implementation

Results 126 - 150 of 705Sort Results By: Published Date | Title | Company Name

MidMarket ERP Buying Checklist - 2009 Edition

Published By: CompareERP.com     Published Date: Jun 24, 2009
ERP failure is a very real concern for companies of all sizes. Our buying checklist helps you avoid common ERP mistakes. You learn how to buy the right system for your needs, how to negotiate a great deal, experience a smooth implementation and gain user acceptance. Learn more today!
Tags : 
erp, midmarket, assessment, vendor, demo, trial, compare erp, enterprise resource planning, stakeholders, support, dog and pony, rfp, request for proposal, checklist, asp, application service providers, enterprise applications, business intelligence
    
CompareERP.com

The Myth of Scale

Published By: Compass Datacenters     Published Date: May 19, 2014
Due to their historically limited alternatives, many businesses have been forced to justify the inefficiency of their data center implementations based on “the myth of scale”. Download to learn more!
Tags : 
compass datacenters, myth of scale, scale, finance, mtdc, first costs
    
Compass Datacenters

Increase Nationwide Rollout & Global Technology Deployment Service Efficiency

Published By: ConcertTech     Published Date: Dec 16, 2008
When you have a technology rollout to deploy on a nationwide or global scale, service efficiency is critical. While missed deadlines and unbudgeted project costs are always a concern, they should never be a likely outcome. By understanding the details of the Rollout Services Model (the second part of the Technology Rollout System), you can avoid the potential nightmares of project implementation and ensure that your project is completed on time and within budget.
Tags : 
concert technologies, rollout service model, project management, networking, enterprise applications, best practices
    
ConcertTech

Cloud P2P Deployment: A How-To Guide to SAP and ERP Integration with eProcurement and Beyond

Published By: Coupa Software     Published Date: Mar 05, 2015
For mid-size and larger organizations, it's critical to have efficient eProcurement and Procure-to-Pay (P2P) solutions that work closely with their installed financial structure (most likely ERP systems, like those from Oracle and SAP). This report provides guidance not only around the technical steps involved in integrations, but also the human and organizational readiness required to make cloud P2P and ERP integration a success - along with a real-life implementation case study.
Tags : 
sap, erp integration, eprocurement, financial structure, cloud p2p, it management
    
Coupa Software

Learn how organizations improve IAM strategy to achieve greater value

Published By: Courion     Published Date: Aug 21, 2012
Hear from a panel of experts as they discuss the challenges organizations face during identity and access management implementations, ways to avoid common pitfalls, and how you can achieve the greatest value from your deployment
Tags : 
access, risk, identity management, identity and access management, iam, regulatory compliance, audit compliance, policy compliance, access policy, user provisioning, access certification, access intelligence, user access, onboarding, data management, business technology, data center
    
Courion

Identify, Quantify and Manage Access Risk with Access Intelligence

Published By: Courion     Published Date: Nov 05, 2012
Learn how to identify, quantify and manage access risk by taking a revealing, visually guided tour of the industry's premier access intelligence solution, Access Insight, via actual screenshots from a customer implementation.
Tags : 
courion, intelligence solution, access insight, iam, security risk, security insight, security, data management, business technology, data center
    
Courion

Endpoint Detection and Response: Automatic Protection Against Advanced Threats

Published By: CrowdStrike     Published Date: Oct 23, 2017
As damaging breaches continue to occur, more organizations are considering endpoint detection and response (EDR) solutions to address the incidents that aren't being handled adequately by their existing defenses. However, EDR solutions come in a wide variety of implementations and can vary significantly in scope and efficacy — choosing the best solution can be challenging. This white paper, “Endpoint Detection and Response: Automatic Protection Against Advanced Threats,” explains the importance of EDR, and describes how various approaches to EDR differ, providing guidance that can help you choose the product that's right for your organization. Read this white paper to learn: What makes EDR such a valuable addition to an organization's security arsenal and why finding the right approach is critical How the “EDR maturity model” can help you accurately evaluate vendor claims and choose the solution that best fits your organization’s needs How the CrowdStrike® EDR solution empowers organ
Tags : 
    
CrowdStrike

Endpoint Detection and Response: Automatic Protection Against Advanced Threats

Published By: CrowdStrike     Published Date: Nov 28, 2018
As damaging breaches continue to occur, more organizations are considering endpoint detection and response (EDR) solutions to address the incidents that aren't being handled adequately by their existing defenses. However, EDR solutions come in a wide variety of implementations and can vary significantly in scope and efficacy — choosing the best solution can be challenging. This white paper, “Endpoint Detection and Response: Automatic Protection Against Advanced Threats,” explains the importance of EDR, and describes how various approaches to EDR differ, providing guidance that can help you choose the product that's right for your organization. Read this white paper to learn: • What makes EDR such a valuable addition to an organization's security arsenal and why finding the right approach is critical • How the “EDR maturity model” can help you accurately evaluate vendor claims and choose the solution that best fits your organization’s needs • How the CrowdStrike® EDR solution empowers
Tags : 
    
CrowdStrike

Improving ROI with Predictive Analytics: Six Keys to Unlocking the Value of Customer Intelligence

Published By: Customer Chemistry     Published Date: Nov 14, 2006
Read this white paper to learn about the six keys to a structured approach to planning and implementation of a predictive analytics infrastructure.  Find out how you can turn customer intelligence data into actionable information for improving the accuracy, efficiency and success of your targeting efforts.
Tags : 
customer intelligence, business intelligence, marketing intelligence, customer research, predictive analytics, analytics, infrastructure, customer data, data mining, customer chemistry, enterprise applications, business analytics, business metrics, customer interaction service, analytical applications
    
Customer Chemistry

Fly Above Fraud - Global Airline Fraud Management Benchmark Study

Published By: CyberSource     Published Date: Aug 31, 2018
Gain a bird's-eye view of how online fraud affects the airline industry Fraud continues to be a major source of revenue loss for the global airline industry. With airlines pushing for more direct bookings and the accelerating use of mobile as a booking platform, incidence of fraud is rising, albeit only slightly. Despite these factors, many airlines are not devoting the necessary resources and tracking the required metrics to measure and control fraud. CyberSource partnered with Phocuswright to benchmark global metrics and trends in fraud management and protection among airlines. The study also explores airline awareness of various fraud-related issues and examines their approaches to and implementation of fraud management tools and services. To learn more, download the study today
Tags : 
    
CyberSource

Intelligence-Led Security: Develop a Concrete Plan

Published By: Cyveillance     Published Date: Apr 03, 2015
Protecting a business – including its information and intellectual property, physical infrastructure, employees, and reputation – has become increasingly difficult. Online threats come from all sides: internal leaks and external adversaries; domestic hacktivists and overseas cybercrime syndicates; targeted threats and mass attacks. And these threats run the gamut from targeted to indiscriminate to entirely accidental. Like many security trends and frameworks, the early stages of adoption often involve inconsistent definitions, challenges with justification and management communication and an unknown path to implementation. In this white paper, we: • Review the current threatscape and why it requires this new approach • Offer a clarifying definition of what cyber threat Intelligence is • Describe how to communicate its value to the business and • Lay out some concrete initial steps toward implementing Intelligence-Led Security
Tags : 
intellectual property, hackers, protection, leaks, security, threatscape, networking
    
Cyveillance

Finding The Best PLM to Fit Industrial Equipment Manufacturers

Published By: Dassault Systèmes     Published Date: Aug 08, 2017
Industrial Equipment Manufacturers have to connect closely with customers and introduce new products quickly and efficiently to meet their needs. While smaller Industrial Equipment Manufacturers may be able to control, access, and share product data with relatively simple Product Data Management (PDM) tools, larger Industrial Equipment Manufacturers rely on full-featured PLM systems that help automate processes and share data across global supply chains. Industrial Equipment Manufacturer companies may find themselves in-between because: • Product and organizational complexity drive them beyond basic PDM capabilities • A full-featured PLM implementation may feel out of reach They need to choose a system that quickly delivers the core capabilities they need to streamline product development but also gives them room to grow value over time. What’s the right size PLM to fit an Industrial Equipment Manufacturer? Let’s take a look.
Tags : 
pdm, product data management, industrial, equipment manufacturers, plm, dassault
    
Dassault Systèmes

Aerospace & Defense: Digital Continuity Throughout Production

Published By: Dassault Systèmes     Published Date: Sep 22, 2017
The business models of Aerospace and Defense manufacturers often derive revenue from a number of sources including aircraft and completions as well as aftermarket business. The shop floor affects two of these key sources of revenue. In order to grow the business organically, while maintaining margins, the enterprise needs to deliver more, through the implementation of unprecedented levels of flexible production. Download this white paper to find out how the unique capabilities of DELMIA make it possible to manage change along the value stream, from engineering design to shop-floor work instructions.
Tags : 
aerospace, aviation, manufacturing, product development, plm, product lifecycle management, automation, data
    
Dassault Systèmes

Jumpstart Digital Transformation with MES – The Road to Manufacturing Operations Maturity in the IIo

Published By: Dassault Systèmes     Published Date: Jun 19, 2018
Start the journey to operational and digital excellence by gaining a clear strategy for the first steps forward. This resource includes: • An executive summary of Smart Manufacturing • Benchmarking manufacturing operations management • The road to MOM 4.0 • Digital transformation is a vehicle, not a destination • Recommendations to achieve digital excellence Manufacturers need to start now and follow a clear path from corporate strategic objectives through to successful program implementation.
Tags : 
    
Dassault Systèmes

Adopting Cloud Innovation Platforms

Published By: Dassault Systèmes     Published Date: May 01, 2019
The Cloud Opportunity is Compelling Cloud solutions offer benefits along implementation, operational, and business dimensions. They provide companies the flexibility and agility they need to compete in today’s changing Automotive market as old and new players alike try to capitalize on the transition to electric, autonomous vehicles. Companies are not willing to trade off the PIP features that directly impact their success drivers – quality, innovation, reliability, performance, and product cost.
Tags : 
    
Dassault Systèmes

How SMBs can Fuel Their B2B Marketing and Sales Engines with Data.com

Published By: Data.com     Published Date: Jan 20, 2012
This whitepaper will illustrate the power of Data, implementation strategies and what qualities to look for in your data providers.
Tags : 
data.com, marketing, b2b marketing, sales, sales engines, data, data implementation, marketing strategies
    
Data.com

Accelerating the Benefits of Windows Server 2012

Published By: Dell     Published Date: Nov 09, 2012
Discover how Dell solutions can help you simplify and accelerate your Windows Server 2012 implementation, enabling you to enhance virtualization, IT management, cloud computing and worker productivity faster.
Tags : 
windows server 2012, dell solutions, it management, cloud computing, work productivity, business technology, data center
    
Dell

The IT Handbook for Windows 7 & 8 OS Migrations

Published By: Dell     Published Date: Feb 02, 2015
While Windows 7 and Windows XP continue to dominate the market, Windows 8 adoption has been fairly slow, especially in the enterprise. The end of support for Windows XP now creates a season of needed change. Prepare now to address both the challenges and opportunities of this wave of OS migrations by downloading this IT handbook. Read it for insights into planning and preparation, hardware and software compatibility considerations, as well as end user training and implementation.
Tags : 
dell, windows, productivity, security, apps, integration, platforms, microsoft, business, management, budget, training, windows 7, windows 8, mobility, security, compatibility, support, training, byod
    
Dell

The Business Value of Data Protection in IT Transformation

Published By: Dell     Published Date: Nov 02, 2018
For many organizations, digital transformation (DX) is the most strategically important initiative for the organization and may determine its ability to compete in the coming decade. IDC estimates that 60% of organizations will have created and begun implementation of a digital transformation strategy by 2020. These DX initiatives are designed to take the organization forward as a proactive, data-driven company that uses and monetizes data to gain competitive advantage in the marketplace.
Tags : 
    
Dell

Building the Business Case for Cloud: Real Ways Private Cloud can Benefit Your Organization

Published By: Dell     Published Date: May 04, 2015
Read this paper to further learn how: - Leveraging cloud technology can help drive costs while enabling service-oriented IT. - Private and hybrid cloud approached improve application delivery. - Cloud implementations increase agility and help organizations adjust to meet customer and worker expectations. - Dell Cloud features Intel® technology.
Tags : 
    
Dell

Choosing a Road to Hybrid Cloud

Published By: Dell     Published Date: Nov 03, 2015
This whitepaper highlights market response to the Azure platform and outlines the most important ingredients in a hybrid cloud approach along with case studies of implementation success.
Tags : 
    
Dell

Integrating Private and Public Clouds to Form Hybrid Clouds

Published By: Dell & Microsoft     Published Date: Aug 14, 2013
With the viability and importance of cloud computing now widely accepted by IT and business leaders alike, the focus of planning, discussion and implementation has shifted to the best approaches for using cloud computing to achieve the all important business goals of agility, flexibility and efficiency. From an architectural standpoint, most organizations have embraced some combination of public and private clouds — sometimes in isolation, other times in concert. But increasingly, large and small organizations alike are taking steps toward the next wave of cloud architecture: hybrid clouds.
Tags : 
private cloud, public cloud, hybrid cloud, cloud computing
    
Dell & Microsoft

Why SQL Server Thrives on Dell EMC XC Series and Nutanix

Published By: Dell and Nutanix     Published Date: Jan 16, 2018
Because many SQL Server implementations are running on virtual machines already, the use of a hyperconverged appliance is a logical choice. The Dell EMC XC Series with Nutanix software delivers high performance and low Opex for both OLTP and analytical database applications. For those moving from SQL Server 2005 to SQL Server 2016, this hyperconverged solution provides particularly significant benefits.
Tags : 
data, security, add capacity, infrastructure, networking, virtualization, dell
    
Dell and Nutanix

Dell And Partners Workforce Productivity Benefits

Published By: Dell APAC     Published Date: May 16, 2019
"Dell and its partners provide a range of solutions that enable their customers to transform the capabilities of the workforce. Dell commissioned Forrester Consulting to conduct a Total Economic ImpactTM (TEI) study and examine the potential benefits and costs enterprises may realize by deploying three key Workforce Enablement Solutions, namely: › Best device experience: a hardware policy combining the choice of a range of Dell PCs, tablets, and peripherals with rapid configuration and delivery. › Unified endpoint management (UEM): an integrated approach to managing mobile devices, PCs. and other workstation technologies. In this case study, implementations of Workspace ONE, VMware’s UEM solution, have been assessed. › Enterprise collaboration: includes capabilities such as messaging, conferencing, document sharing, and business use of social media. In this case study the collaboration elements of Microsoft Office 365, namely OneDrive, SharePoint, Teams, Skype for Business, and Yammer
Tags : 
    
Dell APAC

Dell And Partners Workforce Productivity Benefits

Published By: Dell APAC     Published Date: May 25, 2019
"Dell and its partners provide a range of solutions that enable their customers to transform the capabilities of the workforce. Dell commissioned Forrester Consulting to conduct a Total Economic ImpactTM (TEI) study and examine the potential benefits and costs enterprises may realize by deploying three key Workforce Enablement Solutions, namely: › Best device experience: a hardware policy combining the choice of a range of Dell PCs, tablets, and peripherals with rapid configuration and delivery. › Unified endpoint management (UEM): an integrated approach to managing mobile devices, PCs. and other workstation technologies. In this case study, implementations of Workspace ONE, VMware’s UEM solution, have been assessed. › Enterprise collaboration: includes capabilities such as messaging, conferencing, document sharing, and business use of social media. In this case study the collaboration elements of Microsoft Office 365, namely OneDrive, SharePoint, Teams, Skype for Business, and Yammer
Tags : 
    
Dell APAC
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.