dom

Results 326 - 350 of 710Sort Results By: Published Date | Title | Company Name

Oracle Data Visualization Cloud Service Libera il potenziale delle tue idee

Published By: Oracle     Published Date: Nov 14, 2016
Saper estrarre le informazioni salienti da una massa è stata per molto tempo una prerogativa di pochi. Ora non più. Oggi non è più possibile per un piccolo gruppo di persone gestire il volume di dati disponibili, come non è più possibile immaginare tutte le domande a cui si vuole trovare risposta.
Tags : 
    
Oracle

Top Reasons Why Customers Deploy Unity

Published By: Dell EMC     Published Date: Nov 03, 2016
Dell EMC Unity™ is modernizing the datacenter, delivering advances that simplify the task of keeping up with growing storage demands. Compared with previous generations of midrange storage, Unity's greater scale, density and simplicity can drive better economics and performance across your entire application portfolio.
Tags : 
storage, vmware, data protection, domain, encryption, storage management, data integration
    
Dell EMC

Target Networking for Successful Cloud Deployments

Published By: Juniper Networks     Published Date: Oct 31, 2016
To gain transformational benefit from a private and/or hybrid cloud deployment, I&O leaders should look beyond provisioning compute and storage to address the networking domain; those that don't will sacrifice business agility.
Tags : 
    
Juniper Networks

First Principles for Network Defenders: A Unified Theory for Security Practiioners

Published By: Palo Alto Networks     Published Date: Sep 30, 2016
Great thinkers like Aristotle, Descartes and Elon Musk have said that, in order to solve really hard problems, you have to get back to first principles. First principles in a designated problem space are so fundamental as to be self-evident; so true that no expert in the field can argue against them. They are atomic. Experts use them like building blocks to derive everything else that is worth knowing in the problem domain. In this paper, I propose that the first principle for all network defenders is to prevent high-risk material impact to the organization.
Tags : 
palo alto, network defenders, security practitioners, security
    
Palo Alto Networks

Building Digital Workspaces: Viewpoints from IT Executives in Financial Services

Published By: VMware AirWatch     Published Date: Sep 21, 2016
This Event Proceedings document captures key takeaways from discussions at a recent executive dinner in London hosted by VMware. Focused on Digital Workspace emergence in the Financial Services sector, the invitation only event attracted a largely IT executive audience. The event was by invitation only and attracted an audience consisting largely of IT executives from the Financial Services in the United Kingdom. The session saw an open, spirited exchange of views on the state of end user computing initiatives amongst the present banks and insurance organizations. Attendees also discussed the impact of digital transformation initiatives on end user computing, and what this means for CIOs and IT departments in this sector.
Tags : 
    
VMware AirWatch

Do’s and Don’ts when moving to Office 365 Cloud Voice

Published By: Polycom     Published Date: Sep 09, 2016
For decades, the predominant model for deploying voice technology was on premises. However, over the past five years, the opinion of cloud-based voice services, such as Office 365, has changed dramatically. Just five years ago, the majority of businesses either felt that cloud unified communication was not viable or were taking a wait and see approach. Today, the majority of respondents are planning a minor or major cloud UC purchase. For Microsoft customers, Skype for Business in Office 365 provides an excellent alternative to a traditional premises-based deployment.
Tags : 
    
Polycom

Connectivity Benchmark Report

Published By: MuleSoft     Published Date: Sep 08, 2016
Between March 25th and March 28th, 2016, MuleSoft surveyed 802 IT decision makers globally across Australia, the Netherlands, Hong Kong, Singapore, Sweden, the United Kingdom and the United States. The survey assessed how organizations of all sizes are executing on digital transformation, IT challenges and technologies used to meet business goals.
Tags : 
mulesoft, digital transformation, it challenges, business goals, it innovation, business management, business process management, customer relationship management
    
MuleSoft

Digital Transformation in the Warehouse: Advanced Mobility Report

Published By: Panasonic Business Mobility Solutions     Published Date: Sep 06, 2016
A surprising 80% of the 30 million1 warehouse workers worldwide, in the field of transportation and logistics, are still using pen and paper in a physically-intensive environment that increasingly demands accuracy and real time feedback. With warehouse efficiency, so closely tied to customer satisfaction in areas like ecommerce, the low penetration of digital solutions—20% as recent as 2014, is surprising. Unless an organization has a fully automated warehouse, the job is heavily labor-intensive. VDC research reveals that as long as human labor plays a dominant role in warehousing, any technology that optimizes workflows and improves accuracy will add tremendous value
Tags : 
mobile workforce, laptops, tablet, mobile computing, productivity, rugged, mobile handheld, mobile scanner
    
Panasonic Business Mobility Solutions

Consider These Use Cases When Selecting Your MFT Technology

Published By: IBM     Published Date: Aug 29, 2016
Four use cases dominate today's use of managed file transfer technology. Infrastructure directors should consider these and use a systematic approach to vendor selection to ensure they choose the right MFT solution for their organization.
Tags : 
ibm, b2b, commerce, b2bi, business to business integration, integration, architecture, mft technology
    
IBM

IDC Whitepaper: NetApp All Flash FAS: Flash-Optimized Storage for Mixed Workload Consolidation

Published By: NetApp     Published Date: Aug 26, 2016
Flash storage is taking the enterprise market by storm. With all-flash arrays (AFAs) now available from every major enterprise storage vendor, they are quickly becoming a mainstream general purpose deployment platform for mixed workloads. According to IDC, flash technology will come to dominate primary storage platforms by 2020. Read this independent whitepaper to learn what sets the NetApp AFF apart from other AFAs on the market, and discover why IDC describes the AFF as “the crown jewel” in the NetApp portfolio of all-flash storage solutions.
Tags : 
netapp, database performance, flash storage, data management, cost challenges
    
NetApp

SSL/TLS Best Practices Guide v2

Published By: Entrust Datacard     Published Date: Aug 10, 2016
Entrust’s SSL/TLS Best Practices Guide is a key resource for those charged with SSL (Secure Sockets Layer) and TLS (Transport Layer Security) deployment. In our guide, you’ll find expert advice from the thought leaders at Entrust on SSL/TLS certificate installation, and tips for managing security for optimal performance. Included in the SSL/TLS Best Practices Guide: Certificates and Private Keys Server Configuration Application Protection Enhanced Server Security Domain Protection Advanced Certificates Always-On SSL Our guide is designed to help make SSL/TLS certificate installation easier, so you can use SSL expertly and with confidence.
Tags : 
    
Entrust Datacard

Top 5 Reasons to Automate Identity Lifecycle

Published By: Okta     Published Date: Jul 27, 2016
Cloud-first, mobile-first organizations are seeing huge benefits from taking a more distributed approach to IT. Business units are given more freedom to evaluate and select SaaS applications that will enable efficiency and growth. Users are given more freedom to use the devices that make them the most productive. When this trend started, most IT organizations were able to implement some basic, manual processes to administer and govern IT in this best-of-breed distributed environment. However, as the number of touchpoints increases, IT needs to automate to keep pace. This paper goes into more detail on the top 5 reasons to automate identity lifecycle and identity administration and build a solid foundation for future cloud-first, mobile-first IT.
Tags : 
identity, idaas, iam, identity lifecycle management, mobile, provisioning, active directory, security
    
Okta

What's New in the Enterprise Email Market?

Published By: IBM     Published Date: Jul 20, 2016
Please join us to get answers to those questions and: - Better understand today’s enterprise email market and how to assess the value of different email solutions - Find out why IBM was named worldwide market share leader in enterprise social networks for the sixth consecutive year - Learn why customers who left IBM are coming back - Expand your understanding of IBM’s range of products, solutions and services in this area, including Notes/Domino and Verse
Tags : 
ibm, enterprise social solutions, enterprise email market, ibm social business, engagement social, enterprise applications, human resource technology
    
IBM

Top 5 Reasons to Automate Identity Lifecycle

Published By: Okta     Published Date: Jul 19, 2016
Cloud-first, mobile-first organizations are seeing huge benefits from taking a more distributed approach to IT. Business units are given more freedom to evaluate and select SaaS applications that will enable efficiency and growth. Users are given more freedom to use the devices that make them the most productive. When this trend started, most IT organizations were able to implement some basic, manual processes to administer and govern IT in this best-of-breed distributed environment. However, as the number of touchpoints increases, IT needs to automate to keep pace. This paper goes into more detail on the top 5 reasons to automate identity lifecycle and identity administration and build a solid foundation for future cloud-first, mobile-first IT.
Tags : 
best practices, business optimization, business management, productivity, cloud services, mobile, identity, idaas
    
Okta

Windows Configuration Management- Managing Users and Groups

Published By: Puppet     Published Date: Jul 13, 2016
If you’re new to Puppet on Windows, one of the first things you’ll want to do is start managing users and groups. In this webinar, we’ll demonstrate how to manage both local groups and Active Directory membership. The demo will include: - Managing administrator accounts - Managing local groups - Setting up a domain controller - Managing Active Directory membership Puppet can do a lot, but we always recommend starting small and building on your success. Managing users and groups is a great way to get started. Make 2016 the year you banish manual configuration for good!
Tags : 
    
Puppet

IDC: Pulsant Delivers Agile and Cost-Effective Hybrid Cloud

Published By: Cisco     Published Date: Jul 11, 2016
Pulsant is a United Kingdom-based IT infrastructure services provider focused on the small and medium-sized enterprise market. It offers public, private, and hybrid cloud services and a variety of managed, collocation, and professional services. Pulsant was one of the first cloud service providers to embrace software-defined networking (SDN) as a way to simplify its IT infrastructure, unify control of physical and virtual environments, and reduce capital expenses (capex) and operating expenses (opex). After evaluating a number of vendors, Pulsant chose Cisco's Application Centric Infrastructure (ACI) as the best SDN solution for delivering its hybrid cloud services.
Tags : 
    
Cisco

Performance and Efficiency for VMWare Data Protection

Published By: Dell EMC     Published Date: Jul 05, 2016
This report documents hands-on testing of an EMC data protection solution for virtual environments using Avamar Virtual Edition with a Data Domain system
Tags : 
data management, business practices, data center. data application, enterprise applications, security, performance management, network security appliance
    
Dell EMC

Work 3.0: The Next Generation Model for Smarter Business

Published By: Mitel     Published Date: Jun 29, 2016
Today’s world of business is increasingly fast-paced, competitive, technology-led and global. Cultural, technological and physical elements are working together to drive a rapid pace of change like never before. From demand for more freedom in the way we work and the Bring Your Own Device (BYOD) trend, to technology innovation and the increasing adoption of new devices, platforms and applications, to the breaking down of international and regional barriers.
Tags : 
best practices, business optimization, business management, productivity, business intelligence
    
Mitel

ZK Research: Cisco’s Branch Infrastructure Powers the Hybrid WAN

Published By: Cisco     Published Date: Jun 21, 2016
IT has gone through a significant evolution over the past decade. Virtualization has changed the entire face of the data center, the network edge has become predominantly wireless and consumer devices reign supreme. However, one of the few areas of IT that has yet to evolve is the corporate wide area network (WAN). Managing the WAN is something network managers have always struggled with because WAN speeds are typically an order of magnitude, or more, slower than local area networks (LANs).
Tags : 
    
Cisco

5 Keys to Creating Awesome Social Content

Published By: Tapinfluence     Published Date: Jun 07, 2016
Consumers are hungry for social content that speaks to their unique needs, but they seldom turn to brands to get it. In order to satisfy this need, you have to reach consumers where they already are with content that adds value beyond what any of your products can offer. This eBook will guide you through the process of creating optimized content for social campaigns, including recipes, styled photo collections, instructional videos, product reviews, and more.
Tags : 
content management, content delivery, best practices, performance management, reach, social content, business intelligence, business management
    
Tapinfluence

Supporto di AirWatch per Office 365

Published By: VMware AirWatch     Published Date: May 24, 2016
Recentemente, una delle domande più comuni dei clienti è: “In che modo AirWatch supporta Office 365?” Molti chiedono se AirWatch possa controllare l’accesso ad Office 365 (O365) non solo sul loro sistema del desktop aziendale, ma soprattutto dai dispositivi mobili.
Tags : 
best practices, business optimization, business management, mobile, support, application integration, business intelligence, business process automation
    
VMware AirWatch

Performance and Efficiency for VMWare Data Protection

Published By: Dell EMC     Published Date: May 13, 2016
This report documents hands-on testing and validation of an EMC data protection solution for virtual environments using Avamar Virtual Edition with a Data Domain system, with a focus on the ease of integration, efficiency, scalability, and backup/restore performance.
Tags : 
emc, vmware, data protection, data domain, backup, data management
    
Dell EMC

eBook: 7 Steps for Delivering Next-Generation Digital Customer Service

Published By: Genesys     Published Date: May 10, 2016
When people engage via digital touchpoints with your organization, they may forge seemingly random, winding paths along their journeys. Yet, no matter how many channels or interactions are involved, for the customer it is a single experience.
Tags : 
call center, cloud call center, cloud contact center, omnichannel, genesys, ebook, digital customer service, customer experience
    
Genesys

Top 5 Reasons to Automate Identity Lifecycle

Published By: Okta     Published Date: May 09, 2016
Cloud-first, mobile-first organizations are seeing huge benefits from taking a more distributed approach to IT. Business units are given more freedom to evaluate and select SaaS applications that will enable efficiency and growth. Users are given more freedom to use the devices that make them the most productive. When this trend started, most IT organizations were able to implement some basic, manual processes to administer and govern IT in this best-of-breed distributed environment. However, as the number of touchpoints increases, IT needs to automate to keep pace. This paper goes into more detail on the top 5 reasons to automate identity lifecycle and identity administration and build a solid foundation for future cloud-first, mobile-first IT.
Tags : 
    
Okta

Top 5 Reasons to Automate Identity Lifecycle

Published By: Okta     Published Date: May 09, 2016
Cloud-first, mobile-first organizations are seeing huge benefits from taking a more distributed approach to IT. Business units are given more freedom to evaluate and select SaaS applications that will enable efficiency and growth. Users are given more freedom to use the devices that make them the most productive. When this trend started, most IT organizations were able to implement some basic, manual processes to administer and govern IT in this best-of-breed distributed environment. However, as the number of touchpoints increases, IT needs to automate to keep pace. This paper goes into more detail on the top 5 reasons to automate identity lifecycle and identity administration and build a solid foundation for future cloud-first, mobile-first IT.
Tags : 
    
Okta
Start   Previous    7 8 9 10 11 12 13 14 15 16 17 18 19 20 21    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.