RSS feed Get our RSS feed

News by Topic

operational

Results 501 - 525 of 1156Sort Results By: Published Date | Title | Company Name
By: Teradata     Published Date: Feb 26, 2013
This survey and research report discusses shifts in the data management landscape and the movement to align data with operational and analytical workloads creating the best possible unified data architecture platform. Read on to learn more.
Tags : big data, survey report, data management, landscape, movement, align data, operational and analytics workloads, business intelligence
     Teradata
By: Birst     Published Date: Jul 16, 2013
Birst’s Salesforce Reporting and Analytics helps sales managers analyze all of the critical salesforce.com data to uncover insightful pipeline information. Combining sales data with marketing, financial and operational data to obtain a comprehensive view of the pipeline is where Birst excels.
Tags : business intelligence, agile bi, self service bi, bi in the cloud, unified bi, mobile bi, embedded analytics, business analytics
     Birst
By: CareCloud     Published Date: Dec 18, 2013
Find out how three physicians are using technology to effectively battle operational difficulties and declining profitability.
Tags : carecloud, quantiamd, ehr, practice profitability, practice profitability index, ppi, outsourced billing, practice management
     CareCloud
By: Cisco     Published Date: Aug 27, 2015
Learn how you can decrease downtime, introduce new products faster, and foster innovation with Cisco's Connect Factory.
Tags : industrial enterprise, manufacturing, connected factory, convergence, automation, business networks, factory-based operational technologies, it networks
     Cisco
By: Sage     Published Date: Oct 29, 2014
If you have recently been to a seminar, attended a conference or webcast, or read a white paper or blog, you have most likely heard about cloud technology as it relates to the accounting profession. Cloud technology is an enabler that allows a business to shift computing power from local networks and desktop environments to a remote off-premises computing environment. Ef?ciency of operations is enhanced by removing the burden of managing networks, upgrades, and information technology operational issues.
Tags : cloud technology, service offerings, efficiency, managing networks, operational issues
     Sage
By: Great Bay Software     Published Date: Jan 09, 2019
"Only 51% of device makers follow guidance from the FDA to mitigate or reduce inherent security risks. See how hospitals can harness the benefits of connected medical devices to achieve operational efficiencies, provide better patient care and reduce the overall risk to patient safety. Watch this on-demand webinar to discover: • Emerging issues and trends that are risky to healthcare IT systems and can directly affect patient safety, violate their trust and impact revenue • Best practices for shoring up network security blind spots with real-time asset inventory, network authentication and automated enforcement controls • Why real-time endpoint visibility is the key to achieving an effective and proactive cybersecurity strategy"
Tags : 
     Great Bay Software
By: Cherwell Software     Published Date: Jun 29, 2015
This guide provides: Key insight into how to create a service catalog, clear guidance on defining a service catalog, and an easy to use service catalog template to help you start realizing business and customer benefits.
Tags : service catalogue, service level agreement, service catalog template, operational service agreements, continual service improvement
     Cherwell Software
By: VMware     Published Date: Jan 05, 2018
Few network and IT managers look forward to migrating critical systems and solutions from one vendor to another, but it is often an essential step forward when evolving operational requirements are considered. When migration is viewed as an opportunity, the new benefits and broad range of quantifiable advantages realized can make switching vendors the optimal solution. Read this Tech Target whitepaper to learn more and see why now is the best time to migrate from MobileIron to VMware Workspace ONE, powered by VMware AirWatch unified endpoint management (UEM) technology.
Tags : 
     VMware
By: Ciena     Published Date: Nov 15, 2016
Research and Education (R&E) networks are experiencing a surge in capacity demand as a result of the massive growth of streaming media (Netflix, Facebook, YouTube), growing utilization of public cloud services, and the continued need to support large scientific data file transfers for researchers collaborating around the globe. This increase in traffic is driving many operators to evaluate network backbone upgrades to 100G. Upgrading is necessary but costly. But what if operators could upgrade their R&E networks to 100G for 50 percent less CAPEX investment and extend the life of the existing routers, while actually simplifying the architecture to enable lower operational costs? Download our app note to learn how.
Tags : o-vpn, integrated access device, pinpoint, z-series, ciena 6500, ciena 5430, 6500-7, emotr
     Ciena
By: FICO     Published Date: Jun 06, 2017
Manufacturing companies have been using supply chain optimization (SCO) solutions?to solve complex operational challenges and improve their supply chains for years now. To reduce the costs of servicing customers and improve performance, manufacturers have made significant investments in supply chain optimization (SCO) solutions over the past decade or more. But why do some companies have had better results than others?
Tags : manufacturing, manufacturing optimization, manufacturing solutions
     FICO
By: Dassault Systèmes     Published Date: Aug 08, 2017
A recent study by Engineering.com indicated there is a significant gap between how Industrial Equipment Manufacturing companies value specific aspects of their project execution and how they judge their performance. In order to address the challenging aspects of product development projects, it was determined that projects with a web-based Product Lifecycle Management (PLM) solution will perform higher. Learn how PLM solutions with embedded project management can uniquely provide the following operational best practices: • Full alignment between projects and the product portfolio in order to leverage common technology platforms and launch products to market faster • Coordination of a project’s schedule and resources, with its scope as defined by requirements and development constraints, in order to meet market expectations • Automatic project task updates as development work is completed to provide a real-time understanding of project status and progress
Tags : product development, engineering, companies, plm, product lifecycle management, market, designs, budget
     Dassault Systèmes
By: Dassault Systèmes     Published Date: Aug 08, 2017
Business leaders today face the challenge of moving their enterprises to the next level, that of digital business transformation and revolution — coupling digital technologies with organizational, operationaland business model innovation to create new ways of operating and growing the business. The "4th Industrial Revolution" enables enterprises to drive changes in their business models and ecosystems, leveraging digital competences and facilitating accelerated revenue and profit growth going forward.
Tags : industrial, business leaders, enterprises, digital technologies, organizational, dassault, revenue, profit
     Dassault Systèmes
By: Reputation.com     Published Date: Jun 29, 2018
The past year ushered in some big changes for Online Reputation Management (ORM) — and the practice has become indispensable for any location-based enterprise. In 2017, review sources proliferated, consumers became more savvy about the validity of online reviews, and the position of Chief Experience Officer started to gain traction among locationbased organizations. ORM and SEO became increasingly intertwined as Google refined its search algorithms with a strong emphasis on reviews and star ratings. This year, expect to see these four trends move to the forefront: 1) Google will extend its dominance in online review volume and consumer exposure, eclipsing all other specialty sites. 2) SEO will be reinvented as user-generated reviews weigh more heavily in search rankings. 3) The voice of the customer will no longer be siloed across disconnected categories. 4) Consumer feedback from reviews and social media will drive operational improvements.
Tags : 
     Reputation.com
By: Reputation.com     Published Date: Jun 29, 2018
Creating competitive advantage starts with a sound digital strategy. In a 2017 survey of healthcare consumers across the U.S. from a representative range of demographic groups, we found that 88% of consumers begin their search for healthcare providers online. Consumers rely on search engines and review sites to steer their decisions about where to go for care. What consumers read about you online heavily influences their decision-making. Your reputation is defined at every touchpoint a potential patient has with your doctors and organization on the web — from the doctor or location listing, to patient rating and reviews, to finding the right doctor and reading profiles on your website. Done well, online reputation management (ORM) enables your providers to generate a high volume of representative reviews from the “silent majority,” while providing valuable insights to improve patient experience, make operational improvements and drive new patient appointments.
Tags : 
     Reputation.com
By: Red Hat     Published Date: Jun 26, 2019
When any organization starts planning for cloud-native applications, it is important to consider the entire time span: from selecting a development platform until an application is truly production-grade and ready for delivery in the cloud. It can be a long journey, with many decisions along the way that can help or hinder progress. For example, at the beginning of a move to cloud-native development, it is easy for inefficiencies to occur if developers begin selecting tools and frameworks before they know where the application will be deployed. While enterprise developers want choice of runtimes, frameworks, and languages, organizations need standards that address the entire application life cycle in order to reduce operational costs, decrease risks, and meet compliance requirements. Organizations also want to avoid lock-in, whether it is to a single provider of cloud infrastructure or the latest architectural style. In addition, given the steep learning curve in cloud development, con
Tags : 
     Red Hat
By: Forcepoint     Published Date: May 14, 2019
2018 NSS Labs SD-WAN Group Test In this report, NSS Labs simulated an enterprise network that has branches connected to a data center through two links: an MPLS line and a commercial broadband connection. They reviewed a select number of vendors, testing their throughput performance, video quality and VoIP quality as well as security effectiveness. NSS Labs verified that Forcepoint NGFW handled all of their use cases and offers all the operational capabilities that they recommend as necessary for SD-WAN as well as scoring 100% across all security tests, blocking all evasion techniques. “Forcepoint is one of the few vendors to support all of the use cases and capabilities we tested as well as strong security in their SD-WAN solution. They should be on the short list for any organization that’s looking to connect and protect their distributed enterprise.” - Vikram Phatak, CEO, NSS Labs Read the report and learn how Forcepoint delivers SD-WAN with enterprise scale and security to ma
Tags : 
     Forcepoint
By: Forcepoint     Published Date: May 14, 2019
As more and more companies are encouraging their employees to work from anywhere, on any device, data loss prevention (DLP) has evolved from an option to a requirement. In the past, DLP has been associated with complicated deployments and pervading operational management issues, yet DLP is not so much a product but a strategy—success depends on methodology and execution. Download the whitepaper for insightful guidance on implementing DLP. Key topics include: • Latest data-breach trends • Assessing DLP vendors • Nine-step framework • Best practices to ensure success
Tags : 
     Forcepoint
By: Forcepoint     Published Date: May 14, 2019
2018 NSS Labs SD-WAN Group Test In this report, NSS Labs simulated an enterprise network that has branches connected to a data center through two links: an MPLS line and a commercial broadband connection. They reviewed a select number of vendors, testing their throughput performance, video quality and VoIP quality as well as security effectiveness. NSS Labs verified that Forcepoint NGFW handled all of their use cases and offers all the operational capabilities that they recommend as necessary for SD-WAN as well as scoring 100% across all security tests, blocking all evasion techniques. “Forcepoint is one of the few vendors to support all of the use cases and capabilities we tested as well as strong security in their SD-WAN solution. They should be on the short list for any organization that’s looking to connect and protect their distributed enterprise.” - Vikram Phatak, CEO, NSS Labs Read the report and learn how Forcepoint delivers SD-WAN with enterprise scale and security to ma
Tags : 
     Forcepoint
By: Forcepoint     Published Date: May 14, 2019
2018 NSS Labs SD-WAN Group Test In this report, NSS Labs simulated an enterprise network that has branches connected to a data center through two links: an MPLS line and a commercial broadband connection. They reviewed a select number of vendors, testing their throughput performance, video quality and VoIP quality as well as security effectiveness. NSS Labs verified that Forcepoint NGFW handled all of their use cases and offers all the operational capabilities that they recommend as necessary for SD-WAN as well as scoring 100% across all security tests, blocking all evasion techniques. “Forcepoint is one of the few vendors to support all of the use cases and capabilities we tested as well as strong security in their SD-WAN solution. They should be on the short list for any organization that’s looking to connect and protect their distributed enterprise.” - Vikram Phatak, CEO, NSS Labs Read the report and learn how Forcepoint delivers SD-WAN with enterprise scale and security to ma
Tags : 
     Forcepoint
By: Forcepoint     Published Date: Jun 06, 2019
As more and more companies are encouraging their employees to work from anywhere, on any device, data loss prevention (DLP) has evolved from an option to a requirement. In the past, DLP has been associated with complicated deployments and pervading operational management issues, yet DLP is not so much a product but a strategy—success depends on methodology and execution. Download the whitepaper for insightful guidance on implementing DLP. Key topics include: • Latest data-breach trends • Assessing DLP vendors • Nine-step framework • Best practices to ensure success
Tags : 
     Forcepoint
By: Forcepoint     Published Date: Jun 06, 2019
In a recent study, IDC analyzed the business value and benefits of supporting network operations with Forcepoint NGFW solutions. The research included interviews with eight organizations relying upon Forcepoint’s NGFW to connect and protect their networks and business operations. IDC created a model based upon their analysis to identify the costs and real benefits of deploying Forcepoint NGFW. The highlights of this analytical model are captured in their Business Value Snapshot; and the complete results are available for download now in the IDC Quantifying the Operational and Security Results of Switching to Forcepoint NGFW Whitepaper. Download the Snapshot now Download the IDC Whitepaper now to learn how the eight organizations surveyed realized improved efficiency, availability and security with Forcepoint NGFW, as well as a return of cost in only seven months and an average 5-year ROI of 510%.
Tags : 
     Forcepoint
By: Ahead     Published Date: Aug 08, 2018
As organizations are moving to AWS to gain the operational efficiencies of the cloud, they’re realizing the importance of a well-architected framework. This framework, which consists of twelve pillars, is well-intended, secure, and compliant, but is not exactly easy to achieve. Our clients frequently tell us that two pillars in particular-- Security and Cost Optimization--are the most difficult to get right. This is partially because while advanced tooling is required to manage cloud complexities and compliance, selecting, deploying, and operating these tools is costly and burdensome. Without optimizing your environment for these two pillars, you are preventing your organization from scaling up. This has resulted in many businesses that are restricted to a minimal use of AWS, negating any benefit of having adopted the cloud in the first place. AHEAD uses the AWS Well-Architected Framework, which will walk you through missteps and how to get it right.
Tags : 
     Ahead
By: Tenable     Published Date: Feb 07, 2018
"Basing your infosec program on an established security framework gives you the controls, KPIs and vocabulary needed for building – and operating – a structured, scalable, and effective practice. For insights into how this works in the real world, download and read Economic, Operational and Strategic Benefits of Security Framework Adoption, a collection of brief essays from 28 global infosec leaders. Topics covered include: - Meeting customer and partner requirements - Improving security practices - Enabling effective communications with corporate leaders - Addressing global compliance challenges - Adapting the framework to fit your needs"
Tags : security frameworks, gdpr, general data protection regulation, compliance, iso 27000, cis controls, nist, cyber
     Tenable
By: Tenable     Published Date: Nov 06, 2018
"What steps should you take to enable the effective and secure use of public cloud services? According to Gartner, “CIOs need to ensure their security teams are not holding back cloud initiatives with unsubstantiated cloud security worries. Instead, they should encourage their teams to apply imagination and energy to develop new approaches to securely and reliably leverage the benefits of SaaS, PaaS and IaaS.” By reading, “Clouds Are Secure: Are You Using Them Securely?,” you will gain insight into Gartner’s recommended practices for effective and secure adoption of public cloud services, including: Develop an enterprise cloud strategy, including guidance on what data can be placed into which clouds and under what circumstances. Implement and enforce policies on cloud ownership, responsibility and risk acceptance by outlining expectations for form, significance and control of public cloud use. Follow a life cycle approach to cloud governance that emphasizes the operational control of
Tags : 
     Tenable
By: Tenable     Published Date: Jan 25, 2019
"This whitepaper from the SANS Institute focuses on the growing use and benefits derived from information technology (IT) and operational technology (OT) convergence which includes more effective management and operation of contemporary control systems. IT/OT convergence carries unique challenges that make managing and securing an industrial control system (ICS) more difficult. This is due to greater technical complexity, expanded risks and new threats to more than just business operations. This paper explores the issues that arise with the blending of IT and OT into combined cyber-physical systems where risks must be identifed and managed. Download this report to get answers to these questions: -Why are digital asset inventories critical for IT/OT security risk management? -How does knowledge about risks and vulnerabilities to IT/OT systems lead to better risk management? -Can applying even a few of Center for Internet Security (CIS) Controls make a marked difference in the securit
Tags : 
     Tenable
Start   Previous    14 15 16 17 18 19 20 21 22 23 24 25 26 27 28    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics