service providers

Results 251 - 275 of 445Sort Results By: Published Date | Title | Company Name

Restoring Connections

Published By: IBM     Published Date: May 29, 2015
Learn how telecommunications providers can reboot the customer experience!
Tags : 
restoration, telecommunications, service providers, connection, communication, customer experience, business intelligence, business management, customer interaction service
    
IBM

Analytics: Real-world use of Big Data in Telecommunications

Published By: IBM     Published Date: May 29, 2015
Learn how innovative communications service providers are extracting value from uncertain data through this whitepaper!
Tags : 
big data, mobility, compute-intensive apps, virtualization, cloud computing, scalable infrastructure, reliability, telecommunications, business intelligence, data mining, data center
    
IBM

Understanding and Selecting the Right Payroll Service Vendor

Published By: InsideUpbg     Published Date: May 21, 2015
I. What is Payroll Accounting? II. Why is Payroll Accounting Important? III. Payroll Services IV. How Should a Vendor for Payroll Accounting Be Selected? V. Vendor References VI. How to Perform a Reliable Reference Check VII. When You Have to Switch Vendors VIII. Payroll Vendors Service Providers IX. Glossary
Tags : 
    
InsideUpbg

Enabling Healthcare Transformation: Optimize, Analyze and Engage

Published By: IBM     Published Date: May 12, 2015
Creating more person-centric, coordinated and value-based care means all service providers must share risks and data, conducting business with partners that cross traditional boundaries, while data is transforming this industry at an unprecedented pace. Watch this webcast to learn more of how organizations are optimizing their business processes to lower costs, analyzing data to improve quality, care, and population health, while learning to engage in new ways to drive better outcomes.
Tags : 
risk, data, service provider, healthcare, optimization, quality of service, quality assurance, business intelligence, data quality, productivity
    
IBM

Mobify’s Mobile Solution Checklist

Published By: Mobify     Published Date: Apr 17, 2015
Choosing the right mobile solution (and solution provider) is a complex undertaking – and asking the right questions is critical in helping you find your best fit. In order to determine your ideal mobile solution, it’s important to understand what your needs are, what a given solution offers and how the two might intersect. In this workbook, we’ve presented the most commonly referenced mobile solution criteria for retailers in 2015. For the purposes of this guide, we’ve defined mobile solution providers as companies that bring together a productized mobile technology platform with creative and strategy services that are focused on improving mobile metrics. You can use this criteria to validate different solution providers, and can download included template to customize it for your business’ unique needs.
Tags : 
mobile solutions, mobify, mobile solution criteria, mobile technology platforms, mobile metrics
    
Mobify

How Riak Helps Telcos Provide Innovative Services

Published By: Basho     Published Date: Apr 13, 2015
Today’s consumers expect instant access to communications services whether they’re in the office, at home, or on the road. With data speeds increasing and international roaming costs decreasing, data usage is rapidly growing. Telecommunications Service Providers (TSPs) are under pressure to deliver more services to more people and approach 100% uptime all while lowering prices to consumers. Traditional relational databases can’t meet the requirements for massive scalability, availability, and fault tolerance that the rapid growth in data usage and rise of big data demands. Read this solution brief to learn how Riak excels at these. Riak is a distributed NoSQL database optimized for big data. Riak meets many of the challenges you may be facing with your own service operations systems.
Tags : 
riak, basho, telecommunications service provider, license fees, scalability, availability, data usage, big data, service operations system, networking, security, it management, wireless, data management
    
Basho

Content is the New Perimeter: The Security and Regulatory Drivers for Information Rights Management

Published By: Intralinks     Published Date: Apr 13, 2015
They say content is king. But if your content isn’t protected, it’s a king with no clothes. The proliferation of mobile devices in the workplace, and the availability of cloud services designed for consumers, can lead to improper sharing of corporate data. Information that leaves your firewalls can live forever, and without adequate protection, can end up in the wrong hands. This report by Ovum takes a look at the challenges of information security and explores how a new generation of Information Rights Management (IRM) technology directly addresses the most critical concerns. Key topics include: • The threat posed by Dropbox and other consumer-grade FSS providers • The need for lifetime control of information and content • The ability to perform audits, and locate files, anywhere, and who accessed them • How next-generation IRM technology is available to add a new layer of security to every file
Tags : 
    
Intralinks

IDC MarketScape Evaluates Global Managed Security Services Providers

Published By: IBM     Published Date: Apr 09, 2015
IDC collected and analyzed data on 11 MSSPs within the 2014 IDC MarketScape worldwide managed security services market assessment. While the market arena for MSS is very broad and there are many suppliers that offer these services, IDC narrowed down the field of players that participate in worldwide MSS based on the following criteria: Service capability across the MSS life cycle; Revenue and Geographic presence.
Tags : 
mssp, idc, idc marketscape, global managed security services, ibm, security, it management, knowledge management, data management
    
IBM

Analytics Embedded in the Cloud: Let the Insight Rain Down

Published By: IBM     Published Date: Apr 07, 2015
This report explores how cloud-based solution providers, such as managed service providers (MSPs) and independent software vendors (ISVs) are using an embedded approach to analytics in an effort to empower their customers and build a competitive advantage.
Tags : 
ibm, cloud computing, analytics, business intelligence, distributed computing, mobile computing, application integration, ebusiness, web service management
    
IBM

How to Transition Enterprise Customers Safely to the Cloud

Published By: PulseSecure     Published Date: Apr 01, 2015
Learn how to transition enterprise customers safely to the cloud and see how this will enable service providers to deliver scalable and on-demand, cloud-based deployments with simplicity and agility.
Tags : 
cloud, pulse secure, security, wireless, mobile access, data center, it management, knowledge management
    
PulseSecure

Gigaom Analyst Report: The Power of Hadoop as a Service

Published By: Altiscale     Published Date: Mar 30, 2015
This industry analyst report describes important considerations when planning a Hadoop implementation. While some companies have the skill and the will to build, operate, and maintain large Hadoop clusters of their own, a growing number are choosing not to make investments in-house and are looking to the cloud. In this report Gigaom Research explores: • How large Hadoop clusters behave differently from the small groups of machines developers typically use to learn • What models are available for running a Hadoop cluster, and which is best for specific situations • What are the costs and benefits of using Hadoop-as-a-Service With Hadoop delivered as a Service from trusted providers such as Altiscale, companies are able to focus less on managing and optimizing Hadoop and more on the business insights Hadoop can deliver.
Tags : 
hadoop implementation, hadoop cluster, hadoop-as-a-service, managing and optimizing, it management
    
Altiscale

PCI DSS 3.0 Compliance: How Trend Micro Cloud and Data Center Security Solutions Can Help

Published By: CDW-Trend Micro     Published Date: Mar 26, 2015
Merchants and service providers that process credit card payments must comply with the Payment Card Industry Data Security Standard (PCI DSS), now at Version 3.0. Whether the transaction occurs in a store or online, and regardless of the environment, from physical Point of Sale devices, to virtualized servers, or web servers in a public cloud, PCI DSS 3.0 mandates that these organizations are responsible for the security of their customers’ cardholder data. Read this white paper to learn more about the Payment Card Industry Data Security Standard 3.0.
Tags : 
security, software development, it management
    
CDW-Trend Micro

Hybrid Cloud Myths

Published By: Equinix     Published Date: Mar 26, 2015
Enterprises grapple with a host of challenges that are spurring the creation of hybrid clouds: collections of computing infrastructure spread across multiple data centers and multiple cloud providers. This new concept often provokes uncertainty, which must be addressed head on. As more applications and computing resources move to the cloud, enterprises will become more dependent on cloud vendors, whether the issue is access, hosting, management, or any number of other services. Cloud consumers want to avoid vendor lock-in—having only one cloud provider. They want to know that they will have visibility into data and systems across multiple platforms and providers. They want to be able to move servers and storage around without a negative impact on application availability. The good news is that more solutions become available every day, but with a learning curve and numerous management challenges and considerations. This CITO Research paper provides advice for managers about how to c
Tags : 
hybrid cloud, computing infrastructure, enterprises, storage, application availability, it management, data center
    
Equinix

Equinix Customer Success Story: Fortune 500 Financial Services Company

Published By: Equinix     Published Date: Mar 26, 2015
A leading U.S.-based financial services firm was faced with the growing challenge of providing consistent application performance to a vast employee base and nationwide network of partners. The company turned to Equinix to help redesign its network, both to improve performance and prepare for a move to a cloud-enabled environment. Equinix worked with the firm to deploy bi-coastal Equinix Performance Hubs, extension nodes of the company’s existing network placed in strategically located Equinix International Business Exchange (IBX) data centers. A Performance Hub moves services closer to end users and provides direct access to networks and cloud providers. By deploying Performance Hubs, the customer created a high-performance services platform for its business. The result was a dramatic decrease in network latency, improvements in application performance and an enhanced user experience.
Tags : 
financial services, cloud-enabled environment, cloud providers, network latency, application performance, enhanced user experience, it management, enterprise applications
    
Equinix

Cloud Mechanics: Delivering Performance in Shared Environments

Published By: VMTurbo     Published Date: Mar 25, 2015
Expedient Data Centers, a leader in Managed and Data Center Services with locations from Cleveland to Memphis to Boston, unpacks the mechanics of how it consistently meets Service Level Agreements for its customers. This whitepaper explores how service providers use VMTurbo to provide consistent performance across all workloads, as well as the three roles a responsible managed service provider (MSP) takes in order to accomplish that directive.
Tags : 
vmturbo, cloud mechanics, msp, data center services, managed service provider, it management, knowledge management, data center
    
VMTurbo

Can You Really Support Business Continuity Requirements?

Published By: VMTurbo     Published Date: Mar 25, 2015
Intelligent N+X Redundancy, Placement Affinities, & Future Proofing in the Virtualized Data Center Virtualization brought about the ability to simplify business continuity management in IT. Workload portability and data replication capabilities mean that physical infrastructure failures no longer need impact application services, and they can rapidly be recovered even in the event of complete site failure. However, Enterprises and Service Providers face new challenges ensuring they have enough compute capacity in their virtualized data centers to support their business continuity requirements, while at the same time not over provisioning infrastructure capacity resulting in unnecessary capital expenditure.
Tags : 
continuity requirements, vmturbo, virtualization, workload portability, data replication, it management, knowledge management, enterprise applications
    
VMTurbo

VMTurbo as a Cloud Control Plane

Published By: VMTurbo     Published Date: Mar 25, 2015
In this paper, we outline the need for “Software-Driven Control” – the intelligence or “control plane” that can take advantage of these new software-defined capabilities, enabling enterprises and service providers to bridge the gap between software-defined flexibility and the true business potential of the Software-Defined Datacenter.
Tags : 
vmturbo, cloud control plane, software-driven control, software-defined capabilities, software-defined datacenter, it management, knowledge management, enterprise applications
    
VMTurbo

ESG: NetApp Multi - cloud Private Storage: Take Charge of Your Cloud Data

Published By: NetApp     Published Date: Mar 11, 2015
Seventy-five percent of enterprise organizations currently use some type of cloud service from cloud providers that offer new capabilities and economies of scale. No single cloud, however, is guaranteed to meet all your needs today and in the future. Learn about a flexible, hybrid, multicloud approach that keeps you free to choose the right cloud resources for business at hand.
Tags : 
    
NetApp

Driving Customer Loyalty Through Network Service Quality

Published By: IBM     Published Date: Mar 10, 2015
This white paper reviews the finding of recent Heavy Reading research into wireless CSP attitudes to and plans for driving customer loyalty through control of network service quality
Tags : 
ibm, customer data, customer service, customer loyalty, communications, service providers, big data, customer satisfaction, ip telephony, network architecture, small business networks, tcp/ip protocol, wireless communications, wireless messaging, wireless service providers, customer interaction service, customer relationship management, business intelligence, collaboration, customer experience management
    
IBM

Breaking the Cloud Security Barrier with Amazon Web Services

Published By: Crownpeak     Published Date: Mar 05, 2015
The cloud market is moving forward as reflected in both the evolving perspectives voiced by IT decision-makers and by the business success of cloud service providers. On perspectives, Stratecast’s recurring annual surveys reveal that public cloud adoption has now reached a much-awaited tipping point with a percentage of the 2014 survey respondents stating that they currently use public cloud Infrastructure as a Service (IaaS), and another percentage stating they will too within the next months. On cloud service providers, the business results of Amazon Web Services (AWS), now in its eighth year and still rapidly growing, make a similar statement. This report describes how AWS is breaking the “cloud not secure enough” adoption barrier and, in the process, injecting innovation into the competitive dynamics of the security market.
Tags : 
cloud security, crownpeak, security market, competitive dynamics, security, it management, data center
    
Crownpeak

Gartner Magic Quadrant for Identity and Access Management as a Service

Published By: Okta     Published Date: Feb 24, 2015
Gartner recently released the Magic Quadrant for Identity and Access Management as a Service (IDaaS) and has named Okta a leader in the space. This Magic Quadrant evaluates vendors on their abilities to be global, general purpose identity and access management (IAM) service providers for multiple use cases.
Tags : 
identity and access management, idaas, service providers, multiple use, vendor evaluation, identity management
    
Okta

Compliance and Clients

Published By: Digital Realty     Published Date: Feb 24, 2015
Enterprise data center clients operate in some of the most complex and regulated environments in the world. These clients need assurance that their partners are up to the challenge of meeting their needs and operating effectively within a dynamic ecosystem. For the client-focused data center solutions provider, this presents a perfect opportunity to differentiate its services from those of other solution providers who simply provide five 9’s. See how they manage the regulatory landscape.
Tags : 
compliance, data center, management, business intelligence, service management, infrastructure, infrastructure management
    
Digital Realty

ESG: NetApp Multi-Cloud Private Storage: Take Charge of Your Cloud Data 

Published By: NetApp     Published Date: Feb 19, 2015
75% of enterprise-scale organizations currently use some type of cloud service. With major cloud providers continually competing to offer new capabilities and low prices, choice abounds. No single cloud is guaranteed to meet all your needs today and in the future. Opt for a more flexible solution. Download this paper to learn about a hybrid, multi-cloud approach that keeps you free to choose the right cloud resources for business at hand.
Tags : 
    
NetApp

Leveraging Your Service Desk to Scale Your MSP Business

Published By: CA Technologies     Published Date: Feb 13, 2015
For the managed services provider (MSP), service desk capabilities play a critical role in the level of service that customers receive and in the degree to which those services are delivered efficiently and profitably. In short, the service desk can make the difference between a service provider’s success or failure. This paper offers some key principles MSPs should adopt in order to ensure their service desk fully supports operational efficiency, optimal service levels and business growth.
Tags : 
service desk, customer service, msp business, service providers
    
CA Technologies

The Power and Payback of Unified IT Monitoring

Published By: CA Technologies     Published Date: Feb 09, 2015
This white paper examines why unified IT monitoring is an important enabling technology for both enterprises and management service providers.
Tags : 
complete it visualization, it operations visibility, application visibility, infrastructure management, uim, it management, enterprise applications, data management, business technology, virtualization, cloud computing, infrastructure
    
CA Technologies
Start   Previous    4 5 6 7 8 9 10 11 12 13 14 15 16 17 18    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.