hie

Results 401 - 425 of 2277Sort Results By: Published Date | Title | Company Name
Published By: CA Technologies     Published Date: Jun 09, 2015
Today’s organizations are challenged to be the first to market with ‘The Next Big Thing’. They must innovate with new and unique services to satisfy customer demands and differentiate themselves in the marketplace. Software drives that innovation and has turned every organization into a software organization. This Executive Brief describes how the efficient collaboration between the development and IT operations teams can bring high-quality applications to market as quickly as possible. The CA Application Delivery suite helps organizations achieve collaborative DevOps through innovative technology tools used to: •Accelerate application development by removing constraints with CA LISA® Service Virtualization. •Expedite release time with CA LISA® Release Automation. •Improve application testing and quality with CA LISA® Pathfinder
Tags : 
    
CA Technologies
Published By: IBM     Published Date: Jul 13, 2012
The new, more accessible workplace needs to be, in a word, manageable. This IBM white paper examines how today's workplace can ultimately help create greater enterprise value and offers best practice for how to best harness a flexible workplace to improve the effectiveness and efficiency of enterprises and institutions.
Tags : 
ibm, technology, workplace, budget, security, productivity, white paper
    
IBM
Published By: IBM     Published Date: Oct 19, 2015
Read this new whitepaper to learn about the seven essential elements needed to achieve the highest performance
Tags : 
ibm, performance, scalability, information, intgration, data volume, enterprise
    
IBM
Published By: IBM     Published Date: Oct 26, 2016
Predictive analytics has come of age. Organizations that want to build and sustain competitive advantage now consider this technology to be a core practice. In this white paper, author Eric Siegel, PhD, founder of Predictive Analytics World, reveals seven strategic objectives that can only be fully achieved with predictive analytics.
Tags : 
ibm, predictive analytics, analytics tools, advanced analytics
    
IBM
Published By: IBM     Published Date: Jan 18, 2017
The synergy between predictive analytics and decision optimization is critical to good decision making. Predictive analytics offers insights into likely future scenarios, and decision optimization prescribes best-action recommendations for how to respond to those scenarios given your business goals, business dynamics, and potential tradeoffs or consequences. Together, predictive analytics and decision optimization provide organizations with the ability to turn insight into action—and action into positive outcomes. In this white paper, you’ll gain a better understanding of: The difference between predictive and prescriptive analytics How predictive and prescriptive actions complement one another to help you achieve optimized business decisions IBM’s approach to creating a powerful end-to-end decision management system
Tags : 
ibm, predictive analytics, decision optimization, synergy, decision making, business goals, prescriptive analytics, decision management
    
IBM
Published By: IBM     Published Date: Jan 18, 2017
Predictive analytics has come of age. Organizations that want to build and sustain competitive advantage now consider this technology to be a core practice. In this white paper, author Eric Siegel, PhD, founder of Predictive Analytics World, reveals seven strategic objectives that can only be fully achieved with predictive analytics. Read this paper to learn how your organization can more effectively: Compete – Secure the most powerful and unique competitive stronghold Grow – Increase sales and retain customers competitively Enforce – Maintain business integrity by managing fraud Improve – Advance your core business capacity competitively Satisfy – Meet today's escalating consumer expectations Learn – Employ today's most advanced analytics ....and finally, render your business intelligence and analytics actionable.
Tags : 
predictive analytics, increase sales, customer retention, fraud management, consumer expectations
    
IBM
Published By: IBM     Published Date: Jul 26, 2017
Every day, torrents of data inundate IT organizations and overwhelm the business managers who must sift through it all to glean insights that help them grow revenues and optimize profits. Yet, after investing hundreds of millions of dollars into new enterprise resource planning (ERP), customer relationship management (CRM), master data management systems (MDM), business intelligence (BI) data warehousing systems or big data environments, many companies are still plagued with disconnected, “dysfunctional” data—a massive, expensive sprawl of disparate silos and unconnected, redundant systems that fail to deliver the desired single view of the business. To meet the business imperative for enterprise integration and stay competitive, companies must manage the increasing variety, volume and velocity of new data pouring into their systems from an ever-expanding number of sources. They need to bring all their corporate data together, deliver it to end users as quickly as possible to maximize
Tags : 
scalability, data warehousing, resource planning
    
IBM
Published By: Oracle     Published Date: Sep 14, 2015
Dieser Bericht zeigt wie mit Oracle Sales Cloud ein moderner Vertrieb aufgebaut werden kann. Erfahren Sie hier wie Sie im Zeitalter der digitalen Kunden erfolgreicher verkaufen können.
Tags : 
sales. sell faster and more easily, social selling, customer satisfaction, customer engagement, sales reps
    
Oracle
Published By: Qualys     Published Date: Jul 19, 2012
Updated for PCI DSS Version 2.0 where internal scanning is now required! With the recent updates to PCI DSS, get all the facts and learn how to comply with our updated version of the book. The book is a guide to understanding how to protect cardholder data and comply with the requirements of PCI DSS. It arms you with the facts, in plain English, and shows you how to achieve PCI Compliance. Discover: . What the Payment Card Industry Data Security Standard (PCI DSS) is all about . The 12 Requirements of the PCI Standard . How to comply with PCI . 10 Best-Practices for PCI Compliance . How QualysGuard PCI simplifies PCI compliance
Tags : 
pci, technology, security, firewall, email, virus protection
    
Qualys
Published By: New Relic     Published Date: Apr 07, 2015
This white paper will help you understand how you can achieve end-to-end visibility into application performance no matter where your application or parts of your application are running. You’ll learn what to look for when choosing an application performance monitoring solution and we’ll share some lessons learned about monitoring applications in the cloud.
Tags : 
    
New Relic
Published By: New Relic     Published Date: Apr 07, 2015
At Zendesk, they see using New Relic and Rackspace® solutions as a winning combination. New Relic allows them to understand the performance characteristics of their application, to monitor performance and quickly drill down to find and resolve issues. Additionally, New Relic shows Zendesk how their application interacts with the Rackspace infrastructure underpinnings so they can achieve the most effective and efficient use of their hosting environment. Together the Rackspace hosting environment and the New Relic application performance tool creates a foundation for SaaS application success. In turn, this frees up the Zendesk team to work on application features.
Tags : 
    
New Relic
Published By: Oracle PaaS/IaaS/Hardware     Published Date: Jul 25, 2017
A hardware and software system specifically designed for the database software to optimize database operations, both for performance and administrative simplicity. An environment that supports workload consolidation, thereby reducing the number of physical servers required for the databases in question. Benefits: Reduced cost and optimal performance.
Tags : 
    
Oracle PaaS/IaaS/Hardware
Published By: Oracle PaaS/IaaS/Hardware     Published Date: Jul 25, 2017
The whitepaper is intended for security practitioners as well as developers and administrators of applications who can benefit from secure communications. The paper presents carious strategies for securing applications using Oracle Solaris 11 security and hardware-assisted cryptographic acceleration features of Oracle's SPARC processors. The paper unveils the core mechanisms, configuration, and deployment strategies, as well as the role of relevance of using Oracle Solaris Cryptographic Framework and Java Cryptography Extension-based techniques for delivering a high-performance, end-to-end security solution. With Oracle's new Software in Silicon capabilities coupled with an innovation cache and memory hierarchy, Oracle's SPARC M7 processor delivers dramatically higher processing speed and revolutionary protection against malware and software errors.
Tags : 
    
Oracle PaaS/IaaS/Hardware
Published By: Sitecore EMEA     Published Date: Jan 23, 2018
The global beauty company provides an exhilarating example of the power of context-driven commerce. When customers can rely on brands to achieve the outcomes that are important to them, brand owners can shift their focus from nonstop customer acquisition to long-term customer engagement. The Sitecore Experience Platform and the underlying Sitecore Experience Database are foundation technologies for IT organizations wanting to implement context-driven commerce environments that function elegantly today and into the future. Sitecore puts an end to digital retailers’ obsession with cart abandonment, replacing it with opportunities to delight customers with personal, meaningful commerce offers.
Tags : 
advertising, revenue, customers, social channels, sitecore
    
Sitecore EMEA
Published By: Adobe     Published Date: Mar 21, 2017
When it comes to audience engagement, the landscape has been completely rewritten. Media and entertainment companies need to embrace new technologies to achieve revenue goals.
Tags : 
    
Adobe
Published By: JBoss Developer     Published Date: Oct 21, 2016
Microservices architecture is a new architectural style for creating loosely coupled but autonomous services. Emerging trends in technology—such as DevOps, Platform-as-a-Service (PaaS), containers, and continuous integration and delivery (CI/CD) methods—let organizations create and manage these modular systems on an unprecedented scale that exceeds earlier approaches like service-oriented architecture (SOA). But organizations that refactor monolithic applications into microservices experience widely varying degrees of success. The key to using microservices effectively is a solid understanding of how and why organizations should use microservices to build applications
Tags : 
microservices, architecture, java, paas, soa
    
JBoss Developer
Published By: JBoss Developer     Published Date: Oct 21, 2016
In April 2014, Nissan opened a new production plant in Rio de Janeiro, Brazil with an annual production capacity of 200,000 vehicles and 200,000 engines. Along with a target of reaching 5% market share in Brazil by 2016, the plant’s opening was aligned with Nissan’s efforts to achieve 8% global market share, part of the “NISSAN POWER 88” five-year mid-term management plan initiated in 2011. To help align their strategic and business goals with their use of technology, Nissan chose Red Hat JBoss BRMS to replace their legacy system.
Tags : 
nissan, production, it optimization, strategic partners, data
    
JBoss Developer
Published By: B Channels     Published Date: Dec 03, 2018
Long recognized as the market share leader of enterprise backup and recovery software, Veritas NetBackup™ is built to protect the largest and most demanding multi-cloud and data center environments. NetBackup delivers breakthrough capabilities for virtualized and cloud-based deployments that go well beyond what traditional backup practices can achieve.
Tags : 
    
B Channels
Published By: Proofpoint     Published Date: Aug 21, 2017
Bei BEC-Attacken werden häufig CFOs oder Mitarbeiter der Personal- bzw. Finanzabteilung oder der Lohnbuchhaltung gezielt angegriffen. Mit einer als „Spoofing“ bezeichneten Methode werden die Opfer getäuscht und davon überzeugt, dass die erhaltene E-Mail von ihrem Vorgesetzten, einem Kollegen, einem Lieferanten oder einem Geschäftspartner stammt. Der Betrüger fordert den Empfänger zur Tätigung einer Überweisung oder zur Weitergabe von Steuerunterlagen oder anderer vertraulicher Daten auf.
Tags : 
geschäftsführer, chief financial officer, personalabteilung, finanzabteilung, lohnbuchhaltung
    
Proofpoint
Published By: Rackspace     Published Date: Feb 01, 2019
Whether you’re already a Google customer or simply getting started with the public cloud, Google Cloud Platform (GCP) is an aordable, reliable, innovative and intuitive cloud solution. Rackspace can help you accelerate innovation and cost savings by taking over the intensive dayto-day operations of GCP — letting you focus on achieving your core business objectives while optimizing the performance of your applications. Rackspace works with customers to identify the scope and criticality of their applications and determine the service level that best addresses their needs. To discover how, download this whitepaper today.
Tags : 
    
Rackspace
Published By: IBM APAC     Published Date: Jun 24, 2019
Every organization strives for more cyber resilience. The Ponemon Institute’s fourth annual study on “The Cyber Resilient Organization” uncovered that there is a set of habits or practices that the most cyber resilient organizations undertake to achieve greater states of cyber resilience. Download this report to review the key findings; including: • The impact of the skills gap • How complexity can be the enemy of cyber resilience • Lessons learned from high achieving cyber resilient organisations • The importance of incorporating the privacy function in your strategy. Join the IBM Security online community to learn from the shared knowledge and experiences of your peers and IBM Cyber Elites to tackle complex business problems.
Tags : 
    
IBM APAC
Published By: Schneider Electric     Published Date: Apr 23, 2019
After buzzing Industry 4.0 all over the media by all OT and IT experts, today, a few key concepts seem to unveil the potential that the industry believes is behind Industry 4.0. These include: Smart Machines, Smart Factory, cyber physical systems, Everything-as-a-Service and a few technologies like OPC UA, cloud and data analytics. Clearly, they are the innovation drivers and must-haves for every vendor of automation products that want to be recognized as leaders or challengers. Sooner or later they will become standards and used by followers and niche players, but the key question for the market of automation suppliers is not who is first in developing and providing all the nice concepts and technologies, but who is creating and combining them in the right way so that they can be turned into new revenue streams. We keep in mind that competitive advantages can be achieved through increasing operational efficiency, but the better way is through strategic uniqueness. Companies which ar
Tags : 
industry 4.0, iiot, smart machines, smart manufacturing, business models
    
Schneider Electric
Published By: CA Mainframe     Published Date: Sep 12, 2008
Compliance requires strong security controls for mainframe environments also. This white paper discusses some major challenges that mainframes bring to compliance, and some key issues that need to be addressed. It also presents some key technologies and approaches that you can use to help you achieve easier compliance for your mainframe systems.
Tags : 
ca mainframe, mainframe, compliance
    
CA Mainframe
Published By: F5 Networks Inc     Published Date: Oct 19, 2012
Whether critical applications live in the cloud, in the data center, or both, organizations need a point of control for application security. Learn how you can achieve the security, intelligence, and performance that today's infrastructure demands.
Tags : 
cloud security, securing applications in the cloud, securing data in the cloud, secure web applications, web application firewall
    
F5 Networks Inc
Published By: Macquarie Telecom     Published Date: Jan 11, 2011
How hosted data center services eliminate the daily pain and frustration of managing your IT infrastructure.
Tags : 
macquarie telecom, hosted data center services, it infrastructure, chief information officer, cio, oursourcing, productivity
    
Macquarie Telecom
Start   Previous    10 11 12 13 14 15 16 17 18 19 20 21 22 23 24    Next    End
Search      
Already a subscriber? Log in here
Please note you must now log in with your email address and password.