business all one

Results 101 - 125 of 365Sort Results By: Published Date | Title | Company Name

Deliver All Analytics for All Users Through a Single Product in the Cloud

Published By: SAP     Published Date: Jul 18, 2016
The SAP® BusinessObjects™ Cloud solution offers all analytics capabilities for all users in one product. In the boardroom, at the office, or in front of a customer, you can discover, analyze, plan, predict, and collaborate in one integrated experience designed expressly for the cloud. Read the solution in detail to learn how to turn instant insight into quick action.
Tags : 
    
SAP

Deliver Mobile Apps: A Lifecycle Approach

Published By: HP - Enterprise     Published Date: Jun 04, 2013
Mobility services are frequently being positioned as part of broader application transformation offerings, enabling enterprises to support the bring-your-own-device (BYOD) approach, with the development of enterprise app stores and the ability to leverage personal devices for business functions. This white paper describes software and services that accelerate and simplify the creation of internally developed or “in-house” enterprise mobile applications. It also describes how to deploy and manage these mobile apps on both company-provided and “bring-your-own” smartphones and tablet computers. Solving the complete mobile app lifecycle means transforming enterprise apps for multiscreen devices; facilitating design, testing, security, performance, management, and compliance to reach new customers and employee expectations.
Tags : 
mobile apps, lifecycle approach, mobility services, bring-your-own-device, software, mobile computing, mobile data systems, smart phones, wireless application software, wireless communications, wireless hardware, wireless phones
    
HP - Enterprise

Deliver Pre-Configured Systems to End Users Faster with Dell Provisioning for VMware Workspace ONE

Published By: Dell EMC     Published Date: May 09, 2019
Traditional methods for provisioning and deploying end-user devices can present real headaches to IT staff and business in general. In comparison, Dell Provisioning for Vmware Workspace ONE® saves time for small and large-scale deployments. This service enables a company to pre-configure devices before they leave the factory, with no ongoing IT involvement. Download this white paper from Dell and Intel® to learn how to; eliminate on-site adminstrative deployment time, deploy large quanitites of fully provisioned devices with a single one-time configuration, and, expedite getting fully configured systems to end-users.
Tags : 
    
Dell EMC

Design With Brilliance

Published By: Stratasys EMEA     Published Date: Feb 21, 2019
Ask anyone in business, higher education or the medical community what their top objectives are and they’ll probably say it’s to achieve more, to solve more problems, faster than what’s possible now, while saving money in the process. Ask what’s holding them back and you’ll probably find a diverse variety of obstacles in their day-to-day work processes that hinder them in meeting those goals. Having the right tools to do the job is one crucial element in solving problems and becoming more efficient and productive. Additive manufacturing, widely known as 3D printing, is one of those tools that has helped businesses, educators, health care providers and researchers improve how they design, manufacture and perform research. While no tool is an all-in-one solution, 3D printing is a strong step in that direction, particularly in its most sophisticated forms. 3D printing makes it possible to manufacture things that aren’t feasible with traditional processes like machining or injection moldi
Tags : 
    
Stratasys EMEA

DevOps Perspectives: Ideas, insight and direction from DevOps leaders

Published By: CA Technologies     Published Date: Jun 03, 2015
"To support digital transformation imperatives, organizations are increasingly exploring DevOps style approaches for the continuous delivery of high quality software. Unfortunately, however, many enterprises remain burdened with accumulated technical debt and legacy wasteful practices – waste that can quickly inhibit the flow of value to customers and the business. Lean thinking provides organizations with a framework by which to quickly identify all forms of waste impacting the flow of value, which DevOps practitioners can apply in a software development context to quickly pinpoint and eliminate 8 elements of waste across people, process and technology dimensions. This paper presents the 8 elements of waste framework, strategies needed to identify and eliminate waste, and the metrics needed to measure effectiveness.
Tags : 
    
CA Technologies

DevOps Perspectives: Ideas, insight and direction from DevOps leaders

Published By: CA Technologies     Published Date: Jun 04, 2015
"To support digital transformation imperatives, organizations are increasingly exploring DevOps style approaches for the continuous delivery of high quality software. Unfortunately, however, many enterprises remain burdened with accumulated technical debt and legacy wasteful practices – waste that can quickly inhibit the flow of value to customers and the business. Lean thinking provides organizations with a framework by which to quickly identify all forms of waste impacting the flow of value, which DevOps practitioners can apply in a software development context to quickly pinpoint and eliminate 8 elements of waste across people, process and technology dimensions. This paper presents the 8 elements of waste framework, strategies needed to identify and eliminate waste, and the metrics needed to measure effectiveness.
Tags : 
    
CA Technologies

DevOps Perspectives: Ideas, insight and direction from DevOps leaders

Published By: CA Technologies     Published Date: Jun 04, 2015
To support digital transformation imperatives, organizations are increasingly exploring DevOps style approaches for the continuous delivery of high quality software. Unfortunately, however, many enterprises remain burdened with accumulated technical debt and legacy wasteful practices – waste that can quickly inhibit the flow of value to customers and the business. Lean thinking provides organizations with a framework by which to quickly identify all forms of waste impacting the flow of value, which DevOps practitioners can apply in a software development context to quickly pinpoint and eliminate 8 elements of waste across people, process and technology dimensions. This paper presents the 8 elements of waste framework, strategies needed to identify and eliminate waste, and the metrics needed to measure effectiveness.
Tags : 
    
CA Technologies

DevOps Perspectives: Ideas, insight and direction from DevOps leaders

Published By: CA Technologies     Published Date: Jun 04, 2015
To support digital transformation imperatives, organizations are increasingly exploring DevOps style approaches for the continuous delivery of high quality software. Unfortunately, however, many enterprises remain burdened with accumulated technical debt and legacy wasteful practices – waste that can quickly inhibit the flow of value to customers and the business. Lean thinking provides organizations with a framework by which to quickly identify all forms of waste impacting the flow of value, which DevOps practitioners can apply in a software development context to quickly pinpoint and eliminate 8 elements of waste across people, process and technology dimensions. This paper presents the 8 elements of waste framework, strategies needed to identify and eliminate waste, and the metrics needed to measure effectiveness.
Tags : 
    
CA Technologies

devops-practitioner-series_waste not want not

Published By: CA Technologies     Published Date: Jun 09, 2015
To support digital transformation imperatives, organizations are increasingly exploring DevOps style approaches for the continuous delivery of high quality software. Unfortunately, however, many enterprises remain burdened with accumulated technical debt and legacy wasteful practices – waste that can quickly inhibit the flow of value to customers and the business. Lean thinking provides organizations with a framework by which to quickly identify all forms of waste impacting the flow of value, which DevOps practitioners can apply in a software development context to quickly pinpoint and eliminate 8 elements of waste across people, process and technology dimensions. This paper presents the 8 elements of waste framework, strategies needed to identify and eliminate waste, and the metrics needed to measure effectiveness.
Tags : 
    
CA Technologies

Do More with Complete Mobile-Cloud Security from MobileIron Access

Published By: MobileIron     Published Date: Nov 14, 2017
This paper covers some of the critical security gaps today’s mobile-cloud enterprises must address: • Unsecured devices. Unsecured devices allow users to easily access business data from mobile apps or cloud services simply by entering their credentials into an app or browser on the device. Once on the device, data can be easily compromised or shared with unauthorized, external sources. • Unmanaged apps. These typically include business apps, such as Office 365 productivity apps, that the user has downloaded from a personal app store instead of the enterprise app store. As a result, these apps are not under IT control but can still be used to access business content once the user enters his or her credentials. • Unsanctioned cloud services. Most enterprise cloud services have associated ecosystems of apps and services that integrate using APIs. While the enterprise cloud service might be sanctioned, apps and services from its ecosystem might not be.
Tags : 
    
MobileIron

Do's and Don'ts of Evaluating and Deploying a CDN

Published By: Limelight Network     Published Date: Aug 12, 2019
As businesses continue to expand their online reach globally, user experience is one of the most important factors for building audience satisfaction and driving revenue. But whether you are delivering videos, web content or even ? les, ensuring engaging online experiences from an increasing variety of devices around the world, is a huge challenge. Organizations have a number of methods for improving user experiences, one of which is leveraging a content delivery network (CDN). But not all CDNs deliver the same level of service. This guide will provide some tips on how to determine what is most important to your organization and how to choose a CDN that meets your needs.
Tags : 
    
Limelight Network

Don't let bad data compromise your intelligence

Published By: Group M_IBM Q2'19     Published Date: Apr 03, 2019
As the information age matures, data has become the most powerful resource enterprises have at their disposal. Businesses have embraced digital transformation, often staking their reputations on insights extracted from collected data. While decision-makers hone in on hot topics like AI and the potential of data to drive businesses into the future, many underestimate the pitfalls of poor data governance. If business decision-makers can’t trust the data within their organization, how can stakeholders and customers know they are in good hands? Information that is not correctly distributed, or abandoned within an IT silo, can prove harmful to the integrity of business decisions.
Tags : 
    
Group M_IBM Q2'19

DSL Vs. Cable High-Speed Internet

Published By: Comcast Business     Published Date: Mar 24, 2015
For today’s businesses, fast Internet access is more than a competitive advantage. It is an operational necessity. Changes in the way companies are working – and the tools they are using – have created the need for high-speed connections to services and individuals off-site. Across the country, in-house servers are rapidly being replaced by cloud-based infrastructure. Videoconferencing is helping businesses cut travel costs. Mobile devices – with easy links to work-related content – are enabling more employees to be more productive, from any location. All of these applications have one factor in common: they require bandwidth. And plenty of it. Download this white paper to learn more about high-speed internet connections.
Tags : 
dsl, high-speed internet, cable, internet connection, productivity, bandwith, enterprise applications, data management
    
Comcast Business

E-Book: What Keeps Bus Leaders Up at Night

Published By: Success Factors     Published Date: Jul 02, 2013
Convert your late-night worries into daytime business success As a small-business leader, you have many reasons for insomnia. Worrying about managing your money, execution, and people can make for restless nights. SuccessFactors is here to help you get a little shut-eye. Download “What keeps business leaders up at night? A quick guide to talent excellence for small-business leaders” for a walk-through of the pivotal areas of your talent management where you can make changes that impact your business. This e-book identifies some of the top worries that keep small-business leaders up at night. How do you sleep better? You bring an integrated approach to your talent management processes to help your people turn strategy into action and action into results. By downloading this e-book, you will learn the benefits of: • Aligning your workforce to your strategy • Helping your people grow • Hiring and retaining the right people from the start • Building a data foundation for your talent mana
Tags : 
e-book, business leaders, benefits, talent management
    
Success Factors

Eight Tips for Mastering Migration

Published By: Carbonite     Published Date: Aug 02, 2017
Every day, a new product launch promises speed, efficiency or savings for businesses eager to stay a step ahead. But if you’re an IT pro, and it’s your job to onboard the new system, the allure gives way to practical considerations: How are you going to move all that critical data—including dependencies, settings and custom configurations—from one system to another so it all talks to each other the way it’s supposed to? Whether you’re tackling a oneoff project or looking to improve your in-house skills, these eight tips for mastering migration will help you form a strategy, determine costs and find technical solutions to ensure successful migration no matter what platform you’re on or which one you’re moving to.
Tags : 
migration, technical solutions
    
Carbonite

Eliminating the Noise: Best Practices for the Five W’s of Sales Intelligence

Published By: Oracle     Published Date: Mar 18, 2014
Much as a journalist is expected to report on the “who, what, when,” etc. when filing their story, professional business-to-business (B2B) sales reps are more likely to open doors, nurture opportunities, and close deals when they know more about their prospect or customer. Sales Intelligence, as a broad category of tools and services within the Sales Effectiveness space, represents a significant opportunity for all varieties of sales-oriented job roles to better understand their buyer both before and during the traditional — and non-traditional — sales cycle. This Research Brief summarizes initial Aberdeen research findings based on recent sales intelligence data collected from 206 survey respondents, and provides specific guidance regarding best practices and technologies that sales leaders and sales operations practitioners are well-advised to adopt.
Tags : 
oracle, b2b, sales intelligence, sales effectiveness, traditional sales cycle, non traditional sales cycle, sales operations, sales research, customer prospects, data center, research
    
Oracle

Email Security Threats: Not Just From the Outside

Published By: Mimecast     Published Date: Feb 13, 2017
Security and risk (S&R) pros have the challenging task of using finite resources (including budget, time, and people) to protect their businesses from every possible attack type. On top of this, S&R pros don’t just need to watch out for threats coming from outside their walls, but must keep an eye on internal threats as well. S&R decision-makers face threats from three groups of insiders – compromised accounts (internal accounts that have been compromised by external attacks), careless misuse (internal policy violators and those who accidentally leak or expose data or systems), and malicious insiders (insiders who purposefully take or misuse data or exploit systems), and they must be prepared for each. In February 2017, Mimecast commissioned Forrester Consulting to evaluate the state of enterprise security readiness for internal email threats.
Tags : 
email security, internal threats, mimecast, forrester
    
Mimecast

Embracing Analytics as a Competitive Strategy for a Midmarket Organization

Published By: IBM     Published Date: Apr 19, 2016
The use of analytics will define the successful midmarket business of the next decade, just as it will define the successful larger organization in this information age. The past decade has seen rapid change in the business climates with an explosion of global competition and economic uncertainty. Despite this, many midmarket companies have thrived by using their size and agility as a competitive advantage. Certainly they have fewer resources than large corporations who are able to invest large sums in IT. However, small yachts can turn and adjust their course much quicker than large cruise ships. The same came be said for midmarket companies. The most successful organizations are ones that can react the quickest to changes in the market place. Midmarket companies can take advantage of their smaller size by being more agile and quicker to change, or even reinvent themselves, to respond to the market.
Tags : 
ibm, ibm pure data system, big data, data analytics, analytics architecture, competitive advantage, midmarket organization, data management
    
IBM

Embracing Analytics as a Competitive Strategy for a Midmarket Organization

Published By: IBM     Published Date: Jul 05, 2016
The use of analytics will define the successful midmarket business of the next decade, just as it will define the successful larger organization in this information age. The past decade has seen rapid change in the business climates with an explosion of global competition and economic uncertainty. Despite this, many midmarket companies have thrived by using their size and agility as a competitive advantage. Certainly they have fewer resources than large corporations who are able to invest large sums in IT. However, small yachts can turn and adjust their course much quicker than large cruise ships. The same came be said for midmarket companies. The most successful organizations are ones that can react the quickest to changes in the market place. Midmarket companies can take advantage of their smaller size by being more agile and quicker to change, or even reinvent themselve
Tags : 
ibm, ibm pure data system, big data, data analytics, analytics architecture, competitive advantage, midmarket organization, knowledge management, data management
    
IBM

Employee-owned Smartphones: Seize the Opportunity

Published By: BlackBerry     Published Date: Jul 22, 2010
As more employees desire to use their personal smartphones for work, IT managers must leverage the opportunity, or risk their organizations missing out on an emerging business trend. It's no longer feasible for an IT department, regardless of company size, to ignore the smartphone push from the majority of the employee population. IT management must attempt to channel the chaos and determine ways to embrace the personal mobility wave while maintaining effective security and management measures, especially in relation to the corporate network. This free whitepaper discusses innovative mobile strategies, new policies, and a fresh approach to allowing smartphones access to corporate resources.
Tags : 
blackberry, mobility, smartphones, rim, cell phones, mobile workforce, e-commerce, handset, touchpoint, mobile computing, mobile data systems, mobile workers, smart phones, wireless application software, wireless communications, wireless hardware, wireless infrastructure, wireless phones, wireless service providers, collaboration
    
BlackBerry

Enterprise Stress Testing Systems from Chartis

Published By: SAS     Published Date: Feb 09, 2016
This report from Chartis provides an independent evaluation and description of leading practices from SAS as well as its competitive position in the market using the Chartis RiskTech Quadrant® for Enterprise Stress Testing Systems. This report also includes a brief look at: • The demand side trends outlining key business and regulatory challenges. • The supply side focusing on the technology landscape for enterprise stress testing. The RiskTech Quadrant® uses a comprehensive methodology of in-depth independent research and a clear scoring system to explain which technology solutions meet an organization’s needs. Chartis considers SAS to be one of the leading vendors of enterprise stress testing systems for the financial services industry.
Tags : 
sas, chartis, enterprise stress testing system, best practices, it management, wireless, knowledge management, data management, business technology
    
SAS

Enterprises in Motion: In-vehicle Network Connectivity

Published By: CradlePoint     Published Date: Sep 04, 2014
In a world where traditional tethers to the central office have all but vanished, enterprises that operate vehicle fleets require constant and dependable mobile Internet connectivity to keep up. Businesses, organizations, and public agencies with vehicle fleets find productivity gains and improved fleet management by deploying dependable mobile connectivity in vehicles. Additionally, travelers and mass transit commuters now expect constant connectivity, and not just through their mobile phones.
Tags : 
constant connectivity, dependable mobile connectivity, cradlepoint, mobile phones, wireless
    
CradlePoint

Entrepreneurs & Managed IT: Putting Big Company Strategies to Work for Small & Mid-Sized Businesses

Published By: Managed Systems, Inc.     Published Date: Aug 14, 2008
No matter the size of the business, technology plays a critical role in its financial success. At the most basic level, companies have to deal with desktop and laptop computers for all their employees, e-mail, access to the Internet, Blackberries, and other kinds of on-site and remote devices. Add networking issues like viruses, spam and bandwidth utilization, and suddenly, this effort becomes a major challenge to anyone operating a small or mid-sized business (SMBs) with limited resources and a limited budget.
Tags : 
network management, smb, small business, medium business, mid-sized business, smb networks, managed systems, it services, outsourcing, outsourced it, managed services, managed systems, tech support, it solutions, security, compliance, disaster recovery, it management, infrastructure, small business networks
    
Managed Systems, Inc.

Environmental Hazards to Peak Performance: Why Network Monitoring is Important for System i Managers

Published By: CCSS     Published Date: May 01, 2008
IT Managers are not in the business of luck. They need to prepare for every disaster scenario, every contingency and ensure that even when every object, job and process is running 100% perfectly on the system, some other unforeseen network element doesn't swoop in and ruin all their efforts, just because it resides outside the parameters of the System i. After all, in a situation like this, people remember the one thing that went wrong – not the millions of things that went right – it's unfortunate, but that's life.
Tags : 
network, network management, network monitoring, ccss, networking, monitoring, network performance
    
CCSS

Equinix Customer Success Story: Global Consulting and Technology Company

Published By: Equinix     Published Date: Mar 26, 2015
The client had an extensive global multiprotocol label switching (MPLS) network with over 30 Gbps of bandwidth. However, the client was experiencing bandwidth growth of >30% compound annual growth rate (CAGR) and foresaw increasing demands for multi-media applications, data center to data center traffic, and cloud solution usage to support its business units and global workforce. It became crucial for the client to re-architect their current network to support growth and provide a globally consistent user experience at lower cost. With 40% of their WAN traffic being http internet traffic, they needed regional internet service provider (ISP) breakouts. The client needed a lower cost/MB high capacity WAN backbone for better application performance and cloud optimization. Their network needed to be scalable to poise them for anticipated growth and offer improved site connectivity options.
Tags : 
bandwidth growth, multi-media applications, data center, cloud solution, internet service provider, cloud optimization, enterprise applications
    
Equinix
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.