resources

Results 426 - 450 of 1793Sort Results By: Published Date | Title | Company Name

The Payroll Solution Buyer’s Guide

Published By: ADP     Published Date: Sep 14, 2017
If you’re like most of the businesses we speak to, you’re looking to do things like streamline your processes, reduce risk and control costs. Maybe you’re spending too much time on payroll, or you’re out-growing your current system.
Tags : 
adp, payroll, streamline, human resources, cloud
    
ADP

Save Time and Cut Errors by Simplifying Payroll

Published By: ADP     Published Date: Sep 14, 2017
Like a lot of employee management tasks, payroll has the uncanny knack of being really important to get right and really easy to mess up, all at the same time. In short, it’s a pain. If you’re a business owner or HR professional, payroll is not something you want to be spending all your time on.
Tags : 
adp, payroll, employee management, human resources
    
ADP

The Executive’s Handbook to Modern Digital Commerce

Published By: Oracle Commerce Cloud     Published Date: Sep 06, 2017
"Ecommerce industry leaders reveal how to provide a superior shopping experience, win over customers, and maximize ROI. Digital commerce is getting harder. As the pace of change grows faster, the divide between commerce leaders and the competition grows wider. Staying ahead requires resources like The Executive's Handbook to Modern Digital Commerce that contains expertise from the industry's top players You will: - Unleash digital commerce innovation - Learn trends in mobile and consumer shopping - See what's possible with modern digital commerce technology - Hear from top industry voices about what’s next in commerce "
Tags : 
    
Oracle Commerce Cloud

Recruiting & HR Conferences Part 2

Published By: Entelo     Published Date: Sep 06, 2017
We searched high and low to find every top recruiting and HR conference happening around the world between July and December of 2017. From London and Omaha, to Amsterdam and San Francisco, you'll find nearly 100 events to choose from. Inside you’ll find actionable intel to help you make informed, decisions about which conferences and events best fit your professional goals and organizational imperatives, including: The full rundown on conferences and meetups happening through the end of 2017, focused on recruiting, human resources, talent management, diversity and inclusion, and more Dates, locations, and cost breakdowns to make planning a cinch Keynote speakers and interesting sessions that we’ve got our eyes on Recommendations on who should attend each conference Which events Entelo will be attending, sponsoring or presenting Download your copy of the Ultimate Guide to start planning where you're headed this Summer and Fall!
Tags : 
    
Entelo

IDC MarketScape: Worldwide Virtual Client Computing Software 2016 Vendor Assessment

Published By: VMware     Published Date: Sep 06, 2017
"VMware was named a leader again in the IDC MarketScape: Worldwide Virtual Client Computing Software 2016 Vendor Assessment. According to the IDC MarketScape report, “It would appear that the commitment made in 2013 (by VMware) is resulting in solid gains and the strategies that were employed have been effective. These elements, along with reference interviews, provide VMware with a solid rating in the IDC MarketScape. As a result, IDC has placed VMware in the Leaders category in this IDC MarketScape. VMware's position reflects the company's market position and commitment to providing resources to expand its VCC product portfolio as well as supporting software and hardware solutions.” Download a free excerpt of the IDC MarketScape: Worldwide Client Computing Software 2016 Vendor Assessment, available from VMware."
Tags : 
vmware, idc marketspace
    
VMware

How To Build a SOC With Limited Resources

Published By: Logrhythm     Published Date: Sep 05, 2017
The purpose of this white paper is to show you how you can successfully build a SOC, even with limited resources. The paper first explains the basics of the Cyber Attack Lifecycle and the need to address it through the Threat Lifecycle Management framework. Next, the paper explains the basics of SOCs, providing details of what SOCs mean in terms of people, processes, and technology. Finally, the paper walks you through a methodology for building a SOC with limited resources, focusing on tactics to make your rollout smooth and successful. After reading this paper, you should be ready to start planning your own SOC.
Tags : 
reconnaissance, initial compromise, command control, lateral movement, target attainment, corruption
    
Logrhythm

The Democratization of Machine Learning

Published By: IBM APAC     Published Date: Aug 25, 2017
Machine learning automates the development of analytic models that can learn and make predictions on data. It has been one of the fastest growing disciplines within the world of statistics and data science, but the barrier to entry has been high, not only in cost, but also in the need for specialized talent.
Tags : 
machine learning, apache spark, additional resources, big data, ibm
    
IBM APAC

The Innovation Imperative

Published By: IBM APAC     Published Date: Aug 25, 2017
New seismic and disruptive events are upending the pace of innovation – and leading companies are jumping into the fray, trying to differentiate themselves through emerging business models. But here is the hard truth: Enterprises are wasting money, resources and time putting on a facade of innovation that falls short of customer and shareholder expectations. There is an inherent expectation that these incremental, and in many cases “siloed,” investments or initiatives will lead to sustained business impact. The time has come to move beyond “innovation theater” into a more mature adoption of innovation that drives measurable business results. Now is the time for Innovation 2.0.
Tags : 
corporate culture, accountable business, risk, leveraging market differentiators, portfolio, investments
    
IBM APAC

CA Technologies Introduces Robust Multicloud Infrastructure Monitoring

Published By: CA Technologies     Published Date: Aug 24, 2017
IDC's research shows that, worldwide, over 70% of enterprise cloud users currently rely on multiple clouds (public and/or private) to support a wide range of applications and workloads. Efficient management of these resources depends on IT operations and DevOps teams having access to consistent, accurate infrastructure performance monitoring data and reporting that span the full set of on-premise cloud infrastructure and public cloud IaaS services. CA Technologies recently announced new capabilities for CA Unified Infrastructure Management (CA UIM) that allow the product to more fully address the monitoring needs of complex multicloud infrastructure as part of delivering on CA's vision to fully enable the agile DevOps in the application economy.
Tags : 
    
CA Technologies

Simplifying Data Benchmarking DataStax Enterprise (DSE) on AWS

Published By: Datastax     Published Date: Aug 23, 2017
Kenzan, a software engineering firm that specializes in building scalable, data-driven solutions, often leverages DataStax Enterprise (DSE) for customers that have high expectations for both performance and value. That means making careful, informed choices when designing the cloud infrastructure that applications run on. Controlling costs is always a priority for businesses that rely on AWS for running DSE. With AWS, it can be tempting to solve performance issues simply by adding more resources until the problem goes away. However, this “solution” results in increased costs which quickly add up over time. In this white paper, Kenzan and DataStax identify some of the key factors to consider when building out infrastructure on AWS, outlining practical steps you can take to optimize performance with DSE on AWS while keeping costs in check.
Tags : 
enterprise, benchmarking, data
    
Datastax

A How-to Guide to OAuth & API Security

Published By: CA Technologies     Published Date: Aug 22, 2017
OAuth is an emerging Web standard for authorizing limited access to applications and data. It is designed so that users can grant restricted access to resources they own—such as pictures residing on a site like Flickr or SmugMug—to a third-party client like a photo printing site. In the past, it was common to ask the user to share their username and password with the client, a deceptively simple request masking unacceptable security risk. In contrast to this, OAuth promotes a least privilege model, allowing a user to grant limited access to their applications and data by issuing a token with limited capability.
Tags : 
    
CA Technologies

Choosing the Right API Management Solution for the Enterprise User

Published By: CA Technologies     Published Date: Aug 22, 2017
Today, 75% of Twitter traffic and 65% of Salesforce.com traffic comes through APIs. But APIs are not just for the social Web. According to ProgrammableWeb.com, the number of open APIs being offered publicly over the Internet now exceeds 2000—up from just 32 in 2005. Opening APIs up to outside developers enables many technology start-ups to become platforms, by fostering developer communities tied to their core data or application resources. This translates into new reach (think Twitter’s rapid growth), revenue (think Salesforce.com’s AppExchange) or end user retention (think Facebook).
Tags : 
    
CA Technologies

An Enterprise Architect’s Guide to API Integration for ESB and SOA

Published By: CA Technologies     Published Date: Aug 22, 2017
While some are still adjusting to the idea, you’re well aware that we’re living in an application economy. For the uninformed, an application economy is where everything is driven by a connected, mobile, application-based world where your customers are far more likely to experience your brand and interact with your enterprise through a software application than a live person. But, beyond the benefits, each day you’re feeling the pressure it exerts on your budget, resources and network. You’ve seen this wave swell on the horizon, and now it’s arrived: executives are enthusiastic and asking about strategies, and line-of-business leaders are requesting faster dev times and more complex projects. Staking out your place as a leader in this new landscape will require you to develop and deliver high-impact applications faster than ever before.
Tags : 
    
CA Technologies

Mobility Insights And Analytics With IBM Watson

Published By: IBM APAC     Published Date: Aug 22, 2017
While working to maintain tactical control of the mobile environment, IT managers often find themselves drowning in minutiae. Overwhelmed by the number of moving parts, they’re unable to stay abreast of the latest threats, let alone extract meaning from or make decisions based on the mountains of data now being collected. With limited IT resources dedicated to mobile technology tools that facilitate reactive rather than proactive management—and limited visibility into mobile intelligence across the organization—many managers have had to choose between security and productivity as the focus of their efforts.
Tags : 
security risks, it operations, workforce, advisor, mobile security, mobile metrics, cloud based, benchmarking data
    
IBM APAC

CA Technologies Introduces Robust Multicloud Infrastructure Monitoring

Published By: CA Technologies     Published Date: Aug 21, 2017
IDC's research shows that, worldwide, over 70% of enterprise cloud users currently rely on multiple clouds (public and/or private) to support a wide range of applications and workloads. Efficient management of these resources depends on IT operations and DevOps teams having access to consistent, accurate infrastructure performance monitoring data and reporting that span the full set of on-premise cloud infrastructure and public cloud IaaS services. CA Technologies recently announced new capabilities for CA Unified Infrastructure Management (CA UIM) that allow the product to more fully address the monitoring needs of complex multicloud infrastructure as part of delivering on CA's vision to fully enable the agile DevOps in the application economy.
Tags : 
    
CA Technologies

Streamline SAP Budgeting and Planning with Accurate, Timely Data

Published By: Winshuttle     Published Date: Aug 17, 2017
How do you invest resources and plan budgets for your organization? The answer to that question often predicts business success or failure. Most organizations have similar goals: They want to achieve business insights from accurate data so they can optimize their business processes and balance organizational needs with financial objectives.
Tags : 
sap, budget, budgeting, planning, sap finance, sap master data, sap implementations, s/4hana
    
Winshuttle

Dell Financial Services Launches Low-Obligation Financing for Hyperconverged Appliiances

Published By: Dell EMC     Published Date: Aug 17, 2017
In a market where compute and storage resources can be bought on demand with a credit card, vendors of on-premises hardware are seeking to tip the scales in their favor with ‘cloud-like’ pricing models that eliminate the need to commit capital to new platforms. At Dell EMC World in May, Dell Financial Services (DFS) rolled out Cloud Flex for HCI (hyperconverged infrastructure), part of the company’s push to evangelize the start-small-and-scale-up virtues of HCI technology. Cloud Flex lets customers acquire equipment on an all-opex basis, with no up-front product cost, steady monthly payments that reduce by up to 30% annually, and the ability to turn in equipment any time after 12 months without penalty. It’s part of a series of moves by Dell EMC meant to ease the financial risk of sticking with on-premises infrastructure in a cloud-enabled world
Tags : 
storage resources, hyperconverged appliance, hyperconverged infrastructure, cloud, cloud pricing model
    
Dell EMC

Delivering the Best Mobile Experience: Why Leading Brands Choose Akamai

Published By: Akamai Technologies     Published Date: Aug 17, 2017
The consumerization of technology and rise of mobile adoption in emerging and established markets have driven companies to invest enormous capital and resources into pursuing the best possible mobile experience for all of their end users. But, without a focused mobile performance solution, these investments can only go so far. Download now to learn more
Tags : 
mobile experience, branding, akamai, loyalty
    
Akamai Technologies

Application Security and Performance

Published By: Akamai Technologies     Published Date: Aug 17, 2017
Web application and DDoS attacks hit enterprises without warning or reason. The attacks can expose confidential data and website resources to malicious uses, reduce performance, and render sites unavailable. Responsible organizations proactively block web attacks to protect their reputations, site availability, site performance, and confidential data.
Tags : 
application, security, performance, web attacks, data security
    
Akamai Technologies

7 Critical Considerations for Choosing a Cloud Security Provider

Published By: Akamai Technologies     Published Date: Aug 17, 2017
The cloud is a network of servers housing data, software, and services. Cloud services are commonly accessed via the Internet, instead of locally in a data center. Businesses are increasingly relying on the cloud for cybersecurity for two key reasons: 1. Due to a changing threat landscape, there’s a need for more scale, accuracy, experience, and collective intelligence. These resources are out of reach internally for most organizations. 2. There are fundamental limits with on-premises hardware mitigation appliances and enterprise data centers for Distributed Denial of Service (DDoS) and web attack protection.
Tags : 
cloud security, scale, data center, ddos
    
Akamai Technologies

E-Book: Top insights and resources from Google Cloud Next '17

Published By: Google Cloud     Published Date: Aug 17, 2017
"From unparalleled infrastructure, to customer value and product innovation, Google Cloud Next ’17 showcased insights and solutions from across the industry. Whether you’re an enterprise or a startup, Google Cloud is here to help you build what’s next. "
Tags : 
    
Google Cloud

5 Steps To A Successful Data Center Consolidation

Published By: Schneider Electric     Published Date: Aug 15, 2017
The reference guide lays out for data center managers a step-by step approach to data center consolidation. By breaking down the process into clear and identifiable actions – all of which are covered in the sections below – a data center consolidation becomes much more manageable, and the odds of its success much higher.
Tags : 
assessment, strategical planning, design, commission, operation, additional resources, schneider electric
    
Schneider Electric

Evolve Your Website Security

Published By: Symantec     Published Date: Aug 15, 2017
Stay ahead of the evolving threats. Organized crime is driving the rapid growth and sophisticated evolution of advanced threats that put entire website ecosystems at risk, and no organization is safe. The stealthy nature of these threats gives cybercriminals the time to go deeper into website environments, very often with severe consequences. The longer the time before detection and resolution, the more damage is inflicted. The risk and size of fines, lawsuits, reparation costs, damaged reputation, loss of operations, loss of sales, and loss of customers pile up higher and higher. The complexity of website security management and lack of visibility across website ecosystems is further impacted by the fact that it is nearly impossible to know how and where to allocate resources. Website security must be evolved in line with these growing threats and challenges.
Tags : 
    
Symantec

Future-Proof Your Data Center Into a Cloud-Based Strategic Business Asset

Published By: Juniper Networks     Published Date: Aug 10, 2017
In today’s business and IT landscape, the network is no longer simply a basic IT function. It is an essential business asset. The ability of your network users—whether they be employees, customers, or partners—to have fast, real-time access to online resources is directly correlated to financial success.
Tags : 
software as a service, platform as a service, infrastructure, cloud service provider, virtual data center, sdsn
    
Juniper Networks

OpenLab: Juniper's Global Innovation Center

Published By: Juniper Networks     Published Date: Aug 10, 2017
OpenLab provides an environment and set of resources where customers representing telecommunications, education, government, financial services, and virtually every other vertical market can explore new technologies, all in the spirit of network transformation. By examining SDN/network automation solutions such Network Functions Virtualization (NFV), software-defined WAN (SD-WAN), and others, OpenLab offers a platform for developing and delivering new network-integrated functionality that serves the greater need.
Tags : 
technology efficiency, cloud storage services, mobile devices, applications, online collaboration tools, client services, data encryption, remote access
    
Juniper Networks
Start   Previous    11 12 13 14 15 16 17 18 19 20 21 22 23 24 25    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.