single

Results 301 - 325 of 1016Sort Results By: Published Date | Title | Company Name

Employers Use Technology and Outsourcing to Ease Leave Management

Published By: Time Clock Plus     Published Date: Feb 07, 2019
While the legal requirements to provide employees with paid or unpaid leave for family and medical issues become more complex, the leave-management tools and services available to employers continue to expand. Employers with the budget to do so are outsourcing—often to a single vendor—leave-management tasks for the federal Family and Medical Leave Act (FMLA) and Americans with Disabilities Act (ADA), and state and local leave ordinances, according to recently released findings from a survey of 1,203 employers conducted in 2017. Employers with the resources to manage leave internally are increasingly using technology to assist them.
Tags : 
    
Time Clock Plus

Empower Your Go-to-Market Strategy

Published By: Anaplan     Published Date: Sep 10, 2019
Faced with an increasingly crowded market, forward-thinking sales leaders are coming up with new ways to sell, and new strategies for pushing past the competition. Anaplan for Sales is designed to empower your organization’s go-to-market strategy and help sales leaders make great decisions. In this paper, you’ll learn how: Managing a go-to-market strategy on a single platform keeps your organization powerful and nimble. A go-to-market strategy is a single entity, not just a collection of disparate parts. Advanced technology helps sales leaders make smarter, more impactful decisions.
Tags : 
    
Anaplan

Empower Your Go-to-Market Strategy

Published By: Anaplan     Published Date: Sep 11, 2019
Faced with an increasingly crowded market, forward-thinking sales leaders are coming up with new ways to sell, and new strategies for pushing past the competition. Anaplan for Sales is designed to empower your organization’s go-to-market strategy and help sales leaders make great decisions. In this paper, you’ll learn how: Managing a go-to-market strategy on a single platform keeps your organization powerful and nimble. A go-to-market strategy is a single entity, not just a collection of disparate parts. Advanced technology helps sales leaders make smarter, more impactful decisions.
Tags : 
    
Anaplan

Enabling Data Center and Cloud Service Management for Mid-Tier Enterprises

Published By: Accelops     Published Date: Nov 05, 2012
Read this white paper to learn how the combination of discovery, data aggregation, correlation, out-of-the-box analytics, data management, and reporting can yield a single pane of glass into data center and IT operations and services.
Tags : 
accelops, data center, cloud service, cloud service management, business technology, virtualization, cloud computing, infrastructure, infrastructure management
    
Accelops

Enabling Multi-speed IT Transformation With WebSphere Application Server and Java EE 7

Published By: IBM     Published Date: Dec 15, 2016
Watch to learn: - How to tackle the challenge of multi-speed IT with WebSphere Application Server's unique approach to delivering application infrastructure based on Java EE 7 - How to provide continuous availability for running modern apps that require on-demand dynamic scalability and high operational resiliency - How the lighweight and modular architecture of WebSphere Liberty provides an ideal foundation to develop and deploy microservices - How to deliver flexibility to develop, deploy and consume application infrastructure - on-premises or on the cloud, including emerging virtualization technologies such as Docker - How to manage and monitor thousands of applications and servers with a single management interface for ease of problem determination
Tags : 
ibm, middleware, it transformation, websphere application server, enterprise applications
    
IBM

Enabling Single Sign-On Across All Application Types 

Published By: Akamai Technologies     Published Date: Jun 14, 2018
"Businesses continue to evolve as digital technologies reshape industries. The workforce is mobile, and speed and ef ciency are imperative, necessitating dynamic, cloud-based infrastructures and connectivity, as well as unhindered, secure application access — from anywhere, on any device, at any time. Leaders must remove hurdles to progress, but new business initiatives and processes increase the attack surface, potentially putting the company at risk.
Tags : 
digital technology, cloud, security, connectivity, authenticate
    
Akamai Technologies

Enabling Single Sign-On Across All Application Types 

Published By: Akamai Technologies     Published Date: Dec 11, 2018
"Businesses continue to evolve as digital technologies reshape industries. The workforce is mobile, and speed and efficiency are imperative, necessitating dynamic, cloud-based infrastructures and connectivity, as well as unhindered, secure application access — from anywhere, on any device, at any time. Leaders must remove hurdles to progress, but new business initiatives and processes increase the attack surface, potentially putting the company at risk.
Tags : 
    
Akamai Technologies

Enterprise ALM: Take the Pain Out of Compliance

Published By: SERENA Software, Inc     Published Date: Jun 23, 2009
Learn how you can simplify compliance and automate the transition from development to production with complete traceability.  Benefit from process definition and enforcement, and automatic generation of audit trails.  Add consolidation to single, global repository where you move code into a single software change and configuration management instance that works globally, but performs as if everything were local.  Result: savings and productivity.
Tags : 
serena, compliance, traceability, enforment, software, single software, alm, collaboration, efficiency, productivity, enterprise, application lifecycle management, gartner, mission critical, sox, hippa, cmmi, audit, enforcement, security
    
SERENA Software, Inc

Enterprise Authentication: Securing Identities in an Evolving Environment

Published By: Entrust Datacard     Published Date: May 13, 2014
The boundaries of the corporate network are being challenged. Today’s enterprise is falling victim to unrelenting attacks that target physical and logical infrastructures, mobile platforms, user identities, network devices and more. Entrust provides more than a simple one-step means of protecting the world’s largest and most respected enterprises. Reduce costs, defend against targeted attacks and consolidate identity-based security via a single management and strong authentication platform.
Tags : 
entrust, enterprise authentication, security, identity security, it management
    
Entrust Datacard

Enterprise Master Data Management: An MDM Institute MarketPulse In-Depth Report

Published By: IBM     Published Date: Dec 30, 2008
Corporate master data is a critical asset that must be increasingly managed within and beyond the enterprise, primarily to solve business problems in compliance, customer service, sales, and marketing. Such master data may be indentified, harmonized and integrated at multiple levels of the software stack to materialize a single customer view (or supplier, product, view etc.).
Tags : 
ibm, enterprise master data management, corporate master data, data integration, enterprise applications, data management, customer relationship management, enterprise resource planning
    
IBM

Enterprise SD-WAN in the Real World

Published By: Forcepoint     Published Date: Jun 06, 2019
Unlike traditional network architectures, software-defined wide-area networking (SD-WAN) makes it possible to harness existing network technology to better align operations and business policies. While many companies identify a need to evolve to SD-WAN, they are not always convinced SD-WAN can deliver the necessary enterprise capabilities. Join us for a webinar with Link-Connect to learn how they use Forcepoint NGFWs to deliver enterprise-class SD-WAN to manage more than 400 sites from a single management console. In this webcast, learn how Forcepoint NGFW: Simplifies operations. Management is easier with central management, visibility and hierarchical policies. Saves investment dollars. Smarter use of capacity and the ability to visualize and prioritize traffic reduces connectivity costs. Boosts business outcomes. Optimized capacity, increased security and ensured high availability
Tags : 
    
Forcepoint

Enterprise Solution Design for SAP HANA

Published By: HP Enterprise System     Published Date: Apr 03, 2014
SAP HANA is a powerful, in-memory computing platform that streamlines business suite applications, analytics, planning, predictive analysis, and sentiment analysis on a single platform, so businesses can operate in real time. The design approach for enterprise-level solutions involving SAP HANA, and the best practices surrounding them, isn’t intrinsically different from the approach to any other enterprise-level solution for technology implementations. This paper is written to address those elements of good solution design and apply them to the SAP landscape, with particular focus on the SAP HANA element.
Tags : 
sap hana, as a service solution, solutions, cost effective, operational management, accelerate value, enterprise applications, data management
    
HP Enterprise System

Entrust IdentityGuard Cloud Services (General)

Published By: Entrust Datacard     Published Date: May 13, 2014
Digital certificates have emerged to serve as the trust foundation for identities, communication, transactions and information security due to their flexibility in terms of deployment and their high level of inherent security. Entrust IdentityGuard Cloud Services provide digital certificate and identity management solutions that bring together all certificate services, tools and security under a single cloud-based service. It’s a simple, strong and easy solution to issue and manage identities through their lifecycle via the cloud.
Tags : 
entrust, digital certificates, cloud services, identity management, security, it management
    
Entrust Datacard

ERP System Acquisition & Implementation Viewed as a Single Project

Published By: Adaptive Growth     Published Date: Mar 12, 2008
It is a truism that in any complex activity, the critical, defining decisions should be made as early in the process as possible.  In ERP implementation projects this principle is routinely undermined by the nearly universal practice of separating acquisition and implementation activities into separate projects, performed by separate teams operating under separate control.
Tags : 
erp, adaptive growth, project management, enterprise applications, enterprise resource planning, adaptivegrowth
    
Adaptive Growth

ESG Assessing the Financial Impact of HPE InfoSight Predictive Analytics

Published By: Hewlett Packard Enterprise     Published Date: Aug 23, 2018
HPE Nimble Storage has broken away from convention and transformed how storage is managed and supported with the HPE InfoSight predictive analytics platform. HPE engaged ESG to conduct a quantitative survey of the HPE Nimble Storage installed base, as well as non-HPE Nimble Storage customers, to better assess how HPE InfoSight positively impacts customer environments. Both HPE InfoSight telemetry data and ESG’s quantitative survey data show that the benefit delivered to HPE Nimble Storage customers is significant, driving: • 79% lower IT operational expenses. • 73% fewer trouble tickets in the environment, which are resolved faster. • 85% less time spent resolving storage-related trouble tickets. • 69% faster time to resolution for events that necessitate level 3 support. • The ability to manage and troubleshoot the entire infrastructure environment from a single, intelligent platform.
Tags : 
    
Hewlett Packard Enterprise

ESG Brief – It’s Time for Enterprise to Secure Mac Computers

Published By: Symantec     Published Date: Oct 07, 2014
Last year, Mac malware increased by 66% with a single, high-profile attack infecting over 600,000 machines. Malware authors are targeting unsuspecting Mac users and gaining access to organization's data. Still wondering whether Macs need protection? See what advice a senior strategic analyst at ESG has to share.
Tags : 
enterprise, mac security, cybercrime, malware, data, high-profile attack, infection, security
    
Symantec

ESG: NetApp Multi - cloud Private Storage: Take Charge of Your Cloud Data

Published By: NetApp     Published Date: Mar 11, 2015
Seventy-five percent of enterprise organizations currently use some type of cloud service from cloud providers that offer new capabilities and economies of scale. No single cloud, however, is guaranteed to meet all your needs today and in the future. Learn about a flexible, hybrid, multicloud approach that keeps you free to choose the right cloud resources for business at hand.
Tags : 
    
NetApp

ESG: NetApp Multi-Cloud Private Storage: Take Charge of Your Cloud Data 

Published By: NetApp     Published Date: Feb 19, 2015
75% of enterprise-scale organizations currently use some type of cloud service. With major cloud providers continually competing to offer new capabilities and low prices, choice abounds. No single cloud is guaranteed to meet all your needs today and in the future. Opt for a more flexible solution. Download this paper to learn about a hybrid, multi-cloud approach that keeps you free to choose the right cloud resources for business at hand.
Tags : 
    
NetApp

ESG:How HPE is Enabling a Hybrid-everywhere Data Protection Strategy

Published By: Hewlett Packard Enterprise     Published Date: Aug 23, 2018
IT organizations today must work in an “and” world, rather than an “or” world to meet the demands of their users. In an “and” world, IT architectures and strategies leverage an ever-broadening variety of tools while still supporting and propelling a single strategy.
Tags : 
    
Hewlett Packard Enterprise

Essential Performance Tools for SQL Server DBAS

Published By: Idera     Published Date: Jul 30, 2013
At a very high and overly simplified level, SQL Server performance can typically be distilled down to a question of how well SQL Server is able to utilize Physical Memory (or RAM). For example, a server with a single, 20GB, OLTP database running on a SQL Server with 32GB of RAM will typically perform well – because it’s typically able to keep the entire database in memory
Tags : 
idera, sql, sql tools, server dbas, server management, ram, software development
    
Idera

Essential Strategies for Using Virtualization to Enhance and Improve Business Continuity

Published By: AMD     Published Date: Oct 01, 2012
What can be more important to your organization than business continuity - when even a single hour of downtime can cost a company as much as $300,000 or more?
Tags : 
amd, virtualization, business continuity, enhance, improve, business
    
AMD

Essential Strategies for Using Virtualization to Enhance and Improve Business Continuity

Published By: AMD     Published Date: Oct 08, 2012
What can be more important to your organization than business continuity - when even a single hour of downtime can cost a company as much as $300,000 or more?
Tags : 
cloud computing, amd, virtualization, business continuity, enhance, improve, business, cloud computing, business technology, infrastructure
    
AMD

ESSO SOS: The Critical Questions Every Company Needs to Ask

Published By: Imprivata     Published Date: Aug 21, 2009
This white paper is intended to make the ESSO evaluation process simpler and faster by identifying the critical questions you need to ask ESSO vendors as you evaluate their solutions.
Tags : 
enterprise single sign on, enterprise single sign-on, single sign on, single sign-on, esso, authentication, imprivata
    
Imprivata

ESSO: The Next Big Win for IT

Published By: Imprivata     Published Date: Aug 21, 2009
Enterprise Single Sign-On (ESSO) has emerged with a similar potential to transform enterprise security. This white paper takes a closer look at ESSO, the problems it solves, and how it will fundamentally change the way corporations address their security needs.
Tags : 
password management, enterprise single sign on, enterprise single sign-on, single sign on, single sign-on, esso, authentication, imprivata
    
Imprivata

Everything You Always Wanted to Know About Security at the Edge, But Were Afraid to Ask

Published By: Akamai Technologies     Published Date: Mar 19, 2019
Whether you're focused on public-facing websites or your company's assets and users, as someone who cares about digital security, your life is dominated by these trends that characterize the state of all things security in 2019: Attacks are growing, evolving, and becoming more sophisticated. And the types of attacks we see are proliferating. How do you protect your crown jewels when the castle has no walls? The answer is at the edge. When you deploy security at the edge, you are protecting your changing assets closer to the attack itself and moving digital experiences closer to users. In essence, you're deploying a single pane of glass, an extension of your infrastructure, that sits between you - your users, your digital experiences - and the always-changing nature of today's digital environment.
Tags : 
    
Akamai Technologies
Start   Previous    6 7 8 9 10 11 12 13 14 15 16 17 18 19 20    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.