RSS feed Get our RSS feed

News by Topic

scribe

Results 51 - 75 of 813Sort Results By: Published Date | Title | Company Name
By: CA Technologies     Published Date: Oct 22, 2014
This paper outlines why legacy service desks and even newer platforms have not delivered on expectations, it describes the requirements for a service desk solution to be truly effective in today’s business environment and it details how CA Cloud Service Management delivers on these key requirements.
Tags : service desks, service management platforms, service desk solutions, failing service desks, saas
     CA Technologies
By: CA Technologies     Published Date: Oct 22, 2014
This paper outlines why legacy service desks and even newer platforms have not delivered on expectations, it describes the requirements for a service desk solution to be truly effective in today’s business environment and it details how CA Cloud Service Management delivers on these key requirements.
Tags : service desks, service management platforms, service desk solutions, failing service desks, saas
     CA Technologies
By: CA Technologies     Published Date: Oct 22, 2014
This paper outlines why legacy service desks and even newer platforms have not delivered on expectations, it describes the requirements for a service desk solution to be truly effective in today’s business environment and it details how CA Cloud Service Management delivers on these key requirements.
Tags : service desks, service management platforms, service desk solutions, failing service desks, saas
     CA Technologies
By: CA Technologies     Published Date: Oct 22, 2014
This paper outlines why legacy service desks and even newer platforms have not delivered on expectations, it describes the requirements for a service desk solution to be truly effective in today’s business environment and it details how CA Cloud Service Management delivers on these key requirements.
Tags : service desks, service management platforms, service desk solutions, failing service desks, saas
     CA Technologies
By: CA Technologies     Published Date: Oct 22, 2014
This paper outlines why legacy service desks and even newer platforms have not delivered on expectations, it describes the requirements for a service desk solution to be truly effective in today’s business environment and it details how CA Cloud Service Management delivers on these key requirements.
Tags : service desks, service management platforms, service desk solutions, failing service desks, saas
     CA Technologies
By: HPE     Published Date: Mar 23, 2015
If you’ve noticed more employees accessing the corporate network using their personally owned mobile devices, you’re not alone. Many employees are boosting their productivity by using their smartphones and tablets at work. Gone are the days of corporate IT departments dictating the types of mobile devices that could access the network. Bring your own device (BYOD) policies, while increasing employee satisfaction and productivity, are straining corporate networks. This white paper describes the limitations of legacy networks, especially for supporting BYOD. Understanding these limitations can pave the way for a successful BYOD management policy for campus and branch networks.
Tags : corporate network, personal devices, smartphone, tablet, legacy networks, byod
     HPE
By: Dell EMC     Published Date: Aug 17, 2017
The migration from a traditional enterprise IT infrastructure architecture with separate servers, separate traditional SAN, and separate hyperscale public cloud to an integrated hyperconverged architecture including Server SAN and an integrated hybrid cloud is a profound change. Wikibon explores the premise that the migration is justified, and the optimum hybrid cloud strategy is to use the same architecture and software for both the on-premises True Private Cloud and the public cloud services. Wikibon uses the term “True Hybrid Cloud” to describe this approach.
Tags : hyper-converged infrastructure, hci, it infrastructure, vmware environment, it performance
     Dell EMC
By: FICO     Published Date: Aug 27, 2012
In this white paper, FICO describes how to use business rules management systems as a core technology to improve revenue while controlling costs.
Tags : cost control, underwriting, insurance, pos, point of sale, revenue generation, analytics, decision management
     FICO
By: Polycom     Published Date: Sep 04, 2012
This document describes the security issues that organizations should consider as they deploy UC, and offers Polycom's recommendations for implementing secured UC.
Tags : firewall traversal, polycom, unified communications, security solutions, uc devices
     Polycom
By: Entrust Datacard     Published Date: Sep 28, 2016
This guide describes the technical and business impact of SHA-1 migration as it pertains to SSL certificates only. It will outline a recommended migration path to minimise the cost and operational impact of replacing affected SSL certificates.
Tags : security, security application, ssl, ssl certificates, sha
     Entrust Datacard
By: Iron Mountain     Published Date: Aug 28, 2014
This white paper describes findings from the first major survey of information governance practices at healthcare organizations.
Tags : iron mountain, information governance practices, ahima, cohasset associates, healthcare benchmarking, healthcare it, information lifecycle practices, health information management
     Iron Mountain
By: EMC     Published Date: Apr 15, 2011
This white paper introduces the EMC Fast VP technology and describes its features, functions, and management.
Tags : emc fast vp, unified storage system, fast cache, lun management, storage tier
     EMC
By: Red Hat Government     Published Date: Jul 21, 2011
This whitepaper describes the various forms that cloud computing can take and how different types of technology relate to each other.
Tags : red hat, open source, enterprise linux, enterprise solutions, virtualization, linux, unix, redhat
     Red Hat Government
By: OutSystems     Published Date: Mar 18, 2015
In this white paper we describe the top four issues that cause mobile projects to fail and outline a path that can take you safely around these common pitfalls and put you on track to delivering a powerful, flexible mobile application strategy.
Tags : application development, mobile app development, mobile app pitfalls, a guide to mobile app success
     OutSystems
By: ServiceNow     Published Date: Jul 09, 2015
Modern IT requires an evolved approach to orchestration – one that erases the barriers separating people, process and technology. Modern IT also demands tools, including orchestration, that promote action and agility. Without high levels of automation, virtual machines and cloud services will quickly grow out of control. IT organizations choose evolved orchestration to deliver business agility while also maintaining control. This white paper describes how ServiceNow Orchestration empowers IT organizations to do all of this and more.
Tags : 
     ServiceNow
By: Teradata     Published Date: Jun 22, 2015
This paper looks at the critical connection between data analytics and the future of tax compliance. It shows how the ability to pinpoint the “right” cases can bring more efficiency—and more revenue—to tax agencies. It also confirms that tax agencies already have vital data at their fingertips; the challenge is to find new and better ways to put it to use. Finally, it describes how a cohesive compliance strategy demands an agile, balanced solution of people, processes, technology, and data.
Tags : 
     Teradata
By: Zooz Payments     Published Date: Feb 11, 2016
This white paper will describe the main problems merchants face when it comes to customer conversions and payment acceptance, and suggest solutions that will enable you to increase your conversion rate.
Tags : online payments, ecommerce payments, ecommerce, credit card processing, online gateway, payments solutions, payment systems, electronic payment systems
     Zooz Payments
By: Webroot     Published Date: Nov 07, 2012
This case study describes how globally dispersed technology company, Cascade Microtech addressed concerns about Web Security.
Tags : case study, web security, cloud, mobility, mobile security, web security solutions, security
     Webroot
By: Oracle     Published Date: Aug 08, 2013
As social media use has grown, an urgent need has emerged to correlate the information generated through social data with existing consumer information, and integrate it with sophisticated data management systems. This white paper describes how organizations can blend social insights with more-traditional data in an integrated customer data hub to optimize social strategies and create outreach efforts, new products, and campaigns grounded in real-time, repeatable, automated, and scalable analysis.
Tags : social media, business intelligence, customer hub, crm, oracle
     Oracle
By: Oracle     Published Date: Aug 15, 2013
John Moxley describes the reasons behind the company’s decision to choose Oracle Taleo Cloud Service.
Tags : cricket's, oracle, taleo, cloud service, cloud
     Oracle
By: Rohde & Schwarz Cybersecurity     Published Date: Nov 28, 2017
DPI software is made to inspect packets at high wire speeds and a critical factor is the throughput and resources required. Keeping the amount of resources that integrated DPI and application classification technology requires low is critical. The fewer cores (on a multi-core processor) and the less on-board memory an engine needs, the better. Multi-threading provides almost linear scalability on multi-core systems. In addition, highly-optimized flow tracking is required for handling millions of concurrent subscribers.
Tags : detection, rate, performance, efficiency, accuracy, encrypted apps, integration, metadata
     Rohde & Schwarz Cybersecurity
By: Symantec     Published Date: Jul 09, 2017
This paper describes how malware is evolving, how it functions, and how it can be identified, neutralized, and blocked by what we refer to as cloud generation malware analysis, which is available as a robust enterprise cloud service. Let’s start with how the blizzard of advanced malware alarms is affecting IT security teams.
Tags : cloud, malware, threat and vulnerability management, security
     Symantec
By: LifeSize, a division of Logitech     Published Date: Aug 25, 2011
This briefing from the Government Business Council (GBC) describes the growth of telework and how agencies can identify key indicators for success...
Tags : lifesize, video conferencing, multimedia presentation, productivity, high definition
     LifeSize, a division of Logitech
By: Prophix     Published Date: Jun 03, 2016
Prophix and IMA hosted a webcast, titled “Overcoming Barriers to Implement CPM Methods”, featuring subject matter expert Gary Cokins, the CEO, at Analytics-Based Performance Management. The adoption rate of business analytics and corporate performance management (CPM) methods has been slowed by various barriers. Gary Cokins outlines the causes of this lag, as well as lessons learned about how to overcome obstacles, and obtain buy-in to manage and improve performance. He describes techniques such as strategy maps, balanced scorecards with key performance indicators (KPIs), channel and customer profitability reporting, and driver-based budgeting that can prevent failure when implementing CPM methods.
Tags : prophix, best practices, performance management, business analytics, productivity
     Prophix
By: Schneider Electric     Published Date: Oct 17, 2016
This paper describes key security aspects of developing and operating digital, cloud-based remote monitoring platforms that keep data private and infrastructure systems secure from attackers.
Tags : 
     Schneider Electric
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics