it standard

Results 551 - 575 of 713Sort Results By: Published Date | Title | Company Name

Taking the Service Desk to the Next Level

Published By: BMC ESM     Published Date: Jul 17, 2009
Listen to this conversation with Doug Mueller to learn how standards and processes have evolved to bring us the service desk of today and tomorrow. Discover what changes in direction surprise even Doug as he builds architecture for efficient service desks. Doug's enthusiasm for taking the service desk to the next level is noticeable in this podcast, and you just might come away with some new perceptions of the service desk of the future.
Tags : 
service desk, architecture, podcast, cto, bmc, podcast, customer service levels, outsource, service, service management, mobile computing, customer service, enterprise applications, mobile workers, customer interaction service, customer satisfaction, customer experience management
    
BMC ESM

Taking the Service Desk to the Next Level.

Published By: BMC ESM     Published Date: Jul 22, 2009
Listen to this conversation with Doug Mueller to learn how standards and processes have evolved to bring us the service desk of today and tomorrow. Discover what changes in direction surprise even Doug as he builds architecture for efficient service desks. Doug's enthusiasm for taking the service desk to the next level is noticeable in this podcast, and you just might come away with some new perceptions of the service desk of the future.
Tags : 
service desk, architecture, podcast, cto, bmc, podcast, customer service levels, outsource, service, service management, mobile computing, customer service, international computing
    
BMC ESM

Taridium Managed VoIP Offering

Published By: Taridium     Published Date: Aug 23, 2007
The Taridium managed VoIP offering (TMV) is a complete PBX replacement solution for small to medium enterprises. Taridium Managed VoIP combines the reliability of an on-premise open standards VoIP telephony system with the convenience of a simple monthly fee for equipment, services and support.
Tags : 
voip, sip, ip pbx, ip telephony, sip voip, voip pbx, microsoft pbx, microsoft integration, ip pbx voip, ippbx active, ip telephony solution, ip telephony system, ip telephony applications, ip telephony pbx, microsoft ip pbx, microsoft ip pbx integration, voip ip telephony, taridium, tmv, convergence
    
Taridium

TCO Report: Tape vs. Object Storage

Published By: Broadcast Beat Magazine     Published Date: Oct 30, 2019
After examining the TCO of object storage vs. LTO tape, and seeing the benefits achieved in a real-world case study, it’s easy to understand why object storage is quickly becoming the standard for data storage, backup, archive, and recovery. It’s clear that when all costs associated with data storage are tracked, object storage beats tape storage hands down. And even with costs aside, on-premises object storage with Cloudian provides businesses with the flexibility they need to respond to changing technology environments, storage requirements, data monetization opportunities, and more.
Tags : 
    
Broadcast Beat Magazine

TechWiseTV:802.11ac Wave 2:Are You ready

Published By: Cisco     Published Date: Apr 10, 2015
Your users are ready for multigigabit wireless. The real question is: Is your network? Don’t miss this opportunity to get a first-hand look at the solutions you’ll need to achieve data rates that make it easier for your people to share, stay informed, and make smart decisions. • Join hosts Robb, Jimmy Ray, and networking experts as they dive deep into the technical details of delivering exponentially faster 802.11ac Wave 2 access through the current Cat5 cable you already have. • Hear all about Cisco’s founding membership and participation in the NBASE-T Alliance, the team that’s driving the standardization of 2.5 Gb/s and 5 Gb/s Ethernet speeds in campus access. • Discover the access point and switch technology you’ll need to ensure that your wired access layer does not become a stumbling block for your continued mobile growth.
Tags : 
cisco, techwise, routers, wan, productivity, performance, 802.11ac, wireless, networking, bandwidth management, network architecture, network management, network performance, 802.11, mobile computing, mobile data systems, mobile workers, smart phones, wifi, wireless communications
    
Cisco

Ten Steps to Better Requirements Management

Published By: IBM     Published Date: Oct 10, 2014
Requirements definition and management is recognized as a necessary step for the successful delivery of systems and software projects; the discipline is also required by standards, regulations and quality improvement initiatives like Capability Maturity Model Integration (CMMI).
Tags : 
ibm, requirements management, cmmi, successful delivery, distinctively identified, specific solutions, defined requirement, managing requirements, structure requirements, duplicate requirements, best practices, content management system, productivity
    
IBM

The 2018 Gartner Magic Quadrant for Full Life Cycle API Management

Published By: Google Apigee APAC     Published Date: Jun 10, 2019
Power your APIs with a three-time leader. We’re thrilled to share that Gartner has recognized Apigee as a Leader in the 2018 Magic Quadrant for Full Life Cycle API Management. This year, Apigee was not only positioned furthest on Gartner’s "completeness of vision" axis for the third time running, it was also positioned highest in "ability to execute." Download your complimentary copy of the 2018 Gartner Magic Quadrant for Full Life Cycle API Management. This must-read for IT professionals provides a comprehensive analysis of the API management marketplace and evaluates 22 vendors across 15 essential criteria. What’s inside? Apigee continues to be recognized as a leader in its category APIs are the de facto standard for building and connecting modern applications APIs and API management have become essential to how enterprises deliver applications in and across clouds Apigee’s API management platform can be a key ingredient in running a successful digital business
Tags : 
    
Google Apigee APAC

The Agile Way: A complete guide to understanding agile testing methodologies

Published By: Tricentis     Published Date: Jan 08, 2018
If you’re in the software development business, there’s no doubt you’ve heard of, dipped your toe into or even experienced the joys and pains of agile methodology. The Agile Method promotes adaptive planning, early delivery and continuous improvement, and encourages rapid and flexible response to change. It’s quickly becoming the gold standard for software development. And, as the agile world has heated up, so has the pressure on testers to produce timely releases without sacrificing quality. With the fast pace of Agile, there is rarely time to test everything, so requirements must be prioritized and testing automation is deployed where possible. With this guide you’ll learn the importance of agile testing and the different types of testing, agile methodology, and our predictions on where the agile movement is headed.
Tags : 
    
Tricentis

The Apstra Zero Lock-in Guarantee. How to Fr3ee Yourself From Hardware Vendor Lock-In

Published By: Apstra     Published Date: Aug 19, 2019
Years ago, there were proprietary networking solutions like IBM Token Ring. Every new PO had to go to the same vendor if customers wanted to ensure connectivity. Then came Ethernet which promised to be an open interoperable standard. However, vendors recreated lock-in by implementing proprietary VLAN extensions such as private VLANs.
Tags : 
    
Apstra

The Art of Empowerment

Published By: RMS     Published Date: Jul 18, 2019
The more holistic view of risk a property underwriter can get, the better decisions they are likely to make. In order to build up a detailed picture of risk at an individual location, underwriters or agents at coverholders have, until now, had to request exposure analytics on single risks from their portfolio managers and brokers. Also, they had to gather supplementary risk data from a range of external resources, whether it is from Catastrophe Risk Evaluation and Standardizing Target Accumulations (CRESTA) zones to look-ups on Google Maps.
Tags : 
    
RMS

The Bad Bot Landscape 2014 Annual Report

Published By: distilnetworks     Published Date: Jun 13, 2014
In the 2014 Annual Bad Bot Report, Distil Networks identifies the trends and changes of bad bot activity over the past year. This report serves as the industry standard of defining malicious attacks and reporting on bad bot origins and makeup to help organizations prepare for, and mitigate, this rapidly accelerating security threat.
Tags : 
block bot, block bots, data protection, distil networks, online trust, prevent web scraping, price scraping, web scraping, security, business technology
    
distilnetworks

The Benefits of Private Clouds

Published By: CDW Vmware     Published Date: Aug 02, 2012
There's a reason why the buzz around cloud computing never seems to die down. Concrete results are replacing the initial hype. Many organizations are taking advantage of private clouds which come with the accessibility of a public cloud and the security of a local server.
Tags : 
data, center, private, cloud, benefits, computing, security, local, server, protection, comliance, cisco, application, virtualize, standardize, hardware, internal, network, infrastructure, local area networking
    
CDW Vmware

The Business Case for Automating Document Driven Business Processes

Published By: Kofax     Published Date: Sep 08, 2011
The Kofax enterprise capture platform offers unmatched scalability from centralized to highly distributed environments, from individual desktops to enterprise deployments and from basic archival scanning to powerful document classification and separation and data extraction. The company's market leading technology supports a wide variety of input devices and line of business applications, providing a strong enterprise-wide platform on which to standardize document driven processes.
Tags : 
kofax ktm, transformation modules, capture, vrs, scan to process, enterprise capture, customer-centric, automated document classification, metadata extraction, new account applications, mfps, loan and mortgage processing, sap, funds processing, credit card application processing, swift format, icr, ocr, omr, automatically index
    
Kofax

The Business Case for Recognition

Published By: OC Tanner     Published Date: Jun 12, 2018
Employee recognition is more than an HR program—it has a profound impact on an organization’s workplaceculture and bottom line. Employee recognition has a strong influence on an organization’s workplace culture. Research on 10,000 employees in 12 countries shows that organizations who have a great culture are: • 54% more likely to have employees that are Promoters on the standard NPS scale • 53% more likely to have highly engaged employees • 29% more likely to have employees innovating and performing great work • 27% more likely to have increased in revenuelast year • 25% more likely to have growth in team size in the last year1 By creating a great workplace culture employees want to engage with, you’ll see an improvement in business results. Employee recognition touches every aspect of your company culture and your employee experience—from recruiting, to engagement, productivity, innovation, and retention.
Tags : 
    
OC Tanner

The Business Case for SOA: Rationalizing the Benefits of Service-Oriented Architecture

Published By: webMethods     Published Date: Aug 21, 2009
One of the most significant IT initiatives underway is the adoption of service-oriented architecture (SOA), where IT assets are aligned to business services in a standard, flexible and architected fashion. The concept is often discussed in conjunction with Web services, though the two are not synonymous.
Tags : 
soa, service-oriented architecture, service oriented architecture, service management, alignment, web service, web methods, webmethods, software development, it management, web service security, database development, web services
    
webMethods

The Business Value of Standardizing on Red Hat Infrastructure Solutions

Published By: Red Hat     Published Date: Oct 23, 2014
The business case for standardizing on Red Hat infrastructure solutions Read this IDC whitepaper to discover the quantifiable business benefits that standardizing on Red Hat® infrastructure has delivered organizations like yours. You'll learn how customers using Red Hat Enterprise Linux® and Red Hat's system management product, Red Hat Satellite: • Quickly recover up-front subscription costs. • Experience higher ratios of servers and users per administrator. • Significantly reduce annual downtime.
Tags : 
quantifiable benefits, infrastructure, management product, higher ratios, reduce annual downtime, networking, it management, enterprise applications
    
Red Hat

The Case for Business Software Assurance - Securing your Applications

Published By: HP - Enterprise     Published Date: Oct 16, 2008
The hacking community has shifted its effort toward a new frontier:  the application layer.  How are companies responding?  Business Software Assurance – the capability to address the problem of application risk within an enterprise.  This whitepaper provides an overview of the severity of the problem along with everything needed to develop Business Software Assurance in your organization. 
Tags : 
business risk, security, application security, audit, risk, vulnerabilities, fortify, fortify software, hackers, cyber threats, application security standards, threats, assessment, remediation, compliance, firewalls
    
HP - Enterprise

The CFO Guide to Rev Re: Challenges and Solutions

Published By: Financial Force     Published Date: Dec 01, 2017
Download this guide to review three major pain points that companies are facing as they prepare for the new revenue recognition standards-ASC 606 and IFRS 15- as they are fast approaching.
Tags : 
    
Financial Force

The CFO Guide to Rev Re: Challenges and Solutions

Published By: FinancialForce     Published Date: Dec 01, 2017
Download this guide to review three major pain points that companies are facing as they prepare for the new revenue recognition standards-ASC 606 and IFRS 15- as they are fast approaching.
Tags : 
    
FinancialForce

The CFO Guide to Rev Rec

Published By: FinancialForce     Published Date: Aug 20, 2019
Are you prepared for the new Revenue Recognition standards? For most organizations, implementing the new standards will be a complex project that demands significant planning and coordination. The CFO Guide to Rev Rec outlines challenges and solutions as you transition your organization to the new standards, and how a cloud application can help position your company for a smooth, successful changeover.
Tags : 
    
FinancialForce

The Challenge of Burdensome Recovery Processes and Long Recovery Times in the Government and Legal

Published By: InMage     Published Date: Feb 24, 2009
The AODA currently provides IT support and management for 32 remote offices serving approximately 1,000 end users. In a field dependent upon the highest standards of data integrity, protection and retention, it was critical for the AODA to implement the disaster recovery (DR) and business continuity solutions necessary for fulfillment of its objectives.
Tags : 
inmage, data recovery, disaster recovery, business continuity, new mexico state aoda, dr scout, continuous data protection, cdp, disaster recover software, data management, data protection
    
InMage

The Complete API Strategy Model For The Enterprise

Published By: CA Technologies EMEA     Published Date: Aug 07, 2017
CA API Management is a robust, enterprise-grade solution that can enable the success of your API initiatives. The software provides industry-leading tools to rapidly create APIs from existing data assets, orchestrate legacy services and safely expose enterprise applications and services. The solution also allows you to quickly onboard, manage and enable the developers who will create innovative apps that add value to your business. And, just as importantly, CA API Management secures your enterprise data to meet the toughest compliance and regulatory standards, while providing you with full control over which apps, developers and partners can access your APIs.
Tags : 
api, application programming interface, psd2, open banking, json, github
    
CA Technologies EMEA

The Conference is Calling: Guide to Getting the Most out of your Conference Calls

Published By: Polycom     Published Date: Nov 09, 2015
When it comes to conference calling, the lack of clarity, background noise, and volume issues that you experience on a standard phone, are all solved by a dedicated conference phone—you can hear the difference. This can have a real impact if you’re teleconferencing on a regular basis and you want to remain alert, attentive and productive.
Tags : 
polycom, conference call, background noise, clarity, teleconferencing, knowledge management, business technology
    
Polycom

The Definitive Guide To Public Cloud Security and Compliance for Financial Services

Published By: Dome9     Published Date: Apr 25, 2018
As of May 2017, according to a report from The Depository Trust & Clearing Corporation (DTCC), which provides financial transaction and data processing services for the global financial industry, cloud computing has reached a tipping point1. Today, financial services companies can benefit from the capabilities and cost efficiencies of the cloud. In October of 2016, the Federal Deposit Insurance Corporation (FDIC), the Office of the Comptroller of Currency (OCC) and the Federal Reserve Board (FRB) jointly announced enhanced cyber risk management standards for financial institutions in an Advanced Notice of Proposed Rulemaking (ANPR)2. These proposed standards for enhanced cybersecurity are aimed at protecting the entire financial system, not just the institution. To meet these new standards, financial institutions will require the right cloud-based network security platform for comprehensive security management, verifiable compliance and governance and active protection of customer data
Tags : 
    
Dome9

The Digital Accountability and Transparency Act: From Obligation to Opportunity

Published By: Teradata     Published Date: Jun 22, 2015
Passed on May 9, 2014, the Digital Accountability and Transparency Act (DATA Act) legislation requires federal agencies to report all expenditures—grants, loans, and contracts—in order to provide American citizens and policy makers better visibility into federal spending. At first glance, new federal requirements— which are scheduled to go in effect May 2017—can seem like imposed obligations with unknown benefits to the implementers. However, wise agencies and early adopters recognize how to transform this new compliance obligation into an opportunity to advance their federal agency by becoming more data driven. The Federal Government maintains vast amounts of data, and the DATA Act establishes data standards and sharing protocols that will help agencies exploit the benefits of data mining and analytics.
Tags : 
    
Teradata
Start   Previous    15 16 17 18 19 20 21 22 23 24 25 26 27 28 29    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.