host

Results 126 - 150 of 761Sort Results By: Published Date | Title | Company Name

IT Automation for Dummies

Published By: VMware     Published Date: Apr 09, 2019
In the modern digital age, traditional barriers to entry and time to market have fallen. Agile businesses can turn an idea into an app, host it in the cloud, and quickly deliver it to millions of customers on their chosen devices and platforms. In comparison, many larger enterprises miss new business opportunities because they’re mired in managing complex, legacy infrastructure, inefficient cross-functional workflow and approval processes, and lengthy audit and compliance requirements.
Tags : 
    
VMware

A CPG major achieved 30% improvement in task completion rate

Published By: Larsen & Toubro Infotech(LTI)     Published Date: May 21, 2019
One of the largest consumer product goods conglomerates wanted their entire platform to be re-hosted, and also enhance its storage and stability. The LTI-developed Cloud Native app on Azure PaaS also helped drive the business value for sourcing through the integration of S2P transformation. Download full case study
Tags : 
    
Larsen & Toubro Infotech(LTI)

Optimizing delivery logistics for peak demand

Published By: HERE Technologies     Published Date: Sep 26, 2019
Let’s face it, consumers are addicted to fast delivery. As delivery windows continue to shrink, demand is only growing stronger. The pressure is on for online food delivery and e-commerce companies to consistently meet these ever-tightening deadlines and keep customers happy and loyal. But what happens to your ETAs when a snowstorm strikes? Or a restaurant in your market hosts a promotion that causes demand to spiral out of control? Don’t let times like these send you scrambling to stay ahead of peak demand. Drive down click-to-door times by discovering: • The role location technology plays in food and e-commerce delivery • The benefits of dynamic routing • How to stay ahead of predictable and unpredictable peak demand
Tags : 
    
HERE Technologies

Optimizing delivery logistics for peak demand

Published By: HERE Technologies     Published Date: Sep 30, 2019
Let’s face it, consumers are addicted to fast delivery. As delivery windows continue to shrink, demand is only growing stronger. The pressure is on for online food delivery and e-commerce companies to consistently meet these ever-tightening deadlines and keep customers happy and loyal. But what happens to your ETAs when a snowstorm strikes? Or a restaurant in your market hosts a promotion that causes demand to spiral out of control? Don’t let times like these send you scrambling to stay ahead of peak demand. Drive down click-to-door times by discovering: The role location technology plays in food and e-commerce delivery The benefits of dynamic routing How to stay ahead of predictable and unpredictable peak demand
Tags : 
    
HERE Technologies

Effective Security for the Multicloud Era

Published By: Cisco Umbrella EMEA     Published Date: Dec 03, 2018
Welcome to the multicloud era - SaaS apps in the cloud, public and hybrid clouds hosting infrastructure, employees and branches accessing the cloud and internet from anywhere. -300,000 OAuth-connected SaaS apps discovered -84% of companies will use multiple clouds -70% of branches have direct, anytime cloud access Elevate Your Cloud Security with Cisco.
Tags : 
    
Cisco Umbrella EMEA

Versed in Virtual Desktop

Published By: Rackspace     Published Date: Jan 09, 2012
Distributed computing has been pervasive in IT organisations for nearly two decades, but the tables are beginning to turn. This whitepaper discusses Rackspace's experience in quick deployment and hosting of VDI environments.
Tags : 
rackspace, technology, virtual desktop, vdi, infrastructure, data center, application integration, desktop management, virtualization
    
Rackspace

2011 Mid-Year Security Report

Published By: Blue Coat Systems     Published Date: Jul 07, 2011
This report examines the interactions of malware ecosystems, including user behavior, malware hosting sites and delivery networks and offers effective strategies to build better defenses.
Tags : 
blue coat, wan optimization, secure web gateway, malware, defenses, security, attacks, threats, application performance monitoring, anti spam, anti spyware, anti virus, application security, disaster recovery, encryption, firewalls, hacker detection, internet security, intrusion detection, intrusion prevention
    
Blue Coat Systems

Handling EDI Exceptions with Order Processing Automation: A Guide for Customer Service Processionals

Published By: Esker     Published Date: Dec 19, 2016
Electronic Data Interchange, commonly referred to as EDI, is a process that allows data to be exchanged between businesses in a standard electronic format. Sales order processing is an area of business where EDI is used extensively. However, up to one-third of EDI orders can contain exceptions — this is where problems surface. Traditional handling methods cause a host of challenges for customer service professionals and the business as a whole. This eBook aims to expose these issues, while showing how order processing automation can work with existing EDI environments to streamline exception handling and fix any potential problems before they mess up your ERP system and bottom line. Learn more about EDI Exceptions, download now!
Tags : 
    
Esker

Modernize Your Workforce and Financial Planning

Published By: Workday     Published Date: Aug 07, 2018
Rethink the way you plan, budget, and forecast. This webinar, hosted by Workday and featuring Paul Hamerman of Forrester Research, provides insight into the advantages of: Uniting organizational, workforce, and financial data Collaborating with stakeholders and planning participants Guiding the business with reporting, dashboards, and scorecards Watch the webinar replay to learn best practices for planning, budgeting, and forecasting that’ll help your organization succeed.
Tags : 
budget, forecast, forrester, best practices
    
Workday

Empower Your People to Engage and Innovate

Published By: Cisco Systems     Published Date: Jun 27, 2013
From the cloud or hosted, outsourced or as a managed service—what is the best way to deploy collaboration services? In this report, Forrester helps IT pros identify key priorities and create an optimal strategy for implementation.
Tags : 
cloud solution, outsourcing, managed service, collaboration, optimal strategy, implementation, technology, empowerment
    
Cisco Systems

Avoiding Outages and Congestion with Intelligent Routing

Published By: Noction     Published Date: Jan 09, 2014
Service Providers have unique networking challenges as compared to other environments. Factor, differentiating Service Provider`s network from others, is the requirement for 100% uptime. The network stability is crucial to their customers’ business and is, therefore, intolerant to disruptions or outages, which may damage the company`s reputation and market position, or even affect it irreversibly. Downtime risks can no longer be mitigated by simply over-engineering the network, but rather deploying network optimization solutions, based on the intelligent monitoring and automated response, versus manual network troubleshooting and brute force time spending.
Tags : 
network performance, congestion, outages, downtime, hosting, bgp, router, ip network, networking, network, performance, optimization, network infrastructure, service provider, cdn, risks, telecom, data center
    
Noction

5 Ways Payroll Can Prevent Onboarding Headaches

Published By: CIC Plus     Published Date: May 28, 2014
How can payroll make sure the onboarding experience is a great one for new employees? This CIC Plus brief will show how payroll can flex its strategic muscles to make the onboarding process smooth and easy.
Tags : 
payroll, payroll processing, payroll company, payroll strategy, pay stubs, online pay stubs, online hr forms, onboarding, new employee, new employee orientation, w-2, w-4, hr form hosting, payroll form hosting
    
CIC Plus

ACA Forms Compliance: Safe Sailing Through the Rocky Waters

Published By: CIC Plus     Published Date: Sep 23, 2014
Learn more about HR compliance under Section 6056 of the ACA, including: • New reporting requirements for 2015 • What those requirements mean for your business • What you can do to ensure compliance • Risks of noncompliance
Tags : 
aca, affordable healthcare act, aca compliance, obamacare, irs section 6056, hr compliance, online hr forms, onboarding, year-end benefits forms, online benefits forms, new-employee orientation, w-2, w-4, hr forms hosting
    
CIC Plus

Paperless Payroll: Three Reasons You Can’t Afford Not to Offer It

Published By: CIC Plus     Published Date: Sep 23, 2014
Learn three reasons that being a competitive employer of choice demands that you take advantage of a cloud-based, paperless system for generating and storing pay stubs and the increasing amount of data they contain.
Tags : 
payroll, payroll processing, multigeneration workforce, payroll company, payroll strategy, pay stubs, online pay stubs, online hr forms, onboarding, new employee, new employee orientation, w-2, w-4, hr form hosting, payroll form hosting
    
CIC Plus

Expand Your Horizon with Hosted Applications

Published By: VMware AirWatch     Published Date: Feb 21, 2017
This white paper provides guidance for adding support for hosted applications and desktop sessions to your VMware Horizon infrastructure. Whether the goal is to integrate an existing RDS environment for combined management with VMware Horizon with View™ virtual desktops or deploy hosted applications or desktop sessions for the first time, Horizon provides the technology required and a simple path forward.
Tags : 
    
VMware AirWatch

Exclusive IT Insights from the San Diego Padres: Mobility, Contact Center and Cloud

Published By: Mitel     Published Date: Mar 30, 2017
Step behind the scenes in this exclusive one on one interview as Daryl Reva, Mitel VP Cloud Marketing discusses mobility, contact center and cloud with Ray Chan, Director of Information Technology for the San Diego Padres. Hear how changing customer expectations, employee mobility and the rigors of hosting the 87th annual MLB All-Star Game inspired a major technology overhaul, including: A move to the Cloud Technology integrations in the contact center UCC and team collaboration applications
Tags : 
cloud, technology integration, marketing, mobility, productivity, networking
    
Mitel

The Value of IT Automation, Featuring Research from Gartner

Published By: Puppet     Published Date: May 20, 2016
At Puppet, we've been looking at the state of DevOps practices for several years and helping organizations achieve higher levels of efficiency. We’ve learned a lot about the impact of DevOps at varying stages of IT automation maturity. As DevOps has moved from theory to implementation for more organizations, a host of DevOps myths have blocked adoption in many organizations. This publication debunks these myths so your organization can automate, innovate, and get ahead. Download this publication, featuring research from Gartner, to discover: - Why DevOps is applicable to legacy environments, traditional enterprises and hierarchical organizations. - Practices that underpin DevOps, from version control to automated testing to infrastructure as code. - How companies like Walmart, Staples, Ambit Energy and Infusionsoft have embraced DevOps and IT automation.
Tags : 
    
Puppet

DRaaS eBook: DraaS Levels the Playing Field for IT

Published By: Carbonite     Published Date: Oct 10, 2018
In the last few years, businesses have changed the way they protect data. Studies show they’re abandoning traditional backup and recovery in favor of disaster recovery as a service (DRaaS).1 With DRaaS, businesses enjoy the luxury of keeping a replica of their data hosted at a remote site that they can fail over to in an emergency—without bearing any of the infrastructure costs or maintenance responsibilities. All infrastructure and maintenance is the responsibility of the provider. Gartner predicts that global DRaaS revenue will reach $3.4 billion by 2019. The firm cited several reasons for the shift:
Tags : 
    
Carbonite

Barcoded Patient ID Wristbands – The Foundation for Closed-Loop Applications and Processes

Published By: Zebra Technologies     Published Date: Dec 20, 2017
The use of wristbands to identify hospital patients has been a standard practice for well over half a century. Handwritten, typed or printed, wristbands were originally created to provide an easy way for caregivers to verify identity at any point along the patient’s healthcare journey. From newborns in the delivery area to geriatric patients in rehabilitation, everyone got a wristband. And that’s how things worked until the introduction of barcode technology. By putting barcodes on hospital wristbands, healthcare facilities can leverage a host of connected technologies to improve safety and quality of care. It’s also the most effective way to comply with the National Patient Safety Goal (NPSG) to “Improve the accuracy of patient identification,” which the Joint Commission has included in its annual goals since 2003.
Tags : 
    
Zebra Technologies

Privileged Access Management

Published By: CA Technologies EMEA     Published Date: Aug 03, 2017
For organizations with additional security requirements for high value servers hosting business-critical assets, CA Privileged Access Manager Server Control provides localized, fine-grained access control and protection over operating system-level access and application-level access. Agent-based, kernel-level protection is available for individual files, folders and specific commands based on policy and/or finedgrained controls on specific hosts.
Tags : 
identity management, privileged user access, secure privileged credentials, secure hybrid it
    
CA Technologies EMEA

Risk & Response: Defending Financial Institutions with Cb Response

Published By: Carbon Black     Published Date: Apr 10, 2018
For decades, the financial services industry has endured constant change and uncertainty, from the depths of a financial crisis to widespread regulation overhauls. With the advent of more advanced cybersecurity threats, the industry has responded with rapid digital transformation to remain competitive while also pushing the envelope. Today, managing and mitigating cyber-related risks not only draws government scrutiny, but increased consumer scrutiny as well, with longstanding brand reputations anchored to institutions’ ability to protect its most sensitive data. In a recent survey of Americans, financial information was considered by consumers to be their most valuable personal information, worth even more than personal or family photos and videos. For consumers, failing to protect their data is a grave violation of trust, to the point where 72% would consider leaving their current financial institution if their sensitive information was taken hostage by ransomware.1 Not only does the
Tags : 
    
Carbon Black

Banking on Machine Data

Published By: Splunk     Published Date: Sep 10, 2018
The financial services industry has unique challenges that often prevent it from achieving its strategic goals. The keys to solving these issues are hidden in machine data—the largest category of big data—which is both untapped and full of potential. Download this white paper to learn: *How organizations can answer critical questions that have been impeding business success *How the financial services industry can make great strides in security, compliance and IT *Common machine data sources in financial services firms
Tags : 
cloud monitoring, aws, azure, gcp, cloud, aws monitoring, hybrid infrastructure, distributed cloud infrastructures, reduce mttr/mtti, cloud monitoring free, cloud monitoring tools, cloud monitoring service, cloud billing monitoring, cloud monitoring architecture, cloud data monitoring, host monitoring, *nix, unix, linux, servers
    
Splunk

Use This 4-Step Approach to Architect Your IT Monitoring Strategy

Published By: Splunk     Published Date: Sep 10, 2018
One of the biggest challenges IT ops teams face is the lack of visibility across its infrastructure — physical, virtual and in the cloud. Making things even more complex, any infrastructure monitoring solution needs to not only meet the IT team’s needs, but also the needs of other stakeholders including line of business (LOB) owners and application developers. For companies already using a monitoring platform like Splunk, monitoring blindspots arise from the need to prioritize across multiple departments. This report outlines a four-step approach for an effective IT operations monitoring (ITOM) strategy. Download this report to learn: How to reduce monitoring blind spots when creating an ITOM strategy How to address ITOM requirements across IT and non-IT groups Distinct layers across ITOM Potential functionality gaps with domain-specific products
Tags : 
cloud monitoring, aws, azure, gcp, cloud, aws monitoring, hybrid infrastructure, distributed cloud infrastructures, reduce mttr/mtti, cloud monitoring free, cloud monitoring tools, cloud monitoring service, cloud billing monitoring, cloud monitoring architecture, cloud data monitoring, host monitoring, *nix, unix, linux, servers
    
Splunk

Threat Landscape - How to predict, spot and mitigate threats

Published By: Cisco Umbrella EMEA     Published Date: Sep 02, 2019
"We live and surf in a cyber world where attacks like APT, DDOS, Trojans and Ransomware are common and easy to execute. Domain names are an integral part of any business today and apparently an integral part of an attacker's plan too. Domain names are carriers of malwares, they act as Command and Control servers and malware's ex-filtrate data too. In today's threat landscape - predicting threats, spotting threats and mitigating them is super crucial.. This is called Visibility and Analytics. Watch this on demand session with our Cisco cloud security experts Shyam Ramaswamy and Fernando Ferrari as they talk about how Cisco Umbrella and The Umbrella Research team detect anomalies, block threats and identify compromised hosts. The experts also discuss how effectively Cisco spot, react, filter out IOC, block the network communications of a malware; identify and stop a phishing campaign (unknown ones too). "
Tags : 
    
Cisco Umbrella EMEA

Electro Mobility in the Cloud Era - Live Event Q&A

Published By: Dassault Systèmes     Published Date: Jun 11, 2019
Q&A from Electro Mobility in the Cloud Era Event. Deep dive with industry-leading speakers to discover in depth answers to compelling questions from the event which was hosted on May 28th.
Tags : 
    
Dassault Systèmes
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.