a new management directive has emerged to meet the changed nature of customer demands and interactions as well as the need to differentiate within the market. This directive has one goal: providing a differentiated customer service experience. As products become increasingly commoditized, organizations can set themselves apart from their competitors by providing a unique customer service experience that creates a "relationship" based on intangible benefits that their customers will find hard to give up. While this vision is theoretically sound, it requires a significant tactical shift in business thinking and processes. The modern customer's habits and service requirements have changed radically. Meeting these needs challenges many historically held beliefs and practices regarding the customer and modes of interaction.
Tags : 
    
ServiceNow
Published By: Concerto Cloud Services     Published Date: Dec 18, 2015
A private cloud offers the most secure way to more quickly deliver agile and updated applications. Coupled with the right provider that invests in security and utilizes the most recent technology advances, businesses can realize significant opportunities to save time, resources and money – all while reducing risk.
Tags : 
    
Concerto Cloud Services
Published By: Avi Networks     Published Date: Mar 06, 2019
Modern application architectures such as microservices are changing the way that modern enterprises run their infrastructure. Enterprises have become application-centric, investing significant effort and resources on continuous delivery goals and DevOps practices to achieve automation of routine IT and operations tasks. And now with the emergence of containerized applications, it is critical to re-evaluate how application services are provided across data centers and multiple cloud environments.
Tags : 
    
Avi Networks
Published By: Red Hat     Published Date: Jun 23, 2016
The Middleware Services Group within Information Technology Services (ITS) at the University of North Carolina at Chapel Hill needed a comprehensive, dynamic solution for frequent server provisioning requests and, in particular, managed servers. Without such a solution, the likelihood that users would employ outside vendors significantly increased. Use of outside vendors would potentially increase security concerns, present additional costs, and further complicate system administration. Moving to a fully-interoperable Platform-as-a-Service (PaaS) offering, built on OpenShift Enterprise by Red Hat, has allowed the middleware services team to deliver a flexible development and hosting environment that has fostered innovation and increased peace of mind.
Tags : 
best practices, technology, productivity, enterprise, red hat
    
Red Hat
Published By: SolidFire_NetApp     Published Date: Nov 21, 2016
It’s no surprise that the Software-as-a-Service (SaaS) market is exploding; its benefits are evident and mounting. In fact, IDC predicts that the SaaS market will grow significantly by 2020. SaaS end users are reaping the benefits of greater software efficiency, agility, reduced operational headaches, and trading CapEx for OpEx. The SaaS model enables low cost to entry, scale, and no maintenance as opposed to traditional software which placed these burdens on the end user.
Tags : 
    
SolidFire_NetApp
Published By: CA Technologies     Published Date: Nov 02, 2016
How did the company do it? By committing to an agile transformation, Swisscom was able to develop and deliver its TV 2.0 product quickly, launching a successful offering poised to capture significant market share.
Tags : 
    
CA Technologies
Published By: CA Technologies     Published Date: Nov 02, 2016
Customer obsession has created a business environment of continual disruption. Constant change is forcing execs to recognize that traditional planning and delivery practices don’t sustain the ability to focus on strategy while delivering new capabilities. To adapt to an environment where change is the new normal, project management office (PMO) leaders and enterprise architecture (EA) strategists are expanding Agile methods, but scaling Agile to the enterprise requires significant process, organization, and cultural change. This report identifies best practices for tackling this challenge.
Tags : 
    
CA Technologies
Published By: CA Technologies     Published Date: Aug 24, 2017
Growing your enterprise is an ongoing priority. And, as the application economy continues to expand, it’s likely that you’re looking at digital business initiatives to fuel a significant portion of that growth.
Tags : 
    
CA Technologies
Published By: Deluxe     Published Date: Mar 15, 2017
The financial services industry has been significantly impacted by the increasing use of technology from smartphones to wearables. This transformation in methods of transacting has enabled more personalized engagement, allowing customers to use multiple channels simultaneously to engage in seamless, multi-dimensional banking. This has also increased both the potential and complexity of creating a positive customer experience.
Tags : 
    
Deluxe
Published By: CA Technologies EMEA     Published Date: Sep 11, 2018
Speed is increasingly becoming the most important factor in project execution for a modern business. Of course, it has always been important to deliver projects as quickly as possible—that’s why schedules were developed and managed to. But historically those schedules were usually rather arbitrary. Today, things are very different. Customers expect more functionality more quickly than ever before, and they are unwilling to tolerate delays or missed commitments. Organizations have recognized the importance of minimizing time to delivery, seeking to leverage opportunities and solve challenges in as little time as possible, but in doing so they have frequently forgotten one critical aspect. They aren’t actively managing those time horizons—they are simply careening headlong toward the end goal. That can introduce significant problems, and that’s what we want to look at in this white paper.
Tags : 
    
CA Technologies EMEA
Published By: CA Technologies EMEA     Published Date: Sep 14, 2018
Data security risk caused by third parties is a pervasive problem. Yet, many organizations granting remote privileged access to third-party users leave gaps that represent significant security risks. If you’re like most organizations today, you frequently grant vendors, contractors and other non-staff members access to internal networks and systems. These privileged users remotely administer your operating systems, databases or applications using their own endpoint devices. Download the eBook to learn the five best practices to control security risk brought on by third parties.
Tags : 
    
CA Technologies EMEA
Published By: Limelight Networks     Published Date: Feb 21, 2018
Content delivery networks (CDNs) can significantly improve the user experience of your online audiences….but not all CDNs deliver the same level of service. Learn how to choose the right CDN for your business
Tags : 
    
Limelight Networks
Published By: This program is brought to you by Oracle and Intel     Published Date: Mar 15, 2018
When application and database numbers increase, how does an organisation avoid overstretching its staff, multiplying costs, and complications? Many companies are using Oracle Exadata—a platform that’s powerful, optimised, and cloud-ready when you are. And they’re seeing, on average, a five-year ROI of 429 percent, 94 percent less unplanned downtime, and 103 percent improvement in transaction rates. See our infographic for more significant findings.
Tags : 
    
This program is brought to you by Oracle and Intel
Published By: CA Technologies_Business_Automation     Published Date: Jun 29, 2018
In the 26-criteria evaluation of continuous delivery and release automation (CDRA) providers, we identified the 15 most significant — Atlassian, CA technologies, Chef Software, Clarive, CloudBees, electric Cloud, Flexagon, Hewlett packard enterprise (Hpe), IBM, Micro Focus, Microsoft, puppet, Red Hat, VMware, and Xebialabs — and researched, analyzed, and scored them. We focused on core features, including modeling, deploying, managing, governing, and visualizing pipelines, and on each vendor’s ability to match a strategy to these features. this report helps infrastructure and operations (I&o) professionals make the right choice when looking for CDRA solutions for their development and operations (Devops) automation.
Tags : 
    
CA Technologies_Business_Automation
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add A White Paper

Email sales@inetinteractive.com to find out about white paper options for your company.