RSS feed Get our RSS feed

News by Topic

native

Results 126 - 150 of 489Sort Results By: Published Date | Title | Company Name
By: Oracle     Published Date: Apr 27, 2015
In This Paper • Smarter spend management is lacking in most organizations, largely due to the tools being used to manage their procurement processes • Oracle Procurement Cloud combines cloud, best-of-breed functionality, and native connectivity • Deploying Oracle Procurement Cloud can resolve pain points with transactional and strategic procurement
Tags : cloud computing, procurement, connectivity, spend management
     Oracle
By: Microsoft     Published Date: Nov 08, 2013
Find out why developers increasingly choose .NET to create new applications faster and more efficiently and why it offers the clearest path from the client/server world to the emerging device/cloud world.
Tags : microsoft, develop better applications, technology guide, business applications, application patterns, devices, web applications, native applications
     Microsoft
By: Red Hat     Published Date: Dec 15, 2015
A truly hybrid IT infrastructure should support any and all workload types, letting applications run optimally on their own natural footprints or environments, whether bare-metal servers, scale-up virtualization, Infrastructure-as-a-Service (IaaS), or Platform-as-a-Service (PaaS), from either private or public clouds. It should not be a singular environment that (unsuccessfully) attempts to handle all types of workloads, nor should it consist of separate IT infrastructures that cannot communicate with each other. The Red Hat® portfolio provides the open hybrid IT fabric required to seamlessly enable both traditional (stateful) and new, agile, cloud-native (stateless) workloads.
Tags : 
     Red Hat
By: HP     Published Date: Feb 02, 2015
HP Converged System 700 offers the opportunity for enterprise organizations to drastically increase their IT and user productivity at a significantly lower TCO compared with alternative infrastructure virtualization approaches. This ESG white paper presents a detailed economic analysis for HP Converged System 700, is designed to provide potential customers with a comprehensive picture of the potential direct and indirect cost and benefit drivers they should consider when evaluating a HP Converged System 700 investment.
Tags : 
     HP
By: AppDynamics     Published Date: Sep 21, 2017
IDC’s research shows enterprises around the world are using multicloud strategies to optimize the performance of modern and existing legacy applications running on-premises, in public cloud services, and on legacy systems. In the early days of enterprise cloud adoption, many organizations focused their cloud strategies on enabling net-new cloud-native applications written to take advantage of dynamic cloud infrastructure and pay-as-you-go consumption-based cost models. Early success with these implementations is convincing more and more enterprises to expand their cloud footprint and to migrate existing applications to cloud in order to enhance end-user experiences, optimize cloud resource utilization and costs, and create a more flexible and agile business environment.
Tags : 
     AppDynamics
By: Intel Security     Published Date: Oct 21, 2015
Intel Security data protection solutions offer a variety of encryption capabilities and solutions to cover both Windows and Apple devices.
Tags : mcafee, intel, encryption, apple, filevault, microsoft, bitlocker, security
     Intel Security
By: MobileIron     Published Date: Oct 29, 2018
For every mobile user, staying productive requires secure access to critical apps such as email, contacts, and calendar. These personal information management (PIM) apps are some of the most commonly used apps in the enterprise, so IT must ensure that users can seamlessly and securely access them on any device, including Android and iOS. The ultimate goal is to prevent data loss while preserving the native app experience users expect.
Tags : 
     MobileIron
By: K2     Published Date: Aug 24, 2015
Download this paper and learn about the challenges companies are facing when building SharePoint workflow apps and see alternative offers that will enable you to get reliable SharePoint workflow applications you want - without the challenges of customization.
Tags : 
     K2
By: Teradata     Published Date: Aug 27, 2015
While your specific data throughput mileage may vary, this paper will share the factors that directly contribute to a Data Movement solution, the data storage ecosystem alternatives, and the pitfalls you may face when attempting to architect such a solution in your data warehouse environment.
Tags : analytics, big data, applications, lob
     Teradata
By: Thomson Reuters     Published Date: Mar 08, 2018
In recent years, the legal marketplace has seen an influx of new start-ups and new entrants looking to challenge the long-standing service model offered by law firms to their clients. Traditionally, clients looked to their law firms to provide a full range of legal and legal-related services, i.e., to handle every aspect of a matter, even including those activities that did not involve the direct provision of legal services. Today, by contrast, consumers of legal services find themselves the beneficiaries of a new and growing number of nontraditional service providers that are changing the way legal work is getting done. These alternative providers comprise a new sector of the legal market, one that is emerging and evolving rapidly, but is still very much in its infancy.
Tags : legal, services, lpo, accounting, audit, revenue, thomson, reuters
     Thomson Reuters
By: Thomson Reuters     Published Date: Jul 30, 2018
How confident is your law firm in its document review process? Learn more about cost-effective and defensible document review and the benefits of partnering with a managed review provider instead of contract attorneys. According to a recent study of Alternative Legal Service Providers (ALSPs), the use of ALSPs such as managed review providers for doc review is expected to grow by more than 50% in the next five years. The top reasons cited for using such providers aligned with the benefits listed here: to control costs and meet peak demand without increasing permanent headcount.
Tags : document, review, law, thomson, reuters
     Thomson Reuters
By: Thomson Reuters     Published Date: Jul 30, 2018
Law firms are – or should be – rethinking the way they approach the delivery of legal services and leveraging service providers to achieve the efficiency their clients are demanding. According to the Alternative Legal Service Study, 51% of law firms report using an Alternative Legal Service Provider (ALSP) such as a managed review provider for at least one type of service today. And the use among law firms is set to grow dramatically in the next five years.
Tags : firm, demand, clients, legal, services, thomson, reuters
     Thomson Reuters
By: Genesys     Published Date: Feb 21, 2018
In the ongoing evolution of the customer experience, organizations continue to rely on phone and email while introducing new customer engagement channels. With the channel mix rapidly changing, it has become more important than ever to accurately identify and proactively deploy the next-best channels for engaging customers today and tomorrow. Gartner Research has profiled 15 ways that organizations will engage customers over the next 20 years. This includes augmented reality, virtual reality and mixed reality immersive solutions which will be adopted by 20% of large enterprises by 2020. By learning which engagement channels will best meet your customers’ needs in the future and prioritizing those aligned with your business model, you can improve customer engagement and
Tags : gartner, customer engagement, customer experience, gartner research
     Genesys
By: Palo Alto Networks     Published Date: Dec 02, 2016
The term “Cloud First” was initially popularized by Vivek Kundra, who formerly held the post of White House CIO and launched this strategy for U.S. federal government IT modernization at the Cloud Security Alliance Summit 2011. The underlying philosophy of the cloud-first strategy is that organizations must initially evaluate the suitability of cloud computing to address emergent business requirements before other alternatives are considered.
Tags : palo alto, automated malware, security, cloud
     Palo Alto Networks
By: IBM     Published Date: Feb 28, 2017
Energy companies are being challenged on multiple fronts. Core expectations require the delivery of safe, reliable, affordable and sustainable energy. Business models are being challenged by alternatives such as renewables and consumers demanding more sophisticated interactions through social and mobile. Energy companies need to: Disruptively innovate business processes through analytics driven operational excellence to increase agility and responsiveness, reduce operational costs and improve asset reliability Assume the role of energy integrator to optimally balance supply and demand points Deliver a 360-degree customer-of-one experience to increase customer satisfaction and loyalty, reduce costs, and improve management of energy demand
Tags : ibm, energy & utilities, utility trends, pov, ibm pov, customer experience, sustainable energy, affordable energy
     IBM
By: IBM     Published Date: May 22, 2017
Financial institutions should consider rapidly transforming business models in ways that are cognitive and digital. These transformations should include: Developing alternative revenue sources and streamlining costs.
Tags : financial services, financial security, data security, cloud security, network security, business protection
     IBM
By: Druva     Published Date: Sep 27, 2017
The public cloud’s reliability, security, and scalability offers the transformational potential to move disparate workloads to a single cloud platform for greater efficiency and agility. Discover 20 real-world benefits gained when moving backup, archival and disaster recovery to a single, native cloud platform.
Tags : backup recovery, disaster recovery, public cloud, security cloud, native cloud
     Druva
By: Druva     Published Date: Sep 27, 2017
There are significant differences between a cloud-native data protection solution and those that call themselves “clouds.” Understanding the value of each requires asking the right questions based on the needs of the organization. This executive brief provides critical insights into the pros and cons of each model.
Tags : cloud protection, data protection, enterprise recovery, cloud
     Druva
By: Druva     Published Date: Sep 27, 2017
Managing the backup and restore of virtual machines in a distributed environment is typically a convoluted process. Learn how a cloud-native platform for these data protection workloads enables organizations to reduce the demands on IT teams as well as their budgets.
Tags : vmware, data protection, cloud protection, native platforms
     Druva
By: Red Hat     Published Date: Jan 02, 2018
Organizations are at a strategic crossroads. According to IDC analysts,1 two-thirds of CEOs will center their corporate strategies around digital transformation initiatives. The goal of digital transformation is only partly to make existing functions more effective. The greater goal is to be able to do new things and use existing data in new, better ways. Yet, 72% of current IT spending2—and the focus of IT resources—is on maintaining existing systems. This creates tension between what needs to be done today and what should be done for the future. Middle-tier applications, according to IDC,3 are the core of a digital transformation strategy because they provide data integration, messaging, and application programming interface (API) management. Middle-tier applications also provide a platform for application development and management that can handle traditional enterprise applications and cloud-native, distributed applications. Specifically, a Java™ EE-based application platform can
Tags : 
     Red Hat
By: Red Hat     Published Date: Jan 03, 2018
IDC’s research shows that interviewed organizations capture significant value by investing in Red Hat JBoss solutions rather than using unsupported community software. Stated differently, these organizations are avoiding significant potential hidden costs of using alternative unsupported community software in terms of:
Tags : 
     Red Hat
By: Group M_IBM Q418     Published Date: Oct 24, 2018
After moving traditional workloads to public cloud, most customers realize they must replace many of them with cloud-native alternatives to reap the full benefits. Technology product management leaders must deliver cloud-native offerings now to capture business opportunities and avoid irrelevancy.
Tags : 
     Group M_IBM Q418
By: Amazon Web Services     Published Date: Apr 16, 2018
Since SAP introduced its in-memory database, SAP HANA, customers have significantly accelerated everything from their core business operations to big data analytics. But capitalizing on SAP HANA’s full potential requires computational power and memory capacity beyond the capabilities of many existing data center platforms. To ensure that deployments in the AWS Cloud could meet the most stringent SAP HANA demands, AWS collaborated with SAP and Intel to deliver the Amazon EC2 X1 and X1e instances, part of the Amazon EC2 Memory-Optimized instance family. With four Intel® Xeon® E7 8880 v3 processors (which can power 128 virtual CPUs), X1 offers more memory than any other SAP-certified cloud native instance available today.
Tags : 
     Amazon Web Services
By: Palo Alto Networks     Published Date: Nov 15, 2017
In today’s complex network environments, applications, infrastructure and threats are dynamic. As such, relying upon various, single-purpose security devices that don’t integrate with each other results in dangerous security gaps. These devices are poorly coordinated and unable to provide comprehensive security and threat prevention. To protect against today’s advanced attacks requires a natively integrated, next-generation approach to security – an approach that can keep up with the latest application and infrastructure trends and recognize and stop today’s most advanced threats.
Tags : firewall, optimization, network, environments, applications, infrastructure, security, palo alto
     Palo Alto Networks
By: Dynatrace     Published Date: Apr 16, 2018
Based on a global survey of 800 CIOs, this report examines the challenges organizations face when working within complex, cloud-centric ecosystems. Technology is at the heart of every organization today. Now more than ever, society expects the services we use to be innovative and faultless, prompting the creation of hyper-complex IT ecosystems. Relying on physical databases and third-party cloud service providers, businesses are finding it increasingly difficult to monitor application performance, ensure positive experiences, and succeed in this new environment.
Tags : 
     Dynatrace
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics