single

Results 151 - 175 of 1016Sort Results By: Published Date | Title | Company Name

Celent Model Bank 2014: Scotiabank Global Transaction Banking case study

Published By: IBM     Published Date: Mar 18, 2015
While we predict a burgeoning market for payment services hubs, we see a growing market for payment frameworks. Celent has often said that, in most instances, moving to a single hub is perhaps the aspirational goal, but is unlikely to be the short-term answer. Celent believes that, for many banks, a combination of a hub and a framework may be the right solution.
Tags : 
financial institution support, bank payment technology, ibm, burgeoning market, payment services hubs
    
IBM

CFO eBook: Transform Your Financial Close

Published By: Fiserv     Published Date: Mar 02, 2018
According to the report, Benchmarking the Accounting Function 2015, only 56% of companies currently use automation to reconcile accounts. While many finance leaders want to change the process of reconciliation, the task can seem overwhelming. However, developing a plan does not have to be complicated or time-consuming – and the benefits far outweigh the risks. A smooth, stress-free financial close adds qualitative value to the company by freeing employees to focus on strategic initiatives and ways to grow business. A CFO’s Guide to Transforming the Financial Close shares how to build a center of excellence to streamline reconciliation so you can align objectives to overall business goals. Leading-edge automation tools can stop the madness of shuffling papers, sorting emails and searching spreadsheets, turning the reconciliation process from a cost center to a value-add for the company.
Tags : 
automating financial close, streamlining reconciliation, data integrity, single version of truth, reconciliation process
    
Fiserv

CHALLENGES DURING THE LIFE OF YOUR TURBINE OIL

Published By: Shell     Published Date: May 30, 2019
The cost of a single turbine failure – whether it’s a steam, gas, water or combined cycle turbine - can amount to hundreds of thousands of dollars per hour. Avoiding turbine outages is business critical, but do you know what warning signs to look out for, and what steps to take to get to the root of the problem?
Tags : 
    
Shell

Changing the Face of Healthcare with Social Business Software

Published By: Jive Software     Published Date: Feb 24, 2014
Providing healthcare is a global, multi-level proposition that transcends single providers. The stakeholders in Cerner’s world are not only clinicians, hospitals, and medical device partners but another whole world of consultants, researchers, and industry experts. Cerner leverages Jive Social Business Software to address a number of their key social business imperatives, including accelerating innovation and providing community-based support. They put Jive to work not only to make their own business operations more productive but to connect priorities and people outside of Cerner to solve broad healthcare issues for the greater good.
Tags : 
jive, cerner, healthcare technology, social business software, collaboration, social networking platform, software solutions, workforce management, it management, human resource technology
    
Jive Software

Changing the Game for Antivirus in the Virtual Datacenter

Published By: Trend Micro Inc.     Published Date: Aug 25, 2011
This white paper reviews the challenges with endpoint security in virtualized environments - including the inherent risks of dynamic virtual machines and the resource impact of security software such as virus-scanners in multiple guest virtual machines, on a single physical host.
Tags : 
trend micro, antivirus, virtual datacenter, enterprise security, virtual machines, virtualization, internet content security, smart protection network, trend micro internet security, enterprise business security, worry-free business security, web threat management, medium business, mid-sized business, mid-size, medium, anti-spam, antispam, spam filter service, network security
    
Trend Micro Inc.

Cherwell Service Management Software

Published By: Cherwell Software     Published Date: Apr 07, 2016
Cherwell Service Management™ software empowers IT organizations to easily manage their infrastructure at a fraction of the cost and complexity associated with traditional, legacy IT service management software. Designed with a metadata-driven approach, the Cherwell Service Management platform can easily be configured to meet process and integration requirements without writing or touching a single line of code. Furthermore, configurations will never break during version upgrades.
Tags : 
best practices, customer support, business intelligence, business optimization, business management
    
Cherwell Software

Choosing the Right Vendor on the Path to Digital Transformation

Published By: Dell EMC     Published Date: May 04, 2018
Digital transformation has become a business imperative as most aspects of economic engagement have become digital. Around the globe, businesses and government agencies are re-engineering their technology infrastructures to keep pace with customer demands, spur innovation and stay competitive in an ever-evolving digital economy. Hyper-Converged Infrastructure (HCI) systems bundle multiple technology components together into single systems, enabling IT departments to spend less time managing separate data center components and more time proactively delivering value to the business. In this white paper, we compare the portfolio offerings of Dell EMC and HPE, and highlight significant benefits to be realized when partnering with the HCI market leader: Dell EMC. Dell EMC provides a tightly integrated software ecosystem and the flexibility to run multiple workload types, providing solutions to a broader customer base than HPE.
Tags : 
    
Dell EMC

CIO's Guide to Azure Active Directory

Published By: Microsoft     Published Date: Oct 04, 2016
Security was once largely limited to the confines of an on-premises world, but now it must extend to the cloud, as well as a myriad of mobile devices. Employees and companies now expect increasingly complex interactions with devices, apps, data, and even other users. As many companies struggle to keep up with traditional single-point solutions, and limited budgets, this pressure is creating security blind spots for IT. In a world of evolving threats, it is becoming increasingly impossible to address all of these issues with an on-premises solution. What is needed is a holistic approach to identity-driven security—one that leverages a cloud-scale intelligent security graph to help you protect your business. In this vision whitepaper, we look into some of the challenges facing IT in the modern world and examine the possible solutions.
Tags : 
    
Microsoft

CIO: Here's why analytics is eating the supply chain

Published By: FusionOps     Published Date: Jul 25, 2016
Life science companies are adopting innovative cloud technology to provide a single source of truth for end-to-end supply chain decision-making. Read this CIO interview to learn how H.D. Smith is using FusionOps supply chain intelligence software to improve efficiency, cost, and quality. Interview Highlights: • How to improve time to actionable insights using a cloud platform • How to improve service levels and forecast accuracy through deeper intelligence into the supply chain • How to enable cross-functional collaboration to make better business decisions and drive performance improvement
Tags : 
    
FusionOps

Cisco and Akamai Elevate the Customer Digital Experience

Published By: Cisco     Published Date: Jan 16, 2015
The term “perfect storm” is used to describe when several forces come together and create a large, single event that has transformative effects. A technology perfect storm took place in the 1990s when Internet services, low-cost home computers, browsers and affordable broadband all came together and created the Internet revolution. This revolution launched an entirely new economic model that sparked new ways of doing business, changed the way we work, and allowed us to blend our personal and professional lives. At first, these new ways of working were the exception. But the transformation to an Internet-based work style is now complete, and this style has become very much the norm. Businesses that embraced the Internet in its early days gained a significant advantage over their competitors; those that did not became irrelevant very quickly.
Tags : 
digital experience, internet, perfect storm, transformative effects, technology, computers, revolution, browsers, broadband, it management, wireless
    
Cisco

Cisco Collaboration Flex Plan Meetings-Enterprise Agreement Data Sheet

Published By: Cisco     Published Date: Dec 20, 2018
Cisco® Collaboration Flex Plan gives you access to Cisco’s collaboration products, allowing you to mix and match buying models and deployment models in a single subscription depending on your buying needs. One subscription covers entitlement and technical support for: (a) the cloud services Cisco Webex® Meetings, Cisco Webex Calling, Cisco BroadCloud Calling, and Cisco Webex Teams and (b) the software Cisco Unified Communications Manager and Cisco Meeting Server.
Tags : 
    
Cisco

Cisco HyperFlex Systems

Published By: Cisco     Published Date: Dec 27, 2017
Cisco HyperFlex™ Systems, powered by Intel® Xeon® processors, deliver a new generation of hyperconverged solutions that are flexible, scalable, and enterprise class. They combine the software-defined networking and software-defined computing of the Cisco Unified Computing System™ (Cisco UCS®) with Cisco HyperFlex HX Data Platform software to provide a single distributed, multitier, objectbased data store with enterprise storage features
Tags : 
    
Cisco

Cisco Regional Digital Network Architecture: Introducing a New era in Networking

Published By: Cisco     Published Date: Dec 20, 2018
Intent-based networking is the difference between a network that needs continuous attention and one that simply understands what your organization needs and makes it happen. It’s the difference between doing thousands of tasks manually and having an automated system that helps you focus on business goals. Cisco® Digital Network Architecture (Cisco DNA™) is your team’s bridge to an intentbased network. It is an open, extensible, software-driven architecture that accelerates and simplifies your enterprise network operations, while lowering costs and reducing your risk. Only Cisco provides a single network fabric that is powered by deep intelligence and integrated security to deliver automation and assurance across your entire organization at scale. Cisco DNA gives IT time back from time-consuming, repetitive network configuration tasks so you can focus on the innovation your business needs. Cisco DNA automation and assurance are built on a Software-Defined Networking (SDN) controller, ri
Tags : 
    
Cisco

Cisco Unified Data Center: The Optimal Infrastructure for Microsoft Environments and Applications

Published By: Cisco     Published Date: May 15, 2015
Cisco Unified Data Center unifies compute, storage, networking, virtualization, and management into a single platform. The result is operational simplicity and business agility -- essential for cloud computing and deploying IT as a Service.
Tags : 
data center, software, networking, infrastructure, applications, cisco, network management, network performance management, application integration, application performance management, best practices, cloud computing, data center design and management
    
Cisco

Cisco Webex Teams:Collaborate.Innovate.From anywhere

Published By: Cisco EMEA     Published Date: Jun 01, 2018
It’s time to make working together what it should be—intuitive. Cisco Webex Teams enables teams to meet, create and communicate continuously on a single easy-to-use platform. Tools adapt, so teams don’t have to. The same page? Everyone is on it, no matter what device or apps they like to use or where they are. Innovation and work keep moving forward, even after a meeting ends. And everyone enjoys an exceptional experience safeguarded by enterprise-grade security no matter how big the business scales.
Tags : 
cisco, webex, collaboration
    
Cisco EMEA

Citrix NetScaler Unified Gateway: Secure User Identity and Achieve Granular Access Control with Fede

Published By: Citrix Systems     Published Date: Jul 25, 2016
For many enterprises, the solution is a centralized single sign-on (SSO) infrastructure that leverages the enterprise directory with federation, multifactor authentication and centralized access control to give users one URL and login to access all their enterprise applications and services--without having to type in another URL or enter credentials a second time. At the same time, it provides IT with a single identity, access control and management infrastructure, closing the inevitable security and management gaps inherent in juggling multiple gateway solutions. Such a solution would offer the best of all worlds, combining enhanced user productivity with IT efficiency, cost effectiveness, security and compliance.
Tags : 
    
Citrix Systems

Citrix TriScale Technology Brings Cloud Scale to Enterprise Networks

Published By: Citrix NetScaler     Published Date: May 06, 2013
Citrix TriScale drives unprecedented network scalability, enabling IT teams to build enterprise cloud networks that can Scale Up performance 5x, Scale Out capacity by 32x, and Scale In consolidation by running up to 40 appliances in a single platform.
Tags : 
cloud scale, enterprise netwroks, citrix triscale technology, scalability, citrix, knowledge management, enterprise applications
    
Citrix NetScaler

Citrix XenApp: Single Point of Access, Single Point of Control

Published By: Citrix Systems     Published Date: Apr 15, 2015
IT professionals are rethinking remote access strategies to enable a mobile workforce. Whether they are in the office or on the road, people need secure remote access that’s simple to use, so they can be productive from anywhere. Empower your mobile workers with the right level of access to Windows® apps and data, using a solution that IT can trust. Used by more than 100 million people worldwide in organizations of all sizes, Citrix XenApp is the proven solution for secure remote access.
Tags : 
citrix, desktop virtualization, efficiency, virtualization, mobile computing, security, compliance, application security, access control, security management, cloud computing, mobile device management, data loss prevention
    
Citrix Systems

Citrix XenApp: Single Point of Access, Single Point of Control

Published By: Citrix     Published Date: Nov 04, 2013
Used by more than 100 million people worldwide in organizations of all sizes, Citrix XenApp is the proven solution for secure remote access. Click here to find out why.
Tags : 
citrix xenapp, xenapp, application delivery, application integration, device management, device access, remote access, remote network management, mobile data systems, mobile workers, smart phones, wireless application software, wireless phones, application performance management, windows, business technology, mobile device management
    
Citrix

Closing the Biggest Hole in Web Application Delivery

Published By: CA Technologies     Published Date: Jan 09, 2015
This paper investigates the threat of session hijacking and the solution developed by CA to address the security threat.
Tags : 
web application delivery, session hijacking, security, ca single sign-on, application security, policy based management, security policies, single sign on, application integration, risk management, system management software
    
CA Technologies

Cloud Accounting Implementation 101: No Risk, Just Reward

Published By: Financial Force     Published Date: Dec 01, 2017
Making the decision to move to cloud accounting is one step in the right direction; understanding the best approach and how you'll get there is half the battle. But guess what? It doesn't have to be difficult. The purpose of this ebook is to provide you with details on how to best plan your cloud accounting implementation, the benefits of a single cloud approach, and offer some key insights and recommendations when evaluating solutions that will make the implementation process so much easier.
Tags : 
    
Financial Force

Cloud Accounting Implementation 101: No Risk, Just Reward

Published By: FinancialForce     Published Date: Dec 01, 2017
Making the decision to move to cloud accounting is one step in the right direction; understanding the best approach and how you'll get there is half the battle. But guess what? It doesn't have to be difficult. The purpose of this ebook is to provide you with details on how to best plan your cloud accounting implementation, the benefits of a single cloud approach, and offer some key insights and recommendations when evaluating solutions that will make the implementation process so much easier.
Tags : 
    
FinancialForce

Cloud Computing IaaS Performance Report: ProfitBricks, Amazon EC2, Rackspace Cloud

Published By: ProfitBricks     Published Date: Jan 01, 2013
Performance testing and benchmarking of cloud computing platforms is a complex task, compounded by the differences between providers and the use cases of cloud computing users. IaaS services are utilized by a large variety of industries and, performance metrics cannot be understood by simply representing cloud performance with a single value. When selecting a cloud computing provider, IT professionals consider many factors: compatibility, performance, cost, security and more. Performance is a key factor that drives many others including cost. In many cases, 3 primary bottlenecks affect server performance: central processing unit (CPU) performance, disk performance, and internal network performance.
Tags : 
cloud computing, iaas, profitbricks, amazon ec2, rackspace cloud, central processing unit, disk performance, internal network performance, access control, database development, web service security, project management
    
ProfitBricks

Cloud For Dummies E-Book

Published By: Group M_IBM Q418     Published Date: Oct 02, 2018
Organizations are faced with providing secure authentication, authorization, and Single Sign On (SSO) access to thousands of users accessing hundreds of disparate applications. Ensuring that each user has only the necessary and authorized permissions, managing the user’s identity throughout its life cycle, and maintaining regulatory compliance and auditing further adds to the complexity. These daunting challenges are solved by Identity and Access Management (IAM) software. Traditional IAM supports on-premises applications, but its ability to support Software-as-a-Service (SaaS)-based applications, mobile computing, and new technologies such as Big Data, analytics, and the Internet of Things (IoT) is limited. Supporting on-premises IAM is expensive, complex, and time-consuming, and frequently incurs security gaps. Identity as a Service (IDaaS) is an SaaS-based IAM solution deployed from the cloud. By providing seamless SSO integration to legacy on-premises applications and modern cloud-
Tags : 
    
Group M_IBM Q418
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.