RSS feed Get our RSS feed

News by Topic

read

Results 351 - 375 of 5400Sort Results By: Published Date | Title | Company Name
By: Splunk     Published Date: Sep 10, 2018
collectd is an open source daemon that collects system and application performance metrics. With this data, collectd then has the ability to work alongside other tools to help identify trends, issues and relationships not easily observable. Read this e-book to get a deep dive into what collectd is and how you can begin incorporating it into your organization’s environment.
Tags : it event management, it event management tool, event logs, aiops platform, what is aiops, aiops vendor, market guide for aiops platforms, guide for aiops platforms
     Splunk
By: Adverity     Published Date: Jun 15, 2018
A Beginner's Guide to Marketing Data Analytics Marketing Data is big & highly fragmented Big data is messy. It’s scattered across platforms, it’s diverse, and in its raw form, it’s practically unusable. We know, it’s a painful truth. The fact of the matter is that having a lot of data doesn’t necessarily mean that you have the answers to your most pressing questions. Looking for the most relevant bits in your pile of big data is like looking for a needle in a haystack. But don't you worry - we are here to help. This handy e-book will give you a short overview what quality matters, why data is so important and what you need to pay attention to. Best thing is: getting this ebook is super easy. Just fill out the form to the right and voilá - your download is ready. Enjoy this read!
Tags : marketing business intelligence, saas marketing optimization, measuring marketing performance, roi analytics, automated report generator, performance based marketing, online marketing data, roi metrics
     Adverity
By: CloudHealth by VMware     Published Date: Feb 13, 2019
Microsoft Azure Reserved Virtual Machine (VM) Instances are an effective way to reduce your Azure spend. While the concept of reservations may be new to you, just remember that they enable you to make an all upfront payment towards your compute costs, thereby providing prioritized capacity. Read this eBook to learn: -The benefits of Reserved VM Instances -How to calculate the break-even point -The options for modifying, exchanging, or cancelling your reservations
Tags : cloud management, microsoft azure, multicloud management
     CloudHealth by VMware
By: CloudHealth by VMware     Published Date: Apr 15, 2019
Microsoft Azure Reserved Virtual Machine (VM) Instances are an effective way to reduce your Azure spend. While the concept of reservations may be new to you, just remember that they enable you to make an all upfront payment towards your compute costs, thereby providing prioritised capacity. Read this eBook to learn: The benefits of Reserved VM Instances How to calculate the break-even point The options for modifying, exchanging, or cancelling your reservations
Tags : 
     CloudHealth by VMware
By: Oracle     Published Date: Feb 21, 2018
Oracle debuted its Blockchain Cloud Service in October, and now one of Oracle’s early-stage partners, AuraBlocks, has already created a financial service on the platform. AuraBlocks is using blockchain to help its customer Biz2Credit verify the identity of borrowers. Biz2Credit provides loans to small- and medium-sized businesses.
Tags : 
     Oracle
By: Infosys BPM Ltd     Published Date: Feb 12, 2019
A global infrastructure management company entered into a factoring agreement with a leading US financial institution in Australia. However, it realized that it was paying unreasonably high interest payments to the financial institution and wanted to trace the reason for the same. Infosys BPM took the initiative to analyze interest payments to the banker, and the customer payments pattern to provide insights on cost saving opportunities. Read on to know more on how did Infosys BPM help the client lead to a cash flow of $138M and also save $562,000 in factoring fees.
Tags : 
     Infosys BPM Ltd
By: IBM     Published Date: Jan 09, 2015
Read the case study “A broadband company streamlines its recovery processes with IBM Cloud” to learn how IBM service teams used cloud-based technology to help the company develop an innovative and proven cloud computing solution for its backup and recovery environment. IBM’s turnkey solution helped the company improve protection, recovery, performance and scalability within its disaster recovery processes, and maximize backup performance and disaster recovery capabilities.
Tags : cloud computing solutions, service teams, cloud-based technology, it performance, it recovery capabilities
     IBM
By: IBM     Published Date: Aug 22, 2014
This white paper introduces the key concepts and challenges of IT governance and introduces the reader to the IT governance solution provided by IBM.
Tags : risk analytics, business analytics, it governance
     IBM
By: Uberall     Published Date: Jan 24, 2019
We’ll give you some key insights on how consumers are using technology platforms to guide them, how your clients can leverage those tools to win business, and how you can drive recurring revenue through location marketing services. We’ll also offer some specific tips on optimizing online presence for brands and maximizing budget – taking advantage of the techniques most likely to drive business. Read on to learn more!
Tags : local marketing, location analytics, location-based marketing, location-based services, mobile marketing, real-time location systems, marketing research, geofencing
     Uberall
By: CDW Symantec     Published Date: Aug 02, 2012
Read how chief information security officers (CISOs) view the state of mobile computing. This whitepaper discusses the importance of mobile enablement, policy updates, pertinent security practices and what organizations have done to secure their business mobility.
Tags : ciso, mobile, computing, security, idg, symantec, managers, enterprise
     CDW Symantec
By: Forcepoint     Published Date: May 14, 2019
The CISO, Head of Human Resources, CIO, and Chief Legal Council are not the cast of characters you would expect to see solve a data protection challenge. Yet, the GDPR’s far-reaching impact has forced teams who typically don’t work together to collaborate to solve a nuanced problem they never thought they would have. Get a firsthand account of how Forcepoint’s CIO, Meerah Rajavel prepared for the regulation including collaborating with all stakeholders to jointly determine how the regulation applied to each part of the business and implementing a path to compliance.
Tags : 
     Forcepoint
By: Burton Group     Published Date: Apr 08, 2008
Server virtualization is a technology that has taken hold with amazing speed and is now firmly entrenched with overwhelming success in many data centers. This perspective document recaps why you should be moving ahead quickly with virtualization (if you haven’t already done so), what the implications are for IT and the business, and what the future holds as the ramifications of virtualization become apparent.
Tags : burton group, server, servers, virtual, virtual machine, virtual server
     Burton Group
By: CA Technologies     Published Date: Aug 21, 2017
If you’re not a unicorn now but want to be one, keep reading. Organizations are moving toward creating greater agility for their businesses. It’s a big effort, but you will reap the rewards. In fact, you’ll see real business results even when you complete just the first step. This paper will help you: • Identify steps to transform your organization and increase business agility • Clarify what makes each step in your transformation stick • Pinpoint the mindset changes you need to create and sustain the organizational health that empowers people to regularly and quickly respond to change
Tags : 
     CA Technologies
By: Fortinet EMEA     Published Date: Nov 26, 2018
If your organization is one of the 95% of enterprises that operate in the cloud, you are already grappling with cloud security. And if your organization is one of the 85% of companies that use multiple Infrastructureas-a-Service (IaaS) and Software-as-a-Service (SaaS) clouds, you have additional issues to consider. Compared to the days when organizations managed everything on-premises or only had a handful of cloud deployments, this new multi-cloud world exacerbates the expansion of the attack surface and makes threat containment and accountability more difficult. Further, pressure on security teams to protect everything in the multi-cloud environment is leading to reactive and expensive threat management. If you are a security leader tasked with meeting the challenges of a multi-cloud environment, eventually you’ll find that siloed cloud security strategies fall short of the mark. But don’t wait. Now is the time to consider a holistic security approach that reclaims control from dispa
Tags : 
     Fortinet EMEA
By: SAP     Published Date: Jun 22, 2009
Read this white paper from CFO Research Services, which examines why and how chief financial offers are looking to create "highly integrated" organizations by moving from standalone spreadsheets to integrated planning, budgeting, and forecasting systems. (CFO Research Services, 2008)
Tags : cfo, sap, global organizations, forecasting, budgeting, planning, finance, financing
     SAP
By: Interactive Intelligence     Published Date: Jul 21, 2010
To successfully choose and implement an IP system, the best place to start is with a roadmap - current offerings, justification factors, upcoming solutions, and suggested planning guidelines. Without one, your new system might never move forward. Read more.
Tags : interactive intelligence, customer ip communication, digital pbx, unified communication, voice network, ip data network, contact center solution
     Interactive Intelligence
By: Technolytics     Published Date: Oct 05, 2007
Recently, a series of cyber attacks on the Defense Department and Defense contractors in the United States as well as the Ministry of Defense and Parliament in the U.K. have created significant cause-for-concern by computer security experts. It is imperative you read this brief and learn how we're all vulnerable and what is being done to prevent these Cyber Attacks.
Tags : spy ops, spy-ops, cyber attack, hacker, hackers, government, internet security, national security
     Technolytics
By: Cisco EMEA     Published Date: Nov 13, 2017
If this snapshot of working life looks familiar, keep reading. Cisco® technology can help the busiest executives not only stay in touch, but also get work done throughout the day.
Tags : cisco, spark, daily, workplace, employee, management, optimization, efficiency
     Cisco EMEA
By: IBM     Published Date: Nov 30, 2016
Covering both mobile and Internet of Things (IoT) use cases, this deep dive into offline first explored several patterns for using PouchDB together with Cloudant, including setting up one database per user, one database per device, read-only replication, and write-only replication.
Tags : ibm, cloud, offline-first, pouchdb, ibm cloudant
     IBM
By: CrowdStrike     Published Date: Nov 28, 2018
Damaging widespread attacks such as WannaCry provide grim reminders of how prevalent Ransomware attacks have become. Adversaries are not only launching Ransomware attacks against a wide range of industries, they are consistently evolving their tools, tactics and procedures (TTPs) to foil your organization’s best cybersecurity strategies. A white paper, “Ransomware, a Growing Enterprise Threat,” offers in-depth analysis of Ransomware and explains why organizations can’t afford to ignore this increasingly challenging cyber threat. Download this white paper to learn • The evolution of Ransomware and why businesses are being targeted more frequently • How perpetrators tactics and targets are evolving to maximize profits • Best practices for protecting your organization from becoming a victim of Ransomware
Tags : 
     CrowdStrike
By: Google     Published Date: Aug 05, 2019
According to Dimensional Research, nearly two-thirds of migration projects prove very difficult or fail entirely, while more than half go over budget. Get to the cloud 10x faster while cutting costs and reducing risks with this ebook from Google Cloud. Read about: - Critical considerations for a seamless migration - Questions to help you understand your existing environment - Tips for maximizing the ROI of your move - Examples of successful migrations from companies like Twitter, Evernote, and Etsy
Tags : google cloud, migration, cloud management, cloud infrastructure, cloud providers
     Google
By: IBM     Published Date: Oct 10, 2013
Like many financial institutions today, the full-service Swedish bank featured in this case study has responded to changing customer needs, evolving from its original founding more than 100 years ago. As a result, the bank has realized remarkable success. Of course, along with that success have come significant challenges. New business growth, plus the rise in Internet and mobile banking, intensified the bank’s need for continuous availability of its IT infrastructure. IBM Resiliency Consulting Services helped the bank strengthen and streamline its environment. In the case study, you can read how teaming with IBM helped the bank meet recovery point and recovery time objectives; mitigate risk; and provide the flexibility to meet business demands without added IT expense.
Tags : ibm, resiliency consulting, ibm, full-service swedish bank, hyperswap, optimizing risk management, risk management, bank optimization
     IBM
By: Optymyze     Published Date: Feb 05, 2018
In a world in which disruption has become the norm, the rules of success change constantly. What is the best growth strategy? What should sales operations professionals keep an eye on in 2018 to remain competitive? And where should sales organizations allocate their resources? Read this article to find out.
Tags : sales operations, sales performance, sales performance management, sales processes, sales ops trends, 2018 sales operations trends
     Optymyze
By: MuleSoft     Published Date: Nov 27, 2018
IT teams across industries face growing pressure to deliver projects faster while reducing costs. All too often, dated legacy systems hinder IT’s ability to accomplish either of these objectives. Legacy systems can also slow the speed at which IT can deliver new projects to support the business. For these reasons, legacy modernization has emerged as a key strategic imperative. But where should organizations start? One large global bank provides a detailed blueprint for how large enterprises can do so. Read this legacy modernization blueprint to learn: The bank’s legacy modernization strategy, and how they used Anypoint Platform Best practices for modernizing legacy SOA web services How to think about re-architecting monolithic applications into microservices The role that APIs play in driving an effective legacy modernization strategy
Tags : 
     MuleSoft
By: Workday APAC     Published Date: Dec 18, 2018
"The vast possibilities of AI make it a must-have for any digital business strategy. Read this Gartner report to better understand what can be achieved with AI and how you can begin to incorporate it into your business strategies. Learn about other leading organizations and how they are currently using AI technology."
Tags : 
     Workday APAC
Start   Previous    8 9 10 11 12 13 14 15 16 17 18 19 20 21 22    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics