Cookie policy: This site uses cookies (small files stored on your computer) to simplify and improve your experience of this website. Cookies are small text files stored on the device you are using to access this website. For more information on how we use and manage cookies please take a look at our privacy and cookie policies. Some parts of the site may not work properly if you choose not to accept cookies.

sections
 

esi

Results 426 - 450 of 3229Sort Results By: Published Date | Title | Company Name
Published By: Stratus Technologies     Published Date: Jul 29, 2008
Protect the availability of business-critical processes while keeping costs in line. This e-book takes you from business analysis to design and deployment to an actual case study using recognized industry best practices and governance guidelines.
Tags : 
stratus, best practices, business process, bpm
    
Stratus Technologies
Published By: Cisco     Published Date: Oct 08, 2015
This document consolidates the enterprise campus network design and deployment guidelines with various best practices from multiple deeply focused Cisco Validated Design Guides. The best practices conclusions are derived from thorough solution-level end-to-end characterization of various levels of system types, network design alternatives, and enterprise applications.
Tags : 
cisco infrastructure, enterprise network, network design, infrastructure, migration, network architecture, network management, network performance, network performance management, quality of service, remote access, remote network management
    
Cisco
Published By: IBM     Published Date: Dec 30, 2008
Does your business need to safeguard information, keep auditors and regulators satisfied, and improve data quality? Data governance is the answer. This informative video outlines the latest challenges and best practices in data governance. IBM data governance solutions help businesses with:• Audit and reporting • Data architecture/infrastructure • Data quality • Information lifecyle management • Metadata/business glossaries • Organizational design/development • Policy/risk management • Security/privacy/compliance • Stewardship/value creation
Tags : 
ibm, data governance, safeguard information, data quality, data architecture, data infrastructure, information lifecycle management, metadata, business glossaries, organizational design, organizational development, policy management, risk management, security, privacy, compliance, stewardship, value creation, enterprise applications
    
IBM
Published By: IBM     Published Date: Feb 25, 2008
IBM HACMP supports a wide variety of configurations, and provides the cluster administrator with a great deal of flexibility. With this flexibility comes the responsibility to make wise choices. This paper discusses the choices that the cluster designer can make, and about the alternatives that make for the highest level of availability.
Tags : 
high availability, backup, recovery, utility computing, network management, ibm
    
IBM
Published By: DocuSign     Published Date: May 29, 2014
In this fast-changing environment, more HR and Staffing professionals are looking to solutions to empower them and their employees. Yet with over 2000 solutions, how do you know which ones are the best? Read this whitepaper and find out the 4 must have tools for HR and Staffing departments in order to streamline workflows, increase efficiencies and help employees help themselves to a better work experience.
Tags : 
docusign, hr technology, staffing professionals, streamline workflows, esignatures, enterprise applications
    
DocuSign
Published By: Docusign     Published Date: Feb 17, 2015
This paper explores the essential tools and technologies that empower HR to create positive interactions that lead to greater engagement while enhancing workflow processes.
Tags : 
electronic signature, esignature, best practices in hr technology, hr technology, technologies allow engagement, human resources technology, consequences of technology for hr
    
Docusign
Published By: Dell     Published Date: Feb 07, 2018
How can IT put PCs in the hands of their users without draining staff time and resources? IDC has put forth a deployment optimization model to help IT organizations understand how to deploy systems in less time, with fewer resources, and with better results. The model provides plenty for IT professionals to think about, including the wisdom of leaving some or all of the tasks to deployment experts who deploy PCs all day, every day. Join this on demand webcast today to learn about IDC’s view of the PC market, where it is headed, and best practices associated with their deployment optimization model. Speakers: • Rob Brothers, IDC, Program Vice President, Software and Hardware Support and Deployment Services • Jason Christensen, Dell EMC, Product Manager Intel Inside®. Powerful Productivity Outside. Intel and the Intel logo are trademarks of Intel Corporation or its subsidiaries in the U.S. and/or other countries.
Tags : 
    
Dell
Published By: Dell     Published Date: May 08, 2018
How can IT put PCs in the hands of their users without draining staff time and resources? IDC has put forth a deployment optimization model to help IT organizations understand how to deploy systems in less time, with fewer resources, and with better results. The model provides plenty for IT professionals to think about, including the wisdom of leaving some or all of the tasks to deployment experts who deploy PCs all day, every day. Join this on demand webcast today to learn about IDC’s view of the PC market, where it is headed, and best practices associated with their deployment optimization model. Speakers: • Rob Brothers, IDC, Program Vice President, Software and Hardware Support and Deployment Services • Jason Christensen, Dell EMC, Product Manager Intel Inside®. Powerful Productivity Outside. Intel and the Intel logo are trademarks of Intel Corporation or its subsidiaries in the U.S. and/or other countries.
Tags : 
    
Dell
Published By: GoodData     Published Date: Sep 17, 2013
In most cases, starting a BI initiative that’s not clearly linked to specific KPIs or business goals or aimed at addressing a specific pain point is sowing the seeds of eventual project failure. This is why it’s crucial to have the processes and mechanisms in place to establish what the desired outcome would be and to start from there.
Tags : 
gooddata, business intelligence, data. better data, bigger ideas, it management
    
GoodData
Published By: Lawson     Published Date: Jun 23, 2008
Lawson Enterprise Asset Management is a software solution specifically designed to help improve the reliability and availability of your critical assets. It can help you to maximize your profitability and return on your asset investment during every stage of the asset lifecycle. It can also be easily integrated with your other business operations and systems.
Tags : 
erp, eam, lawson, manufacturing, enterprise asset management
    
Lawson
Published By: Oracle Corporation     Published Date: May 11, 2012
Download this whitepaper, for a clear view of Oracle BI 11g and how it is designed to help today's organizations drive profitable growth, change, and many other operational and financial performance goals.
Tags : 
oracle, 11g, growth, change, operation, financial, performance, scorecards, business intelligence, alignment, insights, analytics, enterprise applications
    
Oracle Corporation
Published By: DocuSign     Published Date: Aug 09, 2016
This white paper is a guide to using eSignature on Office 365.
Tags : 
docusign, client satisfaction, office 365, technology, electronic contract, paperless, reduce costs
    
DocuSign
Published By: MuleSoft     Published Date: Sep 09, 2019
Im Geschäftsleben herrscht ein außerordentlich harter Wettbewerb. Kein Unternehmen – egal wie groß oder in welcher Branche – ist sicher vor Disruption. Um die damit einhergehenden Risiken zu mindern, ist es äußerst empfehlenswert, bewährte Microservices-Methoden zu implementieren, um Änderungen und innovative Neuerungen schnell und einfach umsetzen zu können und im Wettbewerb jederzeit Schritt zu halten. Organisationen, die bereits über ein Fundament für fortlaufende Innovationen verfügen, haben Microservices-Architekturen eingeführt, um schnell und effektiv auf die ständig neuen Anforderungen reagieren zu können. In diesem Whitepaper erfahren Sie mehr zu folgenden Themen: Warum Microservices zu den bedeutendsten Software-Trends gehören Design-Grundlagen für Microservice-Architektur So erleichtert die Anypoint Platform die Implementierung von Best Practices für Microservices innerhalb von Unternehmen
Tags : 
    
MuleSoft
Published By: IBM     Published Date: May 12, 2008
In today's rapidly changing business environment, it's important to be ready to respond to every risk or opportunity. In this white paper, you'll learn how to determine risks, calculate impact, evaluate your current structure’s response and test overall resilience. Then you'll see how IBM can help you combine several risk management strategies into a single integrated one, so you’re better able to respond to the threat of disaster and stay ahead of the competition.
Tags : 
disaster recovery, d/r, business continuity, risk management, ibm, ibm g&rm, ibm grm, global services
    
IBM
Published By: Trend Micro     Published Date: Sep 05, 2019
“EDR alone is simply not enough to empower security pros to detect, investigate, and respond to attacks at the pace they need to keep up with modern attackers. A broader detection and response approach is needed.” Register now and receive this exclusive white paper. Dave Gruber, ESG Senior Analyst takes a look at how you can increase the efficiency and effectiveness of detection and response through XDR, along with: • Strategic insight into the current state of threat detection and response, providing you with ESG’s comprehensive research and findings. • Current challenges affecting today’s organizations, including the time and resources required and numerous gaps that EDR exposes. • Valuable foresight into what’s next and how XDR—detection and response across email, endpoint, servers, cloud workloads, and network—can help solve these issues.
Tags : 
    
Trend Micro
Published By: Enterprise Mobile     Published Date: Jul 09, 2013
Device-centric management strategies have prevailed over the last several years, but this approach can no longer keep pace with the increasing number of remote workers who need to access more applications across multiple platforms. Enterprise IT leaders must shift from locking down devices to securing the corporate applications, data, and other proprietary content that reside on these devices. It’s time to move beyond mobile device management to a more holistic management method.
Tags : 
mobility-as-a service, enterprise mobile, mobility, enterprise mobility, mobile strategy, mobile security, mobile management, device management, enterprise mobile devices
    
Enterprise Mobile
Published By: Enterprise Mobile     Published Date: Jul 14, 2014
Device-centric management strategies have prevailed over the last several years, but this approach can no longer keep pace with the increasing number of remote workers who need to access more applications across multiple platforms. Enterprise IT leaders must shift from locking down devices to securing the corporate applications, data, and other proprietary content that reside on these devices. It’s time to move beyond mobile device management to a more holistic management method.
Tags : 
managed mobility services, mobility-as-a service, enterprise mobile, mobility, enterprise mobility, mobile strategy, mobile security, mobile management, device management, enterprise mobile devices, wireless
    
Enterprise Mobile
Published By: Enterprise Mobile     Published Date: Dec 11, 2014
Device-centric management strategies have prevailed over the last several years, but this approach can no longer keep pace with the increasing number of remote workers who need to access more applications across multiple platforms. Enterprise IT leaders must shift from locking down devices to securing the corporate applications, data, and other proprietary content that reside on these devices. It’s time to move beyond mobile device management to a more holistic management method.
Tags : 
managed mobility services, mobility-as-a service, enterprise mobile, mobility, enterprise mobility, mobile strategy, mobile security, mobile management, device management, enterprise mobile devices, wireless
    
Enterprise Mobile
Published By: MarkLogic     Published Date: Nov 08, 2016
Today, data is big, fast, varied and constantly changing. As a result, organizations are managing hundreds of systems and petabytes of data. However, many organizations are unable to get the most value from their data because they’re using RDBMS to solve problems they weren’t designed to fix. Download now to learn more.
Tags : 
    
MarkLogic
Published By: MarkLogic     Published Date: Jun 09, 2017
Today, data is big, fast, varied and constantly changing. As a result, organizations are managing hundreds of systems and petabytes of data. However, many organizations are unable to get the most value from their data because they’re using RDBMS to solve problems they weren’t designed to fix. Why change? In this white paper, we dive into the details of why relational databases are ill-suited to handle the massive volumes of disparate, varied, and changing data that organizations have in their data centers. It is for this reason that leading organizations are going beyond relational to embrace new kinds of databases. And when they do, the results can be dramatic
Tags : 
    
MarkLogic
Published By: MarkLogic     Published Date: Nov 07, 2017
Today, data is big, fast, varied and constantly changing. As a result, organizations are managing hundreds of systems and petabytes of data. However, many organizations are unable to get the most value from their data because they’re using RDBMS to solve problems they weren’t designed to fix. Why change? In this white paper, we dive into the details of why relational databases are ill-suited to handle the massive volumes of disparate, varied, and changing data that organizations have in their data centers. It is for this reason that leading organizations are going beyond relational to embrace new kinds of databases. And when they do, the results can be dramatic.
Tags : 
    
MarkLogic
Published By: IBM     Published Date: May 09, 2016
Agile methods have proven effective for software development and have grown in popularity across a number of software disciplines. Agile methods build capabilities using an iterative approach, as opposed to traditional approaches where requirements are defined early and designs are completed in full before a single line of code is written. Agile incrementally defines requirements with priorities, partial component designs and working systems that evolve through iterations called sprints. The question remains, however: Do the 12 agile principles apply to more than just software? Agile principles are in line with lean management’s approach. Given that, it seems as though agile principles should directly apply beyond software development. However, the answer is not straightforward, because differences between software and physical components affect how agile is applied. Let’s explore how agile can be applied in light of these differences.
Tags : 
ibm, continuous engineering, watson, iot, internet of things, agile, product development, software development
    
IBM
Published By: McAfee EMEA     Published Date: Mar 14, 2018
As every business decision-maker should now know, the E.U. General Data Protection Regulation (GDPR) enforcement date is coming. The GDPR will be enforced starting May 2018 and will apply to those collecting, storing or using the personal data of the residents of the European Union’s 28 member states. The Regulation changes requirements around protecting the personally identifiable information of over 500 million people, and occupies the minds of anyone around the world concerned with data protection. To better understand data decision-making, McAfee® commissioned Vanson Bourne to survey the views of 800 senior business professionals across eight countries around the world from a range of industry sectors.
Tags : 
    
McAfee EMEA
Published By: IBM     Published Date: Jul 24, 2008
Tune into this TDWI Radio News interview, with Eric Kavanagh, to hear Karen Parrish, vice president of business intelligence solutions for IBM, as she explains Big Blue's take on the evolving industry of data warehouse appliances.
Tags : 
    
IBM
Published By: Cisco EMEA     Published Date: Nov 13, 2017
Big data and analytics is a rapidly expanding field of information technology. Big data incorporates technologies and practices designed to support the collection, storage, and management of a wide variety of data types that are produced at ever increasing rates. Analytics combine statistics, machine learning, and data preprocessing in order to extract valuable information and insights from big data.
Tags : 
big data, analytics, virtualization, cloudera, ibm, sas, sap, splunk
    
Cisco EMEA
Start   Previous    11 12 13 14 15 16 17 18 19 20 21 22 23 24 25    Next    End
Search      

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.