Cookie policy: This site uses cookies (small files stored on your computer) to simplify and improve your experience of this website. Cookies are small text files stored on the device you are using to access this website. For more information on how we use and manage cookies please take a look at our privacy and cookie policies. Some parts of the site may not work properly if you choose not to accept cookies.

sections
 

guida

Results 101 - 125 of 372Sort Results By: Published Date | Title | Company Name
Published By: CA Technologies EMEA     Published Date: Sep 11, 2018
Welcome to the very first edition of Modern Monitoring, a collection of articles and insights designed to help IT operations and DevOps professionals deliver more resilient, supportable and high-performance IT services. It’s perhaps a sign of the times that monitoring as a discipline is receiving much more attention within the biz tech community. And deservedly so. The new distributed application architectures being built, together with the dizzying pace of software delivery, demand new approaches in what’s traditionally been perceived as a “keeping the lights on” IT practice. Of course, there’s no better way to consider monitoring than to draw parallels with other practices in related fields. It’s why we’ve included a couple of pieces with a distinct aeronautical flavor that discuss importance of instrumentation and contextual awareness.
Tags : 
    
CA Technologies EMEA
Published By: Iterable     Published Date: Sep 07, 2018
Today’s consumers are more informed, diverse, demanding and well-connected than ever before. With nearly unrestricted access to shopping resources used for discovery, comparison, and purchase, consumers are able to shop at will, often independent of branded retailer guidance. This rise of consumer independence can be attributed to the emergence of technological advancements favoring consumer empowerment; however, the repeated failures of brands to proactively offer personalized, high-value shopping experiences at scale is a significant contributing factor of consumer exodus. This has fostered an inclination among shoppers to become self-reliant in their pursuit of purchases, effectively shutting out promotional outreach from brands. Many brands continue to fall out of touch with their customers because they’ve lost sight of their customers’ true needs. Customer centricity has long been the foundation for modern marketing, but the brands which fail at creating deeply personalized market
Tags : 
    
Iterable
Published By: Dell EMC     Published Date: Aug 23, 2018
“Benché gli strumenti di progettazione 3D siano disponibili da tempo, la consumerizzazione della realtà virtuale offre nuove opzioni di visualizzazione a un ritmo senza precedenti. La visualizzazione ha raggiunto livelli tali da permettere ai progettisti di produrre immagini fotorealistiche dei prodotti in ambienti naturali in modo più rapido e accurato, velocizzando il time-to-market e consentendo ai client di sperimentare autonomamente il prodotto, il tutto senza i costi associati alla realizzazione di prototipi e modelli. Questa guida offre una panoramica degli sviluppi più recenti della visualizzazione e presenta i nostri nuovi centri di eccellenza per la realtà virtuale di Limerick, Cork, Parigi, Francoforte, Dubai, Santa Clara e Austin, dove si potranno constatare concretamente i vantaggi.” Rahul Tikoo Executive Director e General Manager Dell Precision
Tags : 
    
Dell EMC
Published By: NAVEX Global     Published Date: Jul 31, 2018
Compare your policy and procedure management programme to industry standards and identify where your programme needs improvements. Read the top challenges policy management programmes face in 2018 and expert recommendations on meeting those challenges. What You'll Learn: Where organisations are struggling with policy management What the best organisations do to create efficiency in their programme How organisations are starting to comply with new SFO and DOJ guidance How automated systems improve results and satisfaction for policy management
Tags : 
    
NAVEX Global
Published By: Vonage Business     Published Date: Jul 31, 2018
This white paper looks at how UCaaS is evolving and provides guidance on what buyers should look for while evaluating modern UCaaS solutions.
Tags : 
    
Vonage Business
Published By: VMware     Published Date: Jul 24, 2018
As infrastructure managers confront urgent demands for data center agility and cost savings, the benefits of Hyper-Converged Infrastructure (HCI) become all the more compelling. HCI enables lower cost IT operations and greater flexibility by combining compute, storage and management in a single software-defined solution on commodity hardware. This paper offers guidance on selecting an HCI solution. It is based on IT Central Station member reviews of VMware vSAN, a foundational component of VMware HCI.
Tags : 
    
VMware
Published By: VMware     Published Date: Jul 24, 2018
As infrastructure managers confront urgent demands for data center agility and cost savings, the benefits of Hyper-Converged Infrastructure (HCI) become all the more compelling. HCI enables lower cost IT operations and greater flexibility by combining compute, storage and management in a single software-defined solution on commodity hardware. This paper offers guidance on selecting an HCI solution. It is based on IT Central Station member reviews of VMware vSAN, a foundational component of VMware HCI.
Tags : 
    
VMware
Published By: Microsoft     Published Date: Jul 20, 2018
This guide presents a structured approach for designing cloud applications that are scalable, resilient, and highly available. The guidance in this ebook is intended to help your architectural decisions regardless of your cloud platform, though we will be using Azure so we can share the best practices that we have learned from many years of customer engagements. In the following chapters, we will guide you through a selection of important considerations and resources to help determine the best approach for your cloud application: 1. Choosing the right architecture style for your application based on the kind of solution you are building. 2. Choosing the most appropriate compute and data store technologies. 3. Incorporating the ten high-level design principles to ensure your application is scalable, resilient, and manageable. 4. Utilizing the five pillars of software quality to build a successful cloud application. 5. Applying design patterns specific to the problem you are trying to
Tags : 
    
Microsoft
Published By: Microsoft     Published Date: Jul 20, 2018
Each organization has a unique journey to the cloud based on its own starting point, its history, its culture, and its goals. This document is designed to meet you wherever you are on that journey and help you build or reinforce a solid foundation around cloud application development and operations, service management, and governance. At Microsoft, we have been on our own journey for the past decade, and over the past years we have learned important lessons by developing our own internal and customer-facing systems. At the same time, we've been fortunate to share the experiences of thousands of customers on their own journeys. This document is designed to share those experiences and distill them into proactive guidance. You do not need to follow these recommendations to the letter, but you ignore them at your peril. Our experience has shown that a careful approach to these topics will speed you along on your organization’s journey and avoid well understood pitfalls. For the past severa
Tags : 
    
Microsoft
Published By: Akamai Technologies     Published Date: Jul 02, 2018
Which bot management solution is right for you? Bots are responsible for 30% to 70% of website traffic. They range from good to middling to bad, and from simple to sophisticated. Many bot management vendors say they can solve your bot problem. But can they really? This e-book provides guidance on how to evaluate bot management solutions and understand what the differences mean for you and your customers. We cover the top 10 things to consider when selecting a bot management solution, from accuracy and API protection to flexibility and resilience over time.
Tags : 
    
Akamai Technologies
Published By: Cornerstone OnDemand     Published Date: Jun 29, 2018
There is no time like the present to come up with an improved strategy for employee retention and development. It is critical for you as supervisors and managers to engage employees effectively if you don’t want your top talent to look for opportunities elsewhere to grow in their careers. Help your employees do their best work by removing obstacles, recognizing valuable contributions and promoting creative approaches to career advancement. Take action to retain employees: authorize them to make decisions; initiate conversations about performance, be transparent; and provide guidance during times of change or uncertainty.
Tags : 
employee, retention, development, talent
    
Cornerstone OnDemand
Published By: Cherwell Software     Published Date: Jun 21, 2018
Some would have you believe that ITIL® is on its way out. That it’s no longer relevant in today’s fast-paced digital environment. But ITIL still holds many timeless truths. As a set of best practice recommendations, ITIL provides a solid foundation and a common language for IT service management (ITSM) in these rapidly changing times. The problems arise when ITIL is seen as dogma. If you apply it too literally—as rules to follow, instead of recommendations to consider—ITIL will slow you down. You’re left struggling to keep up with ever-increasing user demands, not to mention your enterprise’s need to modernize and digitally transform. If you suspect ITIL is slowing you down, read on to uncover the seven ways ITIL has commonly been misapplied—and gain guidance on how you can go faster, while still upholding ITIL principles.
Tags : 
itil, implementation, digital
    
Cherwell Software
Published By: Applause Israel     Published Date: Jun 19, 2018
There’s no denying the effect digital has on the retail industry. $.56 of every $1 spent in physical stores is influenced by digital. What’s more, three of the world’s top five retailers are internetfirst: Amazon, Alibaba, and JD.com. According to PricewaterhouseCoopers’ Total Retail 2017 report, 56% of global shoppers use Amazon. Of these, 28% say they shop less often at retail stores because of Amazon. 18% say they shop less on other retailers’ e-commerce sites because of Amazon. And 10% say they shop exclusively on Amazon. Retailers need to find a way to compete in this changing retail landscape. These five global trends can provide some guidance on where retail is headed and how brands can thrive in this new era of retail.
Tags : 
    
Applause Israel
Published By: Akamai Technologies     Published Date: Jun 14, 2018
"A zero trust security and access model is the solution: Every machine, user, and server should be untrusted until proven otherwise. But how do you achieve zero trust? Read this white paper authored by Akamai’s CTO, Charlie Gero, to learn how to transition to a perimeter-less world in an incredibly easy way, with steps including: • The zero trust method of proof • The vision behind Google BeyondCorpTM • Analysis of application access vs. network access • How to deploy user grouping methodology • Guidance for application rollout stages 1-8"
Tags : 
security, perimeter security, zero trust, cloud, enterprise security
    
Akamai Technologies
Published By: ADP     Published Date: Jun 01, 2018
The Marcus Buckingham Company, an ADP Company, commissioned Forrester Consulting to conduct a Total Economic Impact™ (TEI) study and examine the potential return on investment (ROI) enterprises may realize by deploying StandOut. The purpose of this study is to provide readers with a framework to evaluate the potential financial impact of StandOut on their organizations. To better understand the benefits, costs, and risks associated with this investment, Forrester interviewed several customers with experience using StandOut. StandOut is an integrated suite that pairs a technology platform with coaching to help organizations achieve their talent activation goals. Prior to using StandOut, the interviewed organizations did not have a structured program to improve and measure employee engagement and performance. Organizations used annual surveys and annual performance reviews, and some even encouraged weekly check-ins, but there was no guidance on how to complete these tasks, and the data t
Tags : 
    
ADP
Published By: CA Technologies     Published Date: Jun 01, 2018
Today’s most damaging security threats are not originating from malicious outsiders or malware but from trusted insiders - both malicious insiders and negligent insiders. This survey is designed to uncover the latest trends and challenges regarding insider threats as well as solutions to prevent or mitigate insider attacks. Our 400,000 member online community, Cybersecurity Insiders, in partnership with the Information Security Community on LinkedIn, asked Crowd Research Partners to conduct an in-depth study of cybersecurity professionals to gather fresh insights, reveal the latest trends, and provide actionable guidance on addressing insider threat.
Tags : 
    
CA Technologies
Published By: CA Technologies EMEA     Published Date: May 23, 2018
Oggi la tecnologia digitale è ovunque: cloud, mobility, social network e Internet of Things stanno cambiando il modo in cui tutti noi lavoriamo e ci divertiamo. Questo mondo digitale in rapida evoluzione sta anche rimodellando il rapporto tra le aziende e i clienti, che ora si aspettano dai propri brand preferiti un'esperienza utile e interattiva. Anche la sicurezza è motivo di preoccupazione. Azienda e clienti si scambiano un volume in continuo aumento di dati sensibili, aumentando i fattori di rischio.La trasformazione del mercato sta inoltre intensificando la concorrenza. Come osserva l'analista Mark Raskino, "Come conseguenza, tutti i contendenti hanno rielaborato le proprie strategie e si sono risvegliate alla potenza del business digitale nello stesso momento. Il conflitto è quindi inevitabile.
Tags : 
    
CA Technologies EMEA
Published By: CA Technologies EMEA     Published Date: May 23, 2018
Nell'economia digitale, le API (Application Programming Interfaces) sono essenziali per concretizzare rapidamente le idee e approfittare delle nuove opportunità di business. Rappresentano la chiave per la digital transformation, consentendo alle aziende di offrire una customer experience eccezionale, creare nuovi flussi di ricavi e permettere a dipendenti, partner, app e device di accedere ai dati ovunque e in qualsiasi momento.Le API non sono necessariamente una nuova tecnologia, ma nel mondo digitale di oggi hanno assunto una particolare rilevanza in ogni aspetto del business. Questo ha accresciuto l'esigenza di implementare una soluzione di API Management realmente efficace. Ma quali sono le caratteristiche di una soluzione efficace?
Tags : 
    
CA Technologies EMEA
Published By: CA Technologies EMEA     Published Date: May 23, 2018
Nel suo libro Psicologia della scienza, pubblicato nel 1966, lo psicologo americano Abraham Maslow analizzò la teoria secondo cui coloro che operavano in ambito psicologico necessitavano di un approccio alla cura da più punti di vista per favorire la genesi di nuove idee, senza limitarsi a utilizzare le stesse teorie e le medesime tecniche create da Freud e dai suoi seguaci in un passato ormai remoto. Partendo dal presupposto che può risultare difficile cambiare il proprio punto di vista, Maslow scrisse: "[...] La tentazione, se l'unico strumento che hai è un martello, è di trattare tutti i problemi come se fossero chiodi". Abbiamo fatto tutti questa esperienza. Siamo talmente abituati a fare le cose come si facevano in passato che a volte non ci chiediamo neppure più il motivo per cui continuiamo a farle oggi.
Tags : 
    
CA Technologies EMEA
Published By: CA Technologies EMEA     Published Date: May 23, 2018
Today’s most damaging security threats are not originating from malicious outsiders or malware but from trusted insiders - both malicious insiders and negligent insiders. This survey is designed to uncover the latest trends and challenges regarding insider threats as well as solutions to prevent or mitigate insider attacks. Our 400,000 member online community, Cybersecurity Insiders, in partnership with the Information Security Community on LinkedIn, asked Crowd Research Partners to conduct an in-depth study of cybersecurity professionals to gather fresh insights, reveal the latest trends, and provide actionable guidance on addressing insider threat.
Tags : 
    
CA Technologies EMEA
Published By: Schneider Electric     Published Date: May 14, 2018
Don't wait until it's too late! Start considering modernization options now.
Tags : 
modernization, data center lifecycle services, refresh-ups, mprs, assessment services, old ups, aging infrastructure
    
Schneider Electric
Published By: CrowdStrike     Published Date: May 10, 2018
Finding out your organization has been breached can be devastating news — knowing how to deal with an intruder that’s broken through your cyber defenses can be even more challenging. This white paper, “You’ve Been Breached — Now What? How to Respond to a Worst-Case Scenario,” offers practical steps IT and security professionals should take after a cyberattack occurs. You’ll receive guidance for both short-term and long-term strategies to help minimize damage, protect sensitive assets and preserve forensic evidence that can help during the investigation and remediation process. This paper also includes recommendations for strengthening your organization’s defenses against a future breach. They are based on decades of experience from CrowdStrike® incident responders who work on the front lines fighting cyberthreat actors every day. Download this White Paper to learn: • How to collect and preserve data after a breach so that critical forensic information can be retrieved • What sort of in
Tags : 
    
CrowdStrike
Published By: CrowdStrike     Published Date: May 10, 2018
Where to invest next: Identifying the people, processes and technology you need for an effective cybersecurity strategy Building your organization’s cybersecurity maturity doesn’t happen overnight. It takes time and thought to adequately assess all the factors that go into creating and implementing an effective security strategy, particularly what steps to take after you’ve made an initial investment in security. This white paper, “Where to Invest Next: Guidance for Maturing Your Cyber Defenses,” offers practical advice on achieving the level of cyber defense maturity that’s right for your organization. Learn why developing a security program that takes into account your risk level and the current state of your security posture is critical. You’ll also see why ensuring that everyone in the organization, from the leadership to the rank-and-file, is working toward the goal of cyber maturity is crucial to your success. Gain important insights into the cybersecurity maturity process incl
Tags : 
    
CrowdStrike
Published By: Epson     Published Date: May 10, 2018
This paper aims to: • Summarize recent developments in the current state of mobile transaction technology, with an emphasis on line busting as a part of mPOS systems • Highlight studies that point to mobile transaction’s projected significant short-term growth • Outline the business benefits of both mobile transactions and line busting • Provide in-depth guidance on how to evaluate mPOS systems for line-busting applications
Tags : 
    
Epson
Published By: Workday     Published Date: May 09, 2018
A cloud-based system for finance frees your finance team to do more than manage controls and transactions. But choosing one that supports your goals today and into the future, while helping your finance team act strategically, can be difficult. Read this whitepaper for guidance in selecting a system.
Tags : 
    
Workday
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.