Cookie policy: This site uses cookies (small files stored on your computer) to simplify and improve your experience of this website. Cookies are small text files stored on the device you are using to access this website. For more information on how we use and manage cookies please take a look at our privacy and cookie policies. Some parts of the site may not work properly if you choose not to accept cookies.

sections
 

dul

Results 226 - 250 of 540Sort Results By: Published Date | Title | Company Name
Published By: Cherwell Software     Published Date: Feb 24, 2017
Are you ready to transform your service desk and unleash the power of effective and affordable IT service management? Schedule your demo of Cherwell Service Management® today.
Tags : 
    
Cherwell Software
Published By: Schneider Electric     Published Date: Feb 17, 2017
This paper proposes standard terminology for categorizing the types of prefabricated modular data centers, defines and compares their key attributes, and provides a framework for choosing the best approach(es) based on business requirements.
Tags : 
data centers, container, it space, cooling, prefabricated modular data centers
    
Schneider Electric
Published By: IBM     Published Date: Jan 26, 2017
The IBM Counter-Fraud Management for Insurance solution is designed to help insurers prevent and intercept attempted fraud while detecting, identifying, and building the case against past fraudulent activity and improper payments.
Tags : 
ibm, analytics, insurance, counter-fraud management, fraud
    
IBM
Published By: Cisco     Published Date: Dec 21, 2016
Cisco® ONE Enterprise Cloud Suite delivers a modular approach to hybrid-ready private cloud that allows you to adopt cloud services at a pace that is comfortable for your business.
Tags : 
    
Cisco
Published By: IBM     Published Date: Dec 15, 2016
Watch to learn: - How to tackle the challenge of multi-speed IT with WebSphere Application Server's unique approach to delivering application infrastructure based on Java EE 7 - How to provide continuous availability for running modern apps that require on-demand dynamic scalability and high operational resiliency - How the lighweight and modular architecture of WebSphere Liberty provides an ideal foundation to develop and deploy microservices - How to deliver flexibility to develop, deploy and consume application infrastructure - on-premises or on the cloud, including emerging virtualization technologies such as Docker - How to manage and monitor thousands of applications and servers with a single management interface for ease of problem determination
Tags : 
ibm, middleware, it transformation, websphere application server, enterprise applications
    
IBM
Published By: Skillsoft     Published Date: Dec 06, 2016
Millennials are the first true “digital natives,” and because of this, they are often associated with driving new work practices and expectations. However, it is actually the ubiquity of technology, the accelerated pace of work and our consumer experiences that are driving new work practices, not millennials. New research tells us that to be engaging, L&D teams need to focus on modern learning rather than millennials.The formula for modern learning is: • Learner-centric • Micro/modular • Varied treatments • Retention-driven • Embedded • Mobile Download “Millennial Learning Myths and Misconceptions Prescriptions for a Modern Learning Strategy” for tips for enabling modern learning at your organization.
Tags : 
learning, engagement, millennials, learning and development
    
Skillsoft
Published By: Oblong     Published Date: Nov 18, 2016
Fujitsu created the Open Innovation Gateway (OIG) in the Silicon Valley as a platform dedicated to advancing the implementation of innovative practices in June 2015. The OIG spurs practical results and achieves goals based on collaboration throughout the organization from a wide range of fields. Fujitsu has been using the immersive Mezzanine solution as the collaborative heart of the OIG. Mezzanine allows remote teams to simultaneously share information on any device. Meeting participants can gesturally move and organize information across an immersive digital workspace. To achieve the same collaborative results as Fujitsu, schedule a demo at one of our locations and experience an immersive digital workspace first hand.
Tags : 
    
Oblong
Published By: Dell EMC     Published Date: Nov 04, 2016
With the 'EMC Mission Control' center in Portsmouth, UK and a second at the America’s Cup venue in Bermuda, plus a mobile center travelling worldwide to the preliminary events, Land Rover BAR will have all its data continuously replicated. The team in Portsmouth can analyze race and testing data immediately, as well as identify and make improvements right up to and through the finals in June 2017. This allows the design team and the crew to adapt much faster. With the introduction of the VCE VxRail Appliance powered by Intel® Xeon® processors, Land Rover BAR will be able to flexibly and rapidly scale, irrespective of location, ensuring a seamless experience for the team. To learn more about the impact of the Dell EMC VCE VxRail Appliance, read this brief infographic.
Tags : 
servers, flash storage, modular platforms, software-defined, networking, infrastructure
    
Dell EMC
Published By: JBoss Developer     Published Date: Oct 21, 2016
Microservices architecture is a new architectural style for creating loosely coupled but autonomous services. Emerging trends in technology—such as DevOps, Platform-as-a-Service (PaaS), containers, and continuous integration and delivery (CI/CD) methods—let organizations create and manage these modular systems on an unprecedented scale that exceeds earlier approaches like service-oriented architecture (SOA). But organizations that refactor monolithic applications into microservices experience widely varying degrees of success. The key to using microservices effectively is a solid understanding of how and why organizations should use microservices to build applications
Tags : 
microservices, architecture, java, paas, soa
    
JBoss Developer
Published By: IBM     Published Date: Oct 21, 2016
According to an IBM Center for Applied Insights survey of developers, while two-thirds of mobile apps fail to achieve budget, schedule and project objectives, the successful one-third rely heavily on cloud-based platforms such as the IBM MobileFirst Platform. Cloud-based platforms have been proven to reduce provisioning and development time by more than 90%. This on-demand webcast will demonstrate how you can leverage IBM’s Cloud offerings to accelerate your mobile transformation in a hybrid cloud.
Tags : 
ibm, mobile, ibm mobile cloud, cloud, digital business, networking, enterprise applications
    
IBM
Published By: Oracle     Published Date: Oct 20, 2016
This wnhitepaper illustrates how Oracle’s Project and Construction Execution Solution for integrated cost and schedule delivery helps ensure project success by uniting business processes and data from the time a contract is created to when work is completed at the job site.
Tags : 
    
Oracle
Published By: Entrust Datacard     Published Date: Oct 17, 2016
The end of SHA-1 SSL certificates is here – ahead of schedule. An upgrade to SHA-2 SSL certificates is necessary to maintain proper security, but do you know how to deploy this upgrade? Entrust’s SHA-2 migration guide will help you plan and execute a successful SHA-2 migration to avoid extra costs, eliminate service disruptions and ensure compliance.
Tags : 
    
Entrust Datacard
Published By: Schneider Electric     Published Date: Oct 17, 2016
This white paper compares the cost of both scenarios, presents the advantages and disadvantages of each, and identifies which environments can best leverage the facility module approach.
Tags : 
    
Schneider Electric
Published By: Schneider Electric     Published Date: Oct 17, 2016
This paper proposes standard terminology for categorizing the types of prefabricated modular data centers, defines and compares their key attributes, and provides a framework for choosing the best approach(es) based on business requirements.
Tags : 
    
Schneider Electric
Published By: Schneider Electric     Published Date: Oct 17, 2016
Questo white paper propone una terminologia standard per classificare i tipi di Data Center modulari prefabbricati, ne definisce e confronta le principali caratteristiche e fornisce una metodologia per adottare gli approcci più adatti in base ai requisiti
Tags : 
    
Schneider Electric
Published By: IBM     Published Date: Oct 11, 2016
IBM Transformation Extender is IBM's new modular transformation solution, encompassing IBM's key transformation tools WebSphere Transformation Extender and Standards Processing Engine. Part of a series of 5 videos by IBM Software Development Manager Mark Conner, this video provides an overview of IBM Transformation Extender.
Tags : 
ibm, commerce, b2b integration, ibm transformation extender, transformation solution, software development, enterprise applications
    
IBM
Published By: IBM     Published Date: Oct 06, 2016
IBM® i2® Analyst’s Notebook® provides rich visual analysis capabilities that help to quickly turn complex sets of disparate information into high-quality, actionable intelligence. It is designed to help analysts, and others involved in intelligence analysis, identify, predict, and prevent criminal, terrorist and fraudulent activities.
Tags : 
cyber security, intelligence, prevention, ibm, data protection, network management
    
IBM
Published By: AlienVault     Published Date: Oct 05, 2016
Use this checklist to help you document: Network information Logging devices Contact information Priority escalation contacts Scheduled events Download this whitepaper now to help lay the foundation for a successful MSSP implementation.
Tags : 
    
AlienVault
Published By: Determine (Selectica)     Published Date: Sep 13, 2016
We came to the above conclusion because even though suites solved many of the problems of independent, standalone modules to support integrated procurement processes in terms of data management nightmares, process inefficiency and visibility gaps that were common with first generation "best-of-breed" solutions, many mature organizations are increasingly finding that suites are not enough if they do not connect into larger enterprise processes and support the stakeholder organizations that procurement needs to work with. Are you with us? If you are, then you know that something else is needed: a source-to-pay (S2P) procurement
Tags : 
    
Determine (Selectica)
Published By: SAS     Published Date: Aug 03, 2016
Insurance fraud has existed wherever insurance policies are written, taking different forms to suit the economic times. Today the magnitude of insurance fraud is not only startling but increasing. Recent studies by the US National Insurance Crime Bureau (NICB) reported a 24 percent rise in questionable claims for the period 2011 to 2013. The full scale of insurance fraud is not known. And if fraudulent behavior is not discovered at the time the claim is submitted, the insurer may never know it occurred. Consequently, an uninvestigated claim can’t be labeled as fraudulent to investigate.
Tags : 
technology, best practices, security, analytics, insurance fraud
    
SAS
Published By: Puppet     Published Date: Aug 03, 2016
After you set up your users and groups, the next thing you’ll want to do is configure the software running on your machines. In this webinar, you’ll get a taste of the many kinds of services and packages Puppet can manage on Windows. We’ll present some common use cases that will help you get some quick wins under your belt, including: - Managing Windows services (Windows Time, Disk Defragmenter, etc.) - Installing packages - Managing Windows maintenance tasks via WMI by executing arbitrary PowerShell code - Creating scheduled tasks in the Task Manager Puppet can do a lot, but we always recommend starting small and building on your success. Make 2016 the year you banish manual configuration for good!
Tags : 
    
Puppet
Published By: IBM     Published Date: Jul 27, 2016
IBM's i2 Analyst’s Notebook offers a wide range of analysis and visualization capabilities that can aid in the identification of key actionable intelligence. Download this IBM White Paper to discover and deliver actionable intelligence to help identify, predict and prevent criminal, terrorist, and fraudulent activities with IBM i2 Analyst's Notebook.
Tags : 
ibm, cyber threat analysis, ibm i2 analyst notebook, analyst, cyber security, business intelligence, security
    
IBM
Published By: IBM     Published Date: Jul 20, 2016
In today’s complex and competitive business world, to be successful and survive, organizations need to be agile, flexible and fast to adapt to changes. Competition gets more aggressive and clients expect more every day, with the 24/7 nature of the global commercial world we live in and the vast availability of similar solutions, organizations and options, how do you stay ahead?
Tags : 
data center, cloud, storage, ibm, private cloud, hybrid cloud, prefabricated data center, modular data center
    
IBM
Published By: Cisco     Published Date: Jul 11, 2016
Read more to learn how Cisco® ONE Enterprise Cloud Suite delivers a modular approach to hybrid-ready private cloud that allows you to adopt cloud services at a pace that is comfortable for your business.
Tags : 
    
Cisco
Published By: Cisco     Published Date: Jul 11, 2016
Customer Name: Stanley Black & Decker, Inc. Industry: Manufacturing Location: Reynosa, Mexico Number of Employees: 52,000 worldwide Challenges: • Transparency of real-time production to schedule • Actual labor costs exceeding standard costs • Understanding effects of shift changes and resource shifts from line to line • Visibility to real-time overall equipment effectiveness and line productivity and reducing production line change over time
Tags : 
    
Cisco
Start   Previous    3 4 5 6 7 8 9 10 11 12 13 14 15 16 17    Next    End
Search      

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.