RSS feed Get our RSS feed

News by Topic

scribe

Results 326 - 350 of 835Sort Results By: Published Date | Title | Company Name
By: SAS     Published Date: Apr 21, 2015
This white paper describes the architecture of SAS Marketing Operations Management and various aspects of its deployment and security.
Tags : 
     SAS
By: SAS     Published Date: Apr 20, 2015
This conclusions paper introduces key machine learning concepts and describes new SAS solutions – SAS In-Memory Statistics for Hadoop and SAS Visual Statistics – that enable machine learning at scale.
Tags : 
     SAS
By: SAS     Published Date: Apr 16, 2015
This white paper describes the architecture of SAS Marketing Operations Management and various aspects of its deployment and security. The following areas are covered: • High-level architecture overview • Architectural components • Ecosystem • Virtualization • Deployment options • Deployment best practices • Security This paper is intended for those involved in purchasing, selling and implementing SAS Marketing Operations Management, including system administrators and anyone seeking an understanding of the solution’s architecture and security.
Tags : 
     SAS
By: IBM     Published Date: Apr 15, 2015
What if your organization could take advantage of emerging business opportunities by deploying new applications dramatically faster than you ever could before? What if you could increase the value of your existing application investments by leveraging them in the cloud—and easily move your apps across off-premises and on-premises cloud options? These capabilities are available today. With IBM® PureApplication® solutions, companies can build and use a cloud environment faster, easier and with less risk than traditional methods to better engage with their customers and partners in new ways. The result: increased competitiveness and improved profitability in a changing business landscape. This paper describes a simpler way forward to gain these advantages.
Tags : ibm, business intelligence, applications, cloud computing, migration
     IBM
By: Cisco     Published Date: Apr 10, 2015
As education evolves, so does the way we teach and learn. This report focuses on one of the newest trends, still in its nascent stages—mobile learning. It describes the potential benefits of mobile learning, addresses the challenges and opportunities that introducing mobile learning presents, and provides examples from school districts that have already implemented mobile learning programs so we can learn from their best practices. The report also suggests key points to consider as you develop your plans, align your goals, and make decisions regarding mobile learning in your schools.
Tags : cisco, education, mobile learning, mobile devices
     Cisco
By: Cisco     Published Date: Apr 10, 2015
The term “perfect storm” is used to describe when several forces come together and create a large, single event that has transformative effects. A technology perfect storm took place in the 1990s when Internet services, low-cost home computers, browsers and affordable broadband all came together and created the Internet revolution. This revolution launched an entirely new economic model that sparked new ways of doing business, changed the way we work, and allowed us to blend our personal and professional lives. At first, these new ways of working were the exception. But the transformation to an Internet-based work style is now complete, and this style has become very much the norm.
Tags : cisco, akaamai, customer experience, digital customer experience, enterprise, wan, integrated solutions, optimization
     Cisco
By: Cisco     Published Date: Apr 10, 2015
This part of the CVD describes design considerations to implement a successful BYOD solution and different deployment models to address diverse business cases. Other parts of the CVD provide more details on how to implement unique use cases. There are numerous ways to enable a BYOD solution based on the unique business requirements of a specific organization. While some organizations may take a more open approach and rely on basic authentication, other organizations will prefer more secure ways to identify, authenticate, and authorize devices. A robust network infrastructure with the capabilities to manage and enforce these policies is critical to a successful BYOD deployment.
Tags : cisco, byod, wifi, wireless, wlan, productivity, productivity
     Cisco
By: Cisco     Published Date: Apr 10, 2015
This document describes how the Cisco® 40-Gbps QSFP BiDi transceiver reduces overall costs and installation time for customers migrating data center aggregation links to 40-Gbps connections.
Tags : cisco. transceiver, cost reduction, data center aggregation, migration, switches
     Cisco
By: IBM     Published Date: Apr 09, 2015
This paper describes the persistent and evolving IT threat landscape, along with the need for and benefits of building an enterprise security operations center (SOC).
Tags : it threat, security threat, security operations center, ibm, optimization, security
     IBM
By: IBM     Published Date: Apr 08, 2015
Carla Wolfe, Senior Business Analyst at Elevations Credit Union will describe their process discovery journey, and how it has led to remarkable changes in their organization. Along the way they've also accumulated several performance awards, including the 2013 Rocky Mountain Performance Excellence PEAK award, and plan to be a 2014 applicant for the prestigious National Malcolm Baldrige Performance Excellence Award.
Tags : ibm, smarter processes, elevations credit union, blueworks live, cross enterprise, engagement, culture, performance
     IBM
By: Cyveillance     Published Date: Apr 03, 2015
Protecting a business – including its information and intellectual property, physical infrastructure, employees, and reputation – has become increasingly difficult. Online threats come from all sides: internal leaks and external adversaries; domestic hacktivists and overseas cybercrime syndicates; targeted threats and mass attacks. And these threats run the gamut from targeted to indiscriminate to entirely accidental. Like many security trends and frameworks, the early stages of adoption often involve inconsistent definitions, challenges with justification and management communication and an unknown path to implementation. In this white paper, we: • Review the current threatscape and why it requires this new approach • Offer a clarifying definition of what cyber threat Intelligence is • Describe how to communicate its value to the business and • Lay out some concrete initial steps toward implementing Intelligence-Led Security
Tags : intellectual property, hackers, protection, leaks, security, threatscape
     Cyveillance
By: Altiscale     Published Date: Mar 30, 2015
This industry analyst report describes important considerations when planning a Hadoop implementation. While some companies have the skill and the will to build, operate, and maintain large Hadoop clusters of their own, a growing number are choosing not to make investments in-house and are looking to the cloud. In this report Gigaom Research explores: • How large Hadoop clusters behave differently from the small groups of machines developers typically use to learn • What models are available for running a Hadoop cluster, and which is best for specific situations • What are the costs and benefits of using Hadoop-as-a-Service With Hadoop delivered as a Service from trusted providers such as Altiscale, companies are able to focus less on managing and optimizing Hadoop and more on the business insights Hadoop can deliver.
Tags : hadoop implementation, hadoop cluster, hadoop-as-a-service, managing and optimizing
     Altiscale
By: Skillsoft     Published Date: Mar 27, 2015
Read peer insight by HR leaders at Rent-A-Center, Madonna University & Copper Phoenix Consulting, Schnitzer Steel and Southwestern Energy Company and get actionable ideas on effective approaches for recruiting and retaining the “millennials” generation that has been alternatively described as entitled and creative.
Tags : leadership, leadership development, succession planning, millennials, skills gap, talent gap, leaders, managers
     Skillsoft
By: HPE     Published Date: Mar 23, 2015
If you’ve noticed more employees accessing the corporate network using their personally owned mobile devices, you’re not alone. Many employees are boosting their productivity by using their smartphones and tablets at work. Gone are the days of corporate IT departments dictating the types of mobile devices that could access the network. Bring your own device (BYOD) policies, while increasing employee satisfaction and productivity, are straining corporate networks. This white paper describes the limitations of legacy networks, especially for supporting BYOD. Understanding these limitations can pave the way for a successful BYOD management policy for campus and branch networks.
Tags : corporate network, personal devices, smartphone, tablet, legacy networks, byod
     HPE
By: OutSystems     Published Date: Mar 18, 2015
In this white paper we describe the top four issues that cause mobile projects to fail and outline a path that can take you safely around these common pitfalls and put you on track to delivering a powerful, flexible mobile application strategy.
Tags : application development, mobile app development, mobile app pitfalls, a guide to mobile app success
     OutSystems
By: Kaseya     Published Date: Mar 12, 2015
This white paper describes the key characteristics of the changing environment and it identifies a new choice that IT managers have for meeting the growing set of management challenges.
Tags : it environments, cloud computing, mobility, big data, saas, iaas, service management, virtualization
     Kaseya
By: IBM     Published Date: Mar 10, 2015
This white paper describes software as the invisible thread that links product parts into an intelligent whole. It examines software delivery for smart products and strategies for evolving software development into a business process. Agile development has become a cornerstone of most software development organizations. Marked by iterative processes that deliver incremental value over time, agile development has enabled organizations to manage software complexity more effectively and to improve quality and time to market compared with previous development processes.
Tags : software development, ibm, agile development, software delivery
     IBM
By: Crownpeak     Published Date: Mar 05, 2015
The cloud market is moving forward as reflected in both the evolving perspectives voiced by IT decision-makers and by the business success of cloud service providers. On perspectives, Stratecast’s recurring annual surveys reveal that public cloud adoption has now reached a much-awaited tipping point with a percentage of the 2014 survey respondents stating that they currently use public cloud Infrastructure as a Service (IaaS), and another percentage stating they will too within the next months. On cloud service providers, the business results of Amazon Web Services (AWS), now in its eighth year and still rapidly growing, make a similar statement. This report describes how AWS is breaking the “cloud not secure enough” adoption barrier and, in the process, injecting innovation into the competitive dynamics of the security market.
Tags : cloud security, crownpeak, security market, competitive dynamics, security
     Crownpeak
By: Workforce Software     Published Date: Mar 04, 2015
The traditional functions of a time and attendance system still matter, but newer solutions can deliver so much more. Join this informative webcast to learn some of specific advantages that cloud delivery offers for time and attendance, and for an update on the security best practices that vendors should employ to keep your system—and your data—safe. The presenters will also describe how a modern solution can improve decision-making, boost productivity, and provide a better view of your total workforce.
Tags : workforce software, cloud, time attendance, modern solution
     Workforce Software
By: Venafi     Published Date: Mar 04, 2015
This technical case study addressing key and certificate security issues is designed for security conscious enterprises to understand real-life attack scenarios that threaten their businesses in today’s world. This white paper demonstrates a recent attack that used cryptographic keys and digital certificates as well as guidance on how to protect certificates and keys and quickly discover and remediate breaches. This paper should be read by more technical IT security staff who are interested in detailed attack methods and remediation tactics. The executive summary is intented for IT Security leaders (CISOs and their direct reports) and addresses the proof-of-concept attack impacts on the business. The attack scenario described in this technical white paper is based on a reproduction of a real-world attack in a Raxis test environment that simulated an enterprise security infrastructure.
Tags : venafi, ssh keys, vpn credentials, digital certificates
     Venafi
By: Skillsoft     Published Date: Mar 03, 2015
This ExecBlueprint describes effective approaches for recruiting and retaining this generation that has been alternatively described as entitled and creative. First, you may need to address conflicts with older workers if they resent millennials’ demands for flexible work arrangements, career advancement, and open relationships with leadership.
Tags : managing millennials, recruiting, retaining, millennial practices, development programs, benchmarking, mentoring programs
     Skillsoft
By: Schneider Electric     Published Date: Mar 03, 2015
This paper explains how to plan for VoIP power and cooling needs, and describes simple, fast, reliable, and cost effective strategies for upgrading old facilities and building new facilities.
Tags : voip power and cooling needs, building new facilities, upgrading old facilities, ip telephony applications
     Schneider Electric
By: Acquia     Published Date: Feb 26, 2015
Content is king. But as the line between publishers and brands are blurring, all brands are finding themselves in both the content and the commerce games. And customers expect this. As Alexis Maybank, founder of Gilt Groupe described it, “If I go into a restoration hardware store, for instance, I understand they’re selling that product, but I’m not just interested in seeing rows of lamps on shelves. I want to be shown how to set up a room and create a look. That’s what I’m craving: the ability to see a product, understand how to use it, and be given the tips and tools to imagine how that might change my interior.” Consumers are very savvy today, and being able to attract and build a relationship with the consumer is key to brand success.This eBook will help you understand how to think like a publisher and turn your commerce site into a content machine.
Tags : content marketing, online consumers, commerce site, brand generated content, emerging marketing, marketing research, branding, data management/analytics
     Acquia
By: Okta     Published Date: Feb 24, 2015
Microsoft made a massive push to the cloud in 2014, and as a result Office 365 is taking off. We’re seeing it in how Okta customers are using Okta to connect to Office 365 in increasing numbers. This eGuide provides some data from the Okta Application Network on the trends we are seeing around Office 365. It also describes the most important things to consider for Identity and Mobility Management during deployment. Office 365 is unlike any other cloud app in it’s complexity, and it is best for IT to plan and deploy solutions around Identity and Mobility Management in concert with their Office 365 roll-out to get maximum user adoption.
Tags : identity and mobility management, office 365, cloud, maximum user adoption
     Okta
By: IBM     Published Date: Feb 19, 2015
This white paper describes how cloud computing can help healthcare organizations reshape their business models and services, design innovative ways of providing better, patient-centered care, and empower consumers to take greater participation in their health.
Tags : cloud computing, healthcare industry, patient-centered care, consumer empowerment
     IBM
Start   Previous    7 8 9 10 11 12 13 14 15 16 17 18 19 20 21    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics