pos systems

Results 126 - 150 of 172Sort Results By: Published Date | Title | Company Name
Published By: BMC Software     Published Date: Oct 21, 2013
In this Industry Insight, BMC discusses how utilizing a SaaS approach to IT Service Management can position your IT organization to best manage the growing number of cloud-based services along with your enterprise’s internal systems.
Tags : 
bmc, bmc software, itsm, service mangement, it management, itil, cloud, cloud service, application integration
    
BMC Software
Published By: ForgeRock     Published Date: Mar 10, 2015
In the modern age, customers are in control of when, where, and how they consume information. In this environment, customer-focused companies strive to make their content available to an ever-growing number of connected users and devices on a much larger scale than ever before, and to gather as much data and insight from these interactions as possible. To achieve this securely, companies need identity and access management (IAM) platforms that are adaptable, scalable, responsive, and high velocity— not typical characteristics of employee-facing IAM, but all too typical of other systems of engagement. This species of solution is worthy of a unique name: identity relationship management (IRM).
Tags : 
iam, irm, forrester, forgerock, platforms, relationship management
    
ForgeRock
Published By: Rackspace     Published Date: Jan 19, 2016
Keeping up with innovation and contributing to the business’s core objectives seems like the impossible task for an IT leader when having to maintain current systems. How does a business best leverage third party services to maximize resources and impact to the business?
Tags : 
outsourcing, it growth, it spend, it operations, it maintenance, it innovation, big data, data security, cloud, hybrid cloud, hosting, hosting providers
    
Rackspace
Published By: Eaton     Published Date: Jan 26, 2016
When working with data center and commercial facility electrical systems, shocks of 100mA to more than 2,000mA are possible—definitely in the realm of serious harm to humans and property. Energized electrical equipment also presents the risk of arc flash caused by electrical faults that produce powerful explosions. When dealing with commercial and industrial electrical systems, such as uninterruptible power systems (UPSs) and their batteries, data center and facilities managers need to be aware of these risks, especially since some repair and maintenance procedures require working with a unit that is still energized. There are ways to minimize the risks to employees, equipment and the field technician performing the service. This paper answers some common questions about UPS maintenance, how to reduce the risks associated with servicing UPSs and batteries, and how to qualify a UPS service provider.
Tags : 
eaton, ups safety, data center, arc flash, energized electrical equipment, facility managers, ups maintenance
    
Eaton
Published By: Tripwire     Published Date: Apr 28, 2008
Learn more about the security risks and vulnerabilities faced by organizations, and the elements of a proactive security approach. Then find out how Tripwire helps organizations attain and maintain a good security posture using industry-leading configuration assessment and change auditing to harden systems against security breaches, automate compliance with security standards and policies, identify configuration changes, and resolve vulnerabilities.
Tags : 
tripwire, security, risk management, configuration management, change management, change audit, change auditing, security policies
    
Tripwire
Published By: IBM     Published Date: May 09, 2016
Agile methods have proven effective for software development and have grown in popularity across a number of software disciplines. Agile methods build capabilities using an iterative approach, as opposed to traditional approaches where requirements are defined early and designs are completed in full before a single line of code is written. Agile incrementally defines requirements with priorities, partial component designs and working systems that evolve through iterations called sprints. The question remains, however: Do the 12 agile principles apply to more than just software? Agile principles are in line with lean management’s approach. Given that, it seems as though agile principles should directly apply beyond software development. However, the answer is not straightforward, because differences between software and physical components affect how agile is applied. Let’s explore how agile can be applied in light of these differences.
Tags : 
ibm, continuous engineering, watson, iot, internet of things, agile, product development
    
IBM
Published By: IBM     Published Date: Sep 30, 2016
Gartner, Inc. has positioned IBM Security as a leader in providing Intrusion Prevention Systems (IPS) appliances in the newly published Gartner Magic Quadrant for IPS technology.
Tags : 
ibm, security, network protection, ibm security network protection, intrusion prevention systems, ips, gartner
    
IBM
Published By: IBM     Published Date: Apr 04, 2013
SAP users have been slow to adopt cloud computing, but IBM PureFlex Systems offer the potential to transform the server, storage and network infrastructures that support SAP enterprise environments and extend management services to non-SAP applications. Read this executive summary to learn how PureFlex Systems can dramatically reduce costs and cycle times.
Tags : 
itg summary, value propisition, ibm pureflex systems, ibm systems, costs, cycle times, sap
    
IBM
Published By: IBM     Published Date: Sep 27, 2013
SAP users have been slow to adopt cloud computing, but IBM PureFlex Systems offer the potential to transform the server, storage and network infrastructures that support SAP enterprise environments and extend management services to non-SAP applications. Read this executive summary to learn how PureFlex Systems can dramatically reduce costs and cycle times.
Tags : 
ibm, ibm pureflex system, sap, cloud, sap enterprise environments, cloud computing, storage, networking, database management, infastructure, it solutions
    
IBM
Published By: Oracle     Published Date: Nov 13, 2013
Being responsible for one-third of a business’ success already puts HR in a critical role. But it’s not just about finding the best people—it’s about finding the best people, at the lowest cost, with the lowest possible attrition and the best possible performance. And it’s about guiding your executive team to the right decisions using the language they understand best: numbers. Talent management—covering everything from recruiting and compensation to ongoing education and retention—has traditionally been managed in silos, with a series of disparate systems and disconnected processes and reports. In today’s data-driven world, CEOs demand more. This new study conducted by HR.com explores what’s working for organizations today and the biggest gaps to fill.
Tags : 
zenithoptimedia, oracle, successful hr leadership, talent management, core business strategy, human resources, transactional to strategic, financial decisions, smart recruiting, talent scarcity and recruitment, technology advances, competitive compensation, quality of hire, hire smartly
    
Oracle
Published By: IBM     Published Date: Jan 09, 2014
This IDC analyst white paper discusses an important sea change happening in IT: the development of expert integrated systems. Converged systems are becoming increasingly important in the systems market. Similarly, convergence is occurring in middleware core runtime services for application development and deployment that are being unified as an enterprise application platform. Given the similarity in derived value propositions, converged systems and platforms are coming together as integrated systems; with the addition of capabilities focused on deployment, management, and optimization, integrated systems become expert integrated systems.
Tags : 
ibm, pureflex, integrated systems, pureflex system, legacy solution, uefi code, system management, platform infrastructure, system security, ibm pureflex, intrachassis communication
    
IBM
Published By: IBM     Published Date: May 09, 2014
Agile methods have become increasingly popular because they empower organizations to more quickly address emerging opportunities, to better ensure accurate fulfillment of functional requirements and to significantly enhance team productivity. Many organizations, however, are hesitant to employ agile methods for their safety-critical systems—since they have serious concerns about compromising those systems and thereby exposing themselves to completely unacceptable consequences.IBM Rational Chief Evangelist Bruce Powel Douglass explains how best practices for project management can assist organizations in experiencing all the benefits of agile development while continuing to maintain rigorous standards essential for successful delivery of safety-critical systems.
Tags : 
ibm, agile development, product development, agile methods, safety critical systems development, project management, productivity
    
IBM
Published By: Cisco     Published Date: Dec 21, 2016
Cisco commissioned Forrester Consulting to conduct a Total Economic Impact™ (TEI) study and examine the potential return on investment (ROI) enterprises may realize by deploying the Cisco Data Virtualization solution. The purpose of this study is to provide readers with a framework to evaluate the potential financial impact of investing in the Cisco Data Virtualization solution for their organizations. To better understand the benefits, costs, and risks associated with Cisco Data Virtualization, Forrester gathered data through interviews with customers who had multiple years’ experience using the solution. All organizations used Cisco Data Virtualization as a single data virtualization integration platform to query and access data across their network. This includes accessing data that resides on the cloud and on-premises across various sources and systems.
Tags : 
    
Cisco
Published By: Cisco     Published Date: Dec 21, 2016
It’s possible to lead the world in an industry—medicine in this case—and to simultaneously lag behind when it comes to network security. One large national hospital system faced serious IT challenges. Network investment had been put off to the point of opening critical security vulnerabilities. A massive attack surface and limited visibility meant a threat could penetrate the network and remain hidden for months. It put critical systems, employees, patients, and the hospital’s reputation at risk.
Tags : 
    
Cisco
Published By: Domino     Published Date: Oct 05, 2018
Industry 4.0 promises a whole host of benefits to food manufacturers — from reduced errors and more uptime to unprecedented visibility into operations at every step in the process. But for many food manufacturers out there, this is uncharted territory. Getting machines of various vintages connected and communicating seamlessly with each other and with existing control systems can seem like an expensive and difficult proposition. Coding and marking is a great place to start for many companies, since SKU proliferation is putting greater demands on packaging lines and introducing additional opportunities for human error. In this brief white paper, Domino examines five key issues with integrating coding and marking systems that often present challenges for food manufacturers along the road to Industry 4.0.
Tags : 
    
Domino
Published By: Business.com     Published Date: Oct 09, 2012
POS or point-of sale systems are commonly used in retail stores, restaurants, stadiums, hotels, and casinos. The basic use of these systems is to scan items for purchase, place inorders and/or calculate bills.
Tags : 
pos, point of sale systems, pos systems, pos software
    
Business.com
Published By: Attivio     Published Date: Apr 07, 2010
In this paper, well known data management authority Mark Albala proposes replacing the reliance on data models as the fixed navigation scheme used for storing, reporting and analyzing information with a new unified information access capability that enables more agile, insightful and pro-active decisions.
Tags : 
attivio, post-discovery intelligent application, analytic information delivery, business intelligence, enterprise applications, executive information systems, eis
    
Attivio
Published By: SAS     Published Date: Feb 09, 2016
This report from Chartis provides an independent evaluation and description of leading practices from SAS as well as its competitive position in the market using the Chartis RiskTech Quadrant® for Enterprise Stress Testing Systems. This report also includes a brief look at: • The demand side trends outlining key business and regulatory challenges. • The supply side focusing on the technology landscape for enterprise stress testing. The RiskTech Quadrant® uses a comprehensive methodology of in-depth independent research and a clear scoring system to explain which technology solutions meet an organization’s needs. Chartis considers SAS to be one of the leading vendors of enterprise stress testing systems for the financial services industry.
Tags : 
sas, chartis, enterprise stress testing system, best practices
    
SAS
Published By: Wheelhouse     Published Date: Aug 13, 2013
There are lots of possible reasons you might want to switch to a new phone system. The old one might cost too much or be too troublesome to operate and maintain. It might not be flexible enough. It might not be reliable enough. Or it just might not have the kinds of features and capabilities that you need in today’s competitive business climate. But even the thought of switching can be intimidating. There is an enormous number of factors to consider. They have to do with cost, features, technical complexity and other issues. And the impact of each factor varies depending on what kind of system you’re changing from. In short, when it comes to switching phone systems, nothing is simple or straightforward.
Tags : 
phone systems, wheelhouse, idg
    
Wheelhouse
Published By: Wheelhouse     Published Date: Aug 13, 2013
The key to understanding the evolving role of VoIP is recognizing that it’s a lot more than just another method for making voice calls. Buying VoIP means more than simply replacing your existing phone system with a functionally identical one running over an IP network. In fact, the underlying IP technology makes possible great advances in the convenience and capabilities of phone systems. Most important of these is that it allows the integration of voice calling with multiple other methods of communication. Both sellers and buyers of VoIP products that build their strategies around this reality will fare best.
Tags : 
voip, technology
    
Wheelhouse
Published By: IBM     Published Date: Aug 21, 2013
Have you ever found yourself in this untenable position? Your web team and email program owners are targeting the same customers, with different offers, or worse, competing offers. Siloed systems and teams limit marketers’ ability to make sound assessments about performance and spending. Marketers around the world spend over one trillion USD each year. Yet, most of them still manage their marketing programs with a hodgepodge of spreadsheets and disconnected applications. Unnecessary costs, delays and poor collaboration plague marketers. Under increasing pressure to connect with customers while doing more with less, marketers who strive to optimize marketing performance through a single integrated software platform can make the best use of people, programs and resources. Today, you need a return on every dollar spent and a platform that aligns technology, people and processes to help create effective, efficient marketing programs that support customers for life.
Tags : 
enterprise marketing management, marketing management, marketing roi, marketing connections, marketing performance, return on investment, marketing optimization
    
IBM
Published By: Oracle     Published Date: Nov 01, 2013
Being responsible for one-third of a business’ success already puts HR in a critical role. But it’s not just about finding the best people—it’s about finding the best people, at the lowest cost, with the lowest possible attrition and the best possible performance. And it’s about guiding your executive team to the right decisions using the language they understand best: numbers. Talent management—covering everything from recruiting and compensation to ongoing education and retention—has traditionally been managed in silos, with a series of disparate systems and disconnected processes and reports. In today’s data-driven world, CEOs demand more. This new study conducted by HR.com explores what’s working for organizations today and the biggest gaps to fill.
Tags : 
zenithoptimedia, oracle, successful hr leadership, talent management, core business strategy, human resources, transactional to strategic, financial decisions, smart recruiting, talent scarcity and recruitment, technology advances, competitive compensation, quality of hire, hire smartly
    
Oracle
Published By: Symantec     Published Date: Nov 21, 2014
Computer viruses are yesterday’s news; automated attacks that morph rapidly, concealing themselves through encryption and deceptive packaging, are the new hotness. This paper describes how to start with improved malware reporting and gateway monitoring and how to combine this output with security intelligence from both internal and external resources. Forward thinking organizations use these and other techniques promoted by frameworks such as the Critical Security Controls. The key is to—as quickly as possible—detect hostile activity, identify and locate affected systems and devices, and respond appropriately.
Tags : 
computer viruses, automated attacks, encryption, deceptive packaging, security controls
    
Symantec
Published By: IBM     Published Date: Oct 10, 2014
In this paper, IBM proposes that organizations relying on the traditional waterfall process for systems and software delivery-that is, an engineering governance model-need to make changes to reduce risk and improve results
Tags : 
ibm, software delivery, collaborative platform, investments, application delivery, customer feedback, standardized process, deployed, it landscape, delivery software
    
IBM
Published By: Symantec     Published Date: Dec 04, 2014
SSL Certificates have been in use for almost 15 years, and they continue to serve a vital role in protecting data as it travels across the Internet and other networks. From online financial transactions to e-commerce to product development, SSL Certificates make it possible for users around the world to communicate sensitive information with the confidence that it is safe from malicious hackers. The Internet has evolved in innumerable ways over the past decade and a half; so why do SSL Certificates continue to instill trust? Simply put, SSL Certificates are very effective in protecting data in transit. Yet, customers transacting on websites and systems that are protected by SSL security still face serious threats . One key reason for this danger: poor SSL Certificate management. Enterprises with hundreds of SSL Certificates from several different providers could lose track of certificates in their environment. This white paper will present the pitfalls associated with poor SSL Certificate management, why they are potentially dangerous to the enterprise, and how enterprises can keep track of SSL Certificates effectively.
Tags : 
ssl, ssl certificates, business continuity, breach protection, protection, e-commerce, malicious hackers
    
Symantec
Start   Previous    1 2 3 4 5 6 7    Next    End
Search      
Already a subscriber? Log in here
Please note you must now log in with your email address and password.