fte

Results 251 - 275 of 1906Sort Results By: Published Date | Title | Company Name
Published By: Juniper Networks     Published Date: Oct 25, 2017
As IT becomes the cloud, and ever more central to business success, projects to transform the IT systems, and more specifically the data center, have become strategic and a competitive differentiator. A crucial piece of the data center transformation puzzle, and one which is too often left until the end, is the network. As the central nervous system of the data center, its transformation must be an integral part of the entire data center transformation project.
Tags : 
data management, data system, business development, software integration, resource planning, enterprise management, data collection
    
Juniper Networks
Published By: Juniper Networks     Published Date: Oct 25, 2017
The primary purpose of containerized applications is to improve the effectiveness of software teams, making it easier for people to work together while lowering the communications overhead. In large enterprises, applications such as ERP or CRM software suites often begin as simple projects, but as time passes, they quickly become clunky and inefficient, with a monolithic code base that slows progress for development teams.
Tags : 
data management, data system, business development, software integration, resource planning, enterprise management, data collection
    
Juniper Networks
Published By: Juniper Networks     Published Date: Oct 25, 2017
My name is Jonathan McCaffrey and I work on the infrastructure team here at Riot. This is the first post in a series where we’ll go deep on how we deploy and operate backend features around the globe. Before we dive into the technical details, it’s important to understand how Rioters think about feature development. Player value is paramount at Riot, and development teams often work directly with the player community to inform features and improvements. In order to provide the best possible player experience, we need to move fast and maintain the ability to rapidly change plans based upon feedback. The infrastructure team’s mission is to pave the way for our developers to do just that - the more we empower Riot teams, the faster features can be shipped to players to enjoy.
Tags : 
technology efficiency, market dynamics, data privacy, data security, device management, platform management, enterprise management
    
Juniper Networks
Published By: Intel     Published Date: Jul 17, 2019
Today, business is conducted in a fast-paced, on-demand, globally dispersed environment. Maintaining a competitive edge requires cohesive real-time collaboration. Mobile workers, partners, vendors, suppliers, and even customers expect to be able to work together seamlessly, both inside and outside the firewall. But delivering tools for high-quality collaboration is often challenging, due to the need for businesses of all sizes to support a wide range of personal and business devices. Mixing disparate devices with complex conferencing solutions often lead to frustrated employees, while businesses face a labor-intensive, costly endeavor without a high ROI. In addition, collaboration is evolving with businesses creating small "huddle" spaces and open workspaces that increase the demand for ubiquitous, effective conferencing. The Intel Unite ' solution is a fast, simple, cost-efficient way to deliver a more secure, manageable, high-quality collaboration experience. Whether you select the
Tags : 
    
Intel
Published By: Absolute Software     Published Date: May 31, 2016
With companies embracing mobility to maintain competitive advantage in the digital era, information security threats have increased exponentially. Userfriendly technologies such as mobile devices, mobile apps, and cloud storage are often hacker-friendly too, creating opportunities for cybercriminals to covertly infiltrate company data. This opens the door to data loss, reputational damage, loss of proprietary information – not to mention the associated regulatory penalties and potential legal fees. IT bears the brunt of responsibility for information security, yet according to Forrester, internal incidents top the list of security breach causes in 2014.
Tags : 
mobility, competitive advantage, best practices, mobile devices, mobile applications
    
Absolute Software
Published By: Adobe     Published Date: Feb 09, 2016
Today’s ultra-connected consumers are interacting with brands more often and in more places than ever. In fact, the average customer comes in contact with a brand at least five times before buying — whether it’s a Google search, an in-store visit or downloading an app.
Tags : 
customer experience, customer interaction, reinventing the customer experience, marketing experiences, customer
    
Adobe
Published By: Adobe     Published Date: Feb 09, 2016
Today’s ultra-connected consumers are interacting with brands more often and in more places than ever. In fact, the average customer comes in contact with a brand at least five times before buying — whether it’s a Google search, an in-store visit or downloading an app.
Tags : 
customer experience, customer interaction, reinventing the customer experience, marketing experiences, customer
    
Adobe
Published By: Adobe     Published Date: Feb 10, 2016
Today’s ultra-connected consumers are interacting with brands more often and in more places than ever. In fact, the average customer comes in contact with a brand at least five times before buying — whether it’s a Google search, an in-store visit or downloading an app.
Tags : 
customer experience, customer interaction, reinventing the customer experience, marketing experiences, customer
    
Adobe
Published By: Adobe     Published Date: Apr 25, 2016
Diese Entwicklung lässt sich zwar mit Statistiken (siehe Seitenleiste) belegen, am deutlichsten zeigt sie sich jedoch im täglichen Leben. Sei es der Jogger, der sein Laufpensum mit dem Telefon überprüft, die Mutter, die sich mit ihren Kindern den Nachthimmel über eine Astronomie-App auf dem Tablet ansieht, der Hauseigentümer, der mithilfe einer Zeitschriften-App in der Lage ist, selbst eine Reparatur durchzuführen, oder jeder Kunde, der sich sein Getränk an einem „Coke Freestyle“-Automaten zusammenstellt oder seinen morgendlichen Kaffee über die Starbucks-App bestellt. Die Liste ließe sich beliebig fortführen.
Tags : 
mobile lifecycle, mobile device management
    
Adobe
Published By: Adobe     Published Date: Apr 25, 2016
Im Zuge der Entwicklung des digitalen Ökosystems um das traditionelle Marketing entstanden isolierte Abteilungen, was unterschiedliche Botschaften, Kampagnen und Erlebnisse zur Folge hatte. Zur Schaffung einheitlicher und ansprechender Erlebnisse auf allen Kanälen ist großes Engagement im gesamten Unternehmen erforderlich.
Tags : 
marketing, customer experience
    
Adobe
Published By: Adobe     Published Date: Feb 02, 2017
Geschäfte fünfmal schneller abschließen und Dokumente in Echtzeit verfolgen.
Tags : 
    
Adobe
Published By: Adobe     Published Date: Feb 02, 2017
Die Möglichkeit zur schnellen Erstellung und Bereitstellung professioneller Personalunterlagen verschafft Unternehmen einen entscheidenden Wettbewerbsvorteil, wenn es darum geht, Fachkräfte zu gewinnen und zu halten.
Tags : 
    
Adobe
Published By: Sage     Published Date: Nov 05, 2012
With many companies finding themselves under prepared for the downturn, they turned to often poorly structured forecasts on which to make business decisions. Where are the problems? Read this white paper to learn how forecasting can help in 3 ways.
Tags : 
sage, construction, forecasting, sage erp evision software, erp solutions
    
Sage
Published By: Riverbed     Published Date: Jul 17, 2013
Effective IT planning and decision making are dependent upon having a complete asset inventory and an accurate understanding about dependencies available before, during and after IT change activities. Application discovery and dependency mapping (ADDM) solutions automate the process of discovering and mapping transactions and applications to the underlying infrastructure and application interdependencies. Learn how Riverbed Cascade’s built-in application discovery and dependency mapping capabilities can help you shorten project times and mitigate risk.
Tags : 
effective it, addm, application discovery, riverbed cascade
    
Riverbed
Published By: NAVEX Global     Published Date: Oct 18, 2016
This paper summarises: What the new FCA whistleblower rules are and why they were introduced, how the rules will impact your company’s ethics and compliance efforts and what actions to take both before and after the rules are fully enforced
Tags : 
    
NAVEX Global
Published By: Avaya     Published Date: Jan 23, 2015
This paper takes a look at some of the top challenges the midmarket is facing as well as considerations to keep in mind when choosing a UC&C option. After a rough few years, the midmarket is no longer putting off investing in technology. According to KPMG, 60 percent of midmarket companies plan to increase capital spending, with the highest priority being information technology.
Tags : 
challenges of midmarket, midmarket companies, midmarket trends
    
Avaya
Published By: SolidFire_NetApp     Published Date: May 10, 2016
Quality of service (QoS) is a critical enabling technology for enterprises and service providers wanting to deliver consistent primary storage performance to business-critical applications in a multi-tenant or enterprise infrastructure. The type of applications that require primary storage services typically demand greater levels of performance than what is readily available from traditional storage infrastructures today. However, simply providing raw performance is often not the only objective in these use cases. For a broad range of business-critical applications, consistent and predictable performance are the more important metrics. Unfortunately, neither is easily achievable within traditional storage arrays.
Tags : 
storage management, performance management, best practices, application integration, technology, business intelligence
    
SolidFire_NetApp
Published By: Puppet     Published Date: Aug 03, 2016
After you set up your users and groups, the next thing you’ll want to do is configure the software running on your machines. In this webinar, you’ll get a taste of the many kinds of services and packages Puppet can manage on Windows. We’ll present some common use cases that will help you get some quick wins under your belt, including: - Managing Windows services (Windows Time, Disk Defragmenter, etc.) - Installing packages - Managing Windows maintenance tasks via WMI by executing arbitrary PowerShell code - Creating scheduled tasks in the Task Manager Puppet can do a lot, but we always recommend starting small and building on your success. Make 2016 the year you banish manual configuration for good!
Tags : 
    
Puppet
Published By: CloudHealth by VMware     Published Date: Apr 15, 2019
While cost is often cited as the reason why people move to the cloud, it's not always that simple. Many organisations have noticed cloud bills 2-3x higher than expectations, when not managed properly. Have you achieved the savings you expected? Learn 10 ways you can reduce your spend in AWS, including: Terminate Zombie Assets Rightsize EC2 Instances & EBS Volumes Upgrade instances to the latest generation Delete Disassociated Elastic IP Addresses Check out this eBook to find out how you can better manage your costs through pro-tips from cloud experts.
Tags : 
    
CloudHealth by VMware
Published By: Schneider Electric     Published Date: Aug 21, 2017
Data center migrations are often complex and risky. These best practices will help I&O leaders invest the appropriate amount of time and money into planning, execution and testing in order to protect the business and maximize the chances of a successful data center migration.
Tags : 
data center, data center management, best practices, data center migration
    
Schneider Electric
Published By: Schneider Electric     Published Date: Oct 31, 2017
Most successful data center migration projects share similar practices, such as expertise, preparation, management, execution, communication and business alignment. The purpose of this research is not to provide an extensive examination of each one of these practices. Rather, it is to provide a pragmatic list of best practices. This list was derived from observations of numerous Gartner clients involved in data center migration projects over the last six years.
Tags : 
planning, contingency plan, testing, migration, preparation, project team, audit, closure
    
Schneider Electric
Published By: CA Technologies     Published Date: Sep 25, 2017
Agile may be simple, but it still takes work. Often, organizations fail to adopt agile methods for similar reasons, and many of these reasons are cultural. From checkbook commitment and lack of executive support to ineffective retrospectives and bad product ownership, this e-book describes the 12 agile failure modes to avoid so you can succeed with your own agile transformation.
Tags : 
leadership, workflow, congruence, transition, ca technologies
    
CA Technologies
Published By: CA Technologies     Published Date: Sep 25, 2017
Protecting privileged access and preventing breaches remains an urgent concern for companies of all sizes. Attackers are using a wider range of more sophisticated methods to infiltrate vulnerable systems. And although news of external breaches often dominates headlines, organizations must also be able to defend against insider threats.
Tags : 
threat analytic systems, siems, firewalls, entity optimization, fraud prevention, ca technologies
    
CA Technologies
Published By: CA Technologies     Published Date: Sep 25, 2017
Several years into the app economy, business has changed. Accelerating product cycles and competitive threats now demand continuous planning. Change is constant and managing it is more important than ever. As a result, companies that for years have taken a traditional approach to managing initiatives are moving rapidly to implement agile business practices. And they’re seeing results, in the form of improved quality, faster delivery of value, reduced development costs and increased customer satisfaction. But this transition also creates new challenges and responsibilities for the project management office (PMO). In fact, the success of the transformation often hinges on the PMO’s ability to expand the underlying concepts of the agile development methodology into a companywide ethos¬—a concept known as business agility.
Tags : 
decision making, strategically, tools, pmo, entrepreneurial spirit, business, ca technologies
    
CA Technologies
Published By: Tenable     Published Date: Aug 07, 2018
The DevOps model drives digital transformation and the rapid delivery of new software products and services. However, this process largely takes place outside the purview of information security (InfoSec), often without their involvement. As a result, security teams struggle to keep pace. This whitepaper explores the intersection of DevOps and InfoSec, offering three reasons why security organizations will benefit by combining these two practices.
Tags : 
devops, dev sec ops, infosec, container security, idg, digital transformation
    
Tenable
Start   Previous    4 5 6 7 8 9 10 11 12 13 14 15 16 17 18    Next    End
Search      
Already a subscriber? Log in here
Please note you must now log in with your email address and password.