innovative enterprises

Results 1 - 21 of 21Sort Results By: Published Date | Title | Company Name

Extend DevOps to Legacy Teams to Drive Enterprise Innovation

Published By: CA Technologies     Published Date: Jul 26, 2017
Extending DevOps to mainframe applications and teams is essential towards the agility and velocity that enterprises require to remain innovative in today’s turbulent digital business environment. Talking Points: • For enterprises with mainframes, trying to achieve the benefits of Digital Transformation without dealing with existing mainframe assets is a fool’s errand. • Breaking down silos and moving to DevOps is central to what it means to undergo Digital Transformation. • Including the mainframe in modern software development approaches can improve quality overall, reduce test cycles and deployment timeframes, and ensure mainframe-based applications support the end-to-end performance requirements that today’s customers demand.
Tags : 
    
CA Technologies

eBook: Defend Your Data

Published By: Cohesity     Published Date: Mar 19, 2019
Every 14 seconds. That’s how often analysts predict ransomware will attack a business this year.1 Despite the best efforts to thwart ransomware attacks, cyber criminals are innovative, and they continue to create new malware. This means more sophisticated and targeted ransomware attacks are coming—all with the same goal: Disrupt business operations in the hopes victims will pay to restore order. No industry is immune. And because enterprises are now even more attractive targets than consumers,2 your organization must proactively prepare for when, not if, cyber criminals come for your data.
Tags : 
    
Cohesity

eBook: Defend Your Data

Published By: Cohesity     Published Date: Mar 26, 2019
Every 14 seconds. That’s how often analysts predict ransomware will attack a business this year. Despite the best efforts to thwart ransomware attacks, cyber criminals are innovative, and they continue to create new malware. This means more sophisticated and targeted ransomware attacks are coming—all with the same goal: Disrupt business operations in the hopes victims will pay to restore order. No industry is immune. And because enterprises are now even more attractive targets than consumers, your organization must proactively prepare for when, not if, cyber criminals come for your data.
Tags : 
    
Cohesity

Tackling The Disrupted Customer Journey: A Customer 360 View For Financial Institutions

Published By: DataStax     Published Date: Mar 10, 2017
Netflix, Intuit and Clear Capital. These 3 innovative companies have one thing in common. They are altering their business landscape and transforming the way people live and work through highly personalized applications. And they're doing this with Apache Cassandra™ and DataStax. Download this white paper and learn why relational technologies failed to meet the demands of Netflix, Mint Bills and Clear Capital and how these enterprises modernize their Web and Mobile applications with DataStax to drive customer engagement, loyalty and lifetime value.
Tags : 
    
DataStax

Tackling The Disrupted Customer Journey: A Customer 360 View For Financial Institutions

Published By: Datastax     Published Date: Apr 04, 2017
Netflix, Intuit and Clear Capital. These 3 innovative companies have one thing in common. They are altering their business landscape and transforming the way people live and work through highly personalized applications. And they're doing this with Apache Cassandra™ and DataStax. Download this white paper and learn why relational technologies failed to meet the demands of Netflix, Mint Bills and Clear Capital and how these enterprises modernize their Web and Mobile applications with DataStax to drive customer engagement, loyalty and lifetime value.
Tags : 
datastax, netflix, mint bills, digital, personalization
    
Datastax

Ombud Open Research: eSignature Solutions

Published By: DocuSign     Published Date: Jun 25, 2014
Innovative enterprises are implementing fully-digitized, business-critical processes with eSignature technologies to drive significant efficiencies and improve customer experience.
Tags : 
docusign, electronic signatures, reduce costs, esignatures, contract execution, knowledge management, enterprise applications
    
DocuSign

The Chemistry of Employee Engagement

Published By: Glint     Published Date: Sep 26, 2017
This white paper explores the data-driven strategies of innovative organizations who leverage employee engagement as a strategic weapon to improve productivity, retention, and corporate performance. It looks at different ways of measuring engagement, how common challenges in building engagement programs have been overcome by well-known enterprises, and offers real-life examples from HR executives.
Tags : 
employee engagement, hr metrics, employee engagement survey, employee engagement strategies, employee engagement strategy
    
Glint

Analytics: The Real-World Use of Big Data

Published By: IBM     Published Date: Sep 27, 2013
Analytics: The Real-World Use of Big Data - How innovative enterprises in the midmarket extract value from uncertain data This study highlights the phases of the big data journey, the objectives and challenges of midsize organizations taking the journey, and the current state of the technology that they are using to drive results. It also offers a pragmatic course of action for midsize companies to take as they dive into this new era of computing.
Tags : 
ibm, big data, big data solutions, midmarket businesses, analytics, it management, data management, business technology
    
IBM

The Power of Context: How Unified Information Applications are Transforming Work

Published By: IBM     Published Date: Oct 14, 2015
Modern organizations often have huge stores of data, which can make it difficult for employees to find the information they need when they need it. In response, innovative enterprises are creating unified information applications based on cognitive computing technology in order to put invaluable information at workers' fingertips.
Tags : 
ibm, information application, enterprise, application, search tool, networking, software development, enterprise applications
    
IBM

The Power of Context: How Unified Information Applications Transform Work

Published By: IBM     Published Date: Feb 26, 2016
Modern organizations often have huge stores of data, which can make it difficult for employees to find the information they need when they need it. In response, innovative enterprises are creating unified information applications based on cognitive computing technology in order to put invaluable information at workers' fingertips.
Tags : 
ibm, information applications, analytics, data, enterprise software, application integration, business analytics, business integration
    
IBM

The Power of Context: How Unified Information Applications Transform Work

Published By: IBM     Published Date: Apr 20, 2016
Modern organizations often have huge stores of data, which can make it difficult for employees to find the information they need when they need it. In response, innovative enterprises are creating unified information applications based on cognitive computing technology in order to put invaluable information at workers' fingertips.
Tags : 
ibm, ibm watson, watson explorer, business intelligence, business decisions, innovative enterprises, knowledge management, enterprise applications
    
IBM

Unique Security Challenges in the Datacenter Demand Innovative Solutions

Published By: Juniper Networks     Published Date: Sep 10, 2014
Get insight into the innovative solutions demanded by data center security in IDC’s Whitepaper. Read about the unique challenges enterprises face in securing data centers, and how Juniper Networks security technologies meet these.
Tags : 
security challenges, data center demand, innovative solutions, security technologies, innovative solutions, networking, data center
    
Juniper Networks

Moving to a Secure, Automated Multicloud Environment

Published By: Juniper Networks     Published Date: Feb 05, 2018
Innovative data-driven strategies are enabling organizations to connect with customers and increase operational efficiency as never before. These new initiatives are built on a multitude of applications, such as big-data analytics, supply chain, and factory automation. On average, organizations are now 53% digital as they create new ways of operating and growing their businesses, according to the Computerworld 2017 Forecast Study. As part of this transformation, enterprises rely increasingly on multivendor, multicloud environments that mix on-premise, private, and public cloud services and workloads. This shift is causing enterprises to increase network capacity; 55% of enterprises in the Computerworld study expect to add network bandwidth in the next 12 months.
Tags : 
security, automation, savings, technology, cloud
    
Juniper Networks

Android Enterprise & MobileIron

Published By: MobileIron     Published Date: Feb 14, 2019
Google’s Android enterprise is fast tracking a more connected workforce, with multiple layers of security along with new innovative features, and comprehensive management. Despite the growing popularity of Android, few enterprises are leveraging the full benefits of Android mobility in their organization. In this webinar, we discuss simple best-practices for how Google’s Android enterprise can be securely leveraged in the enterprise with UEM.
Tags : 
    
MobileIron

Foundation for Open Cloud Infrastructure

Published By: Oracle APAC     Published Date: May 24, 2018
Enterprises are rapidly embracing cloud services to speed innovation and drive cost savings. The most innovative IT organizations in these enterprises are shifting to software-defined “virtual data centers” that connect, aggregate, and configure public and private computing resources in unprecedented ways. These IT organizations use open private cloud infrastructure within a corporate data center or at a hosting site (managed cloud services) in conjunction with public cloud services to meet all their business requirements.
Tags : 
    
Oracle APAC

Big Data Comes of Age: Shifting to a Real-time Data Platform

Published By: SAP     Published Date: May 18, 2014
New data sources are fueling innovation while stretching the limitations of traditional data management strategies and structures. Data warehouses are giving way to purpose built platforms more capable of meeting the real-time needs of a more demanding end user and the opportunities presented by Big Data. Significant strategy shifts are under way to transform traditional data ecosystems by creating a unified view of the data terrain necessary to support Big Data and real-time needs of innovative enterprises companies.
Tags : 
sap, big data, real time data, in memory technology, data warehousing, analytics, big data analytics, data management
    
SAP

Prefabricated Data Centers: Business Advantages for Colocation Providers

Published By: Schneider Electric     Published Date: Mar 28, 2019
To win the colocation race you need to be faster, reliable, innovative and efficient –all while making smarter design choices that will ensure positive returns. Customers are demanding 100% uptime and always-on connectivity –be it small enterprises to large Internet Giants–and colocation providers need to meet these expectations. The growing adoption of prefabricated data centers allows just that. With the undisputed benefits of prefab modules and building components(like speed or quality),colocation providers can manage their business today, and deploy faster in the future. Chris Crosby, CEO for Compass Datacenters, is well-known for his expertise in the data center industry. From its founding in 2012, Compass’ data center solutions have used prefabricated components like exterior walls and power centers to deliver brandable, dedicated facilities for colocation providers. Prefabrication is the central element of the company’s “Kit of Parts” methodology that delivers customizable data center solutions from the core to the edge. By attending this webinar, colocation providers will: • understand the flexibility and value delivered via the use of prefabricated construction • Hear the common misperceptions regarding prefabricated modules and data center components • learn how prefabricated solutions can provide more revenue generation capability than competing alternatives • know what key things to consider when evaluating prefabricated data center design
Tags : 
data centers, colocation provider, schneider electric, - modular data centers, prefabricated data center
    
Schneider Electric

Viavi Special Report: Network Tools Hold Critical Insight in Attack Remediation

Published By: Viavi Solutions     Published Date: Jan 04, 2017
In the age of information, staying on top of emerging threats requires IT teams to leverage existing tools in innovative ways, such as applying deep packet inspection and analysis from performance monitoring solutions for advanced security forensics. Based on recent insight gathered from 322 network engineers, IT directors and CIOs around the world, 85 percent of enterprise network teams are now involved with security investigations, indicating a major shift in the role of those teams within enterprises. Large-scale and high-profile security breaches have become more common as company data establishes itself as a valuable commodity on the black market. As such, enterprises are now dedicating more IT resources than ever before to protect data integrity.
Tags : 
    
Viavi Solutions

Viavi Special Report: Network Tools Hold Critical Insight In Attack Remediation

Published By: Viavi Solutions     Published Date: Apr 14, 2017
In the age of information, staying on top of emerging threats requires IT teams to leverage existing tools in innovative ways, such as applying deep packet inspection and analysis from performance monitoring solutions for advanced security forensics. Based on recent insight gathered from 322 network engineers, IT directors and CIOs around the world, 85 percent of enterprise network teams are now involved with security investigations, indicating a major shift in the role of those teams within enterprises. Large-scale and high-profile security breaches have become more common as company data establishes itself as a valuable commodity on the black market. As such, enterprises are now dedicating more IT resources than ever before to protect data integrity.
Tags : 
network security, security validation, technical security, cyber attacks, database security, it security, traffic analytics, data report
    
Viavi Solutions

EMM Real Benefits in Today's Mobile World

Published By: VMware AirWatch     Published Date: May 19, 2016
The economy isn’t standing still. For your business to succeed, your employees shouldn’t either. That’s why companies of all types are moving to empower their mobile workforce and engage with customers in innovative ways. To realize their potential, enterprises need to find ways to make a mobile workforce as productive when they’re away from the office and on their mobile devices as they are in the office. This means mobility systems must give users a seamless experience across the ever-expanding types of mobile devices employees use, for easy access to business-critical applications. At the same time, it must deliver a secure workspace that complies with security regulations, protects devices, plus guards business and customer data, from expanding security threats.
Tags : 
innovation, best practices, mobile device, security, mobile workforce, access control, mobile computing, mobile data systems
    
VMware AirWatch

Wild, Wild West of Mobile App Reputation

Published By: Webroot UK     Published Date: Sep 25, 2013
Mobile applications are providing exciting new business opportunities for service providers and technology companies. Innovative firms are thriving by offering apps in app stores and app markets, by supporting apps with mobile services and infrastructure, and by managing apps through mobile device management (MDM) and mobile application management (MAM) products. Enterprises are providing mobile apps to their employees and customers through corporate app catalogs. But these business opportunities could be jeopardized by information security issues.
Tags : 
webroot, app reputation, app, mobile app, mam, enterprise mobile apps, app markets, mobile viruses
    
Webroot UK
Search      

Add Research

Get your company's research in the hands of targeted business professionals.