implementation

Results 326 - 350 of 687Sort Results By: Published Date | Title | Company Name

Intent-Based Networking: A Next-Gen Vision for the Next-Gen Network

Published By: Apstra     Published Date: Feb 25, 2019
This in-depth white paper explains how service providers are capitalizing on Intent-Based Networking — a new and effective networking model that provides a way of abstracting an application, feature, network, or resource in such a way that the intent is exposed, but the implementation is hidden.
Tags : 
apstra, intetn-based networking
    
Apstra

How We Build Now - Tackling Technology In Construction 2019

Published By: Procore     Published Date: Jun 25, 2019
Download Your Copy: How We Build Now - Tracking Technology in Construction 2019 The Australian construction industry is undergoing a technical transformation and we’ve taken a snapshot of this dynamic and interesting space - examining how construction companies are adopting technologies and implementing new tech-enabled processes. Our inaugural report How We Build Now - Tracking Technology in Construction 2019 examines and tracks key elements in this fast-paced, tech-driven transition. It covers 4 main areas: Taking the Pulse: People and skills development Pick and Mixing: Technology adoption and future proofing Forging Ahead: Processes and implementation The Spirit Level: Business outlooks across industry sectors The new findings provide insight and ideas about technology adoption and how new technologies are influencing modern construction company processes.
Tags : 
    
Procore

Put patient safety first and reduce adverse drug events (ADEs)

Published By: Zebra Technologies     Published Date: May 02, 2018
Up to 5% of all hospitalized patients are affected by ADEs. Implementing a comprehensive Barcode Medication Administration (BCMA) program can help, reducing medication errors up to 80%. In this white paper Zebra Technologies uncovers best practices for adopting Barcode Medication Administration, including: The importance of building a multidisciplinary implementation team The role of efficient, well-defined workflows How accurate data management and reporting are essential to ongoing BCMA success
Tags : 
safety, technology, zebra, medical, administration
    
Zebra Technologies

Key Considerations in Deploying an SSL Solution

Published By: F5 Networks Inc     Published Date: Aug 16, 2016
With privacy breaches becoming increasingly common, many organizations look to SSL as a way to protect the integrity of their data online. However, the implementation of a comprehensive SSL strategy comes with its own challenges of visibility, performance and scale. Through proper planning and deployment, a strong SSL strategy mitigates the risk of breaches. Once the strategy is in place, the site will be positioned for future security, scalability, and reliability, putting the focus where it really matters--moving business forward.
Tags : 
ssl, ssl solutions, networking, privacy, security, network security, enterprise applications, business technology
    
F5 Networks Inc

Vendor Landscape: Security Information & Event Management (SIEM)

Published By: Logrhythm     Published Date: Feb 24, 2016
This research will help you to: - Select an appropriate SIEM solution based on vendor research. - Create an implementation roadmap. - Define your SIEM architecture. - Measure the continued value of your SIEM.
Tags : 
security, security application, siem, siem architecture, it security managers, application security, security management, security policies, information management, productivity
    
Logrhythm

Citrix XenDesktop: The Best Desktop Delivery System For Today's Demanding Business Needs

Published By: Citrix     Published Date: May 27, 2009
Whether you're considering your first virtual desktop solution or trying to salvage an existing implementation, Citrix XenDesktop is the clear choice on the market that offers the performance, scalability and manageability required to meet your business needs.
Tags : 
citrix, virtualization, hdx, xendesktop, sla, service level agreement, scalable, streamline, tco, view composer, virtual machine, total cost of ownership, hyper-v, microsoft, datacenter, server virtualization, servers, xenserver, network interface cards, nics
    
Citrix

Identify, Quantify and Manage Access Risk with Access Intelligence

Published By: Courion     Published Date: Nov 05, 2012
Learn how to identify, quantify and manage access risk by taking a revealing, visually guided tour of the industry's premier access intelligence solution, Access Insight, via actual screenshots from a customer implementation.
Tags : 
courion, intelligence solution, access insight, iam, security risk, security insight, security, data management, business technology, data center
    
Courion

Analyst Case Study: US Bank Increases Top-Line Revenue with E-Signatures

Published By: E-SignLive by Silanis     Published Date: Oct 23, 2013
In this case study from Ombud Open Research, you will learn how US Bank is using electronic signature technology to streamline account openings and SMB loans. With e-signatures deployed across more than 3,000 branches, US Bank is leveraging both the Silanis on-premise e-signature solution and the Silanis cloud e-signature service for different processes. As a result, they have achieved operational efficiencies, improved customer experience and increased top-line revenue. The bank is currently e-signing 460,000 documents each week – a number that will continue to grow as US Bank’s initial implementation of electronic signatures is currently being re-purposed across the entire organization.
Tags : 
banking, account openings, financial services
    
E-SignLive by Silanis

The Why, the What and the How of the Software-Defined Data Center

Published By: McAfee EMEA     Published Date: Nov 15, 2017
The Software-Defined Data Center (SDDC) is an overarching philosophy for implementing better data centers. The most basic way to think about an SDDC is as a combination of virtualized computing resources, plus software-defined storage and networking. In addition, SDDC often includes overarching security aspects: in other words, SDDC abstracts and automates all the compute, storage and networking aspects that are traditionally physical, and it can put that automation and abstraction to use in enhancing security.
Tags : 
data center, software, defined, sddc, implementation, automation, security
    
McAfee EMEA

The Top Six Microservices Patterns

Published By: MuleSoft     Published Date: Jan 16, 2018
For the last several years, microservices has been an important trend in IT architecture, and many architects and IT executives experience pressure to jump on microservices as the new hot thing. But there is a feeling that microservices must only be implemented in a certain way, or it is being done incorrectly. This simply isn't so. This whitepaper discusses how microservices presents itself as a series of patterns, and outlines how organizations should select the microservices pattern that makes sense for their own business, goals, and culture. Read this whitepaper to discover: The top six microservices patterns and the advantages and disadvantages of each Foundational best practices to make sure your microservice implementation is successful How Anypoint Platform can help you implement a microservices architecture in a workable way
Tags : 
    
MuleSoft

API-led Connectivity for Government

Published By: MuleSoft     Published Date: Jan 18, 2018
Today, government IT teams are expected to deliver more services with fewer resources. Consequently, many agencies have prioritized legacy modernization, interoperability, and shared service models as a means towards increasing IT delivery capacity. We propose that successful execution of these initiatives within the confines of a strictly managed budget requires a new approach to integration, one centered around APIs. Our recommended approach, API-led connectivity, builds on the principles of re-use first outlined by SOA, while avoiding many of the pitfalls that limited the success of heavyweight SOA implementations. In this whitepaper, you will learn: What forces drive digital transformation in federal government, and what role integration plays in supporting digital transformation How a civilian federal agency leveraged APIs to modernize legacy systems and accelerate the speed of integration How to build out an API-led architecture within a government agency to accelerate project
Tags : 
    
MuleSoft

Top 6 Microservices Patterns

Published By: MuleSoft     Published Date: Nov 27, 2018
For the last several years, microservices has been an important trend in IT architecture, and many architects and IT executives experience pressure to jump on microservices as the new hot thing. But there is a feeling that microservices must only be implemented in a certain way, or it is being done incorrectly. This simply isn't so. This whitepaper discusses how microservices presents itself as a series of patterns, and outlines how organizations should select the microservices pattern that makes sense for their own business, goals, and culture. Read this whitepaper to discover: The top six microservices patterns and the advantages and disadvantages of each Foundational best practices to make sure your microservices implementation is successful How Anypoint Platform can help you implement a microservices architecture in a workable way
Tags : 
    
MuleSoft

API-led connectivity for government

Published By: MuleSoft     Published Date: Nov 27, 2018
Today, government IT teams are expected to deliver more services with fewer resources. Consequently, many agencies have prioritized legacy modernization, interoperability, and shared service models as a means towards increasing IT delivery capacity. We propose that successful execution of these initiatives within the confines of a strictly managed budget requires a new approach to integration, one centered around APIs. Our recommended approach, API-led connectivity, builds on the principles of reuse first outlined by SOA, while avoiding many of the pitfalls that limited the success of heavyweight SOA implementations. In this whitepaper, you will learn: What forces drive digital transformation in federal government, and what role integration plays in supporting digital transformation How a civilian federal agency leveraged APIs to modernize legacy systems and accelerate the speed of integration How to build out an API-led architecture within a government agency to accelerate project
Tags : 
    
MuleSoft

Frost & Sullivan Competitive Ranking Report: Leading Mobile Solutions

Published By: Motorola     Published Date: Feb 06, 2008
In this paper, Frost & Sullivan has detailed leading mobile solution deployments, products in development and new product features and modifications for leading solution vendors in the mobile enterprise space. All solutions were then compared, evaluated and ranked based on parameters considered as critical in the implementation of a wireless enterprise solution.
Tags : 
mobile, wireless, wireless products, wireless phones, mobility, motorola, motorola good, wireless communications, wireless hardware
    
Motorola

The Definitive Guide to Marketing Metrics and Analytics

Published By: Marketo     Published Date: Mar 18, 2019
The role of marketing is constantly evolving. More than ever, marketing has to prove its impact on the success of the business. Outside executives often believe that marketing exists solely to support sales, or as an arts function that hosts company events and puts logos on t-shirts. With the pressure increasing, the growing imperative for marketers to prove their worth has arrived. It’s time for marketers to take control over the revenue process, earn the respect of their organizational peers, and earn a seat at the table. What must marketers do to be seen as an integral part of the machine that drives revenue and growth? Download The Definitive Guide to Marketing Metrics and Analytics to learn about: Establishing a culture of accountability Planning programs with ROI in mind Creating a framework for measurement Embracing revenue performance management Mastering the art of forecasting Building dashboards to inform complex decisions Implementation across teams, tactics, and technolog
Tags : 
    
Marketo

Build Enterprise-Class Security Into Your VOIP Devices

Published By: Mocana     Published Date: Jun 18, 2010
Mocana's NanoVOIP is a comprehensive security solution for application developers and device designers looking to build secure VOIP products. Its simple API means no previous crypto expertise is required, and its tiny memory footprint goes where other implementations simply can't. Download the NanoVOIP whitepaper and receive a free trial.
Tags : 
mocana, nano voip, security, application developer, device designer, encrypted voice, video, data solution, ip networks, application security, voice over ip, system on a chip, embedded design, integrated circuits and semiconductors
    
Mocana

WPA2 Security Solutions Allows OEMs to build Highly Scalable Security

Published By: Mocana     Published Date: Jun 18, 2010
Until recently, designing or building a wireless device meant cobbling together whatever security implementations you could find, often with open source and other code that is usually too big and too slow for device environments.
Tags : 
mocana, nano wireless security, wpa2, device developer, open source code, wireless application software, wireless infrastructure, wireless security, system on a chip, embedded systems and networking, integrated circuits and semiconductors
    
Mocana

Aberdeen:  Email Security in the Cloud-More Secure! Compliant! Less Expensive!

Published By: Symantec.cloud     Published Date: Sep 07, 2010
Drawing on the findings from multiple benchmark studies on best practices in email security and security software as a service, Aberdeen's analysis shows that users of cloud-based email security had substantially better results than users of on-premise email security implementations in the critical areas of security, compliance, reliability and cost.
Tags : 
messagelabs hosted services, email security, cloud computing, audit, compliance, auditing
    
Symantec.cloud

How to Avoid the Hidden Costs of AD FS

Published By: Okta     Published Date: Mar 09, 2015
Many companies believe Active Directory Federation Services (AD FS) is the best choice for applications to integrate with AD. After all, both Active Directory and AD FS are from Microsoft and AD FS is 'free,' so that should be the best choice, right? Not quite. it’s important to realize that not all Active Directory integration solutions are created equal, and IT departments should examine all aspects of implementation when considering a solution. Read this whitepaper and learn what to examine when integrating cloud applications to AD via AD FS.
Tags : 
active directory federation services, integration, it departments, cloud-based identity, access management service, web-based application integrations, it management
    
Okta

The Online Retailer's Guide to IT-Free Conversion Rate Optimization

Published By: HiConversion, Inc.     Published Date: Apr 13, 2011
The goal of this white paper is to address the incorrect perception that all CRO implementations are time consuming and require expensive IT assistance.
Tags : 
conversion rate optimization, ssi, server-side integration, cro, hiconversion, virtual enabler, eai, client-side integration, javascript, no-script, single-script, virtual enabling, mapping
    
HiConversion, Inc.

ESG Lab Validation Report: HP Data Protector & Deduplication Solutions

Published By: HP and Intel® Xeon® processor     Published Date: Feb 10, 2012
This ESG Lab Validation Report sponsored by HP + Intel examines a number of backup and recovery solutions and evaluates their ease of implementation as well as their ability to improve reliability and reduce costs.
Tags : 
intel, storage, 2.0, infrastructure, trends, storage, flexibility, drivers, market dynamics, trends, converged, custom requirement, deduplication, tiering, protocol, foundation, supply chain, integrated strategy, archival storage, virtualization
    
HP and Intel® Xeon® processor

Cloud P2P Deployment: A How-To Guide to SAP and ERP Integration with eProcurement and Beyond

Published By: Coupa Software     Published Date: Mar 05, 2015
For mid-size and larger organizations, it's critical to have efficient eProcurement and Procure-to-Pay (P2P) solutions that work closely with their installed financial structure (most likely ERP systems, like those from Oracle and SAP). This report provides guidance not only around the technical steps involved in integrations, but also the human and organizational readiness required to make cloud P2P and ERP integration a success - along with a real-life implementation case study.
Tags : 
sap, erp integration, eprocurement, financial structure, cloud p2p, it management
    
Coupa Software

Software-Defined WAN for Dummies

Published By: VMware SD-WAN by VeloCloud     Published Date: Feb 19, 2019
oftware-Defined WAN, or SD-WAN for short, is at the leading edge of software-based networking deployments. SD-WAN offers significant business value for organizations with distributed branches in terms of business agility and the ability to leverage Internet bandwidth economics – put simply, cost savings. This Software-Defined WAN For Dummies book explains the way for IT and business managers to migrate to a distributed network which is less complex, more flexible and easier to manage. With this book, VMware and Dan Pitt make an important contribution to better understanding the future of WAN implementations.
Tags : 
software-based networking, vmware, sd-wan
    
VMware SD-WAN by VeloCloud

Innovation to Optimize Cornerstone Your Way — From Integration to Content to Data

Published By: Tribridge     Published Date: Feb 09, 2015
Cornerstone is among the world’s most powerful talent management platforms. But you’ll benefit from molding and shaping it to meet your unique needs and ensure you optimally deploy, integrate, and manage your TMS or LMS.
Tags : 
cornerstone ondemand partners, csod, cornerstone ondemand, tms implementation, cornerstone integration, talent management solutions, talent management software, talent management system, learning management system software, learning management software, learning management system, cornerstone support, cornerstone help, lms integration, lms implementation, tms help, tms integration, content delivery, content integration, content management system
    
Tribridge

Best Practices for Creating the Network-Enabled Cloud

Published By: XO Communications     Published Date: Apr 13, 2015
Use this step-by-step guide from enterprise technology expert David Linthicum to help improve your network to handle services delivered from multiple clouds. With the right network infrastructure, it is much easier to connect, secure and speed up delivery of all of the cloud applications and services consumed by your organized. No matter where you are in your cloud implementations, learn best practices and strategies in this eBook series focused on Building the Network that Empowers Digital Business. Part 2 of the series, this guide focuses on best practices and creating a master implementation plan. Interested in crafting your strategy and business case for using multiple clouds, watch for Part 1 in the series "The Evolution from Network to Multi-Clouds."
Tags : 
    
XO Communications
Start   Previous    7 8 9 10 11 12 13 14 15 16 17 18 19 20 21    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.