Cookie policy: This site uses cookies (small files stored on your computer) to simplify and improve your experience of this website. Cookies are small text files stored on the device you are using to access this website. For more information on how we use and manage cookies please take a look at our privacy and cookie policies. Some parts of the site may not work properly if you choose not to accept cookies.

sections
 

critical

Results 426 - 450 of 2678Sort Results By: Published Date | Title | Company Name
Published By: KPMG     Published Date: Jun 06, 2019
Organisations increasingly need a delivery model for technology that can keep pace with the market. This is about more than doing the basics faster. Find out what ‘modern delivery’ looks like. Read this briefing to discover: • why modern deliver is a key enabler for the customer-centric, connected enterprise • how organisations can make better decisions before development begins • how future development teams will be organised • how to adjust policies and controls to create space for innovation • critical steps for achieving frictionless agility at scale.
Tags : 
    
KPMG
Published By: TARGUSinfo.     Published Date: Jul 31, 2008
Companies today are faced with consumers who they are less likely to know, but who are more knowledgeable about them than ever before. Consumers are more demanding, have access to masses of information and are more likely to shop around. This briefing discusses how the right knowledge at the right time is the critical factor in winning over new customers.
Tags : 
targus, targus info, targusinfo
    
TARGUSinfo.
Published By: KPMG     Published Date: Sep 20, 2018
Our client's critical back office systems hadn't kept pace with it's aggressive growth. The software had been customized over the years and had become costly and complex to operate. We know how to get things done.
Tags : 
kpmg, business transformation
    
KPMG
Published By: VASCO     Published Date: Jul 12, 2012
Read more of this whitepaper to explore critical elements in which strong authentication solutions can be applied with SaaS applications to help drive adoption and improve user experience.
Tags : 
vasco, cloud computing, technology, saas applications, authentication, security
    
VASCO
Published By: IBM ILOG.     Published Date: Jul 14, 2009
Has your organization run into difficulties adapting to evolving business conditions? Is there interest in being able to increase the efficiency of your operational processes? Are your business experts looking to more easily control the decisions within mission-critical systems? If you have answered 'yes' to any of the above, you may benefit from integrating a Business Rules Management System (BRMS) into your organization's overall enterprise architecture.  Learn more today!
Tags : 
ibm, organization, brms, business conditions, business rules management system, enterprise, improvement, profitabilty
    
IBM ILOG.
Published By: Splunk     Published Date: Sep 17, 2012
Splunk has become a critical real-time monitoring and analytics tool for Bronto. Read more about Bronto Software's hard and soft ROI's by using Splunk versus extending their Hadoop deployment.
Tags : 
roi, enterprise management associates, real time monitoring, analytics, hadoop, email delivery system, enterprise business solutions, security
    
Splunk
Published By: Brother     Published Date: Mar 08, 2018
The last decade has seen many exciting advances in connectivity accelerated by the near universal availability of smartphones and tablets – leading to a highly interconnected world. The security of networks - and the businesses and individuals that rely on them - has become top of mind for the IT Security professionals who are responsible for ensuring the safety of the data and the networks where this information is utilized. As high-visibility security breaches occur - affecting ecommerce, banking, retail and other industries - the critical importance of the security of the infrastructure these businesses rely on continues to grow. Security in the workplace is a daily fact of life. From using ID cards to control physical access, to entering passwords to join the network, to using software to monitor and prevent unauthorized access, all are routinely used to protect critical assets and information. However, there is one key area where many organizations still have potential vulnerabili
Tags : 
network security, security breaches, pci, dss, hippa
    
Brother
Published By: Quocirca     Published Date: Jul 03, 2008
Technology is no longer a nice to have, or a tool for the few. With many organizations now being completely dependent on their IT systems, the need for the IT department to be seen to be responding to the organization's requirements is of critical importance.  Business Service Management, or BSM, can help in providing underpinnings to the IT function. This paper looks at how the changing processes and market conditions within an organization can be augmented through the use of a Business Service Management (BSM) approach, creating a flexible and responsive technology infrastructure aimed at supporting a rapidly changing commercial landscape and enabling greater competitiveness in the markets.
Tags : 
quocirca, business service management, bsm, service management, business management
    
Quocirca
Published By: Akamai Technologies     Published Date: Jul 02, 2019
In today’s markets, customer identities and the personal data associated with them are among the most critical and valuable assets of any enterprise. Managing these digital identities — from first registration and login to the later stages of the customer relationship — and extracting business value from the associated data are complex tasks, commonly referred to as customer identity and access management (CIAM). When implementing a system to collect, manage, and utilize digital identity and customer data, companies have two basic choices: in-house development or buying a dedicated solution from a vendor specialized in CIAM (i.e., build vs. buy). Read this white paper for an in-depth analysis of CIAM implementation options, including: ? Must-haves for a successful, enterprise-grade CIAM system ? Pros and cons of implementation options, ranging from in-house software development to commercial off-the-shelf solutions ? A real-world case study that illustrates the ROI of an effective CI
Tags : 
    
Akamai Technologies
Published By: CA Technologies EMEA     Published Date: Apr 10, 2018
Focus on Value. “The benefits of agile are multidimensional. But the most important change is that it focuses the entire organization on meaningful delivery to the customer. Instead of relying on indirect metrics describing degrees of our software’s quality and progress ... we ask, ‘What percent of critical functionality is included in this release?’ This emphasis on customerperceived value impacts our entire project life cycle pretty significantly.” Vice President of Infrastructure Management BMC Software.
Tags : 
    
CA Technologies EMEA
Published By: IBM     Published Date: Oct 26, 2016
Predictive analytics transforms organizations. Watch this video to see how predictive analytics can improve outcomes in four strategic areas critical to the success of your business: - Customer satisfaction and retention - More effective HR processes - Fraud and threat detection and prevention - Revenue growth and profitability
Tags : 
ibm, analytics, predictive analytics, enterprise applications
    
IBM
Published By: NetApp     Published Date: Nov 13, 2017
This paper desribes key ways to accelerate business transformation by using the cloud for more workloads and controlling your data to keep critical data secure and compliant.
Tags : 
    
NetApp
Published By: Sitecore     Published Date: Feb 24, 2017
Gartner’s Critical Capabilities report helps you understand the evolving role of WCM, five use cases to consider, and how 19 WCM vendors score on each of the use case criteria.
Tags : 
gartner critical capabilities, wcm, web content management, digital business strategy, digital roadmap
    
Sitecore
Published By: Sitecore     Published Date: Mar 27, 2017
Gartner’s Critical Capabilities report helps you understand the evolving role of WCM, five use cases to consider, and how 19 WCM vendors score on each of the use case criteria.
Tags : 
    
Sitecore
Published By: Hewlett Packard Enterprise     Published Date: Aug 02, 2017
In this increasingly complex competitive environment, IT has become a critical factor to the success of any business. Companies seek to leverage IT capabilities and services to drive improvements in all aspects of their business operations.
Tags : 
    
Hewlett Packard Enterprise
Published By: Nutanix     Published Date: Aug 22, 2019
Today, companies of all sizes face growing threats from shifting consumer habits, global competitors, and well-funded startups. Digital transformation, cloud computing, and the dynamic nature of global business have changed business expectations, making IT an essential driver of revenue and an ever more critical part of your business. Your IT team is looking for ways to accelerate the adoption of digital technologies to increase customer engagement, streamline business processes, and gain a sustainable competitive advantage.
Tags : 
    
Nutanix
Published By: ServiceNow     Published Date: Apr 19, 2013
As an IT infrastructure and operations (I&O) leader you understand the business and IT impact of service management and automation (SMA). SMA done right will improve staff productivity, increase the quality of services, reduce operational costs, and improve the overall IT organization’s reputation with the business. That is why building the business case to secure funding and executive support for SMA is critical.
Tags : 
roi, it infrastrucutre, service management, automation, productivity, quality of service, customer service
    
ServiceNow
Published By: Genesys     Published Date: Jun 19, 2019
Today’s customers want fast, hassle-free, personalized interactions across channels. Global brands like PayPal, Heineken and Vodafone have embraced technology to deliver truly connected, omnichannel customer experiences. By migrating to a best-in-class customer experience platform, they’ve been able to: Meet critical business timelines with a cloud-based transition Address industry-specific regulatory requirements Reduce maintenance and operational costs Optimize employees Accelerate time-to-value and ROI Improve Net Promoter Score, customer satisfaction, call resolution Learn the four steps to plan and execute a successful, seamless migration and customer experience transformation.
Tags : 
    
Genesys
Published By: Infosys     Published Date: May 30, 2018
Enterprises often accord the lowest priority for modernizing systems running business-critical applications, for fear of disruption of business as well as the time it would take for the new system to stabilize and come up to speed. A large telecom company had the same fears when they decided to modernize the reporting data warehouse which produced reports critical for making business decisions. See how Infosys helped and the five key takeaways from the project.
Tags : 
data, fortress, modernize, business, applications, telecom
    
Infosys
Published By: Infosys     Published Date: Jun 12, 2018
Enterprises often accord the lowest priority for modernizing systems running business-critical applications, for fear of disruption of business as well as the time it would take for the new system to stabilize and come up to speed. A large telecom company had the same fears when they decided to modernize the reporting data warehouse which produced reports critical for making business decisions. See how Infosys helped and the five key takeaways from the project.
Tags : 
data, fortress, modernize, business, applications, telecom
    
Infosys
Published By: Nokia     Published Date: Mar 03, 2016
This white paper reveals how extensive deployment of video surveillance places heavy demands on network resources. The mission-critical network must therefore be able to support the high-bandwidth required by video traffic efficiently, with multiple stringent QoS levels.
Tags : 
ip cctv, nokia, ip video cameras, video, video management, video management system, ip video traffic, ip cctv system architecture
    
Nokia
Published By: Extreme Networks     Published Date: Feb 23, 2017
The network has never been as critical to the healthcare sector as it is today. Electronic health records, Wi-Fi-connected medical devices, and clinician smart phones are among a plethora of healthcare technologies that depend on a stable network. The consistent development of this infrastructure is key for the healthcare sector to continue its successes in creating new possibilities for management, patient and family experience, and patient outcomes. Extreme Networks posed key questions to Nolan Greene, a senior research analyst with IDC’s Network Infrastructure group, who highlights the critical issues healthcare IT professionals must consider when building a network that maintains industry needs. Download this report to learn about: • Why having a modern healthcare infrastructure is so important • The major challenges IoT brings to healthcare networks • How IEC 80001 is impacting compliance • Trends that confront a network IT professional in healthcare • Risks Healthcare IT must eli
Tags : 
healthcare, iot, iec 800001, extreme networks, healthcare it
    
Extreme Networks
Published By: MuleSoft     Published Date: Nov 27, 2018
Access to data – particularly customer data – is critical for companies looking to transform customer experience. This is why organizations start initiatives to create a single customer view. Building this single customer view without APIs, however, is becoming more difficult due to the large number of fragmented systems. Read this whitepaper to learn: A new approach to modularizing your single customer view, to accommodate changes, trends, market shifts, and other factors in order to deliver the right experience to your customers at the right time. How an API-led approach to integrating systems provides a well-constructed single customer view using APIs, and we’ll also suggest tools to make this job easier. The stories of customers like Mount Sinai Health System, who used MuleSoft’s solution and approach to successfully set up a single customer views using APIs.
Tags : 
    
MuleSoft
Published By: IBM     Published Date: Jul 07, 2016
With SUSE Linux Enterprise Server on IBM Power Systems, you gain the benefits of the latest generation of Enterprise Linux OS with the power and reliability of IBM hardware. This combination provides the performance and flexibility to run the most demanding business-critical workloads.
Tags : 
ibm, ibm power systems, suse, suse linux enterprise server, linux, ibm hardware, open source
    
IBM
Published By: Oracle     Published Date: Apr 05, 2016
With cybercrime and security breaches sharply on the rise, protecting valuable information from cyberattacks is an ongoing challenge for companies. In this increasingly insecure world, your critical information deserves the best protection, making the database and surrounding infrastructure the best line of defense. Protect your data better through evolving your approach to data security. Learn about three key steps to reinvent the security of your surrounding infrastructure to create an information fortress by protecting your valuable data at its source.
Tags : 
information management, security, best practices, information secuirty
    
Oracle
Start   Previous    11 12 13 14 15 16 17 18 19 20 21 22 23 24 25    Next    End
Search      

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.