tools

Results 1 - 25 of 2289Sort Results By: Published Date | Title | Company Name

NICE WFM 7.0: Understanding the Business Value and ROI

Published By: Nice Systems     Published Date: Feb 26, 2019
NICE, the leader in workforce management, introduces the most advanced forecasting tools on the market with WFM 7.0. Building on its recognition as the industry standard, NICE WFM 7.0 Forecasting with Artificial Intelligence chooses the optimal daily forecast model to provide staffing levels and budgeting that are more accurate than those delivered by any other WFM solution.
Tags : 
    
Nice Systems

Machine builder opportunities and challenges in the new digital world

Published By: Schneider Electric     Published Date: Apr 23, 2019
Schneider Electric surveyed over 400 worldwide machine builders and factory end users in 2015. The questions they answered all centered around what their machines and plants would need to look like in 2020 if their businesses were to sustain growth and boost productivity. Their feedback has shaped (and will continue to shape) Schneider Electric digitized solution investments. Key requirements identified included: • Tools that could accommodate a younger, less skilled, and less experienced workforce • A need for simpler integration through open software connectivity and more open field buses • A need for whole lifecycle support of the products they purchase Read this eBook to see answers to some of these identified key points from those surveyed.
Tags : 
machine, digitization, industry 4.0, business models, smart machines
    
Schneider Electric

5 Ways Your Online Event Can Go Wrong (And How to Fix It)

Published By: PGi     Published Date: May 15, 2019
Whether it’s a webinar or webcast, an online event is one of the smartest ways to connect with your audience. But not all online events are created equal. As with anything in life, your results will only be as good as the tools you’re using. We’ve collected five of the most common problems people face when producing an event so you can be prepared to fix them (or better yet, avoid them in the first place!).
Tags : 
    
PGi

Definitive Guide™ to Next-Generation Network Packet Brokers

Published By: Gigamon EMEA     Published Date: Apr 10, 2019
Need powerful visibility and insights into network traffic while reducing risk, complexity and costs? Download the new Definitive Guide™ to Next-Generation Network Packet Brokers to learn why you should shift your infrastructure strategy to include NGNPBs, which offer new, expanded feature sets that simplify your architecture, realize the true ROI of your security tools and give you visibility into critical security threats. Learn how to see, control and secure what matters -- download now!
Tags : 
    
Gigamon EMEA

ESG Economic Validation: Analyzing the Benefits of Gigamon

Published By: Gigamon EMEA     Published Date: Apr 10, 2019
Download ESG’s Economic Validation Report, “Analyzing the Economic Benefits of Gigamon,” to see how Gigamon reduces false positives by 70%, decreases the cost of security personnel by 50%, eliminates redundant systems and tools and aligns SecOps and NetOps for better collaboration. Learn how a network visibility infrastructure can secure business, enable new ideas and facilitate growth. And, see why ESG believes the Gigamon Visibility Platform is a critical tool for success in today’s digital age.
Tags : 
    
Gigamon EMEA

IBM PowerAI Enterprise - Enterprise AI workloads at massive scale

Published By: IBM APAC     Published Date: May 14, 2019
IBM PowerAI Enterprise helps to make deep learning easier and faster for organizations by bringing together some of the most popular open source frameworks for deep learning, with development and management tools in a single installable package. Designed to simplify end-toend deep learning, PowerAI Enterprise allows enterprises to spend less time on data preparation, implementation and integration, and more time training neural networks for results. IBM PowerAI Enterprise version 1.1.2 includes the most popular deep learning frameworks in one installation: - BVLC Caffe - IBMCaffe - TensorFlow - PyTorch - Keras (tensorflow-keras)
Tags : 
    
IBM APAC

What Does the Cloud Mean to Enterprise Security?

Published By: Zscaler     Published Date: May 15, 2019
Enterprise security has undergone a complete transformation as a result of rapid and sweeping changes that are remaking the way public sector organizations do business. New technologies and trends are changing the very definition of an enterprise, how and where we work, and the tools we use to do our jobs. These trends include:
Tags : 
    
Zscaler

Survey Report: Data Integration Reaches Inflection Point

Published By: Group M_IBM Q2'19     Published Date: Apr 03, 2019
Data is the lifeblood of business. And in the era of digital business, the organizations that utilize data most effectively are also the most successful. Whether structured, unstructured or semi-structured, rapidly increasing data quantities must be brought into organizations, stored and put to work to enable business strategies. Data integration tools play a critical role in extracting data from a variety of sources and making it available for enterprise applications, business intelligence (BI), machine learning (ML) and other purposes. Many organization seek to enhance the value of data for line-of-business managers by enabling self-service access. This is increasingly important as large volumes of unstructured data from Internet-of-Things (IOT) devices are presenting organizations with opportunities for game-changing insights from big data analytics. A new survey of 369 IT professionals, from managers to directors and VPs of IT, by BizTechInsights on behalf of IBM reveals the challe
Tags : 
    
Group M_IBM Q2'19

Tools And Technology: The Identity And Access Management Playbook

Published By: SailPoint Technologies     Published Date: May 08, 2019
In our 26-criterion evaluation of identity management and governance (IMG) providers, we identified the nine most significant ones — CA Technologies, IBM, Ivanti, Micro Focus, Omada, One Identity, RSA Security, SailPoint Technologies, Saviynt — and researched, analyzed, and scored them. This report shows how each provider measures up and helps security and risk (S&R) professionals make the right choice.
Tags : 
    
SailPoint Technologies

All Clouds Are Not Created Equal

Published By: Forcepoint     Published Date: May 14, 2019
All Clouds are not Equal Today’s organizations turn to the cloud for all types of productivity-gaining tools – including security. Features such as security for mobile users and data loss protection are key, but it’s also important to separate fact from fiction when looking at the infrastructure of the provider. This ebook helps you consider the importance of: Data center locations Security controls, data privacy, availability, reliability, and performance What your organization or agency actually needs Download the ebook to discover five common misconceptions about cloud-based security infrastructure, and what you should really be looking for in a cloud-based security solution.
Tags : 
    
Forcepoint

All Clouds Are Not Created Equal

Published By: Forcepoint     Published Date: May 14, 2019
All Clouds are not Equal Today’s organizations turn to the cloud for all types of productivity-gaining tools – including security. Features such as security for mobile users and data loss protection are key, but it’s also important to separate fact from fiction when looking at the infrastructure of the provider. This ebook helps you consider the importance of: Data center locations Security controls, data privacy, availability, reliability, and performance What your organization or agency actually needs Download the ebook to discover five common misconceptions about cloud-based security infrastructure, and what you should really be looking for in a cloud-based security solution.
Tags : 
    
Forcepoint

All Clouds Are Not Created Equal

Published By: Forcepoint     Published Date: May 14, 2019
All Clouds are not Equal Today’s organizations turn to the cloud for all types of productivity-gaining tools – including security. Features such as security for mobile users and data loss protection are key, but it’s also important to separate fact from fiction when looking at the infrastructure of the provider. This ebook helps you consider the importance of: Data center locations Security controls, data privacy, availability, reliability, and performance What your organization or agency actually needs Download the ebook to discover five common misconceptions about cloud-based security infrastructure, and what you should really be looking for in a cloud-based security solution.
Tags : 
    
Forcepoint

Future Proof Your Digital Strategy

Published By: Blue Prism     Published Date: Mar 15, 2019
If you're going to implement an automation tool, ensure that the tools and solutions you implement can carry your business through the rapidly changing marketplace. Desktop recording and attended automation program offer a quick return on investment but overtime, because the scripts they use so frequently become obsolete - the total cost of ownership (TCO) over the long run simply isn't sustainable.
Tags : 
    
Blue Prism

Keys to RPA Success

Published By: Blue Prism     Published Date: Mar 15, 2019
Blue Prism, the inventor of the term Robotic Process Automation (RPA) and the market leader in enterprise RPA, recently engaged Knowledge Capital Partners (KCP) to survey their client deployments. We used proprietary KCP research tools, and this report summarizes our findings. Based on finalized quantitative survey results as well as our ever-growing library of qualitative case investigations, the report analyzes the management practices and behaviors that underpin the exceptional value achieved by Blue Prism customers as outlined in our January 2018 report “Robotic Process Automation: Benchmarking the Client Experience.”
Tags : 
    
Blue Prism

Case Study: London School of Economics

Published By: Cherwell Software     Published Date: Apr 24, 2019
Founded over a century ago for the betterment of society, The London School of Economics and Political Science (LSE) is one of the foremost social science universities in the world. The prestigious University has produced some of the leading lights in fi elds including law, economics, history and politics, with dozens of Nobel Prize winners and Members of Parliament among its alumni. Today, the LSE is home to more than 10,000 students and 3,300 staff, placing considerable demand on its IT service management team. However, as the university continued to expand in scope and complexity, its support team looked for new solutions to overcome the infl exible and outdated service management tools. Nicos Kyriacou, IMT Service Management Offi cer at LSE, explained: “We had the same tool for over a decade and it was so rigid that we were forced to adapt our working practices around it, rather than vice versa.
Tags : 
    
Cherwell Software

Case Study "Voorhees College"-provide students, faculty&staff with voice and desktop communications

Published By: NEC     Published Date: Aug 25, 2009
This is a case study which shows how Voorhees College implemented a revolutionary communications solution based around a service-orientated Unified Communications architecture from NEC to provide students, faculty and staff in five locations with software-based voice and desktop communications tools to achieve a 40 percent savings over its previous traditional telephony solution.
Tags : 
voorhees, nec, desktop communications, communications, service orientated, widearea network, wan, unified communications architecture, tco, soa, ip networks, ip telephony, service oriented architecture
    
NEC

The Right Tool for the Right Job

Published By: Ounce Labs, an IBM Company     Published Date: Jan 26, 2010
A range of application security tools was developed to support the efforts to secure the enterprise from the threat posed by insecure applications. But in the ever-changing landscape of application security, how does an organization choose the right set of tools to mitigate the risks their applications pose to their environment? Equally important, how, when, and by whom are these tools used most effectively?
Tags : 
owasp, ounce wagner, csrf, xss, cross-site scripting, sql, security management strategy, source code analysis, web application firewalls, web application scanner, policy based management, security management, vulnerability management
    
Ounce Labs, an IBM Company

Real-time Business: Playing to win in the new global marketplace

Published By: SAP     Published Date: Jun 18, 2011
To stay ahead of the competition in a global marketplace, firms are increasingly speeding up operations, in many cases adopting real-time systems and tools to allow for instant decision-making and faster business cycles. Download here to learn how.
Tags : 
real-time business analytics, faster decision making, business automation, business metrics, analytical data, sap, best practices, business activity monitoring, business analytics, business intelligence, business process automation, analytical applications, data integration
    
SAP

How to Populate Your CMDB in Four Steps

Published By: ASG Software Solutions     Published Date: Dec 09, 2008
Generally, CMDBs populated by discovery tools alone simply aren't usable. They fail because they contain massive amounts of irrelevant information. You avoid this pitfall by correctly populating your CMDB in four simple steps.
Tags : 
asg, cmdb, bsm, itil, configuration management, metadata, metacmdb, lob, sdm, service dependency mapping, ecommerce, bpm, workflow, itsm, critical application, cms, itsm, application performance management, best practices, business activity monitoring
    
ASG Software Solutions

Strategies to Cut Application Costs and Increase Productivity Using Application Mining Tools

Published By: ASG Software Solutions     Published Date: Apr 07, 2009
Application Portfolio Optimization (APO) provides executives with tools and information to assess the quality and condition of application assets as well as a means for understanding the impact of proposed application changes.
Tags : 
asg, cmdb, bsm, itil, bsm, portfolio optimization, apo, mining tools, metacmdb, configuration management, metadata, metacmdb, lob, sdm, service dependency mapping, ecommerce, bpm, workflow, itsm, critical application
    
ASG Software Solutions

Business-Critical Benefits of Workload Automation, by EMA

Published By: ASG Software Solutions     Published Date: Nov 05, 2009
Effective workload automation that provides complete management level visibility into real-time events impacting the delivery of IT services is needed by the data center more than ever before. The traditional job scheduling approach, with an uncoordinated set of tools that often requires reactive manual intervention to minimize service disruptions, is failing more than ever due to todays complex world of IT with its multiple platforms, applications and virtualized resources.
Tags : 
asg, cmdb, bsm, itil, bsm, metacmdb, workload automation, wla, visibility, configuration management, metadata, metacmdb, lob, sdm, service dependency mapping, ecommerce, bpm, workflow, itsm, critical application
    
ASG Software Solutions

Application Modernization: Three High Payback Strategies by Clarity Consulting

Published By: ASG Software Solutions     Published Date: Apr 20, 2010
This paper can help you achieve successful legacy modernization projects. It presents practical steps for starting application modernization projects and describes the benefits of three high payback strategies. It also reviews the criteria for evaluating a variety of modernization tools.
Tags : 
asg, application modernization, clarity consulting, apo, application performance optimization, business intelligence, application integration, application performance management, business integration, business management, business process automation, business process management, system management software
    
ASG Software Solutions

Boost Sales Calls by 50% or More - Free Trial

Published By: VanillaSoft     Published Date: Sep 08, 2010
VanillaSoft is used by thousands who need robust lead management software with CRM functionality but also need to power their inside sales reps and drive productivity by deploying best in class productivity tools.
Tags : 
vanillasoft
    
VanillaSoft

Online document management & Project management in the cloud

Published By: Filocity.com     Published Date: Nov 03, 2011
Online project and document management software with virtual office tools to manage & share documents, files, folders, tasks and calendars.
Tags : 
    
Filocity.com

Mobility for Business - How to E-Sign on an iPad

Published By: e-SignLive     Published Date: Oct 11, 2013
While we tend to think about mobility largely as a consumer phenomenon, it is also changing how the workforce carries out business. With so much being done beyond traditional office walls, many insurance companies, financial service organizations and even government agencies are adopting mobile tablets and smartphones as productivity tools for agents, representatives and personnel, and developing enterprise apps for these devices.
Tags : 
ipad, mobility, apple, e-signatures, esign
    
e-SignLive
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.