it operations

Results 226 - 250 of 1338Sort Results By: Published Date | Title | Company Name

20 Recommendations for Successful Oracle Retail Operations

Published By: CA Technologies_Business_Automation     Published Date: Jun 29, 2018
It doesn’t matter whether you’re new to Oracle Retail, have an active implementation project that is running or have an existing deployment in production. The same issue applies: You are making a significant investment in the technology and need to develop a reliable and efficient batch schedule. If you’re new to Oracle Retail, you are no doubt embarking on a major project to improve your competitive position in the retail market. With that in mind, your goals will be to shrink the time-to-market for your retail implementation, lower the reliability risks associated with in-house developed solutions and improve the visibility and control of retail business processes. In this eBook you will discover a series of recommendations for operating a fail-safe and efficient Oracle Retail operational environment. You will also understand how automation enables you to streamline the execution of your Oracle Retail batch operations and increase the day-to-day efficiency of your operations teams.
Tags : 
    
CA Technologies_Business_Automation

Seven Deadly Sins of I&O Cost Optimization and Transformational Investment

Published By: VMware     Published Date: Oct 02, 2018
The journey towards upgrading IT infrastructure is fraught with buzzwords and misinformation. In this special report, Gartner identifies the key challenges faced by infrastructure and operations leaders and provides strong recommendations for optimizing IT costs and investments. Submit the form to access the report and discover the ‘seven deadly sins’ I&O leaders must avoid in order to capture efficiency gains and produce strategic, outcome-driven results.
Tags : 
    
VMware

The Key to Modernizing the Financial Services Data Center

Published By: VMware     Published Date: Dec 10, 2018
It’s no secret financial services organizations own and operate legacy solutions. Some of these core processes are front and center, meeting customer needs; others are in the middle, supporting account handling operations; and still many more are in the back-office, handling data and managing analytics. The challenge for financial leaders is to ensure these traditional systems don’t prevent the delivery of great digital experiences now and into the future. To find out more download this eBook today.
Tags : 
    
VMware

Increase Visibility to Boost Security - Protect your apps by orchestrating your SSL traffic

Published By: F5 Networks Singapore Pte Ltd     Published Date: May 27, 2019
What you can’t see will hurt you The situation is critical, because the percentage of encrypted user traffic has more than doubled since 2014, exceeding 80 percent, according to F5 Labs' 2017 TLS Telemetry report. So, of course, now there are SSL visibility solutions that provide decryption services allowing those security controls to see what they’re doing. But visibility, by itself, isn’t enough. Security teams and network operations have found that setting up decryption zones is not easy. Security teams often have to resort to manual daisy-chaining or tedious configuration to manage decryption/encryption across the entire security stack. And then they find that exceptions abound. And lastly, you need to scan your inbound and outbound traffic for tomorrow’s threats, and SSL Orchestrator is the tool that lets your security controls keep your organization’s name out of the papers and away from those pesky GDPR fines. Download the eBook to find out how you can gain visibility into e
Tags : 
    
F5 Networks Singapore Pte Ltd

Intel® Vision Products Power the Next Generation of Digital Security and Surveillance

Published By: Intel     Published Date: Apr 15, 2019
o The growing video surveillance market is driving demand for advanced video analysis technologies. Businesses and organizations from all vertical sectors are looking to leverage the benefits of enhanced detection accuracy and flexibility provided by deep learning to solve their security, safety, and operations challenges. Discover how Agent Vi’s innoVi* leverages cutting-edge deep learning technology to transform the hundreds, or even thousands, of cameras deployed across a city into smart video devices, contributing to the city’s ability to improve security, safety, and incident response citywide.
Tags : 
    
Intel

Transformation of Security

Published By: Fidelis Cybersecurity     Published Date: May 15, 2019
This report, conducted by SC Media and sponsored by Fidelis asked security leaders, decision makers and influencers what they were most concerned about, what their C-Suite was most concerned about, and what they’re doing (or planning to do) about it. As we start off 2018 it is clear that cybersecurity is ripe for transformation. The focus has shifted away from tactical technologies that provide more proverbial fingers in the dam and towards a strategic approach that focuses on delivering quantifiable improvement to the effectiveness and efficiency of security operations. Download this a research report to: See what executives and boards of directors care most about. See the top obstacles, gaps and concerns faced by security leaders. See where we are on the road to cyber maturity, as reported by your peers. See when security professionals prefer tactical approaches and when they prefer strategic plans.
Tags : 
    
Fidelis Cybersecurity

New Webinar: Achieve Better Airline Schedules with Jeppesen Aircraft Routing and Tail Assignment

Published By: Jeppesen     Published Date: Aug 05, 2019
Aircraft routing and tail assignment are two critical aspects of airline scheduling. Learn how Jeppesen’s Aircraft Routing and Tail Assignment solutions work together holistically across your operations to support improved airline scheduling.
Tags : 
aircraft routing, fleet solutions, tail assignment, fuel savings, crew integration, aircraft operations, airline scheduling
    
Jeppesen

Cloud Security - A Shared Responsibility Model

Published By: Secureworks ABM UK 2017     Published Date: Oct 23, 2017
Despite long-standing concerns captured in a myriad of surveys, security in the cloud has progressed to a more practical and achievable level. The cloud represents a shared security responsibility model whereby that responsibility is split between the Cloud Service Provider and the cloud customer. For organisations moving some or all of their applications and data to the cloud, acceptance of this model clears the way to more thoughtful consideration for how security can and should be architected — from the ground up. As a result, IT and IT Security leaders now have a much clearer trajectory to support their business operations in the cloud in a secure manner.
Tags : 
cyber security, cyber security framework, data security, firewall, general data protection regulation, incident and problem management, information security, intrusion detection
    
Secureworks ABM UK 2017

Case study – Sherwood

Published By: Sage Software (APAC)     Published Date: May 02, 2018
Sherwood International, a specialist in providing customised in-bound supply chain solutions into Africa, has implemented the Sage Business Cloud Enterprise Management solution business management solution to boost efficiencies in its operations and gain better visibility into its business. It has also been able to streamline finances and improve operational controls.
Tags : 
    
Sage Software (APAC)

The Forrester Wave™: Application Performance Management, Q3 2016

Published By: CA Technologies     Published Date: Aug 24, 2017
In our 28-criteria evaluation of application performance management (APM) solutions, we identified the 14 most significant vendors — AppDynamics, AppNeta, BMC Software, CA Technologies, Dell, Dynatrace, Hewlett Packard Enterprise (HPE), IBM, ManageEngine, Microsoft, Nastel Technologies, NetScout, New Relic, and Riverbed Technology — and researched, analyzed, and scored them. This report shows how each provider measures up and helps infrastructure and operations (I&O) professionals make the right choice for their organization.
Tags : 
    
CA Technologies

CA Technologies Introduces Robust Multicloud Infrastructure Monitoring

Published By: CA Technologies     Published Date: Aug 24, 2017
IDC's research shows that, worldwide, over 70% of enterprise cloud users currently rely on multiple clouds (public and/or private) to support a wide range of applications and workloads. Efficient management of these resources depends on IT operations and DevOps teams having access to consistent, accurate infrastructure performance monitoring data and reporting that span the full set of on-premise cloud infrastructure and public cloud IaaS services. CA Technologies recently announced new capabilities for CA Unified Infrastructure Management (CA UIM) that allow the product to more fully address the monitoring needs of complex multicloud infrastructure as part of delivering on CA's vision to fully enable the agile DevOps in the application economy.
Tags : 
    
CA Technologies

In the application economy, DevOps ignites your digital transformation

Published By: CA Technologies     Published Date: Jun 04, 2015
To stand out in the application economy, businesses must add digital dimensions to the experiences they provide for customers, employees and partners. Such a “digital transformation” requires new thinking around IT—specifically, its capabilities and goals, and how the various teams must collaborate to deliver on business objectives. For many organizations, the best way to navigate the digital transformation is with DevOps. In this ebook, you’ll learn more about the challenges digital transformation has created and how DevOps best practices, such as Agile Parallel Development, Continuous Delivery and Agile Operations, can be used to capitalize on opportunities and create competitive differentiation in the application economy.
Tags : 
    
CA Technologies

Modern, High Velocity Application Delivery

Published By: CA Technologies     Published Date: Jun 09, 2015
Today’s organizations are challenged to be the first to market with ‘The Next Big Thing’. They must innovate with new and unique services to satisfy customer demands and differentiate themselves in the marketplace. Software drives that innovation and has turned every organization into a software organization. This Executive Brief describes how the efficient collaboration between the development and IT operations teams can bring high-quality applications to market as quickly as possible. The CA Application Delivery suite helps organizations achieve collaborative DevOps through innovative technology tools used to: •Accelerate application development by removing constraints with CA LISA® Service Virtualization. •Expedite release time with CA LISA® Release Automation. •Improve application testing and quality with CA LISA® Pathfinder
Tags : 
    
CA Technologies

Navigating Your Last Mile Routing Strategy

Published By: WorkWave     Published Date: Apr 18, 2019
The “last mile,” that tricky distance from final transit hub to customer has long been a logistical, management and customer service challenge for delivery service providers. Today, pen and paper just aren’t enough to get business operations where they need to be. With increased delivery volume and customer expectations, the bar is being set higher and higher. Delivery service providers need the right tools to execute a flawless last mile routing strategy and stand out from the competition.
Tags : 
    
WorkWave

NATS ECG CUSTOMER STUDY: CAPITA AT THE HEART OF THE UK’S AVIATION INDUSTRY

Published By: Capita     Published Date: Jun 25, 2019
ECG – Enterprise Connectivity Grading – is essential to the well-being of every organisation, but nothing less than critical for some. National Air Traffic Services (NATS), for example, which handles UK air traffic to the tune of 2.4 million flights and 250 million passengers every year, and which relies on Capita to ensure the connectivity that underpins those vital operations never misses a beat. Download the case study and learn more>>
Tags : 
    
Capita

Affordable, Scalable, Reliable OLTP in a Cloud and Big Data World: IBM DB2 pureScale

Published By: IBM     Published Date: Oct 13, 2016
Compare IBM DB2 pureScale with any other offering being considered for implementing a clustered, scalable database configuration see how they deliver continuous availability and why they are important. Download now!
Tags : 
data. queries, database operations, transactional databases, clustering, it management, storage, business technology
    
IBM

Magic Quadrant for Managed Security Services, Worldwide

Published By: IBM     Published Date: Jan 09, 2017
Security managers should evaluate MSSPs for enterprise scale operations, multinational and local presence, and effective threat management and compliance capabilities. Use this Magic Quadrant to evaluate MSSPs to support global service requirements, regional presence and leading-edge services.
Tags : 
ibm, security, maturity, gartner, magic quadrant, managed security services, enterprise applications, business technology
    
IBM

Four top cyber crime trends

Published By: IBM     Published Date: Jan 09, 2017
This report from IBM Emergency Response Services discusses four key trends in cybersecurity based on field experience in responding to client security incidents.
Tags : 
ibm, security, services operations, ibm emergency response services, cybersecurity, cyber crime, enterprise applications, business technology
    
IBM

Designing an identity and access management program optimized for your business

Published By: IBM     Published Date: Jan 09, 2017
In today’s complex and distributed IT environments, identity and access management (IAM) programs do much more than simply manage user identities and grant access. This paper provides four key steps that can move you toward a more mature solution now.
Tags : 
ibm, security, services operations, iam programs, enterprise applications, business technology
    
IBM

IT Policy Compliance for Dummies

Published By: Qualys     Published Date: Feb 22, 2010
This book is a quick guide to understanding IT policy compliance. It surveys the best steps for preparing your organization's IT operations to comply with laws and regulations - and how to prove compliance to an auditor.
Tags : 
qualys, network secure, it security, vulnerability, it budget, risk management, vulnerability management, misconfigurations
    
Qualys

Forrester Technology Adpotion Profile

Published By: Oracle PaaS/IaaS/Hardware     Published Date: Jul 25, 2017
Read this whitepaper by Forrester Research to gain perspective on the trends shaping development and operations strategies. Learn how progressive companies are handling application development and operations in a DevOps environment faster and at lower costs
Tags : 
    
Oracle PaaS/IaaS/Hardware

IDC Spotlight paper

Published By: Oracle PaaS/IaaS/Hardware     Published Date: Jul 25, 2017
According to Mary Johnston Turner, Research Vice President at IDC; "Breaking down technology specific management as well as data silos also facilitates faster infrastructure and application rollouts, reduces human errors, and improves overall business agility.Cloud based management, monitoring and analytics help to improve collaboration between IT operations and developer teams by stabilizing service levels and monitoring usage to support accurate charge back." 
Tags : 
    
Oracle PaaS/IaaS/Hardware

Veritas Netbackup 8.1.2. Unified Data Protection for the Cloud-ready Enterprise.

Published By: bChannels     Published Date: Dec 11, 2018
For many years, organizations thought about business continuity in much the same way they thought about business insurance — yes, it was important, but rarely was it top of mind. But that’s all changed. Many organizations have, unfortunately, discovered that even a scant few minutes of service downtime can have deleterious effects on their business operations, resulting in lost revenue, diminished customer confidence and heightened compliance risk. For those and other reasons, IT executives have raised the bar on business continuity preparedness for their organizations in all ways. New technologies, business processes and partnerships, combined with a raised level of importance for testing and a full appreciation of what virtualization can and can’t do for business continuity, are essential to new thinking around avoiding the impact of an unplanned service interruption. Download this informative Whitepaper to learn more about how Veritas Netbackup 8.1.2 can help.
Tags : 
    
bChannels

5 Principles for Securing DevOps

Published By: Veracode     Published Date: Jun 26, 2019
DevOps, a new model for software development, is transforming the way the world creates software. And despite its substantial organizational, cultural and technological requirements, this new way of organizing development and IT operations work is spreading rapidly.
Tags : 
    
Veracode

Rackspace Managed Service for Google Cloud Platform

Published By: Rackspace     Published Date: Feb 01, 2019
Whether you’re already a Google customer or simply getting started with the public cloud, Google Cloud Platform (GCP) is an aordable, reliable, innovative and intuitive cloud solution. Rackspace can help you accelerate innovation and cost savings by taking over the intensive dayto-day operations of GCP — letting you focus on achieving your core business objectives while optimizing the performance of your applications. Rackspace works with customers to identify the scope and criticality of their applications and determine the service level that best addresses their needs. To discover how, download this whitepaper today.
Tags : 
    
Rackspace
Start   Previous    3 4 5 6 7 8 9 10 11 12 13 14 15 16 17    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.