RSS feed Get our RSS feed

News by Topic

service models

Results 1 - 25 of 140Sort Results By: Published Date | Title | Company Name
By: Dell PC Lifecycle     Published Date: Feb 13, 2018
IT market intelligence agency, IDC, conducted a global study of 3500+ IT leaders around the world and found that companies at all levels are considering PC Lifecycle as a Service models to reduce costs, shorten refresh cycles and procure better equipment for their employees. Dell PC as a Service (PCaaS) combines hardware, software, lifecycle services and financing into one all-encompassing solution – providing a single, predictable price per seat per month provided by Dell Financial Services.
Tags : market, idc, lifecycle, service, dell intel
     Dell PC Lifecycle
By: Cisco EMEA     Published Date: Mar 05, 2018
Enterprise IT is changing. It’s evolving from a rigid, static, manually configured and managed architecture to one where connectivity is dynamic, application services are on demand, and processes are automated. Enterprise networking is evolving along with IT. This has been evident in the past several years in initiatives such as enterprise digitization and as-a-service consumption models, as well as their enablers, including BYOD, IoT and cloud. Add to this, all of the security implications of each initiative. The evolution of IT requires a network that evolves along with IT’s changing requirements – a network that continuously adapts to ever-changing security threats, and evolving digitization, mobility, IoT and cloud requirements.
Tags : networking, enterprise, architecture, applications
     Cisco EMEA
By: Cisco EMEA     Published Date: Nov 08, 2018
Enterprise IT is changing. It’s evolving from a rigid, static, manually configured and managed architecture to one where connectivity is dynamic, application services are on demand, and processes are automated. Enterprise networking is evolving along with IT. This has been evident in the past several years in initiatives such as enterprise digitization and as-a-service consumption models, as well as their enablers, including BYOD, IoT and cloud. Add to this, all of the security implications of each initiative. The purpose of this paper is to assess the switching requirements for next-generation campus networks incorporating wired switches, wireless LANs and WAN routers in an intuitive, intent-based network supporting cloud, mobility, IoT and digitization, with pervasive security.
Tags : 
     Cisco EMEA
By: Cisco EMEA     Published Date: Dec 11, 2018
Enterprise IT is changing. It’s evolving from a rigid, static, manually configured and managed architecture to one where connectivity is dynamic, application services are on demand, and processes are automated. Enterprise networking is evolving along with IT. This has been evident in the past several years in initiatives such as enterprise digitization and as-a-service consumption models, as well as their enablers, including BYOD, IoT and cloud. Add to this, all of the security implications of each initiative. The evolution of IT requires a network that evolves along with IT’s changing requirements – a network that continuously adapts to ever-changing security threats, and evolving digitization, mobility, IoT and cloud requirements. The purpose of this paper is to assess the switching requirements for next-generation campus networks incorporating wired switches, wireless LANs and WAN routers in an intuitive, intent-based network supporting cloud, mobility, IoT and digitization, with
Tags : 
     Cisco EMEA
By: Commvault     Published Date: Jul 06, 2016
The cloud is changing everything. It’s transforming IT organizations with agility and efficiency like never before, enabling them to realize new IT-as-a-Service delivery models. Yet, with change also comes new challenges. Read more to see how you can solve them so that you can realize the full potential of your next cloud project.
Tags : commvault, cloud data, cloud data protection, it as a service, cloud security, cloud infrastructure, cloud optimization, cloud storage
     Commvault
By: Financial Force     Published Date: Dec 01, 2017
Traditional business models are getting shattered by subscriptions. No one can doubt the new services economy is flourishing. The cloud, mobile, digital, connected devices, globalization - all these things have had a hand in reshaping business and powering new business models. Companies today are wrapping service-based business models and while this shift adds new complexities for finance and has major revenue recognition implications, it also gives finance leaders huge opportunities to become bigger value creators for their business and make a stronger impact on enterprise-wide strategies - not financials.
Tags : 
     Financial Force
By: Dell and Nutanix     Published Date: Oct 26, 2017
A related recent development in the data center is converged infrastructure (CI). Instead of the traditional silo deployment approach to storage, compute, and network resources, all infrastructure elements are delivered and managed in a single environment, providing virtualized access to business services in an efficient manner. This is particularly suitable for cloud-based delivery models. However, since CI achieves lower costs through optimization of data center resources, it can be effective for all IT organizations, regardless of the way in which the services are managed or presented.
Tags : 
     Dell and Nutanix
By: T Systems     Published Date: Nov 28, 2018
The wait is over. Here at T-Systems, we are proud to present the findings of CXP Group - a leading independent European research and advisory firm in the field of digital, software and IT services. Their new “Digital Industrial Transformation with the Internet of Things” report examines the dynamic range of opportunities that IoT holds for businesses and explores the challenges of integrating existing data processes with those that are IoT enabled. The report is the result of the feedback cultivated from interviews with senior business and IT decision-makers responsible for creating and running innovation strategies at 250 large-scale European manufacturers. The data has been disseminated by region, strategies, pain points, IoT adoption, intention, investment etc. and provides readers with a detailed examination of what industrial businesses look for most from IoT. The report provides a fascinating unearthing of influencing factors for IoT readiness and digitization as a whole. Using
Tags : industrial manufacture, iot, internet of things, iot adoption, european, digitization, digitization strategy, value chains
     T Systems
By: Dell EMC EMEA     Published Date: Nov 22, 2018
IT market intelligence agency, IDC, conducted a global study of 3500+ IT leaders around the world and found that companies at all levels are considering PC Lifecycle as a Service models to reduce costs, shorten refresh cycles and procure better equipment for their employees. Dell PC as a Service (PCaaS) combines hardware, software, lifecycle services and financing into one all-encompassing solution – providing a single, predictable price per seat per month provided by Dell Financial Services. Learn more about Dell solutions powered by Intel®.
Tags : 
     Dell EMC EMEA
By: Akamai Technologies     Published Date: Dec 11, 2018
IT complexity has rapidly grown with more applications, users, and infrastructure needed to service the enterprise. Traditional remote access models weren’t built for business models of today and are unable to keep up with the pace of change. Read this paper to understand how remote access can be redefined to remove the complexity, meet end-user expectation and mitigate network security risks.
Tags : 
     Akamai Technologies
By: Akamai Technologies     Published Date: Jun 14, 2018
IT complexity has rapidly grown with more applications, users, and infrastructure needed to service the enterprise. Traditional remote access models weren’t built for business models of today and are unable to keep up with the pace of change. Read this paper to understand how remote access can be redefined to remove the complexity, meet end-user expectation and mitigate network security risks.
Tags : security, multi-factor authentication, network security risks
     Akamai Technologies
By: HP     Published Date: Dec 05, 2014
This assessment is composed of a core set of comparative questions, and the option to be assessed in any of three key areas: computing economics, service delivery and business performance. After a half-decade of cost cutting and shrinking IT budgets, the compute infrastructure that powers the enterprise now is typically inefficient, slow and not optimized for business outcomes. It is better suited to the economic realities of 2010 rather than the rigors of the application workloads, delivery models & business expectations of today driven by cloud, mobility, security and big data megatrends. As a result, there is a significant gap between what businesses expect from technology and what IT can deliver.
Tags : server, performance, efficiency, application, infrastructure, information technology, mobility, cloud
     HP
By: HPE     Published Date: Feb 11, 2015
This assessment is composed of a core set of comparative questions, and the option to be assessed in any of three key areas: computing economics, service delivery and business performance. After a half-decade of cost cutting and shrinking IT budgets, the compute infrastructure that powers the enterprise now is typically inefficient, slow and not optimized for business outcomes. It is better suited to the economic realities of 2010 rather than the rigors of the application workloads, delivery models & business expectations of today driven by cloud, mobility, security and big data megatrends. As a result, there is a significant gap between what businesses expect from technology and what IT can deliver.
Tags : 
     HPE
By: Akamai Technologies     Published Date: Apr 25, 2018
Cyber attackers are targeting the application programming interfaces (APIs) used by businesses to share data with customers. Consumer mobile adoption, electronic goods and services, and high volumes of data have led businesses to use APIs for data exchange. Unfortunately, attackers can also use APIs to access or deny service to valuable data and systems. This white paper explores strategies for protecting APIs. You’ll learn about APIs, how and why these endpoints are targets for web application attacks, security models, and how Akamai can help.
Tags : api, security, interface, businesses, data, mobile, adoption
     Akamai Technologies
By: Dun & Bradstreet     Published Date: Mar 03, 2017
Creating predictive analytics from alternative data has become the current focus of the biggest quant trading firms in the industry The democratization of financial services data and technology, together with more intense competition, makes the needs of today’s market participants vastly different from those of previous generations. Firms must locate untapped sources of data for both public and non-public companies. This alternative data, such as payment data and other non-public information, from sources beyond the common channels, can be a predictive indicator of market performance; a difference maker in assisting firms as they develop models to evaluate their investments. By combining our unique data sets with advanced analytics, traders, analysts and managers can seek predictive signals and actionable information utilizing their own models. View our research report to learn how alternative data, our 'Information Alpha,' can help you earn differentiated investment returns.
Tags : 
     Dun & Bradstreet
By: SAP     Published Date: Sep 19, 2017
Everything is changing in retail. Stores are becoming an omni channel experience; fulfilment and service centers and smart showrooms are enabling endless-aisle commerce. eCommerce and mobile customer experiences are changing retail, as retailers are now entering the third generation of ecommerce, in which IDC identifies eight core capabilities at the heart of the transformation of key operating models. Omni-channel fulfilment practices and new merchandise planning archetypes are emerging to drive profit, and retail technology is fundamentally changing, as digital transformations take shape in the industry. Websites, smartphones, the Internet of Things (IoT), and wearables change customers and their journeys, while 3D printing changes value chains and products, while IoT changes products, stores, and logistics, and artificial intelligence (AI), probably the most pervasive agent of change, will underpin new levels of customer individualization and workforce efficiencies.
Tags : business models, innovation, omni channel, ecommerce, commerce platform, retail
     SAP
By: SAP     Published Date: Sep 28, 2017
Everything is changing in retail. Stores are becoming an omni channel experience; fulfilment and service centers and smart showrooms are enabling endless-aisle commerce. eCommerce and mobile customer experiences are changing retail, as retailers are now entering the third generation of ecommerce, in which IDC identifies eight core capabilities at the heart of the transformation of key operating models. Omni-channel fulfilment practices and new merchandise planning archetypes are emerging to drive profit, and retail technology is fundamentally changing, as digital transformations take shape in the industry. Websites, smartphones, the Internet of Things (IoT), and wearables change customers and their journeys, while 3D printing changes value chains and products, while IoT changes products, stores, and logistics, and artificial intelligence (AI), probably the most pervasive agent of change, will underpin new levels of customer individualization and workforce efficiencies.
Tags : business models, innovation, omni channel, ecommerce, commerce platform, retail
     SAP
By: SAP     Published Date: Sep 28, 2017
Everything is changing in retail. Stores are becoming an omni channel experience; fulfilment and service centers and smart showrooms are enabling endless-aisle commerce. eCommerce and mobile customer experiences are changing retail, as retailers are now entering the third generation of ecommerce, in which IDC identifies eight core capabilities at the heart of the transformation of key operating models. Omni-channel fulfilment practices and new merchandise planning archetypes are emerging to drive profit, and retail technology is fundamentally changing, as digital transformations take shape in the industry.
Tags : business models, innovation, omni channel, ecommerce, commerce platform, retail
     SAP
By: ServiceNow     Published Date: Oct 18, 2013
To reach the customers of IT services, you have to abandon long-entrenched models of IT thinking & replace them with a customer-focused model that focuses on value, experience & context. Join the webinar to understand the issues internal customers face with IT, & see how IT can evolve from being the department of no to the department of now.
Tags : servicenow, enterprise it, service automation, applications, webinar, customer relationships, perception of it, change management
     ServiceNow
By: Akamai Technologies     Published Date: Apr 13, 2018
Cyber attackers are targeting the application programming interfaces (APIs) used by businesses to share data with customers. Consumer mobile adoption, electronic goods and services, and high volumes of data have led businesses to use APIs for data exchange. Unfortunately, attackers can also use APIs to access or deny service to valuable data and systems. This white paper explores strategies for protecting APIs. You’ll learn about APIs, how and why these endpoints are targets for web application attacks, security models, and how Akamai can help.
Tags : api, security, interface, businesses, data, mobile, adoption
     Akamai Technologies
By: Akamai Technologies     Published Date: Apr 25, 2018
Cyber attackers are targeting the application programming interfaces (APIs) used by businesses to share data with customers. Consumer mobile adoption, electronic goods and services, and high volumes of data have led businesses to use APIs for data exchange. Unfortunately, attackers can also use APIs to access or deny service to valuable data and systems. This white paper explores strategies for protecting APIs. You’ll learn about APIs, how and why these endpoints are targets for web application attacks, security models, and how Akamai can help.
Tags : api, security, interface, businesses, data, mobile, adoption
     Akamai Technologies
By: BMC Software     Published Date: Aug 12, 2013
While many companies have begun using external cloud infrastructure services, and a smaller number have embarked on internal “cloud-like” initiatives, others are just starting out and trying to determine how to best use cloud computing. This paper written by BMC’s Deputy CTO Herb VanHook, provides an overview of the major models of cloud infrastructure services (IaaS) and the business benefits and best uses of each model.
Tags : cloud, bmc, cloud infrastructure
     BMC Software
By: Akamai Technologies     Published Date: Apr 25, 2018
Cyber attackers are targeting the application programming interfaces (APIs) used by businesses to share data with customers. Consumer mobile adoption, electronic goods and services, and high volumes of data have led businesses to use APIs for data exchange. Unfortunately, attackers can also use APIs to access or deny service to valuable data and systems. This white paper explores strategies for protecting APIs. You’ll learn about APIs, how and why these endpoints are targets for web application attacks, security models, and how Akamai can help.
Tags : api, security, interface, businesses, data, mobile, adoption
     Akamai Technologies
By: Dell Server     Published Date: Aug 07, 2018
IT is in the midst of one of its major transformations. IDC has characterized this paradigm shift as the “third platform,” driven by innovations in cloud, big data, mobility and social technologies. Progressive enterprises are seeking to leverage third-platform technologies to create new business opportunities and competitive differentiation through new products such as Dell EMC PowerEdge Servers powered by Intel® Xeon® Platinum processor and services, new business models and new ways of engaging customers.
Tags : 
     Dell Server
By: DellEMC and Intel®     Published Date: Sep 20, 2017
A related recent development in the data center is converged infrastructure (CI). Instead of the traditional silo deployment approach to storage, compute, and network resources, all infrastructure elements are delivered and managed in a single environment, providing virtualized access to business services in an efficient manner. This is particularly suitable for cloud-based delivery models. However, since CI achieves lower costs through optimization of data center resources, it can be effective for all IT organizations, regardless of the way in which the services are managed or presented. Intel® Xeon® processor Ultrabook, Celeron, Celeron Inside, Core Inside, Intel, Intel logotyp, Intel Atom, Intel Atom Inside, Intel Core, Intel Inside, Intel Inside logotyp, Intel vPro, Itanium, Itanium Inside, Pentium, Pentium Inside, vPro Inside, Xeon, Xeon Phi och Xeon Inside är varumärken som tillhör Intel Corporation eller dess dotterbolag i USA och/eller andra länder
Tags : ultrabook, celeron, celeron inside, core inside, intel, intel logo, intel atom, intel atom inside
     DellEMC and  Intel®
Start   Previous   1 2 3 4 5 6    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics