implementation

Results 101 - 125 of 689Sort Results By: Published Date | Title | Company Name

Understanding Your Open Source Risk

Published By: Veracode     Published Date: Jul 01, 2019
The demand on software development teams is greater than ever. With the cultural move towards DevOps, the implementation of CI/CD systems, and the desire to operate in an agile manner, developers are being asked to push out more software - and in shorter periods of time - than ever before. In turn, developers are increasingly relying on open source libraries, or pre-built pieces of code available online, which allow them to add functionality to their code without having to build it from scratch. As a result, software today is rarely completely made of first-party code and is more often "assembled" from other sources.
Tags : 
    
Veracode

Improving Business Performance with HR Technology

Published By: TriNet     Published Date: Jul 28, 2015
The future of HR lies in technological advances and implementation for businesses of all sizes.
Tags : 
hr technology, hr data, technology providers, hr trends, mobility, cloud data security, hr terminology, business performance management
    
TriNet

Improve Your Tech Startup's Performance with HR Technology

Published By: TriNet     Published Date: Sep 13, 2016
The future of HR lies in technological advances and implementation for businesses of all sizes.
Tags : 
trinet, hr package, employee benefits
    
TriNet

Why Privileged Identity Management Implementations Fail

Published By: Lieberman Software     Published Date: Mar 27, 2012
Download "Why Privileged Identity Management Implementations Fail" to learn how to quickly implement a solution that can both lower your IT staff's workload and protect access to your organization's most sensitive data.
Tags : 
security
    
Lieberman Software

How NCR Corporation Improved Quality and Time to Market for Advanced Analytics

Published By: Teradata     Published Date: Jan 30, 2015
Enterprise Hadoop Implementation with Teradata and Hortonworks
Tags : 
ncr, big data, data warehouse, enterprise hadoop, hadoop implementation, teradata, hortonworks, performance data
    
Teradata

Business Paper Short: 6 essential steps when considering mobile workforce management software

Published By: ClickExpress     Published Date: May 01, 2013
Even if you have only 15 mobile workforce employees, you can reduce costs and improve the customer’s experience using optimization software. Today, it’s easy because you don’t even have to provide dedicated mobile devices to your field employees, just an app. But how do you avoid difficult transitions for workers, long implementation times, and solutions that don’t work as you really needed? This paper walks you through the 6 steps to successful decision making.
Tags : 
6 essential, mobile, workforce, management, software, customer, experience, optimization
    
ClickExpress

Cloud Control: Moving to the Comfort Zone

Published By: NetApp     Published Date: Sep 29, 2014
As cloud deployments accelerate, there's no question that Federal agencies are reaping the benefits – improved agility, less IT complexity, and greater collaboration through shared services. But, while the benefits are clear, concerns around data stewardship and management can stop migrations in their tracks. So how are Federal agencies dealing with the control challenge? To find out, MeriTalk surveyed 153 Federal IT professionals closely involved in their agency's cloud implementations.
Tags : 
cloud control, it complexity, collaboration, data management, cloud implementations, it management
    
NetApp

Public Safety, Justice, and IoE WP and Infographic

Published By: Cisco     Published Date: Sep 15, 2015
This paper examines how the increasingly ubiquitous connectedness of our IoE world can help provide public safety and justice agencies with new opportunities to meet and overcome the challenges they face. It specifically examines this topic through applications in law enforcement, emergency response, corrections, courts, and national security, and shows how IoE can help transform agencies to better protect citizens and make communities safer. Finally, this paper will provide recommendations on strategy implementation to enable agencies to take the next steps.
Tags : 
public safety, iot, law enforcement, emergency response, strategy, convergence, application integration
    
Cisco

Pardot + Salesforce Dynamic Duo

Published By: Salesforce Pardot     Published Date: Sep 09, 2014
Pardot and Salesforce are complementary tools that really reach their full potential when paired together. Not only can these tools improve marketing and sales alignment, they can also provide greater insight into campaign performance, jumpstart lead generation efforts, and positively impact ROI. If you’re thinking about integrating these two systems, it’s important that you understand the benefits this will provide and the steps that will be required for implementation. So, let’s get started!
Tags : 
pardot, roi, sales alignment, integration, generation efforts, marketing tool, implementation
    
Salesforce Pardot

ABI Healthcare Report: Medical Device Cybersecurity

Published By: Extreme Networks     Published Date: Feb 23, 2017
ABI Research’s Securing Medical Devices Technology Analysis Report analyzes the current risks posed by medical devices, noting various security issues, potential vulnerabilities, and the threat landscape. It reviews implementation mechanisms and efforts in medical device cybersecurity and safety. The final section looks at how the healthcare ecosystem is responding to the issues and the vendors driving change.
Tags : 
abi. healthcare, cybersecurity, medical
    
Extreme Networks

Accelerate Your MiFID II Compliance--Within 30 Days

Published By: MarkLogic     Published Date: Sep 29, 2017
The clock is ticking: It’s time to future proof your data for MiFID II (and future regulations). Learn how to accelerate your MiFID II Compliance--within 30 days. Download our Quick Start Guide, designed to get you up and running with the major components and related processes for MiFID II, including an approach for building a fully integrated regulatory reporting solution. In the Quick Start Guide, we’ll cover: - What our consulting service can help you accomplish in 30 days - Key factors for your success - How we work - Why financial institutions trust MarkLogic for successful MiFID II implementations • CTA Button: o Get the Quick Start Guide
Tags : 
    
MarkLogic

From Fear to Fortune: Lessons from Leveraging the Cloud

Published By: Netsuite DWASF Leads Display Q1 2015     Published Date: Feb 03, 2015
In his latest paper, Tom Kelly offers real-world anecdotes from cloud implementations at a selection of more than 25 companies, from Fortune 500 to private equity-backed companies, showing examples on how the cloud provides fast- growing companies a scalable infrastructure that supports their growth while improving efficiency and reducing costs.
Tags : 
cloud leverage, cloud implementations, fortune 500, private equity-backed companies, scalable infrastructure, efficiency, data center
    
Netsuite DWASF Leads Display Q1 2015

The Total Economic Impact of Dell ENC Isilon Scale-out NAS

Published By: Dell EMC     Published Date: Aug 22, 2017
Identifying the benefits, costs, and risks associated with an Isilon implementation, Forrester interviewed several customers with experience using Isilon. Dell EMC Isilon is a scale-out NAS platform that enables organizations to store, manage, and analyze unstructured data. Isilon clusters are composed of different node types that can scale up to 68 petabytes (PB) in a single cluster while maintaining management simplicity. Isilon clusters can also scale to edge locations and the cloud
Tags : 
    
Dell EMC

The Data-Driven Era Requires Modern IT Infrastructure, Enabling Business Transformation

Published By: Oracle ODA     Published Date: Dec 06, 2016
IT leaders must consider new approaches to database administration, implementation, and security, including proactive management, to reduce time-consuming administrative tasks. This, in turn, will free them to develop strategies for capitalizing on the new data-driven initiatives that can help transform the enterprise. Learn more about these opportunities as well as how products, such as an integrated Database Appliance, can streamline the management of these tasks, while reducing costs and time.
Tags : 
    
Oracle ODA

Privileged Access Management: A Roadmap to Calculating Total Cost of Ownership

Published By: CA Technologies     Published Date: Jun 26, 2017
Privileged user accounts—whether usurped, abused or simply misused—are at the heart of most data breaches. Security teams are increasingly evaluating comprehensive privileged access management (PAM) solutions to avoid the damage that could be caused by a rogue user with elevated privileges, or a privileged user who is tired, stressed or simply makes a mistake. Pressure from executives and audit teams to reduce business exposure reinforces their effort, but comprehensive PAM solutions can incur hidden costs, depending on the implementation strategy adopted. With multiple capabilities including password vaults, session management and monitoring, and often user behavior analytics and threat intelligence, the way a PAM solution is implemented can have a major impact on the cost and the benefits. This report provides a blueprint for determining the direct, indirect and hidden costs of a PAM deployment over time.
Tags : 
    
CA Technologies

Privileged Access Management: A Roadmap to Calculating Total Cost of Ownership

Published By: CA Technologies     Published Date: Jun 01, 2018
Privileged user accounts—whether usurped, abused or simply misused—are at the heart of most data breaches. Security teams are increasingly evaluating comprehensive privileged access management (PAM) solutions to avoid the damage that could be caused by a rogue user with elevated privileges, or a privileged user who is tired, stressed or simply makes a mistake. Pressure from executives and audit teams to reduce business exposure reinforces their effort, but comprehensive PAM solutions can incur hidden costs, depending on the implementation strategy adopted. With multiple capabilities including password vaults, session management and monitoring, and often user behavior analytics and threat intelligence, the way a PAM solution is implemented can have a major impact on the cost and the benefits. This report provides a blueprint for determining the direct, indirect and hidden costs of a PAM deployment over time.
Tags : 
    
CA Technologies

Cloud Accounting Implementation 101: No Risk, Just Reward

Published By: FinancialForce     Published Date: Dec 01, 2017
Making the decision to move to cloud accounting is one step in the right direction; understanding the best approach and how you'll get there is half the battle. But guess what? It doesn't have to be difficult. The purpose of this ebook is to provide you with details on how to best plan your cloud accounting implementation, the benefits of a single cloud approach, and offer some key insights and recommendations when evaluating solutions that will make the implementation process so much easier.
Tags : 
    
FinancialForce

How to Maximize your ROI in SharePoint

Published By: Longi Engineering     Published Date: Feb 15, 2018
SharePoint is a technology that most organizations have access to these days, yet it is one that is open not utilized fully. This is in part due to organizations not being fully aware of the breadth of SharePoint’s capabilities. Most SharePoint power users/administrators are aware they can leverage SharePoint as a document repository and to share data seamlessly with a group of colleagues, however, they often are not aware of how to leverage some of SharePoint’s key foundational components effectively. As someone who implements SharePoint, one of the biggest complaints we hear from organizations is users aren’t using it, adoption is low. Without user adoption no technology implementation project can be successful. It is difficult to pinpoint one reason that causes adoption to be low, however, taking steps to effectively build your SharePoint site with a solid foundation along with an end goal of high user adoption is a great way to start.
Tags : 
software development, it consulting services, net software solutions, microsoft sharepoint
    
Longi Engineering

Improve Machine Safety by Using Wireless Technology

Published By: Schneider Electric     Published Date: May 04, 2018
Wireless technology is increasingly used in machine safety applications. New solutions introduce mobility and offer higher levels of flexibility and safety for plant floor operators. This eBook explores how modern wireless implementations can increase user safety and mobility, reduce installation costs, and boost productivity.
Tags : 
keywords, packaging, oem, smart machines, food & beverage, bottling, conveying, industrial automation
    
Schneider Electric

Intelligent Migration To Amazon Web Services and Microsoft Azure: The Path To Hybrid Cloud

Published By: Turbonomic     Published Date: Jul 05, 2018
The hybrid cloud has been heralded as a promising IT operational model enabling enterprises to maintain security and control over the infrastructure on which their applications run. At the same time, it promises to maximize ROI from their local data center and leverage public cloud infrastructure for an occasional demand spike. Public clouds are relatively new in the IT landscape and their adoption has accelerated over the last few years with multiple vendors now offering solutions as well as improved on-ramps for workloads to ease the adoption of a hybrid cloud model. With these advances and the ability to choose between a local data center and multiple public cloud offerings, one fundamental question must still be answered: What, when and where to run workloads to assure performance while maximizing efficiency? In this whitepaper, we explore some of the players in Infrastructure-as-a-Service (IaaS) and hybrid cloud, the challenges surrounding effective implementation, and how to iden
Tags : 
    
Turbonomic

Fly Above Fraud - Global Airline Fraud Management Benchmark Study

Published By: CyberSource     Published Date: Aug 31, 2018
Gain a bird's-eye view of how online fraud affects the airline industry Fraud continues to be a major source of revenue loss for the global airline industry. With airlines pushing for more direct bookings and the accelerating use of mobile as a booking platform, incidence of fraud is rising, albeit only slightly. Despite these factors, many airlines are not devoting the necessary resources and tracking the required metrics to measure and control fraud. CyberSource partnered with Phocuswright to benchmark global metrics and trends in fraud management and protection among airlines. The study also explores airline awareness of various fraud-related issues and examines their approaches to and implementation of fraud management tools and services. To learn more, download the study today
Tags : 
    
CyberSource

Free eBook: Streaming Change Data Capture – A Foundation for Modern Data Architectures

Published By: Attunity     Published Date: Nov 15, 2018
Change data capture (CDC) technology can modernize your data and analytics environment with scalable, efficient and real-time data replication that does not impact production systems. To realize these benefits, enterprises need to understand how this critical technology works, why it’s needed, and what their Fortune 500 peers have learned from their CDC implementations. This book serves as a practical guide for enterprise architects, data managers and CIOs as they enable modern data lake, streaming and cloud architectures with CDC. Read this book to understand: ? The rise of data lake, streaming and cloud platforms ? How CDC works and enables these architectures ? Case studies of leading-edge enterprises ? Planning and implementation approaches
Tags : 
optimize customer service
    
Attunity

Enable A Connected Enterprise With Red Hat JBoss Fuse

Published By: Red Hat APAC     Published Date: Jun 27, 2019
Red Hat® JBoss® Fuse is a lightweight integration platform that reduces the pain of connecting applications, services, processes, and devices for comprehensive and efficient solutions. JBoss Fuse includes the popular and versatile Apache Camel project, an implementation of the most commonlyused enterprise integration patterns. With integration patterns and more than 150 connectors ready to use, JBoss Fuse supports integration across the extended enterprise—including applications and services on-premise, on mobile devices, or in the cloud. JBoss Fuse is complemented by Red Hat JBoss Developer Studio for easier development of integration solutions and Red Hat JBoss Operations Networkfor monitoring of deployed solutions.
Tags : 
    
Red Hat APAC

Fleet monitoring implementation enables 80% downtime reduction for Scandinavian CVM

Published By: Larsen & Toubro Infotech(LTI)     Published Date: May 21, 2019
The Scandinavian commercial vehicle manufacturer wanted better uptime and reduction of vehicle on road (VOR), and also provide real-time feedback and visibility to their customers. LTI helped streamline analytics to detect exceptions and create actionable and achievable high scalability with microservices and serverless architecture. Download full case study
Tags : 
    
Larsen & Toubro Infotech(LTI)

Cloud self-service platform enabled 25% cost saving for a BFS Major

Published By: Larsen & Toubro Infotech(LTI)     Published Date: May 21, 2019
US-based multinational financial services corporation was facing a longer time-to-market due to hampering of digital transformation across business lines, thereby affecting the developer productivity due to global manual build and deployment processes. LTI’s approach of providing end-to-end implementation of DevOps, with quality control gates, helped establish a role-based governance dashboard for real-time health KPIs of programs, projects, and tracking server positioning and the configuration status. Download full case study
Tags : 
    
Larsen & Toubro Infotech(LTI)
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.