RSS feed Get our RSS feed

News by Topic

discovery process

Results 1 - 24 of 24Sort Results By: Published Date | Title | Company Name
By: Spectrum Enterprise     Published Date: Mar 01, 2019
FRONTEO provides end-to-end project management, litigation consulting and eDiscovery solutions for a global base of law firms and corporations. To meet clients’ critical information needs, the business requires connectivity and data center solutions that can process, access and interpret terabytes of sensitive data—reliably and at top speeds. Get actionable insights from experts at FRONTEO and learn how switching to a high-performance Ethernet solution from Spectrum Enterprise can deliver security and reliability across your network and IT infrastructure.
Tags : 
     Spectrum Enterprise
By: ServiceNow     Published Date: Mar 13, 2019
It’s nearly impossible to effectively manage software assets without first normalizing disparate software discovery data. This best practice guide will help you get the most out of software normalization process and showcase the benefits realized during software publisher audits and renewal discussions.
Tags : 
     ServiceNow
By: Riverbed     Published Date: Jul 17, 2013
Effective IT planning and decision making are dependent upon having a complete asset inventory and an accurate understanding about dependencies available before, during and after IT change activities. Application discovery and dependency mapping (ADDM) solutions automate the process of discovering and mapping transactions and applications to the underlying infrastructure and application interdependencies. Learn how Riverbed Cascade’s built-in application discovery and dependency mapping capabilities can help you shorten project times and mitigate risk.
Tags : effective it, addm, application discovery, riverbed cascade
     Riverbed
By: Tenable     Published Date: Aug 15, 2018
"What’s your vulnerability assessment style? Are you scanning weekly, monthly or quarterly? And, what does your scanning habit reveal about the maturity of your organization’s vulnerability assessment practices, a critical part of cyber hygiene? These are the key questions Tenable Research set out to answer in our Cyber Defender Strategies Report. We discovered four common vulnerability assessment strategies in use today. These strategies tell us how mature an organization’s vulnerability discovery process is – and help us identify ways to improve. Download the report now to: - Learn what the four vulnerability assessment styles tell us about cyber risk maturity. - Compare your vulnerability assessment strategy to these four common scanning styles. - Find out what steps you can take today to improve your vulnerability assessment strategy – no matter where you are on the maturity scale."
Tags : cyber exposure, vulnerability management, vulnerability assesment, vulnerabiility scanner, cyber risk management, cyber risk, cyber security
     Tenable
By: Dell Storage     Published Date: Aug 21, 2012
Newest generation of processors delivers up to 2X FLOPS1 and boosts real-world application performance up to 70 percent2.
Tags : dell, intel, xeon, processor e5
     Dell Storage
By: WNS     Published Date: Jun 21, 2017
Making key decisions that improve business performance requires more than simple insights. It takes deep data discovery and a keen problem solving approach to think beyond the obvious. As a business leader, you ought to have access to information most relevant to you that helps you anticipate potential business headwinds and craft strategies which can turn challenges into opportunities finally leading to favorable business outcomes. WNS DecisionPoint , a one-of-its kind thought leadership platform tracks industry segments served by WNS and presents thought-provoking original perspectives based on rigorous data analysis and custom research studies. Coupling empirical data analysis with practical ideas around the application of analytics, disruptive technologies, next-gen customer experience, process transformation and business model innovation; we aim to arm you with decision support frameworks based on points of fact.
Tags : cost of goods solid, warehousing and logistics, advertising and promotion, rent, electricity and utilities, floor staff, depreciation, system costs
     WNS
By: IBM Watson Health     Published Date: Jul 09, 2018
Gaps in care in health systems cause higher mortality rates and inflate costs. Download this case study for a closer look at how one health system used IBM CareDiscovery data to prove to their board that an outpatient palliative care service line was viable in both cost savings and quality of care improvement.
Tags : mortality rates, quality of care, palliative care, care continuum, clinical performance improvement, ibm, carediscovery, roi
     IBM Watson Health
By: Okta     Published Date: Aug 03, 2016
Within 6 months of purchasing Okta, the average customer connects 10 applications, and once up and running, the number increases quickly. But, the average customer could be using twice as many provisioning integrations than they are. Using Okta for single sign-on and a centralized view of your cloud apps isn’t nearly enough. Watch this webinar for a live demo of Okta’s new Access Request Workflow and Access Discovery Report features and learn how Okta Provisioning can bring sanity to your IT processes. Learn about: • Provisioning Workflows • Role & Rule-based Access Control • Security-focused Compliance Reporting
Tags : identity, idaas, iam, identity lifecycle management, mobile, provisioning, active directory, security
     Okta
By: IBM     Published Date: Jun 25, 2018
Vast resources of data are increasingly available, but the sheer volume can overwhelm human capability. By implementing the cognitive system of IBM Watson Discovery into their infrastructure, businesses can extract deeper and more accurate insights by efficiently identifying, collecting and curating structured and unstructured data. Watson Discovery, also capable of creating content collections and custom cognitive applications, can transform organizational processes to extend proprietary content and expert knowledge faster and at greater scales. Read more to learn how Watson Discovery can keep your organization evolving ahead of the competition. Click here to find out more about how embedding IBM technologies can accelerate your solutions’ time to market.
Tags : 
     IBM
By: Oracle OMC     Published Date: Nov 30, 2017
It’s no secret that Account Based Marketing (ABM) has emerged as one of the most buzzed about trends within the B2B marketing world. As ABM evolves from a new, cutting edge tactic into a well known, trusted strategy, some B2B marketers are knee deep within their ABM journey, while others are still in the discovery process, searching for a better understanding before seeking buy-in. Among the array of questions that these marketers have, many are wondering: just how essential is Account Based Marketing to my organization’s success? What challenges are my peers facing when leveraging ABM? How is ROI from ABM being measured? How much success are my peers achieving? And looking ahead, how will ABM fit in the B2B marketing landscape? To better understand these questions, Argyle Executive Forum, in partnership with Oracle Marketing Cloud, surveyed leading B2B CMOs and marketing executives across the U.S. to better understand how they’re incorporating ABM into their marketing strategies, wha
Tags : 
     Oracle OMC
By: LifeSize, a division of Logitech     Published Date: Aug 03, 2011
With any newer technology, there are plenty of misconceptions and concerns about HD video communications. To aid your research and discovery process, we've outlined the five myths we receive most often.
Tags : video conference, video conferencing, videoconference, videoconferencing, hd video conferencing, high definition video, high definition videoconferencing, video communications
     LifeSize, a division of Logitech
By: Pentaho     Published Date: Apr 28, 2016
Today, the need for self-service data discovery is making data governance a charged topic. As business-driven data discovery emerges as a fundamental need, the ability to ensure that data and analytics are trustworthy and protected becomes both more difficult and more imperative. This research explains how to manage the barriers and risks of self-service and enable agile data discovery across the organization by extending existing data governance framework concepts to the data-driven and discovery-oriented business. You’ll learn: - The implications of the "freedom vs. control" paradox - How to design for iterative, "frictionless" discovery - Critical checkpoints in data discovery process where governance should be in place
Tags : pentaho, governed data, data and analytics, governance framework, freedom vs control, frictionless discovery
     Pentaho
By: McAfee     Published Date: Jan 28, 2013
Re-think your DLP — This white paper discusses how a new DLP model aligns data discovery, classification, policy management, and security controls to your business requirements and processes.
Tags : dlp, business-centric dlp, dlp business rules, discovery, classification, policy management, security controls
     McAfee
By: Code42     Published Date: Apr 22, 2016
Rapid changes in technology and software, and the nearly universal shift to electronically stored information (ESI), has made eDiscovery more complex and expensive. In a movement to simplify and standardize their procedures—and dissolve some of the extra tensions surrounding litigation—many organizations are bringing phases of the eDiscovery process in house, in particular legal hold. Among other benefits, Code42 eDiscovery simplifies legal hold management. Litigation preparation can be a large task crossing over many departments, but will consistently feature two main players: Legal and IT. This document focuses on those two groups, and aims to enable one to see the eDiscovery world through the point of view of one group—or the other. Read more to find out the details.
Tags : code 42, legal process, ediscovery, litigation issues
     Code42
By: Proofpoint     Published Date: Apr 22, 2010
This whitepaper addresses the key e-discovery challenges facing legal and IT departments today, form the impact of regulations such as the Federal Rules of Civil Procedure (FRCP) to the technology required to deal with them. Finally, this paper describes how businesses can develop a proactive strategy to deal with e-discovery requests in the event of litigation, saving time and money in the process.
Tags : proofpoint, email archiving, e-discovery, federal rules of civil procedure, frcp, electronic data, search and retrieval of messages
     Proofpoint
By: Kaseya     Published Date: Feb 11, 2014
Embrace a new concept and adopt these 4 steps to create IT efficiencies without having to cut service levels. This might just be the change you need.
Tags : kaseya, systems management, technology savvy, it efficiencies, systems management strategy, discovery process, mobile workers, it policies
     Kaseya
By: IBM     Published Date: Apr 15, 2016
Ziff Davis Custom Whitepaper: Analytics relies on BI, Big Data, and data discovery to provide reporting, trend analysis, and what-if analysis.iii Analytics is defined as the scientific process of transforming data into insight for making better decisions.
Tags : ibm, business analytics, business intelligence, agile, decision making, big data
     IBM
By: SAS     Published Date: Mar 06, 2018
Known for its industry-leading analytics, data management and business intelligence solutions, SAS is focused on helping organizations use data and analytics to make better decisions, faster. The combination of self-service BI and analytics positions you for improved productivity and smarter business decisions. So you can become more competitive as you use all your data to take better actions. Instead of depending on hunch-based choices, you can make decisions that are truly rooted in discovery and analytics. And you can do it through an interface that anyone can use. At last, your business users can get close enough to the data to manipulate it and draw their own reliable, fact-based conclusions. And they can do it in seconds or minutes, not hours or days. Equally important, IT remains in control of data access and security by providing trusted data sets and defined processes that promote the valuable, user-generated content for reuse and consistency. But, they are no longer forced
Tags : 
     SAS
By: Numara Software     Published Date: Jul 16, 2009
See how this integrated out-of-the-box help desk, asset management and Change Management solution can help solve many IT help desk problems with ease.• Easily create tickets and requests • Automate repetitive workflows • Perform asset discovery • Manage software license compliance • Run pre-built dashboards and reports 
Tags : numara, help desk management, track it, asset management, asset discovery, tickets, requests, dashboards
     Numara Software
By: IBM     Published Date: Oct 10, 2013
With modern IT infrastructures an intricate web of interdependencies, uncovering the total IT environment, including the logical relationships between physical, virtual and cloud elements, has never been more important—or more complex. This white paper discusses how IBM’s analytics for logical dependency mapping, ALDM, reengineers the IT discovery process to provide a more complete and accurate view of the IT infrastructure.
Tags : reengineering, it discovery, analytics, visualization, interdependencies, it environment, logic, logical relationships
     IBM
By: Oracle     Published Date: Dec 11, 2014
"Hopeful messaging is wasted messaging. Clear targeting means more than just Who. It also demands a knowledge of How, When, and What. Read this quick guide on what you can do to ensure your web pages and white papers, social posts, and search optimization are primed and ready for any “road to discovery” your audience takes. Get a clearer picture of who is involved in the buying process. Download the “Modern Marketing Essentials How-To Guide: Targeting”
Tags : oracle, marketing cloud, targetting, persona-driven communication, segmentation, database transformation
     Oracle
By: Ultimus     Published Date: Aug 16, 2007
By making process discovery easier and on-demand, Adaptive Discovery overcomes a major hurdle to success with BPM and shortens the time it takes organizations to capture the competitive advantages of BPM.
Tags : ultimus, bpm, business process management, automation, process discovery, discovery, adaptive discovery, bpa
     Ultimus
By: Ultimus     Published Date: Aug 16, 2007
By enabling Adaptive SOA, Ultimus Adaptive Discovery takes SOA to the highest level of rapid deployment and agility. It accomplishes this by enabling business processes to be developed rapidly, and to embrace change in real-time. More importantly, it empowers business professionals and analysts who own processes to discover and change processes with IT playing the supporting role to manage the infrastructure.
Tags : ultimus, bpm, business process management, automation, process discovery, discovery, adaptive discovery, bpa
     Ultimus
By: Ultimus     Published Date: Aug 16, 2007
In the coming years, we believe that BPM will become the most important technology-driven business initiative for most companies. It leads you toward a focus on using technology to support your business processes, rather than adapting your business processes to support your technologies. It provides strong, sustainable ROI and competitive advantage.
Tags : ultimus, bpm, business process management, automation, process discovery, discovery, adaptive discovery, bpa
     Ultimus
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics