RSS feed Get our RSS feed

News by Topic

service based it

Results 51 - 75 of 315Sort Results By: Published Date | Title | Company Name
By: Dell and Nutanix     Published Date: Oct 26, 2017
The CSI Companies consists of four entities plus affiliate Anteo Group that provide staffing and specialized services to meet a wide range of client needs. Since 1994, the Jacksonville, Floridabased company has offered staff augmentation services, executive search, and direct hire of people for clients in healthcare, financial services, banking, retail/hospitality, technology, and other industries. The company serves businesses nationwide from its headquarters and three regional offices.
Tags : 
     Dell and Nutanix
By: RCN Business     Published Date: Nov 11, 2014
In a changing business climate, you're only productive as the technology that supports you. In fact, having the right services can mean the difference between one more happy sale or one less customer. Don’t settle for "one less" - get the right solution for your business with RCN Business Services. RCN Business Services offers a full suite of communications products and services to businesses of all sizes, including Internet, voice, video and network solutions. We are a facilities-based provider that offers extensive fiber density with redundancy and superior performance. Spanning over 6,000 miles, the advanced fiber-rich network is completely diverse from other communications providers, enabling businesses to experience exceptional customer service, quicker installation and issue resolution. RCN Business operates on three fundamental tenets: Partnership, Choice and Technology. These fundamental tenets guide how RCN Business approaches the sales process, addresses its customers, and supports its products and services. Partnership: The process starts with a dedicated RCN Business account representative actively listening and learning the needs, goals and challenges of a business. The trained and experienced RCN Business staff then delivers a customized solution. Choice: RCN Business understands that one size does not fit all. The goal is to create a reliable, customized technology solution that contributes to a business’s success and growth. Technology: Technology and customer support are critical to any business. With RCN Business owning and having full control of its network, businesses get local U.S. based operations, faster response times and a continuous monitoring for superior uptime.
Tags : lan, voip, business communication, wan, pbx
     RCN Business
By: Allscripts     Published Date: Oct 14, 2015
Independent physician practices are weighing their options as fee-for-service reimbursement models shift to value-based-care models, such as Accountable Care Organizations (ACOs). Download this white paper to learn more about forming ACOs.
Tags : accountable care organizations, acos, independent physician practices, fee-for-service, reimbursement, healthcare finance
     Allscripts
By: ServiceNow     Published Date: Feb 24, 2017
At the highest level of organizations, a new management directive has emerged to meet the changed nature of customer demands and interactions as well as the need to differentiate within the market. This directive has one goal: providing a differentiated customer service experience. As products become increasingly commoditized, organizations can set themselves apart from their competitors by providing a unique customer service experience that creates a "relationship" based on intangible benefits that their customers will find hard to give up. While this vision is theoretically sound, it requires a significant tactical shift in business thinking and processes. The modern customer's habits and service requirements have changed radically. Meeting these needs challenges many historically held beliefs and practices regarding the customer and modes of interaction.
Tags : 
     ServiceNow
By: Akamai Technologies     Published Date: Sep 27, 2016
How do you choose the best cloud security solution? Denial of service, data breaches, and SQL injection attacks are growing faster than on-premises firewalls can scale—you need a cloud-based security solution to meet the threat. Learn about the various solutions and techniques for web, DNS, and infrastructure security.
Tags : akamai, web, dns, infrastructure security, sql, cloud security solution, security
     Akamai Technologies
By: Red Hat     Published Date: May 11, 2016
This IDC study represents a vendor assessment of the public deployment-centric cloud application platform component of the platform-as-a-service market through the IDC MarketScape model. This assessment discusses both quantitative and qualitative characteristics that explain a vendor's success in this market. This IDC MarketScape covers a variety of vendors participating in the deployment-centric subset of the overall platform-as-a-service market. The evaluation is based on a comprehensive and rigorous framework that assesses vendors relative to the criteria and one another and highlights the factors expected to be the most influential for success in the market, both short term and long term.
Tags : red hat, idc, paas, cloud, application, platform
     Red Hat
By: Microsoft     Published Date: Jul 07, 2016
Before you transform your business with mobility services, you need to consider both the management and security challenges you’ll face from the combination of mobile devices and cloud-based apps. In this IDC report, you’ll examine enterprise mobility management technology—offered through solutions such as the Microsoft Enterprise Mobility Suite—and how it helps manage the security risks of your mobility strategy. Learn about these critical benefits: • Provisioning and configuration devices and users—across platforms • Ensuring only authorized users access data with identity system integration • Ensuring only compliant devices access the corporate network through conditional access policies • Allowing mobile applications to deploy in a more secure, streamline manner with enterprise app stores • Providing security for data at rest, within workflows or over wireless networks, using granular policies around applications
Tags : mobile, cloud, best practices, productivity, technology
     Microsoft
By: Panaya     Published Date: Aug 09, 2018
You can succeed in your digital transfomation and deliver applications and services faster, better, and safely. How? With Enterprise Agile Delivery. Enterprise Agile Delivery brings a wealth of benefits to organizations and can be adopted by any Agile hybrid framework: SAFe, LESS, Nexus as well as Agile/lean frameworks like Scrum and Kanban. Yet to achieve Eneterprise Agile Delivery, enterprises need an easy to use modern ALM tool for quick and successful onboarding. Download this white paper to understand how the right solution will help you: • Strategiaclly align feature releases and backlogs with your overall business strategy • Identify and prioritize dev and test activities with visibility into project waves and portfolios • Make data-based decisons for safe releases with real-time insights and multidimensional views into delivery risks • Sync business, dev, QA and release teams around shared objectives with automated coordination and communication
Tags : 
     Panaya
By: TIBCO Software     Published Date: May 31, 2018
Since it first started providing air passenger services in 2000, JetBlue has been innovating. It was the first airline to embrace dot.com transactions and electronic ticketing, and continues to churn out industry-leading inventions as described here. When business needs changed in 2014, JetBlue embarked on very robust digital transformation based on TIBCO integration and analytics technology—and the company was recognized with the first-ever TIBCO Trailblazer Impact award for the incredible effect this project was having on its strategic differentiation. In this case study, Director of Shared Development Services Andi Azzolina describes the objectives, initiatives, capabilities, and achievements making up JetBlue’s journey towards becoming the most caring travel provider in the world.
Tags : 
     TIBCO Software
By: BeyondTrust     Published Date: Apr 11, 2019
The WannaCry ransomware attack in May 2017 crippled the UK’s National Health Service (NHS) and disrupted a range of organizations across 150 countries. Despite being a relatively unsophisticated attack, WannaCry was able to make such a global impact due to preventable vulnerabilities that had largely gone unaddressed. There were many more attacks in 2017, including high-profile breaches at Uber and Equifax, where heeding cyber-security recommendations may have reduced the impact and fallout. The scale and sophistication of cyber-attacks is not slowing down – ranging from phishing scams to cryptocurrency-based cyber-attacks, to statesponsored attacks on industrial control systems. These attacks present an ever growing challenge and serve as a reminder that organizations cannot afford to be complacent in the face of cyber threats. We’re living in a time when cyberattacks are a matter of when, not if, and security professionals must focus on mitigating their extent and damage.
Tags : 
     BeyondTrust
By: Fidelis Cybersecurity     Published Date: May 15, 2019
Its the start of a new year and amidst the countless predictions flooding the internet, one things for certain 2019 is shaping up to be the year of cloud adoption. Analysts are expecting that enterprise adoption of cloud will ramp up significantly, but with this migration and the continued adoption of mobile and IoT technologies, the attack surface is changing dramatically and this has major implications for security. Fundamentally, security boundaries extend from on premises infrastructure to cloud service provider environments where perimeters no longer exist. Organizations cannot defend themselves with the same strategies and tactics that applied when it did. In this brave new world of cloud, IoT and mobile technology, organizations must be agile and shift, extend, and evolve their perimeter-based defense practices to those that are more robust. Further, a comprehensive defense in depth approach enables defense of high value assets amidst a more unpredictable cyber security landsca
Tags : 
     Fidelis Cybersecurity
By: IBM     Published Date: Jan 09, 2017
This report from IBM Emergency Response Services discusses four key trends in cybersecurity based on field experience in responding to client security incidents.
Tags : ibm, security, services operations, ibm emergency response services, cybersecurity, cyber crime
     IBM
By: IBM     Published Date: Jun 13, 2018
In the digital era, businesses in every industry are becoming technology companies. New business models such as “product as a service” (in which traditional manufacturers and distributors are driving new revenue streams by integrating software-based services into their offerings) and new operational models, such as collaboration, social business, and mobile platforms, mean that nearly every company is deriving at least part of its revenue from cloudbased solutions. So, why are so many of these new cloud solution providers building their businesses on shaky foundations? The truth is, when your business is based in the cloud, you need more than on-demand leased compute and storage capacity. You need a cloud that is enterprise-grade, secure, and resilient. Equally important—and overlooked by too many cloud solution providers—you need a cloud platform that is able to grow your business into the future, supporting next-generation functionality like Artificial Intelligence (AI). No matter wh
Tags : 
     IBM
By: Qualys     Published Date: Jul 19, 2012
Data breaches are bad for business, so every enterprise needs security. In the past this was expensive, because security products were designed for companies with deep pockets and teams of experts. But that's changed. New 'cloud based' services, such as those offered by Qualys, are fast to deploy, safe and easy to use. What's more they're even more affordable. With growing demands from customers and regulators for security, now is a good time to invest in security. Leading cloud-based security services deliver a professional level of security assurance in a form that fits the circumstances and pockets of small businesses.
Tags : technology, firewall, security, cloud, data, anti-virus
     Qualys
By: ipoque     Published Date: Feb 14, 2019
Virtualized Evolved Packet Core (vEPC) is a major breakthrough in network function virtualization (NFV). When asked where they have deployed NFV in production networks, communication service providers (CSPs) consistently name vEPC as one of the top answers. Why is that? In order to maximize their processing capacity, CSPs virtualize a subset of their network applications, including mobile edge computing (MEC), base stations (small/macro cells) and the mobile core, because these systems use a large bandwidth. The mobile packet core builds the foundation of the core network on which mobile CSPs offer IP-based services to their customers. Implementing vEPC solutions can help CSPs obtain the scale necessary to accommodate growing numbers of subscribers and large amounts of traffic or connections while controlling costs and improving on quality of experience (QoE). In the past, evolved packet core (EPC) solutions were deployed on purpose-built hardware. NFV enables operators to deploy EPC c
Tags : dpi, deep packet inspection, vepc, sdn, nfv, network analytics, virtual network
     ipoque
By: Workday     Published Date: Sep 18, 2018
Explore the strategies companies are pursuing to manage change in this Workday-sponsored Harvard Business Review Analytic Services report. See how organisations use a single cloud-based system for finance and HR to create data-led decision-making, support C-suite collaboration, and develop planning methods with better insight, accuracy, and speed.
Tags : finance, workday, workforce technology, digital strategy
     Workday
By: Cisco     Published Date: Oct 08, 2018
Cisco DNA takes a software-delivered approach to automating and assuring services across your campus, WAN, and branch networks. Based on an open and extensible platform, DNA allows you to build value on the network, so you can streamline operations and facilitate IT and business innovation.
Tags : networking, intent-based networking, gartner, wan, network, innovation, digital, digital network
     Cisco
By: HP - Enterprise     Published Date: Jun 04, 2013
HP Business Services Management (BSM), which includes HP Network Management Center, HP Systems Management, and HP Application Performance Management, is a comprehensive performance management solution designed to enable IT organizations to manage a diversity of in-house and cloud based services at a lower cost to the business. HP commissioned Dimensional Research to interview customers who have deployed HP BSM solutions to obtain detailed feedback on the real world benefits provided by these solutions. Dimensional Research conducted 26 in-depth interviews with HP customers as well as researched documented case studies. This report summarizes those findings.
Tags : business service, management solutions, bsm, business services management, network management, systems management
     HP - Enterprise
By: Genesys     Published Date: Oct 16, 2013
The existing upgrade paths from legacy PBX and ACD suppliers make it difficult for contact center executives to contemplate the future of customer service on their own terms. If your ACD-based contact center has become a road block for adding capacity or adding channels such as social media and mobile, you might want to think about making the switch to a SIP-based contact center solution. SIP delivers two important advantages over legacy switching: 1. SIP is based on open standards, so you can choose hardware and software that is best suited for your environment. 2. SIP’s capability extends beyond voice to new media types such as mobile, social media and video. SIP-based contact centers provide a roadmap to sophisticated features without the complexity and expense of traditional proprietary ACDs. Learn more about how to build the next-generation customer service platform.
Tags : contact center, customer service, social media, mobile, sip, technology solution, technology
     Genesys
By: CEB     Published Date: Dec 05, 2013
Improve confidence in your technology plans and break through the vendor hype with this real-world look at technologies actually being deployed by Infrastructure functions across the globe.
Tags : emerging technologies, managed cloud services, cloud based architectures, security technologies, industry trends, technology adoption, technology investment plan, security
     CEB
By: goTransverse     Published Date: Nov 02, 2016
In this era of cloud computing, mobile devices, and the Internet of Things (IoT), firms are testing new product offerings that combine elements of content, software, services, and hardware together. Like the innovative products themselves, the rulebook on monetizing them is evolving. Firms are shifting from one-time perpetual sales or fixed monthly subscriptions to consumption models that blend onetime, subscription, and usage-based billing. Download this white paper to learn the eight subscription billing solution providers that matter most and how they stack up.
Tags : 
     goTransverse
By: Citrix ShareFile     Published Date: Mar 31, 2017
Protecting your clients’ sensitive data is not optional. Data security is so important in finance that suspicion alone leaves many firms to reject modern cloud software as new or unproven. However, the facts tell a different story. Read this revealing e-book for 13 security facts your organization needs to make the best decision for your clients: • How built-in data encryption keeps your data safe • Why more security pros are concerned with user behavior than cloud tools • What your firm should know to utilize the cloud with confidence
Tags : cloud security, financial services, cloud based, electronic security, it protection, data security
     Citrix ShareFile
By: FinancialForce     Published Date: Dec 01, 2017
Traditional business models are getting shattered by subscriptions. No one can doubt the new services economy is flourishing. The cloud, mobile, digital, connected devices, globalization - all these things have had a hand in reshaping business and powering new business models. Companies today are wrapping service-based business models and while this shift adds new complexities for finance and has major revenue recognition implications, it also gives finance leaders huge opportunities to become bigger value creators for their business and make a stronger impact on enterprise-wide strategies - not financials.
Tags : 
     FinancialForce
By: FinancialForce     Published Date: Dec 01, 2017
software solutions that have been available to manufacturers and other entities. Custom, bespoke solutions have figured greatly in service organizations during this time frame. Spreadsheets, PC-based applications and components of larger ERP suites have rounded out the software portfolio of countless service firms globally.
Tags : 
     FinancialForce
By: Lenovo - APAC     Published Date: Jan 28, 2019
Australian businesses have long been recognised as leaders in the adoption of cloud services and the migration of core infrastructure to cloud platforms. Yet as ambitious ‘cloud-first’ programs are executed, performance and complexity issues have led many organisations to embrace the middle ground – a hybrid IT solution combining public cloud and on-premises infrastructure. Fast-growing hyperconverged infrastructure (HCI) platforms are increasingly being recognised as an ideal enabler for this strategy, with a software-based design that combines robust computing infrastructure with a high degree of centralisation, integration, flexibility, and analytics-based monitoring and manageability. Read how companies such as Beam Suntory have redefined enterprise architecture and learn more about the way an integrated hyperconverged infrastructure can help you build the right infrastructure for the future.
Tags : lenovodcg, nutanix, hyperconvergedinfrastructure, hci
     Lenovo - APAC
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics