support

Results 151 - 175 of 2913Sort Results By: Published Date | Title | Company Name

A New Approach to Security Intelligence

Published By: Splunk     Published Date: Oct 15, 2012
Supporting a Big-data Approach for Security Intelligence
Tags : 
splunk, security, malware protection, security, it infrastructure, security intelligence, business technology, data center
    
Splunk

A new direction for IT user support: Enabling an omnichannel experience in the cognitive era

Published By: IBM APAC     Published Date: May 12, 2017
This white paper describes omnichannel IT support, why it has become critical for a superior personalized user experience and how organizations can begin incorporating this more cognitive strategy into their IT support organizations.
Tags : 
it support, internet of things, iot, cognitive strategy, digital transformation
    
IBM APAC

A new direction for IT user support: Enabling an omnichannel experience in the cognitive era

Published By: IBM APAC     Published Date: Aug 25, 2017
Consumerization of IT and the Internet of Things (IoT) are revolutionizing how people live. Users are increasingly becoming accustomed to instant gratification when using technology in their personal lives, whether for gaming, shopping or managing their daily activities. And they want the same kind of immediate service when they go to work. To address this expectation, IT support needs to adapt, evolve and even revolutionize itself or become outdated. In short, IT support must reinvent itself into a friendly, proactive service that is tied directly to a business’ profitability.
Tags : 
cognitive it support, transactions, system of engagement, soa, omnichannel support, ibm
    
IBM APAC

A New Vision for High Velocity Application Delivery

Published By: CA Technologies     Published Date: Jun 05, 2014
A report into how an automated lifecycle approach to DevOps supports the agile business
Tags : 
application delivery, high velocity application delivery, devops strategy, service virtualization, release automation, application performance management, application integration, best practices
    
CA Technologies

A One-Stop-Shop for Marketing Operations at BearingPoint, Inc.

Published By: Aprimo, Inc.     Published Date: Dec 23, 2008
BearingPoint wanted a “one-stop-shop” for its growing marketing organization that was easy to setup and didn’t require a lot of resources. A tool was needed to help with the wide-range of marketing activities that satisfied the needs of the entire marketing team. This system needed to easily handle financial and legal requests, capture campaign and event data, support creative development and reduce manual processes that contributed to the lagging of concrete knowledge of their marketing budgets and spending at any given point in time.
Tags : 
aprimo, marketing operations, financial visibility, marketing resource management, it management, knowledge management, network management, contact management
    
Aprimo, Inc.

A partner to monitor, manage and maintain your cloud

Published By: Rackspace     Published Date: Jan 19, 2016
Rackspace® Private Cloud Powered by OpenStack® is backed with our results-obsessed service known as Fanatical Support.® Our exceptional customer service means we’re in it with you every step of the way. From initial design to ongoing management for your production environment, we manage your cloud so you can focus on your core business.
Tags : 
rackspace, cloud, information technology, security, data center
    
Rackspace

A Path to Scale and Profitability for Cloud and Managed Service Providers

Published By: Infinidat EMEA     Published Date: May 14, 2019
Infrastructure efficiency and effectiveness directly support profit and growth as competition increases in the cloud and managed service provider (xSP) market. Savvy service providers understand that storage choices have a profound impact on not only their profit and growth, but also on their customer experience and retention. They also know that storage challenges in all those areas increase exponentially with scale. Infinidat storage platforms allow service providers to build and scale differentiated, profitable solutions without worrying about storage. Infinidat technology enables unprecedented efficiency, performance, and resiliency, while flexible business models make it easy for service providers to operationalize those platform advantages—including unique co-branding and promotional opportunities as part of the Powered by Infinidat program. Cloud providers worldwide trust their businesses to Infinidat storage. This paper explores a path for service providers to unlock greater sc
Tags : 
    
Infinidat EMEA

A Platform For Modernizing Java Applications

Published By: JBoss Developer     Published Date: Oct 21, 2016
Java applications have been a central technology for enterprises for two decades. This wealth of data, functionality, and knowledge are critical to enterprises. With Java-based applications, modern development can build on a platform that enables cloud-native architectures while simultaneously supporting existing applications. This combination of traditional enterprise-wide monoliths and cloud-based application deployment allows organizations to take advantage of existing knowledge and resources while actively moving toward newer application models.
Tags : 
middleware, java, big data, analytics, mobile development, database development, cloud computing
    
JBoss Developer

A Powerful New Foundation for Creating Customer Campaigns (Merkle case study)

Published By: Dell EMC     Published Date: Oct 08, 2015
Download this white paper to learn how the company deployed a Dell and Hadoop cluster based on Dell and Intel® technologies to support a new big data insight solution that gives clients a unified view of customer data.
Tags : 
    
Dell EMC

A Practical Guide for Evaluating the Value of VCE Converged Infrastructure for Data Center

Published By: Dell EMC     Published Date: Feb 23, 2017
This study provides IT decision-makers with insight on various types of clouds and how they are used today along with a practical framework to evaluate converged infrastructure versus do-it-yourself approaches.  Based on interviews with organizations that implemented VCE solutions, Forrester Consulting quantified how VCE converged infrastructure drove significant increases in IT efficiency and productivity, as well as decreases in the cost associated with infrastructure, security, and compliance. The study describes a process for setting improvement goals and measuring success for infrastructure modernization. This process is supported by an intuitive template.
Tags : 
    
Dell EMC

A Practical Guide to Understand and Benefit from the Consumerization of IT

Published By: BMC Software     Published Date: Jan 31, 2014
Consumerization of IT forces enterprises to rethink their approach to IT service delivery. What does consumerization really mean and why does it matter? Understand the basics to accurately identify the practical implications and benefits for your organization. This guide explores the realities of IT Consumerization to define challenges and opportunities. Learn best practices and get actionable recommendations. Please download the whitepaper to learn more.
Tags : 
bmc, cosumerized technology, cloud technology, mobile technology, social technology, customer-first, modernized work processes, social-enabled enterprise applications
    
BMC Software

A Privileged Access Management Maturity Model for Digital Transformation and Automation at Scale

Published By: CA Technologies EMEA     Published Date: Apr 10, 2018
Challenge Organizations undergoing digital transformations are dealing with amplified concerns around risk and security, which isn’t surprising. Digital transformation initiatives inevitably result in more points of access to enterprise infrastructure that are outside of existing controls, accessible by a greater number and more diverse set of identities, and proliferated across a distributed and dynamic infrastructure. Opportunity Knowing your privileged users is knowing your risk. Privileged access management tools themselves must be able to support automation in the authorization process and enable scalability through support for both dynamic operations and ephemeral infrastructure. Benefits Better pinpointing attacks exploiting credential theft isn’t simply a question of accumulating more data but involves incorporating better data about privileged user behaviour, which can identify significant changes that represent real risk.
Tags : 
    
CA Technologies EMEA

A Proper Foundation: Extended Validation SSL

Published By: Entrust Datacard     Published Date: May 15, 2014
To bolster consumer trust in the foundation of ecommerce before it was irreparably damaged, several CAs and browser vendors came together to establish a higher security approach based on common standards: Extended Validation SSL certificates. EV SSL is universally supported by all desktop browsers and provides an EV trust indication. All mobile browsers support EV SSL and some provide an EV indication. Extended Validation SSL certificates have the highest impact on consumers, reassuring them that the site they are visiting is legitimate through visual cues in un-modifiable parts of the browser interface “chrome.” For example, the latest versions of Microsoft Internet Explorer, Google Chrome, Mozilla Firefox, Opera and Apple Safari display the corporate name with a green background for sites protected by an Extended Validation SSL certificate.
Tags : 
entrust, ssl, ecommerce, extended validation, chrome, mobile browsers, networking, it management
    
Entrust Datacard

A Proven Security Intelligence Model for Combating Cyber Threats: A Reference Model for IT Security

Published By: LogRhythm     Published Date: Aug 08, 2016
IT environments have become much more vulnerable as enterprise mobility, cloud services and “bring-your-own-everything” have broken down the defensible perimeter and added layers of complexity to securing the enterprise. At the same time, the nature of cyber threats has changed dramatically. Threat actors are well organized and well funded, and many of them are known to be supported by nation states. They have sophisticated technical skills which allow these actors to create custom malware for very specific targets, and they are relentless in pursuit of their objectives. Moreover, almost anyone with a malicious intent can purchase malware and rent botnets on the Dark Web, lowering the bar for criminal entities, nation states, and terrorists to use cyber as a weapon of choice towards their intended purpose.
Tags : 
security, technology, best practices, information technology, cyber threats, mobility, business analytics, business management
    
LogRhythm

A Secure, Highly Available Approach to the Distributed Enterprise

Published By: Dell EMC     Published Date: May 12, 2016
Today’s global business model presents both opportunities for business agility and challenges for IT management. To do business effectively, organizations require an IT infrastructure at remote locations that delivers applications and data with high performance and high reliability. Download this paper and learn how you can enjoy the benefits of having remote offices without the need for an entire IT staff to support it.
Tags : 
    
Dell EMC

A Sensible Guide to Latency Management

Published By: Comcast Business     Published Date: Feb 10, 2015
By managing latency well, your network can support cloud services, off-site backup and mirroring, and e-commerce – adding to your company’s bottom line and making your operations more efficient with happier users.
Tags : 
latency, latency management, networks, data center, data management, ecommerce, data communications, interactive environment
    
Comcast Business

A Set of Best Practices for Targeting, Aligning and Measuring Learning

Published By: Skillsoft     Published Date: Mar 03, 2015
This paper offers a set of best practices for identifying learning needs that support business priorities, align a solution and measure results. It is a consolidated set of ideas, tips and techniques collected from the experiences of Skillsoft customers.
Tags : 
learning management, business priorities, learning growth model, e-learning, performance tools, performance requirements, human resources services, employee performance management
    
Skillsoft

A Smart Path to Virtualization

Published By: Dell-Intel     Published Date: Oct 30, 2008
Dell servers have been optimized to help provide strong support for the latest ESX release, VMware ESX 3.5 Update 2, including enhanced performance for virtualized environments based on support for six-core Intel Xeon processors. Organizations that do not approach server virtualization with a clear plan risk developing a chaotic, inflexible infrastructure that wastes energy and resources.
Tags : 
hyper v, dell, intel, it infrastructure, virtualization, server virtualization, esx, tco
    
Dell-Intel

A Smarter Approach To Enable Endpoints, End Users And Everything In Between

Published By: IBM APAC     Published Date: Aug 22, 2017
Today’s enterprises support an assortment of end-user devices, including laptops and desktops (both PCs and Macs), tablets and hybrid devices, and, of course, smartphones. Not only do employees use a variety of form factors, but they run a variety of platforms on those devices, including: • Apple iOS and Apple macOS • Google Android • Microsoft Windows
Tags : 
user based context, id management, integration, azure ad, application catalogs, portal, end user store, saas
    
IBM APAC

A Step-by-Step Guide to Workplace Incentives for Tobacco Cessation

Published By: Alere Wellbeing     Published Date: Sep 29, 2011
Offering incentives for tobacco cessation can promote positive behavior change, positively impact your bottom line, and improve employee relations, provided you implement an approach that includes a comprehensive cessation program supported by a positive environment.
Tags : 
human resources, tocacco cessation, employee relations, positive environment, alere wellbeing, roi
    
Alere Wellbeing

A Successful Innovation Agenda

Published By: Oracle     Published Date: Mar 07, 2019
If you’re like other HR professionals, you wonder what more you could do to drive business growth. In our latest research, we asked 5,000 decision-makers their views of the role of innovation in driving business growth. You’ll learn: • Why HR feels limited by innovation teams being too separated from their organisation’s core business • The six processes for idea generation and project delivery • Which leadership behaviours HR finds valuable in supporting innovation culture Our research uncovers the key innovation challenges they face, key execution issues, and the barriers to true innovation. See what HR leaders think
Tags : 
    
Oracle

A Successful Innovation Agenda

Published By: Oracle     Published Date: Mar 22, 2019
If you’re like other HR professionals, you wonder what more you could do to drive business growth. In our latest research, we asked 2,000 decision-makers their views of the role of innovation in driving business growth. You’ll learn: • Why HR feels limited by innovation teams being too separated from their organisation’s core business • The six processes for idea generation and project delivery • Which leadership behaviours HR finds valuable in supporting innovation culture Our research uncovers the key innovation challenges they face, key execution issues, and the barriers to true innovation. See what HR leaders think
Tags : 
    
Oracle

A Successful Innovation Agenda

Published By: Oracle     Published Date: Mar 21, 2019
If you’re like other HR professionals, you wonder what more you could do to drive business growth. In our latest research, we asked 5,000 decision-makers their views of the role of innovation in driving business growth. You’ll learn: • Why HR feels limited by innovation teams being too separated from their organisation’s core business • The six processes for idea generation and project delivery • Which leadership behaviours HR finds valuable in supporting innovation culture Our research uncovers the key innovation challenges they face, key execution issues, and the barriers to true innovation. See what HR leaders think
Tags : 
    
Oracle

A to Z: Why Office 365

Published By: Microsoft Office 365     Published Date: Nov 15, 2016
Download the free A to Z eBook to learn more about data security, employee productivity, IT Support and cost. Also, see how the competition measures up against Office 365. Here are a few must-knows when it comes to Office 365: Data compliance out of the box. Built-in security and privacy features; meets key industry standards and supports FERPA, HIPPAA and EU. Online or offline across all devices. Whether you are in the office or on the go, Office applications let you create, edit and share from your PC/MAC or your iOS, Android™ or Windows device with anyone in real time. Work off a single platform and eliminate third-party apps. With our suite of apps, such as Enterprise Content Management, Cloud PBX, and Microsoft MyAnalytics, you can trust that a single vendor is providing you the tools you need to get work done.
Tags : 
    
Microsoft Office 365

A Total-Cost-of-Ownership Comparison for Unified Communications and Collaboration

Published By: Cisco     Published Date: Jan 20, 2014
Midsize organizations strive for success, and being successful means consistently making smart decisions—including smart technology purchases. Technology should enable a midsize organization to meet the needs of its employees and customers today and also allow it to make simple but value-rich changes in the future. Technology must support changes that occur in a business without increasing the risks associated with providing excellent customer service, engaging with suppliers, and conducting many common business processes.
Tags : 
cisco, unified communications, collaboration, unified communications, it management
    
Cisco
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.