Cookie policy: This site uses cookies (small files stored on your computer) to simplify and improve your experience of this website. Cookies are small text files stored on the device you are using to access this website. For more information on how we use and manage cookies please take a look at our privacy and cookie policies. Some parts of the site may not work properly if you choose not to accept cookies.

sections
 

alm

Results 151 - 175 of 498Sort Results By: Published Date | Title | Company Name
Published By: Dell EMC     Published Date: May 15, 2015
This Wikibon research shows that flash will become the lowest cost media for almost all storage from 2016 and beyond, and that a shared data philosophy is required to maximize the potential from both storage cost and application functionality perspectives.
Tags : 
emc, storage all-flash, array, architectures, workload, data center, scale, storage
    
Dell EMC
Published By: SAP SME     Published Date: Nov 02, 2017
Las expectativas del consumidor estan cambiando y los modelos de negocio tambien deberían hacerlo. En la era del consumidor digital, IDC asegura que solo aquellas empresas que puedan interactuar con cada consumidor individualmente –para construir relaciones a largo plazo que sean personales y auténticas– sobrevivirán y prosperarán.
Tags : 
    
SAP SME
Published By: Oracle Oracle Marketing Cloud     Published Date: Mar 10, 2016
Consumers worldwide have nearly 5 billion active mobile subscriptions- that’s almost a billion and a half more active mobile subscriptions than toothbrushes sold. With more than five times more mobile devices than PCs on the planet today, as a marketer, chances are your messages are being consumed in the mobile channel.
Tags : 
modern marketing, marketing, digital marketing, mobility, mobile marketing, mobile devices
    
Oracle Oracle Marketing Cloud
Published By: Rackspace     Published Date: Apr 17, 2018
Read this blog to see how larger enterprises are modernizing their infrastructure. Specifically, three tips to reduce risk and complexity that accompanies such efforts: Adopt tooling and prioritize automation Make sure operations has a seat at the table Adapt and update IT policies While those might sound obvious, it’s remarkable how many organizations attempt short cuts that almost inevitably lead to early failure. Read this blog to learn more!
Tags : 
    
Rackspace
Published By: Ping Identity     Published Date: Feb 12, 2016
Gartner projects almost 4 in 10 organizations will rely exclusively on BYOD by 2016, and 85 percent of businesses will allow some level of BYOD by 2020. If enterprises want peace of mind with regard to the security of their data and systems, they must understand employee perceptions and practices. Blurred lines between personal and work use impacts security and puts corporate data at risk.
Tags : 
    
Ping Identity
Published By: Puppet     Published Date: May 20, 2016
At Puppet, we've been looking at the state of DevOps practices for several years and helping organizations achieve higher levels of efficiency. We’ve learned a lot about the impact of DevOps at varying stages of IT automation maturity. As DevOps has moved from theory to implementation for more organizations, a host of DevOps myths have blocked adoption in many organizations. This publication debunks these myths so your organization can automate, innovate, and get ahead. Download this publication, featuring research from Gartner, to discover: - Why DevOps is applicable to legacy environments, traditional enterprises and hierarchical organizations. - Practices that underpin DevOps, from version control to automated testing to infrastructure as code. - How companies like Walmart, Staples, Ambit Energy and Infusionsoft have embraced DevOps and IT automation.
Tags : 
    
Puppet
Published By: Carbonite     Published Date: Oct 10, 2018
These days, a lot of organizations are looking to the cloud to help them protect their data. They wish to take advantage of the appealing economics and operational agility that are two of the biggest attributes of a cloud-based IT infrastructure. Leveraging the cloud can be a smart choice for any organization interested in gaining more control over costs (i.e., almost all organizations). According to ESG research, reducing costs was the second most commonly reported business driver affecting IT spending in 2016
Tags : 
    
Carbonite
Published By: CA Technologies EMEA     Published Date: Aug 03, 2017
Tenuto conto del fatto che la GDPR è stato annunciato formalmente solo di recente, si evidenzia un buon livello di consapevolezza tra i partecipanti. Una volta informati sul regolamento, l'88% degli intervistati ha dichiarato che la propria azienda deve affrontare difficoltà tecnologiche per la compliance alla GDPR. Il percorso verso la compliance è percepito come molto laborioso.
Tags : 
generazione di dati sintetici, virtualizzazione di servizi, controllo e protezione dei database, masking dei dati, warehouse dei dati, ca technologies, gdpr
    
CA Technologies EMEA
Published By: CA Technologies EMEA     Published Date: Aug 03, 2017
Las empresas que actualmente adoran las metodologías ágil y de desarrollo y aplicaciones luchan por lograr cambios rápidos e implementaciones veloces. Para estas compañías, la arquitectura de microservicios supone un regalo, pero no el fin de todas sus preocupaciones. Las organizaciones pueden habilitar a equipos de desarrollo más reducidos, dotados de una agilidad y autonomía mayores. Como resultado, el resto del negocio notará que la TI se ajusta mejor a las cambiantes demandas que se les proponen.
Tags : 
modularidad, velocidad de entrega, cero implementación, implementación automatizada, cohesión, separación de intereses, seguridad, ca technologies
    
CA Technologies EMEA
Published By: CA Technologies EMEA     Published Date: Aug 24, 2017
Las cuentas de usuario con privilegios, ya se usurpen, sean objeto de abuso o, simplemente, se usen de forma incorrecta, se encuentran en el corazón de la mayoría de las infracciones relativas a datos. Los equipos de seguridad evalúan, cada vez más, soluciones de gestión de accesos con privilegios (PAM) completas para evitar el perjuicio que podría provocar un usuario malintencionado con privilegios altos o un usuario con privilegios que está cansado, estresado o que, sencillamente, comete un error. La presión que ejercen los ejecutivos y los equipos de auditoría para reducir la exposición de la empresa aseguran el esfuerzo, pero las soluciones de PAM completas pueden acarrear costes ocultos, según la estrategia de implementación adoptada.
Tags : 
almacen de contrasenas, monitorizacion de contrasenas, entornos hibridos
    
CA Technologies EMEA
Published By: Commvault ABM Oct     Published Date: Feb 15, 2018
Enterprises and managed service providers (MSPs) have some similar challenges in the realm of data protection. Both have to deal with expansive environments—with enterprises protecting distributed offices/geographies, and MSPs protecting many independent subscribers. Both also have been seeing production data storage and secondary protection storage demands rising. Enterprises and MSPs alike should therefore be looking for data protection architectures that have scale-out capabilities built into their core foundation.
Tags : 
data protection, msps, data storage, scale out data protection
    
Commvault ABM Oct
Published By: Intapp     Published Date: Nov 01, 2019
Chief Marketing Officers who modernize business development strategies can accelerate revenue and market share growth with both new and existing clients. This requires unifying data across the entire client lifecycle, making that data transparent, and developing insights that drive better decision making across the board. How much of an impact can this modern approach make? According to a recent study conducted by ALM Legal Intelligence and Calibrate Legal, the investment pays off with Am Law 200 firms seeing an average return of $47 million on $1 million of marketing and business development spending. Download this point of view to learn what it takes to transform today’s law firm marketing from reactive to predictive. Topics include: Winning business with data-driven insights CMOs as change agents The data divide Smart collaboration in action: Key-client planning The pivot: From reactive to predictive
Tags : 
    
Intapp
Published By: Illusive Networks     Published Date: Apr 10, 2019
How well-equipped is your organization to stop malicious attackers once they’re inside your network? According to this study of over 600 IT security professionals, almost two-thirds of respondents lack efficient capabilities to detect and investigate “stealth” attackers before serious damage occurs. Download the report to learn the primary obstacles to better threat detection and incident response, how well organizations are hardening their environments against lateral movement, and how cybersecurity budgets are changing to address the reality that attackers will get in.
Tags : 
risk management, it security, ponemon institute, ponemon, cybersecurity, research report, cyber attack, data breach
    
Illusive Networks
Published By: Panaya     Published Date: May 31, 2018
You can succeed in your digital transfomation and deliver applications and services faster, better, and safely. How? With Enterprise Agile Delivery. Enterprise Agile Delivery brings a wealth of benefits to organizations and can be adopted by any Agile hybrid framework: SAFe, LESS, Nexus as well as Agile/lean frameworks like Scrum and Kanban. Yet to achieve Eneterprise Agile Delivery, enterprises need an easy to use modern ALM tool for quick and successful onboarding. Download this white paper to understand how the right solution will help you: › Strategiaclly align feature releases and backlogs with your overall business strategy › Identify and prioritize dev and test activities with visibility into project waves and portfolios › Make data-based decisons for safe releases with real-time insights and multidimensional views into delivery risks › Sync business, dev, QA and release teams around shared objectives with automated coordination and communication
Tags : 
    
Panaya
Published By: Panaya     Published Date: Jun 01, 2018
Hear IDC Research Director for ALM Strategies explain how establishing effective agile approaches to software development, QA and testing, ensures software relevance, streamlines execution and increases release velocity. Join IDC guest speaker and Panaya experts to hear: › IDC Research Director, Melinda-Carol Ballou cover the latest ALM industry practices › Which ALM strategies bring greater agility to your backend system › How to implement these practices to achieve frequent, quality change releases
Tags : 
    
Panaya
Published By: Infor     Published Date: Mar 07, 2017
El objetivo de las operaciones de un almacén es dar una respuesta perfecta los pedidos: entregar exactamente lo que un cliente pide, a tiempo y con una eficiencia óptima. El módulo de almacenes de una solución de planificación de recursos empresariales (ERP – Enterprise Resources Management) puede ayudar a los almacenes más pequeños. Pero los módulos de gestión de almacenes de los ERP tienen limitaciones y, en el caso de empresas con operaciones más complejas, puede ser más inteligente optar por las capacidades adicionales de un sistema de gestión de almacenes avanzado (WMS, Warehouse Management System).
Tags : 
    
Infor
Published By: Forcepoint     Published Date: Apr 20, 2016
Nel 2014, le violazioni dei dati hanno compromesso più di 700 milioni di informazioni, con perdite finanziarie stimate di almeno 400 milioni di dollari e gli incidenti di sicurezza sono aumentati fino al 66%. Ma non lasciare che la paura soffochi la crescita. Il report “Data Theft Prevention” si concentra su come innovare in completa sicurezza da una prospettiva più ampia, più mirata e più intelligente nell'applicazione.
Tags : 
security, data theft prevention, data security, security application
    
Forcepoint
Published By: Adaptive Planning     Published Date: Apr 25, 2012
In 2006 the world economy was booming, partly on the back of triple-A investment innovations. Then, suddenly, the boom ended. What fascinates the authors is the fact that almost no one saw the 2008 economic crisis coming. In this article, the authors come to terms with the reality that, in economics and business, accurate forecasts aren't possible. Therefore, they say, managers need to develop a different attitude about the future.
Tags : 
adaptive, business, finance, forecasting, business planning, budget
    
Adaptive Planning
Published By: Redstor UK     Published Date: Mar 12, 2018
The General Data Protection Regulation is set to shake up modern data protection laws. With large-scale data breaches making news headlines on a weekly basis throughout 2017, data regulation authorities across Europe will be hoping this can help resolve the challenges of data protection. However, with so many questions around how to comply it is still unclear how far this regulation spreads. Technologists are now looking for answers, wanting to know how the GDPR will affect backup and nonprimary data sets and what needs to be done to be compliant. This white paper will explore and understand aspects of the regulation to help answer questions and give clarity over what data is covered by the GDPR and what organisations need to do to be compliant. Redstor have specialised in assisting organisations with data protection and management for almost two decades. Providing compliant services around the areas of Data Backup, Disaster Recovery and Archiving.
Tags : 
    
Redstor UK
Published By: IBM     Published Date: Mar 29, 2017
Not just some data—all of it. Internal, external, structured, unstructured, historical, real-time. And what if you could do it without a huge infrastructure project? You can. Take a closer look at how three companies capitalized on more data—almost instantly—with IBM® BigInsights® on Cloud.
Tags : 
analyze, data, cloud, ibm, analytics
    
IBM
Published By: Entrust Datacard     Published Date: Jun 09, 2017
Security professionals attribute more than 63% of confirmed breaches to weak, default or stolen passwords. Analysts say more than 80% of all confirmed breaches involve privileged credentials. And the average cost of a data breach totals more than $3.8M. Almost every story reporting statistics like these concludes with “the password is dead.” The world clearly must move on from passwords in the battle to protect data – or at least attempt to phase them out.
Tags : 
    
Entrust Datacard
Published By: EMC Corporation     Published Date: May 27, 2014
RSA Technical Brief: The openness of today's networks and the growing sophistication of advanced threats make it almost impossible to prevent cyber attacks and intrusions. This technical brief discusses why combating advanced threats depends on organizations shifting more security resources from prevention to detection and remediation, and developing intelligence-driven security programs.
Tags : 
emc, security operations, security analytics, intelligence-driven security, threat detection, security monitoring, critical incident response, security
    
EMC Corporation
Published By: Brightcove     Published Date: Sep 17, 2014
6 Billion hours of video are watched EACH MONTH on YouTube .... That's almost 1 HOUR for every person on Earth! There is no denying the power and reach of YouTube. But, are quality issues common with YouTube videos negatively impacting your brand? We investigate.
Tags : 
online video quality, consumer perception, distribution strategies
    
Brightcove
Published By: Microsoft     Published Date: Nov 08, 2013
Learn how Forrester researched Microsoft’s Application Lifecycle Management and found that it increases productivity, lowers costs, and creates more agile IT organizations.
Tags : 
microsoft, application lifecycle management, increase roi, cutting development cycles, microsoft alm, increase productivity, create agile it organization, forrester consulting
    
Microsoft
Published By: ServiceNow     Published Date: May 21, 2015
Today, enterprises are increasingly dependent on business services delivered by their IT organizations. These services underpin almost every business function, ranging from manufacturing and supply chain through to customer service and online sales. Because of their critical nature, business services need to be highly available and responsive – any disruption has a major financial and customer impact. Download this study to learn more about ServiceNow’s ServiceWatch and how it can help your organization prevent outages that could lead to: • Lost revenue • Lost employee productivity • Lost customers
Tags : 
servicenow, applications, databases, cloud, virtualization, it management
    
ServiceNow
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.