Cookie policy: This site uses cookies (small files stored on your computer) to simplify and improve your experience of this website. Cookies are small text files stored on the device you are using to access this website. For more information on how we use and manage cookies please take a look at our privacy and cookie policies. Some parts of the site may not work properly if you choose not to accept cookies.

sections
 

eva

Results 276 - 300 of 2660Sort Results By: Published Date | Title | Company Name
Published By: Epson     Published Date: Dec 18, 2017
When it comes to display technology today, businesses tend to invest in flat panel TVs without much thought. But visual communication is an important element essential for success. When a new product is unveiled to a room of editors, when engineers analyze a circuit board, or when a teacher attempts to bring a classroom subject to life, visuals are as powerful as the spoken word, if not more. This paper offers insight on the state of visual display to ensure you make the right decision on your next investment, whether it’s a replacement, revamp, or remodel. Learn how to use and maintain visual display technology to make the greatest positive impact on your organization with the highest return of investment.
Tags : 
display technology, visual communication, virtual display, projectors
    
Epson
Published By: VMware     Published Date: Dec 18, 2012
Taneja Group presents an evaluation of the virtualization and cloud solution market for small and medium business (SMB) users.
Tags : 
virtualization, process management, cloud, operations management, viom, infrastructure operations management, infrastructure
    
VMware
Published By: Menlo Security     Published Date: Jun 01, 2018
"Multi-stage attacks are an increasingly popular approach used by cybercriminals. By sending a malicious attachment in a phishing email that contains an embedded URL, with no malevolent code, attackers can evade existing security solutions, like sandboxes and AV. How do you prevent these attacks before they happen? Download this white paper to find out: *How Menlo Security Labs recently isolated a multi-stage document attack *What tools, techniques and procedures ( TTPs ) are attackers using to infect victims’ devices *How Isolation can foil the attack before it can even start "
Tags : 
    
Menlo Security
Published By: SAP     Published Date: May 18, 2014
This TDWI Checklist Report presents requirements for analytic DBMSs with a focus on their use with big data. Along the way, the report also defines the many techniques and tool types involved. The requirements checklist and definitions can assist users who are currently evaluating analytic databases and/or developing strategies for big data analytics.
Tags : 
sap, big data, real time data, in memory technology, data warehousing, analytics, big data analytics, data management
    
SAP
Published By: SAS     Published Date: Mar 06, 2018
Tax fraud is already prevalent, and fraudsters are more sophisticated and automated than ever. To get ahead of the game in detecting fraud and protecting revenue, tax agencies need to leverage more advanced and predictive analytics. Legacy processes, systems, and attitudes need not stand in the way. To explore the challenges, opportunities, and value of tax fraud analytics, IIA spoke with Deborah Pianko, a Government Fraud Solutions Architect within the SAS Security Intelligence practice.
Tags : 
    
SAS
Published By: HP     Published Date: Feb 02, 2015
HP Converged System 700 offers the opportunity for enterprise organizations to drastically increase their IT and user productivity at a significantly lower TCO compared with alternative infrastructure virtualization approaches. This ESG white paper presents a detailed economic analysis for HP Converged System 700, is designed to provide potential customers with a comprehensive picture of the potential direct and indirect cost and benefit drivers they should consider when evaluating a HP Converged System 700 investment.
Tags : 
    
HP
Published By: Oracle Linux     Published Date: Oct 24, 2018
Security is everyone’s job today, from consumers, to system administrators, to executives. If you are doing business, you need to elevate the priority of security across your organization and data center. Over the years, cybercriminals have gotten more advanced and better funded. They are entire teams of highly trained hackers, and they have built it into a very profitable business. Cybercrime is big business. In many cases, states have built their own cyberattack teams. These teams are no less important to their state strategies than their army or navy. And just like these cyber-attack teams are prepared to attack anyone, you too must be prepared to defend against anyone. Whether you know it or not, you are in a cyber war. You need to be prepared.
Tags : 
    
Oracle Linux
Published By: MuleSoft     Published Date: Sep 27, 2017
Key Challenges • Companies must embrace digital transformation in order to stay relevant to their customers, else risk ceding market share to competitors who are able to adapt more quickly. • At its core, digital transformation is driving companies to reframe their relationships with their customers, suppliers and employees through leveraging new technologies to engage in ways that were not possible before. • These new technologies - SaaS, mobile, and the Internet of Things (IoT) - demand a new level of connectivity that cannot be achieved with yesterday’s integration approaches.
Tags : 
    
MuleSoft
Published By: IBM     Published Date: Jun 28, 2016
Businesses all over the world run on applications and data. Your business does as well. The success of your business relies on the performance of your applications because they deliver the services to your customers that keep you in business. Your IT infrastructure supports and carries these applications—the lifeblood of your company. How to keep things up and running, connected, responsive and relevant is enough to keep most app owners up at night.
Tags : 
business, technology, infrastructure, best practices, applications, productivity
    
IBM
Published By: IBM     Published Date: May 18, 2015
This book defines the basics of application release and deployment, and provides best practices for implementation with resources for a deeper dive. Inside you will find: • Business and technical drivers behind automated application release and deployment • Evaluation guides • Success stories that utilize application release and deployment solutions
Tags : 
application delivery, application deployment, software delivery methods, deployment solutions, automated application release, software development life cycle, migration, monitoring
    
IBM
Published By: IBM     Published Date: Apr 06, 2016
" This eBook will take you through the basics of application release and deployment, and provide best practices for implementation with resources for a deeper dive. Inside you will find: • Business and technical drivers behind automated application release and deployment • Evaluation guides • Success stories that utilize application release and deployment solutions Complete the short form to the right to download the eBook."
Tags : 
ibm, application release, devops, deployment, ibm urbancode, software development, enterprise applications
    
IBM
Published By: Cytiva, Inc.     Published Date: Aug 30, 2010
This document is designed to give you a high level overview of the kind of information security practices you should expect from any applicant tracking vendor you evaluate or use.
Tags : 
data protection, security, applicant tracking, cytiva
    
Cytiva, Inc.
Published By: ASG Software Solutions     Published Date: Apr 20, 2010
This paper can help you achieve successful legacy modernization projects. It presents practical steps for starting application modernization projects and describes the benefits of three high payback strategies. It also reviews the criteria for evaluating a variety of modernization tools.
Tags : 
asg, application modernization, clarity consulting, apo, application performance optimization, business intelligence
    
ASG Software Solutions
Published By: Lionbridge     Published Date: Nov 18, 2009
APM is one of the best tools for evaluating, balancing, and enhancing the value of application portfolios and supporting fact-based decision making.
Tags : 
implementing apm, lifecycle approach to apm, efficiency with apm, value of apm
    
Lionbridge
Published By: Dun & Bradstreet     Published Date: Mar 03, 2017
Creating predictive analytics from alternative data has become the current focus of the biggest quant trading firms in the industry The democratization of financial services data and technology, together with more intense competition, makes the needs of today’s market participants vastly different from those of previous generations. Firms must locate untapped sources of data for both public and non-public companies. This alternative data, such as payment data and other non-public information, from sources beyond the common channels, can be a predictive indicator of market performance; a difference maker in assisting firms as they develop models to evaluate their investments. By combining our unique data sets with advanced analytics, traders, analysts and managers can seek predictive signals and actionable information utilizing their own models. View our research report to learn how alternative data, our 'Information Alpha,' can help you earn differentiated investment returns.
Tags : 
    
Dun & Bradstreet
Published By: AppSense     Published Date: Oct 06, 2011
Significant differences exist in uptake of the different flavours of desktop virtualisation, for example in VDI the shared-server approach is more prevalent than 'one server per client'. It is likely that more organisations will seek the economies of scale offered by the shared server approach than those looking at the one server per desktop approach to deliver 'higher performance' desktops. However, there will be situations where centralising the management and other operational elements of a desktop estate by employing a one server per desktop approach are appropriate.
Tags : 
appsense, user, virtualization, data center, desktop management, technology
    
AppSense
Published By: Aprimo, Inc.     Published Date: Dec 23, 2008
Evaluating and managing the media buying processes for advertisements Warner Bros. purchases from its six sister companies can be time consuming and complicated. Generating reports for media purchased by each of Time Warner’s 2,500 media suppliers and comparing Warner Bros.’ spend decisions with competitors creates the need for internal resources dedicated specifically to focus on it – taking time away from other activities.
Tags : 
aprimo, financial system, auditing process, prioritize marketing programs, it management
    
Aprimo, Inc.
Published By: Dell EMC Storage     Published Date: Aug 15, 2019
La era digital ha dado pie a la proliferación de los datos que potencian a las empresas modernas. Cuando se aprovechan correctamente, las organizaciones ven el potencial de los datos para impulsar mejores resultados en todos los aspectos del negocio El uso de datos para soportar diferentes flujos de trabajo, el análisis y las actividades transforman la TI en un capital de datos, un recurso digital que impulsará valor del negocio. La medida en que una empresa alinea su organización con respecto a esta mentalidad de capital de datos, ya sea en la manera en que usan los datos y la manera en que se invierte en la tecnología de datos, puede tener un impacto duradero en el éxito de la empresa. En febrero de 2019, Dell EMC e Intel encargaron a Forrester Consulting un análisis que evaluara si la capacidad de aprovechar y aplicar el análisis y los datos en cada oportunidad se está convirtiendo rápidamente en un requisito previo para el éxito. Para probarlo, Forrester llevó a cabo una encuesta g
Tags : 
    
Dell EMC Storage
Published By: Esker     Published Date: Jun 29, 2017
With little to no oversight into billing and collections‚ it can be hard to evaluate and improve the performance of accounts receivable (AR) processes — but not anymore. AR Automation solutions provide access to critical analytics that go beyond DSO to transform your AR department into a more strategic‚ value-added operation. Read our new AR Analytics Playbook to discover the six essential metrics that can bring big gains in efficiencies‚ such as: • Faster customer payments • Reduced administrative costs • Enhanced collections efficiencies • Improved customer retention The competition isn’t getting any weaker. Start strengthening your business with an AR automation solution today!
Tags : 
accounts receivable management, invoice management, collections management, ar best practices, invoice portal, invoice delivery
    
Esker
Published By: CA Technologies_Business_Automation     Published Date: Jun 29, 2018
Application release automation (ARA) tools enable best practices in deploying and promoting applicationrelated artifacts, properties, configurations and even data across an application lifecycle in a safe, predictable and repeatable manner. Gartner reports that using an ARA tool is key to enabling DevOps and achieving continuous delivery. Wikipedia also defines five dimensions of scalability that can apply to ARA tools: • Administrative scalability • Functional scalability • Geographic scalability • Load scalability • Generational scalability This white paper will explain how each of these criteria is relevant when choosing an ARA product that is capable of scaling along with the growth of your enterprise.
Tags : 
    
CA Technologies_Business_Automation
Published By: NetApp     Published Date: Sep 25, 2017
Evaluate the four key design choices you need to consider when choosing your all-flash storage architecture. This report compares the design choices made by NetApp SolidFire and EMC XtremIO so you're better equipped to decide which product is best for your next-generation data center.
Tags : 
    
NetApp
Published By: NetApp     Published Date: Sep 19, 2017
Evaluate the four key design choices you need to consider when choosing your all-flash storage architecture. This report compares the design choices made by NetApp SolidFire and Pure Storage so you're better equipped to decide which product is best for your next-generation data center.
Tags : 
netapp, database performance, flash storage, data management, cost challenges, solidfire vs purestorage
    
NetApp
Published By: Palo Alto Networks     Published Date: Sep 30, 2016
Every year, record levels of money are spent on new IT security technology yet major breaches and compromises are more prevalent than ever. The concept of “layered security” in which an organization supports a wide variety of security technologies in order to discourage attackers doesn’t seem to be working. It’s time to rethink IT security not just the technology, but the way it’s approached from a strategic, architectural perspective.
Tags : 
palo alto, security, security architecture, saas, applications
    
Palo Alto Networks
Published By: Aerohive     Published Date: Oct 23, 2014
This analysis is designed to provide potential customers with a comprehensive picture of the direct and indirect costs and benefits they should consider when evaluating Aerohive or any other wireless connectivity solutions.
Tags : 
wireless connectivity, aerohive, controlle-less, benefits of wirelesss connectivity
    
Aerohive
Published By: Xiotech     Published Date: Apr 13, 2007
Organizations face a double whammy when it comes to data archive management. On one hand, the volume of digital and paper archives is growing exponentially. Industry analysts report that digital hard disk storage has grown 85 percent a year over the last eight years and 2.7 billion new sheets of paper are filed into folders every day.
Tags : 
data archive, data management, storage, data warehousing, archive management, document search, search and retrieval, document management
    
Xiotech
Start   Previous    5 6 7 8 9 10 11 12 13 14 15 16 17 18 19    Next    End
Search      

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.