dom

Results 351 - 375 of 722Sort Results By: Published Date | Title | Company Name

Top 5 Reasons to Automate Identity Lifecycle

Published By: Okta     Published Date: Jul 19, 2016
Cloud-first, mobile-first organizations are seeing huge benefits from taking a more distributed approach to IT. Business units are given more freedom to evaluate and select SaaS applications that will enable efficiency and growth. Users are given more freedom to use the devices that make them the most productive. When this trend started, most IT organizations were able to implement some basic, manual processes to administer and govern IT in this best-of-breed distributed environment. However, as the number of touchpoints increases, IT needs to automate to keep pace. This paper goes into more detail on the top 5 reasons to automate identity lifecycle and identity administration and build a solid foundation for future cloud-first, mobile-first IT.
Tags : 
best practices, business optimization, business management, productivity, cloud services, mobile, identity, idaas, iam, identity lifecycle management, mobile, provisioning, active directory, security, cloud applications., business intelligence
    
Okta

Windows Configuration Management- Managing Users and Groups

Published By: Puppet     Published Date: Jul 13, 2016
If you’re new to Puppet on Windows, one of the first things you’ll want to do is start managing users and groups. In this webinar, we’ll demonstrate how to manage both local groups and Active Directory membership. The demo will include: - Managing administrator accounts - Managing local groups - Setting up a domain controller - Managing Active Directory membership Puppet can do a lot, but we always recommend starting small and building on your success. Managing users and groups is a great way to get started. Make 2016 the year you banish manual configuration for good!
Tags : 
    
Puppet

IDC: Pulsant Delivers Agile and Cost-Effective Hybrid Cloud

Published By: Cisco     Published Date: Jul 11, 2016
Pulsant is a United Kingdom-based IT infrastructure services provider focused on the small and medium-sized enterprise market. It offers public, private, and hybrid cloud services and a variety of managed, collocation, and professional services. Pulsant was one of the first cloud service providers to embrace software-defined networking (SDN) as a way to simplify its IT infrastructure, unify control of physical and virtual environments, and reduce capital expenses (capex) and operating expenses (opex). After evaluating a number of vendors, Pulsant chose Cisco's Application Centric Infrastructure (ACI) as the best SDN solution for delivering its hybrid cloud services.
Tags : 
    
Cisco

Performance and Efficiency for VMWare Data Protection

Published By: Dell EMC     Published Date: Jul 05, 2016
This report documents hands-on testing of an EMC data protection solution for virtual environments using Avamar Virtual Edition with a Data Domain system
Tags : 
data management, business practices, data center. data application, enterprise applications, security, performance management, network security appliance
    
Dell EMC

Work 3.0: The Next Generation Model for Smarter Business

Published By: Mitel     Published Date: Jun 29, 2016
Today’s world of business is increasingly fast-paced, competitive, technology-led and global. Cultural, technological and physical elements are working together to drive a rapid pace of change like never before. From demand for more freedom in the way we work and the Bring Your Own Device (BYOD) trend, to technology innovation and the increasing adoption of new devices, platforms and applications, to the breaking down of international and regional barriers.
Tags : 
best practices, business optimization, business management, productivity, business intelligence
    
Mitel

ZK Research: Cisco’s Branch Infrastructure Powers the Hybrid WAN

Published By: Cisco     Published Date: Jun 21, 2016
IT has gone through a significant evolution over the past decade. Virtualization has changed the entire face of the data center, the network edge has become predominantly wireless and consumer devices reign supreme. However, one of the few areas of IT that has yet to evolve is the corporate wide area network (WAN). Managing the WAN is something network managers have always struggled with because WAN speeds are typically an order of magnitude, or more, slower than local area networks (LANs).
Tags : 
    
Cisco

5 Keys to Creating Awesome Social Content

Published By: Tapinfluence     Published Date: Jun 07, 2016
Consumers are hungry for social content that speaks to their unique needs, but they seldom turn to brands to get it. In order to satisfy this need, you have to reach consumers where they already are with content that adds value beyond what any of your products can offer. This eBook will guide you through the process of creating optimized content for social campaigns, including recipes, styled photo collections, instructional videos, product reviews, and more.
Tags : 
content management, content delivery, best practices, performance management, reach, social content, business intelligence, business management
    
Tapinfluence

Supporto di AirWatch per Office 365

Published By: VMware AirWatch     Published Date: May 24, 2016
Recentemente, una delle domande più comuni dei clienti è: “In che modo AirWatch supporta Office 365?” Molti chiedono se AirWatch possa controllare l’accesso ad Office 365 (O365) non solo sul loro sistema del desktop aziendale, ma soprattutto dai dispositivi mobili.
Tags : 
best practices, business optimization, business management, mobile, support, application integration, business intelligence, business process automation
    
VMware AirWatch

Performance and Efficiency for VMWare Data Protection

Published By: Dell EMC     Published Date: May 13, 2016
This report documents hands-on testing and validation of an EMC data protection solution for virtual environments using Avamar Virtual Edition with a Data Domain system, with a focus on the ease of integration, efficiency, scalability, and backup/restore performance.
Tags : 
emc, vmware, data protection, data domain, backup, data management
    
Dell EMC

eBook: 7 Steps for Delivering Next-Generation Digital Customer Service

Published By: Genesys     Published Date: May 10, 2016
When people engage via digital touchpoints with your organization, they may forge seemingly random, winding paths along their journeys. Yet, no matter how many channels or interactions are involved, for the customer it is a single experience.
Tags : 
call center, cloud call center, cloud contact center, omnichannel, genesys, ebook, digital customer service, customer experience, contact center, touch points, omni channel, enterprise applications, business technology
    
Genesys

Top 5 Reasons to Automate Identity Lifecycle

Published By: Okta     Published Date: May 09, 2016
Cloud-first, mobile-first organizations are seeing huge benefits from taking a more distributed approach to IT. Business units are given more freedom to evaluate and select SaaS applications that will enable efficiency and growth. Users are given more freedom to use the devices that make them the most productive. When this trend started, most IT organizations were able to implement some basic, manual processes to administer and govern IT in this best-of-breed distributed environment. However, as the number of touchpoints increases, IT needs to automate to keep pace. This paper goes into more detail on the top 5 reasons to automate identity lifecycle and identity administration and build a solid foundation for future cloud-first, mobile-first IT.
Tags : 
    
Okta

Top 5 Reasons to Automate Identity Lifecycle

Published By: Okta     Published Date: May 09, 2016
Cloud-first, mobile-first organizations are seeing huge benefits from taking a more distributed approach to IT. Business units are given more freedom to evaluate and select SaaS applications that will enable efficiency and growth. Users are given more freedom to use the devices that make them the most productive. When this trend started, most IT organizations were able to implement some basic, manual processes to administer and govern IT in this best-of-breed distributed environment. However, as the number of touchpoints increases, IT needs to automate to keep pace. This paper goes into more detail on the top 5 reasons to automate identity lifecycle and identity administration and build a solid foundation for future cloud-first, mobile-first IT.
Tags : 
    
Okta

Enabling Governed Data Discovery

Published By: Pentaho     Published Date: Apr 28, 2016
Today, the need for self-service data discovery is making data governance a charged topic. As business-driven data discovery emerges as a fundamental need, the ability to ensure that data and analytics are trustworthy and protected becomes both more difficult and more imperative. This research explains how to manage the barriers and risks of self-service and enable agile data discovery across the organization by extending existing data governance framework concepts to the data-driven and discovery-oriented business. You’ll learn: - The implications of the "freedom vs. control" paradox - How to design for iterative, "frictionless" discovery - Critical checkpoints in data discovery process where governance should be in place
Tags : 
pentaho, governed data, data and analytics, governance framework, freedom vs control, frictionless discovery, networking, it management, wireless, enterprise applications, data management, business technology
    
Pentaho

Accurate Statistical Analysis of SERDES Links

Published By: Mentor Graphics     Published Date: Apr 25, 2016
Over the years, two major approaches to SERDES simulation have emerged and gained popularity: time-domain (or bit-by-bit) and statistical. Both are used to build the eye diagram and bit-error ratio (BER), and each has its benefits and limitations.
Tags : 
mentor graphics, analysis flow, bit by bit, serdes, ber, gigabit networking, internetworking hardware, electronic test and measurement, embedded systems and networking
    
Mentor Graphics

Infographic: Cloud Must-Haves for Developers

Published By: Cisco     Published Date: Apr 15, 2016
To make the most of the cloud, developers need to have the right foundations in place. If you’re working with enough freedom - and without having to worry about things like cost and data security – then you can concentrate on creating services and innovations that move your organisation forward.
Tags : 
cloud management, cloud services, cloud management, best practices, business intelligence, business management, business metrics, content integration, content management system, productivity
    
Cisco

The Keys to the Kingdom: Making Your Marketing Team More Data-Centric

Published By: Meltwater     Published Date: Apr 13, 2016
Everyone needs something to strive for to keep them on track. When you (or your boss) is wondering if you’re doing a good job, key performance indicators (KPIs) are there to answer the question and nudge you to even greater heights.
Tags : 
marketing, data, best practices, business optimization, public relations, communications
    
Meltwater

MozliwoSci Chmury Dla Przedsiebiorstw Gastronomicznych

Published By: Oracle     Published Date: Apr 06, 2016
Dobra wiadomosc dla dyrektorów z sektora gastronomicznego jest taka, ze istnieje sposób, by latwiej osiagac te cele: technologia chmury.
Tags : 
cloud computing, cloud, cloud computing platform, virtualization, infrastructure, infrastructure management
    
Oracle

Make the Move from IBM Lotus Notes and Optimize Your Business Apps

Published By: K2     Published Date: Apr 01, 2016
This white paper reveals how K2 blackpearl can help make the challenge of rebuilding your business applications more manageable. Its visual, easy-to-use tools help ensure that you are not dependent on consultants or even your IT department to build apps.
Tags : 
ibm lotus, ibm lotus domino, microsoft sharepoint, it management
    
K2

Lab Validation Report on EMC's Data Domain and Avamar

Published By: Dell EMC     Published Date: Mar 18, 2016
This report documents hands-on testing and validation of an EMC data protection solution for virtual environments using Avamar Virtual Edition with a Data Domain system, with a focus on the ease of integration, efficiency, scalability, and backup/restore performance.
Tags : 
emc, lab validation, data protection, avamar virtual edition, data domain, business technology
    
Dell EMC

Control and Freedom at the Same Time

Published By: Tyco Integrated Security     Published Date: Mar 09, 2016
Crime alone costs businesses dearly – as much as 5 percent of gross revenue each year.
Tags : 
tyco, security, control, freedom, crime, revenue
    
Tyco Integrated Security

Video or Text? Invest effectively in your content

Published By: Clicktale     Published Date: Feb 25, 2016
Businesses spend a lot of time and money on content creation. Forbes noted in Top 7 Content Marketing Trends That Will Dominate 2015 that 58% of B2B marketers plan on increasing their content marketing budgets in 2015. However, in many cases, the effectiveness of this investment and efforts are not obvious. In a study conducted by the Content Marketing Institute on B2C Content Marketing 2015: Benchmarks, Budgets, and Trends—North America, only 8% of the companies rated the effectiveness of their organization’s use of content marketing as “very effective”. You want to make sure that you’re spending your resources wisely and getting the highest ROI. So how can you choose correctly?
Tags : 
marketing, business development, website development, sales, business practices, best practices, business intelligence, business management, customer relationship management, web development, productivity
    
Clicktale

Ventana - How to Get Business Users to Switch from Spreadsheets

Published By: IBM     Published Date: Feb 17, 2016
In our benchmark research, at least half of participants that use spreadsheets to support a business process routinely say that these tools make it difficult for them to do their job. Yet spreadsheets continue to dominate in a range of business functions and processes. At the heart of the problem is a disconnect between what spreadsheets were originally designed to do, and how they are actually used today in corporations.
Tags : 
ibm, spreadsheets, ventana research, switch, spreadsheets, software development, it management, convergence, business technology
    
IBM

Stress Testing: A View from the Trenches

Published By: SAS     Published Date: Feb 09, 2016
Since the global financial crisis of 2008, stress tests have taken on growing importance and prominence in financial institution supervision and regulation. These tests, designed to measure an institution’s ability to maintain capital buffers and withstand extreme economic shocks, were imposed initially, and primarily, on the biggest multinational firms – those designated global significantly important banks (G-SIBs) or financial institutions (G-SIFIs). However, the circle for supervisory stress testing has widened to include a growing number of banks as defined by domestic jurisdictions – in the United States, for example, down to banks with $10 billion in assets under the Dodd-Frank Act Stress Test (DFAST) rule. What’s more, stress tests and their underlying scenarios can be of considerable value as a strategic management tool to a financial services company of virtually any type or size.
Tags : 
sas, white paper, stress testing, supervisory stress testing, security, it management, knowledge management, enterprise applications, platforms, data management
    
SAS

The Business Value of Red Hat Integration Products

Published By: JBoss Developer     Published Date: Feb 05, 2016
IDC analyzed the business value that six surveyed organizations are realizing through their use of Red Hat integration products based on interviews conducted from April to June 2014. Interviewees were from companies ranging in size from just hundreds of employees to several hundred thousand employees, with a mean employee base of just under 92,000. Companies interviewed included representatives from the telecommunications, IT, shipment and logistics, and document management industries. These organizations are headquartered in the United States, the United Kingdom, and Norway and several of them operate on a global scale. These organizations use JBoss Fuse for integration and development of business-critical internal and customer-facing applications
Tags : 
jboss, red hat, idc, integration, jboss fuse, data management, application integration, application performance management, best practices, business analytics, business integration, business intelligence, business management, business process management, business technology
    
JBoss Developer

10 essential elements for a secure enterprise mobility strategy

Published By: Citrix Systems, Inc.     Published Date: Jan 27, 2016
To unlock the full potential of enterprise mobility, IT needs to allow people the freedom to access all their apps and data from any device, seamlessly and conveniently. White paper attached
Tags : 
citrix, mobility, security, data, mobile workers, smart phones, wireless phones, data protection, secure content management, mobile device management
    
Citrix Systems, Inc.
Start   Previous    8 9 10 11 12 13 14 15 16 17 18 19 20 21 22    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.